Online Library TheLib.net » Dependable Computing for Critical Applications 2

This volume contains the papers presented at the Second International Work­ ing Conference on Dependable Computing for Critical Applications, sponsored by IFIP Working Group lOA and held in Tucson, Arizona on February 18-20, 1991. In keeping with the first such conference on this topic, which took place at the University of California, Santa Barbara in 1989, this meeting was like­ wise concerned with an important basic question: Can we rely on Computers? In more precise terms, it addressed various aspects of computer system de­ pendability, a broad concept defined as th'e trustworthiness of computer service such that reliance can justifiably be placed on this service. Given that this term includes attributes such as reliability, availability, safety, and security, it is our hope that these papers will contribute to further integration of these ideas in the context of critical applications. The program consisted of 20 papers and three panel sessions. The papers were selected from a total of 61 submissions at a November 1990 meeting of the Program Committee in Ann Arbor, Michigan. We were very fortunate to have a broad spectrum of interests represented, with papers in the final program coming from seven different countries, representing work at universities, corporations, and government agencies. The process was greatly facilitated by the diligent work of the Program Committee and the quality of reviews provided by outside referees. In addition to the paper presentations, there were three panel sessions or­ ganized to examine particular topics in detail.








Content:
Front Matter....Pages N2-XIII
Front Matter....Pages 1-1
Architectural Foundations, Concepts and Methods Behind ISACS — A Real-Time Intelligent System for Critical Applications....Pages 3-26
Implementing Forward Recovery Using Checkpoints in Distributed Systems....Pages 27-46
Front Matter....Pages 47-47
Evaluating the Impact of Network Partitions on Replicated Data Availability....Pages 49-65
A Distributed Systems Architecture Supporting High Availability and Reliability....Pages 67-91
Front Matter....Pages 93-93
A Numerical Technique for the Hierarchical Evaluation of Large, Closed Fault-Tolerant Systems....Pages 95-114
Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Events....Pages 115-134
Limits of Parallelism in Fault-Tolerant Multiprocessors....Pages 135-154
Front Matter....Pages 155-155
Correlated Hardware Failures in Redundant Systems....Pages 157-174
Impact of Correlated Failures on Dependability in a VAXcluster System....Pages 175-194
Front Matter....Pages 195-195
Assuring Design Diversity in N-Version Software: A Design Paradigm for N-Version Programming....Pages 197-218
An Empirical Investigation of the Effect of Formal Specifications on Program Diversity....Pages 219-240
Front Matter....Pages 241-241
The Proof of Correctness of a Fault-Tolerant Circuit Design....Pages 243-260
Verification of Memory Management Units....Pages 261-278
High Level Design Proof of a Reliable Computing Platform....Pages 279-306
Front Matter....Pages 307-307
A Membership Protocol Based on Partial Order....Pages 309-331
A Fault-Tolerant Architecture for the Intellectual Distributed Processing System....Pages 333-353
Front Matter....Pages 355-355
A New Approach of Formal Proof: Probabilistic Validation....Pages 357-374
Testing Programs to Detect Malicious Faults....Pages 375-392
Front Matter....Pages 393-393
On-Line Signature Learning and Checking....Pages 395-420
A New Efficient Signature Technique for Process Monitoring in Critical Systems....Pages 421-437
Back Matter....Pages 439-439



Content:
Front Matter....Pages N2-XIII
Front Matter....Pages 1-1
Architectural Foundations, Concepts and Methods Behind ISACS — A Real-Time Intelligent System for Critical Applications....Pages 3-26
Implementing Forward Recovery Using Checkpoints in Distributed Systems....Pages 27-46
Front Matter....Pages 47-47
Evaluating the Impact of Network Partitions on Replicated Data Availability....Pages 49-65
A Distributed Systems Architecture Supporting High Availability and Reliability....Pages 67-91
Front Matter....Pages 93-93
A Numerical Technique for the Hierarchical Evaluation of Large, Closed Fault-Tolerant Systems....Pages 95-114
Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Events....Pages 115-134
Limits of Parallelism in Fault-Tolerant Multiprocessors....Pages 135-154
Front Matter....Pages 155-155
Correlated Hardware Failures in Redundant Systems....Pages 157-174
Impact of Correlated Failures on Dependability in a VAXcluster System....Pages 175-194
Front Matter....Pages 195-195
Assuring Design Diversity in N-Version Software: A Design Paradigm for N-Version Programming....Pages 197-218
An Empirical Investigation of the Effect of Formal Specifications on Program Diversity....Pages 219-240
Front Matter....Pages 241-241
The Proof of Correctness of a Fault-Tolerant Circuit Design....Pages 243-260
Verification of Memory Management Units....Pages 261-278
High Level Design Proof of a Reliable Computing Platform....Pages 279-306
Front Matter....Pages 307-307
A Membership Protocol Based on Partial Order....Pages 309-331
A Fault-Tolerant Architecture for the Intellectual Distributed Processing System....Pages 333-353
Front Matter....Pages 355-355
A New Approach of Formal Proof: Probabilistic Validation....Pages 357-374
Testing Programs to Detect Malicious Faults....Pages 375-392
Front Matter....Pages 393-393
On-Line Signature Learning and Checking....Pages 395-420
A New Efficient Signature Technique for Process Monitoring in Critical Systems....Pages 421-437
Back Matter....Pages 439-439
....
Download the book Dependable Computing for Critical Applications 2 for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen