Browsing by Subject "Computer system recovery"
Now showing items 1-14 of 14
-
Conference Object
Combating persistent adversaries in wireless sensor networks using directional antennas
(2011)Security is an important property in applications offering services in mission-critical areas, such as in healthcare, military, transportation, etc. Wireless sensor networks (WSN) support the mission of these applications ...
-
Article
The Do-All problem with Byzantine processor failures
(2005)Do-All is the abstract problem of using n processors to cooperatively perform m independent tasks in the presence of failures. This problem and its derivatives have been a centerpiece in the study of trade-offs between ...
-
Article
Fault-tolerant computation in groups and semigroups: Applications to automata, dynamic systems and Petri nets
(2002)The traditional approach to fault-tolerant computation has been via modular hardware redundancy. Although universal and simple, modular redundancy is inherently expensive and inefficient. By exploiting particular structural ...
-
Article
Finite-state machine embeddings for nonconcurrent error detection and identification
(2005)In digital sequential systems that operate over several time steps, a state-transition fault at any time step during the operation of the system can corrupt its state and render its future functionality useless. Such ...
-
Article
MPI-FT: Portable fault tolerance scheme for MPI
(2000)In this paper, we propose the design and development of a fault tolerant and recovery scheme for the Message Passing Interface (MPI). The proposed scheme consists of a detection mechanism for detecting process failures, ...
-
Article
Periodic and non-concurrent error detection and identification in one-hot encoded FSMs
(2004)State-transition faults in digital sequential systems, such as finite-state logic controllers, have traditionally been handled by embedding the given system into a larger one, in a way that preserves the state evolution ...
-
Conference Object
Recovering from the selective forwarding attack in WSNs - Enhancing the recovery benefits of blacklisting and rerouting using directional antennas
(Institute of Electrical and Electronics Engineers Inc., 2014)Wireless sensor networks (WSNs) face a number of security challenges that can compromise their operation. A typical security attack that can be launched by an adversary, in order to affect the network's communication, is ...
-
Conference Object
Security evaluation methodology for intrusion recovery protocols in wireless sensor networks
(2012)Researchers have designed intrusion recovery protocols in Wireless Sensor Networks (WSN) with the aim of restoring compromised services and promoting a secure and reliable environment in WSNs. Currently, evaluation frameworks ...
-
Conference Object
Situation aware intrusion recovery policy in WSNs
(Institute of Electrical and Electronics Engineers Inc., 2016)Wireless Sensor Networks (WSNs) have been gaining tremendous research attention the last few years as they support a broad range of applications in the context of the Internet of Things. WSN-driven applications greatly ...
-
Conference Object
A trellis notion for distributed system diagnosis with sequential semantics
(2006)We consider modular automata, obtained as a product of elementary components, and adopt the usual sequential semantics: runs of these systems are sequences of events (in contrast to partial orders). The set of all runs of ...
-
Conference Object
Two-phase commit optimizations and tradeoffs in the commercial environment
(Publ by IEEE, 1993)An atomic commit protocol can ensure that all participants in a distributed transaction reach consistent states, whether or not system or network failures occur. One widely used protocol is the two-phase commit (2PC) ...
-
Article
Two-phase commit optimizations in a commercial distributed environment
(1995)An atomic commit protocol can ensure that all participants in a distributed transaction reach consistent states, whether or not system or network failures occur. The atomic commit protocol used in industry and academia is ...
-
Conference Object
Vulnerability assessment of intrusion recovery countermeasures in wireless sensor networks
(2011)Wireless sensor networks (WSNs) have become a hot research topic in recent years and are considered to be one of the building blocks of pervasive computing. Many diverse, mission-critical applications are deployed, including ...
-
Conference Object
WSN operability during persistent attack execution
(Institute of Electrical and Electronics Engineers Inc., 2016)Wireless Sensor Networks (WSNs) are utilized in a number of critical infrastructures, e.g. healthcare, disaster and relief. In sensitive environments, it is vital to maintain the operability of the network in an effort to ...