Fault and Failure Tolerance

نویسنده

  • Jack D. Cowan
چکیده

Jack D. Cowan SFI WORKING PAPER: 1995-10-096 SFI Working Papers contain accounts of scientific work of the author(s) and do not necessarily represent the views of the Santa Fe Institute. We accept papers intended for publication in peer-reviewed journals or proceedings volumes, but not papers that have already appeared in print. Except for papers by our external faculty, papers must be based on work done at SFI, inspired by an invited visit to or collaboration at SFI, or funded by an SFI grant. ©NOTICE: This working paper is included by permission of the contributing author(s) as a means to ensure timely distribution of the scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the author(s). It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may be reposted only with the explicit permission of the copyright holder. www.santafe.edu

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CAFT: Cost-aware and Fault-tolerant routing algorithm in 2D mesh Network-on-Chip

By increasing, the complexity of chips and the need to integrating more components into a chip has made network –on- chip known as an important infrastructure for network communications on the system, and is a good alternative to traditional ways and using the bus. By increasing the density of chips, the possibility of failure in the chip network increases and providing correction and fault tol...

متن کامل

Stability Assessment Metamorphic Approach (SAMA) for Effective Scheduling based on Fault Tolerance in Computational Grid

Grid Computing allows coordinated and controlled resource sharing and problem solving in multi-institutional, dynamic virtual organizations. Moreover, fault tolerance and task scheduling is an important issue for large scale computational grid because of its unreliable nature of grid resources. Commonly exploited techniques to realize fault tolerance is periodic Checkpointing that periodically ...

متن کامل

FDMG: Fault detection method by using genetic algorithm in clustered wireless sensor networks

Wireless sensor networks (WSNs) consist of a large number of sensor nodes which are capable of sensing different environmental phenomena and sending the collected data to the base station or Sink. Since sensor nodes are made of cheap components and are deployed in remote and uncontrolled environments, they are prone to failure; thus, maintaining a network with its proper functions even when und...

متن کامل

FAULT TOLERANCE IN DCDIDP USING HAProxy

With the growing demand of Cloud Computing, Fault tolerance is a major concern because there are many types of failure occur and fault tolerance guarantee availability and reliability of critical issues as well as applications. Fault tolerant technique necessary to enable a system to tolerate software faults remaining in the system after its development. When a fault occurs, these techniques pr...

متن کامل

An Evaluation of Topology Fault Tolerance Based on Semi-Markov Process in Wireless Sensor Networks ⋆

In order to solve effectively the problem of evaluating the wireless sensor network fault tolerance, this paper presents an evaluation index of the topological tolerance for failure node according to the ability of the topology keeping network connect and cover in case of existing failure nodes and establishes a quantitative evaluation model of topology fault tolerance according to semi-Markov ...

متن کامل

Challenging Malicious Inputs with Fault Tolerance Techniques

Most of the attacks attempt an initial activation which means the first occurrence of an error provoked by the fault. If its unable to stop the propagation, a fault will be transformed into a failure, causing consequences. This paper presents an exploratory research about the integration of fault tolerance aiming defenses against malicious inputs. When a fault occurs, these techniques provide m...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1995