| 2013 | 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013 |
| 2013 | A logic for model-checking mean-field models. Anna Kolesnichenko, Pieter-Tjerk de Boer, Anne Remke, Boudewijn R. Haverkort |
| 2013 | A practical characterization of a NASA SpaceCube application through fault emulation and laser testing. John Paul Walters, Kenneth M. Zick, Matthew French |
| 2013 | A review of cloud deployment models for e-learning systems. Engin Leloglu, Tolga Ayav, Burak Galip Aslan |
| 2013 | A view on the past and future of fault injection. Nuno Silva, Ricardo Barbosa, João Carlos Cunha, Marco Vieira |
| 2013 | Addressing memory exhaustion failures in Virtual Machines in a cloud environment. Jose Antonio Navas Molina, Shivakant Mishra |
| 2013 | An adaptive approach to dependable circuits for a digital power control. Aromhack Saysanasongkham, Kenta Imai, Masayuki Arai, Satoshi Fukumoto, Keiji Wada |
| 2013 | An algorithmic approach to error localization and partial recomputation for low-overhead fault tolerance. Joseph Sloan, Rakesh Kumar, Greg Bronevetsky |
| 2013 | An empirical investigation of fault repairs and mitigations in space mission system software. Javier Alonso, Michael Grottke, Allen P. Nikora, Kishor S. Trivedi |
| 2013 | Analysis of bugs in Apache Virtual Computing Lab. Flavio Frattini, Rahul Ghosh, Marcello Cinque, Andy J. Rindos, Kishor S. Trivedi |
| 2013 | Application-driven TCP recovery and non-stop BGP. Robert Surton, Ken Birman, Robbert van Renesse |
| 2013 | Automating the debugging of datacenter applications with ADDA. Cristian Zamfir, Gautam Altekar, Ion Stoica |
| 2013 | Availability study on cloud computing environments: Live migration as a rejuvenation mechanism. Matheus D'Eça Torquato de Melo, Paulo Romero Martins Maciel, Jean Araujo, Rúbens de Souza Matos Júnior, Carlos Araújo |
| 2013 | Chasing the optimum in replicated in-memory transactional platforms via protocol adaptation. Maria Couceiro, Pedro Ruivo, Paolo Romano, Luís E. T. Rodrigues |
| 2013 | CloudPD: Problem determination and diagnosis in shared dynamic clouds. Bikash Sharma, Praveen Jayachandran, Akshat Verma, Chita R. Das |
| 2013 | Complementing static and dynamic analysis approaches for better network defense. Himanshu Pareek, N. Sarat Chandra Babu |
| 2013 | Consistency or latency? A quantitative analysis of replication systems based on replicated state machines. Xu Wang, Hailong Sun, Ting Deng, Jinpeng Huai |
| 2013 | Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing. Srinivas Krishnan, Teryl Taylor, Fabian Monrose, John McHugh |
| 2013 | DATAFLASKS: An epidemic dependable key-value substrate. Francisco Maia, Miguel Matos, Ricardo Manuel Pereira Vilaça, José Pereira, Rui Oliveira, Etienne Rivière |
| 2013 | DRIP: A framework for purifying trojaned kernel drivers. Zhongshu Gu, William N. Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu |
| 2013 | Dependability models for designing disaster tolerant cloud computing systems. Bruno Silva, Paulo Romero Martins Maciel, Eduardo Tavares, Armin Zimmermann |
| 2013 | Design of event-based Intrusion Detection System on OpenFlow Network. Yung-Li Hu, Wei-Bing Su, Li-ying Wu, Yennun Huang, Sy-Yen Kuo |
| 2013 | Detecting malicious landing pages in Malware Distribution Networks. Gang Wang, Jack W. Stokes, Cormac Herley, David Felstead |
| 2013 | Distal: A framework for implementing fault-tolerant distributed algorithms. Martin Biely, Pamela Delgado, Zarko Milosevic, André Schiper |
| 2013 | EagleEye: Towards mandatory security monitoring in virtualized datacenter environment. Yu-Sung Wu, Pei-Keng Sun, Chun-Chi Huang, Sung-Jer Lu, Syu-Fang Lai, Yi-Yung Chen |
| 2013 | Error detector placement for soft computation. Anna Thomas, Karthik Pattabiraman |
| 2013 | Evaluating Xilinx SEU Controller Macro for fault injection. Jose Luis Nunes, João Carlos Cunha, Raul Barbosa, Mário Zenha Rela |
| 2013 | Evasive bots masquerading as human beings on the web. Jing Jin, Jeff Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang |
| 2013 | FTSPM: A Fault-Tolerant ScratchPad Memory. Amir Mahdi Hosseini Monazzah, Hamed Farbeh, Seyed Ghassem Miremadi, Mahdi Fazeli, Hossein Asadi |
| 2013 | Fault detection and localization in distributed systems using invariant relationships. Abhishek B. Sharma, Haifeng Chen, Min Ding, Kenji Yoshihira, Guofei Jiang |
| 2013 | Fault-tolerance characteristics of data center network topologies using fault regions. Yang Liu, Jogesh K. Muppala |
| 2013 | Fitting second-order acyclic Marked Markovian Arrival Processes. Andrea Sansottera, Giuliano Casale, Paolo Cremonesi |
| 2013 | Generative software-based memory error detection and correction for operating system data structures. Christoph Borchert, Horst Schirmeier, Olaf Spinczyk |
| 2013 | Geo-replicated storage with scalable deferred update replication. Daniele Sciascia, Fernando Pedone |
| 2013 | Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach. Feng Tan, Yufei Wang, Qixin Wang, Lei Bu, Rong Zheng, Neeraj Suri |
| 2013 | Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software. Suman Saha, Jean-Pierre Lozi, Gaël Thomas, Julia L. Lawall, Gilles Muller |
| 2013 | Implementing the ADVISE security modeling formalism in Möbius. Michael D. Ford, Ken Keefe, Elizabeth LeMay, William H. Sanders, Carol Muehrcke |
| 2013 | Improving SSD reliability with RAID via Elastic Striping and Anywhere Parity. Jaeho Kim, Jongmin Lee, Jongmoo Choi, Donghee Lee, Sam H. Noh |
| 2013 | Increasing network resiliency by optimally assigning diverse variants to routing nodes. Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir |
| 2013 | Increasing the trustworthiness of commodity hardware through software. Kevin Elphinstone, Yanyan Shen |
| 2013 | Intrusion detection and honeypots in nested virtualization environments. Michael Beham, Marius Vlad, Hans P. Reiser |
| 2013 | Lightweight message tracing for debugging wireless sensor networks. Vinaitheerthan Sundaram, Patrick Eugster |
| 2013 | Lilliput meets brobdingnagian: Data center systems management through mobile devices. Saurabh Bagchi, Fahad A. Arshad, Jan S. Rellermeyer, Thomas H. Osiecki, Michael Kistler, Ahmed Gheith |
| 2013 | Locality matters: Reducing Internet traffic graphs using location analysis. Andreas Berger, Stefan Ruehrup, Wilfried N. Gansterer, Oliver Jung |
| 2013 | Lumpability of fluid models with heterogeneous agent types. Giulio Iacobelli, Mirco Tribastone |
| 2013 | Manipulating semantic values in kernel data structures: Attack assessments and implications. Aravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin |
| 2013 | Message from the DCCS program chair. George Candea |
| 2013 | Message from the PDS program chair. Peter Kemper |
| 2013 | Message from the general chair. András Pataricza |
| 2013 | Mitigating access-driven timing channels in clouds using StopWatch. Peng Li, Debin Gao, Michael K. Reiter |
| 2013 | Model-based performance analysis of local re-execution scheme in offloading system. Qiushi Wang, Huaming Wu, Katinka Wolter |
| 2013 | Modeling and analysing operation processes for dependability. Xiwei Xu, Liming Zhu, Jim Zhanwen Li, Len Bass, Qinghua Lu, Min Fu |
| 2013 | Network traffic anomaly detection based on growing hierarchical SOM. Shin-Ying Huang, Yennun Huang |
| 2013 | Operating SECDED-based caches at ultra-low voltage with FLAIR. Moinuddin K. Qureshi, Zeshan Chishti |
| 2013 | PHYS: Profiled-HYbrid Sampling for soft error reliability benchmarking. Jinho Suh, Murali Annavaram, Michel Dubois |
| 2013 | Performability analysis of RAID10 versus RAID6. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno, Takashi Horikawa |
| 2013 | Practical automated vulnerability monitoring using program state invariants. Cristiano Giuffrida, Lorenzo Cavallaro, Andrew S. Tanenbaum |
| 2013 | Reading between the lines of failure logs: Understanding how HPC systems fail. Nosayba El-Sayed, Bianca Schroeder |
| 2013 | Redefining web browser principals with a Configurable Origin Policy. Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk |
| 2013 | SIDE: Isolated and efficient execution of unmodified device drivers. Yifeng Sun, Tzi-cker Chiueh |
| 2013 | SPECTRE: A dependable introspection framework via System Management Mode. Fengwei Zhang, Kevin Leach, Kun Sun, Angelos Stavrou |
| 2013 | Seamless kernel updates. Maxim Siniavine, Ashvin Goel |
| 2013 | Security implications of memory deduplication in a virtualized environment. Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang |
| 2013 | State-of-the-practice in data center virtualization: Toward a better understanding of VM usage. Robert Birke, Andrej Podzimek, Lydia Y. Chen, Evgenia Smirni |
| 2013 | Stress balancing to mitigate NBTI effects in register files. Hussam Amrouch, Thomas Ebi, Jörg Henkel |
| 2013 | The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013. Jogesh K. Muppala, Matti A. Hiltunen, Roy H. Campbell, Paulo Veríssimo |
| 2013 | The architecture of a resilience infrastructure for computing and communication systems. Algirdas Avizienis |
| 2013 | Towards SDN enabled network control delegation in clouds. Muhammad Salman Malik, Mirko Montanari, Jun Ho Huh, Rakesh B. Bobba, Roy H. Campbell |
| 2013 | Towards secure monitoring and control systems: Diversify! Domenico Cotroneo, Antonio Pecchia, Stefano Russo |
| 2013 | Uniform node sampling service robust against collusions of malicious nodes. Emmanuelle Anceaume, Yann Busnel, Bruno Sericola |
| 2013 | Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet. Chaitrali Amrutkar, Matti A. Hiltunen, Trevor Jim, Kaustubh R. Joshi, Oliver Spatscheck, Patrick Traynor, Shobha Venkataraman |
| 2013 | WirelessHART modeling and performance evaluation. Anne Remke, Xian Wu |
| 2013 | simFI: From single to simultaneous software fault injections. Stefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri |