Filters








685 Hits in 5.6 sec

Why panic()?

Swaminathan Sundararaman, Sriram Subramanian, Abhishek Rajimwale, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift
2010 ACM SIGOPS Operating Systems Review  
In this paper, we propose Membrane, a set of changes to the operating system to support restartable file systems.  ...  Membrane allows an operating system to tolerate a broad class of file system failures and does so while remaining transparent to running applications; upon failure, the file system restarts, its state  ...  Applications should not require any modifications to work with restartable file systems.  ... 
doi:10.1145/1740390.1740397 fatcat:ip4fn22dyzel3mt7er5bpbnlqq

Paroxysmal Disorders in Neuropsychiatry: Why Episodic Disorders Must be Accounted For

Vernon M Neppe
2015 Journal of Psychology & Clinical Psychiatry  
Paroxysmal Disorders in Neuropsychiatry: Why Episodic Disorders Must be Accounted For 2/28 Copyright: ©2015 Neppe Citation: Neppe VM (2015) Paroxysmal Disorders in Neuropsychiatry: Why Episodic Disorders  ...  The Research We evaluated the diagnostic and clinical validity, and reliability of the INSET and SOBIN as adjunct to 3-day AEEG compared with anticonvulsant responsiveness, quantitative clinical improvement  ...  Paroxysmal disorders: electrical firing and systems diagnoses (Part 7) Ethically in the healing professions, we try to improve the patient at every level.  ... 
doi:10.15406/jpcpy.2015.03.00165 fatcat:6rop3hputrcaljf3p42moxkup4

Self-healing in modern operating systems

Michael W. Shapiro
2004 Queue  
Unfortunately, with the increasing physical resources available to each system, this approach is inherently wasteful: Why restart a whole system if you can disable a particular processor core, restart  ...  THE ROLE OF THE OPERATING SYSTEM There are three basic forces we can bring to bear on improving the availability of computing services: we can improve the reliability and resiliency of the individual components  ...  His contributions to Solaris include the DTrace D language compiler, kernel panic subsystem, fmd(1M), mdb(1), dumpadm(1M), pgrep(1), pkill(1), and numerous enhancements to the /proc filesystem, core files  ... 
doi:10.1145/1039511.1039537 fatcat:6gshrwj5fnavvknephczd5b2xq

Linux is Growing

Munai Das Udasin
2011 Reason-A Technical Journal  
The article "Linux is Growing" deals with the recent booming growth of the Operating System and justifies its edge over Windows Operating System.  ...  He/she likes without restarting the system or impacting any programs already running.  ...  Operating system crashes (called "kernel panics" in Linux) are rare -many Linux users have never seen a crash.  ... 
doi:10.21843/reas/2011/77-80/108222 fatcat:dt7pvkjlcnemdmbkmtam6d4qgy

Benchmarking the dependability of Windows NT4, 2000 and XP

A. Kalakech, K. Kanoun, Y. Crouzet, J. Arlat
2004 International Conference on Dependable Systems and Networks, 2004  
The aim of this paper is to compare the dependability of three operating systems (Windows NT4, Windows 2000 and Windows XP) with respect to erroneous behavior of the application layer.  ...  The results show a similar behavior of the three OSs with respect to robustness and a noticeable difference in OS reaction and restart times.  ...  They also show that Windows XP has the shortest system call execution time as well as the shortest restart times, both with and without faults.  ... 
doi:10.1109/dsn.2004.1311938 dblp:conf/dsn/KalakechKCA04 fatcat:az3csmcv2ndb5dcqhvc747k7li

Construction of a Highly Dependable Operating System

Jorrit Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew Tanenbaum
2006 2006 Sixth European Dependable Computing Conference  
We also discuss the performance effects of our changes and evaluate how our multiserver design improves operating system dependability over monolithic designs.  ...  -Antoine de Saint-Exupéry [2] The Solution: Proper Fault Isolation One of the key observations of the research reported in this paper is that a powerful technique for increasing system reliability is to  ...  Why do Systems Crash?  ... 
doi:10.1109/edcc.2006.7 dblp:conf/edcc/HerderBGHT06 fatcat:b4sdp6nkffhcfphq7cv26w4j2q

CacheMind: Fast performance recovery using a virtual machine monitor

Kenichi Kourai
2010 2010 International Conference on Dependable Systems and Networks Workshops (DSN-W)  
A virtual machine monitor (VMM) underlying an operating system guarantees that the reused file cache is consistent with the corresponding files on disks.  ...  The warm-cache reboot preserves the file cache on main memory during the reboot and enables an operating system to restore the file cache after the reboot.  ...  When an operating system is rebooted, Rio discards non-dirty cache pages because saving them is not necessary for improving reliability.  ... 
doi:10.1109/dsnw.2010.5542614 dblp:conf/dsn/Kourai10 fatcat:kl2feto2rvbctozaz5ssjhbgxi

Limiting trust in the storage stack

Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
2006 Proceedings of the second ACM workshop on Storage security and survivability - StorageSS '06  
Our study indicates the need to more carefully examine how trust is managed within modern file systems.  ...  It will thus improve the reliability of the system. • Availability.  ...  panic), and (ii) the file system should not indefinitely retry operations thereby wasting system resources.  ... 
doi:10.1145/1179559.1179569 dblp:conf/storagess/BairavasundaramRAA06 fatcat:xs7dxhe57rcq7girvyw4dnkymq

