Abstract is missing.
- PROPS: A PRivacy-Preserving Location Proof SystemSébastien Gambs, Marc-Olivier Killijian, Matthieu Roy, Moussa Traore. 1-10 [doi]
- Gemini: An Emergency Line of Defense against Phishing AttacksZhang Xu, Haining Wang, Sushil Jajodia. 11-20 [doi]
- A Practical Experience on the Impact of Plugins in Web SecurityJose Carlos Coelho Martins da Fonseca, Marco Paulo Amorim Vieira. 21-30 [doi]
- Improving Cloud Service Resilience Using Brownout-Aware Load-BalancingCristian Klein, Alessandro Vittorio Papadopoulos, Manfred Dellkrantz, Jonas Durango, Martina Maggio, Karl-Erik Årzén, Francisco Hernández-Rodriguez, Erik Elmroth. 31-40 [doi]
- The Performance of Paxos in the CloudParisa Jalili Marandi, Samuel Benz, Fernando Pedone, Kenneth P. Birman. 41-50 [doi]
- Transfer as a Service: Towards a Cost-Effective Model for Multi-site Cloud Data ManagementRadu Tudoran, Alexandru Costan, Gabriel Antoniu. 51-56 [doi]
- Optimistic Parallel State-Machine ReplicationParisa Jalili Marandi, Fernando Pedone. 57-66 [doi]
- ZooFence: Principled Service Partitioning and Application to the ZooKeeper Coordination ServiceRaluca Halalai, Pierre Sutra, Etienne Riviere, Pascal Felber. 67-78 [doi]
- DATAFLASKS: Epidemic Store for Massive Scale SystemsFrancisco Maia, Miguel Matos, Ricardo Manuel Pereira Vilaça, José Orlando Pereira, Rui Oliveira, Etienne Riviere. 79-88 [doi]
- Make the Leader Work: Executive Deferred Update ReplicationMaciej Kokocinski, Tadeusz Kobus, Pawel T. Wojciechowski. 89-94 [doi]
- On the Support of Versioning in Distributed Key-Value StoresPascal Felber, Marcelo Pasin, Etienne Riviere, Valerio Schiavoni, Pierre Sutra, Fábio Coelho, Rui Oliveira, Miguel Matos, Ricardo Manuel Pereira Vilaça. 95-104 [doi]
- Transaction Management Using Causal Snapshot Isolation in Partially Replicated DatabasesVinit Padhye, Gowtham Rajappan, Anand R. Tripathi. 105-114 [doi]
- pH1: A Transactional Middleware for NoSQLFabio Andre Castanheira Luis Coelho, Francisco Miguel Barros da Cruz, Ricardo Manuel Pereira Vilaça, José Orlando Pereira, Rui Carlos Mendes de Oliveira. 115-124 [doi]
- Exploiting Decoding Computational Locality to Improve the I/O Performance of an XOR-Coded Storage Cluster under Concurrent FailuresShiyi Li, Xubin He, Shenggang Wan, Yuhua Guo, Ping Huang, Di Chen, Qiang Cao, Changsheng Xie. 125-135 [doi]
- A Stack-Based Single Disk Failure Recovery Scheme for Erasure Coded Storage SystemsYingxun Fu, Jiwu Shu, Xianghong Luo. 136-145 [doi]
- Fast Repair for Single Failure in Erasure Coding-Based Distributed Storage SystemsHuayu Zhang, Hui Li, Bing Zhu, Jun Chen. 146-151 [doi]
- Self-Stabilizing Byzantine BroadcastAlexandre Maurer, Sébastien Tixeuil. 152-160 [doi]
- Fair Synchronization in the Presence of Process Crashes and its Weakest Failure DetectorCarole Delporte-Gallet, Hugues Fauconnier, Michel Raynal. 161-170 [doi]
- Convergence Verification of Asynchronous IterationsYoshisato Sakai. 171-181 [doi]
- Dependable Admission Control for Mission-Critical Mobile Applications in Wireless Mesh NetworksTimo Lindhorst, Burkhard Weseloh, Edgar Nett. 182-190 [doi]
- PCTopk: Privacy-and Correctness-Preserving Functional Top-k Query on Un-trusted Data Storage in Two-Tiered Sensor NetworksYao-Tung Tsou, Yung-Li Hu, Yennun Huang, Sy-Yen Kuo. 191-200 [doi]
- Device Collaboration for Stability Assurance in Distributed Cyber-Physical SystemsTao Li, Jiannong Cao. 201-210 [doi]
- ACaZoo: A Distributed Key-Value Store Based on Replicated LSM-TreesPanagiotis Garefalakis, Panagiotis Papadopoulos, Kostas Magoutis. 211-220 [doi]
- End-to-End Congestion Control for Content-Based NetworksAmirhossein Malekpour, Antonio Carzaniga, Fernando Pedone. 221-231 [doi]
- HardPaxos: Replication Hardened against Hardware ErrorsDiogo Behrens, Dmitrii Kuvaiskii, Christof Fetzer. 232-241 [doi]
- Towards a Practical Survivable Intrusion Tolerant Replication SystemMarco Platania, Daniel Obenshain, Thomas Tantillo, Ricky Sharma, Yair Amir. 242-252 [doi]
- ByzID: Byzantine Fault Tolerance from Intrusion DetectionSisi Duan, Karl Levitt, Hein Meling, Sean Peisert, Haibin Zhang. 253-264 [doi]
- LO-FA-MO: Fault Detection and Systemic Awareness for the QUonG Computing SystemRoberto Ammendola, Andrea Biagioni, Ottorino Frezza, Francesca Lo Cicero, Alessandro Lonardo, Pier Stanislao Paolucci, Davide Rossetti, Francesco Simula, Laura Tosoratto, Piero Vicini. 265-270 [doi]
- FullReview: Practical Accountability in Presence of Selfish NodesAmadou Diarra, Sonia Ben Mokhtar, Pierre-Louis Aublin, Vivien Quéma. 271-280 [doi]
- Overnesia: A Resilient Overlay Network for Virtual Super-PeersJoao Carlos Antunes Leitao, Luis Eduardo Teixeira Rodrigues. 281-290 [doi]
- AcTinG: Accurate Freerider Tracking in GossipSonia Ben Mokhtar, Jeremie Decouchant, Vivien Quéma. 291-300 [doi]
- Accurate and Efficient Counting in Dynamic NetworksZhiwei Yang, Weigang Wu, Yishun Chen, Xiaola Lin. 301-310 [doi]
- A Systematic Differential Analysis for Fast and Robust Detection of Software AgingRivalino Matias, Artur Andrzejak, Fumio Machida, Diego Elias, Kishor S. Trivedi. 311-320 [doi]
- Modeling Reliability Requirements in Coordinated Node and Link MappingRiccardo Guerzoni, Zoran Despotovic, Riccardo Trivisonno, Ishan Vaishnavi. 321-330 [doi]
- A Convex Hull Query Processing Method in MANETsYuka Komai, Takahiro Hara, Shojiro Nishio. 331-332 [doi]
- A Distributed NameNode Cluster for a Highly-Available Hadoop Distributed File SystemYongHwan Kim, Tadashi Araragi, Junya Nakamura, Toshimitsu Masuzawa. 333-334 [doi]
- Practical Encoded ProcessingDmitrii Kuvaiskii, Christof Fetzer. 335-336 [doi]
- Keyword Search with Path-Based Filtering over XML StreamsSavong Bou, Toshiyuki Amagasa, Hiroyuki Kitagawa. 337-338 [doi]
- A Prototype of Power Saving Storage Method RAPoSDASatoshi Hikida, Hiroki Oguri, Haruo Yokota. 339-340 [doi]
- A Study on Efficient Event Monitoring in Dense Mobile Wireless Sensor NetworksKazuya Matsuo, Keisuke Goto, Akimitsu Kanzaki, Takahiro Hara, Shojiro Nishio. 341-342 [doi]
- Chained Signatures for Secure Program ExecutionSergei Arnautov, Christof Fetzer. 343-344 [doi]
- An Efficient Static Taint-Analysis Detecting Exploitable-Points on ARM BinariesKi-Jin Eom, Choong-Hyun Choi, Joon-Young Paik, Eun-Sun Cho. 345-346 [doi]
- Building a Strongly Consistent Multi-site File SystemRaluca Halalai, Leandro Pacheco de Sousa. 347-348 [doi]
- Adaptive Redundant Data Allocation Using Unused Blocks for Improving Access Efficiency in Dependable Storage SystemsTa Hong Viet. 349-350 [doi]
- Improving the Throughput of Wireless LAN by Tuning Carrier Sense Threshold of Access Points Based on Node Positions Detected by a Visible Light Tag SystemKodai Murakami, Tatsuya Ito, Susumu Ishihara. 351-352 [doi]