Abstract is missing.
- Techniques for efficient in-memory checkpointingDirk Vogt, Cristiano Giuffrida, Herbert Bos, Andrew S. Tanenbaum. [doi]
- Using big data for more dependability: a cellular network taleNawanol Theera-Ampornpunt, Saurabh Bagchi, Kaustubh R. Joshi, Rajesh K. Panta. [doi]
- Towards privacy-preserving fault detectionAntonis Papadimitriou, Mingchen Zhao, Andreas Haeberlen. [doi]
- An untold story of redundant clouds: making your service deployment truly reliableEnnan Zhai, Ruichuan Chen, David Isaac Wolinsky, Bryan Ford. [doi]
- Towards effective and efficient search-based deterministic replayManuel Bravo, Nuno Machado, Paolo Romano, Luís E. T. Rodrigues. [doi]
- Towards efficient, portable application-level consistencyThanumalayan Sankaranarayana Pillai, Vijay Chidambaram, Joo Young Hwang, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. [doi]
- Higher SLA satisfaction in datacenters with continuous VM placement constraintsHuynh Tu Dang, Fabien Hermenier. [doi]
- PSCloud: a durable context-aware personal storage cloudSobir Bazarbayev, Matti A. Hiltunen, Kaustubh R. Joshi, William H. Sanders, Richard D. Schlichting. [doi]
- Towards Byzantine fault tolerant publish/subscribe: a state machine approachLeander Jehl, Hein Meling. [doi]
- Verifying the correctness of remote executions: from wild implausibility to near practicalityMichael Walfish. [doi]
- Towards transparent hardening of distributed systemsDiogo Behrens, Christof Fetzer, Flavio Paiva Junqueira, Marco Serafini. [doi]
- Behave or be watched: debugging with behavioral watchpointsAkshay Kumar, Peter Goodman, Ashvin Goel, Angela Demke Brown. [doi]