A conceptually novel and powerful technique to achieve fault tolerance in hardware and software systems is introduced. When used for software fault tolerance, this new technique uses time and software redundancy and can be outlined as follows. In the initial phase, a program is run to solve a problem and store the result. In addition, this program leaves behind a trail of data called a certification trail. In the second phase, another program is run which solves the original problem again. This program, however, has access to the certification trail left by the first program. Because of the availability of the certification trail, the second phase can be performed by a less complex program and can execute more quickly. In the final phase, t...
In this thesis, we present techniques to recognize basic algorithms covered in computer science educ...
In this research, methods that will be able to solve the second order initial value problem (IVP) di...
1. Introduction In this archive, we provide the implementation and experimental results of eight di...
Learning to program is now a requirement in many courses of study in such areas as computer science,...
This work studies the reliability of embedded systems with approximate computing on software and har...
A formally verified implementation of the 'oral messages' algorithm of Pease, Shostak, and Lamport i...
International audienceComputer programs may go wrong due to exceptional behaviors, out-of-bound arra...
Products of this project will significantly improve the quality and productivity of Space Station Fr...
A style manual is presented to serve as a reference and guide for system and program documentation. ...
The basic organization of the fault tolerant multiprocessor, (FTMP) is that of a general purpose hom...
This talk presents the latest stage in formal development of a fault-tolerant clock synchronization ...
This tutorial attempts to provide a frank, step-by-step approach to Reed-Solomon (RS) error correcti...
The method of program packages [1] is a tool for identyfying the solvability conditions of guarantee...
Invited presentation at the SPEC (Service de Physique de l'Etat Condensé) seminar at CEA Saclay,Comp...
Electronic logic gates that operate using N logic state levels, where N is greater than 2, and metho...
In this thesis, we present techniques to recognize basic algorithms covered in computer science educ...
In this research, methods that will be able to solve the second order initial value problem (IVP) di...
1. Introduction In this archive, we provide the implementation and experimental results of eight di...
Learning to program is now a requirement in many courses of study in such areas as computer science,...
This work studies the reliability of embedded systems with approximate computing on software and har...
A formally verified implementation of the 'oral messages' algorithm of Pease, Shostak, and Lamport i...
International audienceComputer programs may go wrong due to exceptional behaviors, out-of-bound arra...
Products of this project will significantly improve the quality and productivity of Space Station Fr...
A style manual is presented to serve as a reference and guide for system and program documentation. ...
The basic organization of the fault tolerant multiprocessor, (FTMP) is that of a general purpose hom...
This talk presents the latest stage in formal development of a fault-tolerant clock synchronization ...
This tutorial attempts to provide a frank, step-by-step approach to Reed-Solomon (RS) error correcti...
The method of program packages [1] is a tool for identyfying the solvability conditions of guarantee...
Invited presentation at the SPEC (Service de Physique de l'Etat Condensé) seminar at CEA Saclay,Comp...
Electronic logic gates that operate using N logic state levels, where N is greater than 2, and metho...
In this thesis, we present techniques to recognize basic algorithms covered in computer science educ...
In this research, methods that will be able to solve the second order initial value problem (IVP) di...
1. Introduction In this archive, we provide the implementation and experimental results of eight di...