Fault-tolerant systems:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier [u.a.]
2007
|
Schlagworte: | |
Online-Zugang: | Table of contents only Publisher description Inhaltsverzeichnis |
Beschreibung: | XIX, 378 S. graph. Darst. |
ISBN: | 0120885255 9780120885251 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV022395857 | ||
003 | DE-604 | ||
005 | 20210512 | ||
007 | t | ||
008 | 070420s2007 xxud||| |||| 00||| eng d | ||
010 | |a 2006031810 | ||
020 | |a 0120885255 |c alk. paper |9 0-12-088525-5 | ||
020 | |a 9780120885251 |9 978-0-12-088525-1 | ||
035 | |a (OCoLC)73741844 | ||
035 | |a (DE-599)BVBBV022395857 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-29T |a DE-706 |a DE-703 |a DE-634 |a DE-898 |a DE-11 |a DE-739 |a DE-384 |a DE-188 | ||
050 | 0 | |a QA76.9.F38 | |
082 | 0 | |a 004.2 | |
084 | |a ST 150 |0 (DE-625)143594: |2 rvk | ||
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 233 |0 (DE-625)143620: |2 rvk | ||
100 | 1 | |a Koren, Israel |d 1945- |e Verfasser |0 (DE-588)172194202 |4 aut | |
245 | 1 | 0 | |a Fault-tolerant systems |c Israel Koren ; C. Mani Krishna |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier [u.a.] |c 2007 | |
300 | |a XIX, 378 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 7 | |a Falhas computacionais |2 larpcal | |
650 | 4 | |a Fault-tolerant computing | |
650 | 4 | |a Computer systems |x Reliability | |
650 | 0 | 7 | |a Hardware |0 (DE-588)4023422-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Fehlertoleranz |0 (DE-588)4123192-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computer |0 (DE-588)4070083-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | 1 | |a Fehlertoleranz |0 (DE-588)4123192-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Hardware |0 (DE-588)4023422-8 |D s |
689 | 1 | 1 | |a Fehlertoleranz |0 (DE-588)4123192-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 2 | 1 | |a Fehlertoleranz |0 (DE-588)4123192-2 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Computer |0 (DE-588)4070083-5 |D s |
689 | 3 | 1 | |a Zuverlässigkeit |0 (DE-588)4059245-5 |D s |
689 | 3 | |8 1\p |5 DE-604 | |
700 | 1 | |a Krishna, C. M. |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-0-08-049268-1 |w (DE-604)BV042314198 |
856 | 4 | |u http://www.loc.gov/catdir/toc/ecip073/2006031810.html |3 Table of contents only | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy0703/2006031810-d.html |3 Publisher description | |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015604601&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-015604601 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804136455752122368 |
---|---|
adam_text | Contents
Foreword
xi
Preface
xiii
Acknowledgements
xvii
About the Authors
xix
1
Preliminaries
1
1.1
Fault Classification
2
1.2
Types of Redundancy
3
1.3
Basic Measures of Fault Tolerance
4
1.3.1
Traditional Measures
5
1.3.2
Network Measures
6
1.4
Outline of This Book
7
1.5
Further Reading
9
References
10
2
Hardware Fault Tolerance
11
2.1
The Rate of Hardware Failures
11
2.2
Failure Rate, Reliability, and Mean Time to Failure
13
2.3
Canonical and Resilient Structures
15
2.3.1
Series and Parallel Systems
16
2.3.2
Non-Series/Parallel Systems
17
2.3.3
M-of-N Systems
20
2.3.4
Voters
23
2.3.5
Variations on N-Modular Redundancy
23
2.3.6
Duplex Systems
27
2.4
Other Reliability Evaluation Techniques
30
2.4.1
Poisson
Processes
30
2.4.2
Markov Models
33
Contents
2.5
Fault-Tolerance Processor-Level Techniques
36
2.5.1
Watchdog Processor
37
2.5.2
Simultaneous Multithreading for Fault Tolerance
39
2.6
Byzantine Failures
41
2.6.1
Byzantine Agreement with Message Authentication
46
2.7
Further Reading
48
2.8
Exercises
48
References
53
3
Information Redundancy
