Software development processes and methods have been studied for decades. Despite that, we still do not have reliable tools to guarantee that complicated ...
A way of handling unknown and unpredictable software (and hard- ware) failures .... predetermined recovery points, and on detection of an erroneous state the system is ... istic of an acceptance test is that it uses only the data that are also availa
fault tolerant software, this paper proposes a layered framework for the ..... of a le system providing only the operation read(fn, buf) that places in bu er buf the.
synchronized. Assuming a fault-tolerant authentication protocol, the algorithms tolerate both link ... certain actions at roughly the same time. In such a system, each processor usually possesses ...... a clock is set after an adjustment, are all pos
WDM-EPON architecture, the optical line terminal (OLT) node is upgraded as an array of fixed-tuned transceivers, and reserves one control wavelength channel ...
It thus represents an improvement over other clock synchronization algorithms such as those of Lamport and Melliar-Smith [1985] and Welch and Lynch [1988], ...
reliability allocation using fault tree and event tree techniques incorporated with cost (testing time) minimization approach is presented, which takes software ...
Hence, application developers can choose from a variety of fault tolerance tools ..... (Ed.), Handbook of Software Reliability Engineering, McGraw-Hill, New York,.
shows the basic processing logic to find out a ... Compare with the upper limit Value ... Step 2. Compare the k-th byte of the three images to find a majority one.
147, No. 3, June 2000 .... stack context (data structure containing the stack pointer amongst ... stack pointer back to its original place, we will effectively be using ...
1School of Computing and Information Technology, REVA University, Rukmini. Knowledge Park, Yelahanka, 560064 Bangalore, India. Full list of author ...
techniques that are external to the component for resolving mis- matches ... architectural style for structuring error detection and recovery mechanisms to be ...
Sep 2, 2011 - Keywords: Fault tolerant control systems, Actuators faults, Actuators aging, Flotation ..... the flow rate through control valves and external inflow.
be used both for software fault-injection and for stress test- ... add transparently fault-tolerance to any MPI application. 2. FAIL-FCI: a fault-injection tool. 2.1.
Jul 9, 2013 - for clients in the n cities, their maximum distance to a facility is minimized. .... For a given instance of FTM(P, k, â), we call Câ the optimum ...
have very limited battery power like those in other sensor .... sensors are mostly turned off to save power, thus forming a ..... note the maximum listening period.
FT-MPI. » Stick to the MPI-1 and MPI-2 specification as closely as possible (e.g. no additional function calls). » What FT-MPI does not do: » Recover user data (e.g. automatic checkpointing) .... Removes one âunnecessaryâ memory operation in.
the most popular methods in fault detection and fault tolerance in FPGA based .... elements and change their logic state. ... demonstrated their significant impact to processor lifetime. .... The Roving STARs based fault tolerance method. [22]:.
Abstract: Fault-tolerant systems designed with redundancy techniques are typically subject to common-cause failures, which are multiple dependent component ...
namically adjust fault coverage and performance. ... performance/ fault coverage requirements to the in- .... run in different fault-tolerant (F) or non fault-tolerant.
tested in a complex dearomatization process. Despite being an attractive approach, fault accommodation is infeasible in many cases, especially when control ...
between processes. ⢠It takes checkpoints and event logs and sends to storage. ⢠It masks the faults using a table of the processes. ⢠It detect communication ...
of software for such systems can be managed by using object-based design and ..... task on a processor, seeks to schedule the next task in the dispatch queue ...
objective is to design a nominal tracking control where out- puts are required to track reference inputs. Februvry 2000. IEEE Control Systems Magarlne. 35 ...
probability of downtime which is highly significant for realistic applications. Keywords .... ponents. A software module was developed to monitor virtual machine.