Abstract is missing.
- Uni-directional trusted path: Transaction confirmation on just one deviceAtanas Filyanov, Jonathan M. McCune, Ahmad-Reza Sadeghi, Marcel Winandy. 1-12 [doi]
- Boundless memory allocations for memory safety and high availabilityMarc Brunink, Martin Süßkraut, Christof Fetzer. 13-24 [doi]
- A methodology for the generation of efficient error detection mechanismsMatthew Leeke, Saima Arif, Arshad Jhumka, Sarabjot Singh Anand. 25-36 [doi]
- Fault tolerant WSN-based structural health monitoringX. Liu, J. Cao, M. Bhuiyan, S. Lai, H. Wu, G. Wang. 37-48 [doi]
- Online detection of multi-component interactions in production systemsAdam J. Oliner, Alex Aiken. 49-60 [doi]
- An empirical study of the performance, security and privacy implications of domain name prefetchingSrinivas Krishnan, Fabian Monrose. 61-72 [doi]
- Efficient model checking of fault-tolerant distributed protocolsPéter Bokor, Johannes Kinder, Marco Serafini, Neeraj Suri. 73-84 [doi]
- Unified debugging of distributed systems with ReconKyu Hyung Lee, Nick Sumner, Xiangyu Zhang, Patrick Eugster. 85-96 [doi]
- Improving Log-based Field Failure Data Analysis of multi-node computing systemsAntonio Pecchia, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 97-108 [doi]
- An analysis of signature overlaps in Intrusion Detection SystemsFrédéric Massicotte, Yvan Labiche. 109-120 [doi]
- Detecting stealthy P2P botnets using statistical traffic fingerprintsJunjie Zhang, Roberto Perdisci, Wenke Lee, Unum Sarfraz, Xiapu Luo. 121-132 [doi]
- Applying game theory to analyze attacks and defenses in virtual coordinate systemsSheila Becker, Jeff Seibert, David Zage, Cristina Nita-Rotaru, Radu State. 133-144 [doi]
- CEC: Continuous eventual checkpointing for data stream processing operatorsZoe Sebepou, Kostas Magoutis. 145-156 [doi]
- Coercing clients into facilitating failover for object deliveryWyatt Lloyd, Michael J. Freedman. 157-168 [doi]
- Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recoveryKazuya Yamakita, Hiroshi Yamada, Kenji Kono. 169-180 [doi]
- Communix: A framework for collaborative deadlock immunityHoratiu Jula, Pinar Tözün, George Candea. 181-188 [doi]
- CloudVal: A framework for validation of virtualization environment in cloud infrastructureCuong Pham, Daniel Chen, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 189-196 [doi]
- Helmet: A resistance drift resilient architecture for multi-level cell phase change memory systemWangyuan Zhang, Tao Li. 197-208 [doi]
- HDP code: A Horizontal-Diagonal Parity Code to Optimize I/O load balancing in RAID-6Chentao Wu, Xubin He, Guanying Wu, Shenggang Wan, Xiaohua Liu, Qiang Cao, Changsheng Xie. 209-220 [doi]
- LLS: Cooperative integration of wear-leveling and salvaging for PCM main memoryLei Jiang, Yu Du, Youtao Zhang, Bruce R. Childers, Jun Yang 0002. 221-232 [doi]
- Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routingEdmund L. Wong, Vitaly Shmatikov. 233-244 [doi]
- Zab: High-performance broadcast for primary-backup systemsFlavio Paiva Junqueira, Benjamin C. Reed, Marco Serafini. 245-256 [doi]
- Deadline-aware scheduling for Software Transactional MemoryWalther Maldonado, Patrick Marlier, Pascal Felber, Julia L. Lawall, Gilles Muller, Etienne Riviere. 257-268 [doi]
- A combinatorial approach to detecting buffer overflow vulnerabilitiesWenhua Wang, Yu Lei, Donggang Liu, David Chenho Kung, Christoph Csallner, Dazhi Zhang, Raghu Kacker, Rick Kuhn. 269-278 [doi]
- Cross-layer resilience using wearout aware design flowBardia Zandian, Murali Annavaram. 279-290 [doi]
- Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessorsShuchang Shan, Yu Hu, Xiaowei Li 0001. 291-302 [doi]
- Fault injection-based assessment of aspect-oriented implementation of fault toleranceRuben Alexandersson, Johan Karlsson. 303-314 [doi]
- A framework for early stage quality-fault tolerance analysis of embedded control systemsSatya Gautam Vadlamudi, P. P. Chakrabarti, Dipankar Das 0002, Purnendu Sinha. 315-322 [doi]
- Characterization of logical masking and error propagation in combinational circuits and effects on system vulnerabilityNishant J. George, John Lach. 323-334 [doi]
- A scalable availability model for Infrastructure-as-a-Service cloudFrancesco Longo, Rahul Ghosh, Vijay K. Naik, Kishor S. Trivedi. 335-346 [doi]
