The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reliability is a critical metric in the design and development of scale-out data storage clusters. A general multiway replication-based declustering scheme has been widely used in enterprise large-scale storage systems to improve the I/O parallelism. Unfortunately, given an increasing number of node failures, how often a cluster starts losing data when being scaled-out is not well investigated. In...
Voting algorithms are often used to improve a system's reliability through fault tolerance. However, when both the reliability of individual voters and the existence of rational attackers are taken into consideration, the number of voters that participate in an actual voting process determines the fault-and-attack tolerance performance of voting algorithms. In this paper, we are to find an optimal...
Distributed and peer-to-peer storage systems are foreseen as an alternative to the traditional data centers and in-house backup solutions. In the past few years many peer-to- peer storage systems have been proposed. Most of them rely on the use of erasure codes to introduce redundancy to the data. This kind of system depends on many parameters that need to be well tuned, such as the factor of redundancy,...
Recently there has been an effort to build scalable and reliable application-level multicast solutions that combine the resilience of pure gossip-based with the efficiency of tree-based schemes. However, such solutions assume that participants have unlimited resources, for instance, that they can send an unbounded number of messages to mask network omissions. Such scenario is not realistic, specially...
This paper intends to demonstrate that embedded systems have to fulfil high safety and reliability requirements if they are implemented in safety loops. It describes reliability and safety methods especially for the SIL classification of hardware components. Mathematical equations determine safety parameters using the Weibull distribution. Further two types of models are demonstrated: safety architectures...
A redundancy design strategy based on component's fault model of device was proposed for distributed control system (DCS). This paper analyzed component's fault model of typical device based on the characteristic of DCS, sorted the faults of components according to the feature which is individual and diagnostic online between the faults of redundancy devices, and put forward the invalidation rate...
The problem of detection of control flow errors in software has been studied extensively in literature and many detection techniques have been proposed. These techniques typically have high memory and performance overheads and hence are unusable for real-time embedded systems which have tight memory and performance budgets. This paper presents two algorithms by which the overheads associated with...
Networks on chips (NoCs) provide a mechanism for handling complex communications in the next generation of integrated circuits. At the same time, lower yield in nano-technology, makes self repair communication channels a necessity in design of digital systems. This paper proposes a reliable NoC architecture based on specific application mapped onto an NoC. This architecture is capable of recovering...
In this paper, we present a new technique to improve the reliability of H-tree SRAM memories. This technique deals with the SRAM power-bus monitoring by using built-in current sensor (BICS) circuits that detect abnormal current dissipation in the memory power-bus. This abnormal current is the result of a single-event upset (SEU) in the memory and it is generated during the inversion of the state of...
This paper describes hybrid-redundant design of monitoring systems with proprietary industrial-control computer boards. Input channels use three-mode redundancy, host controllers two-mode redundancy and output channels use warm redundancy. Experiments and analysis of system reliability by the Markov model indicate that the reliability of normal operation for 5 years is above 0.9.
Distributed video coding (DVC) technology is investigated and payed more and more attentions in wireless video applications because of characteristics of its encoder with low-complexity and decoder with high-complexity. Its coding types can be sorted the key and Wyner-Ziv frames, key frames are with conventional intra-coding mode, Wyner-Ziv frames are coded by an encoder that is composed of quantizer...
Due to resource constraints, digital image transmissions are a significant challenge for image sensor based wireless sensor networks (WSN). In this paper, we propose a novel robust and energy-efficient scheme, called image component transmission (ICT) in WSN by providing various levels of reliability during image transmissions. Essential components such as the information for the positions of significant...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.