


default search action
DSN 2011: Hong Kong, China
- Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2011, Hong Kong, China, June 27-30 2011. IEEE Compute Society 2011, ISBN 978-1-4244-9233-6

- Atanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy:

Uni-directional trusted path: Transaction confirmation on just one device. 1-12 - Marc Brünink, Martin Süßkraut, Christof Fetzer:

Boundless memory allocations for memory safety and high availability. 13-24 - Matthew Leeke, Saima Arif, Arshad Jhumka, Sarabjot Singh Anand:

A methodology for the generation of efficient error detection mechanisms. 25-36 - Xuefeng Liu, Jiannong Cao

, Md. Zakirul Alam Bhuiyan
, Steven Lai, Hejun Wu, Guojun Wang:
Fault tolerant WSN-based structural health monitoring. 37-48 - Adam J. Oliner, Alex Aiken:

Online detection of multi-component interactions in production systems. 49-60 - Srinivas Krishnan, Fabian Monrose:

An empirical study of the performance, security and privacy implications of domain name prefetching. 61-72 - Péter Bokor, Johannes Kinder, Marco Serafini, Neeraj Suri

:
Efficient model checking of fault-tolerant distributed protocols. 73-84 - Kyu Hyung Lee, Nick Sumner

, Xiangyu Zhang, Patrick Eugster:
Unified debugging of distributed systems with Recon. 85-96 - Antonio Pecchia, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Improving Log-based Field Failure Data Analysis of multi-node computing systems. 97-108 - Frédéric Massicotte, Yvan Labiche

:
An analysis of signature overlaps in Intrusion Detection Systems. 109-120 - Junjie Zhang, Roberto Perdisci

, Wenke Lee, Unum Sarfraz, Xiapu Luo
:
Detecting stealthy P2P botnets using statistical traffic fingerprints. 121-132 - Sheila Becker, Jeff Seibert, David Zage, Cristina Nita-Rotaru, Radu State:

Applying game theory to analyze attacks and defenses in virtual coordinate systems. 133-144 - Zoe Sebepou, Kostas Magoutis

:
CEC: Continuous eventual checkpointing for data stream processing operators. 145-156 - Wyatt Lloyd, Michael J. Freedman:

Coercing clients into facilitating failover for object delivery. 157-168 - Kazuya Yamakita, Hiroshi Yamada, Kenji Kono:

Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery. 169-180 - Horatiu Jula, Pinar Tözün

, George Candea:
Communix: A framework for collaborative deadlock immunity. 181-188 - Cuong Manh Pham, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

CloudVal: A framework for validation of virtualization environment in cloud infrastructure. 189-196 - Wangyuan Zhang, Tao Li:

Helmet: A resistance drift resilient architecture for multi-level cell phase change memory system. 197-208 - Chentao Wu, Xubin He, Guanying Wu, Shenggang Wan, Xiaohua Liu, Qiang Cao, Changsheng Xie:

HDP code: A Horizontal-Diagonal Parity Code to Optimize I/O load balancing in RAID-6. 209-220 - Lei Jiang, Yu Du, Youtao Zhang, Bruce R. Childers, Jun Yang:

LLS: Cooperative integration of wear-leveling and salvaging for PCM main memory. 221-232 - Edmund L. Wong, Vitaly Shmatikov:

Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing. 233-244 - Flavio Paiva Junqueira, Benjamin C. Reed

, Marco Serafini:
Zab: High-performance broadcast for primary-backup systems. 245-256 - Walther Maldonado, Patrick Marlier, Pascal Felber

, Julia Lawall, Gilles Muller, Etienne Rivière:
Deadline-aware scheduling for Software Transactional Memory. 257-268 - Wenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner

, Dazhi Zhang, Raghu Kacker, Rick Kuhn:
A combinatorial approach to detecting buffer overflow vulnerabilities. 269-278 - Bardia Zandian, Murali Annavaram

:
Cross-layer resilience using wearout aware design flow. 279-290 - Shuchang Shan, Yu Hu, Xiaowei Li:

Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessors. 291-302 - Ruben Alexandersson, Johan Karlsson:

Fault injection-based assessment of aspect-oriented implementation of fault tolerance. 303-314 - Satya Gautam Vadlamudi, P. P. Chakrabarti, Dipankar Das, Purnendu Sinha:

A framework for early stage quality-fault tolerance analysis of embedded control systems. 315-322 - Nishant J. George, John C. Lach:

Characterization of logical masking and error propagation in combinational circuits and effects on system vulnerability. 323-334 - Francesco Longo

