Abstract is missing.
- An empirical investigation of fault repairs and mitigations in space mission system softwareJavier Alonso, Michael Grottke, Allen P. Nikora, Kishor S. Trivedi. 1-8 [doi]
- Complementing static and dynamic analysis approaches for better network defenseHimanshu Pareek, N. Sarat Chandra Babu. 1-2 [doi]
- CloudPD: Problem determination and diagnosis in shared dynamic cloudsBikash Sharma, Praveen Jayachandran, Akshat Verma, Chita R. Das. 1-12 [doi]
- Error detector placement for soft computationAnna Thomas, Karthik Pattabiraman. 1-12 [doi]
- Implementing the ADVISE security modeling formalism in MöbiusMichael D. Ford, Ken Keefe, Elizabeth LeMay, William H. Sanders, Carol Muehrcke. 1-8 [doi]
- Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approachFeng Tan, Yufei Wang, Qixin Wang, Lei Bu, Rong Zheng, Neeraj Suri. 1-12 [doi]
- Availability study on cloud computing environments: Live migration as a rejuvenation mechanismMatheus Melo, Paulo Romero Martins Maciel, Jean Araujo, Rubens de S. Matos, Carlos Araújo. 1-6 [doi]
- Improving SSD reliability with RAID via Elastic Striping and Anywhere ParityJaeho Kim, Jongmin Lee, Jongmoo Choi, Donghee Lee, Sam H. Noh. 1-12 [doi]
- Locality matters: Reducing Internet traffic graphs using location analysisAndreas Berger, Stefan Ruehrup, Wilfried N. Gansterer, Oliver Jung. 1-12 [doi]
- EagleEye: Towards mandatory security monitoring in virtualized datacenter environmentYu-Sung Wu, Pei-Keng Sun, Chun-Chi Huang, Sung-Jer Lu, Syu-Fang Lai, Yi-Yung Chen. 1-12 [doi]
- Towards secure monitoring and control systems: Diversify!Domenico Cotroneo, Antonio Pecchia, Stefano Russo. 1-2 [doi]
- WirelessHART modeling and performance evaluationAnne Remke, Xian Wu. 1-12 [doi]
- SPECTRE: A dependable introspection framework via System Management ModeFengwei Zhang, Kevin Leach, Kun Sun, Angelos Stavrou. 1-12 [doi]
- Addressing memory exhaustion failures in Virtual Machines in a cloud environmentJose Antonio Navas Molina, Shivakant Mishra. 1-6 [doi]
- Model-based performance analysis of local re-execution scheme in offloading systemQiushi Wang, Huaming Wu, Katinka Wolter. 1-6 [doi]
- Performability analysis of RAID10 versus RAID6Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno, Takashi Horikawa. 1-2 [doi]
- A review of cloud deployment models for e-learning systemsEngin Leloglu, Tolga Ayav, Burak Galip Aslan. 1-2 [doi]
- Practical automated vulnerability monitoring using program state invariantsCristiano Giuffrida, Lorenzo Cavallaro, Andrew S. Tanenbaum. 1-12 [doi]
- Towards SDN enabled network control delegation in cloudsMuhammad Salman Malik, Mirko Montanari, Jun Ho Huh, Rakesh B. Bobba, Roy H. Campbell. 1-6 [doi]
- An adaptive approach to dependable circuits for a digital power controlAromhack Saysanasongkham, Kenta Imai, Masayuki Arai, Satoshi Fukumoto, Keiji Wada. 1-2 [doi]
- An algorithmic approach to error localization and partial recomputation for low-overhead fault toleranceJoseph Sloan, Rakesh Kumar, Greg Bronevetsky. 1-12 [doi]
- Detecting malicious landing pages in Malware Distribution NetworksGang Wang, Jack W. Stokes, Cormac Herley, David Felstead. 1-11 [doi]
- Seamless kernel updatesMaxim Siniavine, Ashvin Goel. 1-12 [doi]
