Sciweavers

1024 search results - page 165 / 205
» Fault Tolerance in Decentralized Systems
Sort
View
CASES
2006
ACM
15 years 1 months ago
Cost-efficient soft error protection for embedded microprocessors
Device scaling trends dramatically increase the susceptibility of microprocessors to soft errors. Further, mounting demand for embedded microprocessors in a wide array of safety c...
Jason A. Blome, Shantanu Gupta, Shuguang Feng, Sco...
ISSTA
2009
ACM
15 years 4 months ago
Specifying the worst case: orthogonal modeling of hardware errors
During testing, the execution of valid cases is only one part of the task. Checking the behavior in boundary situations and in the presence of errors is an equally important subje...
Jewgenij Botaschanjan, Benjamin Hummel
HPDC
2005
IEEE
15 years 3 months ago
411 on scalable password service
In this paper we present 411, a password distribution system for high performance environments that provides security and scalability. We show that existing solutions such as NIS ...
Federico D. Sacerdoti, Mason J. Katz, Philip M. Pa...
ECBS
2002
IEEE
118views Hardware» more  ECBS 2002»
15 years 2 months ago
On the Relation between Design Contracts and Errors: A Software Development Strategy
When designing a software module or system, a systems engineer must consider and differentiate between how the system responds to external and internal errors. External errors can...
Eivind J. Nordby, Martin Blom, Anna Brunstrom
ACSAC
1999
IEEE
15 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti