2005 International Conference on Dependable Systems and Networks (DSN'05)

28 June-1 July 2005

Filter Results

Displaying Results 1 - 25 of 100
  • 2005 International Conference on Dependable Systems and Networks - Cover

    Publication Year: 2005, Page(s): c1
    Request permission for reuse | PDF file iconPDF (504 KB)
    Freely Available from IEEE
  • Proceedings. 2005 International Conference on Dependable Systems and Networks

    Publication Year: 2005
    Request permission for reuse | PDF file iconPDF (83 KB)
    Freely Available from IEEE
  • 2005 International Conference on Dependable Systems and Networks - Copyright Page

    Publication Year: 2005, Page(s): iv
    Request permission for reuse | PDF file iconPDF (46 KB)
    Freely Available from IEEE
  • 2005 International Conference on Dependable Systems and Networks - Table of contents

    Publication Year: 2005, Page(s):v - xii
    Request permission for reuse | PDF file iconPDF (60 KB)
    Freely Available from IEEE
  • Welcome Message from the General Chair and Conference Coordinator

    Publication Year: 2005, Page(s): xiii
    Request permission for reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Organizers

    Publication Year: 2005, Page(s):xiv - xvii
    Request permission for reuse | PDF file iconPDF (33 KB)
    Freely Available from IEEE
  • Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair

    Publication Year: 2005, Page(s): xviii
    Request permission for reuse | PDF file iconPDF (44 KB) | HTML iconHTML
    Freely Available from IEEE
  • DCCS Program Committee

    Publication Year: 2005, Page(s): xix
    Request permission for reuse | PDF file iconPDF (21 KB)
    Freely Available from IEEE
  • DCCS Reviewers

    Publication Year: 2005, Page(s):xx - xxii
    Request permission for reuse | PDF file iconPDF (32 KB)
    Freely Available from IEEE
  • W.C. Carter Award

    Publication Year: 2005, Page(s): xxiii
    Request permission for reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs

    Publication Year: 2005, Page(s): xxiv
    Request permission for reuse | PDF file iconPDF (47 KB) | HTML iconHTML
    Freely Available from IEEE
  • PDS Steering and Program Committees

    Publication Year: 2005, Page(s):xxv - xxvi
    Request permission for reuse | PDF file iconPDF (24 KB)
    Freely Available from IEEE
  • PDS Reviewers

    Publication Year: 2005, Page(s): xxvii
    Request permission for reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Observation of Local and Distant Earthquakes and Tsunami Warning System

    Publication Year: 2005, Page(s): xxviii
    Request permission for reuse | PDF file iconPDF (28 KB)
    Freely Available from IEEE
  • Assured reconfiguration of fail-stop systems

    Publication Year: 2005, Page(s):2 - 11
    Cited by:  Papers (4)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (127 KB) | HTML iconHTML

    Hardware dependability improvements have led to a situation in which it is sometimes unnecessary to employ extensive hardware replication to mask hardware faults. Expanding upon our previous work on assured reconfiguration for single processes and building upon the fail-stop model of processor behavior, we define a framework that provides assured reconfiguration for concurrent software. This frame... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NonStop/spl reg/ advanced architecture

    Publication Year: 2005, Page(s):12 - 21
    Cited by:  Papers (77)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    For nearly 30 years the Hewlett Packard NonStop Enterprise Division (formerly Tandem Computers Inc.) has produced highly available, fault-tolerant, massively parallel NonStop computer systems. These vertically integrated systems use a proprietary operating system and specialized hardware for detecting, isolating, and recovering from faults. The NonStop advanced architecture (NSAA) uses dual or tri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How fast can eventual synchrony lead to consensus?

