The SCEAS System
Navigation Menu

Conferences in DBLP

Dependable Systems and Networks (dsn)
2005 (conf/dsn/2005)


  1. Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  2. DCCS Program Committee. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  3. Conference Organizers. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  4. Welcome Message from the General Chair and Conference Coordinator. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  5. DCCS Reviewers. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  6. PDS Reviewers. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  7. Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  8. W.C. Carter Award. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]
  9. Mitsuyuki Hoshiba
    Observation of Local and Distant Earthquakes and Tsunami Warning System. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]

  10. PDS Steering and Program Committees. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:- [Conf]
  11. Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello
    Assured Reconfiguration of Fail-Stop Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:2-11 [Conf]
  12. David Bernick, Bill Bruckert, Paul Del Vigna, David Garcia, Robert Jardine, Jim Klecka, Jim Smullen
    NonStop® Advanced Architecture. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:12-21 [Conf]
  13. Partha Dutta, Rachid Guerraoui, Leslie Lamport
    How Fast Can Eventual Synchrony Lead to Consensus?. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:22-27 [Conf]
  14. Nicholas J. Wang, Sanjay J. Patel
    ReStore: Symptom Based Soft Error Detection in Microprocessors. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:30-39 [Conf]
  15. Srivathsan Krishnamohan, Nihar R. Mahapatra
    Combining Error Masking and Error Detection Plus Recovery to Combat Soft Errors in Static CMOS Circuits. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:40-49 [Conf]
  16. Paolo Bernardi, Leticia Maria Veiras Bolzani, Maurizio Rebaudengo, Matteo Sonza Reorda, Fabian Vargas, Massimo Violante
    On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:50-58 [Conf]
  17. Robert W. Reeder, Roy A. Maxion
    User Interface Dependability through Goal-Error Prevention. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:60-69 [Conf]
  18. Sampath Yerramalla, Bojan Cukic, Martin Mladenovski, Edgar Fuller
    Stability Monitoring and Analysis of Learning in an Adaptive System. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:70-79 [Conf]
  19. Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Krits, Roman Vitenberg
    Effective Testing and Debugging Techniques for a Group Communication System. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:80-85 [Conf]
  20. Andréas Johansson, Neeraj Suri
    Error Propagation Profiling of Operating Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:86-95 [Conf]
  21. Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo
    How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:98-107 [Conf]
  22. Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya
    Towards a Theory of Insider Threat Assessment. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:108-117 [Conf]
  23. Zonghua Zhang, Hong Shen
    Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:118-127 [Conf]
  24. Mohamed G. Gouda, Alex X. Liu
    A Model of Stateful Firewalls and Its Properties. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:128-137 [Conf]
  25. Chunqiang Tang, Rong N. Chang, Christopher Ward
    GoCast: Gossip-Enhanced Overlay Multicast for Fast and Dependable Group Communication. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:140-149 [Conf]
  26. Jian Wu, Kang G. Shin
    SMRP: Fast Restoration of Multicast Sessions from Persistent Failures. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:150-159 [Conf]
  27. Vadim Drabkin, Roy Friedman, Marc Segal
    Efficient Byzantine Broadcast in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:160-169 [Conf]
  28. Tina Wong, Van Jacobson, Cengiz Alaettinoglu
    Internet Routing Anomaly Detection and Visualization. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:172-181 [Conf]
  29. Rebecca L. Collins, James S. Plank
    Assessing the Performance of Erasure Codes in the Wide-Area. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:182-187 [Conf]
  30. Yin Zhang, Zihui Ge
    Finding Critical Traffic Matrices. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:188-197 [Conf]
  31. Paul Murray
    A Distributed State Monitoring Service for Adaptive Application Management. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:200-205 [Conf]
  32. Xavier Défago, Péter Urbán, Naohiro Hayashibara, Takuya Katayama
    Definition and Specification of Accrual Failure Detectors. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:206-215 [Conf]
  33. Kymie M. C. Tan, Roy A. Maxion
    The Effects of Algorithmic Diversity on Anomaly Detector Performance. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:216-225 [Conf]
  34. Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam
    On Partial Protection in Groomed Optical WDM Mesh Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:228-237 [Conf]
