András Pataricza

András Pataricza
Budapest University of Technology and Economics · Department of Measurement and Information Systems

Prof.

About

172
Publications
18,604
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,719
Citations
Citations since 2016
24 Research Items
261 Citations
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
Introduction
András Pataricza is a full professor at the Department of Measurement and Information Systems, Budapest University of Technology and Economics. András does research in Computer Science, Computer Engineering..'
Additional affiliations
May 2003 - September 2003
July 1977 - present
Budapest University of Technology and Economics

Publications

Publications (172)
Article
The design and operation of modern software systems exhibit a shift towards virtualization, containerization and service-based orchestration. Performance capacity engineering and resource utilization tuning become priority requirements in such environments. Measurement-based performance evaluation is the cornerstone of capacity engineering and desi...
Article
Proper timeliness is vital for a lot of real-world computing systems. Understanding the phenomena of extreme workloads is essential because unhandled, extreme workloads could cause violation of timeliness requirements, service degradation, and even downtime. Extremity can have multiple roots: (1) service requests can naturally produce extreme workl...
Chapter
Container restart after failure is a key mechanism in the service availability management of containerized environments. However, container restart times empirically have long tail distributions, posing a risk for many soft real-time cyber-physical, telco and IoT systems, where service component downtimes have to remain under a specific threshold....
Chapter
Safety-critical systems are designed to operate millions of hours without losing or harming life. Millions of hours enable events with small occurrence probability to materialise. Owing to this, rare events have to be factored when designing for millions of safe operating hours. In this paper, we apply a statistical paradigm named Extreme Value ana...
Article
Full-text available
Blockchain has become particularly popular due to its promise to support business-critical services in very different domains (e.g., retail, healthcare). Blockchain systems rely on complex middleware, like Ethereum or Hyperledger Fabric, that allow running smart contracts, which specify business logic in cooperative applications. The presence of so...
Chapter
Containerization, and container-based application orchestration and management - primarily using Kubernetes - are rapidly gaining popularity. Resilience in such environments is an increasingly critical aspect, especially in terms of fault recovery, as containerization-based microservices are becoming the de facto standard for soft real-time and cyb...
Preprint
Full-text available
Blockchain has become particularly popular due to its promise to support business-critical services in very different domains (e.g., retail, supply chains, healthcare). Blockchain systems rely on complex middleware, like Ethereum or Hyperledger Fabric, that allow running smart contracts, which specify business logic in cooperative applications. The...
Article
Full-text available
In today's dynamic and highly composed environments, IT service performance and dependability assurance require efficient reasoning about the performance and dependability effects of faults and the countermeasures to choose, using limited knowledge. Model- and observation-based qualitative error propagation analysis methods can be applied to this e...
Conference Paper
Cyber-physical systems frequently perform measurement and control of safety-critical applications. Collecting data for a posteriori analysis in hazardous and or catastrophic situations is of crucial importance both for investigations and effective measures aiming at avoidance of a recurrence of such events. At the same time, damage confinement and...
Conference Paper
After the success of bitcoin proved the viability of the distributed ledger technology, other frameworks emerged with the goal of providing a general purpose blockchain platform for businesses to execute smart contracts. The private and permissioned platforms are promising replacements for many current systems in several sectors, such as finance, h...
Article
Timeliness and throughput critical applications require a framework offering predictable temporal characteristics. The best practice for estimating a prediction of the system dynamics relies on benchmarking. Each novel middleware solution needs such an evaluation as part of the development process to assure an appropriate throughput in the future u...
Article
Cloud computing has become the fundamental platform for service offerings. Such services frequently face peaks in their variable workload. Thus, the cloudification of critical applications with strict service level agreements (e.g., performability) needs a properly engineered capacity to withstand peak loads. A core problem is the prediction of the...
Conference Paper
Blockchain technologies target domains where strict performance guarantees are required and formal Service Level Agreements are commonplace. Designing for performance targets in a trustworthy manner requires performance models; we present a performance characterization approach that addresses the complexity of Blockhain technologies. We apply the m...
Conference Paper
The current paper presents an approach to analyse V&V projects in order to facilitate cost and quality estimation based on historical data. We focus on factors to be used in specialized version of industrial cost estimators, therefore we focus on the characteristics of V&V projects, namely, the typical phases of development and related V&V activiti...
Conference Paper
Design for resiliency always needs a proper trade-off between dependability of a system, and (cost) overhead. Cloud computing offers surplus resources at a favorable cost, thus (modular) redundancy based solutions became affordable for a broad spectrum of applications. The paper aims at a risk model based assessment of the benefit of applying redun...
Conference Paper
Safety analysis is increasingly important for a wide class of systems. In the automotive field, the recent ISO26262 standard foresees safety analysis to be performed at system, hardware, and software levels. Failure Modes and Effects Analysis (FMEA) is an important step in any safety analysis process, and its application at hardware and system leve...
