The Myths of Coded Processing
Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like electromobility. In series production fail-safe systems as well as fault-tolerant systems are realized with redundant hardware concepts like dual...
Saved in:
Published in | 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems pp. 1637 - 1644 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.08.2015
|
Subjects | |
Online Access | Get full text |
DOI | 10.1109/HPCC-CSS-ICESS.2015.24 |
Cover
Abstract | Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like electromobility. In series production fail-safe systems as well as fault-tolerant systems are realized with redundant hardware concepts like dual core microcontrollers running in lock-step-mode to reach highest safety requirements given by standards, like ISO 26262 or IEC 61508. In contrast to the hardware redundancy approach, there are also approaches available with information-, time-and/or software-redundancy since several years. One of them is known as coded processing or AN-codes. Coded processing is capable of reducing redundancy in hardware by adding diverse redundancy in software. But the breakthrough of coded processing never took place. One reason for this seem to be the myths which are widely propagated on this subject and the hereby associated uncertainties. In this paper some myths are busted, like the usage of prime numbers as transformation factor A, the myth that greater transformation factors are better or the myth about the residual error probability defined as 1/A. Some of them have been propagated since 1989. The aim of this paper is to provide more clarity and understanding for this technique, perhaps to pave the way for further functional safety concepts based on coded processing approaches. |
---|---|
AbstractList | Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like electromobility. In series production fail-safe systems as well as fault-tolerant systems are realized with redundant hardware concepts like dual core microcontrollers running in lock-step-mode to reach highest safety requirements given by standards, like ISO 26262 or IEC 61508. In contrast to the hardware redundancy approach, there are also approaches available with information-, time-and/or software-redundancy since several years. One of them is known as coded processing or AN-codes. Coded processing is capable of reducing redundancy in hardware by adding diverse redundancy in software. But the breakthrough of coded processing never took place. One reason for this seem to be the myths which are widely propagated on this subject and the hereby associated uncertainties. In this paper some myths are busted, like the usage of prime numbers as transformation factor A, the myth that greater transformation factors are better or the myth about the residual error probability defined as 1/A. Some of them have been propagated since 1989. The aim of this paper is to provide more clarity and understanding for this technique, perhaps to pave the way for further functional safety concepts based on coded processing approaches. |
Author | Mottok, Juergen Braun, Juergen |
Author_xml | – sequence: 1 givenname: Juergen surname: Braun fullname: Braun, Juergen email: Juergen.Braun@oth-regensburg.de organization: Univ. of Appl. Sci. Regensburg, Regensburg, Germany – sequence: 2 givenname: Juergen surname: Mottok fullname: Mottok, Juergen email: Juergen.Mottok@oth-regensburg.de organization: Univ. of Appl. Sci. Regensburg, Regensburg, Germany |
