| 2008 | A characterization of instruction-level error derating and its implications for error detection. Jeffrey J. Cook, Craig B. Zilles |
| 2008 | A fast restart mechanism for checkpoint/recovery protocols in networked environments. Yawei Li, Zhiling Lan |
| 2008 | A fault-tolerant directory-based cache coherence protocol for CMP architectures. Ricardo Fernández-Pascual, José M. García, Manuel E. Acacio, José Duato |
| 2008 | A log mining approach to failure analysis of enterprise telephony systems. Chinghway Lim, Navjot Singh, Shalini Yajnik |
| 2008 | A recurrence-relation-based reward model for performability evaluation of embedded systems. Ann T. Tai, Kam S. Tso, William H. Sanders |
| 2008 | A robust and lightweight stable leader election service for dynamic systems. Nicolas Schiper, Sam Toueg |
| 2008 | A smart triggering scheme to reduce service interruption during heterogeneous handovers. Huaiyu Liu, Christian Maciocco, Vijay Kesavan, Andy Lock Yen Low |
| 2008 | A study of cognitive resilience in a JPEG compressor. Damian Nowroth, Ilia Polian, Bernd Becker |
| 2008 | AGIS: Towards automatic generation of infection signatures. Zhuowei Li, Xiaofeng Wang, Zhenkai Liang, Michael K. Reiter |
| 2008 | An accurate flip-flop selection technique for reducing logic SER. Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja |
| 2008 | An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. Kivanc M. Ozonat |
| 2008 | An integrated approach to resource pool management: Policies, efficiency and quality metrics. Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Guillaume Belrose, Tom Turicchi, Alfons Kemper |
| 2008 | Analysis and solutions to issue queue process variation. Niranjan Soundararajan, Aditya Yanamandra, Chrysostomos Nicopoulos, Narayanan Vijaykrishnan, Anand Sivasubramaniam, Mary Jane Irwin |
| 2008 | Analyzing the effects of disk-pointer corruption. Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift |
| 2008 | Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni |
| 2008 | Architectural dependability evaluation with Arcade. Hichem Boudali, Pepijn Crouzen, Boudewijn R. Haverkort, Matthias Kuntz, Mariëlle Stoelinga |
| 2008 | Automated duplicate detection for bug tracking systems. Nicholas Jalbert, Westley Weimer |
| 2008 | Automatic security assessment of critical cyber-infrastructures. Zahid Anwar, Ravinder Shankesi, Roy H. Campbell |
| 2008 | Automotive Enhanced Vision Systems - Issues arising from placing users in the loop. Thomas Seder |
| 2008 | BAR primer. Allen Clement, Harry C. Li, Jeff Napper, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin |
| 2008 | Byzantine replication under attack. Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane |
| 2008 | Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors. Xin Fu, Tao Li, José A. B. Fortes |
| 2008 | ConfErr: A tool for assessing resilience to human configuration errors. Lorenzo Keller, Prasang Upadhyaya, George Candea |
| 2008 | Convicting exploitable software vulnerabilities: An efficient input provenance based approach. Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu |
| 2008 | Coverage of a microarchitecture-level fault check regimen in a superscalar processor. Vimal K. Reddy, Eric Rotenberg |
| 2008 | Dependability on the last frontier. Alex Hills |
| 2008 | Detouring: Translating software to circumvent hard faults in simple cores. Albert Meixner, Daniel J. Sorin |
| 2008 | End-system tools for enhancing email reliability. Tim Moors, Patrick Chu |
| 2008 | Enhanced server fault-tolerance for improved user experience. Manish Marwah, Shivakant Mishra, Christof Fetzer |
| 2008 | Enhancing data availability in disk drives through background activities. Ningfang Mi, Alma Riska, Evgenia Smirni, Erik Riedel |
| 2008 | Evaluating availability under quasi-heavy-tailed repair times. Sei Kato, Takayuki Osogami |
| 2008 | Evaluating email's feasibility for botnet command and control. Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee |
| 2008 | Experiences with formal specification of fault-tolerant file systems. Roxana Geambasu, Andrew Birrell, John MacCormick |
| 2008 | Hot-spot prediction and alleviation in distributed stream processing applications. Thomas Repantis, Vana Kalogeraki |
