Hypervisor-based fault tolerance
نویسندگان
چکیده
منابع مشابه
Hypervisor-based Intrusion Detection
Hypervisor-based Intrusion Detection Lionel Litty Master of Science Graduate Department of Computer Science University of Toronto 2005 Unauthorized access by intruders to computer systems is a pervasive and seemingly worsening problem. This research explores the implementation of the Intrusion Sensing and Introspection System (ISIS). ISIS is an Intrusion Detection System (IDS) implemented in a ...
متن کاملFault Tolerance Evaluation Using Two Software Based Fault Injection Methods
A silicon independent C-Based model of the TTP/C protocol was implemented within the EU-founded project FIT. The C-based model is integrated in the C-Sim simulation environment. The main objective of this work is to verify whether the simulation model of the TTP/C protocol behaves in the presence of faults in the same way as the existing hardware prototype implementation. Thus, the experimental...
متن کاملFault-tolerance in HLA-based distributed simulations
Modelling and Simulation (M&S;) is a powerful tool that is used to support training andanalysis of military operations, development of military concepts and gradually, it isbecoming an integral part of modern C3I systems. As the web has evolved, new ways ofcarrying out modelling and simulation and realizing C3I systems have emerged. Theseachievements address some of the research ...
متن کاملSoftware Based Fault Tolerance against Byzantine Failures
The proposed software technique is a very low cost and an effective solution towards designing Byzantine fault tolerant computing application systems that are not so safety critical. It does not rely on multiple versions of software running simultaneously on multiple machines. The proposed software approach is to mask various hardware random errors on adopting the so-called, ESVP (an enhanced s...
متن کاملAutomated Stream-Based Analysis of Fault-Tolerance
A rigorous, automated approach to analyzing fault-tolerance of distributed systems is presented. The method is based on a stream model of computation that incorporates approximation mechanisms. One application is described: a protocol for fault-tolerant moving agents.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: ACM SIGOPS Operating Systems Review
سال: 1995
ISSN: 0163-5980
DOI: 10.1145/224057.224058