Sciweavers

2400 search results - page 108 / 480
» Systems Failures
Sort
View
EUROMICRO
1999
IEEE
14 years 1 months ago
Error Recovery using Forced Validity Assisted by Executable Assertions for Error Detection: An Experimental Evaluation
This paper proposes and evaluates error detection and recovery mechanisms suitable for embedded systems. The purpose of these mechanisms is to provide detection of and recovery fr...
Martin Hiller
CMS
2003
120views Communications» more  CMS 2003»
13 years 10 months ago
Extending the SDSI / SPKI Model through Federation Webs
Classic security systems use a trust model centered in the authentication procedure, which depends on a naming service. Even when using a Public Key Infrastructure as X.509, such s...
Altair Olivo Santin, Joni da Silva Fraga, Carlos M...
INFOCOM
2005
IEEE
14 years 2 months ago
The one-to-many TCP overlay: a scalable and reliable multicast architecture
Abstract— We consider reliable multicast in overlay networks where nodes have finite-size buffers and are subject to failures. We address issues of end-to-end reliability and th...
François Baccelli, Augustin Chaintreau, Zhe...
SIAMAM
2000
71views more  SIAMAM 2000»
13 years 8 months ago
Wave-Block in Excitable Media Due to Regions of Depressed Excitability
We study propagation failure using the one-dimensional scalar bistable equation with a passive "gap" region. By applying comparison principles for this type of equation, ...
James P. Keener, Timothy J. Lewis
GRID
2007
Springer
14 years 3 months ago
Log summarization and anomaly detection for troubleshooting distributed systems
— Today’s system monitoring tools are capable of detecting system failures such as host failures, OS errors, and network partitions in near-real time. Unfortunately, the same c...
Dan Gunter, Brian Tierney, Aaron Brown, D. Martin ...