首页 > 最新文献

13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)最新文献

英文 中文
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise 一个有效的客户端到客户端密码认证密钥交换弹性服务器妥协
Hongfeng Zhu, Tianhua Liu, Jie Liu, G. Chang
With rapid changes in the modern communication environment such as ad hoc networks and ubiquitous computing, it is necessary to construct a secure end-to-end channel between clients. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. This paper presents a new password authentication and key-exchange protocol suitable for client-to-client without a server public key in different realms to agree on a common session key using different passwords over an untrusted network. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.
随着自组织网络和普适计算等现代通信环境的快速变化,在客户端之间构建安全的端到端通道是必要的。PAKE的基本安全目标是防止字典攻击。基于验证器的PAKE协议还需要确保安全,防止服务器泄露。本文提出了一种新的密码认证和密钥交换协议,适用于客户端到客户端,在不可信网络中使用不同的密码,在不同的领域使用不同的服务器公钥来商定共同的会话密钥。所提出的协议的安全性、简单性和速度使其成为需要安全密码身份验证的广泛现实应用程序的理想选择。
{"title":"An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise","authors":"Hongfeng Zhu, Tianhua Liu, Jie Liu, G. Chang","doi":"10.1109/PRDC.2007.32","DOIUrl":"https://doi.org/10.1109/PRDC.2007.32","url":null,"abstract":"With rapid changes in the modern communication environment such as ad hoc networks and ubiquitous computing, it is necessary to construct a secure end-to-end channel between clients. The fundamental security goal of PAKE is security against dictionary attacks. The protocols for verifier-based PAKE are additionally required to be secure against server compromise. This paper presents a new password authentication and key-exchange protocol suitable for client-to-client without a server public key in different realms to agree on a common session key using different passwords over an untrusted network. The proposed protocol's security, simplicity, and speed make it ideal for a wide range of real-world applications in which secure password authentication is required.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126787806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Predicting Defective Software Components from Code Complexity Measures 从代码复杂度度量预测有缺陷的软件组件
Hongyu Zhang, Xiuzhen Zhang, Ming Gu
The ability to predict defective modules can help us allocate limited quality assurance resources effectively and efficiently. In this paper, we propose a complexity- based method for predicting defect-prone components. Our method takes three code-level complexity measures as input, namely Lines of Code, McCabe's Cyclomatic Complexity and Halstead's Volume, and classifies components as either defective or non-defective. We perform an extensive study of twelve classification models using the public NASA datasets. Cross-validation results show that our method can achieve good prediction accuracy. This study confirms that static code complexity measures can be useful indicators of component quality.
预测缺陷模块的能力可以帮助我们有效地分配有限的质量保证资源。在本文中,我们提出了一种基于复杂性的方法来预测容易出现缺陷的部件。我们的方法以三个代码级复杂性度量作为输入,即代码行数、McCabe的圈复杂度和Halstead的体积,并将组件分为缺陷和非缺陷。我们使用NASA的公共数据集对12个分类模型进行了广泛的研究。交叉验证结果表明,该方法具有较好的预测精度。这项研究证实了静态代码复杂性度量可以作为组件质量的有用指示器。
{"title":"Predicting Defective Software Components from Code Complexity Measures","authors":"Hongyu Zhang, Xiuzhen Zhang, Ming Gu","doi":"10.1109/PRDC.2007.28","DOIUrl":"https://doi.org/10.1109/PRDC.2007.28","url":null,"abstract":"The ability to predict defective modules can help us allocate limited quality assurance resources effectively and efficiently. In this paper, we propose a complexity- based method for predicting defect-prone components. Our method takes three code-level complexity measures as input, namely Lines of Code, McCabe's Cyclomatic Complexity and Halstead's Volume, and classifies components as either defective or non-defective. We perform an extensive study of twelve classification models using the public NASA datasets. Cross-validation results show that our method can achieve good prediction accuracy. This study confirms that static code complexity measures can be useful indicators of component quality.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123515088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks 无线传感器网络中传输范围可调的容错拓扑控制
Chiu-Wen Chen, K. Ssu, H. C. Jiau
A topology control algorithm can be applied to wireless sensor networks to construct a virtual backbone for maintaining network connectivity. For handling node failure, previous algorithms typically prefer to have redundant nodes so the power efficiency was compromised. This paper describes a Power-CDS (P-CDS) mechanism that schedules active and backup sensor nodes in the backbone for tolerating failures. When node failure is detected, both active and backup nodes will adjust their transmission ranges to maintain connectivity. Simulation results show that P-CDS forms a smaller connected dominating set than the other fault- tolerant topology control algorithm. P-CDS also provides efficient broadcast with relatively low energy consumption.
在无线传感器网络中,可以应用拓扑控制算法来构建虚拟骨干网,以保持网络的连通性。对于处理节点故障,以前的算法通常倾向于使用冗余节点,从而降低了功率效率。本文描述了一种Power-CDS (P-CDS)机制,该机制调度主干网中的主动和备用传感器节点以容忍故障。当检测到节点故障时,主节点和备份节点都将调整各自的传输范围以保持连通性。仿真结果表明,与其他容错拓扑控制算法相比,P-CDS算法能形成更小的连通控制集。P-CDS还能以相对较低的能耗提供高效的广播。
{"title":"Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks","authors":"Chiu-Wen Chen, K. Ssu, H. C. Jiau","doi":"10.1109/PRDC.2007.47","DOIUrl":"https://doi.org/10.1109/PRDC.2007.47","url":null,"abstract":"A topology control algorithm can be applied to wireless sensor networks to construct a virtual backbone for maintaining network connectivity. For handling node failure, previous algorithms typically prefer to have redundant nodes so the power efficiency was compromised. This paper describes a Power-CDS (P-CDS) mechanism that schedules active and backup sensor nodes in the backbone for tolerating failures. When node failure is detected, both active and backup nodes will adjust their transmission ranges to maintain connectivity. Simulation results show that P-CDS forms a smaller connected dominating set than the other fault- tolerant topology control algorithm. P-CDS also provides efficient broadcast with relatively low energy consumption.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125667888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Path Diversity Metric for End-to-End Network 端到端网络的路径分集度量
Song Huang, Yong Xu, Ling Zhang
Path diversity is an important index of the dependability and fault tolerance capability of networks. Most path diversity metrics are designed under an implicit hypothesis that all candidate paths for a divergence node are always equally chosen. This may not be true due to the effect of routing policy with consideration of cost or other factors. A new simple metric is proposed in this paper for path diversity measurement of end-to-end networks. An end-to-end network is firstly transformed into a sequence of cascading segments. With the assumption that only one of all available branches is chosen each time, a probability based metric is calculated for each segment, and the joint entropy is calculated as path diversity measurement for the overall end-to-end network. The metric is fitful for both single-hop and multi-hop topologies. A comparison between the new metric and other ones is given at the end.
路径分集是衡量网络可靠性和容错能力的重要指标。大多数路径多样性指标都是在一个隐式假设下设计的,即发散节点的所有候选路径总是被平等地选择。由于考虑成本或其他因素的路由策略的影响,这可能不是真的。提出了一种新的简单的端到端网络路径分集度量方法。端到端网络首先被转换成一系列的级联网段。在假设每次只选择一个可用分支的情况下,计算每个分支的概率度量,并计算联合熵作为整个端到端网络的路径多样性度量。该度量对于单跳和多跳拓扑都是断断续续的。最后给出了新度量与其他度量的比较。
{"title":"A Path Diversity Metric for End-to-End Network","authors":"Song Huang, Yong Xu, Ling Zhang","doi":"10.1109/PRDC.2007.15","DOIUrl":"https://doi.org/10.1109/PRDC.2007.15","url":null,"abstract":"Path diversity is an important index of the dependability and fault tolerance capability of networks. Most path diversity metrics are designed under an implicit hypothesis that all candidate paths for a divergence node are always equally chosen. This may not be true due to the effect of routing policy with consideration of cost or other factors. A new simple metric is proposed in this paper for path diversity measurement of end-to-end networks. An end-to-end network is firstly transformed into a sequence of cascading segments. With the assumption that only one of all available branches is chosen each time, a probability based metric is calculated for each segment, and the joint entropy is calculated as path diversity measurement for the overall end-to-end network. The metric is fitful for both single-hop and multi-hop topologies. A comparison between the new metric and other ones is given at the end.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115661040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Fault Tolerance for Super-Peers of P2P Systems P2P系统的超级对等体容错
Jenn-Wei Lin, M. Yang, Jichiang Tsai
This paper presents an efficient fault-tolerant approach for the super-peers of peer-to-peer (P2P) file sharing systems. In the super-peer based P2P file sharing system, peers are organized into multiple groups. In each group, it has a special peer called super peer to serve the regular peers within the group. In this hierarchical architecture, if the super peer departs (fails), any file queries to its serving regular peers cannot be delivered. In the proposed approach, we propose a multiple publication technique to make each regular peer logically connect with two or more super peers in other groups. If a regular peer finds that its serving super peer cannot work, one of its other connected super peers will be selected as its new serving super peer to continuously process the file queries. To examine the effectiveness of the proposed approach, comprehensive simulations are performed to quantify the performance and overhead of the proposed approach.
针对P2P文件共享系统中的超级节点,提出了一种高效的容错方法。在基于超级对等体的P2P文件共享系统中,对等体被组织成多个组。在每个组中,它都有一个称为超级节点的特殊节点来为组内的常规节点服务。在这种分层体系结构中,如果超级对等点离开(失败),则无法向其服务的常规对等点发送任何文件查询。在该方法中,我们提出了一种多重发布技术,使每个常规对等点与其他组中的两个或多个超级对等点在逻辑上连接。如果一个常规对等体发现它的服务超级对等体不能工作,它的另一个连接的超级对等体将被选中作为它的新服务超级对等体继续处理文件查询。为了检验所提出方法的有效性,进行了全面的仿真,以量化所提出方法的性能和开销。
{"title":"Fault Tolerance for Super-Peers of P2P Systems","authors":"Jenn-Wei Lin, M. Yang, Jichiang Tsai","doi":"10.1109/PRDC.2007.5","DOIUrl":"https://doi.org/10.1109/PRDC.2007.5","url":null,"abstract":"This paper presents an efficient fault-tolerant approach for the super-peers of peer-to-peer (P2P) file sharing systems. In the super-peer based P2P file sharing system, peers are organized into multiple groups. In each group, it has a special peer called super peer to serve the regular peers within the group. In this hierarchical architecture, if the super peer departs (fails), any file queries to its serving regular peers cannot be delivered. In the proposed approach, we propose a multiple publication technique to make each regular peer logically connect with two or more super peers in other groups. If a regular peer finds that its serving super peer cannot work, one of its other connected super peers will be selected as its new serving super peer to continuously process the file queries. To examine the effectiveness of the proposed approach, comprehensive simulations are performed to quantify the performance and overhead of the proposed approach.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126417584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation 无线环境中的入侵容忍:一种实验评估
Henrique Moniz, N. Neves, M. Correia, A. Casimiro, P. Veríssimo
This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also within the context of a car platooning application for distributed cruise control. The experimental evaluation reveals how performance is affected by the various environmental parameters such as the wireless standard, group size, and network topology. The distributed cruise control application demonstrates the practicability of such protocols, even when subjected to malicious faults.
本文对无线局域网中容忍入侵协议的性能进行了研究。这些协议在几种不同的环境设置中进行了评估,并在分布式巡航控制的汽车队列应用程序中进行了评估。实验评估揭示了性能如何受到各种环境参数(如无线标准、组大小和网络拓扑)的影响。分布式巡航控制应用程序证明了这种协议的实用性,即使在遭受恶意故障时也是如此。
{"title":"Intrusion Tolerance in Wireless Environments: An Experimental Evaluation","authors":"Henrique Moniz, N. Neves, M. Correia, A. Casimiro, P. Veríssimo","doi":"10.1109/PRDC.2007.33","DOIUrl":"https://doi.org/10.1109/PRDC.2007.33","url":null,"abstract":"This paper presents a study on the performance of intrusion-tolerant protocols in wireless LANs. The protocols are evaluated in several different environmental settings, and also within the context of a car platooning application for distributed cruise control. The experimental evaluation reveals how performance is affected by the various environmental parameters such as the wireless standard, group size, and network topology. The distributed cruise control application demonstrates the practicability of such protocols, even when subjected to malicious faults.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133262721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Model Based Development of Safety-Critical Systems Using Template Based Code Generation 基于模板代码生成的安全关键系统模型开发
M. Regensburger, C. Buckl, A. Knoll, G. Schrott
Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists a huge heterogeneity of used platforms, it is obvious that it is impossible to design a code generator that supports a priori all required platforms. Instead a code generator architecture is needed that is suited for an easy extensibility of the code generation ability. One possible solution is the use of template-based approaches. In this paper, we describe an approach1 to develop safety-critical realtime systems by using open architecture ware, a modular MDA/MDD generator framework. We will present the tool-chain and discuss two lab applications.
