• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Dependable Computing for Critical Applications 2

پدید آورنده
edited by John F. Meyer, Richard D. Schlichting.

موضوع
Computer science.,Electronic data processing.,Software engineering.

رده
QA76
.
9
.
F38
E358
1992

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3211823301
(Number (ISBN
370919198X
(Number (ISBN
9783211823309
(Number (ISBN
9783709191989

NATIONAL BIBLIOGRAPHY NUMBER

Number
b587741

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Dependable Computing for Critical Applications 2
General Material Designation
[Book]
First Statement of Responsibility
edited by John F. Meyer, Richard D. Schlichting.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Vienna
Name of Publisher, Distributor, etc.
Springer Vienna
Date of Publication, Distribution, etc.
1992

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
(xiii, 439 pages 114 illustrations)

SERIES

Series Title
Dependable computing and fault-tolerant systems, 6.

CONTENTS NOTE

Text of Note
Distributed Systems I.- Architectural Foundations, Concepts and Methods Behind ISACS - A Real-Time Intelligent System for Critical Applications.- Implementing Forward Recovery Using Checkpoints in Distributed Systems.- Replication.- Evaluating the Impact of Network Partitions on Replicated Data Availability.- A Distributed Systems Architecture Supporting High Availability and Reliability.- Evaluation.- A Numerical Technique for the Hierarchical Evaluation of Large, Closed Fault-Tolerant Systems.- Fault Injection Simulation: A Variance Reduction Technique for Systems with Rare Events.- Limits of Parallelism in Fault-Tolerant Multiprocessors.- Correlated Failures.- Correlated Hardware Failures in Redundant Systems.- Impact of Correlated Failures on Dependability in a VAXcluster System.- Design Diversity.- Assuring Design Diversity in N-Version Software: A Design Paradigm for N-Version Programming.- An Empirical Investigation of the Effect of Formal Specifications on Program Diversity.- Verification Techniques.- The Proof of Correctness of a Fault-Tolerant Circuit Design.- Verification of Memory Management Units.- High Level Design Proof of a Reliable Computing Platform.- Distributed Systems II.- A Membership Protocol Based on Partial Order.- A Fault-Tolerant Architecture for the Intellectual Distributed Processing System.- Validation.- A New Approach of Formal Proof: Probabilistic Validation.- Testing Programs to Detect Malicious Faults.- Signatures.- On-Line Signature Learning and Checking.- A New Efficient Signature Technique for Process Monitoring in Critical Systems.

SUMMARY OR ABSTRACT

Text of Note
This book contains the twenty papers presented and discussed at the 2nd IFIP Working Conference on Depend- able Computing for Critical Applications. Based on the feedback at this meeting, the papers were revised and updated prior to inclusion in this volume. The topics addressed span the spectrum of dependable computing, from design methods for distributed, fault-tolerant systems to formal and experimental validation techniques. The unique focus of this forum on critical applications is what distinguishes many of these papers from those found elsewhere. This book should be of interest to those involved in the development of computing systems where dependability attributes such as reliability, safety, and security are a major concern.

TOPICAL NAME USED AS SUBJECT

Computer science.
Electronic data processing.
Software engineering.

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
F38
Book number
E358
1992

PERSONAL NAME - PRIMARY RESPONSIBILITY

edited by John F. Meyer, Richard D. Schlichting.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

John F Meyer
Richard D Schlichting

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival