DSN A

83 papers

YearTitle / Authors
201444th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2014, Atlanta, GA, USA, June 23-26, 2014
2014A Design and Implementation of an Assurance Case Language.
Yutaka Matsuno
2014A Markov Decision Process Approach for Optimal Data Backup Scheduling.
Ruofan Xia, Fumio Machida, Kishor S. Trivedi
2014A Novel Variable Ordering Heuristic for BDD-based K-Terminal Reliability.
Minh Lê, Josef Weidendorfer, Max Walter
2014A Reliable 3D MLC PCM Architecture with Resistance Drift Predictor.
Majid Jalili, Mohammad Arjomand, Hamid Sarbazi-Azad
2014A-ABFT: Autonomous Algorithm-Based Fault Tolerance for Matrix Multiplications on Graphics Processing Units.
Claus Braun, Sebastian Halder, Hans-Joachim Wunderlich
2014Adaptive Low-Power Architecture for High-Performance and Reliable Embedded Computing.
Ronaldo Rodrigues Ferreira, Jean da Rolt, Gabriel L. Nazar, Álvaro Freitas Moreira, Luigi Carro
2014An Adaptable Rule Placement for Software-Defined Networks.
Shuyuan Zhang, Franjo Ivancic, Cristian Lumezanu, Yifei Yuan, Aarti Gupta, Sharad Malik
2014An Integrated Security Framework for GOSS Power Grid Analytics Platform.
Tara D. Gibson, Selim Ciraci, Sharma Poorva, Craig Allwardt, Mark Rice, Bora A. Akyol
2014Anomaly Characterization in Large Scale Networks.
Emmanuelle Anceaume, Yann Busnel, Erwan Le Merrer, Romaric Ludinard, Jean Louis Marchand, Bruno Sericola
2014Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems.
Lee W. Lerner, Zane R. Franklin, William T. Baumann, Cameron D. Patterson
2014Automatically Fixing C Buffer Overflows Using Program Transformations.
Alex Shaw, Dusten Doggett, Munawar Hafiz
2014Availability Evaluation of Digital Library Cloud Services.
Julian Araujo, Paulo Romero Martins Maciel, Matheus Torquato, Gustavo Rau de Almeida Callou, Ermeson C. Andrade
2014Catch Me If You Can: A Cloud-Enabled DDoS Defense.
Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter Powell
2014Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory.
Yixin Luo, Sriram Govindan, Bikash Sharma, Mark Santaniello, Justin Meza, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid, Onur Mutlu
2014Clock-RSM: Low-Latency Inter-datacenter State Machine Replication Using Loosely Synchronized Physical Clocks.
Jiaqing Du, Daniele Sciascia, Sameh Elnikety, Willy Zwaenepoel, Fernando Pedone
2014Coarse-Grained Energy Modeling of Rollback/Recovery Mechanisms.
Dewan Ibtesham, David Debonis, Dorian C. Arnold, Kurt B. Ferreira
2014Comparison Criticality in Sorting Algorithms.
Thomas B. Jones, David H. Ackley
2014Crosscheck: Hardening Replicated Multithreaded Services.
Arthur Martens, Christoph Borchert, Tobias Oliver Geissler, Daniel Lohmann, Olaf Spinczyk, Rüdiger Kapitza
2014DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS Traffic.
Yizheng Chen, Manos Antonakakis, Roberto Perdisci, Yacin Nadji, David Dagon, Wenke Lee
2014Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using Checkpointing.
Subrota K. Mondal, Jogesh K. Muppala
2014Degraded-First Scheduling for MapReduce in Erasure-Coded Storage Clusters.
Runhui Li, Patrick P. C. Lee, Yuchong Hu
2014Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPI.
Amin Hassani, Anthony Skjellum, Ron Brightwell
2014Detecting Malicious Javascript in PDF through Document Instrumentation.
Daiping Liu, Haining Wang, Angelos Stavrou
2014Developing Correctly Replicated Databases Using Formal Tools.
