Abstract is missing.
- Scalable RFID systems: a privacy-preserving protocol with constant-time identificationBasel Alomair, Andrew Clark, Jorge Cuéllar, Radha Poovendran. 1-10 [doi]
- Detecting selfish carrier-sense behavior in WiFi networks by passive monitoringUtpal Paul, Samir R. Das, Ritesh Maheshwari. 11-20 [doi]
- Detecting Sybil nodes in wireless networks with physical layer network codingWeichao Wang, Di Pu, Alexander M. Wyglinski. 21-30 [doi]
- Observable non-Sybil quorums construction in one-hop wireless ad hoc networksDiogo Mónica, João Leitão, Luís Rodrigues, Carlos Ribeiro. 31-40 [doi]
- Reliable MLC NAND flash memories based on nonlinear t-error-correcting codesZhen Wang, Mark G. Karpovsky, Ajay Joshi. 41-50 [doi]
- Code-M: A non-MDS erasure code scheme to support fast recovery from up to two-disk failures in storage systemsShenggang Wan, Qiang Cao, Changsheng Xie, Benjamin Eckart, Xubin He. 51-60 [doi]
- Decoding STAR code for tolerating simultaneous disk failure and silent errorsJianqiang Luo, Cheng Huang, Lihao Xu. 61-70 [doi]
- Diverse Partial Memory ReplicationRyan M. Lefever, Vikram S. Adve, William H. Sanders. 71-80 [doi]
- Data recovery for web applicationsIstemi Ekin Akkus, Ashvin Goel. 81-90 [doi]
- Programming support and adaptive checkpointing for high-throughput data services with log-based recoveryJingyu Zhou, Caijie Zhang, Hong Tang, Jiesheng Wu, Tao Yang. 91-100 [doi]
- StageWeb: Interweaving pipeline stages into a wearout and variation tolerant CMP fabricShantanu Gupta, Amin Ansari, Shuguang Feng, Scott A. Mahlke. 101-110 [doi]
- Architecting reliable multi-core network-on-chip for small scale processing technologyXin Fu, Tao Li, José A. B. Fortes. 111-120 [doi]
- Energy-efficient fault tolerance in chip multiprocessors using Critical Value ForwardingPramod Subramanyan, Virendra Singh, Kewal K. Saluja, Erik Larsson. 121-130 [doi]
- A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems designMahdi Fazeli, Seyed Ghassem Miremadi, Hossein Asadi, Seyed Nematollah Ahmadian. 131-140 [doi]
- Bit-slice logic interleaving for spatial multi-bit soft-error toleranceNishant J. George, Carl R. Elks, Barry W. Johnson, John Lach. 141-150 [doi]
- WearMon: Reliability monitoring using adaptive critical path testingBardia Zandian, Waleed Dweik, Suk Hun Kang, Thomas Punihaole, Murali Annavaram. 151-160 [doi]
- A numerical optimization-based methodology for application robustification: Transforming applications for error toleranceJoseph Sloan, David Kesler, Rakesh Kumar, Ali Rahimi. 161-170 [doi]
- Blue Banana: resilience to avatar mobility in distributed MMOGsSergey Legtchenko, Sébastien Monnet, Gaël Thomas. 171-180 [doi]
- Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archiveEric Anderson, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph Tucek, Mustafa Uysal, Jay J. Wylie. 181-190 [doi]
- Using correlated surprise to infer shared influenceAdam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken. 191-200 [doi]
- Keystroke biometrics with number-pad inputRoy A. Maxion, Kevin S. Killourhy. 201-210 [doi]
- Using Bayesian networks for cyber security analysisPeng Xie, Jason H. Li, Xinming Ou, Peng Liu, Renato Levy. 211-220 [doi]
- A study of the internal and external effects of concurrency bugsPedro Fonseca, Cheng Li, Vishal Singhal, Rodrigo Rodrigues. 221-230 [doi]
- AutomaDeD: Automata-based debugging for dissimilar parallel tasksGreg Bronevetsky, Ignacio Laguna, Saurabh Bagchi, Bronis R. de Supinski, Dong H. Ahn, Martin Schulz. 231-240 [doi]
- Detecting vulnerabilities in C programs using trace-based testingDazhi Zhang, Donggang Liu, Yu Lei, David Chenho Kung, Christoph Csallner, Wenhua Wang. 241-250 [doi]
- Mash-IF: Practical information-flow control within client-side mashupsZhou Li, Kehuan Zhang, Xiaofeng Wang. 251-260 [doi]
- DataGuard: Dynamic data attestation in wireless sensor networksDazhi Zhang, Donggang Liu. 261-270 [doi]
- iProve: A scalable technique for consumer-verifiable software guaranteesSilviu Andrica, Horatiu Jula, George Candea. 271-280 [doi]
- Reuse-oriented camouflaging trojan: Vulnerability detection and attack constructionZhiqiang Lin, Xiangyu Zhang, Dongyan Xu. 281-290 [doi]
- Detection of botnets using combined host- and network-level informationYuanyuan Zeng, Xin Hu, Kang G. Shin. 291-300 [doi]
- Dependable connection setup for network capabilitiesSoo Bum Lee, Virgil D. Gligor, Adrian Perrig. 301-310 [doi]
- Why software hangs and what can be done with itXiang Song, Haibo Chen, Binyu Zang. 311-316 [doi]
- Finding stable cliques of PlanetLab nodesElias Procópio Duarte Jr., Thiago Garrett, Luis C. E. Bona, Renato Carmo, Alexandre P. Züge. 317-322 [doi]
- Who is peeping at your passwords at Starbucks? - To catch an evil twin access pointYimin Song, Chao Yang, Guofei Gu. 323-332 [doi]
- Improving privacy and lifetime of PCM-based main memoryJingfei Kong, Huiyang Zhou. 333-342 [doi]
- Generic construction of consensus algorithms for benign and Byzantine faultsOlivier Rütti, Zarko Milosevic, André Schiper. 343-352 [doi]
- Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicasMarco Serafini, Péter Bokor, Dan Dobre, Matthias Majuntke, Neeraj Suri. 353-362 [doi]
- Zzyzx: Scalable fault tolerance through Byzantine lockingJames Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter. 363-372 [doi]
- Doubly-expedited one-step Byzantine consensusNazreen Banu, Taisuke Izumi, Koichi Wada. 373-382 [doi]
- A passive approach to wireless device fingerprintingKe Gao, Cherita Corbett, Raheem Beyah. 383-392 [doi]
- Exploiting diverse observation perspectives to get insights on the malware landscapeCorrado Leita, Ulrich Bayer, Engin Kirda. 393-402 [doi]
- Combined performance and risk analysis for border management applicationsMayra Sacanamboy, Bojan Cukic. 403-412 [doi]
- Experimental validation of a fault tolerant microcomputer system against intermittent faultsJoaquin Gracia-Moran, Daniel Gil-Tomas, Luis J. Saiz-Adalid, Juan Carlos Baraza, Pedro J. Gil-Vicente. 413-418 [doi]
- Evaluating repair strategies for a water-treatment facility using ArcadeBoudewijn R. Haverkort, Matthias Kuntz, Anne Remke, S. Roolvink, Mariëlle Stoelinga. 419-424 [doi]
- Application of a fault injection based dependability assessment process to a commercial safety critical nuclear reactor protection systemCarl R. Elks, Michael Reynolds, Nishant J. George, Marko Miklo, Scott Bingham, Ron Williams, Barry W. Johnson, Michael Waterman, Jeanne Dion. 425-430 [doi]
- Measurement-based analysis of fault and error sensitivities of dynamic memoryKeun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 431-436 [doi]
- Representativeness analysis of injected software faults in complex softwareRoberto Natella, Domenico Cotroneo, João Durães, Henrique Madeira. 437-446 [doi]
- An empirical investigation of fault types in space mission system softwareMichael Grottke, Allen P. Nikora, Kishor S. Trivedi. 447-456 [doi]
- Assessing and improving the effectiveness of logs for the analysis of software faultsMarcello Cinque, Domenico Cotroneo, Roberto Natella, Antonio Pecchia. 457-466 [doi]
- Statistical guarantees of performance for MIMO designsJayanand Asok Kumar, Shobha Vasudevan. 467-476 [doi]
- Transient fault models and AVF estimation revisitedNishant J. George, Carl R. Elks, Barry W. Johnson, John Lach. 477-486 [doi]
- A unified model for timing speculation: Evaluating the impact of technology scaling, CMOS design style, and fault recovery mechanismMarc de Kruijf, Shuou Nomura, Karthikeyan Sankaralingam. 487-496 [doi]
- Performance and availability aware regeneration for cloud based multitier applicationsGueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, Calton Pu. 497-506 [doi]
- Adaptive on-line software aging prediction based on machine learningJavier Alonso, Jordi Torres, Josep Lluis Berral, Ricard Gavaldà. 507-516 [doi]
- Correlating failures with asynchronous changes for root cause analysis in enterprise environmentsManoj K. Agarwal, Venkateswara Reddy Madduri. 517-526 [doi]
- Ring Paxos: A high-throughput atomic broadcast protocolParisa Jalili Marandi, Marco Primi, Nicolas Schiper, Fernando Pedone. 527-536 [doi]
- Turquois: Byzantine consensus in wireless ad hoc networksHenrique Moniz, Nuno Ferreira Neves, Miguel Correia. 537-546 [doi]
- Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluationAnn T. Tai, Kam S. Tso, William H. Sanders. 547-556 [doi]
- GOOFI-2: A tool for experimental dependability assessmentDaniel Skarin, Raul Barbosa, Johan Karlsson. 557-562 [doi]
- Studying application-library interaction and behavior with LibTracEric Bisolfati, Paul Dan Marinescu, George Candea. 563-568 [doi]
- Experiences with a CANoe-based fault injection framework for AUTOSARPatrick E. Lanigan, Priya Narasimhan, Thomas E. Fuhrman. 569-574 [doi]
- Empirical characterization of uncongested optical lambda networks and 10GbE commodity endpointsTudor Marian, Daniel A. Freedman, Ken Birman, Hakim Weatherspoon. 575-584 [doi]
- On/off process modeling of IP network failuresPirkko Kuusela, Ilkka Norros. 585-594 [doi]
- An automated technique to support the verification and validation of simulation modelsSamuel K. Klock, Peter Kemper. 595-604 [doi]
- Model checking CSL:::TA::: with Deterministic and Stochastic Petri NetsElvio Gilberto Amparore, Susanna Donatelli. 605-614 [doi]
- 1:::st::: workshop on fault-tolerance for HPC at extreme scale FTXS 2010John T. Daly, Nathan DeBardeleben. 615 [doi]
- Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM)Miroslaw Malek, Felix Salfner, Kishor S. Trivedi. 616-618 [doi]
- Fourth workshop on dependable and secure nanocomputingJean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis. 619-620 [doi]
- 4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010Miguel Correia, Pratha Pal. 621-622 [doi]