15
2015 Proceedings of the 7 th Information Technologies in Environmental Engineering International Conference 14 th to 16 th July 2015 Summerstrand Hotel, Port Elizabeth, Nelson Mandela Bay, South Africa http://itee2015.org/ Editors: Dr Brenda Scholtz Prof Dr.-Ing. habil. Jorge Marx Gómez Mr Clayton Burger ISBN: 978-1-920508-60-9

2015 Proceedings of the 7th Information Technologies … · Technologies in Environmental Engineering International Conference 14th to 16th July 2015 Summerstrand Hotel, Port Elizabeth,

Embed Size (px)

Citation preview

2015 Proceedings of the 7th Information Technologies in Environmental

Engineering International Conference

14th to 16th July 2015

Summerstrand Hotel, Port Elizabeth, Nelson Mandela Bay, South Africa

http://itee2015.org/

Editors: Dr Brenda Scholtz Prof Dr.-Ing. habil. Jorge Marx Gómez Mr Clayton Burger ISBN: 978-1-920508-60-9

i

Proceedings of the 2015 Information Technologies in Environmental Engineering International Conference Published by the Nelson Mandela Metropolitan University, Port Elizabeth, South Africa All rights reserved Copyright © 2015 Nelson Mandela Metropolitan University, South Africa No part of this document may be commercially reproduced or transmitted in any form or by any electronic, photographic or mechanical means, including photocopying and recording on sound, tape or laser disk, on microfilm, via the Internet, by E-mail, or by any other information storage and retrieval system, without written permission from the authors of the articles. Educational, research and personal use is permitted on condition that the articles are not edited in any way. First edition 2015 ISBN 978-1-920508-60-9 Conference Logo Design by Caylee Greyvenstein Editing by Brenda Scholtz, Jorge Marx Gómez and Clayton Burger Editing assistants: Maxine Esterhuyse and Samantha Ludick

ii

Editorial Information Technologies in Environmental Engineering (ITEE) is a biennial conference hosted by a new university every second year. The conference aims to bring leading researchers in IT-enabled environmental engineering related disciplines together to share novel research, current studies and potential for future collaboration. The theme of ITEE 2015 is ‘Technologies for a sustainable future’. The review committee for the conference was comprised of well-regarded local and international members of the academic computing community, having expertise and interest in subjects relevant to the theme of the conference. A total of 33 academics reviewed papers for the conference; of these 27 were international academics and 6 were South African academics. All contributed papers were screened, and identifying author information was redacted prior to the initiation of the review process. The review process followed the double-blind peer review model. Every paper received multiple reviews, and the programme chairs solicited additional expert reviews in cases where further clarity was warranted. Reviewers were requested to especially consider the originality of contributions, relevance to the conference, technical/scientific merit as well as presentation and clarity. A total number of 31 academic papers were received for consideration for the conference. The double-blind review process was highly selective, resulting in 13 full papers and 5 work-in-progress papers being accepted for presentation at the conference after the required changes were made. This constitutes a 58% acceptance rate of contributed papers. Of the 13 accepted full papers, 7 are from European institutions and 6 papers are from South African universities. The papers accepted cover a wide range of relevant topics within the conference theme, and are reproduced within these proceedings. Dr Brenda Scholtz, Prof Dr.-Ing. habil. Jorge Marx Gómez and Mr Clayton Burger Editors July 2015

Organising Committee

Conference Co-Chairs Prof Dr.-Ing. habil. Jorge Marx Gómez (Universität Oldenburg) Dr Brenda Scholtz (NMMU)

Proceedings Editor & Webmaster Mr Clayton Burger (Universität Oldenburg)

Assistant Editors Ms Samantha Ludick and Ms Maxine Esterhuyse

Technical Committee Chair Dr Kevin Naude (NMMU)

Programme Coordinator Dr Lester Cowley (NMMU)

Committee Members Prof Andre Calitz (NMMU) Prof Jean Greyling (NMMU)

