Dependable computing and fault-tolerant systems, 6.
CONTENTS NOTE
Text of Note
Distributed Systems I.- Architectural Foundations, Concepts and Methods Behind ISACS - A Real-Time Intelligent System for Critical Applications.- Implementing Forward Recovery Using Checkpoints in Distributed Systems.- Replication.- Evaluating the Impact of Network Partitions on Replicated Data Availability.- A Distributed Systems Architecture Supporting High Availability and Reliability.- Evaluation.- A Numerical Technique for the Hierarchical Evaluation of Large, Closed Fault-Tolerant Systems.- Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Events.- Limits of Parallelism in Fault-Tolerant Multiprocessors.- Correlated Failures.- Correlated Hardware Failures in Redundant Systems.- Impact of Correlated Failures on Dependability in a VAXcluster System.- Design Diversity.- Assuring Design Diversity in N-Version Software: A Design Paradigm for N-Version Programming.- An Empirical Investigation of the Effect of Formal Specifications on Program Diversity.- Verification Techniques.- The Proof of Correctness of a Fault-Tolerant Circuit Design.- Verification of Memory Management Units.- High Level Design Proof of a Reliable Computing Platform.- Distributed Systems II.- A Membership Protocol Based on Partial Order.- A Fault-Tolerant Architecture for the Intellectual Distributed Processing System.- Validation.- A New Approach of Formal Proof: Probabilistic Validation.- Testing Programs to Detect Malicious Faults.- Signatures.- On-Line Signature Learning and Checking.- A New Efficient Signature Technique for Process Monitoring in Critical Systems.
SUMMARY OR ABSTRACT
Text of Note
This book contains the twenty papers presented and discussed at the 2nd IFIP Working Conference on Depend- able Computing for Critical Applications. Based on the feedback at this meeting, the papers were revised and updated prior to inclusion in this volume. The topics addressed span the spectrum of dependable computing, from design methods for distributed, fault-tolerant systems to formal and experimental validation techniques. The unique focus of this forum on critical applications is what distinguishes many of these papers from those found elsewhere. This book should be of interest to those involved in the development of computing systems where dependability attributes such as reliability, safety, and security are a major concern.