DSN A

77 papers

YearTitle / Authors
20093rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009.
Saurabh Bagchi, Miguel Correia, Partha P. Pal
2009A QoS-aware fault tolerant middleware for dependable service composition.
Zibin Zheng, Michael R. Lyu
2009A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases.
Avik Sinha, Amit M. Paradkar, Palani Kumanan, Branimir Boguraev
2009A low-tech solution to avoid the severe impact of transient errors on the IP interconnect.
Derek Graham, Per Strid, Scott Roy, Fernando Rodriguez
2009A self-diagnosis technique using Reed-Solomon codes for self-repairing chips.
Xiangyu Tang, Seongmoon Wang
2009A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID).
Jon G. Elerath
2009An efficient XOR-scheduling algorithm for erasure codes encoding.
Jianqiang Luo, Lihao Xu, James S. Plank
2009An end-to-end approach for the automatic derivation of application-aware error detectors.
Galen Lyle, Shelley Cheny, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2009An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors.
Mahdi Fazeli, Alireza Namazi, Seyed Ghassem Miremadi
2009Analyzing the process of installing rogue software.
Robin Berthier, Jorge Arjona, Michel Cukier
2009Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring.
Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward
2009Blue-Watchdog: Detecting Bluetooth worm propagation in public areas.
Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner
2009Comparing anomaly-detection algorithms for keystroke dynamics.
Kevin S. Killourhy, Roy A. Maxion
2009Data management mechanisms for embedded system gateways.
Justin Ray, Philip Koopman
2009Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor.
Hari Kannan, Michael Dalton, Christos Kozyrakis
2009Dependability - How does the market value it?
Gonçalo Quadros
2009Dependability in the cloud: Challenges and opportunities.
Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel, Joseph Weinman
2009Design and development of a proof-of-concept platooning application using the HIDENETS architecture.
Luis Marques, António Casimiro, Mario Calha
2009Deterministic high-speed simulation of complex systems including fault-injection.
Matthias Sand, Stefan Potyra, Volkmar Sieh
2009Dynamic content web applications: Crash, failover, and recovery analysis.
Luiz Eduardo Buzato, Gustavo M. D. Vieira, Willy Zwaenepoel
2009Effectiveness of machine checks for error diagnostics.
Nikhil Pandit, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2009Efficient resource management on template-based web servers.
Eli Courtwright, Chuan Yue, Haining Wang
2009Emµcode: Masking hard faults in complex functional units.
Nicholas Weaver, John H. Kelm, Matthew I. Frank
2009Evaluating the impact of Undetected Disk Errors in RAID systems.
Eric Rozier, Wendy Belluomini, Veera Deenadhayalan, Jim Hafner, K. K. Rao, Pin Zhou
2009Exception triggered DoS attacks on wireless networks.
Yao Zhao, Sagar Vemuri, Jiazhen Chen, Yan Chen, Hai Zhou, Zhi Fu
2009Exploiting refactoring in formal verification.
Xiang Yin, John C. Knight, Westley Weimer
2009Fail-Aware Untrusted Storage.
Christian Cachin, Idit Keidar, Alexander Shraer
2009Fast Abstracts.
Luigi Romano
2009Fast memory state synchronization for virtualization-based fault tolerance.
Maohua Lu, Tzi-cker Chiueh
2009Fault isolation for device drivers.
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum
2009Fifth Workshop on Hot Topics in System Dependability (HotDep 2009).
Christof Fetzer, Rodrigo Rodrigues
2009Fitness-guided path exploration in dynamic symbolic execution.
Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte
2009Flexible multicast authentication for time-triggered embedded control network applications.
Christopher Szilagyi, Philip Koopman
2009Fluid modeling and control for server system performance and availability.
Luc Malrait, Sara Bouchenak, Nicolas Marchand
2009From assessment to standardised benchmarking: Will it happen? What could we do about it?
Henrique Madeira, István Majzik
2009Future prospects of research on security and dependability.
Jacques Bus
2009HC-BGP: A light-weight and flexible scheme for securing prefix ownership.
Ying Zhang, Zheng Zhang, Zhuoqing Morley Mao, Y. Charlie Hu
2009I-JVM: a Java Virtual Machine for component isolation in OSGi.
Nicolas Geoffray, Gaël Thomas, Gilles Muller, Pierre Parrend, Stéphane Frénot, Bertil Folliot
2009ICT resilience of power control systems: experimental results from the CRUTIAL testbeds.
Giovanna Dondossola, Fabrizio Garrone, Judit Szanto, Geert Deconinck, T. Loix, Hakem Beitollahi
2009Intrusion-tolerant self-healing devices for critical infrastructure protection.
Paulo Sousa, Alysson Neves Bessani, Wagner Saback Dantas, Fabio Souto, Miguel Correia, Nuno Ferreira Neves
2009LFI: A practical and general library-level fault injector.
Paul Dan Marinescu, George Candea
2009Language level checkpointing support for stream processing applications.
Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu
2009Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems.
Naga Durga Prasad Avirneni, Viswanathan Subramanian, Arun K. Somani
2009MAP-AMVA: Approximate mean value analysis of bursty systems.
Giuliano Casale, Evgenia Smirni
2009Maximizing system lifetime by battery scheduling.
Marijn R. Jongerden, Boudewijn R. Haverkort, Henrik C. Bohnenkamp, Joost-Pieter Katoen
2009Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models.
Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders
2009On the effectiveness of low latency anonymous network in the presence of timing attack.
Jing Jin, Xinyuan Wang
2009On the effectiveness of structural detection and defense against P2P-based botnets.
Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo
2009Overloading vulnerability of VoIP networks.
Hemant Sengar
2009Parametric NdRFT for the derivation of optimal repair strategies.
Marco Beccuti, Giuliana Franceschinis, Daniele Codetta Raiteri, Serge Haddad
2009Power supply induced common cause faults-experimental assessment of potential countermeasures.
Peter Tummeltshammer, Andreas Steininger
2009Precise request tracing and performance debugging for multi-tier services of black boxes.
Zhihong Zhang, Jianfeng Zhan, Yong Li, Lei Wang, Dan Meng, Bo Sang
2009Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009
2009Processor reliability enhancement through compiler-directed register file peak temperature reduction.
Chengmo Yang, Alex Orailoglu
2009Providing transactional quality of service in event stream processing middleware.
Robert E. Strom, Chitra Dorai
2009RRE: A game-theoretic intrusion Response and Recovery Engine.
Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley
2009Remote attestation to dynamic system properties: Towards providing complete system integrity evidence.
Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang
2009Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories.
Zhen Wang, Mark G. Karpovsky, Konrad J. Kulikowski
2009Report generation for simulation traces with Traviando.
Peter Kemper
2009Safety modeling and evaluation of Automated Highway Systems.
Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun
2009Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS).
Karthik Pattabiraman, Zbigniew Kalbarczyk
2009Sharing end-user negative symptoms for improving overlay network dependability.
Yongning Tang, Ehab Al-Shaer
2009Spam detection in voice-over-IP calls through semi-supervised clustering.
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsameetip Wita
2009Stretching gossip with live streaming.
Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Maxime Monod, Vivien Quéma
2009Student Forum.
Marco Vieira
2009System log pre-processing to improve failure prediction.
Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Geist
2009System safety as an emergent property in composite systems.
Jennifer Black, Philip Koopman
2009Third workshop on dependable and secure nanocomputing.
Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis
2009Using web security scanners to detect vulnerabilities in web services.
Marco Vieira, Nuno Antunes, Henrique Madeira
2009VNsnap: Taking snapshots of virtual networked environments with minimal downtime.
Ardalan Kangarlou, Patrick Eugster, Dongyan Xu
2009Verme: Worm containment in overlay networks.
Filipe Freitas, Edgar Marques, Rodrigo Rodrigues, Carlos Ribeiro, Paulo Ferreira, Luís E. T. Rodrigues
2009Vulnerability & attack injection for web applications.
José Fonseca, Marco Vieira, Henrique Madeira
2009WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks.
Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee
2009WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code.
Julia L. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, Henrik Stuart, Gilles Muller
2009Workshop on Architecting Dependable Systems (WADS 2009).
António Casimiro, Rogério de Lemos, Cristina Gacek
2009Workshop on proactive failure avoidance, recovery and maintenance (PFARM).
Miroslaw Malek, Felix Salfner, Kishor S. Trivedi
2009Xprobe2++: Low volume remote network information gathering tool.
Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, Sy-Yen Kuo