default search action
DSN 2006: Philadelphia, Pennsylvania, USA
- 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings. IEEE Computer Society 2006, ISBN 0-7695-2607-1
Introduction
- Welcome Message from the General Chair.
- Welcome Message from the Conference Coordinator.
- Conference Organizers.
- Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair.
- DCCS Program Committee.
- List of Reviewers for DCCS.
- William C. Carter Award.
- Message from the Performance and Dependability Symposium (PDS) Program Chair.
- PDS Program Committee.
- List of Reviewers for PDS.
Keynote Address
- Ambuj Goyal:
Delivering Dependability: A Moving Target.
Dependable Computing and Communications Symposium (DCCS)
Session 1A: Real-Time and Embedded Systems
- Justin Ray, Philip Koopman:
Efficient High Hamming Distance CRCs for Embedded Networks. 3-12 - Guangyu Chen, Mahmut T. Kandemir, Ibrahim Kolcu:
Memory-Conscious Reliable Execution on Embedded Chip Multiprocessors. 13-22 - Sumant Kowshik, Grigore Rosu, Lui Sha:
Static Analysis to Enforce Safe Value Flow in Embedded Control Systems. 23-34
Session 2A: Safety-Critical Systems
- Wilfried Steiner, Hermann Kopetz:
The Startup Problem in Fault-Tolerant Time-Triggered Communication. 35-44 - Thomas Kottke, Andreas Steininger:
A Reconfigurable Generic Dual-Core Architecture. 45-54 - Gregory C. Sharp, Nagarajan Kandasamy:
A Dependable System Architecture for Safety-Critical Respiratory-Gated Radiation Therapy. 55-60 - Robert W. Reeder, Roy A. Maxion:
User Interface Defect Detection by Hesitation Analysis. 61-72
Session 3A: Architecture and Operating Systems
- Albert Meixner, Daniel J. Sorin:
Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures. 73-82 - Jonathan Chang, George A. Reis, David I. August:
Automatic Instruction-Level Software-Only Recovery. 83-92 - Dongkook Park, Chrysostomos Nicopoulos, Jongman Kim, Narayanan Vijaykrishnan, Chita R. Das:
Exploring Fault-Tolerant Network-on-Chip Architectures. 93-104
Session 4A: Byzantine Faults
- Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David John Zage:
Scaling Byzantine Fault-Tolerant Replication toWide Area Networks. 105-114 - Christian Cachin, Stefano Tessaro:
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. 115-124 - Rachid Guerraoui, Ron R. Levy, Marko Vukolic:
Lucky Read/Write Access to Robust Atomic Storage. 125-136
Session 5A: Consensus and Leader Election
- Dan Dobre, Neeraj Suri:
One-step Consensus with Zero-Degradation. 137-146 - Marcos Kawazoe Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, Sam Toueg:
Consensus with Byzantine Failures and Little System Synchrony. 147-155 - Richard Ekwall, André Schiper:
Solving Atomic Broadcast with Indirect Consensus. 156-165 - Antonio Fernández, Ernesto Jiménez, Michel Raynal:
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony. 166-178
Session 5B: Intrusion Detection and Tolerance
- Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian:
Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. 179-188 - Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang:
A Multi-Resolution Approach for Worm Detection and Containment. 189-198 - Cliff Changchun Zou, Ryan Cunningham:
Honeypot-Aware Advanced Botnet Construction and Maintenance. 199-208 - Michael Ihde, William H. Sanders:
Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance. 209-216
Session 6A: Storage Systems
- James Lee Hafner:
HoVer Erasure Codes For Disk Arrays. 217-226 - John A. Chandy:
Storage Allocation in Unreliable Peer-to-Peer Systems. 227-236 - K. K. Rao, James Lee Hafner, Richard A. Golding:
Reliability for Networked Storage Nodes. 237-248
Session 7A: Complex and Large-Scale Systems
- Bianca Schroeder, Garth A. Gibson:
A large-scale study of failures in high-performance computing systems. 249-258 - Zhen Guo, Guofei Jiang, Haifeng Chen, Kenji Yoshihira:
Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems. 259-268 - Dinakar Dhurjati, Vikram S. Adve:
Efficiently Detecting All Dangling Pointer Uses in Production Servers. 269-280
Session 7C: VLSI
- Jie S. Hu, Shuai Wang, Sotirios G. Ziavras:
In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability. 281-290 - David de Andrés, Juan-Carlos Ruiz-Garcia, Daniel Gil, Pedro J. Gil:
Run-Time Reconfiguration for Emulating Transient Faults in VLSI Systems. 291-300 - Smruti R. Sarangi, Brian Greskamp, Josep Torrellas:
CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging. 301-312
Session 8A: Networking
- Marcello Cinque, Domenico Cotroneo, Stefano Russo:
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks. 313-322 - Amit Sahoo, Krishna Kant, Prasant Mohapatra:
Improving BGP Convergence Delay for Large-Scale Failures. 323-332 - Sihyung Lee, Tina Wong, Hyong S. Kim:
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System. 333-342 - Joseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury:
A General Framework for Scalability and Performance Analysis of DHT Routing Systems. 343-354
Performance and Dependability Symposium (PDS)
Session 1B: Dependable Storage
- Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Dependability Analysis of Virtual Memory Systems. 355-364 - Dong Tang, Peter Carruthers, Zuheir Totari, Michael W. Shapiro:
Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults. 365-370 - Shravan Gaonkar, Kimberly Keeton, Arif Merchant, William H. Sanders:
Designing dependable storage solutions for shared application environments. 371-382
Session 2B: Attack Prevention and Mitigation
- Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan:
A Statistical Analysis of Attack Data to Separate Attacks. 383-392 - Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia:
VoIP Intrusion Detection Through Interacting Protocol State Machines. 393-402 - Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei:
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. 403-412 - Lap-Chung Lam, Wei Li, Tzi-cker Chiueh:
Accurate and Automated System Call Policy-Based Intrusion Prevention. 413-424
Session 3B: Dependability Models
- Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Morris Jette, Ramendra K. Sahoo:
BlueGene/L Failure Analysis and Prediction Models. 425-434 - Alberto Avritzer, Andre B. Bondi, Michael Grottke, Kishor S. Trivedi, Elaine J. Weyuker:
Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms. 435-444 - Kaustubh R. Joshi, William H. Sanders, Matti A. Hiltunen, Richard D. Schlichting:
Automatic Recovery Using Bounded Partially Observable Markov Decision Processes. 445-456
Session 4B: Attack Analysis
- Nuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Veríssimo, Rui Ferreira Neves:
Using Attack Injection to Discover New Vulnerabilities. 457-466 - Robert Meyer, Michel Cukier:
Assessing the Attack Threat due to IRC Channels. 467-472 - Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, Ravi K. Iyer:
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks. 473-484
Session 6B: Measuring and Modeling
- Vinh Vi Lam, William H. Sanders, Peter Buchholz:
A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCs. 485-494 - Qi Zhang, Ningfang Mi, Evgenia Smirni, Alma Riska, Erik Riedel:
Evaluating the Performability of Systems with Background Jobs. 495-504 - Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wang, Amit Sangle:
A Contribution Towards Solving the Web Workload Puzzle. 505-516
Session 7B: Multiple-Server Systems
- Jennie Palmer, Isi Mitrani:
Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers. 517-525 - Ludmila Cherkasova, Jerome A. Rolia:
R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource Pools. 526-535 - Jinliang Fan, Tianying Chang, Dimitrios E. Pendarakis, Zhen Liu:
Cost-Effective Configuration of Content Resiliency Services Under Correlated Failures. 536-548
Session 8B: Distributed Algorithms
- Rachid Guerraoui, Ron R. Levy, Bastian Pochon, Vivien Quéma:
High Throughput Total Order Broadcast for Cluster Environments. 549-557 - Guang Tan, Stephen A. Jarvis, Daniel P. Spooner:
Improving the Fault Resilience of Overlay Multicast for Media Streaming. 558-567 - Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo:
Randomized Intrusion-Tolerant Asynchronous Services. 568-577 - Qurat-ul-Ain Inayat, Paul Devadoss Ezhilchelvan:
A Performance Study on the Signal-On-Fail Approach to Imposing Total Order in the Streets of Byzantium. 578-590
Special Tracks
- Adnan Agbaria, Claudio Basile, Zbigniew Kalbarczyk:
Workshop on Applied Software Reliability (WASR). 591 - Rogério de Lemos, Cristina Gacek, Alexander B. Romanovsky:
Workshop on Architecting Dependable Systems (WADS). 592 - Michel Cukier, Ioana Rus:
Workshop on Empirical Evaluation of Dependability and Security (WEEDS). 593 - Christof Fetzer:
Student Forum. 594 - Saurabh Bagchi:
Fast Abstracts. 595
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.