. Activator and . Class, Cet Activator teste l'existence d'un chier particulier Si ce chier existe, alors le worker peut exécuter son job ; dans le cas contraire, il ne le peut pas. Nous avons ensuite créé deux nouvelles primitives d'injection de fautes pour FAIL-FCI qui permettent la création de ce chier particulier (xtremweb_activate()) et la suppression de celui-ci (xtremweb_desactivate()). Ces primitives sont stockées dans une nouvelle bibliothèque FAIL-FCI. En utilisant ce mécanisme

. Mhz-chacun, une mémoire vive d'une capacité de 2 Gb, et étaient connectées grâce à un réseau Ethernet Gigabit

]. J. Bibliographie1, J. Aidemark, P. Vinter, J. Folkesson, and . Karlsson, Goo : Generic object-oriented fault injection tool, Proc. International Conference on Dependable Systems and Networks, 2001.

R. Alur, Techniques for automatic verication of real-time systems, 1992.

R. Alur and D. L. Dill, Automata for modeling real-time systems, ICALP '90 : Proceedings of the 17th International Colloquium on Automata, Languages and Programming, p.322335, 1990.
DOI : 10.1007/BFb0032042

R. Alur and D. L. Dill, A theory of timed automata, Theor. Comput. Sci, vol.126, issue.2, p.183235, 1994.

A. Guillermo, F. Alvarez, and . Cristian, Centralized failure injection for distributed , fault-tolerant protocol testing, International Conference on Distributed Computing Systems, p.0, 1997.

P. David and . Anderson, Boinc : A system for public-resource computing and storage, GRID '04 : Proceedings of the Fifth IEEE/ACM International Workshop on Grid Computing, p.410, 2004.

K. A. Bartlett, R. A. Scantlebury, and P. T. Wilkinson, A note on reliable full-duplex transmission over half-duplex links, Communications of the ACM, vol.12, issue.5, p.260261, 1969.
DOI : 10.1145/362946.362970

N. Bertrand, Modèles stochastiques pour les pertes de messages dans les protocoles asynchrones et techniques de vérication automatique, Thèse de doctorat, 2006.

A. Bouteiller, F. Cappello, T. Hérault, G. Krawezik, P. Lemarinier et al., MPICH-V2, Proceedings of the 2003 ACM/IEEE conference on Supercomputing, SC '03, 2003.
DOI : 10.1145/1048935.1050176

P. Bouyer, Modèles et algorithmes pour la vérication des systèmes temporisés

D. Brand and P. Zaropulo, On communicating nite-state machines, J. ACM, vol.30, issue.2, p.323342, 1983.

S. Budkowski and P. Dembinski, An introduction to Estelle: A specification language for distributed systems, Computer Networks and ISDN Systems, vol.14, issue.1, p.323, 1987.
DOI : 10.1016/0169-7552(87)90084-5

F. Cappello, S. Djilali, G. Fedak, T. Herault, F. Magniette et al., Computing on large-scale distributed systems: XtremWeb architecture, programming models, security, tests and convergence with grid, Future Generation Computer Systems, vol.21, issue.3, p.417437, 2005.
DOI : 10.1016/j.future.2004.04.011

URL : https://hal.archives-ouvertes.fr/in2p3-00163490

J. Carreira, H. Madeira, and J. Silva, Xception : Software fault injection and monitoring, Processor Functional Units Pre-prints 5th Int. Working Conf. on Dependable Computing for Critical Applications (DCCA-5), p.3549, 1995.

M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, Security for structured peer-to-peer overlay networks, Proceedings of the Fifth Symposium on Operating Systems Design and Implementation (OSDI'02), 2002.

M. Castro, P. Druschel, Y. C. Hu, and A. Rowstron, Exploiting network proximity in peer-to-peer overlay networks, 2002.

R. Chandra, R. M. Lefever, M. Cukier, and W. H. Sanders, Loki: a state-driven fault injector for distributed systems, Proceeding International Conference on Dependable Systems and Networks. DSN 2000, 2000.
DOI : 10.1109/ICDSN.2000.857544

R. Chandra, M. Cukier, R. M. Lefever, and W. H. Sanders, Dynamic node management and measure estimation in a state-driven fault injector, Proceedings 19th IEEE Symposium on Reliable Distributed Systems SRDS-2000, p.248257, 2000.
DOI : 10.1109/RELDI.2000.885412

K. M. Chandy and L. Lamport, Distributed snapshots: determining global states of distributed systems, ACM Transactions on Computer Systems, vol.3, issue.1, p.6375, 1985.
DOI : 10.1145/214451.214456

. Sanders, Fault injection based on a partial view of the global state of a distributed system, p.168, 1999.

D. Perrin and J. E. Pin, Innite words, 2001.

S. Dawson, F. Jahanian, and T. Mitton, Orchestra : A fault injection environment for distributed systems, 26th International Symposium on Fault-Tolerant Computing (FTCS), p.404414, 1996.

S. Dawson and F. Jahanian, Deterministic fault injection of distributed systems, Dagstuhl Seminar on Distributed Systems, p.178196, 1994.
DOI : 10.1007/3-540-60042-6_13

S. Dawson and F. Jahanian, Probing and fault injection of protocol implementations, Proceedings of 15th International Conference on Distributed Computing Systems, p.351359, 1995.
DOI : 10.1109/ICDCS.1995.500039

S. Dawson, F. Jahanian, and T. Mitton, A software fault injection tool on real-time Mach, Proceedings 16th IEEE Real-Time Systems Symposium, p.130140, 1995.
DOI : 10.1109/REAL.1995.495203

S. Dawson, F. Jahanian, T. Mitton, and T. Tung, Testing of faulttolerant and real-time distributed systems via protocol fault injektion, Symposium on Fault-Tolerant Computing, p.404414, 1996.

G. Fagg and J. Dongarra, FT-MPI: Fault Tolerant MPI, Supporting Dynamic Applications in a Dynamic World, 7th Euro PVM/MPI User's Group Meeting2000, 1908.
DOI : 10.1007/3-540-45255-9_47

G. Fedak, C. Germain, V. Néri, and F. Cappello, XtremWeb: a generic global computing system, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid, 2001.
DOI : 10.1109/CCGRID.2001.923246

W. Gropp, E. Lusk, N. Doss, and A. Skjellum, Highperformance , portable implementation of the MPI message passing interface sta ndard, Parallel Computing, vol.22, issue.6, p.789828, 1996.

S. Han, K. Shin, and H. Rosenberg, Doctor : An integrated software fault injection environment for distributed real-time systems, Int. Computer Performance and Dependability Symp. (IPDS'95), pp.204-217, 1995.

D. Henke, Loki an empirical evaluation tool for distributed systems : The experiment analysis framework, 1998.

T. Herault, P. Lemarinier, A. Bouteiller, and F. Cappello, The MPICH-V project http

W. Hoarau, P. Lemarinier, T. Herault, and E. Rodriguez, Sébastien Tixeuil, and Franck Cappello. Fail-mpi : How fault-tolerant is fault-tolerant mpi ?, Proceedings of Cluster 2006, 2006.

W. Hoarau, L. Silva, and S. Tixeuil, Integrated research in grid computing , chapter fault-injection and dependability benchmarking for grid computing middleware. CoreGRID, 2006.

W. Hoarau and S. Tixeuil, A language-driven tool for fault injection in distributed applications, Proceedings of the IEEE, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00684889

W. Hoarau and S. Tixeuil, Easy fault injection and stress testing with fail-fci, Second CoreGRID Workshop on Grid and Peer to Peer Systems Architecture, 2006.
URL : https://hal.archives-ouvertes.fr/hal-00699867

W. Hoarau, S. Tixeuil, N. Rodrigues, D. Sousa, and L. Silva, Integrated research in grid computing

W. Hoarau, S. Tixeuil, and F. Vauchelles, Fault injection in distributed Java applications, Proceedings 20th IEEE International Parallel & Distributed Processing Symposium, p.page to appear, 2006.
DOI : 10.1109/IPDPS.2006.1639507

W. Hoarau, S. Tixeuil, and F. Vauchelles, Fail-fci : Versatile faultinjection, Future Generation Computer Systems, 2007.

W. Hoschek, A Unied Peer-to-Peer Database Framework for XQueries over Dynamic Distributed Content and its Application for Scalable Service Discovery

E. , R. J. Duell, and P. Hargrove, The design and implementation of berkeley lab's linux checkpoint/restart, 2003.

E. Jenn, J. Arlat, M. Rimen, J. Ohlsson, and J. Karlsson, Fault injection into VHDL models: the MEFISTO tool, Proceedings of IEEE 24th International Symposium on Fault- Tolerant Computing, p.6675, 1994.
DOI : 10.1109/FTCS.1994.315656

D. Kondo, M. Taufer, C. Brooks, H. Casanova, and A. Chien, Characterizing and evaluating desktop grids: an empirical study, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings., 2004.
DOI : 10.1109/IPDPS.2004.1302936

D. Kondo, G. Fedak, F. Cappello, A. A. Chien, and H. Casanova, On Resource Volatility in Enterprise Desktop Grids, 2006 Second IEEE International Conference on e-Science and Grid Computing (e-Science'06), p.78, 2006.
DOI : 10.1109/E-SCIENCE.2006.261162

P. Lemarinier, A. Bouteiller, T. Herault, G. Krawezik, and F. Cappello, Improved message logging versus improved coordinated checkpointing for fault tolerant MPI, 2004 IEEE International Conference on Cluster Computing (IEEE Cat. No.04EX935), 2004.
DOI : 10.1109/CLUSTR.2004.1392609

M. Litzkow, T. Tannenbaum, J. Basney, and M. Livny, Checkpoint and migration of UNIX processes in the condor distributed processing sy stem, 1997.

S. Lumetta and D. Culler, The Mantis parallel debugger, Proceedings of the SIGMETRICS symposium on Parallel and distributed tools , SPDT '96, p.118
DOI : 10.1145/238020.238056

H. Madeira, J. Carreira, and J. Silva, Injection of faults in complex computers, IEEE Workshop on Evaluation Techniques for Dependable Systems, 1995.

P. Maymounkov and D. Mazieres, Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Proceedings of IPTPS02, 2002.
DOI : 10.1007/3-540-45748-8_5

D. Nurmi, J. Brevik, and R. Wolski, Modeling Machine Availability in Enterprise and Wide-Area Distributed Computing Environments
DOI : 10.1007/11549468_50

G. Fedak, P. Malecot, and D. Kondo, Xtremlab : une plateforme pour l'observation et la caracterisation des grilles de pc sur internet, 2006.

J. K. Pachl, Protocol description and analysis based on a state transition model with channel expressions The Netherlands, The Netherlands, Proceedings of the IFIP WG6.1 Seventh International Conference on Protocol Specication, Testing and Verication VII, p.207219, 1987.

J. Pistole, Lokian empirical evaluation tool for distributed systems : The run-time experiment framework, 1998.

S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Schenker, A scalable content-addressable network, SIGCOMM '01 : Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, p.161172, 2001.

A. Rowstron and P. Druschel, Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, Lecture Notes in Computer Science, p.329, 2001.
DOI : 10.1007/3-540-45518-3_18

G. Rozenberg and A. Salomaa, Handbook of Formal Languages, 1997.

S. Sankaran, J. M. Squyres, B. Barrett, A. Lumsdaine, J. Son-duell et al., The Lam/Mpi Checkpoint/Restart Framework: System-Initiated Checkpointing, Proceedings, LACSI Symposium, 2003.
DOI : 10.1177/1094342005056139

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.9068

D. C. Schmidt, Reactor : An object behavioral pattern for concurrent event demultiplexing and event handler dispatching, Proceedings of the 1st Pattern Languages of Programs Conference, 1994.

D. C. Schmidt and S. D. Huston, C++ Network Programming : Mastering Complexity Using ACE and Patterns, 2002.

D. C. Schmidt and S. D. Huston, C++ Network Programming : Systematic Reuse with ACE and Frameworks, 2003.

M. Shirts and V. S. Pande, Screen savers of the world unite ! In Sciences, 2000.

V. Sieh, Fault-injector using unix ptrace interface, 1993.

L. Silva, H. Madeira, and J. G. Silva, Software aging and rejuvenation in a soap-based server, NCA '06 : Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, p.5665, 2006.

M. Snir, S. Otto, S. Huss-lederman, D. Walker, and J. Dongarra, MPI : The Complete Reference, 1996.

I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan, Chord : A scalable Peer-To-Peer lookup service for internet applications, Proceedings of the 2001 ACM SIGCOMM Conference, p.149160, 2001.

D. T. Stott, NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors, Proceedings IEEE International Computer Performance and Dependability Symposium. IPDS 2000, p.91100, 2000.
DOI : 10.1109/IPDS.2000.839467

W. T. Sullivan, I. , D. Werthimer, S. Bowyer, J. Cobb et al., Abstract, IAU Colloq. 161 : Astronomical and Biochemical Origins and the Search for Life in the Universe, p.729, 1997.
DOI : 10.1016/0019-1035(84)90172-6

U. Wildner, Swier : Software implemented control ow error injection, 1996.

R. Wolski, D. Nurmi, and J. Brevik, An Analysis of Availability Distributions in Condor, 2007 IEEE International Parallel and Distributed Processing Symposium, 2007.
DOI : 10.1109/IPDPS.2007.370523

R. Wolski, D. Nurmi, J. Brevik, H. Casanova, and A. Chien, Models and modeling infrastructures for global computational platforms, ipdps, 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05, p.224, 2005.
DOI : 10.1109/ipdps.2005.294

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.357.6392

B. Zhao, L. Huang, J. Stribling, S. Rhea, A. Joseph et al., Tapestry: A Resilient Global-Scale Overlay for Service Deployment, IEEE Journal on Selected Areas in Communications, 2003.
DOI : 10.1109/JSAC.2003.818784

L. Grammaire-de and F. Les-blancs-les-caractères-espace, retour chariot et tabulation sont considérés comme blancs. Ils servent uniquement à séparer les diérents mots. Ils n'ont aucun impact sur la grammaire dans FAIL et peuvent donc être insérés un nombre quelconque de fois entre n'importe quels mots

L. , L. Commentaires-peuvent-Être-Écrits-en-Étant-insérés-entre-les-signes, /. *. , and *. , On peut aussi mettre une ligne du code en commentaire grâce aux signes, Le commentaire débute alors aux signes // et se termine à la n de la ligne (délimitée par un caractère retour chariot). Les commentaires dans FAIL peuvent être imbriqués

L. Identicateurs, Les identicateurs sont constitués d'une suite non vide de caractères dont le premier est un alphabétique (masjuscule ou minuscule) et dont tous les autres sont alphanumériques ou '_'. Leur longueur est arbitraire