- Dewan Ibtesham, David Debonis, Dorian C. Arnold, Kurt B. Ferreira:
Coarse-Grained Energy Modeling of Rollback/Recovery Mechanisms. DSN 2014: 708-713 - Murtuza Jadliwala, Anindya Maiti, Vinod Namboodiri:
Social Puzzles: Context-Based Access Control in Online Social Networks. DSN 2014: 299-310 - Majid Jalili, Mohammad Arjomand, Hamid Sarbazi-Azad:
A Reliable 3D MLC PCM Architecture with Resistance Drift Predictor. DSN 2014: 204-215 - Quan Jia, Huangxin Wang, Dan Fleck, Fei Li, Angelos Stavrou, Walter Powell:
Catch Me If You Can: A Cloud-Enabled DDoS Defense. DSN 2014: 264-275 - Lei Jiang, Youtao Zhang, Jun Yang:
Mitigating Write Disturbance in Super-Dense Phase Change Memories. DSN 2014: 216-227 - Hideyuki Jitsumoto, Yuki Todoroki, Yutaka Ishikawa, Mitsuhisa Sato:
Grid-Oriented Process Clustering System for Partial Message Logging. DSN 2014: 714-719 - Thomas B. Jones, David H. Ackley:
Comparison Criticality in Sorting Algorithms. DSN 2014: 726-731 - Aaron Kane, Thomas E. Fuhrman, Philip Koopman:
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience Report. DSN 2014: 148-155 - Sudarsun Kannan, Naila Farooqui, Ada Gavrilovska, Karsten Schwan:
HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based Systems. DSN 2014: 738-743 - Amin Kharraz, Engin Kirda, William K. Robertson, Davide Balzarotti, Aurélien Francillon:
Optical Delusions: A Study of Malicious QR Codes in the Wild. DSN 2014: 192-203 - Minh Lê, Josef Weidendorfer, Max Walter:
A Novel Variable Ordering Heuristic for BDD-based K-Terminal Reliability. DSN 2014: 527-537 - Lee W. Lerner, Zane R. Franklin, William T. Baumann, Cameron D. Patterson:
Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control Systems. DSN 2014: 136-147 - Jing Li, Xinpu Ji, Yuhan Jia, Bingpeng Zhu, Gang Wang, Zhongwei Li, Xiaoguang Liu:
Hard Drive Failure Prediction Using Classification and Regression Trees. DSN 2014: 383-394 - Runhui Li, Patrick P. C. Lee, Yuchong Hu:
Degraded-First Scheduling for MapReduce in Erasure-Coded Storage Clusters. DSN 2014: 419-430 - Bin Liang, Wei You, Liangkun Liu, Wenchang Shi, Mario Heiderich:
Scriptless Timing Attacks on Web Browser Privacy. DSN 2014: 112-123 - Xiaojing Liao, David Formby, Carson Day, Raheem A. Beyah:
Towards Secure Metering Data Analysis via Distributed Differential Privacy. DSN 2014: 780-785 - Xiaojing Liao, A. Selcuk Uluagac, Raheem A. Beyah:
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social Services. DSN 2014: 287-298 - Qin Liu, John C. S. Lui, Cheng He, Lujia Pan, Wei Fan, Yunlong Shi:
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic Analytics. DSN 2014: 80-87 - Daiping Liu, Haining Wang, Angelos Stavrou:
Detecting Malicious Javascript in PDF through Document Instrumentation. DSN 2014: 100-111 - Yixin Luo, Sriram Govindan, Bikash Sharma, Mark Santaniello, Justin Meza, Aman Kansal, Jie Liu, Badriddine Khessib, Kushagra Vaid, Onur Mutlu:
Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory. DSN 2014: 467-478 - Arthur Martens, Christoph Borchert, Tobias Oliver Geissler, Daniel Lohmann, Olaf Spinczyk, Rüdiger Kapitza:
Crosscheck: Hardening Replicated Multithreaded Services. DSN 2014: 648-653 - Catello Di Martino, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer, Fabio Baccanico, Joseph Fullop, William Kramer:
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters. DSN 2014: 610-621 - Stephen Mason, Ilir Gashi, Luca Lugini, Emanuela Marasco, Bojan Cukic:
Interoperability between Fingerprint Biometric Systems: An Empirical Study. DSN 2014: 586-597 - Yutaka Matsuno:
A Design and Implementation of an Assurance Case Language. DSN 2014: 630-641 - Gaspar Modelo-Howard, Christopher N. Gutierrez, Fahad A. Arshad, Saurabh Bagchi, Yuan Qi:
pSigene: Webcrawling to Generalize SQL Injection Signatures. DSN 2014: 45-56 - Subrota K. Mondal, Jogesh K. Muppala:
Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using Checkpointing. DSN 2014: 672-677 - Hossen Asiful Mustafa, Wenyuan Xu, Ahmad-Reza Sadeghi, Steffen Schulz:
You Can Call but You Can't Hide: Detecting Caller ID Spoofing Attacks. DSN 2014: 168-179 - Shankaranarayanan P. N., Ashiwan Sivakumar, Sanjay G. Rao, Mohit Tawarmalani:
Performance Sensitive Replication in Geo-distributed Cloud Datastores. DSN 2014: 240-251 - Daniel A. G. de Oliveira, Caio B. Lunardi, Laércio Lima Pilla, Paolo Rech, Philippe Olivier Alexandre Navaux, Luigi Carro:
Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUs. DSN 2014: 732-737 - Konstantinos Parasyris, Georgios Tziantzoulis, Christos D. Antonopoulos, Nikolaos Bellas:
GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable Substrates. DSN 2014: 622-629