Laboratoire d’analyse et d’architecture des systèmes
E.FKI, S.TAZI, K.DRIRA
Revue Scientifique : Future Generation Computer Systems, Vol.68, pp.376-390, Mars 2017 , N° 16468
In recent years, the composition of loosely coupled services with the aim of satisfying the user intention is a widely followed research topic. The composition of services implies the ability to select, coordinate, interact, and interoperate existing services. This is considered as a complex task. This complexity is mainly due to the large number of available services and their heterogeneity as they are created by different organizations. This complexity is increased when services must be dynamically and automatically composed to meet requirements which are not satisfied by existing services. In fact, an approach for service composition must offer the potential to achieve flexible and adaptable applications, by selecting and combining services based of the request and the context of the user. In this perspective, different approaches have been developed for services composition. However, most of the existing composition approaches tend to be static and not flexible in the sense that they do not have the ability to adapt to user requirements. To overcome these challenges, we propose a composition approach in which the generation of the composition schema is performed at runtime through the use of abstract services provided at design time. The composition process that we propose takes as input a structure of user requirements materialized by a graph of intentions and enriches this graph to explicit the implicit relationships. The enriched graph is used to generate an initial composition schema by building the control flow and selecting the appropriate abstract services. The selection of these services is based on the semantic matching and the degree of semantic affinity between abstract services. Then, the final composition schema is generated using a refinement mechanism of abstract services using semantic matching techniques and taking into account user context and constraints.
T.SEREGINA, O.BRUN, R.ELAZOUZI, B.PRABHU
SARA, LIA Avignon
Revue Scientifique : IEEE Transactions on Mobile Computing, Vol.16, N°2, pp.453-465, Février 2017, doi 10.1109/TMC.2016.2546910 , N° 14418
A central problem in Delay Tolerant Networks (DTNs) is to persuade mobile nodes to participate in relaying messages. Indeed, the delivery of a message incurs a certain number of costs for a relay. We consider a two- hop DTN in which a source node, wanting to get its message across to the destination as fast as possible, promises each relay it meets a reward. This reward is the minimum amount that offsets the expected delivery cost, as estimated by the relay from the information given by the source (number of existing copies of the message, age of these copies). A reward is given only to the relay that is the first one to deliver the message to the destination. We show that under fairly weak assumptions the expected reward the source pays remains the same irrespective of the information it conveys, provided that the type of information does not vary dynamically over time. On the other hand, the source can gain by adapting the information it conveys to a meeting relay. For the particular cases of two relays or exponentially distributed inter-contact times, we give some structural results of the optimal adaptive policy.
A.GASSARA, I.BOUASSIDA, M.JMAIEL, K.DRIRA
ReDCAD Laboratory, SARA
Revue Scientifique : Computers and Electrical Engineering, Vol.58, pp.113-125, Février 2017 , N° 17033
In this paper, we present a multi-scale modeling methodology for software System of Systems (SoS) using the formal technique of Bigraphical Reactive System. This methodology provides a correct by design approach ensuring the correctness of the SoS architectures. A first scale is defined by the designer. Then, it is refined by successively adding lower scale details. The transition between scales is implemented following a rule-oriented refinement process. The executed rules respect the system constraints ensuring, in this way, the correctness of the obtained scale architectures. Moreover, we address the dynamic aspect of SoS by providing model-based rules of reconfiguration actions. We illustrate our approach with a Smart Buildings case study.
