Normal view MARC view ISBD view

Safety of Computer Control Systems 1986 (Safecomp '86) Trends in Safe Real Time Computer Systems : Proceedings of the Fifth IFAC Workshop, Sarlat, France, 14-17 October 1986

By: Quirk, W. J.
Material type: TextTextSeries: eBooks on Demand.IFAC Workshop Series: Publisher: Burlington : Elsevier Science, 2014Description: 1 online resource (202 p.).ISBN: 9781483299471.Subject(s): Automatic control -- Reliability -- Congresses | Computers -- Reliability -- Congresses | Fault-tolerant computing -- Congresses | Real-time control -- CongressesGenre/Form: Electronic books.Additional physical formats: Print version:: Safety of Computer Control Systems 1986 (Safecomp '86) Trends in Safe Real Time Computer Systems : Proceedings of the Fifth IFAC Workshop, Sarlat, France, 14-17 October 1986DDC classification: 629.8/95 | 629.895 LOC classification: TJ212.2 .I3394 2014Online resources: Click here to view this ebook.
Contents:
Front Cover; Safety of Computer Control Systems 1986 (SAFECOMP '86): Trends in Safe Real Time Computer Systems; Copyright Page; Preface; Table of Contents; SESSION 1: SOFTWARE QUALITY ASSURANCE; CHAPTER 1. SOME THOUGHTS ON SOFTWARE QUALITY ASSURANCE; INTRODUCTION; DEFINITIONS; DELIMITATION OF SOFTWARE QUALITY ASSURANCE; SYSTEM TESTING: AN EXAMPLE OF DELIMITATION; CONCLUSIONS; ACKNOWLEDGMENT; REFERENCES; CHAPTER 2. QUANTITATIVE ASSESSMENT OF SAFE AND RELIABLE SOFTWARE; INTRODUCTION; HOH TO MAKE SAFE SYSTEMS; ATTRIBUTES AND THEIR MEASURES; ASSESSMENT OF CRITICAL SOFTHARE
STANDARDS AND GUIDELINESCONCLUSIONS; REFERENCES; CHAPTER 3. MODELLING SYSTEM QUALITY; INTRODUCTION; MODELS; QUALITY; QUALITY MODELLING; QUALITY MODELLING OF SOFTWARE; CONCLUSIONS AND THE WAY AHEAD; REFERENCES; ACKNOWLEDGEMENTS; CHAPTER 4. PROGRAMMABLE ELECTRONIC SYSTEMS SAFETY: STANDARDS AND PRINCIPLES-AN INDUSTRIAL VIEWPOINT; INTRODUCTION; ICI's ROLE IN STANDARDS WORK; ICI's APPROACH TO THE SAFE USE OF PROGRAMMABLE ELECTRONIC SYSTEMS; CONCLUSIONS; REFERENCES; SESSION 2: SOFTWARE FAULT-TOLERANCE; CHAPTER 5. A RECOVERY BLOCK MODEL AND ITS ANALYSIS; 1 Introduction; 2 Notations; 3 Related Works
