default search action
DSN 2007: Edinburgh, UK
- The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings. IEEE Computer Society 2007, ISBN 0-7695-2855-4
Keynote Address
- Tony Hoare:
Science and Engineering: A Collusion of Cultures. 2-9
Dependable Computing and Communications Symposium (DCCS)
Session 1A: Security Protection: Architectural Approaches
- Yixin Shi, Gyungho Lee:
Augmenting Branch Predictor to Secure Program Execution. 10-19 - Ying Zhang, Zhuoqing Morley Mao, Jia Wang:
A Firewall for Routers: Protecting against Routing Misbehavior. 20-29 - Ryan D. Riley, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. 30-40
Session 1B: Software Fault Tolerance
- Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Failure Resilience for Device Drivers. 41-50 - Nicolas Salatgé, Jean-Charles Fabre:
Fault Tolerance Connectors for Unreliable Web Services. 51-60 - Martin Süßkraut, Christof Fetzer:
Robustness and Security Hardening of COTS Software Libraries. 61-71
Session 2A: Distributed Consensus
- Piotr Zielinski:
Automatic Verification and Discovery of Byzantine Consensus Protocols. 72-81 - Fabíola Greve, Sébastien Tixeuil:
Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown Networks. 82-91 - Martin Hutle, André Schiper:
Communication Predicates: A High-Level Abstraction for Coping with Transient and Dynamic Faults. 92-101 - Josef Widder, Günther Gridling, Bettina Weiss, Jean-Paul Blanquart:
Synchronous Consensus with Mortal Byzantines. 102-112
Session 2B: Practical Experience Reports
- Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittwik Jana:
Reliability Techniques for RFID-Based Object Tracking Applications. 113-118 - Daniel Ramsbrock, Robin Berthier, Michel Cukier:
Profiling Attacker Behavior Following SSH Compromises. 119-124 - Nik Looker, Jie Xu:
Dependability Assessment of Grid Middleware. 125-130 - Marco Vieira, Nuno Laranjeiro, Henrique Madeira:
Assessing Robustness of Web-Services Infrastructures. 131-136 - Keith Harrison, Shouhuai Xu:
Protecting Cryptographic Keys from Memory Disclosure Attacks. 137-143
Session 3A: Embedded Systems
- Benjamin Lussier, Matthieu Gallien, Jérémie Guiochet, Félix Ingrand, Marc-Olivier Killijian, David Powell:
Fault Tolerant Planning for Critical Robots. 144-153 - Michael Paulitsch, Brendan Hall:
Insights into the Sensitivity of the BRAIN (Braided Ring Availability Integrity Network) - On Platform Robustness in Extended Operation. 154-163 - Marco Serafini, Neeraj Suri, Jonny Vinter, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch:
A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems. 164-174
Session 3B: Dependability Modeling
- Jon G. Elerath, Michael G. Pecht:
Enhanced Reliability Modeling of RAID Storage Systems. 175-184 - Silvano Chiaradonna, Paolo Lollini, Felicita Di Giandomenico:
On a Modeling Framework for the Analysis of Interdependencies in Electric Power Systems. 185-195
Session 4A: Hardware Fault Tolerance: Emerging Challenges
- Viswanathan Subramanian, Mikel Bezdek, Naga Durga Prasad Avirneni, Arun K. Somani:
Superscalar Processor Performance Enhancement through Reliable Dynamic Clock Frequency Tuning. 196-205 - Jay J. Wylie, Ram Swaminathan:
Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently. 206-215 - Wenjing Rao, Alex Orailoglu, Ramesh Karri:
Fault Tolerant Approaches to Nanoelectronic Programmable Logic Arrays. 216-224
Session 4B: VM Rejuvenation and Network Reliability
- James W. Mickens, Brian D. Noble:
Concilium: Collaborative Diagnosis of Broken Overlay Routes. 225-234 - Shengchao Yu, Yanyong Zhang:
R-Sentry: Providing Continuous Sensor Services against Random Node Failures. 235-244 - Kenichi Kourai, Shigeru Chiba:
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines. 245-255
Session 5A: Soft Errors: Analysis and Protection
- Teruaki Sakata, Teppei Hirotsu, Hiromichi Yamada, Takeshi Kataoka:
A Cost-Effective Dependable Microcontroller Architecture with Instruction-Level Rollback for Soft Error Recovery. 256-265 - Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers:
Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions. 266-275 - Mahdi Fazeli, Ahmad Patooghy, Seyed Ghassem Miremadi, Alireza Ejlali:
Feedback Redundancy: A Power Efficient SEU-Tolerant Latch Design for Deep Sub-Micron Technologies. 276-285 - Pablo Montesinos, Wei Liu, Josep Torrellas:
Using Register Lifetime Predictions to Protect Register Files against Soft Errors. 286-296
Session 5B: Processor Level Fault Tolerance
- Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Joseph Blomstedt, Daniel A. Connors:
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance. 297-306 - Vimal K. Reddy, Eric Rotenberg:
Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault Tolerance. 307-316 - Christopher LaFrieda, Engin Ipek, José F. Martínez, Rajit Manohar:
Utilizing Dynamically Coupled Cores to Form a Resilient Chip Multiprocessor. 317-326 - Ethan Schuchman, T. N. Vijaykumar:
BlackJack: Hard Error Detection with Redundant Threads on SMT. 327-337
Session 6A: Critical Systems: Risk Analysis and Assurance
- Robin E. Bloomfield, Bev Littlewood, David Wright:
Confidence: Its Role in Dependability Cases for Risk Assessment. 338-346 - Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk:
Assurance Based Development of Critical Systems. 347-357
Session 6B: Security Threats and Novel Detection
- Jinpeng Wei, Calton Pu:
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks. 358-367 - Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Lixia Zhang:
Understanding Resiliency of Internet Topology against Prefix Hijack Attacks. 368-377 - Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad:
User Discrimination through Structured Writing on PDAs. 378-388
Session 7A: Timing Model and Network Protocols
- Idit Keidar, Alexander Shraer:
How to Choose a Timing Model? 389-398 - Antonio Fernández, Ernesto Jiménez, Michel Raynal:
Electing an Eventual Leader in an Asynchronous Shared Memory System. 399-408 - Florian Oprea, Michael K. Reiter:
Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks. 409-418 - João Leitão, José Pereira, Luís E. T. Rodrigues:
HyParView: A Membership Protocol for Reliable Gossip-Based Broadcast. 419-429
Session 7B: Security Protection: Algorithmic Approaches
- Michael Rogers, Saleem Bhatti:
A Lightweight Mechanism for Dependable Communication in Untrusted Networks. 430-439 - Dacheng Zhang, Jie Xu, Xianxian Li:
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. 440-449 - Vasileios Pappas, Daniel Massey, Lixia Zhang:
Enhancing DNS Resilience against Denial of Service Attacks. 450-459 - Chuan Yue, Mengjun Xie, Haining Wang:
Automatic Cookie Usage Setting with CookiePicker. 460-470
Session 8A: Networking
- Mi Kyung Han, Brian Overstreet, Lili Qiu:
Greedy Receivers in IEEE 802.11 Hotspots. 471-480 - Nuno Carvalho, José Pereira, Rui Oliveira, Luís E. T. Rodrigues:
Emergent Structure in Unstructured Epidemic Multicast. 481-490 - Dimitrios Koutsonikolas, Y. Charlie Hu:
The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks. 491-501
Session 8B: Experimental Dependability Assessment
- Andréas Johansson, Neeraj Suri, Brendan Murphy:
On the Selection of Error Model(s) for OS Robustness Evaluation. 502-511 - Regina Lúcia de Oliveira Moraes, João Durães, Ricardo Barbosa, Eliane Martins, Henrique Madeira:
Experimental Risk Assessment and Comparison Using Software Fault Injection. 512-521 - Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Falai, Michele Vadursi:
Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes. 522-533
Performance and Dependability Symposium (PDS)
Session 1C: System Architecture and Software Assessment
- Jeonghee Shin, Victor V. Zyuban, Zhigang Hu, Jude A. Rivers, Pradip Bose:
A Framework for Architecture-Level Lifetime Reliability Modeling. 534-543 - Nithin Nakka, Karthik Pattabiraman, Ravishankar K. Iyer:
Processor-Level Selective Replication. 544-553 - Manuel Mendonça, Nuno Ferreira Neves:
Robustness Testing of the Windows DDK. 554-564
Session 2C: Measurement and Monitoring
- Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff:
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks. 565-574 - Adam J. Oliner, Jon Stearley:
What Supercomputers Say: A Study of Five System Logs. 575-584 - Marcello Cinque, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones. 585-594 - Kuai Xu, Feng Wang, Supratik Bhattacharyya, Zhi-Li Zhang:
A Real-Time Network Traffic Profiling System. 595-605
Session 3C: Practical Experience Reports
- Alan Wood, Swami Nathan:
RAS by the Yard. 606-611 - Marcelo De Barros, Jing Shiau, Chen Shang, Kenton Gidewall, Hui Shi, Joe Forsmann:
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services. 612-617 - Xi Chen, Juejing Feng, Martin Hiller, Vera Lauer:
Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems. 618-624
Session 4C: Distributed Algorithms
- Lívia M. R. Sampaio, Michel Hurfin, Francisco Vilar Brasileiro, Fabíola Greve:
Evaluating the Impact of Simultaneous Round Participation and Decentralized Decision on the Performance of Consensus. 625-634 - Olivier Rütti, Sergio Mena, Richard Ekwall, André Schiper:
On the Cost of Modularity in Atomic Broadcast. 635-644 - Yantao Song, Scott M. Pike:
Eventually k-Bounded Wait-Free Distributed Daemons. 645-655
Session 5C: Availability of Distributed Systems
- Mikael Asplund, Simin Nadjm-Tehrani, Stefan Beyer, Pablo Galdámez:
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints. 656-665 - Kaloian Manassiev, Cristiana Amza:
Scaling and Continuous Availability in Database Server Clusters through Multiversion Replication. 666-676 - Marcos Kawazoe Aguilera, Kimberly Keeton, Arif Merchant, Kiran-Kumar Muniswamy-Reddy, Mustafa Uysal:
Improving Recoverability in Multi-tier Storage Systems. 677-686 - Ningning Zhu, Tzi-cker Chiueh:
Portable and Efficient Continuous Data Protection for Network File Servers. 687-697
Session 6C: Modeling and Evaluation
- Hiroyuki Okamura, Michael Grottke, Tadashi Dohi, Kishor S. Trivedi:
Variational Bayesian Approach for Interval Estimation of NHPP-Based Software Reliability Models. 698-707 - Hichem Boudali, Pepijn Crouzen, Mariëlle Stoelinga:
Dynamic Fault Tree Analysis Using Input/Output Interactive Markov Chains. 708-717 - Holger Hermanns, Sven Johr:
Uniformity by Construction in the Analysis of Nondeterministic Stochastic Systems. 718-728
Session 7C: Quality of Service and Error Recovery
- Qijun Zhu, Chun Yuan:
A Reinforcement Learning Approach to Automatic Error Recovery. 729-738 - Tiejun Ma, Jane Hillston, Stuart Anderson:
On the Quality of Service of Crash-Recovery Failure Detectors. 739-748 - Sandip Agarwala, Fernando Alegre, Karsten Schwan, Jegannathan Mehalingham:
E2EProf: Automated End-to-End Performance Management for Enterprise Systems. 749-758 - Chun-Ying Huang, Chin-Laung Lei:
Bounding Peer-to-Peer Upload Traffic in Client Networks. 759-769
Session 8C: Stochastic Modeling
- Hans-Peter Schwefel, Imad Antonios:
Performability Models for Multi-Server Systems with High-Variance Repair Durations. 770-779 - Lucia Cloth, Marijn R. Jongerden, Boudewijn R. Haverkort:
Computing Battery Lifetime Distributions. 780-789 - Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens:
Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. 790-800
Special Tracks
- Luís E. T. Rodrigues:
DSN 2007 Tutorials. 801 - Christof Fetzer:
DSN 2007 Workshops. 802 - Paul D. Ezhilchelvan, Michel Raynal, Ajoy Kumar Datta:
Workshop on Dependable Application Support for Self-Organizing Networks (DASSON 2007). 803 - Miguel Castro, John Wilkes:
Third Workshop on Hot Topics in System Dependability HotDep'07. 804 - Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek:
Workshop on Architecting Dependable Systems (WADS 2007). 805-806 - Robin E. Bloomfield, Marcelo Masera, Ann Miller, O. Sami Saydjari, Charles B. Weinstock:
Assurance Cases for Security: The Metrics Challenge. 807-808 - Jean Arlat, Ravishankar K. Iyer, Michael Nicolaidis:
Workshop on Dependable and Secure Nanocomputing. 809-810 - Farnam Jahanian:
Student Forum. 811 - Hiroshi Nakamura:
Fast Abstracts. 812 - Brian Randell:
The National Programme for Information Technology in the UK Health Service: Dependability Challenges and Strategies. 813 - Lisa Spainhower:
Industry Session. 814
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.