


default search action
DSN 2010: Chicago, IL, USA
- Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2010, Chicago, IL, USA, June 28 - July 1 2010. IEEE Computer Society 2010, ISBN 978-1-4244-7501-8

- Basel Alomair

, Andrew Clark, Jorge Cuéllar, Radha Poovendran
:
Scalable RFID systems: a privacy-preserving protocol with constant-time identification. 1-10 - Utpal Paul, Samir R. Das, Ritesh Maheshwari:

Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring. 11-20 - Weichao Wang, Di Pu, Alexander M. Wyglinski

:
Detecting Sybil nodes in wireless networks with physical layer network coding. 21-30 - Diogo Mónica, João Leitão

, Luís E. T. Rodrigues, Carlos Ribeiro
:
Observable non-Sybil quorums construction in one-hop wireless ad hoc networks. 31-40 - Zhen Wang, Mark G. Karpovsky, Ajay Joshi:

Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes. 41-50 - Shenggang Wan, Qiang Cao, Changsheng Xie, Benjamin Eckart, Xubin He:

Code-M: A non-MDS erasure code scheme to support fast recovery from up to two-disk failures in storage systems. 51-60 - Jianqiang Luo, Cheng Huang, Lihao Xu:

Decoding STAR code for tolerating simultaneous disk failure and silent errors. 61-70 - Ryan M. Lefever, Vikram S. Adve, William H. Sanders:

Diverse Partial Memory Replication. 71-80 - Istemi Ekin Akkus, Ashvin Goel:

Data recovery for web applications. 81-90 - Jingyu Zhou, Caijie Zhang, Hong Tang, Jiesheng Wu, Tao Yang:

Programming support and adaptive checkpointing for high-throughput data services with log-based recovery. 91-100 - Shantanu Gupta, Amin Ansari, Shuguang Feng, Scott A. Mahlke:

StageWeb: Interweaving pipeline stages into a wearout and variation tolerant CMP fabric. 101-110 - Xin Fu, Tao Li, José A. B. Fortes:

Architecting reliable multi-core network-on-chip for small scale processing technology. 111-120 - Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson

:
Energy-efficient fault tolerance in chip multiprocessors using Critical Value Forwarding. 121-130 - Mahdi Fazeli

, Seyed Ghassem Miremadi, Hossein Asadi
, Seyed Nematollah Ahmadian:
A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems design. 131-140 - Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach:

Bit-slice logic interleaving for spatial multi-bit soft-error tolerance. 141-150 - Bardia Zandian, Waleed Dweik

, Suk Hun Kang, Thomas Punihaole, Murali Annavaram
:
WearMon: Reliability monitoring using adaptive critical path testing. 151-160 - Joseph Sloan, David Kesler, Rakesh Kumar, Ali Rahimi:

A numerical optimization-based methodology for application robustification: Transforming applications for error tolerance. 161-170 - Sergey Legtchenko, Sébastien Monnet, Gaël Thomas:

Blue Banana: resilience to avatar mobility in distributed MMOGs. 171-180 - Eric Anderson, Xiaozhou Li, Arif Merchant

, Mehul A. Shah, Kevin Smathers, Joseph A. Tucek, Mustafa Uysal
, Jay J. Wylie:
Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive. 181-190 - Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken:

Using correlated surprise to infer shared influence. 191-200 - Roy A. Maxion, Kevin S. Killourhy:

Keystroke biometrics with number-pad input. 201-210 - Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy:

Using Bayesian networks for cyber security analysis. 211-220 - Pedro Fonseca, Cheng Li, Vishal Singhal, Rodrigo Rodrigues

:
A study of the internal and external effects of concurrency bugs. 221-230 - Greg Bronevetsky, Ignacio Laguna, Saurabh Bagchi, Bronis R. de Supinski, Dong H. Ahn, Martin Schulz

:
AutomaDeD: Automata-based debugging for dissimilar parallel tasks. 231-240 - Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner

, Wenhua Wang:
Detecting vulnerabilities in C programs using trace-based testing. 241-250 - Zhou Li

, Kehuan Zhang, XiaoFeng Wang:
Mash-IF: Practical information-flow control within client-side mashups. 251-260 - Dazhi Zhang, Donggang Liu:

DataGuard: Dynamic data attestation in wireless sensor networks. 261-270 - Silviu Andrica, Horatiu Jula, George Candea:

iProve: A scalable technique for consumer-verifiable software guarantees. 271-280 - Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. 281-290 - Yuanyuan Zeng, Xin Hu, Kang G. Shin:

Detection of botnets using combined host- and network-level information. 291-300 - Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:

Dependable connection setup for network capabilities. 301-310 - Xiang Song, Haibo Chen, Binyu Zang:

Why software hangs and what can be done with it. 311-316 - Elias P. Duarte Jr., Thiago Garrett

, Luis C. E. Bona
, Renato Carmo, Alexandre Prusch Züge:
Finding stable cliques of PlanetLab nodes. 317-322 - Yimin Song, Chao Yang, Guofei Gu:

Who is peeping at your passwords at Starbucks? - To catch an evil twin access point. 323-332 - Jingfei Kong, Huiyang Zhou

:
Improving privacy and lifetime of PCM-based main memory. 333-342 - Olivier Rütti, Zarko Milosevic, André Schiper:

Generic construction of consensus algorithms for benign and Byzantine faults. 343-352 - Marco Serafini, Péter Bokor, Dan Dobre, Matthias Majuntke, Neeraj Suri

:
Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas. 353-362 - James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter:

Zzyzx: Scalable fault tolerance through Byzantine locking. 363-372 - Nazreen Banu, Taisuke Izumi, Koichi Wada:

Doubly-expedited one-step Byzantine consensus. 373-382 - Ke Gao, Cherita L. Corbett, Raheem A. Beyah

:
A passive approach to wireless device fingerprinting. 383-392 - Corrado Leita, Ulrich Bayer, Engin Kirda:

Exploiting diverse observation perspectives to get insights on the malware landscape. 393-402 - Mayra Sacanamboy, Bojan Cukic

:
Combined performance and risk analysis for border management applications. 403-412 - Joaquin Gracia-Moran

, Daniel Gil-Tomas, Luis J. Saiz-Adalid
, Juan Carlos Baraza
, Pedro J. Gil-Vicente
:
Experimental validation of a fault tolerant microcomputer system against intermittent faults. 413-418 - Boudewijn R. Haverkort

, Matthias Kuntz, Anne Remke, S. Roolvink, Mariëlle Stoelinga
:
Evaluating repair strategies for a water-treatment facility using Arcade. 419-424 - Carl R. Elks, Michael Reynolds, Nishant J. George, Marko Miklo, Scott Bingham, Ronald D. Williams, Barry W. Johnson, Michael Waterman, Jeanne Dion:

Application of a fault injection based dependability assessment process to a commercial safety critical nuclear reactor protection system. 425-430 - Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Measurement-based analysis of fault and error sensitivities of dynamic memory. 431-436 - Roberto Natella

, Domenico Cotroneo, João Durães
, Henrique Madeira
:
Representativeness analysis of injected software faults in complex software. 437-446 - Michael Grottke

, Allen P. Nikora, Kishor S. Trivedi:
An empirical investigation of fault types in space mission system software. 447-456 - Marcello Cinque

, Domenico Cotroneo, Roberto Natella
, Antonio Pecchia:
Assessing and improving the effectiveness of logs for the analysis of software faults. 457-466 - Jayanand Asok Kumar, Shobha Vasudevan:

Statistical guarantees of performance for MIMO designs. 467-476 - Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach:

Transient fault models and AVF estimation revisited. 477-486 - Marc de Kruijf, Shuou Nomura, Karthikeyan Sankaralingam:

A unified model for timing speculation: Evaluating the impact of technology scaling, CMOS design style, and fault recovery mechanism. 487-496 - Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, Calton Pu:

Performance and availability aware regeneration for cloud based multitier applications. 497-506 - Javier Alonso, Jordi Torres

, Josep Lluis Berral
, Ricard Gavaldà
:
Adaptive on-line software aging prediction based on machine learning. 507-516 - Manoj K. Agarwal, Venkateswara Reddy Madduri:

Correlating failures with asynchronous changes for root cause analysis in enterprise environments. 517-526 - Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone

:
Ring Paxos: A high-throughput atomic broadcast protocol. 527-536 - Henrique Moniz

, Nuno Ferreira Neves
, Miguel Correia
:
Turquois: Byzantine consensus in wireless ad hoc networks. 537-546 - Ann T. Tai, Kam S. Tso, William H. Sanders:

Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation. 547-556 - Daniel Skarin, Raul Barbosa

, Johan Karlsson:
GOOFI-2: A tool for experimental dependability assessment. 557-562 - Eric Bisolfati, Paul Dan Marinescu, George Candea:

Studying application-library interaction and behavior with LibTrac. 563-568 - Patrick E. Lanigan, Priya Narasimhan, Thomas E. Fuhrman:

Experiences with a CANoe-based fault injection framework for AUTOSAR. 569-574 - Tudor Marian, Daniel A. Freedman, Ken Birman

, Hakim Weatherspoon:
Empirical characterization of uncongested optical lambda networks and 10GbE commodity endpoints. 575-584 - Pirkko Kuusela

, Ilkka Norros:
On/off process modeling of IP network failures. 585-594 - Samuel K. Klock, Peter Kemper:

An automated technique to support the verification and validation of simulation models. 595-604 - Elvio Gilberto Amparore, Susanna Donatelli:

Model checking CSLTA with Deterministic and Stochastic Petri Nets. 605-614 - John T. Daly, Nathan DeBardeleben:

1st workshop on fault-tolerance for HPC at extreme scale FTXS 2010. 615 - Miroslaw Malek, Felix Salfner, Kishor S. Trivedi:

Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM). 616-618 - Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis:

Fourth workshop on dependable and secure nanocomputing. 619-620 - Miguel Correia

, Partha P. Pal
:
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. 621-622

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














