Sciweavers

799 search results - page 129 / 160
» On Failures and Faults
Sort
View
MASCOTS
1993
13 years 10 months ago
Simulation Modeling of Weak-Consistency Protocols
: Weak-consistency replication protocols can be used to build wide-area services that are scalable, fault-tolerant, and useful for mobile computer systems. We have evaluated the ti...
Richard A. Golding, Darrell D. E. Long
ICECCS
2010
IEEE
159views Hardware» more  ICECCS 2010»
13 years 9 months ago
Towards Self-Healing Swarm Robotic Systems Inspired by Granuloma Formation
Abstract—Granuloma is a medical term for a ball-like collection of immune cells that attempts to remove foreign substances from a host organism. This response is a special type o...
Amelia Ritahani Ismail, Jon Timmis
IJNSEC
2008
126views more  IJNSEC 2008»
13 years 9 months ago
A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
We present a hybrid group key management protocol that incorporates both a centralized and a contributory scheme for key management, and a tree-based Elliptic Curve Diffie-Hellman...
Depeng Li, Srinivas Sampalli
DAC
2006
ACM
14 years 10 months ago
FLAW: FPGA lifetime awareness
Aggressive scaling of technology has an adverse impact on the reliability of VLSI circuits. Apart from increasing transient error susceptibility, the circuits also become more vul...
Suresh Srinivasan, Prasanth Mangalagiri, Yuan Xie,...
SIGSOFT
2006
ACM
14 years 9 months ago
Finding failure-inducing changes in java programs using change classification
Testing and code editing are interleaved activities during program development. When tests fail unexpectedly, the changes that caused the failure(s) are not always easy to find. W...
Barbara G. Ryder, Frank Tip, Maximilian Störz...