05713nam 2200817 a 450 991082887080332120240313140621.09781118600696111860069X978129918750412991875019781118600610111860061497811186008011118600800(CKB)2670000000327697(EBL)1120753(OCoLC)827207553(SSID)ssj0000831589(PQKBManifestationID)11421088(PQKBTitleCode)TC0000831589(PQKBWorkID)10880555(PQKB)11255224(MiAaPQ)EBC1120753(Au-PeEL)EBL1120753(CaPaEBR)ebr10657623(CaONFJC)MIL450000(OCoLC)500823375(FINmELB)ELB178716(Perlego)1007058(EXLCZ)99267000000032769720100505d2010 uy 0engur|n|---|||||txtccrSafety of computer architectures /edited by Jean-Louis Boulanger1st ed.London ISTE ;Hoboken, N.J. b Wiley20101 online resource (506 p.)ISTEDescription based upon print version of record.9781848211971 184821197X Includes bibliographical references and index.Cover; Safety of Computer Architectures; Title Page; Copyright Page; Table of Contents; Introduction; Chapter 1. Principles; 1.1. Introduction; 1.2. Presentation of the basic concepts: faults, errors and failures; 1.2.1. Obstruction to functional safety; 1.2.2. Safety demonstration studies; 1.2.3. Assessment; 1.3. Safe and/or available architecture; 1.4. Resetting a processing unit; 1.5. Overview of safety techniques; 1.5.1. Error detection; 1.5.2. Diversity; 1.5.3. Redundancy; 1.5.4. Error recovery and retrieval; 1.5.5. Partitioning; 1.6. Conclusion; 1.7. BibliographyChapter 2. Railway Safety Architecture2.1. Introduction; 2.2. Coded secure processor; 2.2.1. Basic principle; 2.2.2. Encoding; 2.2.3. Hardware architecture; 2.2.4. Assessment; 2.3. Other applications; 2.3.1. TVM 430; 2.3.2. SAET-METEOR; 2.4. Regulatory and normative context; 2.4.1. Introduction; 2.4.2. CENELEC and IEC history; 2.4.3. Commissioning evaluation, certification, and authorization; 2.5. Conclusion; 2.6. Bibliography; Chapter 3. From the Coded Uniprocessor to 2oo3; 3.1. Introduction; 3.2. From the uniprocessor to the dual processor with voter3.2.1. North LGV requirements and the Channel Tunnel3.2.2. The principles of the dual processor with voter by coded uniprocessor; 3.2.3. Architecture characteristics; 3.2.4. Requirements for the Mediterranean LGV; 3.3. CSD: available safety computer; 3.3.1. Background; 3.3.2. Functional architecture; 3.3.3. Software architecture; 3.3.4. Synchronization signals; 3.3.5. The CSD mail system; 3.4. DIVA evolutions; 3.4.1. ERTMS equipment requirements; 3.4.2. Functional evolution; 3.4.3. Technological evolution; 3.5. New needs and possible solutions; 3.5.1. Management of the partitions3.5.2. Multicycle services3.6. Conclusion; 3.7. Assessment of installations; 3.8. Bibliography; Chapter 4. Designing a Computerized Interlocking Module: a Key Component of Computer-Based Signal Boxes Designed by the SNCF; 4.1. Introduction; 4.2. Issues; 4.2.1. Persistent bias; 4.2.2. Challenges for tomorrow; 4.2.3. Probability and computer safety; 4.2.4. Maintainability and modifiability; 4.2.5. Specific problems of critical systems; 4.2.6. Towards a targeted architecture for safety automatons; 4.3. Railway safety: fundamental notions; 4.3.1. Safety and availability4.3.2. Intrinsic safety and closed railway world4.3.3. Processing safety; 4.3.4. Provability of the safety of computerized equipment; 4.3.5. The signal box; 4.4. Development of the computerized interlocking module; 4.4.1. Development methodology of safety systems; 4.4.2. Technical architecture of the system; 4.4.3. MEI safety; 4.4.4. Modeling the PETRI network type; 4.5. Conclusion; 4.6. Bibliography; Chapter 5. Command Control of Railway Signaling Safety: Safety at Lower Cost; 5.1. Introduction; 5.2. A safety coffee machine; 5.3. History of the PIPC; 5.4. The concept basis5.5. Postulates for safety requirementsIt is currently quite easy for students or designers/engineers to find very general books on the various aspects of safety, reliability and dependability of computer system architectures, and partial treatments of the elements that comprise an effective system architecture. It is not so easy to find a single source reference for all these aspects of system design. However, the purpose of this book is to present, in a single volume, a full description of all the constraints (including legal contexts around performance, reliability norms, etc.) and examples of architectures from various fields oISTEComputer architectureComputer systemsReliabilityComputer securityAvionicsSafety measuresComputer architecture.Computer systemsReliability.Computer security.AvionicsSafety measures.005.8Boulanger Jean-Louis847395MiAaPQMiAaPQMiAaPQBOOK9910828870803321Safety of computer architectures4015873UNINA01412nam2 22003251i 450 UON0052550320240801074303.33020240731d1958 |0itac50 baspaES|||| |||||19.1: Volumen 1por Luis Fernández y Fernández de Retanaprólogo por Cayetano Alcázar MolinaMadridEspasa-Calpe1958XLIV, 823 p.illustrazioni28 cm.001UON005255022001 19: Espana en tiempo de Felipe 2. : 1556-1598210 Segunda edición - MadridEspasa-Calpe1958215 2 volumiillustrazioni.1UON00525479Historia de España4399777SPAGNAStoriaUONC062095FIESMadridUONL000218946Storia della Spagna21FERNANDEZ DE RETANALuisUONV180764400548ALCAZAR MOLINACayetanoUONV118279JOVER ZAMORAJose MariaUONV050246Menéndez PidalRamónUONV116015Espasa-CalpeUONV255739650ITSOL20250704RICASIBA - SISTEMA BIBLIOTECARIO DI ATENEOUONSIUON00525503SIBA - SISTEMA BIBLIOTECARIO DI ATENEOSI S.C II G 01 SI MR 65042 7 01 Historia de España4399777UNIOR00899nam0 2200313 i 450 99668147910331620251015104924.0978-88-290-1335-720231020d2023----||||0itac50 baitaIT<<L'>> abortouna storiaAlessandra Gissi, Paola StelliferiRomaCarocci2023259 p.22 cmQuality paperbacks680Nodi dell'Italia repubblicanaQuality paperbacks680Nodi dell'Italia repubblicanaAborto indottoItaliaBNCF362.1988800945GISSI,Alessandra600157STELLIFERI,Paola742191ITcbacbaREICAT996681479103316II.5. 9215292888II.5.573618BKUMAAborto4444585UNISA