Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Browse All Reviews > Software (D) > Operating Systems (D.4) > Reliability (D.4.5)  
 
Options:
 
  1-10 of 46 Reviews about "Reliability (D.4.5)": Date Reviewed
  Formal verification of control system software
Garoche P., PRINCETON UNIVERSITY PRESS, Princeton, NJ, 2019. 224 pp.  Type: Book (978-0-691181-30-1)

This outstanding work manages to deal with key topics, many of which are highly advanced, while also being encyclopedic (in a good sense) within a mere 200 pages. In spite of its advanced nature, all levels of reader will be informed o...

May 10 2021
  Spectrum-based fault localization in model transformations
Troya J., Segura S., Parejo J., Ruiz-Cortés A. ACM Transactions on Software Engineering and Methodology 27(3): 1-50, 2018.  Type: Article

Model transformation is a recognized cornerstone in software engineering. Any nontrivial software system involves some kind of model transformation (for example, a large and heterogeneous system or an automotive system). Insuring that ...

Jan 31 2019
  ARMISCOM: self-healing service composition
Vizcarrondo J., Aguilar J., Exposito E., Subias A. Service Oriented Computing and Applications 11(3): 345-365, 2017.  Type: Article

The evolution of service-oriented architecture (SOA) and the demands from industry provide opportunity on one hand, and requirements on the other--to develop fault-tolerant, robust, and resilient configurations of web services...

Jan 4 2018
  Beyond subterm-convergent equational theories in automated verification of stateful protocols
Dreier J., Duménil C., Kremer S., Sasse R.  POST 2017 (Proceedings of the 6th International Conference on Principles of Security and Trust, Uppsala, Sweden, Apr 22-29, 2017) 117-140, 2017.  Type: Proceedings

The Tamarin Prover, a protocol analyzer tool for security protocols with cryptographic primitives, accepts protocols including cryptographic primitives such as encryption, signatures, and hash functions. More advanced primitives are al...

Oct 26 2017
  Embedded software verification and debugging
Lettnin D., Winterholer M., Springer International Publishing, New York, NY, 2017.  Type: Book (9781461422655)

Speaking about embedded software and hardware is related to speaking about critical systems, which by definition must be reliable systems with no failures at all. Or, in case of failures, systems must have enough intelligence to operat...

Jul 26 2017
  Fault tolerance with aspects: a feasibility study
Karol S., Rink N., Gyapjas B., Castrillon J.  MODULARITY 2016 (Proceedings of the 15th International Conference on Modularity, Málaga, Spain, Mar 14-17, 2016) 66-69, 2016.  Type: Proceedings

Writing programs to manage and mitigate faults is a complex and usually custom process. Are there approaches to help one easily create a correct and reliable program when running on unreliable hardware? This paper reports on the goals ...

Nov 29 2016
  Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes
Akinyele J., Green M., Hohenberger S., Pagano M. Journal of Computer Security 22(6): 867-912, 2014.  Type: Article

With the Internet of Things (IoT) quickly becoming a reality, the importance of secure communications between devices cannot be overstated. Since there are many small devices involved in such networks, the algorithms needed for authent...

Aug 20 2015
  Depot: cloud storage with minimal trust
Mahajan P., Setty S., Lee S., Clement A., Alvisi L., Dahlin M., Walfish M. ACM Transactions on Computer Systems 29(4): 1-38, 2011.  Type: Article

Storage service providers (SSPs) are fault-prone black boxes operated by a third party. Prudent clients should avoid strong assumptions about the integrity of data stored remotely and implement some form of end-to-end checks. Based on ...

Apr 2 2012
  Enforcing structural regularities in software using IntensiVE
Brichau J., Kellens A., Castro S., DHondt T. Science of Computer Programming 75(4): 232-246, 2010.  Type: Article

One way to make programs more comprehensible and maintainable is to ensure that they follow appropriate conventions, expressed as design patterns, coding conventions, and so forth. Typically, this is done by training or exhortation: pr...

Oct 4 2010
  SWEEPER: an efficient disaster recovery point identification mechanism
Verma A., Voruganti K., Routray R., Jain R.  File and storage technologies (Proceedings of the 6th USENIX Conference on File and Storage Technologies, San Jose, California, Feb 26-29, 2008) 1-16, 2008.  Type: Proceedings

An effective business continuity contingency plan mandates efficient disaster recovery strategies predicated on cost, level of involvement, precedence, and accessible resources. Today, most data recovery procedures consist of protracte...

Jun 23 2008
 
 
 
Display per page
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy