Abstract is missing.
- Detecting Anomalous User Behaviors in Workflow-Driven Web ApplicationsXiaowei Li 0003, Yuan Xue, Bradley Malin. 1-10 [doi]
- Susceptibility Analysis of Structured P2P Systems to Localized Eclipse AttacksDaniel Germanus, Robert Langenberg, Abdelmajid Khelil, Neeraj Suri. 11-20 [doi]
- Benchmarking Dependability of MapReduce SystemsAmit Sangroya, Damián Serrano, Sara Bouchenak. 21-30 [doi]
- Aggregating CVSS Base Scores for Semantics-Rich Network Security MetricsPengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal. 31-40 [doi]
- First Step toward Cloud-Based FirewallingAmir R. Khakpour, Alex X. Liu. 41-50 [doi]
- Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud StorageHenry C. H. Chen, Patrick P. C. Lee. 51-60 [doi]
- TailCon: Power-Minimizing Tail Percentile Control of Response Time in Server ClustersXi Chen, Xue Liu, Shengquan Wang, Xiao-Wen Chang. 61-70 [doi]
- LogMaster: Mining Event Correlations in Logs of Large-Scale Cluster SystemsXiaoyu Fu, Rui Ren, Jianfeng Zhan, Wei Zhou, Zhen Jia, Gang Lu. 71-80 [doi]
- RAM-DUR: In-Memory Deferred Update ReplicationDaniele Sciascia, Fernando Pedone. 81-90 [doi]
- SPECULA: Speculative Replication of Software Transactional MemorySebastiano Peluso, Joao Fernandes, Paolo Romano, Francesco Quaglia, Luís Rodrigues. 91-100 [doi]
- Model-Driven Comparison of State-Machine-Based and Deferred-Update Replication SchemesPawel T. Wojciechowski, Tadeusz Kobus, Maciej Kokocinski. 101-110 [doi]
- S-Paxos: Offloading the Leader for High Throughput State Machine ReplicationMartin Biely, Zarko Milosevic 0001, Nuno Santos, André Schiper. 111-120 [doi]
- FORTRESS: Adding Intrusion-Resilience to Primary-Backup Server SystemsDylan Clarke, Paul D. Ezhilchelvan. 121-130 [doi]
- From Backup to Hot Standby: High Availability for HDFSAndre Oriani, Islene C. Garcia. 131-140 [doi]
- Availability Modeling and Analysis for Data Backup and Restore OperationsXiaoyan Yin, Javier Alonso, Fumio Machida, Ermeson C. Andrade, Kishor S. Trivedi. 141-150 [doi]
- Availability-Based Methods for Distributed Storage SystemsAnne-Marie Kermarrec, Erwan Le Merrer, Gilles Straub, Alexandre van Kempen. 151-160 [doi]
- Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal ConditionsBruno Vavala, Nuno Neves. 161-170 [doi]
- GRADE: Graceful Degradation in Byzantine Quorum SystemsJingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang. 171-180 [doi]
- Scalable and Secure Polling in Dynamic Distributed NetworksSébastien Gambs, Rachid Guerraoui, Hamza Harkous, Florian Huc, Anne-Marie Kermarrec. 181-190 [doi]
- Distributed and Private Group ManagementOlivier Heen, Erwan Le Merrer, Christoph Neumann, Stéphane Onno. 191-200 [doi]
- Improving Security of Internet Services through Continuous and Transparent User Identity VerificationAndrea Ceccarelli, Andrea Bondavalli, Francesco Brancati, Ernesto La Mattina. 201-206 [doi]
- Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service AttacksZhang Fu, Marina Papatriantafilou. 207-212 [doi]
- Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some SolutionsRoberto Di Pietro, Fabio Martinelli, Nino Vincenzo Verde. 213-218 [doi]
- Impact of Operational Reliability Re-assessment during Aircraft MissionsKossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos. 219-224 [doi]
