Sciweavers

DSN
2011
IEEE
12 years 4 months ago
Modeling stream processing applications for dependability evaluation
— This paper describes a modeling framework for evaluating the impact of faults on the output of streaming ions. Our model is based on three abstractions: stream operators, strea...
Gabriela Jacques-Silva, Zbigniew Kalbarczyk, Bugra...
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 7 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
ICDE
2011
IEEE
235views Database» more  ICDE 2011»
12 years 8 months ago
Dealing proactively with data corruption: Challenges and opportunities
—The danger of production or backup data becoming corrupted is a problem that database administrators dread. This position paper aims to bring this problem to the attention of th...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...
FAST
2008
13 years 6 months ago
An Analysis of Data Corruption in the Storage Stack
An important threat to reliable storage of data is silent data corruption. In order to develop suitable protection mechanisms against data corruption, it is essential to understan...
Lakshmi N. Bairavasundaram, Garth R. Goodson, Bian...
FAST
2008
13 years 6 months ago
SWEEPER: An Efficient Disaster Recovery Point Identification Mechanism
Data corruption is one of the key problems that is on top of the radar screen of most CIOs. Continuous Data Protection (CDP) technologies help enterprises deal with data corruptio...
Akshat Verma, Kaladhar Voruganti, Ramani Routray, ...
DSN
2009
IEEE
13 years 8 months ago
Evaluating the impact of Undetected Disk Errors in RAID systems
Despite the reliability of modern disks, recent studies have made it clear that a new class of faults, Undetected Disk Errors (UDEs) also known as silent data corruption events, b...
Eric Rozier, Wendy Belluomini, Veera Deenadhayalan...
PRDC
2005
IEEE
13 years 10 months ago
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime
An important issue in modern cache designs is bridging the gap between wire and device delays. This warrants the use of more regular and modular structures to mask wire latencies....
Heng Xu, Arun K. Somani
ERCIMDL
2009
Springer
132views Education» more  ERCIMDL 2009»
13 years 11 months ago
Just One Bit in a Million: On the Effects of Data Corruption in Files
So far little attention has been paid to file format robustness, i.e., a file formats capability for keeping its information as safe as possible in spite of data corruption. The pa...
Volker Heydegger