首页 > 最新文献

2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing最新文献

英文 中文
Reliability Evaluation of Flip-Flops Based on Probabilistic Transfer Matrices 基于概率传递矩阵的触发器可靠性评估
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.22
Chengtian Ouyang, Jianhui Jiang, Jie Xiao
To estimate the reliability and find the weak point of circuits at design phase, several high-level evaluation methods have been proposed recently. However, most of these methods can only be used for combinational circuits. In this paper, we propose a reliability evaluation method based on probabilistic transfer matrices to accurately estimate the reliability of a flip flop circuit. The proposed method is compared with the method in [7] for the D-type flip-flop. Experimental results confirmed that our method is accurate.
为了在设计阶段对电路的可靠性进行评估,找出电路的薄弱环节,近年来提出了几种高水平的评估方法。然而,这些方法大多只能用于组合电路。本文提出了一种基于概率转移矩阵的可靠性评估方法,以准确估计触发器电路的可靠性。将该方法与[7]中的d型触发器方法进行了比较。实验结果证实了该方法的准确性。
{"title":"Reliability Evaluation of Flip-Flops Based on Probabilistic Transfer Matrices","authors":"Chengtian Ouyang, Jianhui Jiang, Jie Xiao","doi":"10.1109/PRDC.2010.22","DOIUrl":"https://doi.org/10.1109/PRDC.2010.22","url":null,"abstract":"To estimate the reliability and find the weak point of circuits at design phase, several high-level evaluation methods have been proposed recently. However, most of these methods can only be used for combinational circuits. In this paper, we propose a reliability evaluation method based on probabilistic transfer matrices to accurately estimate the reliability of a flip flop circuit. The proposed method is compared with the method in [7] for the D-type flip-flop. Experimental results confirmed that our method is accurate.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"25 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120859218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Software Accelerated Life Testing Model 软件加速寿命测试模型
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.50
Toshiya Fujii, T. Dohi, H. Okamura, T. Fujiwara
Software system developed for a specific user under contract undergoes a period of testing by the user before acceptance. This is known as user acceptance testing and is useful to debug the software in the user's operational circumstance. In this paper we first present a simple non-homogeneous Poisson process (NHPP)-based software reliability model to assess the quantitative software reliability under the user acceptance test, where the idea of an accelerated life testing model is introduced to represent the user's operational phase and to investigate the impact of user's acceptance test. This idea is applied to the reliability assessment of web applications in a different testing environment, where two stress tests with normal and higher workload conditions are executed in parallel. Through numerical examples with real software fault data observed in actual user acceptance and stress tests, we show the applicability of the software accelerated life testing model to two different software testing schemes.
根据合同为特定用户开发的软件系统,在验收前由用户进行一段时间的测试。这就是所谓的用户验收测试,对于在用户的操作环境中调试软件很有用。本文首先提出了一种基于非齐次泊松过程(NHPP)的软件可靠性定量评估模型,其中引入了加速寿命测试模型的思想来表示用户的操作阶段,并研究了用户验收测试对软件可靠性的影响。这个想法被应用到一个不同的测试环境中的web应用程序的可靠性评估中,其中两个压力测试在正常和更高的工作负载条件下并行执行。通过在实际用户验收和压力测试中观察到的真实软件故障数据的数值算例,说明了软件加速寿命测试模型在两种不同的软件测试方案中的适用性。
{"title":"A Software Accelerated Life Testing Model","authors":"Toshiya Fujii, T. Dohi, H. Okamura, T. Fujiwara","doi":"10.1109/PRDC.2010.50","DOIUrl":"https://doi.org/10.1109/PRDC.2010.50","url":null,"abstract":"Software system developed for a specific user under contract undergoes a period of testing by the user before acceptance. This is known as user acceptance testing and is useful to debug the software in the user's operational circumstance. In this paper we first present a simple non-homogeneous Poisson process (NHPP)-based software reliability model to assess the quantitative software reliability under the user acceptance test, where the idea of an accelerated life testing model is introduced to represent the user's operational phase and to investigate the impact of user's acceptance test. This idea is applied to the reliability assessment of web applications in a different testing environment, where two stress tests with normal and higher workload conditions are executed in parallel. Through numerical examples with real software fault data observed in actual user acceptance and stress tests, we show the applicability of the software accelerated life testing model to two different software testing schemes.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128091904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Address Remapping for Static NUCA in NoC-Based Degradable Chip-Multiprocessors 基于noc的可降解芯片多处理器中静态NUCA的地址重映射
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.33
Ying Wang, Lei Zhang, Yinhe Han, Huawei Li, Xiaowei Li
Large scale Chip-Multiprocessors (CMPs) generally employ Network-on-Chip (NoC) to connect the last level cache (LLC), which is generally organized as distributed NUCA (non-uniform cache access) arrays for scalability and efficiency. On the other hand, aggressive technology scaling induces severe reliability problems, causing on-chip components (e.g., cores, cache banks, routers) failure due to manufacture defects or on-line hardware faults. Typical degradable CMPs should possess the ability to work around defects by disabling faulty components. For static NUCA architecture, when cache banks attached to a computing node are disabled, however, certain physical address sections will no longer be accessible. Prior approaches such as sets reduction introduced in Intel Xeon processor 7100 series enable turning off cache banks by masking certain sets bits in physical address1, which greatly wastes cache capacity. In this paper, we propose to tackle the above problem in a finer granularity to restrict the capacity loss in NUCA cache. Cache accesses to isolated nodes are redirected based on the utility-driven address remapping scheme that reduces data blocks conflicts in fault-tolerant shared-LLC. We evaluate our technique using GEMS simulator. Experimental results show that address remapping achieves significant improvement over the conventional cache sizing scheme.
大型芯片多处理器(cmp)通常采用片上网络(NoC)来连接最后一级缓存(LLC),为了可扩展性和效率,通常将其组织为分布式NUCA(非统一缓存访问)阵列。另一方面,激进的技术扩展会导致严重的可靠性问题,导致芯片上的组件(例如,核心,缓存库,路由器)由于制造缺陷或在线硬件故障而失效。典型的可降解cmp应该具有通过禁用有缺陷的组件来解决缺陷的能力。然而,对于静态NUCA架构,当连接到计算节点的缓存库被禁用时,某些物理地址段将不再可访问。先前的方法,如英特尔至强处理器7100系列中引入的集合减少,通过屏蔽物理地址1中的某些集合位来关闭缓存库,这极大地浪费了缓存容量。在本文中,我们建议在更细的粒度上解决上述问题,以限制NUCA缓存中的容量损失。基于实用程序驱动的地址重映射方案对隔离节点的缓存访问进行重定向,该方案减少了容错共享llc中的数据块冲突。我们使用GEMS模拟器来评估我们的技术。实验结果表明,地址重映射比传统的缓存大小方案有显著的改进。
{"title":"Address Remapping for Static NUCA in NoC-Based Degradable Chip-Multiprocessors","authors":"Ying Wang, Lei Zhang, Yinhe Han, Huawei Li, Xiaowei Li","doi":"10.1109/PRDC.2010.33","DOIUrl":"https://doi.org/10.1109/PRDC.2010.33","url":null,"abstract":"Large scale Chip-Multiprocessors (CMPs) generally employ Network-on-Chip (NoC) to connect the last level cache (LLC), which is generally organized as distributed NUCA (non-uniform cache access) arrays for scalability and efficiency. On the other hand, aggressive technology scaling induces severe reliability problems, causing on-chip components (e.g., cores, cache banks, routers) failure due to manufacture defects or on-line hardware faults. Typical degradable CMPs should possess the ability to work around defects by disabling faulty components. For static NUCA architecture, when cache banks attached to a computing node are disabled, however, certain physical address sections will no longer be accessible. Prior approaches such as sets reduction introduced in Intel Xeon processor 7100 series enable turning off cache banks by masking certain sets bits in physical address1, which greatly wastes cache capacity. In this paper, we propose to tackle the above problem in a finer granularity to restrict the capacity loss in NUCA cache. Cache accesses to isolated nodes are redirected based on the utility-driven address remapping scheme that reduces data blocks conflicts in fault-tolerant shared-LLC. We evaluate our technique using GEMS simulator. Experimental results show that address remapping achieves significant improvement over the conventional cache sizing scheme.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115297014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Towards a Language for Communication among Stakeholders 利益相关者之间的沟通语言
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.47
Y. Matsuno, J. Nakazawa, M. Takeyama, Midori Sugaya, Y. Ishikawa
Computers are now present almost everywhere and connected into ever more complex networks. This means not only that embedded systems are more complicated, but also that communication among the diverse stakeholders of systems is much harder than before. This paper introduces the D-Case approach to a systematic explanation of embedded-systems dependability. A D-Case is a structured document that argues for the dependability of a system, supported by evidence. This extends the notion of •textit{safety cases} •cite{BB98} commonly used in (European) safety-critical sectors. The goal is to develop the D-Case language for communication systems dependability among the stakeholders. The paper reports the experience in constructing a D-Case for the remote test surveillance system developed to demonstrate certain dependability system components. D-Case construction is shown to be an effective method in explaining how each system component contributes to the overall dependability of the system. Another experiment shows how the D-Case approach can promote dependability through the life cycle of a larger system. Finally, the paper presents some comments on the difficulties and insights for future work.
计算机现在几乎无处不在,并连接到越来越复杂的网络中。这意味着不仅嵌入式系统更加复杂,而且系统的不同涉众之间的沟通也比以前困难得多。本文介绍了D-Case方法对嵌入式系统可靠性的系统解释。D-Case是一种结构化的文档,它论证了系统的可靠性,并有证据支持。这扩展了(欧洲)安全关键部门常用的•文本{安全案例}•引用{BB98}的概念。目标是为涉众之间的通信系统可靠性开发D-Case语言。本文介绍了为演示系统组件的可靠性而开发的远程测试监控系统的D-Case的构建经验。D-Case构造被证明是解释每个系统组件如何对系统的整体可靠性做出贡献的有效方法。另一个实验显示了D-Case方法如何在一个更大的系统的生命周期中提高可靠性。最后,对今后工作的难点和设想提出了自己的看法。
{"title":"Towards a Language for Communication among Stakeholders","authors":"Y. Matsuno, J. Nakazawa, M. Takeyama, Midori Sugaya, Y. Ishikawa","doi":"10.1109/PRDC.2010.47","DOIUrl":"https://doi.org/10.1109/PRDC.2010.47","url":null,"abstract":"Computers are now present almost everywhere and connected into ever more complex networks. This means not only that embedded systems are more complicated, but also that communication among the diverse stakeholders of systems is much harder than before. This paper introduces the D-Case approach to a systematic explanation of embedded-systems dependability. A D-Case is a structured document that argues for the dependability of a system, supported by evidence. This extends the notion of •textit{safety cases} •cite{BB98} commonly used in (European) safety-critical sectors. The goal is to develop the D-Case language for communication systems dependability among the stakeholders. The paper reports the experience in constructing a D-Case for the remote test surveillance system developed to demonstrate certain dependability system components. D-Case construction is shown to be an effective method in explaining how each system component contributes to the overall dependability of the system. Another experiment shows how the D-Case approach can promote dependability through the life cycle of a larger system. Finally, the paper presents some comments on the difficulties and insights for future work.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":" 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120830489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Sequential Frequency Vector Based System Call Anomaly Detection 基于顺序频率矢量的系统调用异常检测
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.26
Ying Wu, Jianhui Jiang, L. Kong
Although either of temporal ordering and frequency distribution information embedded in process traces can profile normal process behaviors, but none of ever published schemes uses both of them to detect system call anomaly. This paper claims combining those two kinds of useful information can improve detection performance and firstly proposes sequential frequency vector (SFV) to exploit both temporal ordering and frequency information for system call anomaly detection. Extensive experiments on DARPA-1998 and UNM dataset have substantiated the claim. It is shown that SFV contains richer information and significantly outperforms other techniques in achieving lower false positive rates at 100% detection rate.
