派博傳思國際中心

標(biāo)題: Titlebook: Dependable Computing - EDDC-3; Third European Depen Jan Hlavi?ka,Erik Maehle,András Pataricza Conference proceedings 1999 Springer-Verlag B [打印本頁]

作者: 涌出    時(shí)間: 2025-3-21 17:53
書目名稱Dependable Computing - EDDC-3影響因子(影響力)




書目名稱Dependable Computing - EDDC-3影響因子(影響力)學(xué)科排名




書目名稱Dependable Computing - EDDC-3網(wǎng)絡(luò)公開度




書目名稱Dependable Computing - EDDC-3網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Dependable Computing - EDDC-3被引頻次




書目名稱Dependable Computing - EDDC-3被引頻次學(xué)科排名




書目名稱Dependable Computing - EDDC-3年度引用




書目名稱Dependable Computing - EDDC-3年度引用學(xué)科排名




書目名稱Dependable Computing - EDDC-3讀者反饋




書目名稱Dependable Computing - EDDC-3讀者反饋學(xué)科排名





作者: 輕快來事    時(shí)間: 2025-3-21 21:40

作者: Density    時(shí)間: 2025-3-22 03:46

作者: STANT    時(shí)間: 2025-3-22 07:11
978-3-540-66483-3Springer-Verlag Berlin Heidelberg 1999
作者: 四指套    時(shí)間: 2025-3-22 11:39
Luca Caracoglia,Gian Felice Giaccudigital signature and key management. Secure and dependable operation must be assured in normal and manipulated environment. Typical failure modes and attacks as well as protection schemes are described for smart card hardware and software. Certification methodology of smart card systems for state o
作者: Soliloquy    時(shí)間: 2025-3-22 14:06
Lecture Notes in Civil Engineeringeterministic and Stochastic Petri Net approach. The DSPN approach offers significant advantages in terms of easiness and clearness of modelling with respect to the existing Markov chain based tools, drastically limiting the amount of user-assistance needed to define the model. At the same time, thes
作者: Soliloquy    時(shí)間: 2025-3-22 18:18

作者: Epithelium    時(shí)間: 2025-3-22 22:09
Dynamics and Aerodynamics of Cables symmetric with a DSM and a CC-NUMA. As the system is scalable, we consider two architectures: a reference one composed of four nodes and an extended one with an additional spare node. A set of dependability and performability measures is evaluated for these architectures with two categories of appl
作者: galley    時(shí)間: 2025-3-23 05:11

作者: JADED    時(shí)間: 2025-3-23 07:32
In the Presence of a Zero Eigenvaluerocess stops sending algorithm messages, but might continue to send other messages, e.g., “.” messages. The paper presents both the specification of a muteness failure detector, denoted by ., and an implementation of . in a partial synchrony model (there are bounds on message latency and clock skew,
作者: 引水渠    時(shí)間: 2025-3-23 12:52

作者: Congeal    時(shí)間: 2025-3-23 15:08
https://doi.org/10.1007/978-1-4612-4426-4under general (and thus hard) fault assumptions. Known signature methods contribute to more efficient solutions by protecting forwarded information from being altered undetectably. This paper presents a new signature generation technique, which prevents the occurrence of malicious Byzantine faults i
作者: Postmenopause    時(shí)間: 2025-3-23 19:16
Bifurcations of Periodic Equationsfailures. In previous studies it has been proved that this approach achieved better results than independent checkpointing and message logging. However, we need to know more about the real overhead of coordinated checkpointing and get sustained insights about the best way to implement this technique
作者: 一瞥    時(shí)間: 2025-3-23 23:05
https://doi.org/10.1007/978-94-010-0161-8the failure modes in the presence of injected faults (internal or external) and of the incorporation of wrappers to improve these failure modes. After a short classification of current microkernel architectures and of their interactions between the application layer and the microkernel functional co
作者: 持續(xù)    時(shí)間: 2025-3-24 04:02
https://doi.org/10.1007/978-94-010-0161-8ult/error handling mechanisms are becoming common features of today servers. This paper presents a new simulated fault injection method, which allows the assessment of the effectiveness of error detection mechanisms without using expensive test circuits. Fault injection was performed in two stages.
作者: Hiatal-Hernia    時(shí)間: 2025-3-24 07:47

作者: Calibrate    時(shí)間: 2025-3-24 14:06

作者: 殖民地    時(shí)間: 2025-3-24 17:02
Peter D. Blair,Ronald E. Millers: intrusiveness, also known as “probe effect”. In fact, for most fault models, additional code has to be run on the same processor that executes the application. The danger lies in some deadlines being missed as a consequence of that overhead..This paper identifies the sources of intrusiveness, and
作者: 不滿分子    時(shí)間: 2025-3-24 21:56
Sirshendu Mondal,Achintya Mukhopadhyay worker more possibilities to intervene in the production process it is desirable to work close to the motions of the machine axis. Intelligent computer based systems are able to introduce new safety technologies into the machines. A close connection between motion control and safety monitoring can
作者: Admire    時(shí)間: 2025-3-25 00:43

