首页 > 最新文献

2014 Tenth European Dependable Computing Conference最新文献

英文 中文
A Study of the Impact of Bit-Flip Errors on Programs Compiled with Different Optimization Levels 位翻转错误对不同优化级别程序编译的影响研究
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.30
B. Sangchoolie, Fatemeh Ayatolahi, R. Johansson, J. Karlsson
In this paper we study the impact of compiler optimizations on the error sensitivity of twelve benchmark programs. We conducted extensive fault injection experiments where bit-flip errors were injected in instruction set architecture registers and main memory locations. The results show that the percentage of silent data corruptions (SDCs) in the output of the optimized programs is only marginally higher compare to that observed for the non-optimized programs. This suggests that compiler optimizations can be used in safety- and mission-critical systems without increasing the risk that the system produces undetected erroneous outputs. In addition, we investigate to what extent the source code implementation of a program affects the error sensitivity of a program. To this end, we perform experiments with five implementations of a bit count algorithm. In this investigation, we consider the impact of the implementation as well as compiler optimizations. The results of these experiments give valuable insights into how compiler optimizations can be used to reduce error sensitive of registers and main memory sections. They also show how sensitive locations requiring additional protection, e.g., by the use of software-based fault tolerance techniques, can be identified.
本文研究了编译器优化对十二个基准程序的错误敏感性的影响。我们进行了大量的故障注入实验,将位翻转错误注入指令集体系结构寄存器和主存位置。结果表明,优化程序输出中静默数据损坏(sdc)的百分比仅略高于未优化程序的百分比。这表明编译器优化可以用于安全和任务关键型系统,而不会增加系统产生未检测到的错误输出的风险。此外,我们还研究了程序的源代码实现在多大程度上影响程序的错误敏感性。为此,我们用五种比特计数算法的实现进行了实验。在本研究中,我们考虑了实现和编译器优化的影响。这些实验的结果为如何使用编译器优化来降低寄存器和主存部分的错误敏感性提供了有价值的见解。他们还展示了如何识别需要额外保护的敏感位置,例如,通过使用基于软件的容错技术。
{"title":"A Study of the Impact of Bit-Flip Errors on Programs Compiled with Different Optimization Levels","authors":"B. Sangchoolie, Fatemeh Ayatolahi, R. Johansson, J. Karlsson","doi":"10.1109/EDCC.2014.30","DOIUrl":"https://doi.org/10.1109/EDCC.2014.30","url":null,"abstract":"In this paper we study the impact of compiler optimizations on the error sensitivity of twelve benchmark programs. We conducted extensive fault injection experiments where bit-flip errors were injected in instruction set architecture registers and main memory locations. The results show that the percentage of silent data corruptions (SDCs) in the output of the optimized programs is only marginally higher compare to that observed for the non-optimized programs. This suggests that compiler optimizations can be used in safety- and mission-critical systems without increasing the risk that the system produces undetected erroneous outputs. In addition, we investigate to what extent the source code implementation of a program affects the error sensitivity of a program. To this end, we perform experiments with five implementations of a bit count algorithm. In this investigation, we consider the impact of the implementation as well as compiler optimizations. The results of these experiments give valuable insights into how compiler optimizations can be used to reduce error sensitive of registers and main memory sections. They also show how sensitive locations requiring additional protection, e.g., by the use of software-based fault tolerance techniques, can be identified.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116064670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Geo-Location Inference Attacks: From Modelling to Privacy Risk Assessment (Short Paper) 地理位置推理攻击:从建模到隐私风险评估(短文)
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.32
Miguel Núñez del Prado Cortez, Jesus Frignal
Despite the commercial success of Location-Based Services (LBS), the sensitivity of the data they manage, specially those concerning the user's location, makes them a suitable target for geo-location inference attacks. These attacks are a new variant of traditional inference attacks aiming at disclosing personal aspects of users' life from their geo-location datasets. Since this threat might dramatically compromise the privacy of users, and so the confidence of LBS, a deeper knowledge of geo-location inference attacks becomes essential to protect LBS. To contribute to this goal, this short paper makes a step forward to model well-known types of geo-location inference attacks as a previous step to quantitatively assess the privacy risk they pose.
