Sciweavers

2604 search results - page 167 / 521
» Human Errors and System Requirements
Sort
View
DSD
2008
IEEE
147views Hardware» more  DSD 2008»
13 years 11 months ago
A Low-Cost Cache Coherence Verification Method for Snooping Systems
Due to modern technology trends such as decreasing feature sizes and lower voltage levels, fault tolerance is becoming increasingly important in computing systems. Shared memory i...
Demid Borodin, Ben H. H. Juurlink
FTCS
1998
79views more  FTCS 1998»
13 years 10 months ago
Proving Correctness of a Controller Algorithm for the RAID Level 5 System
Most RAID controllers implemented in industry are complicated and di cult to reason about. This complexity has led to software and hardware systems that are di cult to debug and h...
Mandana Vaziri, Nancy A. Lynch, Jeannette M. Wing
IJSNET
2007
155views more  IJSNET 2007»
13 years 9 months ago
Distributed Bayesian fault diagnosis of jump Markov systems in wireless sensor networks
: A Bayesian distributed online change detection algorithm is proposed for monitoring a dynamical system by a wireless sensor network. The proposed solution relies on modelling the...
Hichem Snoussi, Cédric Richard
CAD
2004
Springer
13 years 9 months ago
ESOLID - a system for exact boundary evaluation
We present a system, ESOLID, that performs exact boundary evaluation of low-degree curved solids in reasonable amounts of time. ESOLID performs accurate Boolean operations using e...
John Keyser, Tim Culver, Mark Foskey, Shankar Kris...
SIGOPS
2010
80views more  SIGOPS 2010»
13 years 7 months ago
Mining dependency in distributed systems through unstructured logs analysis
Dependencies among system components are crucial to locating root errors in a distributed system. In this paper, we propose an approach to mine intercomponent dependencies from un...
Jian-Guang Lou, Qiang Fu, Yi Wang, Jiang Li