Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Nakka, Nithin
add a person with the name Nakka, Nithin
 

Other publications of authors with the same name

Detailed analysis of I/O traces for large scale applications., , , , , and . HiPC, page 419-427. IEEE Computer Society, (2009)Achieving Target MTTF by Duplicating Reliability-Critical Components in High Performance Computing Systems., , , , , and . IPDPS Workshops, page 1567-1576. IEEE, (2011)Failure Data-Driven Selective Node-Level Duplication to Improve MTTF in High Performance Computing Systems., and . HPCS, volume 5976 of Lecture Notes in Computer Science, page 304-322. Springer, (2009)SymPLFIED: Symbolic Program-Level Fault Injection and Error Detection Framework., , , and . IEEE Trans. Computers, 62 (11): 2292-2307 (2013)Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach., , , and . Insider Attack and Cyber Security, volume 39 of Advances in Information Security, Springer, (2008)Fault Injection., , , and . Encyclopedia of Software Engineering, Taylor & Francis, (2010)Discovering Application-Level Insider Attacks Using Symbolic Execution., , , and . SEC, volume 297 of IFIP Advances in Information and Communication Technology, page 63-75. Springer, (2009)Predicting Node Failure in High Performance Computing Systems from Failure and Usage Logs., , and . IPDPS Workshops, page 1557-1566. IEEE, (2011)Defeating Memory Corruption Attacks via Pointer Taintedness Detection., , , , and . DSN, page 378-387. IEEE Computer Society, (2005)An Architectural Framework for Providing Reliability and Security Support., , , and . DSN, page 585-594. IEEE Computer Society, (2004)