基于模型的开发是软件工程中最先进的技术,因为它具有自动代码合成的潜力。然而,对于嵌入式系统来说,使用的平台存在巨大的异质性,很明显,不可能设计一个先验地支持所有所需平台的代码生成器。相反,需要一个适合于代码生成能力易于扩展的代码生成器体系结构。一种可能的解决方案是使用基于模板的方法。在本文中,我们描述了一种使用开放式体系结构软件(一个模块化的MDA/MDD生成器框架)来开发安全关键型实时系统的方法。我们将介绍工具链并讨论两个实验室应用。
{"title":"Model Based Development of Safety-Critical Systems Using Template Based Code Generation","authors":"M. Regensburger, C. Buckl, A. Knoll, G. Schrott","doi":"10.1109/PRDC.2007.25","DOIUrl":"https://doi.org/10.1109/PRDC.2007.25","url":null,"abstract":"Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists a huge heterogeneity of used platforms, it is obvious that it is impossible to design a code generator that supports a priori all required platforms. Instead a code generator architecture is needed that is suited for an easy extensibility of the code generation ability. One possible solution is the use of template-based approaches. In this paper, we describe an approach1 to develop safety-critical realtime systems by using open architecture ware, a modular MDA/MDD generator framework. We will present the tool-chain and discuss two lab applications.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133476598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
MAPMon: A Host-Based Malware Detection Tool MAPMon:一个基于主机的恶意软件检测工具
Shih-Yao Dai, S. Kuo
In order for financial-motivated malware programs such as spyware, virus and worm to survive after system rebooted, they have to modify entries in auto start extensibility points (ASEPs), system calls or system files on a comprised system. We call these system resources which a malware program could attack once it intrudes a host as malware attacking points (MAPs). Based on this observation, we design and implement MAPMon, a monitoring mechanism to detect any suspicious change of malware attacking points. This paper describes the design and implementation tradeoff of the MAPMon tool. The effectiveness of the MAPMon tool for malware detection is evaluated by using real-world malware programs including those that do not have signatures.
为了让诸如间谍软件、病毒和蠕虫之类的恶意软件程序在系统重新启动后存活,它们必须修改自动启动扩展点(asep)、系统调用或系统文件中的条目。我们把这些恶意程序入侵主机后可能攻击的系统资源称为恶意软件攻击点(map)。在此基础上,设计并实现了一种监测机制MAPMon,用于检测恶意软件攻击点的任何可疑变化。本文描述了MAPMon工具的设计和实现折衷。MAPMon工具用于恶意软件检测的有效性是通过使用真实的恶意软件程序来评估的,包括那些没有签名的恶意软件。
{"title":"MAPMon: A Host-Based Malware Detection Tool","authors":"Shih-Yao Dai, S. Kuo","doi":"10.1109/PRDC.2007.23","DOIUrl":"https://doi.org/10.1109/PRDC.2007.23","url":null,"abstract":"In order for financial-motivated malware programs such as spyware, virus and worm to survive after system rebooted, they have to modify entries in auto start extensibility points (ASEPs), system calls or system files on a comprised system. We call these system resources which a malware program could attack once it intrudes a host as malware attacking points (MAPs). Based on this observation, we design and implement MAPMon, a monitoring mechanism to detect any suspicious change of malware attacking points. This paper describes the design and implementation tradeoff of the MAPMon tool. The effectiveness of the MAPMon tool for malware detection is evaluated by using real-world malware programs including those that do not have signatures.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"29 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122859077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Improving Email Reliability by Sender Retransmission 通过发件人重传提高电子邮件的可靠性
T. Moors, P. Chu
While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of e-mail, which passes responsibility for delivering email from one mail server to another, but in doing so exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to email unreliability than others, and seek tools with which they can detect and recover from email failures. This paper describes tools that allow email sending software to automatically respond to reports of undeliverability by persisting with retransmission or retransmitting to alternate recipients.
