2009 International Conference on Innovations in Information Technology (IIT) 2009
DOI: 10.1109/iit.2009.5413780
|View full text |Cite
|
Sign up to set email alerts
|

A majority voter for intrusion tolerant software based on N-version programming techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2017
2017
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 9 publications
0
2
0
Order By: Relevance
“…According to the type of voting, the voter can be exact or inexact. The exact voter compares the inputs, and they must be equal to be considered as correct if one input is distinct not matter the difference the input is marked as incorrect . On the contrary, the inexact voting has a threshold at which the input can vary, this means if an input is distinct but the difference is lower than the specified threshold, the input is marked as correct and is used to generate the output.…”
Section: State Of the Artmentioning
confidence: 99%
“…According to the type of voting, the voter can be exact or inexact. The exact voter compares the inputs, and they must be equal to be considered as correct if one input is distinct not matter the difference the input is marked as incorrect . On the contrary, the inexact voting has a threshold at which the input can vary, this means if an input is distinct but the difference is lower than the specified threshold, the input is marked as correct and is used to generate the output.…”
Section: State Of the Artmentioning
confidence: 99%
“…If the output value doesn't match the previously obtained one, a new class is created, if the value matches the existing class [6][7], then this class weight will be recalculated as version class class total…”
Section: Software Implementation Of the Simulation Environmentmentioning
confidence: 99%