Concurrent systems are used in applications where multiple processors are needed to complete tasks within a reasonable amount of time, or where the data sets involved will not fit within the main memory of a single computer. Because of their reliance on multiple machines, such systems are proportionally more vulnerable to both hardware and software induced failures. Fault-tolerance schemes are used to recover some earlier consistent state of the system after such a failure.;One important technique used to achieve fault-tolerance is checkpointing and rollback-recovery. In this thesis, we present a method for efficiently and transparently incorporating the part of the process state contained in the file system into process checkpoints, and we...
Distributed shared memory (DSM) provides the illusion of shared memory processing to programs runnin...
Monitoring end-to-end available bandwidth is critical in helping applications and users efficiently ...
Domain and Type Enforcement (DTE) is a simple and well-known access control system, which has been u...
Concurrent systems are used in applications where multiple processors are needed to complete tasks w...
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering an...
This thesis is concerned with research into techniques for tolerating the defects which inevitably o...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
As commodity computers and networking technologies have become faster and more affordable, fairly ca...
The general aim of this thesis is to develop an accurate fault location scheme that can solve the pr...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
Currently, passwords are the default method used to authenticate users. As hardware continues to adv...
Journal ArticlePrototyping is an important activity in engineering. Prototype development is a good ...
The effects of a realistic memory system have not received much attention in recent decades. Often, ...
A step-by-step tutorial of the methods and tools used for the reliability analysis of fault-tolerant...
As disk performance continues to lag behind that of memory systems and processors, fully utilizing m...
Distributed shared memory (DSM) provides the illusion of shared memory processing to programs runnin...
Monitoring end-to-end available bandwidth is critical in helping applications and users efficiently ...
Domain and Type Enforcement (DTE) is a simple and well-known access control system, which has been u...
Concurrent systems are used in applications where multiple processors are needed to complete tasks w...
Thesis (M. Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering an...
This thesis is concerned with research into techniques for tolerating the defects which inevitably o...
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Compute...
As commodity computers and networking technologies have become faster and more affordable, fairly ca...
The general aim of this thesis is to develop an accurate fault location scheme that can solve the pr...
This thesis introduces a comprehensive approach for making a particular class of embedded processors...
Currently, passwords are the default method used to authenticate users. As hardware continues to adv...
Journal ArticlePrototyping is an important activity in engineering. Prototype development is a good ...
The effects of a realistic memory system have not received much attention in recent decades. Often, ...
A step-by-step tutorial of the methods and tools used for the reliability analysis of fault-tolerant...
As disk performance continues to lag behind that of memory systems and processors, fully utilizing m...
Distributed shared memory (DSM) provides the illusion of shared memory processing to programs runnin...
Monitoring end-to-end available bandwidth is critical in helping applications and users efficiently ...
Domain and Type Enforcement (DTE) is a simple and well-known access control system, which has been u...