{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T19:03:56Z","timestamp":1745003036094,"version":"3.34.0"},"publisher-location":"Boston, MA","reference-count":160,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781402081569"},{"type":"electronic","value":"9781402081576"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-1-4020-8157-6_15","type":"book-chapter","created":{"date-parts":[[2008,4,7]],"date-time":"2008-04-07T16:54:40Z","timestamp":1207587280000},"page":"135-164","source":"Crossref","is-referenced-by-count":1,"title":["The Evolution of Dependable Computing at the University of Illinois"],"prefix":"10.1007","author":[{"given":"R. K.","family":"Iyer","sequence":"first","affiliation":[]},{"given":"W. H.","family":"Sanders","sequence":"additional","affiliation":[]},{"given":"J. H.","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Z.","family":"Kalbarczyk","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"875","DOI":"10.1109\/TC.1981.1675718","volume":"C-30","author":"J. Abraham","year":"1981","unstructured":"J. Abraham, D. Gajski, \u201cDesign of Testable Structures Defined by Simple Loops,\u201d IEEE Trans. on Comp., C-30, 1981, pp. 875\u2013884","journal-title":"IEEE Trans. on Comp"},{"issue":"6","key":"15_CR2","doi-asserted-by":"crossref","first-page":"4339","DOI":"10.1109\/TNS.1983.4333134","volume":"NS-30","author":"J. Abraham","year":"1983","unstructured":"J. Abraham, E. Davidson, J. Patel, \u201cMemory System Design for Tolerating Single-Event Upsets,\u201d IEEE Trans. on Nuclear Science, NS-30,No. 6, 1983, pp. 4339\u20134344.","journal-title":"IEEE Trans. on Nuclear Science"},{"unstructured":"J. Abraham, G. Metze, \u201cRoving Diagnosis for High-Performance Digital Systems,\u201d Proc. Conf. on Information Sciences andSystems, 1978, pp. 221\u2013226.","key":"15_CR3"},{"unstructured":"N. Alewine, K. Fuchs, W-M. Hwu, \u201cApplication of Compiler-Assisted Multiple Instruction Rollback Recovery to Speculative Execution,\u201d Technical Report CRHC-93-16, University of Illinois, 1993.","key":"15_CR4"},{"key":"15_CR5","series-title":"Coordinated Science Laboratory Technical Report","volume-title":"Design of Self-Checking Digital Networks","author":"D. Anderson","year":"1971","unstructured":"D. Anderson, \u201cDesign of Self-Checking Digital Networks,\u201d Coordinated Science Laboratory Technical Report R527, University of Illinois, Urbana, Illinois, 1971."},{"issue":"3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1109\/T-C.1973.223705","volume":"C-22","author":"D. Anderson","year":"1973","unstructured":"D. Anderson, G. Metze, \u201cDesign of Totally Self-Checking Circuits for m-out-of-n Codes,\u201d IEEE Trans. on Comp., C-22,No. 3, 1973, pp. 263\u2013269.","journal-title":"IEEE Trans. on Comp"},{"unstructured":"S. Bagchi, \u201cHierarchical Error Detection in a SIFT Environment,\u201d Ph.D. Thesis, University of Illinois, 2000.","key":"15_CR7"},{"doi-asserted-by":"crossref","unstructured":"S. Bagchi, Y. Liu, Z. Kalbarczyk, R. K. Iyer, Y. Levendel, L. Votta, \u201cA Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller,\u201d Proc. of Conf. on Dependable Systems and Networks, DSN\u201901, July 2001, pp. 225\u2013234.","key":"15_CR8","DOI":"10.1109\/DSN.2001.941408"},{"key":"15_CR9","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MDT.1984.5005655","volume":"1","author":"P. Banerjee","year":"1984","unstructured":"P. Banerjee, J. Abraham, \u201cCharacterization and Testing of Physical Failures in MOS Logic Circuits,\u201d IEEE Design and Test, 1, 1984, pp. 76\u201386","journal-title":"IEEE Design and Test"},{"doi-asserted-by":"crossref","unstructured":"P. Banerjee, J. Abraham, \u201cFault-Secure Algorithms for Multiple Processor Systems,\u201d Proc. 11th Int. Symp. on Computer Architecture, 1984, pp. 279\u2013287.","key":"15_CR10","DOI":"10.1145\/800015.808196"},{"issue":"3","key":"15_CR11","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1109\/TCAD.1985.1270127","volume":"CAD-4","author":"P. Banerjee","year":"1985","unstructured":"P. Banerjee, J. Abraham, \u201cA Multivalued Algebra for Modeling Physical Failures in MOS VLSI Circuits,\u201d IEEE Trans. on Computer-Aided Design, CAD-4,No. 3, 1985, pp. 312\u2013321.","journal-title":"IEEE Trans. on Computer-Aided Design"},{"issue":"4","key":"15_CR12","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1109\/TC.1986.1676762","volume":"C-35","author":"P. Banerjee","year":"1986","unstructured":"P. Banerjee, J. Abraham, \u201cBounds on Algorithm-Based Fault Tolerance in Multiple Processor Systems,\u201d IEEE Trans. on Comp., C-35,No. 4, 1986, pp. 296\u2013306.","journal-title":"IEEE Trans. on Comp"},{"doi-asserted-by":"crossref","unstructured":"H. Bohnenkamp, T. Courtney, D. Daly, S. Derisavi, H. Hermanns, J.-P. Katoen, R. Klaren, V. V. Lam, W. H. Sanders, \u201cOn Integrating the M\u00f6bius and Modest Modeling Tools,\u201d Proc. Int. Conf. on Dependable Systems andNetworks, San Francisco, CA, June 22\u201325, 2003, p. 671.","key":"15_CR13","DOI":"10.1109\/DSN.2003.1209980"},{"doi-asserted-by":"crossref","unstructured":"V. Boppana, W. K. Fuchs, \u201cFault Dictionary Compaction by Output Sequence Removal,\u201d Proc. IEEE\/A CM Conf. Computer-Aided Design, Nov. 1994, pp. 576\u2013579.","key":"15_CR14","DOI":"10.1109\/ICCAD.1994.629878"},{"key":"15_CR15","first-page":"878","volume":"2","author":"W. Carter","year":"1968","unstructured":"W. Carter, P. Schneider, \u201cDesign of Dynamically Checked Computers,\u201d Proc. IFIP Congress 2, 1968, pp. 878\u2013883.","journal-title":"Proc. IFIP Congress"},{"key":"15_CR16","series-title":"Coordinated Science Laboratory Technical Report","volume-title":"Multiple Fault Diagnosis in Combinational Networks","author":"C. Cha","year":"1974","unstructured":"C. Cha, \u201cMultiple Fault Diagnosis in Combinational Networks,\u201d Coordinated Science Laboratory Technical Report R-650, University of Illinois, Urbana, Illinois, 1974."},{"doi-asserted-by":"crossref","unstructured":"R. Chandra, M. Cukier, R. M. Lefever, W. H. Sanders, \u201cDynamic Node Management and Measure Estimation in a State-Driven Fault Injector,\u201d Proc. 19th IEEE Symp. on Reliable Distributed Systems, N\u00fcrnberg, Germany, October 16\u201318, 2000, pp, 248\u2013257.","key":"15_CR17","DOI":"10.1109\/RELDI.2000.885412"},{"doi-asserted-by":"crossref","unstructured":"R. Chandra, R. M. Lefever, M. Cukier, W. H. Sanders, \u201cLoki: A State-Driven Fault Injector for Distributed Systems,\u201d Proc. Int. Conf. on Dependable Systems and Networks (DSN-2000), New York, NY, June 25\u201328, 2000, pp. 237\u2013242.","key":"15_CR18","DOI":"10.1109\/ICDSN.2000.857544"},{"unstructured":"R. Chandra, R. M. Lefever, K. Joshi, M. Cukier, W. H. Sanders, \u201cA Global-State-Triggered Fault Injector for Distributed System Evaluation,\u201d IEEE Trans. on Par. and Dist. Systems, to appear.","key":"15_CR19"},{"key":"15_CR20","volume-title":"Fault Diagnosis of Digital Systems","author":"H. Chang","year":"1970","unstructured":"H. Chang, E. Manning, C. Metze, Fault Diagnosis of Digital Systems, Huntington, NY: Robert E. Krieger Publishing Company, 1970."},{"doi-asserted-by":"crossref","unstructured":"M. Chang, W. Fuchs, J. Patel, \u201cDiagnosis and Repair of Memory with Coupling Faults,\u201d IEEE Trans. Comp., April 1989, pp. 493\u2013500.","key":"15_CR21","DOI":"10.1109\/12.21142"},{"key":"15_CR22","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.peva.2003.07.013","volume":"56","author":"S. Chen","year":"2004","unstructured":"S. Chen, J. Xu, Z. Kalbarczyk, R. K. Iyer, K. Whisnant, \u201cModeling and Evaluating the Security Threats ofTransient Errors in Firewall Software,\u201d Int. Journal on Performance Evaluation, 56, March 2004, pp. 53\u201372.","journal-title":"Int. Journal on Performance Evaluation"},{"doi-asserted-by":"crossref","unstructured":"S. Chen, K. Pattabiraman, Z. Kalbarczyk, R. K. Iyer, \u201cFormal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities Using Pointer Taintedness Semantics,\u201d Proc. 19th IFIP Int\u2019l Information Security Conf. (SEC-2004), held as part of 18th IFIP World Computer Congress, August 2004.","key":"15_CR23","DOI":"10.1007\/1-4020-8143-X_6"},{"unstructured":"S. Chen, Z. Kalbarczyk, J. Xu, R. K. Iyer, \u201cA Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities,\u201d Proc. Int. Conf. on Dependable Systems and Networks, DSN\u201903, June 2003, pp. 605\u2013614.","key":"15_CR24"},{"doi-asserted-by":"crossref","unstructured":"W. Cheng, \u201cThe BACK Algorithm for Sequential Test Generation,\u201d Proc. IEEE Int. Conf. on Computer Design, Oct 1988, pp. 66\u201369.","key":"15_CR25","DOI":"10.1109\/ICCD.1988.25661"},{"unstructured":"W. Cheng, J. Patel, \u201cConcurrent Error Detection in Iterative Logic Arrays,\u201d Proc. 14th Int. Symp. on Fault-Tolerant Computing, 1984, pp. 10\u201315.","key":"15_CR26"},{"unstructured":"W. Cheng, J. Patel, \u201cA Minimum Test Set for Multiple-Fault Detection in Ripple-Carry Adders,\u201d Proc. Int. Conf. on Computer Design, 1985, pp. 435\u2013438.","key":"15_CR27"},{"unstructured":"W. Cheng, J. Patel, \u201cMultiple-Fault Detection in Iterative Logic Arrays,\u201d Proc. Int. Test Conf., 1985, pp. 493\u2013499.","key":"15_CR28"},{"unstructured":"W. Cheng, J. Patel, \u201cA Shortest Length Test Sequence for Sequential-Fault Detection in Ripple Carry Adders,\u201d Proc. Int. Conf. on Computer-Aided Design, 1985, pp. 71\u201373.","key":"15_CR29"},{"unstructured":"R. Chillarege, R. K. Iyer, \u201cFault Latency in the Memory: An Experimental Study on VAX 11\/780,\u201d Proc. 16th Int. Symp. on Fault-Tolerant Computing, 1986.","key":"15_CR30"},{"doi-asserted-by":"crossref","unstructured":"R. Chillarege, R. K. Iyer, \u201cThe Effect of System Workload on Error Latency: An Experimental Study,\u201d Proc. ACM SIGMETRICS Conf. on Measurement and Modeling of Computer Systems, 1985, pp. 69\u201377.","key":"15_CR31","DOI":"10.1145\/317795.317812"},{"unstructured":"A. L. Christensen, \u201cResult Specification and Model Connection in the M\u00f6bius Modeling Framework,\u201d Master\u2019s Thesis, University of Illinois, 2000.","key":"15_CR32"},{"doi-asserted-by":"crossref","unstructured":"G. Clark, T. Courtney, D. Daly, D. Deavours, S. Derisavi, J. M. Doyle, W. H. Sanders, P. Webster, \u201cThe M\u00f6bius Modeling Tool,\u201d Proc. 9th Int. Workshop on Petri Nets and Performance Models, Aachen, Germany, September 11\u201314, 2001, pp. 241\u2013250.","key":"15_CR33","DOI":"10.1109\/PNPM.2001.953373"},{"key":"15_CR34","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/3-540-44804-7_13","volume-title":"Process Algebra and Probabilistic Methods: Performance Modelling and Verification: Proc. Joint Int. Workshop, PAPM-PROBMIV2001","author":"G. Clark","year":"2001","unstructured":"G. Clark, W. H. Sanders, \u201cImplementing a Stochastic Process Algebra within the M\u00f6bius Modeling Framework,\u201d in Luca de Alfaro and Stephen Gilmore (Eds.), Process Algebra and Probabilistic Methods: Performance Modelling and Verification: Proc. Joint Int. Workshop, PAPM-PROBMIV2001, RWTH Aachen, Germany, September 12\u201314, 2001, LNCS no. 2165, Berlin: Springer, 2001, pp. 200\u2013215."},{"unstructured":"T. Courtney, J. Lyons, H. V. Ramasamy, W. H. Sanders, M. Seri, M. Atighetchi, P. Rubel, C. Jones, F. Webber, P. Pal, R. Watro, M. Cukier, J. Gossett, \u201cProviding Intrusion Tolerance with ITUA,\u201d Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23\u201326, 2002, pp. C-5-1\u2013C-5-3.","key":"15_CR35"},{"doi-asserted-by":"crossref","unstructured":"M. Cukier, R. Chandra, D. Henke, J. Pistole, W. H. Sanders, \u201cFault Injection Based on a Partial View of the Global State of a Distributed System,\u201d Proc. 18th IEEE Symp. on Reliable Distributed Systems, Lausanne, Switzerland, October 19\u201322, 1999, pp. 168\u2013177.","key":"15_CR36","DOI":"10.1109\/RELDIS.1999.805093"},{"doi-asserted-by":"crossref","unstructured":"J. Cusey, J. Patel, \u201cBART: A Bridging Fault Test Generator for Sequential Circuits,\u201d Proc. Int. Test Conf., Nov. 1997, pp. 838\u2013847.","key":"15_CR37","DOI":"10.1109\/TEST.1997.639698"},{"unstructured":"D. Daly, P. Buchholz, W. H. Sanders, \u201cAn Approach for Bounding Reward Measures in Markov Models Using Aggregation,\u201d submitted for publication.","key":"15_CR38"},{"unstructured":"T. Davis, R. Kunda, K. Fuchs, \u201cTesting of Bit-Serial Multipliers,\u201d Proc. Int. Conf. on Computer Design, 1985, pp. 430\u2013434.","key":"15_CR39"},{"unstructured":"D. D. Deavours, \u201cFormal Specification of the M\u00f6bius Modeling Framework,\u201d Doctoral Dissertation, University of Illinois, 2001.","key":"15_CR40"},{"issue":"10","key":"15_CR41","doi-asserted-by":"publisher","first-page":"956","DOI":"10.1109\/TSE.2002.1041052","volume":"28","author":"D. D. Deavours","year":"2002","unstructured":"D. D. Deavours, G. Clark, T. Courtney, D. Daly, S. Derisavi, J. M. Doyle, W. H. Sanders, P. G. Webster, \u201cThe M\u00f6bius Framework and Its Implementation,\u201d IEEE Trans. on Software Eng., 28,No. 10, October 2002, pp. 956\u2013969.","journal-title":"IEEE Trans. on Software Eng."},{"doi-asserted-by":"crossref","unstructured":"D. D. Deavours, W. H. Sanders, \u201cThe M\u00f6bius Execution Policy,\u201d Proc. 9th Int. Workshop on Petri Nets and Performance Models, Aachen, Germany, September 11\u201314, 2001, pp. 135\u2013144.","key":"15_CR42","DOI":"10.1109\/PNPM.2001.953363"},{"doi-asserted-by":"crossref","unstructured":"D. D. Deavours, W. H. Sanders, \u201cM\u00f6bius: Framework and Atomic Models,\u201d ibid., pp. 251\u2013260.","key":"15_CR43","DOI":"10.1109\/PNPM.2001.953374"},{"unstructured":"S. Derisavi, P. Kemper, W. H. Sanders, \u201cSymbolic State-space Exploration and Numerical Analysis of State-sharing Composed Models,\u201d Proc. 4th Int. Conf. on the Numerical Solution of Markov Chains, Urbana, IL, USA, Sept, 3\u20135, 2003, pp. 167\u2013189.","key":"15_CR44"},{"doi-asserted-by":"crossref","unstructured":"S. Derisavi, P. Kemper, W. H. Sanders, \u201cSymbolic State-space Exploration and Numerical Analysis of State-sharing Composed Models,\u201d Linear Algebra and Its Applications (LAA), to appear.","key":"15_CR45","DOI":"10.1016\/j.laa.2004.01.006"},{"issue":"2","key":"15_CR46","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/S0166-5316(03)00070-1","volume":"54","author":"S. Derisavi","year":"2003","unstructured":"S. Derisavi, P. Kemper, W. H. Sanders, T. Courtney, \u201cThe M\u00f6bius State-level Abstract Functional Interface,\u201d Performance Evaluation, 54,No. 2, October 2003, pp. 105\u2013128.","journal-title":"Performance Evaluation"},{"doi-asserted-by":"crossref","unstructured":"Y. Deswarte, L. Blain, J. C. Fabre, \u201cIntrusion Tolerance in Distributed Computing Systems,\u201d Proc. IEEE Symp. on Research in Security & Privacy, May 1991, pp. 110\u2013121.","key":"15_CR47","DOI":"10.1109\/RISP.1991.130780"},{"key":"15_CR48","series-title":"Coordinated Science Lab. Technical Report","volume-title":"On the Design of Self-Checking Systems under Various Fault Models","author":"J. Dussault","year":"1977","unstructured":"J. Dussault, \u201cOn the Design of Self-Checking Systems under Various Fault Models,\u201d Coordinated Science Lab. Technical Report R-781, Univ. of Illinois, Urbana, IL, 1977."},{"doi-asserted-by":"crossref","unstructured":"B. Dutertre, V. Crettaz, V. Stavridou, \u201cIntrusion-tolerant Enclaves,\u201d Proc. IEEE Int. Symp. on Security & Privacy, Oakland, CA, May 2002, pp. 216\u2013224.","key":"15_CR49","DOI":"10.1109\/SECPRI.2002.1004373"},{"issue":"3","key":"15_CR50","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MC.1980.1653532","volume":"13","author":"A. Friedman","year":"1980","unstructured":"A. Friedman, L. Simoncini, \u201cSystem-Level Fault Diagnosis,\u201d Computer (Spec. Issue on Fault-Tolerant Computing), 13,No. 3, 1980, pp. 47\u201353.","journal-title":"Computer"},{"issue":"1","key":"15_CR51","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/12.559803","volume":"46","author":"K. Goswami","year":"1997","unstructured":"K. Goswami, R. K. Iyer, L. Young, \u201cDEPEND: A Simulation-Based Environment for System Level Dependability Analysis,\u201d IEEE Trans. on Comp., vol. 46,no. 1, 1997, pp.60\u201374.","journal-title":"IEEE Trans. on Comp."},{"doi-asserted-by":"crossref","unstructured":"G. Greenstein, J. Patel, \u201cE-PROOFS: A CMOS Bridging Fault Simulator,\u201d Proc. IEEE\/ACM Conf. on Computer-AidedDesign, Nov. 1992, pp. 268\u2013271.","key":"15_CR52","DOI":"10.1109\/ICCAD.1992.279362"},{"unstructured":"W. Gu, Z. Kalbarczyk, R. K. Iyer, \u201cError Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors,\u201d Proc. Conf. on Dependable Systems & Networks, DSN\u201904, June 2004.","key":"15_CR53"},{"unstructured":"W. Gu, Z. Kalbarczyk, R.K. Iyer, Z. Yang, \u201cCharacterization of Linux Kernel Behavior under Errors,\u201d Proc. Conf. on Dependable Systems & Networks, DSN\u201903, June 2003, pp. 459\u2013468.","key":"15_CR54"},{"doi-asserted-by":"crossref","unstructured":"J. Gunnels, D. Katz, E. Quintana-Orti, R. van de Geijn, \u201cFault-Tolerant High-Performance Matrix Multiplication: Theory and Practice,\u201d Proc. Conf. on Dependable Systems andNetworks, DSN\u201901, July 2001, pp. 47\u201356.","key":"15_CR55","DOI":"10.1109\/DSN.2001.941390"},{"key":"15_CR56","first-page":"81","volume-title":"LNCS","author":"V. Gupta","year":"2003","unstructured":"V. Gupta, V. Lam, H. V. Ramasamy, W. H. Sanders, S. Singh, \u201cDependability and Performance Evaluation of Intrusion-Tolerant Server Architectures,\u201d Dependable Computing: Proc. First Latin-American Symposium (LADC 2003), S\u00e3o Paulo, Brazil, October 21\u201324, 2003, LNCS vol. 2847 (Rog\u2019erio de Lemos, Taisy Silva Weber, and Jo\u00e3o Batista Camargo Jr., eds), Berlin: Springer, 2003, pp. 81\u2013101."},{"doi-asserted-by":"crossref","unstructured":"I. Hamzaoglu, J. Patel, \u201cTest Set Compaction Algorithms for Combinational Circuits,\u201d Proc. IEEE\/ACM Int. Conf. Computer-Aided Design, Nov. 1998, pp. 283\u2013289.","key":"15_CR57","DOI":"10.1145\/288548.288615"},{"doi-asserted-by":"crossref","unstructured":"I. Hamzaoglu, J. Patel, \u201cReducing Test Application Time for Full Scan Embedded Cores,\u201d Proc. 29th Int. Symp. on Fault-Tolerant Computing, June 1999, pp. 260\u2013267.","key":"15_CR58","DOI":"10.1109\/FTCS.1999.781060"},{"doi-asserted-by":"crossref","unstructured":"I. Hartanto, V. Boppana, W. Fuchs, J. Patel, \u201cDiagnostic Test Generation for Sequential Circuits,\u201d Proc. IEEE VLSI Test Symp., April 1997, pp. 196\u2013202.","key":"15_CR59","DOI":"10.1109\/VTEST.1997.600264"},{"key":"15_CR60","doi-asserted-by":"publisher","first-page":"1496","DOI":"10.1109\/T-C.1971.223162","volume":"C-20","author":"J. Hayes","year":"1971","unstructured":"J. Hayes, \u201cA NAND Model for Fault Diagnosis in Combinational Logic Networks,\u201d IEEETrans. on Comp., C-20, 1971, pp. 1496\u20131506.","journal-title":"IEEETrans. on Comp."},{"doi-asserted-by":"crossref","unstructured":"F. Hsu, K. Butter, J. Patel, \u201cA Case Study on the Implementation of the Illinois Scan Architecture,\u201d Proc. Int. Test Conf., Oct-Nov 2001, pp. 538\u2013547.","key":"15_CR61","DOI":"10.1109\/TEST.2001.966672"},{"unstructured":"K. Huang, J. Abraham, \u201cLow-Cost Schemes for Fault Tolerance in Matrix Operations with Array Processors,\u201d Proc. 12th Int. Symp. on Fault-Tolerant Computing, 1982, pp. 330\u2013337.","key":"15_CR62"},{"key":"15_CR63","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TC.1984.1676475","volume":"C-33","author":"K. Huang","year":"1984","unstructured":"K. Huang, J. Abraham, \u201cAlgorithm-Based Fault Tolerance for Matrix Operations,\u201d IEEE Trans. on Comp. (Spec. Issue Reliable & Fault-Tolerant Comp.), C-33, 1984, pp. 518\u2013528.","journal-title":"IEEE Trans. on Comp."},{"unstructured":"K. Huang, J. Abraham, \u201cFault-Tolerant Algorithms and their Applications to Solving Laplace Equations,\u201d Proc. Int. Conf. on Parallel Processing, 1984, pp. 117\u2013122.","key":"15_CR64"},{"doi-asserted-by":"crossref","unstructured":"R. K. Iyer, D. Rossetti, \u201cA Measurement-Based Model for Workload Dependency of CPU Errors,\u201d IEEE Trans. on Comp., C-35,No. 6, 1986.","key":"15_CR65","DOI":"10.1109\/TC.1986.5009428"},{"doi-asserted-by":"crossref","unstructured":"R. K. Iyer, D. Rossetti, \u201cEffect of System Workload on Operating System Reliability: A Study on the IBM 3081,\u201d IEEE Trans. on Software Eng. (Spec. Issue Software Reliability, Part 1), 1985, pp. 1438\u20131448.","key":"15_CR66","DOI":"10.1109\/TSE.1985.232180"},{"unstructured":"I. Jansch, B. Courtois, \u201cStrongly Language Disjoint Checkers,\u201d Proc. 15th Int. Symp. on Fault-Tolerant Computing, 1985, pp. 390\u2013395.","key":"15_CR67"},{"doi-asserted-by":"crossref","unstructured":"H. S. Javitz, A. Valdes, \u201cThe SRI IDES Statistical Anomaly Detector,\u201d Proc. IEEE Symp. on Research in Security and Privacy, Oakland, CA, May 1991, pp. 316\u2013376.","key":"15_CR68","DOI":"10.1109\/RISP.1991.130799"},{"doi-asserted-by":"crossref","unstructured":"K. R. Joshi, M. Cukier, W. H. Sanders, \u201cExperimental Evaluation of the Unavailability Induced by a Group Membership Protocol,\u201d Dependable Computing EDCC-4: Proc. 4 th European Dependable Computing Conf., Toulouse, France, Oct 23\u201325, 2002, pp. 140\u2013158.","key":"15_CR69","DOI":"10.1007\/3-540-36080-8_15"},{"doi-asserted-by":"crossref","unstructured":"J. Jou, J. Abraham, \u201cFault-Tolerant Matrix Operations on Multiple Processor Systems Using Weighted Checksums,\u201d Proc. SPIE Conf., 1984, pp. 94\u2013101.","key":"15_CR70","DOI":"10.1117\/12.944013"},{"unstructured":"J. Jou, J. Abraham, \u201cFault-Tolerant FFT Networks,\u201d Proc. Int. Symp. on Fault-Tolerant Computing, 1985, pp. 338\u2013343.","key":"15_CR71"},{"issue":"6","key":"15_CR72","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1109\/71.774907","volume":"10","author":"Z. Kalbarczyk","year":"1999","unstructured":"Z. Kalbarczyk, R. K. Iyer, S. Bagchi, K. Whisnant, \u201cChameleon: A Software Infrastructure for Adaptive Fault Tolerance,\u201d IEEE Trans. on Par. andDist. Systems, 10,No. 6, June 1999, pp. 560\u2013579.","journal-title":"IEEE Trans. on Par. andDist. Systems"},{"doi-asserted-by":"crossref","unstructured":"M. Kalyanakrishnam, R. K. Iyer, J. Patel, \u201cReliability of Internet Hosts: A Case Study from End User\u2019s Perspective,\u201d Proc. 6th Int. Conf. on Computer Communications and Networks, Las Vegas, 1996, pp. 418\u2013423.","key":"15_CR73","DOI":"10.1109\/ICCCN.1997.623345"},{"doi-asserted-by":"crossref","unstructured":"M. Kalyanakrishnam, Z. Kalbarczyk, R. Iyer, \u201cFailure Data Analysis of LAN of Windows NT Based Computers,\u201d Proc. of 18th Symp. on Reliable and Distributed Systems, SRDS\u2019 99, Lausanne, Switzerland, 1999, pp. 178\u2013187.","key":"15_CR74","DOI":"10.1109\/RELDIS.1999.805094"},{"unstructured":"S. Krishnamurthy, \u201cAn Adaptive Quality of Service Aware Middleware for Replicated Services,\u201d Ph.D. Thesis, University of Illinois, 2002.","key":"15_CR75"},{"issue":"11","key":"15_CR76","doi-asserted-by":"publisher","first-page":"1112","DOI":"10.1109\/TPDS.2003.1247672","volume":"14","author":"S. Krishnamurthy","year":"2003","unstructured":"S. Krishnamurthy, W. H. Sanders, M. Cukier, \u201cAn Adaptive Quality of Service Aware Middleware for Replicated Services,\u201d IEEE Trans. on Par. and Dist. Systems, 14,No. 11, November 2003, pp. 1112\u20131125.","journal-title":"IEEE Trans. on Par. and Dist. Systems"},{"doi-asserted-by":"crossref","unstructured":"S. Kuo, K. Fuchs, \u201cEfficient Spare Allocation in Reconfigurable Arrays,\u201d IEEE Design and Test, Feb. 1987, pp. 24\u201331.","key":"15_CR77","DOI":"10.1109\/MDT.1987.295111"},{"unstructured":"S. Laha, J. Patel, \u201cError Correction in Arithmetic Operations using Time Redundancy,\u201d Proc. 13th Int. Symp. on Fault-Tolerant Computing, 1983, pp. 298\u2013305.","key":"15_CR78"},{"doi-asserted-by":"crossref","unstructured":"V. V. Lam, P. Buchholz, W. H. Sanders, \u201cA Structured Path-Based Approach for Computing Transient Rewards of Large CTMCs,\u201d Proc. 2004 Int. Conf. on Quantitative Evaluation of Systems (QEST), Twente, The Netherlands, September 27\u201330, 2004.","key":"15_CR79","DOI":"10.1109\/QEST.2004.1348028"},{"doi-asserted-by":"crossref","unstructured":"C. Landwehr, \u201cFormal Models for Computer Security,\u201d Computer Surveys, 13,No. 3, Sept. 1981.","key":"15_CR80","DOI":"10.1145\/356850.356852"},{"doi-asserted-by":"crossref","unstructured":"R. M. Lefever, M. Cukier, W. H. Sanders, \u201cAn Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System,\u201d Proc. 22nd Int. Symp. on Reliable Distributed Systems (SRDS\u201903), Florence, Italy, October 6\u20138, 2003, pp. 273\u2013282.","key":"15_CR81","DOI":"10.1109\/RELDIS.2003.1238077"},{"issue":"2-3","key":"15_CR82","doi-asserted-by":"crossref","first-page":"211","DOI":"10.3233\/JCS-1993-22-308","volume":"2","author":"B. Littlewood","year":"1993","unstructured":"B. Littlewood, S. Brocklehurst, N. Fenton, P. Mellor, S. Page, D. Wright, J. Dobson, J. McDermid, D. Gollmann, \u201cTowards Operational Measures of Computer Security,\u201d Journal of Computer Security, vol. 2,no. 2-3, pp. 211\u2013229, 1993.","journal-title":"Journal of Computer Security"},{"doi-asserted-by":"crossref","unstructured":"J. Lowry, \u201cAn Initial Foray into Understanding Adversary Planning and Courses of Action,\u201d Proc. DARPA Information Survivability Conf. and Exposition II (DISCEX\u201901), pp. 123\u2013133, 2001.","key":"15_CR83","DOI":"10.1109\/DISCEX.2001.932201"},{"doi-asserted-by":"crossref","unstructured":"F. Luk, \u201cAlgorithm-Based Fault Tolerance for Parallel Matrix Equation Solvers,\u201d Proc. SPIE Conf. (Real-Time Signal Processing VIII), 564, 1985.","key":"15_CR84","DOI":"10.1117\/12.949703"},{"unstructured":"L. Malhis, \u201cDevelopment and Application of an Efficient Method for the Solution of Stochastic Activity Networks with Deterministic Activities,\u201d Doctoral Dissertation, University of Arizona, 1996.","key":"15_CR85"},{"doi-asserted-by":"crossref","unstructured":"L. Malhis and W. H. Sanders, \u201cAn Efficient Two-Stage Iterative Method for the Steady-State Analysis of Markov Regenerative Stochastic Petri Net Models,\u201d Performance Evaluation, 27&28, October 1996, pp. 583\u2013601.","key":"15_CR86","DOI":"10.1016\/S0166-5316(96)90047-4"},{"key":"15_CR87","doi-asserted-by":"publisher","first-page":"873","DOI":"10.1109\/PGEC.1966.264468","volume":"EC-15","author":"E. Manning","year":"1966","unstructured":"E. Manning, \u201cOn Computer Self-Diagnosis: Part I and II,\u201d IEEE Trans. Electronic Comp., EC-15, 1966, pp. 873\u2013890.","journal-title":"IEEE Trans. Electronic Comp."},{"doi-asserted-by":"crossref","unstructured":"R. Marlett, \u201cAn Effective Test Generation System for Sequential Circuits,\u201d Proc. Design Automation Conf., June 1986, pp. 250\u2013256.","key":"15_CR88","DOI":"10.1109\/DAC.1986.1586097"},{"key":"15_CR89","series-title":"Coordinated Science Laboratory Technical Report","volume-title":"On the Design and Testing of Self-Diagnosable Computers","author":"R. Marlett","year":"1966","unstructured":"R. Marlett, \u201cOn the Design and Testing of Self-Diagnosable Computers,\u201d Coordinated Science Laboratory Technical Report R-293, University of Illinois, Urbana, IL, 1966."},{"key":"15_CR90","doi-asserted-by":"publisher","first-page":"1286","DOI":"10.1109\/T-C.1971.223129","volume":"C-20","author":"E. McCluskey","year":"1971","unstructured":"E. McCluskey, F. Clegg, \u201cFault Equivalence in Combinational Logic Networks,\u201d IEEE Trans. on Comp., C-20, 1971, pp. 1286\u20131293.","journal-title":"IEEE Trans. on Comp."},{"doi-asserted-by":"crossref","unstructured":"R. Meagher, J. Nash, \u201cThe ORDVAC,\u201d Review of Electronic Digital Computers, 1952, pp. 37\u201343.","key":"15_CR91","DOI":"10.1145\/1434770.1434776"},{"unstructured":"D. Muller, J. Bartky, \u201cA Theory of Asynchronous Circuits,\u201d Proc. Int. Symp. on Theory of Switching, 1959, pp. 204\u2013243.","key":"15_CR92"},{"issue":"6","key":"15_CR93","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1109\/TC.1978.1675150","volume":"C-27","author":"R. Nair","year":"1978","unstructured":"R. Nair, S. Thatte, J. Abraham, \u201cEfficient Algorithms for Testing Semiconductor Random-Access Memories,\u201d IEEE Trans. on Comp., C-27,No. 6, 1978, pp. 572\u2013576.","journal-title":"IEEE Trans. on Comp."},{"doi-asserted-by":"crossref","unstructured":"N. Nakka, J. Xu, Z. Kalbarczyk, R. K. Iyer, \u201cAn Architectural Framework for Providing Reliability and Security Support,\u201d Proc. Conf. on Dependable Systems and Networks, DSN\u201904, June 2004.","key":"15_CR94","DOI":"10.1109\/DSN.2004.1311929"},{"doi-asserted-by":"crossref","unstructured":"N. Neves, K. Fuchs, \u201cCoordinated Checkpointing Without Direct Coordination,\u201d Proc. Int. Computer Performance and Dependability Symp. (IPDS), 1998.","key":"15_CR95","DOI":"10.21236\/ADA348851"},{"doi-asserted-by":"crossref","unstructured":"N. Neves, K. Fuchs, \u201cRENEW: A Tool for Fast and Efficient Implementation of Checkpoint Protocols,\u201d Proc. 28th Int. Symp. on Fault-Tolerant Computing, 1998, pp.58\u201367.","key":"15_CR96","DOI":"10.1109\/FTCS.1998.689455"},{"doi-asserted-by":"crossref","unstructured":"T. Niermann, J. Patel, \u201cHITEC: A Test Generation Package for Sequential Circuits,\u201d Proc. European Design Automation Conf., Feb. 2001, pp. 214\u2013218.","key":"15_CR97","DOI":"10.1109\/EDAC.1991.206393"},{"doi-asserted-by":"crossref","unstructured":"T. Niermann, W. Cheng and J. Patel, \u201cPROOFS: A Fast Memory Efficient Sequential Circuit Fault Simulator,\u201d IEEE Trans. On Computer-Aided Design, Feb. 1992, pp. 198\u2013207.","key":"15_CR98","DOI":"10.1109\/43.124398"},{"unstructured":"W. D. Obal II, \u201cMeasure-Adaptive State-Space Construction Methods,\u201d Doctoral Dissertation, University of Arizona, 1998.","key":"15_CR99"},{"doi-asserted-by":"crossref","unstructured":"W. D. Obal II, W. H. Sanders, \u201cAn Environment for Importance Sampling Based on Stochastic Activity Networks,\u201d Proc. 13th Symp. on Reliable Distributed Systems, Dana Point, CA, October, 1994, pp. 64\u201373.","key":"15_CR100","DOI":"10.1109\/RELDIS.1994.336908"},{"doi-asserted-by":"crossref","unstructured":"W. D. Obal II, W. H. Sanders, \u201cState-Space Support for Path-based Reward Variables,\u201d Proc. Int. Computer Performance and Dependability Symp. (IPDS), September 7\u20139, 1998, Durham, North Carolina, USA, pp. 228\u2013237.","key":"15_CR101","DOI":"10.1109\/IPDS.1998.707725"},{"key":"15_CR102","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/S0166-5316(99)00010-3","volume":"35","author":"W. D. Obal II","year":"1999","unstructured":"W. D. Obal II, W. H. Sanders, \u201cState-Space Support for Path-based Reward Variables,\u201d Performance Evaluation, 35, 1999, pp. 233\u2013251.","journal-title":"Performance Evaluation"},{"doi-asserted-by":"crossref","unstructured":"P. Pal, F. Webber, R. Schantz, J. Loyall, R. Watro, W. Sanders, M. Cukier, J. Gossett, \u201cSurvival by Defense-Enabling,\u201d Proc. New Security Paradigms Workshop 2001, Cloudcroft, New Mexico, September 11\u201313, 2001, pp. 71\u201378.","key":"15_CR103","DOI":"10.1145\/508171.508183"},{"key":"15_CR104","doi-asserted-by":"publisher","first-page":"589","DOI":"10.1109\/TC.1982.1676055","volume":"C-31","author":"J. Patel","year":"1982","unstructured":"J. Patel, L. Fung, \u201cConcurrent Error Detection in ALUs by Recomputing with Shifted Operands,\u201d IEEE Trans. onComp., C-31, 1982, pp. 589\u2013595.","journal-title":"IEEE Trans. onComp."},{"key":"15_CR105","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1109\/TC.1983.1676246","volume":"C-32","author":"J. Patel","year":"1983","unstructured":"J. Patel, L. Fung, \u201cConcurrent Error Detection in Multiply and Divide Arrays,\u201d IEEE Trans. on Comp., C-32, 1983, pp. 417\u2013422.","journal-title":"IEEE Trans. on Comp."},{"doi-asserted-by":"crossref","unstructured":"C. Payne, T. Markham, \u201cArchitecture and Applications for a Distributed Embedded Firewall,\u201d Proc. 17th Annual Computer Security Applications Conf. (ACSAC\u201901), New Orleans, Louisiana, October 2001.","key":"15_CR106","DOI":"10.1109\/ACSAC.2001.991548"},{"unstructured":"L. Pollard and J. Patel, \u201cCorrection of Errors in Data Transmission using Time Redundancy,\u201d Proc. 13th Int. Symp. on Fault-Tolerant Computing, 1983, pp. 314\u2013317.","key":"15_CR107"},{"issue":"6","key":"15_CR108","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1109\/PGEC.1967.264747","volume":"EC-16","author":"F. Preparata","year":"1967","unstructured":"F. Preparata, G. Metze, R. Chien, \u201cOn the Connection Assignment Problem of Diagnosable Systems,\u201d IEEE Trans. on Electronic Comp., EC-16,No. 6, 1967, pp. 848\u2013854.","journal-title":"IEEE Trans. on Electronic Comp."},{"unstructured":"M. A. Qureshi, \u201cConstruction and Solution of Markov Reward Models,\u201d Doctoral Dissertation, University of Arizona, 1996.","key":"15_CR109"},{"doi-asserted-by":"crossref","unstructured":"M. A. Qureshi, W. H. Sanders, \u201cA New Methodology for Calculating Distributions of Reward Accumulated During a Finite Interval,\u201d Proc. 26th Int. Symp. on Fault-Tolerant Computing, Sendai, Japan, June 1996, pp. 116\u2013125.","key":"15_CR110","DOI":"10.1109\/FTCS.1996.534600"},{"issue":"12","key":"15_CR111","first-page":"2612","volume":"E86-D","author":"H. V. Ramasamy","year":"2003","unstructured":"H. V. Ramasamy, M. Cukier, W. H. Sanders, \u201cFormal Verification of an Intrusion-Tolerant Group Membership Protocol,\u201d IEICE Trans. on Information and Systems Spec. issue on Dependable Computing, E86-D,No. 12, December 2003, pp. 2612\u20132622.","journal-title":"IEICE Trans. on Information and Systems Spec. issue on Dependable Computing"},{"doi-asserted-by":"crossref","unstructured":"H.V. Ramasamy, P. Pandey, J. Lyons, M. Cukier, W.H. Sanders, \u201cQuantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems,\u201d Proc. Int. Conf. on Dependable Systems & Networks (DSN\u201902), Washington, DC, June 23\u201326, 2002, pp. 229\u2013238.","key":"15_CR112","DOI":"10.1109\/DSN.2002.1028904"},{"doi-asserted-by":"crossref","unstructured":"J. Rearick, J. Patel, \u201cFast and Accurate CMOS Bridging Fault Simulation,\u201d Proc. Int. Test Conf., Oct. 1993, pp. 54\u201362.","key":"15_CR113","DOI":"10.1109\/TEST.1993.470718"},{"unstructured":"Y. Ren, \u201cAQuA: A Framework for Providing Adaptive Fault Tolerance to Distributed Applications,\u201d Ph.D. thesis, University oflllinois at Urbana-Champaign, 2001.","key":"15_CR114"},{"issue":"1","key":"15_CR115","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TC.2003.1159752","volume":"52","author":"Y.J. Ren","year":"2003","unstructured":"Y.(J.) Ren, D.E. Bakken, T. Courtney, M. Cukier, D.A. Karr, P. Rubel, C. Sabnis, W.H. Sanders, R.E. Schantz, M. Seri, \u201cAQuA: An Adaptive Architecture that Provides Dependable Distributed Objects,\u201d IEEE Trans. on Comp., 52,No. 1, January 2003, pp. 31\u201350.","journal-title":"IEEE Trans. on Comp."},{"issue":"2","key":"15_CR116","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/71.910872","volume":"12","author":"Y. Ren","year":"2001","unstructured":"Y. Ren, M, Cukier, W.H. Sanders, \u201cAn Adaptive Algorithm for Tolerating Value Faults and Crash Failures,\u201d IEEETrans. on Par. & Dist. Systems, 12,No. 2, Feb. 2001, pp. 173\u2013192.","journal-title":"IEEETrans. on Par. & Dist. Systems"},{"key":"15_CR117","doi-asserted-by":"publisher","first-page":"1093","DOI":"10.1109\/TC.1978.1675011","volume":"C-27","author":"D. Reynolds","year":"1978","unstructured":"D. Reynolds, C. Metze, \u201cFault Detection Capabilities of Alternating Logic,\u201d IEEE Trans. on Comp., C-27, 1978, pp. 1093\u20131098.","journal-title":"IEEE Trans. on Comp."},{"doi-asserted-by":"crossref","unstructured":"P. Ryan, S. Rawat, W. Fuchs, \u201cTwo-stage Fault Location,\u201d Proc. Int. Test Conf., Oct. 1991, pp. 963\u2013968.","key":"15_CR118","DOI":"10.1109\/TEST.1991.519762"},{"key":"15_CR119","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1109\/DCFTS.1999.814294","volume-title":"Dependable Computing for Critical Applications 7","author":"C. Sabnis","year":"1999","unstructured":"C. Sabnis, M. Cukier, J. Ren, P. Rubel, W. H. Sanders, D. E. Bakken, D. A. Karr, \u201cProteus: A Flexible Infrastructure to Implement Adaptive Fault Tolerance in AQuA,\u201d in C. B. Weinstock and J. Rushby (Eds.), Dependable Computing for Critical Applications 7, vol. 12 in Dependable Computing and Fault-Tolerant Systems (A. Avizienis, H. Kopetz, and J. C. Laprie, Eds.), pp. 149\u2013168. Los Alamitos, CA: IEEE CS, 1999."},{"doi-asserted-by":"crossref","unstructured":"A. Saleh, J. Serrano, J. Patel, \u201cReliability of Scrubbing Recovery Techniques for Memory Systems,\u201d IEEE Trans. on Reliability, April 1990, pp. 114\u2013122.","key":"15_CR120","DOI":"10.1109\/24.52622"},{"unstructured":"W. H. Sanders, \u201cConstruction and Solution of Performability Models Based on Stochastic Activity Networks,\u201d Doctoral Dissertation, University of Michigan, 1988.","key":"15_CR121"},{"doi-asserted-by":"crossref","unstructured":"W. H. Sanders, \u201cIntegrated Frameworks for Multi-Level and Multi-Formalism Modeling,\u201d Proc. of PNPM\u201999: 8th Int. Workshop on Petri Nets and Performance Models, Zaragoza, Spain, September 8\u201310, 1999, pp. 2\u20139.","key":"15_CR122","DOI":"10.1109\/PNPM.1999.796527"},{"unstructured":"W. H. Sanders, M. Cukier, F. Webber, P. Pal, R. Watro, \u201cProbabilistic Validation of Intrusion Tolerance,\u201d Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23\u201326, 2002, pp. B-78\u2013B-79.","key":"15_CR123"},{"issue":"2\/3","key":"15_CR124","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/BF01439852","volume":"3","author":"W. H. Sanders","year":"1993","unstructured":"W. H. Sanders, R. S. Freire, \u201cEfficient Simulation of Hierarchical Stochastic Activity Network Models,\u201d Discrete Event Dynamic Systems: Theory and Applications, 3,No. 2\/3, July 1993, pp. 271\u2013300.","journal-title":"Discrete Event Dynamic Systems: Theory and Applications"},{"issue":"1","key":"15_CR125","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/49.64901","volume":"9","author":"W. H. Sanders","year":"1991","unstructured":"W. H. Sanders, J. F. Meyer, \u201cReduced Base Model Construction Methods for Stochastic Activity Networks,\u201d IEEE Journal on Selected Areas in Communications, special issue on Computer-Aided Modeling, Analysis, and Design of Communication Networks, vol. 9,no. 1, Jan. 1991, pp. 25\u201336.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"15_CR126","series-title":"Revised Lectures, LNCS","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/3-540-44667-2_9","volume-title":"Lectures on Formal Methods and Performance Analysis","author":"W. H. Sanders","year":"2001","unstructured":"W. H. Sanders, J. F. Meyer, \u201cStochastic Activity Networks: Formal Definitions and Concepts,\u201d in E. Brinksma, H. Hermanns, and J. P. Katoen (Eds.), Lectures on Formal Methods and Performance Analysis, First EEF\/Euro Summer School on Trends in Computer Science, Berg en Dal, The Netherlands, July 3\u20137, 2000, Revised Lectures, LNCS no. 2090, pp. 315\u2013343. Berlin: Springer, 2001."},{"doi-asserted-by":"crossref","unstructured":"W. H. Sanders, J. F. Meyer, \u201cA Unified Approach for Specifying Measures of Performance, Dependability, and Performability,\u201d Dependable Computing for Critical Applications, Vol. 4 of Dependable Computing and Fault-Tolerant Systems (ed. A. Avizienis, H. Kopetz, and J. Laprie), Springer-Verlag, 1991, pp. 215\u2013237.","key":"15_CR127","DOI":"10.1007\/978-3-7091-9123-1_10"},{"issue":"1","key":"15_CR128","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/0166-5316(95)00012-M","volume":"24","author":"W.H. Sanders","year":"1995","unstructured":"W.H. Sanders, W.D. Obal II, M.A. Qureshi, F.K. Widjanarko, \u201cThe UltraSANModeling Environment,\u201d Performance Evaluation, 24,No. 1, Oct.\u2013Nov. 1995, pp. 89\u2013115.","journal-title":"Performance Evaluation"},{"issue":"8","key":"15_CR129","doi-asserted-by":"crossref","first-page":"858","DOI":"10.1109\/TC.1972.5009041","volume":"C-21","author":"D. Schertz","year":"1972","unstructured":"D. Schertz, G. Metze, \u201cA New Representation for Faults in Combinational Digital Circuits,\u201d IEEE Trans. on Comp., C-21,No. 8, 1972, pp. 858\u2013866.","journal-title":"IEEE Trans. on Comp."},{"key":"15_CR130","series-title":"Coordinated Science Laboratory Technical Report","volume-title":"On the Representation of Digital Faults","author":"D. Schertz","year":"1969","unstructured":"D. Schertz, \u201cOn the Representation of Digital Faults,\u201d Coordinated Science Laboratory Technical Report R418, University of Illinois, Urbana, Illinois, 1969."},{"unstructured":"D. Schertz, G. Metze, \u201cOn the Indistinguishability of Faults in Digital Systems,\u201d Proc. 6th Ann. Allerton Conf. on Circuit and System Theory, 1968, pp. 752\u2013760.","key":"15_CR131"},{"unstructured":"M. Seri, T. Courtney, M. Cukier, V. Gupta, S. Krishnamurthy, J. Lyons, H. Ramasamy, J. Ren, W. H. Sanders, \u201cA Configurable CORBA Gateway for Providing Adaptable System Properties,\u201d Supplemental Volume Int. Conf. on Dependable Systems & Networks (DSN-2002), Washington, DC, June 23\u201326, 2002, pp. G-26\u2013G-30.","key":"15_CR132"},{"issue":"4","key":"15_CR133","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1109\/TEC.1962.5219384","volume":"EC-11","author":"S. Seshu","year":"1962","unstructured":"S. Seshu, D. Freeman, \u201cThe Diagnosis of Asynchronous Sequential Switching Systems\u201d, IRE Trans. onElectronic Comp., EC-11,No. 4, 1962, pp. 459\u2013465.","journal-title":"IRE Trans. onElectronic Comp."},{"key":"15_CR134","series-title":"Coordinated Science Laboratory Technical Report","volume-title":"The Logic Organizer and Diagnosis Programs","author":"S. Seshu","year":"1964","unstructured":"S. Seshu, \u201cThe Logic Organizer and Diagnosis Programs\u201d, Coordinated Science Laboratory Technical Report R226, University of Illinois, Urbana, IL, 1964."},{"issue":"1","key":"15_CR135","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/PGEC.1965.264061","volume":"EC-14","author":"S. Seshu","year":"1965","unstructured":"S. Seshu, \u201cOn an Improved Diagnosis Program\u201d, IEEE Trans. on Electronic Comp. EC-14,No. 1, 1965, pp. 76\u201379.","journal-title":"IEEE Trans. on Electronic Comp."},{"doi-asserted-by":"crossref","unstructured":"S. Singh, M. Cukier, W. H. Sanders, \u201cProbabilistic Validation of an Intrusion-Tolerant Replication System,\u201d Proc. Int. Conf. on Dependable Systems and Networks (DSN-2003), San Francisco, CA, June 22\u201325, 2003, pp. 615\u2013624.","key":"15_CR136","DOI":"10.1109\/DSN.2003.1209971"},{"key":"15_CR137","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1109\/TC.1979.1675251","volume":"C-28","author":"J. Smith","year":"1979","unstructured":"J. Smith, \u201cOn Necessary and Sufficient Conditions for Multiple Fault Undetectability,\u201d IEEE Trans. on Comp., C-28, 1979, pp. 801\u2013802","journal-title":"IEEE Trans. on Comp."},{"key":"15_CR138","series-title":"Coordinated Science Laboratory Technical Report","volume-title":"The Design ofTotally Self-Checking Combinational Circuits","author":"J. Smith","year":"1976","unstructured":"J. Smith, \u201cThe Design ofTotally Self-Checking Combinational Circuits,\u201d Coordinated Science Laboratory Technical Report R-737, University of Illinois, Urbana, IL, 1976."},{"key":"15_CR139","series-title":"Coordinated Science Laboratory Technical Report","volume-title":"On the Existence of Combinational Networks with Arbitrary Multiple Redundancies","author":"J. Smith","year":"1975","unstructured":"J. Smith, G. Metze, \u201cOn the Existence of Combinational Networks with Arbitrary Multiple Redundancies,\u201d Coordinated Science Laboratory Technical Report R-692, University of Illinois, Urbana, IL, 1975."},{"issue":"6","key":"15_CR140","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1109\/TC.1978.1675139","volume":"C-27","author":"J. Smith","year":"1978","unstructured":"J. Smith, G. Metze, \u201cStrongly Fault-Secure Logic Networks,\u201d IEEE Trans. on Comp., C-27,No. 6, 1978, pp. 491\u2013499.","journal-title":"IEEE Trans. on Comp."},{"doi-asserted-by":"crossref","unstructured":"F. Stevens, \u201cValidation of an Intrusion-Tolerant Information System Using Probabilistic Modeling,\u201d Master\u2019s Thesis, University of Illinois, 2004.","key":"15_CR141","DOI":"10.1109\/RELDIS.2004.1353019"},{"doi-asserted-by":"crossref","unstructured":"D. Stott, B. Floering, D. Burke, Z. Kalbarczyk, R. K. Iyer, \u201cNFTAPE: A Framework for Assessing Dependability in Distributed Systems with Lightweight Fault Injectors,\u201d Proc. Int. Computer Performance & Dependability Symp. (IPDS), March 2000, pp. 91\u2013100.","key":"15_CR142","DOI":"10.1109\/IPDS.2000.839467"},{"doi-asserted-by":"crossref","unstructured":"D. Stott, P. Jones, M. Hamman, Z. Kalbarczyk, R. Iyer, \u201cNFTAPE: Network Fault Tolerance and Performance Evaluator,\u201d Proc. Int. Conf. on Dependable Systems and Networks, DSN\u201902, June 2002, pp. 542.","key":"15_CR143","DOI":"10.1109\/DSN.2002.1028964"},{"key":"15_CR144","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1109\/TC.1981.1675739","volume":"C-30","author":"D. Suk","year":"1981","unstructured":"D. Suk, S. Reddy, \u201cA March Test for Functional Faults in Semiconductor Random Access Memories,\u201d IEEE Trans. on Comp., C-30, 1981, pp. 982\u2013984.","journal-title":"IEEE Trans. on Comp."},{"unstructured":"S. Thatte, J. Abraham, \u201cTesting of Semiconductor Random Access Memories,\u201d Proc. 7th Int. Symp. on Fault-Tolerant Computing, 1977, pp. 81\u201387.","key":"15_CR145"},{"issue":"6","key":"15_CR146","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1109\/TC.1980.1675602","volume":"C-29","author":"S. Thatte","year":"1980","unstructured":"S. Thatte, J. Abraham, \u201cTest Generation for Microprocessors,\u201d IEEE Trans. on Comp., C-29,No. 6, 1980, pp. 429\u2013441.","journal-title":"IEEE Trans. on Comp."},{"issue":"11","key":"15_CR147","doi-asserted-by":"publisher","first-page":"1008","DOI":"10.1109\/T-C.1973.223637","volume":"C-22","author":"K. To","year":"1973","unstructured":"K. To, \u201cFault Folding for Irredundant and Redundant Combinational Circuits\u201d, IEEE Trans. on Comp. C-22,No. 11, 1973, pp. 1008\u20131015.","journal-title":"IEEE Trans. on Comp."},{"issue":"11","key":"15_CR148","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1109\/12.811108","volume":"48","author":"T. Tsai","year":"1999","unstructured":"T. Tsai, M-Ch. Hsueh, H. Zhao, Z. Kalbarczyk, R. K. Iyer, \u201cStress-based and Pathbased Fault Injection,\u201d IEEE Trans. on Comp., 48,No. 11, Nov. 1999, pp. 1183\u20131201.","journal-title":"IEEE Trans. on Comp."},{"unstructured":"J. Tvedt, \u201cSolution of Large-Sparse Stochastic Process Representations of Stochastic Activity Networks,\u201d Master\u2019s Thesis, University of Arizona, 1990.","key":"15_CR149"},{"unstructured":"E. Ulrich and T. Baker, \u201cThe Concurrent Simulation of Nearly Identical Digital Systems,\u201d Proc. 10th Design Automation Workshop, June 1973, pp. 145\u2013150.","key":"15_CR150"},{"issue":"3","key":"15_CR151","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1080\/15326349408807313","volume":"10","author":"A. P. A. Moorsel van","year":"1994","unstructured":"A. P. A. van Moorsel, W. H. Sanders, \u201cAdaptive Uniformization,\u201d ORSA Communications in Statistics: Stochastic Models, 10,No. 3, August 1994, pp. 619\u2013648.","journal-title":"ORSA Communications in Statistics: Stochastic Models"},{"issue":"3","key":"15_CR152","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/24.664016","volume":"46","author":"A. P. A. Moorsel van","year":"1997","unstructured":"A. P. A. van Moorsel, W. H. Sanders, \u201cTransient Solution of Markov Models by Combining Adaptive & Standard Uniformization,\u201d IEEE Trans. on Reliability, 46,No. 3, September 1997, pp. 430\u2013440.","journal-title":"IEEE Trans. on Reliability"},{"doi-asserted-by":"crossref","unstructured":"L. Wang, Z. Kalbarczyk, R. K. Iyer, H. Vora, T. Chahande, \u201cCheckpointing of Control Structures in Main Memory Database Systems,\u201d Proc. Conf. on Dependable Systems and Networks, DSN\u201904, June 2004.","key":"15_CR153","DOI":"10.1109\/DSN.2004.1311939"},{"unstructured":"Y. Wang, K. Fuchs, \u201cOptimal Message Log Reclamation for Independent Checkpointing,\u201d Technical Report CRHC-93-07, University of Illinois, 1993.","key":"15_CR154"},{"doi-asserted-by":"crossref","unstructured":"D. Wheeler and J. Robertson, \u201cDiagnostic Programs for the ILLIAC,\u201d Proc. IRE 41, 1953, pp. 1320\u20131325.","key":"15_CR155","DOI":"10.1109\/JRPROC.1953.274306"},{"issue":"4","key":"15_CR156","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1109\/TSE.2004.1274045","volume":"30","author":"K. Whisnant","year":"2004","unstructured":"K. Whisnant, R,K. Iyer, Z. Kalbarczyk, P.H. Jones III, D.A. Rennels, R. Some, \u201cThe Effects of an ARMOR-Based SIFT Environment on the Performance and Dependability of User Applications,\u201d IEEE Trans. on Software Eng., 30,No. 4, April 2004, pp. 257\u2013277.","journal-title":"IEEE Trans. on Software Eng."},{"issue":"1","key":"15_CR157","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1147\/sj.421.0045","volume":"42","author":"K. Whisnant","year":"2003","unstructured":"K. Whisnant, Z. Kalbarczyk, R. Iyer, \u201cA System Model for Reconfigurable Software,\u201d IBM Systems Journal, 42,No. 1, 2003, pp. 45\u201359.","journal-title":"IBM Systems Journal"},{"doi-asserted-by":"crossref","unstructured":"J. Xu, S. Chen, Z. Kalbarczyk, R. K. Iyer, \u201cAn Experimental Study of Security Vulnerabilities Caused by Errors,\u201d Proc. Conf. on Dependable Systems and Networks, DSN\u201901, July 2001, pp. 421\u2013430.","key":"15_CR158","DOI":"10.1109\/DSN.2001.941426"},{"unstructured":"J. Xu, Z. Kalbarczyk, R.K. Iyer, \u201cTransparent Runtime Randomization for Security,\u201d Proc. Symp. on Reliable and Distributed Systems, SRDS\u201903, October 2003.","key":"15_CR159"},{"unstructured":"J. Xu, Z. Kalbarczyk, R. Iyer, \u201cNetworked Windows NT System Filed Failure Data Analysis,\u201d Proc. Pacific Rim Int. Symp. on Dependable Computing, Hong Kong, 1999.","key":"15_CR160"}],"container-title":["IFIP International Federation for Information Processing","Building the Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4020-8157-6_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T15:03:34Z","timestamp":1738163014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4020-8157-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9781402081569","9781402081576"],"references-count":160,"URL":"https:\/\/doi.org\/10.1007\/978-1-4020-8157-6_15","relation":{},"subject":[]}}