2007
DOI: 10.1007/978-3-540-74035-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Architecting Dynamic Reconfiguration in Dependable Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0
1

Year Published

2008
2008
2014
2014

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 13 publications
(8 citation statements)
references
References 26 publications
0
7
0
1
Order By: Relevance
“…Regarding approches that advocate model-driven reconfigurations [14][13] [15] [19][21] [27], the focus is mainly on on the capture of application-specific architectural constraints, mostly through the use of architectural styles [16] [26]. Complementary to the architectural constraints that we consider in this paper, application-specific constraints do not require to be incrementally preserved during a reconfiguration, they only need to be preserved by the target architecture.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Regarding approches that advocate model-driven reconfigurations [14][13] [15] [19][21] [27], the focus is mainly on on the capture of application-specific architectural constraints, mostly through the use of architectural styles [16] [26]. Complementary to the architectural constraints that we consider in this paper, application-specific constraints do not require to be incrementally preserved during a reconfiguration, they only need to be preserved by the target architecture.…”
Section: Related Workmentioning
confidence: 99%
“…A component may indeed fail to successfully apply a reconfiguration operation. To face this limitation, [13] [14] [19] advocate a rollback strategy based on inverse operations. However, this approach only tolerates a single failure since the rollback only succeeds if all inverse operations succeed.…”
Section: Introductionmentioning
confidence: 99%
“…for a sequential component the selected algorithm whereas for a parallel computation the exploited parallelism scheme). The actual system configuration can be modified by exploiting dynamic reconfiguration activities classified in four general categories (Arshad et al, 2007;Gomes et al, 2007;Hillman & Warren, 2004;Tsai et al, 2007;Vanneschi & Veraldi, 2007):…”
Section: Related Workmentioning
confidence: 99%
“…Além de seu potencial sócio-econômico, o sistema tem-se mostrado um excelente caso de uso, permitindo a análise de técnicas avançadas de especificação arquitetural [3], bem como apontando dificuldades práticas na codificação de aspectos -como aquelas encontradas na funcionalidade de criptografia nos Web Services da Central de Regulação.…”
Section: Conclusõesunclassified