Sciweavers

10 search results - page 2 / 2
» Using device diversity to protect data against batch-correla...
Sort
View
CORR
2006
Springer
119views Education» more  CORR 2006»
13 years 6 months ago
An approach to RAID-6 based on cyclic groups of a prime order
As the size of data storing arrays of disks grows, it becomes vital to protect data against double disk failures. An economic way of providing such protection consists of adding tw...
R. Jackson, D. Rumynin, O. Zaboronski
ITC
2000
IEEE
101views Hardware» more  ITC 2000»
13 years 11 months ago
Which concurrent error detection scheme to choose ?
Concurrent error detection (CED) techniques (based on hardware duplication, parity codes, etc.) are widely used to enhance system dependability. All CED techniques introduce some ...
Subhasish Mitra, Edward J. McCluskey
VTS
2000
IEEE
89views Hardware» more  VTS 2000»
13 years 11 months ago
Fault Escapes in Duplex Systems
Hardware duplication techniques are widely used for concurrent error detection in dependable systems to ensure high availability and data integrity. These techniques are vulnerabl...
Subhasish Mitra, Nirmal R. Saxena, Edward J. McClu...
HPCA
2011
IEEE
12 years 10 months ago
Beyond block I/O: Rethinking traditional storage primitives
Over the last twenty years the interfaces for accessing persistent storage within a computer system have remained essentially unchanged. Simply put, seek, read and write have deď¬...
Xiangyong Ouyang, David W. Nellans, Robert Wipfel,...
IOLTS
2005
IEEE
163views Hardware» more  IOLTS 2005»
14 years 13 days ago
Modeling Soft-Error Susceptibility for IP Blocks
As device geometries continue to shrink, single event upsets are becoming of concern to a wider spectrum of system designers. These “soft errors” can be a nuisance or catastro...
Robert C. Aitken, Betina Hold