Sciweavers

DSN
2007
IEEE
14 years 5 months ago
Using Register Lifetime Predictions to Protect Register Files against Soft Errors
— Device scaling and large integration increase the vulnerability of microprocessors to transient errors. One of the structures where errors can be most harmful is the register ...
Pablo Montesinos, Wei Liu, Josep Torrellas
DSN
2007
IEEE
14 years 5 months ago
How to Choose a Timing Model?
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer
DSN
2007
IEEE
14 years 5 months ago
BlackJack: Hard Error Detection with Redundant Threads on SMT
Testing is a difficult process that becomes more difficult with scaling. With smaller and faster devices, tolerance for errors shrinks and devices may act correctly under certain ...
Ethan Schuchman, T. N. Vijaykumar
DSN
2007
IEEE
14 years 5 months ago
Greedy Receivers in IEEE 802.11 Hotspots
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense...
Mi Kyung Han, Brian Overstreet, Lili Qiu
DSN
2007
IEEE
14 years 5 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble
DSN
2007
IEEE
14 years 5 months ago
Protecting Cryptographic Keys from Memory Disclosure Attacks
Cryptography has become an indispensable mechanism for securing systems, communications and applications. While offering strong protection, cryptography makes the assumption that ...
Keith Harrison, Shouhuai Xu
DSN
2007
IEEE
14 years 5 months ago
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines
As server consolidation using virtual machines (VMs) is carried out, software aging of virtual machine monitors (VMMs) is becoming critical. Performance degradation or crash failu...
Kenichi Kourai, Shigeru Chiba
DSN
2007
IEEE
14 years 5 months ago
Robustness Testing of the Windows DDK
Modern computers interact with many kinds of external devices, which have lead to a state where device drivers (DD) account for a substantial part of the operating system (OS) cod...
Manuel Mendonça, Nuno Neves
DSN
2007
IEEE
14 years 5 months ago
Dependability Assessment of Grid Middleware
Dependability is a key factor in any software system due to the potential costs in both time and money a failure may cause. Given the complexity of Grid applications that rely on ...
Nik Looker, Jie Xu
DSN
2007
IEEE
14 years 5 months ago
R-Sentry: Providing Continuous Sensor Services against Random Node Failures
The success of sensor-driven applications is reliant on whether a steady stream of data can be provided by the underlying system. This need, however, poses great challenges to sen...
Shengchao Yu, Yanyong Zhang