2001
DOI: 10.1016/s0166-5316(00)00054-7
|View full text |Cite
|
Sign up to set email alerts
|

On the effectiveness of a message-driven confidence-driven protocol for guarded software upgrading

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2002
2002
2006
2006

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 12 publications
0
7
0
Order By: Relevance
“…As the realistic goal of the MDCD protocol is to significantly reduce the probability of system failure rather than to guarantee the system to be failure-free, the protocol is anticipated to be effective in a nonideal execution environment. In order to validate the effectiveness of the protocol when it is run in an environment where C1, C2, and C3 are not satisfied, we conducted a model-based reliability analysis in [9]. The evaluation results confirm that the MDCD approach is effective with respect to reliability enhancement as originally surmised, even in a nonideal execution environment.…”
Section: T Umentioning
confidence: 70%
See 2 more Smart Citations
“…As the realistic goal of the MDCD protocol is to significantly reduce the probability of system failure rather than to guarantee the system to be failure-free, the protocol is anticipated to be effective in a nonideal execution environment. In order to validate the effectiveness of the protocol when it is run in an environment where C1, C2, and C3 are not satisfied, we conducted a model-based reliability analysis in [9]. The evaluation results confirm that the MDCD approach is effective with respect to reliability enhancement as originally surmised, even in a nonideal execution environment.…”
Section: T Umentioning
confidence: 70%
“…Due to the dynamic nature of the MDCD protocol, the evaluation requires a model to capture numerous interdependencies among system attributes. Therefore, as we did with the reliability analysis for the MDCD protocol [9], we choose to use stochastic activity networks (SANs) [19] to conduct the performance cost analysis because of their capability of explicitly representing dependencies among system attributes.…”
Section: Analysis Of Performance Costmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, safeguard has to be built into this process in the mission operation. A technique called the Guarded Upgrade, which is similar to the Guarded Software Upgrade technique [2], will be employed to provide this safeguard.…”
Section: Architectural Support For In-flight Hardware Reconfigurationmentioning
confidence: 99%
“…Details of this technique can be found in [2] and an example of the guarded upgrade operation will be discussed in the following.…”
Section: Architectural Support For In-flight Hardware Reconfigurationmentioning
confidence: 99%