首页 > 最新文献

2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)最新文献

英文 中文
A Replication Model for Trading Data Integrity against Availability 数据完整性与可用性交易的复制模型
Johannes Osrael, Lorenz Froihofer, K. M. Göschka
Higher availability and better performance of data-centric applications can be achieved by replication of objects or data items. If data integrity, a correctness criterion for such systems, needs to be maintained even during degraded situations (node or link failures) the system soon becomes (partially) unavailable. However, some applications exist (e.g., in control engineering) where data integrity can be relaxed for higher availability during degraded situations. Traditional replication models do not support the balancing of these two properties. In this paper, we present a novel replication model that (i) allows replicas to diverge if data integrity can be temporarily relaxed and (ii) re-establishes both replica consistency and data integrity during repair time
通过复制对象或数据项,可以实现以数据为中心的应用程序的更高可用性和更好的性能。如果即使在降级情况下(节点或链路故障)也需要维护数据完整性(这是此类系统的正确性标准),那么系统很快就会变得(部分)不可用。然而,存在一些应用程序(例如,在控制工程中),在降级情况下可以放松数据完整性以获得更高的可用性。传统的复制模式不支持这两种属性的平衡。在本文中,我们提出了一种新的复制模型(i)如果数据完整性可以暂时放松,则允许副本发散;(ii)在修复期间重新建立副本一致性和数据完整性
{"title":"A Replication Model for Trading Data Integrity against Availability","authors":"Johannes Osrael, Lorenz Froihofer, K. M. Göschka","doi":"10.1109/PRDC.2006.12","DOIUrl":"https://doi.org/10.1109/PRDC.2006.12","url":null,"abstract":"Higher availability and better performance of data-centric applications can be achieved by replication of objects or data items. If data integrity, a correctness criterion for such systems, needs to be maintained even during degraded situations (node or link failures) the system soon becomes (partially) unavailable. However, some applications exist (e.g., in control engineering) where data integrity can be relaxed for higher availability during degraded situations. Traditional replication models do not support the balancing of these two properties. In this paper, we present a novel replication model that (i) allows replicas to diverge if data integrity can be temporarily relaxed and (ii) re-establishes both replica consistency and data integrity during repair time","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116654786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Monitoring Database Application Behavior for Intrusion Detection 针对入侵检测的数据库应用行为监控
J. Fonseca, M. Vieira, H. Madeira
Database management systems (DBMS) represent the ultimate layer in preventing malicious data access or corruption and implement several security mechanisms to protect data. However these mechanisms cannot always stop malicious users from accessing data by exploiting system vulnerabilities. The aim of this paper is to propose an intrusion detection mechanism for DBMS to fill this gap. Our approach consists of a comprehensive representation of user database utilization profiles to perform concurrent intrusion detection. Prior to the detection it is necessary to define and learn these utilization profiles. Profiles are defined using a three level abstraction and learned directly from monitoring the database utilization in real conditions. The proposed mechanism is generic and can be easily implemented in commercial and open-source DBMS
数据库管理系统(DBMS)代表了防止恶意数据访问或损坏的最终层,并实现了几种安全机制来保护数据。然而,这些机制并不总是能够阻止恶意用户利用系统漏洞访问数据。本文的目的是提出一种数据库管理系统的入侵检测机制来填补这一空白。我们的方法包括用户数据库利用概况的综合表示来执行并发入侵检测。在检测之前,有必要定义和了解这些利用率配置文件。概要文件是使用三层抽象定义的,并直接从监视实际条件下的数据库利用率中学习。所提出的机制是通用的,可以很容易地在商业和开源DBMS中实现
{"title":"Monitoring Database Application Behavior for Intrusion Detection","authors":"J. Fonseca, M. Vieira, H. Madeira","doi":"10.1109/PRDC.2006.46","DOIUrl":"https://doi.org/10.1109/PRDC.2006.46","url":null,"abstract":"Database management systems (DBMS) represent the ultimate layer in preventing malicious data access or corruption and implement several security mechanisms to protect data. However these mechanisms cannot always stop malicious users from accessing data by exploiting system vulnerabilities. The aim of this paper is to propose an intrusion detection mechanism for DBMS to fill this gap. Our approach consists of a comprehensive representation of user database utilization profiles to perform concurrent intrusion detection. Prior to the detection it is necessary to define and learn these utilization profiles. Profiles are defined using a three level abstraction and learned directly from monitoring the database utilization in real conditions. The proposed mechanism is generic and can be easily implemented in commercial and open-source DBMS","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"43 12","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120989201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Statistically Estimated Optimistic Delivery in Wide-Area Total Order Protocols 广域总订单协议中统计估计的乐观交货
