The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
While technology evolves, challenges in system requirements, design and reliability modeling continue to keep pace with future underlying technology innovations and domain changes. Complex-software intense web-based information systems, with personal banking, retail marketing and retail sales evolved to online transactions and so did the need for secure information assurance to protect from illegal...
Markov chain usage models have been a basis for statistical testing of software intensive systems for more than two decades. During this time, several reliability estimators have been formulated and used in testing. This paper presents an improvement on the arc-based Bayesian estimator distributed with Version 4.5 of the JUMBL (J Usage Model Builder Library) [1]. The arc-based Bayesian estimator is...
As the demand for high performance and computational complexity continue to increase in embedded systems, reliability issues are becoming limiting factors on application scalability and long-term survivability in the harsh conditions in which such systems are operated. As embedded systems already house large datasets, traditional techniques to improve reliability such as task redundancy can be very...
System reliability becomes an increasing concern. The separate generation of hardware and software reliability test data cannot satisfy the demands of system reliability study. This paper introduces an approach to develop the system usage profile, which describes the system how to be used from the analysis of both hardware and software. By establishing the different scenarios of hardware and software,...
Soft errors on hardware could affect the reliability of computer system. To estimate system reliability, it is important to know the effects of soft errors to system reliability. This paper explores the effects of soft errors to computer system reliability. We propose a new approach to measure system reliability for soft error factor. In our approach, hardware components reliability is concerned first...
Software-Intensive Equipment is the system which includes software and hardware. In this paper, we analyze the characteristics of software-intensive equipment and propose a non-parametric system reliability model to study the failure data with time series technique. The model uses fuzzy neural network and a wavelet function as the membership function to adjust the shape on line so that the model has...
Managing corporate Information Technology (IT) environment becomes increasingly complex as server logic architecture becomes distributed and the number of manageable entities increases. At the same time, the open source community has not yet produced a reliable systems and network management solution, even though there are open source initiatives specializing in individual fields of remote management...
Voting algorithms are used in a wide area of control systems from real-time and safety-critical control systems to pattern recognition, image processing and human organization systems in order to arbitrating among redundant results of processing in redundant hardware modules or software versions. From a point of view, voting algorithms can be categorized to agreement-based voters like plurality and...
Components can be assembled based on the Service-Oriented Architecture (SOA), which allows enterprises to specify their services in a finer granularity, thus the services can be expressed in a deeper and more comprehensive manner. This paper makes use of the formal description of the service component, the Hierarchical Automata, studies the importance factors of each component and roughly categorizes...
The campus network is the birthplace of a large number of attacks, and also the attacker's objective that is most easily broken. How to build up an effective technical system to support emergency response under the current state of lower invests in maintaining the campus network Yecurity is an issue worth studying. An emergency response log has been designed to record each emergency incident response...
Petri Net is a special directional net, which can represent static structure and dynamic change in a system, and can reflect state of a system and development of event, and can express spread relationship of faults. It can get minimal cut sets (MCS) using Incidence Matrix of Petri Net, and get qualitative analysis according to the program of the method. Through Object Oriented programmed technology,...
Web service composition is a distributed model to construct new Web service on top of existing primitive or other composite Web services. However, current service technologies, including proposed composition languages, do not address the reliability of Web service composition. Thus it is hard to predict the system reliability. In this paper, we propose a method to compute system reliability based...
This paper sets forth the technical reviews, question eliminating and configuration management of the command information system, depicts the measures taken in the system reliability, maintainability and supportability design; and the system availability models are established of full functions, main functions and lowest functions, moreover the system availability is quantitatively analyzed. Thenceforth...
Future network systems and embedded infrastructure devices in ubiquitous environments will need to consume low power and process large amounts of network packet traffic. In order to meet necessary high processing efficiency requirements, future processors will have many heterogeneous cores with reduced reliability due to low voltage, small transistor sizes, semiconductor wearout, and environmental...
Most system level software is written in C and executed concurrently. Because such software is often critical for system reliability, it is an ideal target for formal verification. Annotated C and the Verified C Compiler (VCC) form the first modular sound verification methodology for concurrent C that scales to real-world production code. VCC is integrated in Microsoft Visual Studio and it comes with...
An early prediction of resource utilization and its impact on system performance and reliability can reduce the overall system cost, by allowing early correction of detected problems, or changes in development plans with minimized overhead. Nowadays, researchers are using both academic and commercial models to predict such attributes, by measuring them at earliest stages of system development. In...
Telecommunications systems achieve high levels of reliability by implementing detection and recovery mechanisms with high coverage. With the trend towards the use of more COTS components in these systems the choices available for the systems detection and recovery mechanisms are more limited. An escalating recovery model with varying coverage factors and recovery durations is developed to provide...
With growing system complication, multiple structures are constructed in software, instead of single architecture style. As a result, the traditional architecture-based models that have considered only homogeneous software behaviors are not suitable to the complex system. In this paper a heterogeneous architecture-based model is presented. In order to verify the practicability, we apply the model...
Importance measures of a system provide a sense of the relative priorities of the components from a system reliability perspective. These measures can thus be used to identify critical components and to guide the allocation of resources so that the system reliability can be improved in a cost effective manner. Importance measures are widely used in many engineered hardware and electro-mechanical systems...
Ensuring reliability in component-based software systems (CBSSs) is important for their effective applications in large scale and safety critical systems. However, only few techniques consider failure propagation in system architectures for system reliability assessment. Those techniques focus only on content failure propagation through component interfaces. Therefore, the evaluation of CBSS architectures...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.