By Topic

Computer Performance and Dependability Symposium, 1995. Proceedings., International

Date 24-26 April 1995

Filter Results

Displaying Results 1 - 25 of 35
  • Proceedings of 1995 IEEE International Computer Performance and Dependability Symposium

    Publication Year: 1995
    Request permission for commercial reuse | PDF file iconPDF (157 KB)
    Freely Available from IEEE
  • Modeling recycle: a case study in the industrial use of measurement and modeling

    Publication Year: 1995, Page(s):285 - 294
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (924 KB)

    Large-scale data storage systems rely on magnetic tape cartridges to store millions of data objects. As these tapes age, the resident data objects become invalid; consequently, less and less of the tape potential capacity is effectively utilized. To address this problem, data storage systems have a facility, called “recycle” in this paper, that transfers valid data objects from sparsel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of performability measures for replicated banyan networks

    Publication Year: 1995, Page(s):265 - 273
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (652 KB)

    Performability, a composite measure that evolved from the synergy between performance and reliability, can capture the cumulative performance of a degradable multistage interconnection network over its operational life. In this paper, we present a technique for conservative analysis of performability measures for the replicated banyan network. Assuming uniformally distributed message generation at... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic process algebras as a tool for performance and dependability modelling

    Publication Year: 1995, Page(s):102 - 111
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (836 KB)

    The stochastic process-algebra modelling paradigm has been introduced recently as an extension of classical process algebras with timing information aiming mainly at the integration of functional design with quantitative analysis of computer systems. Time is represented by exponentially distributed random variables that are assigned to each activity in the model. Thus, the semantic model of a stoc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Markov regenerative models

    Publication Year: 1995, Page(s):134 - 142
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (616 KB)

    The Markov Regenerative Stochastic Process (MRGP) has been shown to capture the behavior of real systems with both deterministic and exponentially distributed event times. In this paper we survey the MRGP literature and focus on the different solution techniques that can be adopted for their transient analysis. We also discuss the automated generation of MRGPs from deterministic and stochastic Pet... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DOCTOR: an integrated software fault injection environment for distributed real-time systems

    Publication Year: 1995, Page(s):204 - 213
    Cited by:  Papers (68)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    The paper presents an integrated software fault injection environment (DOCTOR) which is capable of (1) generating synthetic workloads under which system dependability is evaluated, (2) injecting various types of faults with different options, and (3) collecting performance and dependability data. A comprehensive graphical user interface is also provided. The software implemented fault-injection to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lumpability and nearly-lumpability in hierarchical queueing networks

    Publication Year: 1995, Page(s):82 - 91
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    Hierarchical extended queueing networks (HQNs) have been proposed recently as a model class which allows a very efficient analysis based on an exploitation of the hierarchical model structure in the analysis of the underlying Markov chain (MC). Furthermore the hierarchical structure of the model enables the definition of symmetries due to identical subnets on model level and the automatic generati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Routing among different nodes where servers break down without losing jobs

    Publication Year: 1995, Page(s):246 - 255
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (668 KB)

    Jobs generated by a single Poisson source can be routed through N alternative gateways, modelled as parallel M/M/1 queues. The servers are subject to random breakdowns which leave their corresponding queues intact, but may affect the routing of jobs during the subsequent repair periods. The marginal equilibrium queue size distributions are determined by spectral expansion. This can be done, at lea... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stochastic Petri nets: accomplishments and open problems

    Publication Year: 1995, Page(s):51 - 60
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (988 KB)

    Generalized stochastic Petri nets are briefly introduced and the work performed since the time of their proposal, to improve their modelling capabilities is surveyed according to three directions of research. The open problems that still need to be solved do make this formalism useful for the analysis of real systems are discussed and some directions of future research are suggested View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On integrating error detection into a fault diagnosis algorithm for massively parallel computers

    Publication Year: 1995, Page(s):154 - 164
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (932 KB)

    Scalable fault diagnosis is necessary for constructing fault tolerance mechanisms in large massively parallel multiprocessor systems. The diagnosis algorithm must operate efficiently even if the system consists of several thousand processors. We introduce an event-driven, distributed system-level diagnosis algorithm. It uses a small number of messages and is based on a general diagnosis model with... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Matrix-geometric solution of infinite stochastic Petri nets

    Publication Year: 1995, Page(s):72 - 81
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (760 KB)

    We characterize a class of stochastic Petri nets that can be solved using matrix geometric techniques. Advantages of such on approach are that very efficient mathematical technique become available for practical usage, as well as that the problem of large state spaces can be circumvented. We first characterize the class of stochastic Petri nets of interest by formally defining a number of constrai... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performability evaluation: where it is and what lies ahead

    Publication Year: 1995, Page(s):334 - 343
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (908 KB)

    The concept of performability emerged from a need to assess a system's ability to perform when performance degrades as a consequence of faults. After almost 20 years of effort concerning its theory, techniques, and applications, performability evaluation is currently well understood by the many people responsible for its development. On the other hand, the utility of combined performance-dependabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of the RAID 5 disk array

    Publication Year: 1995, Page(s):236 - 245
    Cited by:  Papers (7)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (964 KB)

    While the processor and memory performance of computers continues to improve, I/O performance has remained relatively constant. Strategies to achieve better I/O performance than current disk systems have been investigated to address the growing I/O bottleneck. One effort is the RAID (Redundant Arrays of Inexpensive Disks) Level 5 disk array. RAID 5 offers increased parallelism of I/O requests thro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An implementation and performance measurement of the progressive retry technique

    Publication Year: 1995, Page(s):41 - 48
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    The paper describes a recovery technique called progressive retry for bypassing software faults in message passing applications. The technique is implemented as reusable modules to provide application-level software fault tolerance. The paper describes the implementation of the technique and presents results from the application of progressive retry to two telecommunications systems. The results p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and analysis of efficient fault-detecting network membership protocols

    Publication Year: 1995, Page(s):144 - 153
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (972 KB)

    Network membership protocols determine the present nodes and links in a computer network and, therefore, contribute to making the huge amount of general distributed systems and their inherent redundancy available for fault tolerance. Two different protocols, GNL and GLV, are described in detail which solve the problem for a very general set of assumptions not covered by existing solutions of relat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing the performance and dependability of real-time systems

    Publication Year: 1995, Page(s):174 - 182
    Cited by:  Papers (5)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (636 KB)

    The imprecise-computation technique was proposed as a way to handle transient overloads and enhance the dependability of real-time systems. In a system based on this technique, each time-critical task produces an approximate but usable result whenever a failure or overload prevents the system from producing a precise result. This approach makes meeting deadlines easier, increases the availability ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Use of preferred preemption points in cache-based real-time systems

    Publication Year: 1995, Page(s):316 - 325
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (856 KB)

    Time-critical applications require known worst-case execution times to ensure that system timing constraints are met. Traditional cache memory arrangements, however significantly impede the determination of tight upper bounds on these worst-case execution times (WCET). The difficulty comes in adequately predicting the cache miss ratio for a task in a preemptable multi-tasking environment. Caches t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of the quorum consensus replication method

    Publication Year: 1995, Page(s):165 - 172
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB)

    The goal of data replication in distributed database systems is to increase data availability in the presence of failures. Using the quorum consensus method, up to [(n+1)/2] site failures can be tolerated, in an n-site system without loss of data accessability. Quorum consensus can however be very expensive to use, especially in large-scale systems. This is because multiple sites in the system mus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance recovery in direct-mapped faulty caches via the use of a very small fully associative spare cache

    Publication Year: 1995, Page(s):326 - 332
    Cited by:  Papers (7)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (524 KB)

    Single chip VLSI processors use on-chip cache memories to satisfy the memory bandwidth demands of CPU. By tolerating cache defects without a noticeable performance degradation, the yield of VLSI processors can be enhanced considerably. In this paper we investigate how much of the lost hit ratio due to faulty block disabling in direct-mapped caches can be recovered by the incorporation of a very sm... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New results for the analysis of deterministic and stochastic Petri nets

    Publication Year: 1995, Page(s):114 - 123
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    This paper presents new methods for the transient and stationary analysis of stochastic Petri nets with exponentially distributed and deterministic firing delays. The method of supplementary variables is used for the derivation of general state equations which describe the temporal behavior of the underlying stochastic process. Numerical algorithms are presented for the solution of the state equat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correctness and performance of a multicomputer operating system

    Publication Year: 1995, Page(s):34 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (632 KB)

    Our discussion assumes parallel or distributed computer systems that allow dynamic migration of processes between processors. Because the overall performance of these systems is strongly dependent on the overheads of migration, it is vital that migration be implemented as efficiently as possible. However, efficient implementations are often complex implementations and thus we have a conflict betwe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computation of absorption probability distributions of continuous-time Markov chains using regenerative randomization

    Publication Year: 1995, Page(s):92 - 101
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (624 KB)

    Randomization is a popular method for the transient solution of continuous-time Markov models. Its primary advantages over other methods (i.e., ODE solvers) are robustness and ease of implementation. It is however well-known that the performance of the method deteriorates with the “stiffness” of the model: the number of required steps to solve the model up to time t tends to Λt ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An analysis of client/server outage data

    Publication Year: 1995, Page(s):295 - 304
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    This paper examines client/server outage data and presents a list of outage causes extracted from the data. The outage causes include hardware, software, operations, and environmental failures, as well as outages due to planned reconfigurations. The study spans all client, server, and network devices in a typical client/server environment. The outage data is used to predict availability in a typic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability analysis in HW-SW codesign

    Publication Year: 1995, Page(s):306 - 315
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (788 KB)

    The increasing complexity of todays computing systems necessitates new design methodologies. One of the most promising methods is hardware-software codesign, that supports unified hardware-software modeling at different levels of abstraction, and hardware-software synthesis. As applications include even critical applications, dependability becomes an important design issue. A novel approach for th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing the effects of communication faults on parallel applications

    Publication Year: 1995, Page(s):214 - 223
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    This paper addresses the problem of injection of faults in the communication system of disjoint memory parallel computers and presents fault injection results showing that 5% to 30% of the faults injected in the communication subsystem of a commercial parallel computer caused undetected errors that lead the application to generate erroneous results. All these cases correspond to situations in whic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.