Sciweavers

153 search results - page 8 / 31
» Fault origin adjudication
Sort
View
129
Voted
ECAI
2010
Springer
15 years 4 months ago
A Fault-model-based Debugging Aid for Data Warehouse Applications
The paper describes a model-based approach to developing a general tool for localizing faults in applications of data warehouse technology. A model of the application is configured...
Peter Struss, Vikas Shivashankar, Mohamed Zahoor
126
Voted
DSN
2011
IEEE
14 years 3 months ago
Modeling stream processing applications for dependability evaluation
— This paper describes a modeling framework for evaluating the impact of faults on the output of streaming ions. Our model is based on three abstractions: stream operators, strea...
Gabriela Jacques-Silva, Zbigniew Kalbarczyk, Bugra...
141
Voted
ESERNET
2003
Springer
15 years 9 months ago
Functional Testing, Structural Testing, and Code Reading: What Fault Type Do They Each Detect?
The origin of the study described here is the experiment performed by Basili and Selby, further replicated by Kamsties and Lott, and once again by Wood et al. These experiments inv...
Natalia Juristo Juzgado, Sira Vegas
124
Voted
EUROPAR
2005
Springer
15 years 9 months ago
A Fault-Tolerant Token-Based Mutual Exclusion Algorithm Using a Dynamic Tree
Abstract. This article presents a fault tolerant extension for the NaimiTrehel token-based mutual exclusion algorithm. Contrary to the extension proposed by Naimi-Trehel, our appro...
Julien Sopena, Luciana Bezerra Arantes, Marin Bert...
137
Voted
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 10 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald