Search Results - "Iyer, R.K."
-
1
A semi-automated, high-purity process for natural killer (NK) cell manufacturing in a rocking bioreactor
Published in Cytotherapy (Oxford, England) (01-05-2018)Get full text
Journal Article -
2
Fault injection techniques and tools
Published in Computer (Long Beach, Calif.) (01-04-1997)“…Fault injection is important to evaluating the dependability of computer systems. Researchers and engineers have created many novel methods to inject faults,…”
Get full text
Journal Article -
3
-
4
Active replication of multithreaded applications
Published in IEEE transactions on parallel and distributed systems (01-05-2006)“…Software-based active replication is expensive in terms of performance overhead. Multithreading can help improve performance; however, thread scheduling is a…”
Get full text
Journal Article -
5
Partial protection of photosynthetic apparatus from UV-B-induced damage by UV-A radiation
Published in Environmental and experimental botany (01-03-2007)“…Alteration in the photosynthetic apparatus of clusterbean ( Cyamopsis tetraganoloba) cotyledons owing to UV-B irradiation in the absence or presence of UV-A…”
Get full text
Journal Article -
6
Reliability MicroKernel: Providing Application-Aware Reliability in the OS
Published in IEEE transactions on reliability (01-12-2007)“…This paper describes the reliability MicroKernel (RMK) framework, a loadable kernel module (or a device driver) for providing application-aware reliability,…”
Get full text
Journal Article -
7
Hierarchical error detection in a software implemented fault tolerance (SIFT) environment
Published in IEEE transactions on knowledge and data engineering (01-03-2000)“…Proposes a hierarchical error detection framework for a software-implemented fault tolerance (SIFT) layer of a distributed system. A four-level error detection…”
Get full text
Journal Article -
8
393 - A semi-automated, high-purity process for natural killer (NK) cell manufacturing in a rocking bioreactor
Published in Cytotherapy (Oxford, England) (01-05-2018)Get full text
Journal Article -
9
Disaster recovery planning in an automated manufacturing environment
Published in IEEE transactions on engineering management (01-05-1998)“…Disasters may strike at any moment in any location. When they do, no distinction is made about the type of firm that is being affected, whether it is a bank or…”
Get full text
Journal Article -
10
Distinct Heart Failure Phenotypes Identified by Myocardial Transcriptome Sequencing: Targets for Reverse Remodeling
Published in The Journal of heart and lung transplantation (01-04-2019)“…Systolic heart failure (HF) is a progressive disease characterized by adverse remodeling from ischemia (ischemic cardiomyopathy, ICM) or a multitude of other…”
Get full text
Journal Article -
11
Circulating, Cell-Free, MicroRNA Sequencing to Diagnose Cardiac Allograft Rejection and Distinguish Rejection Subtype
Published in The Journal of heart and lung transplantation (01-04-2019)“…Genomic biomarkers are used to non-invasively screen cardiac transplant recipients for allograft rejection. Gene expression profiling has no ability to…”
Get full text
Journal Article -
12
Editor's note
Published in IEEE transactions on dependable and secure computing (01-07-2004)Get full text
Journal Article -
13
Editor's Note
Published in IEEE transactions on dependable and secure computing (01-07-2004)Get full text
Journal Article -
14
An experimental study of soft errors in microprocessors
Published in IEEE MICRO (01-11-2005)“…The issue of soft errors is an important emerging concern in the design and implementation of future microprocessors. The authors examine the impact of soft…”
Get full text
Journal Article -
15
Automatic recognition of intermittent failures: an experimental study of field data
Published in IEEE transactions on computers (01-04-1990)“…A methodology is proposed for recognizing the symptoms of persistent problems in large systems. The system error rate is used to identify the error states…”
Get full text
Journal Article -
16
Transparent runtime randomization for security
Published in 22nd International Symposium on Reliable Distributed Systems, 2003. Proceedings (2003)“…A large class of security attacks exploit software implementation vulnerabilities such as unchecked buffers. This paper proposes transparent runtime…”
Get full text
Conference Proceeding -
17
Editorial:Dependability and Security - Looking Foward to 2006
Published in IEEE transactions on dependable and secure computing (01-01-2006)Get full text
Journal Article -
18
Recent advances and new avenues in hardware-level reliability support
Published in IEEE MICRO (01-11-2005)“…Discussion on some of the recent advances in logic- and architectural-level techniques to deal with transient errors serves as a "springboard" to motivate the…”
Get full text
Journal Article -
19
Simulated fault injection: a methodology to evaluate fault tolerant microprocessor architectures
Published in IEEE transactions on reliability (01-10-1990)“…A simulation-based fault-injection methodology for validating fault-tolerant microprocessor architectures is described. The approach uses mixed-mode simulation…”
Get full text
Journal Article -
20
TRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing Base
Published in 10th IEEE High Assurance Systems Engineering Symposium (HASE'07) (01-11-2007)“…Summary form only given. Trusted ILLIAC is a reliable and secure computing platform being built at the University of Illinois Coordinated Science Laboratory…”
Get full text
Conference Proceeding