Ravishankar K. Iyer

Affiliations:
  • University of Illinois at Urbana-Champaign, Center for Reliable & High Performance Computing (CRHC), IL, USA


According to our database1, Ravishankar K. Iyer authored at least 331 papers between 1977 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2001, "For outstanding contributions to the design, measurement and evaluation of reliable computing systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
RACR-MIL: Weakly Supervised Skin Cancer Grading using Rank-Aware Contextual Reasoning on Whole Slide Images.
CoRR, 2023

AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023

Taxonomy of Fingerprinting Techniques for Evaluation of Smart Grid Honeypot Realism.
Proceedings of the IEEE International Conference on Communications, 2023

Multi-Agent Meta-Reinforcement Learning: Sharper Convergence Rates with Task Similarity.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

A Transfer Learning-based Model for Individualized Clustered Seizure Prediction Using Intracranial EEG.
Proceedings of the 11th International IEEE/EMBS Conference on Neural Engineering, 2023

REMEDI: REinforcement learning-driven adaptive MEtabolism modeling of primary sclerosing cholangitis DIsease progression.
Proceedings of the Machine Learning for Health, 2023

Effects of Learning-Based Action-Space Attacks on Autonomous Driving Agents.
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023

Susceptibility of Autonomous Driving Agents to Learning-Based Action-Space Attacks.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023

stealthML: Data-driven Malware for Stealthy Data Exfiltration.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023

2022
Data-Driven Application-Oriented Reliability Model of a High-Performance Computing System.
IEEE Trans. Reliab., 2022

Deep learning identifies brain structures that predict cognition and explain heterogeneity in cognitive aging.
NeuroImage, 2022

Watch Out for the Safety-Threatening Actors: Proactively Mitigating Safety Hazards.
CoRR, 2022

Telogator: a method for reporting chromosome-specific telomere lengths from long reads.
Bioinform., 2022

A Mean-Field Game Approach to Cloud Resource Management with Function Approximation.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Evaluating Hardware Memory Disaggregation under Delay and Contention.
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2022

Reinforcement learning for resource management in multi-tenant serverless platforms.
Proceedings of the EuroMLSys '22: Proceedings of the 2nd European Workshop on Machine Learning and Systems, Rennes, France, April 5, 2022

Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

SIMPPO: a scalable and incremental online learning framework for serverless resource management.
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022

Individualized seizure cluster prediction using machine learning and ambulatory intracranial EEG.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

2021
Watch out for the risky actors: Assessing risk in dynamic environments for safe driving.
CoRR, 2021

SLO beyond the Hardware Isolation Limits.
CoRR, 2021

Reinforcement Learning based Disease Progression Model for Alzheimer's Disease.
Proceedings of the Advances in Neural Information Processing Systems 34: Annual Conference on Neural Information Processing Systems 2021, 2021

Is Function-as-a-Service a Good Fit for Latency-Critical Services?
Proceedings of the WoSC '21: Proceedings of the Seventh International Workshop on Serverless Computing (WoSC7) 2021, 2021

Delay sensitivity-driven congestion mitigation for HPC systems.
Proceedings of the ICS '21: 2021 International Conference on Supercomputing, 2021

Improved GPU Implementations of the Pair-HMM Forward Algorithm for DNA Sequence Alignment.
Proceedings of the 39th IEEE International Conference on Computer Design, 2021

BayesPerf: minimizing performance monitoring errors using Bayesian statistics.
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021

2020
Application-aware Congestion Mitigation forHigh-Performance Computing Systems.
CoRR, 2020

ML-driven Malware that Targets AV Safety.
CoRR, 2020

Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks.
Computer, 2020

Live forensics for HPC systems: a case study on distributed storage systems.
Proceedings of the International Conference for High Performance Computing, 2020

A Dynamic Human-in-the-loop Recommender System for Evidence-based Clinical Staging of COVID-19.
Proceedings of the 5th International Workshop on Health Recommender Systems co-located with the 14th ACM Conference on Recommender Systems 2020 (RecSys 2020), 2020

FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020

Measuring Congestion in High-Performance Datacenter Interconnects.
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020

