Proceedings Pacific Rim International Symposium on Dependable Computing PRDC 2002
|
|
- Dinah Bryan
- 5 years ago
- Views:
Transcription
1 Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC 2002 i
2 [blank page] ii
3 Proceedings 2002 Pacific Rim International Symposium on Dependable Computing PRDC December 2002 Tsukuba, Japan Sponsored by IEEE Computer Society Technical Committee on Fault-Tolerant Computing IEICE Technical Group on Dependable Computing In cooperation with IFIP WG10.4 on Dependable Computing and Fault Tolerance Jet Propulsion Laboratory Los Alamitos, California Washington Brussels Tokyo iii
4 Copyright 2002 by The Institute of Electrical and Electronics Engineers, Inc. All rights reserved Copyright and Reprint Permissions: Abstracting is permitted with credit to the source. Libraries may photocopy beyond the limits of US copyright law, for private use of patrons, those articles in this volume that carry a code at the bottom of the first page, provided that the per-copy fee indicated in the code is paid through the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA Other copying, reprint, or republication requests should be addressed to: IEEE Copyrights Manager, IEEE Service Center, 445 Hoes Lane, P.O. Box 133, Piscataway, NJ The papers in this book comprise the proceedings of the meeting mentioned on the cover and title page. They reflect the authors opinions and, in the interests of timely dissemination, are published as presented and without change. Their inclusion in this publication does not necessarily constitute endorsement by the editors, the IEEE Computer Society, or the Institute of Electrical and Electronics Engineers, Inc. IEEE Computer Society Order Number PR01852 ISBN Library of Congress Number Additional copies may be ordered from: IEEE Computer Society IEEE Service Center IEEE Computer Society Customer Service Center 445 Hoes Lane Asia/Pacific Office Los Vaqueros Circle P.O. Box 1331 Watanabe Bldg., P.O. Box 3014 Piscataway, NJ Minami-Aoyama Los Alamitos, CA Tel: Minato-ku, Tokyo Tel: Fax: JAPAN Fax: Tel: customer-service@ieee.org Fax: csbooks@computer.org tokyo.ofc@computer.org Editorial production by Anne Jacobs Cover art production by Joe Daigle/Studio Productions Printed in the United States of America by The Printing House iv
5 Table of Contents 2002 Pacific Rim International Symposium on Dependable Computing General Chair s Message...ix Program Co-Chairs' Message...x Organizing Committee...xi Steering Committee... xii Program Committee... xiii Reviewers... xiv Keynote Speech (I) Fault Tolerance in Autonomic Computing Environment... 3 Y. Tohma Session 1A: Dependable Distributed Systems (I) Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System... 9 H. V. Ramasamy, M. Cukier, and W. H. Sanders Asynchronous Active Replication in Three-tier Distributed Systems R. Baldoni, C. Marchetti, and S. Tucci Piergiovanni Session 1B: Checkpointing On Characteristics of DEF Communication-Induced Checkpointing Protocols J. Tsai and J.-W. Lin A Low Overhead Checkpointing Protocol for Mobile Computing Systems C.-Y. Lin, S.-C. Wang, S.-Y. Kuo, and I.-Y. Chen The Cost of Checkpointing, Logging and Recovery for the Mobile Agent Systems H. Kim, H. Y. Yeom, T. Park, and H. Park Session 2A: Dependable Systems (I) Analysis of the Effects of Real and Injected Software Faults: Linux as a Case Study T. Jarboui, J. Arlat, Y. Crouzet, K. Kanoun, and T. Marteau Principles of Multi-Level Reflection for Fault Tolerant Architectures F. Taïani, J.-C. Fabre, and M.-O. Killijian Hardware/Software Co-Reliability of Configurable Digital Systems M. Choi, N. Park, Y. Kim, and F. Lombardi Highly Fault-Tolerant FPGA Processor by Degrading Strategy Y. Nakamura and K. Hiraki v
