Saurabh Bagchi

According to our database1, Saurabh Bagchi
  • authored at least 161 papers between 1997 and 2018.
  • has a "Dijkstra number"2 of three.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
TRIFECTA: Security, Energy Efficiency, and Communication Capacity Comparison for Wireless IoT Devices.
IEEE Internet Computing, 2018

MAVIS: Managing Datacenters using Smartphones.
CoRR, 2018

Reactive redundancy for data destruction protection (R2D2).
Computers & Security, 2018

VideoChef: Efficient Approximation for Streaming Video Processing Pipelines.
Proceedings of the 2018 USENIX Annual Technical Conference, 2018

Minerva: A reinforcement learning-based technique for optimal scheduling and bottleneck detection in distributed factory operations.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

2017
TRIFECTA: Security, Energy-Efficiency, and Communication Capacity Comparison for Wireless IoT Devices.
CoRR, 2017

Dependability in Edge Computing.
CoRR, 2017

On Reliability of Android Wearable Health Devices.
CoRR, 2017

Protecting Bare-Metal Embedded Systems with Privilege Overlays.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Integrity of Data in a Mobile Crowdsensing Campaign: A Case Study.
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017

TopHat : Topology-Based Host-Level Attribution for Multi-stage Attacks in Enterprise Systems Using Software Defined Networks.
Proceedings of the Security and Privacy in Communication Networks, 2017

Snowpack: efficient parameter choice for GPU kernels via static analysis and statistical prediction.
Proceedings of the 8th Workshop on Latest Advances in Scalable Algorithms for Large-Scale Systems, 2017

Sense-aid: a framework for enabling network as a service for participatory sensing.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

Rafiki: a middleware for parameter tuning of NoSQL datastores for dynamic metagenomics workloads.
Proceedings of the 18th ACM/IFIP/USENIX Middleware Conference, Las Vegas, NV, USA, December 11, 2017

Understanding the Spatial Characteristics of DRAM Errors in HPC Clusters.
Proceedings of the ACM Workshop on Fault-Tolerance for HPC at Extreme Scale, 2017

RL-BLH: Learning-Based Battery Control for Cost Savings and Privacy Preservation for Smart Meters.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Profiting from attacks on real-time price communications in smart grids.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Position statements from panelists: Smart cities-delusions of grandeur.
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Position statements from panelists: Ubiquitous sensing and privacy: Can the twains meet?
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

Position statements from panelists: Big data in IoT - Academic hype or industrial reality?
Proceedings of the 9th International Conference on Communication Systems and Networks, 2017

TATHYA: A Multi-Classifier System for Detecting Check-Worthy Statements in Political Debates.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Phase-aware optimization in approximate computing.
Proceedings of the 2017 International Symposium on Code Generation and Optimization, 2017

Scalable Genomic Assembly through Parallel de Bruijn Graph Construction for Multiple K-mers.
Proceedings of the 8th ACM International Conference on Bioinformatics, 2017

2016
Toward Optimal Distributed Monitoring of Multi-Channel Wireless Networks.
IEEE Trans. Mob. Comput., 2016

The MG-RAST metagenomics database and portal in 2015.
Nucleic Acids Research, 2016

Sirius: Neural Network Based Probabilistic Assertions for Detecting Silent Data Corruption in Parallel Programs.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

TANGO: Toward a More Reliable Mobile Streaming through Cooperation between Cellular Network and Mobile Devices.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

Chameleon: defending secret information from eavesdropping over physical environment.
Proceedings of the International Conference on Networking Systems and Security, 2016

Video through a crystal ball: effect of bandwidth prediction quality on adaptive streaming in mobile environments.
Proceedings of the 8th International Workshop on Mobile Video, 2016

A Study of Failures in Community Clusters: The Case of Conte.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

SARVAVID: A Domain Specific Language for Developing Scalable Computational Genomics Applications.
Proceedings of the 2016 International Conference on Supercomputing, 2016

Optimal and Game-Theoretic Deployment of Security Investments in Interdependent Assets.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

Partial-parallel-repair (PPR): a distributed technique for repairing erasure coded storage.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

Defending against strategic adversaries in dynamic pricing markets for smart grids.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

Fast training on large genomics data using distributed Support Vector Machines.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

2015
Diagnosis of Performance Faults in LargeScale MPI Applications via Probabilistic Progress-Dependence Inference.
IEEE Trans. Parallel Distrib. Syst., 2015

Debugging high-performance computing applications at massive scales.
Commun. ACM, 2015

Denial of Service Elusion (DoSE): Keeping Clients Connected for Less.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems, 2015

Software-only system-level record and replay in wireless sensor networks.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

TARDIS: software-only system-level record and replay in wireless sensor networks.
Proceedings of the 14th International Conference on Information Processing in Sensor Networks, 2015

Optimizing Defensive Investments in Energy-Based Cyber-Physical Systems.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015

ICE: An Integrated Configuration Engine for Interference Mitigation in Cloud Services.
Proceedings of the 2015 IEEE International Conference on Autonomic Computing, 2015

Do specialized distributed frameworks for bioinformatics applications obtain better performance over generic ones?
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

An ensemble SVM model for the accurate prediction of non-canonical MicroRNA targets.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Dealing with the Unknown: Resilience to Prediction Errors.
Proceedings of the 2015 International Conference on Parallel Architecture and Compilation, 2015

2014
Addressing failures in exascale computing.
IJHPCA, 2014

Reliable and Efficient Distributed Checkpointing System for Grid Environments.
J. Grid Comput., 2014

A risk assessment tool for advanced metering infrastructures.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Orion: Scaling Genomic Sequence Matching with Fine-Grained Parallelization.
Proceedings of the International Conference for High Performance Computing, 2014

Accurate application progress analysis for large-scale parallel debugging.
Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014

Mitigating interference in cloud services by middleware reconfiguration.
Proceedings of the 15th International Middleware Conference, 2014

Is Your Web Server Suffering from Undue Stress due to Duplicate Requests?
Proceedings of the 11th International Conference on Autonomic Computing, 2014

pSigene: Webcrawling to Generalize SQL Injection Signatures.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
McrEngine: A scalable checkpointing system using data-aware aggregation and compression.
Scientific Programming, 2013

DISA: Detection and isolation of sneaky attackers in locally monitored multi-hop wireless networks.
Security and Communication Networks, 2013

Distributed mobility management for efficient video delivery over all-IP mobile networks: Competing approaches.
IEEE Network, 2013

An optimization framework for monitoring multi-channel multi-radio wireless mesh networks.
Ad Hoc Networks, 2013

A delay-bounded event-monitoring and adversary-identification protocol in resource-constraint sensor networks.
Ad Hoc Networks, 2013

Automatic Problem Localization via Multi-dimensional Metric Profiling.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

Toward optimal sniffer-channel assignment for reliable monitoring in multi-channel wireless networks.
Proceedings of the 10th Annual IEEE Communications Society Conference on Sensor, 2013

WuKong: effective diagnosis of bugs at large system scales.
Proceedings of the ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2013

Characterizing configuration problems in Java EE application servers: An empirical study with GlassFish and JBoss.
Proceedings of the IEEE 24th International Symposium on Software Reliability Engineering, 2013

WuKong: automatically detecting and localizing bugs that manifest at large system scales.
Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing, 2013

Using big data for more dependability: a cellular network tale.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

Lilliput meets brobdingnagian: Data center systems management through mobile devices.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Low-complexity secure protocols to defend cyber-physical systems against network isolation attacks.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Secure and resilient proximity-based access control.
Proceedings of the 2013 International Workshop on Data Management & Analytics for Healthcare, 2013

2012
Mitigating the Effects of Software Component Shifts for Incremental Reprogramming of Wireless Sensor Networks.
IEEE Trans. Parallel Distrib. Syst., 2012

McrEngine: a scalable checkpointing system using data-aware aggregation and compression.
Proceedings of the SC Conference on High Performance Computing Networking, 2012

Multi-armed Bandit Congestion Control in Multi-hop Infrastructure Wireless Mesh Networks.
Proceedings of the 20th IEEE International Symposium on Modeling, 2012

Distributed online channel assignment toward optimal monitoring in multi-channel wireless networks.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

To cloud or not to cloud: A study of trade-offs between in-house and outsourced virtual private network.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

ABHRANTA: Locating Bugs that Manifest at Large System Scales.
Proceedings of the Eighth Workshop on Hot Topics in System Dependability, HotDep 2012, 2012

PRIVATUS: Wallet-Friendly Privacy Protection for Smart Meters.
Proceedings of the Computer Security - ESORICS 2012, 2012

A study of soft error consequences in hard disk drives.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Dependability as a cloud service - a modular approach.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012

An empirical study of the robustness of Inter-component Communication in Android.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Automatic fault characterization via abnormality-enhanced classification.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

Probabilistic diagnosis of performance faults in large-scale parallel applications.
Proceedings of the International Conference on Parallel Architectures and Compilation Techniques, 2012

2011
Efficient incremental code update for sensor networks.
TOSN, 2011

Stealthy Attacks in Wireless Ad Hoc Networks: Detection and Countermeasure.
IEEE Trans. Mob. Comput., 2011

The NEEShub Cyberinfrastructure for Earthquake Engineering.
Computing in Science and Engineering, 2011

Secure neighbor discovery through overhearing in static multihop wireless networks.
Computer Networks, 2011

Dangers and Joys of Stock Trading on the Web: Failure Characterization of a Three-Tier Web Service.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

Aveksha: a hardware-software approach for non-intrusive tracing and profiling of wireless embedded systems.
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011

Secure Configuration of Intrusion Detection Sensors for Changing Enterprise Systems.
Proceedings of the Security and Privacy in Communication Networks, 2011

v-CAPS: A Confidentiality and Anonymity Preserving Routing Protocol for Content-Based Publish-Subscribe Networks.
Proceedings of the Security and Privacy in Communication Networks, 2011

Large scale debugging of parallel tasks with AutomaDeD.
Proceedings of the Conference on High Performance Computing Networking, 2011

Dependence-based multi-level tracing and replay for wireless sensor networks debugging.
Proceedings of the ACM SIGPLAN/SIGBED 2011 conference on Languages, 2011

Vrisha: using scaling properties of parallel programs for bug detection and localization.
Proceedings of the 20th ACM International Symposium on High Performance Distributed Computing, 2011

2010
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks.
Ad Hoc Networks, 2010

Fixed Cost Maintenance for Information Dissemination in Wireless Sensor Networks.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Characterizing Failures in Mobile OSes: A Case Study with Android and Symbian.
Proceedings of the IEEE 21st International Symposium on Software Reliability Engineering, 2010

AutomaDeD: Automata-based debugging for dissimilar parallel tasks.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Intrusion detection in voice over IP environments.
Int. J. Inf. Sec., 2009

Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping.
Ad Hoc Networks, 2009

A tale of two synchronizing clocks.
Proceedings of the 7th International Conference on Embedded Networked Sensor Systems, 2009

FALCON: a system for reliable checkpoint recovery in shared grid environments.
Proceedings of the ACM/IEEE Conference on High Performance Computing, 2009

Optimal monitoring in multi-channel multi-radio wireless mesh networks.
Proceedings of the 10th ACM Interational Symposium on Mobile Ad Hoc Networking and Computing, 2009

How to Keep Your Head above Water While Detecting Errors.
Proceedings of the Middleware 2009, ACM/IFIP/USENIX, 10th International Middleware Conference, Urbana, IL, USA, November 30, 2009

