Abstract is missing.
- PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer NetworksSanthosh Muthyapu, Sanjay Kumar Madria, Mark Linderman. 1-10 [doi]
- Securing Mobile Unattended WSNs against a Mobile AdversaryRoberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik. 11-20 [doi]
- Attack Injection to Support the Evaluation of Ad Hoc NetworksJesus Friginal, David de Andrés, Juan Carlos Ruiz, Pedro J. Gil. 21-29 [doi]
- Optimization Based Topology Control for Wireless Ad Hoc Networks to Meet QoS RequirementsYadu Kishore K, Ashish Tiwari, O. G. Kakde. 30-36 [doi]
- Fault-Tolerant Aggregation for Dynamic NetworksPaulo Jesus, Carlos Baquero, Paulo Sérgio Almeida. 37-43 [doi]
- Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor NetworksArshad Jhumka. 44-53 [doi]
- Fixed Cost Maintenance for Information Dissemination in Wireless Sensor NetworksRajesh Krishna Panta, Madalina Vintila, Saurabh Bagchi. 54-63 [doi]
- A Resource-Efficient Adaptive Caching Scheme for Mobile Ad Hoc NetworksDan Hirsch, Sanjay Madria. 64-71 [doi]
- VMDriver: A Driver-Based Monitoring Mechanism for VirtualizationGuofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao. 72-81 [doi]
- DKSM: Subverting Virtual Machine Introspection for Fun and ProfitSina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu. 82-91 [doi]
- Real Distribution of Response Time Instability in Service-Oriented ArchitectureAnatoliy Gorbenko, Vyacheslav S. Kharchenko, Seyran Mamutov, Olga Tarasyuk, Yuhui Chen, Alexander Romanovsky. 92-99 [doi]
- Lightweight Task Graph Inference for Distributed ApplicationsBin Xin, Patrick Th. Eugster, Xiangyu Zhang, Jinlin Yang. 100-110 [doi]
- A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing SystemsHaifeng Chen, Guofei Jiang, Hui Zhang 0002, Kenji Yoshihira. 111-120 [doi]
- Uncertainty Propagation in Analytic Availability ModelsAmita Devaraj, Kesari Mishra, Kishor S. Trivedi. 121-130 [doi]
- Monitoring Local Progress with Watchdog Timers Deduced from Global PropertiesRaul Barbosa. 131-140 [doi]
- Adaptare-FD: A Dependability-Oriented Adaptive Failure DetectorMonica Dixit, Antonio Casimiro. 141-147 [doi]
- GAUL: Gestalt Analysis of Unstructured Logs for Diagnosing Recurring Problems in Large Enterprise Storage SystemsPin Zhou, Binny Gill, Wendy Belluomini, Avani Wildani. 148-159 [doi]
- Invariants Based Failure Diagnosis in Distributed Computing SystemsHaifeng Chen, Guofei Jiang, Kenji Yoshihira, Akhilesh Saxena. 160-166 [doi]
- Shedding Light on Enterprise Network Failures Using SpotlightDipu John, Pawan Prakash, Ramana Rao Kompella, Ranveer Chandra. 167-176 [doi]
- An Entity-Centric Approach for Privacy and Identity Management in Cloud ComputingPelin Angin, Bharat K. Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien. 177-183 [doi]
- CloudRank: A QoS-Driven Component Ranking Framework for Cloud ComputingZibin Zheng, Yilei Zhang, Michael R. Lyu. 184-193 [doi]
- Secure, Dependable, and High Performance Cloud StorageYunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh B. Bastani. 194-203 [doi]
- On-Demand Recovery in Middleware Storage SystemsLásaro J. Camargos, Fernando Pedone, Alex Pilchin, Marcin Wieloch. 204-213 [doi]
- P-Store: Genuine Partial Replication in Wide Area NetworksNicolas Schiper, Pierre Sutra, Fernando Pedone. 214-224 [doi]
- FireSpam: Spam Resilient Gossiping in the BAR ModelSonia Ben Mokhtar, Alessio Pace, Vivien Quéma. 225-234 [doi]
- Semias: Self-Healing Active Replication on Top of a Structured Peer-to-Peer OverlayStefania Costache, Thomas Ropars, Christine Morin. 235-244 [doi]
- Experimental Validation of a Synchronization Uncertainty-Aware Software ClockAndrea Bondavalli, Francesco Brancati, Andrea Ceccarelli, Michele Vadursi. 245-254 [doi]
- Applying Text Classification Algorithms in Web Services Robustness TestingNuno Laranjeiro, Rui Oliveira, Marco Vieira. 255-264 [doi]
- Availability Assessment of HA Standby Redundant ClustersSalvatore Distefano, Francesco Longo, Marco Scarpa. 265-274 [doi]
- Diskless Checkpointing with Rollback-Dependency TrackabilityRaphael Marcos Menderico, Islene Calciolari Garcia. 275-281 [doi]
- Swift Algorithms for Repeated ConsensusFatemeh Borran, Martin Hutle, Nuno Santos, André Schiper. 282-292 [doi]
- Thicket: A Protocol for Building and Maintaining Multiple Trees in a P2P OverlayMario Ferreira, João Leitão, Luís Rodrigues. 293-302 [doi]
- A Tactical Information Management Middleware for Resource-Constrained Mobile P2P NetworksBo Xu, Mark Linderman, Sanjay Madria, Ouri Wolfson. 303-307 [doi]
- On Optimizing Traffic Signal Phase Ordering in Road NetworksJason Barnes, Vamsi Paruchuri, Sriram Chellappan. 308-312 [doi]
- Lightweight Fault-Tolerance for Peer-to-Peer MiddlewareRolando Martins, Priya Narasimhan, Luis Lopes, Fernando M. A. Silva. 313-317 [doi]
- Adaptive Routing Scheme for Emerging Wireless Ad Hoc NetworksBehdis Eslamnour, Sarangapani Jagannathan. 318-322 [doi]
- Towards Mobile Data Streaming in Service Oriented ArchitectureNorman Ahmed, Mark Linderman, Jason Bryant. 323-327 [doi]
- Practical Aspects in Analyzing and Sharing the Results of Experimental EvaluationFrancesco Brancati, Andrea Bondavalli. 328-332 [doi]
- A Study on Latent VulnerabilitiesBeng Heng Ng, Xin Hu, Atul Prakash. 333-337 [doi]
- CReW: Cloud Resilience for Windows Guests through Monitored VirtualizationFlavio Lombardi, Roberto Di Pietro, Claudio Soriente. 338-342 [doi]
- Quantifying Resiliency of IaaS CloudRahul Ghosh, Francesco Longo, Vijay K. Naik, Kishor S. Trivedi. 343-347 [doi]
- Benchmarking the Resilience of Self-Adaptive Systems: A New Research ChallengeRaquel Almeida, Henrique Madeira, Marco Vieira. 348-352 [doi]
- Data-Mining-Based Link Failure Detection for Wireless Mesh NetworksTimo Lindhorst, Georg Lukas, Edgar Nett, Michael Mock. 353-357 [doi]
- Data Validity and Dependable Perception in Networked Sensor-Based SystemsLuis Marques, Antonio Casimiro. 358-362 [doi]
- A Multi-step Simulation Approach toward Secure Fault Tolerant System EvaluationRuchika Mehresh, Shambhu J. Upadhyaya, Kevin A. Kwiat. 363-367 [doi]
- Protection of Identity Information in Cloud Computing without Trusted Third PartyRohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong H. Kang, Mark Linderman. 368-372 [doi]