default search action
DSN 2011: Hong Kong, China
- Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2011, Hong Kong, China, June 27-30 2011. IEEE Compute Society 2011, ISBN 978-1-4244-9233-6
- Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy:
Uni-directional trusted path: Transaction confirmation on just one device. 1-12 - Marc Brünink, Martin Süßkraut, Christof Fetzer:
Boundless memory allocations for memory safety and high availability. 13-24 - Matthew Leeke, Saima Arif, Arshad Jhumka, Sarabjot Singh Anand:
A methodology for the generation of efficient error detection mechanisms. 25-36 - Xuefeng Liu, Jiannong Cao, Md. Zakirul Alam Bhuiyan, Steven Lai, Hejun Wu, Guojun Wang:
Fault tolerant WSN-based structural health monitoring. 37-48 - Adam J. Oliner, Alex Aiken:
Online detection of multi-component interactions in production systems. 49-60 - Srinivas Krishnan, Fabian Monrose:
An empirical study of the performance, security and privacy implications of domain name prefetching. 61-72 - Péter Bokor, Johannes Kinder, Marco Serafini, Neeraj Suri:
Efficient model checking of fault-tolerant distributed protocols. 73-84 - Kyu Hyung Lee, Nick Sumner, Xiangyu Zhang, Patrick Eugster:
Unified debugging of distributed systems with Recon. 85-96 - Antonio Pecchia, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Improving Log-based Field Failure Data Analysis of multi-node computing systems. 97-108 - Frédéric Massicotte, Yvan Labiche:
An analysis of signature overlaps in Intrusion Detection Systems. 109-120 - Junjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo:
Detecting stealthy P2P botnets using statistical traffic fingerprints. 121-132 - Sheila Becker, Jeff Seibert, David Zage, Cristina Nita-Rotaru, Radu State:
Applying game theory to analyze attacks and defenses in virtual coordinate systems. 133-144 - Zoe Sebepou, Kostas Magoutis:
CEC: Continuous eventual checkpointing for data stream processing operators. 145-156 - Wyatt Lloyd, Michael J. Freedman:
Coercing clients into facilitating failover for object delivery. 157-168 - Kazuya Yamakita, Hiroshi Yamada, Kenji Kono:
Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery. 169-180 - Horatiu Jula, Pinar Tözün, George Candea:
Communix: A framework for collaborative deadlock immunity. 181-188 - Cuong Manh Pham, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
CloudVal: A framework for validation of virtualization environment in cloud infrastructure. 189-196 - Wangyuan Zhang, Tao Li:
Helmet: A resistance drift resilient architecture for multi-level cell phase change memory system. 197-208 - Chentao Wu, Xubin He, Guanying Wu, Shenggang Wan, Xiaohua Liu, Qiang Cao, Changsheng Xie:
HDP code: A Horizontal-Diagonal Parity Code to Optimize I/O load balancing in RAID-6. 209-220 - Lei Jiang, Yu Du, Youtao Zhang, Bruce R. Childers, Jun Yang:
LLS: Cooperative integration of wear-leveling and salvaging for PCM main memory. 221-232 - Edmund L. Wong, Vitaly Shmatikov:
Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing. 233-244 - Flavio Paiva Junqueira, Benjamin C. Reed, Marco Serafini:
Zab: High-performance broadcast for primary-backup systems. 245-256 - Walther Maldonado, Patrick Marlier, Pascal Felber, Julia Lawall, Gilles Muller, Etienne Rivière:
Deadline-aware scheduling for Software Transactional Memory. 257-268 - Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, Rick Kuhn:
A combinatorial approach to detecting buffer overflow vulnerabilities. 269-278 - Bardia Zandian, Murali Annavaram:
Cross-layer resilience using wearout aware design flow. 279-290 - Shuchang Shan, Yu Hu, Xiaowei Li:
Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessors. 291-302 - Ruben Alexandersson, Johan Karlsson:
Fault injection-based assessment of aspect-oriented implementation of fault tolerance. 303-314 - Satya Gautam Vadlamudi, P. P. Chakrabarti, Dipankar Das, Purnendu Sinha:
A framework for early stage quality-fault tolerance analysis of embedded control systems. 315-322 - Nishant J. George, John C. Lach:
Characterization of logical masking and error propagation in combinational circuits and effects on system vulnerability. 323-334 - Francesco Longo, Rahul Ghosh, Vijay K. Naik, Kishor S. Trivedi:
A scalable availability model for Infrastructure-as-a-Service cloud. 335-346 - Emmanuelle Anceaume, Bruno Sericola, Romaric Ludinard, Frederic Tronel:
Modeling and evaluating targeted attacks in large scale dynamic systems. 347-358 - Marta Z. Kwiatkowska, David Parker, Hongyang Qu:
Incremental quantitative verification for Markov decision processes. 359-370 - Min Lee, A. S. Krishnakumar, Parameshwaran Krishnan, Navjot Singh, Shalini Yajnik:
Hypervisor-assisted application checkpointing in virtualized environments. 371-382 - Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, Nuno Ferreira Neves, Rafael R. Obelheiro:
OS diversity for intrusion tolerance: Myth or reality? 383-394 - Daniel Gmach, Jerry Rolia, Ludmila Cherkasova:
Resource and virtualization costs up in the cloud: Models and design choices. 395-402 - Silviu Andrica, George Candea:
WaRR: A tool for high-fidelity web application record and replay. 403-410 - Marc Brünink, André Schmitt, Thomas Knauth, Martin Süßkraut, Ute Schiffel, Stephan Creutz, Christof Fetzer:
Aaron: An adaptable execution environment. 411-421 - Raul Barbosa, Johan Karlsson, Qiu Yu, Xiaozhen Mao:
Toward dependability benchmarking of partitioning operating systems. 422-429 - Gabriela Jacques-Silva, Zbigniew Kalbarczyk, Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Ravishankar K. Iyer:
Modeling stream processing applications for dependability evaluation. 430-441 - Silvano Chiaradonna, Felicita Di Giandomenico, Nicola Nostro:
Modeling and analysis of the impact of failures in Electric Power Systems organized in interconnected regions. 442-453 - Parisa Jalili Marandi, Marco Primi, Fernando Pedone:
High performance state-machine replication. 454-465 - Edward Condon, Emily Cummins, Zaïna Afoulki, Michel Cukier:
How secure are networked office devices? 465-472 - Xiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee:
A combinatorial approach to network covert communications with applications in Web Leaks. 474-485 - Sunghun Kim, Thomas Zimmermann, Nachiappan Nagappan:
Crash graphs: An aggregated view of multiple crashes to improve crash triage. 486-493 - Xin Huang, Fabian Monrose, Michael K. Reiter:
Amplifying limited expert input to sanitize large network traces. 494-505 - Aashish Sharma, Zbigniew Kalbarczyk, James Barlow, Ravishankar K. Iyer:
Analysis of security data from a large computing organization. 506-517 - Abhishek Rajimwale, Vijay Chidambaram, Deepak Ramamurthi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Coerced Cache Eviction and discreet mode journaling: Dealing with misbehaving disks. 518-529 - Sriram Sankar, Mark Shaw, Kushagra Vaid:
Impact of temperature on hard disk drive reliability in large datacenters. 530-537 - Matthew Dobson, Spyros Voulgaris, Maarten van Steen:
Merging ultra-low duty cycle networks. 538-549 - Jin Cao, Aiyou Chen, Patrick P. C. Lee:
Modeling time correlation in passive network loss tomography. 550-561 - Takayuki Osogami, Rudy Raymond:
Simple bounds for a transient queue. 562-573 - Vittoria De Nitto Persone, Giuliano Casale, Evgenia Smirni:
Approximate analysis of blocking queueing networks with temporal dependence. 574-585 - Alysson Neves Bessani, Partha P. Pal:
5th Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011. 586-587 - Jean Arlat, Cristian Constantinescu, Johan Karlsson, Takashi Nanya, Alan Wood:
Introduction to the fifth workshop on dependable and secure nanocomputing. 588-589 - Jogesh K. Muppala, Matti A. Hiltunen, Robert J. Stroud, Ji Wang:
The First International Workshop on Dependability of Clouds, data centers and Virtual Computing Environments. 590-591 - Andreas Haeberlen, Mootaz Elnozahy:
Seventh workshop on hot topics in system dependability (HotDep'11). 592 - Mario Tokoro, Karama Kanoun, Kimio Kuramitsu, Jean-Charles Fabre:
WOSD 2011 the first international workshop on open systems dependability. 593-594 - Miroslaw Malek, Felix Salfner, Kishor S. Trivedi:
Third workshop on proactive failure avoidance, recovery, and maintenance (PFARM). 595-596 - Domenico Cotroneo, Vincenzo De Florio:
5th international workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011. 597-598
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.