AV-FUZZER: Finding Safety Violations in Autonomous Driving Systems.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Predicting Longitudinal Cognitive Scores Using Baseline Imaging and Clinical Variables.
Proceedings of the 17th IEEE International Symposium on Biomedical Imaging, 2020

Inductive-bias-driven Reinforcement Learning For Efficient Schedules in Heterogeneous Clusters.
Proceedings of the 37th International Conference on Machine Learning, 2020

Electrophysiological Correlates of Brain Health Help Diagnose Epilepsy and Lateralize Seizure Focus.
Proceedings of the 42nd Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2020

ML-Driven Malware that Targets AV Safety.
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020

Machine learning for load balancing in the Linux kernel.
Proceedings of the APSys '20: 11th ACM SIGOPS Asia-Pacific Workshop on Systems, 2020

2019
RAINCOAT: Randomization of Network Communication in Power Grid Cyber Infrastructure to Mislead Attackers.
IEEE Trans. Smart Grid, 2019

ASAP: Accelerated Short-Read Alignment on Programmable Hardware.
IEEE Trans. Computers, 2019

Inductive Bias-driven Reinforcement Learning For Efficient Schedules in Heterogeneous Clusters.
CoRR, 2019

Live Forensics for Distributed Storage Systems.
CoRR, 2019

Kayotee: A Fault Injection-based System to Assess the Safety and Reliability of Autonomous Vehicles to Faults and Errors.
CoRR, 2019

Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo.
CoRR, 2019

Correction to: Recommendations for performance optimizations when using GATK3.8 and GATK4.
BMC Bioinform., 2019

Recommendations for performance optimizations when using GATK3.8 and GATK4.
BMC Bioinform., 2019

Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

CAUDIT: Continuous Auditing of SSH Servers To Mitigate Brute-Force Attacks.
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019

A Computationally Efficient Model for Predicting Successful Memory Encoding Using Machine-Learning-based EEG Channel Selection.
Proceedings of the 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER), 2019

Availability attacks on computing systems through alteration of environmental control: smart malware approach.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019

TRACTION: an infrastructure for trusted alert sharing and collaborative mitigation.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

A Study of Network Congestion in Two Supercomputing High-Speed Interconnects.
Proceedings of the 2019 IEEE Symposium on High-Performance Interconnects, 2019

ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Towards a Bayesian Approach for Assessing Fault Tolerance of Deep Neural Networks.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

A Joint Model for Predicting Structural and Functional Brain Health in Elderly Individuals.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

AcMC <sup>2 </sup>: Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019

2018
Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids.
IEEE Trans. Smart Grid, 2018

Self-Healing Attack-Resilient PMU Network for Power System Operation.
IEEE Trans. Smart Grid, 2018

Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters.
IEEE Trans. Dependable Secur. Comput., 2018

Integrating Artificial Intelligence with Real-time Intracranial EEG Monitoring to Automate Interictal Identification of Seizure Onset Zones in Focal Epilepsy.
CoRR, 2018

A Contextual-bandit-based Approach for Informed Decision-making in Clinical Trials.
CoRR, 2018

Augmentation of Physician Assessments with Multi-Omics Enhances Predictability of Drug Response: A Case Study of Major Depressive Disorder.
IEEE Comput. Intell. Mag., 2018

Detection and visualization of complex structural variants from long reads.
BMC Bioinform., 2018

Impact of Malicious SCADA Commands on Power Grids' Dynamic Responses.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

AVFI: Fault Injection for Autonomous Vehicles.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018

Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Characterizing Supercomputer Traffic Networks Through Link-Level Analysis.
Proceedings of the IEEE International Conference on Cluster Computing, 2018

A ML-based Runtime System for Executing Dataflow Graphs on Heterogeneous Processors.
Proceedings of the ACM Symposium on Cloud Computing, 2018

Measuring the Mappability Spectrum of Reference Genome Assemblies.
Proceedings of the 2018 ACM International Conference on Bioinformatics, 2018

2017
Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud.
IEEE Trans. Reliab., 2017

