default search action
DSN 2008: Anchorage, Alaska, USA
- The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings. IEEE Computer Society 2008, ISBN 978-1-4244-2397-2
- Philip Koopman, Henrique Madeira:
Message from the conference general chair and coordinator. - Neeraj Suri:
Message from the DCCS program chair. - Kimberly Keeton:
Message from the PDS program chair. - Alex Hills:
Dependability on the last frontier. - Thomas Seder:
Automotive Enhanced Vision Systems - Issues arising from placing users in the loop.
Hardware and Diagnosis
- Vimal K. Reddy, Eric Rotenberg:
Coverage of a microarchitecture-level fault check regimen in a superscalar processor. 1-10 - Niranjan Soundararajan, Aditya Yanamandra, Chrysostomos Nicopoulos, Narayanan Vijaykrishnan, Anand Sivasubramaniam, Mary Jane Irwin:
Analysis and solutions to issue queue process variation. 11-21 - Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou:
Trace-based microarchitecture-level diagnosis of permanent hardware faults. 22-31
Modeling 1
- Damian Nowroth, Ilia Polian, Bernd Becker:
A study of cognitive resilience in a JPEG compressor. 32-41 - Jonathan A. Winter, David H. Albonesi:
Scheduling algorithms for unpredictably heterogeneous CMP architectures. 42-51 - Nicholas Jalbert, Westley Weimer:
Automated duplicate detection for bug tracking systems. 52-61
Hardware Reliability
- Hisashige Ando, Ryuji Kan, Yoshiharu Tosaka, Keiji Takahisa, Kichiji Hatanaka:
Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor. 62-69 - Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou:
Using likely program invariants to detect hardware errors. 70-79 - Albert Meixner, Daniel J. Sorin:
Detouring: Translating software to circumvent hard faults in simple cores. 80-89
Practical Experience Reports
- Afonso Araújo Neto, Marco Vieira:
Towards assessing the security of DBMS configurations. 90-95 - Roxana Geambasu, Andrew Birrell, John MacCormick:
Experiences with formal specification of fault-tolerant file systems. 96-101 - Elisabeth A. Nguyen, William S. Greenwell, Myron Hecht:
Using an assurance case to support independent assessment of the transition to a new GPS ground control system. 102-107
Panel
- Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak:
Silent Data Corruption - Myth or reality? 108-109
Tools and Practical Experience Reports
- Tim Moors, Patrick Chu:
End-system tools for enhancing email reliability. 110-115 - Thirumalesh Bhat, Nachiappan Nagappan:
Tempest: Towards early identification of failure-prone binaries. 116-121 - Pradeep Ramachandran, Prabhakar Kudva, Jeffrey W. Kellington, John Schumann, Pia N. Sanda:
Statistical Fault Injection. 122-127
Soft-Errors
- Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja:
An accurate flip-flop selection technique for reducing logic SER. 128-136 - Xin Fu, Tao Li, José A. B. Fortes:
Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors. 137-146
Storage and Server Dependability
- Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie:
Reliability of flat XOR-based erasure codes on heterogeneous devices. 147-156 - Lorenzo Keller, Prasang Upadhyaya, George Candea:
ConfErr: A tool for assessing resilience to human configuration errors. 157-166 - Manish Marwah, Shivakant Mishra, Christof Fetzer:
Enhanced server fault-tolerance for improved user experience. 167-176
Intrusion Tolerance
- Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario:
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. 177-186 - Anh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson:
Security through redundant data diversity. 187-196 - Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:
Byzantine replication under attack. 197-206
Dynamic Systems and Replication
- Nicolas Schiper, Sam Toueg:
A robust and lightweight stable leader election service for dynamic systems. 207-216 - Yawei Li, Zhiling Lan:
A fast restart mechanism for checkpoint/recovery protocols in networked environments. 217-226 - Tudor Marian, Mahesh Balakrishnan, Ken Birman, Robbert van Renesse:
Tempest: Soft state replication in the service tier. 227-236
Security 2
- Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures. 237-246 - Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:
Convicting exploitable software vulnerabilities: An efficient input provenance based approach. 247-256 - José Fonseca, Marco Vieira:
Mapping software faults with web security vulnerabilities. 257-266
Distributed Protocols
- Ricardo Fernández Pascual, José M. García, Manuel E. Acacio, José Duato:
