Abstract is missing.
- Optimization of data collection strategies for model-based evaluation and decision-makingRobert G. Cain, Aad P. A. van Moorsel. 1-10 [doi]
- A study of soft error consequences in hard disk drivesTimothy K. Tsai, Nawanol Theera-Ampornpunt, Saurabh Bagchi. 1-8 [doi]
- DS-Bench Toolset: Tools for dependability benchmarking with simulation and assuranceHajime Fujita, Yutaka Matsuno, Toshihiro Hanawa, Mitsuhisa Sato, Shinpei Kato, Yutaka Ishikawa. 1-8 [doi]
- Assessing time coalescence techniques for the analysis of supercomputer logsCatello Di Martino, Marcello Cinque, Domenico Cotroneo. 1-12 [doi]
- Epiphany: A location hiding architecture for protecting critical services from DDoS attacksVamsi Kambhampati, Christos Papadopoulos, Daniel Massey. 1-12 [doi]
- NINEPIN: Non-invasive and energy efficient performance isolation in virtualized serversPalden Lama, Xiaobo Zhou. 1-12 [doi]
- Mitigating random variation with spare RIBs: Redundant intermediate bitslicesDavid J. Palframan, Nam Sung Kim, Mikko H. Lipasti. 1-11 [doi]
- Adaptive algorithms for diagnosing large-scale failures in computer networksSrikar Tati, Bong-Jun Ko, Guohong Cao, Ananthram Swami, Thomas F. La Porta. 1-12 [doi]
- A new symbolic approach for network reliability analysisMarco Beccuti, Andrea Bobbio, Giuliana Franceschinis, Roberta Terruggia. 1-12 [doi]
- RePRAM: Re-cycling PRAM faulty blocks for extended lifetimeJie Chen 0020, Guru Venkataramani, H. Howie Huang. 1-12 [doi]
- Keep net working - on a dependable and fast networking stackTomas Hruby, Dirk Vogt, Herbert Bos, Andrew S. Tanenbaum. 1-12 [doi]
- Time-efficient and cost-effective network hardening using attack graphsMassimiliano Albanese, Sushil Jajodia, Steven Noel. 1-12 [doi]
- Filtering log data: Finding the needles in the HaystackLi Yu, Ziming Zheng, Zhiling Lan, Terry Jones, Jim M. Brandt, Ann C. Gentile. 1-12 [doi]
- Low-cost program-level detectors for reducing silent data corruptionsSiva Kumar Sastry Hari, Sarita V. Adve, Helia Naeimi. 1-12 [doi]
- Error injection-based study of soft error propagation in AMD Bulldozer microprocessor moduleCristian Constantinescu, Mike Butler, Chris Weller. 1-6 [doi]
- High-performance parallel accelerator for flexible and efficient run-time monitoringDaniel Y. Deng, G. Edward Suh. 1-12 [doi]
- Perspectives on software safety case development for unmanned aircraftEwen Denney, Ganesh Pai, Ibrahim Habli. 1-8 [doi]
- A framework for efficient evaluation of the fault tolerance of deduplicated storage systemsEric Rozier, William H. Sanders. 1-12 [doi]
- BLOCKWATCH: Leveraging similarity in parallel programs for error detectionJiesheng Wei, Karthik Pattabiraman. 1-12 [doi]
- Taming Mr Hayes: Mitigating signaling based attacks on smartphonesCollin Mulliner, Steffen Liebergeld, Matthias Lange, Jean-Pierre Seifert. 1-12 [doi]
- Scalable optimal countermeasure selection using implicit enumeration on attack countermeasure treesArpan Roy, Dong Seong Kim, Kishor S. Trivedi. 1-12 [doi]
- Confidentiality of event data in policy-based monitoringMirko Montanari, Roy H. Campbell. 1-12 [doi]
- Lightweight cooperative logging for fault replication in concurrent programsNuno Machado, Paolo Romano, Luís Rodrigues. 1-12 [doi]
- Binary mutation testing through dynamic translationMarkus Becker, Christoph Kuznik, Mabel M. Joy, Tao Xie, Wolfgang Müller 0003. 1-12 [doi]
- Practical scrubbing: Getting to the bad sector at the right timeGeorge Amvrosiadis, Alina Oprea, Bianca Schroeder. 1-12 [doi]
- Characterization of the error resiliency of power grid substation devicesKuan-Yu Tseng, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 1-8 [doi]
- Instrumenting AUTOSAR for dependability assessment: A guidance frameworkThorsten Piper, Stefan Winter, Paul Manns, Neeraj Suri. 1-12 [doi]
- Multi-Ring PaxosParisa Jalili Marandi, Marco Primi, Fernando Pedone. 1-12 [doi]
- Heuristics for optimizing matrix-based erasure codes for fault-tolerant storage systemsJames S. Plank, Catherine D. Schuman, B. Devin Robison. 1-12 [doi]
- EliMet: Security metric elicitation in power grid critical infrastructures by observing system administrators' responsive behaviorSaman A. Zonouz, Amir Houmansadr, Parisa Haghani. 1-12 [doi]
- Continuous authentication for mouse dynamics: A pattern-growth approachChao Shen, Zhongmin Cai, Xiaohong Guan. 1-12 [doi]
- Latent fault detection in large scale servicesMoshe Gabel, Assaf Schuster, Ran Gilad-Bachrach, Nikolaj Bjørner. 1-12 [doi]
- Algorithmic approaches to low overhead fault detection for sparse linear algebraJoseph Sloan, Rakesh Kumar, Greg Bronevetsky. 1-12 [doi]
- Toward comprehensive and accurate simulation performance prediction of parallel file systemsMiguel A. Erazo, Ting Li, Jason Liu, Stephan Eidenbenz. 1-12 [doi]
- Model-driven consolidation of Java workloads on multicoresDanilo Ansaloni, Lydia Y. Chen, Evgenia Smirni, Walter Binder. 1-12 [doi]
- Draco: Statistical diagnosis of chronic problems in large distributed systemsSoila Kavulya, Scott Daniels, Kaustubh R. Joshi, Matti A. Hiltunen, Rajeev Gandhi, Priya Narasimhan. 1-12 [doi]
- A dependability analysis of hardware-assisted polling integrity checking systemsJiang Wang, Kun Sun, Angelos Stavrou. 1-12 [doi]
- Safeguarding academic accounts and resources with the University Credential Abuse Auditing SystemJing Zhang, Robin Berthier, Will Rhee, Michael Bailey, Partha Pratim Pal, Farnam Jahanian, William H. Sanders. 1-8 [doi]
- Scalable deferred update replicationDaniele Sciascia, Fernando Pedone, Flavio Junqueira. 1-12 [doi]
- Automatic fault characterization via abnormality-enhanced classificationGreg Bronevetsky, Ignacio Laguna, Bronis R. de Supinski, Saurabh Bagchi. 1-12 [doi]
- Understanding soft error propagation using Efficient vulnerability-driven fault injectionXin Xu, Man-Lap Li. 1-12 [doi]
- Mitigating the impact of ambient noise on Wireless Mesh Networks using adaptive link-quality-based packet replicationJesus Friginal, Juan Carlos Ruiz, David de Andrés, Antonio Bustos. 1-8 [doi]
- A cost-based heterogeneous recovery scheme for distributed storage systems with RAID-6 codesYunfeng Zhu, Patrick P. C. Lee, Liping Xiang, Yinlong Xu, Lingling Gao. 1-12 [doi]
- Robust data sharing with key-value storesCristina Basescu, Christian Cachin, Ittay Eyal, Robert Haas, Alessandro Sorniotti, Marko Vukolic, Ido Zachevsky. 1-12 [doi]
- ExtraTime: Modeling and analysis of wearout due to transistor aging at microarchitecture-levelFabian Oboril, Mehdi Baradaran Tahoori. 1-12 [doi]
- An empirical study of the robustness of Inter-component Communication in AndroidAmiya Kumar Maji, Fahad A. Arshad, Saurabh Bagchi, Jan S. Rellermeyer. 1-12 [doi]
- Finite horizon analysis of infinite CTMDPsPeter Buchholz. 1-12 [doi]
- CFIMon: Detecting violation of control flow integrity using performance countersYubin Xia, Yutao Liu, Haibo Chen, Binyu Zang. 1-12 [doi]
- RDIS: A recursively defined invertible set scheme to tolerate multiple stuck-at faults in resistive memoryRami G. Melhem, Rakan Maddah, Sangyeun Cho. 1-12 [doi]
- VARIUS-NTV: A microarchitectural model to capture the increased sensitivity of manycores to process variations at near-threshold voltagesUlya R. Karpuzcu, Krishna B. Kolluru, Nam Sung Kim, Josep Torrellas. 1-11 [doi]
- A cross-layer approach for IP network protectionQiang Zheng, Jing Zhao, Guohong Cao. 1-12 [doi]