Nicolas Schiper, Vincent Rahli, Robbert van Renesse, Mark Bickford, Robert L. Constable
2014Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS Testbed.
Jianhua Zhang, Aranya Chakrabortty, Yufeng Xin
2014Evaluating the Error Resilience of Parallel Programs.
Bo Fang, Karthik Pattabiraman, Matei Ripeanu, Sudhanva Gurumurthi
2014Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work Stealing.
Jeremiah J. Wilke, Janine Bennett, Hemanth Kolla, Keita Teranishi, Nicole Slattengren, John Floren
2014FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual Machine.
Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu
2014Failure Analysis of Virtual and Physical Machines: Patterns, Causes and Characteristics.
Robert Birke, Ioana Giurgiu, Lydia Y. Chen, Dorothea Wiesmann, Ton Engbersen
2014GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable Substrates.
Konstantinos Parasyris, Georgios Tziantzoulis, Christos D. Antonopoulos, Nikolaos Bellas
2014Grid-Oriented Process Clustering System for Partial Message Logging.
Hideyuki Jitsumoto, Yuki Todoroki, Yutaka Ishikawa, Mitsuhisa Sato
2014HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 Systems.
Zhirong Shen, Jiwu Shu
2014Hard Drive Failure Prediction Using Classification and Regression Trees.
Jing Li, Xinpu Ji, Yuhan Jia, Bingpeng Zhu, Gang Wang, Zhongwei Li, Xiaoguang Liu
2014Hardware-Software Integrated Diagnosis for Intermittent Hardware Faults.
Majid Dadashi, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan
2014Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and Runtime.
Bin Huang, Ron Sass, Nathan DeBardeleben, Sean Blanchard
2014HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based Systems.
Sudarsun Kannan, Naila Farooqui, Ada Gavrilovska, Karsten Schwan
2014Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution Systems.
Masood Parvania, Georgia Koutsandria, Vishak Muthukumar, Sean Peisert, Chuck McParland, Anna Scaglione
2014Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications Reliability.
Paolo Rech, Laércio Lima Pilla, Philippe Olivier Alexandre Navaux, Luigi Carro
2014Interoperability between Fingerprint Biometric Systems: An Empirical Study.
Stephen Mason, Ilir Gashi, Luca Lugini, Emanuela Marasco, Bojan Cukic
2014Ironstack: Performance, Stability and Security for Power Grid Data Networks.
Zhiyuan Teo, Vera Kutsenko, Ken Birman, Robbert van Renesse
2014Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale Systems.
Devesh Tiwari, Saurabh Gupta, Sudharshan S. Vazhkudai
2014Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters.
Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer
2014Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems.
Rui Ding, Qiang Fu, Jian-Guang Lou, Qingwei Lin, Dongmei Zhang, Tao Xie
2014Mitigating Write Disturbance in Super-Dense Phase Change Memories.
Lei Jiang, Youtao Zhang, Jun Yang
2014Model Checking Stochastic Automata for Dependability and Performance Measures.
Peter Buchholz, Jan Kriege, Dimitri Scheftelowitsch
2014Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience Report.
Aaron Kane, Thomas E. Fuhrman, Philip Koopman
2014NV-Hypervisor: Hypervisor-Based Persistence for Virtual Machines.
Vasily A. Sartakov, Rüdiger Kapitza
2014Ocasta: Clustering Configuration Settings for Error Recovery.
Zhen Huang, David Lie
2014On Tracking Information Flows through JNI in Android Applications.
Chenxiong Qian, Xiapu Luo, Yuru Shao, Alvin T. S. Chan
2014Optical Delusions: A Study of Malicious QR Codes in the Wild.
Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon
2014POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud Applications.
Xiwei Xu, Liming Zhu, Ingo Weber, Len Bass, Daniel Sun
2014Performance Sensitive Replication in Geo-distributed Cloud Datastores.
