[1] Brooks F P.The mythical man-month:essays on software engineering[M].Twentieth Anniversary Edition,Addison-WesLey Publishing Co.,1995:226. [2] Patterson D A,Brown A,Broadwell P,et al.Recovery-oriented computing(ROC):motivation,definition,techniques,and case studies[R].V.C.Berkeley Computer Science Technical Report,2002,UCB//CSD-02-1175. [3] Ganek A G,Corbi T A.The dawning of the autonomic computing era[J].IBM Systems Journal,Special Issue on Autonomic Computing,2003,42(1):5-18. [4] Shapiro M W.Self-healing in modern operating systems[J].ACM QUEUE,2004,2(9):66-75. [5] David F M,Campbell R H.Building a self-healing operating sys-tem[C]//Third IEEE International Symposium on Dependable,Autonomic and Secure Computing,2007:3-10. [6] David F M.,Carlyle J C,Chan E M,et al.Improving dependability by revisiting operating system design[C]//Proc.of the 3rd Workshop on Hot Topics in System Dependability,2007. [7] Janakiraman G,Renato J,Dinesh S,et al.Cruz:applicationtransparent distributed checkpoint-restart on standard operating systems[C]//Proc.of the International Conference on Dependable Systems and Networks,2005. [8] Duell J,Hargrove P,Roman E.The design and implementation of Berkeley Labs' Linux checkpoint/restart[R].Berkeley LabTechnical Report,2002,LBNL-54941. [9] Dvorak D,Rasmussen R,Reeves G,et al.Software architecture themes in JPL's mission data system[C]//Proc.of IEEE Aerospace Conference,2000,7:259-268. [10] Tanenbaum A S,Woodhull A S.操作系统设计及实现设计及实现[M].第2版.北京:清华大学出版社,1997. [11] Avizienis A,Laprie J C,Randell B,et al.Basic concepts and taxonomy of dependable and secure computing[J].IEEE Trans.on Dependable and Secure Computing,2004:11-33. [12] Raymond E.The Cathedral & the Bazaar[M].O'Reilly Media,Inc.,2001. [13] Hume A.Operating system reliability:Does anyone care any more?[EB/OL]//http://www.usenix.org/events/hotos03/reports.html,2003. [14] 李航,刘西洋,陈平.自愈系统构架构建方法研究[J].系统工程与电子技术,2007,29(2):291-293.(LiHang,LiuXiyang,Chen Ping.Survey on self-healing system architecture construction[J].Systems Engineering and Electronics,2007,29(2):291-293.) [15] Tanenbaum A S,Herder J N,Bos H,Can We Make Operating Systems Reliable and Secure?[J].IEEE Computer,2006,39:44-51. [16] Li Hang,Liu Xiyang,Chen Ping.Octopus architecture:a new attempt to achieve reliable OS[C]//5th Working IEEE/IFIP Conference on Software Architecture,2005. [17] Laprie J C,Arlat J,Beounes C,et al.Definition and analysis of hardware-and software-fault tolerant architectures[J].IEEE Computer,1990,23(7).39-51. [18] 李航,郭敬林,刘西洋,等.Bins分配器算法[J].系统工程与电子技术,2005,27:115-116.(Li Hang,Guo Jinglin,Liu Xiyang,et al.Balls into bins allocator algorithm[J].Systems Engineering and Electronics,2005,27(1):115-116.) [19] Winter V,Berg R,Ringland J.Bay area rapid transit district advance automated train control system case study description[EB/OL].http://faculty.ist.unomaha.edu/winter/publications/2001/Bay_Area_Rapid_Transit_District _Advanced_Automated_Train _ Control _ System _ Case _ Study _ Description.pdf,2001. |