DSN A

70 papers

YearTitle / Authors
2008A characterization of instruction-level error derating and its implications for error detection.
Jeffrey J. Cook, Craig B. Zilles
2008A fast restart mechanism for checkpoint/recovery protocols in networked environments.
Yawei Li, Zhiling Lan
2008A fault-tolerant directory-based cache coherence protocol for CMP architectures.
Ricardo Fernández-Pascual, José M. García, Manuel E. Acacio, José Duato
2008A log mining approach to failure analysis of enterprise telephony systems.
Chinghway Lim, Navjot Singh, Shalini Yajnik
2008A recurrence-relation-based reward model for performability evaluation of embedded systems.
Ann T. Tai, Kam S. Tso, William H. Sanders
2008A robust and lightweight stable leader election service for dynamic systems.
Nicolas Schiper, Sam Toueg
2008A smart triggering scheme to reduce service interruption during heterogeneous handovers.
Huaiyu Liu, Christian Maciocco, Vijay Kesavan, Andy Lock Yen Low
2008A study of cognitive resilience in a JPEG compressor.
Damian Nowroth, Ilia Polian, Bernd Becker
2008AGIS: Towards automatic generation of infection signatures.
Zhuowei Li, Xiaofeng Wang, Zhenkai Liang, Michael K. Reiter
2008An accurate flip-flop selection technique for reducing logic SER.
Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja
2008An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services.
Kivanc M. Ozonat
2008An integrated approach to resource pool management: Policies, efficiency and quality metrics.
Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Guillaume Belrose, Tom Turicchi, Alfons Kemper
2008Analysis and solutions to issue queue process variation.
Niranjan Soundararajan, Aditya Yanamandra, Chrysostomos Nicopoulos, Narayanan Vijaykrishnan, Anand Sivasubramaniam, Mary Jane Irwin
2008Analyzing the effects of disk-pointer corruption.
Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift
2008Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change.
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni
2008Architectural dependability evaluation with Arcade.
Hichem Boudali, Pepijn Crouzen, Boudewijn R. Haverkort, Matthias Kuntz, Mariëlle Stoelinga
2008Automated duplicate detection for bug tracking systems.
Nicholas Jalbert, Westley Weimer
2008Automatic security assessment of critical cyber-infrastructures.
Zahid Anwar, Ravinder Shankesi, Roy H. Campbell
2008Automotive Enhanced Vision Systems - Issues arising from placing users in the loop.
Thomas Seder
2008BAR primer.
Allen Clement, Harry C. Li, Jeff Napper, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin
2008Byzantine replication under attack.
Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane
2008Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors.
Xin Fu, Tao Li, José A. B. Fortes
2008ConfErr: A tool for assessing resilience to human configuration errors.
Lorenzo Keller, Prasang Upadhyaya, George Candea
2008Convicting exploitable software vulnerabilities: An efficient input provenance based approach.
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
2008Coverage of a microarchitecture-level fault check regimen in a superscalar processor.
Vimal K. Reddy, Eric Rotenberg
2008Dependability on the last frontier.
Alex Hills
2008Detouring: Translating software to circumvent hard faults in simple cores.
Albert Meixner, Daniel J. Sorin
2008End-system tools for enhancing email reliability.
Tim Moors, Patrick Chu
2008Enhanced server fault-tolerance for improved user experience.
Manish Marwah, Shivakant Mishra, Christof Fetzer
2008Enhancing data availability in disk drives through background activities.
Ningfang Mi, Alma Riska, Evgenia Smirni, Erik Riedel
2008Evaluating availability under quasi-heavy-tailed repair times.
Sei Kato, Takayuki Osogami
2008Evaluating email's feasibility for botnet command and control.
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee
2008Experiences with formal specification of fault-tolerant file systems.
Roxana Geambasu, Andrew Birrell, John MacCormick
2008Hot-spot prediction and alleviation in distributed stream processing applications.
Thomas Repantis, Vana Kalogeraki
2008Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing.
Yoshitomo Murata, Tsutomu Inaba, Hiroyuki Takizawa, Hiroaki Kobayashi
2008Improving dependability of network configuration through policy classification.
Sihyung Lee, Tina Wong, Hyong S. Kim
2008Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL.
Paolo Romano, Francesco Quaglia
2008International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008).
Andrea Bondavalli, István Majzik, Aad P. A. van Moorsel
2008Mapping software faults with web security vulnerabilities.
José Fonseca, Marco Vieira
2008Message from the DCCS program chair.
Neeraj Suri
2008Message from the PDS program chair.
Kimberly Keeton
2008Message from the conference general chair and coordinator.
Philip Koopman, Henrique Madeira
2008On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao
2008On representing knowledge in the dependability domain: a panel discussion.
Algirdas Avizienis
2008Probabilistic quorum systems in wireless ad hoc networks.
Roy Friedman, Gabriel Kliot, Chen Avin
2008Reliability of flat XOR-based erasure codes on heterogeneous devices.
Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie
2008Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices.
Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders
2008Scheduling algorithms for unpredictably heterogeneous CMP architectures.
Jonathan A. Winter, David H. Albonesi
2008Scheduling for performance and availability in systems with temporal dependent workloads.
Ningfang Mi, Giuliano Casale, Evgenia Smirni
2008Second workshop on dependable and secure nanocomputing.
Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaidis
2008Security through redundant data diversity.
Anh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson
2008Silent Data Corruption - Myth or reality?
Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak
2008Statistical Fault Injection.
Pradeep Ramachandran, Prabhakar Kudva, Jeffrey W. Kellington, John Schumann, Pia N. Sanda
2008Survivability quantification of communication services.
Poul E. Heegaard, Kishor S. Trivedi
2008SymPLFIED: Symbolic program-level fault injection and error detection framework.
Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2008TCP covert timing channels: Design and detection.
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
2008Tempest: Soft state replication in the service tier.
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Robbert van Renesse
2008Tempest: Towards early identification of failure-prone binaries.
Thirumalesh Bhat, Nachiappan Nagappan
2008The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings
2008Toward an understanding of the processing delay of peer-to-peer relay nodes.
Kuan-Ta Chen, Jing-Kai Lou
2008Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware.
Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario
2008Towards assessing the security of DBMS configurations.
Afonso Araújo Neto, Marco Vieira
2008Trace-based microarchitecture-level diagnosis of permanent hardware faults.
Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou
2008Traffic grooming in WDM mesh networks with guaranteed survivability.
Ataul Bari, Quazi Rahman, Arunita Jaekel, Subir Bandyopadhyay
2008Using an assurance case to support independent assessment of the transition to a new GPS ground control system.
Elisabeth A. Nguyen, William S. Greenwell, Myron Hecht
2008Using likely program invariants to detect hardware errors.
Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou
2008Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor.
Hisashige Ando, Ryuji Kan, Yoshiharu Tosaka, Keiji Takahisa, Kichiji Hatanaka
2008WS-DREAM: A distributed reliability assessment Mechanism for Web Services.
Zibin Zheng, Michael R. Lyu
2008Workshop on Architecting Dependable Systems (WADS 2008).
Rogério de Lemos, Jean-Charles Fabre, Cristina Gacek
2008Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Karthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk