Exploiting non-constant safe memory in resilient algorithms and data structures

We extend the Faulty RAM model by Finocchi and Italiano (2008) by adding a safe memory of arbitrary size S, and we then derive tradeoffs between the performance of resilient algorithmic techniques and the size of the safe memory. Let δ and α denote, respectively, the maximum amount of faults which c...

Full description

Saved in:
Bibliographic Details
Published in:Theoretical computer science Vol. 583; pp. 86 - 97
Main Authors: De Stefani, Lorenzo, Silvestri, Francesco
Format: Journal Article
Language:English
Published: Elsevier B.V 07.06.2015
Subjects:
ISSN:0304-3975, 1879-2294
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract We extend the Faulty RAM model by Finocchi and Italiano (2008) by adding a safe memory of arbitrary size S, and we then derive tradeoffs between the performance of resilient algorithmic techniques and the size of the safe memory. Let δ and α denote, respectively, the maximum amount of faults which can happen during the execution of an algorithm and the actual number of occurred faults, with α≤δ. We propose a resilient algorithm for sorting n entries which requires O(nlog⁡n+α(δ/S+log⁡S)) time and uses Θ(S) safe memory words. Our algorithm outperforms previous resilient sorting algorithms which do not exploit the available safe memory and require O(nlog⁡n+αδ) time. Finally, we exploit our sorting algorithm for deriving a resilient priority queue. Our implementation uses Θ(S) safe memory words and Θ(n) faulty memory words for storing n keys, and requires O(log⁡n+δ/S) amortized time for each insert and deletemin operation. Our resilient priority queue improves the O(log⁡n+δ) amortized time required by the state of the art. •We study tradeoffs between algorithmic resiliency and hardware resiliency.•We extend the Faulty RAM (FRAM) model by adding a safe memory S which is immune to corruptions.•We propose a resilient sorting algorithm requiring O(nlog⁡n+α(δ/S+log⁡S)) time.•We propose a resilient priority queue data structure requiring O(log⁡n+δ/S) amortized time per operation.
AbstractList We extend the Faulty RAM model by Finocchi and Italiano (2008) by adding a safe memory of arbitrary size S, and we then derive tradeoffs between the performance of resilient algorithmic techniques and the size of the safe memory. Let δ and α denote, respectively, the maximum amount of faults which can happen during the execution of an algorithm and the actual number of occurred faults, with α≤δ. We propose a resilient algorithm for sorting n entries which requires O(nlog⁡n+α(δ/S+log⁡S)) time and uses Θ(S) safe memory words. Our algorithm outperforms previous resilient sorting algorithms which do not exploit the available safe memory and require O(nlog⁡n+αδ) time. Finally, we exploit our sorting algorithm for deriving a resilient priority queue. Our implementation uses Θ(S) safe memory words and Θ(n) faulty memory words for storing n keys, and requires O(log⁡n+δ/S) amortized time for each insert and deletemin operation. Our resilient priority queue improves the O(log⁡n+δ) amortized time required by the state of the art. •We study tradeoffs between algorithmic resiliency and hardware resiliency.•We extend the Faulty RAM (FRAM) model by adding a safe memory S which is immune to corruptions.•We propose a resilient sorting algorithm requiring O(nlog⁡n+α(δ/S+log⁡S)) time.•We propose a resilient priority queue data structure requiring O(log⁡n+δ/S) amortized time per operation.
We extend the Faulty RAM model by Finocchi and Italiano (2008) by adding a safe memory of arbitrary size S, and we then derive tradeoffs between the performance of resilient algorithmic techniques and the size of the safe memory. Let delta and alpha denote, respectively, the maximum amount of faults which can happen during the execution of an algorithm and the actual number of occurred faults, with . We propose a resilient algorithm for sorting n entries which requires time and uses safe memory words. Our algorithm outperforms previous resilient sorting algorithms which do not exploit the available safe memory and require time. Finally, we exploit our sorting algorithm for deriving a resilient priority queue. Our implementation uses safe memory words and faulty memory words for storing n keys, and requires amortized time for each insert and deletemin operation. Our resilient priority queue improves the amortized time required by the state of the art.
Author De Stefani, Lorenzo
Silvestri, Francesco
Author_xml – sequence: 1
  givenname: Lorenzo
  surname: De Stefani
  fullname: De Stefani, Lorenzo
  email: destefan@dei.unipd.it
– sequence: 2
  givenname: Francesco
  orcidid: 0000-0002-9077-9921
  surname: Silvestri
  fullname: Silvestri, Francesco
  email: silvest1@dei.unipd.it
BookMark eNp9kD1PwzAQhi1UJNrCD2DLyJJwtpO4FROqyodUqQvMlmtfiqvELraL6L_HVZkYuOWGe59XumdCRs47JOSWQkWBtve7KulYMaBNBXUFwC_ImM7EvGRsXo_IGDjUJZ-L5opMYtxBnka0Y7Jefu97b5N12yJXltq7mJRLRVQdFgMOPhwL64qA0fYW80H1Wx9s-hhioZwpjEqqiCkcdDrk0DW57FQf8eZ3T8n70_Jt8VKu1s-vi8dVqbngqdSq7TbIseFMMwN1u0FTGzMzQnCxoaLmTS02M95q0IwpVPneAtKuBdG0BviU3J1798F_HjAmOdiose-VQ3-IkgoBTMw4EzlKz1EdfIwBO7kPdlDhKCnIkzy5k1mePMmTUMssLzPiD6NtUsl6l4Ky_b_kw5nE_P2XxSCjzt40GhtQJ2m8_Yf-AW72jTM
CitedBy_id crossref_primary_10_1007_s00453_015_0073_z
Cites_doi 10.1007/s11704-012-2870-8
10.1109/TNS.2014.2301768
10.1007/s00453-007-9088-4
10.1137/S0097539703428324
10.1145/1897816.1897844
10.1145/1644015.1644016
10.1016/j.tcs.2009.07.026
10.1016/j.cosrev.2007.10.001
10.1109/TDMR.2005.853449
ContentType Journal Article
Copyright 2015 Elsevier B.V.
Copyright_xml – notice: 2015 Elsevier B.V.
DBID 6I.
AAFTH
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.tcs.2015.04.003
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList
Computer and Information Systems Abstracts
DeliveryMethod fulltext_linktorsrc
Discipline Mathematics
Computer Science
EISSN 1879-2294
EndPage 97
ExternalDocumentID 10_1016_j_tcs_2015_04_003
S0304397515003096
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
123
1B1
1RT
1~.
1~5
4.4
457
4G.
5VS
6I.
7-5
71M
8P~
9JN
AABNK
AACTN
AAEDW
AAFTH
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAXUO
AAYFN
ABAOU
ABBOA
ABJNI
ABMAC
ABVKL
ABYKQ
ACAZW
ACDAQ
ACGFS
ACRLP
ACZNC
ADBBV
ADEZE
AEBSH
AEKER
AENEX
AEXQZ
AFKWA
AFTJW
AGUBO
AGYEJ
AHHHB
AHZHX
AIALX
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
AOUOD
ARUGR
AXJTR
BKOJK
BLXMC
CS3
DU5
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FIRID
FNPLU
FYGXN
G-Q
GBLVA
GBOLZ
HVGLF
IHE
IXB
J1W
KOM
LG9
M26
M41
MHUIS
MO0
N9A
NCXOZ
O-L
O9-
OAUVE
OK1
OZT
P-8
P-9
P2P
PC.
Q38
RIG
ROL
RPZ
SCC
SDF
SDG
SES
SPC
SPCBC
SSV
SSW
SSZ
T5K
TN5
WH7
YNT
ZMT
~G-
29Q
9DU
AAEDT
AAQXK
AATTM
AAXKI
AAYWO
AAYXX
ABDPE
ABEFU
ABFNM
ABWVN
ABXDB
ACLOT
ACNNM
ACRPL
ACVFH
ADCNI
ADMUD
ADNMO
ADVLN
AEIPS
AEUPX
AFJKZ
AFPUW
AGHFR
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
ASPBG
AVWKF
AZFZN
CITATION
EFKBS
FGOYB
G-2
HZ~
R2-
SEW
TAE
WUQ
ZY4
~HD
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c373t-ca6fbe3e532c2d046bed4dd8d7737b1743547b836c0c22aeabed60e1f60756d03
ISICitedReferencesCount 1
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000355038600008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0304-3975
IngestDate Wed Oct 01 13:22:31 EDT 2025
Tue Nov 18 22:41:13 EST 2025
Sat Nov 29 05:15:19 EST 2025
Fri Feb 23 02:30:23 EST 2024
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords Memory errors
Fault tolerance
Tradeoffs
Resilient algorithm
Resilient data structure
Priority queue
Sorting
Language English
License http://www.elsevier.com/open-access/userlicense/1.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c373t-ca6fbe3e532c2d046bed4dd8d7737b1743547b836c0c22aeabed60e1f60756d03
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 23
ORCID 0000-0002-9077-9921
OpenAccessLink https://dx.doi.org/10.1016/j.tcs.2015.04.003
PQID 1770278327
PQPubID 23500
PageCount 12
ParticipantIDs proquest_miscellaneous_1770278327
crossref_primary_10_1016_j_tcs_2015_04_003
crossref_citationtrail_10_1016_j_tcs_2015_04_003
elsevier_sciencedirect_doi_10_1016_j_tcs_2015_04_003
PublicationCentury 2000
PublicationDate 2015-06-07
PublicationDateYYYYMMDD 2015-06-07
PublicationDate_xml – month: 06
  year: 2015
  text: 2015-06-07
  day: 07
PublicationDecade 2010
PublicationTitle Theoretical computer science
PublicationYear 2015
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Baumann (br0010) 2005; 5
Finocchi, Grandoni, Italiano (br0060) 2009; 410
Kopelowitz, Talmon (br0070) 2012; vol. 7676
Pilla, Rech, Silvestri, Frost, Navaux, Sonza Reorda, Carro (br0140) 2014; 61
Arge, Bender, Demaine, Minkley, Munro (br0180) 2007; 36
Petrillo, Grandoni, Italiano (br0150) 2013; 18
Gieseke, Moruz, Vahrenhold (br0120) 2012; 6
Finocchi, Italiano (br0050) 2008; 52
Li, Chen, Wu, Vetter (br0170) 2013
Rech, Pilla, Silvestri, Navaux, Carro (br0110) 2013
Christiano, Demaine, Kishore (br0130) 2011; vol. 6844
Jørgensen, Moruz, Mølhave (br0100) 2007; vol. 4619
Caminiti, Finocchi, Fusco, Silvestri (br0080) 2011; vol. 13
Schroeder, Pinheiro, Weber (br0020) 2011; 54
Govindavajhala, Appel (br0030) 2003
Finocchi, Grandoni, Italiano (br0040) 2007; 1
Finocchi, Grandoni, Italiano (br0090) 2009; 6
Cormen, Leiserson, Rivest, Stein (br0190) 2009
Petrillo, Finocchi, Italiano (br0160) 2010
Christiano (10.1016/j.tcs.2015.04.003_br0130) 2011; vol. 6844
Finocchi (10.1016/j.tcs.2015.04.003_br0090) 2009; 6
Pilla (10.1016/j.tcs.2015.04.003_br0140) 2014; 61
Finocchi (10.1016/j.tcs.2015.04.003_br0060) 2009; 410
Petrillo (10.1016/j.tcs.2015.04.003_br0160) 2010
Schroeder (10.1016/j.tcs.2015.04.003_br0020) 2011; 54
Li (10.1016/j.tcs.2015.04.003_br0170) 2013
Govindavajhala (10.1016/j.tcs.2015.04.003_br0030) 2003
Cormen (10.1016/j.tcs.2015.04.003_br0190) 2009
Arge (10.1016/j.tcs.2015.04.003_br0180) 2007; 36
Finocchi (10.1016/j.tcs.2015.04.003_br0040) 2007; 1
Kopelowitz (10.1016/j.tcs.2015.04.003_br0070) 2012; vol. 7676
Jørgensen (10.1016/j.tcs.2015.04.003_br0100) 2007; vol. 4619
Rech (10.1016/j.tcs.2015.04.003_br0110) 2013
Petrillo (10.1016/j.tcs.2015.04.003_br0150) 2013; 18
Finocchi (10.1016/j.tcs.2015.04.003_br0050) 2008; 52
Baumann (10.1016/j.tcs.2015.04.003_br0010) 2005; 5
Caminiti (10.1016/j.tcs.2015.04.003_br0080) 2011; vol. 13
Gieseke (10.1016/j.tcs.2015.04.003_br0120) 2012; 6
References_xml – volume: 5
  start-page: 305
  year: 2005
  end-page: 316
  ident: br0010
  article-title: Radiation-induced soft errors in advanced semiconductor technologies
  publication-title: IEEE Trans. Device Mater. Reliab.
– volume: 52
  start-page: 309
  year: 2008
  end-page: 332
  ident: br0050
  article-title: Sorting and searching in faulty memories
  publication-title: Algorithmica
– volume: 61
  start-page: 1874
  year: 2014
  end-page: 1880
  ident: br0140
  article-title: Software-based hardening strategies for neutron sensitive FFT algorithms on GPUs
  publication-title: IEEE Trans. Nucl. Sci.
– start-page: 13
  year: 2013
  end-page: 20
  ident: br0110
  article-title: Neutron sensitivity and software hardening strategies for matrix multiplication and FFT on graphics processing units
  publication-title: Proc. 3rd Workshop on Fault-Tolerance for HPC at Extreme Scale
– start-page: 154
  year: 2003
  end-page: 165
  ident: br0030
  article-title: Using memory errors to attack a virtual machine
  publication-title: Proc. IEEE Symposium on Security and Privacy
– volume: vol. 6844
  start-page: 243
  year: 2011
  end-page: 254
  ident: br0130
  article-title: Lossless fault-tolerant data structures with additive overhead
  publication-title: Proc. 12th Workshop on Algorithms and Data Structures
– start-page: 44:1
  year: 2013
  end-page: 44:12
  ident: br0170
  article-title: Rethinking algorithm-based fault tolerance with a cooperative software-hardware approach
  publication-title: Proc. International Conference on High Performance Computing, Networking, Storage and Analysis
– volume: 6
  start-page: 1:1
  year: 2009
  end-page: 1:19
  ident: br0090
  article-title: Resilient dictionaries
  publication-title: ACM Trans. Algorithms
– volume: vol. 7676
  start-page: 558
  year: 2012
  end-page: 567
  ident: br0070
  article-title: Selection in the presence of memory faults, with applications to in-place resilient sorting
  publication-title: Proc. 23rd International Symposium on Algorithms and Computation
– volume: 6
  start-page: 166
  year: 2012
  end-page: 178
  ident: br0120
  article-title: Resilient
  publication-title: Front. Comput. Sci.
– volume: 410
  start-page: 4457
  year: 2009
  end-page: 4470
  ident: br0060
  article-title: Optimal resilient sorting and searching in the presence of memory faults
  publication-title: Theoret. Comput. Sci.
– year: 2009
  ident: br0190
  article-title: Introduction to Algorithms
– volume: 54
  start-page: 100
  year: 2011
  end-page: 107
  ident: br0020
  article-title: DRAM errors in the wild: a large-scale field study
  publication-title: Commun. ACM
– volume: 18
  year: 2013
  ident: br0150
  article-title: Data structures resilient to memory faults: an experimental study of dictionaries
  publication-title: ACM J. Exp. Algorithmics
– start-page: 1
  year: 2010
  end-page: 12
  ident: br0160
  article-title: Experimental study of resilient algorithms and data structures
  publication-title: Proc. 9th International Symposium Experimental Algorithms
– volume: vol. 13
  start-page: 433
  year: 2011
  end-page: 444
  ident: br0080
  article-title: Dynamic programming in faulty memory hierarchies (cache-obliviously)
  publication-title: Proc. 31st Conference on Foundations of Software Technology and Theoretical Computer Science
– volume: vol. 4619
  start-page: 127
  year: 2007
  end-page: 138
  ident: br0100
  article-title: Priority queues resilient to memory faults
  publication-title: Proc. 10th Workshop on Algorithms and Data Structures
– volume: 36
  start-page: 1672
  year: 2007
  end-page: 1695
  ident: br0180
  article-title: An optimal cache-oblivious priority queue and its application to graph algorithms
  publication-title: SIAM J. Comput.
