E-Book, Englisch, 199 Seiten, Web PDF
Reihe: IFAC Workshop Series
Quirk Safety of Computer Control Systems 1986 (Safecomp '86) Trends in Safe Real Time Computer Systems
1. Auflage 2017
ISBN: 978-1-4832-9947-1
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
Proceedings of the Fifth IFAC Workshop, Sarlat, France, 14-17 October 1986
E-Book, Englisch, 199 Seiten, Web PDF
Reihe: IFAC Workshop Series
ISBN: 978-1-4832-9947-1
Verlag: Elsevier Science & Techn.
Format: PDF
Kopierschutz: 1 - PDF Watermark
The proceedings of the fifth workshop in this subject continue the trend set by the previous four and discusses some of the current problems involved in the design and production of safe real-time computer systems. Topics covered include software quality assurance, software fault tolerance, design for safety, and reliability and safety assessment. Every paper details the theoretical and practical problems involved in the development of safe systems and should therefore be of interest to all those involved in systems design.
Autoren/Hrsg.
Weitere Infos & Material
1;Front Cover;1
2;Safety of Computer Control Systems 1986 (SAFECOMP '86): Trends in Safe Real Time Computer Systems;4
3;Copyright Page;5
4;Table of Contents;8
5;Preface;7
6;SESSION 1: SOFTWARE QUALITY ASSURANCE;10
6.1;CHAPTER 1. SOME THOUGHTS ON SOFTWARE QUALITY ASSURANCE;10
6.1.1;INTRODUCTION;10
6.1.2;DEFINITIONS;10
6.1.3;DELIMITATION OF SOFTWARE QUALITY ASSURANCE;12
6.1.4;SYSTEM TESTING: AN EXAMPLE OF DELIMITATION;13
6.1.5;CONCLUSIONS;14
6.1.6;ACKNOWLEDGMENT;15
6.1.7;REFERENCES;15
6.2;CHAPTER 2. QUANTITATIVE ASSESSMENT OF SAFE AND RELIABLE SOFTWARE;16
6.2.1;INTRODUCTION;16
6.2.2;HOH TO MAKE SAFE SYSTEMS;17
6.2.3;ATTRIBUTES AND THEIR MEASURES;17
6.2.4;ASSESSMENT OF CRITICAL SOFTHARE;19
6.2.5;STANDARDS AND GUIDELINES;19
6.2.6;CONCLUSIONS;20
6.2.7;REFERENCES;20
6.3;CHAPTER 3. MODELLING SYSTEM QUALITY;22
6.3.1;INTRODUCTION;22
6.3.2;MODELS;22
6.3.3;QUALITY;23
6.3.4;QUALITY MODELLING;23
6.3.5;QUALITY MODELLING OF SOFTWARE;24
6.3.6;CONCLUSIONS AND THE WAY AHEAD;24
6.3.7;REFERENCES;24
6.3.8;ACKNOWLEDGEMENTS;24
6.4;CHAPTER 4. PROGRAMMABLE ELECTRONIC SYSTEMS SAFETY: STANDARDS AND PRINCIPLES—AN INDUSTRIAL VIEWPOINT;26
6.4.1;INTRODUCTION;26
6.4.2;ICI's ROLE IN STANDARDS WORK;26
6.4.3;ICI's APPROACH TO THE SAFE USE OF PROGRAMMABLE ELECTRONIC SYSTEMS;27
6.4.4;CONCLUSIONS;29
6.4.5;REFERENCES;29
7;SESSION 2: SOFTWARE FAULT-TOLERANCE;30
7.1;CHAPTER 5. A RECOVERY BLOCK MODEL AND ITS ANALYSIS;30
7.1.1;1 Introduction;30
7.1.2;2 Notations;30
7.1.3;3 Related Works;31
7.1.4;4 A Combined Model;32
7.1.5;5 Simulation and Analysis;33
7.1.6;6 Conclusions;35
7.1.7;References;35
7.1.8;Acknowledgements;35
7.2;CHAPTER 6. SOFTWARE DIVERSITY—SOME CONSIDERATIONS ABOUT ITS BENEFITS AND ITS LIMITATIONS;36