Assistant Committee Members

Ms Kerryn Botha (NMMU) Ms Bianca Deyzel (NMMU) Ms Mareike Hinrichs (Universität Oldenburg) Ms Hayley Irvine (NMMU) Ms Maxine Esterhuyse (NMMU) Ms Samantha Ludick (NMMU)

iii

Programme Committee We acknowledge the role of the following people who were part of the review process: Sedef Akinli Kocak (Ryerson University) Javier Britch (Universidad Tecnológica Nacional de Córdoba) Christian Bunse (Fachhochschule Stralsund) Clayton Burger (Universität Oldenburg) André Calitz (Nelson Mandela Metropolitan University) Lester Cowley (Nelson Mandela Metropolitan University) Clemens Düpmeier (Karlsruhe Institute of Technology) Holger Eichelberger (Universität Hildesheim) Nils Giesen (Universität Oldenburg) Albrecht Gnauck (Hochschule für Technik und Wirtschaft Berlin) Marion Gottschalk (Oldenburger Institut für Informatik) Sebastian Götz (Technische Universität Dresden) Klaus Greve (Universität Bonn) Jean Greyling (Nelson Mandela Metropolitan University) Theo Härder (Technische Universität Kaiserslautern) Timo Hönig (Friedrich-Alexander-Universität Erlangen-Nürnberg) Naoum Jamous (Universität Magdeburg) Horst Junker (Institut für Informationsmanagement) Gamal Kassem (Universität Magdeburg) Veit Köppen (Universität Magdeburg) Oliver Kramer (Universität Oldenburg) Wolfgang Lohmann (Universität Zürich) Siba Mohammad (Universität Magdeburg) Kevin Alexander Naudé (Nelson Mandela Metropolitan University) Stefan Naumann (Hochschule Trier, Umwelt-Campus Birkenfeld) Birgit Penzenstadler (University of California, Irvine) Rafael Bello Perez (Universidad Central "Marta Abreu" de Las Villas) Brenda Scholtz (Nelson Mandela Metropolitan University) Thomas Schulze (Universität Mannheim) Michael Sonnenschein (Universität Oldenburg) Jean-Paul Van Belle (University of Cape Town) Ute Vogel (Universität Oldenburg) Volker Wohlgemuth (Hochschule für Technik und Wirtschaft Berlin)

ITEE 2015 Corporate Sponsors

The Organising Committee would like to express its grateful thanks to the generous sponsors of ITEE 2015:

SYSPRO (Platinum Sponsor) REDISA (Platinum Sponsor) PwC (Silver Sponsor) Allan Gray (Bronze Sponsor)

Telkom

iv

Contents

FULL ACADEMIC PAPERS Pg

SESSION 1:

Contribution of Mobile Phones to Township Livelihood Outcomes in the Western Cape Province of South Africa Unathi September, Upendo Fatukubonye, Kevin Johnston and Brian O’Donovan

1

An Application to Support Sustainability Management in the Cuban Energy Sector Frank Medel-González, Lourdes García-Ávila and Jorge Marx Gómez

16

A Framework for Environmental Management Information Systems in Higher Education Brenda Scholtz, André Calitz and Blessing Jonamu

29

Support for Improved Scrap Tire Re-use and Recycling Decisions Matthias Kalverkamp and Alexandra Pehlken

42

SESSION 2:

Risk Profiling for Corporate Environmental Compliance Management Heiko Thimm

55

Designing for Engagement – A Case Study of an ICT Solution for Citizen Complaints Management in Rural South Africa Carl Jacobs, Ulrike Rivett and Musa Chemisto

66

SESSION 3: Industry Presentations (not included here)

SESSION 4:

An Analysis of the Perceived Benefits and Drawbacks of Cloud ERP Systems: A South African Study Brenda Scholtz and Denis Atukwase

77

Collaborative Network Platform Solution for Monitoring, Optimization, and Reporting of Environmental and Energy Performance of Data Center Gamal Kassem, Niko Zenker, Klaus Turowski and Naoum Jamous

91

Using Social Media to Improve Environmental Awareness in Higher Education Institutions Brenda Scholtz, André Calitz and Thabo Tlebere

102

Sustainability Reporting by South African Higher Education Institutions André Calitz, Margaret Cullen and Samuel Bosire

115

v

SESSION 5:

A Living Lab for Optimising the Health, Socio-Economic and Environmental Situation in El Salvador Melanie Platz, Marlien Herselman and Jörg Rapp

126

Modeling the Intention to Use Carbon Footprint Apps Arno Sagawe, Burk¬hardt Funk and Peter Niemeyer

141

Mass Customization – Sustainability of a Computer-Based Manufacturing System Hans-Knud Arndt

154

M&D SYMPOSIUM PAPERS

SESSION 6:

A Data Replication Protocol for Real-World Network Topologies Robert Schadek and Oliver Theel

168

Intelligent Management of Energy Usage in a Home Environment Cainos Mukandatsama, Janet Wesson and Brenda Scholtz

173

The Prospects and Approaches of Greening Sub-Saharan African Universities Lloyd Larbi, Jorge Marx Gómez, José Luís Sambo, Eugénio Alberto Macumbe and Jantje Halberstadt

180

Region-Adherent Distributed Algorithms in Faulty Environments Dilshod Rahmatov and Oliver Theel

188

A Business Intelligence Framework for Supporting Sustainability Information Management in Higher Education Institutions Ross Haupt, André Calitz and Brenda Scholtz

194

vi

Conference Programme

Tuesday 14 July 2015 (Pre-Conference Activities)

TIME EVENTS 18:00 – 20:00 Registration and Welcoming Function (Pool Lounge)

Wednesday 15 July 2015 – DAY 1 (Conference Opening and Academic, Competition and Industry

Presentations)

TIME EVENTS 08:30 – 09:00 Registration (Pool Lounge)

Conference Opening (Conference Room) 09:00 – 09:15 Conference Welcome: Prof Andrew Leitch (DVC Research, NMMU)

09:15 – 09:50 Keynote Address: Professor Emilio Luque - Modelling, Simulation, Prediction and Computation The Role of Computation (HPC) to Improve the Quality of the Results of Simulation When Computation is Used to Provide the Best Possible Value for the Models' Parameters.

Parallel Session 1a: Computing for Sustainability With Respect to Societal Impact (Conference Room) Session Chair: Prof Ulrike Rivett (UCT)

Parallel Session 1b: Computing for Sustainability With Respect to Organisational Impact (Meeting Room 2 & 3) Session Chair: Prof Dr Hans-Knud Arndt (Universität Magdeburg)

10:00 – 10:30

Contribution of Mobile Phones to Township Livelihood Outcomes in the Western Cape Province of South Africa. Unathi September, Upendo Fatukubonye, Kevin Johnston and Brian O’Donovan. UCT

Application to Support Sustainability Management in Cuban Energy Sector Frank Medel-González, Lourdes García-Ávila and Jorge Marx Gómez. Universidad Central "Marta Abreu" de Las Villas and Universität Oldenburg

10:30 – 11:00

A Framework for Environmental Management Information Systems in Higher Education. Brenda Scholtz, Andre Calitz and Blessing Jonamu. NMMU

Support for Improved Scrap Tire Reuse and Recycling Decisions. Matthias Kalverkamp and Alexandra Pehlken. Universität Oldenburg

11:00 – 11:15 COFFEE BREAK (Pool Lounge)

Parallel Session 2a (Conference Room) Session Chair: Prof Dr.-Ing. Jorge Marx Gómez (Universität Oldenburg)

Parallel Session 2b (Meeting Room 2 & 3) Session Chair: Prof Jean Greyling (NMMU)

11:15 – 11:45 Risk Profiling for Corporate Environmental Compliance Management. Heiko Thimm. Pforzheim University (by proxy)

Student Project Competition Presentations: Improving Society or the Environment Using the Internet of Things (IoT)

11:45 – 12:15

Designing for Engagement – A Case Study of an ICT Solution for Citizen Complaints Management in Rural South Africa. Carl Jacobs, Ulrike Rivett and Musa Chemisto. UCT

Session 3a: Computing for Sustainability with Respect to Organisational Impact (Industry Symposium Part 1, Conference Room). Session Chair: Dr Brenda Scholtz (NMMU)

12:15 – 12:45 A Practical Application of Information Technology in the Waste Management Sector. Ian Beaton. CIO REDISA

12:45 – 13:15 Functional Programming in the Corporate Environment. Benny Ou. Allan Gray

13:15 – 14:00 LUNCH (Satis Restaurant)

vii

Wednesday 15 July 2015 – DAY 1 (continued) (Conference Opening and Academic, Competition and Industry

Presentations)

Session 3b: Computing for Sustainability with Respect to Organisational Impact (Industry Symposium Part 2, Conference Room). Session Chair: Dr Brenda Scholtz (NMMU)

14:00 – 14:30 GRI Framework for Sustainability: Empowering Decision Making. Douglas Kativu. GRI Africa

14:30 – 15:00 Making Integrated and Sustainability Reporting Practical for Organisations. Jayne Mammatt. Partner. PwC

15:00 – 15:30 Market Trends and Technological Innovations in Integrated Reporting. Johan Naudé and Daniel Da Silva. KPMG

15:30 – 16:00 Organisational Impact and Value Add – Recycling Case Studies. Jaisheila Rajput. CEO. Tomorrow Matters Now | TOMA-Now

19:00 – 23:00 Gala Dinner and Best Paper and Student Competition Awards (Lillie’s Bar)

Thursday 16 July 2015 – DAY 2 (Academic and Post-Graduate Presentations)

TIME EVENTS 08:30 – 09:00 Keynote Address: SYSPRO Presentation.

Session 4 (Conference Room) Session Chair: Dr Melanie Platz (Universität Koblenz-Landau)

09:00 – 09:30 An Analysis of the Perceived Benefits and Drawbacks of Cloud ERP Systems: A South African Study. Brenda Scholtz and Denis Atukwase. NMMU

09:30 – 10:00 Collaborative Network Platform Solution for Monitoring, Optimization, and Reporting of Environmental and Energy Performance of Data Center. Gamal Kassem, Niko Zenker, Klaus Turowski and Naoum Jamous. Universität Magdeburg

10:00 – 10:30 Using Social Media to Improve Environmental Awareness in Higher Education Institutions. Brenda Scholtz, Andre Calitz, NMMU and Thabo Tlebere. SYSPRO

10:30 – 11:00 Sustainability Reporting by South African Higher Education Institutions. Andre Calitz, Margaret Cullen and Samuel Bosire. NMMU

11:00 – 11:30 COFFEE BREAK (Pool Lounge)

Session 5 (Conference Room) Session Chair: Prof Kevin Johnston (UCT)

11:30 – 12:00

A Living Lab for Optimising the Health, Socio-Economic and Environmental Situation in El Salvador. Melanie Platz, Marlien Herselman and Jörg Rapp. University of Koblenz-Landau and University of South Africa

12:00 – 12:30 Modeling the Intention to Use Carbon Footprint Apps. Arno Sagawe, Burkhardt Funk and Peter Niemeyer. Leuphana University

12:30 – 13:00 Mass Customization – Sustainability of a Computer-Based Manufacturing System. Hans-Knud Arndt. University of Magdeburg

13:00 – 14:00 LUNCH (Satis Restaurant)

viii

Thursday 16 July 2015 – DAY 2 (continued) (Academic and Post-Graduate Presentations)

Session 6: Postgraduate Symposium (Conference Room) Session Chair: Prof Jean Greyling (NMMU)

14:00 – 14:20 A Data Replication Protocol for Real-World Network Topologies. Robert Schadek and Oliver Theel. Universität Oldenburg

14:20 – 14:40 Intelligent Management of Energy Usage in a Home Environment. Cainos Mukandatsama, Janet Wesson and Brenda Scholtz. NMMU

14:40 – 15:00 The Prospects and Approaches of Greening Sub-Saharan African Universities. Lloyd Larbi, Jorge Marx Gómez, José Luís Sambo, Eugénio Alberto Macumbe and Jantje Halberstadt. Universität Oldenburg

15:00– 15:20 Region-Adherent Distributed Algorithms in Faulty Environments. Dilshod Rahmatov and Oliver Theel. Universität Oldenburg

15:20 – 15:40 A Business Intelligence Framework for Supporting Strategic Sustainability Information Management in South African Higher Education Institutions. Ross Haupt, André Calitz and Brenda Scholtz. NMMU

16:00 – 16:30 Closing Address (Conference Room)

188

Region-Adherent Distributed Algorithms in

Faulty Environments

Dilshod Rahmatov, Oliver Theel17

Abstract This research work is exploring a new class of fault-tolerant distributed

algorithms based on a concept which is called region-adherence. A region-

adherent algorithm upper-bounds the violation of safety due to faults in space.

With bounding in space, it is meant that the decrease of the quality of service that

the system provides to its environment is upper-bounded per fault. This paper

presents a brief introduction, focusing on a particular property of the self-

stabilisation concept and a new concept called region adherence that is somewhat

“orthogonal” to the property of self-stabilisation. The paper then presents a formal

definition of region adherence, the status of the research work done so far as well

as ideas for further work.

1 Introduction

Self-stabilising systems are famous realisations of non-masking fault-tolerant

systems. Such systems are always live, but due to faults or improper initialisation,

may not be safe. However, because of its “inner design,” a self-stabilising system

– as long as it is not in a state from whereon it exhibits safe behavior –

autonomously works towards establishing or re-establishing this safe behaviour.

Importantly, it does so in an upper-bounded number of execution steps (in the

absence of newly occurring faults), a property called convergence (Fig. 1). Thus,

one can regard self-stabilising systems as systems that limit the invalidation of

their safety property in time. An alternative, though, of restricting the invalidation

of the safety property in time is restricting it in space. We refer to such systems as

region-adherent systems (Becker et al. 2013). In contrast to self-stabilising

systems which are clearly non-masking fault-tolerant systems, region-adherent

systems can be realised as either being masking or non-masking.

D. Rahmatov, O. Theel

Carl von Ossietzky Universität,

Oldenburg, Germany

e-mail: [email protected]; [email protected]

189

Fig. 1. Behavior of a Self-Stabilising System over Time

2 Notion of Region-Adherence

A region-adherent system can be perceived as a system exhibiting a particular

variant of gracefully degrading behavior (Herlihy and Wing 1987): it gracefully

degrades the service quality provided by the system per fault up to some maximal

number of faults that the system is able to withstand. Additionally, degradation is

upper-bounded per fault. With service quality, we refer to an application-specific

quality-of-service notion that is without faults, where the system delivers a service

with 100% quality. When faults occur the service quality gets increasingly

reduced. A region-adherent system exhibits desirable fault tolerance properties.

When region-adherence is realised in a system, it manifests gracefully degrading,

quantified quality-of-service guarantees in case up to f faults happen. Thus, at any

time knowing the number of faults that have happened, the system user can take

an a priori known minimal service quality for granted that is crucial information

in various critical contexts.

Clearly, a system that is live and safe should provide the system service the

user is interested in. In this case, we assume that the system is delivering 100% of

service quality. For example, when watching the video image which is transmitted

through the telecommunication equipment (satellites, receivers, and others), the

video quality may be reduced due to the faults encountered in the encoding,

decoding processes, or even due to bad weather conditions (Anand et al. 2000).

However, in such a case the video image can be still available with a reduced

quality. A particular behaviour of such systems over time is given in Fig. 2. The

dashed blue line shows the service quality of a region-adherent system. The solid

blue line states the minimal service quality guaranteed by the system. Initially, the

system is in a safe state. In a safe state, the system delivers 100% of service

quality. After the first fault has occurred, the system must deliver a service quality

of at least 100% − δ. The dashed blue line exhibits a slightly higher service

quality. This is always allowed. After the second fault, the guaranteed and

delivered service quality is again reduced and so on. Assuming a maximal service

190

quality reduction per fault of δ = 30%, then the system is able to “survive” three

faults (of the underlying fault model) and is still able to provide a system service

above 0%, here, a “residual” quality of at least r = 10%. The dashed blue line

indicates a possible run of the system, represented by the actual service quality

provided at a particular time. Note, that in the example run given, the system could

survive more faults and still deliver a service quality of greater than 0% (although

only with maximal service quality reduction of less than 10%), but without any a

priori known minimal service quality above 0%. Fig. 3 shows a topological

interpretation of the behavior of a region-adherent system. The blue dashed line

represents a particular execution of the region-adherent system over time.

Execution starts in the innermost region where the system exhibits 100% of

service quality. When the first fault occurs, then the system is thrown in a state of

the neighboring region with 100% − δ service quality only. After a second fault,

the system is allowed to adopt system states belonging to any of the three

innermost regions, thereby exhibiting a system quality of 100% − 2 · δ minimum.

When being in a particular region, without any further fault, the system is allowed

to stay within the region it is currently in, as well as any included region. In this

sense, the system behavior is restricted in space: is must adhere to regions of

known system quality. We formally defined the notion of region-adherence as

follows:

Definition 1 (General Region-Adherence (Becker et al. 2014a)). Assume a

system with configurations C, initial configurations C0 and algorithm A under

fault model F. Let g: C → [0, 1] be a function stating the service quality of the

system and let f be a natural number. r: {0, . . . , f } → [0, 1) is a non-decreasing

function with r(0)=0 and r( f ) < 1. Algorithm A is called f - region-adherent wrt.

g, r, and F, if and only if for all reachable configurations c ∈ C, all initial

configurations c0 ∈ C0 and all executions γ = c0 … c ending in c with #F\A (γ ) ≤ f ,

the following holds:

g(c) ≥ 1 – r(#F\A(γ)) (1)

where #F\A(γ) represents the number of fault steps of execution γ. A system

executing an f -region-adherent algorithm is also called f -region-adherent.

A fault (step, i.e. a state change due to a fault) having the same effect as

computation step (i.e. as step taken by the algorithm) does not count as fault

(step). This is indicated by the “F\A” subscript of the # function. The value of g

may also be interpreted as a percentage. The function r can be perceived as the

service’s loss or reduction of quality with r(i), 0 ≤ i ≤ f, upper-bounding the loss

due to the i-th fault. Note that an f - region-adherent system is able to tolerate at

least f faults and is still exhibiting a service quality higher than 0%. For example, a

reduction function r with r(i)=i - δ for i = 0, . . . , f with f = 3 and δ < 1/f describes

the non-masking fault-tolerance behavior of the example system of Fig. 2 and Fig.

3 as 3-region-adherent.

191

Fig. 2. Worst Case and Particular Behavior of a Region-Adherent System over Time.

Fig. 3. Topological Interpretation of a Region-Adherent System.

3 Work Done so Far and Future Perspective

Examples of region-adherent systems have been presented in Becker et al. (2013,

2014a, 2014b) along with a formal definition of region-adherence and formal

techniques for proving the region-adherence property: We introduced the concept

of region-adherence and presented a wireless sensor network (WSN) for

monitoring the air humidity in some geographical region in Becker et al. (2013).

In this WSN, a region-adherent algorithm was used that helped to quantify the

effects of failed sensors in the sensing process of the WSN. A simple refinement

of the lower bounds of service quality known of a region-adherent system we

presented by Rahmatov and Theel (2015). In Becker et al. (2014a), we gave a

formal definition of region-adherence. A distributed Bubblesort algorithm we

presented in Becker et al. (2014b) that combines region-adherence and self-

stabilisation. Furthermore, we presented techniques that ease the formal

verification of region-adherence and gave a formal proof of the region-adherence

192

property of the Bubblesort algorithm. Furthermore, we analysed the service quality

of the algorithm via simulation in the average case and compared it to the worst-

case behavior stated by the region-adherence property.

Similar to self-stabilising systems, the construction of region-adherent systems

is not an easy task and requires careful algorithm design. Thus, we are particularly

interested in the following topics: 1) the design of region-adherent systems: for

designing region-adherent systems, the challenge is to find out how to

systematically get/design a region-adherent algorithm; 2) methodologies of

formally verifying region-adherence of a system and analysing related

properties: in this case we have to find out what properties can be exploited such

that the verification becomes simple; 3) a systematic refinement of the lower

bounds of service quality known of a region-adherent system: here, we would

like to find out what observations of properties allow for a strengthening of the

lower bounds known for a system so far; 4) a systematic improvement of a

given region-adherent system with respect to region-adherence-related

properties, such as number of faults it tolerates prior to delivering a service

quality of 0%: in this case questions are what changes e.g. to the algorithm can be

done such that the region-adherent property is improved? if a sys- tem is proven to

be region-adherent for f faults, then how can underlying algorithm be altered such

that it becomes region-adherent for (n + 1)f faults? 5) the systematic composition

of one or more (region-adherent) systems such that the resulting system

is region-adherent by design, namely, without the need of subsequently

proving the region-adherence property explicitly: there, we hope to identify

composition techniques that the resulting system is region-adherent. This way, we

can construct a region-adherent system; 6) a systematic combination of region-

adherence and self-stabilisation, since such a combined system, on one side,

exhibits a region-adherent behaviour while being hit by faults. On the other side,

it recovers to full service quality in the course of time. In this combination, a

system can potentially exhibit a high level of “expected service quality” since it is

highly available due to self-stabilisation and still offers some (potentially high)

service quality even after some number of faults.

Acknowledgments The work is partially supported by the German Research Foundation in the

scope of DFG GRK 1765/1 SCARE, DFG SFB/TR AVACS 14/3 and the European

Commission’s Erasmus Mundus TARGET II program.

References

Becker JS, Rahmatov D, Theel O (2013) Dependable Systems through Region-Adherent

Distributed Algorithms. In: Proceedings of the IEEE/IFIP International Conference in Central

Asia on the Internet, Tashkent, Uzbekistan, 8–10 October 2013

Becker JS, Rahmatov D, Theel O (2014a) Brief Announcement: Region-Adherent Algorithms –

Bounding the Impact of Faults in Space. In: Proceedings of the 16th International Symposium

193

on Stabilization, Safety, and Security of Distributed Systems, Paderborn, Germany, 28

September – 1 October 2014

Becker JS, Rahmatov D, Theel O (2014b) Region-Adherent Algorithms: Restricting the Impact

of Faults on Service Quality. In: Proceedings of the 20th IEEE Pacific Rim International

Symposium on Dependable Computing, Singapore, 18–21 November 2014

Herlihy MP, Wing JM (1987) Specifying Graceful Degradation in Distributed Systems. In:

Proceedings of the 6th Annual ACM Symposium on Principles of Distributed Computing,

Vancouver, BC, Canada, 10–12 August 1987

Rahmatov D, Theel O (2015) Towards a Design Theory of Region-Adherent Algorithms. In:

Proceedings of the 23rd International Conference on Parallel, Distributed and Network-based

Processing, Turku, Finland, 4–6 March 2015

Anand R, Podilchuk C, Lou H (2000) Progressive Video Transmission over a Wired-to-Wireless

Network. In: Proceedings of the IEEE 51st Vehicular Technology Conference, Tokyo, Japan,

15–18 May 2000