Abstract is missing.
- Message from the conference general chair and coordinatorPhilip Koopman, Henrique Madeira. [doi]
- Message from the PDS program chairKimberly Keeton. [doi]
- Dependability on the last frontierAlex Hills. [doi]
- Message from the DCCS program chairNeeraj Suri. [doi]
- Automotive Enhanced Vision Systems - Issues arising from placing users in the loopThomas Seder. [doi]
- Coverage of a microarchitecture-level fault check regimen in a superscalar processorVimal K. Reddy, Eric Rotenberg. 1-10 [doi]
- Analysis and solutions to issue queue process variationNiranjan Soundararajan, Aditya Yanamandra, Chrysostomos Nicopoulos, Narayanan Vijaykrishnan, Anand Sivasubramaniam, Mary Jane Irwin. 11-21 [doi]
- Trace-based microarchitecture-level diagnosis of permanent hardware faultsMan-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou. 22-31 [doi]
- A study of cognitive resilience in a JPEG compressorDamian Nowroth, Ilia Polian, Bernd Becker. 32-41 [doi]
- Scheduling algorithms for unpredictably heterogeneous CMP architecturesJonathan A. Winter, David H. Albonesi. 42-51 [doi]
- Automated duplicate detection for bug tracking systemsNicholas Jalbert, Westley Weimer. 52-61 [doi]
- Validation of hardware error recovery mechanisms for the SPARC64 V microprocessorHisashige Ando, Ryuji Kan, Yoshiharu Tosaka, Keiji Takahisa, Kichiji Hatanaka. 62-69 [doi]
- Using likely program invariants to detect hardware errorsSwarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou. 70-79 [doi]
- Detouring: Translating software to circumvent hard faults in simple coresAlbert Meixner, Daniel J. Sorin. 80-89 [doi]
- Towards assessing the security of DBMS configurationsAfonso Araújo Neto, Marco Vieira. 90-95 [doi]
- Experiences with formal specification of fault-tolerant file systemsRoxana Geambasu, Andrew Birrell, John MacCormick. 96-101 [doi]
- Using an assurance case to support independent assessment of the transition to a new GPS ground control systemElisabeth A. Nguyen, William S. Greenwell, Myron Hecht. 102-107 [doi]
- Silent Data Corruption - Myth or reality?Cristian Constantinescu, Ishwar Parulkar, Robert Harper, Sarah Michalak. 108-109 [doi]
- End-system tools for enhancing email reliabilityTim Moors, Patrick Chu. 110-115 [doi]
- Tempest: Towards early identification of failure-prone binariesThirumalesh Bhat, Nachiappan Nagappan. 116-121 [doi]
- Statistical Fault InjectionPradeep Ramachandran, Prabhakar Kudva, Jeffrey W. Kellington, John Schumann, Pia Sanda. 122-127 [doi]
- An accurate flip-flop selection technique for reducing logic SEREric L. Hill, Mikko H. Lipasti, Kewal K. Saluja. 128-136 [doi]
- Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processorsXin Fu, Tao Li, José A. B. Fortes. 137-146 [doi]
- Reliability of flat XOR-based erasure codes on heterogeneous devicesKevin M. Greenan, Ethan L. Miller, Jay J. Wylie. 147-156 [doi]
- ConfErr: A tool for assessing resilience to human configuration errorsLorenzo Keller, Prasang Upadhyaya, George Candea. 157-166 [doi]
- Enhanced server fault-tolerance for improved user experienceManish Marwah, Shivakant Mishra, Christof Fetzer. 167-176 [doi]
- Towards an understanding of anti-virtualization and anti-debugging behavior in modern malwareXu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael Bailey, Jose Nazario. 177-186 [doi]
- Security through redundant data diversityAnh Nguyen-Tuong, David Evans, John C. Knight, Benjamin Cox, Jack W. Davidson. 187-196 [doi]
- Byzantine replication under attackYair Amir, Brian A. Coan, Jonathan Kirsch, John Lane. 197-206 [doi]
- A robust and lightweight stable leader election service for dynamic systemsNicolas Schiper, Sam Toueg. 207-216 [doi]
- A fast restart mechanism for checkpoint/recovery protocols in networked environmentsYawei Li, Zhiling Lan. 217-226 [doi]
- Tempest: Soft state replication in the service tierTudor Marian, Mahesh Balakrishnan, Ken Birman, Robbert van Renesse. 227-236 [doi]
- AGIS: Towards automatic generation of infection signaturesZhuowei Li, Xiaofeng Wang, Zhenkai Liang, Michael K. Reiter. 237-246 [doi]
- Convicting exploitable software vulnerabilities: An efficient input provenance based approachZhiqiang Lin, Xiangyu Zhang, Dongyan Xu. 247-256 [doi]
- Mapping software faults with web security vulnerabilitiesJosé Fonseca, Marco Vieira. 257-266 [doi]
- A fault-tolerant directory-based cache coherence protocol for CMP architecturesRicardo Fernández Pascual, José M. García, Manuel E. Acacio, José Duato. 267-276 [doi]
- Probabilistic quorum systems in wireless ad hoc networksRoy Friedman, Gabriel Kliot, Chen Avin. 277-286 [doi]
- BAR primerAllen Clement, Harry C. Li, Jeff Napper, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin. 287-296 [doi]
- Improving dependability of network configuration through policy classificationSihyung Lee, Tina Wong, Hyong S. Kim. 297-306 [doi]
- Traffic grooming in WDM mesh networks with guaranteed survivabilityAtaul Bari, Quazi Rahman, Arunita Jaekel, Subir Bandyopadhyay. 307-315 [doi]
- Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computingYoshitomo Murata, Tsutomu Inaba, Hiroyuki Takizawa, Hiroaki Kobayashi. 316-325 [doi]
- An integrated approach to resource pool management: Policies, efficiency and quality metricsDaniel Gmach, Jerry Rolia, Ludmila Cherkasova, Guillaume Belrose, Tom Turicchi, Alfons Kemper. 326-335 [doi]
- Scheduling for performance and availability in systems with temporal dependent workloadsNingfang Mi, Giuliano Casale, Evgenia Smirni. 336-345 [doi]
- Hot-spot prediction and alleviation in distributed stream processing applicationsThomas Repantis, Vana Kalogeraki. 346-355 [doi]
- On localization attacks to Internet Threat Monitors: An information-theoretic frameworkWei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettati, Wei Zhao. 356-365 [doi]
- Automatic security assessment of critical cyber-infrastructuresZahid Anwar, Ravinder Shankesi, Roy H. Campbell. 366-375 [doi]
- Evaluating email s feasibility for botnet command and controlKapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee. 376-385 [doi]
- Scaling file systems to support petascale clusters: A dependability analysis to support informed design choicesShravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders. 386-391 [doi]
- WS-DREAM: A distributed reliability assessment Mechanism for Web ServicesZibin Zheng, Michael R. Lyu. 392-397 [doi]
- A log mining approach to failure analysis of enterprise telephony systemsChinghway Lim, Navjot Singh, Shalini Yajnik. 398-403 [doi]
- Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQLPaolo Romano, Francesco Quaglia. 404-409 [doi]
- Toward an understanding of the processing delay of peer-to-peer relay nodesKuan-Ta Chen, Jing-Kai Lou. 410-419 [doi]
- TCP covert timing channels: Design and detectionXiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang. 420-429 [doi]
- A smart triggering scheme to reduce service interruption during heterogeneous handoversHuaiyu Liu, Christian Maciocco, Vijay Kesavan, Andy Lock Yen Low. 430-439 [doi]
- On representing knowledge in the dependability domain: a panel discussionAlgirdas Avizienis. 440-441 [doi]
- Evaluating availability under quasi-heavy-tailed repair timesSei Kato, Takayuki Osogami. 442-451 [doi]
- Anomaly? application change? or workload change? towards automated detection of application performance anomaly and changeLudmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni. 452-461 [doi]
- Survivability quantification of communication servicesPoul E. Heegaard, Kishor S. Trivedi. 462-471 [doi]
- SymPLFIED: Symbolic program-level fault injection and error detection frameworkKarthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 472-481 [doi]
- A characterization of instruction-level error derating and its implications for error detectionJeffrey J. Cook, Craig B. Zilles. 482-491 [doi]
- Enhancing data availability in disk drives through background activitiesNingfang Mi, Alma Riska, Evgenia Smirni, Erik Riedel. 492-501 [doi]
- Analyzing the effects of disk-pointer corruptionLakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift. 502-511 [doi]
- Architectural dependability evaluation with ArcadeHichem Boudali, Pepijn Crouzen, Boudewijn R. Haverkort, Matthias Kuntz, Mariëlle Stoelinga. 512-521 [doi]
- An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web servicesKivanc M. Ozonat. 522-531 [doi]
- A recurrence-relation-based reward model for performability evaluation of embedded systemsAnn T. Tai, Kam S. Tso, William H. Sanders. 532-541 [doi]
- International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)Andrea Bondavalli, István Majzik, Aad P. A. van Moorsel. 542-543 [doi]
- Workshop on compiler and architectural techniques for application reliability and security (CATARS)Karthik Pattabiraman, Shuo Chen, Zbigniew Kalbarczyk. 544-545 [doi]
- Second workshop on dependable and secure nanocomputingJean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaidis. 546-547 [doi]
- Workshop on Architecting Dependable Systems (WADS 2008)Rogério de Lemos, Jean-Charles Fabre, Cristina Gacek. 548-549 [doi]