Search Results - "International Conference on Dependable Systems and Networks (DSN'06)"
-
1
A large-scale study of failures in high-performance computing systems
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT…”
Get full text
Conference Proceeding -
2
BlueGene/L Failure Analysis and Prediction Models
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM's…”
Get full text
Conference Proceeding -
3
Exploring Fault-Tolerant Network-on-Chip Architectures
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…The advent of deep sub-micron technology has exacerbated reliability issues in on-chip interconnects. In particular, single event upsets, such as soft errors,…”
Get full text
Conference Proceeding -
4
Honeypot-Aware Advanced Botnet Construction and Maintenance
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Because "botnets" can be used for illicit financial gain, they have become quite popular in recent Internet attacks. "Honeypots" have been successfully…”
Get full text
Conference Proceeding -
5
HoVer Erasure Codes For Disk Arrays
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…We present a new family of XOR-based erasure codes primarily targeted for use in disk arrays. These codes have a unique data/parity layout, with both…”
Get full text
Conference Proceeding -
6
VoIP Intrusion Detection Through Interacting Protocol State Machines
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Being a fast-growing Internet application, voice over Internet protocol (VoIP) shares the network resources with the regular Internet traffic, and is…”
Get full text
Conference Proceeding -
7
Automatic Instruction-Level Software-Only Recovery
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Computer…”
Get full text
Conference Proceeding -
8
Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Due to their growing complexity, it becomes extremely difficult to detect and isolate faults in complex systems. While large amount of monitoring data can be…”
Get full text
Conference Proceeding -
9
In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Protecting the register value and its data buses is crucial to reliable computing in high-performance microprocessors due to the increasing susceptibility of…”
Get full text
Conference Proceeding -
10
Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…We present three algorithms for detecting the need for software rejuvenation by monitoring the changing values of a customer-affecting performance metric, such…”
Get full text
Conference Proceeding -
11
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…We analyze the problem of efficiently storing large amounts of data on a distributed set of servers that may be accessed concurrently from multiple clients by…”
Get full text
Conference Proceeding -
12
Efficiently Detecting All Dangling Pointer Uses in Production Servers
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for production use in server codes. One…”
Get full text
Conference Proceeding -
13
CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…One of the main reasons for the difficulty of hardware verification is that hardware platforms are typically nondeterministic at clock-cycle granularity…”
Get full text
Conference Proceeding -
14
Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…The Solaris 10 operating system includes a number of new features for predictive self-healing. One such feature is the ability of the fault management software…”
Get full text
Conference Proceeding -
15
Using Attack Injection to Discover New Vulnerabilities
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this…”
Get full text
Conference Proceeding -
16
Assessing the Attack Threat due to IRC Channels
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…This practical experience report presents the results of an investigation into the threat of attacks associated with the chat medium IRC. A combination of…”
Get full text
Conference Proceeding -
17
Efficient High Hamming Distance CRCs for Embedded Networks
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter…”
Get full text
Conference Proceeding -
18
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management…”
Get full text
Conference Proceeding -
19
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…This paper considers the eventual leader election problem in asynchronous message-passing systems where an arbitrary number t of processes can crash (t<n,…”
Get full text
Conference Proceeding -
20
Scaling Byzantine Fault-Tolerant Replication toWide Area Networks
Published in International Conference on Dependable Systems and Networks (DSN'06) (2006)“…This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The…”
Get full text
Conference Proceeding