標題: Titlebook: Dependable Computing; Second Latin-America Carlos Alberto Maziero,Jo?o Gabriel Silva,Flávio M Conference proceedings 2005 Springer-Verlag B [打印本頁] 作者: JOLT 時間: 2025-3-21 19:51
書目名稱Dependable Computing影響因子(影響力)
書目名稱Dependable Computing影響因子(影響力)學(xué)科排名
書目名稱Dependable Computing網(wǎng)絡(luò)公開度
書目名稱Dependable Computing網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Dependable Computing被引頻次
書目名稱Dependable Computing被引頻次學(xué)科排名
書目名稱Dependable Computing年度引用
書目名稱Dependable Computing年度引用學(xué)科排名
書目名稱Dependable Computing讀者反饋
書目名稱Dependable Computing讀者反饋學(xué)科排名
作者: moribund 時間: 2025-3-21 21:14
0302-9743 Overview: 978-3-540-29572-3978-3-540-32092-0Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: PHIL 時間: 2025-3-22 01:36 作者: CRUDE 時間: 2025-3-22 06:46
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/265704.jpg作者: opportune 時間: 2025-3-22 11:26
Leslie P. Willcocks,Edgar A. Whitleyave been proposed to validate individual components (e.g., formal methods) or a system as a whole (e.g., red teaming). However, no single technique can provide the breadth of evidence needed to validate a system with respect to high-level survivability requirements. To accomplish this, we propose an作者: Migratory 時間: 2025-3-22 13:34
John W. Moore,Diana E. J. Blazis failure model. The system model defines the semantics of basic services like process and message services of a distributed system. More advanced system services will be based on these basic services. The failure model specifies the likely failures of the basic services, i.e., these are the failures作者: Migratory 時間: 2025-3-22 21:01 作者: FRAUD 時間: 2025-3-22 21:48
Research Notes in Neural Computingnent when the application that interacted with it failed. In this work we tackle the injection of errors directly into the interfaces among the target component’s classes. As the component under test has several classes, we use stratified sampling to reduce the amount of injections without losing th作者: Concrete 時間: 2025-3-23 02:14 作者: 宏偉 時間: 2025-3-23 09:33
Dynamic Learning Spaces in Education of distributed applications; it provides tools to organize the applications using a layered architecture, with the network(s) at the bottom of the architecture. Neko is also a communication platform that allows sending and receiving of generic Java objects. Distributed systems realized within the N作者: Spangle 時間: 2025-3-23 10:59 作者: hyperuricemia 時間: 2025-3-23 14:13
https://doi.org/10.1007/978-981-10-8521-5tention from existing development methodologies. This work presents a systematic way to deal with exception handling, from the requirement specification phase to the implementation and testing phases, in component-based software development. Testing activities are performed since the early stages of作者: 搜尋 時間: 2025-3-23 18:09 作者: 群居男女 時間: 2025-3-24 01:45
Springer Series in Design and Innovationem assists the developer in the design and implementation process. Main features of the Zerberus System are generality, dependability, real-time predictability, the ability to be certified and cost-efficiency..The main concept of the Zerberus System is the platform independent specification of the f作者: 他日關(guān)稅重重 時間: 2025-3-24 06:20
https://doi.org/10.1007/978-3-030-39529-2rable to soft errors originated from energetic nuclear particles or electrical sources. This paper proposes a new protected cache scheme, which provides high performance as well as high fault detection coverage. In this scheme, the cache space is divided into sets of different sizes. Here, the lengt作者: abstemious 時間: 2025-3-24 07:13
Thomas Schnekenburger,Georg Stellner hardware is initialized, and the processor executes the boot loader followed by kernel initialization. For this reason most system support is not yet available and traditional fault-injection techniques such as . cannot be used. Thus our study was based in the processor’s IEEE?1149.1 (boundary-scan作者: FLAT 時間: 2025-3-24 14:03
Thomas Schnekenburger,Georg Stellnerject-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network on 作者: 寬宏大量 時間: 2025-3-24 17:39 作者: 態(tài)度暖昧 時間: 2025-3-24 19:24
City System as a Location Factorcation rely on the information provided by failure detectors in order to make progress and terminate. As such, erroneous information provided by the failure detector (or the absence of it) may delay decision-making or lead the upper-layer fault-tolerant mechanism to take incorrect decisions (e.g., t作者: staging 時間: 2025-3-25 02:15 作者: 攀登 時間: 2025-3-25 03:28 作者: prolate 時間: 2025-3-25 10:35 作者: slipped-disk 時間: 2025-3-25 11:45
https://doi.org/10.1007/11572329Processing; Scheduling; WLAN; algorithms; architecture; communication; dependable computing; distributed sy作者: 疲憊的老馬 時間: 2025-3-25 18:46 作者: 大漩渦 時間: 2025-3-25 22:59 作者: 謙卑 時間: 2025-3-26 03:33 作者: agenda 時間: 2025-3-26 06:01
Timed Asynchronous Distributed Systems failure model. The system model defines the semantics of basic services like process and message services of a distributed system. More advanced system services will be based on these basic services. The failure model specifies the likely failures of the basic services, i.e., these are the failures作者: LUCY 時間: 2025-3-26 08:55 作者: Clinch 時間: 2025-3-26 16:10 作者: glowing 時間: 2025-3-26 19:36
A Methodology for the Automated Identification of Buffer Overflow Vulnerabilities in Executable Softhas been used by hackers to breach security or simply to crash computer systems. The mere presence inside the software code of a vulnerability that allows for buffer overflow exploitations presents a serious risk. So far, all methodologies devised to mitigate this problem assume source code availabi作者: Excise 時間: 2025-3-26 21:20
Quantitative Evaluation of Distributed Algorithms Using the Neko Framework: The NekoStat Extension of distributed applications; it provides tools to organize the applications using a layered architecture, with the network(s) at the bottom of the architecture. Neko is also a communication platform that allows sending and receiving of generic Java objects. Distributed systems realized within the N作者: HATCH 時間: 2025-3-27 02:36 作者: Medicaid 時間: 2025-3-27 05:24
A Method for Modeling and Testing Exceptions in Component-Based Software Developmenttention from existing development methodologies. This work presents a systematic way to deal with exception handling, from the requirement specification phase to the implementation and testing phases, in component-based software development. Testing activities are performed since the early stages of作者: PRE 時間: 2025-3-27 10:37 作者: 間接 時間: 2025-3-27 16:27
The Zerberus Language: Describing the Functional Model of Dependable Real-Time Systemsem assists the developer in the design and implementation process. Main features of the Zerberus System are generality, dependability, real-time predictability, the ability to be certified and cost-efficiency..The main concept of the Zerberus System is the platform independent specification of the f作者: membrane 時間: 2025-3-27 19:12
Soft Error Mitigation in Cache Memories of Embedded Systems by Means of a Protected Schemerable to soft errors originated from energetic nuclear particles or electrical sources. This paper proposes a new protected cache scheme, which provides high performance as well as high fault detection coverage. In this scheme, the cache space is divided into sets of different sizes. Here, the lengt作者: phlegm 時間: 2025-3-27 22:39
On the Effects of Errors During Boot hardware is initialized, and the processor executes the boot loader followed by kernel initialization. For this reason most system support is not yet available and traditional fault-injection techniques such as . cannot be used. Thus our study was based in the processor’s IEEE?1149.1 (boundary-scan作者: obscurity 時間: 2025-3-28 04:33
A Fault Tolerant Approach to Object Oriented Design and Synthesis of Embedded Systemsject-oriented design methodology which models a system in terms of its constituting objects and their corresponding method calls. Some of these methods are implemented in hardware; others are simply executed by a general purpose processor. One fundamental element of this methodology is a network on 作者: overhaul 時間: 2025-3-28 07:26 作者: 蔑視 時間: 2025-3-28 12:25 作者: choleretic 時間: 2025-3-28 17:23 作者: 牛的細微差別 時間: 2025-3-28 22:11 作者: Clinch 時間: 2025-3-29 02:00 作者: JEER 時間: 2025-3-29 07:06 作者: fender 時間: 2025-3-29 10:14
https://doi.org/10.1007/978-981-10-0524-4 the effect of accumulated crashes. On the other hand, to save the energy, nodes should remain sleeping as much as possible. In fact, if the energy consumed with the monitoring process is too high, spare nodes may exhaust their batteries (and the batteries of active nodes) before they are needed..Th作者: ostensible 時間: 2025-3-29 14:00
City System as a Location Factormmunication load conditions. The training patterns used to feed the neural network were obtained by using Simple Network Management Protocol (SNMP) agents over MIB – Management Information Base variables. The output of such neural network is an estimation for the arrival time for the failure detecto作者: 殖民地 時間: 2025-3-29 15:36 作者: ticlopidine 時間: 2025-3-29 23:33 作者: 角斗士 時間: 2025-3-30 03:25 作者: 神刊 時間: 2025-3-30 06:53
Probabilistic Validation of Computer System Survivabilityother, are integrated to provide a convincing assurance argument. We then illustrate the IVP by applying it to an intrusion-tolerant information system being developed by the U.S. Department of Defense. In addition to validating the system against high-level survivability requirements, we demonstrat作者: 漂亮才會豪華 時間: 2025-3-30 08:17 作者: Hiatus 時間: 2025-3-30 16:14 作者: 騷動 時間: 2025-3-30 18:03
Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Executionl-active approach. However, a request that exposes faults among the . replicas will incur a higher latency than the all-active approach mainly due to fault detection latency. Under such conditions, the protocol switches to a recovery mode, in which all 2. + 1 replicas execute the request and send th作者: 國家明智 時間: 2025-3-30 22:00 作者: 寵愛 時間: 2025-3-31 00:51 作者: 圖表證明 時間: 2025-3-31 05:22 作者: Medicaid 時間: 2025-3-31 10:10
https://doi.org/10.1007/978-981-10-8521-5 development, promoting an increase in the quality of the produced system. Our solution refines the Methodology for the Definition of Exception Behavior, MDCE, in the architectural design, implementation, and testing phases. Moreover, the proposed method was adapted to the UML Components process.作者: Reverie 時間: 2025-3-31 15:52 作者: Minikin 時間: 2025-3-31 19:02
Springer Series in Design and Innovationr a new method for automatically inserting fault behaviours into OBGG models, which is suitable for using verification as the analysis method, is proposed. Moreover, we show how to formally verify OBGG models in the presence of such faults. A two phase commit protocol is used to illustrate the contributions.作者: 高度贊揚 時間: 2025-4-1 01:31
Springer Series in Design and Innovationfault-tolerance mechanisms. Thus the task of the developer is restricted to the implementation of the application-dependent code..In this paper we present one major part of the Zerberus System: the Zerberus Language that is used to specify the functional model of the control applications.