首页 > 最新文献

Proceedings. International Conference on Dependable Systems and Networks最新文献

英文 中文
Stepwise construction and refinement of dependability models 逐步构建和改进可靠性模型
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028944
Cláudia Betous-Almeida, K. Kanoun
This paper presents a stepwise approach for dependability modeling, based on Generalized Stochastic Petri Nets (GSPNs). The first-step model called functional-level model, can be built as early as system functional specifications and then completed by the structural model as soon as the system architecture is known, even at a very high level. The latter can be refitted according to three different aspects: component decomposition, state and event fine-tuning and distribution adjustment to take into account increasing event rates. We define specific rules to make the successive transformations as easy and systematic as possible. This approach allows the various dependencies to be taken into account at the right level of abstraction: functional dependency, structural dependency and those induced by non-exponential distributions. A part of the approach is applied to an instrumentation and control system (I&C) in power plants.
本文提出了一种基于广义随机Petri网(GSPNs)的可靠性逐步建模方法。第一步模型称为功能级模型,可以在系统功能规格说明时建立,然后在系统架构已知时,甚至在非常高的级别上,由结构模型完成。后者可以根据三个不同的方面进行调整:组件分解、状态和事件微调以及考虑到事件率增加的分布调整。我们定义了特定的规则,使连续的转换尽可能简单和系统。这种方法允许在适当的抽象层次上考虑各种依赖关系:功能依赖、结构依赖和由非指数分布引起的依赖关系。该方法的一部分应用于电厂的仪表和控制系统。
{"title":"Stepwise construction and refinement of dependability models","authors":"Cláudia Betous-Almeida, K. Kanoun","doi":"10.1109/DSN.2002.1028944","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028944","url":null,"abstract":"This paper presents a stepwise approach for dependability modeling, based on Generalized Stochastic Petri Nets (GSPNs). The first-step model called functional-level model, can be built as early as system functional specifications and then completed by the structural model as soon as the system architecture is known, even at a very high level. The latter can be refitted according to three different aspects: component decomposition, state and event fine-tuning and distribution adjustment to take into account increasing event rates. We define specific rules to make the successive transformations as easy and systematic as possible. This approach allows the various dependencies to be taken into account at the right level of abstraction: functional dependency, structural dependency and those induced by non-exponential distributions. A part of the approach is applied to an instrumentation and control system (I&C) in power plants.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"1 1","pages":"515-524"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89586054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Optimizing buffer management for reliable multicast 优化缓冲区管理的可靠组播
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028899
Zhen Xiao, K. Birman, R. V. Renesse
Reliable multicast delivery requires that a multicast message be received by all members in a group. Hence certain or all members need to buffer messages for possible retransmissions. Designing an efficient buffer management algorithm is challenging in large multicast groups where no member has complete group membership information and the delivery latency to different members could differ by orders of magnitude. We propose an innovative two-phase buffering algorithm, which explicitly addresses variations in delivery latency seen in large multicast groups. The algorithm effectively reduces buffer requirements by adaptively allocating buffer space to messages most needed in the system and by spreading the load of buffering among all members in the group. Simulation and experimental results demonstrate that the algorithm has good performance.
可靠的组播传递要求组播消息被组中的所有成员接收。因此,某些或所有成员需要缓冲消息以备可能的重传。在大型多播组中,由于没有成员拥有完整的组成员信息,并且传递到不同成员的延迟可能会有数量级的差异,因此设计有效的缓冲区管理算法是一项挑战。我们提出了一种创新的两阶段缓冲算法,它明确地解决了大型多播组中传输延迟的变化。该算法通过自适应地将缓冲区空间分配给系统中最需要的消息,并在组中的所有成员之间分散缓冲负载,有效地减少了缓冲区需求。仿真和实验结果表明,该算法具有良好的性能。
{"title":"Optimizing buffer management for reliable multicast","authors":"Zhen Xiao, K. Birman, R. V. Renesse","doi":"10.1109/DSN.2002.1028899","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028899","url":null,"abstract":"Reliable multicast delivery requires that a multicast message be received by all members in a group. Hence certain or all members need to buffer messages for possible retransmissions. Designing an efficient buffer management algorithm is challenging in large multicast groups where no member has complete group membership information and the delivery latency to different members could differ by orders of magnitude. We propose an innovative two-phase buffering algorithm, which explicitly addresses variations in delivery latency seen in large multicast groups. The algorithm effectively reduces buffer requirements by adaptively allocating buffer space to messages most needed in the system and by spreading the load of buffering among all members in the group. Simulation and experimental results demonstrate that the algorithm has good performance.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"6 1","pages":"187-196"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89712026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Impact of deep submicron technology on dependability of VLSI circuits 深亚微米技术对超大规模集成电路可靠性的影响
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028901
C. Constantinescu
Advances in semiconductor technology have led to impressive performance gains of VLSI circuits, in general, and microprocessors, in particular. However, smaller transistor and interconnect dimensions, lower power voltages, and higher operating frequencies have contributed to increased rates of occurrence of transient and intermittent faults. We address the impact of deep submicron technology on permanent, transient and intermittent classes of faults, and discuss the main trends in circuit dependability. Two case studies exemplify this analysis. The first one deals with intermittent faults induced by manufacturing residuals. The second case study shows that transients generated by timing violations are capable of silently corrupting data. It is concluded that the semiconductor industry is approaching a new stage in the design and manufacturing of VLSI circuits. Fault-tolerance features, specific to custom designed computers, have to be integrated into commercial-off-the-shelf (COTS) VLSI systems in the future, in order to preserve data integrity and limit the impact of transient and intermittent faults.
半导体技术的进步使VLSI电路的性能得到了显著提高,尤其是微处理器。然而,更小的晶体管和互连尺寸、更低的电源电压和更高的工作频率导致瞬态和间歇性故障的发生率增加。我们讨论了深亚微米技术对永久性、暂态和间歇性故障的影响,并讨论了电路可靠性的主要趋势。两个案例研究证明了这一分析。第一种方法处理由制造残余引起的间歇故障。第二个案例研究表明,由时间冲突生成的瞬态能够静默地破坏数据。结论是,半导体工业在超大规模集成电路的设计和制造方面正在进入一个新的阶段。为了保持数据完整性并限制瞬态和间歇性故障的影响,未来必须将定制设计计算机的容错功能集成到商用现货(COTS) VLSI系统中。
{"title":"Impact of deep submicron technology on dependability of VLSI circuits","authors":"C. Constantinescu","doi":"10.1109/DSN.2002.1028901","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028901","url":null,"abstract":"Advances in semiconductor technology have led to impressive performance gains of VLSI circuits, in general, and microprocessors, in particular. However, smaller transistor and interconnect dimensions, lower power voltages, and higher operating frequencies have contributed to increased rates of occurrence of transient and intermittent faults. We address the impact of deep submicron technology on permanent, transient and intermittent classes of faults, and discuss the main trends in circuit dependability. Two case studies exemplify this analysis. The first one deals with intermittent faults induced by manufacturing residuals. The second case study shows that transients generated by timing violations are capable of silently corrupting data. It is concluded that the semiconductor industry is approaching a new stage in the design and manufacturing of VLSI circuits. Fault-tolerance features, specific to custom designed computers, have to be integrated into commercial-off-the-shelf (COTS) VLSI systems in the future, in order to preserve data integrity and limit the impact of transient and intermittent faults.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"128 1","pages":"205-209"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76398610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 197
Masquerade detection using truncated command lines 使用截断的命令行进行伪装检测
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028903
R. Maxion, T. Townsend
A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecting significant departures from normal user behavior, as represented by a user profile formed from system audit data. While the success of this approach has been limited, the reasons for its unsatisfying performance are not obvious, possibly because most reports do not elucidate the origins of errors made by the detection mechanisms. This paper takes as its point of departure a recent series of experiments framed by Schonlau et al. (2001). In extending that work with a new classification algorithm, a 56% improvement in masquerade detection was achieved at a corresponding false-alarm rate of 1.3%. A detailed error analysis, based on an alternative data configuration, reveals why some users are good masqueraders and others are not.