6 Session 2B: Reliability/Dependability Analysis Using Software Implemented Fault Inserter in Dependability Analysis P. Gawkowski and J. Sosnowski Analyzing Network Reliability with Imperfect Nodes using OBDD F.-M. Yeh, H.-Y. Lin, and S.-Y. Kuo Reliability Analysis of Grid Computing Systems Y. S. Dai, M. Xie, and K. L. Poh A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems Ö. Askerdal, M. Gäfvert, M. Hiller, and N. Suri Keynote Speech (II) Caveat Emptor: Making Grid Services Dependable from the Client Side M. Livny and D. Thain Session 3A: Dependable Distributed Systems (II) An Introduction to the Renaming Problem M. Raynal Passive Replication Schemes in AQUA Y. Ren, P. Rubel, M. Seri, M. Cukier, W. H. Sanders, and T. Courtney Detecting Feature Interactions in Telecommunication Services with a SAT Solver T. Tsuchiya, M. Nakamura, and T. Kikuno Session 3B: Dependable Networks Fault-Tolerant Properties of Generalized Hierarchical Completely-Connected Networks T. Takabatake, M. Kitakami, and H. Ito Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks S. Moh, C. Yu, B. Lee, and H. Y. Youn Configurable PC Clusters Using a Hierarchical Complete-Connection-Based Switching Network N. Tsuda Keynote Speech (III) Perspectives on Dependable Computing for Solar System Exploration L. Alkalai vi
7 Session 4A: Dependable Systems (II) Enhancing Access Control with SysGuard, a Reference Monitor Supporting Portable and Composable Kernel Module Y. Shinjo, K. Eiraku, A. Suzuki, K. Itano, and C. Pu An Adaptive High-Low Water Mark Destage Algorithm for Cached RAID Y. J. Nam and C. Park A Packet-Based Caching Proxy with Loss Recovery for Video Streaming K.-S. Hsueh and S.-D. Wang Session 4B: Dependability Evaluation and Verification Reliability Evaluation of Multi-State Systems Subject to Imperfect Coverage Using OBDD Y.-R. Chang, S. V. Amari, and S.-Y. Kuo Characterization of Operating Systems Behavior in the Presence of Faulty Drivers through Software Fault Emulation J. Durães and H. Madeira Level Oriented Formal Model for Asynchronous Circuit Verification and Its Efficient Analysis Method T. Kitai, Y. Oguro, T. Yoneda, E. Mercer, and C. Myers Session 5A: Consensus in Distributed Systems Consensus in Synchronous Systems: A Concise Guided Tour M. Raynal A Consensus Algorithm for Synchronous Distributed Systems using Mobile Agent J. Cao, X. Wang, S. Lo, and S. K. Das Session 5B: Coding Evaluation of Convolutional-Code-Based FEC under Limited Recovery Time and Its Application to Real-Time Transmission M. Arai, H. Kurosu, S. Fukumoto, and K. Iwasaki A Class of Random Multiple Bits in a Byte Error Correcting (S t/b EC) Codes for Semiconductor Memory Systems G. Umanesan and E. Fujiwara Session 6A: Dependable Database Providing Persistence for Sensor Streams with Light Neighbor WAL H. Kawashima, M. Toyama, M. Imai, and Y. Anzai Definition of Faultloads Based on Operator Faults for DMBS Recovery Benchmarking M. Vieira and H. Madeira vii
8 Session 6B: Test An Alternative Method of Generating Tests for Path Delay Faults Using N i -Detection Test Sets H. Takahashi, K. K. Saluja, and Y. Takamatsu Enhancing Delay Fault Testability for Iterative Logic Arrays S.-K. Lu and C.-H. Yeh Session 7A: Neural Network Comparison with Defect Compensation Methods for Feed-Forward Neural Networks K. Takahashi, K. Yamamori, S. Horiguchi, and I. Yoshihara An Extreme Value Injection Approach with Reduced Learning Time to Make MLNs Multiple-Weight-Fault Tolerant I. Takanami and Y. Oyama Session 7B: Practical Reports Event Log Based Dependability Analysis of Windows NT and 2K Systems C. Simache, M. Kaâniche, and A. Saidane Using VHDL-Based Fault Injection to Exercise Error Detection Mechanisms in the Time-Triggered Architecture J. Gracia, D. Gil, J. C. Baraza, and P. J. Gil Formal Verification of a Pipelined Processor with New Memory Hierarchy Using a Commercial Model Checker H. Nakamura, T. Arai, and M. Fujita Author Index viii
Proceedings. Second IEEE International Workshop on Source Code Analysis and Manipulation
Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation Proceedings Second IEEE International Workshop on Source Code Analysis and Manipulation 1 October 2002 Montreal,
More informationSixth IEEE International Symposium on High Assurance Systems Engineering
Sixth IEEE International Symposium on High Assurance Systems Engineering Special Topic: Impact of Networking 22-24 October 2001 Boca Raton, Florida, USA Sponsored by the IEEE Computer Society Technical
More informationIEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003
IEEE International Workshop on Analysis and Modeling of Faces and Gestures AMFG 2003 17 October 2003 Nice, France Los Alamitos, California Washington Brussels Tokyo Copyright 2003 by The Institute of Electrical
More informationProceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002)
Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce and Web-Based Information Systems (WECWIS 2002) Proceedings Fourth IEEE International Workshop on Advanced Issues of E-Commerce