A fault-tolerant directory-based cache coherence protocol for CMP architectures. 267-276 - Roy Friedman, Gabriel Kliot, Chen Avin:
Probabilistic quorum systems in wireless ad hoc networks. 277-286 - Allen Clement, Harry C. Li, Jeff Napper, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin:
BAR primer. 287-296
Networks
- Sihyung Lee, Tina Wong, Hyong S. Kim:
Improving dependability of network configuration through policy classification. 297-306 - Ataul Bari, Quazi Rahman, Arunita Jaekel, Subir Bandyopadhyay:
Traffic grooming in WDM mesh networks with guaranteed survivability. 307-315 - Yoshitomo Murata, Tsutomu Inaba, Hiroyuki Takizawa, Hiroaki Kobayashi:
Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing. 316-325
Self-Managing Systems
- Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Guillaume Belrose, Tom Turicchi, Alfons Kemper:
An integrated approach to resource pool management: Policies, efficiency and quality metrics. 326-335 - Ningfang Mi, Giuliano Casale, Evgenia Smirni:
Scheduling for performance and availability in systems with temporal dependent workloads. 336-345 - Thomas Repantis, Vana Kalogeraki:
Hot-spot prediction and alleviation in distributed stream processing applications. 346-355
Security 1
- Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao:
On localization attacks to Internet Threat Monitors: An information-theoretic framework. 356-365 - Zahid Anwar, Ravinder Shankesi, Roy H. Campbell:
Automatic security assessment of critical cyber-infrastructures. 366-375 - Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee:
Evaluating email's feasibility for botnet command and control. 376-385
Practical Experience Reports and Demos
- Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders:
Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. 386-391 - Zibin Zheng, Michael R. Lyu:
WS-DREAM: A distributed reliability assessment Mechanism for Web Services. 392-397 - Chinghway Lim, Navjot Singh, Shalini Yajnik:
A log mining approach to failure analysis of enterprise telephony systems. 398-403 - Paolo Romano, Francesco Quaglia:
Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL. 404-409
Networks and Mobile Systems
- Kuan-Ta Chen, Jing-Kai Lou:
Toward an understanding of the processing delay of peer-to-peer relay nodes. 410-419 - Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
TCP covert timing channels: Design and detection. 420-429 - Huaiyu Liu, Christian Maciocco, Vijay Kesavan, Andy Lock Yen Low:
A smart triggering scheme to reduce service interruption during heterogeneous handovers. 430-439
Panel
- Algirdas Avizienis:
On representing knowledge in the dependability domain: a panel discussion. 440-441
Evaluation and Measurement
- Sei Kato, Takayuki Osogami:
Evaluating availability under quasi-heavy-tailed repair times. 442-451 - Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni:
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. 452-461 - Poul E. Heegaard, Kishor S. Trivedi:
Survivability quantification of communication services. 462-471
Error Detection
- Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
SymPLFIED: Symbolic program-level fault injection and error detection framework. 472-481 - Jeffrey J. Cook, Craig B. Zilles:
A characterization of instruction-level error derating and its implications for error detection. 482-491
Storage Systems
- Ningfang Mi, Alma Riska, Evgenia Smirni, Erik Riedel:
Enhancing data availability in disk drives through background activities. 492-501 - Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift:
Analyzing the effects of disk-pointer corruption. 502-511
Modeling 2
- Hichem Boudali, Pepijn Crouzen, Boudewijn R. Haverkort, Matthias Kuntz, Mariëlle Stoelinga:
Architectural dependability evaluation with Arcade. 512-521 - Kivanc M. Ozonat:
An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. 522-531 - Ann T. Tai, Kam S. Tso, William H. Sanders:
A recurrence-relation-based reward model for performability evaluation of embedded systems. 532-541
Workshops
- Andrea Bondavalli, István Majzik, Aad P. A. van Moorsel:
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008). 542-543 - Karthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk:
Workshop on compiler and architectural techniques for application reliability and security (CATARS). 544-545 - Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaidis:
Second workshop on dependable and secure nanocomputing. 546-547 - Rogério de Lemos, Jean-Charles Fabre, Cristina Gacek:
Workshop on Architecting Dependable Systems (WADS 2008). 548-549
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.