Proceedings of 1995 IEEE International Computer Performance and Dependability Symposium

24-26 April 1995

Filter Results

Displaying Results 1 - 25 of 35
  • Proceedings of 1995 IEEE International Computer Performance and Dependability Symposium

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • New results for the analysis of deterministic and stochastic Petri nets

    Publication Year: 1995, Page(s):114 - 123
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    This paper presents new methods for the transient and stationary analysis of stochastic Petri nets with exponentially distributed and deterministic firing delays. The method of supplementary variables is used for the derivation of general state equations which describe the temporal behavior of the underlying stochastic process. Numerical algorithms are presented for the solution of the state equat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markov regenerative SPN with non-overlapping activity cycles

    Publication Year: 1995, Page(s):124 - 133
    Cited by:  Papers (25)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    The paper discusses a class of Markov Regenerative Stochastic Petri Nets (MRSPN) characterized by the fact that the stochastic process subordinated to two consecutive regeneration time points is a semi-Markov reward process. This class of SPN's can accommodate transitions with generally distributed firing time and associated memory policy of both enabling and age type, thus generalizing and encomp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation and performance measurement of the progressive retry technique

    Publication Year: 1995, Page(s):41 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The paper describes a recovery technique called progressive retry for bypassing software faults in message passing applications. The technique is implemented as reusable modules to provide application-level software fault tolerance. The paper describes the implementation of the technique and presents results from the application of progressive retry to two telecommunications systems. The results p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DOCTOR: an integrated software fault injection environment for distributed real-time systems

    Publication Year: 1995, Page(s):204 - 213
    Cited by:  Papers (61)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    The paper presents an integrated software fault injection environment (DOCTOR) which is capable of (1) generating synthetic workloads under which system dependability is evaluated, (2) injecting various types of faults with different options, and (3) collecting performance and dependability data. A comprehensive graphical user interface is also provided. The software implemented fault-injection to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computation of absorption probability distributions of continuous-time Markov chains using regenerative randomization

    Publication Year: 1995, Page(s):92 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Randomization is a popular method for the transient solution of continuous-time Markov models. Its primary advantages over other methods (i.e., ODE solvers) are robustness and ease of implementation. It is however well-known that the performance of the method deteriorates with the “stiffness” of the model: the number of required steps to solve the model up to time t tends to Λt ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of efficient fault-detecting network membership protocols

    Publication Year: 1995, Page(s):144 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    Network membership protocols determine the present nodes and links in a computer network and, therefore, contribute to making the huge amount of general distributed systems and their inherent redundancy available for fault tolerance. Two different protocols, GNL and GLV, are described in detail which solve the problem for a very general set of assumptions not covered by existing solutions of relat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of the RAID 5 disk array

    Publication Year: 1995, Page(s):236 - 245
    Cited by:  Papers (8)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (964 KB)

    While the processor and memory performance of computers continues to improve, I/O performance has remained relatively constant. Strategies to achieve better I/O performance than current disk systems have been investigated to address the growing I/O bottleneck. One effort is the RAID (Redundant Arrays of Inexpensive Disks) Level 5 disk array. RAID 5 offers increased parallelism of I/O requests thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing the effects of communication faults on parallel applications

    Publication Year: 1995, Page(s):214 - 223
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    This paper addresses the problem of injection of faults in the communication system of disjoint memory parallel computers and presents fault injection results showing that 5% to 30% of the faults injected in the communication subsystem of a commercial parallel computer caused undetected errors that lead the application to generate erroneous results. All these cases correspond to situations in whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markov regenerative models

    Publication Year: 1995, Page(s):134 - 142
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    The Markov Regenerative Stochastic Process (MRGP) has been shown to capture the behavior of real systems with both deterministic and exponentially distributed event times. In this paper we survey the MRGP literature and focus on the different solution techniques that can be adopted for their transient analysis. We also discuss the automated generation of MRGPs from deterministic and stochastic Pet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matrix-geometric solution of infinite stochastic Petri nets

    Publication Year: 1995, Page(s):72 - 81
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    We characterize a class of stochastic Petri nets that can be solved using matrix geometric techniques. Advantages of such on approach are that very efficient mathematical technique become available for practical usage, as well as that the problem of large state spaces can be circumvented. We first characterize the class of stochastic Petri nets of interest by formally defining a number of constrai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software Assembly Workbench: how to construct software like hardware

    Publication Year: 1995, Page(s):4 - 12
    Cited by:  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (676 KB)

    The paper describes an approach for assembling software by combining reusable building blocks, much in the way hardware is being designed. The approach uses a Software Assembly Workbench and is predicated on the existence of a Network Execution Platform. The Network Execution Platform is a “network computer” that performs network functions necessary to execute typical services. Its ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On integrating error detection into a fault diagnosis algorithm for massively parallel computers