J. Mocito, A. Respício, L. Rodrigues
Total order broadcast protocols have been successfully applied as the basis for the construction of many fault-tolerant distributed systems. Unfortunately, the implementation of such a primitive can be expensive both in terms of communication steps and of number of messages exchanged. To alleviate this problem, optimistic total order protocols have been proposed. This paper addresses the problem of offering optimistic total order in geographically wide-area systems. We present a protocol that outperforms previous work, by minimizing the average latency of the optimistic notification
全序广播协议已被成功地应用于许多容错分布式系统的构建。不幸的是,就通信步骤和交换的消息数量而言,实现这样的原语可能代价高昂。为了解决这一问题,提出了乐观总顺序协议。本文研究了地理广域系统中最优总序的给出问题。通过最小化乐观通知的平均延迟,我们提出了一种优于以前工作的协议
{"title":"On Statistically Estimated Optimistic Delivery in Wide-Area Total Order Protocols","authors":"J. Mocito, A. Respício, L. Rodrigues","doi":"10.1109/PRDC.2006.47","DOIUrl":"https://doi.org/10.1109/PRDC.2006.47","url":null,"abstract":"Total order broadcast protocols have been successfully applied as the basis for the construction of many fault-tolerant distributed systems. Unfortunately, the implementation of such a primitive can be expensive both in terms of communication steps and of number of messages exchanged. To alleviate this problem, optimistic total order protocols have been proposed. This paper addresses the problem of offering optimistic total order in geographically wide-area systems. We present a protocol that outperforms previous work, by minimizing the average latency of the optimistic notification","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126740340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
The Survivability of the Augmented Logical Ring Topology in WDM Networks WDM网络中增强型逻辑环拓扑的生存性
Yung-Chiao Chen, C. Sue, S. Kuo
The logical ring topology is a simple protection scheme in WDM networks. The failure of a single physical fiber link may cause the failure of multiple lightpaths. The service becomes unprotected if the failure propagates to the logical ring topology. In this paper, we focus on the elimination of failure propagation from the physical WDM network to the logical topology. We propose a method to make the augmented logical ring topology survivable. The augmented survivable edges (ASE) is based on the connectivity problem of the logical topology. Our method makes the modification of logical ring topology cost-effective, i.e., with the minimal number of the additional edges to the original logical ring topology. Finally, we show the results on various network cases
逻辑环拓扑是WDM网络中一种简单的保护方案。单个物理光纤链路的故障可能导致多个光路的故障。如果故障传播到逻辑环拓扑,则服务将不受保护。在本文中,我们的重点是消除故障传播从物理WDM网络到逻辑拓扑。提出了一种使增广逻辑环拓扑具有生存性的方法。扩充生存边(ASE)是基于逻辑拓扑的连通性问题。我们的方法使得逻辑环拓扑的修改具有成本效益,即在原始逻辑环拓扑的基础上增加最少的边。最后,我们展示了在各种网络情况下的结果
{"title":"The Survivability of the Augmented Logical Ring Topology in WDM Networks","authors":"Yung-Chiao Chen, C. Sue, S. Kuo","doi":"10.1109/PRDC.2006.61","DOIUrl":"https://doi.org/10.1109/PRDC.2006.61","url":null,"abstract":"The logical ring topology is a simple protection scheme in WDM networks. The failure of a single physical fiber link may cause the failure of multiple lightpaths. The service becomes unprotected if the failure propagates to the logical ring topology. In this paper, we focus on the elimination of failure propagation from the physical WDM network to the logical topology. We propose a method to make the augmented logical ring topology survivable. The augmented survivable edges (ASE) is based on the connectivity problem of the logical topology. Our method makes the modification of logical ring topology cost-effective, i.e., with the minimal number of the additional edges to the original logical ring topology. Finally, we show the results on various network cases","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122616993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Trade-Offs and Deadlock Prevention in Transient Fault-Tolerant SMT Processors 瞬态容错SMT处理器的设计权衡与死锁预防