尽管基于位置的服务(LBS)在商业上取得了成功,但它们管理的数据的敏感性,特别是那些与用户位置有关的数据,使它们成为地理位置推断攻击的合适目标。这些攻击是传统推理攻击的一种新变体,旨在从用户的地理位置数据集中泄露用户生活的个人方面。由于这种威胁可能会极大地损害用户的隐私,从而损害LBS的信心,因此对地理位置推断攻击的深入了解对于保护LBS至关重要。为了实现这一目标,这篇短文向前迈出了一步,对众所周知的地理位置推断攻击类型进行建模,作为定量评估它们构成的隐私风险的前一步。
{"title":"Geo-Location Inference Attacks: From Modelling to Privacy Risk Assessment (Short Paper)","authors":"Miguel Núñez del Prado Cortez, Jesus Frignal","doi":"10.1109/EDCC.2014.32","DOIUrl":"https://doi.org/10.1109/EDCC.2014.32","url":null,"abstract":"Despite the commercial success of Location-Based Services (LBS), the sensitivity of the data they manage, specially those concerning the user's location, makes them a suitable target for geo-location inference attacks. These attacks are a new variant of traditional inference attacks aiming at disclosing personal aspects of users' life from their geo-location datasets. Since this threat might dramatically compromise the privacy of users, and so the confidence of LBS, a deeper knowledge of geo-location inference attacks becomes essential to protect LBS. To contribute to this goal, this short paper makes a step forward to model well-known types of geo-location inference attacks as a previous step to quantitatively assess the privacy risk they pose.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133365757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Software Diversity as a Measure for Reducing Development Risk 软件多样性是降低开发风险的一种方法
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.36
P. Popov, A. Povyakalo, Vladimir Stankovic, L. Strigini
Despite the widespread adoption of software diversity in some industries, there is still controversy about its benefits for reliability, safety or security. We take the prospective of diversity as a risk reduction strategy, in face of the uncertainty about the dependability levels delivered by software development. We specifically consider the problem faced at the start of a project, when the assessment of potential benefits, however uncertain, must determine the decision whether to adopt diversity. Using probabilistic modelling, we discuss how different application areas require different measures of the effectiveness of diversity for reducing risk. Extreme values of achieved reliability, and especially, in some applications, the likelihood of delivering "effectively fault-free" programs, may be the dominant factor in this effect. Therefore, we cast our analysis in terms of the whole distribution of achieved probabilities of failure per demand, rather than averages, as usually done in past research. This analysis highlights possible and indeed frequent errors in generalizations from experiments, and identifies risk reduction effects that can be proved to derive from independent developments of diverse software versions. Last, we demonstrate that, despite the difficulty of predicting the actual advantages of specific practices for achieving diversity, the practice of "forcing" diversity by explicitly mandating diverse designs, development processes, etc., for different versions, rather than just ensuring separate development, is robust, in terms of worst-case effects, in the face of uncertainty about the reliability that the different methods will achieve in a specific project, a result with direct applicability to practice.
