Sciweavers

DSN
2004
IEEE
15 years 4 months ago
Does Your Result Checker Really Check?
A result checker is a program that checks the output of the computation of the observed program for correctness. Introduced originally by Blum, the result checking paradigm has pr...
Lan Guo, Supratik Mukhopadhyay, Bojan Cukic
64
Voted
DSN
2004
IEEE
15 years 4 months ago
Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors
Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iy...
93
Voted
DSN
2004
IEEE
15 years 4 months ago
Efficient Byzantine-Tolerant Erasure-Coded Storage
This paper describes a decentralized consistency protocol for survivable storage that exploits local data versioning within each storage-node. Such versioning enables the protocol...
Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger,...
54
Voted
DSN
2004
IEEE
15 years 4 months ago
An Adaptive Algorithm for Efficient Message Diffusion in Unreliable Environments
Benoît Garbinato, Fernando Pedone, Rodrigo S...
95
Voted
DSN
2004
IEEE
15 years 4 months ago
Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems
Software configuration problems are a major source of failures in computer systems. In this paper, we present a new framework for categorizing configuration problems. We apply thi...
Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong We...
96
Voted
DSN
2004
IEEE
15 years 4 months ago
A Decentralized Algorithm for Erasure-Coded Virtual Disks
A Federated Array of Bricks is a scalable distributed storage system composed from inexpensive storage bricks. It achieves high reliability with low cost by using erasure coding a...
Svend Frølund, Arif Merchant, Yasushi Saito...
63
Voted
DSN
2004
IEEE
15 years 4 months ago
Generic Faultloads Based on Software Faults for Dependability Benchmarking
João Durães, Henrique Madeira
101
Voted
DSN
2004
IEEE
15 years 4 months ago
Evaluating the Impact of Limited Resource on the Performance of Flooding in Wireless Sensor Networks
Abstract-- Wireless sensor networks (WSNs) are large collections of resource limited nodes, densely deployed over a landscape. They gather and disseminate local data using multihop...
Patrick Downey, Rachel Cardell-Oliver
DSN
2004
IEEE
15 years 4 months ago
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks
Wireless sensor networks face acute security concerns in applications such as battlefield monitoring. A central point of failure in a sensor network is the base station, which act...
Jing Deng, Richard Han, Shivakant Mishra
83
Voted
DSN
2004
IEEE
15 years 4 months ago
Experience with Evaluating Human-Assisted Recovery Processes
We describe an approach to quantitatively evaluating human-assisted failure-recovery tools and processes in the environment of modern Internet- and enterprise-class server systems...
Aaron B. Brown, Leonard Chung, William Kakes, Calv...