BookMark | eNotzM9Kw0AQgPEVFNSaJxAlL5A4s_8mc5Sl2kLFQuq5bJJZG9BEkl769gr29F1-fLfqchgHUeoRoUQEflptQyhCXRfrsKzrUgO6UtsLlTFVaIm5YkN8rbJ57huwFTnU5G7Uw-4g-dvpeJjzMeVh7KTLt9PYyp8bPu_UVYpfs2TnLtTHy3IXVsXm_XUdnjdFr6E6Fqy97WILXiJgEhZLYNF7jS6hcVEAHJOJrbEttQTSiGtQEpJjTiRmoe7_v72I7H-m_jtOpz0Z4y1Y8wt7RD4h |
CODEN | IEEPAD |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/HPCC-CSS-ICESS.2015.24 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781479989379 1479989371 |
EndPage | 1644 |
ExternalDocumentID | 7336404 |
Genre | orig-research |
GroupedDBID | 6IE 6IL ALMA_UNASSIGNED_HOLDINGS CBEJK RIB RIC RIE RIL |
ID | FETCH-LOGICAL-i208t-9264dac06ea01fe9e4704166215f135ae005973ac34c7c70ebe5b1ef17599f7e3 |
IEDL.DBID | RIE |
IngestDate | Wed Dec 20 05:20:03 EST 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i208t-9264dac06ea01fe9e4704166215f135ae005973ac34c7c70ebe5b1ef17599f7e3 |
PageCount | 8 |
ParticipantIDs | ieee_primary_7336404 |
PublicationCentury | 2000 |
PublicationDate | 20150801 |
PublicationDateYYYYMMDD | 2015-08-01 |
PublicationDate_xml | – month: 08 year: 2015 text: 20150801 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems |
PublicationTitleAbbrev | hpcc-css-icess |
PublicationYear | 2015 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssib048751275 |
Score | 1.5816187 |
Snippet | Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1637 |
SubjectTerms | coded processing diversity Encoding Error probability fail-operational fail-safe failure probability failure rate fault-tolerant Hamming distance Hardware IEC 61508 ISO 26262 Redundancy reliability residual error probability Safely Embedded Software Safety safety measure SES Software |
Title | The Myths of Coded Processing |
URI | https://ieeexplore.ieee.org/document/7336404 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_hr0oNH06VtmjTn4pjCZDAHu400eUERVtH2MP96X9puinjwEkJ4kLzkkfeSvO8LITfGFgWedoCmmSgoF1hoxRRVFnfC2LhUJR4oPHsU0yV_WKWrHrndY2EAoEk-g9BXm7d8W5raX5WNPXUf9-SfB2hmLVZrZzs-7vZc5R0IOGJqPJ3nOc0XC3qfoy4-iysNPbD9xy8qjROZHJHZrvs2d-Q1rKsiNJ-_mBn_O75jMvyG6wXzvSM6IT3YDMgIDSCYbavnj6B0QV5asEGHCkChIVlO7p7yKe3-QqAvMcsqqjBwsdowAZpFDhRwyTCWEuixXZSkGjyKVCbaJNxIIxmuTVpE4DA6UMpJSE5Jf1Nu4IwEWgoUzGLPvsR14jIrWGa5BYli3MTnZOBVW7-1dBfrTquLv5svyaGf2TYn7or0q_caRuinq-K6WaAvHhGQmA |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5jHvSksom_pj14NF3aJm1zLo6q6xhsg91GmryiCKtod9C_3pe2myIevIQQ3iEvCflekvd9IeRGmzzH0w5QEYc55SEWSjJJpcGd0NeFkIElCmeTMF3wh6VYdsjtjgsDAHXyGbi2Wr_lm1Jv7FXZ0Er3cSv-uYe4z0XD1tquHht5W7XylgbsMTlMp0lCk9mM3ifojc3jEq6ltv_4R6WGkdEhybYdaLJHXtxNlbv685c24397eET634Q9Z7qDomPSgXWPDHAJONlH9fTulIWTlAaM0_IC0KhPFqO7eZLS9jcE-uyzuKISQxejNAtBMa8ACTxiGE2FiNmFFwgFlkcaBUoHXEc6Yjg7IvegwPhAyiKC4IR01-UaTomjohANY9_qL3EVFLEJWWy4gQjNuPbPSM-6tnptBC9WrVfnfzdfk_10no1X4_vJ4wU5sKPcZMhdkm71toEBonaVX9WT9QXobJPl |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+17th+International+Conference+on+High+Performance+Computing+and+Communications%2C+2015+IEEE+7th+International+Symposium+on+Cyberspace+Safety+and+Security%2C+and+2015+IEEE+12th+International+Conference+on+Embedded+Software+and+Systems&rft.atitle=The+Myths+of+Coded+Processing&rft.au=Braun%2C+Juergen&rft.au=Mottok%2C+Juergen&rft.date=2015-08-01&rft.pub=IEEE&rft.spage=1637&rft.epage=1644&rft_id=info:doi/10.1109%2FHPCC-CSS-ICESS.2015.24&rft.externalDocID=7336404 |