Sciweavers

81
Voted
DSN
2011
IEEE
13 years 10 months ago
Coercing clients into facilitating failover for object delivery
Abstract—Application-level protocols used for object delivery, such as HTTP, are built atop TCP/IP and inherit its hostabstraction. Given that these services are replicated for s...
Wyatt Lloyd, Michael J. Freedman
98
Voted
DSN
2011
IEEE
13 years 10 months ago
Coerced Cache Eviction and discreet mode journaling: Dealing with misbehaving disks
—We present Coerced Cache Eviction (CCE), a new method to force writes to disk in the presence of a disk cache that does not properly obey write-cache configuration or flush re...
Abhishek Rajimwale, Vijay Chidambaram, Deepak Rama...
87
Voted
DSN
2011
IEEE
13 years 10 months ago
Cross-layer resilience using wearout aware design flow
—As process technology shrinks devices, circuits experience accelerated wearout. Monitoring wearout will be critical for improving the efficiency of error detection and correctio...
Bardia Zandian, Murali Annavaram
107
Voted
DSN
2011
IEEE
13 years 10 months ago
Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessors
—Aggressive technology scaling causes chip multiprocessors increasingly error-prone. Core-level faulttolerant approaches bind two cores to implement redundant execution and error...
Shuchang Shan, Yu Hu, Xiaowei Li
134
Voted
DSN
2011
IEEE
13 years 10 months ago
LLS: Cooperative integration of wear-leveling and salvaging for PCM main memory
Phase change memory (PCM) has emerged as a promising technology for main memory due to many advan­ tages, such as better scalability, non-volatility and fast read access. However,...
Lei Jiang, Yu Du, Youtao Zhang, Bruce R. Childers,...
111
Voted
DSN
2011
IEEE
13 years 10 months ago
Approximate analysis of blocking queueing networks with temporal dependence
—In this paper we extend the class of MAP queueing networks to include blocking models, which are useful to describe the performance of service instances which have a limited con...
Vittoria de Nitto Persone, Giuliano Casale, Evgeni...
120
Voted
DSN
2011
IEEE
13 years 10 months ago
Communix: A framework for collaborative deadlock immunity
—We present Communix, a collaborative deadlock immunity framework for Java programs. Deadlock immunity enables applications to avoid deadlocks that they previously encountered. D...
Horatiu Jula, Pinar Tözün, George Candea
69
Voted
DSN
2011
IEEE
13 years 10 months ago
WaRR: A tool for high-fidelity web application record and replay
Silviu Andrica, George Candea
89
Voted
DSN
2011
IEEE
13 years 10 months ago
Analysis of security data from a large computing organization
In this work, we study security incidents that occurred over period of 5 years at the National Center for Supercomputing Applications at the University of Illinois. The analysis co...
Aashish Sharma, Zbigniew Kalbarczyk, James Barlow,...
84
Voted
DSN
2011
IEEE
13 years 10 months ago
OS diversity for intrusion tolerance: Myth or reality?
—One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are ...
Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, ...