Search Results - "International Conference on Dependable Systems and Networks (DSN'06)"

Refine Results
  1. 1

    A large-scale study of failures in high-performance computing systems by Schroeder, B., Gibson, G.A.

    “…Designing highly dependable systems requires a good understanding of failure characteristics. Unfortunately, little raw data on failures in large IT…”
    Get full text
    Conference Proceeding
  2. 2

    BlueGene/L Failure Analysis and Prediction Models by Liang, Y., Zhang, Y., Jette, M., Anand Sivasubramaniam, Sahoo, R.

    “…The growing computational and storage needs of several scientific applications mandate the deployment of extreme-scale parallel machines, such as IBM's…”
    Get full text
    Conference Proceeding
  3. 3

    Exploring Fault-Tolerant Network-on-Chip Architectures by Dongkook Park, Nicopoulos, C., Jongman Kim, Vijaykrishnan, N., Das, C.R.

    “…The advent of deep sub-micron technology has exacerbated reliability issues in on-chip interconnects. In particular, single event upsets, such as soft errors,…”
    Get full text
    Conference Proceeding
  4. 4

    Honeypot-Aware Advanced Botnet Construction and Maintenance by Zou, C.C., Cunningham, R.

    “…Because "botnets" can be used for illicit financial gain, they have become quite popular in recent Internet attacks. "Honeypots" have been successfully…”
    Get full text
    Conference Proceeding
  5. 5

    HoVer Erasure Codes For Disk Arrays by Hafner, J.L.

    “…We present a new family of XOR-based erasure codes primarily targeted for use in disk arrays. These codes have a unique data/parity layout, with both…”
    Get full text
    Conference Proceeding
  6. 6

    VoIP Intrusion Detection Through Interacting Protocol State Machines by Sengar, H., Wijesekera, D., Wang, H., Jajodia, S.

    “…Being a fast-growing Internet application, voice over Internet protocol (VoIP) shares the network resources with the regular Internet traffic, and is…”
    Get full text
    Conference Proceeding
  7. 7

    Automatic Instruction-Level Software-Only Recovery by Chang, J., Reis, G.A., August, D.I.

    “…As chip densities and clock rates increase, processors are becoming more susceptible to transient faults that can affect program correctness. Computer…”
    Get full text
    Conference Proceeding
  8. 8

    Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems by Guo, Z., Jiang, G., Chen, H., Yoshihira, K.

    “…Due to their growing complexity, it becomes extremely difficult to detect and isolate faults in complex systems. While large amount of monitoring data can be…”
    Get full text
    Conference Proceeding
  9. 9

    In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability by Hu, J., Wang, S., Ziavras, S.G.

    “…Protecting the register value and its data buses is crucial to reliable computing in high-performance microprocessors due to the increasing susceptibility of…”
    Get full text
    Conference Proceeding
  10. 10

    Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms by Avritzer, A., Bondi, A., Grottket, M., Trivedi, K.S., Weyuker, E.J.

    “…We present three algorithms for detecting the need for software rejuvenation by monitoring the changing values of a customer-affecting performance metric, such…”
    Get full text
    Conference Proceeding
  11. 11

    Optimal Resilience for Erasure-Coded Byzantine Distributed Storage by Cachin, C., Tessaro, S.

    “…We analyze the problem of efficiently storing large amounts of data on a distributed set of servers that may be accessed concurrently from multiple clients by…”
    Get full text
    Conference Proceeding
  12. 12

    Efficiently Detecting All Dangling Pointer Uses in Production Servers by Dhurjati, D., Adve, V.

    “…In this paper, we propose a novel technique to detect all dangling pointer uses at run-time that is efficient enough for production use in server codes. One…”
    Get full text
    Conference Proceeding
  13. 13

    CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging by Sarangi, S.R., Greskamp, B., Torrellas, J.

    “…One of the main reasons for the difficulty of hardware verification is that hardware platforms are typically nondeterministic at clock-cycle granularity…”
    Get full text
    Conference Proceeding
  14. 14

    Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults by Tang, D., Carruthers, P., Totari, Z., Shapiro, M.W.

    “…The Solaris 10 operating system includes a number of new features for predictive self-healing. One such feature is the ability of the fault management software…”
    Get full text
    Conference Proceeding
  15. 15

    Using Attack Injection to Discover New Vulnerabilities by Neves, N., Antunes, J., Correia, M., Verissimo, P., Neves, R.

    “…Due to our increasing reliance on computer systems, security incidents and their causes are important problems that need to be addressed. To contribute to this…”
    Get full text
    Conference Proceeding
  16. 16

    Assessing the Attack Threat due to IRC Channels by Meyer, R., Cukier, M.

    “…This practical experience report presents the results of an investigation into the threat of attacks associated with the chat medium IRC. A combination of…”
    Get full text
    Conference Proceeding
  17. 17

    Efficient High Hamming Distance CRCs for Embedded Networks by Ray, J., Koopman, P.

    “…Cyclic redundancy codes (CRCs) are widely used in network transmission and data storage applications because they provide better error detection than lighter…”
    Get full text
    Conference Proceeding
  18. 18

    Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures by Meixner, A., Sorin, D.J.

    “…Multithreaded servers with cache-coherent shared memory are the dominant type of machines used to run critical network services and database management…”
    Get full text
    Conference Proceeding
  19. 19

    Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony by Fernandez, A., Jimenez, E., Raynal, M.

    “…This paper considers the eventual leader election problem in asynchronous message-passing systems where an arbitrary number t of processes can crash (t<n,…”
    Get full text
    Conference Proceeding
  20. 20

    Scaling Byzantine Fault-Tolerant Replication toWide Area Networks by Amir, Y., Danilov, C., Dolev, D., Kirsch, J., Lane, J., Nita-Rotaru, C., Olsen, J., Zage, D.

    “…This paper presents the first hierarchical Byzantine fault-tolerant replication architecture suitable to systems that span multiple wide area sites. The…”
    Get full text
    Conference Proceeding