- Modeling and evaluating targeted attacks in large scale dynamic systemsEmmanuelle Anceaume, Bruno Sericola, Romaric Ludinard, Frederic Tronel. 347-358 [doi]
- Incremental quantitative verification for Markov decision processesMarta Z. Kwiatkowska, David Parker, Hongyang Qu. 359-370 [doi]
- Hypervisor-assisted application checkpointing in virtualized environmentsMin Lee, A. S. Krishnakumar, Parameshwaran Krishnan, Navjot Singh, Shalini Yajnik. 371-382 [doi]
- OS diversity for intrusion tolerance: Myth or reality?Miguel Garcia, Alysson Neves Bessani, Ilir Gashi, Nuno Ferreira Neves, Rafael R. Obelheiro. 383-394 [doi]
- Resource and virtualization costs up in the cloud: Models and design choicesDaniel Gmach, Jerry Rolia, Ludmila Cherkasova. 395-402 [doi]
- WaRR: A tool for high-fidelity web application record and replaySilviu Andrica, George Candea. 403-410 [doi]
- Aaron: An adaptable execution environmentMarc Brunink, André Schmitt, Thomas Knauth, Martin Süßkraut, Ute Schiffel, Stephan Creutz, Christof Fetzer. 411-421 [doi]
- Toward dependability benchmarking of partitioning operating systemsRaul Barbosa, Johan Karlsson, Qiu Yu, Xiaozhen Mao. 422-429 [doi]
- Modeling stream processing applications for dependability evaluationGabriela Jacques-Silva, Zbigniew Kalbarczyk, Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Ravishankar K. Iyer. 430-441 [doi]
- Modeling and analysis of the impact of failures in Electric Power Systems organized in interconnected regionsSilvano Chiaradonna, Felicita Di Giandomenico, Nicola Nostro. 442-453 [doi]
- High performance state-machine replicationParisa Jalili Marandi, Marco Primi, Fernando Pedone. 454-465 [doi]
- How secure are networked office devices?Edward Condon, Emily Cummins, Zaïna Afoulki, Michel Cukier. 465-472 [doi]
- A combinatorial approach to network covert communications with applications in Web LeaksXiapu Luo, Peng Zhou, Edmond W. W. Chan, Rocky K. C. Chang, Wenke Lee. 474-485 [doi]
- Crash graphs: An aggregated view of multiple crashes to improve crash triageSunghun Kim, Thomas Zimmermann, Nachiappan Nagappan. 486-493 [doi]
- Amplifying limited expert input to sanitize large network tracesXin Huang, Fabian Monrose, Michael K. Reiter. 494-505 [doi]
- Analysis of security data from a large computing organizationAashish Sharma, Zbigniew Kalbarczyk, James Barlow, Ravishankar K. Iyer. 506-517 [doi]
- Coerced Cache Eviction and discreet mode journaling: Dealing with misbehaving disksAbhishek Rajimwale, Vijay Chidambaram, Deepak Ramamurthi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau. 518-529 [doi]
- Impact of temperature on hard disk drive reliability in large datacentersSriram Sankar, Mark Shaw, Kushagra Vaid. 530-537 [doi]
- Merging ultra-low duty cycle networksMatthew Dobson, Spyros Voulgaris, Maarten van Steen. 538-549 [doi]
- Modeling time correlation in passive network loss tomographyJin Cao, Aiyou Chen, Patrick P. C. Lee. 550-561 [doi]
- Simple bounds for a transient queueTakayuki Osogami, Rudy Raymond. 562-573 [doi]
- Approximate analysis of blocking queueing networks with temporal dependenceVittoria De Nitto Persone, Giuliano Casale, Evgenia Smirni. 574-585 [doi]
- th Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011Alysson Neves Bessani, Partha Pal. 586-587 [doi]
- Introduction to the fifth workshop on dependable and secure nanocomputingJean Arlat, Cristian Constantinescu, Johan Karlsson, Takashi Nanya, Alan Wood. 588-589 [doi]
- The First International Workshop on Dependability of Clouds, data centers and Virtual Computing EnvironmentsJogesh K. Muppala, Matti A. Hiltunen, Robert J. Stroud, Ji Wang. 590-591 [doi]
- Seventh workshop on hot topics in system dependability (HotDep'11)Andreas Haeberlen, Mootaz Elnozahy. 592 [doi]
- WOSD 2011 the first international workshop on open systems dependabilityMario Tokoro, Karama Kanoun, Kimio Kuramitsu, Jean-Charles Fabre. 593-594 [doi]
- Third workshop on proactive failure avoidance, recovery, and maintenance (PFARM)Miroslaw Malek, Felix Salfner, Kishor S. Trivedi. 595-596 [doi]
- 5th international workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011Domenico Cotroneo, Vincenzo De Florio. 597-598 [doi]