Abstract is missing.
- PDS Program Committee [doi]
- Delivering Dependability: A Moving TargetAmbuj Goyal. [doi]
- Conference Organizers [doi]
- List of Reviewers for DCCS [doi]
- Welcome Message from the Conference Coordinator [doi]
- List of Reviewers for PDS [doi]
- Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair [doi]
- DCCS Program Committee [doi]
- William C. Carter Award [doi]
- Message from the Performance and Dependability Symposium (PDS) Program Chair [doi]
- Welcome Message from the General Chair [doi]
- Efficient High Hamming Distance CRCs for Embedded NetworksJustin Ray, Philip Koopman. 3-12 [doi]
- Memory-Conscious Reliable Execution on Embedded Chip MultiprocessorsGuangyu Chen, Mahmut T. Kandemir, Ibrahim Kolcu. 13-22 [doi]
- Static Analysis to Enforce Safe Value Flow in Embedded Control SystemsSumant Kowshik, Grigore Rosu, Lui Sha. 23-34 [doi]
- The Startup Problem in Fault-Tolerant Time-Triggered CommunicationWilfried Steiner, Hermann Kopetz. 35-44 [doi]
- A Reconfigurable Generic Dual-Core ArchitectureThomas Kottke, Andreas Steininger. 45-54 [doi]
- A Dependable System Architecture for Safety-Critical Respiratory-Gated Radiation TherapyGregory C. Sharp, Nagarajan Kandasamy. 55-60 [doi]
- User Interface Defect Detection by Hesitation AnalysisRobert W. Reeder, Roy A. Maxion. 61-72 [doi]
- Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer ArchitecturesAlbert Meixner, Daniel J. Sorin. 73-82 [doi]
- Automatic Instruction-Level Software-Only RecoveryJonathan Chang, George A. Reis, David I. August. 83-92 [doi]
- Exploring Fault-Tolerant Network-on-Chip ArchitecturesDongkook Park, Chrysostomos Nicopoulos, Jongman Kim, Narayanan Vijaykrishnan, Chita R. Das. 93-104 [doi]
- Scaling Byzantine Fault-Tolerant Replication toWide Area NetworksYair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David John Zage. 105-114 [doi]
- Optimal Resilience for Erasure-Coded Byzantine Distributed StorageChristian Cachin, Stefano Tessaro. 115-124 [doi]
- Lucky Read/Write Access to Robust Atomic StorageRachid Guerraoui, Ron R. Levy, Marko Vukolic. 125-136 [doi]
- One-step Consensus with Zero-DegradationDan Dobre, Neeraj Suri. 137-146 [doi]
- Consensus with Byzantine Failures and Little System SynchronyMarcos Kawazoe Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, Sam Toueg. 147-155 [doi]
- Solving Atomic Broadcast with Indirect ConsensusRichard Ekwall, André Schiper. 156-165 [doi]
- Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and SynchronyAntonio Fernández, Ernesto Jiménez, Michel Raynal. 166-178 [doi]
- Hotspots: The Root Causes of Non-Uniformity in Self-Propagating MalwareEvan Cooke, Zhuoqing Morley Mao, Farnam Jahanian. 179-188 [doi]
- A Multi-Resolution Approach forWorm Detection and ContainmentVyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang. 189-198 [doi]
- Honeypot-Aware Advanced Botnet Construction and MaintenanceCliff Changchun Zou, Ryan Cunningham. 199-208 [doi]
- Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood ToleranceMichael Ihde, William H. Sanders. 209-216 [doi]
- HoVer Erasure Codes For Disk ArraysJames Lee Hafner. 217-226 [doi]
- Storage Allocation in Unreliable Peer-to-Peer SystemsJohn A. Chandy. 227-236 [doi]
- Reliability for Networked Storage NodesK. K. Rao, James Lee Hafner, Richard A. Golding. 237-248 [doi]
- A large-scale study of failures in high-performance computing systemsBianca Schroeder, Garth A. Gibson. 249-258 [doi]
- Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex SystemsZhen Guo, Guofei Jiang, Haifeng Chen, Kenji Yoshihira. 259-268 [doi]
- Efficiently Detecting All Dangling Pointer Uses in Production ServersDinakar Dhurjati, Vikram S. Adve. 269-280 [doi]
- In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File ReliabilityJie Hu, Shuai Wang, Sotirios G. Ziavras. 281-290 [doi]
- Run-Time Reconfiguration for Emulating Transient Faults in VLSI SystemsDavid de Andrés, Juan Carlos Ruiz, Daniel Gil, Pedro J. Gil. 291-300 [doi]
- CADRE: Cycle-Accurate Deterministic Replay for Hardware DebuggingSmruti R. Sarangi, Brian Greskamp, Josep Torrellas. 301-312 [doi]
