Sciweavers

DSN
2007
IEEE
13 years 11 months ago
User Discrimination through Structured Writing on PDAs
This paper explores whether features of structured writing can serve to discriminate users of handheld devices such as Palm PDAs. Biometric authentication would obviate the need t...
Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Kill...
DSN
2007
IEEE
13 years 11 months ago
On the Cost of Modularity in Atomic Broadcast
Modularity is a desirable property of complex software systems, since it simplifies code reuse, verification, maintenance, etc. However, the use of loosely coupled modules intro...
Olivier Rütti, Sergio Mena, Richard Ekwall, A...
DSN
2007
IEEE
13 years 11 months ago
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks
Sleep-wake protocols are critical in sensor networks to ensure long-lived operation. However, an open problem is how to develop efficient mechanisms that can be incorporated with ...
Issa Khalil, Saurabh Bagchi, Ness B. Shroff
DSN
2007
IEEE
13 years 11 months ago
Improving Recoverability in Multi-tier Storage Systems
Enterprise storage systems typically contain multiple storage tiers, each having its own performance, reliability, and recoverability. The primary motivation for this multi-tier o...
Marcos Kawazoe Aguilera, Kimberly Keeton, Arif Mer...
DSN
2007
IEEE
13 years 11 months ago
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services
New versions of existing large-scale web services such as Passport.com© have to go through rigorous performance evaluations in order to ensure a high degree of availability. Perf...
Marcelo De Barros, Jing Shiau, Chen Shang, Kenton ...
DSN
2007
IEEE
13 years 11 months ago
Using Register Lifetime Predictions to Protect Register Files against Soft Errors
— Device scaling and large integration increase the vulnerability of microprocessors to transient errors. One of the structures where errors can be most harmful is the register ...
Pablo Montesinos, Wei Liu, Josep Torrellas
DSN
2007
IEEE
13 years 11 months ago
How to Choose a Timing Model?
When employing a consensus algorithm for state machine replication, should one optimize for the case that all communication links are usually timely, or for fewer timely links? Do...
Idit Keidar, Alexander Shraer
DSN
2007
IEEE
13 years 11 months ago
BlackJack: Hard Error Detection with Redundant Threads on SMT
Testing is a difficult process that becomes more difficult with scaling. With smaller and faster devices, tolerance for errors shrinks and devices may act correctly under certain ...
Ethan Schuchman, T. N. Vijaykumar
DSN
2007
IEEE
13 years 11 months ago
Greedy Receivers in IEEE 802.11 Hotspots
As wireless hotspot business becomes a tremendous financial success, users of these networks have increasing motives to misbehave in order to obtain more bandwidth at the expense...
Mi Kyung Han, Brian Overstreet, Lili Qiu
DSN
2007
IEEE
13 years 11 months ago
Concilium: Collaborative Diagnosis of Broken Overlay Routes
In a peer-to-peer overlay network, hosts cooperate to forward messages. When a message does not reach its final destination, there are two possible explanations. An intermediate ...
James W. Mickens, Brian D. Noble