標(biāo)題: Titlebook: Dependable Computing for Critical Applications 2; John F. Meyer,Richard D. Schlichting Conference proceedings 1992 Springer-Verlag/Wien 19 [打印本頁] 作者: 憑票入場 時間: 2025-3-21 19:22
書目名稱Dependable Computing for Critical Applications 2影響因子(影響力)
書目名稱Dependable Computing for Critical Applications 2影響因子(影響力)學(xué)科排名
書目名稱Dependable Computing for Critical Applications 2網(wǎng)絡(luò)公開度
書目名稱Dependable Computing for Critical Applications 2網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Dependable Computing for Critical Applications 2被引頻次
書目名稱Dependable Computing for Critical Applications 2被引頻次學(xué)科排名
書目名稱Dependable Computing for Critical Applications 2年度引用
書目名稱Dependable Computing for Critical Applications 2年度引用學(xué)科排名
書目名稱Dependable Computing for Critical Applications 2讀者反饋
書目名稱Dependable Computing for Critical Applications 2讀者反饋學(xué)科排名
作者: 大量 時間: 2025-3-21 22:52 作者: voluble 時間: 2025-3-22 01:29 作者: 獎牌 時間: 2025-3-22 05:50 作者: Magnificent 時間: 2025-3-22 10:34
Limits of Parallelism in Fault-Tolerant Multiprocessorschanism. We consider four different methods of fault-tolerance:.For each of the above fault-tolerance methods, we give an expression for the expected completion time, as a function of the number of processors in the system, and provide numerical results to illustrate the limit of parallelism.作者: duplicate 時間: 2025-3-22 15:05
Correlated Hardware Failures in Redundant Systemse concept of correlation between failures into a Markov model of a redundant system. This methodology uses a correlation coefficient to determine the (constant) rate of occurrence of the second and subsequent faults in a Markov model of a system. We solve models of two, three and four component syst作者: duplicate 時間: 2025-3-22 18:01
Impact of Correlated Failures on Dependability in a VAXcluster Systemfluenced by correlated failures. The joint failure rate of the two components, λ., is found to be the key parameter for estimating reliability of 1-out-of-2 systems with correlated failures. A validated relationship between ρ and λ., is also derived.作者: blister 時間: 2025-3-22 22:12
0932-5581 eeting of the Program Committee in Ann Arbor, Michigan. We were very fortunate to have a broad spectrum of interests represented, with papers in the final progr978-3-7091-9200-9978-3-7091-9198-9Series ISSN 0932-5581 作者: 剛毅 時間: 2025-3-23 01:37
Architectural Foundations, Concepts and Methods Behind ISACS — A Real-Time Intelligent System for Crrt system, intended to be used by the operator of a Nuclear Power Plant. The system, for its own nature, is an example of a class of applications normally referred to as critical applications. Dependability is a key requirement for the system.作者: CRUDE 時間: 2025-3-23 06:26 作者: Glaci冰 時間: 2025-3-23 11:19 作者: Boycott 時間: 2025-3-23 14:02
A Distributed Systems Architecture Supporting High Availability and Reliabilityted by replicating the computations on two distinct and dedicated processors which check each other’s performance to form a self-checking processor pair. Given that no more than one processor in a fail-silent node fails, the node is guaranteed either to function correctly or to effectively stop func作者: endoscopy 時間: 2025-3-23 18:42 作者: 根除 時間: 2025-3-23 22:26
Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Eventsdiscrete event dynamic systems which are strongly influenced by rarely occurring events. FIS is based on decomposition of the observations in those that are affected and those that are not affected by these events. If methods are available FIS can be used as a (partly) analytical technique, else as 作者: fulcrum 時間: 2025-3-24 03:04 作者: 燕麥 時間: 2025-3-24 07:28 作者: 思考而得 時間: 2025-3-24 13:22 作者: 開玩笑 時間: 2025-3-24 18:18
Assuring Design Diversity in ,-Version Software: A Design Paradigm for ,-Version Programminge of software diversity. To maximize the effectiveness of the NVP approach, the probability of similar errors that coincide at the NVS decision points should be reduced to the lowest possible value. Design diversity is potentially an effective method to get this result. It has been the major concern作者: Emasculate 時間: 2025-3-24 19:50 作者: insightful 時間: 2025-3-25 00:38
The Proof of Correctness of a Fault-Tolerant Circuit Designrithm has been verified to achieve interactive consistency in the presence of faults[1]. This abstract characterization is then mapped down to a hardware level design which inherits the fault-tolerant characteristics of the abstract version. The proof that the hardware level description is a correct作者: 教唆 時間: 2025-3-25 07:23 作者: 歡樂東方 時間: 2025-3-25 09:31
Ju H. Park,Tae H. Lee,Yajuan Liu,Jun Chen failures in networks for real-time applications. Comparisons with other fast simulation techniques are made and results of FIS for an M/M/1-queue with rarely occurring service breakdowns are included.作者: Aggregate 時間: 2025-3-25 14:07
Connectedness of Limit Sets and Separations and experience obtained from fault-tolerant system design with software engineering techniques, and the application of this design paradigm to a real-world project for an extensive evaluation. Some limitations of the approach are also presented.作者: 舞蹈編排 時間: 2025-3-25 19:49 作者: 失敗主義者 時間: 2025-3-25 23:02 作者: poliosis 時間: 2025-3-26 01:32
An Empirical Investigation of the Effect of Formal Specifications on Program Diversity version. This paper analyses the effect formal specification languages have on program development by examining nine diverse versions of a communication protocol created using three different formal specification languages.作者: CORD 時間: 2025-3-26 06:30
Extension of the Usual System Modelsr technique by comparing the availabilities of replicated objects with three replicas managed by majority consensus voting (MCV), and dynamic-linear voting (DLV), under three different network configurations.作者: 使高興 時間: 2025-3-26 11:30
Ju H. Park,Tae H. Lee,Yajuan Liu,Jun Chen at any level, resulting in a much more accurate prediction of reliability. The proposed technique has been validated through comparison with analytical calculations, results from existing tools and Monte-Carlo simulation.作者: Creatinine-Test 時間: 2025-3-26 13:13 作者: ILEUM 時間: 2025-3-26 17:49
Conference proceedings 1992d by IFIP Working Group lOA and held in Tucson, Arizona on February 18-20, 1991. In keeping with the first such conference on this topic, which took place at the University of California, Santa Barbara in 1989, this meeting was like- wise concerned with an important basic question: Can we rely on Co作者: 偏見 時間: 2025-3-27 01:00
0932-5581 , sponsored by IFIP Working Group lOA and held in Tucson, Arizona on February 18-20, 1991. In keeping with the first such conference on this topic, which took place at the University of California, Santa Barbara in 1989, this meeting was like- wise concerned with an important basic question: Can we 作者: 革新 時間: 2025-3-27 01:12 作者: Lethargic 時間: 2025-3-27 07:40
Extension of the Usual System Modelsstributed computations in general, and replicated processes in particular, require group communication (multicast communication) services. The paper presents an integrated suit of protocols for performing reliable multicasts, and illustrates how the dual processor redundancy in a fail-silent node can be exploited for implementing these protocols.作者: NAUT 時間: 2025-3-27 11:07 作者: 健談 時間: 2025-3-27 14:13
A Distributed Systems Architecture Supporting High Availability and Reliabilitystributed computations in general, and replicated processes in particular, require group communication (multicast communication) services. The paper presents an integrated suit of protocols for performing reliable multicasts, and illustrates how the dual processor redundancy in a fail-silent node can be exploited for implementing these protocols.作者: Tailor 時間: 2025-3-27 19:24 作者: Override 時間: 2025-3-28 01:22
Evaluating the Impact of Network Partitions on Replicated Data Availabilityr technique by comparing the availabilities of replicated objects with three replicas managed by majority consensus voting (MCV), and dynamic-linear voting (DLV), under three different network configurations.作者: Saline 時間: 2025-3-28 03:17 作者: 反對 時間: 2025-3-28 07:37 作者: ASSAY 時間: 2025-3-28 11:03 作者: effrontery 時間: 2025-3-28 14:58 作者: 設(shè)想 時間: 2025-3-28 18:57
Extension of the Usual System Models. must be chosen to insure that a consistent view of the data is always presented..In this paper, we present a simple aggregation technique leading to closed form estimates of the availability of replicated objects whose replicas reside on networks subject to communication failures. We illustrate ou作者: 預(yù)示 時間: 2025-3-29 02:13 作者: Flirtatious 時間: 2025-3-29 05:29 作者: 哭得清醒了 時間: 2025-3-29 10:44 作者: sigmoid-colon 時間: 2025-3-29 11:43
Ju H. Park,Tae H. Lee,Yajuan Liu,Jun Chenor system, even if the application is infinitely parallelizable. We consider the execution of a given application on a multiprocessor system with fault-tolerance capabilities, and use its expected completion time as a measure of computational efficiency. We show that more parallelism may not necessa作者: 預(yù)兆好 時間: 2025-3-29 17:09 作者: MOCK 時間: 2025-3-29 22:26 作者: Dendritic-Cells 時間: 2025-3-30 00:07
Connectedness of Limit Sets and Separationse of software diversity. To maximize the effectiveness of the NVP approach, the probability of similar errors that coincide at the NVS decision points should be reduced to the lowest possible value. Design diversity is potentially an effective method to get this result. It has been the major concern作者: 吞噬 時間: 2025-3-30 07:46
https://doi.org/10.1007/978-1-4684-6262-3tal evidence indicates that the syntax and semantics associated with a formal specification language can have a large effect on the subsequent program version. This paper analyses the effect formal specification languages have on program development by examining nine diverse versions of a communicat作者: plasma 時間: 2025-3-30 08:13
Metric Spaces and a Metrization Theoremrithm has been verified to achieve interactive consistency in the presence of faults[1]. This abstract characterization is then mapped down to a hardware level design which inherits the fault-tolerant characteristics of the abstract version. The proof that the hardware level description is a correct作者: anagen 時間: 2025-3-30 13:10
https://doi.org/10.1007/978-3-030-36233-1 of hierarchical decomposition and abstract theories. Both devices authorize memory requests and translate virtual addresses to real addresses. The first unit was designed and verified to the gate level. The second memory management unit is implemented with an abstract representation and provides so作者: Panther 時間: 2025-3-30 18:36