Addressing failures in exascale computing

Marc Snir, Robert W Wisniewski, Jacob A Abraham, Sarita V Adve, Saurabh Bagchi, Pavan Balaji, Jim Belak, Pradip Bose, Franck Cappello, Bill Carlson, Andrew A Chien, Paul Coteus (+16 others)
2014 The international journal of high performance computing applications  
Two key technologies are needed for this approach to be feasible. (1) low SDC frequency (same as now) and low frequency of system failures or an order of magnitude improvement in system recovery time.  ...  The time to restart (which includes the time to restore the system to a consistent state) is MTBF; 3.  ...  While statistics may indicate which subsystem crashed (e.g., file system), they do not indicate why the file system crashed. Therefore, much of the discussion in this section is qualitative.  ... 
doi:10.1177/1094342014522573 fatcat:menonpmgdfflzamz2fsivevxqm

VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing

Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Arun Iyengar
2015 IEEE Transactions on Dependable and Secure Computing  
We also constructed Markov models to study the availability improvements provided by VM-µCheckpoint (from 99% to 99.98% on reasonably reliable hypervisors).  ...  Checkpointing and rollback techniques enhance reliability and availability of virtual machines and their hosted IT services.  ...  Comparing with around 50% overhead in Remus this is great improvement.  ... 
doi:10.1109/tdsc.2014.2327967 fatcat:zlksvmzy2jde5ge6vkf2k4ku5y

Delusional boot

Anh Nguyen, Himanshu Raj, Shravan Rayanchu, Stefan Saroiu, Alec Wolman
2012 Proceedings of the 7th ACM european conference on Computer Systems - EuroSys '12  
Our reliability tests show that Min-V is able to run unmodified Linux and Windows OSes on top of this minimal virtualization interface.  ...  We evaluate Min-V and demonstrate that our security improvements incur no performance overhead except for a small delay during reboot of a guest VM.  ...  Conclusions This paper presents Min-V, a system that improves the security of commodity virtualization systems.  ... 
doi:10.1145/2168836.2168851 dblp:conf/eurosys/NguyenRRSW12 fatcat:mluwzcaodjea7l4nfa3uzrrgom

Load Balancing Tools and Techniques in Cloud Computing: A Systematic Review [chapter]

Mohammad Oqail Ahmad, Rafiqul Zaman Khan
2017 Advances in Intelligent Systems and Computing  
Cloud Computing support virtualization technique over the internet to meet the stretchy demand of the users with less interaction by having service provider.  ...  Several organizations are getting to interest to use cloud computing over period of time, but CC has come into existence with the invention of ARPANET by J.C.R.Licklider in 1960's.  ...  [25] Business User Developer and Deployers System Manager Why use it?  ... 
doi:10.1007/978-981-10-3773-3_18 fatcat:wlqfmfhmfzbwnhg4jqdw3s63ai

Detecting failures in distributed systems with the Falcon spy network

Joshua B. Leners, Hao Wu, Wei-Lun Hung, Marcos K. Aguilera, Michael Walfish
2011 Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles - SOSP '11  
Falcon is thus the first failure detector that is fast, reliable, and viable. As such, it could change the way that a class of distributed systems is built.  ...  This paper presents the design, implementation, and evaluation of Falcon, a failure detector with several features.  ...  This paper was improved by careful, detailed comments by Hari Balakrishnan, Allen Clement, Russ Cox, Trinabh Gupta, Carmel Levy, J.-P.  ... 
doi:10.1145/2043556.2043583 dblp:conf/sosp/LenersWHAW11 fatcat:jfd3shjl6ra5zl4fj27go65xdq

Using Fault Injection to Analyze the Scope of Error Propagation in Linux

Takeshi Yoshimura, Hiroshi Yamada, Kenji Kono
2013 IPSJ Online Transactions  
Operating systems (OSes) are crucial for achieving high availability of computer systems.  ...  defensive coding style contributes to lower rates of error manifestation and kernel-global errors, (2) the scope of error propagation is mostly process-local in Linux, and (3) global propagation occurs with  ...  This experimental environment uses ext3 file system, which is the default configuration of Fedora 8. Real bugs inside the kernel might destroy the file system structure.  ... 
doi:10.2197/ipsjtrans.6.55 fatcat:2tilimfh6zcjdkcueutbemmtim

An analysis on the impact and detection of kernel stack infoleaks

S. Peiró, M. Munoz, A. Crespo
2016 Logic Journal of the IGPL  
Information leaks can improve the attack reliability enabling the attacker to read sensitive kernel data to bypass kernel based protections.  ...  Kernel based attacks require reliability, where kernel attack reliability is achieved through the information gathering stage, where the attacker is able to gather enough information about the target to  ...  as implies a process crash/restart.  ... 
doi:10.1093/jigpal/jzw049 fatcat:lzkffoaqhfghzjv27grue3jhri
« Previous Showing results 1 — 15 out of 685 results