By Laura L. Pullum
This leading edge source offers the main entire assurance of software program fault tolerance options to steer pros via layout, operation and function. It positive aspects an in-depth dialogue at the merits and downsides of particular options, so practitioners can come to a decision which of them are most fitted for his or her paintings. The ebook examines key programming innovations similar to assertions, checkpointing, and atomic activities, and offers layout assistance and types to help within the improvement of severe software program fault tolerance software program structures that aid be certain in charge functionality. From software program reliability, restoration and redundancy to layout- and data-diverse software program fault tolerance recommendations, this functional reference presents certain perception into thoughts that would enhance the general caliber of software program.
Read or Download Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series) PDF
Similar quality control books
Stochastic systems : uncertainty quantification and propagation
Creation -- necessities of likelihood concept -- Random features -- Stochastic Integrals -- Itô's formulation and functions -- Probabilistic versions -- Stochastic traditional Differential and distinction Equations -- Stochastic Algebraic Equations -- Stochastic Partial Differential Equations
Quantitative Methods in Supply Chain Management: Models and Algorithms
Quantitative equipment in provide Chain administration provides probably the most very important tools and instruments to be had for modeling and fixing difficulties bobbing up within the context of provide chain administration. within the context of this publication, “solving difficulties” often capability designing effective algorithms for acquiring high quality strategies.
Towards A Risk-Based Chain Control
This booklet is the fourth within the sequence of "Food defense coverage and Veterinary Public well-being" which offers the newest findings in learn at the issues of meals protection within the whole agifood chain from desk to sturdy. the subjects during this quantity diversity from epidemiological tracking and surveillance in fundamental creation and processing of meals of animal starting place, to antimicrobial resistance and move in those meals, to danger modelling and administration ideas.
Urban Resilience for Emergency Response and Recovery: Fundamental Concepts and Applications
This booklet introduces the thoughts of Resilience-Based layout (RBD) as an extension of Performance-Based layout. It presents readers with a number of state of the art methodologies for comparing resilience and clarifies the adaptation among resilience, vulnerability and sustainability. firstly, the e-book makes a speciality of describing the different sorts of uncertainty that come up within the context of resilience assessment.
Additional resources for Software Fault Tolerance Techniques and Implementation (Artech House Computer Security Series)
Sample text
For example, the software product attribute is decomposed into use and product profile attributes. These attributes are further broken down until leaf nodes such as number of loops and hazards containment techniques are found. The software process attribute is decomposed into the following subattributes: process profile, tools, personnel, and machines. Leaf nodes on this major branch include the attributes skill level and assurance of software tool. Some of these attributes may only be applicable to certain applications.
Simple replication of redundant software or of the same software can overcome transient faults because prior to the reexecution time, the temporary circumstances causing the fault are then usually absent. If the conditions causing the fault persist at the time of reexecution, the reexecution will again result in failure. Temporal redundancy has a great advantage for some applications it does not require redundant hardware or software. It simply requires the availability of additional time to reexecute the failed process.
The major disadvantages of multilayer diversity are cost and speed. The cost of designing and implementing diversity in multiple layers can be prohibitive. In addition, the requirement to wait for the slowest component at each diversified layer is a critical drawback for real-time systems. One way to add diversity at a potentially lower cost is systematic diversity, although it is typically used as a software technique for tolerating hardware faults. Some examples of systematic diversity are [40]: • Utilization of different processor registers in the variants; • Transformation of mathematical expressions; • Different implementation of programming structures; • Different memory usage; • Using complementary branching conditions in the variants by trans- forming the branch statements; • Different compilers and libraries; • Different optimization and code-generation options.