Xiaobin Li, J. Gaudiot
Since the very concept of simultaneous multi-threading (SMT) entails inherent redundancy, some proposals have been made to run two copies of the same thread on top of SMT platforms in order to detect and correct soft errors. This allows, upon detection of an error, for the rolling back of the processor state to a known safe point, and then a retry of the instructions, thereby resulting in a completely error-free execution. This paper focuses on two crucial implementation issues introduced by this concept: (i) the design trade-off between the fault detection coverage versus the design costs; (ii) the possible occurrence of deadlock situations. To achieve the largest possible fault detection coverage, we replicate the instructions fetched in order to generate the redundant thread copies. Further, we apply the SMT thread scheduling at the instruction dispatch stage so as to lower the performance overhead. As a result, when compared to the baseline processor, our simulation results show that by using our two new schemes, the performance overhead can be reduced down to as little as 34% on the average, down from 42%. Finally, in the fault-tolerant execution mode, since the two copied threads are cooperating with one another, deadlock situations could be quite common. We thus present a detailed deadlock analysis and then conclude that allocating some entries of ROB, LQ, and SQ for the trailing thread is sufficient to prevent such deadlocks
由于同步多线程(SMT)的概念本身就需要固有的冗余,因此有人建议在SMT平台上运行同一线程的两个副本,以便检测和纠正软错误。这允许在检测到错误时将处理器状态回滚到已知的安全点,然后重试指令,从而导致完全无错误的执行。本文重点讨论了该概念引入的两个关键实现问题:(i)故障检测覆盖率与设计成本之间的设计权衡;(ii)可能发生的僵局情况。为了实现最大的故障检测覆盖率,我们复制获取的指令,以生成冗余线程副本。此外,我们在指令调度阶段应用SMT线程调度,以降低性能开销。因此,当与基准处理器进行比较时,我们的模拟结果表明,通过使用我们的两种新方案,性能开销平均可以降低到34%,而不是42%。最后,在容错执行模式下,由于两个复制的线程相互协作,死锁情况可能非常常见。因此,我们提供了一个详细的死锁分析,然后得出结论,为跟踪线程分配一些ROB、LQ和SQ条目足以防止此类死锁
{"title":"Design Trade-Offs and Deadlock Prevention in Transient Fault-Tolerant SMT Processors","authors":"Xiaobin Li, J. Gaudiot","doi":"10.1109/PRDC.2006.25","DOIUrl":"https://doi.org/10.1109/PRDC.2006.25","url":null,"abstract":"Since the very concept of simultaneous multi-threading (SMT) entails inherent redundancy, some proposals have been made to run two copies of the same thread on top of SMT platforms in order to detect and correct soft errors. This allows, upon detection of an error, for the rolling back of the processor state to a known safe point, and then a retry of the instructions, thereby resulting in a completely error-free execution. This paper focuses on two crucial implementation issues introduced by this concept: (i) the design trade-off between the fault detection coverage versus the design costs; (ii) the possible occurrence of deadlock situations. To achieve the largest possible fault detection coverage, we replicate the instructions fetched in order to generate the redundant thread copies. Further, we apply the SMT thread scheduling at the instruction dispatch stage so as to lower the performance overhead. As a result, when compared to the baseline processor, our simulation results show that by using our two new schemes, the performance overhead can be reduced down to as little as 34% on the average, down from 42%. Finally, in the fault-tolerant execution mode, since the two copied threads are cooperating with one another, deadlock situations could be quite common. We thus present a detailed deadlock analysis and then conclude that allocating some entries of ROB, LQ, and SQ for the trailing thread is sufficient to prevent such deadlocks","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114708014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Adaptive Secure Group Communication: Bridging the Gap between Formal Specification and Network Simulation 迈向自适应安全组通信:弥合形式规范与网络仿真之间的差距
Sebastian Gutierrez-Nolasco, N. Venkatasubramanian, Mark-Oliver Stehr, C. Talcott
We extend an executable specification of a state-of-the-art secure group communication subsystem to explore two dimensions of adaptability, namely security and synchrony under crash-recovery and intermittent connectivity scenarios. In particular, we relax the traditional requirement of virtual synchrony and propose various generic optimizations, while preserving essential security guarantees. In order to evaluate how practical and effective our generic optimizations are, we integrate the specification into ns2, bridging the gap between formal specification and classical network simulation
我们扩展了最先进的安全组通信子系统的可执行规范,以探索适应性的两个维度,即在崩溃恢复和间歇性连接场景下的安全性和同步性。特别是,我们放宽了传统的虚拟同步要求,并提出了各种通用优化,同时保留了基本的安全保证。为了评估我们的通用优化的实用性和有效性,我们将规范集成到ns2中,弥合了正式规范和经典网络模拟之间的差距
{"title":"Towards Adaptive Secure Group Communication: Bridging the Gap between Formal Specification and Network Simulation","authors":"Sebastian Gutierrez-Nolasco, N. Venkatasubramanian, Mark-Oliver Stehr, C. Talcott","doi":"10.1109/PRDC.2006.62","DOIUrl":"https://doi.org/10.1109/PRDC.2006.62","url":null,"abstract":"We extend an executable specification of a state-of-the-art secure group communication subsystem to explore two dimensions of adaptability, namely security and synchrony under crash-recovery and intermittent connectivity scenarios. In particular, we relax the traditional requirement of virtual synchrony and propose various generic optimizations, while preserving essential security guarantees. In order to evaluate how practical and effective our generic optimizations are, we integrate the specification into ns2, bridging the gap between formal specification and classical network simulation","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124334064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Framework for Inheritance Testing from VDM++ Specifications 基于VDM++规范的继承测试框架
A. Nadeem, Michael R. Lyu
The benefits offered by the use of formal methods are not limited to avoidance of specification errors and elimination of ambiguities only - a formal specification also provides a sound basis for generating test suites. Inheritance is a powerful mechanism in object-oriented paradigm by which a subclass inherits data and functionality of a super class. Testing of inheritance relationships is crucial in object-oriented testing, as an inheritance error may lead to subtle bugs such as due to overridden functionality. In this paper, we introduce a technique to generate test cases for inheritance testing, using a VDM++ formal specification. The proposed technique is based on the flattening of a VDM++ specification class, and then generating operation sequences from the trace structure specified in the VDM++ specification. The input space for each operation is partitioned, and a test model is constructed from the operation sequences and the input partitions. Test paths are generated from the test model, which cover the different operation sequences as well as the partitions. We also define various coverage criteria for test path generation
使用形式化方法所带来的好处不仅限于避免规范错误和消除歧义——形式化规范还为生成测试套件提供了坚实的基础。继承是面向对象范式中的一种强大机制,子类通过它继承超类的数据和功能。继承关系的测试在面向对象的测试中是至关重要的,因为继承错误可能导致微妙的错误,例如由于覆盖的功能。在本文中,我们介绍了一种使用VDM++正式规范为继承测试生成测试用例的技术。该技术基于VDM++规范类的扁平化,然后从VDM++规范中指定的跟踪结构生成操作序列。对每个操作的输入空间进行分区,并根据操作序列和输入分区构造测试模型。测试路径是从测试模型中生成的,它涵盖了不同的操作序列以及分区。我们还为测试路径生成定义了各种覆盖标准
{"title":"A Framework for Inheritance Testing from VDM++ Specifications","authors":"A. Nadeem, Michael R. Lyu","doi":"10.1109/PRDC.2006.7","DOIUrl":"https://doi.org/10.1109/PRDC.2006.7","url":null,"abstract":"The benefits offered by the use of formal methods are not limited to avoidance of specification errors and elimination of ambiguities only - a formal specification also provides a sound basis for generating test suites. Inheritance is a powerful mechanism in object-oriented paradigm by which a subclass inherits data and functionality of a super class. Testing of inheritance relationships is crucial in object-oriented testing, as an inheritance error may lead to subtle bugs such as due to overridden functionality. In this paper, we introduce a technique to generate test cases for inheritance testing, using a VDM++ formal specification. The proposed technique is based on the flattening of a VDM++ specification class, and then generating operation sequences from the trace structure specified in the VDM++ specification. The input space for each operation is partitioned, and a test model is constructed from the operation sequences and the input partitions. Test paths are generated from the test model, which cover the different operation sequences as well as the partitions. We also define various coverage criteria for test path generation","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"36 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130796144","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Synchronous Set Agreement: a Concise Guided Tour (including a new algorithm and a list of open problems) 同步集协议:一个简明的导览(包括一个新算法和一个开放问题列表)
