Sciweavers

153 search results - page 8 / 31
» Fault origin adjudication
Sort
View
ECAI
2010
Springer
14 years 10 months ago
A Fault-model-based Debugging Aid for Data Warehouse Applications
The paper describes a model-based approach to developing a general tool for localizing faults in applications of data warehouse technology. A model of the application is configured...
Peter Struss, Vikas Shivashankar, Mohamed Zahoor
DSN
2011
IEEE
13 years 9 months ago
Modeling stream processing applications for dependability evaluation
— This paper describes a modeling framework for evaluating the impact of faults on the output of streaming ions. Our model is based on three abstractions: stream operators, strea...
Gabriela Jacques-Silva, Zbigniew Kalbarczyk, Bugra...
ESERNET
2003
Springer
15 years 2 months ago
Functional Testing, Structural Testing, and Code Reading: What Fault Type Do They Each Detect?
The origin of the study described here is the experiment performed by Basili and Selby, further replicated by Kamsties and Lott, and once again by Wood et al. These experiments inv...
Natalia Juristo Juzgado, Sira Vegas
78
Voted
EUROPAR
2005
Springer
15 years 3 months ago
A Fault-Tolerant Token-Based Mutual Exclusion Algorithm Using a Dynamic Tree
Abstract. This article presents a fault tolerant extension for the NaimiTrehel token-based mutual exclusion algorithm. Contrary to the extension proposed by Naimi-Trehel, our appro...
Julien Sopena, Luciana Bezerra Arantes, Marin Bert...
IJNSEC
2010
66views more  IJNSEC 2010»
14 years 4 months ago
Finding Traitors in Secure Networks Using Byzantine Agreements
Secure networks rely upon players to maintain security and reliability. However not every player can be assumed to have total loyalty and one must use methods to uncover traitors ...
Liam Wagner, Stuart McDonald