


default search action
DSN 2005: Yokohama, Japan
- 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings. IEEE Computer Society 2005, ISBN 0-7695-2282-3 
Introduction
- Welcome Message from the General Chair and Conference Coordinator. 
- Conference Organizers. 
- Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair. 
- DCCS Program Committee. 
- DCCS Reviewers. 
- W.C. Carter Award. 
- Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs. 
- PDS Steering and Program Committees. 
- PDS Reviewers. 
Keynote Address
- Mitsuyuki Hoshiba: 
 Observation of Local and Distant Earthquakes and Tsunami Warning System.
Session 1A: Fault Tolerant Architectures and Algorithms
- Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello: 
 Assured Reconfiguration of Fail-Stop Systems. 2-11
- David Bernick  , Bill Bruckert, Paul Del Vigna, David García, Robert Jardine, Jim Klecka, Jim Smullen: , Bill Bruckert, Paul Del Vigna, David García, Robert Jardine, Jim Klecka, Jim Smullen:
 NonStop® Advanced Architecture. 12-21
- Partha Dutta, Rachid Guerraoui  , Leslie Lamport: , Leslie Lamport:
 How Fast Can Eventual Synchrony Lead to Consensus?. 22-27
Session 1B: Dependability in VLSI
- Nicholas J. Wang, Sanjay J. Patel: 
 ReStore: Symptom Based Soft Error Detection in Microprocessors. 30-39
- Srivathsan Krishnamohan, Nihar R. Mahapatra: 
 Combining Error Masking and Error Detection Plus Recovery to Combat Soft Errors in Static CMOS Circuits. 40-49
- Paolo Bernardi  , Letícia Maria Veiras Bolzani, Maurizio Rebaudengo , Letícia Maria Veiras Bolzani, Maurizio Rebaudengo , Matteo Sonza Reorda , Matteo Sonza Reorda , Fabian Vargas, Massimo Violante: , Fabian Vargas, Massimo Violante:
 On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core. 50-58
Session 2A: Experimental Validation
- Robert W. Reeder, Roy A. Maxion: 
 User Interface Dependability through Goal-Error Prevention. 60-69
- Sampath Yerramalla, Bojan Cukic  , Martin Mladenovski, Edgar Fuller , Martin Mladenovski, Edgar Fuller : :
 Stability Monitoring and Analysis of Learning in an Adaptive System. 70-79
- Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Krits, Roman Vitenberg: 
 Effective Testing and Debugging Techniques for a Group Communication System. 80-85
- Andréas Johansson, Neeraj Suri  : :
 Error Propagation Profiling of Operating Systems. 86-95
Session 2B: System Security
- Paulo Sousa  , Nuno Ferreira Neves , Nuno Ferreira Neves , Paulo Veríssimo , Paulo Veríssimo : :
 How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? 98-107
- Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya: 
 Towards a Theory of Insider Threat Assessment. 108-117
- Zonghua Zhang  , Hong Shen: , Hong Shen:
 Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. 118-127
- Mohamed G. Gouda, Alex X. Liu: 
 A Model of Stateful Firewalls and Its Properties. 128-137
Session 3A: Multicast
- Chunqiang Tang, Rong N. Chang, Christopher Ward: 
 GoCast: Gossip-Enhanced Overlay Multicast for Fast and Dependable Group Communication. 140-149
- Jian Wu, Kang G. Shin: 
 SMRP: Fast Restoration of Multicast Sessions from Persistent Failures. 150-159
- Vadim Drabkin, Roy Friedman, Marc Segal: 
 Efficient Byzantine Broadcast in Wireless Ad-Hoc Networks. 160-169
Session 3B: Wide Area Networks
- Tina Wong, Van Jacobson, Cengiz Alaettinoglu: 
 Internet Routing Anomaly Detection and Visualization. 172-181
- Rebecca L. Collins, James S. Plank  : :
 Assessing the Performance of Erasure Codes in the Wide-Area. 182-187
- Yin Zhang, Zihui Ge: 
 Finding Critical Traffic Matrices. 188-197
Session 4A: Detection and Adaptation
- Paul Murray: 
 A Distributed State Monitoring Service for Adaptive Application Management. 200-205
- Xavier Défago  , Péter Urbán, Naohiro Hayashibara, Takuya Katayama: , Péter Urbán, Naohiro Hayashibara, Takuya Katayama:
 Definition and Specification of Accrual Failure Detectors. 206-215
- Kymie M. C. Tan, Roy A. Maxion: 
 The Effects of Algorithmic Diversity on Anomaly Detector Performance. 216-225
Session 4B: FT Communications
- Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam: 
 On Partial Protection in Groomed Optical WDM Mesh Networks. 228-237
- Audun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing, Olav Lysne: 
 Resilient Routing Layers for Recovery in Packet Networks. 238-247
- Steven Y. Ko, Indranil Gupta: 
 Perturbation-Resistant and Overlay-Independent Resource Discovery. 248-257
Session 5A: Operating Systems and Mechanisms
- G. John Janakiraman, Jose Renato Santos, Dinesh Subhraveti, Yoshio Turner: 
 Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating Systems. 260-269
- François Taïani  , Jean-Charles Fabre, Marc-Olivier Killijian: , Jean-Charles Fabre, Marc-Olivier Killijian:
 A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures. 270-279
- Archana Ganapathi, David A. Patterson: 
 Crash Data Collection: A Windows Case Study. 280-285
Session 5B: Networking
- Fanglu Guo, Tzi-cker Chiueh: 
 Scalable and Robust WLAN Connectivity Using Access Point Array. 288-297
- Brendan Hall, Kevin Driscoll, Michael Paulitsch, Samar Dajani-Brown: 
 Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. 298-307
- Manish Marwah, Shivakant Mishra, Christof Fetzer: 
 A System Demonstration of ST-TCP. 308-313
Session 6A: Codes
- Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy: 
 A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications. 316-325
- James S. Plank  , Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason: , Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason:
 Small Parity-Check Erasure Codes - Exploration and Observations. 326-335
- Marcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu: 
 Using Erasure Codes Efficiently for Storage in a Distributed System. 336-345
- Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman: 
 Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems. 346-355
Session 6B: Critical Infrastructures Protection
- Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting: 
 Authenticated System Calls. 358-367
- Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski: 
 Detecting Stealth Software with Strider GhostBuster. 368-377
- Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer: 
 Defeating Memory Corruption Attacks via Pointer Taintedness Detection. 378-387
- Lap-Chung Lam, Tzi-cker Chiueh: 
 Checking Array Bound Violation Using Segmentation Hardware. 388-397
Panel: Dependability Benchmarking of Computing Systems
- Cristian Constantinescu, Karama Kanoun, Henrique Madeira  , Brendan Murphy, Ira Pramanick, Aaron B. Brown: , Brendan Murphy, Ira Pramanick, Aaron B. Brown:
 Dependability Benchmarking of Computing Systems - Panel Statement. 400
Session 7A: Consensus
- Jean-Philippe Martin, Lorenzo Alvisi: 
 Fast Byzantine Consensus. 402-411
- Sérgio Gorender, Raimundo A. Macêdo  , Michel Raynal: , Michel Raynal:
 A Hybrid and Adaptive Model for Fault-Tolerant Distributed Computing. 412-421
- Lívia M. R. Sampaio, Francisco Vilar Brasileiro  : :
 Adaptive Indulgent Consensus. 422-431
Session 7B: Hardware and Codesign
- Moinuddin K. Qureshi, Onur Mutlu  , Yale N. Patt: , Yale N. Patt:
 Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors. 434-443
- P. Oscar Boykin, Vwani P. Roychowdhury: 
 Reversible Fault-Tolerant Logic. 444-453
- Sumant Kowshik, Girish Baliga, Scott R. Graham  , Lui Sha: , Lui Sha:
 Co-Design Based Approach to Improve Robustness in Networked Control Systems. 454-463
Session 8A: Dependability Modeling and Prediction
- Sabine M. Böhm: 
 H-RAFT - Heuristic Reachability Analysis for Fault Tolerance Protocols Modelled in SDL. 466-475
- Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Ramendra K. Sahoo, José E. Moreira, Manish Gupta: 
 Filtering Failure Logs for a BlueGene/L Prototype. 476-485
- Elizabeth Latronico, Philip Koopman: 
 Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms. 486-495
- Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers: 
 SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors. 496-505
Session 8B: Intrusion Detection and Tolerance
- Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford: 
 ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. 508-517
- Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer: 
 Neutralization of Errors and Attacks in Wireless Ad Hoc Networks. 518-527
- Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi: 
 Modeling and Automated Containment of Worms. 528-537
- Alper Tugay Mizrak, Yuchung Cheng, Keith Marzullo, Stefan Savage: 
 Fatih: Detecting and Isolating Malicious Routers. 538-547
Session 1C: Software Reliability, Rejuvenation and Optimization
- Peter Kemper, Dennis Müller, Axel Thümmler: 
 Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems. 550-559
- Michael Grottke  , Kishor S. Trivedi: , Kishor S. Trivedi:
 On a Method for Mending Time to Failure Distributions. 560-569
- Ann T. Tai, Kam S. Tso, William H. Sanders, Savio N. Chau: 
 A Performability-Oriented Software Rejuvenation Framework for Distributed Applications. 570-579
Session 2C: Security Evaluation
- Xiapu Luo  , Rocky K. C. Chang: , Rocky K. C. Chang:
 Optimizing the Pulsing Denial-of-Service Attacks. 582-591
- Marco Vieira  , Henrique Madeira , Henrique Madeira : :
 Towards a Security Benchmark for Database Management Systems. 592-601
- Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier: 
 An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. 602-611
- Issa M. Khalil  , Saurabh Bagchi, Ness B. Shroff: , Saurabh Bagchi, Ness B. Shroff:
 LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. 612-621
Session 3C: Evaluation of QoS and Self-Healing Systems
- Lorenzo Falai, Andrea Bondavalli  : :
 Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network. 624-633
- Adam J. Oliner, Larry Rudolph, Ramendra K. Sahoo, José E. Moreira, Manish Gupta: 
 Probabilistic QoS Guarantees for Supercomputing Systems. 634-643
- Steve Zhang, Ira Cohen, Moisés Goldszmidt, Julie Symons, Armando Fox: 
 Ensembles of Models for Automated Diagnosis of System Performance Problems. 644-653
Session 4C: Experimental Evaluation of Fault-Tolerance
- Joakim Aidemark, Peter Folkesson, Johan Karlsson: 
 A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems. 656-665
- Jonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson: 
 Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles. 666-671
- Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu: 
 TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. 672-681
Session 5C: Performance Evaluation of Networks and Protocols
- Sherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon: 
 Improving TCP Performance for Multihop Wireless Networks. 684-693
- Marco Gribaudo  , Carla-Fabiana Chiasserini , Carla-Fabiana Chiasserini , Rossano Gaeta , Rossano Gaeta , Michele Garetto , Michele Garetto , Daniele Manini , Daniele Manini , Matteo Sereno: , Matteo Sereno:
 A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks. 694-703
- Henrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen  : :
 Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks. 704-709
Session 6C: Markovian Models for Performance and Dependability
- Axel Thümmler, Peter Buchholz  , Miklós Telek: , Miklós Telek:
 A Novel Approach for Fitting Probability Distributions to Real Trace Data with the EM Algorithm. 712-721
- Lucia Cloth, Joost-Pieter Katoen  , Maneesh Khattri, Reza Pulungan , Maneesh Khattri, Reza Pulungan : :
 Model Checking Markov Reward Models with Impulse Rewards. 722-731
- Yi Zhang, David Parker, Marta Z. Kwiatkowska: 
 A Wavefront Parallelisation of CTMC Solution Using MTBDDs. 732-741
- Salem Derisavi, Peter Kemper, William H. Sanders: 
 Lumping Matrix Diagram Representations of Markov Models. 742-751
Session 7C: Experimental Microprocessor Evaluation
- Cristian Constantinescu: 
 Neutron SER Characterization of Microprocessors. 754-759
- Giacinto Paolo Saggese  , Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar K. Iyer: , Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
 Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic. 760-769
- Gokhan Memik, Masud H. Chowdhury, Arindam Mallik, Yehea I. Ismail: 
 Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files. 770-779
Session 8C: Replication and Checkpointing Protocol Evaluation
- Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki: 
 Analysis of Probabilistic Trapezoid Protocol for Data Replication. 782-791
- António Luís Sousa  , José Pereira , José Pereira , Luís Soares, Alfrânio Correia Jr., L. Rocha, Rui Oliveira , Luís Soares, Alfrânio Correia Jr., L. Rocha, Rui Oliveira , Francisco Moura , Francisco Moura : :
 Testing the Dependability and Performance of Group Communication Based Database Replication Protocols. 792-801
- Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau: 
 Model-Based Failure Analysis of Journaling File Systems. 802-811
- Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood: 
 Modeling Coordinated Checkpointing for Large-Scale Supercomputers. 812-821
Workshop Abstracts
- Takuya Katayama, Yutaka Ishikawa, Yoshiki Kinoshita: 
 Workshop on Dependable Software - Tools and Methods - Workshop Abstract. 824
- George Candea, David Oppenheimer: 
 Workshop on Hot Topics in System Depend - Workshop Abstract. 826-827
- Saïda Benlarbi: 
 Workshop on Assurance of Networking Systems Dependability Service Level Agreements - Workshop Abstract. 830

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