M. Raynal, Corentin Travers
The k-set agreement problem is a paradigm of coordination problems encountered in distributed computing. The parameter k defines the coordination degree we are interested in. (The case k=1 corresponds to the well-known uniform consensus problem.) More precisely, the k-set agreement problem considers a system made up of n processes where each process proposes a value. It requires that each non-faulty process decides a value such that a decided value is a proposed value, and no more than k different values are decided. This paper visits the k-set agreement problem in synchronous systems where up to t processes can experience failures. Three failure models are explored: the crash failure model, the send omission failure model, and the general omission failure model. Lower bounds and protocols are presented for each model. Open problems for the general omission failure model are stated. This paper can be seen as a short tutorial whose aim is to make the reader familiar with the k-set agreement problem in synchrony models with increasing fault severity. An important concern of the paper is simplicity. In addition to its survey flavor, several results and protocols that are presented are new
k集协议问题是分布式计算中遇到的协调问题的一个范例。参数k定义了我们感兴趣的协调度。(k=1的情况对应于众所周知的一致共识问题。)更准确地说,k集协议问题考虑一个由n个进程组成的系统,其中每个进程提出一个值。它要求每个无故障进程确定一个值,这样一个确定的值就是一个建议值,并且确定的不同值不超过k个。本文研究了同步系统中多达t个进程可能出现故障的k集协议问题。探讨了三种失效模型:崩溃失效模型、发送遗漏失效模型和一般遗漏失效模型。给出了每个模型的下界和协议。阐述了一般遗漏失效模型存在的若干问题。本文可以看作是一个简短的教程,其目的是使读者熟悉故障严重程度增加的同步模型中的k集协议问题。本文的一个重要关注点是简单性。除了它的调查风格,提出的一些结果和协议是新的
{"title":"Synchronous Set Agreement: a Concise Guided Tour (including a new algorithm and a list of open problems)","authors":"M. Raynal, Corentin Travers","doi":"10.1109/PRDC.2006.59","DOIUrl":"https://doi.org/10.1109/PRDC.2006.59","url":null,"abstract":"The k-set agreement problem is a paradigm of coordination problems encountered in distributed computing. The parameter k defines the coordination degree we are interested in. (The case k=1 corresponds to the well-known uniform consensus problem.) More precisely, the k-set agreement problem considers a system made up of n processes where each process proposes a value. It requires that each non-faulty process decides a value such that a decided value is a proposed value, and no more than k different values are decided. This paper visits the k-set agreement problem in synchronous systems where up to t processes can experience failures. Three failure models are explored: the crash failure model, the send omission failure model, and the general omission failure model. Lower bounds and protocols are presented for each model. Open problems for the general omission failure model are stated. This paper can be seen as a short tutorial whose aim is to make the reader familiar with the k-set agreement problem in synchrony models with increasing fault severity. An important concern of the paper is simplicity. In addition to its survey flavor, several results and protocols that are presented are new","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130825013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor Systems 实时多处理器系统中的容错分区调度算法
H. Beitollahi, Geert Deconinck
