| 2005 | 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings |
| 2005 | A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications. Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy |
| 2005 | A Distributed State Monitoring Service for Adaptive Application Management. Paul Murray |
| 2005 | A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems. Joakim Aidemark, Peter Folkesson, Johan Karlsson |
| 2005 | A Hybrid and Adaptive Model for Fault-Tolerant Distributed Computing. Sérgio Gorender, Raimundo A. Macêdo, Michel Raynal |
| 2005 | A Model of Stateful Firewalls and Its Properties. Mohamed G. Gouda, Alex X. Liu |
| 2005 | A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures. François Taïani, Jean-Charles Fabre, Marc-Olivier Killijian |
| 2005 | A Novel Approach for Fitting Probability Distributions to Real Trace Data with the EM Algorithm. Axel Thümmler, Peter Buchholz, Miklós Telek |
| 2005 | A Performability-Oriented Software Rejuvenation Framework for Distributed Applications. Ann T. Tai, Kam S. Tso, William H. Sanders, Savio N. Chau |
| 2005 | A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks. Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano Gaeta, Michele Garetto, Daniele Manini, Matteo Sereno |
| 2005 | A System Demonstration of ST-TCP. Manish Marwah, Shivakant Mishra, Christof Fetzer |
| 2005 | A Wavefront Parallelisation of CTMC Solution Using MTBDDs. Yi Zhang, David Parker, Marta Z. Kwiatkowska |
| 2005 | ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford |
| 2005 | Adaptive Indulgent Consensus. Lívia M. R. Sampaio, Francisco Vilar Brasileiro |
| 2005 | An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier |
| 2005 | Analysis of Probabilistic Trapezoid Protocol for Data Replication. Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki |
| 2005 | Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks. Henrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen |
| 2005 | Assessing the Performance of Erasure Codes in the Wide-Area. Rebecca L. Collins, James S. Plank |
| 2005 | Assured Reconfiguration of Fail-Stop Systems. Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello |
| 2005 | Authenticated System Calls. Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting |
| 2005 | Checking Array Bound Violation Using Segmentation Hardware. Lap-Chung Lam, Tzi-cker Chiueh |
| 2005 | Co-Design Based Approach to Improve Robustness in Networked Control Systems. Sumant Kowshik, Girish Baliga, Scott R. Graham, Lui Sha |
| 2005 | Combining Error Masking and Error Detection Plus Recovery to Combat Soft Errors in Static CMOS Circuits. Srivathsan Krishnamohan, Nihar R. Mahapatra |
| 2005 | Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems. Peter Kemper, Dennis Müller, Axel Thümmler |
| 2005 | Conference Organizers. |
| 2005 | Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. Zonghua Zhang, Hong Shen |
| 2005 | Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems. Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman |
| 2005 | Crash Data Collection: A Windows Case Study. Archana Ganapathi, David A. Patterson |
| 2005 | Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating Systems. G. John Janakiraman, Jose Renato Santos, Dinesh Subhraveti, Yoshio Turner |
| 2005 | DCCS Program Committee. |
| 2005 | DCCS Reviewers. |
| 2005 | Defeating Memory Corruption Attacks via Pointer Taintedness Detection. Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2005 | Definition and Specification of Accrual Failure Detectors. Xavier Défago, Péter Urbán, Naohiro Hayashibara, Takuya Katayama |
| 2005 | Dependability Benchmarking of Computing Systems - Panel Statement. Cristian Constantinescu, Karama Kanoun, Henrique Madeira, Brendan Murphy, Ira Pramanick, Aaron B. Brown |
| 2005 | Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms. Elizabeth Latronico, Philip Koopman |
| 2005 | Detecting Stealth Software with Strider GhostBuster. Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski |
| 2005 | Effective Testing and Debugging Techniques for a Group Communication System. Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Krits, Roman Vitenberg |
| 2005 | Efficient Byzantine Broadcast in Wireless Ad-Hoc Networks. Vadim Drabkin, Roy Friedman, Marc Segal |
| 2005 | Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files. Gokhan Memik, Masud H. Chowdhury, Arindam Mallik, Yehea I. Ismail |
| 2005 | Ensembles of Models for Automated Diagnosis of System Performance Problems. Steve Zhang, Ira Cohen, Moisés Goldszmidt, Julie Symons, Armando Fox |
| 2005 | Error Propagation Profiling of Operating Systems. Andréas Johansson, Neeraj Suri |
| 2005 | Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles. Jonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson |
| 2005 | Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network. Lorenzo Falai, Andrea Bondavalli |
| 2005 | Fast Byzantine Consensus. Jean-Philippe Martin, Lorenzo Alvisi |
| 2005 | Fatih: Detecting and Isolating Malicious Routers. Alper Tugay Mizrak, Yuchung Cheng, Keith Marzullo, Stefan Savage |
| 2005 | Filtering Failure Logs for a BlueGene/L Prototype. Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Ramendra K. Sahoo, José E. Moreira, Manish Gupta |
| 2005 | Finding Critical Traffic Matrices. Yin Zhang, Zihui Ge |
| 2005 | GoCast: Gossip-Enhanced Overlay Multicast for Fast and Dependable Group Communication. Chunqiang Tang, Rong N. Chang, Christopher Ward |
| 2005 | H-RAFT - Heuristic Reachability Analysis for Fault Tolerance Protocols Modelled in SDL. Sabine M. Böhm |
| 2005 | How Fast Can Eventual Synchrony Lead to Consensus?. Partha Dutta, Rachid Guerraoui, Leslie Lamport |
| 2005 | How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo |
| 2005 | Improving TCP Performance for Multihop Wireless Networks. Sherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon |
| 2005 | Internet Routing Anomaly Detection and Visualization. Tina Wong, Van Jacobson, Cengiz Alaettinoglu |
| 2005 | LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. Issa M. Khalil, Saurabh Bagchi, Ness B. Shroff |
| 2005 | Lumping Matrix Diagram Representations of Markov Models. Salem Derisavi, Peter Kemper, William H. Sanders |
| 2005 | Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair. |
| 2005 | Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs. |
| 2005 | Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors. Moinuddin K. Qureshi, Onur Mutlu, Yale N. Patt |
| 2005 | Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic. Giacinto Paolo Saggese, Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2005 | Model Checking Markov Reward Models with Impulse Rewards. Lucia Cloth, Joost-Pieter Katoen, Maneesh Khattri, Reza Pulungan |
| 2005 | Model-Based Failure Analysis of Journaling File Systems. Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
| 2005 | Modeling Coordinated Checkpointing for Large-Scale Supercomputers. Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood |
| 2005 | Modeling and Automated Containment of Worms. Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi |
| 2005 | Neutralization of Errors and Attacks in Wireless Ad Hoc Networks. Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2005 | Neutron SER Characterization of Microprocessors. Cristian Constantinescu |
| 2005 | NonStop® Advanced Architecture. David Bernick, Bill Bruckert, Paul Del Vigna, David García, Robert Jardine, Jim Klecka, Jim Smullen |
| 2005 | Observation of Local and Distant Earthquakes and Tsunami Warning System. Mitsuyuki Hoshiba |
| 2005 | On Partial Protection in Groomed Optical WDM Mesh Networks. Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam |
| 2005 | On a Method for Mending Time to Failure Distributions. Michael Grottke, Kishor S. Trivedi |
| 2005 | On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core. Paolo Bernardi, Letícia Maria Veiras Bolzani, Maurizio Rebaudengo, Matteo Sonza Reorda, Fabian Vargas, Massimo Violante |
| 2005 | Optimizing the Pulsing Denial-of-Service Attacks. Xiapu Luo, Rocky K. C. Chang |
| 2005 | PDS Reviewers. |
| 2005 | PDS Steering and Program Committees. |
| 2005 | Perturbation-Resistant and Overlay-Independent Resource Discovery. Steven Y. Ko, Indranil Gupta |
| 2005 | Probabilistic QoS Guarantees for Supercomputing Systems. Adam J. Oliner, Larry Rudolph, Ramendra K. Sahoo, José E. Moreira, Manish Gupta |
| 2005 | ReStore: Symptom Based Soft Error Detection in Microprocessors. Nicholas J. Wang, Sanjay J. Patel |
| 2005 | Resilient Routing Layers for Recovery in Packet Networks. Audun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing, Olav Lysne |
| 2005 | Reversible Fault-Tolerant Logic. P. Oscar Boykin, Vwani P. Roychowdhury |
| 2005 | Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. Brendan Hall, Kevin Driscoll, Michael Paulitsch, Samar Dajani-Brown |
| 2005 | SMRP: Fast Restoration of Multicast Sessions from Persistent Failures. Jian Wu, Kang G. Shin |
| 2005 | Scalable and Robust WLAN Connectivity Using Access Point Array. Fanglu Guo, Tzi-cker Chiueh |
| 2005 | Small Parity-Check Erasure Codes - Exploration and Observations. James S. Plank, Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason |
| 2005 | SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors. Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers |
| 2005 | Stability Monitoring and Analysis of Learning in an Adaptive System. Sampath Yerramalla, Bojan Cukic, Martin Mladenovski, Edgar Fuller |
| 2005 | TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu |
| 2005 | Testing the Dependability and Performance of Group Communication Based Database Replication Protocols. António Luís Sousa, José Pereira, Luís Soares, Alfrânio Correia Jr., L. Rocha, Rui Oliveira, Francisco Moura |
| 2005 | The Effects of Algorithmic Diversity on Anomaly Detector Performance. Kymie M. C. Tan, Roy A. Maxion |
| 2005 | Towards a Security Benchmark for Database Management Systems. Marco Vieira, Henrique Madeira |
| 2005 | Towards a Theory of Insider Threat Assessment. Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya |
| 2005 | User Interface Dependability through Goal-Error Prevention. Robert W. Reeder, Roy A. Maxion |
| 2005 | Using Erasure Codes Efficiently for Storage in a Distributed System. Marcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu |
| 2005 | W.C. Carter Award. |
| 2005 | Welcome Message from the General Chair and Conference Coordinator. |
| 2005 | Workshop on Assurance of Networking Systems Dependability Service Level Agreements - Workshop Abstract. Saïda Benlarbi |
| 2005 | Workshop on Dependable Software - Tools and Methods - Workshop Abstract. Takuya Katayama, Yutaka Ishikawa, Yoshiki Kinoshita |
| 2005 | Workshop on Hot Topics in System Depend - Workshop Abstract. George Candea, David Oppenheimer |