| 2015 | 34th IEEE Symposium on Reliable Distributed Systems, SRDS 2015, Montreal, QC, Canada, September 28 - October 1, 2015 |
| 2015 | A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems. Guido Lena Cota, Sonia Ben Mokhtar, Julia Lawall, Gilles Muller, Gabriele Gianini, Ernesto Damiani, Lionel Brunie |
| 2015 | A Practical Experience on Evaluating Intrusion Prevention System Event Data as Indicators of Security Issues. Rodrigo Sanches Miani, Bruno Bogaz Zarpelão, Bertrand Sobesto, Michel Cukier |
| 2015 | A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks. Lei Dong, Xuan Chen, Jianxiang Zhu, Hong Chen, Ke Wang, Cuiping Li |
| 2015 | Approximate Hash-Based Set Reconciliation for Distributed Replica Repair. Nico Kruber, Maik Lange, Florian Schintke |
| 2015 | Auditable Restoration of Distributed Programs. Reza Hajisheykhi, Mohammad Roohitavaf, Sandeep S. Kulkarni |
| 2015 | Chasing the Tail of Atomic Broadcast Protocols. Daniel Cason, Parisa Jalili Marandi, Luiz Eduardo Buzato, Fernando Pedone |
| 2015 | Communicating Reliably in Multihop Dynamic Networks Despite Byzantine Failures. Alexandre Maurer, Sébastien Tixeuil, Xavier Défago |
| 2015 | ControlFreak: Signature Chaining to Counter Control Flow Attacks. Sergei Arnautov, Christof Fetzer |
| 2015 | Denial of Service Elusion (DoSE): Keeping Clients Connected for Less. Paul Wood, Christopher N. Gutierrez, Saurabh Bagchi |
| 2015 | Distributed Attribute Based Access Control of Aggregated Data in Sensor Clouds. Vimal Kumar, Sanjay Madria |
| 2015 | Extending Eventually Consistent Cloud Databases for Enforcing Numeric Invariants. Valter Balegas, Diogo Serra, Sérgio Duarte, Carla Ferreira, Marc Shapiro, Rodrigo Rodrigues, Nuno M. Preguiça |
| 2015 | FTDE: Distributed Fault Tolerance for WSN Data Collection and Compression Schemes. Azad Ali, Abdelmajid Khelil, Neeraj Suri |
| 2015 | Identifying Global Icebergs in Distributed Streams. Emmanuelle Anceaume, Yann Busnel, Nicolo Rivetti, Bruno Sericola |
| 2015 | MICS: Mingling Chained Storage Combining Replication and Erasure Coding. Yan Tang, Jianwei Yin, Wei Lo, Ying Li, Shuiguang Deng, Kexiong Dong, Calton Pu |
| 2015 | Multi-objective Optimisation of Rolling Upgrade Allowing for Failures in Clouds. Daniel Sun, Daniel Guimarans, Alan D. Fekete, Vincent Gramoli, Liming Zhu |
| 2015 | Online Behavior Identification in Distributed Systems. Javier Álvarez Cid-Fuentes, Claudia Szabo, Katrina Falkner |
| 2015 | PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation. Daniel Germanus, Hatem Ismail, Neeraj Suri |
| 2015 | PCM: A Parity-Check Matrix Based Approach to Improve Decoding Performance of XOR-based Erasure Codes. Yongzhe Zhang, Chentao Wu, Jie Li, Minyi Guo |
| 2015 | PSG-Codes: An Erasure Codes Family with High Fault Tolerance and Fast Recovery. Shiyi Li, Qiang Cao, Lei Tian, Shenggang Wan, Lu Qian, Changsheng Xie |
| 2015 | PmDroid: Permission Supervision for Android Advertising. Xing Gao, Dachuan Liu, Haining Wang, Kun Sun |
| 2015 | Privacy-Preserving Content-Based Image Retrieval in the Cloud. Bernardo Ferreira, João Rodrigues, João Leitão, Henrique João L. Domingos |
| 2015 | Probabilistic Byzantine Tolerance for Cloud Computing. Luciana Arantes, Roy Friedman, Olivier Marin, Pierre Sens |
| 2015 | Recurrence in Self-Stabilization. Oday Jubran, Oliver E. Theel |
| 2015 | Replacement: Decentralized Failure Handling for Replicated State Machines. Leander Jehl, Tormod Erevik Lea, Hein Meling |
| 2015 | Ridge: High-Throughput, Low-Latency Atomic Multicast. Carlos Eduardo Benevides Bezerra, Daniel Cason, Fernando Pedone |
| 2015 | SafeSky: A Secure Cloud Storage Middleware for End-User Applications. Rui Zhao, Chuan Yue, Byung-Chul Tak, Chunqiang Tang |
| 2015 | Securing Passive Replication through Verification. Bruno Vavala, Nuno Ferreira Neves, Peter Steenkiste |
| 2015 | Seek-Efficient I/O Optimization in Single Failure Recovery for XOR-coded Storage Systems. Zhirong Shen, Jiwu Shu, Yingxun Fu |
| 2015 | Separating the WHEAT from the Chaff: An Empirical Design for Geo-Replicated State Machines. João Sousa, Alysson Bessani |
| 2015 | Signature-Based Top-k Query Processing against Data Replacement Attacks in MANETs. Takuji Tsuda, Yuka Komai, Takahiro Hara, Shojiro Nishio |
| 2015 | Temporality a NVRAM-based Virtualization Platform. Vasily A. Sartakov, Arthur Martens, Rüdiger Kapitza |
| 2015 | To Transmit Now or Not to Transmit Now. Dacfey Dzung, Rachid Guerraoui, David Kozhaya, Yvonne-Anne Pignolet |
| 2015 | Z Codes: General Systematic Erasure Codes with Optimal Repair Bandwidth and Storage for Distributed Storage Systems. Qing Liu, Dan Feng, Hong Jiang, Yuchong Hu, Tianfeng Jiao |