Modern cluster managers like Borg, Omega and Kubernetes rely on the state-reconciliation principle to be highly resilient and extensible. In these systems, all cluster-management …
A Mahimkar, Z Ge, X Liu, Y Shaqalle, Y Xiang… - Proceedings of the …, 2022 - dl.acm.org
Cellular service operators frequently tune the network configuration to optimize coverage, support seamless handovers, minimize channel interference, and improve the service …
Test case prioritization (TCP) aims to reorder the regression test suite with a goal of increasing the fault detection rate. Various TCP techniques have been proposed based on …
MA Inam, W Ul - Proceedings of the 2022 Network and Distributed …, 2022 - par.nsf.gov
Causality analysis is an effective technique for investigating and detecting cyber attacks. However, by focusing on auditing at the Operating System level, existing causal analysis …
While many techniques have been proposed to find software configuration errors in software systems, most of them focus on finding misconfiguration occurring on a single node …
Multimedia content has dominated the Internet, fueled by an unprecedented number of multimedia applications. Among them, a kind of emerging application, termed Video-to …
Storage systems are vital in managing the ever increasing data generated by High Performance Computing based and Cloud-based applications. Therefore ensuring reliability …
Router software is prone to bugs triggered by commands entered in the command line interface (CLI). In particular, over two-thirds of the CLI-triggered bugs in FreeRangeRouting …