The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As the number of processors and the size of the memory of computing systems keep increasing, the likelihood of CPU core failures, memory errors, and bus failures increases and can threaten system availability. Software components can be hardened against such failures by running several replicas of a component on hardware replicas that fail independently and that are coordinated by a State-Machine...
This work presents a comparative analysis of successive approximation algorithms with ordinary algorithms under fault injection. Successive approximation algorithms are implemented as a computation loop that approaches the final result for each loop execution. Because of that, we expect that they will present a natural fault tolerance, given that a fault in a given point of the execution may be masked...
Buggy device drivers are a major threat to the reliability of their host operating system. There have been myriad attempts to protect the kernel, but most of them either required driver modifications or incur substantial performance overhead. This paper describes an isolated device driver execution system called SIDE (Streamlined Isolated Driver Execution), which focuses specifically on unmodified...
Linux servers with heterogeneous architectures present a new challenge for fault management. With the significant increase in the numbers and types of hardware components, separate fault management becomes more complex and inefficient. It is clear that centralized management, automatic recovering and scalable design must be incorporated in the modern fault management system. Based on the ccNUMA architecture,...
On space missions, software suffers from Single Event Upsets (SEUs), producing bit-flips. A single bitflip can impede the whole program. In this work we present a novel software based approach to tolerate SEUs by redundant execution and protected memory. This approach can protect specifically designed programs against all SEUs. Our aim is to be able to use of-the-shelf processors and other complex...
While RAID is the prevailing method of creating reliable secondary storage infrastructure, many users desire more flexibility than offered by current implementations. Traditionally, RAID capabilities have been implemented largely in hardware in order to achieve the best performance possible, but hardware RAID has rigid designs that are costly to change. Software implementations are much more flexible,...
Currently, there are variety of international RFID protocols, and various corresponding RFID electronic tags. So, users have a strong requirement of supporting multi-protocol RFID reader. Because of the diversity of the application environment, users have to identify the moving items and transmit the results to remote servers. This paper focuses on the research and design of the wireless multi-protocol...
This paper presents an approach to conducting experimental studies for the characterization and comparison of the error behavior in different computing systems. The proposed approach is applied to characterize and compare the error behavior of three commercial systems (Linux 2.6 on Pentium 4, Solaris 10 on UltraSPARC IIIi, and AIX 5.3 on POWER 5) under hardware transient faults. The data is obtained...
Live migration of virtual machine (VM) is a desirable feature for distributed computing such as grid computing and recent cloud computing by facilitating fault tolerance, load balance, and hardware maintenance. Virtual machine monitor (VMM) enforced process protection is a newly advocated approach to provide a trustworthy execution environment for processes running on commodity operating systems.While...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.