Listing 1 - 6 of 6 |
Sort by
|
Choose an application
Given that faults cannot be prevented in sufficiently complex systems, means of fault tolerance are essential for dependable distributed systems. Designing and evaluating fault-tolerant systems require well-conceived fault models. In the past, theoretical works have used simplified models that, while being tractable, turned out to be inaccurate. Practical works have used probabilistic fault models that, while being more accurate, often turned out to be intractable. Timo Warns bridges the gap between theory and practice regarding fault models. He has developed tractable fault models that, while being non-probabilistic, are accurate for dependent and propagating faults. Using seminal problems such as consensus and constructing coteries, he demonstrates how the new models can be used to design and evaluate effective and efficient means of fault tolerance.
Information Technology --- Computer Science (Hardware & Networks) --- Computer systems -- Reliability. --- Electronic data processing. --- Fault-tolerant computing. --- Engineering & Applied Sciences --- Computer Science --- Computing, Fault-tolerant --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer Science. --- Computer Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Computer Science, general. --- Electronic data processing --- Electronic digital computers --- Fault tolerance (Engineering) --- Computer system failures --- Reliability --- Informatics --- Science --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing
Choose an application
What evidence is sufficient to justify the release of a computer-based safety critical system? How should this evidence be presented to certification bodies or regulatory authorities? What best practices should be applied? These are just a few of the questions addressed by Justifying the Dependability of Computer-based Systems, which provides a framework for the justification of the dependability of a computer-based system. The book also explores some of the more fundamental aspects of safety evaluation, such as the nature of models, arguments, evidence and documentation, and the ways to deal with different types of risk and uncertainty. Justifying the Dependability of Computer-based Systems will be of value to software, computer system, instrumentation and control engineers, and regulators working in industry sectors such as nuclear safety. Pierre-Jacques Courtois is a Professor in the Department of Computer Science and Engineering at the Catholic University of Louvain-la-Neuve, with particular research interests in safety-critical software for the nuclear industry. He has more than fifteen years experience in the nuclear safety industry, having worked as a nuclear safety advisor in Finland and the UK, and as a consultant to the International Atomic Energy Agency (IAEA) and the Organisation for Economic Co-operation and Development (OECD).
Engineering. --- Computer organization. --- Computational intelligence. --- Quality control. --- Reliability. --- Industrial safety. --- Quality Control, Reliability, Safety and Risk. --- Engineering, general. --- Computational Intelligence. --- Computer Systems Organization and Communication Networks. --- Industrial accidents --- Industries --- Job safety --- Occupational hazards, Prevention of --- Occupational health and safety --- Occupational safety and health --- Prevention of industrial accidents --- Prevention of occupational hazards --- Safety, Industrial --- Safety engineering --- Safety measures --- Safety of workers --- Accidents --- System safety --- Dependability --- Trustworthiness --- Conduct of life --- Factory management --- Industrial engineering --- Reliability (Engineering) --- Sampling (Statistics) --- Standardization --- Quality assurance --- Quality of products --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Organization, Computer --- Electronic digital computers --- Construction --- Industrial arts --- Technology --- Prevention --- Computer systems --- Nuclear engineering --- Nuclear power plants --- Safety measures. --- ADP systems (Computer systems) --- Computing systems --- Systems, Computer --- Electronic systems --- Cyberinfrastructure --- System safety. --- Computer network architectures. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Safety, System --- Safety of systems --- Systems safety --- Industrial safety --- Systems engineering --- Computer systems - Reliability --- Nuclear power plants - Safety measures --- Nuclear engineering - Safety measures
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com. For more information about IFIP, please visit www.ifip.org.
Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Systèmes informatiques --- Confiance --- Ordinateurs --- Sécurité informatique --- Commerce électronique --- Reliability --- Congresses --- Access control --- Security measures --- Fiabilité --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer security -- Congresses. --- Computer systems -- Reliability -- Congresses. --- Computers -- Access control -- Congresses. --- Electronic books. -- local. --- Electronic commerce -- Security measures -- Congresses. --- Trust -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Trust (Psychology) --- Computer science. --- Computer security. --- Computer Science. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Commerce --- Information superhighway --- Attitude (Psychology) --- Emotions
Choose an application
Computer software --- Software architecture --- Computer systems --- Logiciels --- Systèmes informatiques --- Development --- Congresses. --- Reliability --- Développement --- Congrès --- Fiabilité --- Computer software -- Development -- Congresses. --- Computer systems -- Reliability -- Congresses. --- Electronic books. -- local. --- Software architecture -- Development -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Software Engineering --- Architecture, Software --- Computer software architecture --- Architecture --- Design --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer programming. --- Programming languages (Electronic computers). --- Computer logic. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Logics and Meanings of Programs. --- Computer Communication Networks. --- Computer science logic --- Logic, Symbolic and mathematical --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Programming --- Distributed processing --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Programming languages (Electronic computers) --- Computer networks.
Choose an application
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springer.com.
Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Systèmes informatiques --- Confiance --- Ordinateurs --- Sécurité informatique --- Commerce électronique --- Reliability --- Congresses. --- Access control --- Security measures --- Fiabilité --- Congrès --- Accès --- Contrôle --- Sécurité --- Mesures --- Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer Science --- Engineering & Applied Sciences --- Information Technology --- Computer Science (Hardware & Networks) --- Management --- Trust (Psychology) --- Computer science. --- Computer security. --- Data structures (Computer science). --- Computers. --- Law and legislation. --- Computer Science. --- Theory of Computation. --- Computer Science, general. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- Legal Aspects of Computing. --- Attitude (Psychology) --- Emotions --- Information theory. --- Data structures (Computer scienc. --- Data Structures and Information Theory. --- Cyberspace --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Communication theory --- Communication --- Cybernetics --- Law and legislation --- Protection --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Data protection. --- Information technology --- Data and Information Security. --- Technology and law --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data structures (Computer science)
Choose an application
This book constitutes the refereed proceedings of the Third IFIP WG 11.11 International Conference, IFIPTM 2009, held in West Lafayette, IN, USA, in June 2009. The 17 revised full papers presented together with one invited paper and 5 demo descriptions were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on social aspects and usability, trust reasoning and processing, data security, enhancements to subjective logic, information sharing, risk assessment, and simulation of trust and reputation systems.
Computer systems -- Reliability -- Congresses. --- Trust -- Management -- Congresses. --- Computer systems --- Trust --- Computers --- Computer security --- Electronic commerce --- Computer Science --- Engineering & Applied Sciences --- Reliability --- Access control --- Security measures --- Management --- Trust (Psychology) --- Cybercommerce --- E-business --- E-commerce --- E-tailing --- eBusiness --- eCommerce --- Electronic business --- Internet commerce --- Internet retailing --- Online commerce --- Web retailing --- Computer science. --- Computer security. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Application software. --- E-commerce. --- Computer Science. --- Computer Applications. --- Coding and Information Theory. --- Data Encryption. --- Systems and Data Security. --- Data Structures, Cryptology and Information Theory. --- e-Commerce/e-business. --- Commerce --- Information superhighway --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer privacy --- Computer system security --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Informatics --- Science --- Protection --- Attitude (Psychology) --- Emotions --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Information theory. --- Communication theory --- Communication --- Cybernetics
Listing 1 - 6 of 6 |
Sort by
|