虽然进程跟踪中嵌入的时间顺序和频率分布信息中的任何一个都可以分析正常的进程行为,但是没有一个已发布的方案同时使用它们来检测系统调用异常。本文认为将这两种有用信息结合起来可以提高系统调用异常检测的性能,并首次提出了时序频率矢量(SFV)来同时利用时序和频率信息进行系统调用异常检测。在DARPA-1998和UNM数据集上的大量实验证实了这一说法。结果表明,SFV包含更丰富的信息,并且在100%的检测率下实现更低的假阳性率方面明显优于其他技术。
{"title":"Sequential Frequency Vector Based System Call Anomaly Detection","authors":"Ying Wu, Jianhui Jiang, L. Kong","doi":"10.1109/PRDC.2010.26","DOIUrl":"https://doi.org/10.1109/PRDC.2010.26","url":null,"abstract":"Although either of temporal ordering and frequency distribution information embedded in process traces can profile normal process behaviors, but none of ever published schemes uses both of them to detect system call anomaly. This paper claims combining those two kinds of useful information can improve detection performance and firstly proposes sequential frequency vector (SFV) to exploit both temporal ordering and frequency information for system call anomaly detection. Extensive experiments on DARPA-1998 and UNM dataset have substantiated the claim. It is shown that SFV contains richer information and significantly outperforms other techniques in achieving lower false positive rates at 100% detection rate.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124135869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Secure System-Wide Process Scheduler across Virtual Machines 跨虚拟机的安全系统范围进程调度程序
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.34
H. Tadokoro, Kenichi Kourai, S. Chiba
Server consolidation using virtual machines (VMs) makes it difficult to execute processes as the administrators intend. A process scheduler in each VM is not aware of the other VM and schedules only processes in one VM independently. To solve this problem, process scheduling across VMs is necessary. However, such system-wide scheduling is vulnerable to denial-of-service (DoS) attacks from a compromised VM against the other VMs. In this paper, we propose the Monarch scheduler, which is a secure system-wide process scheduler running in the virtual machine monitor (VMM). The Monarch scheduler monitors the execution of processes and changes the scheduling behavior in all VMs. To change process scheduling from the VMM, it manipulates run queues and process states consistently without modifying guest operating systems. Its hybrid scheduling mitigates DoS attacks by leveraging performance isolation among VMs. We confirmed that the Monarch scheduler could achieve useful scheduling and the overheads were small.
使用虚拟机(vm)进行服务器整合使得难以按照管理员的意图执行进程。每个VM中的进程调度器不知道其他VM,只独立调度一个VM中的进程。为了解决这个问题,需要跨虚拟机进行进程调度。但是,这种系统范围的调度很容易受到来自受损虚拟机对其他虚拟机的拒绝服务攻击。在本文中,我们提出了一个运行在虚拟机监视器(VMM)中的安全的系统级进程调度程序——君主调度程序。Monarch调度程序监控进程的执行情况,并改变所有虚拟机的调度行为。为了从VMM更改进程调度,它在不修改客户机操作系统的情况下一致地操作运行队列和进程状态。它的混合调度通过利用虚拟机之间的性能隔离来减轻DoS攻击。我们证实,君主调度器可以实现有用的调度,开销很小。
{"title":"A Secure System-Wide Process Scheduler across Virtual Machines","authors":"H. Tadokoro, Kenichi Kourai, S. Chiba","doi":"10.1109/PRDC.2010.34","DOIUrl":"https://doi.org/10.1109/PRDC.2010.34","url":null,"abstract":"Server consolidation using virtual machines (VMs) makes it difficult to execute processes as the administrators intend. A process scheduler in each VM is not aware of the other VM and schedules only processes in one VM independently. To solve this problem, process scheduling across VMs is necessary. However, such system-wide scheduling is vulnerable to denial-of-service (DoS) attacks from a compromised VM against the other VMs. In this paper, we propose the Monarch scheduler, which is a secure system-wide process scheduler running in the virtual machine monitor (VMM). The Monarch scheduler monitors the execution of processes and changes the scheduling behavior in all VMs. To change process scheduling from the VMM, it manipulates run queues and process states consistently without modifying guest operating systems. Its hybrid scheduling mitigates DoS attacks by leveraging performance isolation among VMs. We confirmed that the Monarch scheduler could achieve useful scheduling and the overheads were small.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128997504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Design and Implementation of a Fault Tolerant Single IP Address Cluster 一个容错单IP地址集群的设计与实现
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.39
Jun Kato, H. Fujita, Y. Ishikawa
An F-FTCS mechanism that develops a fault tolerant single IP address cluster for TCP applications is proposed. The FTCS mechanism performs fine grain load balancing by handling all incoming TCP connection requests with a master node. Three fail-over algorithms are designed and implemented to carry out the fault tolerant FTCS mechanism. Discarding and Gathering Algorithms discard and gather TCP connections whose state is SYN-RECEIVED, respectively, at failure. A Scattering Algorithm synchronizes the information between nodes in the failure-free phase. These three algorithms are evaluated on Core 2 Duo machines. The Discarding Algorithm recovers from a failure from 440 to 950 msec earlier than the Gathering Algorithm, but it requires reprocessing the discarded TCP connection requests. The Scattering Algorithm requires from 120 to 160 usec more overhead during processing of a TCP connection request than that of the original FTCS mechanism.
