错误流模型:硬件故障的软件传播建模与分析
作者:
基金项目:

upported by the National Natural Science Foundation of China,the National Science Fund for Distinguished Young Scholars of China under Grant No.60621003(国家自然科学基金创新研究群体)


Error Flow Model: Modeling and Analysis of Software Propagating Hardware Faults
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [25]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    无论是可靠性工程还是软件可靠性中的可靠性模型,都难以描述硬件故障在程序中的传播问题.首先建立了计算数据流模型,并以无穷存储机器的指令集为例,说明可以为任意程序建立计算数据流图.在计算数据流模型的基础上,进一步建立了错误流模型.把计算过程中的错误分成物理错误和传播错误两种,通过分析这两种错误的本质和传播规律,给出了6条有关错误传播的规则和2条独立定律.根据这些规则和定律,能够计算出在程序运行过程中,任意时刻在任意位置上出现错误的概率.最后以一个简单的无穷存储机器程序为例,简要地展示了错误流模型描述硬件故障在

    Abstract:

    Neither reliability models in reliability engineering nor in software reliability can be directly applied to describe the propagation of hardware errors in programs. This paper first sets up a computational data flow model, and then explains that a computational data flow graph for the program can be built, using the instruction set of URM (unlimited register machine) as an example. Upon the computational data flow model, the error flow model is set up. Errors are categorized into two kinds: Original errors and propagated errors. By analyzing the propagation rules of these two kinds of errors, 6 assumptions about error propagation are given, upon which the probabilities of errors at any time and at any place in a program can be calculated. At last, a sample of URM program is given to demonstrate the capability of the fault flow model.

    参考文献
    [1]Liu P.Reliability Engineering Principles.Revised ed.,Beijing:Measurements Press,2002 (in Chinese).
    [2]Xu RZ,Xie M,Zheng RJ.Software Reliability Models and Applications.Beijing:Tsinghua University Press,1994 (in Chinese).
    [3]Tian J.Integrating time domain and input domain analyses of software reliability using tree-based models.IEEE Trans.on Software Engineering,1995,21(12):945-958.
    [4]Huang CY,Lyu MR.A unified scheme of some nonhomogenous poisson process models for software reliability estimation.IEEE Trans.on Software Engineering,2003,29(3):261-269.
    [5]Clark JA,Pradhan DK.Fault injection:A method for validating computer-system dependability.IEEE Computer,1995,28(6):47-56.
    [6]Avizienis A.Toward systematic design of fault-tolerant systems.IEEE Computer,1997,30(4):51-58.
    [7]Cheynet P,Nicolescu B,Velazco R,Rebaudengo M,Reorda MS,Violante M.Experimentally evaluating an automatic approach for generating safety-critical software with respect to transient errors.IEEE Trans.on Nuclear Science,2000,47(6):2231-2236.
    [8]Ziegler JF.IBM experiments in soft fails in computer electronics (1978-1994).IBM Journal of Research and Development,1996,40(1):3-18.
    [9]Avizeinis A.The n-version approach to fault-tolerant software.IEEE Trans.on Software Engineering,1985,SE-11(12):1491-1501.
    [10]Randell B.System structure for software fault tolerance.IEEE Trans.on Software Engineering,1975,SE-1(2):220-223.
    [11]Oh N.Software implemented hardware fault tolerance[Ph.D.Thesis].Stanford:Stanford University,2000.
    [12]Gerke RD,Shapiro AA.Use of commercial off-the-shelf (COTS) for space applications.In:Proc.of the Aerospace Conf.IEEE Computer Society,2003.230.
    [13]Huang KH,Abraham JA.Algorithm-Based fault tolerance for matrix operations.IEEE Trans.on Computers,1984,33(6):518-528.
    [14]Maurizio R,Matteo SR,Massimo V,Marco T.A source-to-source compiler for generating dependable software.In:Proc.of the 1st IEEE Int'l Workshop on Source Code Analysis and Manipulation.Florence:IEEE Computer Society,2001.33-42.http://csdl2.computer.org/persagen/DLAbsToc.jsp?resourcePath=/dl/proceedings/&toc=comp/proceedings/scam/2001/1387/00/1387toc.xml&DOI=10.1109/SCAM.2001.972664
    [15]Oh N,Shirvani PP,McCluskey EJ.Error detection by duplicated instructions in super-scalar processors.IEEE Trans.on Reliability,2002,51(1):63-75.
    [16]Oh N,Mitra S,McCluskey EJ.ED4I:Error detection by diverse data and duplicated instructions.IEEE Trans.on Computers,2002,51(2):180-199.
    [17]Burger DC,Austin TM.The SimpleScalar tool set,version 2.0.ACM SIGARCH Computer Architecture News,1997,25(3):13-25.
    [18]Chen HW,Qian JH,Sun YQ.Principles of Compilers.2nd ed.,Beijing:Press of Defense Industry,1999 (in Chinese).
    [19]Cliff Y,Michael DS.Static correlated branch prediction.ACM Trans.on Programming Languages and Systems,1999,21(5):1028-1075.
    [20]Wu Y,Larus JR.Static branch frequency and program profile analysis.In:Proc.of the 27th Annual Int'l Symp.on Microarchitecture.New York:ACM Press,1994.1-11.http://portal.acm.org/citation.cfm?id=192725&dl=ACM&coll=portal
    [21]Jason RC,Patterson DA.Accurate static branch prediction by value range propagation.In:Proc.of the ACM SIGPLAN 1995 Conf.on Programming Language Design and Implementation.New York:ACM Press,1995.67-78.http://portal.acm.org/citation.cfm-id=223428.207117
    [22]Yang DP,Li AS.Computing Theories.Beijing:Science Press,1999 (in Chinese). [1]刘品.可靠性工程基础.修订版.北京:计量出版社,2002.
    [2]徐仁佐,谢旻,郑人杰.软件可靠性模型及应用.北京:清华大学出版社,1994.
    [18]陈火旺,钱家骅,孙永强.编译原理.第2版.北京:国防工业出版社,1999.
    [22]杨东屏,李昂生.可计算性理论.北京:科学出版社,1999.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

杨学军,高珑.错误流模型:硬件故障的软件传播建模与分析.软件学报,2007,18(4):808-820

复制
分享
文章指标
  • 点击次数:4441
  • 下载次数: 5288
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2006-06-12
  • 最后修改日期:2006-08-29
文章二维码
您是第19868386位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号