Learn More
A range of common software components are gradually being integrated into the infrastructures that support safety-critical systems. These include network management tools, operating systems-especially Linux, Voice Over IP (VOIP) communications technologies, Satellite Based Augmentation Systems for navigation/timing data etc. The increasing use of these(More)
The Intelligent Environment consists of ubiquitous connectivity in sensor rich environments coupled with adaptive technologies that allow access from multiple devices with varying capabilities. Context information is drawn from what the Intelligent Environment can sense about its current physical and computational environments. This context information(More)
This paper presents some ideas for efficiently allocating resources to enhance the performance of gang scheduling. We first introduce a job repacking scheme. In this scheme we try to rearrange the order of job execution on their originally allocated processors in a scheduling round to combine small fragments of available processors from different time slots(More)
National and international organisations including NIST and ENISA have published guidance that is intended to help organisations respond to, and recover from, cyber incidents. They provide detailed information about contingency planning, about the processes needed to gather and analyse evidence, about appropriate ways to disseminate the findings from(More)
The LERP project aims to assist the ap1000 programmer with essential monitoring and debugging tools. LERP is based on oo-line analysis and replay of an event trace. A common event trace format includes both low level system events and user-deened events. In this paper we address the issues of instrumentation of ap1000 programs with minimal interference, and(More)
Clinicians and support staff are faced with increasingly complex computer applications. This complexity stems partly from the integration of heterogeneous systems ranging from computerized patient records to theatre management and dosage planning applications, and also from the increased functionality offered by the new generation of IT systems. Many(More)
Location awareness is a crucial part of the context-awareness mechanism for ubicomputing. This paper explores how usefull is the location awareness history for an office based low-cost context-awareness environment. Capturing location awareness data into a relational database is simple and feasible in office environment. We use extended SQL to access the(More)
Safety cases provide high-level support for the development of critical systems. They present a graphical overview of arguments and evidence to demonstrate that complex applications are acceptably safe within a particular context of use. This paper shows how safety cases support the application of the latest generation of augmented Global Navigation(More)