This paper presents the performance analysis of several well-known partitioning scheduling algorithms in real-time and fault-tolerant multiprocessor systems. Both static and dynamic scheduling algorithms are analyzed. Partitioning scheduling algorithms, which are studied, are heuristic algorithms that are formed by combining any of the bin-packing algorithms with any of the schedulability conditions for the rate-monotonic (RM) and earliest-deadline-first (EDF) policies. A tool is developed which enables to experimentally evaluate the performance of the algorithms from the graph of tasks. The results show that among several partitioning algorithms evaluated, the RM-small-task (RMST) algorithm is the best static algorithm and the EDF-best-fit (EDF-BF) is the best dynamic algorithm, for non fault-tolerant systems. For fault-tolerant systems which require about 49% more processors, the results show that the RM-first-fit decreasing utilization (RM-FFDU) is the best static algorithm and the EDF-BF is the best dynamic algorithm. To decrease the number of processors in fault-tolerant systems, the RMST is modified. The results show that the modified RMST decreases the number of required processors between 7% and 78% in comparison with the original RMST, the RM-FFDU and other well-known static partitioning scheduling algorithms
本文对实时容错多处理机系统中常用的几种分区调度算法进行了性能分析。分析了静态调度算法和动态调度算法。本文所研究的分区调度算法是一种启发式算法,它是将任何装箱算法与任何速率单调(RM)和最早截止日期优先(EDF)策略的可调度性条件相结合而形成的。开发了一种工具,可以从任务图中实验评估算法的性能。结果表明,对于非容错系统,RM-small-task (RMST)算法是最佳静态算法,EDF-best-fit (EDF-best-fit)算法是最佳动态算法。结果表明,对于需要多49%处理器的容错系统,RM-first-fit递减利用率(RM-FFDU)是最好的静态算法,EDF-BF是最好的动态算法。为了减少容错系统中的处理器数量,对RMST进行了修改。结果表明,与原始的RMST、RM-FFDU和其他知名的静态分区调度算法相比,改进后的RMST所需的处理器数量减少了7% ~ 78%
{"title":"Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor Systems","authors":"H. Beitollahi, Geert Deconinck","doi":"10.1109/PRDC.2006.34","DOIUrl":"https://doi.org/10.1109/PRDC.2006.34","url":null,"abstract":"This paper presents the performance analysis of several well-known partitioning scheduling algorithms in real-time and fault-tolerant multiprocessor systems. Both static and dynamic scheduling algorithms are analyzed. Partitioning scheduling algorithms, which are studied, are heuristic algorithms that are formed by combining any of the bin-packing algorithms with any of the schedulability conditions for the rate-monotonic (RM) and earliest-deadline-first (EDF) policies. A tool is developed which enables to experimentally evaluate the performance of the algorithms from the graph of tasks. The results show that among several partitioning algorithms evaluated, the RM-small-task (RMST) algorithm is the best static algorithm and the EDF-best-fit (EDF-BF) is the best dynamic algorithm, for non fault-tolerant systems. For fault-tolerant systems which require about 49% more processors, the results show that the RM-first-fit decreasing utilization (RM-FFDU) is the best static algorithm and the EDF-BF is the best dynamic algorithm. To decrease the number of processors in fault-tolerant systems, the RMST is modified. The results show that the modified RMST decreases the number of required processors between 7% and 78% in comparison with the original RMST, the RM-FFDU and other well-known static partitioning scheduling algorithms","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116980040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
End-to-end consensus using end-to-end channels 使用端到端通道的端到端共识
M. Wiesmann, X. Défago
End-to-end consensus ensures delivery of the same value to the application layer running in distributed processes. Deliveries that have not been acknowledged by the application before a failure are delivered again. End-to-end primitives are important for applications that need to enforce persistency. We present an algorithm that solves the end-to-end consensus problem. Our approach is to build end-to-end consensus using a new type of communication channels, end-to-end channels
端到端一致性确保向运行在分布式进程中的应用层交付相同的值。在出现故障之前未被应用程序确认的交付将再次交付。端到端原语对于需要执行持久性的应用程序非常重要。我们提出了一种解决端到端共识问题的算法。我们的方法是通过一种新型的沟通渠道,端到端渠道,建立端到端的共识
{"title":"End-to-end consensus using end-to-end channels","authors":"M. Wiesmann, X. Défago","doi":"10.1109/PRDC.2006.32","DOIUrl":"https://doi.org/10.1109/PRDC.2006.32","url":null,"abstract":"End-to-end consensus ensures delivery of the same value to the application layer running in distributed processes. Deliveries that have not been acknowledged by the application before a failure are delivered again. End-to-end primitives are important for applications that need to enforce persistency. We present an algorithm that solves the end-to-end consensus problem. Our approach is to build end-to-end consensus using a new type of communication channels, end-to-end channels","PeriodicalId":314915,"journal":{"name":"2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123460286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1