307 | -- | 317 | Silvio Cesare, Yang Xiang, Wanlei Zhou. Control Flow-Based Malware VariantDetection |
318 | -- | 331 | Pietro Colombo, Elena Ferrari. Enforcing Obligations within RelationalDatabase Management Systems |
332 | -- | 344 | Fengwei Zhang, Jiang Wang, Kun Sun, Angelos Stavrou. HyperCheck: A Hardware-AssistedIntegrity Monitor |
345 | -- | 360 | Shu Yin, Xiaojun Ruan, Adam Manzanares, Xiao Qin, Kenli Li. MINT: A Reliability Modeling Frameworkfor Energy-Efficient Parallel Disk Systems |
361 | -- | 374 | Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou. Modeling and Analysis on the Propagation Dynamics of Modern Email Malware |
375 | -- | 389 | Ruofan Xia, Xiaoyan Yin, Javier Alonso Lopez, Fumio Machida, Kishor S. Trivedi. Performance and Availability Modeling of ITSystems with Data Backup and Restore |
390 | -- | 391 | Wenhong Tian, Yu Chen, Xinyang Wang. A Note on "Orchestrating an Ensemble of MapReduce Jobs for Minimizing Their Makespan" |
392 | -- | 398 | Kyuseung Han, Ganghee Lee, Kiyoung Choi. Software-Level Approaches for Tolerating Transient Faults in a Coarse-GrainedReconfigurable Architecture |