Failure Diagnosis for Distributed Systems Using Targeted Fault Injection.
IEEE Trans. Parallel Distributed Syst., 2017

Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.
IEEE Trans. Inf. Forensics Secur., 2017

Seizure Forecasting and the Preictal State in Canine Epilepsy.
Int. J. Neural Syst., 2017

Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017

SVAuth - A Single-Sign-On Integration Solution with Runtime Verification.
Proceedings of the Runtime Verification - 17th International Conference, 2017

Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

EEG-GRAPH: A Factor-Graph-Based Model for Capturing Spatial, Temporal, and Observational Relationships in Electroencephalograms.
Proceedings of the Advances in Neural Information Processing Systems 30: Annual Conference on Neural Information Processing Systems 2017, 2017

Inter-ictal Seizure Onset Zone localization using unsupervised clustering and Bayesian Filtering.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

Trustworthy Services Built on Event-Based Probing for Layered Defense.
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017

On accelerating pair-HMM computations in programmable hardware.
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017

ASAP: Accelerated Short Read Alignment on Programmable Hardware (Abstract Only).
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017

Prediction of adenocarcinoma development using game theory.
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017

Holistic Measurement-Driven System Assessment.
Proceedings of the 2017 IEEE International Conference on Cluster Computing, 2017

Data-driven longitudinal modeling and prediction of symptom dynamics in major depressive disorder: Integrating factor graphs and learning methods.
Proceedings of the IEEE Conference on Computational Intelligence in Bioinformatics and Computational Biology, 2017

Unraveling complex local genomic rearrangements from long-read data.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2016
A Data-Driven Approach to Soil Moisture Collection and Prediction.
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016

A hardware-in-the-loop simulator for safety training in robotic surgery.
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016

Optimal False Data Injection Attack against Automatic Generation Control in Power Grids.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016

Efficient and Scalable Workflows for Genomic Analyses.
Proceedings of the ACM International Workshop on Data-Intensive Distributed Computing, 2016

Safety-critical cyber-physical attacks: analysis, detection, and mitigation.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

A framework for generation, replay, and analysis of real-world attack variants.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

Game Theory with Learning for Cyber Security Monitoring.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016

F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Attacking supercomputers through targeted alteration of environmental control: A data driven case study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

Unsupervised single-cell analysis in triple-negative breast cancer: A case study.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Towards longitudinal analysis of a population's electronic health records using factor graphs.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016

2015
VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing.
IEEE Trans. Dependable Secur. Comput., 2015

Performance Comparison and Tuning of Virtual Machines For Sequence Alignment Software.
Scalable Comput. Pract. Exp., 2015

Adverse Events in Robotic Surgery: A Retrospective Study of 14 Years of FDA Data.
CoRR, 2015

Systems-theoretic Safety Assessment of Robotic Telesurgical Systems.
CoRR, 2015

Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015

Systems-Theoretic Safety Assessment of Robotic Telesurgical Systems.
Proceedings of the Computer Safety, Reliability, and Security, 2015

A fault-tolerant hardware architecture for robust wearable heart rate monitoring.
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015

The future of fault tolerant computing.
Proceedings of the 21st IEEE International On-Line Testing Symposium, 2015

LogDiver: A Tool for Measuring Resilience of Extreme-Scale Systems and Applications.
Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale, 2015

Towards an unified security testbed and security analytics framework.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Preemptive intrusion detection: theoretical framework and real-world measurements.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

Dynamic VM Dependability Monitoring Using Hypervisor Probes.
Proceedings of the 11th European Dependable Computing Conference, 2015

Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015

ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids.
Proceedings of the Critical Information Infrastructures Security, 2015

Resilience of Medical Devices and Systems.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

Software-Defined Networking for Smart Grid Resilience: Opportunities and Challenges.
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015

2014
Building Reliable and Secure Virtual Machines Using Architectural Invariants.
IEEE Secur. Priv., 2014

An evaluation of zookeeper for high availability in system S.
Proceedings of the ACM/SPEC International Conference on Performance Engineering, 2014

Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

Characterization of operational failures from a business data processing SaaS platform.
Proceedings of the 36th International Conference on Software Engineering, 2014

Personalized password guessing: a new security threat.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Preemptive intrusion detection.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

AHEMS: Asynchronous Hardware-Enforced Memory Safety.
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014

A Performance Evaluation of Sequence Alignment Software in Virtualized Environments.
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014

Automated Classification of Computer-Based Medical Device Recalls: An Application of Natural Language Processing and Statistical Learning.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014

2013
SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework.
IEEE Trans. Computers, 2013

Analysis of Safety-Critical Computer Failures in Medical Devices.
IEEE Secur. Priv., 2013

Pluggable Watchdog: Transparent Failure Detection for MPI Programs.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

A Simulation Framework to Evaluate Virtual CPU Scheduling Algorithms.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol.
Proceedings of the Cyber Security and Information Intelligence, 2013

Semantic security analysis of SCADA networks to detect malicious control commands in power grids.
Proceedings of the SEGS'13, 2013

2012
Architectural impact of secure socket layer on Internet servers.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012

Architectural impact of secure socket layer on Internet servers: A retrospect.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012

Characterization of the error resiliency of power grid substation devices.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Toward a high availability cloud: Techniques and challenges.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

Towards resiliency in embedded medical monitoring devices.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

2011
Automated Derivation of Application-Specific Error Detectors Using Dynamic Analysis.
IEEE Trans. Dependable Secur. Comput., 2011

Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach.
IEEE Trans. Dependable Secur. Comput., 2011

Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Hauberk: Lightweight Silent Data Corruption Error Detector for GPGPU.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

A Codesigned Fault Tolerance System for Heterogeneous Many-Core Processors.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

HTAF: Hybrid Testing Automation Framework to Leverage Local and Global Computing Resources.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

An embedded reconfigurable architecture for patient-specific multi-paramater medical monitoring.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011

Managing business health in the presence of malicious attacks.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

Analysis of security data from a large computing organization.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

CloudVal: A framework for validation of virtualization environment in cloud infrastructure.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Improving Log-based Field Failure Data Analysis of multi-node computing systems.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Modeling stream processing applications for dependability evaluation.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011

Fault injection-based assessment of partial fault tolerance in stream processing applications.
Proceedings of the Fifth ACM International Conference on Distributed Event-Based Systems, 2011

2010
Fault Injection.
Proceedings of the Encyclopedia of Software Engineering, 2010

Analysis of Credential Stealing Attacks in an Open Networked Environment.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Checkpointing virtual machines against transient errors.
Proceedings of the 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 2010

Measurement-based analysis of fault and error sensitivities of dynamic memory.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Fourth workshop on dependable and secure nanocomputing.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

A Soldier Health Monitoring System for Military Applications.
Proceedings of the International Conference on Body Sensor Networks, 2010

2009
Discovering Application-Level Insider Attacks Using Symbolic Execution.
Proceedings of the Emerging Challenges for Security, 2009

Quantitative Analysis of Long-Latency Failures in System Software.
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009

Pervasive embedded real time monitoring of EEG & SpO2.
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009

Pervasive embedded systems for detection of traumatic brain injury.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Effectiveness of machine checks for error diagnostics.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

An end-to-end approach for the automatic derivation of application-aware error detectors.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Third workshop on dependable and secure nanocomputing.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008

Formalizing System Behavior for Evaluating a System Hang Detector.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

Error Behavior Comparison of Multiple Computing Systems: A Case Study Using Linux on Pentium, Solaris on SPARC, and AIX on POWER.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Reliable system design: models, metrics and design techniques.
Proceedings of the 2008 International Conference on Computer-Aided Design, 2008

Second workshop on dependable and secure nanocomputing.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Reliability MicroKernel: Providing Application-Aware Reliability in the OS.
IEEE Trans. Reliab., 2007

Inner-Circle Consistency for Wireless Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2007

Editorial: Dependability and Security.
IEEE Trans. Dependable Secur. Comput., 2007

Toward Application-Aware Security and Reliability.
IEEE Secur. Priv., 2007

Automated Derivation of Application-aware Error Detectors using Static Analysis.
Proceedings of the 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 2007

TRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing Base.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

Processor-Level Selective Replication.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

Workshop on Dependable and Secure Nanocomputing.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Active Replication of Multithreaded Applications.
IEEE Trans. Parallel Distributed Syst., 2006

Editorial: Dependability and Security--Looking Foward to 2006.
IEEE Trans. Dependable Secur. Comput., 2006

Security Vulnerabilities: From Analysis to Detection and Masking Techniques.
Proc. IEEE, 2006

An OS-level Framework for Providing Application-Aware Reliability.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

Application-Aware Reliability and Security: The Trusted ILLIAC Approach.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware.
Proceedings of the Sixth European Dependable Computing Conference, 2006

An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Security vulnerabilities: from measurements to design.
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006

2005
Editorial: State of the Journal Address.
IEEE Trans. Dependable Secur. Comput., 2005

An Experimental Study of Soft Errors in Microprocessors.
IEEE Micro, 2005

Recent Advances and New Avenues in Hardware-Level Reliability Support.
IEEE Micro, 2005

Application Fault Tolerance with Armor Middleware.
IEEE Internet Comput., 2005

Illinois wireless wind tunnel: a testbed for experimental evaluation of wireless networks.
Proceedings of the 2005 ACM SIGCOMM Workshop on Experimental Approaches to Wireless Network Design and Analysis, 2005

Application-Based Metrics for Strategic Placement of Detectors.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Assessing the Crash-Failure Assumption of Group Communication Protocols.
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005

A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

An Architectural Framework for Detecting Process Hangs/Crashes.
Proceedings of the Dependable Computing, 2005

Modeling Coordinated Checkpointing for Large-Scale Supercomputers.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Neutralization of Errors and Attacks in Wireless Ad Hoc Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
The Effects of an ARMOR-Based SIFT Environment on the Performance and Dependability of User Applications.
IEEE Trans. Software Eng., 2004

Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation, 2004

Hardware Support for High Performance, Intrusion- and Fault-Tolerant Systems.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Proceedings of the Security and Protection in Information Processing Systems, 2004

The evolution of dependable computing at the University of Illinois.
Proceedings of the Building the Information Society, 2004

Checkpointing of Control Structures in Main Memory Database Systems.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

An Architectural Framework for Providing Reliability and Security Support.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Hierarchical application aware error detection and recovery.
Proceedings of the 41th Design Automation Conference, 2004

Design and networking considerations for FACE.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
A system model for dynamically reconfigurable software.
IBM Syst. J., 2003

Security Vulnerabilities - From Data Analysis to Protection Mechanisms.
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003

Transparent Runtime Randomization for Security.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Group Communication Protocols under Errors.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Performance implications of chipset caches in web servers.
Proceedings of the 2003 IEEE International Symposium on Performance Analysis of Systems and Software, 2003

Error-Injection-Based Failure Characterization of the IEEE 1394 Bus.
Proceedings of the 9th IEEE International On-Line Testing Symposium (IOLTS 2003), 2003

Design and Performance of Compressed Interconnects for High Performance Servers.
Proceedings of the 21st International Conference on Computer Design (ICCD 2003), 2003

A Foundation for Adaptive Fault Tolerance in Software.
Proceedings of the 10th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2003), 2003

Characterization of Linux Kernel Behavior under Errors.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

A Preemptive Deterministic Scheduling Algorithm for Multithreaded Replicas.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

2002
Loose Synchronization of Multithreaded Replicas.
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002

Measurement-Based Analysis of System Dependability Using Fault Injection and Field Failure Data.
Proceedings of the Performance Evaluation of Complex Systems: Techniques and Tools, 2002

An Experimental Evaluation of the REE SIFT Environment for Spaceborne Applications.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

NFTAPE: Networked Fault Tolerance and Performance Evaluator.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Joint Panel - IPDS and Workshop on Dependability Benchmarking.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed Networks.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Geist: A Web Traffic Generation Tool.
Proceedings of the Computer Performance Evaluation, 2002

A Framework for Classifying Peer-to-Peer Technologies.
Proceedings of the 2nd IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2002), 2002

2001
Geist: a generator for e-commerce & internet server traffic.
Proceedings of the 2001 IEEE International Symposium on Performance Analysis of Systems and Software, 2001

Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Improving Cache Performance of Network Intensive Workloads.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

An Experimental Study of Security Vulnerabilities Caused by Errors.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Diagnosing Rediscovered Software Problems Using Symptoms.
IEEE Trans. Software Eng., 2000

Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment.
IEEE Trans. Knowl. Data Eng., 2000

Micro-Checkpointing: Checkpointing for Multithreaded Applications.
Proceedings of the 6th IEEE International On-Line Testing Workshop (IOLTW 2000), 2000

Measurement-based Analysis of Networked System Availability.
Proceedings of the Performance Evaluation: Origins and Directions, 2000

1999
Hierarchical Simulation Approach to Accurate Fault Modeling for System Dependability Evaluation.
IEEE Trans. Software Eng., 1999

Chameleon: A Software Infrastructure for Adaptive Fault Tolerance.
IEEE Trans. Parallel Distributed Syst., 1999

Stress-Based and Path-Based Fault Injection.
IEEE Trans. Computers, 1999

Reliability of Internet Hosts: A Case Study from the End User's Perspective.
Comput. Networks, 1999

An Approach to Evaluating the Effects of Realistic Faults in Digital Circuits.
Proceedings of the 12th International Conference on VLSI Design (VLSI Design 1999), 1999

A Software Multilevel Fault Injection Mechanism: Case Study Evaluating the Virtual Interface Architecture.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Failure Data Analysis of a LAN of Windows NT based Computers.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Networked Windows NT System Field Failure Data Analysis.
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999

COTS Hardware and Software in High-Availability Systems (Panel).
Proceedings of the Digest of Papers: FTCS-29, 1999

1998
Dependability Analysis of a High-Speed Network Using Software-Implemented Fault Injection and Simulated Fault Injection.
IEEE Trans. Computers, 1998

A Speculation-based Approach for Performance and Dependability Analysis: A Case Study.
Proceedings of the 30th conference on Winter simulation, 1998

An Object-Oriented Environment for Fast Simulation Using Compiler Techniques.
Proceedings of the 30th conference on Winter simulation, 1998

Dependability Analysis of a Cache-Based RAID System via Fast Distributed Simulation.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

The Chameleon Infrastructure for Adaptive, Software Implemented Fault Tolerance.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Measurement-based modeling and analysis methodology for characterizing parallel I/O performance.
Proceedings of the 5th International Conference On High Performance Computing, 1998

A Flexible Software Architecture for High Availability Computing.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture.
Proceedings of the Digest of Papers: FTCS-28, 1998

1997
DEPEND: A Simulation-Based Environment for System Level Dependability Analysis.
IEEE Trans. Computers, 1997

Fault Injection Techniques and Tools.
Computer, 1997

FAMAS: FAult Modeling via Adaptive Simulation.
Proceedings of the 10th International Conference on VLSI Design (VLSI Design 1997), 1997

Chameleon: Adaptive Fault Tolerance Using Reliable, Mobile Agents.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

Dependability Analysis of a Commercial High-Speed Network.
Proceedings of the Digest of Papers: FTCS-27, 1997

An Object-Oriented Testbed for the Evaluation of Checkpointing and Recovery Systems.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Analyze-NOW-an environment for collection and analysis of failures in a network of workstations.
IEEE Trans. Reliab., 1996

A Gate-Level Simulation Environment for Alpha-Particle-Induced Transient Faults.
IEEE Trans. Computers, 1996

Measurement and simulation based performance analysis of parallel I/O in a high-performance cluster system.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

An Approach towards Benchmarking of Fault-Tolerant Commercial Systems.
Proceedings of the Digest of Papers: FTCS-26, 1996

Efficient Service of Rediscovered Software Problems.
Proceedings of the Digest of Papers: FTCS-26, 1996

Availability of Commercial Parallel Systems.
Proceedings of the Digest of Papers: FTCS-26, 1996

Heterogeneous I/O Contention in a Single-Bus Multiprocessor.
Proceedings of the Input/Output in Parallel and Distributed Computer Systems., 1996

1995
Software Dependability in the Tandem GUARDIAN System.
IEEE Trans. Software Eng., 1995

A Measurement-Based Model to Predict the Performance Impact of System Modifications: A Case Study.
IEEE Trans. Parallel Distributed Syst., 1995

Measuring Fault Tolerance with the FTAPE Fault Injection Tool.
Proceedings of the Quantitative Evaluation of Computing and Communication Systems, 1995

Analysis of failures in the Tandem NonStop-UX Operating System.
Proceedings of the Sixth International Symposium on Software Reliability Engineering, 1995

Dependability of Commercial Systems.
Proceedings of the Digest of Papers: FTCS-25, 1995

1994
Measurement of I/O bus contention and correlation among heterogeneous device types in a single-bus multiprocessor system.
SIGARCH Comput. Archit. News, 1994

Measurement-Based Characterization of Global Memory and Network Contention, Operating System and Parallelization Overheads: A Case Study on Shared-Memory Multiprocessor.
Proceedings of the 21st Annual International Symposium on Computer Architecture. Chicago, 1994

Impact of Loop Granularity and Self-Preemtion on the Performance of Loop Parallel Applications on a Multiprogrammed Shared-Memory Multiprocessor.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

Device-Level Transient Fault Modeling.
Proceedings of the Digest of Papers: FTCS/24, 1994

Identifying Software Problems Using Symptoms.
Proceedings of the Digest of Papers: FTCS/24, 1994

1993
FINE: A Fault Injection and Monitoring Environment for Tracing the UNIX System Behavior under Faults.
IEEE Trans. Software Eng., 1993

Prediction-Based Dynamic Load-Sharing Heuristics.
IEEE Trans. Parallel Distributed Syst., 1993

Dependability Measurement and Modeling of a Multicomputer System.
IEEE Trans. Computers, 1993

Experimental Evaluation of Performance and Scalability of a Multiprogrammed Shared-Memory Multiprocessor.
Proceedings of the Fifth IEEE Symposium on Parallel and Distributed Processing, 1993

MEASURE+ - A Measurement-Based Dependability Analysis Package.
Proceedings of the 1993 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1993

Use of Hybrid and Hierarchical Simulation to Reduce Computation Costs.
Proceedings of the MASCOTS '93, 1993

Panel: Field Failures And Reliability In Operation.
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993

Fault behavior dictionary for simulation of device-level transients.
Proceedings of the 1993 IEEE/ACM International Conference on Computer-Aided Design, 1993

Faults, Symptoms, and Software Fault Tolerance in the Tandem GUARDIAN90 Operating System.
Proceedings of the Digest of Papers: FTCS-23, 1993

Simulation of Software Behaviour Under Hardware Faults.
Proceedings of the Digest of Papers: FTCS-23, 1993

Wear-Out Simulation Environment for VLSI Designs.
Proceedings of the Digest of Papers: FTCS-23, 1993

A Fast and Accurate Gate-Level Transient Fault Simulation Environment.
Proceedings of the Digest of Papers: FTCS-23, 1993

1992
Guest Editors' Introduction.
IEEE Trans. Parallel Distributed Syst., 1992

Analysis and Modeling of Correlated Failures in Multicomputer Systems.
IEEE Trans. Computers, 1992

FOCUS: An Experimental Environment for Fault Sensitivity Analysis.
IEEE Trans. Computers, 1992

Analysis of the VAX/VMS error logs in multicomputer environments-a case study of software dependability.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992

Analysis of software halts in the tandem GUARDIAN operating system.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992

Analysis of large system black-box test data.
Proceedings of the Third International Symposium on Software Reliability Engineering, 1992

A User-Oriented Synthetic Workload Generator.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1991
Modeling and Measuring Multiprogramming and System Overheads on a Shared-Memory Multiprocessor: Case Study.
J. Parallel Distributed Comput., 1991

Performance Prediction and Tuning on a Multiprocessor.
Proceedings of the 18th Annual International Symposium on Computer Architecture. Toronto, 1991

A Simulation-Based Study of a Triple Modular Redundant System Using DEFEND.
Proceedings of the Fault-Tolerant Computing Systems, Tests, Diagnosis, 1991

Error/Failure Analysis Using Event Logs from Fault Tolerant Systems.
Proceedings of the 1991 International Symposium on Fault-Tolerant Computing, 1991

1990
Guest Editor's Introduction Experimental Computer Science.
IEEE Trans. Software Eng., 1990

Automatic Recognition of Intermittent Failures: An Experimental Study of Field Data.
IEEE Trans. Computers, 1990

Performance degradation due to multiprogramming and system overheads in real workloads: case study on a shared memory multiprocessor.
Proceedings of the 4th international conference on Supercomputing, 1990

Failure analysis and modeling of a VAXcluster system.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

1989
Predictability of Process Resource Usage: A Measurement-Based Study on UNIX.
IEEE Trans. Software Eng., 1989

An Experimental Study of Memory Fault Latency.
IEEE Trans. Computers, 1989

Measurement and Modeling of Computer System Failures.
Proceedings of the Information Processing 89, Proceedings of the IFIP 11th World Computer Congress, San Francisco, USA, August 28, 1989

Multiprogramming Performance Degradation: Case Study on a Shared Memory Multiprocesor.
Proceedings of the International Conference on Parallel Processing, 1989

FOCUS: an experimental environment for validation of fault-tolerant systems - case study of a jet-engine controller.
Proceedings of the Computer Design: VLSI in Computers and Processors, 1989

1988
Accurate Low-Cost Methods for Performance Evaluation of Cache Memory Systems.
IEEE Trans. Computers, 1988

Performability Modeling Based on Real Data: A Case Study.
IEEE Trans. Computers, 1988

Measurement-Based Analysis of Multiple Latent Errors and Near-coincident Fault Discovery in a Shared Memory Multiprocessor.
Proceedings of the International Conference on Parallel Processing, 1988

Performance Analysis of a Shared Memory Multiprocessor: Case Study.
Proceedings of the International Conference on Parallel Processing, 1988

Transient fault behavior in a microprocessor - A case study.
Proceedings of the Computer Design: VLSI in Computers and Processors, 1988

Diagnostic reasoning in digital systems.
Proceedings of the Eighteenth International Symposium on Fault-Tolerant Computing, 1988

1987
Measurement-Based Analysis of Error Latency.
IEEE Trans. Computers, 1987

A Measurement-Based Performability Model for a Multiprocessor System.
Proceedings of the Computer Performance and Reliability, 1987

A Measurement-Based Study of Concurrency in a Multiprocessor.
Proceedings of the International Conference on Parallel Processing, 1987

1986
Measurement and Modeling of Computer Reliability as Affected by System Activity.
ACM Trans. Comput. Syst., 1986

A Measurement-Based Model for Workload Dependence of CPU Errors.
IEEE Trans. Computers, 1986

Error Propagation in a Digital Avionic Processor: A Simulation-Based Study.
Proceedings of the 7th IEEE Real-Time Systems Symposium (RTSS '86), 1986

Recognition of Error Symptoms in Large Systems.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986

1985
Hardware-Related Software Errors: Measurement and Analysis.
IEEE Trans. Software Eng., 1985

Effect of System Workload on Operating System Reliability: A Study on IBM 3081.
IEEE Trans. Software Eng., 1985

The Effect of System Workload on Error Latency: An Experimental Study.
Proceedings of the 1985 ACM SIGMETRICS conference on Measurement and modeling of computer systems, 1985

1984
A Study of Software Failures and Recovery in the MVS Operating System.
IEEE Trans. Computers, 1984

Reliability Evaluation of Fault-Tolerant Systems - Effect of Variability in Failure Rates.
IEEE Trans. Computers, 1984

1982
A Statistical Failure/Load Relationship: Results of a Multicomputer Study.
IEEE Trans. Computers, 1982

1977
Some applications of probability in the design of engineering systems
PhD thesis, 1977


  Loading...