


default search action
33. SRDS 2014: Nara, Japan
- 33rd IEEE International Symposium on Reliable Distributed Systems, SRDS 2014, Nara, Japan, October 6-9, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-5584-8
Security & Privacy
- Sébastien Gambs, Marc-Olivier Killijian, Matthieu Roy, Moussa Traoré:
PROPS: A PRivacy-Preserving Location Proof System. 1-10 - Zhang Xu, Haining Wang, Sushil Jajodia
:
Gemini: An Emergency Line of Defense against Phishing Attacks. 11-20 - Jose Carlos Coelho Martins da Fonseca, Marco Paulo Amorim Vieira
:
A Practical Experience on the Impact of Plugins in Web Security. 21-30
Reliability of Clouds
- Cristian Klein, Alessandro Vittorio Papadopoulos
, Manfred Dellkrantz, Jonas Durango, Martina Maggio
, Karl-Erik Årzén, Francisco Hernández-Rodriguez, Erik Elmroth:
Improving Cloud Service Resilience Using Brownout-Aware Load-Balancing. 31-40 - Parisa Jalili Marandi, Samuel Benz, Fernando Pedone
, Kenneth P. Birman
:
The Performance of Paxos in the Cloud. 41-50 - Radu Tudoran, Alexandru Costan
, Gabriel Antoniu:
Transfer as a Service: Towards a Cost-Effective Model for Multi-site Cloud Data Management. 51-56
Replication & Coordination
- Parisa Jalili Marandi, Fernando Pedone
:
Optimistic Parallel State-Machine Replication. 57-66 - Raluca Halalai, Pierre Sutra
, Etienne Rivière, Pascal Felber
:
ZooFence: Principled Service Partitioning and Application to the ZooKeeper Coordination Service. 67-78 - Francisco Maia
, Miguel Matos
, Ricardo Manuel Pereira Vilaça
, José Pereira
, Rui Oliveira
, Etienne Rivière:
DATAFLASKS: Epidemic Store for Massive Scale Systems. 79-88 - Maciej Kokocinski
, Tadeusz Kobus
, Pawel T. Wojciechowski
:
Make the Leader Work: Executive Deferred Update Replication. 89-94
Databases and Transaction Processing
- Pascal Felber
, Marcelo Pasin
, Etienne Rivière, Valerio Schiavoni
, Pierre Sutra
, Fábio Coelho
, Rui Oliveira
, Miguel Matos
, Ricardo Manuel Pereira Vilaça
:
On the Support of Versioning in Distributed Key-Value Stores. 95-104 - Vinit Padhye, Gowtham Rajappan, Anand R. Tripathi:
Transaction Management Using Causal Snapshot Isolation in Partially Replicated Databases. 105-114 - Fábio Andre Castanheira Luis Coelho
, Francisco Miguel Barros da Cruz
, Ricardo Manuel Pereira Vilaça
, José Orlando Pereira
, Rui Carlos Mendes de Oliveira
:
pH1: A Transactional Middleware for NoSQL. 115-124
Reliable Storage
- Shiyi Li, Xubin He, Shenggang Wan, Yuhua Guo, Ping Huang, Di Chen, Qiang Cao, Changsheng Xie:
Exploiting Decoding Computational Locality to Improve the I/O Performance of an XOR-Coded Storage Cluster under Concurrent Failures. 125-135 - Yingxun Fu, Jiwu Shu, Xianghong Luo:
A Stack-Based Single Disk Failure Recovery Scheme for Erasure Coded Storage Systems. 136-145 - Huayu Zhang, Hui Li, Bing Zhu, Jun Chen:
Fast Repair for Single Failure in Erasure Coding-Based Distributed Storage Systems. 146-151
Algorithms
- Alexandre Maurer, Sébastien Tixeuil:
Self-Stabilizing Byzantine Broadcast. 152-160 - Carole Delporte-Gallet, Hugues Fauconnier, Michel Raynal:
Fair Synchronization in the Presence of Process Crashes and its Weakest Failure Detector. 161-170 - Yoshisato Sakai:
Convergence Verification of Asynchronous Iterations. 171-181
Wireless Networks and Cyber-Physical Systems
- Timo Lindhorst, Burkhard Weseloh, Edgar Nett:
Dependable Admission Control for Mission-Critical Mobile Applications in Wireless Mesh Networks. 182-190 - Yao-Tung Tsou, Yung-Li Hu, Yennun Huang
, Sy-Yen Kuo
:
PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor Networks. 191-200 - Tao Li, Jiannong Cao
:
Device Collaboration for Stability Assurance in Distributed Cyber-Physical Systems. 201-210
Nominated Papers I
- Panagiotis Garefalakis, Panagiotis Papadopoulos
, Kostas Magoutis
:
ACaZoo: A Distributed Key-Value Store Based on Replicated LSM-Trees. 211-220 - Amirhossein Malekpour, Antonio Carzaniga
, Fernando Pedone
:
End-to-End Congestion Control for Content-Based Networks. 221-231 - Diogo Behrens, Dmitrii Kuvaiskii, Christof Fetzer:
HardPaxos: Replication Hardened against Hardware Errors. 232-241
Nominated Papers II
- Marco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir:
Towards a Practical Survivable Intrusion Tolerant Replication System. 242-252 - Sisi Duan, Karl N. Levitt, Hein Meling, Sean Peisert
, Haibin Zhang:
ByzID: Byzantine Fault Tolerance from Intrusion Detection. 253-264 - Roberto Ammendola
, Andrea Biagioni
, Ottorino Frezza
, Francesca Lo Cicero
, Alessandro Lonardo, Pier Stanislao Paolucci
, Davide Rossetti, Francesco Simula
, Laura Tosoratto, Piero Vicini
:
LO-FA-MO: Fault Detection and Systemic Awareness for the QUonG Computing System. 265-270
Network
- Amadou Diarra, Sonia Ben Mokhtar
, Pierre-Louis Aublin, Vivien Quéma:
FullReview: Practical Accountability in Presence of Selfish Nodes. 271-280 - Joao Carlos Antunes Leitao
, Luis Eduardo Teixeira Rodrigues:
Overnesia: A Resilient Overlay Network for Virtual Super-Peers. 281-290 - Sonia Ben Mokhtar
, Jeremie Decouchant
, Vivien Quéma:
AcTinG: Accurate Freerider Tracking in Gossip. 291-300
Reliability of Software and Networks
- Zhiwei Yang, Weigang Wu, Yishun Chen, Xiaola Lin
:
Accurate and Efficient Counting in Dynamic Networks. 301-310 - Rivalino Matias, Artur Andrzejak, Fumio Machida, Diego Elias, Kishor S. Trivedi:
A Systematic Differential Analysis for Fast and Robust Detection of Software Aging. 311-320 - Riccardo Guerzoni, Zoran Despotovic, Riccardo Trivisonno
, Ishan Vaishnavi:
Modeling Reliability Requirements in Coordinated Node and Link Mapping. 321-330
PhD Forum
- Yuka Komai, Takahiro Hara, Shojiro Nishio:
A Convex Hull Query Processing Method in MANETs. 331-332 - Yonghwan Kim, Tadashi Araragi, Junya Nakamura, Toshimitsu Masuzawa:
A Distributed NameNode Cluster for a Highly-Available Hadoop Distributed File System. 333-334 - Dmitrii Kuvaiskii, Christof Fetzer:
Practical Encoded Processing. 335-336 - Savong Bou, Toshiyuki Amagasa, Hiroyuki Kitagawa:
Keyword Search with Path-Based Filtering over XML Streams. 337-338 - Satoshi Hikida, Hiroki Oguri, Haruo Yokota
:
A Prototype of Power Saving Storage Method RAPoSDA. 339-340 - Kazuya Matsuo, Keisuke Goto, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio:
A Study on Efficient Event Monitoring in Dense Mobile Wireless Sensor Networks. 341-342 - Sergei Arnautov, Christof Fetzer:
Chained Signatures for Secure Program Execution. 343-344 - Ki-Jin Eom, Choong-Hyun Choi, Joon-Young Paik, Eun-Sun Cho:
An Efficient Static Taint-Analysis Detecting Exploitable-Points on ARM Binaries. 345-346 - Raluca Halalai, Leandro Pacheco de Sousa:
Building a Strongly Consistent Multi-site File System. 347-348 - Ta Hong Viet:
Adaptive Redundant Data Allocation Using Unused Blocks for Improving Access Efficiency in Dependable Storage Systems. 349-350 - Kodai Murakami, Tatsuya Ito, Susumu Ishihara:
Improving the Throughput of Wireless LAN by Tuning Carrier Sense Threshold of Access Points Based on Node Positions Detected by a Visible Light Tag System. 351-352

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.