, Rahul Ghosh, Vijay K. Naik, Kishor S. Trivedi:
A scalable availability model for Infrastructure-as-a-Service cloud. 335-346 - Emmanuelle Anceaume, Bruno Sericola, Romaric Ludinard

, Frederic Tronel
:
Modeling and evaluating targeted attacks in large scale dynamic systems. 347-358 - Marta Z. Kwiatkowska, David Parker

, Hongyang Qu:
Incremental quantitative verification for Markov decision processes. 359-370 - Min Lee, A. S. Krishnakumar, Parameshwaran Krishnan, Navjot Singh, Shalini Yajnik:

Hypervisor-assisted application checkpointing in virtualized environments. 371-382 - Miguel Garcia

, Alysson Neves Bessani
, Ilir Gashi
, Nuno Ferreira Neves
, Rafael R. Obelheiro:
OS diversity for intrusion tolerance: Myth or reality? 383-394 - Daniel Gmach, Jerry Rolia, Ludmila Cherkasova:

Resource and virtualization costs up in the cloud: Models and design choices. 395-402 - Silviu Andrica, George Candea:

WaRR: A tool for high-fidelity web application record and replay. 403-410 - Marc Brünink, André Schmitt, Thomas Knauth, Martin Süßkraut, Ute Schiffel, Stephan Creutz, Christof Fetzer:

Aaron: An adaptable execution environment. 411-421 - Raul Barbosa

, Johan Karlsson, Qiu Yu, Xiaozhen Mao:
Toward dependability benchmarking of partitioning operating systems. 422-429 - Gabriela Jacques-Silva, Zbigniew Kalbarczyk, Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Ravishankar K. Iyer:

Modeling stream processing applications for dependability evaluation. 430-441 - Silvano Chiaradonna, Felicita Di Giandomenico, Nicola Nostro

:
Modeling and analysis of the impact of failures in Electric Power Systems organized in interconnected regions. 442-453 - Parisa Jalili Marandi, Marco Primi, Fernando Pedone

:
High performance state-machine replication. 454-465 - Edward Condon, Emily Cummins, Zaïna Afoulki, Michel Cukier:

How secure are networked office devices? 465-472 - Xiapu Luo

, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang
, Wenke Lee:
A combinatorial approach to network covert communications with applications in Web Leaks. 474-485 - Sunghun Kim, Thomas Zimmermann, Nachiappan Nagappan:

Crash graphs: An aggregated view of multiple crashes to improve crash triage. 486-493 - Xin Huang, Fabian Monrose, Michael K. Reiter:

Amplifying limited expert input to sanitize large network traces. 494-505 - Aashish Sharma, Zbigniew Kalbarczyk, James Barlow, Ravishankar K. Iyer:

Analysis of security data from a large computing organization. 506-517 - Abhishek Rajimwale, Vijay Chidambaram

, Deepak Ramamurthi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Coerced Cache Eviction and discreet mode journaling: Dealing with misbehaving disks. 518-529 - Sriram Sankar, Mark Shaw, Kushagra Vaid:

Impact of temperature on hard disk drive reliability in large datacenters. 530-537 - Matthew Dobson, Spyros Voulgaris, Maarten van Steen

:
Merging ultra-low duty cycle networks. 538-549 - Jin Cao, Aiyou Chen, Patrick P. C. Lee

:
Modeling time correlation in passive network loss tomography. 550-561 - Takayuki Osogami, Rudy Raymond

:
Simple bounds for a transient queue. 562-573 - Vittoria De Nitto Persone, Giuliano Casale, Evgenia Smirni:

Approximate analysis of blocking queueing networks with temporal dependence. 574-585 - Alysson Neves Bessani, Partha P. Pal

:
5th Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011. 586-587 - Jean Arlat, Cristian Constantinescu, Johan Karlsson, Takashi Nanya, Alan Wood:

Introduction to the fifth workshop on dependable and secure nanocomputing. 588-589 - Jogesh K. Muppala

, Matti A. Hiltunen, Robert J. Stroud, Ji Wang:
The First International Workshop on Dependability of Clouds, data centers and Virtual Computing Environments. 590-591 - Andreas Haeberlen

, Mootaz Elnozahy:
Seventh workshop on hot topics in system dependability (HotDep'11). 592 - Mario Tokoro, Karama Kanoun, Kimio Kuramitsu

, Jean-Charles Fabre:
WOSD 2011 the first international workshop on open systems dependability. 593-594 - Miroslaw Malek, Felix Salfner, Kishor S. Trivedi:

Third workshop on proactive failure avoidance, recovery, and maintenance (PFARM). 595-596 - Domenico Cotroneo, Vincenzo De Florio

:
5th international workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011. 597-598

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