55
3.1
Coding
56
3.1.1
Parity Codes
57
3.1.2
Checksum
64
3.1.3
M-oi-N Codes
65
3.1.4
Berger
Code
66
3.1.5
Cyclic Codes
67
3.1.6
Arithmetic Codes
74
3.2
Resilient Disk Systems
79
3.2.1
RAID
Leveli
79
3.2.2
RAID Level
2 81
3.2.3
RAID Level
3 82
3.2.4
RAID Level
4 83
3.2.5
RAID Level
5 84
3.2.6
Modeling Correlated Failures
84
3.3
Data Replication
88
3.3.1
Voting: Non-Hierarchical Organization
89
3.3.2
Voting: Hierarchical Organization
95
3.3.3
Primary-Backup Approach
96
3.4
Algorithm-Based Fault Tolerance
99
3.5
Further Reading
101
3.6
Exercises
102
References
106
4
Fault-Tolerant Networks
109
4.1
Measures of Resilience
110
4.1.1
Graph-Theoretical Measures
110
4.1.2
Computer Networks Measures 111
4.2
Common Network Topologies and Their Resilience
112
4.2.1
Multistage and Extra-Stage Networks
112
4.2.2
Crossbar Networks
119
4.2.3
Rectangular Mesh and Interstitial Mesh
121
4.2.4
Hypercube Network
124
Contents
4.2.5 Cube-Connected
Cycles
Networks 128
4.2.6
Loop
Networks
130
4.2.7
Ad hoc Point-to-Point Networks
132
4.3
Fault-Tolerant
Routing 135
4.3.1
Hypercube
Fault-Tolerant Routing 136
4.3.2
Origin-Based
Routing in
the
Mesh
138
4.4
Further Reading
141
4.5
Exercises
142
References
145
5
Software Fault Tolerance
147
5.1
Acceptance Tests
148
5.2
Single-Version Fault Tolerance
149
5.2.1
Wrappers
149
5.2.2
Software Rejuvenation
152
5.2.3
Data Diversity
155
5.2.4
Software Implemented Hardware Fault Tolerance (SIHFT)
157
5.3
N-Version Programming
160
5.3.1
Consistent Comparison Problem
161
5.3.2
Version Independence
162
5.4
Recovery Block Approach
169
5.4.1
Basic Principles
169
5.4.2
Success Probability Calculation
169
5.4.3
Distributed Recovery Blocks
171
5.5
Preconditions, Postconditions, and Assertions
173
5.6
Exception-Handling
173
5.6.1
Requirements from Exception-Handlers
174
5.6.2
Basics of Exceptions and Exception-Handling
175
5.6.3
Language Support
177
5.7
Software Reliability Models
178
5.7.1
Jelinski-Moranda Model
178
5.7.2
Littlewood-Verrall Model
179
5.7.3
Musa-Okumoto Model
180
5.7.4
Model Selection and Parameter Estimation
182
5.8
Fault-Tolerant Remote Procedure Calls
182
5.8.1
Primary-Backup Approach
182
5.8.2
The Circus Approach
183
5.9
Further Reading
184
5.10
Exercises
186
References
188
Contents
6 Checkpointing 193
6.1
What is
Checkpointing? 195
6.1.1
Why is
Checkpointing Nontrivial? 197
6.2 Checkpoint Level 197
6.3 Optimal Checkpointing—An
Analytical
Model 198
6.3.1
Time Between
Checkpoints—
A First-Order
Approximation 200
6.3.2 Optimal Checkpoint
Placement
201
6.3.3
Time Between
Checkpoints—
A More Accurate
Model 202
6.3.4
Reducing Overhead
204
6.3.5
Reducing Latency
205
6.4
Cache-Aided Rollback Error Recovery (CARER)
206
6.5
Checkpointing in Distributed Systems
207
6.5.1
The Domino Effect and
Livelock
209
6.5.2
A Coordinated Checkpointing Algorithm
210
6.5.3
Time-Based Synchronization
211
6.5.4
Diskless Checkpointing
212
6.5.5
Message Logging
213
6.6
Checkpointing in Shared-Memory Systems
217
6.6.1
Bus-Based Coherence Protocol
218
6.6.2
Directory-Based Protocol
219
6.7
Checkpointing in Real-Time Systems
220
6.8
Other Uses of Checkpointing
223
6.9
Further Reading
223
6.10
Exercises
224
References
226
7
Casestudies
229
7.1
NonStop Systems
229
7.1.1
Architecture
229
7.1.2
Maintenance and Repair Aids
233
7.1.3
Software
233
7.1.4
Modifications to the NonStop Architecture
235
7.2
Stratus Systems
236
7.3 Cassini
Command and Data Subsystem
238
7.4
IBMG5
241
7.5
IBMSysplex
242
7.6
Itanium
244
7.7
Further Reading
246
References
247
8
Defect Tolerance in VLSI Circuits
249
8.1
Manufacturing Defects and Circuit Faults
249
Contents
8.2
Probability
of Failure and Critical Area
251
8.3
Basic Yield Models
253
8.3.1
The
Poisson
and Compound
Poisson
Yield Models
254
8.3.2
Variations on the Simple Yield Models
256
8.4
Yield Enhancement Through Redundancy
258
8.4.1
Yield Projection for Chips with Redundancy
259
8.4.2
Memory Arrays with Redundancy
263
8.4.3
Logic Integrated Circuits with Redundancy
270
8.4.4
Modifying the Floorplan
272
8.5
Further Reading
276
8.6
Exercises
277
References
281
9
Fault Detection in Cryptographic Systems
285
9.1
Overview of Ciphers
286
9.1.1
Symmetric Key Ciphers
286
9.1.2
Public Key Ciphers
295
9.2
Security Attacks Through Fault Injection
296
9.2.1
Fault Attacks on Symmetric Key Ciphers
297
9.2.2
Fault Attacks on Public (Asymmetric) Key Ciphers
298
9.3
Countermeasures
299
9.3.1
Spatial and Temporal Duplication
300
9.3.2
Error-Detecting Codes
300
9.3.3
Are These Countermeasures Sufficient?
304
9.3.4
Final Comment
307
9.4
Further Reading
307
9.5
Exercises
307
References
308
10
Simulation Techniques
311
10.1
Writing a Simulation Program
311
10.2
Parameter Estimation
315
10.2.1
Point Versus Interval Estimation
315
10.2.2
Method of Moments
316
10.2.3
Method of Maximum Likelihood
318
10.2.4
The Bayesian Approach to Parameter Estimation
322
10.2.5
Confidence Intervals
324
10.3
Variance Reduction Methods
328
10.3.1
Antithetic Variables
328
10.3.2
Using Control Variables
330
10.3.3
Stratified Sampling
331
10.3.4
Importance Sampling
333
Contents
10.4
Random Number Generation
341
10.4.1
Uniformly Distributed Random Number Generators
342
10.4.2
Testing Uniform Random Number Generators
345
10.4.3
Generating Other Distributions
349
10.5
Fault Injection
355
10.5.1
Types of Fault Injection Techniques
356
10.5.2
Fault Injection Application and Tools
358
10.6
Further Reading
358
10.7
Exercises
359
References
363
Subject Index
365
|
adam_txt |
Contents
Foreword
xi
Preface
xiii
Acknowledgements
xvii
About the Authors
xix
1
Preliminaries
1
1.1
Fault Classification
2
1.2
Types of Redundancy
3
1.3
Basic Measures of Fault Tolerance
4
1.3.1
Traditional Measures
5
1.3.2
Network Measures
6
1.4
Outline of This Book
7
1.5
Further Reading
9
References
10
2
Hardware Fault Tolerance
11
2.1
The Rate of Hardware Failures
11
2.2
Failure Rate, Reliability, and Mean Time to Failure
13
2.3
Canonical and Resilient Structures
15
2.3.1
Series and Parallel Systems
16
2.3.2
Non-Series/Parallel Systems
17
2.3.3
M-of-N Systems
20
2.3.4
Voters
23
2.3.5
Variations on N-Modular Redundancy
23
2.3.6
Duplex Systems
27
2.4
Other Reliability Evaluation Techniques
30
2.4.1
Poisson
Processes
30
2.4.2
Markov Models
33
Contents
2.5
Fault-Tolerance Processor-Level Techniques
36
2.5.1
Watchdog Processor
37
2.5.2
Simultaneous Multithreading for Fault Tolerance
39
2.6
Byzantine Failures
41
2.6.1
Byzantine Agreement with Message Authentication
46
2.7
Further Reading
48
2.8
Exercises
48
References
53
3
Information Redundancy
55
3.1
Coding
56
3.1.1
Parity Codes
57
3.1.2
Checksum
64
3.1.3
M-oi-N Codes
65
3.1.4
Berger
Code
66
3.1.5
Cyclic Codes
67
3.1.6
Arithmetic Codes
74
3.2
Resilient Disk Systems
79
3.2.1
RAID
Leveli
79
3.2.2
RAID Level
2 81
3.2.3
RAID Level
3 82
3.2.4
RAID Level
4 83
3.2.5
RAID Level
5 84
3.2.6
Modeling Correlated Failures
84
3.3
Data Replication
88
3.3.1
Voting: Non-Hierarchical Organization
89
3.3.2
Voting: Hierarchical Organization
95
3.3.3
Primary-Backup Approach
96
3.4
Algorithm-Based Fault Tolerance
99
3.5
Further Reading
101
3.6
Exercises
102
References
106
4
Fault-Tolerant Networks
109
4.1
Measures of Resilience
110
4.1.1
Graph-Theoretical Measures
110
4.1.2
Computer Networks Measures 111
4.2
Common Network Topologies and Their Resilience
112
4.2.1
Multistage and Extra-Stage Networks
112
4.2.2
Crossbar Networks
119
4.2.3
Rectangular Mesh and Interstitial Mesh
121
4.2.4
Hypercube Network
124
Contents
4.2.5 Cube-Connected