    Publication Year: 1995, Page(s):154 - 164
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    Scalable fault diagnosis is necessary for constructing fault tolerance mechanisms in large massively parallel multiprocessor systems. The diagnosis algorithm must operate efficiently even if the system consists of several thousand processors. We introduce an event-driven, distributed system-level diagnosis algorithm. It uses a small number of messages and is based on a general diagnosis model with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing among different nodes where servers break down without losing jobs

    Publication Year: 1995, Page(s):246 - 255
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Jobs generated by a single Poisson source can be routed through N alternative gateways, modelled as parallel M/M/1 queues. The servers are subject to random breakdowns which leave their corresponding queues intact, but may affect the routing of jobs during the subsequent repair periods. The marginal equilibrium queue size distributions are determined by spectral expansion. This can be done, at lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic process algebras as a tool for performance and dependability modelling

    Publication Year: 1995, Page(s):102 - 111
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    The stochastic process-algebra modelling paradigm has been introduced recently as an extension of classical process algebras with timing information aiming mainly at the integration of functional design with quantitative analysis of computer systems. Time is represented by exponentially distributed random variables that are assigned to each activity in the model. Thus, the semantic model of a stoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correctness and performance of a multicomputer operating system

    Publication Year: 1995, Page(s):34 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    Our discussion assumes parallel or distributed computer systems that allow dynamic migration of processes between processors. Because the overall performance of these systems is strongly dependent on the overheads of migration, it is vital that migration be implemented as efficiently as possible. However, efficient implementations are often complex implementations and thus we have a conflict betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • System-level modeling in the ADEPT environment of a distributed computer system for real-time applications

    Publication Year: 1995, Page(s):194 - 203
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (840 KB)

    The design of complex systems in safety-critical applications requires an integrated design and assessment environment. The paper presents the ADEPT environment for designing dependable systems from concept to implementation. An application of ADEPT to modeling a distributed computer system used in real-time embedded train control applications is described. Results from a performance analysis of t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability evaluation using hybrid fault/error injection

    Publication Year: 1995, Page(s):224 - 233
    Cited by:  Papers (10)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (812 KB)

    This paper presents a new hybrid fault/error injection technique which overcomes the limitations of both software-based and hardware-based approaches. The logic for the hardware fault unit injection circuitry is implemented using field programmable gate arrays, and the software is an extension of FERRARI, the software-based fault injection system. The combination of these techniques allows the inc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Structural performance analysis of stochastic Petri nets

    Publication Year: 1995, Page(s):61 - 70
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (804 KB)

    Structure performance analysis theory and techniques is an essay to avoid the computational complexity problem associated to Markovian and discrete event simulation techniques. Even if a finished conceptual and technical framework is not yet available, important benefits have been obtained not only from performance but also from correctness analysis point of view. In this survey we overview some o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lumpability and nearly-lumpability in hierarchical queueing networks

    Publication Year: 1995, Page(s):82 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    Hierarchical extended queueing networks (HQNs) have been proposed recently as a model class which allows a very efficient analysis based on an exploitation of the hierarchical model structure in the analysis of the underlying Markov chain (MC). Furthermore the hierarchical structure of the model enables the definition of symmetries due to identical subnets on model level and the automatic generati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic dependencies in client-server systems and their effect on performance prediction

    Publication Year: 1995, Page(s):24 - 33
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    Client-server systems are becoming increasingly common in the world today as users move from centralized mainframe facilities to networks of distributed workstations. This form of work demands new performance models as the interactions in client-server systems are more complete than the types supported by classic queueing network solvers such as Mean Value Analysis. However, certain interaction pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performability analysis of formal graphical specifications

    Publication Year: 1995, Page(s):183 - 192
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (876 KB)

    The advantages of forward documentation with a toolkit for graphical block oriented specification of software and hardware for performability analysis and automation of safety critical technical processes are described. The main topics are the timing analysis and pre runtime scheduling employed by the distributed, responsive TELEPERM XS Digital Safety I&C for Nuclear Power Plants View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Petri nets: accomplishments and open problems

    Publication Year: 1995, Page(s):51 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    Generalized stochastic Petri nets are briefly introduced and the work performed since the time of their proposal, to improve their modelling capabilities is surveyed according to three directions of research. The open problems that still need to be solved do make this formalism useful for the analysis of real systems are discussed and some directions of future research are suggested View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability models for iterative software considering correlation between successive inputs

    Publication Year: 1995, Page(s):13 - 21
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    We consider the dependability of programs of an iterative nature. The dependability of software structures is usually analysed using models that are strongly limited in their realism by the assumptions made to obtain mathematically tractable models and by the lack of experimental data. The assumption of independence between the outcomes of successive executions, which is often false, may lead to s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the performance and dependability of real-time systems

    Publication Year: 1995, Page(s):174 - 182
    Cited by:  Papers (4)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    The imprecise-computation technique was proposed as a way to handle transient overloads and enhance the dependability of real-time systems. In a system based on this technique, each time-critical task produces an approximate but usable result whenever a failure or overload prevents the system from producing a precise result. This approach makes meeting deadlines easier, increases the availability ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.