[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers最新文献

筛选
英文 中文
Disk dual copy methods and their performance 磁盘双拷贝方法及其性能
Y. Dishon, T. S. Liu
{"title":"Disk dual copy methods and their performance","authors":"Y. Dishon, T. S. Liu","doi":"10.1109/FTCS.1988.5337","DOIUrl":"https://doi.org/10.1109/FTCS.1988.5337","url":null,"abstract":"Performance analyses of three dual-copy methods for ensuring fault tolerance of disk storage devices are considered: an algorithm using synchronized disks, and single-read and parallel-read algorithms using nonsynchronized disks. With the synchronized algorithm, dual copying of data is performed almost simultaneously for every write request. With nonsynchronized disks, the two write operations are essentially sequential. Thus the coordination of the two physical data transfers for each write request degrades performance. On the other hand, the availability of dual copies of the data makes it possible to save on rotational latency time by connecting to that device whose rotational position is closest to the read/write head, thus improving performance.<<ETX>>","PeriodicalId":171148,"journal":{"name":"[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers","volume":"134 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133666296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
In search of effective diversity: a six-language study of fault-tolerant flight control software 寻找有效的多样性:容错飞行控制软件的六种语言研究
A. Avizienis, Michael R. Lyu, Werner Schütz
{"title":"In search of effective diversity: a six-language study of fault-tolerant flight control software","authors":"A. Avizienis, Michael R. Lyu, Werner Schütz","doi":"10.1109/FTCS.1988.5291","DOIUrl":"https://doi.org/10.1109/FTCS.1988.5291","url":null,"abstract":"Multiversion software systems achieve fault tolerance through software redundancy and diversity. The authors investigated multiversion software systems using six different programming languages to create six versions of software for an automatic landing program. The rationale, preparation, execution, and evaluation of this investigation are reported.<<ETX>>","PeriodicalId":171148,"journal":{"name":"[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133693700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 89
Accelerated fault simulation by propagating disjoint fault-sets 通过传播不相交的故障集加速故障模拟
Shigeharu Teshima, N. Chujo, Noriyoshi Sano, H. Nagase, M. Takigawa
{"title":"Accelerated fault simulation by propagating disjoint fault-sets","authors":"Shigeharu Teshima, N. Chujo, Noriyoshi Sano, H. Nagase, M. Takigawa","doi":"10.1109/FTCS.1988.5308","DOIUrl":"https://doi.org/10.1109/FTCS.1988.5308","url":null,"abstract":"The authors propose a novel fault simulation method (the compressive method), which extends the idea of fault propagation on which the deductive and concurrent method are based. A fault set is used as a unit of fault propagation; it is a set of faults which cause the same effect on the primary outputs for a given input pattern. Thus, faults in the set are propagated in a lump, just like an individual fault in the concurrent method, and fault propagation is accelerated in proportion to number of elements in a fault set. The compressive method introduces union operation on the fault sets. The operation dynamically gathers faults into a fault set so that they are propagated in a bit unit. Fault simulation using this method provides better performance than the concurrent method; simulation time is shortened by 50-83% and memory storage is reduced by 50-80% in simulating a combinational circuit.<<ETX>>","PeriodicalId":171148,"journal":{"name":"[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127711986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Approaches for the repair of VLSI/WSI RRAMs by row/column deletion VLSI/WSI rram的行/列删除修复方法
F. Lombardi, Wei-Kang Huang
{"title":"Approaches for the repair of VLSI/WSI RRAMs by row/column deletion","authors":"F. Lombardi, Wei-Kang Huang","doi":"10.1109/FTCS.1988.5341","DOIUrl":"https://doi.org/10.1109/FTCS.1988.5341","url":null,"abstract":"The authors present two approaches for the repair of large random access memory (RAM) in which redundant rows and columns have been added as spares. These devices, referred to as redundant RAMs, are repaired to achieve acceptable yields at production time. The first approach, namely, the faulty-line-covering technique, is a refinement of the fault-driven approach. This approach finds the optimal repair-solution within a smaller number of iterations than the fault-driven algorithm. Simulation results show that the faulty-line-covering technique will execute much faster under all fault distributions. The second approach uses a heuristic criterion in the generation of the repair-solution. This heuristic criterion permits a very fast repair. The criterion is based on the calculation of efficient coefficients for the rows and columns of the memory. Two techniques for coefficient selection are proposed.<<ETX>>","PeriodicalId":171148,"journal":{"name":"[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128533887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 52
Reliabilities of two fault-tolerant interconnection networks 两个容错互连网络的可靠性
J. T. Blake, Kishor S. Trivedi
{"title":"Reliabilities of two fault-tolerant interconnection networks","authors":"J. T. Blake, Kishor S. Trivedi","doi":"10.1109/FTCS.1988.5335","DOIUrl":"https://doi.org/10.1109/FTCS.1988.5335","url":null,"abstract":"The authors examine the augmented-shuffle-exchange network (ASEN), a network with low switch and link complexity. Using exact reliability expressions for small networks and upper and lower bounds for larger networks, the reliability of the ASEN is compared with that of the extra-stage interconnection network (SEN+). The main contribution of this work is to analyze the effects of imperfect coverage and online repair on the reliability of large ASEN networks using a hierarchical approach.<<ETX>>","PeriodicalId":171148,"journal":{"name":"[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127028426","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Dependability evaluation of software fault-tolerance 软件容错可靠性评估
J. Arlat, K. Kanoun, J. Laprie
{"title":"Dependability evaluation of software fault-tolerance","authors":"J. Arlat, K. Kanoun, J. Laprie","doi":"10.1109/FTCS.1988.5312","DOIUrl":"https://doi.org/10.1109/FTCS.1988.5312","url":null,"abstract":"The authors present a detailed reliability and safety analysis of the two major software fault-tolerance approaches, recovery blocks (RB) and n-version programming (NVP). The methodology used for the modeling is based on the identification of the possible types of faults introduced during the specification and the implementation, and on the analysis of the behavior following fault activation. The main outcome of the evaluation concerns the derivation of analytical results for identifying the improvement that can result from the use of RB and NVP and for revealing the most critical types of related faults. The study of nested RBs shows that the proposed analysis approach can be applied to such realistic software structures and when an alternate is itself a RB, the results are analogous to the case of the addition of a third alternate. The reliability analysis showed that an improvement has to be expected, but that this improvement would be very low. The study of the discarding of a failed version in NVP shows that this strategy is always worthwhile for safety, whereas, for reliability, it is only worthwhile when independent faults dominate.<<ETX>>","PeriodicalId":171148,"journal":{"name":"[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128998686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Design and reconfiguration strategies for near-optimal k-fault-tolerant tree architectures 近最优k-容错树结构的设计和重构策略
S. Dutt, J. Hayes
{"title":"Design and reconfiguration strategies for near-optimal k-fault-tolerant tree architectures","authors":"S. Dutt, J. Hayes","doi":"10.1109/FTCS.1988.5339","DOIUrl":"https://doi.org/10.1109/FTCS.1988.5339","url":null,"abstract":"A graph G(k,T) representing a multiprocessor architecture is a k-fault-tolerant (k-FT) implementation of a basic tree T, if G(k,T) contains T after removal of any k nodes. The authors consider the design of such k-FT architectures with the primary goals of minimizing the number of spare nodes and edges. The authors present a systematic methodology for designing k-FT implementations of nonhomogeneous symmetric d-ary trees based on graph covering. The resulting designs are optimal in a well-defined sense when k<d, and are near-optimal otherwise. The methodology is applicable to general tree structures; this is illustrated for the case of k-FT homogeneous symmetric trees. They also present strategies for reconfiguring G(k,T) to obtain a fault-free tree isomorphic to T.<<ETX>>","PeriodicalId":171148,"journal":{"name":"[1988] The Eighteenth International Symposium on Fault-Tolerant Computing. Digest of Papers","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133000566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信