Sciweavers

PDPTA
2010
13 years 9 months ago
Collecting Sensor Data for High-Performance Computing: A Case-study
- Many research questions remain open with regard to improving reliability in exascale systems. Among others, statistics-based analysis has been used to find anomalies, to isolate ...
Line C. Pouchard, Jonathan D. Dobson, Stephen W. P...
MIDDLEWARE
2010
Springer
13 years 10 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
DMS
2008
161views Multimedia» more  DMS 2008»
14 years 27 days ago
A Method to Diagnose Self-weaknesses for Software Development Organizations
A root cause is a source of a defect such that if it is removed, the defect is subsequently decreased or removed. By analyzing the root causes of defects of our software projects,...
Chi-Lu Yang, Yeim-Kuan Chang, Chih-Ping Chu
ACSAC
2001
IEEE
14 years 3 months ago
Mining Alarm Clusters to Improve Alarm Handling Efficiency
It is a well-known problem that intrusion detection systems overload their human operators by triggering thousands of alarms per day. As a matter of fact, we have been asked by on...
Klaus Julisch
ICSM
2008
IEEE
14 years 5 months ago
Identifying the root causes of memory bugs using corrupted memory location suppression
We present a general approach for automatically isolating the root causes of memory-related bugs in software. Our approach is based on the observation that most memory bugs involv...
Dennis Jeffrey, Neelam Gupta, Rajiv Gupta