Sciweavers

953 search results - page 87 / 191
» On the Emulation of Software Faults by Software Fault Inject...
Sort
View
DATE
2010
IEEE
182views Hardware» more  DATE 2010»
15 years 2 months ago
Fault-based attack of RSA authentication
For any computing system to be secure, both hardware and software have to be trusted. If the hardware layer in a secure system is compromised, not only it would be possible to ext...
Andrea Pellegrini, Valeria Bertacco, Todd M. Austi...
COMSWARE
2006
IEEE
15 years 3 months ago
Fault repair framework for mobile sensor networks
— In this paper, we propose a framework for fault repair in mobile sensor networks. A hierarchical structure which consists of replacement module, management policy module, knowl...
Tuan D. Le, Nadeem Ahmed, Nandan Parameswaran, San...
ISORC
2005
IEEE
15 years 3 months ago
A Provenance-Aware Weighted Fault Tolerance Scheme for Service-Based Applications
Service-orientation has been proposed as a way of facilitating the development and integration of increasingly complex and heterogeneous system components. However, there are many...
Paul Townend, Paul T. Groth, Jie Xu
PRDC
2007
IEEE
15 years 4 months ago
Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time
Model-based development has become state of the art in software engineering. Unfortunately, the used code generators often focus on the pure application functionality. Features li...
Christian Buckl, Matthias Regensburger, Alois Knol...
65
Voted
SIGMOD
2002
ACM
91views Database» more  SIGMOD 2002»
15 years 10 months ago
Phoenix Project: Fault-Tolerant Applications
After a system crash, databases recover to the last committed transaction, but applications usually either crash or cannot continue. The Phoenix purpose is to enable application s...
Roger S. Barga, David B. Lomet