Conference Paper
Resilience is the ability of a system to return to its normal operation state after a change or disturbance. Frequently, resilience of a system can be only empirically estimated due to the complexity of the underlying mechanisms. While traditional dependability uses quantitative characteristics based on averaging the impacts of faults, resilience r...
Conference Paper
Full-text available
It is my distinguished pleasure to welcome all the participants to Budapest and the 43nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks. The Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) is the most prestigious international forum for presenting research results in the field of depe...
Article
Guaranteeing QoS of services deployed in clouds is a key issue in cloud environments. Cloud services rely heavily on sharing resources between tenants; users have only partial knowledge and control of them. Limited observability and controllability make guaranteeing QoS a challenging task. Many important classic approaches to QoS assurance cannot b...
Article
Full-text available
Our paper outlines the application of two data mining techniques for the automatic processing of failure data. The first solutions aims at identifying those parts of a complex HW/SW system built up of COTS components whose incom-patibilities or undesired interactions lead to system failures. The second approach is proposed for automatic discovery o...
Article
Full-text available
Model-driven architecture (MDA) based paradigms gen-erate a complete specification of the target system in addi-tion to its implementation. Such a specification facilitates the formal analysis and prediction of the characteristics of the target system. The prerequisite of the analysis of non-functional properties is the extension of the model by th...
Conference Paper
This paper describes a model-driven development methodology that supports the design, implementation and maintenance of complex, evolving systems. The key asset in this methodology is a domain specific design ontology which incorporates multiple aspects of the system under design. The methodology considers different input data and metamodels during...
Article
Full-text available
The core of proactive system management is the exploitation of the built-in intelligence of computer infrastructures in order to implement self-∗ properties for the assurance of a guaranteed quality of service even in the case of faults by reacting to them prior they affect services. The creation of a proper system control policy and implementation...
Article
The main strategic objectives of the embedded systems industry are increased design and manufacturing productivity and quality. The appearance of general purpose design and implementation components and platforms requires new paradigms for creating critical embedded systems out of standardized COTS components. Another main driver and simultaneously...
Article
Embedded systems increasingly entail complex issues of hardware–software (HW–SW) co-design. As the number and range of SW functional components typically exceed the finite HW resources, a common approach is that of resource sharing (i.e., the deployment of diverse SW functionalities onto the same HW resources). Consequently, to result in a meaningf...
Conference Paper
Full-text available
Performability control of IT systems still lacks theoretically well-founded approaches that fit well to enterprise system management solutions. We propose a methodology for designing compact qualitative, state-based predictive performability control that use instrumentation provided by typical system monitoring frameworks. We identify the main syst...
Conference Paper
Full-text available
The design of safety-critical systems and business-critical services necessitates to coordinate between a large variety of tools used in different phases of the development process. As certification frequently prescribes to achieve justified compliance with regulations of authorities, integrated tool chain should strictly adhere to the development...
Article
Full-text available
The assurance of a good software product quality necessitates a managed software process. Periodic product evaluation (inspection and testing) should be executed during the development process in order to simultaneously guarantee the timeliness and quality aspects of the development workflow. A faithful prediction of the efforts needed forms the ba...
Article
Full-text available
Moving from the traditional federated design paradigm, integration of mixed-criticality software components onto common computing platforms is increasingly being adopted by automotive, avionics and the control industry. This method faces new challenges such as the integration of varied functionalities (dependability, responsiveness, power consumpti...
Conference Paper
Full-text available
Supervisory control is the main means to assure a high level performance and availability of large IT infrastructures. Applied control theory is used in physical and virtualization based clustering, autonomic-, self-healing and cloud computing, but similar problems arise in any distributed environment. The selection of a compact, but sufficiently c...
Article
Full-text available
Formal methods can effectively support the model driven develoment and analysis of IT applications in many domains. Typically, the domain-specific engineering models are transformed to formal analysis models (to compute measures that help the designer in verifying the design decisions) and verified models are mapped to test and implementation relat...
Conference Paper
Frequently, model-based computing is looked at as a good paradigm increasing productivity by allowing an increase in the design level, thus in productivity and reusability similar to that what happened several decades ago when software technology changed from machine near assembly programming to high-level languages. However, model-based design (an...
Book
Full-text available
The world of embedded systems is broad and diverse, addressing a wide variety of application domains. Although technologically, the situation for embedded systems is still quite fragmented, platform-based engineering, reference designs and maturing system domains have effected great changes. However, the features of modern embedded systems are chan...
Article
Full-text available
Viatra2 (VIsual Automated model TRAnsformations) is a general-purpose model transformation engineering framework that aims at supporting the entire life-cycle, i.e. the specification, design, execution, validation and maintenance of transformations within and between various modeling languages and domains in the MDA. This paper reports on the curre...
Article
Full-text available
As mobile systems are gaining more and more importance in every aspect of life, be it business or everyday use, the need for highly available services appear there too. In fixed infrastructures, the computer clusters have been extensively used to provide such services. For example, a special type of computer clusters, the high availability clusters...
Conference Paper
Large, distributed IT infrastructures providing business-critical services have to protect themselves against internal and external threats and adapt to changing environmental parameters, as workload. Most widely applied, structural resilience mechanisms use some form of local static redundancy deployed to each critical resource for failover. Howev...
Article
Full-text available
We present a method for testing the implementation of graph transformation specifications focusing on test case generation for graph pattern matching. We propose an extensible fault model for the implementation of transformations based on common programmer faults and the technicalities of graph transformations. We integrate traditional hardware tes...
Article
Full-text available
Bounded Model Checking (BMC) is often able to handle thousands of system variables by encoding the system and its properties via symbolic formulas and using satisfiability (SAT) solvers for verification. To further ease the verifica-tion of state invariants, BMC is augmented with a general induction rule called k -induction; however, this sacrifice...
Article
Full-text available
This paper proposes the application of On-Line Analytical Processing (OLAP) and data mining approaches to analyse the large amount of raw data collected in fault injection campaigns and dependability benchmarking experiments. We use data warehousing technologies to store raw results from different experiments in a multidimensional structure where r...
Article
Full-text available
A new equipment of safety relevance has been developed to upgrade ageing relay-based railway interlocking systems in Hungary. In course of the design process formal methods have been used in the development of a module realising a well-separable function of the system. Namely, the UML-based design process was extended by model based analysis and va...
Conference Paper
Full-text available
It is often considered that a protocol that has been verified for its dependability properties at the protocol level maintains these proven properties over its implementation. Focusing on synchronous protocols, we demonstrate that this assumption can easily be fallacious. We utilize the example of an existing formally verified diagnostic protocol a...
Conference Paper
The integrated EU-project DECOS (Dependable Embedded Components and Systems) aims at developing an integrated architecture for embedded systems to reduce life-cycle costs and to increase dependability of embedded applications in respect to a comparable federated architecture. To facilitate the certification process of DECOS-based applications, the...
Conference Paper
Full-text available
This paper presents our results in the field of Model Driven Design (MDD) gained in dependable, distributed application development communicating over ad-hoc mobile networks. The context of the discussion is the Highly Dependable IP-based Networks and Services (Hidenets) research project. Our efforts involve (i) construction of the platform's UML m...
Conference Paper
Full-text available
Distributed system composition is the main trend in creating safety-critical (SC) real-time systems like automotive, aerospace, and industrial control systems. Their growing complexity (e.g. tens of control units in a modern car) led to an integrated architecture concept [7]. It supports the sharing of hardware resources between different sub-appli...
Article
Full-text available
Ambient intelligent systems continuously gain importance in a variety of application domains. Nowadays one of the most important ambient intelligence domains is assisted living, which involves devices and services supporting elderly people during their everyday life. Typical assisted living applications include health monitoring, remote nursing, an...
Conference Paper
Full-text available
The integrated EU-project DECOS (Dependable Embedded Comp-onents and Systems) aims at developing an integrated architecture for embedded systems to reduce life-cycle costs and to increase dependability of embedded applications. To facilitate the certification process of DECOS-based applications, the DECOS Test Bench constitutes a framework to suppo...
Conference Paper
Full-text available
As Web service-based system integration recently became the main- stream approach to create composite services, the dependability of such systems becomes more and more crucial. Therefore, extensions of the common service composition techniques are urgently needed in order to cover dependability as- pects and a core concept for the dependability est...
Chapter
Massively parallel systems represent a new challenge for fault tolerance. The designers of such systems cannot expect that no parts of the system will fail. With the significant increase in the complexity and number of components the chance of a single or multiple failure is no longer negligible. It is clear that the redundancy, reconfigurability a...
Article
Full-text available
Recently, the increasing complexity of IT systems requires the early verification and validation of the system design in order to avoid the costly redesign. Furthermore, the efficiency of system operation can be improved by solving system optimization problems (like resource allocation and scheduling problems). Such combined optimization and valida...
Conference Paper
Full-text available
We present a technique for compiling model transformations defined by a combination of graph transformation and abstract state machine rules (as used within the VIATRA2 framework) into stand-alone transformer plugins for the EJB 3.0 platform. As a result, the design of transformations can be separated from the execution of transformations. This als...
Chapter
Dependability consolidation is a novel solution for complex problems. It includes in-depth analysis of business systems and their technology infrastructure for identification of risk areas. Results include the generation of precise metrics to quantify the risk. Once areas of low dependability have been identified solutions that minimize risk are de...