Home | Projects | Publications | Presentations | People | News | Activities | About DCSL | Internal |
Reading Group |
||||
Reading Group on Reliable & Secure System Design |
||||
Here is the schedule for each meeting date. The default meeting time is 11-12:30 pm. For some of the meeting dates, no conference room with our requirement of an LCD projector was available. I will continue working on this to find a suitable venue. I will update the topic and presenter as we go along. | ||||
Dates |
Venue |
Topic/Papers | Presenter(s) | Presentation |
Oct 4 | EE317 | Analytical Modeling & Simulation |
Saurabh Bagchi | |
Oct 11 | MSEE239 | Performability Paper by Meyer et al | ||
Oct 18 | Knoy | |||
Oct 25 | EE317 | |||
Nov 1 | EE317 | |||
Nov 8 | EE317 | |||
Nov 15 | EE317 | |||
Nov 22 | No room available yet | |||
Nov 29 | MSEE239 |
Topics:
Content of the PresentationPay particular emphasis on the following points in your presentation:
Here are some parts that may be of less importance in a reading group presentation such as ours:
Tips for the PresentationHere are some points the presenter should keep in mind and the other participants should use while critiquing the presentation.
For the feedback on the presentation, speak your mind out. Don¡¦t be offensive, but be candid. We are doing this so that we can help each other improve in the way we give presentations. This is a very important skill in all walks of life ¡V industry jobs and academic jobs, and this group is meant to give you a non-threatening environment in which to improve this skill. List of PapersHere is an initial list of a superset of the papers we will look at. We will be sticking to this list for the first few weeks and after that, if students express interest in some other papers on the topic, we will consider those too. Analytical Modeling and SimulationZ. Kalbarczyk, R. K. Iyer, G.L. Ries, J.U. Patel, M.S. Lee, and Y. Xiao Hierarchical Simulation Approach to Accurate Fault Modeling for System Dependability Evaluation,IEEE Transactions on Software Engineering, vol. 25, no.5, September/October 1999, pp.619-632. K. K. Goswami, R. K. Iyer, and L. Young, "DEPEND: A Simulation-Based Environment for System Level Dependability Analysis," IEEE Transactions on Computers, vol. 46, no. 1, Jan. 1997, pp. 60-74. J. F. Meyer, "On Evaluating the Performability of Degradable Computing Systems," IEEE Transactions on Computers, vol. C-29, no.8, Aug. 1980, pp. 720-731. W.H. Sanders and L.M. Malhis, "Dependability Evaluation Using Composed SAN-Based Reward Models," Journal of Parallel and Distributed Computing, Special Issues on Petri Net Models of Parallel and Distributed Computers, vol.15, no.3, 1992, pp.238-254. Dependability MeasurementsR. Iyer, Z. Kalbarczyk, M. Kalyanakrishnam Measurement-Based Analysis of Networked System Avilability, in "Performance Evaluation Origins and Directions," Ed. G. Haring, Ch. Lindemann, M. Reiser, Lecture Notes in Computer Science, Springer Verlag 1999. J. Xu, Z. Kalbarczyk, R. Iyer, Networked Windows NT System Filed Failure Data Analysis, Proc. of Pacific Rim International Symposium on Dependable Computing, PRDC'99, Hong Kong, 1999. S. Chandra and P. Chen, "Whither Generic Recovery from Application Faults?A Fault Study Using Open-Source Software," Proc. International Conference on Dependable Systems, DSN 2000, pp. 97-106. J. Gray, "A Census of Tandem System Availability Between 1985 and 1990," IEEE Transactions on Reliability, vol. 39, no. 4, July 1990, pp. 409-418. ValidationJ. Arlat, et al., "Fault Injection for Dependability Validation: A Methodology and Some Applications," IEEE Transactions on Software Engineering, vol.16, no. 2, Feb. 1990, pp. 166-182. R. K. Shehady and D. P. Siewiorek, "A Method to Automate User Interface Testing Using Variable Finite State Machines," Proc. IEEE Fault-Tolerant Computing Symp., 1997, pp. 80-88. D. Stott, N. Speirs,Z. Kalbarczyk, S. Bagchi, J. Xu, R. K. Iyer, Comparing Fail-Silence Provided by Process Duplication versus Internal Error Detection for DHCP Server, Proc. of Int'l Parallel and Distributed Processing Symposium, IPDPS'01, April 2001, pp. 91-100. Case Studies of Intrusion Detection SystemsWenke Lee and Sal Stolfo, A Framework for Constructing Features and Models for Intrusion Detection Systems ACM Transactions on Information and System Security, Volume 3, Number 4 (November 2000) S. Chen, J. Zu, R. K. Iyer and K. Whisnant. Evaluating the Security Threat of Firewall Data Corruption Caused by Instruction Transient Errors. Proc. International Conference on Dependable Systems, DSN 2002. J. Reynolds, J. Just, E. Lawson, L. Clough, R. Maglich, and K. Levitt. The Design and Implementation of an Intrusion Tolerant System. Proc. International Conference on Dependable Systems, DSN 2002. Readings taken from CS 590-I course on "Introduction to Information Security". http://www.cerias.purdue.edu/homes/spaf/CS590I/index.html#read Case Studies of Reliable System DesignD. Jewett, "Integrity S2: A Fault-tolerant Unix Platform," Proc. IEEE Fault-Tolerant Computing Symp., 1991, pp.512-519. O. Serlin, "Fault-Tolerant Systems in Commercial Applications," IEEE Computer, August, 1984, pp. 19-30. R. W. Horst,, " TNet: A Reliable System Area Network," IEEE Micro, February 1995, pp. 37-45. Error Detection & Control Flow CheckingS. Bagchi, Y. Liu, Z. Kalbarczyk, R. K. Iyer, Y. Levendel, L. Votta, A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller, in Proc. of Conference on Dependable Systems and Networks, DSN'01, July 2001, pp. 225-234. Z. Alkhalifa, V.S.S. Nair, N. Krishnamurthy, and J.A. Abraham, ¡§Design and Evaluation of System-Level Checks for On-Line Control Flow Error Detection,¡¨ IEEE Trans. On Parrallel & Distributed Systems, June 1999, pp. 627-641. J. H. Patel and L. Y. Fung, "Concurrent Error Detection in ALU¡¦s by Recomputing with Shifted Operands, " IEEE Transactions on Computers, vol. C-31, no. 7, July 1982, pp. 589-595. A. Mahmood and E. J. McCluskey, "Concurrent Error Detection Using Watchdog Processors - A Survey," IEEE Transactions on Computers, vol. 37, no. 2, Feb. 1988, pp. 160-174. Checkpointing & RecoveryK. M. Chandy and L. Lamport, "Distributed Snapshots: Determining Global States of Distributed Systems," ACM Transactions on Computer Systems, vol. 3, no. 1, Feb. 1985, pp. 63-75. E. N. Elnozahy and W. Zwaenepoel, "On the Use and Implementation of Message Logging," Proc. IEEE Fault-Tolerant Computing Symp., 1994, pp.298-307. N. Vaidya, "A Case for Two-level Recovery Schemes," IEEE Transactions on Computers, vol. 47, no.6, June 1998, pp. 656-666. R. Prakash, M. Singhal, "Low-cost Checkpointing and Failure Recovery in Mobile Computing Systems,"IEEE Transaction on Parallel and Distributed Systems, vol. 7, no. 10, Oct. 1996, pp. 1035-1048. |
||||||||
Here is the reading group information for other years: | |||||||||
2011 | |||||||||
465 Northwestern Avenue, West Lafayette, IN 47907 | dcsl@ecn.purdue.edu | +1 765 494 3510 |
Home | Projects | Publications | Presentations | People News | Activities | About DCSL | Internal Last Update: August 4, 2011 10:34 by GMHoward |