Abstract is missing.
- Science and Engineering: A Collusion of CulturesTony Hoare. 2-9 [doi]
- Augmenting Branch Predictor to Secure Program ExecutionYixin Shi, Gyungho Lee. 10-19 [doi]
- A Firewall for Routers: Protecting against Routing MisbehaviorYing Zhang, Zhuoqing Morley Mao, Jia Wang. 20-29 [doi]
- An Architectural Approach to Preventing Code Injection AttacksRyan Riley, Xuxian Jiang, Dongyan Xu. 30-40 [doi]
- Failure Resilience for Device DriversJorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum. 41-50 [doi]
- Fault Tolerance Connectors for Unreliable Web ServicesNicolas Salatge, Jean-Charles Fabre. 51-60 [doi]
- Robustness and Security Hardening of COTS Software LibrariesMartin Süßkraut, Christof Fetzer. 61-71 [doi]
- Automatic Verification and Discovery of Byzantine Consensus ProtocolsPiotr Zielinski. 72-81 [doi]
- Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown NetworksFabíola Greve, Sébastien Tixeuil. 82-91 [doi]
- Communication Predicates: A High-Level Abstraction for Coping with Transient and Dynamic FaultsMartin Hutle, André Schiper. 92-101 [doi]
- Synchronous Consensus with Mortal ByzantinesJosef Widder, Günther Gridling, Bettina Weiss, Jean-Paul Blanquart. 102-112 [doi]
- Reliability Techniques for RFID-Based Object Tracking ApplicationsAhmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittwik Jana. 113-118 [doi]
- Profiling Attacker Behavior Following SSH CompromisesDaniel Ramsbrock, Robin Berthier, Michel Cukier. 119-124 [doi]
- Dependability Assessment of Grid MiddlewareNik Looker, Jie Xu. 125-130 [doi]
- Assessing Robustness of Web-Services InfrastructuresMarco Vieira, Nuno Laranjeiro, Henrique Madeira. 131-136 [doi]
- Protecting Cryptographic Keys from Memory Disclosure AttacksKeith Harrison, Shouhuai Xu. 137-143 [doi]
- Fault Tolerant Planning for Critical RobotsBenjamin Lussier, Matthieu Gallien, Jérémie Guiochet, Félix Ingrand, Marc-Olivier Killijian, David Powell. 144-153 [doi]
- Insights into the Sensitivity of the BRAIN (Braided Ring Availability Integrity Network) - On Platform Robustness in Extended OperationMichael Paulitsch, Brendan Hall. 154-163 [doi]
- A Tunable Add-On Diagnostic Protocol for Time-Triggered SystemsMarco Serafini, Neeraj Suri, Jonny Vinter, Astrit Ademaj, Wolfgang Brandstatter, Fulvio Tagliabo, Jens Koch. 164-174 [doi]
- Enhanced Reliability Modeling of RAID Storage SystemsJon G. Elerath, Michael Pecht. 175-184 [doi]
- On a Modeling Framework for the Analysis of Interdependencies in Electric Power SystemsSilvano Chiaradonna, Paolo Lollini, Felicita Di Giandomenico. 185-195 [doi]
- Superscalar Processor Performance Enhancement through Reliable Dynamic Clock Frequency TuningViswanathan Subramanian, Mikel Bezdek, Naga D. Avirneni, Arun K. Somani. 196-205 [doi]
- Determining Fault Tolerance of XOR-Based Erasure Codes EfficientlyJay J. Wylie, Ram Swaminathan. 206-215 [doi]
- Fault Tolerant Approaches to Nanoelectronic Programmable Logic ArraysWenjing Rao, Alex Orailoglu, Ramesh Karri. 216-224 [doi]
- Concilium: Collaborative Diagnosis of Broken Overlay RoutesJames W. Mickens, Brian D. Noble. 225-234 [doi]
- R-Sentry: Providing Continuous Sensor Services against Random Node FailuresShengchao Yu, Yanyong Zhang. 235-244 [doi]
- A Fast Rejuvenation Technique for Server Consolidation with Virtual MachinesKenichi Kourai, Shigeru Chiba. 245-255 [doi]
- A Cost-Effective Dependable Microcontroller Architecture with Instruction-Level Rollback for Soft Error RecoveryTeruaki Sakata, Teppei Hirotsu, Hiromichi Yamada, Takeshi Kataoka. 256-265 [doi]
- Architecture-Level Soft Error Analysis: Examining the Limits of Common AssumptionsXiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers. 266-275 [doi]
- Feedback Redundancy: A Power Efficient SEU-Tolerant Latch Design for Deep Sub-Micron TechnologiesMahdi Fazeli, Ahmad Patooghy, Seyed Ghassem Miremadi, Alireza Ejlali. 276-285 [doi]
- Using Register Lifetime Predictions to Protect Register Files against Soft ErrorsPablo Montesinos, Wei Liu, Josep Torrellas. 286-296 [doi]
- Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault ToleranceAlex Shye, Tipp Moseley, Vijay Janapa Reddi, Joseph Blomstedt, Daniel A. Connors. 297-306 [doi]
- Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault ToleranceVimal K. Reddy, Eric Rotenberg. 307-316 [doi]
- Utilizing Dynamically Coupled Cores to Form a Resilient Chip MultiprocessorChristopher LaFrieda, Engin Ipek, José F. Martínez, Rajit Manohar. 317-326 [doi]
- BlackJack: Hard Error Detection with Redundant Threads on SMTEthan Schuchman, T. N. Vijaykumar. 327-337 [doi]
- Confidence: Its Role in Dependability Cases for Risk AssessmentRobin E. Bloomfield, Bev Littlewood, David Wright. 338-346 [doi]
- Assurance Based Development of Critical SystemsPatrick J. Graydon, John C. Knight, Elisabeth A. Strunk. 347-357 [doi]
- Multiprocessors May Reduce System Dependability under File-Based Race Condition AttacksJinpeng Wei, Calton Pu. 358-367 [doi]
- Understanding Resiliency of Internet Topology against Prefix Hijack AttacksMohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Lixia Zhang. 368-377 [doi]
- User Discrimination through Structured Writing on PDAsRachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad. 378-388 [doi]
- How to Choose a Timing Model?Idit Keidar, Alexander Shraer. 389-398 [doi]
- Electing an Eventual Leader in an Asynchronous Shared Memory SystemAntonio Fernández, Ernesto Jiménez, Michel Raynal. 399-408 [doi]
- Minimizing Response Time for Quorum-System Protocols over Wide-Area NetworksFlorian Oprea, Michael K. Reiter. 409-418 [doi]
- HyParView: A Membership Protocol for Reliable Gossip-Based BroadcastJoao Leitao, José Pereira, Luís Rodrigues. 419-429 [doi]
- A Lightweight Mechanism for Dependable Communication in Untrusted NetworksMichael Rogers, Saleem Bhatti. 430-439 [doi]
- Dynamic Cross-Realm Authentication for Multi-Party Service InteractionsDacheng Zhang, Jie Xu, Xianxian Li. 440-449 [doi]
- Enhancing DNS Resilience against Denial of Service AttacksVasileios Pappas, Daniel Massey, Lixia Zhang. 450-459 [doi]
- Automatic Cookie Usage Setting with CookiePickerChuan Yue, Mengjun Xie, Haining Wang. 460-470 [doi]
- Greedy Receivers in IEEE 802.11 HotspotsMi Kyung Han, Brian Overstreet, Lili Qiu. 471-480 [doi]
- Emergent Structure in Unstructured Epidemic MulticastNuno Carvalho, José Pereira, Rui Carlos Oliveira, Luís Rodrigues. 481-490 [doi]
- The Case for FEC-Based Reliable Multicast in Wireless Mesh NetworksDimitrios Koutsonikolas, Y. Charlie Hu. 491-501 [doi]
- On the Selection of Error Model(s) for OS Robustness EvaluationAndréas Johansson, Neeraj Suri, Brendan Murphy. 502-511 [doi]
- Experimental Risk Assessment and Comparison Using Software Fault InjectionRegina L. O. Moraes, João Durães, R. Barbosa, Eliane Martins, Henrique Madeira. 512-521 [doi]
- Foundations of Measurement Theory Applied to the Evaluation of Dependability AttributesAndrea Bondavalli, Andrea Ceccarelli, Lorenzo Falai, Michele Vadursi. 522-533 [doi]
- A Framework for Architecture-Level Lifetime Reliability ModelingJeonghee Shin, Victor V. Zyuban, Zhigang Hu, Jude A. Rivers, Pradip Bose. 534-543 [doi]
- Processor-Level Selective ReplicationNithin Nakka, Karthik Pattabiraman, Ravishankar K. Iyer. 544-553 [doi]
- Robustness Testing of the Windows DDKManuel Mendonça, Nuno Neves. 554-564 [doi]
- SLAM: Sleep-Wake Aware Local Monitoring in Sensor NetworksIssa Khalil, Saurabh Bagchi, Ness B. Shroff. 565-574 [doi]
- What Supercomputers Say: A Study of Five System LogsAdam J. Oliner, Jon Stearley. 575-584 [doi]
- How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart PhonesMarcello Cinque, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 585-594 [doi]
- A Real-Time Network Traffic Profiling SystemKuai Xu, Feng Wang 0002, Supratik Bhattacharyya, Zhi-Li Zhang. 595-605 [doi]
- RAS by the YardAlan Wood, Swami Nathan. 606-611 [doi]
- Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web ServicesMarcelo De Barros, Jing Shiau, Chen Shang, Kenton Gidewall, Hui Shi, Joe Forsmann. 612-617 [doi]
- Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant SystemsXi Chen, Juejing Feng, Martin Hiller, Vera Lauer. 618-624 [doi]
- Evaluating the Impact of Simultaneous Round Participation and Decentralized Decision on the Performance of ConsensusLívia M. R. Sampaio, Michel Hurfin, Francisco Vilar Brasileiro, Fabíola Greve. 625-634 [doi]
- On the Cost of Modularity in Atomic BroadcastOlivier Rütti, Sergio Mena, Richard Ekwall, André Schiper. 635-644 [doi]
- Eventually k-Bounded Wait-Free Distributed DaemonsYantao Song, Scott M. Pike. 645-655 [doi]
- Measuring Availability in Optimistic Partition-Tolerant Systems with Data ConstraintsMikael Asplund, Simin Nadjm-Tehrani, Stefan Beyer, Pablo Galdámez. 656-665 [doi]
- Scaling and Continuous Availability in Database Server Clusters through Multiversion ReplicationKaloian Manassiev, Cristiana Amza. 666-676 [doi]
- Improving Recoverability in Multi-tier Storage SystemsMarcos Kawazoe Aguilera, Kimberly Keeton, Arif Merchant, Kiran-Kumar Muniswamy-Reddy, Mustafa Uysal. 677-686 [doi]
- Portable and Efficient Continuous Data Protection for Network File ServersNingning Zhu, Tzi-cker Chiueh. 687-697 [doi]
- Variational Bayesian Approach for Interval Estimation of NHPP-Based Software Reliability ModelsHiroyuki Okamura, Michael Grottke, Tadashi Dohi, Kishor S. Trivedi. 698-707 [doi]
- Dynamic Fault Tree Analysis Using Input/Output Interactive Markov ChainsHichem Boudali, Pepijn Crouzen, Mariëlle Stoelinga. 708-717 [doi]
- Uniformity by Construction in the Analysis of Nondeterministic Stochastic SystemsHolger Hermanns, Sven Johr. 718-728 [doi]
- A Reinforcement Learning Approach to Automatic Error RecoveryQijun Zhu, Chun Yuan. 729-738 [doi]
- On the Quality of Service of Crash-Recovery Failure DetectorsTiejun Ma, Jane Hillston, Stuart Anderson. 739-748 [doi]
- E2EProf: Automated End-to-End Performance Management for Enterprise SystemsSandip Agarwala, Fernando Alegre, Karsten Schwan, Jegannathan Mehalingham. 749-758 [doi]
- Bounding Peer-to-Peer Upload Traffic in Client NetworksChun-Ying Huang, Chin-Laung Lei. 759-769 [doi]
- Performability Models for Multi-Server Systems with High-Variance Repair DurationsHans-Peter Schwefel, Imad Antonios. 770-779 [doi]
- Computing Battery Lifetime DistributionsLucia Cloth, Marijn R. Jongerden, Boudewijn R. Haverkort. 780-789 [doi]
- Quantifying the Effectiveness of Mobile Phone Virus Response MechanismsElizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens. 790-800 [doi]
- DSN 2007 TutorialsLuís Rodrigues. 801 [doi]
- DSN 2007 WorkshopsChristof Fetzer. 802 [doi]
- Workshop on Dependable Application Support for Self-Organizing Networks (DASSON 2007)Paul D. Ezhilchelvan, Michel Raynal, Ajoy Kumar Datta. 803 [doi]
- Third Workshop on Hot Topics in System Dependability HotDep 07Miguel Castro, John Wilkes. 804 [doi]
- Workshop on Architecting Dependable Systems (WADS 2007)Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek. 805-806 [doi]
- Assurance Cases for Security: The Metrics ChallengeRobin E. Bloomfield, Marcelo Masera, Ann Miller, O. Sami Saydjari, Charles B. Weinstock. 807-808 [doi]
- Workshop on Dependable and Secure NanocomputingJean Arlat, Ravishankar K. Iyer, Michael Nicolaidis. 809-810 [doi]
- Student ForumFarnam Jahanian. 811 [doi]
- Fast AbstractsHiroshi Nakamura. 812 [doi]
- The National Programme for Information Technology in the UK Health Service: Dependability Challenges and StrategiesBrian Randell. 813 [doi]
- Industry SessionLisa Spainhower. 814 [doi]