• Aucun résultat trouvé

Dependability Analysis

Event log based dependability analysis of Windows NT and 2K systems

Event log based dependability analysis of Windows NT and 2K systems

... The analysis and assessment of computer systems based on data collected during operation provide valuable information on actual error/failure behavior, and can be used to identify system bottlenecks, to quantify ...

6

A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture

A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture

... the dependability analysis and evaluation of a highly available commercial cache-based RAID storage ...system-level dependability analysis, which provides facili- ties to inject faults into a ...

12

Discrete and Hybrid Systems Dependability Analysis with ESA PetriNet

Discrete and Hybrid Systems Dependability Analysis with ESA PetriNet

... out dependability analysis of discrete (based on temporal Petri nets modelling) or hybrid systems (differential predicate-transition Petri nets ...qualitative analysis of Petri net ...

5

Dependability Analysis of Control Systems using SystemC and Statistical Model Checking

Dependability Analysis of Control Systems using SystemC and Statistical Model Checking

... such dependability analysis consists in constructing and analyzing a state-based model of the system [ 20 , 8 ...the analysis of large systems is ...

26

Use of probabilistic relational model (PRM) for dependability analysis of complex systems

Use of probabilistic relational model (PRM) for dependability analysis of complex systems

... There are several works in the maintenance, however, it is somewhat “under-developed” ” (McKone et al., 2001) with a lack of effective methodologies and the integration of standard methods in manufacturing companies. ...

7

Dependability modeling and evaluation – From AADL to stochastic Petri nets

Dependability modeling and evaluation – From AADL to stochastic Petri nets

... for dependability analysis, there are other initiatives that consider model transformations from UML to other analytical ...criticality analysis) models from UML models using a new safety ...hazard ...

191

Dependability modelling of a fault tolerant duplex system using AADL and GSPNs

Dependability modelling of a fault tolerant duplex system using AADL and GSPNs

... global dependability model for the software components (from the point of view of the SW-SW ...the dependability analysis. Consequently, for dependability analysis, we inhibit or we ...

76

Bayesian networks applications on dependability, risk analysis and maintenance

Bayesian networks applications on dependability, risk analysis and maintenance

... Abstract: In this paper, a bibliographical review is presented about the use of Bayesian networks over the last decade on dependability, risk analysis and maintenance. It is shown an increasing trend of the ...

7

An Holistic Approach to Dependability ?

An Holistic Approach to Dependability ?

... contrary, dependability analysis and evaluation of safety critical systems involving computers are based on techniques and methodologies that concern human, software and hardware components ...

7

WOSD 2011 The First International Workshop on Open Systems Dependability

WOSD 2011 The First International Workshop on Open Systems Dependability

... system dependability”, is about current trends in ICT clearly showed that the vast majority of computer-based systems of the future will be ...ensuring dependability of open ...system dependability ...

3

Dependability Modelling of Safety Applications in Communicating Automotive Systems

Dependability Modelling of Safety Applications in Communicating Automotive Systems

... The dependability modelling approach has been designed to master the complexity of the models taking into account the dynamic evolution of the corresponding ...

11

Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices

Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices

... Other replication strategies can be imagined. In- stead of focusing only on dependability, users may spec- ify additional fragmentation to increase confidentiality [8]. Such a strategy could maximize fragmentation ...

9

DEPENDABILITY MODELING AND EVALUATION OF SOFTWARE-FAULT TOLERANT SYSTEMS

DEPENDABILITY MODELING AND EVALUATION OF SOFTWARE-FAULT TOLERANT SYSTEMS

... 4. NESTED RECOVERY BLOCKS This section provides a preliminary extension of the analysis of the RB architecture to account for the specific case of nested RBs. Nested RBs are very interesting and give rise to ...

31

Dependability evaluation of a distributed shared memory multiprocessor system

Dependability evaluation of a distributed shared memory multiprocessor system

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

22

Dependability Evaluation of an Air Traffic Control Computing System

Dependability Evaluation of an Air Traffic Control Computing System

... 4 2 1 3 Figure 8. Markov chain of step 3 corresponding to the GSPN of figure 6 Sensitivity analyses with respect to the most significant reliability parameters (considering different parameter values) are then performed ...

29

Benchmarking The Dependability of Windows NT4, 2000 and XP *

Benchmarking The Dependability of Windows NT4, 2000 and XP *

... Benchmark Controller that is primarily in charge of diagnosing and collecting data in case of a hang or an abort. Furthermore, as we are using a TPC-C client as workload, the (Oracle) Data Base Management System (DBMS), ...

8

Building dependability arguments for software intensive systems

Building dependability arguments for software intensive systems

... Figure 5-20: Step 3, Part 3.. ballotRecelpt ballotArrangement recelptMarked receiptOnlon onlonArrangement ballotRecell Stack of receiptCandid Ballots recelptMarc recelptOnlo onion[r] ...

308

Benchmarking the Dependability of Windows and Linux using PostMark ™ Workloads *

Benchmarking the Dependability of Windows and Linux using PostMark ™ Workloads *

... 7. Conclusion We presented the specification of a dependability benchmark for OSs with respect to erroneous parameters in system calls, along with prototypes for two families of OSs, Windows and Linux. These ...

11

A Model-based Repository of Security and Dependability Patterns for Trusted RCES

A Model-based Repository of Security and Dependability Patterns for Trusted RCES

... and/or dependability problems, caused by the lack of a dedicated classification scheme for S&D patterns and the lack of precise specification languages for ...

11

Dependability modelling of instrumentation and control systems: a comaprison of competing architectures

Dependability modelling of instrumentation and control systems: a comaprison of competing architectures

... L’archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d’enseignemen[r] ...

26

Show all 10000 documents...

Sujets connexes