[引用][C] Understanding and Validating Ethernet Networks for Mission-Critical Protection, Automation, and Control Applications
S Chelluri, D Dolezilek, J Dearien, A Kalra - NTPC Limited and Schweitzer …, 2014
Scheduling and optimization of fault-tolerant distributed embedded systems
V Izosimov - 2009 - diva-portal.org
Abstract SAFETY-CRITICAL APPLICATIONS have to function correctly and deliver high level
of quality-of-service even in the presence of faults. This thesis deals with techniques for …
of quality-of-service even in the presence of faults. This thesis deals with techniques for …
A primer on architectural level fault tolerance
RW Butler - 2008 - ntrs.nasa.gov
This paper introduces the fundamental concepts of fault tolerant computing. Key topics
covered are voting, fault detection, clock synchronization, Byzantine Agreement, diagnosis …
covered are voting, fault detection, clock synchronization, Byzantine Agreement, diagnosis …
Using unreliable virtual hardware to inject errors in extreme-scale systems
Fault tolerance is a key obstacle to next generation extreme-scale systems. As systems
scale, the Mean Time To Interrupt (MTTI) decreases proportionally. As a result, extreme …
scale, the Mean Time To Interrupt (MTTI) decreases proportionally. As a result, extreme …
[PDF][PDF] Rr: A fault model for efficient tee replication
Trusted Execution Environments (TEEs) ensure the confidentiality and integrity of
computations in hardware. Subject to the TEE's threat model, the hardware shields a …
computations in hardware. Subject to the TEE's threat model, the hardware shields a …
In-ConcReTeS: Interactive Consistency meets Distributed Real-Time Systems, Again!
A Gujarati, N Yang… - 2022 IEEE Real-Time …, 2022 - ieeexplore.ieee.org
The problem of replica coordination is fundamental to building Byzantine fault-tolerant (BFT)
distributed systems. Seminal BFT architectures for safety-critical real-time systems from the …
distributed systems. Seminal BFT architectures for safety-critical real-time systems from the …
Making Intrusion Tolerance Accessible: A Cloud-Based Hybrid Management Approach to Deploying Resilient Systems
Even with the rise of cyberattacks on high-value systems, we still do not see widespread
adoption of intrusion-tolerant replication protocols, despite their long history in the research …
adoption of intrusion-tolerant replication protocols, despite their long history in the research …
Byzantine state machine replication for the masses
JC de Sousa - 2017 - search.proquest.com
The state machine replication technique is a popular approach for building Byzantine fault-
tolerant services. However, despite the widespread adoption of this paradigm for crash fault …
tolerant services. However, despite the widespread adoption of this paradigm for crash fault …
Fault detection for message passing systems
MH Karaata, A Hamdan, MH Faisal… - Journal of Circuits …, 2018 - World Scientific
Many crucial dependable and secure services including atomic commitment, consensus and
group membership, and middleware services (such as replica, communication and …
group membership, and middleware services (such as replica, communication and …
Experiences with fault-injection in a byzantine fault-tolerant protocol
R Martins, R Gandhi, P Narasimhan, S Pertet… - Middleware 2013: ACM …, 2013 - Springer
The overall performance improvement in Byzantine fault-tolerant state machine replication
algorithms has made them a viable option for critical high-performance systems. However …
algorithms has made them a viable option for critical high-performance systems. However …