Lecture 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12? | 13? | Index


To add a question because something is unclear or was not understood, just insert the question and add the prefix %q% for each addition (q like question). This is the "question-style". Like this:

* %q% What kind of problems could have decentralized nature?
  • What kind of problems could have decentralized nature?

If you want to answer a question or add a comment please put a %a% in front. This is thea "answer-style" (a lilke answer). An example:

* %a% This is an addition to something that I consider important.
  • This is an addition to something that I consider important.

For citations or references to the slides of Prof. Suri pleas add the lecture and slide number in braces: (<lecture>.<slide>).

Please make sure that you enter an author name, else your changes will not be saved!


Lecture 10 - Verification and Validation of dependable Systems

  • Verification: "The system is designed right." (10.3)
    • Design Reviews (10.4)
    • Formal (mathematical) mehtods
    • Testing
      • Static testing (without executing the program) (10.5)
        • Code inspection
        • Walkthroug
        • Supported by tools (10.8)
      • Dynamic testing
        • Functional testing (Black-Box) (10.9)
        • Structural testing (White-Box (10.10)
        • Run-Time testing (10.11)
        • Robustness Checks (10.12)
      • Test case generation (10.14)
      • Coverage: "measure of testing done" (10.17)
  • Validation: "The right system is designed." (10.3)
    • Dependability modeling (10.24)
      • Coverage of models (10.28)
    • Fault injection: intentionally and artificially inserting abnormal states during normal operation (10.22)
      • Metrics (10.32)
      • Approaches (10.30)
        • Physical fault injection
          • EMI, radiation, heat, voltage spikes, etc. (10.33)
        • Simulated fault injection (10.38)
          • Simulated in Spice, VHDL, etc.
          • Electrical, logical, functional level (10.39)
        • Hardware fault injection (10.40)
          • Pin-level injection
          • JTAG, scan chains
        • Software implemented fault injection (SWIFI) (10.41)
          • PROPANE: error propagagion analysis (10.53)
          • Code mutations (10.55)

Nach oben

Lecture 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12? | 13? | Index


Recent Changes


Nach oben

Zuletzt geändert am 13 März 2005 22:16 Uhr von chrschn