尽管软件多样性在某些行业被广泛采用,但它在可靠性、安全性或安全性方面的好处仍然存在争议。面对软件开发交付的可靠性水平的不确定性,我们将多样性的前景作为降低风险的策略。我们特别考虑在项目开始时所面临的问题,因为对潜在利益的评估虽然不确定,但必须决定是否采用多样性。使用概率模型,我们讨论了不同的应用领域如何需要不同的多样性有效性措施来降低风险。实现可靠性的极端值,特别是在某些应用中,交付“有效无故障”程序的可能性,可能是这种影响的主要因素。因此,我们根据每个需求的实现失败概率的整体分布来进行分析,而不是像过去的研究中通常所做的那样平均。这个分析强调了从实验中归纳出的可能的和确实频繁的错误,并确定了可以证明来自不同软件版本的独立开发的风险降低效果。最后,我们证明,尽管很难预测实现多样性的具体实践的实际优势,但通过明确要求不同版本的不同设计、开发过程等来“强制”多样性的实践,而不仅仅是确保单独的开发,在最坏情况下是稳健的,面对不同方法在特定项目中实现的可靠性的不确定性。具有直接应用于实践的结果。
{"title":"Software Diversity as a Measure for Reducing Development Risk","authors":"P. Popov, A. Povyakalo, Vladimir Stankovic, L. Strigini","doi":"10.1109/EDCC.2014.36","DOIUrl":"https://doi.org/10.1109/EDCC.2014.36","url":null,"abstract":"Despite the widespread adoption of software diversity in some industries, there is still controversy about its benefits for reliability, safety or security. We take the prospective of diversity as a risk reduction strategy, in face of the uncertainty about the dependability levels delivered by software development. We specifically consider the problem faced at the start of a project, when the assessment of potential benefits, however uncertain, must determine the decision whether to adopt diversity. Using probabilistic modelling, we discuss how different application areas require different measures of the effectiveness of diversity for reducing risk. Extreme values of achieved reliability, and especially, in some applications, the likelihood of delivering \"effectively fault-free\" programs, may be the dominant factor in this effect. Therefore, we cast our analysis in terms of the whole distribution of achieved probabilities of failure per demand, rather than averages, as usually done in past research. This analysis highlights possible and indeed frequent errors in generalizations from experiments, and identifies risk reduction effects that can be proved to derive from independent developments of diverse software versions. Last, we demonstrate that, despite the difficulty of predicting the actual advantages of specific practices for achieving diversity, the practice of \"forcing\" diversity by explicitly mandating diverse designs, development processes, etc., for different versions, rather than just ensuring separate development, is robust, in terms of worst-case effects, in the face of uncertainty about the reliability that the different methods will achieve in a specific project, a result with direct applicability to practice.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122570125","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Improving the Kuo-Lu-Yeh Algorithm for Assessing Two-Terminal Reliability 基于Kuo-Lu-Yeh算法的双端可靠性评估
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.11
Minh Lê, M. Walter, J. Weidendorfer
Currently, the most efficient approach for solving the NP-hard terminal-pair reliability problem is the Kuo-Lu-Yeh algorithm which applies the technique of Edge Expansion Diagram (EED) coupled with Ordered Binary Decision Diagram (OBDD). In this work we will show that this algorithm can be enhanced significantly by removing redundant biconnected components, which can be done in linear time and without needing additional memory. We empirically evaluated our approach against the original one by means of 24 benchmark networks. In addition, we examined our approach statistically using randomly generated graphs. Our new approach performs significantly better regarding runtime and memory consumption for most of the benchmark networks. For a regular 3x20 grid network we have even achieved a speedup of 464 and the memory consumption goes down to 0.3 percent. Thus, in practice, runtime and memory consumptions are drastically reduced for many "difficult" networks. When applied to networks without redundant biconnected components, there is no memory overhead and the additional runtime is negligible.
目前,解决np -硬终端对可靠性问题最有效的方法是利用边缘展开图(EED)和有序二元决策图(OBDD)相结合的Kuo-Lu-Yeh算法。在这项工作中,我们将证明该算法可以通过去除冗余的双连接组件来显着增强,这可以在线性时间内完成,并且不需要额外的内存。我们通过24个基准网络对我们的方法进行了实证评估。此外,我们使用随机生成的图形对我们的方法进行了统计检验。对于大多数基准网络,我们的新方法在运行时和内存消耗方面表现得更好。对于常规的3x20网格网络,我们甚至实现了464的加速,内存消耗下降到0.3%。因此,在实践中,对于许多“困难”的网络,运行时和内存消耗会大大减少。当应用于没有冗余双连接组件的网络时,没有内存开销,并且额外的运行时可以忽略不计。
{"title":"Improving the Kuo-Lu-Yeh Algorithm for Assessing Two-Terminal Reliability","authors":"Minh Lê, M. Walter, J. Weidendorfer","doi":"10.1109/EDCC.2014.11","DOIUrl":"https://doi.org/10.1109/EDCC.2014.11","url":null,"abstract":"Currently, the most efficient approach for solving the NP-hard terminal-pair reliability problem is the Kuo-Lu-Yeh algorithm which applies the technique of Edge Expansion Diagram (EED) coupled with Ordered Binary Decision Diagram (OBDD). In this work we will show that this algorithm can be enhanced significantly by removing redundant biconnected components, which can be done in linear time and without needing additional memory. We empirically evaluated our approach against the original one by means of 24 benchmark networks. In addition, we examined our approach statistically using randomly generated graphs. Our new approach performs significantly better regarding runtime and memory consumption for most of the benchmark networks. For a regular 3x20 grid network we have even achieved a speedup of 464 and the memory consumption goes down to 0.3 percent. Thus, in practice, runtime and memory consumptions are drastically reduced for many \"difficult\" networks. When applied to networks without redundant biconnected components, there is no memory overhead and the additional runtime is negligible.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132029895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Towards a Resilience Benchmarking Description Language for the Context of Satellite Simulators (Short Paper) 面向卫星模拟器环境的弹性基准描述语言(短文)
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.19
D. Azevedo, A. Ambrosio, M. Vieira
Specifying a resilience benchmark is a difficult task due to the complexity of the benchmark components and the need for standardization. Existing approaches for benchmark specification, including document-based and program-based approaches, are limited in terms of their scope and in the support they provide to the benchmark users. In this short paper we present the work we are conducting towards the definition of a description language for resilience benchmarks for the domain of satellite simulators.
