• Publications
  • Influence
Understanding the propagation of hard errors to software and implications for resilient system design
TLDR
This paper aims to provide such a characterization, resulting in identifying low-cost detection methods and providing guidelines for implementation of the recovery and diagnosis components of such a reliability solution. Expand
Using likely invariants for automated software fault localization
TLDR
We propose an automatic diagnosis technique for isolating the root cause(s) of software failures. Expand
Using likely program invariants to detect hardware errors
TLDR
We present a system that uses software-level symptoms to improve the coverage and latency of existing detection techniques for permanent faults. Expand
An empirical study of reported bugs in server software with implications for automated bug diagnosis
TLDR
We examine randomly selected bug reports of six server applications and find that nearly 82% of bug symptoms can be reproduced deterministically by re-running with the same set of inputs at the production site. Expand
SWAT : An Error Resilient System
TLDR
This paper presents two significant enhancements to the SWAT system over the last year: (1) an effective diagnosis strategy that identifi es the faulty microarchitectural unit by exploiting a checkpoint/replay based recovery mechanism and analyzing the faulty core’s instruction trace, and a sophisticated detection mechanism that specifically targets silent data corruptions by using compiler-inserted range-based invar iants to further improve detection coverage and latency. Expand
Trace-based microarchitecture-level diagnosis of permanent hardware faults
TLDR
This paper presents trace-based fault diagnosis, a diagnosis strategy that identifies permanent faults in microarchitectural units by analyzing the faulty corepsilas instruction trace. Expand
PrivacyProxy: Leveraging Crowdsourcing and In Situ Traffic Analysis to Detect and Mitigate Information Leakage
TLDR
We present PrivacyProxy, a system that monitors outbound network traffic and generates app-specific signatures to represent privacy sensitive data being shared, all without any modifications to the OS. Expand
Integrated Loop Optimizations for Data Locality Enhancement of Tensor Contraction Expressions
A very challenging issue for optimizing compilers is the phase ordering problem: In what order should a collection of compiler optimizations be performed? We address this problem in the context ofExpand
Efficient Search-Space Pruning for Integrated Fusion and Tiling Transformations
TLDR
Compile-time optimizations involve a number of transformations such as loop permutation, fusion, tiling, array contraction, etc. in order to minimize disk I/O cost. Expand
Cache miss characterization and data locality optimization for imperfectly nested loops on shared memory multiprocessors
TLDR
This paper develops an algorithm to accurately characterize the number of cache misses for a class of compute-intensive calculations encountered in accurate quantum chemistry models of electronic structure. Expand
...
1
2
3
...