Timothy Tsai
Timothy Tsai
Verified email at byu.net
Cited by
Cited by
Fault injection techniques and tools
MC Hsueh, TK Tsai, RK Iyer
Computer 30 (4), 75-82, 1997
Transparent run-time defense against stack-smashing attacks.
A Baratloo, N Singh, TK Tsai
USENIX Annual Technical Conference, General Track, 251-262, 2000
Understanding error propagation in deep learning neural network (DNN) accelerators and applications
G Li, SKS Hari, M Sullivan, T Tsai, K Pattabiraman, J Emer, SW Keckler
Proceedings of the International Conference for High Performance Computing …, 2017
Scidive: A stateful and cross protocol intrusion detection architecture for voice-over-ip environments
YS Wu, S Bagchi, S Garg, N Singh, T Tsai
Dependable Systems and Networks, 2004 International Conference on, 433-442, 2004
An approach towards benchmarking of fault-tolerant commercial systems
TK Tsai, RK Iyer, D Jewitt
Proceedings of Annual Symposium on Fault Tolerant Computing, 314-323, 1996
Method and apparatus for providing extensible object-oriented fault injection
N Singh, T Tsai
US Patent 6,484,276, 2002
Measuring fault tolerance with the FTAPE fault injection tool
TK Tsai, RK Iyer
International Conference on Modelling Techniques and Tools for Computer …, 1995
Sassifi: An architecture-level fault injection tool for gpu application resilience evaluation
SKS Hari, T Tsai, M Stephenson, SW Keckler, J Emer
2017 IEEE International Symposium on Performance Analysis of Systems and …, 2017
Distributed indirect software instrumentation
R Klemm, N Singh, T Tsai
US Patent 6,216,237, 2001
Security vulnerability monitor
N Singh, T Tsai
US Patent App. 10/611,264, 2005
Libsafe: Protecting critical elements of stacks
A Baratloo, N Singh, T Tsai
White Paper http://www. research. avayalabs. com/project/libsafe, 1999
Fault tolerance software system with periodic external self-test failure detection
N Singh, T Tsai
US Patent 7,096,388, 2006
Stress-based and path-based fault injection
TK Tsai, MC Hsueh, H Zhao, Z Kalbarczyk, RK Iyer
IEEE Transactions on Computers 48 (11), 1183-1201, 1999
Libsafe 2.0: Detection of format string vulnerability exploits
T Tsai, N Singh
white paper, Avaya Labs, 2001
Modeling soft-error propagation in programs
G Li, K Pattabiraman, SKS Hari, M Sullivan, T Tsai
2018 48th Annual IEEE/IFIP International Conference on Dependable Systems …, 2018
Low-overhead run-time memory leak detection and recovery
T Tsai, K Vaidyanathan, K Gross
2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC …, 2006
Fault tolerance via N-modular software redundancy using indirect instrumentation
T Tsai
US Patent 6,161,196, 2000
Libsafe: Transparent system-wide protection against buffer overflow attacks
T Tsai, N Singh
Proceedings International Conference on Dependable Systems and Networks, 541-541, 2002
Ml-based fault injection for autonomous vehicles: A case for bayesian fault injection
S Jha, S Banerjee, T Tsai, SKS Hari, MB Sullivan, ZT Kalbarczyk, ...
2019 49th annual IEEE/IFIP international conference on dependable systems …, 2019
Optimizing software-directed instruction replication for gpu error detection
A Mahmoud, SKS Hari, MB Sullivan, T Tsai, SW Keckler
SC18: International Conference for High Performance Computing, Networking …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20