By Topic

Computer Performance and Dependability Symposium, 1998. IPDS '98. Proceedings. IEEE International

Date 9-9 Sept. 1998

Filter Results

Displaying Results 1 - 25 of 35
  • Proceedings. IEEE International Computer Performance and Dependability Symposium. IPDS'98 (Cat. No.98TB100248)

    Publication Year: 1998
    Request permission for commercial reuse | PDF file iconPDF (228 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s): 278
    Request permission for commercial reuse | PDF file iconPDF (106 KB)
    Freely Available from IEEE
  • An analytical approach to architecture-based software reliability prediction

    Publication Year: 1998, Page(s):13 - 22
    Cited by:  Papers (40)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    Prevalent approaches to software reliability modeling are black-box based, i.e., the the software system is treated as a monolithic entity and only its interactions with the outside world are modeled. However with the advancement and widespread use of object oriented systems design and web-based development, the use of component-based software development is on the rise. Software systems are being... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fine grained software rejuvenation models

    Publication Year: 1998, Page(s):4 - 12
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (132 KB)

    Preventive maintenance of operational software systems is a technique used to counteract the phenomenon of software “aging”. Haung et al. (1995) proposed a technique called “software rejuvenation” in which the software is periodically stopped and then restarted in a “robust” state after a proper maintenance. This “renewal” of the software prevents, o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Exploiting the background debugging mode in a fault injection system

    Publication Year: 1998
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (16 KB)

    This note describes a software-implemented Fault Injection system suited to be used with embedded microprocessor-based boards and based on some features available in the most recent microprocessors and microcontrollers. Although these features were originally introduced to easy code development and debugging, they are very well suited for supporting the implementation of efficient and barely intru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RODAIN: a highly available real-time main-memory database system

    Publication Year: 1998
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12 KB)

    The RODAIN database system has been designed to be used in telecommunications. It is a highly available real time object-oriented database system. The main challenge is that typical transactions are heterogeneous: short simple queries, simple updates, and long massive updates. A RODAIN node consists of a primary node and of a mirror node that are symmetrical and have the same subsystems but their ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Making benchmarks uncheatable

    Publication Year: 1998, Page(s):216 - 226
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    The industry is full of anecdotes of benchmark “cheating” of various degrees ranging from innocent mistakes to flagrant misuse. Based on the tremendous progress made in recent years in theoretical computer science, it becomes possible to make a wide variety of existing benchmarks more accurate, resistant to tampering and more trustworthy. We propose two methods, the Secret Key method a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of distributed real-time databases

    Publication Year: 1998, Page(s):184 - 194
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (608 KB)

    In a distributed process control system, information about the behavior of physical processes is usually collected and stored in a real-time database which can be remotely accessed by human operators. In this paper we propose an analytic approach to compute the response time distribution of operator consoles in a distributed process control environment. The technique we develop is based on Markov ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault coverage design and analysis tools for fault tolerant systems

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    Complex systems require severe availability objectives related to the importance of the service being provided; for this reason, they are usually fault tolerant. Fault-tolerant designers try to create mechanisms to detect 100% of faults, because in complex systems, uncovered faults lead to latent highly undesired situations. Starting from the basics of FMECA, a design methodology and a tool have b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel redundancy technique for mobile networks

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12 KB)

    In a mobile network, the information transmission is done in a relatively noise and burst-error prone shared medium. The two methods commonly used to recover the transmission errors are automatic retransmission request (ARQ) and forward error correction (FEC). The ARQ is issued when errors exceed beyond those that can be corrected by FEC. ARQ implies re-transmission, which wastes a considerable am... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dependability evaluation of an air traffic control computing system

    Publication Year: 1998, Page(s):206 - 215
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    As air traffic over France is growing rapidly, the existing Air Traffic Control (ATC) system has to evolve to satisfy the increasing demand. The selection of the new automated computing system (denoted CAUTRA) is based, among other things, on dependability evaluation. This paper is devoted to the dependability evaluation of a subset of the CAUTRA, the Regional Control Center (RCC). Starting from t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a fault tolerant real-time storage system for multimedia applications

    Publication Year: 1998, Page(s):174 - 183
    Cited by:  Papers (1)  |  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (232 KB)

    We describe the design and implementation of the RIO (Randomized I/O) multimedia object server which manages a set of parallel disks and supports real-time throughput and statistical delay guarantees. The original implementation, on an SMP (Sun Microsystems E4000), has been ported to a cluster of PCs. The new version uses a similar philosophy with respect to allocation of data storage and scheduli... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chameleon: a software infrastructure for adaptive fault tolerance

    Publication Year: 1998
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8 KB)

    This paper presents Chameleon, an adaptive software infrastructure for concurrently supporting different reliability levels in the same networked environment. Traditionally, fault tolerance has been provided through dedicated hardware, dedicated software, or a combination of both. Hardware solutions from manufacturers like Tandem have provided dedicated fault-tolerant machines with extensive hardw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Bounding steady-state availability models with phase type repair distributions