M.A.LOPEZ, J.M.OCON, C.ARE RUA, J.DROMARD, P.OWEZARSKI
Rapport de Contrat : ONTIC Project (GA number 619633), Janvier 2017, 70p. , N° 17042
Deliverable D5.4 purpose is to document the final set of requirements for Use Case #1 (Network Intrusion Detection) jointly with the design, implementation and validation of its corresponding prototype. Additionally, updates in the Use Case requirements are also shown. The ONTIC Use Case development and implementation follows a customized version of the Scrum Agile methodology (as described in deliverable D5.1 ); therefore, the requirements are described as user stories. The different sections in the document provide: Introduction of Use Case #1 in terms of their application in CSP environments, operational goals and machine learning algorithms (section 7). Use case #1 specification is described in section 8). Definitions of Done (DoD) are provided in (Annex A) Use case #1 design is detailed in section 9. Use case #1 implementation details are documented in section 10 . Use case #1 testing documentation is shown in section 11
C.DIETZEL, M.ABT, M.CHIESA, P.OWEZARSKI
DE-CIX, UCL, SARA
Rapport de Contrat : H2020-ICT-2014-1 Project No. 644960, Janvier 2017, 16p. , N° 17007
Over the course of the ENDEAVOUR project the consortium developed a wide range of use cases as potential candidates to be implemented within the ENDEAVOUR prototype. After consolidating the most compelling use cases we implemented them into the ENDEAVOUR platform. To this end, the present deliverable showcases the implemented use cases of the ENDEAV- OUR platform for Internet eXchange Point (IXP) members. Each use case is demonstrated in a video. In addition, Deliverable 4.4 discusses the relevant use cases for IXP operators. In combination, these two deliverables reflect the current state of the ENDEAVOUR platform prototype. We present technical background necessary to understand the implementation of each use case, the high level implementation itself, as well as a workflow of each demonstration.
F.OQUENDO, K.DRIRA, A.LEGAY, T.BATISTA
Univ Bretagne Sud, SARA, INRIA Rennes, UFRN, Brésil
Ouvrage (éditeur) : Proceedings of the 1st ACM SAC Conference Track on Software-intensive Systems-of-Systems (SiSoS 2017): 32nd ACM SIGAPP Symposium On Applied Computing, Janvier 2017 , N° 17010
Rapport LAAS N°17006, Janvier 2017, 15p.
E.FERNANDES, G.BOETTGER, G.ANTICHI, R.LAPEYRADE, P.OWEZARSKI
Univ Quenn Mary, Londres, CAMBRIDGE, SARA
Rapport de Contrat : H2020-ICT-2014-1 Project No. 644960, Janvier 2017, 20p. , N° 17012
This is the accompanying report of the demonstrator of Work Package 3 for month 24, where the implementation of the ENDEAVOUR monitoring platform is documented. In this report, we briefly discuss the organization of the code development, we then describe the implementation of the ele- ments of the ENDEAVOUR monitoring platform, and finally, present and document the demonstrators.
J.DROMARD, P.OWEZARSKI, M.A.LOPEZ, M.A.MONJAS, A.BASCUNANA, V.MARTIN, F.ARIAS, A.MOZO, S.GOMEZ, B.ORDOZGOITI
SARA, SATEC, ERICSSON, EMC2, UPM
Rapport de Contrat : ONTIC Project (GA number 619633), Janvier 2017, 37p. , N° 17043
Deliverable D5.3 purpose is to provide information about how the algorithms developed in scientific work packages have been applied in use cases. Although it is possible to assume that integration should have been straightforward, in general, adaptations, configurations, and transformations are needed. For instance, the following adaptation could have been needed: Interface adaptation: it means not only protocol (many times a specific protocol wrapper has been designed), but also data model adaptation. Sometimes it has been also interconnected using other off-the-self systems such as data brokers, cloud platforms... Redesign if the algorithm was designed in a language/technology different from the one used in the use case. Also, the following information would be needed in order to fully understand how the algorithms are run: The parameters used in the algorithm implementation within the use case. For instance, if considering a Spark Streaming-based algorithm, the size of the windows or the thresholds used. The configuration parameters for the platform where the algorithm is run (RAM, processors...)
M.A.LOPEZ, M.A.MONJAS, A.BASCUNANA, B.ORDOZGOITI, A.MOZO, S.GOMEZ, D.APILETTI, A.TZAFERIS, P.OWEZARSKI, F.ARIAS, V.MARTIN
SATEC, ERICSSON, UPM, Politecnico Torino, ADAPTIT, SARA, EMC2
Rapport de Contrat : ONTIC Project (GA number 619633), Janvier 2017, 31p. , N° 17040
This deliverable presents the progress in the exploitation and dissemination plans for the project    during the third period (third year) of the project by describing the activities performed in order to implement these plans and it is and update of deliverable D6.5  The set of activities include scientific papers, journals and conferences of interest, IPR, press releases, and a list of relevant industrial associations that are interested in the project activities and outcomes. Both future and current to-date activities are presented, targeting different scientific communities, students, stakeholders and decision makers.