Abstract is missing.
- Recent Discoveries from PaxosLeslie Lamport. 3
- Performance and Dependability of Structured Peer-to-Peer OverlaysMiguel Castro, Manuel Costa, Antony I. T. Rowstron. 9-18 [doi]
- Robust Aggregation Protocols for Large-Scale Overlay NetworksAlberto Montresor, Márk Jelasity, Özalp Babaoglu. 19-28 [doi]
- Impact of Path Diversity on Multi-homed and Overlay NetworksJunghee Han, Farnam Jahanian. 29 [doi]
- Fault Detection and Isolation Techniques for Quasi Delay-Insensitive CircuitsChristopher LaFrieda, Rajit Manohar. 41-50 [doi]
- Tolerating Hard Faults in Microprocessor Array StructuresFred A. Bower, Paul G. Shealy, Sule Ozev, Daniel J. Sorin. 51-60 [doi]
- Characterizing the Effects of Transient Faults on a High-Performance Processor PipelineNicholas J. Wang, Justin Quek, Todd M. Rafacz, Sanjay J. Patel. 61 [doi]
- Dynamic Quarantine of Internet WormsCynthia Wong, Chenxi Wang, Dawn Xiaodong Song, Stan Bielski, Gregory R. Ganger. 73-82 [doi]
- HOURS: Achieving DoS Resilience in an Open Service HierarchyHao Yang, Haiyun Luo, Yi Yang, Songwu Lu, Lixia Zhang. 83-92 [doi]
- Robust Protection against Fault-Injection Attacks on Smart Cards Implementing the Advanced Encryption StandardMark G. Karpovsky, Konrad J. Kulikowski, Alexander Taubin. 93-101 [doi]
- A Defense-Centric Taxonomy Based on Attack ManifestationsKevin S. Killourhy, Roy A. Maxion, Kymie M. C. Tan. 102 [doi]
- A Practical Analysis of Low-Density Parity-Check Erasure Codes for Wide-Area Storage ApplicationsJames S. Plank, Michael G. Thomason. 115-124 [doi]
- A Decentralized Algorithm for Erasure-Coded Virtual DisksSvend Frølund, Arif Merchant, Yasushi Saito, Susan Spence, Alistair C. Veitch. 125-134 [doi]
- Efficient Byzantine-Tolerant Erasure-Coded StorageGarth R. Goodson, Jay J. Wylie, Gregory R. Ganger, Michael K. Reiter. 135-144 [doi]
- Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded NetworksPhilip Koopman, Tridib Chakravarty. 145 [doi]
- Fault Tolerant Computation on Ensemble Quantum ComputersP. Oscar Boykin, Vwani P. Roychowdhury, Tal Mor, Farrokh Vatan. 157-166 [doi]
- The Recursive NanoBox Processor Grid: A Reliable System Architecture for Unreliable Nanotechnology DevicesA. J. KleinOsowski, Kevin KleinOsowski, Vijay Rangarajan, Priyadarshini Ranganath, David J. Lilja. 167-176 [doi]
- The Impact of Technology Scaling on Lifetime ReliabilityJayanth Srinivasan, Sarita V. Adve, Pradip Bose, Jude A. Rivers. 177 [doi]
- Model Checking a Fault-Tolerant Startup Algorithm: From Design Exploration To Exhaustive Fault SimulationWilfried Steiner, John M. Rushby, Maria Sorea, Holger Pfeifer. 189-198 [doi]
- Verifying Web Applications Using Bounded Model CheckingYao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo. 199-208 [doi]
- Automated Synthesis of MultitoleranceSandeep S. Kulkarni, Ali Ebnenasir. 209 [doi]
- Exposing and Eliminating Vulnerabilities to Denial of Service Attacks in Secure Gossip-Based MulticastGal Badishi, Idit Keidar, Amir Sasson. 223-232 [doi]
- Data-Aware MulticastSébastien Baehni, Patrick Th. Eugster, Rachid Guerraoui. 233-242 [doi]
- Timed Uniform Consensus Resilient to Crash and Timing FaultsTaisuke Izumi, Akinori Saitoh, Toshimitsu Masuzawa. 243-252 [doi]
- Caching-Enhanced Scalable Reliable MulticastCarolos Livadas, Idit Keidar. 253 [doi]
- The Effect of Testing on Reliability of Fault-Tolerant SoftwarePeter T. Popov, Bev Littlewood. 265-274 [doi]
- Quantifying the Reliability of Proven SPIDER Group Membership Service GuaranteesElizabeth Latronico, Paul S. Miner, Philip Koopman. 275-284 [doi]
- Generic Faultloads Based on Software Faults for Dependability BenchmarkingJoão Durães, Henrique Madeira. 285-294 [doi]
- Improving System Dependability with Functional AlternativesCharles P. Shelton, Philip Koopman. 295 [doi]
- Cheap PaxosLeslie Lamport, Mike Massa. 307-314 [doi]
- The Join Problem in Dynamic Network AlgorithmsKishori M. Konwar, Dariusz R. Kowalski, Alexander A. Shvartsman. 315-324 [doi]
- A Framework for Dynamic Byzantine StorageJean-Philippe Martin, Lorenzo Alvisi. 325-334 [doi]
- Dependable Initialization of Large-Scale Distributed SoftwareJennifer Ren, Rick Buskens, Oscar J. Gonzalez. 335 [doi]
- A Bi-Criteria Scheduling Heuristic for Distributed Embedded Systems under Reliability and Real-Time ConstraintsIsmail Assayad, Alain Girault, Hamoudi Kalla. 347-356 [doi]
- Proactive Recovery in Distributed CORBA ApplicationsSoila M. Pertet, Priya Narasimhan. 357-366 [doi]
- Assured Reconfiguration of Embedded Real-Time SoftwareElisabeth A. Strunk, John C. Knight. 367-376 [doi]
- Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded SystemsJennifer Morris, Daniel Kroening, Philip Koopman. 377 [doi]
- Fault Diversity among Off-The-Shelf SQL Database ServersIlir Gashi, Peter T. Popov, Lorenzo Strigini. 389-398 [doi]
- Does Your Result Checker Really Check?Lan Guo, Supratik Mukhopadhyay, Bojan Cukic. 399-404 [doi]
- Experience with Evaluating Human-Assisted Recovery Processes405-410 [doi]
- Automated System Design for AvailabilityG. John Janakiraman, Jose Renato Santos, Yoshio Turner. 411 [doi]
- Secure Distributed DNSChristian Cachin, Asad Samar. 423-432 [doi]
- SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP EnvironmentsYu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh, Timothy K. Tsai. 433-442 [doi]
- A Portable Implementation Framework for Intrusion-Resilient Database Management SystemsAlexey Smirnov, Tzi-cker Chiueh. 443-452 [doi]
- A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA ArchitectureRobert J. Stroud, Ian S. Welch, John P. Warne, Peter Y. A. Ryan. 453 [doi]
- FRTR: A Scalable Mechanism for Global Routing Table ConsistencyLan Wang, Daniel Massey, Keyur Patel, Lixia Zhang. 465-474 [doi]
- On Failure Dependent Protection in Optical Grooming NetworksSrinivasan Ramasubramanian. 475-484 [doi]
- Analyses of the Reverse Path Forwarding Routing AlgorithmChristie Bolton, Gavin Lowe. 485-494 [doi]
- Delivering Packets During The Routing Convergence Latency Interval Through Highly Connected DetoursElias Procópio Duarte Jr., Rogério Santini, Jaime Cohen. 495 [doi]
- An Adaptive Algorithm for Efficient Message Diffusion in Unreliable EnvironmentsBenoît Garbinato, Fernando Pedone, Rodrigo Schmidt. 507-516 [doi]
- Efficient Hierarchic Management For Reconfiguration of Networked Information SystemsJonathan C. Rowanhill, Philip E. Varner, John C. Knight. 517-526 [doi]
- Collective Endorsement and the Dissemination Problem in Malicious EnvironmentsSubramanian Lakshmanan, Deepak J. Manohar, Mustaque Ahamad, H. Venkateswaran. 527-536 [doi]
- Support for Mobility and Fault Tolerance in MykilJyh-How Huang, Shivakant Mishra. 537 [doi]
- Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java SerializationTaha Bennani, Laurent Blain, Ludovic Courtès, Jean-Charles Fabre, Marc-Olivier Killijian, Eric Marsden, François Taïani. 549-554 [doi]
- In Advance Activation of Backup Channels for Real-Time TransmissionEnrique Hernández-Orallo, Joan Vila i Carbó. 555-560 [doi]
- Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry ProblemsArchana Ganapathi, Yi-Min Wang, Ni Lao, Ji-Rong Wen. 561-566 [doi]
- Dependable Adaptive Real-Time Applications in Wormhole-based SystemsPedro Martins, Paulo Jorge Paiva de Sousa, Antonio Casimiro, Paulo Veríssimo. 567 [doi]
- High Throughput Byzantine Fault ToleranceRamakrishna Kotla, Michael Dahlin. 575-584 [doi]
- An Architectural Framework for Providing Reliability and Security SupportNithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Jun Xu. 585-594 [doi]
- Diverse Firewall DesignAlex X. Liu, Mohamed G. Gouda. 595-604 [doi]
- Component Middleware to Support Non-repudiable Service InteractionsNick Cook, Paul Robinson, Santosh K. Shrivastava. 605 [doi]
- Customizing Dependability Attributes for Mobile Service PlatformsJun He, Matti A. Hiltunen, Richard D. Schlichting. 617-626 [doi]
- Discovering 1-FT Routes in Mobile Ad Hoc NetworksRajesh Venkatasubramanian, John P. Hayes. 627-636 [doi]
- Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor NetworksJing Deng, Richard Han, Shivakant Mishra. 637 [doi]
- Safety Optimization: A Combination of Fault Tree Analysis and Optimization TechniquesFrank Ortmeier, Wolfgang Reif. 651-658 [doi]
- Repairable Fault Tree for the Automatic Evaluation of Repair PoliciesDaniele Codetta Raiteri, Mauro Iacono, Giuliana Franceschinis, Valeria Vittorini. 659-668 [doi]
- Availability Measurement and Modeling for An Application ServerDong Tang, Dileep Kumar, Sreeram Duvur, Øystein Torbjørnsen. 669 [doi]
- Benchmarking The Dependability of Windows NT4, 2000 and XPAli Kalakech, Karama Kanoun, Yves Crouzet, Jean Arlat. 681-686 [doi]
- Checkpointing of Control Structures in Main Memory Database SystemsLong Wang, Zbigniew Kalbarczyk, Ravishankar K. Iyer, H. Vora, T. Chahande. 687-692 [doi]
- Hierarchical Computation of Interval Availability and Related MetricsDong Tang, Kishor S. Trivedi. 693 [doi]
- Model Checking Action- and State-Labelled Markov ChainsChristel Baier, Lucia Cloth, Boudewijn R. Haverkort, Matthias Kuntz, Markus Siegle. 701-710 [doi]
- Model Checking Dependability Attributes of Wireless Group CommunicationMieke Massink, Joost-Pieter Katoen, Diego Latella. 711-720 [doi]
- Min-Max Checkpoint Placement under Incomplete Failure InformationTatsuya Ozaki, Tadashi Dohi, Hiroyuki Okamura, Naoto Kaio. 721-730 [doi]
- Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered AppliancesAndrea Acquaviva, Alessandro Aldini, Marco Bernardo, Alessandro Bogliolo, Edoardo Bontà, Emanuele Lattanzi. 731 [doi]
- An SLA-Oriented Capacity Planning Tool for Streaming Media ServicesLudmila Cherkasova, Wenting Tang, Sharad Singhal. 743-752 [doi]
- QoS of Timeout-Based Self-Tuned Failure Detectors: The Effects of the Communication Delay Predictor and the Safety MarginRaul Ceretta Nunes, Ingrid Jansch-Pôrto. 753-761 [doi]
- Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed SystemsPanagiotis Katsaros, Constantine Lazos. 762-771 [doi]
- Failure Data Analysis of a Large-Scale Heterogeneous Server EnvironmentRamendra K. Sahoo, Anand Sivasubramaniam, Mark S. Squillante, Yanyong Zhang. 772 [doi]
- Evaluating the Impact of Limited Resource on the Performance of Flooding in Wireless Sensor NetworksPatrick Downey, Rachel Cardell-Oliver. 785-794 [doi]
- Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor NetworksGunjan Khanna, Saurabh Bagchi, Yu-Sung Wu. 795-804 [doi]
- Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network ApplicationsAnn T. Tai, Kam S. Tso, William H. Sanders. 805 [doi]
- A Markov Reward Model for Reliable Synchronous Dataflow System DesignVinu Vijay Kumar, Rashi Verma, John Lach, Joanne Bechta Dugan. 817-825 [doi]
- A Method for Performance Analysis of Earliest-Deadline-First Scheduling PolicyMehdi Kargahi, Ali Movaghar-Rahimabadi. 826-834 [doi]
- An Efficient Algorithm for the Transient Analysis of a Class of Deterministic Stochastic Petri NetsMarco Gribaudo, Matteo Sereno. 835-844 [doi]
- Analysis of Second-Order Markov Reward ModelsGábor Horváth, Sándor Rácz, Miklós Telek. 845 [doi]
- On Benchmarking the Dependability of Automotive Engine Control ApplicationsJuan-Carlos Ruiz-Garcia, Pedro Yuste, Pedro J. Gil, Lenin Lemus. 857-866 [doi]
- Characterization of the Impact of Faulty Drivers on the Robustness of the Linux KernelArnaud Albinet, Jean Arlat, Jean-Charles Fabre. 867-876 [doi]
- A Framework for Evaluating Storage System DependabilityKimberly Keeton, Arif Merchant. 877-886 [doi]
- Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 ProcessorsWeining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 887 [doi]
- Workshop on Interdisciplinary Approaches to Achieving and Analysing System DependabilityMichael D. Harrison, Lorenzo Strigini. 899
- DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor NetworksSaurabh Bagchi, Douglas M. Blough, Paolo Santi, Nitin H. Vaidya. 900
- Twin Workshops on Architecting Dependable Systems (WADS 2004)Rogério de Lemos, Cristina Gacek, Alexander B. Romanovsky. 901
- Workshop on Fault Diagnosis and Tolerance in CryptographyLuca Breveglieri, Israel Koren. 902
- Workshop on Assurance Cases: Best Practices, Possible Obstacles, and Future OpportunitiesCharles Howell, Sofia Guerra, Shari Lawrence Pfleeger, Victoria Stavridou-Coleman. 903
- Student ForumSusanna Donatelli. 904
- Fast AbstractsFelicita Di Giandomenico. 905