Shankaranarayanan P. N., Ashiwan Sivakumar, Sanjay G. Rao, Mohit Tawarmalani
2014Predicting Incident Reports for IT Help Desk.
Anneliese Amschler Andrews, Joseph Lucente
2014Probabilistic Inference for Obfuscated Network Attack Sequences.
Haitao Du, Shanchieh Jay Yang
2014Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware Faults.
Jiesheng Wei, Anna Thomas, Guanpeng Li, Karthik Pattabiraman
2014Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUs.
Daniel A. G. de Oliveira, Caio B. Lunardi, Laércio Lima Pilla, Paolo Rech, Philippe Olivier Alexandre Navaux, Luigi Carro
2014Recovery for Failures in Rolling Upgrade on Clouds.
Min Fu, Liming Zhu, Len Bass, Anna Liu
2014Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Cuong Manh Pham, Zachary Estrada, Phuong Cao, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer
2014Replication-Based Fault-Tolerance for Large-Scale Graph Processing.
Peng Wang, Kaiyuan Zhang, Rong Chen, Haibo Chen, Haibing Guan
2014S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services.
Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah
2014SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics.
Qin Liu, John C. S. Lui, Cheng He, Lujia Pan, Wei Fan, Yunlong Shi
2014Scalable Security Models for Assessing Effectiveness of Moving Target Defenses.
Jin B. Hong, Dong Seong Kim
2014Scalable State-Machine Replication.
Carlos Eduardo Benevides Bezerra, Fernando Pedone, Robbert van Renesse
2014Scriptless Timing Attacks on Web Browser Privacy.
Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich
2014Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud Computing.
Wei Zhang, Sheng Xiao, Yaping Lin, Ting, Siwang Zhou
2014Security Threat Analytics and Countermeasure Synthesis for Power System State Estimation.
Mohammad Ashiqur Rahman, Ehab Al-Shaer, Rajesh G. Kavasseri
2014Social Puzzles: Context-Based Access Control in Online Social Networks.
Murtuza Jadliwala, Anindya Maiti, Vinod Namboodiri
2014State Machine Replication for the Masses with BFT-SMART.
Alysson Neves Bessani, João Sousa, Eduardo Adílio Pelinson Alchieri
2014Stateful Data Delivery Service for Wide Area Monitoring and Control Applications.
Yiming Wu, Davood Babazadeh, Lars Nordström
2014System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection Needs.
Rui Wu, Ping Chen, Peng Liu, Bing Mao
2014The Energy Efficiency of Database Replication Protocols.
Nicolas Schiper, Fernando Pedone, Robbert van Renesse
2014Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a Bot.
Osama Haq, Waqar Ahmed, Affan A. Syed
2014Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy Grail.
Stephany Bellomo, Neil A. Ernst, Robert L. Nord, Rick Kazman
2014Towards Secure Metering Data Analysis via Distributed Differential Privacy.
Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah
2014Towards a Taxonomy of Cloud Recovery Strategies.
Min Fu, Len Bass, Anna Liu
2014Understanding Interoperability Issues of Web Service Frameworks.
Ivano Alessandro Elia, Nuno Laranjeiro, Marco Vieira
2014WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change Memory.
Jie Fan, Song Jiang, Jiwu Shu, Long Sun, Qingda Hu
2014Warped-Shield: Tolerating Hard Faults in GPGPUs.
Waleed Dweik, Mohammad Abdel-Majeed, Murali Annavaram
2014What Logs Should You Look at When an Application Fails? Insights from an Industrial Case Study.
Marcello Cinque, Domenico Cotroneo, Raffaele Della Corte, Antonio Pecchia
2014What Vulnerability Do We Need to Patch First?
Jin B. Hong, Dong Seong Kim, Abdelkrim Haqiq
2014You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks.
Hossen Asiful Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz
2014pSigene: Webcrawling to Generalize SQL Injection Signatures.
Gaspar Modelo-Howard, Christopher N. Gutierrez, Fahad A. Arshad, Saurabh Bagchi, Yuan Qi