Cycles
Networks 128
4.2.6
Loop
Networks
130
4.2.7
Ad hoc Point-to-Point Networks
132
4.3
Fault-Tolerant
Routing 135
4.3.1
Hypercube
Fault-Tolerant Routing 136
4.3.2
Origin-Based
Routing in
the
Mesh
138
4.4
Further Reading
141
4.5
Exercises
142
References
145
5
Software Fault Tolerance
147
5.1
Acceptance Tests
148
5.2
Single-Version Fault Tolerance
149
5.2.1
Wrappers
149
5.2.2
Software Rejuvenation
152
5.2.3
Data Diversity
155
5.2.4
Software Implemented Hardware Fault Tolerance (SIHFT)
157
5.3
N-Version Programming
160
5.3.1
Consistent Comparison Problem
161
5.3.2
Version Independence
162
5.4
Recovery Block Approach
169
5.4.1
Basic Principles
169
5.4.2
Success Probability Calculation
169
5.4.3
Distributed Recovery Blocks
171
5.5
Preconditions, Postconditions, and Assertions
173
5.6
Exception-Handling
173
5.6.1
Requirements from Exception-Handlers
174
5.6.2
Basics of Exceptions and Exception-Handling
175
5.6.3
Language Support
177
5.7
Software Reliability Models
178
5.7.1
Jelinski-Moranda Model
178
5.7.2
Littlewood-Verrall Model
179
5.7.3
Musa-Okumoto Model
180
5.7.4
Model Selection and Parameter Estimation
182
5.8
Fault-Tolerant Remote Procedure Calls
182
5.8.1
Primary-Backup Approach
182
5.8.2
The Circus Approach
183
5.9
Further Reading
184
5.10
Exercises
186
References
188
Contents
6 Checkpointing 193
6.1
What is
Checkpointing? 195
6.1.1
Why is
Checkpointing Nontrivial? 197
6.2 Checkpoint Level 197
6.3 Optimal Checkpointing—An
Analytical
Model 198
6.3.1
Time Between
Checkpoints—
A First-Order
Approximation 200
6.3.2 Optimal Checkpoint
Placement
201
6.3.3
Time Between
Checkpoints—
A More Accurate
Model 202
6.3.4
Reducing Overhead
204
6.3.5
Reducing Latency
205
6.4
Cache-Aided Rollback Error Recovery (CARER)
206
6.5
Checkpointing in Distributed Systems
207
6.5.1
The Domino Effect and
Livelock
209
6.5.2
A Coordinated Checkpointing Algorithm
210
6.5.3
Time-Based Synchronization
211
6.5.4
Diskless Checkpointing
212
6.5.5
Message Logging
213
6.6
Checkpointing in Shared-Memory Systems
217
6.6.1
Bus-Based Coherence Protocol
218
6.6.2
Directory-Based Protocol
219
6.7
Checkpointing in Real-Time Systems
220
6.8
Other Uses of Checkpointing
223
6.9
Further Reading
223
6.10
Exercises
224
References
226
7
Casestudies
229
7.1
NonStop Systems
229
7.1.1
Architecture
229
7.1.2
Maintenance and Repair Aids
233
7.1.3
Software
233
7.1.4
Modifications to the NonStop Architecture
235
7.2
Stratus Systems
236
7.3 Cassini
Command and Data Subsystem
238
7.4
IBMG5
241
7.5
IBMSysplex
242
7.6
Itanium
244
7.7
Further Reading
246
References
247
8
Defect Tolerance in VLSI Circuits
249
8.1
Manufacturing Defects and Circuit Faults
249
Contents
8.2
Probability
of Failure and Critical Area
251
8.3
Basic Yield Models
253
8.3.1
The
Poisson
and Compound
Poisson
Yield Models
254
8.3.2
Variations on the Simple Yield Models
256
8.4
Yield Enhancement Through Redundancy
258
8.4.1
Yield Projection for Chips with Redundancy
259
8.4.2
Memory Arrays with Redundancy
263
8.4.3
Logic Integrated Circuits with Redundancy
270
8.4.4
Modifying the Floorplan
272
8.5
Further Reading
276
8.6
Exercises
277
References
281
9
Fault Detection in Cryptographic Systems
285
9.1
Overview of Ciphers
286
9.1.1
Symmetric Key Ciphers
286
9.1.2
Public Key Ciphers
295
9.2
Security Attacks Through Fault Injection
296
9.2.1
Fault Attacks on Symmetric Key Ciphers
297
9.2.2
Fault Attacks on Public (Asymmetric) Key Ciphers
298
9.3
Countermeasures
299
9.3.1
Spatial and Temporal Duplication
300
9.3.2
Error-Detecting Codes
300
9.3.3
Are These Countermeasures Sufficient?
304
9.3.4
Final Comment
307
9.4
Further Reading
307
9.5
Exercises
307
References
308
10
Simulation Techniques
311
10.1
Writing a Simulation Program
311
10.2
Parameter Estimation
315
10.2.1
Point Versus Interval Estimation
315
10.2.2
Method of Moments
316
10.2.3
Method of Maximum Likelihood
318
10.2.4
The Bayesian Approach to Parameter Estimation
322
10.2.5
Confidence Intervals
324
10.3
Variance Reduction Methods
328
10.3.1
Antithetic Variables
328
10.3.2
Using Control Variables
330
10.3.3
Stratified Sampling
331
10.3.4
Importance Sampling
333
Contents
10.4
Random Number Generation
341
10.4.1
Uniformly Distributed Random Number Generators
342
10.4.2
Testing Uniform Random Number Generators
345
10.4.3
Generating Other Distributions
349
10.5
Fault Injection
355
10.5.1
Types of Fault Injection Techniques
356
10.5.2
Fault Injection Application and Tools
358
10.6
Further Reading
358
10.7
Exercises
359
References
363
Subject Index
365 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Koren, Israel 1945- Krishna, C. M. |
author_GND | (DE-588)172194202 |
author_facet | Koren, Israel 1945- Krishna, C. M. |
author_role | aut aut |
author_sort | Koren, Israel 1945- |
author_variant | i k ik c m k cm cmk |
building | Verbundindex |
bvnumber | BV022395857 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.F38 |
callnumber-search | QA76.9.F38 |
callnumber-sort | QA 276.9 F38 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 150 ST 230 ST 233 |
ctrlnum | (OCoLC)73741844 (DE-599)BVBBV022395857 |
dewey-full | 004.2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.2 |
dewey-search | 004.2 |
dewey-sort | 14.2 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02792nam a2200673 c 4500</leader><controlfield tag="001">BV022395857</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210512 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">070420s2007 xxud||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2006031810</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0120885255</subfield><subfield code="c">alk. paper</subfield><subfield code="9">0-12-088525-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780120885251</subfield><subfield code="9">978-0-12-088525-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)73741844</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV022395857</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.F38</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.2</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 150</subfield><subfield code="0">(DE-625)143594:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Koren, Israel</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)172194202</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fault-tolerant systems</subfield><subfield code="c">Israel Koren ; C. Mani Krishna</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier [u.a.]</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIX, 378 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Falhas computacionais</subfield><subfield code="2">larpcal</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Fault-tolerant computing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer systems</subfield><subfield code="x">Reliability</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Computer</subfield><subfield code="0">(DE-588)4070083-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2="1"><subfield code="a">Zuverlässigkeit</subfield><subfield code="0">(DE-588)4059245-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krishna, C. M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-0-08-049268-1</subfield><subfield code="w">(DE-604)BV042314198</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/toc/ecip073/2006031810.html</subfield><subfield code="3">Table of contents only</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy0703/2006031810-d.html</subfield><subfield code="3">Publisher description</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015604601&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-015604601</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV022395857 |