伪装攻击,即一个用户冒充另一个用户,可能是最严重的计算机滥用形式。有时通过检测与正常用户行为的重大偏离来自动发现伪装者,如由系统审计数据形成的用户配置文件所表示的那样。虽然这种方法的成功是有限的,但其不令人满意的性能的原因并不明显,可能是因为大多数报告没有阐明检测机制所犯错误的根源。本文以Schonlau et al.(2001)最近的一系列实验为出发点。在用一种新的分类算法扩展这项工作时,假面检测的效率提高了56%,相应的误报率为1.3%。基于另一种数据配置的详细错误分析揭示了为什么有些用户是好的伪装者,而有些则不是。
{"title":"Masquerade detection using truncated command lines","authors":"R. Maxion, T. Townsend","doi":"10.1109/DSN.2002.1028903","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028903","url":null,"abstract":"A masquerade attack, in which one user impersonates another, can be the most serious form of computer abuse. Automatic discovery of masqueraders is sometimes undertaken by detecting significant departures from normal user behavior, as represented by a user profile formed from system audit data. While the success of this approach has been limited, the reasons for its unsatisfying performance are not obvious, possibly because most reports do not elucidate the origins of errors made by the detection mechanisms. This paper takes as its point of departure a recent series of experiments framed by Schonlau et al. (2001). In extending that work with a new classification algorithm, a 56% improvement in masquerade detection was achieved at a corresponding false-alarm rate of 1.3%. A detailed error analysis, based on an alternative data configuration, reveals why some users are good masqueraders and others are not.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"16 1","pages":"219-228"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75130793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 255
Self-organizing systems with self-diagnosability 具有自诊断的自组织系统
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1029021
Kiyoaki Yoshida, T. Kohda, Y. Sujaku
Constructing a system capable of functioning without any human support over an extended period is the aim of many engineers. However it is generally considered to be difficult to make decentralized self-organizing autonomous system fault-tolerant. In this paper, we propose to apply the theory of highly structured self-diagnosable systems to this problem. As an example, we apply the theory and recursive procedures method of fault-tolerant system construction to a decentralized self-organizing autonomous robotic system that forms a circle. The result of simulation shows the usefulness of the proposed method. The highly structured self-diagnosable system has an O(|E|)fault-identification algorithm that can diagnose each of the units in the system independently, locally and in any order, where E and |E| mean the set of the directed edges and its cardinality, respectively.
构建一个能够在没有任何人类支持的情况下长时间运行的系统是许多工程师的目标。然而,通常认为去中心化自组织自治系统很难实现容错。在本文中,我们提出将高度结构化自诊断系统理论应用于这一问题。作为一个例子,我们将容错系统构造的理论和递归过程方法应用于一个分散的自组织圆形自治机器人系统。仿真结果表明了该方法的有效性。高度结构化的自诊断系统具有O(|E|)故障识别算法,该算法可以独立地、局部地、任意顺序地诊断系统中的每个单元,其中E和|E|分别表示有向边集及其基数。
{"title":"Self-organizing systems with self-diagnosability","authors":"Kiyoaki Yoshida, T. Kohda, Y. Sujaku","doi":"10.1109/DSN.2002.1029021","DOIUrl":"https://doi.org/10.1109/DSN.2002.1029021","url":null,"abstract":"Constructing a system capable of functioning without any human support over an extended period is the aim of many engineers. However it is generally considered to be difficult to make decentralized self-organizing autonomous system fault-tolerant. In this paper, we propose to apply the theory of highly structured self-diagnosable systems to this problem. As an example, we apply the theory and recursive procedures method of fault-tolerant system construction to a decentralized self-organizing autonomous robotic system that forms a circle. The result of simulation shows the usefulness of the proposed method. The highly structured self-diagnosable system has an O(|E|)fault-identification algorithm that can diagnose each of the units in the system independently, locally and in any order, where E and |E| mean the set of the directed edges and its cardinality, respectively.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"56 1","pages":"755-762"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73080065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Small byzantine quorum systems 小型拜占庭仲裁系统
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028922
Jean-Philippe Martin, L. Alvisi, M. Dahlin
In this paper we present two protocols for asynchronous Byzantine quorum systems (BQS) built on top of reliable channels-one for self-verifying data and the other for any data. Our protocols tolerate f Byzantine failures with f fewer servers than existing solutions by eliminating nonessential work in the write protocol and by using read and write quorums of different sizes. Since engineering a reliable network layer on an unreliable network is difficult, two other possibilities must be explored. The first is to strengthen the model by allowing synchronous networks that use time-outs to identify failed links or machines. We consider running synchronous and asynchronous Byzantine quorum protocols over synchronous networks and conclude that, surprisingly, "self-timing" asynchronous Byzantine protocols may offer significant advantages for many synchronous networks when network time-outs are long. We show how to extend an existing Byzantine quorum protocol to eliminate its dependency on reliable networking and to handle message loss and retransmission explicitly.
