| 2010 | 1 John T. Daly, Nathan DeBardeleben |
| 2010 | 4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. Miguel Correia, Partha P. Pal |
| 2010 | A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems design. Mahdi Fazeli, Seyed Ghassem Miremadi, Hossein Asadi, Seyed Nematollah Ahmadian |
| 2010 | A numerical optimization-based methodology for application robustification: Transforming applications for error tolerance. Joseph Sloan, David Kesler, Rakesh Kumar, Ali Rahimi |
| 2010 | A passive approach to wireless device fingerprinting. Ke Gao, Cherita L. Corbett, Raheem A. Beyah |
| 2010 | A study of the internal and external effects of concurrency bugs. Pedro Fonseca, Cheng Li, Vishal Singhal, Rodrigo Rodrigues |
| 2010 | A unified model for timing speculation: Evaluating the impact of technology scaling, CMOS design style, and fault recovery mechanism. Marc de Kruijf, Shuou Nomura, Karthikeyan Sankaralingam |
| 2010 | Adaptive on-line software aging prediction based on machine learning. Javier Alonso, Jordi Torres, Josep Lluis Berral, Ricard Gavaldà |
| 2010 | An automated technique to support the verification and validation of simulation models. Samuel K. Klock, Peter Kemper |
| 2010 | An empirical investigation of fault types in space mission system software. Michael Grottke, Allen P. Nikora, Kishor S. Trivedi |
| 2010 | Application of a fault injection based dependability assessment process to a commercial safety critical nuclear reactor protection system. Carl R. Elks, Michael Reynolds, Nishant J. George, Marko Miklo, Scott Bingham, Ronald D. Williams, Barry W. Johnson, Michael Waterman, Jeanne Dion |
| 2010 | Architecting reliable multi-core network-on-chip for small scale processing technology. Xin Fu, Tao Li, José A. B. Fortes |
| 2010 | Assessing and improving the effectiveness of logs for the analysis of software faults. Marcello Cinque, Domenico Cotroneo, Roberto Natella, Antonio Pecchia |
| 2010 | AutomaDeD: Automata-based debugging for dissimilar parallel tasks. Greg Bronevetsky, Ignacio Laguna, Saurabh Bagchi, Bronis R. de Supinski, Dong H. Ahn, Martin Schulz |
| 2010 | Bit-slice logic interleaving for spatial multi-bit soft-error tolerance. Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach |
| 2010 | Blue Banana: resilience to avatar mobility in distributed MMOGs. Sergey Legtchenko, Sébastien Monnet, Gaël Thomas |
| 2010 | Code-M: A non-MDS erasure code scheme to support fast recovery from up to two-disk failures in storage systems. Shenggang Wan, Qiang Cao, Changsheng Xie, Benjamin Eckart, Xubin He |
| 2010 | Combined performance and risk analysis for border management applications. Mayra Sacanamboy, Bojan Cukic |
| 2010 | Correlating failures with asynchronous changes for root cause analysis in enterprise environments. Manoj K. Agarwal, Venkateswara Reddy Madduri |
| 2010 | Data recovery for web applications. Istemi Ekin Akkus, Ashvin Goel |
| 2010 | DataGuard: Dynamic data attestation in wireless sensor networks. Dazhi Zhang, Donggang Liu |
| 2010 | Decoding STAR code for tolerating simultaneous disk failure and silent errors. Jianqiang Luo, Cheng Huang, Lihao Xu |
| 2010 | Dependable connection setup for network capabilities. Soo Bum Lee, Virgil D. Gligor, Adrian Perrig |
| 2010 | Detecting Sybil nodes in wireless networks with physical layer network coding. Weichao Wang, Di Pu, Alexander M. Wyglinski |
| 2010 | Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring. Utpal Paul, Samir R. Das, Ritesh Maheshwari |
| 2010 | Detecting vulnerabilities in C programs using trace-based testing. Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang |
| 2010 | Detection of botnets using combined host- and network-level information. Yuanyuan Zeng, Xin Hu, Kang G. Shin |
| 2010 | Diverse Partial Memory Replication. Ryan M. Lefever, Vikram S. Adve, William H. Sanders |
| 2010 | Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation. Ann T. Tai, Kam S. Tso, William H. Sanders |
| 2010 | Doubly-expedited one-step Byzantine consensus. Nazreen Banu, Taisuke Izumi, Koichi Wada |
| 2010 | Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive. Eric Anderson, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph A. Tucek, Mustafa Uysal, Jay J. Wylie |
| 2010 | Empirical characterization of uncongested optical lambda networks and 10GbE commodity endpoints. Tudor Marian, Daniel A. Freedman, Ken Birman, Hakim Weatherspoon |
| 2010 | Energy-efficient fault tolerance in chip multiprocessors using Critical Value Forwarding. Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson |
| 2010 | Evaluating repair strategies for a water-treatment facility using Arcade. Boudewijn R. Haverkort, Matthias Kuntz, Anne Remke, S. Roolvink, Mariëlle Stoelinga |
| 2010 | Experiences with a CANoe-based fault injection framework for AUTOSAR. Patrick E. Lanigan, Priya Narasimhan, Thomas E. Fuhrman |
| 2010 | Experimental validation of a fault tolerant microcomputer system against intermittent faults. Joaquin Gracia-Moran, Daniel Gil-Tomas, Luis J. Saiz-Adalid, Juan Carlos Baraza, Pedro J. Gil-Vicente |
| 2010 | Exploiting diverse observation perspectives to get insights on the malware landscape. Corrado Leita, Ulrich Bayer, Engin Kirda |
| 2010 | Finding stable cliques of PlanetLab nodes. Elias P. Duarte Jr., Thiago Garrett, Luis C. E. Bona, Renato Carmo, Alexandre Prusch Züge |
| 2010 | Fourth workshop on dependable and secure nanocomputing. Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis |
| 2010 | GOOFI-2: A tool for experimental dependability assessment. Daniel Skarin, Raul Barbosa, Johan Karlsson |
| 2010 | Generic construction of consensus algorithms for benign and Byzantine faults. Olivier Rütti, Zarko Milosevic, André Schiper |
| 2010 | Improving privacy and lifetime of PCM-based main memory. Jingfei Kong, Huiyang Zhou |
| 2010 | Keystroke biometrics with number-pad input. Roy A. Maxion, Kevin S. Killourhy |
| 2010 | Mash-IF: Practical information-flow control within client-side mashups. Zhou Li, Kehuan Zhang, Xiaofeng Wang |
| 2010 | Measurement-based analysis of fault and error sensitivities of dynamic memory. Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2010 | Model checking CSL Elvio Gilberto Amparore, Susanna Donatelli |
| 2010 | Observable non-Sybil quorums construction in one-hop wireless ad hoc networks. Diogo Mónica, João Leitão, Luís E. T. Rodrigues, Carlos Ribeiro |
| 2010 | On/off process modeling of IP network failures. Pirkko Kuusela, Ilkka Norros |
| 2010 | Performance and availability aware regeneration for cloud based multitier applications. Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, Calton Pu |
| 2010 | Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2010, Chicago, IL, USA, June 28 - July 1 2010 |
| 2010 | Programming support and adaptive checkpointing for high-throughput data services with log-based recovery. Jingyu Zhou, Caijie Zhang, Hong Tang, Jiesheng Wu, Tao Yang |
| 2010 | Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes. Zhen Wang, Mark G. Karpovsky, Ajay Joshi |
| 2010 | Representativeness analysis of injected software faults in complex software. Roberto Natella, Domenico Cotroneo, João Durães, Henrique Madeira |
| 2010 | Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu |
| 2010 | Ring Paxos: A high-throughput atomic broadcast protocol. Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone |
| 2010 | Scalable RFID systems: a privacy-preserving protocol with constant-time identification. Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran |
| 2010 | Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas. Marco Serafini, Péter Bokor, Dan Dobre, Matthias Majuntke, Neeraj Suri |
| 2010 | Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM). Miroslaw Malek, Felix Salfner, Kishor S. Trivedi |
| 2010 | StageWeb: Interweaving pipeline stages into a wearout and variation tolerant CMP fabric. Shantanu Gupta, Amin Ansari, Shuguang Feng, Scott A. Mahlke |
| 2010 | Statistical guarantees of performance for MIMO designs. Jayanand Asok Kumar, Shobha Vasudevan |
| 2010 | Studying application-library interaction and behavior with LibTrac. Eric Bisolfati, Paul Dan Marinescu, George Candea |
| 2010 | Transient fault models and AVF estimation revisited. Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach |
| 2010 | Turquois: Byzantine consensus in wireless ad hoc networks. Henrique Moniz, Nuno Ferreira Neves, Miguel Correia |
| 2010 | Using Bayesian networks for cyber security analysis. Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy |
| 2010 | Using correlated surprise to infer shared influence. Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken |
| 2010 | WearMon: Reliability monitoring using adaptive critical path testing. Bardia Zandian, Waleed Dweik, Suk Hun Kang, Thomas Punihaole, Murali Annavaram |
| 2010 | Who is peeping at your passwords at Starbucks? - To catch an evil twin access point. Yimin Song, Chao Yang, Guofei Gu |
| 2010 | Why software hangs and what can be done with it. Xiang Song, Haibo Chen, Binyu Zang |
| 2010 | Zzyzx: Scalable fault tolerance through Byzantine locking. James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter |
| 2010 | iProve: A scalable technique for consumer-verifiable software guarantees. Silviu Andrica, Horatiu Jula, George Candea |