default search action
DSN 2012: Boston, MA, USA
- Robert S. Swarz, Philip Koopman, Michel Cukier:
IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 25-28, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1624-8 - Thorsten Piper, Stefan Winter, Paul Manns, Neeraj Suri:
Instrumenting AUTOSAR for dependability assessment: A guidance framework. 1-12 - Markus Becker, Christoph Kuznik, Mabel M. Joy, Tao Xie, Wolfgang Müller:
Binary mutation testing through dynamic translation. 1-12 - Hajime Fujita, Yutaka Matsuno, Toshihiro Hanawa, Mitsuhisa Sato, Shinpei Kato, Yutaka Ishikawa:
DS-Bench Toolset: Tools for dependability benchmarking with simulation and assurance. 1-8 - Parisa Jalili Marandi, Marco Primi, Fernando Pedone:
Multi-Ring Paxos. 1-12 - Srikar Tati, Bong Jun Ko, Guohong Cao, Ananthram Swami, Thomas La Porta:
Adaptive algorithms for diagnosing large-scale failures in computer networks. 1-12 - Jesus Friginal, Juan-Carlos Ruiz-Garcia, David de Andrés, Antonio Bustos:
Mitigating the impact of ambient noise on Wireless Mesh Networks using adaptive link-quality-based packet replication. 1-8 - George Amvrosiadis, Alina Oprea, Bianca Schroeder:
Practical scrubbing: Getting to the bad sector at the right time. 1-12 - Cristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic, Ido Zachevsky:
Robust data sharing with key-value stores. 1-12 - Eric Rozier, William H. Sanders:
A framework for efficient evaluation of the fault tolerance of deduplicated storage systems. 1-12 - Cristian Constantinescu, Mike Butler, Chris Weller:
Error injection-based study of soft error propagation in AMD Bulldozer microprocessor module. 1-6 - Xin Xu, Man-Lap Li:
Understanding soft error propagation using Efficient vulnerability-driven fault injection. 1-12 - Kuan-Yu Tseng, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Characterization of the error resiliency of power grid substation devices. 1-8 - Daniel Y. Deng, G. Edward Suh:
High-performance parallel accelerator for flexible and efficient run-time monitoring. 1-12 - Greg Bronevetsky, Ignacio Laguna, Bronis R. de Supinski, Saurabh Bagchi:
Automatic fault characterization via abnormality-enhanced classification. 1-12 - Soila Kavulya, Scott Daniels, Kaustubh R. Joshi, Matti A. Hiltunen, Rajeev Gandhi, Priya Narasimhan:
Draco: Statistical diagnosis of chronic problems in large distributed systems. 1-12 - Danilo Ansaloni, Lydia Y. Chen, Evgenia Smirni, Walter Binder:
Model-driven consolidation of Java workloads on multicores. 1-12 - Peter Buchholz:
Finite horizon analysis of infinite CTMDPs. 1-12 - Miguel A. Erazo, Ting Li, Jason Liu, Stephan J. Eidenbenz:
Toward comprehensive and accurate simulation performance prediction of parallel file systems. 1-12 - Daniele Sciascia, Fernando Pedone, Flavio Junqueira:
Scalable deferred update replication. 1-12 - Moshe Gabel, Assaf Schuster, Ran Gilad-Bachrach, Nikolaj S. Bjørner:
Latent fault detection in large scale services. 1-12 - Tomás Hrubý, Dirk Vogt, Herbert Bos, Andrew S. Tanenbaum:
Keep net working - on a dependable and fast networking stack. 1-12 - Yunfeng Zhu, Patrick P. C. Lee, Liping Xiang, Yinlong Xu, Lingling Gao:
A cost-based heterogeneous recovery scheme for distributed storage systems with RAID-6 codes. 1-12 - Marco Beccuti, Andrea Bobbio, Giuliana Franceschinis, Roberta Terruggia:
A new symbolic approach for network reliability analysis. 1-12 - Timothy K. Tsai, Nawanol Theera-Ampornpunt, Saurabh Bagchi:
A study of soft error consequences in hard disk drives. 1-8 - James S. Plank, Catherine D. Schuman, B. Devin Robison:
Heuristics for optimizing matrix-based erasure codes for fault-tolerant storage systems. 1-12 - Joseph Sloan, Rakesh Kumar, Greg Bronevetsky:
Algorithmic approaches to low overhead fault detection for sparse linear algebra. 1-12 - Ewen Denney, Ganesh Pai, Ibrahim Habli:
Perspectives on software safety case development for unmanned aircraft. 1-8 - Arpan Roy, Dong Seong Kim, Kishor S. Trivedi:
Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure trees. 1-12 - Saman A. Zonouz, Amir Houmansadr, Parisa Haghani:
EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behavior. 1-12 - Massimiliano Albanese, Sushil Jajodia, Steven Noel:
Time-efficient and cost-effective network hardening using attack graphs. 1-12 - Collin Mulliner, Steffen Liebergeld, Matthias Lange, Jean-Pierre Seifert:
Taming Mr Hayes: Mitigating signaling based attacks on smartphones. 1-12 - Qiang Zheng, Jing Zhao, Guohong Cao:
A cross-layer approach for IP network protection. 1-12 - Vamsi Kambhampati, Christos Papadopoulos, Daniel Massey:
Epiphany: A location hiding architecture for protecting critical services from DDoS attacks. 1-12 - Catello Di Martino, Marcello Cinque, Domenico Cotroneo:
Assessing time coalescence techniques for the analysis of supercomputer logs. 1-12 - Robert Cain, Aad P. A. van Moorsel:
Optimization of data collection strategies for model-based evaluation and decision-making. 1-10 - Li Yu, Ziming Zheng, Zhiling Lan, Terry R. Jones, Jim M. Brandt, Ann C. Gentile:
Filtering log data: Finding the needles in the Haystack. 1-12 - Rami G. Melhem, Rakan Maddah, Sangyeun Cho:
RDIS: A recursively defined invertible set scheme to tolerate multiple stuck-at faults in resistive memory. 1-12 - Jie Chen, Guru Venkataramani, H. Howie Huang:
RePRAM: Re-cycling PRAM faulty blocks for extended lifetime. 1-12 - Ulya R. Karpuzcu, Krishna B. Kolluru, Nam Sung Kim, Josep Torrellas:
VARIUS-NTV: A microarchitectural model to capture the increased sensitivity of manycores to process variations at near-threshold voltages. 1-11 - David J. Palframan, Nam Sung Kim, Mikko H. Lipasti:
Mitigating random variation with spare RIBs: Redundant intermediate bitslices. 1-11 - Nuno Machado, Paolo Romano, Luís E. T. Rodrigues:
Lightweight cooperative logging for fault replication in concurrent programs. 1-12 - Mirko Montanari, Roy H. Campbell:
Confidentiality of event data in policy-based monitoring. 1-12 - Chao Shen, Zhongmin Cai, Xiaohong Guan:
Continuous authentication for mouse dynamics: A pattern-growth approach. 1-12 - Palden Lama, Xiaobo Zhou:
NINEPIN: Non-invasive and energy efficient performance isolation in virtualized servers. 1-12 - Fabian Oboril, Mehdi Baradaran Tahoori:
ExtraTime: Modeling and analysis of wearout due to transistor aging at microarchitecture-level. 1-12 - Yubin Xia, Yutao Liu, Haibo Chen, Binyu Zang:
CFIMon: Detecting violation of control flow integrity using performance counters. 1-12 - Jiesheng Wei, Karthik Pattabiraman:
BLOCKWATCH: Leveraging similarity in parallel programs for error detection. 1-12 - Siva Kumar Sastry Hari, Sarita V. Adve, Helia Naeimi:
Low-cost program-level detectors for reducing silent data corruptions. 1-12 - Jing Zhang, Robin Berthier, Will Rhee, Michael D. Bailey, Partha P. Pal, Farnam Jahanian, William H. Sanders:
Safeguarding academic accounts and resources with the University Credential Abuse Auditing System. 1-8 - Jiang Wang, Kun Sun, Angelos Stavrou:
A dependability analysis of hardware-assisted polling integrity checking systems. 1-12 - Amiya Kumar Maji, Fahad A. Arshad, Saurabh Bagchi, Jan S. Rellermeyer:
An empirical study of the robustness of Inter-component Communication in Android. 1-12
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.