|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn880901987 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
140505s2013 xx o 000 0 eng |
040 |
|
|
|a AU@
|b eng
|e pn
|c AU@
|d UKDOC
|d EBLCP
|d YDXCP
|d MHW
|d DEBSZ
|d OCLCQ
|d ZCU
|d MERUC
|d ICG
|d OCLCF
|d OCLCQ
|d OCLCO
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 827207553
|
020 |
|
|
|a 9781118600801
|
020 |
|
|
|a 1118600800
|
029 |
0 |
|
|a AU@
|b 000052914228
|
029 |
1 |
|
|a DEBBG
|b BV044172729
|
029 |
1 |
|
|a DEBSZ
|b 431332568
|
035 |
|
|
|a (OCoLC)880901987
|z (OCoLC)827207553
|
050 |
|
4 |
|a QA76.9.A73 S4313
|
082 |
0 |
4 |
|a 004.22
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Boulanger, Jean-Louis.
|
245 |
1 |
0 |
|a Safety of Computer Architectures.
|
260 |
|
|
|a Hoboken :
|b Wiley,
|c 2013.
|
300 |
|
|
|a 1 online resource (506 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a ISTE
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Safety of Computer Architectures; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Principles; 1.1. Introduction; 1.2. Presentation of the basic concepts: faults, errors and failures; 1.2.1. Obstruction to functional safety; 1.2.2. Safety demonstration studies; 1.2.3. Assessment; 1.3. Safe and/or available architecture; 1.4. Resetting a processing unit; 1.5. Overview of safety techniques; 1.5.1. Error detection; 1.5.2. Diversity; 1.5.3. Redundancy; 1.5.4. Error recovery and retrieval; 1.5.5. Partitioning; 1.6. Conclusion; 1.7. Bibliography.
|
505 |
8 |
|
|a Chapter 2. Railway Safety Architecture2.1. Introduction; 2.2. Coded secure processor; 2.2.1. Basic principle; 2.2.2. Encoding; 2.2.3. Hardware architecture; 2.2.4. Assessment; 2.3. Other applications; 2.3.1. TVM 430; 2.3.2. SAET-METEOR; 2.4. Regulatory and normative context; 2.4.1. Introduction; 2.4.2. CENELEC and IEC history; 2.4.3. Commissioning evaluation, certification, and authorization; 2.5. Conclusion; 2.6. Bibliography; Chapter 3. From the Coded Uniprocessor to 2oo3; 3.1. Introduction; 3.2. From the uniprocessor to the dual processor with voter.
|
505 |
8 |
|
|a 3.2.1. North LGV requirements and the Channel Tunnel3.2.2. The principles of the dual processor with voter by coded uniprocessor; 3.2.3. Architecture characteristics; 3.2.4. Requirements for the Mediterranean LGV; 3.3. CSD: available safety computer; 3.3.1. Background; 3.3.2. Functional architecture; 3.3.3. Software architecture; 3.3.4. Synchronization signals; 3.3.5. The CSD mail system; 3.4. DIVA evolutions; 3.4.1. ERTMS equipment requirements; 3.4.2. Functional evolution; 3.4.3. Technological evolution; 3.5. New needs and possible solutions; 3.5.1. Management of the partitions.
|
505 |
8 |
|
|a 3.5.2. Multicycle services3.6. Conclusion; 3.7. Assessment of installations; 3.8. Bibliography; Chapter 4. Designing a Computerized Interlocking Module: a Key Component of Computer-Based Signal Boxes Designed by the SNCF; 4.1. Introduction; 4.2. Issues; 4.2.1. Persistent bias; 4.2.2. Challenges for tomorrow; 4.2.3. Probability and computer safety; 4.2.4. Maintainability and modifiability; 4.2.5. Specific problems of critical systems; 4.2.6. Towards a targeted architecture for safety automatons; 4.3. Railway safety: fundamental notions; 4.3.1. Safety and availability.
|
505 |
8 |
|
|a 4.3.2. Intrinsic safety and closed railway world4.3.3. Processing safety; 4.3.4. Provability of the safety of computerized equipment; 4.3.5. The signal box; 4.4. Development of the computerized interlocking module; 4.4.1. Development methodology of safety systems; 4.4.2. Technical architecture of the system; 4.4.3. MEI safety; 4.4.4. Modeling the PETRI network type; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. Command Control of Railway Signaling Safety: Safety at Lower Cost; 5.1. Introduction; 5.2. A safety coffee machine; 5.3. History of the PIPC; 5.4. The concept basis.
|
505 |
8 |
|
|a 5.5. Postulates for safety requirements.
|
520 |
|
|
|a It is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effective system architecture. It is not so easy to find a single source reference for all these aspects of system design. However, the purpose of this book is to present, in a single volume, a full description of all the constraints (including legal contexts around performance, reliability norms, etc.) and examples of architectures from various fields o.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer architecture.
|
650 |
|
0 |
|a Computer systems
|x Reliability.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Avionics
|x Safety measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Ordinateurs
|x Architecture.
|
650 |
|
6 |
|a Systèmes informatiques
|x Fiabilité.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Avionique
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer architecture
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computer systems
|x Reliability
|2 fast
|
758 |
|
|
|i has work:
|a Safety of computer architectures (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFvk4vdBFcmMpPGKpyvVhb
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Boulanger, Jean-Louis.
|t Safety of Computer Architectures.
|d Hoboken : Wiley, ©2013
|z 9781848211971
|
830 |
|
0 |
|a ISTE.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1120753
|z Texto completo
|
938 |
|
|
|a 123Library
|b 123L
|n 64357
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1120753
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10001749
|
994 |
|
|
|a 92
|b IZTAP
|