Abstract is missing.
- Introduction to RADIANCE 2016Ariadne M. B. R. Carvalho, Nuno Antunes, Andrea Ceccarelli, András Zentai. 1 [doi]
- Use of Similarity Measure to Suggest the Existence of Duplicate User Stories in the Srum ProcessR. Barbosa, A. E. A. Silva, R. Moraes. 2-5 [doi]
- Code Change History and Software VulnerabilitiesMarcus Pianco, Baldoino Fonseca, Nuno Antunes. 6-9 [doi]
- Hierarchical Model and Sensitivity Analysis for a Cloud-Based VoD Streaming ServiceJamilson Dantas, Rubens de S. Matos, Jean Araujo, Danilo Oliveira, Andre Oliveira, Paulo Romero Martins Maciel. 10-16 [doi]
- SOASales: A SOA System for Research PurposesCarla Machado, Cristiana Areias, João Carlos Cunha. 17-24 [doi]
- A Bayesian Networks Based Method for Ship Reliability AssessmentHong Dong Wang, Xiaofeng Liang, Hong Yi, Dan Li. 25-30 [doi]
- Scalable RobustnessThomas B. Jones, David H. Ackley. 31-38 [doi]
- D-MBTDD: An Approach for Reusing Test Artefacts in Evolving SystemThais Harumi Ussami, Eliane Martins, Leonardo Montecchi. 39-46 [doi]
- Introduction to RSDA 2016Antonio Pecchia, Olivier Thonnard. 47 [doi]
- Comparing Detection Capabilities of AntiVirus Products: An Empirical Study with Different Versions of Products from the Same VendorsAreej Algaith, Ilir Gashi, Bertrand Sobesto, Michel Cukier, Selman Haxhijaha, Gazmend Bajrami. 48-53 [doi]
- An Application of Unsupervised Fraud Detection to Passenger Name RecordsRemi Domingues, Francesco Buonora, Romain Senesi, Olivier Thonnard. 54-59 [doi]
- MimeoDroid: Large Scale Dynamic App Analysis on Cloned Devices via Machine Learning ClassifiersParvez Faruki, Akka Zemmari, Manoj Singh Gaur, Vijay Laxmi, Mauro Conti. 60-65 [doi]
- Error Monitoring for Legacy Mission-Critical SystemsMarcello Cinque, Raffaele Della Corte, Stefano Russo. 66-71 [doi]
- SDC is in the Eye of the Beholder: A Survey and Preliminary StudyBo Fang, Panruo Wu, Qiang Guan, Nathan DeBardeleben, Laura Monroe, Sean Blanchard, Zhizong Chen, Karthik Pattabiraman, Matei Ripeanu. 72-76 [doi]
- Classifying Virtual Machine Managers by OverheadColin S. Murray. 77-82 [doi]
- Hunting Killer Tasks for Cloud System through Behavior Pattern LearningHongyan Tang, Ying Li, Tong Jia, Zhonghai Wu. 83-88 [doi]
- Introduction to DISN 2016Elias Procópio Duarte Jr., Matti A. Hiltunen, Robert Soulé. 89 [doi]
- Ground Control to Major Faults: Towards a Fault Tolerant and Adaptive SDN Control NetworkLiron Schiff, Stefan Schmid, Marco Canini. 90-96 [doi]
- Experience with 3 SDN Controllers in an Enterprise SettingZhiyuan Teo, Ken Birman, Robbert van Renesse. 97-104 [doi]
- Availability Modelling of Software-Defined Backbone NetworksGianfranco Nencioni, Bjarne E. Helvik, Andrés J. Gonzalez, Poul E. Heegaard, Andrzej Kamisinski. 105-112 [doi]
- Routing-Verification-as-a-Service (RVaaS): Trustworthy Routing Despite Insecure ProvidersLiron Schiff, Kashyap Thimmaraju, Stefan Schmid. 113-119 [doi]
- KAR: Key-for-Any-Route, a Resilient Routing SystemRodolfo R. Gomes, Alextian B. Liberato, Cristina K. Dominicini, Moisés R. N. Ribeiro, Magnos Martinello. 120-127 [doi]
- NetCo: Reliable Routing With Unreliable RoutersAnja Feldmann, Philipp Heyder, Michael Kreutzer, Stefan Schmid, Jean-Pierre Seifert, Haya Shulman, Kashyap Thimmaraju, Michael Waidner, Jens Sieberg. 128-135 [doi]
- Introduction to ReSA4CI 2016Silvia Bonomi, Ilaria Matteucci. 136 [doi]
- An Architecture for Semi-Automatic Collaborative Malware Analysis for CIsGiuseppe Laurenza, Daniele Ucci, Leonardo Aniello, Roberto Baldoni. 137-142 [doi]
- Diverse Compiling for Software-Based Recovery of Permanent Faults in COTS ProcessorsAndrea Höller, Bernhard Spitzer, Tobias Rauter, Johannes Iber, Christian Kreiner. 143-148 [doi]
- Quantification and Analysis of Interdependency in Cyber-Physical SystemsKoosha Marashi, Sahra Sedigh Sarvestani, Ali R. Hurson. 149-154 [doi]
- On the Feasibility of Distinguishing Between Process Disturbances and Intrusions in Process Control Systems Using Multivariate Statistical Process ControlMikel Iturbe, José Camacho, Iñaki Garitano, Urko Zurutuza, Roberto Uribeetxeberria. 155-160 [doi]
- Introduction to SSIV 2016João Carlos Cunha, Kalinka Branco, Antonio Casimiro, Urbano Nunes. 161 [doi]
- In-Vehicle Real-Time Fog ComputingHermann Kopetz, Stefan Poledna. 162-167 [doi]
- An Effective Two-Level Redundancy Approach for FlexRay Network SystemsYung-Yuan Chen, Kuen-Long Leu. 168-175 [doi]
- Designing Security for In-vehicle Networks: A Body Control Module (BCM) Centered ViewpointBogdan Groza, Horatiu-Eugen Gurban, Pal-Stefan Murvay. 176-183 [doi]
- IEEE 802.11n vs. IEEE 802.15.4: A Study on Communication QoS to Provide Safe FANETsEmerson Alberto Marconato, Jean-Aimé Maxa, Daniel F. Pigatto, Alex S. R. Pinto, Nicolas Larrieu, Kalinka R. L. J. Castelo Branco. 184-191 [doi]
- On the Validation of a UAV Collision Avoidance System Developed by Model-Based Optimization: Challenges and a Tentative Partial SolutionXueyi Zou, Rob Alexander, John McDermid. 192-199 [doi]
- Safety Engineering for Autonomous VehiclesRasmus Adler, Patrik Feth, Daniel Schneider 0001. 200-205 [doi]
- A Distributed Avionics Communication NetworkPaul Boivin Champeaux, David Faura, Marc Gatti, William Terroy. 206-209 [doi]
- HARP: High Availability Registration Platform for Software Defined InfrastructureHenry Zhu, Sejun Song. 210 [doi]
- Secure Embedded Hypervisor Based Systems for AutomotiveStefaan Sonck Thiebaut, Antonio De Rosa, Ralph Sasse. 211-212 [doi]
- Software Safety Assessment and ProbabilitiesJean-Paul Blanquart, Philippe Baufreton, Jean-Louis Boulanger, Jean-Louis Camus, Cyrille Comar, Hervé Delseny, Jean Gassino, Emmanuel Ledinot, Philippe Quéré, Bertrand Ricque. 213-214 [doi]
- AUTOSAR for Connected and Autonomous Vehicles: The AUTOSAR Adaptive PlatformSimon Fürst, Markus Bechter. 215-217 [doi]
- Evaluation of EEE Reliability Prediction Models for Space ApplicationsS. Bourbouse, Jean-Paul Blanquart, J. F. Gajewski, C. Lahorgue. 218-221 [doi]
- An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair ArchitectureKate Highnam, Kevin Angstadt, Kevin Leach, Westley Weimer, Aaron Paulos, Patrick Hurley. 222-225 [doi]
- Transformation of Failure Propagation Models into Fault Trees for Safety Evaluation PurposesMoomen Chaari, Wolfgang Ecker, Thomas Kruse, Cristiano Novello, Bogdan-Andrei Tabacaru. 226-229 [doi]
- The Concept of a Software-Free Resilience Infrastructure for Cyber-Physical SystemsAlgirdas Avizienis, Rimas Avizienis, Audrius V. Avizienis. 230-233 [doi]
- A System for the Security Protection of Embedded Binary ProgramsJack W. Davidson, Jason D. Hiser, Anh Nguyen-Tuong, Clark L. Coleman, William H. Hawkins, John C. Knight, Benjamin D. Rodes, Ashlie B. Hocking. 234-237 [doi]
- Trusted Software Repair for System ResiliencyWestley Weimer, Stephanie Forrest, Miryung Kim, Claire Le Goues, Patrick Hurley. 238-241 [doi]
- Resiliency Challenges in Accelerating Carrier-Grade Networks with SDNCatello Di Martino, Veena B. Mendiratta, Marina Thottan. 242-245 [doi]
- A Triple Core Lock-Step (TCLS) ARM® Cortex®-R5 Processor for Safety-Critical and Ultra-Reliable ApplicationsXabier Iturbe, Balaji Venu, Emre Ozer, Shidhartha Das. 246-249 [doi]
- Improving DRAM Fault Characterization through Machine LearningElisabeth Baseman, Nathan DeBardeleben, Kurt B. Ferreira, Scott Levy, Steven Raasch, Vilas Sridharan, Taniya Siddiqua, Qiang Guan. 250-253 [doi]
- Towards Black-Box Anomaly Detection in Virtual Network FunctionsCarla Sauvanaud, Kahina Lazri, Mohamed Kaâniche, Karama Kanoun. 254-257 [doi]
- Profiling Memory Vulnerability of Big-Data ApplicationsNavaneeth Rameshan, Robert Birke, L. Navarro, Vladimir Vlassov, Bhuvan Urgaonkar, George Kesidis, Martin Schmatz, Lydia Y. Chen. 258-261 [doi]
- Common Safety Method for Risk Evaluation and Assessment (CSM-RA) and Hazard Analysis Tutorial: Managing Effectively Significant Changes in a Railway SystemFrancisco Moreira, Nuno Pedro Silva. 262 [doi]
- DSN 2016 Tutorial: Reliability and Availability Modeling in PracticeKishor S. Trivedi, Andrea Bobbio. 263 [doi]
- Activating Protection and Exercising Recovery Against Large-Scale Outages on the CloudLong Wang, HariGovind V. Ramasamy, Ruchi Mahindru, Richard E. Harper. 264 [doi]
- Measuring Resiliency through Field Data: Techniques, Tools and ChallengesAntonio Pecchia, Marcello Cinque, Veena B. Mendiratta. 265 [doi]
- Building Highly-Available Distributed SDN Applications with ONOSAli Al-Shabibi, Brian O'Connor, Thomas Vachuska. 266 [doi]
- DSN 2016 Tutorial: Resilience for Scientific Computing: From Theory to PracticeFranck Cappello, George Bosilca. 267 [doi]
- A Unified Framework for Error Correction in On-chip MemoriesFrederic Sala, Henry Duwe, Lara Dolecek, Rakesh Kumar 0002. 268-274 [doi]
- Special Session at DSN for the Best Papers from SELSE 2016Alan Wood. 275 [doi]
- Software-Defined Error-Correcting CodesMark Gottscho, Clayton Schoeny, Lara Dolecek, Puneet Gupta. 276-282 [doi]
- External Assessment of QoS Provisioning in Distributed Cloud ServicesKaliappa Nadar Ravindran, Arun Adiththan, Michael Iannelli, Mohammad Rabby. 283-290 [doi]