Sciweavers

261 search results - page 25 / 53
» Efficient Recovery in Harp
Sort
View
ISCA
2007
IEEE
90views Hardware» more  ISCA 2007»
14 years 4 months ago
Transparent control independence (TCI)
AL-ZAWAWI, AHMED SAMI. Transparent Control Independence (TCI). (Under the direction of Dr. Eric Rotenberg). Superscalar architectures have been proposed that exploit control indep...
Ahmed S. Al-Zawawi, Vimal K. Reddy, Eric Rotenberg...
IJNM
2000
91views more  IJNM 2000»
13 years 9 months ago
Coding-based schemes for fault identification in communication networks
The complexity of communication networks and the amount of information transferred in these networks have made the management of such networks increasingly difficult. Since faults ...
Chi-Chun Lo, Shing Hong Chen, Bon-Yeh Lin
TKDE
1998
102views more  TKDE 1998»
13 years 9 months ago
Database Migration: A New Architecture for Transaction Processing in Broadband Networks
—Due to recent developments in network technologies, broader channel bandwidth is becoming prevalent in worldwide networks. As one of the new technologies making good use of such...
Takahiro Hara, Kaname Harumoto, Masahiko Tsukamoto...
TPDS
1998
135views more  TPDS 1998»
13 years 9 months ago
On Coordinated Checkpointing in Distributed Systems
—Coordinated checkpointing simplifies failure recovery and eliminates domino effects in case of failures by preserving a consistent global checkpoint on stable storage. However, ...
Guohong Cao, Mukesh Singhal
TSE
2010
125views more  TSE 2010»
13 years 8 months ago
Engineering a Sound Assertion Semantics for the Verifying Compiler
—The Verifying Compiler (VC) project is a core component of the Dependable Systems Evolution Grand Challenge. The VC offers the promise of automatically proving that a program or...
Patrice Chalin