- Collecting and Analyzing Failure Data of Bluetooth Personal Area NetworksMarcello Cinque, Domenico Cotroneo, Stefano Russo. 313-322 [doi]
- Improving BGP Convergence Delay for Large-Scale FailuresAmit Sahoo, Krishna Kant, Prasant Mohapatra. 323-332 [doi]
- Secure Split Assignment Trajectory Sampling: A Malicious Router Detection SystemSihyung Lee, Tina Wong, Hyong S. Kim. 333-342 [doi]
- A General Framework for Scalability and Performance Analysis of DHT Routing SystemsJoseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury. 343-354 [doi]
- Dependability Analysis of Virtual Memory SystemsLakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 355-364 [doi]
- Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware FaultsDong Tang, Peter Carruthers, Zuheir Totari, Michael W. Shapiro. 365-370 [doi]
- Designing dependable storage solutions for shared application environmentsShravan Gaonkar, Kimberly Keeton, Arif Merchant, William H. Sanders. 371-382 [doi]
- A Statistical Analysis of Attack Data to Separate AttacksMichel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan. 383-392 [doi]
- VoIP Intrusion Detection Through Interacting Protocol State MachinesHemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia. 393-402 [doi]
- Mitigating Active Attacks Towards Client Networks Using the Bitmap FilterChun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei. 403-412 [doi]
- Accurate and Automated System Call Policy-Based Intrusion PreventionLap-Chung Lam, Wei Li, Tzi-cker Chiueh. 413-424 [doi]
- BlueGene/L Failure Analysis and Prediction ModelsYinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Morris Jette, Ramendra K. Sahoo. 425-434 [doi]
- Performance Assurance via Software Rejuvenation: Monitoring, Statistics and AlgorithmsAlberto Avritzer, Andre B. Bondi, Michael Grottke, Kishor S. Trivedi, Elaine J. Weyuker. 435-444 [doi]
- Automatic Recovery Using Bounded Partially Observable Markov Decision ProcessesKaustubh R. Joshi, William H. Sanders, Matti A. Hiltunen, Richard D. Schlichting. 445-456 [doi]
- Using Attack Injection to Discover New VulnerabilitiesNuno Ferreira Neves, João Antunes, Miguel Correia, Paulo Veríssimo, Rui Neves. 457-466 [doi]
- Assessing the Attack Threat due to IRC ChannelsRobert Meyer, Michel Cukier. 467-472 [doi]
- An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor NetworksClaudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, Ravi K. Iyer. 473-484 [doi]
- A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCsVinh Vi Lam, William H. Sanders, Peter Buchholz. 485-494 [doi]
- Evaluating the Performability of Systems with Background JobsQi Zhang, Ningfang Mi, Evgenia Smirni, Alma Riska, Erik Riedel. 495-504 [doi]
- A Contribution Towards Solving the Web Workload PuzzleKaterina Goseva-Popstojanova, Fengbin Li, Xuan Wang, Amit Sangle. 505-516 [doi]
- Empirical and Analytical Evaluation of Systems with Multiple Unreliable ServersJennie Palmer, Isi Mitrani. 517-525 [doi]
- R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource PoolsLudmila Cherkasova, Jerome A. Rolia. 526-535 [doi]
- Cost-Effective Configuration of Content Resiliency Services Under Correlated FailuresJinliang Fan, Tianying Chang, Dimitrios E. Pendarakis, Zhen Liu. 536-548 [doi]
- High Throughput Total Order Broadcast for Cluster EnvironmentsRachid Guerraoui, Ron R. Levy, Bastian Pochon, Vivien Quéma. 549-557 [doi]
- Improving the Fault Resilience of Overlay Multicast for Media StreamingGuang Tan, Stephen A. Jarvis, Daniel P. Spooner. 558-567 [doi]
- Randomized Intrusion-Tolerant Asynchronous ServicesHenrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo. 568-577 [doi]
- A Performance Study on the Signal-On-Fail Approach to Imposing Total Order in the Streets of ByzantiumQurat-ul-Ain Inayat, Paul Devadoss Ezhilchelvan. 578-590 [doi]
- Workshop on Applied Software Reliability (WASR)Adnan Agbaria, Claudio Basile, Zbigniew Kalbarczyk. 591 [doi]
- Workshop on Architecting Dependable Systems (WADS)Rogério de Lemos, Cristina Gacek, Alexander Romanovsky. 592 [doi]
- Workshop on Empirical Evaluation of Dependability and Security (WEEDS)Michel Cukier, Ioana Rus. 593 [doi]
- Student ForumChristof Fetzer. 594 [doi]
- Fast AbstractsSaurabh Bagchi. 595 [doi]