Special Issue: Computer Architecture and Systems

• Articles • Previous Articles    

The Researches in Fault-Tolerant D ataflow Architecture

Wang Lei; Tan Ying;   

  1. Tianjin University Tianjin; Kansas University; U.S.A.;
  • Online:1991-07-10 Published:1991-07-10

Fault-tolerant dataflow system is an entirely new field.This paper presents an overview of FTDF-TD.a fault-tolerant dataflow system.Various aspects of FTDF-TD,such as the architecture, the fault-tolerant strategy,and its reliability,are described.The research on overhead and performance evaluation based on software simulation is introduced.It is shown that FTDF-TD gets valuable results in reducing overhead,execution time and increasing reliability of processor array,compared with two other fault-tolerant sy…

Key words: information integration,data model,semistructured data,extracting schema;



[1] Special Issue on Dataflow System, Computer, Feb .1982.

[2] D.P.Siewiorek and R.S.Swarz, The Theory and Practice of Reliable System Design. Digital Press Bedford, Mass, 1982.

[3] Vason P.Srini, A Fault Tolerant Dataflow System. Computer, March, 1985.

[4] Lecture Note, Research for Fault Tolerant Dataflow Machine. Tokyo Institute of Technology, Japan, 1986.

[5] Tan Ying, Huang Wehyu and Wang Lei, Introduction to and Analysis on Fault Tolerant Dataflow System. Proc.of the 2nd National Symposium on Fault Tolerant Computing, Shanghai, Oct. 1987. ……….
No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] Wu Yunzeng;. On the Development of Applications of Logic in Programming[J]. , 1987, 2(1): 30 -34 .
[2] WANG Deqiang; ZHAO Lianchang;. The Twisted-Cube Connected Networks[J]. , 1999, 14(2): 181 -187 .
[3] Jin-Woo Kim, Ju-Hum Kwon, Young-Gab Kim, Chee-Yang Song, Hyun-Seok Kim, and Doo-Kwon Baik. EAFoC: Enterprise Architecture Framework Based on Commonality[J]. , 2006, 21(6): 952 -964 .
[4] Qiang Liu, Tao Huang, Shao-Hua Liu, and Hua Zhong. An Ontology-Based Approach for Semantic Conflict Resolution in Database Integration[J]. , 2007, 22(2): 218 -227 .
[5] Lu-An Tang, Bin Cui, Hong-Yan Li, Gao-Shan Miao, Dong-Qing Yang, and Xin-Biao Zhou. PGG: An Online Pattern Based Approach for Stream Variation Management[J]. , 2008, 23(4 ): 497 -515 .
[6] Shung Han Cho, Student Member, IEEE, Yuntai Kyong, Student Member, IEEE, Sangjin Hong, Senior Member, IEEE, and We-Duke Cho, Member, IEEE. Self Localization Method Using Parallel Projection Model for Mobile Sensor in Navigation Applications[J]. , 2009, 24(3): 588 -603 .
[7] Peng Xiao, Zhi-Gang Hu, and Yan-Ping Zhang. An Energy-Aware Heuristic Scheduling for Data-Intensive Workflows in Virtualized Datacenters[J]. , 2013, 28(6): 948 -961 .
[8] Po Hu, Min-Lie Huang, and Xiao-Yan Zhu. Exploring the Interactions of Storylines from Informative News Events[J]. , 2014, 29(3): 502 -518 .
[9] Jing-Yuan Zhao, Mei-Qin Wang, Long Wen . Improved Linear Cryptanalysis of CAST-256[J]. , 2014, 29(6): 1134 -1139 .
[10] Peng Du, Jie-Yi Zhao, Wan-Bin Pan, Yi-Gang Wang. GPU Accelerated Real-time Collision Handling in Virtual Disassembly[J]. , 2015, 30(3): 511 -518 .

ISSN 1000-9000(Print)

         1860-4749(Online)
CN 11-2296/TP

Home
Editorial Board
Author Guidelines
Subscription
Journal of Computer Science and Technology
Institute of Computing Technology, Chinese Academy of Sciences
P.O. Box 2704, Beijing 100190 P.R. China
Tel.:86-10-62610746
E-mail: jcst@ict.ac.cn
 
  Copyright ©2015 JCST, All Rights Reserved