-
8
-
-
4544366279
-
Remote repair of operating system state using backdoors
-
A. Bohra, I. Neamtiu, P. Gallard, F. Sultan, and L. Iftode. Remote repair of operating system state using backdoors. In Proceedings of the 2004 International Conference on Autonomic Computing, May 2004.
-
Proceedings of the 2004 International Conference on Autonomic Computing, May 2004
-
-
Bohra, A.1
Neamtiu, I.2
Gallard, P.3
Sultan, F.4
Iftode, L.5
-
10
-
-
0024606852
-
Fault tolerance under UNIX
-
A. Borg, W. Blau, W. Graetsch, F. Herrmann, and W. Oberle. Fault tolerance under UNIX. ACM Transactions on Computer Systems, 7(1), 1989.
-
(1989)
ACM Transactions on Computer Systems
, vol.7
, Issue.1
-
-
Borg, A.1
Blau, W.2
Graetsch, W.3
Herrmann, F.4
Oberle, W.5
-
12
-
-
0036926472
-
Reducing recovery time in a small recursively restartable system
-
G. Candea, J. Cutler, A. Fox, R. Doshi, P. Garg, and R. Gowda. Reducing recovery time in a small recursively restartable system. In Proceedings of the 2002 International Conference on Dependable Systems and Networks, Jun 2002.
-
Proceedings of the 2002 International Conference on Dependable Systems and Networks, Jun 2002
-
-
Candea, G.1
Cutler, J.2
Fox, A.3
Doshi, R.4
Garg, P.5
Gowda, R.6
-
13
-
-
80053199674
-
Microreboot - A technique for cheap recovery
-
G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot - A technique for cheap recovery. In Proceedings of the 6th Symposium on Operating System Design and Implementation, Dec 2004.
-
Proceedings of the 6th Symposium on Operating System Design and Implementation, Dec 2004
-
-
Candea, G.1
Kawamoto, S.2
Fujiki, Y.3
Friedman, G.4
Fox, A.5
-
16
-
-
84885597053
-
-
CERT/CC. Advisories. http://www.cert.org/advisories/.
-
Advisories
-
-
-
20
-
-
0038716438
-
CCured in the real world
-
J. Condit, M. Harren, S. McPeak, G. C. Necula, and W. Weimer. CCured in the real world. In Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, Jun 2003.
-
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, Jun 2003
-
-
Condit, J.1
Harren, M.2
McPeak, S.3
Necula, G.C.4
Weimer, W.5
-
21
-
-
85084160243
-
StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks
-
C. Cowan, C. Pu, D. Maier, J.Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle, Q. Zhang, and H. Hinton. StackGuard: Automatic adaptive detection and prevention of buffer-overflow attacks. In Proceedings of the 7th USENIX Security Symposium, Jan 1998.
-
Proceedings of the 7th USENIX Security Symposium, Jan 1998
-
-
Cowan, C.1
Pu, C.2
Maier, D.3
Walpole, J.4
Bakke, P.5
Beattie, S.6
Grier, A.7
Wagle, P.8
Zhang, Q.9
Hinton, H.10
-
22
-
-
84978401615
-
Revirt: Enabling intrusion analysis through virtual-machine logging and replay
-
G. W. Dunlap, S. T. King, S. Cinar, M. A. Basrai, and P. M. Chen. Revirt: Enabling intrusion analysis through virtual-machine logging and replay. In Proceedings of the 5th Symposium on Operating System Design and Implementation, Dec 2002.
-
Proceedings of the 5th Symposium on Operating System Design and Implementation, Dec 2002
-
-
Dunlap, G.W.1
King, S.T.2
Cinar, S.3
Basrai, M.A.4
Chen, P.M.5
-
23
-
-
0042078549
-
A survey of rollback-recovery protocols in message-passing systems
-
E. N. M. Elnozahy, L. Alvisi, Y.-M. Wang, and D. B. Johnson. A survey of rollback-recovery protocols in message-passing systems. ACM Computer Surveys, 34(3):375-408, 2002.
-
(2002)
ACM Computer Surveys
, vol.34
, Issue.3
, pp. 375-408
-
-
Elnozahy, E.N.M.1
Alvisi, L.2
Wang, Y.-M.3
Johnson, D.B.4
-
29
-
-
0028994247
-
Software rejuvenation: Analysis, module and applications
-
Y. Huang, C. Kintala, N. Kolettis, and N. D. Fulton. Software rejuvenation: Analysis, module and applications. In Proceedings of the 25th Annual International Symposium on Fault-Tolerant Computing, Jun 1995.
-
Proceedings of the 25th Annual International Symposium on Fault-Tolerant Computing, Jun 1995
-
-
Huang, Y.1
Kintala, C.2
Kolettis, N.3
Fulton, N.D.4
-
31
-
-
38249017422
-
Recovery in distributed systems using optimistic message logging and check-pointing
-
D. B. Johnson and W. Zwaenepoel. Recovery in distributed systems using optimistic message logging and check-pointing. Journal of Algorithms, 11(3):462-491, 1990.
-
(1990)
Journal of Algorithms
, vol.11
, Issue.3
, pp. 462-491
-
-
Johnson, D.B.1
Zwaenepoel, W.2
-
35
-
-
0012991080
-
-
Technical report, CSE-TR-410-99, University of Michigan, Jul
-
D. E. Lowell and P. M. Chen. Discount checking: Transparent, low-overhead recovery for general applications. Technical report, CSE-TR-410-99, University of Michigan, Jul 1998.
