The SCEAS System
Navigation Menu

Conferences in DBLP

Dependable Systems and Networks (dsn)
2006 (conf/dsn/2006)


  1. Conference Organizers. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  2. Welcome Message from the General Chair. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  3. William C. Carter Award. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  4. Message from the Performance and Dependability Symposium (PDS) Program Chair. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  5. Welcome Message from the Conference Coordinator. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]
  6. Ambuj Goyal
    Delivering Dependability: A Moving Target. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  7. DCCS Program Committee. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  8. PDS Program Committee. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  9. List of Reviewers for PDS. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  10. Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]

  11. List of Reviewers for DCCS. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:- [Conf]
  12. Justin Ray, Philip Koopman
    Efficient High Hamming Distance CRCs for Embedded Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:3-12 [Conf]
  13. Guangyu Chen, Mahmut T. Kandemir, Ibrahim Kolcu
    Memory-Conscious Reliable Execution on Embedded Chip Multiprocessors. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:13-22 [Conf]
  14. Sumant Kowshik, Grigore Rosu, Lui Sha
    Static Analysis to Enforce Safe Value Flow in Embedded Control Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:23-34 [Conf]
  15. Wilfried Steiner, Hermann Kopetz
    The Startup Problem in Fault-Tolerant Time-Triggered Communication. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:35-44 [Conf]
  16. Thomas Kottke, Andreas Steininger
    A Reconfigurable Generic Dual-Core Architecture. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:45-54 [Conf]
  17. Gregory C. Sharp, Nagarajan Kandasamy
    A Dependable System Architecture for Safety-Critical Respiratory-Gated Radiation Therapy. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:55-60 [Conf]
  18. Robert W. Reeder, Roy A. Maxion
    User Interface Defect Detection by Hesitation Analysis. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:61-72 [Conf]
  19. Albert Meixner, Daniel J. Sorin
    Dynamic Verification of Memory Consistency in Cache-Coherent Multithreaded Computer Architectures. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:73-82 [Conf]
  20. Jonathan Chang, George A. Reis, David I. August
    Automatic Instruction-Level Software-Only Recovery. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:83-92 [Conf]
  21. Dongkook Park, Chrysostomos Nicopoulos, Jongman Kim, Narayanan Vijaykrishnan, Chita R. Das
    Exploring Fault-Tolerant Network-on-Chip Architectures. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:93-104 [Conf]
  22. Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David Zage
    Scaling Byzantine Fault-Tolerant Replication toWide Area Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:105-114 [Conf]
  23. Christian Cachin, Stefano Tessaro
    Optimal Resilience for Erasure-Coded Byzantine Distributed Storage. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:115-124 [Conf]
  24. Rachid Guerraoui, Ron R. Levy, Marko Vukolic
    Lucky Read/Write Access to Robust Atomic Storage. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:125-136 [Conf]
  25. Dan Dobre, Neeraj Suri
    One-step Consensus with Zero-Degradation. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:137-146 [Conf]
  26. Marcos Kawazoe Aguilera, Carole Delporte-Gallet, Hugues Fauconnier, Sam Toueg
    Consensus with Byzantine Failures and Little System Synchrony. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:147-155 [Conf]
  27. Richard Ekwall, André Schiper
    Solving Atomic Broadcast with Indirect Consensus. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:156-165 [Conf]
  28. Antonio Fernández, Ernesto Jiménez, Michel Raynal
    Eventual Leader Election with Weak Assumptions on Initial Knowledge, Communication Reliability, and Synchrony. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:166-178 [Conf]
  29. Evan Cooke, Zhuoqing Morley Mao, Farnam Jahanian
    Hotspots: The Root Causes of Non-Uniformity in Self-Propagating Malware. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:179-188 [Conf]
  30. Vyas Sekar, Yinglian Xie, Michael K. Reiter, Hui Zhang
    A Multi-Resolution Approach forWorm Detection and Containment. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:189-198 [Conf]
  31. Cliff Changchun Zou, Ryan Cunningham
    Honeypot-Aware Advanced Botnet Construction and Maintenance. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:199-208 [Conf]
  32. Michael Ihde, William H. Sanders
    Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:209-216 [Conf]
  33. James Lee Hafner
    HoVer Erasure Codes For Disk Arrays. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:217-226 [Conf]
  34. John A. Chandy
    Storage Allocation in Unreliable Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:227-236 [Conf]
  35. K. K. Rao, James Lee Hafner, Richard A. Golding
    Reliability for Networked Storage Nodes. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:237-248 [Conf]
  36. Bianca Schroeder, Garth A. Gibson
    A large-scale study of failures in high-performance computing systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:249-258 [Conf]
  37. Zhen Guo, Guofei Jiang, Haifeng Chen, Kenji Yoshihira
    Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:259-268 [Conf]
  38. Dinakar Dhurjati, Vikram S. Adve
    Efficiently Detecting All Dangling Pointer Uses in Production Servers. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:269-280 [Conf]
  39. Jie Hu, Shuai Wang, Sotirios G. Ziavras
    In-Register Duplication: Exploiting Narrow-Width Value for Improving Register File Reliability. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:281-290 [Conf]
  40. David de Andrés, Juan Carlos Ruiz, Daniel Gil, Pedro J. Gil
    Run-Time Reconfiguration for Emulating Transient Faults in VLSI Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:291-300 [Conf]
  41. Smruti R. Sarangi, Brian Greskamp, Josep Torrellas
    CADRE: Cycle-Accurate Deterministic Replay for Hardware Debugging. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:301-312 [Conf]
  42. Marcello Cinque, Domenico Cotroneo, Stefano Russo
    Collecting and Analyzing Failure Data of Bluetooth Personal Area Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:313-322 [Conf]
  43. Amit Sahoo, Krishna Kant, Prasant Mohapatra
    Improving BGP Convergence Delay for Large-Scale Failures. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:323-332 [Conf]
  44. Sihyung Lee, Tina Wong, Hyong S. Kim
    Secure Split Assignment Trajectory Sampling: A Malicious Router Detection System. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:333-342 [Conf]
  45. Joseph S. Kong, Jesse S. A. Bridgewater, Vwani P. Roychowdhury
    A General Framework for Scalability and Performance Analysis of DHT Routing Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:343-354 [Conf]
  46. Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
    Dependability Analysis of Virtual Memory Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:355-364 [Conf]
  47. Dong Tang, Peter Carruthers, Zuheir Totari, Michael W. Shapiro
    Assessment of the Effect of Memory Page Retirement on System RAS Against Hardware Faults. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:365-370 [Conf]
  48. Shravan Gaonkar, Kimberly Keeton, Arif Merchant, William H. Sanders
    Designing dependable storage solutions for shared application environments. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:371-382 [Conf]
  49. Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan
    A Statistical Analysis of Attack Data to Separate Attacks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:383-392 [Conf]
  50. Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia
    VoIP Intrusion Detection Through Interacting Protocol State Machines. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:393-402 [Conf]
  51. Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei
    Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:403-412 [Conf]
  52. Lap-Chung Lam, Wei Li, Tzi-cker Chiueh
    Accurate and Automated System Call Policy-Based Intrusion Prevention. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:413-424 [Conf]
  53. Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Morris Jette, Ramendra K. Sahoo
    BlueGene/L Failure Analysis and Prediction Models. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:425-434 [Conf]
  54. Alberto Avritzer, Andre B. Bondi, Michael Grottke, Kishor S. Trivedi, Elaine J. Weyuker
    Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:435-444 [Conf]
  55. Kaustubh R. Joshi, William H. Sanders, Matti A. Hiltunen, Richard D. Schlichting
    Automatic Recovery Using Bounded Partially Observable Markov Decision Processes. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:445-456 [Conf]
  56. Nuno Ferreira Neves, Joao Antunes, Miguel Correia, Paulo Veríssimo, Rui Neves
    Using Attack Injection to Discover New Vulnerabilities. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:457-466 [Conf]
  57. Robert Meyer, Michel Cukier
    Assessing the Attack Threat due to IRC Channels. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:467-472 [Conf]
  58. Claudio Basile, Meeta Gupta, Zbigniew Kalbarczyk, Ravi K. Iyer
    An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:473-484 [Conf]
  59. Vinh Vi Lam, William H. Sanders, Peter Buchholz
    A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCs. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:485-494 [Conf]
  60. Qi Zhang, Ningfang Mi, Evgenia Smirni, Alma Riska, Erik Riedel
    Evaluating the Performability of Systems with Background Jobs. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:495-504 [Conf]
  61. Katerina Goseva-Popstojanova, Fengbin Li, Xuan Wang, Amit Sangle
    A Contribution Towards Solving the Web Workload Puzzle. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:505-516 [Conf]
  62. Jennie Palmer, Isi Mitrani
    Empirical and Analytical Evaluation of Systems with Multiple Unreliable Servers. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:517-525 [Conf]
  63. Ludmila Cherkasova, Jerome A. Rolia
    R-Opus: A Composite Framework for Application Performability and QoS in Shared Resource Pools. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:526-535 [Conf]
  64. Jinliang Fan, Tianying Chang, Dimitrios E. Pendarakis, Zhen Liu
    Cost-Effective Configuration of Content Resiliency Services Under Correlated Failures. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:536-548 [Conf]
  65. Rachid Guerraoui, Ron R. Levy, Bastian Pochon, Vivien Quéma
    High Throughput Total Order Broadcast for Cluster Environments. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:549-557 [Conf]
  66. Guang Tan, Stephen A. Jarvis, Daniel P. Spooner
    Improving the Fault Resilience of Overlay Multicast for Media Streaming. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:558-567 [Conf]
  67. Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Paulo Veríssimo
    Randomized Intrusion-Tolerant Asynchronous Services. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:568-577 [Conf]
  68. Qurat-ul-Ain Inayat, Paul Devadoss Ezhilchelvan
    A Performance Study on the Signal-On-Fail Approach to Imposing Total Order in the Streets of Byzantium. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:578-590 [Conf]
  69. Adnan Agbaria, Claudio Basile, Zbigniew Kalbarczyk
    Workshop on Applied Software Reliability (WASR). [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:591- [Conf]
  70. Rogério de Lemos, Cristina Gacek, Alexander Romanovsky
    Workshop on Architecting Dependable Systems (WADS). [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:592- [Conf]
  71. Michel Cukier, Ioana Rus
    Workshop on Empirical Evaluation of Dependability and Security (WEEDS). [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:593- [Conf]
  72. Christof Fetzer
    Student Forum. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:594- [Conf]
  73. Saurabh Bagchi
    Fast Abstracts. [Citation Graph (0, 0)][DBLP]
    DSN, 2006, pp:595- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002