– volume: 1
  start-page: 77
  year: 2007
  end-page: 87
  ident: br0040
  article-title: Designing reliable algorithms in unreliable memories
  publication-title: Comput. Sci. Rev.
– volume: 6
  start-page: 166
  issue: 2
  year: 2012
  ident: 10.1016/j.tcs.2015.04.003_br0120
  article-title: Resilient k-d trees: k-means in space revisited
  publication-title: Front. Comput. Sci.
  doi: 10.1007/s11704-012-2870-8
– volume: 61
  start-page: 1874
  issue: 4
  year: 2014
  ident: 10.1016/j.tcs.2015.04.003_br0140
  article-title: Software-based hardening strategies for neutron sensitive FFT algorithms on GPUs
  publication-title: IEEE Trans. Nucl. Sci.
  doi: 10.1109/TNS.2014.2301768
– volume: 52
  start-page: 309
  issue: 3
  year: 2008
  ident: 10.1016/j.tcs.2015.04.003_br0050
  article-title: Sorting and searching in faulty memories
  publication-title: Algorithmica
  doi: 10.1007/s00453-007-9088-4
– volume: vol. 4619
  start-page: 127
  year: 2007
  ident: 10.1016/j.tcs.2015.04.003_br0100
  article-title: Priority queues resilient to memory faults
– year: 2009
  ident: 10.1016/j.tcs.2015.04.003_br0190
– volume: vol. 7676
  start-page: 558
  year: 2012
  ident: 10.1016/j.tcs.2015.04.003_br0070
  article-title: Selection in the presence of memory faults, with applications to in-place resilient sorting
– start-page: 154
  year: 2003
  ident: 10.1016/j.tcs.2015.04.003_br0030
  article-title: Using memory errors to attack a virtual machine
– volume: 36
  start-page: 1672
  issue: 6
  year: 2007
  ident: 10.1016/j.tcs.2015.04.003_br0180
  article-title: An optimal cache-oblivious priority queue and its application to graph algorithms
  publication-title: SIAM J. Comput.
  doi: 10.1137/S0097539703428324
– volume: 54
  start-page: 100
  issue: 2
  year: 2011
  ident: 10.1016/j.tcs.2015.04.003_br0020
  article-title: DRAM errors in the wild: a large-scale field study
  publication-title: Commun. ACM
  doi: 10.1145/1897816.1897844
– volume: 6
  start-page: 1:1
  issue: 1
  year: 2009
  ident: 10.1016/j.tcs.2015.04.003_br0090
  article-title: Resilient dictionaries
  publication-title: ACM Trans. Algorithms
  doi: 10.1145/1644015.1644016
– volume: 18
  year: 2013
  ident: 10.1016/j.tcs.2015.04.003_br0150
  article-title: Data structures resilient to memory faults: an experimental study of dictionaries
  publication-title: ACM J. Exp. Algorithmics
– start-page: 13
  year: 2013
  ident: 10.1016/j.tcs.2015.04.003_br0110
  article-title: Neutron sensitivity and software hardening strategies for matrix multiplication and FFT on graphics processing units
– volume: vol. 13
  start-page: 433
  year: 2011
  ident: 10.1016/j.tcs.2015.04.003_br0080
  article-title: Dynamic programming in faulty memory hierarchies (cache-obliviously)
– volume: 410
  start-page: 4457
  issue: 44
  year: 2009
  ident: 10.1016/j.tcs.2015.04.003_br0060
  article-title: Optimal resilient sorting and searching in the presence of memory faults
  publication-title: Theoret. Comput. Sci.
  doi: 10.1016/j.tcs.2009.07.026
– start-page: 44:1
  year: 2013
  ident: 10.1016/j.tcs.2015.04.003_br0170
  article-title: Rethinking algorithm-based fault tolerance with a cooperative software-hardware approach
– volume: vol. 6844
  start-page: 243
  year: 2011
  ident: 10.1016/j.tcs.2015.04.003_br0130
  article-title: Lossless fault-tolerant data structures with additive overhead
– volume: 1
  start-page: 77
  issue: 2
  year: 2007
  ident: 10.1016/j.tcs.2015.04.003_br0040
  article-title: Designing reliable algorithms in unreliable memories
  publication-title: Comput. Sci. Rev.
  doi: 10.1016/j.cosrev.2007.10.001
– start-page: 1
  year: 2010
  ident: 10.1016/j.tcs.2015.04.003_br0160
  article-title: Experimental study of resilient algorithms and data structures
– volume: 5
  start-page: 305
  issue: 3
  year: 2005
  ident: 10.1016/j.tcs.2015.04.003_br0010
  article-title: Radiation-induced soft errors in advanced semiconductor technologies
  publication-title: IEEE Trans. Device Mater. Reliab.
  doi: 10.1109/TDMR.2005.853449
SSID ssj0000576
Score 2.1027684
Snippet We extend the Faulty RAM model by Finocchi and Italiano (2008) by adding a safe memory of arbitrary size S, and we then derive tradeoffs between the...
SourceID proquest
crossref
elsevier
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 86
SubjectTerms Algorithms
Fault tolerance
Faults
Inserts
Memory errors
Priorities
Priority queue
Queues
Random access memory
Resilient algorithm
Resilient data structure
Sorting
Sorting algorithms
State of the art
Tradeoffs
Title Exploiting non-constant safe memory in resilient algorithms and data structures
URI https://dx.doi.org/10.1016/j.tcs.2015.04.003
https://www.proquest.com/docview/1770278327
Volume 583
WOSCitedRecordID wos000355038600008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1879-2294
  dateEnd: 20180131
  omitProxy: false
  ssIdentifier: ssj0000576
  issn: 0304-3975
  databaseCode: AIEXJ
  dateStart: 19950109
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELag5QAHHgVEeclInIhSZe04to8ValUQFCSKtLfIcZyS1Ta72qRV21_f8SPJqhUVIHGxojwtz5fx2PPNDELvDaOSaUliVdEiTmVJYimUiSuuWCl1yaQSrtgEPzwU06n8HqJLWldOgDeNOD-Xy_8qajgHwrahs38h7uGlcAKOQejQgtih_SPBO1Zd7djMsLSPtTcAu6hVlYlOLLH2wgextPW8dgzz-fFiVXe_Tny6ZssZjXxa2dNVYBjOBkwNUY86lIOIwhw6WMSWm2gqXyoq-gL3N5eLYR-nntu0Hj663dX0MK1erO88TJhjSPFxO-xGSIwPw7KuFunLoewYr1UFlzEhvppxr3aZoGuKs8-HvRwZuzeUu99nmO102uZZnzCXozah40w28At_2F7YToC5a31I2V20STiToPY2dz_tTT-PkzXj3p0det07vh0F8NqHfme6XJvEnWVy9Bg9DEsKvOuh8ATdMc0WetSX68BBe2-hB1-HFL3tU_RtxAlexwm2OMEeJ7hu8IATPOIEA06wxQkecfIM_dzfO_p4EIfqGrGmnHaxVllVGAo_K9GkTNKsMGValqLknPLCLlRZygtBM51oQpRRcD1LzKTKwMrMyoQ-RxvQPfMCYVJJok0GlmAi0kSlqiIF1ULDwBdgUZNtlPQDl-uQet5WQJnnPcdwlsNY53as8yS1-Wq30YfhkaXPu3LbzWkvjTyA3huEOUDntsfe9ZLLQalaT5lqzOK0zSecW488Jfzlv736Fbo__jGv0QYIw7xB9_RZV7ertwGEV09joOo
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Exploiting+non-constant+safe+memory+in+resilient+algorithms+and+data+structures&rft.jtitle=Theoretical+computer+science&rft.au=De+Stefani%2C+Lorenzo&rft.au=Silvestri%2C+Francesco&rft.date=2015-06-07&rft.pub=Elsevier+B.V&rft.issn=0304-3975&rft.eissn=1879-2294&rft.volume=583&rft.spage=86&rft.epage=97&rft_id=info:doi/10.1016%2Fj.tcs.2015.04.003&rft.externalDocID=S0304397515003096
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0304-3975&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0304-3975&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0304-3975&client=summon