7.2.1;THE DIFFERENT FAILURE SETS OF A TWO-FOLD DIVERSE SYSTEM;36
7.2.2;2. EXPERIMENTAL APPROACH;38
7.2.3;3. THEORETICAL APPROACH;40
7.2.4;4. ADDITIONAL REQUIREMENTS;41
7.2.5;5. COMPARISON BETWEEN SINGLE AND DIVERSE USE OF PROGRAMS;41
7.2.6;6. CONCLUSION;42
7.2.7;REFERENCES;42
7.3;CHAPTER 7. ERROR RECOVERY IN MULTI-VERSION SOFTWARE;44
7.3.1;INTRODUCTION;44
7.3.2;RECOVERY IN MULTI-VERSION SOFTWARE;44
7.3.3;COMMUNITY ERROR RECOVERY;45
7.3.4;IMPLEMENTATION OF RECOVERY IN DEDIX;45
7.3.5;RELIABILITY MODELS FOR MULTI-VERSION SOFTWARE;47
7.3.6;CONCLUSION;50
7.3.7;ACKNOWLEDGEMENTS;50
7.3.8;REFERENCES;50
7.4;CHAPTER 8. MULTI-VERSION SOFTWARE DEVELOPMENT;52
7.4.1;INTRODUCTION;52
7.4.2;PREVIOUS EXPERIMENTS;52
7.4.3;SECOND GENERATION EXPERIMENT;53
7.4.4;CURRENT RESEARCH ISSUES;55
7.4.5;CONCLUSIONS;57
7.4.6;REFERENCES;57
8;SESSION 3: FAULT-TOLERANT DISTRIBUTED SYSTEMS;60
8.1;CHAPTER 9. THE JOIN ALGORITHM: ORDERING MESSAGES IN REPLICATED SYSTEMS;60
8.1.1;1. Introduction;60
8.1.2;2. An Architecture for Replicated Processing;60
8.1.3;3 . The Join Algorithm;61
8.1.4;4. A Simple Example;62
8.1.5;Concluding Remarks;63
8.1.6;Acknowledgements;63
8.1.7;References;64
8.2;CHAPTER 10. PROTECTION OF SHARED RESOURCES;66
8.2.1;1. INTRODUCTION;66
8.2.2;2. THE ADDRESSING SCHEME AND THE PROTECTION SYSTEM;66
8.2.3;3. DYNAMIC PROTECTION MANAGEMENT;67
8.2.4;4. THE MONITOR;67
8.2.5;5. OPERATING SYSTEM AND PROTECTION SYSTEM;68
8.2.6;6. CONCLUDING REMARKS;69
8.2.7;7. REFERENCES;69
8.3;CHAPTER 11. A PROPOSAL FOR DISTRIBUTED COMMITMENT AND ABORT OF MULTI-SITE TRANSACTIONS IN A MULTIMICROPROCESSOR SYSTEM;72
8.3.1;INTRODUCTION;72
8.3.2;MULTI-SITE TRANSACTIONS;73
8.3.3;STATES OF A SITE;73
8.3.4;THE BAMP PROTOCOL UNDER NORMAL OPERATION;73
8.3.5;BAMP AND FAILURES;73
8.3.6;TIME-OUT;74
8.3.7;OVERVIEW OF THE MARA ARCHITECTURE;74
8.3.8;IMPLEMENTATION NOTES;74
8.3.9;CONCLUSIONS;75
8.3.10;ACKNOWLEDGMENTS;75
8.3.11;REFERENCES;75
8.4;CHAPTER 12. A ROBUST DATABASE FOR SAFE REAL-TIME SYSTEMS;76
8.4.1;INTRODUCTION;76
8.4.2;THE DATABASE MANAGER;78
8.4.3;THE USER - DATABASE INTERFACE;79
8.4.4;READ(BLOCK,FIELD,KEYS,CONDS);80
8.4.5;WRITE(BLOCK,FIELD,KEYS,CONDS);80
8.4.6;ADD(BLOCK,FIELD,KEYS,CONDS,OPERAND);80
8.4.7;SYSTEM PERFORMANCE;80
8.4.8;CONCLUSIONS;80
8.4.9;REFERENCES;81
8.5;CHAPTER 13. FAULT DETECTION USING INVERSE TRANSFER CHARACTERISTIC SOFTWARE;82
8.5.1;ABSTRACT;82
8.5.2;INTRODUCTION;82
8.5.3;INVERSE SYSTEM CHARACTERISTIC;83
8.5.4;MONITORING SCHEME;84
8.5.5;ILLUSTRATIVE EXAMPLES;85
8.5.6;WEIGHTED SUM OF VARIABLES, Y;87
8.5.7;TRANSIENT RESPONSE OF A TIME INTEGRATOR;89
8.5.8;NON LINEAR EQUATIONS;90
8.5.9;DISCUSSION;90
9;SESSION 4: SAFE AND RELIABLE ARCHITECTURES;92
9.1;CHAPTER 14. SELF-CHECKING CIRCUITS: FROM THEORY TO PRACTICE;92
9.1.1;I - INTRODUCTION;92
9.1.2;II - BASIC THEORY;92
9.1.3;Ill - GENERAL LAYOUT RULES FOR THE DESIGN OF STRONGLY FAULT SECURE CIRCUITS;93
9.1.4;IV - COMPLEX VLSI SELF CHECKING CIRCUITS;96
9.1.5;V - CHECKERS DESIGN AND UNIFIED BIST SCHEME;96
9.1.6;VI - CONCLUSIONS;97
9.1.7;REFERENCES;97
9.2;CHAPTER 15. HIGH RELIABILITY FEATURES BUILT IN THE VSB BUS;98
9.2.1;1. INTRODUCTION;98
9.2.2;2. GENERAL VSB FEATURES;98
9.2.3;3. VSB SPACES;98
9.2.4;4. PARALLEL ARBITRATION;98
9.2.5;5. PARALLEL INTERRUPT;99
9.2.6;6. ADDRESS BROADCAST;99
9.2.7;7. DYNAMIC BUS SIZING;100
9.2.8;8. DATA BROADCAST AND BROADCALL;100
9.2.9;9. CACHE COHERENCE;100
9.2.10;10. BLOCK TRANSFER DYNAMIC SLAVE CONTROL;100
9.2.11;11. INDIVISIBLE ACCESS CAPABILITY;100
9.2.12;12. GEOGRAPHICAL ADDRESS;100
9.2.13;13. CONCLUSION;101
9.2.14;REFERENCE;101
9.3;CHAPTER 16. SAFE AND RELIABLE COMPUTING ON BOARD THE AIRBUS AND ATR AIRCRAFT;102
9.3.1;INTRODUCTION;102
9.3.2;DEPENDABILITY PROCUREMENT;102
9.3.3;DEPENDABILITY CONFIDENCE;105
9.3.4;REFERENCES;105
10;SESSION 5: KNOWLEDGE BASED APPROACH TO SAFETY;108
10.1;CHAPTER 17. USING AI-METHODS TO IMPROVE SOFTWARE SAFETY;108
10.1.1;INTRODUCTION;108
10.1.2;SOFTWARE SAFETY;108
10.1.3;THE SAFETY BAG TECHNIQUE;109
10.1.4;THE BASIC SOFTWARE ARCHITECTURE OF ELEKTRA;113
10.1.5;CONCLUSIONS;114
10.1.6;REFERENCES;114
10.2;CHAPTER 18. DATA BASE COHERENCE: LRC LANGUAGE COMMUTATIVE CONVERGENCE;116
10.2.1;INTRODUCTION;116
10.2.2;1. LRC LANGUAGE;116
10.2.3;2. RULE BASE CONVERGENCE;118
10.2.4;3. INFERENCE CUMMUTATIVIY;120
10.2.5;4. LRC SOFTWARE;122
10.2.6;REFERENCES;124
11;SESSION 6: MAN-MACHINE INTERFACE;126
11.1;CHAPTER 19. TOWARD FAULT-TOLERANT USER INTERFACES1;126
11.1.1;INTRODUCTION;126
11.1.2;CHARACTERIZATIONS OF USER INTERFACES;127
11.1.3;IMPORTANCE OF FT INTERFACES;127
11.1.4;WHY DO PEOPLE MAKE MISTAKES?;127
11.1.5;OVERCOMING COGNITIVE/USER LIMITATIONS;128
11.1.6;THE ARCHITECTURE OF FSBB;129
11.1.7;EXPERIMENTAL DESIGN;129
11.1.8;DISCUSSION;130
11.1.9;COST OF FAULT-TOLERANCE;131
11.1.10;CONCLUSION;131
11.1.11;References;131
11.2;CHAPTER 20. MODELLING THE REAL ISSUES IN DEPENDABLE COMMUNICATIONS SYSTEMS;132
11.2.1;1. INTRODUCTION;132
11.2.2;2. A SYSTEMS APPROACH;133
11.2.3;3. MODELLING PRINCIPLES;134
11.2.4;4. DEPENDABILITY BREACHES;135
11.2.5;5. A PROPOSED RATIONAL DECISION MAKING PROCEDURE;135
11.2.6;6. CONCLUSION;136
11.2.7;Acknowledgements;136
11.2.8;References;136
12;SESSION 7: DESIGN FOR SAFETY;138
12.1;CHAPTER 21. AN OUTLINE OF A PROGRAM TO ENHANCE SOFTWARE SAFETY;138
12.1.1;INTRODUCTION;138
12.1.2;A SOFTWARE SAFETY PROGRAM;138
12.1.3;CONCLUSIONS;143
12.1.4;REFERENCES;144
12.2;CHAPTER 22. REQUIREMENTS MODELLING OF INDUSTRIAL REAL-TIME SYSTEMS BY AUTOMATA AND STRUCTURED ANALYSIS;146