illustrated | Illustrated |
index_date | 2024-07-02T17:16:30Z |
indexdate | 2024-07-09T20:56:41Z |
institution | BVB |
isbn | 0120885255 9780120885251 |
language | English |
lccn | 2006031810 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-015604601 |
oclc_num | 73741844 |
open_access_boolean | |
owner | DE-29T DE-706 DE-703 DE-634 DE-898 DE-BY-UBR DE-11 DE-739 DE-384 DE-188 |
owner_facet | DE-29T DE-706 DE-703 DE-634 DE-898 DE-BY-UBR DE-11 DE-739 DE-384 DE-188 |
physical | XIX, 378 S. graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Elsevier [u.a.] |
record_format | marc |
spelling | Koren, Israel 1945- Verfasser (DE-588)172194202 aut Fault-tolerant systems Israel Koren ; C. Mani Krishna Amsterdam [u.a.] Elsevier [u.a.] 2007 XIX, 378 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Falhas computacionais larpcal Fault-tolerant computing Computer systems Reliability Hardware (DE-588)4023422-8 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Zuverlässigkeit (DE-588)4059245-5 gnd rswk-swf Software (DE-588)4055382-6 gnd rswk-swf Fehlertoleranz (DE-588)4123192-2 gnd rswk-swf Computer (DE-588)4070083-5 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 s Fehlertoleranz (DE-588)4123192-2 s DE-604 Hardware (DE-588)4023422-8 s Software (DE-588)4055382-6 s Computer (DE-588)4070083-5 s Zuverlässigkeit (DE-588)4059245-5 s 1\p DE-604 Krishna, C. M. Verfasser aut Erscheint auch als Online-Ausgabe 978-0-08-049268-1 (DE-604)BV042314198 http://www.loc.gov/catdir/toc/ecip073/2006031810.html Table of contents only http://www.loc.gov/catdir/enhancements/fy0703/2006031810-d.html Publisher description Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015604601&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Koren, Israel 1945- Krishna, C. M. Fault-tolerant systems Falhas computacionais larpcal Fault-tolerant computing Computer systems Reliability Hardware (DE-588)4023422-8 gnd Datenverarbeitung (DE-588)4011152-0 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Software (DE-588)4055382-6 gnd Fehlertoleranz (DE-588)4123192-2 gnd Computer (DE-588)4070083-5 gnd |
subject_GND | (DE-588)4023422-8 (DE-588)4011152-0 (DE-588)4059245-5 (DE-588)4055382-6 (DE-588)4123192-2 (DE-588)4070083-5 |
title | Fault-tolerant systems |
title_auth | Fault-tolerant systems |
title_exact_search | Fault-tolerant systems |
title_exact_search_txtP | Fault-tolerant systems |
title_full | Fault-tolerant systems Israel Koren ; C. Mani Krishna |
title_fullStr | Fault-tolerant systems Israel Koren ; C. Mani Krishna |
title_full_unstemmed | Fault-tolerant systems Israel Koren ; C. Mani Krishna |
title_short | Fault-tolerant systems |
title_sort | fault tolerant systems |
topic | Falhas computacionais larpcal Fault-tolerant computing Computer systems Reliability Hardware (DE-588)4023422-8 gnd Datenverarbeitung (DE-588)4011152-0 gnd Zuverlässigkeit (DE-588)4059245-5 gnd Software (DE-588)4055382-6 gnd Fehlertoleranz (DE-588)4123192-2 gnd Computer (DE-588)4070083-5 gnd |
topic_facet | Falhas computacionais Fault-tolerant computing Computer systems Reliability Hardware Datenverarbeitung Zuverlässigkeit Software Fehlertoleranz Computer |
url | http://www.loc.gov/catdir/toc/ecip073/2006031810.html http://www.loc.gov/catdir/enhancements/fy0703/2006031810-d.html http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=015604601&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT korenisrael faulttolerantsystems AT krishnacm faulttolerantsystems |