虽然电子邮件相当可靠,但信息确实会丢失。这可能是由于电子邮件的存储和转发特性,它将将电子邮件从一个邮件服务器传递到另一个邮件服务器的责任,但如果服务器没有履行其责任,那么这样做会导致消息丢失。一些终端用户对电子邮件的不可靠性比其他人更敏感,他们会寻找能够检测和恢复电子邮件故障的工具。本文描述了一些工具,这些工具允许电子邮件发送软件通过坚持重新传输或重新传输到备用收件人来自动响应无法交付的报告。
{"title":"Improving Email Reliability by Sender Retransmission","authors":"T. Moors, P. Chu","doi":"10.1109/PRDC.2007.38","DOIUrl":"https://doi.org/10.1109/PRDC.2007.38","url":null,"abstract":"While email is fairly reliable, messages do get lost. This can be due to the store-and-forward nature of e-mail, which passes responsibility for delivering email from one mail server to another, but in doing so exposes messages to loss, should a server not fulfil its responsibility. Some end users are more sensitive to email unreliability than others, and seek tools with which they can detect and recover from email failures. This paper describes tools that allow email sending software to automatically respond to reports of undeliverability by persisting with retransmission or retransmitting to alternate recipients.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129258015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Fail-Silent Reconfigurable Superscalar Processor 无故障可重构超标量处理器
T. Kottke, A. Steininger
We propose a reconfigurable superscalar processor with two modes of operation: In safety mode the two pipelines run in lock step, executing the same instruction sequence, thus allowing to detect hardware failures. In performance mode different instruction streams are executed in parallel, just like in a standard superscalar processor. Considering that many embedded applications comprise a mixture of safety-critical and non safety-critical functions, the ability to dynamically switch between the two modes allows an efficient utilization of the duplicated pipeline. To complement the error detection enabled by the duplicated pipeline, non-duplicated components such as the register file are secured by parity. A systematic failure analysis shows that the proposed implementation can indeed detect all single faults in safety mode and that the ability to switch modes does not compromise the fail safe property. These encouraging results are finally confirmed by extensive fault injection experiments.
我们提出了一种具有两种操作模式的可重构超标量处理器:在安全模式下,两个管道以锁步运行,执行相同的指令序列,从而允许检测硬件故障。在性能模式中,不同的指令流并行执行,就像在标准的超标量处理器中一样。考虑到许多嵌入式应用程序包含安全关键和非安全关键功能的混合,在两种模式之间动态切换的能力允许有效地利用重复的管道。为了补充由重复管道启用的错误检测,寄存器文件等非重复组件由奇偶校验保护。系统的故障分析表明,所提出的实现确实可以检测安全模式下的所有单个故障,并且切换模式的能力不会损害故障安全特性。这些令人鼓舞的结果最终被广泛的断层注入实验所证实。
{"title":"A Fail-Silent Reconfigurable Superscalar Processor","authors":"T. Kottke, A. Steininger","doi":"10.1109/PRDC.2007.16","DOIUrl":"https://doi.org/10.1109/PRDC.2007.16","url":null,"abstract":"We propose a reconfigurable superscalar processor with two modes of operation: In safety mode the two pipelines run in lock step, executing the same instruction sequence, thus allowing to detect hardware failures. In performance mode different instruction streams are executed in parallel, just like in a standard superscalar processor. Considering that many embedded applications comprise a mixture of safety-critical and non safety-critical functions, the ability to dynamically switch between the two modes allows an efficient utilization of the duplicated pipeline. To complement the error detection enabled by the duplicated pipeline, non-duplicated components such as the register file are secured by parity. A systematic failure analysis shows that the proposed implementation can indeed detect all single faults in safety mode and that the ability to switch modes does not compromise the fail safe property. These encouraging results are finally confirmed by extensive fault injection experiments.","PeriodicalId":183540,"journal":{"name":"13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131305468","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1