More informationSoftware Reliability Engineering
Proceedings lzth International Symposium on Software Reliability Engineering ISSRE 2001 Proceedings lzfh International Symposium on Software Reliability Engineering ISSRE 2001 27-30 November Hong Kong,
More informationFuture Trends of Distributed Computing Systems
Proceedings The Ninth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2003 28-30 May 2003 San Juan, Puerto Rico Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationFuture Trends of Distributed Computing Systems
Proceedings The Eighth IEEE Workshop on Future Trends of Distributed Computing Systems FTDCS 2001 31 October 2 November 2001 Bologna, Italy Sponsored by IEEE Computer Society Los Alamitos, California Washington
More informationCOMPUTER PROCEEDINGS OF SOCIETY. THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program)
PROCEEDINGS OF THE 2nd INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS ENGINEERING Volume 1 (Main Program) 3-6 December 2001, Kyoto, Japan Organized by WISE Society Kyoto University, Japan EDITORS
More informationProceedings Pacific Rim International Symposium on Dependable Computing PRDC 2001
Proceedings 2001 Pacific Rim International Symposium on Dependable Computing PRDC 2001 ~~ ~~~~~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ Proceedings 2001 Pacific Rim International Symposium on Dependable Computing 17-1 9 December
More informationProceedings. 14 th IEEE International Workshop on. Rapid Systems Prototyping RSP 2003
Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping RSP 2003 Proceedings 14 th IEEE International Workshop on Rapid Systems Prototyping San Diego, California, USA June 9 11, 2003
More informationProceedings. Ninth International Conference on. Network Protocols ICNP 2001
Proceedings Ninth International Conference on Network Protocols ICNP 2001 Proceedings Ninth International Conference on Network Protocols ICNP 2001 11-14 November 2001 Riverside, California, USA Sponsored
More informationProceedings. Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing ISORC 2003 Proceedings Sixth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing
More informationWIRELESS SENSOR NETWORKS A Networking Perspective Edited by Jun Zheng Abbas Jamalipour A JOHN WILEY & SONS, INC., PUBLICATION WIRELESS SENSOR NETWORKS IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE
More informationth International Conference on Telecommunications (ICT 2017)
2017 24th International Conference on Telecommunications (ICT 2017) Limassol, Cyprus 3-5 May 2017 IEEE Catalog Number: ISBN: CFP17530-POD 978-1-5386-0644-5 Copyright 2017 by the Institute of Electrical
More information2017 International Conference on Communication Technologies (ComTech 2017)
2017 International Conference on Communication Technologies (ComTech 2017) Rawalpindi, Pakistan 19 21 April 2017 IEEE Catalog Number: ISBN: CFP17CMR-POD 978-1-5090-5985-0 Copyright 2017 by the Institute
More informationProceedings December 2001 New Orleans, Louisiana. Sponsored by. Applied Computer Security Associates. Los Alamitos, California
Proceedings 17th Annual Computer Security Applications Conference 10 14 December 2001 New Orleans, Louisiana Sponsored by Applied Computer Security Associates Los Alamitos, California Washington Brussels
More informationENABLING AND (IN MY HUMBLE OPINION) ESSENTIAL TECHNOLOGIES FOR DEPENDABILITY BENCHMARKING. William H. Sanders
ENABLING AND (IN MY HUMBLE OPINION) ESSENTIAL TECHNOLOGIES FOR DEPENDABILITY BENCHMARKING William H. Sanders University of Illinois at Urbana-Champaign whs@crhc.uiuc.edu http://www.crhc.uiuc.edu/perform
More informationAlgorithms and Parallel Computing
Algorithms and Parallel Computing Algorithms and Parallel Computing Fayez Gebali University of Victoria, Victoria, BC A John Wiley & Sons, Inc., Publication Copyright 2011 by John Wiley & Sons, Inc. All
More informationMulti-Core Programming
Multi-Core Programming Increasing Performance through Software Multi-threading Shameem Akhter Jason Roberts Intel PRESS Copyright 2006 Intel Corporation. All rights reserved. ISBN 0-9764832-4-6 No part
More informationDISTRIBUTED SYSTEMS. Second Edition. Andrew S. Tanenbaum Maarten Van Steen. Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON.
DISTRIBUTED SYSTEMS 121r itac itple TAYAdiets Second Edition Andrew S. Tanenbaum Maarten Van Steen Vrije Universiteit Amsterdam, 7'he Netherlands PEARSON Prentice Hall Upper Saddle River, NJ 07458 CONTENTS
More informationBenchmarking The Dependability of Windows NT4, 2000 and XP *
Benchmarking The Dependability of Windows NT4, 2000 and XP * Ali Kalakech, Karama Kanoun, Yves Crouzet and Jean Arlat LAAS-CNRS, 7, Avenue Colonel Roche 31077 Toulouse Cedex 4, France {kalakech, kanoun,
More informationBasic vs. Reliable Multicast
Basic vs. Reliable Multicast Basic multicast does not consider process crashes. Reliable multicast does. So far, we considered the basic versions of ordered multicasts. What about the reliable versions?
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 62243 First edition 2005-07 IEEE 1232 Artificial intelligence exchange and service tie to all test environments (AI-ESTATE) IEEE 2005 Copyright - all rights reserved IEEE is
More informationJAVA Projects. 1. Enforcing Multitenancy for Cloud Computing Environments (IEEE 2012).
JAVA Projects I. IEEE based on CLOUD COMPUTING 1. Enforcing Multitenancy for Cloud Computing Environments 2. Practical Detection of Spammers and Content Promoters in Online Video Sharing Systems 3. An
More informationCheckpointing and Rollback Recovery in Distributed Systems: Existing Solutions, Open Issues and Proposed Solutions
Checkpointing and Rollback Recovery in Distributed Systems: Existing Solutions, Open Issues and Proposed Solutions D. Manivannan Department of Computer Science University of Kentucky Lexington, KY 40506
More informationMicroprocessor Theory
Microprocessor Theory and Applications with 68000/68020 and Pentium M. RAFIQUZZAMAN, Ph.D. Professor California State Polytechnic University Pomona, California and President Rafi Systems, Inc. WILEY A
More informationProceedings of The Second International Conference on Web Information Systems Engineering
Proceedings of The Second International Conference on Web Information Systems Engineering Volume 1 (Main Program) 3-6 December 2001 Kyoto, Japan Editors Tamer Ozsu Hans-Jorg Schek Katsumi Tanaka Yanchun
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 60488-2 First edition 2004-05 IEEE 488.2 Standard digital interface for programmable instrumentation Part 2: Codes, formats, protocols and common commands IEEE 2004 Copyright
More informationWorkshop on Dependability Benchmarking. 39th Meeting of IFIP Working Group 10.4, Parati, Brazil, March 1-3, 2001
Workshop on Dependability Benchmarking 39th Meeting of IFIP Working Group 10.4, Parati, Brazil, March 1-3, 2001 Wrap up Dependability benchmarking problem space Session 1 - Dependability Benchmarking Approaches
More information2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015)
2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN 2015) Bangalore, India 9-11 September 2015 IEEE Catalog Number: ISBN: CFP15604-POD 978-1-4673-9278-5 Copyright
More informationAgile Database Techniques Effective Strategies for the Agile Software Developer. Scott W. Ambler
Agile Database Techniques Effective Strategies for the Agile Software Developer Scott W. Ambler Agile Database Techniques Effective Strategies for the Agile Software Developer Agile Database Techniques
More informationPractical Database Programming with Visual Basic.NET
Practical Database Programming with Visual Basic.NET IEEE Press 445 Hoes Lane Piscataway, NJ 08854 IEEE Press Editorial Board Lajos Hanzo, Editor in Chief R. Abari M. El-Hawary S. Nahavandi J. Anderson
More informationModern Experimental Design
Modern Experimental Design THOMAS P. RYAN Acworth, GA Modern Experimental Design Modern Experimental Design THOMAS P. RYAN Acworth, GA Copyright C 2007 by John Wiley & Sons, Inc. All rights reserved.
More informationA 120 fps High Frame Rate Real-time Video Encoder
: Creating Immersive UX Services for Beyond 2020 A High Frame Rate Real-time Video Encoder Yuya Omori, Takayuki Onishi, Hiroe Iwasaki, and Atsushi Shimizu Abstract This article describes a real-time HEVC
More informationFault-Tolerant Parallel and Distributed Systems
Fault-Tolerant Parallel and Distributed Systems Fault-Tolerant Parallel and Distributed Systems by DIMITER R. AVRESKY Department of Electrical and Computer Engineering Boston University Boston, MA and
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationCONTENTS. Computer-System Structures
CONTENTS PART ONE OVERVIEW Chapter 1 Introduction 1.1 What Is an Operating System? 3 1.2 Simple Batch Systems 6 1.3 Multiprogrammed Batched Systems 8 1.4 Time-Sharing Systems 9 1.5 Personal-Computer Systems
More informationMATERIALS AND METHOD
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Evaluation of Web Security Mechanisms
More informationHistorical Reliability Data for IEEE 3006 Standards: Power Systems Reliability
IEEE 3006 STANDARDS: POWER SYSTEMS RELIABILITY http://www.booksfiles.org/33780-ieee-3006-5-2014.html Historical Reliability Data for IEEE 3006 Standards: Power Systems Reliability IEEE 3000 Standards
More informationNode-level Fault Tolerance for Fixed Priority Scheduling. Project proposal submitted to ARTES
Chalmers University of Technology Department of Computer Engineering 412 96 Göteborg 1998-11-13 Node-level Fault Tolerance for Fixed Priority Scheduling Project proposal submitted to ARTES Johan Karlsson
More informationBehavioral Analysis for Intrusion Resilience. Ahmed Fawaz Dec 6, 2016
Behavioral Analysis for Intrusion Resilience Ahmed Fawaz Dec 6, 2016 1 Recent Cyber Attacks on Private and Public Entities 2 Design for Resiliency Diverse Monitoring Secure Monitoring Monitoring Fusion
More informationLEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS
LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS DINESH C. VERMA IBM T. J. Watson Research Center A JOHN WILEY & SONS, INC., PUBLICATION LEGITIMATE APPLICATIONS OF PEER-TO-PEER NETWORKS LEGITIMATE APPLICATIONS
More informationUsing a Managed Peer-to-Peer Protocol to Deliver Files within an Organization
ASIA-PACIFIC SYMPOSIUM ON QUEUEING THEORY AND NETWORK APPLICATIONS 2007 227 Using a Managed Peer-to-Peer Protocol to Deliver s within an Organization Chih-Chin Liang a, Chia-Hung Wang b, Hsing Luh b and
More informationRelational Database Index Design and the Optimizers
Relational Database Index Design and the Optimizers DB2, Oracle, SQL Server, et al. Tapio Lahdenmäki Michael Leach A JOHN WILEY & SONS, INC., PUBLICATION Relational Database Index Design and the Optimizers
More informationCOMPONENT-ORIENTED PROGRAMMING
COMPONENT-ORIENTED PROGRAMMING COMPONENT-ORIENTED PROGRAMMING ANDY JU AN WANG KAI QIAN Southern Polytechnic State University Marietta, Georgia A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2005 by John
More informationPerformance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV)
Performance Evaluation of Active Route Time-Out parameter in Ad-hoc On Demand Distance Vector (AODV) WADHAH AL-MANDHARI, KOICHI GYODA 2, NOBUO NAKAJIMA Department of Human Communications The University
More informationTIME-CONSTRAINED TRANSACTION MANAGEMENT. Real-Time Constraints in Database Transaction Systems
TIME-CONSTRAINED TRANSACTION MANAGEMENT Real-Time Constraints in Database Transaction Systems The Kluwer International Series on ADV ANCES IN DATABASE SYSTEMS Other books in the Series: Series Editor Ahmed
More informationINTERNATIONAL STANDARD
IEC 62032 INTERNATIONAL STANDARD Edition 2.0 2012-06 IEEE Std C57.135 Guide for the Application, Specification, and Testing of Phase-Shifting Transformers (E) IEEE Std. C57.135:2011 THIS PUBLICATION IS
More informationReal-Time Optimization by Extremum-Seeking Control
Real-Time Optimization by Extremum-Seeking Control Real-Time Optimization by Extremum-Seeking Control KARTIK B. ARIYUR MIROSLAV KRSTIĆ A JOHN WILEY & SONS, INC., PUBLICATION Copyright 2003 by John Wiley
More informationDSRC Standards Development in ITU-R and Japan
DSRC Standards Development in ITU-R and Japan SS30: Future ITS Wireless Communications November 10, 2005 San Francisco, U.S.A. Sam Oyama (Hitachi, Ltd.) ITS Info-Communications Forum, Japan November 10,
More informationHDFS Architecture. Gregory Kesden, CSE-291 (Storage Systems) Fall 2017
HDFS Architecture Gregory Kesden, CSE-291 (Storage Systems) Fall 2017 Based Upon: http://hadoop.apache.org/docs/r3.0.0-alpha1/hadoopproject-dist/hadoop-hdfs/hdfsdesign.html Assumptions At scale, hardware
More informationVMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
More informationHome Inspection 2014
Home Inspection 2014 Home Inspection A fifteen hour continuing education course approved by the California Bureau of Real Estate (CalBRE) to meet the requirements of the Business and Professions Code Section
More informationHASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING Alan G. Konheim JOHN WILEY & SONS, INC., PUBLICATION HASHING IN COMPUTER SCIENCE HASHING IN COMPUTER SCIENCE FIFTY YEARS OF SLICING AND DICING
More informationCOSO Enterprise Risk Management
COSO Enterprise Risk Management COSO Enterprise Risk Management Establishing Effective Governance, Risk, and Compliance Processes Second Edition ROBERT R. MOELLER John Wiley & Sons, Inc. Copyright # 2007,
More informationDynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality
Dynamically Provisioning Distributed Systems to Meet Target Levels of Performance, Availability, and Data Quality Amin Vahdat Department of Computer Science Duke University 1 Introduction Increasingly,
More informationBuilding Dependable COTS Microkernel-based Systems using MAFALDA
Building Dependable COTS Microkernel-based Systems using MAFALDA Jean-Charles Fabre, Manuel Rodríguez, Jean Arlat, Frédéric Salles and Jean-Michel Sizun LAAS-CNRS Toulouse, France PRDC-2000, UCLA, Los
More informationTechnical Committee. E3 Public UNI. af-phy
Technical Committee E3 Public UNI August 1995 1995 The ATM Forum. All Rights Reserved. No part of this publication may be reproduced in any form or by any means The information in this publication is believed
More informationMastering UNIX Shell Scripting
Mastering UNIX Shell Scripting Bash, Bourne, and Korn Shell Scripting for Programmers, System Administrators, and UNIX Gurus Second Edition Randal K. Michael Wiley Publishing, Inc. Mastering UNIX Shell
More informationLinux Command Line and Shell Scripting Bible
Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing, Inc. Linux Command Line and Shell Scripting Bible Linux Command Line and Shell Scripting Bible Richard Blum Wiley Publishing,
More informationScalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments *
Scalable, Reliable Marshalling and Organization of Distributed Large Scale Data Onto Enterprise Storage Environments * Joesph JaJa joseph@ Mike Smorul toaster@ Fritz McCall fmccall@ Yang Wang wpwy@ Institute
More informationPhilip Andrew Simpson. FPGA Design. Best Practices for Team-based Reuse. Second Edition
FPGA Design Philip Andrew Simpson FPGA Design Best Practices for Team-based Reuse Second Edition Philip Andrew Simpson San Jose, CA, USA ISBN 978-3-319-17923-0 DOI 10.1007/978-3-319-17924-7 ISBN 978-3-319-17924-7
More informationNFSv4 as the Building Block for Fault Tolerant Applications
NFSv4 as the Building Block for Fault Tolerant Applications Alexandros Batsakis Overview Goal: To provide support for recoverability and application fault tolerance through the NFSv4 file system Motivation:
More informationStudy Guide. Robert Schmidt Dane Charlton
Study Guide Study Guide Robert Schmidt Dane Charlton Senior Acquisitions Editor: Kenyon Brown Development Editor: Candace English Technical Editors: Eric Biller and Brian Atkinson Production Editor: Christine
More informationNetworked Graphics 01_P374423_PRELIMS.indd i 10/27/2009 6:57:42 AM
Networked Graphics Networked Graphics Building Networked Games and Virtual Environments Anthony Steed Manuel Fradinho Oliveira AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
More informationProfessional ASP.NET 2.0 Databases. Thiru Thangarathinam
Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Professional ASP.NET 2.0 Databases Thiru Thangarathinam Professional ASP.NET 2.0 Databases Published by Wiley
More informationYoshiaki Tanaka, Professor, Dr. Eng.
Yoshiaki Tanaka, Professor, Dr. Eng. Department of Communications and Computer Engineering, Waseda University E mail ytanaka@waseda.jp Fax/Tel +81 3 5286 1625 Postal Address: 3 4 1 Okubo, Shinjuku ku,
More informationThe Architecture of a Resilience Infrastructure for Computing and Communication Systems
The Architecture of a Resilience Infrastructure for Computing and Communication Systems Algirdas Avižienis University of California, Los Angeles, USA, and Vytautas Magnus University, Kaunas, Lithuania
More informationA Robust Bloom Filter
A Robust Bloom Filter Yoon-Hwa Choi Department of Computer Engineering, Hongik University, Seoul, Korea. Orcid: 0000-0003-4585-2875 Abstract A Bloom filter is a space-efficient randomized data structure
More informationIBM BladeCenter Chassis Management Pack for Microsoft System Center Operations Manager 2007 Release Notes
IBM System x IBM BladeCenter Chassis Management Pack for Microsoft System Center Operations Manager 2007 Release Notes Version 1.0.3 IBM System x IBM BladeCenter Chassis Management Pack for Microsoft
More informationAdministrator s Guide. StorageX 7.8
Administrator s Guide StorageX 7.8 August 2016 Copyright 2016 Data Dynamics, Inc. All Rights Reserved. The trademark Data Dynamics is the property of Data Dynamics, Inc. StorageX is a registered trademark
More informationOn Bootstrapping Replicated CORBA Applications Λ
On Bootstrapping Replicated CORBA Applications Λ W. Zhao, L. E. Moser and P. M. Melliar-Smith Department of Electrical and Computer Engineering University of California, Santa Barbara, CA 93106 wenbing@alpha.ece.ucsb.edu,
More informationIssues in Testing Electronic Commerce Systems
Issues in Testing Electronic Commerce Systems Kassem Saleh 1 and Robert Probert University of Ottawa, School of Information Technology and Engineering (SITE) P.O.Box 450, Stn A, Ottawa, Ontario, Canada
More informationMODERN MULTITHREADING
MODERN MULTITHREADING Implementing, Testing, and Debugging Multithreaded Java and C++/Pthreads/Win32 Programs RICHARD H. CARVER KUO-CHUNG TAI A JOHN WILEY & SONS, INC., PUBLICATION MODERN MULTITHREADING
More informationDynamic Design of Cellular Wireless Networks via Self Organizing Mechanism
Dynamic Design of Cellular Wireless Networks via Self Organizing Mechanism V.Narasimha Raghavan, M.Venkatesh, Divya Sridharabalan, T.Sabhanayagam, Nithin Bharath Abstract In our paper, we are utilizing
More informationIP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H
IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H Daniel Minoli A JOHN WILEY & SONS, INC., PUBLICATION IP MULTICAST WITH APPLICATIONS TO IPTV AND MOBILE DVB-H IP MULTICAST WITH APPLICATIONS TO
More informationAdministrator s Guide. StorageX 7.6
Administrator s Guide StorageX 7.6 May 2015 Copyright 2015 Data Dynamics, Inc. All Rights Reserved. The trademark Data Dynamics is the property of Data Dynamics, Inc. StorageX is a registered trademark
More informationIEEE P /Dx.x Draft Standard for Radio over Ethernet Encapsulations and Mappings
IEEE P0. /Dx.x Draft Standard for Radio over Ethernet Encapsulations and Mappings Sponsor Standards Development Board of the IEEE Communications Society 0 0 Approved IEEE-SA Standards Board
More informationKeynote Speakers CyberC 2010
Keynote Speakers CyberC 2010 Keynote Speaker 1 Wireless Sensor Network Security: Overview and Future Perspective Prof. Anup Kumar University of Louisville, USA Wireless sensor networks have the potential
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 60488-2 First edition 2004-05 IEEE 488.2 Standard digital interface for programmable instrumentation Part 2: Codes, formats, protocols and common commands Reference number IEC
More informationCurriculum 2013 Knowledge Units Pertaining to PDC
Curriculum 2013 Knowledge Units Pertaining to C KA KU Tier Level NumC Learning Outcome Assembly level machine Describe how an instruction is executed in a classical von Neumann machine, with organization
More informationMastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications
Mastering BEA WebLogic Server Best Practices for Building and Deploying J2EE Applications Gregory Nyberg Robert Patrick Paul Bauerschmidt Jeffrey McDaniel Raja Mukherjee Mastering BEA WebLogic Server
More informationPart 16: Air Interface for Fixed Broadband Wireless Access Systems
Draft IEEE Standard for Local and Metropolitan Area Networks Part 16: Air Interface for Fixed Broadband Wireless Access Systems Amendment for Improved Coexistence Mechanisms for License-Exempt Operation
More informationAn Approach to Quality Achievement at the Architectural Level: AQUA
