DSN A

70 papers

YearTitle / Authors
20101
John T. Daly, Nathan DeBardeleben
20104th workshop on recent advances in intrusion-tolerant systems WRAITS 2010.
Miguel Correia, Partha P. Pal
2010A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems design.
Mahdi Fazeli, Seyed Ghassem Miremadi, Hossein Asadi, Seyed Nematollah Ahmadian
2010A numerical optimization-based methodology for application robustification: Transforming applications for error tolerance.
Joseph Sloan, David Kesler, Rakesh Kumar, Ali Rahimi
2010A passive approach to wireless device fingerprinting.
Ke Gao, Cherita L. Corbett, Raheem A. Beyah
2010A study of the internal and external effects of concurrency bugs.
Pedro Fonseca, Cheng Li, Vishal Singhal, Rodrigo Rodrigues
2010A unified model for timing speculation: Evaluating the impact of technology scaling, CMOS design style, and fault recovery mechanism.
Marc de Kruijf, Shuou Nomura, Karthikeyan Sankaralingam
2010Adaptive on-line software aging prediction based on machine learning.
Javier Alonso, Jordi Torres, Josep Lluis Berral, Ricard Gavaldà
2010An automated technique to support the verification and validation of simulation models.
Samuel K. Klock, Peter Kemper
2010An empirical investigation of fault types in space mission system software.
Michael Grottke, Allen P. Nikora, Kishor S. Trivedi
2010Application of a fault injection based dependability assessment process to a commercial safety critical nuclear reactor protection system.
Carl R. Elks, Michael Reynolds, Nishant J. George, Marko Miklo, Scott Bingham, Ronald D. Williams, Barry W. Johnson, Michael Waterman, Jeanne Dion
2010Architecting reliable multi-core network-on-chip for small scale processing technology.
Xin Fu, Tao Li, José A. B. Fortes
2010Assessing and improving the effectiveness of logs for the analysis of software faults.
Marcello Cinque, Domenico Cotroneo, Roberto Natella, Antonio Pecchia
2010AutomaDeD: Automata-based debugging for dissimilar parallel tasks.
Greg Bronevetsky, Ignacio Laguna, Saurabh Bagchi, Bronis R. de Supinski, Dong H. Ahn, Martin Schulz
2010Bit-slice logic interleaving for spatial multi-bit soft-error tolerance.
Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach
2010Blue Banana: resilience to avatar mobility in distributed MMOGs.
Sergey Legtchenko, Sébastien Monnet, Gaël Thomas
2010Code-M: A non-MDS erasure code scheme to support fast recovery from up to two-disk failures in storage systems.
Shenggang Wan, Qiang Cao, Changsheng Xie, Benjamin Eckart, Xubin He
2010Combined performance and risk analysis for border management applications.
Mayra Sacanamboy, Bojan Cukic
2010Correlating failures with asynchronous changes for root cause analysis in enterprise environments.
Manoj K. Agarwal, Venkateswara Reddy Madduri
2010Data recovery for web applications.
Istemi Ekin Akkus, Ashvin Goel
2010DataGuard: Dynamic data attestation in wireless sensor networks.
Dazhi Zhang, Donggang Liu
2010Decoding STAR code for tolerating simultaneous disk failure and silent errors.
Jianqiang Luo, Cheng Huang, Lihao Xu
2010Dependable connection setup for network capabilities.
Soo Bum Lee, Virgil D. Gligor, Adrian Perrig
2010Detecting Sybil nodes in wireless networks with physical layer network coding.
Weichao Wang, Di Pu, Alexander M. Wyglinski
2010Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring.
Utpal Paul, Samir R. Das, Ritesh Maheshwari
2010Detecting vulnerabilities in C programs using trace-based testing.
Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang
2010Detection of botnets using combined host- and network-level information.
Yuanyuan Zeng, Xin Hu, Kang G. Shin
2010Diverse Partial Memory Replication.
Ryan M. Lefever, Vikram S. Adve, William H. Sanders
2010Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation.
Ann T. Tai, Kam S. Tso, William H. Sanders
2010Doubly-expedited one-step Byzantine consensus.
Nazreen Banu, Taisuke Izumi, Koichi Wada
2010Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive.
Eric Anderson, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph A. Tucek, Mustafa Uysal, Jay J. Wylie
2010Empirical characterization of uncongested optical lambda networks and 10GbE commodity endpoints.
Tudor Marian, Daniel A. Freedman, Ken Birman, Hakim Weatherspoon
2010Energy-efficient fault tolerance in chip multiprocessors using Critical Value Forwarding.
Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson
2010Evaluating repair strategies for a water-treatment facility using Arcade.
Boudewijn R. Haverkort, Matthias Kuntz, Anne Remke, S. Roolvink, Mariëlle Stoelinga
2010Experiences with a CANoe-based fault injection framework for AUTOSAR.
Patrick E. Lanigan, Priya Narasimhan, Thomas E. Fuhrman
2010Experimental validation of a fault tolerant microcomputer system against intermittent faults.
Joaquin Gracia-Moran, Daniel Gil-Tomas, Luis J. Saiz-Adalid, Juan Carlos Baraza, Pedro J. Gil-Vicente
2010Exploiting diverse observation perspectives to get insights on the malware landscape.
Corrado Leita, Ulrich Bayer, Engin Kirda
2010Finding stable cliques of PlanetLab nodes.
Elias P. Duarte Jr., Thiago Garrett, Luis C. E. Bona, Renato Carmo, Alexandre Prusch Züge
2010Fourth workshop on dependable and secure nanocomputing.
Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis
2010GOOFI-2: A tool for experimental dependability assessment.
Daniel Skarin, Raul Barbosa, Johan Karlsson
2010Generic construction of consensus algorithms for benign and Byzantine faults.
Olivier Rütti, Zarko Milosevic, André Schiper
2010Improving privacy and lifetime of PCM-based main memory.
Jingfei Kong, Huiyang Zhou
2010Keystroke biometrics with number-pad input.
Roy A. Maxion, Kevin S. Killourhy
2010Mash-IF: Practical information-flow control within client-side mashups.
Zhou Li, Kehuan Zhang, Xiaofeng Wang
2010Measurement-based analysis of fault and error sensitivities of dynamic memory.
Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2010Model checking CSL
Elvio Gilberto Amparore, Susanna Donatelli
2010Observable non-Sybil quorums construction in one-hop wireless ad hoc networks.
Diogo Mónica, João Leitão, Luís E. T. Rodrigues, Carlos Ribeiro
2010On/off process modeling of IP network failures.
Pirkko Kuusela, Ilkka Norros
2010Performance and availability aware regeneration for cloud based multitier applications.
Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, Calton Pu
2010Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2010, Chicago, IL, USA, June 28 - July 1 2010
2010Programming support and adaptive checkpointing for high-throughput data services with log-based recovery.
Jingyu Zhou, Caijie Zhang, Hong Tang, Jiesheng Wu, Tao Yang
2010Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes.
Zhen Wang, Mark G. Karpovsky, Ajay Joshi
2010Representativeness analysis of injected software faults in complex software.
Roberto Natella, Domenico Cotroneo, João Durães, Henrique Madeira
2010Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction.
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
2010Ring Paxos: A high-throughput atomic broadcast protocol.
Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone
2010Scalable RFID systems: a privacy-preserving protocol with constant-time identification.
Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran
2010Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas.
Marco Serafini, Péter Bokor, Dan Dobre, Matthias Majuntke, Neeraj Suri
2010Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM).
Miroslaw Malek, Felix Salfner, Kishor S. Trivedi
2010StageWeb: Interweaving pipeline stages into a wearout and variation tolerant CMP fabric.
Shantanu Gupta, Amin Ansari, Shuguang Feng, Scott A. Mahlke
2010Statistical guarantees of performance for MIMO designs.
Jayanand Asok Kumar, Shobha Vasudevan
2010Studying application-library interaction and behavior with LibTrac.
Eric Bisolfati, Paul Dan Marinescu, George Candea
2010Transient fault models and AVF estimation revisited.
Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach
2010Turquois: Byzantine consensus in wireless ad hoc networks.
Henrique Moniz, Nuno Ferreira Neves, Miguel Correia
2010Using Bayesian networks for cyber security analysis.
Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy
2010Using correlated surprise to infer shared influence.
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
2010WearMon: Reliability monitoring using adaptive critical path testing.
Bardia Zandian, Waleed Dweik, Suk Hun Kang, Thomas Punihaole, Murali Annavaram
2010Who is peeping at your passwords at Starbucks? - To catch an evil twin access point.
Yimin Song, Chao Yang, Guofei Gu
2010Why software hangs and what can be done with it.
Xiang Song, Haibo Chen, Binyu Zang
2010Zzyzx: Scalable fault tolerance through Byzantine locking.
James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter
2010iProve: A scalable technique for consumer-verifiable software guarantees.
Silviu Andrica, Horatiu Jula, George Candea