样式: 排序: IF: - GO 导出 标记为已读
-
Beyond the limitations of real-time scheduling theory: a unified scheduling theory for the analysis of real-time systems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2021-11-29 Frank Slomka, Mohammadreza Sadeghi
We investigate the mathematical properties of event bound functions as they are used in the worst-case response time analysis and utilization tests. We figure out the differences and similarities between the two approaches. Based on this analysis, we derive a more general form do describe events and event bounds. This new unified approach gives clear new insights in the investigation of real-time systems
-
Automating integration under emergent constraints for embedded systems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2021-10-23 Johannes Schlatow, Edgard Schmidt, Rolf Ernst
As embedded applications are subject to non-functional requirements (latency, safety, reliability, etc.) they require special care when it comes to providing assurances. Traditionally, these systems are quite static in their software and hardware composition. However, there is an increasing interest in enabling adaptivity and autonomy in embedded systems that cannot be satisfied with preprogrammed
-
A new enhanced cyber security framework for medical cyber physical systems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2021-03-23 Ishaani Priyadarshini, Raghvendra Kumar, Le Minh Tuan, Le Hoang Son, Hoang Viet Long, Rohit Sharma, Sakshi Rai
Medical Cyber-Physical Systems (MCPS) are complex, location-aware, networked systems of medical devices that can be used as a piece of the healing center to give the best medical care to patients. Hence, they integrate human, cyber, and physical elements. Since MCPSs are life-critical and context-aware, they are significant to the healthcare industry, which is prone to data breaches and cyber-attacks
-
The 13th advanced summer school on service-oriented computing SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2020-08-01 Schahram Dustdar
The 13th advanced Summer School on Service Oriented Computing (SummerSOC’19) continued a successful series of summer schools that started in 2007, regularly attracting world-class experts inServiceOrientedComputing to present state-of-the-art research during a week-long program organized in several thematic tracks: IoT, formal methods for SOC, Cloud Computing, Data Science, Advanced Manufacturing,
-
Strategic logics for collaborative embedded systems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-12-05 Damian Kurpiewski, Diego Marmsoler
In embedded systems, there is a clear movement from autonomous systems towards collaborative systems, forming so-called collaborative system groups (CSGs), which collaborate to achieve common goals. Verification of CSGs, however, imposes new challenges, which are difficult to address with traditional verification techniques. In the following, we investigate the use of strategic logics for the analysis
-
Special issue on engineering collaborative embedded systems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-12-01 Bernhard Rumpe,Ina Schaefer,Bernd-Holger Schlingloff,Andreas Vogelsang
Welcome to the special issue on “Collaborative Embedded Systems” (CrESt). While in the old days software in embedded systems was isolated and mainly concentrating on predefined functionalities within the overall system context, software has now become the connecting factor between cooperating systems of systems and, because of its increasing functionality, also the driving complexity factor. Cyber-physical
-
Simulation methods and tools for collaborative embedded systems: with focus on the automotive smart ecosystems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-11-20 Emilia Cioroaica, Florian Pudlitz, Ilias Gerostathopoulos, Thomas Kuhn
Embedded Systems are increasingly equipped with open interfaces that enable communication and collaboration with other embedded systems. Collaborative embedded systems (CES) can be seen as an emerging new class of systems which, although individually designed and developed, can form collaborations at runtime. When embedded systems collaborate with each other, functions developed independently need
-
EURECA: epistemic uncertainty classification scheme for runtime information exchange in collaborative system groups SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-11-14 Constantin Hildebrandt, Torsten Bandyszak, Ana Petrovska, Nishanth Laxman, Emilia Cioroaica, Sebastian Törsleff
Collaborative embedded systems (CES) typically operate in highly dynamic contexts that cannot be completely predicted during design time. These systems are subject to a wide range of uncertainties occurring at runtime, which can be distinguished in aleatory or epistemic. While aleatory uncertainty refers to stochasticity that is present in natural or physical processes and systems, epistemic uncertainty
-
Towards runtime verification of collaborative embedded systems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-11-02 Samira Akili, Felix Lorenz
A group of collaborative embedded systems does not depend on a central authority to operate in uncertain environments. By engaging in various negotiation protocols, the participants assign roles, schedule tasks, and combine their world views for more resilient perception and planning. To verify functional correctness, critical components can be tested with simulation-based methods, but the possibility
-
(Self-)adaptiveness for manufacturing systems: challenges and approaches SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-11-01 Birte Caesar, Florian Grigoleit, Stephan Unverdorben
Shrinking lot sizes and growing product variability demand frequent changes in manufacturing systems. Common manufacturing systems, however, are built for large, invariant lot sizes. (Self-)adaptive manufacturing systems can, on the other hand, react quickly to changes in both function and capabilities. This ability makes them suitable to meet new customer or production requirements. Introducing (self-)adaptiveness
-
Design principles, architectural smells and refactorings for microservices: a multivocal review SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-09-03 Davide Neri, Jacopo Soldani, Olaf Zimmermann, Antonio Brogi
Potential benefits such as agile service delivery have led many companies to deliver their business capabilities through microservices. Bad smells are however always around the corner, as witnessed by the considerable body of literature discussing architectural smells that possibly violate the design principles of microservices. In this paper, we systematically review the white and grey literature
-
Freezing and defrosting cloud applications: automated saving and restoring of running applications SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Lukas Harzenetter, Uwe Breitenbücher, Kálmán Képes, Frank Leymann
In recent years, several technologies were developed enabling the automated provisioning and decommissioning of cloud applications. To reduce costs, these applications can be terminated and restarted on demand. However, as an application is terminated, its current application state, i.e., all application specific data is deleted along with the running application instance. This application state may
-
Pattern-based rewrite and refinement of architectures using graph theory SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Jasmin Guth, Frank Leymann
With the continuous growth of IT application systems, the complexity of architecture modeling and development increases. Patterns document proven solutions for recurring problems in an abstract and human readable manner. Within the domain of IT architectures, they should support the architecture modeling and development process. Due to the documentation of patterns as text documents, they cannot be
-
Transactional properties of permissioned blockchains SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Ghareeb Falazi, Vikas Khinchi, Uwe Breitenbücher, Frank Leymann
Traditional distributed transaction processing (TP) systems, such as replicated databases, faced difficulties in getting wide adoption for scenarios of enterprise integration due to the level of mutual trust required. Ironically, public blockchains, which promised to solve the problem of mutual trust in collaborative processes, suffer from issues like scalability, probabilistic transaction finality
-
Where to begin: on pattern language entry points SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Lukas Reinfurt, Michael Falkenthal, Frank Leymann
Pattern languages as tools for solving problems based on interconnected, abstract, and proven solutions can offer valuable help to practitioners. But there is always the question of where to begin when a pattern language should be applied. Their authors often provide entry points, but these are usually only useful if one starts completely from scratch or from a very specific situation. When confronted
-
A formal approach to build privacy-awareness into clinical workflows SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Saliha Irem Besik, Johann-Christoph Freytag
Clinical workflows consist of sets of tasks involving patients and healthcare professionals. In such an environment, maintaining the privacy of patient data is a significant challenge. Healthcare providers have to consider both legislative compliances with tightening privacy regulations and growing privacy concerns of individuals. Unlike data security, which aims at preventing unauthorized access,
-
The essential deployment metamodel: a systematic review of deployment automation technologies SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Michael Wurster, Uwe Breitenbücher, Michael Falkenthal, Christoph Krieger, Frank Leymann, Karoline Saatkamp, Jacopo Soldani
In recent years, a plethora of deployment technologies evolved, many following a declarative approach to automate the delivery of software components. Even if such technologies share the same purpose, they differ in features and supported mechanisms. Thus, it is difficult to compare and select deployment automation technologies as well as to migrate from one technology to another. Hence, we present
-
Quantum humanities: a vision for quantum computing in digital humanities SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Johanna Barzen, Frank Leymann
The establishment of digital humanities as a research field has shown that the use of computers as tools, but also the use of methods and techniques from computer science, can contribute enormously to research done in the humanities. Since quantum computers are expected to become generally available in the next few years, it is promising to use the advantages of this new technology for addressing existing
-
RADON: rational decomposition and orchestration for serverless computing SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 G. Casale, M. Artač, W.-J. van den Heuvel, A. van Hoorn, P. Jakovits, F. Leymann, M. Long, V. Papanikolaou, D. Presenza, A. Russo, S. N. Srirama, D. A. Tamburri, M. Wurster, L. Zhu
Emerging serverless computing technologies, such as function as a service (FaaS), enable developers to virtualize the internal logic of an application, simplifying the management of cloud-native services and allowing cost savings through billing and scaling at the level of individual functions. Serverless computing is therefore rapidly shifting the attention of software vendors to the challenge of
-
A lightweight messaging engine for decentralized data processing in the Internet of Things SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Daniel Del Gaudio, Pascal Hirmer
Today, Internet of Things applications are available throughout many different domains (manufacturing, health, cities, homes), enabling a high degree of automation to ease people’s lives. For example, automated heating systems in a smart home can lead to reduced costs and an increased comfort for the residents. In the IoT, situations can be detected through interpretation of data produced by heterogeneous
-
Requirements for a model-driven cloud-native migration of monolithic web-based applications SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Robin Lichtenthäler, Mike Prechtl, Christoph Schwille, Tobias Schwartz, Pascal Cezanne, Guido Wirtz
With the emergence of cloud-native applications, the question arises how existing, often monolithic, applications can be migrated to this new paradigm. The main migration challenges are the decomposition of an application into fine-grained components and the introduction of cloud computing paradigms. With complex existing applications the migration is difficult. A structured and tool-supported approach
-
Towards task-based parallelization for entity resolution SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-26 Leonardo Gazzarri, Melanie Herschel
Entity resolution (ER) refers to the problem of finding which virtual representations in one or more data sources refer to the same real-world entity. A central question in ER is how to find matching entity representations (so called duplicates) efficiently and in a scalable way. One general technique to address these issues is to leverage parallelization. In particular, almost all work on parallel
-
ASAP-DM: a framework for automatic selection of analytic platforms for data mining SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-08-17 Manuel Fritz, Osama Muazzen, Michael Behringer, Holger Schwarz
The plethora of analytic platforms escalates the difficulty of selecting the most appropriate analytic platform that fits the needed data mining task, the dataset as well as additional user-defined criteria. Especially analysts, who are rather focused on the analytics domain, experience difficulties to keep up with the latest developments. In this work, we introduce the ASAP-DM framework, which enables
-
The 12th Advanced Summer School on Service-Oriented Computing SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-05-22 Bernhard Mitschang
-
CSRD has become SICS SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-03-01 Sabine Glesner
Modern societies have undergone major changes during the last decade. Especially information and communication technologies have increasingly shaped many facets of the daily lives of many human beings as well as of, for example, industrial production, medicine technology, logistics, traffic management, environmental technology, and agriculture. Cyber-physical systems play a major role in this development
-
TOSCA-based Intent modelling: goal-modelling for infrastructure-as-code SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-13 Damian A. Tamburri, Willem-Jan Van den Heuvel, Chris Lauwers, Paul Lipton, Derek Palma, Matt Rutkowski
DevOps entails a set of practices that speed up the time needed to rollout software product changes. One such practice is automating deployment and delivery with infrastructure-as-code, i.e., automated scripts that ideally carry out 1-click deployment. Providing effective infrastructure-as-code poses the tricky issue in determining the modelling and information representation paradigm (e.g., Imperative
-
Mimicking FogDirector application management SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-08 Stefano Forti, Ahmad Ibrahim, Antonio Brogi
CISCO FogDirector is one of the first available tools supporting the management of the entire life cycle of applications deployed to Fog infrastructures. In this paper, we present a simple operational semantics of the main features of FogDirector, which provides a compact reference for the tool. We then introduce a prototype, based on such semantics, that can constitute the core of a simulation environment
-
Using architectural modifiability tactics to examine evolution qualities of Service- and Microservice-Based Systems SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-08 Justus Bogner, Stefan Wagner, Alfred Zimmermann
Software evolvability is an important quality attribute, yet one difficult to grasp. A certain base level of it is allegedly provided by Service- and Microservice-Based Systems, but many software professionals lack systematic understanding of the reasons and preconditions for this. We address this issue via the proxy of architectural modifiability tactics. By qualitatively mapping principles and patterns
-
Troubleshooting Serverless functions: a combined monitoring and debugging approach SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-06 Johannes Manner, Stefan Kolb, Guido Wirtz
Today, Serverless computing gathers pace and attention in the cloud computing area. The abstraction of operational tasks combined with the auto-scaling property are convincing reasons to adapt this new cloud paradigm. Building applications in a Serverless style via cloud functions is challenging due to the fine-grained architecture and the tighter coupling to back end services. Increased complexity
-
On the algebraic properties of concrete solution aggregation SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-06 Michael Falkenthal, Uwe Breitenbücher, Johanna Barzen, Frank Leymann
Pattern languages are a pervasive means in many domains to capture proven solutions for recurring problems in an abstract manner. To improve reusability, they abstract from implementation details such as specific technologies or environments. However, while this abstraction provides a significant benefit as patterns can be applied to solve different manifestations of the general problem, this also
-
An approach to automatically detect problems in restructured deployment models based on formalizing architecture and design patterns SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-06 Karoline Saatkamp, Uwe Breitenbücher, Oliver Kopp, Frank Leymann
For the automated deployment of applications, technologies exist which can process topology-based deployment models that describes the application’s structure with its components and their relations. The topology-based deployment model of an application can be adapted for the deployment in different environments. However, the structural changes can lead to problems, which had not existed before and
-
Modeling and execution of blockchain-aware business processes SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-06 Ghareeb Falazi, Michael Hahn, Uwe Breitenbücher, Frank Leymann
The blockchain is an emerging technology that allows multiple parties to agree on a common state without the need for trusted intermediaries. Moreover, business process technology streamlines the automation of inter- and intra-organizational processes while cutting-down on costs. With the new business opportunities provided by blockchains, it becomes vital to combine both technologies to allow the
-
Migrating parallel applications to the cloud: assessing cloud readiness based on parallel design decisions SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-06 Stefan Kehrer, Wolfgang Blochinger
Parallel applications are the computational backbone of major industry trends and grand challenges in science. Whereas these applications are typically constructed for dedicated High Performance Computing clusters and supercomputers, the cloud emerges as attractive execution environment, which provides on-demand resource provisioning and a pay-per-use model. However, cloud environments require specific
-
Quality-driven early stopping for explorative cluster analysis for big data SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2019-02-06 Manuel Fritz, Michael Behringer, Holger Schwarz
Data analysis has become a critical success factor for companies in all areas. Hence, it is necessary to quickly gain knowledge from available datasets, which is becoming especially challenging in times of big data. Typical data mining tasks like cluster analysis are very time consuming even if they run in highly parallel environments like Spark clusters. To support data scientists in explorative data
-
The 11th advanced summer school on service-oriented computing SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2018-07-12 Guido Wirtz
The 11th advanced summer school on service oriented computing (SummerSOC’17) continued a successful series of summer schools that started in 2007, regularly attracting world-class experts in service oriented computing to present state-of-the-art research during a week-long program organized in several thematic tracks: patterns and IoT, formal methods for SOC, computing in the clouds, data science,
-
Analyzing the power consumption behavior of a large scale data center SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2018-05-29 Kashif Nizam Khan, Sanja Scepanovic, Tapio Niemi, Jukka K. Nurminen, Sebastian Von Alfthan, Olli-Pekka Lehto
The aim of this paper is to illustrate the use of application and system level logs to better understand scientific data center behavior and energy-spending. Analyzing a data center log of 900 nodes (Sandy Bridge and Haswell), we study node power consumption and describe approaches to estimate and forecast it. Our results include methods to cluster nodes based on different vmstat and RAPL measurements
-
The influence of two modern compiler infrastructures on the energy consumption of the HPCG benchmark SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2018-05-15 Armin Jäger, Jan-Patrick Lehr, Christian Bischof
As energy consumption plays a more and more critical role in high-performance computing installations, investigating the influence of the different system components and their share w.r.t. energy consumption is of great interest. The compiler is one of the key parts of the software environment. Unlike processor frequency and power limits, the influence of the compiler and its sets of optimizations
-
Combining global regression and local approximation in server power modeling SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2018-05-02 Xiaoming Du, Cong Li
To evaluate energy use in green clusters, power models take the resource utilization data as the input to predict server power consumption. We propose a novel method in power modeling combining a global linear model and a local approximation model. The new model enjoys high accuracy by compensating the global linear model with local approximation and exhibits robustness with the generalization capability
-
Power measurement techniques for energy-efficient computing: reconciling scalability, resolution, and accuracy SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2018-04-23 Thomas Ilsche, Robert Schöne, Joseph Schuchart, Daniel Hackenberg, Marc Simon, Yiannis Georgiou, Wolfgang E. Nagel
The rising concern for power consumption of large-scale computer systems puts a research focus on the respective measurement methods. Varying workload patterns and energy efficiency optimizations cause highly dynamic power consumption on today’s compute nodes—a challenge for every measurement infrastructure. We identify five partly contradictory requirements that characterize such infrastructures:
-
6th DACH+ Conference on Energy informatics (EnInf 2017) SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2018-01-30 Silvia Santini,Verena Tiefenbeck
This volume contains the scientific contributions accepted for presentation at the 6th DACH+ Conference on Energy Informatics (EnInf 2017). The objective of the DACH+ conference series on Energy Informatics is to promote the research, development, and implementation of information and communication technologies in the energy domain and to foster the exchange between academia, industry, and service
-
TOSCA-based container orchestration on Mesos SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-27 Stefan Kehrer, Wolfgang Blochinger
Container virtualization evolved into a key technology for deployment automation in line with the DevOps paradigm. Whereas container management systems facilitate the deployment of cloud applications by employing container-based artifacts, parts of the deployment logic have been applied before to build these artifacts. Current approaches do not integrate these two deployment phases in a comprehensive
-
Towards a conceptual foundation of service composition SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-25 Wolfgang Reisig
Service Orientation is a computing paradigm that fundamentally differs from previous paradigms. Advocated by Software Industry, it lacks from theoretical foundation and a systematic build-up. In this paper we suggest concepts and ideas for a theoretical foundation and a systematic build-up of a key part of SOC, namely service composition.
-
API governance support through the structural analysis of REST APIs SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-22 Florian Haupt, Frank Leymann, Karolina Vukojevic-Haupt
Today, REST APIs have established as a means for realizing distributed systems and are supposed to gain even more importance in the context of Cloud Computing, Internet of Things, and Microservices. Nevertheless, many existing REST APIs are known to be not well designed, resulting in the absence of desirable non-functional properties that truly RESTful systems entail. Although existing analysis show
-
Customization and provisioning of complex event processing using TOSCA SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-18 Ana Cristina Franco da Silva, Pascal Hirmer, Uwe Breitenbücher, Oliver Kopp, Bernhard Mitschang
In many Internet of Things scenarios, a large amount of sensor data is continuously produced and exchanged among devices in smart environments. Handling these data causes great challenges since their processing must occur in a timely manner. Furthermore, the exchanged data must be kept at a minimum in order to efficiently use network resources of constrained devices. Complex event processing (CEP)
-
Modeling and execution of data-aware choreographies: an overview SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-18 Michael Hahn, Uwe Breitenbücher, Oliver Kopp, Frank Leymann
Due to recent advances in data science and Big Data the importance of data is increasing. Although service choreographies provide means to specify complex conversations between multiple interacting parties from a global perspective and in a technology-agnostic manner, they do not fully reflect the paradigm shift towards data-awareness at the moment. In this paper, we discuss current shortcomings such
-
Partial execution of Mashup Plans during modeling time SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-18 Pascal Hirmer, Michael Behringer, Bernhard Mitschang
Workflows and workflow technologies are an approved means to orchestrate services while supporting parallelism, error handling, and asynchronous messaging. A special case workflow technology is applied to are Data Mashups. In Data Mashups, workflows orchestrate services that specialize on data processing. The workflow model itself specifies the order data is processed in. Due to the fact that Data
-
Automated deserializer generation from CIM ontologies: CIM $${+}{+}$$ + + —an easy-to-use and automated adaptable open-source library for object deserialization in C $${+}{+}$$ + + from documents based on user-specified UML models following the Common Information Model (CIM) standards for the energy sector SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-13 Lukas Razik, Markus Mirz, Daniel Knibbe, Stefan Lankes, Antonello Monti
The increasing complexity of ICT systems in smart grids requires that all actors improve their interoperability. To this aim, IEC 61970/61968 specify the Common Information Model (CIM) which describes terms in the energy sector and relations between them. One of the key features of CIM is its object-oriented design based on the Unified Modeling Language (UML). This makes CIM easy to maintain and extensible
-
Phase preserving profile generation from measurement data by clustering and performance analysis: a tool for network planning and operation SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-11 Paul Zehetbauer, Matthias Stifter, Bharath Varsh Rao
The need for improved operational efficiency planning accuracy leads to a growing number of sensors and other monitoring sources in our power system. New methods for properly dealing with this increasing amount of data are required. This paper presents how clustering can help to drastically reduce the processing time of energy data time series. The developed approach categorizes similar load behavior
-
Exploiting flexibility in smart grids at scale SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-11 Lukas Barth, Dorothea Wagner
Large parts of the worldwide energy system are undergoing drastic changes at the moment. Two of these changes are the increasing share of intermittent generation technologies and the advent of the smart grid. A possible application of smart grids is demand response, i.e., the ability to influence and control power demand to match it with fluctuating generation. We present a heuristic approach to coordinate
-
Poster Abstract: Real-time load prediction with high velocity smart home data stream SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-11 Christoph Doblander, Martin Strohbach, Holger Ziekow, Hans-Arno Jacobsen
This poster addresses the use of smart home data to continuously predict the aggregated energy consumption of individual households. We introduce a device level energy consumption dataset recorded over 3 years wich includes high resolution energy measurements from electrical devices collected within a pilot program. Using data from that pilot, we analyze the performance of various machine learning
-
Poster Abstract: Less energy, more efficiency in server rooms and data centers SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-08 Beat Koch, Doris Slezak
Server rooms and data centers consume approximately 3% of the total electricity production in Switzerland. Studies have shown that more than 40% of that energy could be saved if common best practices were implemented by facility and IT operators. In order to raise public awareness of this relevant energy-saving potential, the Swiss Telecommunications Association was asked to set up a campaign. We describe
-
Modeling and simulation of local flexibilities and their effect to the entire power system SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-05 Lukas Exel, Georg Frey
The transformation of the energy system requires new methods for its modeling and simulation, as established methods are facing problems in representing the increasing complexity and flexibility. We present the modeling and simulation framework MOCES that is based on the modeling language Modelica. The novelty of MOCES is the explicit modeling of the processes that ensure the balancing of production
-
NIWM: non-intrusive water monitoring to uncover heat energy use in households SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-05 Samuel Schöb, Sebastian A. Günther, Karl Regensburger, Thorsten Staake
In Europe and the US, hot water use accounts for 13–18% of the average home’s energy consumption, compared to just 4 and 6% for lighting and cooking, respectively. As water heating mostly relies on oil, gas, and electricity, hot water use has been identified as an important target of many carbon reduction programs. We propose and describe a system that—comparable to non-intrusive load monitoring for
-
Poster abstract: Big Data beats engineering in residential energy performance assessment—a case study SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-05 Gilbert Fridgen, Florian Guggenmos, Christian Regal, Marco Schmidt
Engineering-based energy performance assessments, e.g., required for the award of energy certificates, evoke significant effort and lack accuracy. This paper introduces the idea of building energy performance assessment on Big Data Analytics and information on buildings and occupants while respecting people’s privacy. Using a case study, we investigate whether the proposed method can outperform engineering-based
-
Poster abstract: economics-inspired modeling of data centre power flexibility SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-05 Sonja Klingert, Christian Becker
Keeping the power grid stable becomes more and more challenging with the increasing share of distributed and intermittent power generation from renewables. Facing this challenge requires using all flexibility options including adaptive power demand. Data centers are huge energy consumers, but fortunately they possess inherent flexibility through shiftable workloads and highly automated processes. Therefore
-
Using locally produced photovoltaic energy to charge electric vehicles SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-04 René Buffat, Dominik Bucher, Martin Raubal
Mobility in Switzerland currently consumes about 35% of the total energy demand. While internal combustion engines still generate most of it, the increasing number of electric vehicles changes the landscape by decoupling energy production from consumption. This allows using more sustainable energy sources, such as photovoltaics (PV), hydroelectric power plants or wind turbines. In the past years, the
-
Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-04 Fabian Knirsch, Andreas Unterweger, Dominik Engel
Electric vehicles are gaining widespread adoption and are a key component in the establishment of the smart grid. Beside the increasing number of electric vehicles, a dense and widespread charging infrastructure will be required. This offers the opportunity for a broad range of different energy providers and charging station operators, both of which can offer energy at different prices depending on
-
Smart grid co-simulation with MOSAIK and HLA: a comparison study SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-04 C. Steinbrink, A. A. van der Meer, M. Cvetkovic, D. Babazadeh, S. Rohjans, P. Palensky, S. Lehnhoff
Evaluating new technological developments for energy systems is becoming more and more complex. The overall application environment is a continuously growing and interconnected cyber-physical system so that analytical assessment is practically impossible to realize. Consequently, new solutions must be evaluated in simulation studies. Due to the interdisciplinarity of the simulation scenarios, various
-
A market-based smart grid approach to increasing power grid capacity without physical grid expansion SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-04 Joachim Bagemihl, Frank Boesner, Jens Riesinger, Michael Künzli, Gwendolin Wilke, Gabriela Binder, Holger Wache, Daniel Laager, Jürgen Breit, Michael Wurzinger, Juliana Zapata, Silvia Ulli-Beer, Vincent Layec, Thomas Stadler, Franz Stabauer
The continuous increase of competitiveness of renewable energy in combination with the necessity of fossil fuel substitution leads to further electrification of the global energy system and therefore a need for large-scale power grid capacity increase. While physical grid expansion is not feasible for many countries, grid-driven energy management in the Smart Grid often interferes in customer processes
-
A threat analysis of the vehicle-to-grid charging protocol ISO 15118 SICS Softw.-Inensiv. Cyber-Phys. Syst. Pub Date : 2017-09-01 Kaibin Bao, Hristo Valev, Manuela Wagner, Hartmut Schmeck
This work performs a security analysis of the vehicle-to-grid charging protocol ISO 15118 and presents various scenarios of how to compromise the availability of the charging service or the integrity, authenticity, or confidentiality of the communication on a protocol level. Furthermore, it analyzes processes related to the authentication, transfer of information, and the certification hierarchy for