作者: 全能    時(shí)間: 2025-3-25 06:00
Sirshendu Mondal,Achintya Mukhopadhyayproach to designing totally self-checking (TSC) code-disjoint (CD) SMs protected against errors using unordered codes. It is assumed that D flip-flops are used as the memory elements and that the circuit should be TSC for all single stuck-at faults (except for the faults on the clock lines), and CD
作者: 使乳化    時(shí)間: 2025-3-25 10:40
https://doi.org/10.1007/978-981-15-0536-2as representative the nxn Omega network. We show that the number of paths is 3n.-2n and we give a method for testing those applying only 2(3n-2) pairs of test vectors. We also show that this is the least number of test vector pairs that are required for testing all paths of the MIN. We also give a p
作者: 火海    時(shí)間: 2025-3-25 13:00

作者: 船員    時(shí)間: 2025-3-25 18:26

作者: 令人心醉    時(shí)間: 2025-3-25 20:41

作者: Hay-Fever    時(shí)間: 2025-3-26 02:53

作者: Cupidity    時(shí)間: 2025-3-26 06:59
Software Reliability Engineering Risk Management for the New Milleniumon & knowledge processing systems. In short, SRE seeks to build such systems that do what we want. The question is whether a general risk management (which we want, including the aspects of safety, security, etc.) can be achieved by the approaches used in SRE. If not, why not? If so, how?
作者: Vsd168    時(shí)間: 2025-3-26 12:03

作者: ZEST    時(shí)間: 2025-3-26 15:16

作者: 妨礙    時(shí)間: 2025-3-26 19:16
Evaluation of Video Communication over Packet Switching Networksng is strongly dependent on the quality of service provided by its communication support. Dependability attributes of the undelying communication system playing a predominant role with regard to the quality achievable from applications and users point of view. Especially video compression reduces da
作者: 鋪?zhàn)?nbsp;   時(shí)間: 2025-3-27 00:23

作者: Generator    時(shí)間: 2025-3-27 01:07
Software Reliability Engineering Risk Management for the New Milleniumon & knowledge processing systems. In short, SRE seeks to build such systems that do what we want. The question is whether a general risk management (which we want, including the aspects of safety, security, etc.) can be achieved by the approaches used in SRE. If not, why not? If so, how?
作者: ambivalence    時(shí)間: 2025-3-27 06:09

作者: Ostrich    時(shí)間: 2025-3-27 11:26

作者: gerontocracy    時(shí)間: 2025-3-27 16:08
Avoiding Malicious Byzantine Faults by a New Signature Generation Techniqueunder general (and thus hard) fault assumptions. Known signature methods contribute to more efficient solutions by protecting forwarded information from being altered undetectably. This paper presents a new signature generation technique, which prevents the occurrence of malicious Byzantine faults i
作者: 漂亮    時(shí)間: 2025-3-27 18:55
An Experimental Evaluation of Coordinated Checkpointing in a Parallel Machinefailures. In previous studies it has been proved that this approach achieved better results than independent checkpointing and message logging. However, we need to know more about the real overhead of coordinated checkpointing and get sustained insights about the best way to implement this technique
作者: Stable-Angina    時(shí)間: 2025-3-28 01:39

作者: Directed    時(shí)間: 2025-3-28 02:35
Assessing Error Detection Coverage by Simulated Fault Injectionult/error handling mechanisms are becoming common features of today servers. This paper presents a new simulated fault injection method, which allows the assessment of the effectiveness of error detection mechanisms without using expensive test circuits. Fault injection was performed in two stages.
作者: Offstage    時(shí)間: 2025-3-28 09:13
Considering Workload Input Variations in Error Coverage Estimationn implemented fault injection experiments using the FIMBUL tool on the Thor microprocessor show that the estimated error non-coverage may vary by more than five percentage units for different workload input sequences. A methodology for predicting error coverage for a particular input sequence based
作者: Relinquish    時(shí)間: 2025-3-28 13:04
Fault Injection into VHDL Models: Experimental Validation of a Fault-Tolerant Microcomputer Systemd stand-by sparing, parity detection and a watchdog timer. The faults have been injected on a chip-level VHDL model, using an injection tool designed with this purpose. We have carried out a set of injection experiments (with 3000 injections each), injecting transient and permanent faults of types s
作者: harangue    時(shí)間: 2025-3-28 16:02

作者: MAOIS    時(shí)間: 2025-3-28 19:38

作者: 大罵    時(shí)間: 2025-3-28 23:37
A Method for Implementing a Safety Control System Based on Its Separation into Safety-Related and Not is required to have such an interlock function that the control output of the safety-related part gives permission to the control output of the non-safety-related part. This paper describes the methods of separating and combining the safety-related and non-safety related parts in Chapter 2. In Cha
作者: G-spot    時(shí)間: 2025-3-29 04:24

