基于动态部分重构的三模冗余容错技术研究

来源 :第十五届全国容错计算学术会议(CFTC13) | 被引量 : 0次 | 上传用户:birdflyloveu
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
SRAM型FPGA对于空间环境下的粒子辐射非常敏感,易受单粒子翻转影响产生软故障,限制了其在航天领域的应用.针对此问题,提出一种基于动态部分重构的三模冗余(TMR)容错系统设计.TMR表决器采用比较编码器实现故障检测及定位;定位故障后,利用动态部分重构恢复故障,实现系统可靠性设计.比较编码器有效解决了多数表决器只能屏蔽故障,不能定位故障的问题.实验结果表明,该设计方案具有可行性,能有效提高FP-GA容错系统的故障定位能力.
其他文献
The existing methods of policy refinement in computer network defense (CND) can only support the refinement of access control policy,but not the policies of protection,detection,response,and recovery.
Recently,the Graphics Processing Unit (GPU) has been proved to be an exciting new platform for high-performance software routers.On such a platform,designing efficient IP lookup engine is a challengin
As one of the three service models of cloud computing,PaaS (Platform as a Service) has gained more and more popularity for its capabilities in optimizing development productivity and business agility.
Conflict detection is an important issue of the Access Control Policy.Most conflict detection tools mainly focus on the two rules that have contrary actions,but there are also other rules which are ne
Large networks are always partitioned into several small networks when deploying software defined networks (SDN),and a dedicated network operating system (NOS) is deployed for each network.Each NOS ha
Although there are many access control models having been developed and applied in various environments,few of them have addressed the issue of managing information access control in the combined cont
We designed and implemented a traffic analyze framework TraSt (Traffic Statistics) based on tcpdump for Android.This framework can get more detailed traffic usage than any other existing traffic monit
会议
Direct Anonymous Attestation (DAA) is a cryptographic scheme which enables the remote authentication of a trusted platform whilst preserving privacy under the user’s control.DAA,as an attractive crypt
Mobile network community discovery has been introduced as a new efficient way to disseminate mobile internet services to a particular group of mobi le users.This paper builds a mobile network model ac
Nowadays,malware,especially for a botnet,heavily employs network communication to accomplish predefined malicious functionalities.The network behavior of malware attracts attention of researchers.Howe