Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Skip header Section
Software Fault ToleranceFebruary 1995
Publisher:
  • John Wiley & Sons, Inc.
  • 605 Third Ave. New York, NY
  • United States
ISBN:978-0-471-95068-4
Published:01 February 1995
Pages:
337
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

From the Publisher:

Software fault tolerance techniques involve error detection, exception handling, monitoring mechanisms and error recovery. This important book also focuses on identification, application, formulation and evaluation of current software tolerance techniques.

Cited By

  1. Di Giandomenico F, Masetti G and Chiaradonna S (2022). Redundancy–Based Intrusion Tolerance Approaches Moving from Classical Fault Tolerance Methods, International Journal of Applied Mathematics and Computer Science, 32:4, (701-719), Online publication date: 1-Dec-2022.
  2. Mo Y, Xing L, Lin Y and Guo W (2021). Efficient Analysis of Repairable Computing Systems Subject to Scheduled Checkpointing, IEEE Transactions on Dependable and Secure Computing, 18:1, (1-14), Online publication date: 1-Jan-2021.
  3. Potteiger B, Zhang Z and Koutsoukos X (2020). Integrated moving target defense and control reconfiguration for securing Cyber-Physical systems, Microprocessors & Microsystems, 73:C, Online publication date: 1-Mar-2020.
  4. Wang L (2019). Architecture-Based Reliability-Sensitive Criticality Measure for Fault-Tolerance Cloud Applications, IEEE Transactions on Parallel and Distributed Systems, 30:11, (2408-2421), Online publication date: 1-Nov-2019.
  5. He Z, Chen Y, Huang E, Wang Q, Pei Y and Yuan H A system identification based Oracle for control-CPS software fault localization Proceedings of the 41st International Conference on Software Engineering, (116-127)
  6. ACM
    Potteiger B, Zhang Z and Koutsoukos X Integrated data space randomization and control reconfiguration for securing cyber-physical systems Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, (1-10)
  7. ACM
    Potteiger B, Zhang Z and Koutsoukos X Integrated instruction set randomization and control reconfiguration for securing cyber-physical systems Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, (1-10)
  8. Levitin G, Xing L, Dai Y and Vokkarane V (2017). Dynamic Checkpointing Policy in Heterogeneous Real-Time Standby Systems, IEEE Transactions on Computers, 66:8, (1449-1456), Online publication date: 1-Aug-2017.
  9. Peng K and Huang C (2016). Stochastic modelling and simulation approaches to analysing enhanced fault tolerance on service-based software systems, Software Testing, Verification & Reliability, 26:4, (276-293), Online publication date: 1-Jun-2016.
  10. ACM
    Natella R, Cotroneo D and Madeira H (2016). Assessing Dependability with Software Fault Injection, ACM Computing Surveys, 48:3, (1-55), Online publication date: 8-Feb-2016.
  11. ACM
    Venkatakrishnan R and Vouk M (2016). Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors, Ubiquity, 2016:January, (1-19), Online publication date: 20-Jan-2016.
  12. ACM
    Märtin L, Koziolek A and Reussner R Quality-oriented Decision Support for maintaining Architectures of fault-tolerant Space Systems Proceedings of the 2015 European Conference on Software Architecture Workshops, (1-5)
  13. ACM
    Alzahrani N and Petriu D Modeling Fault Tolerance Tactics with Reusable Aspects Proceedings of the 11th International ACM SIGSOFT Conference on Quality of Software Architectures, (43-52)
  14. ACM
    Peng K, Huang C, Wang P and Hsu C Enhanced n-version programming and recovery block techniques for web service systems Proceedings of the International Workshop on Innovative Software Development Methodologies and Practices, (11-20)
  15. ACM
    Khomh F On improving the dependability of cloud applications with fault-tolerance Proceedings of the WICSA 2014 Companion Volume, (1-3)
  16. Bishop P Does Software Have to Be Ultra Reliable in Safety Critical Systems? Proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security - Volume 8153, (118-129)
  17. ACM
    Zheng Z and Lyu M (2013). Personalized Reliability Prediction of Web Services, ACM Transactions on Software Engineering and Methodology, 22:2, (1-25), Online publication date: 1-Mar-2013.
  18. ACM
    Bernardi S, Merseguer J and Petriu D (2012). Dependability modeling and analysis of software systems specified with UML, ACM Computing Surveys, 45:1, (1-48), Online publication date: 1-Nov-2012.
  19. ACM
    Spinellis D, Karakoidas V and Louridas P Comparative language fuzz testing Proceedings of the ACM 4th annual workshop on Evaluation and usability of programming languages and tools, (25-34)
  20. Bernardi S, Flammini F, Marrone S, Merseguer J, Papa C and Vittorini V Model-driven availability evaluation of railway control systems Proceedings of the 30th international conference on Computer safety, reliability, and security, (15-28)
  21. Bernardi S, Merseguer J and Petriu D (2011). A dependability profile within MARTE, Software and Systems Modeling (SoSyM), 10:3, (313-336), Online publication date: 1-Jul-2011.
  22. ACM
    Mahadevan N, Dubey A and Karsai G Application of software health management techniques Proceedings of the 6th International Symposium on Software Engineering for Adaptive and Self-Managing Systems, (1-10)
  23. ACM
    Ragel R and Parameswaran S (2011). A hybrid hardware--software technique to improve reliability in embedded processors, ACM Transactions on Embedded Computing Systems, 10:3, (1-16), Online publication date: 1-Apr-2011.
