Results 1 - 10
of
3,618
Sensor networks: Evolution, opportunities, and challenges
- PROCEEDINGS OF THE IEEE
, 2003
"... Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA) spann ..."
Abstract
-
Cited by 655 (1 self)
- Add to MetaCart
Wireless microsensor networks have been identified as one of the most important technologies for the 21st century. This paper traces the history of research in sensor networks over the past three decades, including two important programs of the Defense Advanced Research Projects Agency (DARPA
Practical network support for IP traceback
, 2000
"... This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source ad ..."
Abstract
-
Cited by 678 (13 self)
- Add to MetaCart
This paper describes a technique for tracing anonymous packet flooding attacks in the Internet back towards their source. This work is motivated by the increased frequency and sophistication of denial-of-service attacks and by the difficulty in tracing packets with incorrect, or “spoofed”, source
A Survey of active network Research
- IEEE Communications
, 1997
"... Active networks are a novel approach to network architecture in which the switches of the network perform customized computations on the messages flowing through them. This approach is motivated by both lead user applications, which perform user-driven computation at nodes within the network today, ..."
Abstract
-
Cited by 549 (29 self)
- Add to MetaCart
, and the emergence of mobile code technologies that make dynamic network service innovation attainable. In this paper, we discuss two approaches to the realization of active networks and provide a snapshot of the current research issues and activities. Introduction – What Are Active Networks? In an active network
C.: Live migration of virtual machine based on full system trace and replay
- In: Proceedings of the 18th ACM international
, 2009
"... Live migration of virtual machines (VM) across distinct physical hosts provides a significant new benefit for administrators of data centers and clusters. However, previous memory-to-memory ap-proaches only make the live VM migration be applied in local area networks (LAN), and their im-proved metho ..."
Abstract
-
Cited by 36 (2 self)
- Add to MetaCart
-proved methods for wide area networks (WAN) environment bring the VM migration with a long period of downtime. This paper describes the design and implementation of a novel approach that adopts checkpointing/recovery and trace/replay technology to provide fast, transparent VM migra-tion for both LAN and WAN
Principles and methods of Testing Finite State Machines -- a survey
- PROCEEDINGS OF IEEE
, 1996
"... With advanced computer technology, systems are getting larger to fulfill more complicated tasks, however, they are also becoming less reliable. Consequently, testing is an indispensable part of system design and implementation; yet it has proved to be a formidable task for complex systems. This moti ..."
Abstract
-
Cited by 345 (16 self)
- Add to MetaCart
With advanced computer technology, systems are getting larger to fulfill more complicated tasks, however, they are also becoming less reliable. Consequently, testing is an indispensable part of system design and implementation; yet it has proved to be a formidable task for complex systems
ReTrace: Collecting Execution Trace with Virtual Machine Deterministic Replay
- In Proceedings of the 3rd Annual Workshop on Modeling, Benchmarking and Simulation
, 2007
"... Execution trace is an important tool in computer architecture research. Unfortunately, existing trace collection techniques are often slow (due to software tracing overheads) or expensive (due to special tracing hardware requirements). Regardless of the method of collection, detailed trace files are ..."
Abstract
-
Cited by 65 (2 self)
- Add to MetaCart
are generally large and inconvenient to store and share. We present ReTrace, a trace collection tool based on the deterministic replay technology of the VMware hypervisor. ReTrace operates in two stages: capturing and expansion. ReTrace capturing accumulates the minimal amount of information necessary to later
Analysis of a Campus-wide Wireless Network
- In Proceedings of ACM Mobicom
, 2002
"... Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace o ..."
Abstract
-
Cited by 308 (18 self)
- Add to MetaCart
Understanding usage patterns in wireless local-area networks (WLANs) is critical for those who develop, deploy, and manage WLAN technology, as well as those who develop systems and application software for wireless networks. This paper presents results from the largest and most comprehensive trace
Optimal Tracing and Replay for Debugging Shared-Memory Parallel Programs
- In Proceedings of the ACM/ONR Workshop on Parallel and Distributed Debugging (PADD
, 1993
"... Execution replay is a crucial part of debugging. Because explicitly parallel shared-memory programs can be nondeterministic, a tool is required that traces executions so they can be replayed for debugging. We present an adaptive tracing strategy that is optimal and records the minimal number of shar ..."
Abstract
-
Cited by 96 (0 self)
- Add to MetaCart
Execution replay is a crucial part of debugging. Because explicitly parallel shared-memory programs can be nondeterministic, a tool is required that traces executions so they can be replayed for debugging. We present an adaptive tracing strategy that is optimal and records the minimal number
Time-Independent Trace Replay
"... Abstract: Simulation is a popular approach to obtain objective performance indicators on platforms that are not at one’s disposal. It may help the dimensioning of compute clusters in large computing centers. In a previous work, we proposed a framework for the off-line simulation of MPI applications. ..."
Abstract
- Add to MetaCart
. Its main originality with regard to the literature is to rely on time-independent execution traces. This allows us to completely decouple the acquisition process from the actual replay of the traces in a simulation context. Then we are able to acquire traces for large application instances without
Optimal Tracing and Replay for Debugging Message-Passing Parallel Programs
- In Proceedings of Supercomputing '92
, 1992
"... A common debugging strategy involves reexecuting a program (on a given input) over and over, each time gaining more information about bugs. Such techniques can fail on message-passing parallel programs. Because of variations in message latencies and process scheduling, different runs on the given in ..."
Abstract
-
Cited by 89 (1 self)
- Add to MetaCart
input may produce different results. This non-repeatability is a serious debugging problem, since an execution cannot always be reproduced to track down bugs. This paper presents a technique for tracing and replaying message-passing programs for debugging. Our technique is optimal in the common case
Results 1 - 10
of
3,618