The Myths of Coded Processing

Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like electromobility. In series production fail-safe systems as well as fault-tolerant systems are realized with redundant hardware concepts like dual...

Full description

Saved in:
Bibliographic Details
Published in2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems pp. 1637 - 1644
Main Authors Braun, Juergen, Mottok, Juergen
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.08.2015
Subjects
Online AccessGet full text
DOI10.1109/HPCC-CSS-ICESS.2015.24

Cover

Abstract Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like electromobility. In series production fail-safe systems as well as fault-tolerant systems are realized with redundant hardware concepts like dual core microcontrollers running in lock-step-mode to reach highest safety requirements given by standards, like ISO 26262 or IEC 61508. In contrast to the hardware redundancy approach, there are also approaches available with information-, time-and/or software-redundancy since several years. One of them is known as coded processing or AN-codes. Coded processing is capable of reducing redundancy in hardware by adding diverse redundancy in software. But the breakthrough of coded processing never took place. One reason for this seem to be the myths which are widely propagated on this subject and the hereby associated uncertainties. In this paper some myths are busted, like the usage of prime numbers as transformation factor A, the myth that greater transformation factors are better or the myth about the residual error probability defined as 1/A. Some of them have been propagated since 1989. The aim of this paper is to provide more clarity and understanding for this technique, perhaps to pave the way for further functional safety concepts based on coded processing approaches.
AbstractList Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like electromobility. In series production fail-safe systems as well as fault-tolerant systems are realized with redundant hardware concepts like dual core microcontrollers running in lock-step-mode to reach highest safety requirements given by standards, like ISO 26262 or IEC 61508. In contrast to the hardware redundancy approach, there are also approaches available with information-, time-and/or software-redundancy since several years. One of them is known as coded processing or AN-codes. Coded processing is capable of reducing redundancy in hardware by adding diverse redundancy in software. But the breakthrough of coded processing never took place. One reason for this seem to be the myths which are widely propagated on this subject and the hereby associated uncertainties. In this paper some myths are busted, like the usage of prime numbers as transformation factor A, the myth that greater transformation factors are better or the myth about the residual error probability defined as 1/A. Some of them have been propagated since 1989. The aim of this paper is to provide more clarity and understanding for this technique, perhaps to pave the way for further functional safety concepts based on coded processing approaches.
Author Mottok, Juergen
Braun, Juergen
Author_xml – sequence: 1
  givenname: Juergen
  surname: Braun
  fullname: Braun, Juergen
  email: Juergen.Braun@oth-regensburg.de
  organization: Univ. of Appl. Sci. Regensburg, Regensburg, Germany
– sequence: 2
  givenname: Juergen
  surname: Mottok
  fullname: Mottok, Juergen
  email: Juergen.Mottok@oth-regensburg.de
  organization: Univ. of Appl. Sci. Regensburg, Regensburg, Germany