本文提出了建立在可靠通道之上的异步拜占庭仲裁系统(BQS)的两种协议——一种用于自验证数据,另一种用于任何数据。通过消除写协议中不必要的工作以及使用不同大小的读写仲裁,我们的协议可以在比现有解决方案更少的服务器上容忍拜占庭式故障。由于在不可靠的网络上设计可靠的网络层是困难的,因此必须探索另外两种可能性。首先是通过允许使用超时来识别故障链接或机器的同步网络来加强模型。我们考虑在同步网络上运行同步和异步拜占庭仲裁协议,并得出结论,令人惊讶的是,当网络超时时间很长时,“自定时”异步拜占庭协议可能为许多同步网络提供显著的优势。我们将展示如何扩展现有的拜占庭仲裁协议,以消除其对可靠网络的依赖,并显式地处理消息丢失和重传。
{"title":"Small byzantine quorum systems","authors":"Jean-Philippe Martin, L. Alvisi, M. Dahlin","doi":"10.1109/DSN.2002.1028922","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028922","url":null,"abstract":"In this paper we present two protocols for asynchronous Byzantine quorum systems (BQS) built on top of reliable channels-one for self-verifying data and the other for any data. Our protocols tolerate f Byzantine failures with f fewer servers than existing solutions by eliminating nonessential work in the write protocol and by using read and write quorums of different sizes. Since engineering a reliable network layer on an unreliable network is difficult, two other possibilities must be explored. The first is to strengthen the model by allowing synchronous networks that use time-outs to identify failed links or machines. We consider running synchronous and asynchronous Byzantine quorum protocols over synchronous networks and conclude that, surprisingly, \"self-timing\" asynchronous Byzantine protocols may offer significant advantages for many synchronous networks when network time-outs are long. We show how to extend an existing Byzantine quorum protocol to eliminate its dependency on reliable networking and to handle message loss and retransmission explicitly.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":" 18","pages":"374-383"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1109/DSN.2002.1028922","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72382574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
Quantifying the cost of providing intrusion tolerance in group communication systems 在群通信系统中提供入侵容忍的量化成本
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028904
H. Ramasamy, P. Pandey, J. Lyons, M. Cukier, W. Sanders
Group communication systems that provide consistent group membership and reliable, ordered multicast properties in the presence of faults resulting from malicious intrusions have not been analyzed extensively to quantify the cost of tolerating these intrusions. This paper attempts to quantify this cost by presenting results from an experimental evaluation of three new intrusion-tolerant microprotocols that have been added to an existing crash-fault-tolerant group communication system. The results are analyzed to identify the parts that contribute the most overhead during provision of intrusion tolerance at the group communication system level.
在存在恶意入侵导致的故障时,提供一致的组成员和可靠、有序的多播特性的组通信系统还没有被广泛地分析,以量化容忍这些入侵的成本。本文试图通过对添加到现有容错组通信系统中的三种新的容错微协议的实验评估结果来量化这种成本。对结果进行分析,以确定在组通信系统级别提供入侵容忍期间贡献最大开销的部分。
{"title":"Quantifying the cost of providing intrusion tolerance in group communication systems","authors":"H. Ramasamy, P. Pandey, J. Lyons, M. Cukier, W. Sanders","doi":"10.1109/DSN.2002.1028904","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028904","url":null,"abstract":"Group communication systems that provide consistent group membership and reliable, ordered multicast properties in the presence of faults resulting from malicious intrusions have not been analyzed extensively to quantify the cost of tolerating these intrusions. This paper attempts to quantify this cost by presenting results from an experimental evaluation of three new intrusion-tolerant microprotocols that have been added to an existing crash-fault-tolerant group communication system. The results are analyzed to identify the parts that contribute the most overhead during provision of intrusion tolerance at the group communication system level.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"197 1","pages":"229-238"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79932977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 61
Process modelling to support dependability arguments 流程建模以支持可靠性参数
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028892
R. Bloomfield, S. Guerra
Reports work to support dependability arguments about the future reliability of a product before there is direct empirical evidence. We develop a method for estimating the number of residual faults at the time of release from a "barrier model" of the development process, where in each phase faults are created or detected. These estimates can be used in a conservative theory in which a reliability bound can be obtained or can be used to support arguments of fault freeness. We present the work done to demonstrate that the model can be applied in practice. A company that develops safety-critical systems provided access to two projects as well as data over a wide range of past projects. The software development process as enacted was determined and we developed a number of probabilistic process models calibrated with generic data from the literature and from the company projects. The predictive power of the various models was compared.
