引水渠 发表于 2025-3-23 12:52:28

http://reply.papertrans.cn/27/2658/265719/265719_11.png

Congeal 发表于 2025-3-23 15:08:52

https://doi.org/10.1007/978-1-4612-4426-4under general (and thus hard) fault assumptions. Known signature methods contribute to more efficient solutions by protecting forwarded information from being altered undetectably. This paper presents a new signature generation technique, which prevents the occurrence of malicious Byzantine faults i

Postmenopause 发表于 2025-3-23 19:16:29

Bifurcations of Periodic Equationsfailures. In previous studies it has been proved that this approach achieved better results than independent checkpointing and message logging. However, we need to know more about the real overhead of coordinated checkpointing and get sustained insights about the best way to implement this technique

一瞥 发表于 2025-3-23 23:05:39

https://doi.org/10.1007/978-94-010-0161-8the failure modes in the presence of injected faults (internal or external) and of the incorporation of wrappers to improve these failure modes. After a short classification of current microkernel architectures and of their interactions between the application layer and the microkernel functional co

持续 发表于 2025-3-24 04:02:41

https://doi.org/10.1007/978-94-010-0161-8ult/error handling mechanisms are becoming common features of today servers. This paper presents a new simulated fault injection method, which allows the assessment of the effectiveness of error detection mechanisms without using expensive test circuits. Fault injection was performed in two stages.

Hiatal-Hernia 发表于 2025-3-24 07:47:15

http://reply.papertrans.cn/27/2658/265719/265719_16.png

Calibrate 发表于 2025-3-24 14:06:56

http://reply.papertrans.cn/27/2658/265719/265719_17.png

殖民地 发表于 2025-3-24 17:02:01

Peter D. Blair,Ronald E. Millers: intrusiveness, also known as “probe effect”. In fact, for most fault models, additional code has to be run on the same processor that executes the application. The danger lies in some deadlines being missed as a consequence of that overhead..This paper identifies the sources of intrusiveness, and

不满分子 发表于 2025-3-24 21:56:45

Sirshendu Mondal,Achintya Mukhopadhyay worker more possibilities to intervene in the production process it is desirable to work close to the motions of the machine axis. Intelligent computer based systems are able to introduce new safety technologies into the machines. A close connection between motion control and safety monitoring can

Admire 发表于 2025-3-25 00:43:25

http://reply.papertrans.cn/27/2658/265719/265719_20.png
页: 1 [2] 3 4 5 6 7
查看完整版本: Titlebook: Dependable Computing - EDDC-3; Third European Depen Jan Hlavička,Erik Maehle,András Pataricza Conference proceedings 1999 Springer-Verlag B