Sciweavers

153 search results - page 1 / 31
» Fault origin adjudication
Sort
View
FMSP
2000
ACM
152views Formal Methods» more  FMSP 2000»
13 years 9 months ago
Fault origin adjudication
When a program P fails to satisfy a requirement R supposedly ensured by a detailed speci cation S that was used to implement P, there is a question about whether the problem arise...
Karthikeyan Bhargavan, Carl A. Gunter, Davor Obrad...
JSA
2002
125views more  JSA 2002»
13 years 4 months ago
Building a dependable system from a legacy application with CORBA
This paper presents a dependability oriented, fault tolerance based system design, development, and deployment approach. The approach relies on an architectural framework, which a...
Domenico Cotroneo, Nicola Mazzocca, Luigi Romano, ...
HPCA
1998
IEEE
13 years 8 months ago
Communication Across Fault-Containment Firewalls on the SGI Origin
Scalability and reliability are inseparable in high-performance computing. Fault-isolation through hardware is a popular means of providing reliability. Unfortunately, such isolat...
Kaushik Ghosh, Allan J. Christie
SAFECOMP
1999
Springer
13 years 8 months ago
Hierarchically Performed Hazard Origin and Propagation Studies
Abstract. This paper introduces a new method for safety analysis called HiPHOPS (Hierarchically Performed Hazard Origin and Propagation Studies). HiP-HOPS originates from a number ...
Yiannis Papadopoulos, John A. McDermid
DSOM
2003
Springer
13 years 9 months ago
Visual-Based Anomaly Detection for BGP Origin AS Change (OASC) Events
Instead of relying completely on machine intelligence in anomaly event analysis and correlation, in this paper, we take one step back and investigate the possibility of a human-int...
Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, Dan...