  24. Stehr M, Talcott C, Rushby J, Lincoln P, Kim M, Cheung S and Poggio A Fractionated software for networked cyber-physical systems Formal modeling, (110-143)
  25. ACM
    Adler R, Schaefer I, Trapp M and Poetzsch-Heffter A (2011). Component-based modeling and verification of dynamic adaptation in safety-critical embedded systems, ACM Transactions on Embedded Computing Systems, 10:2, (1-39), Online publication date: 1-Dec-2010.
  26. ACM
    Yang L, Yu L, Tang J, Wang L, Zhao J and Li X Enabling multi-core based monitoring and fault tolerance in C++/Java Proceedings of the 3rd International Workshop on Multicore Software Engineering, (32-39)
  27. Aghajani Z and Azgomi M A majority voter for intrusion tolerant software based on N-version programming techniques Proceedings of the 6th international conference on Innovations in information technology, (61-65)
  28. ACM
    Florio V and Blondia C (2008). A survey of linguistic structures for application-level fault tolerance, ACM Computing Surveys, 40:2, (1-37), Online publication date: 1-Apr-2008.
  29. ACM
    Saha G (2006). Software fault avoidance issues, Ubiquity, 2006:November, (1-15), Online publication date: 1-Nov-2006.
  30. Mawlood-Yunis A, Weiss M and Santoro N Issues for robust consensus building in p2p networks Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part II, (1021-1027)
  31. ACM
    Ragel R and Parameswaran S Hardware assisted pre-emptive control flow checking for embedded processors to improve reliability Proceedings of the 4th international conference on Hardware/software codesign and system synthesis, (100-105)
  32. ACM
    Saha G (2006). Software based fault tolerance, Ubiquity, 2006:July, (1-1), Online publication date: 1-Jul-2006.
  33. ACM
    Rinard M Probabilistic accuracy bounds for fault-tolerant computations that discard tasks Proceedings of the 20th annual international conference on Supercomputing, (324-334)
  34. ACM
    Banerjee S, Mattmann C, Medvidovic N and Golubchik L (2005). Leveraging architectural models to inject trust into software systems, ACM SIGSOFT Software Engineering Notes, 30:4, (1-7), Online publication date: 1-Jul-2005.
  35. Rogers P and Wellings A The application of compile-time reflection to software fault tolerance using ada 95 Proceedings of the 10th Ada-Europe international conference on Reliable Software Technologies, (236-247)
  36. ACM
    Banerjee S, Mattmann C, Medvidovic N and Golubchik L Leveraging architectural models to inject trust into software systems Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications, (1-7)
  37. Litke A, Tserpes K, Dolkas K and Varvarigou T A task replication and fair resource management scheme for fault tolerant grids Proceedings of the 2005 European conference on Advances in Grid Computing, (1022-1031)
  38. Rinard M, Cadar C, Dumitran D, Roy D, Leu T and Beebee W Enhancing server availability and security through failure-oblivious computing Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (21-21)
  39. Cai K and Wang X Towards a Control-Theoretical Approach to Software Fault-Tolerance Proceedings of the Quality Software, Fourth International Conference, (198-205)
  40. Candea G, Cutler J and Fox A (2004). Improving availability with recursive microreboots, Performance Evaluation, 56:1-4, (213-248), Online publication date: 1-Mar-2004.
  41. Spitznagel B and Garlan D A compositional formalization of connector wrappers Proceedings of the 25th International Conference on Software Engineering, (374-384)
  42. Klimek B, Radziszowski D and Zieliński K (2002). An event routing service for distributed applications, Software—Practice & Experience, 32:15, (1467-1483), Online publication date: 1-Dec-2002.
  43. Li Y and Meng L High Availability Connection Management via Software Bus and Mobile Agent in Network Management Environment Proceedings of the Third International Workshop on Mobile Agents for Telecommunication Applications, (51-62)
  44. ACM
    Littlewood B, Popov P and Strigini L (2001). Modeling software design diversity, ACM Computing Surveys, 33:2, (177-208), Online publication date: 1-Jun-2001.
  45. Selective Checkpointing and Rollbacks in Multithreaded Distributed Systems Proceedings of the The 21st International Conference on Distributed Computing Systems
  46. Kandasamy N, Hayes J and Murray B Tolerating Transient Faults in Statically Scheduled Safety-Critical Embedded Systems Proceedings of the 18th IEEE Symposium on Reliable Distributed Systems
  47. Alkhalifa Z, Nair V, Krishnamurthy N and Abraham J (1999). Design and Evaluation of System-Level Checks for On-Line Control Flow Error Detection, IEEE Transactions on Parallel and Distributed Systems, 10:6, (627-641), Online publication date: 1-Jun-1999.
  48. Al-Asaad H, Murray B and Hayes J (1998). Online BIST for Embedded Systems, IEEE Design & Test, 15:4, (17-24), Online publication date: 1-Oct-1998.
  49. ACM
    Morzenti A and Schreiber F (1997). Analysis of techniques in the assessment of ultra-reliable computerized systems, ACM SIGSOFT Software Engineering Notes, 22:2, (87-91), Online publication date: 1-Mar-1997.
  50. ACM
    Kim K and Subbaraman C (1997). Fault-tolerant real-time objects, Communications of the ACM, 40:1, (75-82), Online publication date: 1-Jan-1997.
  51. Nagaraju V, Basavaraj V and Fiondella L Software rejuvenation of a fault-tolerant server subject to correlated failure 2016 Annual Reliability and Maintainability Symposium (RAMS), (1-6)
Contributors
  • Chinese University of Hong Kong

Recommendations