default search action
DSN 2011: Hong Kong, China
- IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), Hong Kong, China, June 27-30, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-0374-4
5th Workshop on Recent Advances in Intrusion-Tolerant Systems (WRAITS)
- Alysson Neves Bessani, Partha P. Pal:
5th Workshop on recent advances in intrusion-tolerant systems WRAITS 2011. 1-2
Session 1: Distributed Systems
- Murilo Santos de Lima, Fabíola Greve, Luciana Arantes, Pierre Sens:
The time-free approach to Byzantine failure detection in dynamic networks. 3-8 - Saman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin P. McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope:
Managing business health in the presence of malicious attacks. 9-14 - Alysson Neves Bessani:
From Byzantine fault tolerance to intrusion tolerance (a position paper). 15-18
Session 2: Intrusion Detection and Response
- Gustavo Nascimento, Miguel Correia:
Anomaly-based intrusion detection in software as a service. 19-24 - Ajay Nagarajan, Quyen L. Nguyen, Robert Banks, Arun Sood:
Combining intrusion detection and recovery for enhancing system dependability. 25-30 - Amir Houmansadr, Saman A. Zonouz, Robin Berthier:
A cloud-based intrusion detection and response system for mobile phones. 31-32
Session 3: Security Assessment
- Patrick Hurley, Partha P. Pal, Matthew Tan Creti, Amy Fedyk:
Continuous mission-oriented assessment (CMA) of assurance. 33-38
5th Workshop on Dependable and Secure Nanocomputing (WDSN)
- Jean Arlat, Cristian Constantinescu, Johan Karlsson, Takashi Nanya, Alan Wood:
Introduction to the fifth workshop on dependable and secure nanocomputing. 39-40
Session 1: Failure Modes
- Alireza Rohani, Hans G. Kerkhoff:
Study of the effects of SET induced faults on submicron technologies. 41-46 - Markus Ferringer:
Investigating the impact of process variations on an asynchronous Time-Triggered-Protocol controller. 47-52 - Jiesheng Wei, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan:
Comparing the effects of intermittent and transient hardware faults on programs. 53-58
Session 2: Stochastic Computing & Time Redundancy Techniques
- Dimitar Nikolov, Urban Ingelsson, Virendra Singh, Erik Larsson:
Level of confidence evaluation and its usage for Roll-back Recovery with Checkpointing optimization. 59-64
Session 3: Mitigation Techniques
- Ching-Hwa Cheng, Ming-Hsuan Wu, Pin-Jui Lai, Chia-Hao Ku:
A digitalized management mechanism for low-cost low-power multiple-voltage 3D designs. 65-68 - Jun Yao, Ryoji Watanabe, Kazuhiro Yoshimura, Takashi Nakada, Hajime Shimada, Yasuhiko Nakashima:
An efficient and reliable 1.5-way processor by fusion of space and time redundancies. 69-74 - Wing-Kei S. Yu, Shantanu Rajwade, Sung-En Wang, Bob Lian, G. Edward Suh, Edwin Kan:
A non-volatile microcontroller with integrated floating-gate transistors. 75-80
Session 4: Testing & Fault Injection
- Ching-Hwa Cheng, Chen-I Chung:
Built-in fine resolution clipping with calibration technique for high-speed testing by using wireless testers. 81-84 - Xiaoxin Fan, Sudhakar M. Reddy, Senling Wang, Seiji Kajihara, Yasuo Sato:
Genetic algorithm based approach for segmented testing. 85-90 - Yohei Nakata, Yasuhiro Ito, Yasuo Sugure, Shigeru Oho, Yusuke Takeuchi, Shunsuke Okumura, Hiroshi Kawaguchi, Masahiko Yoshimoto:
Model-based fault injection for failure effect analysis - Evaluation of dependable SRAM for vehicle control units. 91-96
1st International Workshop on Dependability of Clouds, Data Centers and Virtual Computing Environments (DCDV)
- Jogesh K. Muppala, Matti A. Hiltunen, Robert J. Stroud, Ji Wang:
The first international workshop on dependability of clouds, data centers and virtual computing environments: DCDV 2011. 97-98
Session 1: Distributed Data
- Zhenhai Zhao, Tingting Qin, Fangliang Xu, Rui Cao, Jing Liu, Gang Wang:
CAWRM: A remote mirroring system based on AoDI volume. 99-104 - Miguel Matos, Ricardo Vilaça, José Pereira, Rui Oliveira:
An epidemic approach to dependable key-value substrates. 105-110
Session 2: Security
- John C. Mace, Aad P. A. van Moorsel, Paul Watson:
The case for dynamic security solutions in public cloud workflow deployments. 111-116 - Bernhard Kauer, Paulo Veríssimo, Alysson Neves Bessani:
Recursive virtual machines for advanced security mechanisms. 117-122 - Quyen L. Nguyen, Arun Sood:
Designing SCIT architecture pattern in a Cloud-based environment. 123-128
Session 3: Failure Detection and Security
- Francisco Rocha, Miguel Correia:
Lucy in the sky without diamonds: Stealing confidential data in the cloud. 129-134 - Haibo Mi, Huaimin Wang, Gang Yin, Hua Cai, Qi Zhou, Tingtao Sun:
Performance problems online detection in cloud computing systems via analyzing request execution paths. 135-139 - Xiang Rao, Huaimin Wang, Dianxi Shi, Zhenbang Chen, Hua Cai, Qi Zhou, Tingtao Sun:
Identifying faults in large-scale distributed systems by filtering noisy error logs. 140-145
Session 4: Cloud Resource Management
- Madalin Mihailescu, Andres Rodriguez, Cristiana Amza:
Enhancing application robustness in Infrastructure-as-a-Service clouds. 146-151 - Rahul Ghosh, Vijay K. Naik, Kishor S. Trivedi:
Power-performance trade-offs in IaaS cloud: A scalable analytic approach. 152-157 - Richard E. Harper, Lorrie A. Tomek, Ofer Biran, Erez Hadad:
A virtual resource placement service. 158-163
7th Workshop on Hot Topics in System Dependability (HotDep)
- Andreas Haeberlen, Mootaz Elnozahy:
Seventh workshop on hot topics in system dependability (HotDep'11). 164
Session 1: Dependable Storage
- David C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum:
Integrated end-to-end dependability in the Loris storage stack. 165-170 - Ricardo Padilha, Fernando Pedone:
Scalable Byzantine fault-tolerant storage. 171-175 - Flavio Junqueira, Benjamin C. Reed, Maysam Yabandeh:
Lock-free transactional support for large-scale storage systems. 176-181
Session 2: Security
- Afonso Araújo Neto, Marco Vieira:
TO BEnchmark or NOT TO BEnchmark security: That is the question. 182-187 - Radu Banabic, George Candea, Rachid Guerraoui:
Automated vulnerability discovery in distributed systems. 188-193 - Jicheng Shi, Xiang Song, Haibo Chen, Binyu Zang:
Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring. 194-199
Session 3: System and Software Reliability
- George Candea:
Exterminating bugs via collective information recycling. 200-204 - Horatiu Jula, Thomas Rensch, George Candea:
Platform-wide deadlock immunity for mobile phones. 205-210 - Vitaly Chipounov, George Candea:
Enabling sophisticated analyses of ×86 binaries with RevGen. 211-216
Session 4: Architectural Support for Dependability
- Seongwook Jin, Jaehyuk Huh:
Secure MMU: Architectural support for memory isolation among virtual machines. 217-222 - Christof Fetzer, Pascal Felber:
Transactional memory for dependable embedded systems. 223-227
1st International Workshop on Open Systems Dependability : Adaptation to Changing World (WOSD)
- Mario Tokoro, Karama Kanoun, Kimio Kuramitsu, Jean-Charles Fabre:
WOSD 2011: The first international workshop on open systems dependability. 228-229
Session 1: Applications
- Hirotake Abe, Hirotaka Moriya, Kyoji Umemura:
On finding vestiges of Internet backbone failures for optimizing wide area data replication. 230-233 - Bo Li, Haiying Zhou, Decheng Zuo, Zhan Zhang, Peng Zhou, Long Jia:
Performance modeling and benchmarking of bank intermediary business on high-performance fault-tolerant computers. 234-239 - Hiroyuki Okamura, Tadashi Dohi, Shin'ichi Shiraishi, Mutsumi Abe:
Composite dependability modeling for in-vehicle networks. 240-245
Session 2: System and Architecture
- Jean-Charles Fabre:
Architecting resilient computing systems: Overall approach and open issues. 246-247 - Shinpei Nakata, Midori Sugaya, Kimio Kuramitsu:
Fault model of foreign function interface across different domains. 248-253 - Shuichi Oikawa:
Enforcing dependable operations by model checking a visualization layer. 254-256
3rd Workshop on Proactive Failure Avoidance, Recovery, and Maintenance (PFARM)
- Miroslaw Malek, Felix Salfner, Kishor S. Trivedi:
Third workshop on proactive failure avoidance, recovery, and maintenance (PFARM). 257-258
Session 1:
- Li Yu, Ziming Zheng, Zhiling Lan, Susan Coghlan:
Practical online failure prediction for Blue Gene/P: Period-based vs event-driven. 259-264 - Huxing Zhang, Gang Wu, Kingsum Chow, Zhidong Yu, XueZhi Xing:
Detecting resource leaks through dynamical mining of resource usage patterns. 265-270 - Richard E. Harper, Kyung Dong Ryu, David Frank, Lisa Spainhower, Ravi Shankar, Tom Weaver:
DynaPlan: Resource placement for application-level clustering. 271-277
5th International workshop on Adaptive and DependAble Mobile Ubiquitous Systems (ADAMUS)
- Domenico Cotroneo, Vincenzo De Florio:
5th International workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011. 278-279
Session 1:
- Edith Cheuk-Han Ngai, Junjie Xiong:
Adaptive collaborative sensing using mobile phones and stationary sensors. 280-285 - Marcello Cinque:
Enabling on-line dependability assessment of Android smart phones. 286-291
Session 2:
- Szu-Lin Su, Yi-Wen Su, Chien-Sheng Chen, Wen-Hsiung Liu:
A novel design of node-disjoint multi-path QoS routing in multi-hop ad hoc networks. 292-296 - Yan Huang, Cai Chen:
Privacy leakage in two-party group nearest neighbor queries. 297-300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.