default search action
DSN 2010: Chicago, IL, USA
- Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2010, Chicago, IL, USA, June 28 - July 1 2010. IEEE Computer Society 2010, ISBN 978-1-4244-7501-8
- Basel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran:
Scalable RFID systems: a privacy-preserving protocol with constant-time identification. 1-10 - Utpal Paul, Samir R. Das, Ritesh Maheshwari:
Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring. 11-20 - Weichao Wang, Di Pu, Alexander M. Wyglinski:
Detecting Sybil nodes in wireless networks with physical layer network coding. 21-30 - Diogo Mónica, João Leitão, Luís E. T. Rodrigues, Carlos Ribeiro:
Observable non-Sybil quorums construction in one-hop wireless ad hoc networks. 31-40 - Zhen Wang, Mark G. Karpovsky, Ajay Joshi:
Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes. 41-50 - Shenggang Wan, Qiang Cao, Changsheng Xie, Benjamin Eckart, Xubin He:
Code-M: A non-MDS erasure code scheme to support fast recovery from up to two-disk failures in storage systems. 51-60 - Jianqiang Luo, Cheng Huang, Lihao Xu:
Decoding STAR code for tolerating simultaneous disk failure and silent errors. 61-70 - Ryan M. Lefever, Vikram S. Adve, William H. Sanders:
Diverse Partial Memory Replication. 71-80 - Istemi Ekin Akkus, Ashvin Goel:
Data recovery for web applications. 81-90 - Jingyu Zhou, Caijie Zhang, Hong Tang, Jiesheng Wu, Tao Yang:
Programming support and adaptive checkpointing for high-throughput data services with log-based recovery. 91-100 - Shantanu Gupta, Amin Ansari, Shuguang Feng, Scott A. Mahlke:
StageWeb: Interweaving pipeline stages into a wearout and variation tolerant CMP fabric. 101-110 - Xin Fu, Tao Li, José A. B. Fortes:
Architecting reliable multi-core network-on-chip for small scale processing technology. 111-120 - Pramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson:
Energy-efficient fault tolerance in chip multiprocessors using Critical Value Forwarding. 121-130 - Mahdi Fazeli, Seyed Ghassem Miremadi, Hossein Asadi, Seyed Nematollah Ahmadian:
A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems design. 131-140 - Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach:
Bit-slice logic interleaving for spatial multi-bit soft-error tolerance. 141-150 - Bardia Zandian, Waleed Dweik, Suk Hun Kang, Thomas Punihaole, Murali Annavaram:
WearMon: Reliability monitoring using adaptive critical path testing. 151-160 - Joseph Sloan, David Kesler, Rakesh Kumar, Ali Rahimi:
A numerical optimization-based methodology for application robustification: Transforming applications for error tolerance. 161-170 - Sergey Legtchenko, Sébastien Monnet, Gaël Thomas:
Blue Banana: resilience to avatar mobility in distributed MMOGs. 171-180 - Eric Anderson, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph A. Tucek, Mustafa Uysal, Jay J. Wylie:
Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive. 181-190 - Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken:
Using correlated surprise to infer shared influence. 191-200 - Roy A. Maxion, Kevin S. Killourhy:
Keystroke biometrics with number-pad input. 201-210 - Peng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy:
Using Bayesian networks for cyber security analysis. 211-220 - Pedro Fonseca, Cheng Li, Vishal Singhal, Rodrigo Rodrigues:
A study of the internal and external effects of concurrency bugs. 221-230 - Greg Bronevetsky, Ignacio Laguna, Saurabh Bagchi, Bronis R. de Supinski, Dong H. Ahn, Martin Schulz:
AutomaDeD: Automata-based debugging for dissimilar parallel tasks. 231-240 - Dazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang:
Detecting vulnerabilities in C programs using trace-based testing. 241-250 - Zhou Li, Kehuan Zhang, XiaoFeng Wang:
Mash-IF: Practical information-flow control within client-side mashups. 251-260 - Dazhi Zhang, Donggang Liu:
DataGuard: Dynamic data attestation in wireless sensor networks. 261-270 - Silviu Andrica, Horatiu Jula, George Candea:
iProve: A scalable technique for consumer-verifiable software guarantees. 271-280 - Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. 281-290 - Yuanyuan Zeng, Xin Hu, Kang G. Shin:
Detection of botnets using combined host- and network-level information. 291-300 - Soo Bum Lee, Virgil D. Gligor, Adrian Perrig:
Dependable connection setup for network capabilities. 301-310 - Xiang Song, Haibo Chen, Binyu Zang:
Why software hangs and what can be done with it. 311-316 - Elias P. Duarte Jr., Thiago Garrett, Luis C. E. Bona, Renato Carmo, Alexandre Prusch Züge:
Finding stable cliques of PlanetLab nodes. 317-322 - Yimin Song, Chao Yang, Guofei Gu:
Who is peeping at your passwords at Starbucks? - To catch an evil twin access point. 323-332 - Jingfei Kong, Huiyang Zhou:
Improving privacy and lifetime of PCM-based main memory. 333-342 - Olivier Rütti, Zarko Milosevic, André Schiper:
Generic construction of consensus algorithms for benign and Byzantine faults. 343-352 - Marco Serafini, Péter Bokor, Dan Dobre, Matthias Majuntke, Neeraj Suri:
Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas. 353-362 - James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter:
Zzyzx: Scalable fault tolerance through Byzantine locking. 363-372 - Nazreen Banu, Taisuke Izumi, Koichi Wada:
Doubly-expedited one-step Byzantine consensus. 373-382 - Ke Gao, Cherita L. Corbett, Raheem A. Beyah:
A passive approach to wireless device fingerprinting. 383-392 - Corrado Leita, Ulrich Bayer, Engin Kirda:
Exploiting diverse observation perspectives to get insights on the malware landscape. 393-402 - Mayra Sacanamboy, Bojan Cukic:
Combined performance and risk analysis for border management applications. 403-412 - Joaquin Gracia-Moran, Daniel Gil-Tomas, Luis J. Saiz-Adalid, Juan Carlos Baraza, Pedro J. Gil-Vicente:
Experimental validation of a fault tolerant microcomputer system against intermittent faults. 413-418 - Boudewijn R. Haverkort, Matthias Kuntz, Anne Remke, S. Roolvink, Mariëlle Stoelinga:
Evaluating repair strategies for a water-treatment facility using Arcade. 419-424 - Carl R. Elks, Michael Reynolds, Nishant J. George, Marko Miklo, Scott Bingham, Ronald D. Williams, Barry W. Johnson, Michael Waterman, Jeanne Dion:
Application of a fault injection based dependability assessment process to a commercial safety critical nuclear reactor protection system. 425-430 - Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Measurement-based analysis of fault and error sensitivities of dynamic memory. 431-436 - Roberto Natella, Domenico Cotroneo, João Durães, Henrique Madeira:
Representativeness analysis of injected software faults in complex software. 437-446 - Michael Grottke, Allen P. Nikora, Kishor S. Trivedi:
An empirical investigation of fault types in space mission system software. 447-456 - Marcello Cinque, Domenico Cotroneo, Roberto Natella, Antonio Pecchia:
Assessing and improving the effectiveness of logs for the analysis of software faults. 457-466 - Jayanand Asok Kumar, Shobha Vasudevan:
Statistical guarantees of performance for MIMO designs. 467-476 - Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach:
Transient fault models and AVF estimation revisited. 477-486 - Marc de Kruijf, Shuou Nomura, Karthikeyan Sankaralingam:
A unified model for timing speculation: Evaluating the impact of technology scaling, CMOS design style, and fault recovery mechanism. 487-496 - Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, Calton Pu:
Performance and availability aware regeneration for cloud based multitier applications. 497-506 - Javier Alonso, Jordi Torres, Josep Lluis Berral, Ricard Gavaldà:
Adaptive on-line software aging prediction based on machine learning. 507-516 - Manoj K. Agarwal, Venkateswara Reddy Madduri:
Correlating failures with asynchronous changes for root cause analysis in enterprise environments. 517-526 - Parisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone:
Ring Paxos: A high-throughput atomic broadcast protocol. 527-536 - Henrique Moniz, Nuno Ferreira Neves, Miguel Correia:
Turquois: Byzantine consensus in wireless ad hoc networks. 537-546 - Ann T. Tai, Kam S. Tso, William H. Sanders:
Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation. 547-556 - Daniel Skarin, Raul Barbosa, Johan Karlsson:
GOOFI-2: A tool for experimental dependability assessment. 557-562 - Eric Bisolfati, Paul Dan Marinescu, George Candea:
Studying application-library interaction and behavior with LibTrac. 563-568 - Patrick E. Lanigan, Priya Narasimhan, Thomas E. Fuhrman:
Experiences with a CANoe-based fault injection framework for AUTOSAR. 569-574 - Tudor Marian, Daniel A. Freedman, Ken Birman, Hakim Weatherspoon:
Empirical characterization of uncongested optical lambda networks and 10GbE commodity endpoints. 575-584 - Pirkko Kuusela, Ilkka Norros:
On/off process modeling of IP network failures. 585-594 - Samuel K. Klock, Peter Kemper:
An automated technique to support the verification and validation of simulation models. 595-604 - Elvio Gilberto Amparore, Susanna Donatelli:
Model checking CSLTA with Deterministic and Stochastic Petri Nets. 605-614 - John T. Daly, Nathan DeBardeleben:
1st workshop on fault-tolerance for HPC at extreme scale FTXS 2010. 615 - Miroslaw Malek, Felix Salfner, Kishor S. Trivedi:
Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM). 616-618 - Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis:
Fourth workshop on dependable and secure nanocomputing. 619-620 - Miguel Correia, Partha P. Pal:
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. 621-622
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.