


default search action
DSN 2008: Anchorage, Alaska, USA
- The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings. IEEE Computer Society 2008, ISBN 978-1-4244-2397-2

- Philip Koopman, Henrique Madeira

:
Message from the conference general chair and coordinator. - Neeraj Suri

:
Message from the DCCS program chair. - Kimberly Keeton

:
Message from the PDS program chair. - Alex Hills:

Dependability on the last frontier. - Thomas Seder:

Automotive Enhanced Vision Systems - Issues arising from placing users in the loop.
Hardware and Diagnosis
- Vimal K. Reddy, Eric Rotenberg

:
Coverage of a microarchitecture-level fault check regimen in a superscalar processor. 1-10 - Niranjan Soundararajan, Aditya Yanamandra, Chrysostomos Nicopoulos

, Narayanan Vijaykrishnan, Anand Sivasubramaniam, Mary Jane Irwin:
Analysis and solutions to issue queue process variation. 11-21 - Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou:

Trace-based microarchitecture-level diagnosis of permanent hardware faults. 22-31
Modeling 1
- Damian Nowroth, Ilia Polian, Bernd Becker

:
A study of cognitive resilience in a JPEG compressor. 32-41 - Jonathan A. Winter, David H. Albonesi:

Scheduling algorithms for unpredictably heterogeneous CMP architectures. 42-51 - Nicholas Jalbert, Westley Weimer:

Automated duplicate detection for bug tracking systems. 52-61
Hardware Reliability
- Hisashige Ando, Ryuji Kan, Yoshiharu Tosaka, Keiji Takahisa, Kichiji Hatanaka:

Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor. 62-69 - Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou:

Using likely program invariants to detect hardware errors. 70-79 - Albert Meixner, Daniel J. Sorin:

Detouring: Translating software to circumvent hard faults in simple cores. 80-89
Practical Experience Reports
- Afonso Araújo Neto, Marco Vieira

:
Towards assessing the security of DBMS configurations. 90-95 - Roxana Geambasu, Andrew Birrell, John MacCormick:

Experiences with formal specification of fault-tolerant file systems. 96-101 - Elisabeth A. Nguyen, William S. Greenwell, Myron Hecht:

Using an assurance case to support independent assessment of the transition to a new GPS ground control system. 102-107
Panel
- Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak:

Silent Data Corruption - Myth or reality? 108-109
Tools and Practical Experience Reports
- Tim Moors, Patrick Chu:

End-system tools for enhancing email reliability. 110-115 - Thirumalesh Bhat, Nachiappan Nagappan:

Tempest: Towards early identification of failure-prone binaries. 116-121 - Pradeep Ramachandran, Prabhakar Kudva, Jeffrey W. Kellington, John Schumann, Pia N. Sanda:

Statistical Fault Injection. 122-127
Soft-Errors
- Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja:

An accurate flip-flop selection technique for reducing logic SER. 128-136 - Xin Fu, Tao Li, José A. B. Fortes:

Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors. 137-146
Storage and Server Dependability
- Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie:

Reliability of flat XOR-based erasure codes on heterogeneous devices. 147-156 - Lorenzo Keller, Prasang Upadhyaya, George Candea:

ConfErr: A tool for assessing resilience to human configuration errors. 157-166 - Manish Marwah, Shivakant Mishra, Christof Fetzer:

Enhanced server fault-tolerance for improved user experience. 167-176
Intrusion Tolerance
- Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario:

Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. 177-186 - Anh Nguyen-Tuong, David Evans

, John C. Knight, Benjamin Cox, Jack W. Davidson:
Security through redundant data diversity. 187-196 - Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:

Byzantine replication under attack. 197-206
Dynamic Systems and Replication
- Nicolas Schiper, Sam Toueg:

A robust and lightweight stable leader election service for dynamic systems. 207-216 - Yawei Li, Zhiling Lan:

A fast restart mechanism for checkpoint/recovery protocols in networked environments. 217-226 - Tudor Marian, Mahesh Balakrishnan, Ken Birman

, Robbert van Renesse:
Tempest: Soft state replication in the service tier. 227-236
Security 2
- Zhuowei Li, XiaoFeng Wang, Zhenkai Liang

, Michael K. Reiter:
AGIS: Towards automatic generation of infection signatures. 237-246 - Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu:

Convicting exploitable software vulnerabilities: An efficient input provenance based approach. 247-256 - José Fonseca

, Marco Vieira
:
Mapping software faults with web security vulnerabilities. 257-266
Distributed Protocols
- Ricardo Fernández-Pascual

, José M. García, Manuel E. Acacio
, José Duato
:
A fault-tolerant directory-based cache coherence protocol for CMP architectures. 267-276 - Roy Friedman, Gabriel Kliot, Chen Avin

:
Probabilistic quorum systems in wireless ad hoc networks. 277-286 - Allen Clement, Harry C. Li, Jeff Napper, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin:

BAR primer. 287-296
Networks
- Sihyung Lee

, Tina Wong, Hyong S. Kim:
Improving dependability of network configuration through policy classification. 297-306 - Ataul Bari, Quazi Rahman, Arunita Jaekel, Subir Bandyopadhyay:

Traffic grooming in WDM mesh networks with guaranteed survivability. 307-315 - Yoshitomo Murata, Tsutomu Inaba, Hiroyuki Takizawa

, Hiroaki Kobayashi:
Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing. 316-325
Self-Managing Systems
- Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Guillaume Belrose, Tom Turicchi, Alfons Kemper:

An integrated approach to resource pool management: Policies, efficiency and quality metrics. 326-335 - Ningfang Mi, Giuliano Casale, Evgenia Smirni:

Scheduling for performance and availability in systems with temporal dependent workloads. 336-345 - Thomas Repantis, Vana Kalogeraki

:
Hot-spot prediction and alleviation in distributed stream processing applications. 346-355
Security 1
- Wei Yu

, Nan Zhang, Xinwen Fu
, Riccardo Bettati, Wei Zhao
:
On localization attacks to Internet Threat Monitors: An information-theoretic framework. 356-365 - Zahid Anwar, Ravinder Shankesi, Roy H. Campbell:

Automatic security assessment of critical cyber-infrastructures. 366-375 - Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee:

Evaluating email's feasibility for botnet command and control. 376-385
Practical Experience Reports and Demos
- Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders:

Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. 386-391 - Zibin Zheng

, Michael R. Lyu:
WS-DREAM: A distributed reliability assessment Mechanism for Web Services. 392-397 - Chinghway Lim, Navjot Singh, Shalini Yajnik:

A log mining approach to failure analysis of enterprise telephony systems. 398-403 - Paolo Romano

, Francesco Quaglia:
Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL. 404-409
Networks and Mobile Systems
- Kuan-Ta Chen, Jing-Kai Lou:

Toward an understanding of the processing delay of peer-to-peer relay nodes. 410-419 - Xiapu Luo

, Edmond W. W. Chan, Rocky K. C. Chang
:
TCP covert timing channels: Design and detection. 420-429 - Huaiyu Liu, Christian Maciocco, Vijay Kesavan, Andy Lock Yen Low:

A smart triggering scheme to reduce service interruption during heterogeneous handovers. 430-439
Panel
- Algirdas Avizienis:

On representing knowledge in the dependability domain: a panel discussion. 440-441
Evaluation and Measurement
- Sei Kato, Takayuki Osogami:

Evaluating availability under quasi-heavy-tailed repair times. 442-451 - Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni:

Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. 452-461 - Poul E. Heegaard

, Kishor S. Trivedi:
Survivability quantification of communication services. 462-471
Error Detection
- Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

SymPLFIED: Symbolic program-level fault injection and error detection framework. 472-481 - Jeffrey J. Cook, Craig B. Zilles:

A characterization of instruction-level error derating and its implications for error detection. 482-491
Storage Systems
- Ningfang Mi, Alma Riska, Evgenia Smirni, Erik Riedel:

Enhancing data availability in disk drives through background activities. 492-501 - Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift:

Analyzing the effects of disk-pointer corruption. 502-511
Modeling 2
- Hichem Boudali, Pepijn Crouzen, Boudewijn R. Haverkort

, Matthias Kuntz, Mariëlle Stoelinga
:
Architectural dependability evaluation with Arcade. 512-521 - Kivanc M. Ozonat:

An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. 522-531 - Ann T. Tai, Kam S. Tso, William H. Sanders:

A recurrence-relation-based reward model for performability evaluation of embedded systems. 532-541
Workshops
- Andrea Bondavalli

, István Majzik
, Aad P. A. van Moorsel:
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008). 542-543 - Karthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk:

Workshop on compiler and architectural techniques for application reliability and security (CATARS). 544-545 - Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaidis:

Second workshop on dependable and secure nanocomputing. 546-547 - Rogério de Lemos

, Jean-Charles Fabre, Cristina Gacek:
Workshop on Architecting Dependable Systems (WADS 2008). 548-549

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














