Proceedings of IEEE International Computer Performance and Dependability Symposium

4-6 Sept. 1996

Filter Results

Displaying Results 1 - 25 of 41
  • Proceedings of IEEE International Computer Performance and Dependability Symposium

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (613 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1996
    Request permission for commercial reuse | PDF file iconPDF (74 KB)
    Freely Available from IEEE
  • On-line recovery for rediscovered software problems

    Publication Year: 1996, Page(s):78 - 87
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    This paper discusses a method that can allow a system to avoid or recover from the exercise of certain known faults at runtime and thus make certain software upgrades unnecessary. The method uses the knowledge of the characteristic symptoms of a software fault and the appropriate recovery action for the fault to detect and recover from the future exercise of the fault. An analysis of field data sh... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using distributed resource management in heterogeneous telecomputing platforms

    Publication Year: 1996, Page(s):2 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (848 KB)

    Programmability, reliability, and scalability are system requirements that are essential to retaining or establishing the high ground in the new world order for telecommunications solutions. For telephony systems to be successful in the next century, they must deliver “fifth-generation software flexibility” that enables interoperability while satisfying these 3 key requirements to give... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Steady state solution of MRSPN with mixed preemption policies

    Publication Year: 1996, Page(s):106 - 115
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (828 KB)

    Markov Regenerative Stochastic Petri Nets (MRSPN) have been recently recognized as a valuable tool to model systems with non-exponential timed activities. The usual assumption in the implementation of such models is that at most a single non-exponential transition, with associated enabling memory policy, can be enabled in each marking. More recently, new memory policies have been studied in order ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ORCHESTRA: a probing and fault injection environment for testing protocol implementations

    Publication Year: 1996
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    Ensuring that a distributed system meets its prescribed specification is a growing challenge that confronts software developers and system engineers. Meeting this challenge is particularly important for applications with strict dependability and/or timeliness constraints. We have developed a software fault injection tool, called ORCHESTRA, for testing dependability and timing properties of distrib... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Conjoint simulation-a technique for the combined performance and dependability analysis of large-scale computer systems

    Publication Year: 1996, Page(s):68 - 77
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1108 KB)

    In this paper we propose an approach which seamlessly integrates two modeling techniques to facilitate the simulation and analysis of performance and dependability of large-scale parallel computer systems. The approach, called Conjoint Simulation, combines object-oriented, process-based simulation with Petri net modeling. The approach splits a system into a performance model and a dependability mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On queueing with customer impatience until the beginning of service

    Publication Year: 1996, Page(s):150 - 157
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    We study queueing systems where customers have strict deadlines until the beginning of their service. An analytic method is given for the analysis of a class of such queues, namely, M(n)/M/m/FCFS+G and M(n)/M/m/FCFS/K+G models. These are queues with state-dependent Poisson arrival process, exponential service times, multiple servers, FCFS service discipline, infinite or finite capacity, and genera... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The effects of LAN-like input traffic on a switch access node

    Publication Year: 1996, Page(s):96 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (736 KB)

    This paper addresses the modeling and analysis of a switching network access node. This is an area of importance due to forthcoming high-speed ATM backbone networks and the need to transmit data for current and future network applications. The nature of these applications must be considered when designing an access node to a switching network. A traffic arrival process for the network and characte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Architecture and safety requirements of the ACC railway interlocking system

    Publication Year: 1996, Page(s):21 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (664 KB)

    The paper summarizes the design, implementation and validation of the Computer Based Interlocking (ACC) designed by Ansaldo Trasporti under the supervision of the Italian Railways. Particularly, details are provided on the methodology that has been adopted to set the safety requirements and to give preliminary safety demonstrations. During the development of the ACC design, new drafts of European ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimal routing for distributed computing systems with data replication

    Publication Year: 1996, Page(s):42 - 51
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (720 KB)

    In a Distributed Computing System (DCS), data files are often replicated several copies and stored on different computers to improve reliability and availability. The particular program and the data files required for its execution may thus be placed on different nodes. Successfully executing the program, however, often requires the access of data files from remote machines. Thus, the program exec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MultiKron: performance measurement instrumentation

    Publication Year: 1996
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB)

    The focus of our instrumentation work at NIST is to provide hardware support in obtaining performance measurement data of parallel computers, as well as uniprocessors, with tolerable perturbation to both the executing processes and the architecture on which they are executing. Tracing events and counting are two basic concepts of performance measurement-both should be controlled from within the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SPN2MGM: tool support for matrix-geometric stochastic Petri nets

    Publication Year: 1996, Page(s):219 - 228
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (860 KB)

    In this paper we present the tool SPN2MGM that can be used to construct and solve stochastic Petri nets using matrix-geometric techniques. The tool automatically recognizes the “matrix-geometric structure” of the Markov chain underlying the stochastic Petri net, and solves the Markov chain with these well-known and efficient techniques. We informally characterize the class of stochasti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The DIN method: a new approach for measuring and rating data processing performance