An Approach to Quality Achievement at the Level: AQUA Heeseok Choi 1, Keunhyuk Yeom 2, Youhee Choi 3, and Mikyeong Moon 2 1 NTIS Organization, Korea Institute of Science and Technology Information Eoeun-dong
More informationINTRUSION DETECTION AND CORRELATION. Challenges and Solutions
INTRUSION DETECTION AND CORRELATION Challenges and Solutions Advances in Information Security Sushil Jajodia Consulting editor Center for Secure Information Systems George Mason University Fairfax, VA
More informationTASK SCHEDULING FOR PARALLEL SYSTEMS
TASK SCHEDULING FOR PARALLEL SYSTEMS Oliver Sinnen Department of Electrical and Computer Engineering The University of Aukland New Zealand TASK SCHEDULING FOR PARALLEL SYSTEMS TASK SCHEDULING FOR PARALLEL
More informationTHE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING
FOURTH EDITION THE ARCHITECTURE OF COMPUTER HARDWARE, SYSTEM SOFTWARE, AND NETWORKING AN INFORMATION TECHNOLOGY APPROACH Irv Englander Bentley University John Wiley & Sons, Inc. Vice President & Executive
More information"Charting the Course... MOC B Active Directory Services with Windows Server Course Summary
Description Course Summary Get Hands on instruction and practice administering Active Directory technologies in Windows Server 2012 and Windows Server 2012 R2 in this 5-day Microsoft Official Course. You
More informationFormal Verification of Process Communications in Operational Flight Program for a Small-Scale Unmanned Helicopter
Formal Verication of Process Communications in Operational Flight Program for a Small-Scale Unmanned Helicopter Dong-Ah Lee 1, Junbeom Yoo 2 and Doo-Hyun Kim 3 1, 2 School of Computer Science and Engineering
More informationVol No. 162 May
Vol. 40 200 No. 62 May 39 39 7 Joint Research 40 200 FILGAP Journal of The Heat Transfer Society of Japan Vol.40, No.62, May, 200 CONTENTS Preface to Special Issue of Student Committee
More informationAdministrator s Guide. StorageX 8.0
Administrator s Guide StorageX 8.0 March 2018 Copyright 2018 Data Dynamics, Inc. All Rights Reserved. The trademark Data Dynamics is the property of Data Dynamics, Inc. StorageX is a registered trademark
More informationDigital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz
Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming Nasser Kehtarnavaz Digital Signal Processing System Design: LabVIEW-Based Hybrid Programming by Nasser Kehtarnavaz University
More informationSun Java System Application Server 8.1: Administration & Deployment
Sun Java System Application Server 8.1: Administration & Deployment Student Guide - Volume I IAS-4444 Rev A D62040GC10 Edition 1.0 D63846 Copyright 2006, 2009, Oracle and/or its affiliates. All rights
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD IEC 61523-3 First edition 2004-09 IEEE 1497 Delay and power calculation standards Part 3: Standard Delay Format (SDF) for the electronic design process IEEE 2004 Copyright - all
More informationFault-tolerant in wireless sensor networks using fuzzy logic
International Research Journal of Applied and Basic Sciences 2014 Available online at www.irjabs.com ISSN 2251-838X / Vol, 8 (9): 1276-1282 Science Explorer Publications Fault-tolerant in wireless sensor
More informationIEEE-SA Conformity Assessment Program for IEEE 1588 in Mobile Networks AUTHORS:
IEEE-SA Conformity Assessment Program for IEEE 1588 8 in Mobile Networks AUTHORS: John C. Eidson Tim Frost Geoffrey M. Garner Sebastien Jobert Bob Mandeville Michael Mayer Michel Ouellette Charles A. Webb
More informationCS4516 Advanced Computer Networks. Final Review
Final Review ------------------------------ Final Material Begins Here --------------------------- V. Local Area Networks A. "The Channel Allocation Problem" 1. assumptions B. LAN Performance Notation
More informationImplementing Security and Tokens: Current Standards, Tools, and Practices
Implementing Email Security and Tokens: Current Standards, Tools, and Practices Sean Turner Russ Housley Wiley Publishing, Inc. Implementing Email Security and Tokens: Current Standards, Tools, and Practices
More informationResearch on Industrial Security Theory
Research on Industrial Security Theory Menggang Li Research on Industrial Security Theory Menggang Li China Centre for Industrial Security Research Beijing, People s Republic of China ISBN 978-3-642-36951-3
More informationAn Introduction to Programming with IDL
An Introduction to Programming with IDL Interactive Data Language Kenneth P. Bowman Department of Atmospheric Sciences Texas A&M University AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
More information