Dependable Computing for Critical Applications 6, Volume 6
IEEE Computer Society, 1998 - Computers - 328 pages
This text addresses significant ideas and concepts for designing, analyzing, implementing and operating dependable computing systems. It covers such topics as: critical industrial systems; specification and design diversity; security protocols and mechanisms; and distributed systems.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Experimental Evaluation of Assigned Signature Checking With Return Address
Transient Fault Detection in Cache Memories by Employing a Small Shadow Cache
Frequentist and Bayesian Coverage Estimations for Stratified FaultInjection
12 other sections not shown
algorithm application approach assumption attacker backup behavior belief network benchmark beta distribution brake-by-wire clock components confidence limit considered CORBA corrupted data cache Dependable Computing election error detection error detection coverage evaluation execution fail-silence violations fault dictionary fault injection fault injection experiments fault injection techniques fault model Fault-Tolerant Computing Fault-Tolerant Systems Figure frequentist function gate-level hardware IEEE implementation injected faults interface International IntSet leader logical partition message versions METFML METFTM module moment generating function Myrinet node under test number of faults number of paths on-line spares operation output parameters physical fault injection pin-level posterior distribution PowerPC privilege graph processor RAID level re-execution real-time systems reliability replicated tasks scheduling Section semantics shadow cache simulation software-implemented fault injection SPARC spare disks specification stable partition stratified sampling sub-block target tion tolerance transient faults utilization valid verification VHDL xlisp