提出了一种为TCP应用开发容错单IP地址集群的F-FTCS机制。FTCS机制通过主节点处理所有传入的TCP连接请求来执行细粒度负载平衡。设计并实现了三种故障转移算法来实现容错的FTCS机制。丢弃和收集算法分别对状态为SYN-RECEIVED的TCP连接进行丢弃和收集。散射算法在无故障阶段同步节点间的信息。这三种算法在Core 2 Duo机器上进行了评估。丢弃算法从失败中恢复的时间比收集算法早440 ~ 950毫秒,但需要重新处理丢弃的TCP连接请求。在处理一个TCP连接请求时,散射算法比原始的FTCS机制需要多120 ~ 160秒的开销。
{"title":"Design and Implementation of a Fault Tolerant Single IP Address Cluster","authors":"Jun Kato, H. Fujita, Y. Ishikawa","doi":"10.1109/PRDC.2010.39","DOIUrl":"https://doi.org/10.1109/PRDC.2010.39","url":null,"abstract":"An F-FTCS mechanism that develops a fault tolerant single IP address cluster for TCP applications is proposed. The FTCS mechanism performs fine grain load balancing by handling all incoming TCP connection requests with a master node. Three fail-over algorithms are designed and implemented to carry out the fault tolerant FTCS mechanism. Discarding and Gathering Algorithms discard and gather TCP connections whose state is SYN-RECEIVED, respectively, at failure. A Scattering Algorithm synchronizes the information between nodes in the failure-free phase. These three algorithms are evaluated on Core 2 Duo machines. The Discarding Algorithm recovers from a failure from 440 to 950 msec earlier than the Gathering Algorithm, but it requires reprocessing the discarded TCP connection requests. The Scattering Algorithm requires from 120 to 160 usec more overhead during processing of a TCP connection request than that of the original FTCS mechanism.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133485006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On the Reliability of Cascaded TMR Systems 级联TMR系统可靠性研究
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.45
Masashi Hamamatsu, Tatsuhiro Tsuchiya, T. Kikuno
Triple modular redundancy (TMR) is a well-known technique for building fault-tolerant systems. In TMR, a module unit is triplicated, and the outputs of these three units are compared by a voter. In this paper we consider systems that consist of multiple TMR units in series. Only recently has it been found that even such simple systems can be configured into various structures. We propose (i) a method of calculating the reliability of cascaded TMR systems and (ii) an algorithm for finding a structure that maximizes reliability. The algorithm uses the branch and bound search algorithm, where candidate solutions are evaluated by means of the proposed reliability calculation method. We also show that some new structures have optimal reliability within some ranges of voter and module reliability.
三模冗余(TMR)是构建容错系统的一种众所周知的技术。在TMR中,一个模块单元是三倍的,这三个单元的输出由投票人进行比较。在本文中,我们考虑由多个串联的TMR单元组成的系统。直到最近才发现,即使是这样简单的系统也可以配置成各种结构。我们提出(i)一种计算级联TMR系统可靠性的方法和(ii)一种寻找最大可靠性结构的算法。该算法采用分支定界搜索算法,并利用所提出的可靠性计算方法对候选解进行评估。我们还证明了一些新结构在一定范围内具有最优可靠度。
{"title":"On the Reliability of Cascaded TMR Systems","authors":"Masashi Hamamatsu, Tatsuhiro Tsuchiya, T. Kikuno","doi":"10.1109/PRDC.2010.45","DOIUrl":"https://doi.org/10.1109/PRDC.2010.45","url":null,"abstract":"Triple modular redundancy (TMR) is a well-known technique for building fault-tolerant systems. In TMR, a module unit is triplicated, and the outputs of these three units are compared by a voter. In this paper we consider systems that consist of multiple TMR units in series. Only recently has it been found that even such simple systems can be configured into various structures. We propose (i) a method of calculating the reliability of cascaded TMR systems and (ii) an algorithm for finding a structure that maximizes reliability. The algorithm uses the branch and bound search algorithm, where candidate solutions are evaluated by means of the proposed reliability calculation method. We also show that some new structures have optimal reliability within some ranges of voter and module reliability.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114834688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
Optimal Inventory of Computer Repair Parts: A Fuzzy Systems Approach 计算机维修零件的最优库存:一种模糊系统方法
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.38
L. Sztandera
The aim of this research is to use a data analysis/mining approach to extract information from a large number of failure equipment notifications, form a fuzzy system that would be capable of learning and optimizing the knowledge from historical evidence, and subsequently use it as a guiding tool in decision making processes.
本研究的目的是利用数据分析/挖掘方法从大量故障设备通知中提取信息,形成一个能够从历史证据中学习和优化知识的模糊系统,并将其作为决策过程中的指导工具。
{"title":"Optimal Inventory of Computer Repair Parts: A Fuzzy Systems Approach","authors":"L. Sztandera","doi":"10.1109/PRDC.2010.38","DOIUrl":"https://doi.org/10.1109/PRDC.2010.38","url":null,"abstract":"The aim of this research is to use a data analysis/mining approach to extract information from a large number of failure equipment notifications, form a fuzzy system that would be capable of learning and optimizing the knowledge from historical evidence, and subsequently use it as a guiding tool in decision making processes.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126275498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Distributed Data Replication Protocol for File Versioning with Optimal Node Assignments 基于最优节点分配的文件版本控制分布式数据复制协议
Pub Date : 2010-12-13 DOI: 10.1109/PRDC.2010.40
Takahiko Ikeda, Mamoru Ohara, S. Fukumoto, M. Arai, K. Iwasaki
Some cloud storage services have recently introduced file versioning features by which more than one version of a file can be maintained. For providing file versioning with limited storage resources, it is essential to divide the resources among versions in accordance with the varied needs of numerous users. In this paper, we focus on applications in which newer versions of a file are more likely to be requested, which may be true in the case of many subscription services. We propose a new distributed data replication protocol supporting the file versioning feature. We also construct an analytical model that can derive an optimal allocation of the resources when the total number of replica nodes in a system and the distribution of the frequency of read requests for each version are given. In addition, we present some numerical examples obtained by simulations to show the good scalability and dependability of our system by assuming some realistic parameters.
一些云存储服务最近引入了文件版本控制功能,通过该功能可以维护一个文件的多个版本。为了在有限的存储资源下提供文件版本控制,必须根据众多用户的不同需求将资源划分为不同的版本。在本文中,我们关注的是更有可能请求文件的新版本的应用程序,这在许多订阅服务的情况下可能是正确的。我们提出了一种支持文件版本控制特性的分布式数据复制协议。我们还构建了一个分析模型,当系统中副本节点总数和每个版本的读请求频率分布给定时,可以推导出资源的最优分配。此外,文中还给出了一些仿真算例,通过对实际参数的假设,说明了系统具有良好的可扩展性和可靠性。
{"title":"A Distributed Data Replication Protocol for File Versioning with Optimal Node Assignments","authors":"Takahiko Ikeda, Mamoru Ohara, S. Fukumoto, M. Arai, K. Iwasaki","doi":"10.1109/PRDC.2010.40","DOIUrl":"https://doi.org/10.1109/PRDC.2010.40","url":null,"abstract":"Some cloud storage services have recently introduced file versioning features by which more than one version of a file can be maintained. For providing file versioning with limited storage resources, it is essential to divide the resources among versions in accordance with the varied needs of numerous users. In this paper, we focus on applications in which newer versions of a file are more likely to be requested, which may be true in the case of many subscription services. We propose a new distributed data replication protocol supporting the file versioning feature. We also construct an analytical model that can derive an optimal allocation of the resources when the total number of replica nodes in a system and the distribution of the frequency of read requests for each version are given. In addition, we present some numerical examples obtained by simulations to show the good scalability and dependability of our system by assuming some realistic parameters.","PeriodicalId":382974,"journal":{"name":"2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126356889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2010 IEEE 16th Pacific Rim International Symposium on Dependable Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1