12.2.1;INTRODUCTION;146
12.2.2;REQUIREMENT ENGINEERING;146
12.2.3;INDUSTRIAL REAL TIME SYSTEMS;147
12.2.4;MODEL OR PROTOTYPE ?;147
12.2.5;TECHNOLOGY FOR INDUSTRIAL REAL TIME SYSTEMS REQUIREMENT ENGINEERING;148
12.2.6;THE ASA TECHNIQUE;148
12.2.7;CONCLUSION;150
12.2.8;BIBLIOGRAPHY;151
12.3;CHAPTER 23. ENGINEERING SOFTWARE SAFETY;152
12.3.1;INTRODUCTION;152
12.3.2;SOFTWARE ENGINEERING;152
12.3.3;THE FOREST PROJECT;153
12.3.4;DESIGN FOR SYSTEM SAFETY;154
12.3.5;ENGINEERING SOFTWARE;154
12.3.6;(RE)EDUCATION;155
12.3.7;CONCLUSION;155
12.3.8;REFERENCES;156
12.4;CHAPTER 24. DESIGN FOR SAFETY USING TEMPORAL LOGIC;158
12.4.1;INTRODUCTION;158
12.4.2;TEMPORAL LOGIC;158
12.4.3;THE CONTROLLED SYSTEM AND ITS MODEL;159
12.4.4;THE TOP LEVEL DESIGN;160
12.4.5;DEMONSTRATION OF SAFETY;161
12.4.6;STRENGTHENING THE "SOFT" ASSERTIONS;162
12.4.7;DEMONSTRATION OF SAFETY INCLUDING GATES;163
12.4.8;CONCLUSION;164
12.4.9;REFERENCES;164
13;SESSION 8: RELIABILITY AND SAFETY ASSESSMENT;166
13.1;CHAPTER 25. MODELLING AND DEPENDABILITY EVALUATION OF SAFETY SYSTEMS IN CONTROL AND MONITORING APPLICATIONS;166
13.1.1;ABSTRACT;166
13.1.2;INTRODUCTION;166
13.1.3;I - ANALYSIS OF SAFETY SYSTEMS;166
13.1.4;II - DEPENDABILITY MEASURES;167
13.1.5;Ill - EVALUATION METHODOLOGY;168
13.1.6;IV. EVALUATION OF SIMPLEX AND DUPLEX SAFETY SYSTEMS;169
13.1.7;CONCLUSIONS;173
13.1.8;ACKNOWLEDGEMENT;173
13.1.9;REFERENCES;173
13.2;CHAPTER 26. RDPS: A SOFTWARE PACKAGE FOR THE VALIDATION AND EVALUATION OF DEPENDABLE COMPUTER SYSTEMS;174
13.2.1;1. INTRODUCTION;174
13.2.2;2. STOCHASTIC PETRI NETS;174
13.2.3;3. THE RDPS TOOL;175
13.2.4;4. APPLICATION OF RDPS TO A COMPLEX DEPENDABILITY STUDY;177
13.2.5;5. CONCLUSION;178
13.2.6;REFERENCES;179
13.3;CHAPTER 27. DEPENDABILITY PREDICTION: COMPARISON OF TOOLS AND TECHNIQUES;180
13.3.1;1. Introduction;180
13.3.2;2. Dependability Models;180
13.3.3;3. Tools for Dependability Analysis;182
13.3.4;4. Summary;187
13.3.5;References;187
14;SESSION 9: TEST AND QUALIFICATION;188
14.1;CHAPTER 28. TESTING STRATEGIES AND TESTING ENVIRONMENT FOR REACTOR SAFETY SYSTEM SOFTWARE;188
14.1.1;1. INTRODUCTION;188
14.1.2;2. TESTING PRACTICE;188
14.1.3;3. TEST DATA DESIGN GUIDELINES;189
14.1.4;4. LEVEL OF TEST INITIATION;190
14.1.5;5. TEST ENVIRONMENT;190
14.1.6;6. IMPLEMENTATION DETAILS;191
14.1.7;7. CONCLUSIONS;191
14.1.8;REFERENCES;192
14.2;CHAPTER 29. BASIC QUALIFICATION CONCEPTS FOR INSTRUMENTATION AND CONTROL SYSTEMS;194
14.2.1;INTRODUCTION;194
14.2.2;INITIAL ASSUMPTIONS;194
14.2.3;LIFE CYCLE;194
14.2.4;INITIATING EVENTS;195
14.2.5;PHYSICAL PARAMETERS AND THEIR RANGES;195
14.2.6;SYNERGISM;195
14.2.7;ATTENUATION METHODS;195
14.2.8;FUNCTIONALITY;196
14.2.9;CONCLUSIONS;196
14.2.10;REFERENCES;196
15;AUTHOR INDEX;200
16;SUBJECT INDEX;202