Sciweavers

DSN
2005
IEEE
14 years 25 days ago
Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors
The increasing transient fault rate will necessitate onchip fault tolerance techniques in future processors. The speed gap between the processor and the memory is also increasing,...
Moinuddin K. Qureshi, Onur Mutlu, Yale N. Patt
DSN
2005
IEEE
14 years 25 days ago
Filtering Failure Logs for a BlueGene/L Prototype
Yinglung Liang, Yanyong Zhang, Anand Sivasubramani...
DSN
2005
IEEE
14 years 25 days ago
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors
Soft errors are a growing concern for processor reliability. Recent work has motivated architecture-level studies of soft errors since the architecture can mask many raw errors an...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
DSN
2005
IEEE
14 years 25 days ago
Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems
In general, decision support is one of the main purposes of model-based analysis of systems. Response surface methodology (RSM) is an optimization technique that has been applied ...
Peter Kemper, Dennis Müller, Axel Thümml...
DSN
2005
IEEE
14 years 25 days ago
A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks
The behavior of large-scale wireless sensor networks has been shown to be surprisingly complex and difficult to analyze, both by empirical experiment and simulation. In this pape...
Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano...
DSN
2005
IEEE
14 years 25 days ago
Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network
This paper describes an experiment performed on Wide Area Network to assess and fairly compare the Quality of Service provided by a large family of failure detectors. Failure dete...
Lorenzo Falai, Andrea Bondavalli
DSN
2005
IEEE
14 years 4 months ago
The Effects of Algorithmic Diversity on Anomaly Detector Performance
Common practice in anomaly-based intrusion detection assumes that one size fits all: a single anomaly detector should detect all anomalies. Compensation for any performance short...
Kymie M. C. Tan, Roy A. Maxion
DSN
2005
IEEE
14 years 4 months ago
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols
Database replication based on group communication systems has recently been proposed as an efficient and resilient solution for large-scale data management. However, its evaluati...
A. Sousa, José Pereira, L. Soares, Alfr&aci...
DSN
2005
IEEE
14 years 4 months ago
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications
While inherent resource redundancies in distributed applications facilitate gracefully degradable services, methods to enhance their dependability may have subtle, yet significan...
Ann T. Tai, Kam S. Tso, William H. Sanders, Savio ...