Sciweavers

Share
warning: Creating default object from empty value in /var/www/modules/taxonomy/taxonomy.module on line 1416.
VEE
2012
ACM
239views Virtualization» more  VEE 2012»
8 years 10 months ago
Facilitating inter-application interactions for OS-level virtualization
OS-level virtualization generates a minimal start-up and run-time overhead on the host OS and thus suits applications that require both good isolation and high efficiency. However...
Zhiyong Shan, Xin Wang 0001, Tzi-cker Chiueh, Xiao...
JNSM
2008
104views more  JNSM 2008»
10 years 1 months ago
Call Forwarding-Based Active Probing for POTS Fault Isolation
To ensure high availability of telephone services, there is considerable interest in network management activities to develop competent fault management mechanisms. In this paper w...
Chi-Shih Chao, Maitreya Natu, Adarshpal S. Sethi
ACST
2006
10 years 4 months ago
A combinatorial group testing method for FPGA fault location
Adaptive fault isolation methods based on discrepancyenabled pairwise comparisons are developed for reconfigurable logic devices. By observing the discrepancy characteristics of m...
Carthik A. Sharma, Ronald F. DeMara
ERSA
2007
108views Hardware» more  ERSA 2007»
10 years 4 months ago
Performance Evaluation of Two Allocation Schemes for Combinatorial Group Testing Fault Isolation
- Two fault isolation approaches based on Combinatorial Group Testing (CGT) are presented. Although they both share the basic principle of grouping suspect resources into subgroups...
Rawad N. Al-Haddad, Carthik A. Sharma, Ronald F. D...
AAAI
2007
10 years 4 months ago
A Qualitative Approach to Multiple Fault Isolation in Continuous Systems
The multiple fault diagnosis problem is important, since the single fault assumption can lead to incorrect or failed diagnoses when multiple faults occur. It is challenging for co...
Matthew J. Daigle, Xenofon D. Koutsoukos, Gautam B...
ASPLOS
2006
ACM
10 years 8 months ago
Architectural support for software-based protection
Control-Flow Integrity (CFI) is a property that guarantees program control flow cannot be subverted by a malicious adversary, even if the adversary has complete control of data m...
Mihai Budiu, Úlfar Erlingsson, Martí...
ISCA
2007
IEEE
182views Hardware» more  ISCA 2007»
10 years 8 months ago
Configurable isolation: building high availability systems with commodity multi-core processors
High availability is an increasingly important requirement for enterprise systems, often valued more than performance. Systems designed for high availability typically use redunda...
Nidhi Aggarwal, Parthasarathy Ranganathan, Norman ...
books