由于基准组件的复杂性和标准化的需要,指定弹性基准是一项困难的任务。现有的基准规范方法,包括基于文档和基于程序的方法,在范围和为基准用户提供的支持方面都是有限的。在这篇短文中,我们介绍了我们为卫星模拟器领域的弹性基准定义描述语言所做的工作。
{"title":"Towards a Resilience Benchmarking Description Language for the Context of Satellite Simulators (Short Paper)","authors":"D. Azevedo, A. Ambrosio, M. Vieira","doi":"10.1109/EDCC.2014.19","DOIUrl":"https://doi.org/10.1109/EDCC.2014.19","url":null,"abstract":"Specifying a resilience benchmark is a difficult task due to the complexity of the benchmark components and the need for standardization. Existing approaches for benchmark specification, including document-based and program-based approaches, are limited in terms of their scope and in the support they provide to the benchmark users. In this short paper we present the work we are conducting towards the definition of a description language for resilience benchmarks for the domain of satellite simulators.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124879043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Probabilistic Analysis of Disagreement in Synchronous Consensus Protocols 同步共识协议中分歧的概率分析
Pub Date : 2014-05-13 DOI: 10.1109/EDCC.2014.26
Negin Fathollahnejad, E. Villani, R. Pathan, R. Barbosa, J. Karlsson
This paper presents a probabilistic analysis of disagreement for a family of simple synchronous consensus algorithms aimed at solving the 1-of-n selection problem in presence of unrestricted communication failures. In this problem, a set of n nodes are to select one common value among n proposed values. There are two possible outcomes of each node's selection process: decide to select a value or abort. We have disagreement if some nodes select the same value while other nodes decide to abort. Previous research has shown that it is impossible to guarantee agreement among the nodes subjected to an unbounded number of message losses. Our aim is to find decision algorithms for which the probability of disagreement is as low as possible. In this paper, we investigate two different decision criteria, one optimistic and one pessimistic. We assume two communication failure models, symmetric and asymmetric. For symmetric communication failures, we present the closed-form expressions for the probability of disagreement. For asymmetric failures, we analyse the algorithm using a probabilistic model checking tool. Our results show that the choice of decision criterion significantly influences the probability of disagreement for the 1-of-n selection algorithm. The optimistic decision criterion shows a lower probability of disagreement compare to the pessimistic one when the probability of message loss is less than 30% to 70%. On the other hand, the optimistic decision criterion has in general a higher maximum probability of disagreement compared to the pessimistic criterion.