Stateful error detection in high throughput applications.
Proceedings of the Middleware 2008, 2009

Multigrade Security Monitoring for Ad-Hoc Wireless Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

TCP/IP Timing Channels: Theory to Implementation.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

Spam detection in voice-over-IP calls through semi-supervised clustering.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Energy-efficient on-demand reprogramming of large-scale sensor networks.
TOSN, 2008

Modeling and Automated Containment of Worms.
IEEE Trans. Dependable Sec. Comput., 2008

MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks.
Ad Hoc Networks, 2008

Single versus multi-hop wireless reprogramming in sensor networks.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

Optimizing AES for embedded devices and wireless sensor networks.
Proceedings of the 4th International Conference on Testbeds & Research Infrastructures for the DEvelopment of NeTworks & COMmunities (TRIDENTCOM 2008), 2008

SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks.
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008

MISPAR: mitigating stealthy packet dropping in locally-monitored multi-hop wireless ad hoc networks.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling.
Proceedings of the Recent Advances in Intrusion Detection, 11th International Symposium, 2008

2007
Automated Rule-Based Diagnosis through a Distributed Monitor System.
IEEE Trans. Dependable Sec. Comput., 2007

Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking.
TAAS, 2007

Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation.
J. Grid Comput., 2007

Automated adaptive intrusion containment in systems of interacting services.
Computer Networks, 2007

LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks.
Computer Networks, 2007

Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks.
Ad Hoc Networks, 2007

Performance Comparison of SPIN based Push-Pull Protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Data-Centric Routing in Sensor Networks: Single-hop Broadcast or Multi-hop Unicast?
Proceedings of the 65th IEEE Vehicular Technology Conference, 2007

Stateful Detection in High Throughput Distributed Systems.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Distributed Diagnosis of Failures in a Three Tier E-Commerce System.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems.
Proceedings of the 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 2007

Capacity Bounds on Timing Channels with Bounded Service Times.
Proceedings of the IEEE International Symposium on Information Theory, 2007

Stream: Low Overhead Wireless Reprogramming for Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Failure-aware checkpointing in fine-grained cycle sharing systems.
Proceedings of the 16th International Symposium on High-Performance Distributed Computing (HPDC-16 2007), 2007

SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Automated Online Monitoring of Distributed Applications through External Monitors.
IEEE Trans. Dependable Sec. Comput., 2006

Detection and Repair of Software Errors in Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

MOBIWORP: Mitigation of the Wormhole Attack in Mobile Multihop Wireless Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection.
Proceedings of the 24th International Conference on Computer Design (ICCD 2006), 2006

Resource Availability Prediction in Fine-Grained Cycle Sharing Systems.
Proceedings of the 15th IEEE International Symposium on High Performance Distributed Computing, 2006

Fast Abstracts.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

DICAS: Detection, Diagnosis and Isolation of Control Attacks in Sensor Networks.
Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks, 2005

Location Estimation in Ad Hoc Networks with Directional Antennas.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

Modeling and Automated Containment of Worms.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
Self Checking Network Protocols: A Monitor Based Approach.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc Network.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Open Source Software - A Recipe for Vulnerable Software, or The Only Way to Keep the Bugs and the Bad Guys Out?
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Exactly-once Delivery in a Content-based Publish-Subscribe System.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

2001
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001

Dependency Analysis in Distributed Systems using Fault Injection: Application to Problem Determination in an e-commerce Environment.
Proceedings of the Operations & Management, 2001

A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment.
IEEE Trans. Knowl. Data Eng., 2000

1999
Chameleon: A Software Infrastructure for Adaptive Fault Tolerance.
IEEE Trans. Parallel Distrib. Syst., 1999

1998
The Chameleon Infrastructure for Adaptive, Software Implemented Fault Tolerance.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

A Flexible Software Architecture for High Availability Computing.
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998

1997
Chameleon: Adaptive Fault Tolerance Using Reliable, Mobile Agents.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997


  Loading...