this paper concerns an important aspect of the problem of designing fault-tolerant distributedcomputing systems. the concepts involved in ″backward error recovery″ , i. e. restoring a system, or some part of a syst...
详细信息
this paper concerns an important aspect of the problem of designing fault-tolerant distributedcomputing systems. the concepts involved in ″backward error recovery″ , i. e. restoring a system, or some part of a system, to a previous state which it is hoped or believed preceded the occurrence of any existing errors are formalised, and generalised so as to apply to concurrent, e. g. distributed, systems. the formalisation is based on the use of ″Occurrence Graphs″ to represent the cause-effect relationships that exist between the events that occur when a system is operational, and to indicate existing possibilities for state restortation. A protocol is presented which could be used in each of the nodes in a distributedcomputing system in order to provide system recoverability in the face even of multiple faults.
this paper presents the results of a study that has established a standard set of four semiconductor VLSI building-block circuits. these circuits can be assembled with off-the-shelf microprocessors and semiconductor m...
详细信息
this paper presents the results of a study that has established a standard set of four semiconductor VLSI building-block circuits. these circuits can be assembled with off-the-shelf microprocessors and semiconductor memory modules into fault-tolerant distributed computer configurations. the resulting multi-computer architecture uses self-checking computer modules backed up by a limited number of spares. A redundant bus system is employed for communication between computer modules.
this conference contains a total of 53 papers of which 25 are short papers. 26 papers abstracted separately, the conference sessions are on system evaluation, self-test evaluation, test generation, system design compa...
详细信息
this conference contains a total of 53 papers of which 25 are short papers. 26 papers abstracted separately, the conference sessions are on system evaluation, self-test evaluation, test generation, system design compact testing, distributed systems, LSI design and evaluation, design techniques, off- and on-live testing.
this paper concerns an important aspect of the problem of designing fault-tolerant distributedcomputing systems. the concepts involved in ″backward error recovery″ , i. e. restoring a system, or some part of a syst...
详细信息
this paper concerns an important aspect of the problem of designing fault-tolerant distributedcomputing systems. the concepts involved in ″backward error recovery″ , i. e. restoring a system, or some part of a system, to a previous state which it is hoped or believed preceded the occurrence of any existing errors are formalised, and generalised so as to apply to concurrent, e. g. distributed, systems. the formalisation is based on the use of ″Occurrence Graphs″ to represent the cause-effect relationships that exist between the events that occur when a system is operational, and to indicate existing possibilities for state restortation. A protocol is presented which could be used in each of the nodes in a distributedcomputing system in order to provide system recoverability in the face even of multiple faults.
this paper presents the results of a study that has established a standard set of four semiconductor VLSI building-block circuits. these circuits can be assembled with off-the-shelf microprocessors and semiconductor m...
详细信息
this paper presents the results of a study that has established a standard set of four semiconductor VLSI building-block circuits. these circuits can be assembled with off-the-shelf microprocessors and semiconductor memory modules into fault-tolerant distributed computer configurations. the resulting multi-computer architecture uses self-checking computer modules backed up by a limited number of spares. A redundant bus system is employed for communication between computer modules.
this conference contains a total of 53 papers of which 25 are short papers. 26 papers abstracted separately, the conference sessions are on system evaluation, self-test evaluation, test generation, system design compa...
详细信息
this conference contains a total of 53 papers of which 25 are short papers. 26 papers abstracted separately, the conference sessions are on system evaluation, self-test evaluation, test generation, system design compact testing, distributed systems, LSI design and evaluation, design techniques, off- and on-live testing.
Proceedings includes 92 papers that are divided into several major groups dealing withthe theory of computing;distributed function computer architecture;scheduling;stochastic decision processes;control system theory;...
详细信息
Proceedings includes 92 papers that are divided into several major groups dealing withthe theory of computing;distributed function computer architecture;scheduling;stochastic decision processes;control system theory;data compression and reliable communication;network computer performance;simulation and modeling of computer systems;operating systems;switching and automata;biomedical engineering;identification of biological systems;data security;specialized applications languages;programming languages;identification;modeling;and discrete structures.
this book constitutes the thoroughly refereed post-proceedings of the 7thinternational Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE internationalconference on Softwa...
详细信息
ISBN:
(数字)9783642197512
ISBN:
(纸本)9783642197505
this book constitutes the thoroughly refereed post-proceedings of the 7thinternational Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE internationalconference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. the 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. the papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.
this book constitutes the thoroughly refereed post-conference proceedings of the 8thinternational ICST conference on Mobile and Ubiquitous Systems: computing, networking, and Services, MobiQuitous 2011, held in Copen...
详细信息
ISBN:
(数字)9783642309731
ISBN:
(纸本)9783642309724
this book constitutes the thoroughly refereed post-conference proceedings of the 8thinternational ICST conference on Mobile and Ubiquitous Systems: computing, networking, and Services, MobiQuitous 2011, held in Copenhagen, Denmark, in December 2011. the 34 revised full papers presented were carefully reviewed and selected from numerous submissions. they cover a wide range of topics ranging from localization and tracking, search and discovery, classification and profiling, context awareness and architecture, location and activity recognition as well as a best paper session, an industry track, and poster and demo papers.
this book constitutes the refereed proceedings of the 8thinternationalconference on distributedcomputing and Internet Technology, ICDCIT 2012, held in Bhubaneswar, India, in February 2012. the 17 full papers presen...
详细信息
ISBN:
(数字)9783642280733
ISBN:
(纸本)9783642280726
this book constitutes the refereed proceedings of the 8thinternationalconference on distributedcomputing and Internet Technology, ICDCIT 2012, held in Bhubaneswar, India, in February 2012. the 17 full papers presented together with 15 short papers in this volume were carefully reviewed and selected from 89 submissions. In addition the book contains the full versions of 6 invited talks. the papers range over a spectrum of issues related to the theme, covering theoretical foundations, computational tools, and societal applications. State of the art techniques like game theoretic ones are used by authors for analyzing conceptual problems.
暂无评论