Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
System recovery
biblio
Automatic Runtime Recovery via Error Handler Synthesis
Submitted by grigby1 on Tue, 05/16/2017 - 12:43pm
automatic runtime recovery
exception handling
JVM
pubcrawl
Resiliency
System recovery
biblio
On Structuring Holistic Fault Tolerance
Submitted by grigby1 on Tue, 05/16/2017 - 12:43pm
Energy Efficiency
Error Recovery
Many-core systems
Performance
pubcrawl
Resiliency
system layering
System recovery
system structuring
biblio
Resilience: A holistic safety approach
Submitted by BrandonB on Wed, 05/06/2015 - 2:54pm
Personnel
Systematics
system safety
system risk reduction
System recovery
Safety
risk management
resilience
Reliability
Accidents
Organizations
Large-scale systems
holistic safety approach
high-risk industries
Hazards
emergency management
complex systems
biblio
A Decision Procedure for Deadlock-Free Routing in Wormhole Networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:54pm
Linear programming
wormhole switching technique
wormhole networks
torus topologies
Topology
telecommunication network topology
telecommunication network routing
System recovery
Switches
sufficient condition
Routing protocols
routing functions
Routing
network topology
necessary condition
adaptive routing function
integer programming
Grippers
formal methods
Design methodology
decision procedure
deadlocks
deadlock-free routing
deadlock freedom
computer networks
computational complexity
Communication networks
communication network design
co-NP-complete problem
automatic verification
biblio
Many-to-all priority-based network-coding broadcast in wireless multihop networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
priority-based deadlock prevention
wireless networks
wireless multihop networks
Wireless communication
Vectors
trees (mathematics)
Topology
telecommunication network topology
System recovery
radio networks
Protocols
broadcast
packet transmission
network coding
minimum transmission broadcast problem
maximum out-degree problem
many-to-all- with-network-coding MTB problem
Energy Efficiency
encoding
distributed many-to-all priority-based network-coding broadcast protocol
broadcast trees
biblio
Practical DCB for improved data center networks
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
NIC
Vegetation
transport protocols
Topology
Throughput
telecommunication traffic
telecommunication network topology
TCP-bolt
System recovery
switching networks
storage area networking
Routing protocols
Routing
Ports (Computers)
arbitrary network topology traffic
lossless Ethernet
Local area networks
line blocking head
improved data center network
Hardware
ECMP routing
deadlock-free routing scheme
DCB
data center bridging
computer centres
commodity data center switch
buffering delay
biblio
Asymptotic analysis of failed recovery probability in a distributed wireless storage system with limited sum storage capacity
Submitted by BrandonB on Wed, 05/06/2015 - 2:53pm
optimal storage allocation strategy
wireless storage
wireless sensor networks
Wireless communication
wireless channels
wireless channel conditions
System recovery
storage size
storage nodes
storage management
storage allocation
signal-to-noise ratio
Signal to noise ratio
resource management
probability
Approximation methods
maximum distance separable coding
limited sum storage capacity constraint
failed recovery probability
failed recovery
exponential order
distributed wireless storage systems
Distributed storage system
distributed storage node
distributed memory systems
Distributed databases
Decoding
Capacity planning
asymptotic failed recovery probability
asymptotic analysis
biblio
Single Disk Failure Recovery for X-Code-Based Parallel Storage Systems
Submitted by BrandonB on Wed, 05/06/2015 - 2:52pm
networked storage system prototype
X-code-based parallel storage systems
X-code-based optimal recovery scheme
System recovery
storage management
single disk failure recovery algorithm
Reliability
redundancy coding schemes
Redundancy
recovery algorithm
Peer to peer computing
Parallel storage systems
parallel memories
optimal update complexity
optimal single-disk failure recovery
arrays
minimum-disk-read-recovery
MDRR
logical encoding scheme
Load management
encoding
double-fault tolerant coding scheme
disc storage
data communication
data centers
data availability
Complexity theory
coding theory
cloud storage
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Wed, 05/06/2015 - 9:54am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
biblio
Multidimensional Diversity Employment for Software Behavior Encryption
Submitted by BrandonB on Tue, 05/05/2015 - 11:22am
multidimensional software diversity employment
system resilience
System recovery
spatiotemporal software behavior encryption
Spatiotemporal phenomena
software monoculture
software fault tolerance
Software
security provisioning
security level
Runtime
resilience
online programmable software-execution foundation separating logic
multidimensional systems
autonomic failure recovery mechanism
moving target defense
encryption
Employment
diffusion levels
Cryptography
confusion levels
computational cost
computational complexity
ChameleonSoft recovery mechanisms
ChameleonSoft Behavior Encryption
CBE mechanism
behaviorally-mutated functionally-equivalent code variants
avalanche effect percentage
« first
‹ previous
…
2
3
4
5
6
7
8
9
10
next ›
last »