BookMark eNotzM9Kw0AQgPEVFNSaJxAlL5A4s_8mc5Sl2kLFQuq5bJJZG9BEkl769gr29F1-fLfqchgHUeoRoUQEflptQyhCXRfrsKzrUgO6UtsLlTFVaIm5YkN8rbJ57huwFTnU5G7Uw-4g-dvpeJjzMeVh7KTLt9PYyp8bPu_UVYpfs2TnLtTHy3IXVsXm_XUdnjdFr6E6Fqy97WILXiJgEhZLYNF7jS6hcVEAHJOJrbEttQTSiGtQEpJjTiRmoe7_v72I7H-m_jtOpz0Z4y1Y8wt7RD4h
CODEN IEEPAD
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/HPCC-CSS-ICESS.2015.24
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781479989379
1479989371
EndPage 1644
ExternalDocumentID 7336404
Genre orig-research
GroupedDBID 6IE
6IL
ALMA_UNASSIGNED_HOLDINGS
CBEJK
RIB
RIC
RIE
RIL
ID FETCH-LOGICAL-i208t-9264dac06ea01fe9e4704166215f135ae005973ac34c7c70ebe5b1ef17599f7e3
IEDL.DBID RIE
IngestDate Wed Dec 20 05:20:03 EST 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i208t-9264dac06ea01fe9e4704166215f135ae005973ac34c7c70ebe5b1ef17599f7e3
PageCount 8
ParticipantIDs ieee_primary_7336404
PublicationCentury 2000
PublicationDate 20150801
PublicationDateYYYYMMDD 2015-08-01
PublicationDate_xml – month: 08
  year: 2015
  text: 20150801
  day: 01
PublicationDecade 2010
PublicationTitle 2015 IEEE 17th International Conference on High Performance Computing and Communications, 2015 IEEE 7th International Symposium on Cyberspace Safety and Security, and 2015 IEEE 12th International Conference on Embedded Software and Systems
PublicationTitleAbbrev hpcc-css-icess
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib048751275
Score 1.5816187
Snippet Safety of embedded systems has the highest priority because it helps contribute to customer confidence and thereby ensures growth of the new markets, like...
SourceID ieee
SourceType Publisher
StartPage 1637
SubjectTerms coded processing
diversity
Encoding
Error probability
fail-operational
fail-safe
failure probability
failure rate
fault-tolerant
Hamming distance
Hardware
IEC 61508
ISO 26262
Redundancy
reliability
residual error probability
Safely Embedded Software
Safety
safety measure
SES
Software
Title The Myths of Coded Processing
URI https://ieeexplore.ieee.org/document/7336404
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5zJ08qm_hr0oNH06VtmjTn4pjCZDAHu400eUERVtH2MP96X9puinjwEkJ4kLzkkfeSvO8LITfGFgWedoCmmSgoF1hoxRRVFnfC2LhUJR4oPHsU0yV_WKWrHrndY2EAoEk-g9BXm7d8W5raX5WNPXUf9-SfB2hmLVZrZzs-7vZc5R0IOGJqPJ3nOc0XC3qfoy4-iysNPbD9xy8qjROZHJHZrvs2d-Q1rKsiNJ-_mBn_O75jMvyG6wXzvSM6IT3YDMgIDSCYbavnj6B0QV5asEGHCkChIVlO7p7yKe3-QqAvMcsqqjBwsdowAZpFDhRwyTCWEuixXZSkGjyKVCbaJNxIIxmuTVpE4DA6UMpJSE5Jf1Nu4IwEWgoUzGLPvsR14jIrWGa5BYli3MTnZOBVW7-1dBfrTquLv5svyaGf2TYn7or0q_caRuinq-K6WaAvHhGQmA
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PS8MwFA5jHvSksom_pj14NF3aJm1zLo6q6xhsg91GmryiCKtod9C_3pe2myIevIQQ3iEvCflekvd9IeRGmzzH0w5QEYc55SEWSjJJpcGd0NeFkIElCmeTMF3wh6VYdsjtjgsDAHXyGbi2Wr_lm1Jv7FXZ0Er3cSv-uYe4z0XD1tquHht5W7XylgbsMTlMp0lCk9mM3ifojc3jEq6ltv_4R6WGkdEhybYdaLJHXtxNlbv685c24397eET634Q9Z7qDomPSgXWPDHAJONlH9fTulIWTlAaM0_IC0KhPFqO7eZLS9jcE-uyzuKISQxejNAtBMa8ACTxiGE2FiNmFFwgFlkcaBUoHXEc6Yjg7IvegwPhAyiKC4IR01-UaTomjohANY9_qL3EVFLEJWWy4gQjNuPbPSM-6tnptBC9WrVfnfzdfk_10no1X4_vJ4wU5sKPcZMhdkm71toEBonaVX9WT9QXobJPl
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+IEEE+17th+International+Conference+on+High+Performance+Computing+and+Communications%2C+2015+IEEE+7th+International+Symposium+on+Cyberspace+Safety+and+Security%2C+and+2015+IEEE+12th+International+Conference+on+Embedded+Software+and+Systems&rft.atitle=The+Myths+of+Coded+Processing&rft.au=Braun%2C+Juergen&rft.au=Mottok%2C+Juergen&rft.date=2015-08-01&rft.pub=IEEE&rft.spage=1637&rft.epage=1644&rft_id=info:doi/10.1109%2FHPCC-CSS-ICESS.2015.24&rft.externalDocID=7336404