|
|
|
|
LEADER |
04713nam a22005295i 4500 |
001 |
978-0-585-28002-8 |
003 |
DE-He213 |
005 |
20151204180452.0 |
007 |
cr nn 008mamaa |
008 |
100301s1994 xxu| s |||| 0|eng d |
020 |
|
|
|a 9780585280028
|9 978-0-585-28002-8
|
024 |
7 |
|
|a 10.1007/b102309
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a QA76.9.D35
|
072 |
|
7 |
|a UMB
|2 bicssc
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM031000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.74
|2 23
|
245 |
1 |
0 |
|a Foundations of Dependable Computing
|h [electronic resource] :
|b System Implementation /
|c edited by Gary M. Koob, Clifford G. Lau.
|
264 |
|
1 |
|a Boston, MA :
|b Springer US,
|c 1994.
|
300 |
|
|
|a XIII, 321 p.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a The Kluwer International Series in Engineering and Computer Science,
|x 0893-3405 ;
|v 285
|
505 |
0 |
|
|a Dependable Components -- Self-Checking and Self-Exercising Design for Hierarchic Long-Life Fault-Tolerant Systems -- Design of Self-Checking Processors Using Efficient Berger Check Prediction Logic -- Dependable Communications -- Network Fault Detection and Recovery in the Chaos Router -- Real-Time Fault-Tolerant Communication in Distributed Computing Systems -- Computer Support -- Speculative Execution and Compiler-Assisted Multiple Instruction Recovery -- Compiler Assisted Synthesis of Algorithm-Based Checking in Multiprocessors1 -- Operating System Support -- Application Transparent Fault Management in Fault Tolerant Mach -- Constructing Dependable Distributed Systems Using Consul -- Enhancing Fault Tolerance of Real-Time Systems through Time Redundancy.
|
520 |
|
|
|a Foundations of Dependable Computing: System Implementation, explores the system infrastructure needed to support the various paradigms of Paradigms for Dependable Applications. Approaches to implementing support mechanisms and to incorporating additional appropriate levels of fault detection and fault tolerance at the processor, network, and operating system level are presented. A primary concern at these levels is balancing cost and performance against coverage and overall dependability. As these chapters demonstrate, low overhead, practical solutions are attainable and not necessarily incompatible with performance considerations. The section on innovative compiler support, in particular, demonstrates how the benefits of application specificity may be obtained while reducing hardware cost and run-time overhead. A companion to this volume (published by Kluwer) subtitled Models and Frameworks for Dependable Systems presents two comprehensive frameworks for reasoning about system dependability, thereby establishing a context for understanding the roles played by specific approaches presented in this book's two companion volumes. It then explores the range of models and analysis methods necessary to design, validate and analyze dependable systems. Another companion to this book (published by Kluwer), subtitled Paradigms for Dependable Applications, presents a variety of specific approaches to achieving dependability at the application level. Driven by the higher level fault models of Models and Frameworks for Dependable Systems, and built on the lower level abstractions implemented in a third companion book subtitled System Implementation, these approaches demonstrate how dependability may be tuned to the requirements of an application, the fault environment, and the characteristics of the target platform. Three classes of paradigms are considered: protocol-based paradigms for distributed applications, algorithm-based paradigms for parallel applications, and approaches to exploiting application semantics in embedded real-time control systems.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
0 |
|a Microprocessors.
|
650 |
|
0 |
|a Special purpose computers.
|
650 |
|
0 |
|a Data structures (Computer science).
|
650 |
1 |
4 |
|a Computer Science.
|
650 |
2 |
4 |
|a Data Structures, Cryptology and Information Theory.
|
650 |
2 |
4 |
|a Special Purpose and Application-Based Systems.
|
650 |
2 |
4 |
|a Processor Architectures.
|
650 |
2 |
4 |
|a Computer Science, general.
|
700 |
1 |
|
|a Koob, Gary M.
|e editor.
|
700 |
1 |
|
|a Lau, Clifford G.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9780792394860
|
830 |
|
0 |
|a The Kluwer International Series in Engineering and Computer Science,
|x 0893-3405 ;
|v 285
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/b102309
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-ENG
|
912 |
|
|
|a ZDB-2-BAE
|
950 |
|
|
|a Engineering (Springer-11647)
|