• الرئیسیة
  • البحث المتقدم
  • قائمة المکتبات
  • حول الموقع
  • اتصل بنا
  • نشأة

عنوان
Dependable Computing for Critical Applications 2

پدید آورنده
edited by John F. Meyer, Richard D. Schlichting.

موضوع
Computer science.,Electronic data processing.,Software engineering.

رده
QA76
.
9
.
F38
E358
1992

کتابخانه
کتابخانه مطالعات اسلامی به زبان های اروپایی

محل استقرار
استان: قم ـ شهر: قم

کتابخانه مطالعات اسلامی به زبان های اروپایی

تماس با کتابخانه : 32910706-025

3211823301
370919198X
9783211823309
9783709191989

b587741

Dependable Computing for Critical Applications 2
[Book]
edited by John F. Meyer, Richard D. Schlichting.

Vienna
Springer Vienna
1992

(xiii, 439 pages 114 illustrations)

Dependable computing and fault-tolerant systems, 6.

Distributed Systems I.- Architectural Foundations, Concepts and Methods Behind ISACS - A Real-Time Intelligent System for Critical Applications.- Implementing Forward Recovery Using Checkpoints in Distributed Systems.- Replication.- Evaluating the Impact of Network Partitions on Replicated Data Availability.- A Distributed Systems Architecture Supporting High Availability and Reliability.- Evaluation.- A Numerical Technique for the Hierarchical Evaluation of Large, Closed Fault-Tolerant Systems.- Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Events.- Limits of Parallelism in Fault-Tolerant Multiprocessors.- Correlated Failures.- Correlated Hardware Failures in Redundant Systems.- Impact of Correlated Failures on Dependability in a VAXcluster System.- Design Diversity.- Assuring Design Diversity in N-Version Software: A Design Paradigm for N-Version Programming.- An Empirical Investigation of the Effect of Formal Specifications on Program Diversity.- Verification Techniques.- The Proof of Correctness of a Fault-Tolerant Circuit Design.- Verification of Memory Management Units.- High Level Design Proof of a Reliable Computing Platform.- Distributed Systems II.- A Membership Protocol Based on Partial Order.- A Fault-Tolerant Architecture for the Intellectual Distributed Processing System.- Validation.- A New Approach of Formal Proof: Probabilistic Validation.- Testing Programs to Detect Malicious Faults.- Signatures.- On-Line Signature Learning and Checking.- A New Efficient Signature Technique for Process Monitoring in Critical Systems.

This book contains the twenty papers presented and discussed at the 2nd IFIP Working Conference on Depend- able Computing for Critical Applications. Based on the feedback at this meeting, the papers were revised and updated prior to inclusion in this volume. The topics addressed span the spectrum of dependable computing, from design methods for distributed, fault-tolerant systems to formal and experimental validation techniques. The unique focus of this forum on critical applications is what distinguishes many of these papers from those found elsewhere. This book should be of interest to those involved in the development of computing systems where dependability attributes such as reliability, safety, and security are a major concern.

Computer science.
Electronic data processing.
Software engineering.

QA76
.
9
.
F38
E358
1992

edited by John F. Meyer, Richard D. Schlichting.

John F Meyer
Richard D Schlichting

 مطالعه متن کتاب 

[Book]

Y

الاقتراح / اعلان الخلل

تحذیر! دقق في تسجیل المعلومات
ارسال عودة
تتم إدارة هذا الموقع عبر مؤسسة دار الحديث العلمية - الثقافية ومركز البحوث الكمبيوترية للعلوم الإسلامية (نور)
المكتبات هي المسؤولة عن صحة المعلومات كما أن الحقوق المعنوية للمعلومات متعلقة بها
برترین جستجوگر - پنجمین جشنواره رسانه های دیجیتال