-
2
-
-
26844568000
-
Detecting application-level failures in component-based internet services
-
Sept.
-
Emre Kcman and Armando Fox. "Detecting Application-level Failures in Component-based Internet Services," IEEE Transactions on Neural Networks, Volume:16,Issue:5, pp:1027-1041, Sept. 2005.
-
(2005)
IEEE Transactions on Neural Networks
, vol.16
, Issue.5
, pp. 1027-1041
-
-
Kcman, E.1
Fox, A.2
-
3
-
-
20344389520
-
The architecture of virtual machines
-
James E. Smith, Ravi Nair. "The Architecture of Virtual Machines," IEEE Computer Society. V38(5), pp:32-38, 2005.
-
(2005)
IEEE Computer Society
, vol.38
, Issue.5
, pp. 32-38
-
-
Smith, J.E.1
Nair, R.2
-
4
-
-
84863542945
-
-
University of Texas at Austin, Tech. Rep
-
Lee I, Basoglu M, Sullivan M, et al. "Survey of Error and Fault Detection Mechanisms," University of Texas at Austin, Tech. Rep, 2011.
-
(2011)
Survey of Error and Fault Detection Mechanisms
-
-
Lee, I.1
Basoglu, M.2
Sullivan, M.3
-
5
-
-
4444365711
-
Measurements and analysis of ser-tolerant latch in a 90 nm dual-vt cmos process
-
Hazucha P, Karnik T, Walstra S, et al. "Measurements and Analysis of SER-tolerant Latch in a 90 nm dual-VT CMOS Process," Solid-State Circuits, IEEE Journal of, 2004, 39(9): 1536-1543.
-
(2004)
Solid-State Circuits, IEEE Journal of
, vol.39
, Issue.9
, pp. 1536-1543
-
-
Hazucha, P.1
Karnik, T.2
Walstra, S.3
-
6
-
-
0142184763
-
Cost-effective approach for reducing soft error failure rate in logic circuits
-
Mohanram K, Touba N A. "Cost-effective Approach for Reducing Soft Error Failure Rate in Logic Circuits," International Test Conference, 2003, pp: 893-901.
-
(2003)
International Test Conference
, pp. 893-901
-
-
Mohanram, K.1
Touba, N.A.2
-
7
-
-
84999178872
-
The Design, analysis, and verification of the sift fault tolerant system
-
IEEE Computer Society Press
-
Wensley J H, Green M W, Levitt K N, et al. "The Design, Analysis, and Verification of the SIFT Fault Tolerant System," Proceedings of the 2nd international conference on Software engineering. IEEE Computer Society Press, 1976, pp: 458-469.
-
(1976)
Proceedings of the 2nd International Conference on Software Engineering
, pp. 458-469
-
-
Wensley, J.H.1
Green, M.W.2
Levitt, K.N.3
-
10
-
-
85080362568
-
A virtual machine introspection based architecture for intrusion detection
-
Garfinkel T, Rosenblum M. "A Virtual Machine Introspection Based Architecture for Intrusion Detection," NDSS. 2003.
-
(2003)
NDSS
-
-
Garfinkel, T.1
Rosenblum, M.2
-
13
-
-
70350451637
-
A Grid based diagnostics and prognosis system for rolls royce aero engines: The dame project
-
Austin J. "A Grid Based Diagnostics and Prognosis System for Rolls Royce Aero Engines: The DAME Project," CLADE. 2004.
-
(2004)
CLADE
-
-
Austin, J.1
-
14
-
-
0032313923
-
Intrusion detection using sequences of system call
-
January 01
-
Steven A. Hofmeyr, Stephanie Forrest, Anil Somayaji. "Intrusion Detection Using Sequences of System Call," In: Journal of Computer Security, Issue: Volume 6, Number 3/1998,pp:151-180,January 01, 1998.
-
(1998)
Journal of Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
15
-
-
84929761235
-
A statistical learning approach to failure diagnosis
-
May
-
M. chen,A. Zheng, J. Lloyd, M. Jordan, and E. Brewer. "A Statistical Learning Approach to Failure Diagnosis," in Proceedings of the International Conference on Autonomic Computing, May 2004.
-
(2004)
Proceedings of the International Conference on Autonomic Computing
-
-
Chen, M.1
Zheng, A.2
Lloyd, J.3
Jordan, M.4
Brewer, E.5
-
17
-
-
84952503562
-
Thirteen ways to look at the correlation coefficient
-
J. Rodgers and W. Nicewander. "Thirteen Ways to Look at the Correlation Coefficient," The American Statistician, vol. 42, no. 1, pp. 59-66,1988.
-
(1988)
The American Statistician
, vol.42
, Issue.1
, pp. 59-66
-
-
Rodgers, J.1
Nicewander, W.2
-
18
-
-
35048900617
-
Dependability benchmarking of web-servers
-
João Durães,Marco Vieira and Henrique Madeira. "Dependability Benchmarking of Web-Servers," Lecture Notes in Computer Science,Volume:3219, pp:297-310, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3219
, pp. 297-310
-
-
Durães, J.1
Vieira, M.2
Madeira, H.3
-
19
-
-
0141836929
-
Comparison of physical and software-implemented fault injection techniques
-
Jean Arlat, Yves Crouzet, Johan Karlsson, Peter Folkesson, Emmerich Fuchs and Gü nther H. Leber. "Comparison of Physical and Software-implemented Fault Injection Techniques," IEEE Transactions on Computers, volume:52, issue:9, pages:1115, 2003.
-
(2003)
IEEE Transactions on Computers
, vol.52
, Issue.9
, pp. 1115
-
-
Arlat, J.1
Crouzet, Y.2
Karlsson, J.3
Folkesson, P.4
Fuchs, E.5
Leber, H.6
Nther, G.7
-
20
-
-
0031123369
-
Fault injection techniques and tools
-
M.-C. Hsueh,T. K. Tsai, and R. K. Iyer. "Fault Injection Techniques and Tools," Computer, vol. 30,no. 4, pp. 75-82,1997.
-
(1997)
Computer
, vol.30
, Issue.4
, pp. 75-82
-
-
Hsueh, M.-C.1
Tsai, T.K.2
Iyer, R.K.3
|