Foundations for the study of software architecture
ACM SIGSOFT Software Engineering Notes
IEEE Transactions on Software Engineering - Special issue on formal methods in software practice
Automated Translation of UML Models of Architectures for Verification and Simulation Using SPIN
ASE '99 Proceedings of the 14th IEEE international conference on Automated software engineering
Architecture-based Exception Handling
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
A fault-tolerant software architecture for COTS-based software systems
Proceedings of the 9th European software engineering conference held jointly with 11th ACM SIGSOFT international symposium on Foundations of software engineering
PKUAS: An Architecture-Based Reflective Component Operating Platform
FTDCS '04 Proceedings of the 10th IEEE International Workshop on Future Trends of Distributed Computing Systems
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
A looming fault tolerance software crisis?
ACM SIGSOFT Software Engineering Notes
Matching and Merging of Statecharts Specifications
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Fault Tolerance Connectors for Unreliable Web Services
DSN '07 Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
Exploring the Role of Software Architecture in Dynamic and Fault Tolerant Pervasive Systems
SEPCASE '07 Proceedings of the 1st International Workshop on Software Engineering for Pervasive Computing Applications, Systems, and Environments
Merging models based on given correspondences
VLDB '03 Proceedings of the 29th international conference on Very large data bases - Volume 29
A Middleware-based Approach to Model Refactoring at Runtime
APSEC '07 Proceedings of the 14th Asia-Pacific Software Engineering Conference
Pattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UML
HASE '07 Proceedings of the 10th IEEE High Assurance Systems Engineering Symposium
Introducing Recovery Style for Modeling and Analyzing System Recovery
WICSA '08 Proceedings of the Seventh Working IEEE/IFIP Conference on Software Architecture (WICSA 2008)
Verification of Exception Control Flows and Handlers Based on Architectural Scenarios
HASE '08 Proceedings of the 2008 11th IEEE High Assurance Systems Engineering Symposium
Increasing system dependability through architecture-based self-repair
Architecting dependable systems
Towards architecture-level middleware-enabled exception handling of component-based systems
Proceedings of the 14th international ACM Sigsoft symposium on Component based software engineering
A framework for the integration of MOF-compliant analysis methods
Proceedings of the Second Asia-Pacific Symposium on Internetware
A self-healing component sandbox for untrustworthy third party code execution
CBSE'10 Proceedings of the 13th international conference on Component-Based Software Engineering
Model driven configuration of fault tolerance solutions for component-based software system
MODELS'12 Proceedings of the 15th international conference on Model Driven Engineering Languages and Systems
Model-based high availability configuration framework for cloud
Proceedings of the 2013 Middleware Doctoral Symposium
Hi-index | 0.00 |
To build highly available or reliable applications out of unreliable third-party components, some software-implemented fault-tolerant mechanisms are introduced to gracefully deal with failures in the components. In this paper, we address an important issue in the approach: how to select the most suitable fault-tolerant mechanisms for a given application in a specific context. To alleviate the difficulty in the selection, these mechanisms are abstracted as Fault-tolerant styles (FTSs) at first, which helps to achieve required high availability or reliability correctly because the complex interactions among functional parts of software and fault-tolerant mechanism are explicitly modeled. Then the required fault-tolerant capabilities are specified as fault-tolerant properties, and the satisfactions of the required properties for candidate FTSs are verified by model checking. Specifically, we take application-specific constraints into consideration during verification. The satisfied properties and constraints are evidences for the selection. A case study shows the effectiveness of the approach.