    Publication Year: 1998, Page(s):259 - 268
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    We propose a method to obtain bounds for the steady-state availability using Markov models in which only a small portion of the state space is generated. The method is applicable to models with phase type repair distributions and involves the solution of only 4 linear systems of the size of the generated state space, independently on the number of “return” states. A numerical example i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Product form solution for a class of PEPA models

    Publication Year: 1998, Page(s):152 - 161
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (152 KB)

    The advantages of the compositional structure within the Markovian process algebra PEPA for model construction and simplification have already been demonstrated. In this paper we show that for some PEPA models this structure may also be used to advantage during the solution of the model. Several papers offering product form solutions of stochastic Petri nets have been published during the last ten... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Coordinated checkpointing without direct coordination

    Publication Year: 1998, Page(s):23 - 31
    Cited by:  Papers (17)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (140 KB)

    Coordinated checkpointing is a well-known method to achieve fault tolerance in distributed systems. Long running parallel applications and high-availability applications are two potential users of checkpointing, although with different requirements. Parallel applications need low failure-free overheads, and high-availability applications require fast and bounded recoveries. In this paper we descri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technique and tool for symbolic representation and manipulation of stochastic transition systems

    Publication Year: 1998
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (12 KB)

    We present a new approach to the compact symbolic representation of stochastic transition systems, based on Decision Node BDDs, a novel stochastic extension of BDDs. Parallel composition of components can be performed on the basis of this new data structure. We also discuss symbolic state space reduction by Markovian bisimulation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • State-space support for path-based reward variables

    Publication Year: 1998, Page(s):228 - 237
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (144 KB)

    Many sophisticated formalisms exist for specifying complex system behaviors, but methods for specifying performance and dependability variables have remained quite primitive. To cope with this problem, modelers often must augment system models with extra state information and event types to support particular variables. This often leads to models that are non-intuitive, and must be changed to supp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-board preventive maintenance for long-life deep-space missions: a model-based analysis

    Publication Year: 1998, Page(s):196 - 205
    Cited by:  Papers (16)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    The long-life deep-space missions associated with NASA's X2000 Advanced Flight Systems Program creates many unprecedented challenges. In particular the stringent constraints on the mass of a spacecraft and the power on-board preclude traditional fault tolerance approaches which rely on extensive component/subsystem replication, calling for novel approaches to mission reliability enhancement. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive file system consistency for unreliable mobile computing environments

    Publication Year: 1998, Page(s):164 - 173
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (84 KB)

    This paper presents the design and implementation of the Mobile File and Adaptation System (MFAS), a system to provide efficient data access mechanisms over variable quality of service networks. MFAS supports fine-grained file caching and consistency, and provides a mechanism for mobility-aware applications to adapt the caching and consistency behavior as network conditions change. Over low-bandwi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient approximate transient analysis for a class of deterministic and stochastic Petri nets

    Publication Year: 1998, Page(s):34 - 43
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    Transient analysis of non-Markovian Stochastic Petri nets is a theoretically interesting and practically important problem. We present a new method to compute bounds and an approximation on the average state sojourn times for a special class of deterministic and stochastic Petri nets (DSPNs). In addition to the idea of the subordinated Markov chain traditionally used for the stationary solution of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Virtual waiting time in queues obtained from second order FSPNs

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    Fluid stochastic Petri nets consist of two parts. A discrete part, that is a GSPN and a continuous part, that is represented by fluid places and arcs. Fluid places are filled and emptied continuously along fluid (double lined) arcs, as long as the transition at the arcs origin or destination is enabled. In second order FSPNs the rate at which the fluid level changes is a normally distributed rando... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Approximations for steady-state measures in highly dependable systems with generally distributed component failure and repair times

    Publication Year: 1998, Page(s):238 - 248
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    In this paper we present an approach for approximating steady-state measures, i.e., steady-state mean time between failures and the steady-state unavailability, in models of repairable, highly dependable systems where the components have generally distributed failure times and repair times. Exact solutions for these measures, even for problems with a small number of components, is very difficult a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supplementary variable approach applied to the transient analysis of age-MRSPNs

    Publication Year: 1998, Page(s):44 - 51
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    In order to assist the performance evaluation of complex stochastic models, automatic program tools have been developed for a long time. An effective model description language, supported by several software tools, is the stochastic Petri Net (SPN). But the attention to the analytical description and the numerical analysis of non-Markovian stochastic Petri Net models arose only recently. There are... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fault inject methodology for embedded systems

    Publication Year: 1998
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (52 KB)

    FITES (Fault Injection Tool for Embedded Systems) is a software implemented non-intrusive fault injection tool used for validating the dependability properties of fault tolerant systems. FITES uses a real time debugger for injection of faults into a real time application. A real time debugger is used because many commercial real time systems (RTS) have a real time debugging/monitoring tool that is... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.