


default search action
DSN 2006: Philadelphia, Pennsylvania, USA
- 2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings. IEEE Computer Society 2006, ISBN 0-7695-2607-1

Introduction
- Welcome Message from the General Chair.

- Welcome Message from the Conference Coordinator.

- Conference Organizers.

- Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair.

- DCCS Program Committee.

- List of Reviewers for DCCS.

- William C. Carter Award.

- Message from the Performance and Dependability Symposium (PDS) Program Chair.

- PDS Program Committee.

- List of Reviewers for PDS.

Keynote Address
- Ambuj Goyal:

Delivering Dependability: A Moving Target.
Dependable Computing and Communications Symposium (DCCS)
Session 1A: Real-Time and Embedded Systems
- Justin Ray, Philip Koopman:

Efficient High Hamming Distance CRCs for Embedded Networks. 3-12 - Guangyu Chen, Mahmut T. Kandemir, Ibrahim Kolcu:

Memory-Conscious Reliable Execution on Embedded Chip Multiprocessors. 13-22 - Sumant Kowshik, Grigore Rosu, Lui Sha:

Static Analysis to Enforce Safe Value Flow in Embedded Control Systems. 23-34
Session 2A: Safety-Critical Systems
- Wilfried Steiner, Hermann Kopetz:

The Startup Problem in Fault-Tolerant Time-Triggered Communication. 35-44 - Thomas Kottke, Andreas Steininger

:
A Reconfigurable Generic Dual-Core Architecture. 45-54 - Gregory C. Sharp

, Nagarajan Kandasamy:
A Dependable System Architecture for Safety-Critical Respiratory-Gated Radiation Therapy. 55-60 - Robert W. Reeder, Roy A. Maxion:

User Interface Defect Detection by Hesitation Analysis. 61-72
Session 3A: Architecture and Operating Systems
- Albert Meixner, Daniel J. Sorin:

Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures. 73-82 - Jonathan Chang, George A. Reis, David I. August:

Automatic Instruction-Level Software-Only Recovery. 83-92 - Dongkook Park, Chrysostomos Nicopoulos

, Jongman Kim, Narayanan Vijaykrishnan, Chita R. Das:
Exploring Fault-Tolerant Network-on-Chip Architectures. 93-104
Session 4A: Byzantine Faults
- Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David John Zage:

Scaling Byzantine Fault-Tolerant Replication toWide Area Networks. 105-114 - Christian Cachin, Stefano Tessaro:

Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. 115-124 - Rachid Guerraoui

, Ron R. Levy, Marko Vukolic:
Lucky Read/Write Access to Robust Atomic Storage. 125-136
Session 5A: Consensus and Leader Election
- Dan Dobre, Neeraj Suri

:
One-step Consensus with Zero-Degradation. 137-146 - Marcos Kawazoe Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, Sam Toueg:

Consensus with Byzantine Failures and Little System Synchrony. 147-155 - Richard Ekwall, André Schiper:

Solving Atomic Broadcast with Indirect Consensus. 156-165 - Antonio Fernández, Ernesto Jiménez

, Michel Raynal:
Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony. 166-178
Session 5B: Intrusion Detection and Tolerance
- Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian:

Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. 179-188 - Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang:

A Multi-Resolution Approach for Worm Detection and Containment. 189-198 - Cliff Changchun Zou, Ryan Cunningham:

Honeypot-Aware Advanced Botnet Construction and Maintenance. 199-208 - Michael Ihde, William H. Sanders:

Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance. 209-216
Session 6A: Storage Systems
- James Lee Hafner:

HoVer Erasure Codes For Disk Arrays. 217-226 - John A. Chandy

:
Storage Allocation in Unreliable Peer-to-Peer Systems. 227-236 - K. K. Rao, James Lee Hafner, Richard A. Golding:

Reliability for Networked Storage Nodes. 237-248
Session 7A: Complex and Large-Scale Systems
- Bianca Schroeder, Garth A. Gibson

:
A large-scale study of failures in high-performance computing systems. 249-258 - Zhen Guo, Guofei Jiang, Haifeng Chen, Kenji Yoshihira:

Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems. 259-268 - Dinakar Dhurjati, Vikram S. Adve:

Efficiently Detecting All Dangling Pointer Uses in Production Servers. 269-280
Session 7C: VLSI
- Jie S. Hu, Shuai Wang, Sotirios G. Ziavras

:
In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability. 281-290 - David de Andrés, Juan-Carlos Ruiz-Garcia

, Daniel Gil, Pedro J. Gil:
Run-Time Reconfiguration for Emulating Transient Faults in VLSI Systems. 291-300 - Smruti R. Sarangi, Brian Greskamp, Josep Torrellas:

CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging. 301-312
Session 8A: Networking
- Marcello Cinque

, Domenico Cotroneo, Stefano Russo
:
Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks. 313-322 - Amit Sahoo, Krishna Kant, Prasant Mohapatra:

Improving BGP Convergence Delay for Large-Scale Failures. 323-332 - Sihyung Lee

, Tina Wong, Hyong S. Kim:
Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System. 333-342 - Joseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury:

A General Framework for Scalability and Performance Analysis of DHT Routing Systems. 343-354
Performance and Dependability Symposium (PDS)
Session 1B: Dependable Storage
- Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:

Dependability Analysis of Virtual Memory Systems. 355-364 - Dong Tang, Peter Carruthers, Zuheir Totari, Michael W. Shapiro:

Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults. 365-370 - Shravan Gaonkar, Kimberly Keeton

, Arif Merchant
, William H. Sanders:
Designing dependable storage solutions for shared application environments. 371-382
Session 2B: Attack Prevention and Mitigation
- Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan:

A Statistical Analysis of Attack Data to Separate Attacks. 383-392 - Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia:

VoIP Intrusion Detection Through Interacting Protocol State Machines. 393-402 - Chun-Ying Huang

, Kuan-Ta Chen, Chin-Laung Lei:
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. 403-412 - Lap-Chung Lam, Wei Li, Tzi-cker Chiueh:

Accurate and Automated System Call Policy-Based Intrusion Prevention. 413-424
Session 3B: Dependability Models
- Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Morris Jette, Ramendra K. Sahoo:

BlueGene/L Failure Analysis and Prediction Models. 425-434 - Alberto Avritzer, Andre B. Bondi, Michael Grottke

, Kishor S. Trivedi, Elaine J. Weyuker:
Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms. 435-444 - Kaustubh R. Joshi, William H. Sanders, Matti A. Hiltunen, Richard D. Schlichting:

Automatic Recovery Using Bounded Partially Observable Markov Decision Processes. 445-456
Session 4B: Attack Analysis
- Nuno Ferreira Neves

, João Antunes, Miguel Correia
, Paulo Veríssimo
, Rui Ferreira Neves
:
Using Attack Injection to Discover New Vulnerabilities. 457-466 - Robert Meyer, Michel Cukier:

Assessing the Attack Threat due to IRC Channels. 467-472 - Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, Ravi K. Iyer:

An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks. 473-484
Session 6B: Measuring and Modeling
- Vinh Vi Lam, William H. Sanders, Peter Buchholz

:
A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCs. 485-494 - Qi Zhang, Ningfang Mi, Evgenia Smirni, Alma Riska, Erik Riedel:

Evaluating the Performability of Systems with Background Jobs. 495-504 - Katerina Goseva-Popstojanova

, Fengbin Li, Xuan Wang, Amit Sangle:
A Contribution Towards Solving the Web Workload Puzzle. 505-516
Session 7B: Multiple-Server Systems
- Jennie Palmer, Isi Mitrani:

Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers. 517-525 - Ludmila Cherkasova, Jerome A. Rolia:

R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource Pools. 526-535 - Jinliang Fan, Tianying Chang, Dimitrios E. Pendarakis, Zhen Liu:

Cost-Effective Configuration of Content Resiliency Services Under Correlated Failures. 536-548
Session 8B: Distributed Algorithms
- Rachid Guerraoui

, Ron R. Levy, Bastian Pochon, Vivien Quéma:
High Throughput Total Order Broadcast for Cluster Environments. 549-557 - Guang Tan, Stephen A. Jarvis

, Daniel P. Spooner:
Improving the Fault Resilience of Overlay Multicast for Media Streaming. 558-567 - Henrique Moniz

, Nuno Ferreira Neves
, Miguel Correia
, Paulo Veríssimo
:
Randomized Intrusion-Tolerant Asynchronous Services. 568-577 - Qurat-ul-Ain Inayat, Paul Devadoss Ezhilchelvan

:
A Performance Study on the Signal-On-Fail Approach to Imposing Total Order in the Streets of Byzantium. 578-590
Special Tracks
- Adnan Agbaria, Claudio Basile, Zbigniew Kalbarczyk:

Workshop on Applied Software Reliability (WASR). 591 - Rogério de Lemos

, Cristina Gacek, Alexander B. Romanovsky
:
Workshop on Architecting Dependable Systems (WADS). 592 - Michel Cukier, Ioana Rus:

Workshop on Empirical Evaluation of Dependability and Security (WEEDS). 593 - Christof Fetzer:

Student Forum. 594 - Saurabh Bagchi:

Fast Abstracts. 595

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