    Publication Year: 2005, Page(s):22 - 27
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (110 KB) | HTML iconHTML

    It is well known that the consensus problem can be solved in a distributed system if, after some time T/sub S/, no process fails and there is some upper bound /spl delta/ on how long it takes to deliver a message. We know of no existing algorithm that guarantees consensus among N processes before time T/sub S/+O(N/spl delta/). We show that consensus can be achieved by time T/sub S/+O(/spl delta/). View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • ReStore: symptom based soft error detection in microprocessors

    Publication Year: 2005, Page(s):30 - 39
    Cited by:  Papers (49)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (164 KB) | HTML iconHTML

    Device scaling and large scale integration have led to growing concerns about soft errors in microprocessors. To date, in all but the most demanding applications, implementing parity and ECC for caches and other large, regular SRAM structures have been sufficient to stem the growing soft error tide. This will not be the case for long, and questions remain as to the best way to detect and recover f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combining error masking and error detection plus recovery to combat soft errors in static CMOS circuits

    Publication Year: 2005, Page(s):40 - 49
    Cited by:  Papers (8)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (197 KB) | HTML iconHTML

    Soft errors are changes in logic state of a circuit/system resulting from the latching of single-event transients (transient voltage fluctuations at a logic node or SETs) caused by high-energy particle strikes or electrical noise. Due to technology scaling and reduced supply voltages, they are expected to increase by several orders of magnitude in logic circuits. In this work, we present a very ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On-line detection of control-flow errors in SoCs by means of an infrastructure IP core

    Publication Year: 2005, Page(s):50 - 58
    Cited by:  Papers (9)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    In sub-micron technology circuits high integration levels coupled with the increased sensitivity to soft errors even at ground level make the task of guaranteeing systems' dependability more difficult than ever. In this paper we present a new approach to detect control-flow errors by exploiting a low-cost infrastructure intellectual property (I-IP) core that works in cooperation with software-base... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • User interface dependability through goal-error prevention

    Publication Year: 2005, Page(s):60 - 69
    Cited by:  Papers (5)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    User interfaces form a critical coupling between humans and computers. When the interface fails, the user fails, and the mission is lost. For example, in computer security applications, human-made configuration errors can expose entire systems to various forms of attack. To avoid interaction failures, a dependable user interface must facilitate the speedy and accurate completion of user tasks. Def... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Stability monitoring and analysis of learning in an adaptive system

    Publication Year: 2005, Page(s):70 - 79
    Cited by:  Papers (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (265 KB) | HTML iconHTML

    The ability to ensure reliable adaptation is important in safety-critical applications. Traditional software verification and validation techniques cannot account for the time-evolving nature of a system, making them inapplicable for adaptive computing system assurance. In this paper, we propose considering stability of adaptation as a heuristic measure of reliability. We present a stability monit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effective testing and debugging techniques for a group communication system

    Publication Year: 2005, Page(s):80 - 85
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (83 KB) | HTML iconHTML

    View-oriented group communication is an important and widely used building block for constructing highly-available fault-tolerant systems. Unfortunately, group-communication based systems are extremely hard to test and debug due to a number of stateful complex algorithms deployed in parallel and the unique combination of distributed and concurrent programming paradigms that amplifies the non-deter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error propagation profiling of operating systems

    Publication Year: 2005, Page(s):86 - 95
    Cited by:  Papers (16)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (178 KB) | HTML iconHTML

    An operating system (OS) constitutes a fundamental software (SW) component of a computing system. The robustness of its operations, or lack thereof, strongly influences the robustness of the entire system. Targeting enhancement of robustness at the OS level via use of add-on SW wrappers, this paper presents an error propagation profiling framework that assists in a) systematic identification and l... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • How resilient are distributed f fault/intrusion-tolerant systems?

    Publication Year: 2005, Page(s):98 - 107
    Cited by:  Papers (16)  |  Patents (1)
    Request permission for reuse | Click to expandAbstract | PDF file iconPDF (239 KB) | HTML iconHTML

    Fault-tolerant protocols, asynchronous and synchronous alike, make stationary fault assumptions: only a fraction f of the total n nodes may fail. Whilst a synchronous protocol is expected to have a bounded execution time, an asynchronous one may execute for an arbitrary amount of time, possibly sufficient for f+1 nodes to fail. This can compromise the safety of the protocol and ultimately the safe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.