Abstract is missing.
- th Workshop on recent advances in intrusion-tolerant systems WRAITS 2011Alysson Neves Bessani, Partha Pal. 1-2 [doi]
- The time-free approach to Byzantine failure detection in dynamic networksMurilo Santos de Lima, Fabíola Greve, Luciana Arantes, Pierre Sens. 3-8 [doi]
- Managing business health in the presence of malicious attacksSaman A. Zonouz, Aashish Sharma, HariGovind V. Ramasamy, Zbigniew T. Kalbarczyk, Birgit Pfitzmann, Kevin P. McAuliffe, Ravishankar K. Iyer, William H. Sanders, Eric Cope. 9-14 [doi]
- From Byzantine fault tolerance to intrusion tolerance (a position paper)Alysson Neves Bessani. 15-18 [doi]
- Anomaly-based intrusion detection in software as a serviceGustavo Nascimento, Miguel Correia. 19-24 [doi]
- Combining intrusion detection and recovery for enhancing system dependabilityAjay Nagarajan, Quyen L. Nguyen, Robert Banks, Arun Sood. 25-30 [doi]
- A cloud-based intrusion detection and response system for mobile phonesAmir Houmansadr, Saman A. Zonouz, Robin Berthier. 31-32 [doi]
- Continuous mission-oriented assessment (CMA) of assurancePatrick Hurley, Partha Pal, Matthew Tan Creti, Amy Fedyk. 33-38 [doi]
- Introduction to the fifth workshop on dependable and secure nanocomputingJean Arlat, Cristian Constantinescu, Johan Karlsson, Takashi Nanya, Alan Wood. 39-40 [doi]
- Study of the effects of SET induced faults on submicron technologiesAlireza Rohani, Hans G. Kerkhoff. 41-46 [doi]
- Investigating the impact of process variations on an asynchronous Time-Triggered-Protocol controllerMarkus Ferringer. 47-52 [doi]
- Comparing the effects of intermittent and transient hardware faults on programsJiesheng Wei, Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan. 53-58 [doi]
- Level of confidence evaluation and its usage for Roll-back Recovery with Checkpointing optimizationDimitar Nikolov, Urban Ingelsson, Virendra Singh, Erik Larsson. 59-64 [doi]
- A digitalized management mechanism for low-cost low-power multiple-voltage 3D designsChing-Hwa Cheng, Ming-Hsuan Wu, Pin-Jui Lai, Chia-Hao Ku. 65-68 [doi]
- An efficient and reliable 1.5-way processor by fusion of space and time redundanciesJun Yao, Ryoji Watanabe, Kazuhiro Yoshimura, Takashi Nakada, Hajime Shimada, Yasuhiko Nakashima. 69-74 [doi]
- A non-volatile microcontroller with integrated floating-gate transistorsWing-Kei S. Yu, Shantanu Rajwade, Sung-En Wang, Bob Lian, G. Edward Suh, Edwin Kan. 75-80 [doi]
- Built-in fine resolution clipping with calibration technique for high-speed testing by using wireless testersChing-Hwa Cheng, Chen-I Chung. 81-84 [doi]
- Genetic algorithm based approach for segmented testingXiaoxin Fan, Sudhakar M. Reddy, Senling Wang, Seiji Kajihara, Yasuo Sato. 85-90 [doi]
- Model-based fault injection for failure effect analysis - Evaluation of dependable SRAM for vehicle control unitsYohei Nakata, Yasuhiro Ito, Yasuo Sugure, Shigeru Oho, Yusuke Takeuchi, Shunsuke Okumura, Hiroshi Kawaguchi, Masahiko Yoshimoto. 91-96 [doi]
- The first international workshop on dependability of clouds, data centers and virtual computing environments: DCDV 2011Jogesh K. Muppala, Matti A. Hiltunen, Robert J. Stroud, Ji Wang. 97-98 [doi]
- CAWRM: A remote mirroring system based on AoDI volumeZhenhai Zhao, Tingting Qin, Fangliang Xu, Rui Cao, Jing Liu, Gang Wang. 99-104 [doi]
- An epidemic approach to dependable key-value substratesMiguel Matos, Ricardo Vilaça, José Pereira, Rui Oliveira. 105-110 [doi]
- The case for dynamic security solutions in public cloud workflow deploymentsJohn C. Mace, Aad P. A. van Moorsel, Paul Watson. 111-116 [doi]
- Recursive virtual machines for advanced security mechanismsBernhard Kauer, Paulo Veríssimo, Alysson Neves Bessani. 117-122 [doi]
- Designing SCIT architecture pattern in a Cloud-based environmentQuyen L. Nguyen, Arun Sood. 123-128 [doi]
- Lucy in the sky without diamonds: Stealing confidential data in the cloudFrancisco Rocha, Miguel Correia. 129-134 [doi]
- Performance problems online detection in cloud computing systems via analyzing request execution pathsHaibo Mi, Huaimin Wang, Gang Yin, Hua Cai, Qi Zhou, Tingtao Sun. 135-139 [doi]
- Identifying faults in large-scale distributed systems by filtering noisy error logsXiang Rao, Huaimin Wang, Dianxi Shi, Zhenbang Chen, Hua Cai, Qi Zhou, Tingtao Sun. 140-145 [doi]
- Enhancing application robustness in Infrastructure-as-a-Service cloudsMadalin Mihailescu, Andres Rodriguez, Cristiana Amza. 146-151 [doi]
- Power-performance trade-offs in IaaS cloud: A scalable analytic approachRahul Ghosh, Vijay K. Naik, Kishor S. Trivedi. 152-157 [doi]
- A virtual resource placement serviceRichard E. Harper, Lorrie A. Tomek, Ofer Biran, Erez Hadad. 158-163 [doi]
- Seventh workshop on hot topics in system dependability (HotDep'11)Andreas Haeberlen, Mootaz Elnozahy. 164 [doi]
- Integrated end-to-end dependability in the Loris storage stackDavid C. van Moolenbroek, Raja Appuswamy, Andrew S. Tanenbaum. 165-170 [doi]
- Scalable Byzantine fault-tolerant storageRicardo Padilha, Fernando Pedone. 171-175 [doi]
- Lock-free transactional support for large-scale storage systemsFlavio Junqueira, Benjamin Reed, Maysam Yabandeh. 176-181 [doi]
- TO BEnchmark or NOT TO BEnchmark security: That is the questionAfonso Araújo Neto, Marco Vieira. 182-187 [doi]
- Automated vulnerability discovery in distributed systemsRadu Banabic, George Candea, Rachid Guerraoui. 188-193 [doi]
- Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloringJicheng Shi, Xiang Song, Haibo Chen, Binyu Zang. 194-199 [doi]
- Exterminating bugs via collective information recyclingGeorge Candea. 200-204 [doi]
- Platform-wide deadlock immunity for mobile phonesHoratiu Jula, Thomas Rensch, George Candea. 205-210 [doi]
- Enabling sophisticated analyses of ×86 binaries with RevGenVitaly Chipounov, George Candea. 211-216 [doi]
- Secure MMU: Architectural support for memory isolation among virtual machinesSeongwook Jin, Jaehyuk Huh. 217-222 [doi]
- Transactional memory for dependable embedded systemsChristof Fetzer, Pascal Felber. 223-227 [doi]
- WOSD 2011: The first international workshop on open systems dependabilityMario Tokoro, Karama Kanoun, Kimio Kuramitsu, Jean-Charles Fabre. 228-229 [doi]
- On finding vestiges of Internet backbone failures for optimizing wide area data replicationHirotake Abe, Hirotaka Moriya, Kyoji Umemura. 230-233 [doi]
- Performance modeling and benchmarking of bank intermediary business on high-performance fault-tolerant computersBo Li, Haiying Zhou, Decheng Zuo, Zhan Zhang, Peng Zhou, Long Jia. 234-239 [doi]
- Composite dependability modeling for in-vehicle networksHiroyuki Okamura, Tadashi Dohi, Shin'ichi Shiraishi, Mutsumi Abe. 240-245 [doi]
- Architecting resilient computing systems: Overall approach and open issuesJean-Charles Fabre. 246-247 [doi]
- Fault model of foreign function interface across different domainsShinpei Nakata, Midori Sugaya, Kimio Kuramitsu. 248-253 [doi]
- Enforcing dependable operations by model checking a visualization layerShuichi Oikawa. 254-256 [doi]
- Third workshop on proactive failure avoidance, recovery, and maintenance (PFARM)Miroslaw Malek, Felix Salfner, Kishor S. Trivedi. 257-258 [doi]
- Practical online failure prediction for Blue Gene/P: Period-based vs event-drivenLi Yu, Ziming Zheng, Zhiling Lan, Susan Coghlan. 259-264 [doi]
- Detecting resource leaks through dynamical mining of resource usage patternsHuxing Zhang, Gang Wu, Kingsum Chow, Zhidong Yu, Xuezhi Xing. 265-270 [doi]
- DynaPlan: Resource placement for application-level clusteringRichard E. Harper, Kyung Dong Ryu, David Frank, Lisa Spainhower, Ravi Shankar, Tom Weaver. 271-277 [doi]
- 5th International workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011Domenico Cotroneo, Vincenzo De Florio. 278-279 [doi]
- Adaptive collaborative sensing using mobile phones and stationary sensorsEdith Cheuk-Han Ngai, Junjie Xiong. 280-285 [doi]
- Enabling on-line dependability assessment of Android smart phonesMarcello Cinque. 286-291 [doi]
- A novel design of node-disjoint multi-path QoS routing in multi-hop ad hoc networksSzu-Lin Su, Yi-Wen Su, Chien-Sheng Chen, Wen-Hsiung Liu. 292-296 [doi]
- Privacy leakage in two-party group nearest neighbor queriesYan Huang, Cai Chen. 297-300 [doi]