


default search action
DSN 2004: Florence, Italy
- 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June - 1 July 2004, Florence, Italy, Proceedings. IEEE Computer Society 2004, ISBN 0-7695-2052-9 [contents]

Keynote Address
- Leslie Lamport:

Recent Discoveries from Paxos. DSN 2004: 3
Dependable Computing and Communications Symposium
Overlay Networks
- Miguel Castro, Manuel Costa, Antony I. T. Rowstron:

Performance and Dependability of Structured Peer-to-Peer Overlays. 9-18 - Alberto Montresor, Márk Jelasity, Özalp Babaoglu:

Robust Aggregation Protocols for Large-Scale Overlay Networks. 19-28 - Junghee Han, Farnam Jahanian:

Impact of Path Diversity on Multi-homed and Overlay Networks. 29-
Fault Tolerance Hardware Design
- Christopher LaFrieda, Rajit Manohar:

Fault Detection and Isolation Techniques for Quasi Delay-Insensitive Circuits. 41-50 - Fred A. Bower, Paul G. Shealy, Sule Ozev, Daniel J. Sorin:

Tolerating Hard Faults in Microprocessor Array Structures. 51-60 - Nicholas J. Wang, Justin Quek, Todd M. Rafacz, Sanjay J. Patel:

Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline. 61-
Security Attacks
- Cynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger:

Dynamic Quarantine of Internet Worms. 73-82 - Hao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zhang:

HOURS: Achieving DoS Resilience in an Open Service Hierarchy. 83-92 - Mark G. Karpovsky, Konrad J. Kulikowski, Alexander Taubin:

Robust Protection against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption Standard. 93-101 - Kevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan:

A Defense-Centric Taxonomy Based on Attack Manifestations. 102-
Coding Techniques
- James S. Plank, Michael G. Thomason:

A Practical Analysis of Low-Density Parity-Check Erasure Codes for Wide-Area Storage Applications. 115-124 - Svend Frølund, Arif Merchant

, Yasushi Saito, Susan Spence, Alistair C. Veitch:
A Decentralized Algorithm for Erasure-Coded Virtual Disks. 125-134 - Garth R. Goodson, Jay J. Wylie, Gregory R. Ganger, Michael K. Reiter:

Efficient Byzantine-Tolerant Erasure-Coded Storage. 135-144 - Philip Koopman, Tridib Chakravarty:

Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks. 145-
Emerging Technologies
- P. Oscar Boykin, Vwani P. Roychowdhury, Tal Mor, Farrokh Vatan:

Fault Tolerant Computation on Ensemble Quantum Computers. 157-166 - A. J. KleinOsowski, Kevin KleinOsowski, Vijay Rangarajan, Priyadarshini Ranganath, David J. Lilja:

The Recursive NanoBox Processor Grid: A Reliable System Architecture for Unreliable Nanotechnology Devices. 167-176 - Jayanth Srinivasan, Sarita V. Adve, Pradip Bose, Jude A. Rivers:

The Impact of Technology Scaling on Lifetime Reliability. 177-
Formal Methods
- Wilfried Steiner, John M. Rushby, Maria Sorea, Holger Pfeifer:

Model Checking a Fault-Tolerant Startup Algorithm: From Design Exploration To Exhaustive Fault Simulation. 189-198 - Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo:

Verifying Web Applications Using Bounded Model Checking. 199-208 - Sandeep S. Kulkarni, Ali Ebnenasir:

Automated Synthesis of Multitolerance. 209-
Impact of Soft Errors in Future Computing Systems
Broadcast & Multicast
- Gal Badishi, Idit Keidar, Amir Sasson:

Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based Multicast. 223-232 - Sébastien Baehni, Patrick Th. Eugster, Rachid Guerraoui

:
Data-Aware Multicast. 233-242 - Taisuke Izumi, Akinori Saitoh, Toshimitsu Masuzawa:

Timed Uniform Consensus Resilient to Crash and Timing Faults. 243-252 - Carolos Livadas, Idit Keidar:

Caching-Enhanced Scalable Reliable Multicast. 253-
Dependability AssessmentDependability Assessment
- Peter T. Popov

, Bev Littlewood:
The Effect of Testing on Reliability of Fault-Tolerant Software. 265-274 - Elizabeth Latronico, Paul S. Miner, Philip Koopman:

Quantifying the Reliability of Proven SPIDER Group Membership Service Guarantees. 275-284 - João Durães

, Henrique Madeira:
Generic Faultloads Based on Software Faults for Dependability Benchmarking. 285-294 - Charles P. Shelton, Philip Koopman:

Improving System Dependability with Functional Alternatives. 295-
Distributed Algorithms
- Leslie Lamport, Mike Massa:

Cheap Paxos. 307-314 - Kishori M. Konwar, Dariusz R. Kowalski, Alexander A. Shvartsman

:
The Join Problem in Dynamic Network Algorithms. 315-324 - Jean-Philippe Martin, Lorenzo Alvisi:

A Framework for Dynamic Byzantine Storage. 325-334 - Jennifer Ren, Rick Buskens, Oscar J. Gonzalez:

Dependable Initialization of Large-Scale Distributed Software. 335-
Embedded & Real-Time Systems
- Ismail Assayad, Alain Girault, Hamoudi Kalla

:
A Bi-Criteria Scheduling Heuristic for Distributed Embedded Systems under Reliability and Real-Time Constraints. 347-356 - Soila M. Pertet, Priya Narasimhan:

Proactive Recovery in Distributed CORBA Applications. 357-366 - Elisabeth A. Strunk, John C. Knight:

Assured Reconfiguration of Embedded Real-Time Software. 367-376 - Jennifer Morris, Daniel Kroening

, Philip Koopman:
Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded Systems. 377-
Practical Experience of Evaluation Tools & Methods
- Ilir Gashi, Peter T. Popov

, Lorenzo Strigini:
Fault Diversity among Off-The-Shelf SQL Database Servers. 389-398 - Lan Guo, Supratik Mukhopadhyay, Bojan Cukic:

Does Your Result Checker Really Check? 399-404 - Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson:

Experience with Evaluating Human-Assisted Recovery Processes. 405-410 - G. John Janakiraman, Jose Renato Santos, Yoshio Turner:

Automated System Design for Availability. 411-
Intrusion Detection & Intrusion Tolerance
- Christian Cachin, Asad Samar:

Secure Distributed DNS. 423-432 - Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh, Timothy K. Tsai:

SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. 433-442 - Alexey Smirnov, Tzi-cker Chiueh:

A Portable Implementation Framework for Intrusion-Resilient Database Management Systems. 443-452 - Robert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan:

A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture. 453-
Fault-Tolerant Routing
- Lan Wang, Daniel Massey, Keyur Patel, Lixia Zhang:

FRTR: A Scalable Mechanism for Global Routing Table Consistency. 465-474 - Srinivasan Ramasubramanian:

On Failure Dependent Protection in Optical Grooming Networks. 475-484 - Christie Bolton, Gavin Lowe:

Analyses of the Reverse Path Forwarding Routing Algorithm. 485-494 - Elias Procópio Duarte Jr., Rogério Santini, Jaime Cohen:

Delivering Packets During The Routing Convergence Latency Interval Through Highly Connected Detours. 495-
Dissemination and Diffusion
- Benoît Garbinato

, Fernando Pedone
, Rodrigo Schmidt:
An Adaptive Algorithm for Efficient Message Diffusion in Unreliable Environments. 507-516 - Jonathan C. Rowanhill, Philip E. Varner, John C. Knight:

Efficient Hierarchic Management For Reconfiguration of Networked Information Systems. 517-526 - Subramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran:

Collective Endorsement and the Dissemination Problem in Malicious Environments. 527-536 - Jyh-How Huang, Shivakant Mishra:

Support for Mobility and Fault Tolerance in Mykil. 537-
Practical Experience in Fault-Tolerance & Real-Time
- Mohamed Taha Bennani

, Laurent Blain, Ludovic Courtès, Jean-Charles Fabre, Marc-Olivier Killijian, Eric Marsden, François Taïani
:
Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java Serialization. 549-554 - Enrique Hernández-Orallo, Joan Vila i Carbó:

In Advance Activation of Backup Channels for Real-Time Transmission. 555-560 - Archana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong Wen:

Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems. 561-566 - Pedro Martins, Paulo Jorge Paiva de Sousa, António Casimiro

, Paulo Veríssimo:
Dependable Adaptive Real-Time Applications in Wormhole-based Systems. 567-
Support for Security & Dependability
- Ramakrishna Kotla, Michael Dahlin:

High Throughput Byzantine Fault Tolerance. 575-584 - Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Jun Xu:

An Architectural Framework for Providing Reliability and Security Support. 585-594 - Alex X. Liu, Mohamed G. Gouda:

Diverse Firewall Design. 595-604 - Nick Cook, Paul Robinson, Santosh K. Shrivastava:

Component Middleware to Support Non-repudiable Service Interactions. 605-
Mobility & Wireless Systems
- Jun He, Matti A. Hiltunen, Richard D. Schlichting:

Customizing Dependability Attributes for Mobile Service Platforms. 617-626 - Rajesh Venkatasubramanian, John P. Hayes:

Discovering 1-FT Routes in Mobile Ad Hoc Networks. 627-636 - Jing Deng, Richard Han

, Shivakant Mishra:
Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks. 637-
Performance and Dependability Symposium
Fault Trees & Modelling
- Frank Ortmeier, Wolfgang Reif:

Safety Optimization: A Combination of Fault Tree Analysis and Optimization Techniques. 651-658 - Daniele Codetta Raiteri

, Mauro Iacono, Giuliana Franceschinis, Valeria Vittorini:
Repairable Fault Tree for the Automatic Evaluation of Repair Policies. 659-668 - Dong Tang, Dileep Kumar, Sreeram Duvur, Øystein Torbjørnsen:

Availability Measurement and Modeling for An Application Server. 669-
Practical Experience on Dependability and Performance Assessment
- Ali Kalakech, Karama Kanoun, Yves Crouzet, Jean Arlat:

Benchmarking The Dependability of Windows NT4, 2000 and XP. 681-686 - Long Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, H. Vora, T. Chahande:

Checkpointing of Control Structures in Main Memory Database Systems. 687-692 - Dong Tang, Kishor S. Trivedi:

Hierarchical Computation of Interval Availability and Related Metrics. 693-
Model Checking
- Christel Baier, Lucia Cloth, Boudewijn R. Haverkort, Matthias Kuntz, Markus Siegle

:
Model Checking Action- and State-Labelled Markov Chains. 701-710 - Mieke Massink

, Joost-Pieter Katoen, Diego Latella:
Model Checking Dependability Attributes of Wireless Group Communication. 711-720 - Tatsuya Ozaki, Tadashi Dohi, Hiroyuki Okamura, Naoto Kaio

:
Min-Max Checkpoint Placement under Incomplete Failure Information. 721-730 - Andrea Acquaviva, Alessandro Aldini

, Marco Bernardo, Alessandro Bogliolo, Edoardo Bontà, Emanuele Lattanzi
:
Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances. 731-
QoS and Performance Evaluation
- Ludmila Cherkasova, Wenting Tang, Sharad Singhal:

An SLA-Oriented Capacity Planning Tool for Streaming Media Services. 743-752 - Raul Ceretta Nunes, Ingrid Jansch-Pôrto:

QoS of Timeout-Based Self-Tuned Failure Detectors: The Effects of the Communication Delay Predictor and the Safety Margin. 753-761 - Panagiotis Katsaros, Constantine Lazos:

Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems. 762-771 - Ramendra K. Sahoo, Anand Sivasubramaniam, Mark S. Squillante, Yanyong Zhang:

Failure Data Analysis of a Large-Scale Heterogeneous Server Environment. 772-
Sensor Networks
- Patrick Downey, Rachel Cardell-Oliver:

Evaluating the Impact of Limited Resource on the Performance of Flooding in Wireless Sensor Networks. 785-794 - Gunjan Khanna, Saurabh Bagchi, Yu-Sung Wu:

Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks. 795-804 - Ann T. Tai, Kam S. Tso, William H. Sanders:

Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications. 805-
Evaluation Theory
- Vinu Vijay Kumar, Rashi Verma, John C. Lach, Joanne Bechta Dugan:

A Markov Reward Model for Reliable Synchronous Dataflow System Design. 817-825 - Mehdi Kargahi, Ali Movaghar-Rahimabadi:

A Method for Performance Analysis of Earliest-Deadline-First Scheduling Policy. 826-834 - Marco Gribaudo

, Matteo Sereno:
An Efficient Algorithm for the Transient Analysis of a Class of Deterministic Stochastic Petri Nets. 835-844 - Gábor Horváth, Sándor Rácz, Miklós Telek

:
Analysis of Second-Order Markov Reward Models. 845-
Dependability Benchmarking
- Juan-Carlos Ruiz-Garcia, Pedro Yuste, Pedro J. Gil, Lenin Lemus:

On Benchmarking the Dependability of Automotive Engine Control Applications. 857-866 - Arnaud Albinet, Jean Arlat, Jean-Charles Fabre:

Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel. 867-876 - Kimberly Keeton, Arif Merchant

:
A Framework for Evaluating Storage System Dependability. 877-886 - Weining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors. 887-
Special Tracks
- Michael D. Harrison, Lorenzo Strigini:

Workshop on Interdisciplinary Approaches to Achieving and Analysing System Dependability. DSN 2004: 899 - Saurabh Bagchi, Douglas M. Blough, Paolo Santi, Nitin H. Vaidya:

DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks. DSN 2004: 900 - Rogério de Lemos, Cristina Gacek, Alexander B. Romanovsky:

Twin Workshops on Architecting Dependable Systems (WADS 2004). DSN 2004: 901 - Luca Breveglieri, Israel Koren:

Workshop on Fault Diagnosis and Tolerance in Cryptography. DSN 2004: 902 - Charles Howell, Sofia Guerra, Shari Lawrence Pfleeger, Victoria Stavridou-Coleman:

Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future Opportunities. DSN 2004: 903 - Susanna Donatelli:

Student Forum. DSN 2004: 904 - Felicita Di Giandomenico:

Fast Abstracts. DSN 2004: 905

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