- Automatic Generation of Graceful ProgramsYiyan Lin, Sandeep S. Kulkarni. 225-230 [doi]
- RD2: Resilient Dynamic Desynchronization for TDMA over Lossy NetworksThomas Hinterhofer, Hans-Peter Schwefel, Slobodanka Tomic. 231-236 [doi]
- Providing Uniform Reliable Broadcast Delivery for Mobile Ad Hoc Networks with MANET Liveness PropertyJerzy Brzezinski, Michal Kalewski, Jacek Kobusinski. 237-242 [doi]
- Fault Localization in MANET-Hosted Service-Based SystemsPetr Novotný, Alexander L. Wolf, Bong-Jun Ko. 243-248 [doi]
- Fast Optimization Algorithms for Designing Cellular Networks with Guard ChannelKousaburo Hari, Tadashi Dohi, Kishor S. Trivedi. 249-254 [doi]
- A Quick and Reliable Routing for Infrastructure Surveillance with Wireless Sensor NetworksZhen Jiang, Jie Wu 0001, Minyi Guo, Zhenping Zhao, Donghong Wu. 255-260 [doi]
- Causally Coordinated Snapshot Isolation for Geographically Replicated DataVinit Padhye, Anand Tripathi. 261-266 [doi]
- GSFord: Towards a Reliable Geo-social Notification SystemKyungbaek Kim, Ye Zhao, Nalini Venkatasubramanian. 267-272 [doi]
- Performance Issue Diagnosis for Online Service SystemsQiang Fu, Jian-Guang Lou, Qingwei Lin, Rui Ding, Dongmei Zhang, Zihao Ye, Tao Xie. 273-278 [doi]
- An End-to-End Security Auditing Approach for Service Oriented ArchitecturesMehdi Azarmi, Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Norman Ahmed, Asher Sinclair, Mark Linderman, Lotfi Ben Othmane. 279-284 [doi]
- RADAR: Adaptive Rate Allocation in Distributed Stream Processing Systems under Bursty WorkloadsIoannis Boutsis, Vana Kalogeraki. 285-290 [doi]
- Efficient Asynchronous Low Power Listening for Wireless Sensor NetworksRajesh Krishna Panta, James A. Pelletier, Gregg T. Vesonder. 291-300 [doi]
- Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor NetworksMd. Zakirul Alam Bhuiyan, Jiannong Cao, Guojun Wang, Xuefeng Liu. 301-310 [doi]
- Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable LinksMingjun Xiao, Jie Wu 0001, Liusheng Huang. 311-320 [doi]
- Efficient and Reliable Multicast in Multi-radio NetworksRoy Friedman, Alex Kogan. 321-330 [doi]
- Fair Comparison of Gossip Algorithms over Large-Scale Random TopologiesRuijing Hu, Julien Sopena, Luciana Arantes, Pierre Sens, Isabelle M. Demeure. 331-340 [doi]
- A Theory of Packet Flows Based on Law-of-Mass-Action SchedulingThomas Meyer, Christian F. Tschudin. 341-351 [doi]
- HybCAST: Rich Content Dissemination in Hybrid Cellular and 802.11 Ad Hoc NetworksNgoc Minh Do, Cheng-Hsin Hsu, Nalini Venkatasubramanian. 352-361 [doi]
- Reliable Distributed Real-Time and Embedded Systems through Safe Middleware AdaptationAkshay Dabholkar, Abhishek Dubey, Aniruddha S. Gokhale, Gabor Karsai, Nagabhushan Mahadevan. 362-371 [doi]
- Approximation Techniques for Maintaining Real-Time Deployments Informed by User-Provided Dataflows within a CloudJames R. Edmondson, Anirrudha Gokhale, Douglas C. Schmidt. 372-377 [doi]
- Response Time Reliability in Cloud Environments: An Empirical Study of n-Tier Applications at High Resource UtilizationQingyang Wang, Yasuhiko Kanemasa, Jack Li, Deepal Jayasinghe, Motoyuki Kawaba, Calton Pu. 378-383 [doi]
- A Quantitative Comparison of Reactive and Proactive Replicated Storage SystemsRossana Motta, Joseph Pasquale. 384-389 [doi]
- PGV: A Storage Enforcing Remote Verification SchemeMohammad Iftekhar Husain, Steve Uurtamo, Steven Y. Ko, Atri Rudra, Ramalingam Sridhar. 390-395 [doi]
- AAD: Adaptive Anomaly Detection System for Cloud Computing InfrastructuresHusanbir S. Pannu, Jianguo Liu, Song Fu. 396-397 [doi]
- Distributed Monitoring of Temporal System Properties Using Petri NetsOlivier Baldellon, Jean-Charles Fabre, Matthieu Roy. 398-399 [doi]
- Improving the Reliability and Availability of Vehicular Communications Using Voronoi Diagram-Based Placement of Road Side UnitsPrithviraj Patil, Aniruddha S. Gokhale. 400-401 [doi]
- Secure Cloud Browser: Model and Architecture to Support Secure WEB NavigationMarta Palanques, Roberto Di Pietro, Carlos del Ojo, Marcel Malet, Miquel Marino, Toni Felguera. 402-403 [doi]
- Towards Identifying Root Causes of Faults in Service-Based ApplicationsChristian Inzinger, Waldemar Hummer, Benjamin Satzger, Philipp Leitner, Schahram Dustdar. 404-405 [doi]
- Anonymous On-Demand Routing and Secure Checking of Traffic Forwarding for Mobile Ad Hoc NetworksRui Jiang, Yuan Xing. 406-411 [doi]
- Pairwise Key Generation Scheme for Cellular Mobile CommunicationChetan Jaiswal, Vijay Kumar. 412-417 [doi]
- Data De-duplication and Event Processing for Security Applications on an Embedded ProcessorHarsha Nagarajaiah, Shambhu Upadhyaya, Vinodh Gopal. 418-423 [doi]
- Query Plan Execution in a Heterogeneous Stream Management System for Situational AwarenessIndrakshi Ray, Sanjay Kumar Madria, Mark Linderman. 424-429 [doi]
- Private Anonymous MessagingRuchith Fernando, Bharat K. Bhargava, Mark Linderman. 430-435 [doi]
- Regenerating Codes: A System PerspectiveSteve Jiekak, Anne-Marie Kermarrec, Nicolas Le Scouarnec, Gilles Straub, Alexandre van Kempen. 436-441 [doi]
- Banking on Decoupling: Budget-Driven Sustainability for HPC Applications on EC2 Spot InstancesMoussa Taifi. 442-447 [doi]
- On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-CloudsMiguel Correia, Pedro Costa, Marcelo Pasin, Alysson Neves Bessani, Fernando M. V. Ramos, Paulo Veríssimo. 448-453 [doi]
- Byzantine Fault-Tolerant Publish/Subscribe: A Cloud Computing InfrastructureTiancheng Chang, Hein Meling. 454-456 [doi]
- Energy Efficient Hadoop Using Mirrored Data Block Replication PolicySara Arbab Yazd, Subbarayan Venkatesan, Neeraj Mittal. 457-462 [doi]
- Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the ProblemsMehmet Tahir Sandikkaya, Ali Emre Harmanci. 463-468 [doi]
- Versatile Key Management for Secure Cloud StorageSebastian Graf, Patrick Lang, Stefan A. Hohenadel, Marcel Waldvogel. 469-474 [doi]
- Securing a Wireless Networked Control System Using Information FusionBrijesh Kashyap Chejerla, Sanjay Madria. 475-476 [doi]
- Exploring Compile Time Caching of Explicit Queries in Programming CodesVenkata Krishna Suhas Nerella, Sanjay Madria, Thomas Weigert. 477-478 [doi]
- Three Point Encryption (3PE): Secure Communications in Delay Tolerant NetworksRoy Cabaniss, Vimal Kumar, Sanjay Madria. 479-480 [doi]
- TAIRO: Trust-Aware Automatic Incremental Routing for Opportunistic Resource Utilization NetworksJoseph W. Baird. 481-482 [doi]
- Strategies for Reliable, Cloud-Based Distributed Real-Time and Embedded SystemsKyoungho An. 483-484 [doi]
- Towards Reliable Communication in Intelligent Transportation SystemsPrithviraj Patil. 485-486 [doi]
- Reliable On-Chip Memory Design for CMPsAbbas BanaiyanMofrad. 487-488 [doi]