Startsida
Hjälp
Sök i LIBRIS databas

     

 

Sökning: onr:13430118 > Advances in Computers

Advances in Computers [Elektronisk resurs] Dependable and Secure Systems Engineering.

Hurson, Ali. (författare)
Sedigh, Sahra. (författare)
ISBN 9780123964694
Publicerad: Burlington : Elsevier Science, 2012
Engelska 1 online resource (209 p.)
  • E-bok
Innehållsförteckning Sammanfattning Ämnesord
Stäng  
  • Front Cover; Dependable and Secure Systems Engineering; Copyright; Contents; Preface; References; Chapter 1: Combining Performance and Availability Analysis in Practice; 1. Introduction; 2. Approaches to Modeling; 2.1 Non-State-Space Models; 2.2 State-Space Models; 3. Practical Examples; 3.1 Pure Reliability/Availability and Pure Performance Analysis; 3.1.1 Two-Board System; 3.1.2 VAXcluster System; 3.1.3 Telecommunication Switching System; 3.2 Composite Performance and Availability Analysis; 3.2.1 Multiprocessor Systems; 3.2.2 Wireless Communication Network System; 3.2.3 Job Completion Time. 
  • 4. ConclusionsReferences; Chapter 2: Modeling, Analysis, and Testing of System Vulnerabilities; 1. Critical Features and Vulnerabilities of Human-Machine Systems; 2. Modeling the SUC and Its Environment; 2.1 Models of the SUC; 2.2 Conversions; 2.3 Complement and Completed System Models; 2.4 Transformed System Models; 2.4.1 Marking Operators; 2.4.1.1 Mark Start; 2.4.1.2 Mark Finish; 2.4.1.3 Mark Non-Start; 2.4.1.4 Mark Non-Finish; 2.4.2 Sequence Manipulation Operators; 2.4.2.1 Sequence Insertion; 2.4.2.2 Sequence Omission; 2.4.3 Event Manipulation Operators; 2.4.3.1 Event Insertion. 
  • 2.4.3.2 Event Omission2.4.4 Partial Complement Models via Transformations; 3. Behavioral Patterns of the SUC: Analysis and Test Aspects; 3.1 Coverage Criteria; 3.1.1 Coverage Criteria for Testing of System Functions; 3.1.2 Coverage Criteria for Testing Vulnerability Threats; 3.2 Test Generation; 3.2.1 Test Generation for Testing System Functions; 3.2.2 Test Generation for Testing Vulnerability Threats; 3.3 Remarks on the Test Process; 4. Ordering the Vulnerability Risks, Countermeasures; 5. Case Study; 5.1 SUC; 5.2 System Functions and Vulnerability Threats. 
  • 5.3 Risk Graph and Defense Mechanism5.4 Testing Safety Issues; 6. Related Work; 7. Conclusion, Limitations, and Future Work; References; Chapter 3: System Dependability...; 1. Introduction; 2. Dependability Measures; 2.1 Comprehensive Dependability Measures; 2.2 Specific Dependability Features and Measures; 2.3 Performance-Related Measures; 2.4 Comments on Features and Measures for Dependability Assessment; 3. Basic Dependability Assessment Approaches; 3.1 Assessment Based on Analytical Modeling; 3.1.1 Compositional Modeling Approaches; 3.1.2 Decomposition and Aggregation Approaches. 
  • 3.2 Assessment Based on Controlled Experiments3.2.1 Techniques for Injecting Hardware Faults; 3.2.2 Techniques for Injecting or Emulating Software Faults; 3.2.3 Message-Based Fault Injection; 3.3 Summary and Relationships Between the Assessment Approaches; 4. Benchmarking Concepts and Examples; 4.1 Examples of Performance Benchmarks; 4.1.1 EEMBC Benchmarks; 4.1.2 SPEC Benchmarks; 4.1.3 TPC Benchmarks; 4.2 Examples of Dependability Benchmarks; 5. Case Study: Benchmarking COTS-based Systems; 5.1 Presentation of the Considered I&C Systems; 5.2 Modeling of the I&C Systems. 
  • 5.3 Comparison of System 1 and System 2. 
  • Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field. In-depth surveys and tutorials on new computer technologyWell-known authors and researchers in the fieldExtensive bibliographies with m 

Ämnesord

Automatic Data Processing -- periodicals. 
Computers -- Periodicals. 
Electronic data processing -- Periodicals. 
Electronic data processing. 

Genre

Electronic books.  (LCSH)

Klassifikation

QA76 (LCC)
510.78 (DDC)
Ta (kssb/8 (machine generated))
Inställningar Hjälp

Titeln finns på 3 bibliotek. 

Bibliotek i Stockholmsregionen (2)

Ange som favorit

Bibliotek i södra Sverige (1)

Ange som favorit
Om LIBRIS
Sekretess
Hjälp
Fel i posten?
Kontakt
Teknik och format
Sök utifrån
Sökrutor
Plug-ins
Bookmarklet
Anpassa
Textstorlek
Kontrast
Vyer
LIBRIS söktjänster
SwePub
Uppsök

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

Copyright © LIBRIS - Nationella bibliotekssystem

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy