1989
DOI: 10.1007/978-3-642-75002-1_5
|View full text |Cite
|
Sign up to set email alerts
|

Design and Analysis of Fault-Tolerant Systems for Industrial Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
206
0
15

Year Published

1998
1998
2015
2015

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 135 publications
(221 citation statements)
references
References 14 publications
0
206
0
15
Order By: Relevance
“…The basic idea is, for each time, two copies of the original task are inserted into the task graph together. When the results from these three tasks are different, majority voting [15] is used to decide the correct value (this is also called Triple Module Redundancy (TMR) [15]). Table 5 shows the number of original tasks duplicated by two versions of S_R_INC schedule algorithms, single duplication vs. double duplication.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic idea is, for each time, two copies of the original task are inserted into the task graph together. When the results from these three tasks are different, majority voting [15] is used to decide the correct value (this is also called Triple Module Redundancy (TMR) [15]). Table 5 shows the number of original tasks duplicated by two versions of S_R_INC schedule algorithms, single duplication vs. double duplication.…”
Section: Resultsmentioning
confidence: 99%
“…System reliability can be ensured by using different redundancy techniques, such as hardware redundancy, software redundancy, information redundancy, and time redundancy [15]. Various methods for reducing the transient faults in deep submicron ICs have been proposed [2,[7][8][9][10]16].…”
Section: Related Workmentioning
confidence: 99%
“…Mission and safety-critical applications, by default, employ redundancy in system design to overcome any arbitrary function module fault(s)/failure(s) to provide correct and uninterrupted operation [1]. The function module deployed could be any circuit/system that is duplicated as per need to construct a redundant system.…”
Section: Introductionmentioning
confidence: 99%
“…In safety-critical applications, ranging from national defense to interests of commercial companies and private citizens, techniques of fault tolerant computing are important and effective to improve the reliability and dependability of real-time systems [1,7,8].…”
Section: Introductionmentioning
confidence: 99%