- Distal: A framework for implementing fault-tolerant distributed algorithmsMartin Biely, Pamela Delgado, Zarko Milosevic 0001, André Schiper. 1-8 [doi]
- Uniform node sampling service robust against collusions of malicious nodesEmmanuelle Anceaume, Yann Busnel, Bruno Sericola. 1-12 [doi]
- Lilliput meets brobdingnagian: Data center systems management through mobile devicesSaurabh Bagchi, Fahad A. Arshad, Jan S. Rellermeyer, Thomas H. Osiecki, Michael Kistler, Ahmed Gheith. 1-6 [doi]
- Fitting second-order acyclic Marked Markovian Arrival ProcessesAndrea Sansottera, Giuliano Casale, Paolo Cremonesi. 1-12 [doi]
- Application-driven TCP recovery and non-stop BGPRobert Surton, Ken Birman, Robbert van Renesse. 1-12 [doi]
- Hector: Detecting Resource-Release Omission Faults in error-handling code for systems softwareSuman Saha, Jean-Pierre Lozi, Gaël Thomas 0001, Julia L. Lawall, Gilles Muller. 1-12 [doi]
- Lumpability of fluid models with heterogeneous agent typesGiulio Iacobelli, Mirco Tribastone. 1-11 [doi]
- DRIP: A framework for purifying trojaned kernel driversZhongshu Gu, William N. Sumner, Zhui Deng, Xiangyu Zhang, Dongyan Xu. 1-12 [doi]
- Modeling and analysing operation processes for dependabilityXiwei Xu, Liming Zhu, Jim Li, Len Bass, Qinghua Lu, Min Fu. 1-2 [doi]
- PHYS: Profiled-HYbrid Sampling for soft error reliability benchmarkingJinho Suh, Murali Annavaram, Michel Dubois. 1-12 [doi]
- Consistency or latency? A quantitative analysis of replication systems based on replicated state machinesXu Wang, Hailong Sun, Ting Deng, Jinpeng Huai. 1-12 [doi]
- Manipulating semantic values in kernel data structures: Attack assessments and implicationsAravind Prakash, Eknath Venkataramani, Heng Yin, Zhiqiang Lin. 1-12 [doi]
- Message from the PDS program chairPeter Kemper. 1 [doi]
- Fault-tolerance characteristics of data center network topologies using fault regionsYang Liu, Jogesh K. Muppala. 1-6 [doi]
- Chasing the optimum in replicated in-memory transactional platforms via protocol adaptationMaria Couceiro, Pedro Ruivo, Paolo Romano, Luís Rodrigues. 1-12 [doi]
- Dependability models for designing disaster tolerant cloud computing systemsBruno Silva, Paulo Romero Martins Maciel, Eduardo Tavares, Armin Zimmermann. 1-6 [doi]
- A view on the past and future of fault injectionNuno Silva, Ricardo Barbosa, João Carlos Cunha, Marco Vieira. 1-2 [doi]
- Network traffic anomaly detection based on growing hierarchical SOMShin-Ying Huang, Yen-Nun Huang. 1-2 [doi]
- simFI: From single to simultaneous software fault injectionsStefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri. 1-12 [doi]
- Automating the debugging of datacenter applications with ADDACristian Zamfir, Gautam Altekar, Ion Stoica. 1-12 [doi]
- Security implications of memory deduplication in a virtualized environmentJidong Xiao, Zhang Xu, Hai Huang, Haining Wang. 1-12 [doi]
- FTSPM: A Fault-Tolerant ScratchPad MemoryAmir Mahdi Hosseini Monazzah, Hamed Farbeh, Seyed Ghassem Miremadi, Mahdi Fazeli, Hossein Asadi. 1-10 [doi]
- Fault detection and localization in distributed systems using invariant relationshipsAbhishek Sharma, Haifeng Chen, Min Ding, Kenji Yoshihira, Guofei Jiang. 1-8 [doi]
- Geo-replicated storage with scalable deferred update replicationDaniele Sciascia, Fernando Pedone. 1-12 [doi]