在有直接的经验证据之前,报告的工作是支持关于产品未来可靠性的可靠性论点。我们开发了一种方法,用于在开发过程的“屏障模型”释放时估计剩余故障的数量,在每个阶段中都创建或检测故障。这些估计可以用在保守理论中,在保守理论中可以得到可靠性界,或者可以用来支持无故障的论点。为了证明该模型在实际中是可以应用的,我们给出了所做的工作。一家开发安全关键系统的公司提供了两个项目的访问权限以及过去项目的广泛数据。制定的软件开发过程是确定的,我们开发了许多概率过程模型,这些模型使用来自文献和公司项目的通用数据进行校准。比较了各种模型的预测能力。
{"title":"Process modelling to support dependability arguments","authors":"R. Bloomfield, S. Guerra","doi":"10.1109/DSN.2002.1028892","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028892","url":null,"abstract":"Reports work to support dependability arguments about the future reliability of a product before there is direct empirical evidence. We develop a method for estimating the number of residual faults at the time of release from a \"barrier model\" of the development process, where in each phase faults are created or detected. These estimates can be used in a conservative theory in which a reliability bound can be obtained or can be used to support arguments of fault freeness. We present the work done to demonstrate that the model can be applied in practice. A company that develops safety-critical systems provided access to two projects as well as data over a wide range of past projects. The software development process as enacted was determined and we developed a number of probabilistic process models calibrated with generic data from the literature and from the company projects. The predictive power of the various models was compared.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"66 1","pages":"113-122"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90291499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Reliability and survivability in the Reduced Ship's Crew by Virtual Presence system 基于虚拟存在系统的减员舰船可靠性与生存能力研究
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1028900
Gary Schwartz
The Reduced Ship's Crew by Virtual Presence Advanced Technology Demonstration was a 3-year program (1999-2001) to show the feasibility of employing wireless sensors on naval ships. Environmental, structural, personnel, and machinery sensors were demonstrated. This paper describes the RSVP architecture, highlighting the aspects of the architecture that contribute to the system's reliability and survivability. It also describes the demonstrations that were performed and their results.
虚拟存在先进技术演示减少舰员是一个为期3年的计划(1999-2001年),以显示在海军舰艇上使用无线传感器的可行性。演示了环境、结构、人员和机械传感器。本文描述了RSVP体系结构,重点介绍了体系结构中有助于提高系统可靠性和生存性的方面。它还描述了所执行的演示及其结果。
{"title":"Reliability and survivability in the Reduced Ship's Crew by Virtual Presence system","authors":"Gary Schwartz","doi":"10.1109/DSN.2002.1028900","DOIUrl":"https://doi.org/10.1109/DSN.2002.1028900","url":null,"abstract":"The Reduced Ship's Crew by Virtual Presence Advanced Technology Demonstration was a 3-year program (1999-2001) to show the feasibility of employing wireless sensors on naval ships. Environmental, structural, personnel, and machinery sensors were demonstrated. This paper describes the RSVP architecture, highlighting the aspects of the architecture that contribute to the system's reliability and survivability. It also describes the demonstrations that were performed and their results.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"5 1","pages":"199-204"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79522911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Parallel randomization for large structured Markov chains 大型结构马尔可夫链的并行随机化
Pub Date : 2002-06-23 DOI: 10.1109/DSN.2002.1029011
P. Kemper
Multiprocessor architectures with few but powerful processors are gaining more and more popularity. We describe a parallel iterative algorithm to perform randomization for a continuous time Markov chain with a Kronecker representation on a shared memory architecture. The Kronecker representation is modified for a parallel matrix-vector multiplication with a fast multiplication scheme and no write conflicts on iteration vectors. The proposed technique is applied on a model of a workstation cluster for dependability analysis, corresponding computations are performed on two multiprocessor architectures, a Sun enterprise and a SGI Origin 2000 to measure its performance.
具有少量但功能强大的处理器的多处理器体系结构越来越受欢迎。我们描述了一种并行迭代算法,用于在共享内存架构上对具有Kronecker表示的连续时间马尔可夫链进行随机化。对Kronecker表示进行了改进,实现了矩阵-向量并行乘法的快速乘法方案,并且迭代向量上没有写冲突。将该技术应用于一个工作站集群模型进行可靠性分析,并在Sun enterprise和SGI Origin 2000两种多处理器架构上进行了相应的计算,以测量其性能。
{"title":"Parallel randomization for large structured Markov chains","authors":"P. Kemper","doi":"10.1109/DSN.2002.1029011","DOIUrl":"https://doi.org/10.1109/DSN.2002.1029011","url":null,"abstract":"Multiprocessor architectures with few but powerful processors are gaining more and more popularity. We describe a parallel iterative algorithm to perform randomization for a continuous time Markov chain with a Kronecker representation on a shared memory architecture. The Kronecker representation is modified for a parallel matrix-vector multiplication with a fast multiplication scheme and no write conflicts on iteration vectors. The proposed technique is applied on a model of a workstation cluster for dependability analysis, corresponding computations are performed on two multiprocessor architectures, a Sun enterprise and a SGI Origin 2000 to measure its performance.","PeriodicalId":93807,"journal":{"name":"Proceedings. International Conference on Dependable Systems and Networks","volume":"17 1","pages":"657-666"},"PeriodicalIF":0.0,"publicationDate":"2002-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79223694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Proceedings. International Conference on Dependable Systems and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1