  35. Audun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing, Olav Lysne
    Resilient Routing Layers for Recovery in Packet Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:238-247 [Conf]
  36. Steven Y. Ko, Indranil Gupta
    Perturbation-Resistant and Overlay-Independent Resource Discovery. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:248-257 [Conf]
  37. G. John Janakiraman, Jose Renato Santos, Dinesh Subhraveti, Yoshio Turner
    Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:260-269 [Conf]
  38. François Taïani, Jean-Charles Fabre, Marc-Olivier Killijian
    A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:270-279 [Conf]
  39. Archana Ganapathi, David A. Patterson
    Crash Data Collection: A Windows Case Study. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:280-285 [Conf]
  40. Fanglu Guo, Tzi-cker Chiueh
    Scalable and Robust WLAN Connectivity Using Access Point Array. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:288-297 [Conf]
  41. Brendan Hall, Kevin Driscoll, Michael Paulitsch, Samar Dajani-Brown
    Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:298-307 [Conf]
  42. Manish Marwah, Shivakant Mishra, Christof Fetzer
    A System Demonstration of ST-TCP. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:308-313 [Conf]
  43. Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy
    A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:316-325 [Conf]
  44. James S. Plank, Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason
    Small Parity-Check Erasure Codes - Exploration and Observations. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:326-335 [Conf]
  45. Marcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu
    Using Erasure Codes Efficiently for Storage in a Distributed System. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:336-345 [Conf]
  46. Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman
    Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:346-355 [Conf]
  47. Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting
    Authenticated System Calls. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:358-367 [Conf]
  48. Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski
    Detecting Stealth Software with Strider GhostBuster. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:368-377 [Conf]
  49. Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Defeating Memory Corruption Attacks via Pointer Taintedness Detection. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:378-387 [Conf]
  50. Lap-Chung Lam, Tzi-cker Chiueh
    Checking Array Bound Violation Using Segmentation Hardware. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:388-397 [Conf]
  51. Cristian Constantinescu, Karama Kanoun, Henrique Madeira, Brendan Murphy, Ira Pramanick, Aaron B. Brown
    Dependability Benchmarking of Computing Systems - Panel Statement. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:400- [Conf]
  52. Jean-Philippe Martin, Lorenzo Alvisi
    Fast Byzantine Consensus. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:402-411 [Conf]
  53. Sérgio Gorender, Raimundo A. Macêdo, Michel Raynal
    A Hybrid and Adaptive Model for Fault-Tolerant Distributed Computing. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:412-421 [Conf]
  54. Lívia M. R. Sampaio, Francisco Vilar Brasileiro
    Adaptive Indulgent Consensus. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:422-431 [Conf]
  55. Moinuddin K. Qureshi, Onur Mutlu, Yale N. Patt
    Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:434-443 [Conf]
  56. P. Oscar Boykin, Vwani P. Roychowdhury
    Reversible Fault-Tolerant Logic. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:444-453 [Conf]
  57. Sumant Kowshik, Girish Baliga, Scott Graham, Lui Sha
    Co-Design Based Approach to Improve Robustness in Networked Control Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:454-463 [Conf]
  58. Sabine M. Böhm
    H-RAFT - Heuristic Reachability Analysis for Fault Tolerance Protocols Modelled in SDL. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:466-475 [Conf]
  59. Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Ramendra K. Sahoo, José E. Moreira, Manish Gupta
    Filtering Failure Logs for a BlueGene/L Prototype. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:476-485 [Conf]
  60. Elizabeth Latronico, Philip Koopman
    Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:486-495 [Conf]
  61. Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers
    SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:496-505 [Conf]
  62. Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
    ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:508-517 [Conf]
  63. Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Neutralization of Errors and Attacks in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:518-527 [Conf]
  64. Sarah Sellke, Ness B. Shroff, Saurabh Bagchi
    Modeling and Automated Containment of Worms. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:528-537 [Conf]
  65. Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage
    Fatih: Detecting and Isolating Malicious Routers. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:538-547 [Conf]
  66. Peter Kemper, Dennis Müller, Axel Thümmler
    Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:550-559 [Conf]
  67. Michael Grottke, Kishor S. Trivedi
    On a Method for Mending Time to Failure Distributions. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:560-569 [Conf]
  68. Ann T. Tai, Kam S. Tso, William H. Sanders, Savio N. Chau
    A Performability-Oriented Software Rejuvenation Framework for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:570-579 [Conf]
  69. Xiapu Luo, Rocky K. C. Chang
    Optimizing the Pulsing Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:582-591 [Conf]
  70. Marco Vieira, Henrique Madeira
    Towards a Security Benchmark for Database Management Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:592-601 [Conf]
  71. Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier
    An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:602-611 [Conf]
  72. Issa Khalil, Saurabh Bagchi, Ness B. Shroff
    LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:612-621 [Conf]
  73. Lorenzo Falai, Andrea Bondavalli
    Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:624-633 [Conf]
  74. Adam J. Oliner, Larry Rudolph, Ramendra K. Sahoo, José E. Moreira, Manish Gupta
    Probabilistic QoS Guarantees for Supercomputing Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:634-643 [Conf]
  75. Steve Zhang, Ira Cohen, Moisés Goldszmidt, Julie Symons, Armando Fox
    Ensembles of Models for Automated Diagnosis of System Performance Problems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:644-653 [Conf]
  76. Joakim Aidemark, Peter Folkesson, Johan Karlsson
    A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:656-665 [Conf]
  77. Jonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson
    Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:666-671 [Conf]
  78. Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu
    TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:672-681 [Conf]
  79. Sherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon
    Improving TCP Performance for Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:684-693 [Conf]
  80. Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano Gaeta, Michele Garetto, Daniele Manini, Matteo Sereno
    A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:694-703 [Conf]
  81. Henrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen
    Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:704-709 [Conf]
  82. Axel Thümmler, Peter Buchholz, Miklós Telek
    A Novel Approach for Fitting Probability Distributions to Real Trace Data with the EM Algorithm. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:712-721 [Conf]
  83. Lucia Cloth, Joost-Pieter Katoen, Maneesh Khattri, Reza Pulungan
    Model Checking Markov Reward Models with Impulse Rewards. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:722-731 [Conf]
  84. Yi Zhang, David Parker, Marta Z. Kwiatkowska
    A Wavefront Parallelisation of CTMC Solution Using MTBDDs. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:732-741 [Conf]
  85. Salem Derisavi, Peter Kemper, William H. Sanders
    Lumping Matrix Diagram Representations of Markov Models. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:742-751 [Conf]
  86. Cristian Constantinescu
    Neutron SER Characterization of Microprocessors. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:754-759 [Conf]
  87. Giacinto Paolo Saggese, Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:760-769 [Conf]
  88. Gokhan Memik, Masud H. Chowdhury, Arindam Mallik, Yehea I. Ismail
    Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:770-779 [Conf]
  89. Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki
    Analysis of Probabilistic Trapezoid Protocol for Data Replication. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:782-791 [Conf]
  90. A. Sousa, José Pereira, L. Soares, Afrânio Correia Jr., L. Rocha, Rui Carlos Oliveira, Francisco Moura
    Testing the Dependability and Performance of Group Communication Based Database Replication Protocols. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:792-801 [Conf]
  91. Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
    Model-Based Failure Analysis of Journaling File Systems. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:802-811 [Conf]
  92. Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood
    Modeling Coordinated Checkpointing for Large-Scale Supercomputers. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:812-821 [Conf]
  93. Takuya Katayama, Yutaka Ishikawa, Yoshiki Kinoshita
    Workshop on Dependable Software - Tools and Methods - Workshop Abstract. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:824- [Conf]
  94. George Candea, David L. Oppenheimer
    Workshop on Hot Topics in System Depend - Workshop Abstract. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:826-827 [Conf]
  95. Saïda Benlarbi
    Workshop on Assurance of Networking Systems Dependability Service Level Agreements - Workshop Abstract. [Citation Graph (0, 0)][DBLP]
    DSN, 2005, pp:830- [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002