Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Failure Data-Driven Selective Node-Level Duplication to Improve MTTF in High Performance Computing Systems., and . HPCS, volume 5976 of Lecture Notes in Computer Science, page 304-322. Springer, (2009)Achieving Target MTTF by Duplicating Reliability-Critical Components in High Performance Computing Systems., , , , , and . IPDPS Workshops, page 1567-1576. IEEE, (2011)Discovering Application-Level Insider Attacks Using Symbolic Execution., , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 63-75. Springer, (2009)Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach., , , and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)Fault Injection., , , and . Encyclopedia of Software Engineering, Taylor & Francis, (2010)SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework., , , and . IEEE Trans. Computers, 62 (11): 2292-2307 (2013)Reliability and Security Engine: A Processor-Level Framework for Application -Aware Detection and Recovery. University of Illinois Urbana-Champaign, USA, (2006)Detailed analysis of I/O traces for large scale applications., , , , , and . HiPC, page 419-427. IEEE Computer Society, (2009)Recent Advances and New Avenues in Hardware-Level Reliability Support., , , and . IEEE Micro, 25 (6): 18-29 (2005)Processor-Level Selective Replication., , and . DSN, page 544-553. IEEE Computer Society, (2007)