Nithin Nakka

According to our database1, Nithin Nakka authored at least 14 papers between 2004 and 2013.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework.
IEEE Trans. Computers, 2013

2011
Achieving Target MTTF by Duplicating Reliability-Critical Components in High Performance Computing Systems.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

Predicting Node Failure in High Performance Computing Systems from Failure and Usage Logs.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

2010
Fault Injection.
Proceedings of the Encyclopedia of Software Engineering, 2010

2009
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Proceedings of the Emerging Challenges for Security, 2009

Failure Data-Driven Selective Node-Level Duplication to Improve MTTF in High Performance Computing Systems.
Proceedings of the High Performance Computing Systems and Applications, 2009

Detailed analysis of I/O traces for large scale applications.
Proceedings of the 16th International Conference on High Performance Computing, 2009

2008
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

2007
Processor-Level Selective Replication.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Reliability and Security Engine: A Processor-Level Framework for Application -Aware Detection and Recovery
PhD thesis, 2006

2005
Recent Advances and New Avenues in Hardware-Level Reliability Support.
IEEE Micro, 2005

An Architectural Framework for Detecting Process Hangs/Crashes.
Proceedings of the Dependable Computing, 2005

Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
An Architectural Framework for Providing Reliability and Security Support.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004


  Loading...