4 A Combined Model5 Simulation and Analysis; 6 Conclusions; References; Acknowledgements; CHAPTER 6. SOFTWARE DIVERSITY-SOME CONSIDERATIONS ABOUT ITS BENEFITS AND ITS LIMITATIONS; THE DIFFERENT FAILURE SETS OF A TWO-FOLD DIVERSE SYSTEM; 2. EXPERIMENTAL APPROACH; 3. THEORETICAL APPROACH; 4. ADDITIONAL REQUIREMENTS; 5. COMPARISON BETWEEN SINGLE AND DIVERSE USE OF PROGRAMS; 6. CONCLUSION; REFERENCES; CHAPTER 7. ERROR RECOVERY IN MULTI-VERSION SOFTWARE; INTRODUCTION; RECOVERY IN MULTI-VERSION SOFTWARE; COMMUNITY ERROR RECOVERY; IMPLEMENTATION OF RECOVERY IN DEDIX
RELIABILITY MODELS FOR MULTI-VERSION SOFTWARECONCLUSION; ACKNOWLEDGEMENTS; REFERENCES; CHAPTER 8. MULTI-VERSION SOFTWARE DEVELOPMENT; INTRODUCTION; PREVIOUS EXPERIMENTS; SECOND GENERATION EXPERIMENT; CURRENT RESEARCH ISSUES; CONCLUSIONS; REFERENCES; SESSION 3: FAULT-TOLERANT DISTRIBUTED SYSTEMS; CHAPTER 9. THE JOIN ALGORITHM: ORDERING MESSAGES IN REPLICATED SYSTEMS; 1. Introduction; 2. An Architecture for Replicated Processing; 3 . The Join Algorithm; 4. A Simple Example; Concluding Remarks; Acknowledgements; References; CHAPTER 10. PROTECTION OF SHARED RESOURCES; 1. INTRODUCTION
2. THE ADDRESSING SCHEME AND THE PROTECTION SYSTEM3. DYNAMIC PROTECTION MANAGEMENT; 4. THE MONITOR; 5. OPERATING SYSTEM AND PROTECTION SYSTEM; 6. CONCLUDING REMARKS; 7. REFERENCES; CHAPTER 11. A PROPOSAL FOR DISTRIBUTED COMMITMENT AND ABORT OF MULTI-SITE TRANSACTIONS IN A MULTIMICROPROCESSOR SYSTEM; INTRODUCTION; MULTI-SITE TRANSACTIONS; STATES OF A SITE; THE BAMP PROTOCOL UNDER NORMAL OPERATION; BAMP AND FAILURES; TIME-OUT; OVERVIEW OF THE MARA ARCHITECTURE; IMPLEMENTATION NOTES; CONCLUSIONS; ACKNOWLEDGMENTS; REFERENCES; CHAPTER 12. A ROBUST DATABASE FOR SAFE REAL-TIME SYSTEMS; INTRODUCTION
THE DATABASE MANAGER
Summary: The proceedings of the fifth workshop in this subject continue the trend set by the previous four and discusses some of the current problems involved in the design and production of safe real-time computer systems. Topics covered include software quality assurance, software fault tolerance, design for safety, and reliability and safety assessment. Every paper details the theoretical and practical problems involved in the development of safe systems and should therefore be of interest to all those involved in systems design.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
TJ212.2 .I3394 2014 (Browse shelf) http://uttyler.eblib.com/patron/FullRecord.aspx?p=1877128 Available EBL1877128

Front Cover; Safety of Computer Control Systems 1986 (SAFECOMP '86): Trends in Safe Real Time Computer Systems; Copyright Page; Preface; Table of Contents; SESSION 1: SOFTWARE QUALITY ASSURANCE; CHAPTER 1. SOME THOUGHTS ON SOFTWARE QUALITY ASSURANCE; INTRODUCTION; DEFINITIONS; DELIMITATION OF SOFTWARE QUALITY ASSURANCE; SYSTEM TESTING: AN EXAMPLE OF DELIMITATION; CONCLUSIONS; ACKNOWLEDGMENT; REFERENCES; CHAPTER 2. QUANTITATIVE ASSESSMENT OF SAFE AND RELIABLE SOFTWARE; INTRODUCTION; HOH TO MAKE SAFE SYSTEMS; ATTRIBUTES AND THEIR MEASURES; ASSESSMENT OF CRITICAL SOFTHARE

STANDARDS AND GUIDELINESCONCLUSIONS; REFERENCES; CHAPTER 3. MODELLING SYSTEM QUALITY; INTRODUCTION; MODELS; QUALITY; QUALITY MODELLING; QUALITY MODELLING OF SOFTWARE; CONCLUSIONS AND THE WAY AHEAD; REFERENCES; ACKNOWLEDGEMENTS; CHAPTER 4. PROGRAMMABLE ELECTRONIC SYSTEMS SAFETY: STANDARDS AND PRINCIPLES-AN INDUSTRIAL VIEWPOINT; INTRODUCTION; ICI's ROLE IN STANDARDS WORK; ICI's APPROACH TO THE SAFE USE OF PROGRAMMABLE ELECTRONIC SYSTEMS; CONCLUSIONS; REFERENCES; SESSION 2: SOFTWARE FAULT-TOLERANCE; CHAPTER 5. A RECOVERY BLOCK MODEL AND ITS ANALYSIS; 1 Introduction; 2 Notations; 3 Related Works

4 A Combined Model5 Simulation and Analysis; 6 Conclusions; References; Acknowledgements; CHAPTER 6. SOFTWARE DIVERSITY-SOME CONSIDERATIONS ABOUT ITS BENEFITS AND ITS LIMITATIONS; THE DIFFERENT FAILURE SETS OF A TWO-FOLD DIVERSE SYSTEM; 2. EXPERIMENTAL APPROACH; 3. THEORETICAL APPROACH; 4. ADDITIONAL REQUIREMENTS; 5. COMPARISON BETWEEN SINGLE AND DIVERSE USE OF PROGRAMS; 6. CONCLUSION; REFERENCES; CHAPTER 7. ERROR RECOVERY IN MULTI-VERSION SOFTWARE; INTRODUCTION; RECOVERY IN MULTI-VERSION SOFTWARE; COMMUNITY ERROR RECOVERY; IMPLEMENTATION OF RECOVERY IN DEDIX

RELIABILITY MODELS FOR MULTI-VERSION SOFTWARECONCLUSION; ACKNOWLEDGEMENTS; REFERENCES; CHAPTER 8. MULTI-VERSION SOFTWARE DEVELOPMENT; INTRODUCTION; PREVIOUS EXPERIMENTS; SECOND GENERATION EXPERIMENT; CURRENT RESEARCH ISSUES; CONCLUSIONS; REFERENCES; SESSION 3: FAULT-TOLERANT DISTRIBUTED SYSTEMS; CHAPTER 9. THE JOIN ALGORITHM: ORDERING MESSAGES IN REPLICATED SYSTEMS; 1. Introduction; 2. An Architecture for Replicated Processing; 3 . The Join Algorithm; 4. A Simple Example; Concluding Remarks; Acknowledgements; References; CHAPTER 10. PROTECTION OF SHARED RESOURCES; 1. INTRODUCTION

2. THE ADDRESSING SCHEME AND THE PROTECTION SYSTEM3. DYNAMIC PROTECTION MANAGEMENT; 4. THE MONITOR; 5. OPERATING SYSTEM AND PROTECTION SYSTEM; 6. CONCLUDING REMARKS; 7. REFERENCES; CHAPTER 11. A PROPOSAL FOR DISTRIBUTED COMMITMENT AND ABORT OF MULTI-SITE TRANSACTIONS IN A MULTIMICROPROCESSOR SYSTEM; INTRODUCTION; MULTI-SITE TRANSACTIONS; STATES OF A SITE; THE BAMP PROTOCOL UNDER NORMAL OPERATION; BAMP AND FAILURES; TIME-OUT; OVERVIEW OF THE MARA ARCHITECTURE; IMPLEMENTATION NOTES; CONCLUSIONS; ACKNOWLEDGMENTS; REFERENCES; CHAPTER 12. A ROBUST DATABASE FOR SAFE REAL-TIME SYSTEMS; INTRODUCTION

THE DATABASE MANAGER

The proceedings of the fifth workshop in this subject continue the trend set by the previous four and discusses some of the current problems involved in the design and production of safe real-time computer systems. Topics covered include software quality assurance, software fault tolerance, design for safety, and reliability and safety assessment. Every paper details the theoretical and practical problems involved in the development of safe systems and should therefore be of interest to all those involved in systems design.

Description based upon print version of record.

There are no comments for this item.

Log in to your account to post a comment.