default search action
28. FTCS 1998: Munich, Germany
- Digest of Papers: FTCS-28, The Twenty-Eigth Annual International Symposium on Fault-Tolerant Computing, Munich, Germany, June 23-25, 1998. IEEE Computer Society 1998, ISBN 0-8186-8470-4
Session 1: Vision for High-Availability of the Global Infrastructure
- Ram Chillarege, Robert W. Horst, Clifford B. Meltzer, Angelo Pruscino, Dalibor F. Vrsalovic:
Vision for High-Availability of the Global Infrastructure (Panel). 2-4
Session 2A: Dependability of Storage and Processing Systems
- Mohamed Kaâniche, Luigi Romano, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Richard M. Karcich:
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture. 6-15 - Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing:
Proving Correctness of a Controller Algorithm for the RAID Level 5 System. 16-25 - João Gabriel Silva, Paula Prata, Mário Zenha Rela, Henrique Madeira:
Practical Issues in the Use of ABFT and a New Failure Model. 26-35
Session 2B: Checkpointing and Recovery in Clusters of Workstations
- Kuo-Feng Ssu, W. Kent Fuchs:
PREACHES - Portable Recovery and Checkpointing in Heterogeneous Systems. 38-47 - James S. Plank, Wael R. Elwasif:
Experimental Assessment of Workstation Failures and Their Impact on Checkpointing Systems. 48-57 - Nuno Neves, W. Kent Fuchs:
RENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols. 58-67
Session 3A: Design for Safety and Critical Systems
- Eric Totel, Jean-Paul Blanquart, Yves Deswarte, David Powell:
Supporting Multiple Levels of Criticality. 70-79 - Peter T. Popov, Lorenzo Strigini:
Conceptual Models for the Reliability of Diverse Systems - New Results. 80-89 - Peter Liggesmeyer, Martin Rothfelder:
Improving System Reliability with Automatic Fault Tree Generation. 90-99
Session 3A: FastAbstracts
Session 4A: Panel I: Cyber Threats
- Wendy Bartlett, Peter B. Ladkin, Derek Long, Brian Randell:
Cyber Threats (Panel). 104-106
Session 4B: Highly Available Systems
- Ashish Singhai, Swee Boon Lim, Sanjay R. Radia:
The SunSCALR Framework for Internet Servers. 108-117 - Kazutaka Murakami, Richard W. Buskens, Ramachandran Ramjee, Yow-Jian Lin, Thomas F. La Porta:
Design, Implementation, and Evaluation of Highly Available Distributed Call Processing Systems. 118-127 - Thomas C. Bressoud:
TFT: A Software System for Application-Transparent Fault Tolerance. 128-137
Session 5A: Fault-Tolerant Protocols
- Flaviu Cristian, Christof Fetzer:
The Timed Asynchronous Distributed System Model. 140-149 - José Rufino, Paulo Veríssimo, Guilherme Arroz, Carlos Almeida, Luís E. T. Rodrigues:
Fault-Tolerant Broadcasts in CAN. 150-159
Session 5B: Practical Experience Reports I and Software Demonstration: Physical and Simulated Fault Injection
- John R. Samson Jr., Wilfrido Alejandro Moreno, Fernando J. Falquez:
A Technique for Automated Validation of Fault Tolerant Designs Using Laser Fault Injection (LFI). 162-167 - Jérome Boué, Philippe Pétillon, Yves Crouzet:
MEFISTO-L: A VHDL-Based Fault Injection Tool for the Experimental Assessment of Fault Tolerance. 168-173
Session 6A: Fault Containment and Fault-Tolerant Communication
- Mohamed F. Younis, Jeffrey X. Zhou, Mohamed Aboutabl:
Strong Partitioning Protocol for a Multiprocessor VME System. 176-185 - Bader Almohammad, Bella Bose:
Fault-Tolerant Communication Algorithms in Toroidal Networks. 186-194
Session 6B: Practical Experience Reports II: Diversity in Time and Design
- Nobuyasu Kanekawa, Takayuki Meguro, Kyosuke Isono, Yosuke Shima, Naoto Miyazaki, Shinichiro Yamaguchi:
Fault Detection and Recovery Coverage Improvement by Clock Synchronized Duplicated Systems with Optimal Time Diversity. 196-200 - Timothy K. Tsai:
Fault Tolerance Via N-Modular Software Redundancy. 201-206
Session 7A: Consistency and Communication
- Jean-Michel Hélary, Achour Mostéfaoui, Michel Raynal:
Communication-Induced Determination of Consistent Snapshots. 208-217 - Christopher Temple:
Avoiding the Babbling-Idiot Failure in a Time-Triggered Communication System. 218-227
Session 7B: Analysis of the Behavior in the Presence of Faults
- Nathan P. Kropp, Philip J. Koopman Jr., Daniel P. Siewiorek:
Automated Robustness Testing of Off-the-Shelf Software Components. 230-239 - Subhachandra Chandra, Peter M. Chen:
How Fail-Stop are Faulty Programs? 240-249
Session 8A: Decision Algorithms and Quorums
- Oliver E. Theel, Henning Pagnia:
Optimal Replica Control Protocols Exhibit Symmetric Operation Availabilities. 252-261 - Mark Bearden, Ronald P. Bianchini Jr.:
A Fault-Tolerant Algorithm for Decentralized On-line Quorum Adaptation. 262-271
Session 8B: Test Generation and Fault Injection
- Irith Pomeranz, Sudhakar M. Reddy:
A Generalized Test Generation Procedure for Path Delay Faults. 274-283 - Peter Folkesson, Sven Svensson, Johan Karlsson:
A Comparison of Simulation Based and Scan Chain Implemented Fault Injection. 284-293
Session 9A: Panel II: From Dependable Computing Systems to Computing for Integrated Dependable Systems?
- Karl-Erwin Großpietsch, Jacob A. Abraham, Johannes Maier, Hans-Dieter Kochs, Michel Renovell:
From Dependable Computing Systems to Computing for Integrated Dependable Systems? (Panel). 296-301
Session 9B: Dependability Modeling
- Hagbae Kim, Allan L. White, Kang G. Shin:
Reliability Modeling of Hard Real-Time Systems. 304-313 - Yinong Chen:
Modelling Software Operational Reliability via Input Domain-Based Reliability Growth Model. 314-323 - Antonio Galves, Marie-Claude Gaudel:
Rare Events in Stochastic Dynamical Systems and Failures in Ultra-Reliable Reactive Programs. 324-333
Session 10A: Software Availability and Robustness
- Frank Eskesen, Michel Hack, Arun Iyengar, Richard P. King, Nagui Halim:
Software Exploitation of a Fault-Tolerant Computer with a Large Memory. 336-345 - Roy A. Maxion, Robert T. Olszewski:
Improving Software Robustness with Dependability Cases. 346-355
Session 10B: Practical Experience Reports III: Avoiding the Perils of Checkpointing
- E. N. Elnozahy:
How Safe is Probabilistic Checkpointing? 358-363 - Luís Moura Silva, João Gabriel Silva:
Avoiding Checkpoint Contamination in Parallel Systems. 364-369
Session 11A: Design and Validation of Complex Systems
- Gerd Urban, Hans-Joachim Kolinowitz, Jan Peleska:
A Survivable Avionics System for Space Applications. 372-381 - Cristian Constantinescu:
Validation of the Fault/Error Handling Mechanisms of the Teraflops Supercomputer. 382-389 - Neeraj Suri, Purnendu Sinha:
On the Use of Formal Techniques for Validation. 390-399
Session 11B: Practical Experience Reports IV: Fault Tolerance in Transportation and Space
- Günter Heiner, Thomas Thurner:
Time-Triggered Architecture for Safety-Related Distributed Real-Time Systems in Transportation Systems. 402-407 - Torsten Fichna, M. Gärtner, Fritz Gliem, F. Rombeck:
Fault-Tolerance of Spaceborne Semiconductor Mass Memories. 408-413 - R. Roques, A. Corrégé, Christian Boléat:
Fault-Tolerant Computer for the Automated Transfer Vehicle. 414-419
Session 12A: High-Performance and Dependable Systems
- Werner Vogels, Dan Dumitriu, Kenneth P. Birman, Rod Gamache, Mike Massa, Rob Short, John Vert, Joe Barrera, Jim Gray:
The Design and Architecture of the Microsoft Cluster Service - A Practical Approach to High-Availability and Scalability. 422-431 - Lisa Spainhower, Thomas A. Gregg:
G4: A Fault-Tolerant CMOS Mainframe. 432-440 - Luiz A. Laranjeira:
NCAPS: Application High Availability in UNIX Computer Clusters. 441-450
Session 12B: Practical Experience Reports V: Design and Assessment of Safety Critical Systems
- Geert Deconinck, Oliver Botti, Flavio Cassinari, Vincenzo De Florio, Rudy Lauwereins:
Stable Memory in Substation Automation: A Case Study. 452-457 - Vicky Hartonas-Garmhausen, Sérgio Vale Aguiar Campos, Alessandro Cimatti, Edmund M. Clarke, Fausto Giunchiglia:
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints. 458-463 - Geneviève Allain-Morin, Olivier Pourret:
Dependability Assessment of a Computerized Nuclear Protection System. 464-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.