    Publication Year: 1996, Page(s):200 - 209
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (772 KB)

    When data processing systems changed from “single user, single task” type to “multi user, multi task” type the internal performance measures used traditionally became less suitable. The necessity arose for developing measures for system performance to replace those for component performance. However, soundly based performance definitions and a measurement method, applicable... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of UltraSAN

    Publication Year: 1996
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    UltraSAN is a software package for model-based evaluation of systems represented as stochastic activity networks (SANs). SANs incorporate features of both stochastic Petri nets and queueing models, where parameters in a model such as case distributions, activity times, state transition rules, and reward variables can be marking dependent. Users may build SAN models using an X-Windows based user in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reliability of traffic management applications based on digital short-range communications

    Publication Year: 1996, Page(s):139 - 148
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (864 KB)

    In this paper, the performance of short-range vehicle-roadside communication systems, which support RTTT (Road Traffic & Transport Telematics) services, is analysed. After introducing general communication requirements of RTTT applications in a road traffic environment, a short overview about the current status of the Dedicated Short-Range Communications DSRC prENV draft standards developed wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounding asymptotic dependability and performance measures

    Publication Year: 1996, Page(s):176 - 186
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (696 KB)

    One of the major drawbacks of Markov models is the size of the generated state space. Often its high value (sometimes infinite) makes the numerical analysis impossible to perform. A possible approach to deal with this problem is to bound the measures of interest. In recent years, some methods have been proposed in this direction, mainly for stationary dependability measures. In this paper, we prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SURF-2-a tool for modeling and evaluation of dependability measures

    Publication Year: 1996
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (108 KB)

    SURF-2 is a software tool for evaluating system dependability. It is especially designed for an evaluation based system design approach in which multiple design solutions need to be compared from the dependability viewpoint. SURF-2 allows the user to describe the model behavior using generalized stochastic Petri nets (GSPNs) whose reachability graph is then interpreted as a Markov chain, or enter ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of integrated system-level checks for on-line error detection

    Publication Year: 1996, Page(s):292 - 301
    Cited by:  Papers (20)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (832 KB)

    This paper evaluates the capabilities of an integrated system level error detection technique using fault and error injection. This technique is comprised of two software level mechanisms for concurrent error detection, control flow checking using assertions (CCA) and data error checking using application specific data checks. Over 300,000 faults and errors were injected and the analysis of the re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computation of the distribution of accumulated reward with Fluid Stochastic Petri-Nets

    Publication Year: 1996, Page(s):90 - 95
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    We describe the recently introduced Fluid Stochastic Petri-Nets as a means of computing the distribution of the accumulated rate reward in a GSPN. In practice, it is the expected value of a reward which is computed, a quantity which is dependent solely on the solution of the underlying Markov chain. Until now, the instantaneous reward rates have been a function of the GSPN marking only, and the Ma... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A structured approach to redundant disk array implementation

    Publication Year: 1996, Page(s):11 - 20
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    Error recovery in redundant disk arrays is typically performed in an ad hoc fashion, requiring architecture-specific code which limits extensibility and is difficult to verify. In this paper, we describe a technique for automating the execution of redundant disk array operations, including recovery from errors, independent of array architecture. Our approach employs a graphical representation of a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exact and approximate analysis of ATM cell loss correlation

    Publication Year: 1996, Page(s):120 - 129
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (816 KB)

    Cell loss behavior is analyzed for an ATM switch with homogeneous Markov sources. While prior work in this regard has focused mainly on measures such as the steady-state loss probability and conditional loss probability, we consider a more refined measure, namely the probability distribution of a cell loss period. Evaluation is based on a discrete-time, finite-state Markov process where cell arriv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QNAUT: approximately analyzing networks of PH|PH|1|K queues

    Publication Year: 1996
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (92 KB)

    With QNAUT we can perform the (approximate) analysis of possibly large, open networks of PH|PH|1 and PH|PH|1|K queues. Since up till now there are no exact means available to study such queueing networks (QNs), the approach supported by QNAUT is currently the best alternative. Starting point of our approach is the analysis of large open QNs as proposed by W. Whitt (known as QNA) in which large QNs... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of threshold partitioning of sparse matrices to Markov chains

    Publication Year: 1996, Page(s):158 - 165
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    Three algorithms which permute and partition a sparse matrix are presented as tools for the improved solution of Markov chain problems. One is the algorithm PABLO [SIAM J. Sci. Stat. Computing, vol.11, pp.811-823, 1990] while the other two are modifications of it. In the new algorithms, in addition to the location of the nonzeros, the values of the entries are taken into account. The permuted matr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mean value analysis for computer systems with variabilities in workload

    Publication Year: 1996, Page(s):32 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (968 KB)

    When evaluating the performance of computer systems, often uncertainties or variabilities in service demands may be observed. Applying well known mean valve analysis (MVA) for single- or multiclass queueing network models of such systems is inappropriate and ineffective, because these models fail to represent variations within a class. This paper proposes to use histograms for characterizing model... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.