作者: orthodox    時(shí)間: 2025-3-29 08:19
Path Delay Fault Testing of a Class of Circuit-Switched Multistage Interconnection Networksas representative the nxn Omega network. We show that the number of paths is 3n.-2n and we give a method for testing those applying only 2(3n-2) pairs of test vectors. We also show that this is the least number of test vector pairs that are required for testing all paths of the MIN. We also give a p
作者: 政府    時(shí)間: 2025-3-29 13:46

作者: Graphite    時(shí)間: 2025-3-29 17:45
Conference proceedings 1999ng” (which is a successor organizationof AFCET)in France,theGI/ITG/GMATechnicalCommitteeonDepend ability and Fault Tolerance in Germany, and the AICA Working Group “Dependability of Computer Systems” in Italy. In addition, committees of several global professional organizations, such as IEEE and IFI
作者: larder    時(shí)間: 2025-3-29 22:25
Luca Caracoglia,Gian Felice Giaccu which present the actual communication infrastructure. First we illustrate the effect of transmission deficiencies on the visual quality of the received video. Then an analytical model of dependability is developed, which reflects the transmission of MPEG and H.261 coded video streams. We apply our
作者: 絕緣    時(shí)間: 2025-3-30 03:37
https://doi.org/10.1007/978-1-4612-4426-4annot obtain the same valid signature, because the steps to increment the coded sequence number are included in UniSig. Deviations from the program execution path are very likely to lead to detectably corrupted signatures. Hence, for each sequence number a valid signature can be generated only once.
作者: Crayon    時(shí)間: 2025-3-30 07:49

作者: 割讓    時(shí)間: 2025-3-30 12:16

作者: 亂砍    時(shí)間: 2025-3-30 13:37

作者: excrete    時(shí)間: 2025-3-30 19:05
Evaluation of Video Communication over Packet Switching Networks which present the actual communication infrastructure. First we illustrate the effect of transmission deficiencies on the visual quality of the received video. Then an analytical model of dependability is developed, which reflects the transmission of MPEG and H.261 coded video streams. We apply our
作者: nocturnal    時(shí)間: 2025-3-30 22:35

作者: Abominate    時(shí)間: 2025-3-31 01:00

作者: synovium    時(shí)間: 2025-3-31 08:17

作者: 很是迷惑    時(shí)間: 2025-3-31 12:25
Design of Totally Self-Checking Code-Disjoint Synchronous Sequential Circuitsas been automated by using the newely developed software tools that accept the BLIF representation of a SM and are compatible with the SIS tools. Many benchmark SMs can now be implemented as TSC with 100% fault coverage.
作者: Parley    時(shí)間: 2025-3-31 16:51

作者: Emg827    時(shí)間: 2025-3-31 18:38
Luca Caracoglia,Gian Felice Giaccu attacks as well as protection schemes are described for smart card hardware and software. Certification methodology of smart card systems for state of the art systems like GELDKARTE and MONEO as well as requirements for ITSEC=6 security level are evaluated.
作者: 果核    時(shí)間: 2025-3-31 21:43

作者: Humble    時(shí)間: 2025-4-1 04:50

作者: Altitude    時(shí)間: 2025-4-1 06:38

作者: 使人入神    時(shí)間: 2025-4-1 13:54
In the Presence of a Zero Eigenvalue but these bounds are unknown and hold only after some point that is itself unknown). We show that, modulo a simple modification, a consensus algorithm that has been designed in a crash-stop model with ., can be reused in the presence of muteness failures simply by replacing . with ..
作者: 偶像    時(shí)間: 2025-4-1 17:02

作者: coltish    時(shí)間: 2025-4-1 20:12
https://doi.org/10.1007/978-94-010-0161-8s is then described distinguishing the two main modes of interactions identified (library-based or trap-based). Some experimental results are presented that show the usefulness of the tool. The paper concludes by a summary of the main characteristics of MAFALDA and a brief discussion of our future work.
作者: 成績上升    時(shí)間: 2025-4-2 01:54

作者: 時(shí)代錯(cuò)誤    時(shí)間: 2025-4-2 05:55

作者: Conflict    時(shí)間: 2025-4-2 10:04
https://doi.org/10.1007/978-981-15-0536-2and the propagation delay along every other path can be calculated from the propagation delays along the selected paths, b) all the selected paths are tested by using 2(3log.n+1) test vector pairs. Both methods derive strong delay—verification test sets.




歡迎光臨 派博傳思國際中心 (http://pjsxioz.cn/) Powered by Discuz! X3.5
洛隆县| 秦安县| 馆陶县| 平乐县| 板桥市| 滦平县| 镇康县| 西林县| 开江县| 岐山县| 皋兰县| 阆中市| 永善县| 贺州市| 松江区| 鹤峰县| 弥勒县| 顺昌县| 浑源县| 阜宁县| 都兰县| 西和县| 綦江县| 灵石县| 建平县| 深水埗区| 克拉玛依市| 镇巴县| 贺兰县| 遵义市| 靖安县| 珲春市| 信丰县| 昆山市| 比如县| 汝阳县| 崇文区| 夏津县| 虹口区| 广德县| 乃东县|