Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
As modern society relies on the fault-free operation of complex computing systems, system fault-tolerance has become an indispensable requirement. Therefore, we need mechanisms that guarantee correct service in cases where system components fail, be they software or hardware elements. Redundancy patterns are commonly used, for either redundancy in space or redundancy in time.
Wolter's book details methods of redundancy in time that need to be issued at the right moment. In particular, she addresses the so-called "timeout selection problem", i.e., the question of choosing the right time for different fault-tolerance mechanisms like restart, rejuvenation and checkpointing. Restart indicates the pure system restart, rejuvenation denotes the restart of the operating environment of a task, and checkpointing includes saving the system state periodically and reinitializing the system at the most recent checkpoint upon failure of the system. Her presentation includes a brief introduction to the methods, their detailed stochastic description, and also aspects of their efficient implementation in real-world systems.
The book is targeted at researchers and graduate students in system dependability, stochastic modeling and software reliability. Readers will find here an up-to-date overview of the key theoretical results, making this the only comprehensive text on stochastic models for restart-related problems.
From the reviews:
"Wolter's textbook presents . three issues that will interest specialists in distributed systems and software design: restarting, rejuvenation, and checkpointing. . The book's strength is its ability to systematically gather different models that are rarely presented together in one place. It is also admirable how clearly . the difficult material on reliability is presented. The work is intended for experienced readers . . The content is up to date; in fact, many of the analyses are quite new and based on Wolter's own work." (Piotr Cholda, ACM Computing Reviews, November, 2010)
"It is comprehensive and self-contained as it includes everything one needs to understand and apply the models and algorithms represented. Even the probability distributions used in those models are briefly, yet satisfactorily, explained in the appendices. All in all, I can recommend this book as a handbook not only to researchers and practitioners who work in this field, but also to students as a textbook." (Fevzi Belli, Zentralblatt MATH, Vol. 1209, 2011)
Katinka Wolter is an assistant professor at Humboldt-University, Berlin, Germany, working with the on Computer Architecture and Communication Group since April 2002. She is principal investigator of two research projects funded by the German research council and teaches courses on performance analysis of communication systems and dependability evaluation. Prior to her current position, she was a visiting researcher at Hewlett-Packard Labs in Palo Alto, CA, USA. Her research interests include dependability evaluation of service-oriented architectures and wireless computer networks, as well as stochastic models for representing data in those systems and stochastic models for improving dependability through restart-based techniques.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.