Search For:

Displaying 1-15 out of 15 total
BioBlaze: Multi-core SIMD ASIP for DNA sequence alignment
Found in: 2013 IEEE 24th International Conference on Application-specific Systems, Architectures and Processors (ASAP)
By Nuno Neves,Nuno Sebastiao,Andre Patricio,David Matos,Pedro Tomas,Paulo Flores,Nuno Roma
Issue Date:June 2013
pp. 241-244
A new Application-Specific Instruction-set Processor (ASIP) architecture for biological sequences alignment is proposed in this manuscript. This architecture achieves high processing throughputs by exploiting both fine and coarsegrained parallelism. The fo...
Reverse Engineering of Protocols from Network Traces
Found in: Reverse Engineering, Working Conference on
By João Antunes,Nuno Neves,Paulo Verissimo
Issue Date:October 2011
pp. 169-178
Communication protocols determine how network components interact with each other. Therefore, the ability to derive a specification of a protocol can be useful in various contexts, such as to support deeper black-box testing or effective defense mechanisms...
DiveInto: Supporting Diversity in Intrusion-Tolerant Systems
Found in: Reliable Distributed Systems, IEEE Symposium on
By João Antunes,Nuno Neves
Issue Date:October 2011
pp. 137-146
Intrusion tolerant services are usually implemented as replicated systems. If replicas execute identical software, then they share the same vulnerabilities and the whole system can be easily compromised if a single flaw is found. One solution to this probl...
Randomized Consensus in Wireless Environments: A Case Where More is Better
Found in: Dependability, International Conference on
By Bruno Vavala, Nuno Neves, Henrique Moniz, Paulo Veríssimo
Issue Date:July 2010
pp. 7-12
In many emerging wireless scenarios, consensus among nodes represents an important task that must be accomplished in a timely and dependable manner. However, the sharing of the radio medium and the typical communication failures of such environments may se...
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities
Found in: Seventh European Dependable Computing Conference
By Manuel Mendonça, Nuno Neves
Issue Date:May 2008
pp. 110-119
Wireless LANs (WLAN) are becoming ubiquitous, as more and more consumer electronic equipments start to support them. This creates new security concerns, since hackers no longer need physical connection to the networks linking the devices, but only need to ...
Robustness Testing of the Windows DDK
Found in: Dependable Systems and Networks, International Conference on
By Manuel Mendonca, Nuno Neves
Issue Date:June 2007
pp. 554-564
Modern computers interact with many kinds of external devices, which have lead to a state where device drivers (DD) account for a substantial part of the operating system (OS) code. Currently, most of the systems crashes can be attributed to DD because of ...
Fault Detection Using Hints from the Socket Layer
Found in: Reliable Distributed Systems, IEEE Symposium on
By Nuno Neves, W. Kent Fuchs
Issue Date:October 1997
pp. 64
This paper describes a fault detection mechanism that uses the error codes returned by the stream sockets to locate process failures. Since these errors are generated automatically when there is communication with a failed process, the mechanism does not i...
Using Time to Improve the Performance of Coordinated Checkpointing
Found in: Computer Performance and Dependability Symposium, International
By Nuno Neves, W. Kent Fuchs
Issue Date:September 1996
pp. 282
This paper describes and evaluates a coordinated checkpoint protocol that uses time to eliminate several performance overheads that are present in traditional protocols. The time-based protocol does not have to exchange coordination messages, does not need...
OS diversity for intrusion tolerance: Myth or reality?
Found in: Dependable Systems and Networks, International Conference on
By Miguel Garcia,Alysson Bessani,Ilir Gashi,Nuno Neves,Rafael Obelheiro
Issue Date:June 2011
pp. 383-394
One of the key benefits of using intrusion-tolerant systems is the possibility of ensuring correct behavior in the presence of attacks and intrusions. These security gains are directly dependent on the components exhibiting failure diversity. To what exten...
Coordinated Checkpointing Without Direct Coordination
Found in: Computer Performance and Dependability Symposium, International
By Nuno Neves, W. Kent Fuchs
Issue Date:September 1998
pp. 23
Coordinated checkpointing is a well-known method to achieve fault tolerance in distributed systems. Long running parallel applications and high-availability applications are two potential users of checkpointing, although with different requirements. Parall...
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions
Found in: 2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS)
By Bruno Vavala,Nuno Neves
Issue Date:October 2012
pp. 161-170
Randomized Byzantine Consensus can be an interesting building block in the implementation of asynchronous distributed systems. Despite its exponential worst-case complexity, which would make it less appealing in practice, a few experimental works have argu...
Lightweight logging for lazy release consistent distributed shared memory
Found in: Proceedings of the second USENIX symposium on Operating systems design and implementation (OSDI '96)
By Manuel Costa, Manuel Sequeira, Miguel Castro, Nuno Neves, Paulo Guedes
Issue Date:October 1996
pp. 1-ff
The computing employed in oil and gas exploration is predominately scientific, resulting in a variety of data analysis applications. Although the analytical domains vary greatly (e.g., seismic processing,, geologic modeling, engineering facilities design, ...
The DiSOM distributed shared object memory
Found in: Proceedings of the 6th workshop on ACM SIGOPS European workshop: Matching operating systems to application needs (EW 6)
By Miguel Castro, Nuno Neves, Paulo Guedes
Issue Date:September 1994
pp. 138-140
DiSOM is a software-based distributed shared memory system for a multicomputer composed of heterogeneous nodes connected by a high-speed, low latency network [Guedes 93]. The current prototype comprises a Sun SPARCCenter 2000 with 10 processors and several...
A checkpoint protocol for an entry consistent shared memory system
Found in: Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing (PODC '94)
By Miguel Castro, Nuno Neves, Paulo Guedes
Issue Date:August 1994
pp. 121-129
In [4] a randomized algorithm for mutual exclusion with bounded waiting, employing a logarithmic sized shared variable, was given. Saias and Lynch [5] pointed out that the adversary scheduler postulated in the above paper can observe the behavior of proces...
Adaptive recovery for mobile environments
Found in: Communications of the ACM
By Nuno Neves, W. Kent Fuchs
Issue Date:January 1988
pp. 68-74
The online Risks Forum has long been a hotbed for discussions of the relative merits of openness relating to the dissemination of knowledge about security vulnerabilities. The debate has now been rekindled, and is summarized here.