Using Erasure Codes Efficiently for Storage in a Distributed System (Englisch)
- Neue Suche nach: Aguilera, M.
- Neue Suche nach: Janakiraman, R.
- Neue Suche nach: Xu, L.
- Neue Suche nach: IEEE Computer Society
- Neue Suche nach: Aguilera, M.
- Neue Suche nach: Janakiraman, R.
- Neue Suche nach: Xu, L.
- Neue Suche nach: IEEE Computer Society
In:
Dependable systems and networks
;
336-345
;
2005
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:Using Erasure Codes Efficiently for Storage in a Distributed System
-
Beteiligte:Aguilera, M. ( Autor:in ) / Janakiraman, R. ( Autor:in ) / Xu, L. ( Autor:in ) / IEEE Computer Society
-
Kongress:INTERNATIONAL CONFERENCE, Dependable systems and networks ; 2005 ; Yokohama, Japan
-
Erschienen in:Dependable systems and networks ; 336-345
-
Verlag:
- Neue Suche nach: IEEE Computer Society,
-
Erscheinungsort:Los Alamitos, Calif.:
-
Erscheinungsdatum:01.01.2005
-
Format / Umfang:10 pages
-
Anmerkungen:Includes bibliographical references and index.; Also held on CD-ROM.; ALSO KNOWN AS DSN 2005
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 2
-
Assured reconfiguration of fail-stop systemsStrunk, E.A. / Knight, J.C. / Aiello, M.A. et al. | 2005
- 12
-
NonStop® Advanced ArchitectureBernick, D. / Bruckert, B. / Del Vigna, P. / Garcia, D. / Jardine, R. / Klecka, J. / Smullen, J. / IEEE Computer Society et al. | 2005
- 12
-
NonStop/spl reg/ advanced architectureBernick, D. / Bruckert, B. / Vigna, P.D. / Garcia, D. / Jardine, R. / Klecka, J. / Smullen, J. et al. | 2005
- 22
-
How fast can eventual synchrony lead to consensus?Partha Dutta, / Guerraoui, R. / Lamport, L. et al. | 2005
- 30
-
ReStore: symptom based soft error detection in microprocessorsWang, N.J. / Patel, S.J. et al. | 2005
- 40
-
Combining error masking and error detection plus recovery to combat soft errors in static CMOS circuitsSrivathsan Krishnamohan, / Mahapatra, N.R. et al. | 2005
- 50
-
On-line detection of control-flow errors in SoCs by means of an infrastructure IP coreBernardi, P. / Bolzani, L. / Rebaudengo, M. / Reorda, M.S. / Vargas, F. / Violante, M. et al. | 2005
- 60
-
User interface dependability through goal-error preventionReeder, R.W. / Maxion, R.A. et al. | 2005
- 70
-
Stability monitoring and analysis of learning in an adaptive systemYerramalla, S. / Cukic, B. / Mladenovski, M. / Fuller, E. et al. | 2005
- 80
-
Effective testing and debugging techniques for a group communication systemFarchi, E. / Kliot, G. / Krasny, Y. / Krits, A. / Vitenberg, R. et al. | 2005
- 86
-
Error propagation profiling of operating systemsJohansson, A. / Suri, N. et al. | 2005
- 98
-
How resilient are distributed f fault/intrusion-tolerant systems?Sousa, P. / Neves, N.F. / Verissimo, P. et al. | 2005
- 108
-
Towards a theory of insider threat assessmentChinchani, R. / Iyer, A. / Ngo, H.Q. / Upadhyaya, S. et al. | 2005
- 118
-
Constructing multi-layered boundary to defend against intrusive anomalies: an autonomic detection coordinatorZhang, Z. / Shen, H. et al. | 2005
- 128
-
A model of stateful firewalls and its propertiesGouda, M.G. / Liu, A.X. et al. | 2005
- 140
-
GoCast: gossip-enhanced overlay multicast for fast and dependable group communicationTang, C. / Chang, R.N. / Ward, C. et al. | 2005
- 150
-
SMRP: fast restoration of multicast sessions from persistent failuresWu, J. / Shin, K.G. et al. | 2005
- 160
-
Efficient Byzantine broadcast in wireless ad-hoc networksDrabkin, V. / Friedman, R. / Segal, M. et al. | 2005
- 172
-
Internet routing anomaly detection and visualizationWong, T. / Van Jacobson, / Alaettinoglu, C. et al. | 2005
- 182
-
Assessing the performance of erasure codes in the wide-areaCollins, R.L. / Plank, J.S. et al. | 2005
- 188
-
Finding critical traffic matricesZhang, Y. / Ge, Z. et al. | 2005
- 200
-
A distributed state monitoring service for adaptive application managementMurray, P. et al. | 2005
- 206
-
Definition and specification of accrual failure detectorsDefago, X. / Urban, P. / Hayashibara, N. / Katayama, T. et al. | 2005
- 216
-
The effects of algorithmic diversity on anomaly detector performanceTan, K.M.C. / Maxion, R.A. et al. | 2005
- 228
-
On partial protection in groomed optical WDM mesh networksFang, J. / Sivakumar, M. / Somani, A.K. / Sivalingam, K.M. et al. | 2005
- 238
-
Resilient routing layers for recovery in packet networksHansen, A.F. / Kvalbein, A. / Cicic, T. / Gjessing, S. / Lysne, O. et al. | 2005
- 248
-
Perturbation-resistant and overlay-independent resource discoveryKo, S.Y. / Gupta, I. et al. | 2005
- 260
-
Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating SystemsJanakiraman, G.J. / Santos, J.R. / Subhraveti, D. / Turner, Y. et al. | 2005
- 270
-
A multi-level meta-object protocol for fault-tolerance in complex architecturesTaiani, F. / Fabre, J.-C. / Killijian, M.-O. et al. | 2005
- 280
-
Crash data collection: a Windows case studyGanapathi, A. / Patterson, D. et al. | 2005
- 288
-
Scalable and robust WLAN connectivity using access point arrayGuo, F. / Chiueh, T. et al. | 2005
- 298
-
Ringing out fault tolerance. A new ring network for superior low-cost dependabilityHall, B. / Driscoll, K. / Paulitsch, M. / Dajani-Brown, S. et al. | 2005
- 308
-
A system demonstration of ST-TCPManish Marwah, / Shivakant Mishra, / Fetzer, C. et al. | 2005
- 316
-
A data-centric approach to checksum reuse for array-intensive applicationsChen, G. / Kandemir, M. / Karakoy, M. et al. | 2005
- 326
-
Small parity-check erasure codes - exploration and observationsPlank, J.S. / Buchsbaum, A.L. / Collins, R.L. / Thomason, M.G. et al. | 2005
- 336
-
Using erasure codes efficiently for storage in a distributed systemAguilera, M.K. / Janakiraman, R. / Xu, L. et al. | 2005
- 346
-
Coverage and the use of cyclic redundancy codes in ultra-dependable systemsPaulitsch, M. / Morris, J. / Hall, B. / Driscoll, K. / Latronico, E. / Koopman, P. et al. | 2005
- 358
-
Authenticated system callsRajagopalan, M. / Hiltunen, M. / Jim, T. / Schlichting, R. et al. | 2005
- 368
-
Detecting stealth software with Strider GhostBusterWang, Y.-M. / Beck, D. / Vo, B. / Roussev, R. / Verbowski, C. et al. | 2005
- 378
-
Defeating memory corruption attacks via pointer taintedness detectionChen, S. / Xu, J. / Nakka, N. / Kalbarczyk, Z. / Iyer, R.K. et al. | 2005
- 388
-
Checking array bound violation using segmentation hardwareLam, L. / Chiueh, T. et al. | 2005
- 400
-
Panel StatementConstantinescu, C. / Kanoun, K. / Madeira, H. / Murphy, B. / Pramanick, I. / Brown, A.B. et al. | 2005
- 402
-
Fast Byzantine consensusMartin, J.-P. / Alvisi, L. et al. | 2005
- 412
-
A hybrid and adaptive model for fault-tolerant distributed computingGorender, S. / Macedo, R. / Raynal, M. et al. | 2005