| 2008 | Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing. Yoshitomo Murata, Tsutomu Inaba, Hiroyuki Takizawa, Hiroaki Kobayashi |
| 2008 | Improving dependability of network configuration through policy classification. Sihyung Lee, Tina Wong, Hyong S. Kim |
| 2008 | Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL. Paolo Romano, Francesco Quaglia |
| 2008 | International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008). Andrea Bondavalli, István Majzik, Aad P. A. van Moorsel |
| 2008 | Mapping software faults with web security vulnerabilities. José Fonseca, Marco Vieira |
| 2008 | Message from the DCCS program chair. Neeraj Suri |
| 2008 | Message from the PDS program chair. Kimberly Keeton |
| 2008 | Message from the conference general chair and coordinator. Philip Koopman, Henrique Madeira |
| 2008 | On localization attacks to Internet Threat Monitors: An information-theoretic framework. Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao |
| 2008 | On representing knowledge in the dependability domain: a panel discussion. Algirdas Avizienis |
| 2008 | Probabilistic quorum systems in wireless ad hoc networks. Roy Friedman, Gabriel Kliot, Chen Avin |
| 2008 | Reliability of flat XOR-based erasure codes on heterogeneous devices. Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie |
| 2008 | Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders |
| 2008 | Scheduling algorithms for unpredictably heterogeneous CMP architectures. Jonathan A. Winter, David H. Albonesi |
| 2008 | Scheduling for performance and availability in systems with temporal dependent workloads. Ningfang Mi, Giuliano Casale, Evgenia Smirni |
| 2008 | Second workshop on dependable and secure nanocomputing. Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaidis |
| 2008 | Security through redundant data diversity. Anh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson |
| 2008 | Silent Data Corruption - Myth or reality? Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak |
| 2008 | Statistical Fault Injection. Pradeep Ramachandran, Prabhakar Kudva, Jeffrey W. Kellington, John Schumann, Pia N. Sanda |
| 2008 | Survivability quantification of communication services. Poul E. Heegaard, Kishor S. Trivedi |
| 2008 | SymPLFIED: Symbolic program-level fault injection and error detection framework. Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2008 | TCP covert timing channels: Design and detection. Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang |
| 2008 | Tempest: Soft state replication in the service tier. Tudor Marian, Mahesh Balakrishnan, Ken Birman, Robbert van Renesse |
| 2008 | Tempest: Towards early identification of failure-prone binaries. Thirumalesh Bhat, Nachiappan Nagappan |
| 2008 | The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings |
| 2008 | Toward an understanding of the processing delay of peer-to-peer relay nodes. Kuan-Ta Chen, Jing-Kai Lou |
| 2008 | Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario |
| 2008 | Towards assessing the security of DBMS configurations. Afonso Araújo Neto, Marco Vieira |
| 2008 | Trace-based microarchitecture-level diagnosis of permanent hardware faults. Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou |
| 2008 | Traffic grooming in WDM mesh networks with guaranteed survivability. Ataul Bari, Quazi Rahman, Arunita Jaekel, Subir Bandyopadhyay |
| 2008 | Using an assurance case to support independent assessment of the transition to a new GPS ground control system. Elisabeth A. Nguyen, William S. Greenwell, Myron Hecht |
| 2008 | Using likely program invariants to detect hardware errors. Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou |
| 2008 | Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor. Hisashige Ando, Ryuji Kan, Yoshiharu Tosaka, Keiji Takahisa, Kichiji Hatanaka |
| 2008 | WS-DREAM: A distributed reliability assessment Mechanism for Web Services. Zibin Zheng, Michael R. Lyu |
| 2008 | Workshop on Architecting Dependable Systems (WADS 2008). Rogério de Lemos, Jean-Charles Fabre, Cristina Gacek |
| 2008 | Workshop on compiler and architectural techniques for application reliability and security (CATARS). Karthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk |