default search action
DSN 2005: Yokohama, Japan
- 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings. IEEE Computer Society 2005, ISBN 0-7695-2282-3
Introduction
- Welcome Message from the General Chair and Conference Coordinator.
- Conference Organizers.
- Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair.
- DCCS Program Committee.
- DCCS Reviewers.
- W.C. Carter Award.
- Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs.
- PDS Steering and Program Committees.
- PDS Reviewers.
Keynote Address
- Mitsuyuki Hoshiba:
Observation of Local and Distant Earthquakes and Tsunami Warning System.
Session 1A: Fault Tolerant Architectures and Algorithms
- Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello:
Assured Reconfiguration of Fail-Stop Systems. 2-11 - David Bernick, Bill Bruckert, Paul Del Vigna, David García, Robert Jardine, Jim Klecka, Jim Smullen:
NonStop® Advanced Architecture. 12-21 - Partha Dutta, Rachid Guerraoui, Leslie Lamport:
How Fast Can Eventual Synchrony Lead to Consensus?. 22-27
Session 1B: Dependability in VLSI
- Nicholas J. Wang, Sanjay J. Patel:
ReStore: Symptom Based Soft Error Detection in Microprocessors. 30-39 - Srivathsan Krishnamohan, Nihar R. Mahapatra:
Combining Error Masking and Error Detection Plus Recovery to Combat Soft Errors in Static CMOS Circuits. 40-49 - Paolo Bernardi, Letícia Maria Veiras Bolzani, Maurizio Rebaudengo, Matteo Sonza Reorda, Fabian Vargas, Massimo Violante:
On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core. 50-58
Session 2A: Experimental Validation
- Robert W. Reeder, Roy A. Maxion:
User Interface Dependability through Goal-Error Prevention. 60-69 - Sampath Yerramalla, Bojan Cukic, Martin Mladenovski, Edgar Fuller:
Stability Monitoring and Analysis of Learning in an Adaptive System. 70-79 - Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Krits, Roman Vitenberg:
Effective Testing and Debugging Techniques for a Group Communication System. 80-85 - Andréas Johansson, Neeraj Suri:
Error Propagation Profiling of Operating Systems. 86-95
Session 2B: System Security
- Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo:
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? 98-107 - Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya:
Towards a Theory of Insider Threat Assessment. 108-117 - Zonghua Zhang, Hong Shen:
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. 118-127 - Mohamed G. Gouda, Alex X. Liu:
A Model of Stateful Firewalls and Its Properties. 128-137
Session 3A: Multicast
- Chunqiang Tang, Rong N. Chang, Christopher Ward:
GoCast: Gossip-Enhanced Overlay Multicast for Fast and Dependable Group Communication. 140-149 - Jian Wu, Kang G. Shin:
SMRP: Fast Restoration of Multicast Sessions from Persistent Failures. 150-159 - Vadim Drabkin, Roy Friedman, Marc Segal:
Efficient Byzantine Broadcast in Wireless Ad-Hoc Networks. 160-169
Session 3B: Wide Area Networks
- Tina Wong, Van Jacobson, Cengiz Alaettinoglu:
Internet Routing Anomaly Detection and Visualization. 172-181 - Rebecca L. Collins, James S. Plank:
Assessing the Performance of Erasure Codes in the Wide-Area. 182-187 - Yin Zhang, Zihui Ge:
Finding Critical Traffic Matrices. 188-197
Session 4A: Detection and Adaptation
- Paul Murray:
A Distributed State Monitoring Service for Adaptive Application Management. 200-205 - Xavier Défago, Péter Urbán, Naohiro Hayashibara, Takuya Katayama:
Definition and Specification of Accrual Failure Detectors. 206-215 - Kymie M. C. Tan, Roy A. Maxion:
The Effects of Algorithmic Diversity on Anomaly Detector Performance. 216-225
Session 4B: FT Communications
- Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam:
On Partial Protection in Groomed Optical WDM Mesh Networks. 228-237 - Audun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing, Olav Lysne:
Resilient Routing Layers for Recovery in Packet Networks. 238-247 - Steven Y. Ko, Indranil Gupta:
Perturbation-Resistant and Overlay-Independent Resource Discovery. 248-257
Session 5A: Operating Systems and Mechanisms
- G. John Janakiraman, Jose Renato Santos, Dinesh Subhraveti, Yoshio Turner:
Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating Systems. 260-269 - François Taïani, Jean-Charles Fabre, Marc-Olivier Killijian:
A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures. 270-279 - Archana Ganapathi, David A. Patterson:
Crash Data Collection: A Windows Case Study. 280-285
Session 5B: Networking
- Fanglu Guo, Tzi-cker Chiueh:
Scalable and Robust WLAN Connectivity Using Access Point Array. 288-297 - Brendan Hall, Kevin Driscoll, Michael Paulitsch, Samar Dajani-Brown:
Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. 298-307 - Manish Marwah, Shivakant Mishra, Christof Fetzer:
A System Demonstration of ST-TCP. 308-313
Session 6A: Codes
- Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy:
A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications. 316-325 - James S. Plank, Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason:
Small Parity-Check Erasure Codes - Exploration and Observations. 326-335 - Marcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu:
Using Erasure Codes Efficiently for Storage in a Distributed System. 336-345 - Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman:
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems. 346-355
Session 6B: Critical Infrastructures Protection
- Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting:
Authenticated System Calls. 358-367 - Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski:
Detecting Stealth Software with Strider GhostBuster. 368-377 - Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. 378-387 - Lap-Chung Lam, Tzi-cker Chiueh:
Checking Array Bound Violation Using Segmentation Hardware. 388-397
Panel: Dependability Benchmarking of Computing Systems
- Cristian Constantinescu, Karama Kanoun, Henrique Madeira, Brendan Murphy, Ira Pramanick, Aaron B. Brown:
Dependability Benchmarking of Computing Systems - Panel Statement. 400
Session 7A: Consensus
- Jean-Philippe Martin, Lorenzo Alvisi:
Fast Byzantine Consensus. 402-411 - Sérgio Gorender, Raimundo A. Macêdo, Michel Raynal:
A Hybrid and Adaptive Model for Fault-Tolerant Distributed Computing. 412-421 - Lívia M. R. Sampaio, Francisco Vilar Brasileiro:
Adaptive Indulgent Consensus. 422-431
Session 7B: Hardware and Codesign
- Moinuddin K. Qureshi, Onur Mutlu, Yale N. Patt:
Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors. 434-443 - P. Oscar Boykin, Vwani P. Roychowdhury:
Reversible Fault-Tolerant Logic. 444-453 - Sumant Kowshik, Girish Baliga, Scott R. Graham, Lui Sha:
Co-Design Based Approach to Improve Robustness in Networked Control Systems. 454-463
Session 8A: Dependability Modeling and Prediction
- Sabine M. Böhm:
H-RAFT - Heuristic Reachability Analysis for Fault Tolerance Protocols Modelled in SDL. 466-475 - Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Ramendra K. Sahoo, José E. Moreira, Manish Gupta:
Filtering Failure Logs for a BlueGene/L Prototype. 476-485 - Elizabeth Latronico, Philip Koopman:
Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms. 486-495 - Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers:
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors. 496-505
Session 8B: Intrusion Detection and Tolerance
- Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. 508-517 - Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks. 518-527 - Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi:
Modeling and Automated Containment of Worms. 528-537 - Alper Tugay Mizrak, Yuchung Cheng, Keith Marzullo, Stefan Savage:
Fatih: Detecting and Isolating Malicious Routers. 538-547
Session 1C: Software Reliability, Rejuvenation and Optimization
- Peter Kemper, Dennis Müller, Axel Thümmler:
Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems. 550-559 - Michael Grottke, Kishor S. Trivedi:
On a Method for Mending Time to Failure Distributions. 560-569 - Ann T. Tai, Kam S. Tso, William H. Sanders, Savio N. Chau:
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications. 570-579
Session 2C: Security Evaluation
- Xiapu Luo, Rocky K. C. Chang:
Optimizing the Pulsing Denial-of-Service Attacks. 582-591 - Marco Vieira, Henrique Madeira:
Towards a Security Benchmark for Database Management Systems. 592-601 - Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier:
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. 602-611 - Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. 612-621
Session 3C: Evaluation of QoS and Self-Healing Systems
- Lorenzo Falai, Andrea Bondavalli:
Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network. 624-633 - Adam J. Oliner, Larry Rudolph, Ramendra K. Sahoo, José E. Moreira, Manish Gupta:
Probabilistic QoS Guarantees for Supercomputing Systems. 634-643 - Steve Zhang, Ira Cohen, Moisés Goldszmidt, Julie Symons, Armando Fox:
Ensembles of Models for Automated Diagnosis of System Performance Problems. 644-653
Session 4C: Experimental Evaluation of Fault-Tolerance
- Joakim Aidemark, Peter Folkesson, Johan Karlsson:
A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems. 656-665 - Jonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson:
Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles. 666-671 - Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu:
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. 672-681
Session 5C: Performance Evaluation of Networks and Protocols
- Sherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon:
Improving TCP Performance for Multihop Wireless Networks. 684-693 - Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano Gaeta, Michele Garetto, Daniele Manini, Matteo Sereno:
A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks. 694-703 - Henrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen:
Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks. 704-709
Session 6C: Markovian Models for Performance and Dependability
- Axel Thümmler, Peter Buchholz, Miklós Telek:
A Novel Approach for Fitting Probability Distributions to Real Trace Data with the EM Algorithm. 712-721 - Lucia Cloth, Joost-Pieter Katoen, Maneesh Khattri, Reza Pulungan:
Model Checking Markov Reward Models with Impulse Rewards. 722-731 - Yi Zhang, David Parker, Marta Z. Kwiatkowska:
A Wavefront Parallelisation of CTMC Solution Using MTBDDs. 732-741 - Salem Derisavi, Peter Kemper, William H. Sanders:
Lumping Matrix Diagram Representations of Markov Models. 742-751
Session 7C: Experimental Microprocessor Evaluation
- Cristian Constantinescu:
Neutron SER Characterization of Microprocessors. 754-759 - Giacinto Paolo Saggese, Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic. 760-769 - Gokhan Memik, Masud H. Chowdhury, Arindam Mallik, Yehea I. Ismail:
Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files. 770-779
Session 8C: Replication and Checkpointing Protocol Evaluation
- Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of Probabilistic Trapezoid Protocol for Data Replication. 782-791 - António Luís Sousa, José Pereira, Luís Soares, Alfrânio Correia Jr., L. Rocha, Rui Oliveira, Francisco Moura:
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols. 792-801 - Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Model-Based Failure Analysis of Journaling File Systems. 802-811 - Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood:
Modeling Coordinated Checkpointing for Large-Scale Supercomputers. 812-821
Workshop Abstracts
- Takuya Katayama, Yutaka Ishikawa, Yoshiki Kinoshita:
Workshop on Dependable Software - Tools and Methods - Workshop Abstract. 824 - George Candea, David L. Oppenheimer:
Workshop on Hot Topics in System Depend - Workshop Abstract. 826-827 - Saïda Benlarbi:
Workshop on Assurance of Networking Systems Dependability Service Level Agreements - Workshop Abstract. 830
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.