- 422
-
Adaptive indulgent consensusSampaio, L. / Brasileiro, F. et al. | 2005
- 434
-
Microarchitecture-based introspection: a technique for transient-fault tolerance in microprocessorsQureshi, M.K. / Mutlu, O. / Patt, Y.N. et al. | 2005
- 444
-
Reversible fault-tolerant logicBoykin, P.O. / Roychowdhury, V.P. et al. | 2005
- 454
-
Co-design based approach to improve robustness in networked control systemsSumant Kowshik, / Girish Baliga, / Graham, S. / Sha, L. et al. | 2005
- 466
-
H-RAFT - heuristic reachability analysis for fault tolerance protocols modelled in SDLBohm, S.M. et al. | 2005
- 476
-
Filtering failure logs for a BlueGene/L prototypeLiang, Y. / Zhang, Y. / Sivasubramaniam, A. / Sahoo, R.K. / Moreira, J. / Gupta, M. et al. | 2005
- 486
-
Design time reliability analysis of distributed fault tolerance algorithmsLatronico, E. / Koopman, P. et al. | 2005
- 496
-
SoftArch: an architecture-level tool for modeling and analyzing soft errorsLi, X. / Adve, S.V. / Pradip Bose, / Rivers, J.A. et al. | 2005
- 508
-
ADEPTS: adaptive intrusion response using attack graphs in an e-commerce environmentFoo, B. / Wu, Y.-S. / Mao, Y.-C. / Bagchi, S. / Spafford, E. et al. | 2005
- 518
-
Neutralization of errors and attacks in wireless ad hoc networksBasile, C. / Kalbarczyk, Z. / Iyer, R.K. et al. | 2005
- 528
-
Modeling and automated containment of wormsSellke, S. / Shroff, N.B. / Bagchi, S. et al. | 2005
- 538
-
Fatih: detecting and isolating malicious routersMizrak, A.T. / Cheng, Y.-C. / Marzullo, K. / Savage, S. et al. | 2005
- 550
-
Combining response surface methodology with numerical models for optimization of class-based queueing systemsKemper, P. / Muller, D. / Thummler, A. et al. | 2005
- 560
-
On a method for mending time to failure distributionsGrottke, M. / Trivedi, K.S. et al. | 2005
- 570
-
A performability-oriented software rejuvenation framework for distributed applicationsTai, A.T. / Tso, K.S. / Sanders, W.H. / Chau, S.N. et al. | 2005
- 582
-
Optimizing the pulsing denial-of-service attacksXiapu Luo, / Chang, R.K.C. et al. | 2005
- 592
-
Towards a security benchmark for database management systemsVieira, M. / Madeira, H. et al. | 2005
- 602
-
An experimental evaluation to determine if port scans are precursors to an attackPanjwani, S. / Tan, S. / Jarrin, K.M. / Cukier, M. et al. | 2005
- 612
-
LITEWORP: a lightweight countermeasure for the wormhole attack in multihop wireless networksKhalil, I. / Saurabh Bagchi, / Shroff, N.B. et al. | 2005
- 624
-
Experimental evaluation of the QoS of failure detectors on wide area networkFalai, L. / Bondavalli, A. et al. | 2005
- 634
-
Probabilistic QoS guarantees for supercomputing systemsOliner, A.J. / Rudolph, L. / Sahoo, R.K. / Moreira, J.E. / Gupta, M. et al. | 2005
- 644
-
Ensembles of models for automated diagnosis of system performance problemsZhang, S. / Cohen, I. / Goldszmidt, M. / Symons, J. / Fox, A. et al. | 2005
- 656
-
A framework for node-level fault tolerance in distributed real-time systemsAidemark, J. / Folkesson, P. / Karlsson, J. et al. | 2005
- 666
-
Experimental dependability evaluation of a fail-bounded jet engine control system for unmanned aerial vehiclesVinter, J. / Hannius, O. / Norlander, T. / Folkesson, P. / Karlsson, J. et al. | 2005
- 672
-
TIBFIT: trust index based fault tolerance for arbitrary data faults in sensor networksKrasniewski, M. / Padma Varadharajan, / Rabeler, B. / Bagchi, S. / Hu, Y.C. et al. | 2005
- 684
-
Improving TCP performance for multihop wireless networksElRakabawy, S.M. / Lindemann, C. / Vernon, M.K. et al. | 2005
- 694
-
A spatial fluid-based framework to analyze large-scale wireless sensor networksGribaudo, M. / Chiasserini, C.F. / Gaeta, R. / Garetto, M. / Manini, D. / Sereno, M. et al. | 2005
- 704
-
Are you still there? - A lightweight algorithm to monitor node presence in self-configuring networksBohnenkamp, H. / Gorter, J. / Guidi, J. / Katoen, J.-P. et al. | 2005
- 712
-
A novel approach for fitting probability distributions to real trace data with the EM algorithmThummler, A. / Buchholz, P. / Telek, M. et al. | 2005
- 722
-
Model checking Markov reward models with impulse rewardsCloth, L. / Katoen, J.-P. / Khattri, M. / Pulungan, R. et al. | 2005
- 732
-
A wavefront parallelisation of CTMC solution using MTBDDsZhang, Y. / Parker, D. / Kwiatkowska, M. et al. | 2005
- 742
-
Lumping matrix diagram representations of Markov modelsDerisavi, S. / Kemper, P. / Sanders, W.H. et al. | 2005
- 754
-
Neutron SER characterization of microprocessorsConstantinescu, C. et al. | 2005
- 760
-
Microprocessor sensitivity to failures: control vs. execution and combinational vs. sequential logicSaggese, G.P. / Vetteth, A. / Kalbarczyk, Z. / Ravishankar Iyer, et al. | 2005
- 770
-
Engineering over-clocking: reliability-performance trade-offs for high-performance register filesMemik, G. / Chowdhury, M.H. / Mallik, A. / Ismail, Y.I. et al. | 2005
- 782
-
Analysis of probabilistic trapezoid protocol for data replicationSuzuki, T. / Ohara, M. / Arai, M. / Fukumoto, S. / Iwasaki, K. et al. | 2005
- 792
-
Testing the dependability and performance of group communication based database replication protocolsSousa, A. / Pereira, J. / Soares, L. / Correia, A. / Rocha, L. / Oliveira, R. / Moura, F. et al. | 2005
- 802
-
Model-based failure analysis of journaling file systemsVijayan Prabhakaran, / Arpaci-Dusseau, A.C. / Arpaci-Dusseau, R.H. et al. | 2005
- 812
-
Modeling coordinated checkpointing for large-scale supercomputersWang, L. / Karthik Pattabiraman, / Kalbarczyk, Z. / Iyer, R.K. / Votta, L. / Vick, C. / Wood, A. et al. | 2005
- 824
-
Workshop AbstractKatayama, T. / Ishikawa, Y. / Kinoshita, Y. et al. | 2005
- 831
-
Author index| 2005
- c1
-
2005 International Conference on Dependable Systems and Networks - Cover| 2005
- iv
-
2005 International Conference on Dependable Systems and Networks - Copyright Page| 2005
- v
-
2005 International Conference on Dependable Systems and Networks - Table of Contents| 2005
- xiii
-
Welcome Message from the General Chair and Conference Coordinator| 2005
- xiv
-
Conference Organizers| 2005
- xix
-
DCCS Program Committee| 2005
- xviii
-
Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair| 2005
- xx
-
DCCS Reviewers| 2005
- xxiii
-
W.C. Carter Award| 2005
- xxiv
-
Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs| 2005
- xxv
-
PDS Steering and Program Committees| 2005
- xxvii
-
PDS Reviewers| 2005
- xxviii
-
Observation of Local and Distant Earthquakes and Tsunami Warning SystemHoshiba, M. et al. | 2005
-
Proceedings. 2005 International Conference on Dependable Systems and Networks| 2005