本文对一类简单同步一致性算法进行了不一致的概率分析,以解决存在无限制通信故障时的1 of n选择问题。在这个问题中,一组n个节点要从n个建议值中选择一个公共值。每个节点的选择过程有两种可能的结果:决定选择一个值或中止。如果一些节点选择相同的值,而其他节点决定中止,则会产生分歧。先前的研究表明,不可能保证节点之间的协议受到无限数量的消息丢失。我们的目标是找到分歧概率尽可能低的决策算法。在本文中,我们研究了两种不同的决策准则,一个乐观和一个悲观。我们假设两种通信故障模型,对称和非对称。对于对称通信失败,我们给出了不一致概率的封闭表达式。对于非对称故障,我们使用概率模型检查工具来分析算法。我们的研究结果表明,决策准则的选择对1-of-n选择算法的不一致概率有显著影响。当消息丢失的概率小于30% ~ 70%时,乐观决策准则的不一致概率比悲观决策准则的低。另一方面,与悲观决策标准相比,乐观决策标准通常具有更高的最大分歧概率。
{"title":"On Probabilistic Analysis of Disagreement in Synchronous Consensus Protocols","authors":"Negin Fathollahnejad, E. Villani, R. Pathan, R. Barbosa, J. Karlsson","doi":"10.1109/EDCC.2014.26","DOIUrl":"https://doi.org/10.1109/EDCC.2014.26","url":null,"abstract":"This paper presents a probabilistic analysis of disagreement for a family of simple synchronous consensus algorithms aimed at solving the 1-of-n selection problem in presence of unrestricted communication failures. In this problem, a set of n nodes are to select one common value among n proposed values. There are two possible outcomes of each node's selection process: decide to select a value or abort. We have disagreement if some nodes select the same value while other nodes decide to abort. Previous research has shown that it is impossible to guarantee agreement among the nodes subjected to an unbounded number of message losses. Our aim is to find decision algorithms for which the probability of disagreement is as low as possible. In this paper, we investigate two different decision criteria, one optimistic and one pessimistic. We assume two communication failure models, symmetric and asymmetric. For symmetric communication failures, we present the closed-form expressions for the probability of disagreement. For asymmetric failures, we analyse the algorithm using a probabilistic model checking tool. Our results show that the choice of decision criterion significantly influences the probability of disagreement for the 1-of-n selection algorithm. The optimistic decision criterion shows a lower probability of disagreement compare to the pessimistic one when the probability of message loss is less than 30% to 70%. On the other hand, the optimistic decision criterion has in general a higher maximum probability of disagreement compared to the pessimistic criterion.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133635706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Do I Need to Fix a Failed Component Now, or Can I Wait Until Tomorrow? 我需要现在修复一个失败的组件,还是可以等到明天?
Pub Date : 2014-05-01 DOI: 10.1109/EDCC.2014.15
M. Calder, Michele Sevegnani
We investigate how predictive event-based modelling can inform operational decision making in complex systems with component failures. By relating the status of components to service availability, and using stochastic temporal logic reasoning, we quantify the risk of service failure now, and in the future, after a given elapsed time. Decisions can then be taken according to those risks. We demonstrate the approach through application to an industrial case study system in which component failures are sensed and monitored. The system has been deployed for some time. A novel aspect is we calibrate the model(s) according to inferences over historical field data, thus the results of our reasoning can inform decision making in the actual deployed system.
我们研究了基于事件的预测建模如何在具有组件故障的复杂系统中为操作决策提供信息。通过将组件的状态与服务可用性联系起来,并使用随机时间逻辑推理,我们可以在给定的经过时间后量化现在和将来的服务故障风险。然后可以根据这些风险做出决策。我们通过应用于工业案例研究系统来演示该方法,其中组件故障被感知和监控。系统已经部署了一段时间。一个新颖的方面是我们根据对历史现场数据的推断来校准模型,因此我们的推理结果可以为实际部署系统中的决策提供信息。
{"title":"Do I Need to Fix a Failed Component Now, or Can I Wait Until Tomorrow?","authors":"M. Calder, Michele Sevegnani","doi":"10.1109/EDCC.2014.15","DOIUrl":"https://doi.org/10.1109/EDCC.2014.15","url":null,"abstract":"We investigate how predictive event-based modelling can inform operational decision making in complex systems with component failures. By relating the status of components to service availability, and using stochastic temporal logic reasoning, we quantify the risk of service failure now, and in the future, after a given elapsed time. Decisions can then be taken according to those risks. We demonstrate the approach through application to an industrial case study system in which component failures are sensed and monitored. The system has been deployed for some time. A novel aspect is we calibrate the model(s) according to inferences over historical field data, thus the results of our reasoning can inform decision making in the actual deployed system.","PeriodicalId":364377,"journal":{"name":"2014 Tenth European Dependable Computing Conference","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2014-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126864742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2014 Tenth European Dependable Computing Conference
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1