Computers are currently used in a variety of critical applications, including systems for nuclear reactor control, flight control (both aircraft and spacecraft), and air traffic control. Moreover, experience has shown that the dependability of such systems is particularly sensitive to that of its software components, both the system software of the embedded computers and the application software they support. Software Performability: From Concepts to Applications addresses the construction and solution of analytic performability models for critical-application software. The...
Computers are currently used in a variety of critical applications, including systems for nuclear reactor control, flight control (both aircraft and s...
Computers are currently used in a variety of critical applications, including systems for nuclear reactor control, flight control (both aircraft and spacecraft), and air traffic control. Moreover, experience has shown that the dependability of such systems is particularly sensitive to that of its software components, both the system software of the embedded computers and the application software they support. Software Performability: From Concepts to Applications addresses the construction and solution of analytic performability models for critical-application software. The...
Computers are currently used in a variety of critical applications, including systems for nuclear reactor control, flight control (both aircraft and s...
This volume contains the papers presented at the Second International Work ing Conference on Dependable Computing for Critical Applications, sponsored by IFIP Working Group lOA and held in Tucson, Arizona on February 18-20, 1991. In keeping with the first such conference on this topic, which took place at the University of California, Santa Barbara in 1989, this meeting was like wise concerned with an important basic question: Can we rely on Computers? In more precise terms, it addressed various aspects of computer system de pendability, a broad concept defined as th'e trustworthiness of...
This volume contains the papers presented at the Second International Work ing Conference on Dependable Computing for Critical Applications, sponsored...