Abstract is missing.
- Observation of Local and Distant Earthquakes and Tsunami Warning SystemMitsuyuki Hoshiba. [doi]
- Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair [doi]
- PDS Steering and Program Committees [doi]
- DCCS Reviewers [doi]
- W.C. Carter Award [doi]
- Conference Organizers [doi]
- Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs [doi]
- PDS Reviewers [doi]
- DCCS Program Committee [doi]
- Welcome Message from the General Chair and Conference Coordinator [doi]
- Assured Reconfiguration of Fail-Stop SystemsElisabeth A. Strunk, John C. Knight, M. Anthony Aiello. 2-11 [doi]
- NonStop® Advanced ArchitectureDavid Bernick, Bill Bruckert, Paul Del Vigna, David García, Robert Jardine, Jim Klecka, Jim Smullen. 12-21 [doi]
- How Fast Can Eventual Synchrony Lead to Consensus?Partha Dutta, Rachid Guerraoui, Leslie Lamport. 22-27 [doi]
- ReStore: Symptom Based Soft Error Detection in MicroprocessorsNicholas J. Wang, Sanjay J. Patel. 30-39 [doi]
- Combining Error Masking and Error Detection Plus Recovery to Combat Soft Errors in Static CMOS CircuitsSrivathsan Krishnamohan, Nihar R. Mahapatra. 40-49 [doi]
- On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP CorePaolo Bernardi, Leticia Maria Veiras Bolzani, Maurizio Rebaudengo, Matteo Sonza Reorda, Fabian Vargas, Massimo Violante. 50-58 [doi]
- User Interface Dependability through Goal-Error PreventionRobert W. Reeder, Roy A. Maxion. 60-69 [doi]
- Stability Monitoring and Analysis of Learning in an Adaptive SystemSampath Yerramalla, Bojan Cukic, Martin Mladenovski, Edgar Fuller. 70-79 [doi]
- Effective Testing and Debugging Techniques for a Group Communication SystemEitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Krits, Roman Vitenberg. 80-85 [doi]
- Error Propagation Profiling of Operating SystemsAndréas Johansson, Neeraj Suri. 86-95 [doi]
- How Resilient are Distributed f Fault/Intrusion-Tolerant Systems?Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo. 98-107 [doi]
- Towards a Theory of Insider Threat AssessmentRamkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya. 108-117 [doi]
- Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection CoordinatorZonghua Zhang, Hong Shen. 118-127 [doi]
- A Model of Stateful Firewalls and Its PropertiesMohamed G. Gouda, Alex X. Liu. 128-137 [doi]
- GoCast: Gossip-Enhanced Overlay Multicast for Fast and Dependable Group CommunicationChunqiang Tang, Rong N. Chang, Christopher Ward. 140-149 [doi]
- SMRP: Fast Restoration of Multicast Sessions from Persistent FailuresJian Wu, Kang G. Shin. 150-159 [doi]
- Efficient Byzantine Broadcast in Wireless Ad-Hoc NetworksVadim Drabkin, Roy Friedman, Marc Segal. 160-169 [doi]
- Internet Routing Anomaly Detection and VisualizationTina Wong, Van Jacobson, Cengiz Alaettinoglu. 172-181 [doi]
- Assessing the Performance of Erasure Codes in the Wide-AreaRebecca L. Collins, James S. Plank. 182-187 [doi]
- Finding Critical Traffic MatricesYin Zhang, Zihui Ge. 188-197 [doi]
- A Distributed State Monitoring Service for Adaptive Application ManagementPaul Murray. 200-205 [doi]
- Definition and Specification of Accrual Failure DetectorsXavier Défago, Péter Urbán, Naohiro Hayashibara, Takuya Katayama. 206-215 [doi]
- The Effects of Algorithmic Diversity on Anomaly Detector PerformanceKymie M. C. Tan, Roy A. Maxion. 216-225 [doi]
- On Partial Protection in Groomed Optical WDM Mesh NetworksJing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam. 228-237 [doi]
- Resilient Routing Layers for Recovery in Packet NetworksAudun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing, Olav Lysne. 238-247 [doi]
- Perturbation-Resistant and Overlay-Independent Resource DiscoverySteven Y. Ko, Indranil Gupta. 248-257 [doi]
- Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating SystemsG. John Janakiraman, Jose Renato Santos, Dinesh Subhraveti, Yoshio Turner. 260-269 [doi]
- A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex ArchitecturesFrançois Taïani, Jean-Charles Fabre, Marc-Olivier Killijian. 270-279 [doi]
- Crash Data Collection: A Windows Case StudyArchana Ganapathi, David A. Patterson. 280-285 [doi]
- Scalable and Robust WLAN Connectivity Using Access Point ArrayFanglu Guo, Tzi-cker Chiueh. 288-297 [doi]
- Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost DependabilityBrendan Hall, Kevin Driscoll, Michael Paulitsch, Samar Dajani-Brown. 298-307 [doi]
- A System Demonstration of ST-TCPManish Marwah, Shivakant Mishra, Christof Fetzer. 308-313 [doi]
- A Data-Centric Approach to Checksum Reuse for Array-Intensive ApplicationsGuilin Chen, Mahmut T. Kandemir, Mustafa Karaköy. 316-325 [doi]
- Small Parity-Check Erasure Codes - Exploration and ObservationsJames S. Plank, Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason. 326-335 [doi]
- Using Erasure Codes Efficiently for Storage in a Distributed SystemMarcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu. 336-345 [doi]
- Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable SystemsMichael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman. 346-355 [doi]
- Authenticated System CallsMohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting. 358-367 [doi]
- Detecting Stealth Software with Strider GhostBusterYi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski. 368-377 [doi]
- Defeating Memory Corruption Attacks via Pointer Taintedness DetectionShuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 378-387 [doi]
- Checking Array Bound Violation Using Segmentation HardwareLap-Chung Lam, Tzi-cker Chiueh. 388-397 [doi]
- Dependability Benchmarking of Computing Systems - Panel StatementCristian Constantinescu, Karama Kanoun, Henrique Madeira, Brendan Murphy, Ira Pramanick, Aaron B. Brown. 400 [doi]
- Fast Byzantine ConsensusJean-Philippe Martin, Lorenzo Alvisi. 402-411 [doi]
- A Hybrid and Adaptive Model for Fault-Tolerant Distributed ComputingSérgio Gorender, Raimundo A. Macêdo, Michel Raynal. 412-421 [doi]
- Adaptive Indulgent ConsensusLívia M. R. Sampaio, Francisco Vilar Brasileiro. 422-431 [doi]
- Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in MicroprocessorsMoinuddin K. Qureshi, Onur Mutlu, Yale N. Patt. 434-443 [doi]
- Reversible Fault-Tolerant LogicP. Oscar Boykin, Vwani P. Roychowdhury. 444-453 [doi]
- Co-Design Based Approach to Improve Robustness in Networked Control SystemsSumant Kowshik, Girish Baliga, Scott Graham, Lui Sha. 454-463 [doi]
- H-RAFT - Heuristic Reachability Analysis for Fault Tolerance Protocols Modelled in SDLSabine M. Böhm. 466-475 [doi]
- Filtering Failure Logs for a BlueGene/L PrototypeYinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Ramendra K. Sahoo, José E. Moreira, Manish Gupta. 476-485 [doi]
- Design Time Reliability Analysis of Distributed Fault Tolerance AlgorithmsElizabeth Latronico, Philip Koopman. 486-495 [doi]
- SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft ErrorsXiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers. 496-505 [doi]
- ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce EnvironmentBingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford. 508-517 [doi]
- Neutralization of Errors and Attacks in Wireless Ad Hoc NetworksClaudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 518-527 [doi]
- Modeling and Automated Containment of WormsSarah H. Sellke, Ness B. Shroff, Saurabh Bagchi. 528-537 [doi]
- Fatih: Detecting and Isolating Malicious RoutersAlper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage. 538-547 [doi]
- Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing SystemsPeter Kemper, Dennis Müller, Axel Thümmler. 550-559 [doi]
- On a Method for Mending Time to Failure DistributionsMichael Grottke, Kishor S. Trivedi. 560-569 [doi]
- A Performability-Oriented Software Rejuvenation Framework for Distributed ApplicationsAnn T. Tai, Kam S. Tso, William H. Sanders, Savio N. Chau. 570-579 [doi]
- Optimizing the Pulsing Denial-of-Service AttacksXiapu Luo, Rocky K. C. Chang. 582-591 [doi]
- Towards a Security Benchmark for Database Management SystemsMarco Vieira, Henrique Madeira. 592-601 [doi]
- An Experimental Evaluation to Determine if Port Scans are Precursors to an AttackSusmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier. 602-611 [doi]
- LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless NetworksIssa Khalil, Saurabh Bagchi, Ness B. Shroff. 612-621 [doi]
- Experimental Evaluation of the QoS of Failure Detectors on Wide Area NetworkLorenzo Falai, Andrea Bondavalli. 624-633 [doi]
- Probabilistic QoS Guarantees for Supercomputing SystemsAdam J. Oliner, Larry Rudolph, Ramendra K. Sahoo, José E. Moreira, Manish Gupta. 634-643 [doi]
- Ensembles of Models for Automated Diagnosis of System Performance ProblemsSteve Zhang, Ira Cohen, Moisés Goldszmidt, Julie Symons, Armando Fox. 644-653 [doi]
- A Framework for Node-Level Fault Tolerance in Distributed Real-Time SystemsJoakim Aidemark, Peter Folkesson, Johan Karlsson. 656-665 [doi]
- Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial VehiclesJonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson. 666-671 [doi]
- TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor NetworksMark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu. 672-681 [doi]
- Improving TCP Performance for Multihop Wireless NetworksSherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon. 684-693 [doi]
- A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor NetworksMarco Gribaudo, Carla-Fabiana Chiasserini, Rossano Gaeta, Michele Garetto, Daniele Manini, Matteo Sereno. 694-703 [doi]
- Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring NetworksHenrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen. 704-709 [doi]
- A Novel Approach for Fitting Probability Distributions to Real Trace Data with the EM AlgorithmAxel Thümmler, Peter Buchholz, Miklós Telek. 712-721 [doi]
- Model Checking Markov Reward Models with Impulse RewardsLucia Cloth, Joost-Pieter Katoen, Maneesh Khattri, Reza Pulungan. 722-731 [doi]
- A Wavefront Parallelisation of CTMC Solution Using MTBDDsYi Zhang, David Parker, Marta Z. Kwiatkowska. 732-741 [doi]
- Lumping Matrix Diagram Representations of Markov ModelsSalem Derisavi, Peter Kemper, William H. Sanders. 742-751 [doi]
- Neutron SER Characterization of MicroprocessorsCristian Constantinescu. 754-759 [doi]
- Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential LogicGiacinto Paolo Saggese, Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 760-769 [doi]
- Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register FilesGokhan Memik, Masud H. Chowdhury, Arindam Mallik, Yehea I. Ismail. 770-779 [doi]
- Analysis of Probabilistic Trapezoid Protocol for Data ReplicationTabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki. 782-791 [doi]
- Testing the Dependability and Performance of Group Communication Based Database Replication ProtocolsA. Sousa, José Pereira, L. Soares, Alfrânio Correia Jr., L. Rocha, Rui Carlos Oliveira, Francisco Moura. 792-801 [doi]
- Model-Based Failure Analysis of Journaling File SystemsVijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 802-811 [doi]
- Modeling Coordinated Checkpointing for Large-Scale SupercomputersLong Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood. 812-821 [doi]
- Workshop on Dependable Software - Tools and Methods - Workshop AbstractTakuya Katayama, Yutaka Ishikawa, Yoshiki Kinoshita. 824 [doi]
- Workshop on Hot Topics in System Depend - Workshop AbstractGeorge Candea, David L. Oppenheimer. 826-827 [doi]
- Workshop on Assurance of Networking Systems Dependability Service Level Agreements - Workshop AbstractSaïda Benlarbi. 830 [doi]