000 04627nam a22005655i 4500
001 978-3-540-70677-9
003 DE-He213
005 20160624102103.0
007 cr nn 008mamaa
008 121227s1996 gw | s |||| 0|eng d
020 _a9783540706779
_9978-3-540-70677-9
024 7 _a10.1007/3-540-61772-8
_2doi
050 4 _aTK7874.6
072 7 _aUYQE
_2bicssc
072 7 _aCOM025000
_2bisacsh
082 0 4 _a004.6
_223
245 1 0 _aDependable Computing — EDCC-2
_h[electronic resource] :
_bSecond European Dependable Computing Conference Taormina, Italy, October 2–4, 1996 Proceedings /
_cedited by Andrzej Hlawiczka, João Gabriel Silva, Luca Simoncini.
260 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1996.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c1996.
300 _aXVI, 444 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1150
505 0 _aFriends: A flexible architecture for implementing fault tolerant and secure distributed applications -- Adaptable fault tolerance for distributed process control using exclusively standard components -- On stratified sampling for high coverage estimations -- Fault injection evaluation of assigned signatures in a RISC processor -- An evaluation of the error detection mechanisms in MARS using software-implemented fault injection -- Dependability modeling and analysis of complex control systems: An application to railway interlocking -- The effect of interfailure time variability on the software reliability growth modelling -- Dependability evaluation of a computing system for traction control of electrical locomotives -- Dependability models of RAID using stochastic activity networks -- Compiler assisted self-checking of structural integrity using return address hashing -- Single source fault-tolerant broadcasting for two-dimensional meshes without virtual channels -- On-line testing of an off-the-shelf microprocessor board for safety-critical applications -- The logic threshold based voting: A model for local feedback bridging fault -- On the yield of VLSI processors with on-chip CPU cache -- Design of dependable hardware: What BIST is most efficient? -- Pseudorandom testing of microprocessors at instruction/data flow level -- Multi-level test generation and fault diagnosis for finite state machines -- Dynamic testing from bounded data type specifications -- A theory of specification-based testing for object-oriented software -- Proving safety properties for embedded control systems -- Enhancing dependability of cooperative applications in partitionable environments -- Efficient message logging for uncoordinated checkpointing protocols -- Atomic updates of replicated data -- Removal of all faulty nodes from a fault-tolerant service by means of distributed diagnosis with imperfect fault coverage -- Constraint based system-level diagnosis of multiprocessors -- A unified theory for f1/f2-diagnosable communication networks.
520 _aThis book constitutes the refereed proceedings of the Second European Dependable Computing Conference, EDCC-2, held in Taormina, Italy, in October 1996. The book presents 26 revised full papers selected from a total of 66 submissions based on the reviews of 146 referees. The papers are organized in sections on distributed fault tolerance, fault injection, modelling and evaluation, fault-tolerant design, basic hardware models, testing, verification, replication and distribution, and system level diagnosis.
650 0 _aComputer science.
650 0 _aComputer hardware.
650 0 _aSoftware engineering.
650 0 _aComputer system performance.
650 0 _aOperating systems (Computers).
650 1 4 _aComputer Science.
650 2 4 _aSpecial Purpose and Application-Based Systems.
650 2 4 _aSystem Performance and Evaluation.
650 2 4 _aComputer Hardware.
650 2 4 _aSoftware Engineering.
650 2 4 _aOperating Systems.
700 1 _aHlawiczka, Andrzej.
_eeditor.
700 1 _aSilva, João Gabriel.
_eeditor.
700 1 _aSimoncini, Luca.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540617723
786 _dSpringer
830 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v1150
856 4 0 _uhttp://dx.doi.org/10.1007/3-540-61772-8
942 _2EBK7453
_cEBK
999 _c36747
_d36747