- Lightweight message tracing for debugging wireless sensor networksVinaitheerthan Sundaram, Patrick Eugster. 1-12 [doi]
- Redefining web browser principals with a Configurable Origin PolicyYinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk. 1-12 [doi]
- Increasing network resiliency by optimally assigning diverse variants to routing nodesAndrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir. 1-12 [doi]
- Reading between the lines of failure logs: Understanding how HPC systems failNosayba El-Sayed, Bianca Schroeder. 1-12 [doi]
- Message from the DCCS program chairGeorge Candea. 1 [doi]
- DATAFLASKS: An epidemic dependable key-value substrateFrancisco Maia, Miguel Matos, Ricardo Manuel Pereira Vilaça, José Orlando Pereira, Rui Oliveira, Etienne Riviere. 1-6 [doi]
- Evasive bots masquerading as human beings on the webJing Jin, Jeff Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang. 1-12 [doi]
- Generative software-based memory error detection and correction for operating system data structuresChristoph Borchert, Horst Schirmeier, Olaf Spinczyk. 1-12 [doi]
- The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013Jogesh K. Muppala, Matti A. Hiltunen, Roy Campbell, Paulo Veríssimo. 1-2 [doi]
- Analysis of bugs in Apache Virtual Computing LabFlavio Frattini, Rahul Ghosh, Marcello Cinque, Andy Rindos, Kishor S. Trivedi. 1-6 [doi]
- A practical characterization of a NASA SpaceCube application through fault emulation and laser testingJohn Paul Walters, Kenneth M. Zick, Matthew French. 1-8 [doi]
- Mitigating access-driven timing channels in clouds using StopWatchPeng Li, Debin Gao, Michael K. Reiter. 1-12 [doi]
- A logic for model-checking mean-field modelsAnna Kolesnichenko, Pieter-Tjerk de Boer, Anne Remke, Boudewijn R. Haverkort. 1-12 [doi]
- Crossing the threshold: Detecting network malfeasance via sequential hypothesis testingSrinivas Krishnan, Teryl Taylor, Fabian Monrose, John McHugh. 1-12 [doi]
- SIDE: Isolated and efficient execution of unmodified device driversYifeng Sun, Tzi-cker Chiueh. 1-12 [doi]
- Stress balancing to mitigate NBTI effects in register filesHussam Amrouch, Thomas Ebi, Jörg Henkel. 1-10 [doi]
- Design of event-based Intrusion Detection System on OpenFlow NetworkYung-Li Hu, Wei-Bing Su, Li-ying Wu, Yennun Huang, Sy-Yen Kuo. 1-2 [doi]
- Increasing the trustworthiness of commodity hardware through softwareKevin Elphinstone, Yanyan Shen. 1-6 [doi]
- Evaluating Xilinx SEU Controller Macro for fault injectionJose Luis Nunes, João Carlos Cunha, Raul Barbosa, Mário Zenha Rela. 1-2 [doi]
- Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile InternetChaitrali Amrutkar, Matti A. Hiltunen, Trevor Jim, Kaustubh R. Joshi, Oliver Spatscheck, Patrick Traynor, Shobha Venkataraman. 1-8 [doi]
- The architecture of a resilience infrastructure for computing and communication systemsAlgirdas Avizienis. 1-2 [doi]
- Message from the general chairAndrás Pataricza. 1 [doi]
- State-of-the-practice in data center virtualization: Toward a better understanding of VM usageRobert Birke, Andrej Podzimek, Lydia Y. Chen, Evgenia Smirni. 1-12 [doi]
- Intrusion detection and honeypots in nested virtualization environmentsMichael Beham, Marius Vlad, Hans P. Reiser. 1-6 [doi]
- Operating SECDED-based caches at ultra-low voltage with FLAIRMoinuddin K. Qureshi, Zeshan Chishti. 1-11 [doi]