-
(1998)
Discount Checking: Transparent, Low-overhead Recovery for General Applications
-
-
Lowell, D.E.1
Chen, P.M.2
-
37
-
-
0003071666
-
httperf - A tool for measuring web server performance
-
D. Mosberger and T. Jin. httperf - a tool for measuring web server performance. SIGMETRICS Performance Evaluation Review, 26(3):31-37, 1998. (Pubitemid 128605767)
-
(1998)
Performance Evaluation Review
, vol.26
, Issue.3
, pp. 31-37
-
-
Mosberger, D.1
Jin, T.2
-
38
-
-
0004015896
-
-
Technical report, Technical Report UCB//CSD-02-1175, U.C.Berkeley, Mar
-
D. Patterson, A. Brown, P. Broadwell, G. Candea, M. Chen, J. Cutler, P. Enriquez, A. Fox, E. Kiciman, M. Merzbacher, D. Oppenheimer, N. Sastry, W. Tetzlaff, J. Traupman, and N. Treuhaft. Recovery oriented computing (ROC): Motivation, definition, techniques, and case studies. Technical report, Technical Report UCB//CSD-02-1175, U.C.Berkeley, Mar 2002.
-
(2002)
Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies
-
-
Patterson, D.1
Brown, A.2
Broadwell, P.3
Candea, G.4
Chen, M.5
Cutler, J.6
Enriquez, P.7
Fox, A.8
Kiciman, E.9
Merzbacher, M.10
Oppenheimer, D.11
Sastry, N.12
Tetzlaff, W.13
Traupman, J.14
Treuhaft, N.15
-
39
-
-
0032179680
-
Diskless checkpointing
-
J. S. Plank, K. Li, and M. A. Puening. Diskless checkpointing. IEEE Transactions on Parallel and Distributed Systems, 9(10):972-986, 1998. (Pubitemid 128747893)
-
(1998)
IEEE Transactions on Parallel and Distributed Systems
, vol.9
, Issue.10
, pp. 972-986
-
-
Plank, J.S.1
Li, K.2
Puening, M.A.3
-
41
-
-
0016522101
-
System structure for software fault tolerance
-
B. Randell. System structure for software fault tolerance. IEEE Transactions on Software Engineering, 1(2):220-232, 1975.
-
(1975)
IEEE Transactions on Software Engineering
, vol.1
, Issue.2
, pp. 220-232
-
-
Randell, B.1
-
42
-
-
0017983255
-
RELIABILITY ISSUES IN COMPUTING SYSTEM DESIGN.
-
DOI 10.1145/356725.356729
-
B. Randell, P. A. Lee, and P. C. Treleaven. Reliability issues in computing system design. ACM Computer Surveys, 10(2):123-165, 1978. (Pubitemid 8633478)
-
(1978)
ACM Computing Surveys
, vol.10
, Issue.2
, pp. 123-165
-
-
Randell, B.1
Lee, P.A.2
Treleaven, P.C.3
-
43
-
-
84906487819
-
Enhancing server availability and security through failure-oblivious computing
-
M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee, Jr. Enhancing server availability and security through failure-oblivious computing. In Proceedings of the 6th Symposium on Operating System Design and Implementation, Dec 2004.
-
Proceedings of the 6th Symposium on Operating System Design and Implementation, Dec 2004
-
-
Rinard, M.1
Cadar, C.2
Dumitran, D.3
Roy, D.M.4
Leu, T.5
Beebee Jr., W.S.6
-
46
-
-
0042352263
-
Deciding when to forget in the Elephant file system
-
D. S. Santry, M. J. Feeley, N. C. Hutchinson, A. C. Veitch, R. W. Carton, and J. Ofir. Deciding when to forget in the Elephant file system. In Proceedings of the 17th ACM Symposium on Operating System Principles, Dec 1999.
-
Proceedings of the 17th ACM Symposium on Operating System Principles, Dec 1999
-
-
Santry, D.S.1
Feeley, M.J.2
Hutchinson, N.C.3
Veitch, A.C.4
Carton, R.W.5
Ofir, J.6
-
56
-
-
85053144389
-
Scalability of the Microsoft Cluster Service
-
W. Vogels, D. Dumitriu, A. Agrawal, T. Chia, and K. Guo. Scalability of the Microsoft Cluster Service. In Proceedings of the 2nd USENIX Windows NT Symposium, Aug 1998.
-
Proceedings of the 2nd USENIX Windows NT Symposium, Aug 1998
-
-
Vogels, W.1
Dumitriu, D.2
Agrawal, A.3
Chia, T.4
Guo, K.5
-
57
-
-
33845459004
-
The design and architecture of the Microsoft Cluster Service
-
W. Vogels, D. Dumitriu, K. Birman, R. Gamache, M. Massa, R. Short, J. Vert, J. Barrera, and J. Gray. The design and architecture of the Microsoft Cluster Service. In Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing, Jun 1998.
-
Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing, Jun 1998
-
-
Vogels, W.1
Dumitriu, D.2
Birman, K.3
Gamache, R.4
Massa, M.5
Short, R.6
Vert, J.7
Barrera, J.8
Gray, J.9
-
59
-
-
0028994273
-
Checkpointing and its applications
-
Y.-M. Wang, Y. Huang, K.-P. Vo, P.-Y. Chung, and C. M. R. Kintala. Checkpointing and its applications. In Proceedings of the 25th Annual International Symposium on Fault-Tolerant Computing, Jun 1995.
-
Proceedings of the 25th Annual International Symposium on Fault-Tolerant Computing, Jun 1995
-
-
Wang, Y.-M.1
Huang, Y.2
Vo, K.-P.3
Chung, P.-Y.4
Kintala, C.M.R.5
|