|
Conferences in DBLP
Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
DCCS Program Committee. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
Conference Organizers. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
Welcome Message from the General Chair and Conference Coordinator. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
DCCS Reviewers. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
PDS Reviewers. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
Message from the Performance and Dependability Symposium (PDS) Program Co-Chairs. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
W.C. Carter Award. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
- Mitsuyuki Hoshiba
Observation of Local and Distant Earthquakes and Tsunami Warning System. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
PDS Steering and Program Committees. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:- [Conf]
- Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello
Assured Reconfiguration of Fail-Stop Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:2-11 [Conf]
- David Bernick, Bill Bruckert, Paul Del Vigna, David Garcia, Robert Jardine, Jim Klecka, Jim Smullen
NonStop® Advanced Architecture. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:12-21 [Conf]
- Partha Dutta, Rachid Guerraoui, Leslie Lamport
How Fast Can Eventual Synchrony Lead to Consensus?. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:22-27 [Conf]
- Nicholas J. Wang, Sanjay J. Patel
ReStore: Symptom Based Soft Error Detection in Microprocessors. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:30-39 [Conf]
- Srivathsan Krishnamohan, Nihar R. Mahapatra
Combining Error Masking and Error Detection Plus Recovery to Combat Soft Errors in Static CMOS Circuits. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:40-49 [Conf]
- Paolo Bernardi, Leticia Maria Veiras Bolzani, Maurizio Rebaudengo, Matteo Sonza Reorda, Fabian Vargas, Massimo Violante
On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:50-58 [Conf]
- Robert W. Reeder, Roy A. Maxion
User Interface Dependability through Goal-Error Prevention. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:60-69 [Conf]
- Sampath Yerramalla, Bojan Cukic, Martin Mladenovski, Edgar Fuller
Stability Monitoring and Analysis of Learning in an Adaptive System. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:70-79 [Conf]
- Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Krits, Roman Vitenberg
Effective Testing and Debugging Techniques for a Group Communication System. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:80-85 [Conf]
- Andréas Johansson, Neeraj Suri
Error Propagation Profiling of Operating Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:86-95 [Conf]
- Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo
How Resilient are Distributed f Fault/Intrusion-Tolerant Systems? [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:98-107 [Conf]
- Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya
Towards a Theory of Insider Threat Assessment. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:108-117 [Conf]
- Zonghua Zhang, Hong Shen
Constructing Multi-Layered Boundary to Defend Against Intrusive Anomalies: An Autonomic Detection Coordinator. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:118-127 [Conf]
- Mohamed G. Gouda, Alex X. Liu
A Model of Stateful Firewalls and Its Properties. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:128-137 [Conf]
- Chunqiang Tang, Rong N. Chang, Christopher Ward
GoCast: Gossip-Enhanced Overlay Multicast for Fast and Dependable Group Communication. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:140-149 [Conf]
- Jian Wu, Kang G. Shin
SMRP: Fast Restoration of Multicast Sessions from Persistent Failures. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:150-159 [Conf]
- Vadim Drabkin, Roy Friedman, Marc Segal
Efficient Byzantine Broadcast in Wireless Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:160-169 [Conf]
- Tina Wong, Van Jacobson, Cengiz Alaettinoglu
Internet Routing Anomaly Detection and Visualization. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:172-181 [Conf]
- Rebecca L. Collins, James S. Plank
Assessing the Performance of Erasure Codes in the Wide-Area. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:182-187 [Conf]
- Yin Zhang, Zihui Ge
Finding Critical Traffic Matrices. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:188-197 [Conf]
- Paul Murray
A Distributed State Monitoring Service for Adaptive Application Management. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:200-205 [Conf]
- Xavier Défago, Péter Urbán, Naohiro Hayashibara, Takuya Katayama
Definition and Specification of Accrual Failure Detectors. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:206-215 [Conf]
- Kymie M. C. Tan, Roy A. Maxion
The Effects of Algorithmic Diversity on Anomaly Detector Performance. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:216-225 [Conf]
- Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam
On Partial Protection in Groomed Optical WDM Mesh Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:228-237 [Conf]
- Audun Fosselie Hansen, Amund Kvalbein, Tarik Cicic, Stein Gjessing, Olav Lysne
Resilient Routing Layers for Recovery in Packet Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:238-247 [Conf]
- Steven Y. Ko, Indranil Gupta
Perturbation-Resistant and Overlay-Independent Resource Discovery. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:248-257 [Conf]
- G. John Janakiraman, Jose Renato Santos, Dinesh Subhraveti, Yoshio Turner
Cruz: Application-Transparent Distributed Checkpoint-Restart on Standard Operating Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:260-269 [Conf]
- François Taïani, Jean-Charles Fabre, Marc-Olivier Killijian
A Multi-Level Meta-Object Protocol for Fault-Tolerance in Complex Architectures. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:270-279 [Conf]
- Archana Ganapathi, David A. Patterson
Crash Data Collection: A Windows Case Study. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:280-285 [Conf]
- Fanglu Guo, Tzi-cker Chiueh
Scalable and Robust WLAN Connectivity Using Access Point Array. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:288-297 [Conf]
- Brendan Hall, Kevin Driscoll, Michael Paulitsch, Samar Dajani-Brown
Ringing out Fault Tolerance. A New Ring Network for Superior Low-Cost Dependability. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:298-307 [Conf]
- Manish Marwah, Shivakant Mishra, Christof Fetzer
A System Demonstration of ST-TCP. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:308-313 [Conf]
- Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy
A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:316-325 [Conf]
- James S. Plank, Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason
Small Parity-Check Erasure Codes - Exploration and Observations. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:326-335 [Conf]
- Marcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu
Using Erasure Codes Efficiently for Storage in a Distributed System. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:336-345 [Conf]
- Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:346-355 [Conf]
- Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting
Authenticated System Calls. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:358-367 [Conf]
- Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski
Detecting Stealth Software with Strider GhostBuster. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:368-377 [Conf]
- Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:378-387 [Conf]
- Lap-Chung Lam, Tzi-cker Chiueh
Checking Array Bound Violation Using Segmentation Hardware. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:388-397 [Conf]
- Cristian Constantinescu, Karama Kanoun, Henrique Madeira, Brendan Murphy, Ira Pramanick, Aaron B. Brown
Dependability Benchmarking of Computing Systems - Panel Statement. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:400- [Conf]
- Jean-Philippe Martin, Lorenzo Alvisi
Fast Byzantine Consensus. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:402-411 [Conf]
- Sérgio Gorender, Raimundo A. Macêdo, Michel Raynal
A Hybrid and Adaptive Model for Fault-Tolerant Distributed Computing. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:412-421 [Conf]
- Lívia M. R. Sampaio, Francisco Vilar Brasileiro
Adaptive Indulgent Consensus. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:422-431 [Conf]
- Moinuddin K. Qureshi, Onur Mutlu, Yale N. Patt
Microarchitecture-Based Introspection: A Technique for Transient-Fault Tolerance in Microprocessors. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:434-443 [Conf]
- P. Oscar Boykin, Vwani P. Roychowdhury
Reversible Fault-Tolerant Logic. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:444-453 [Conf]
- Sumant Kowshik, Girish Baliga, Scott Graham, Lui Sha
Co-Design Based Approach to Improve Robustness in Networked Control Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:454-463 [Conf]
- Sabine M. Böhm
H-RAFT - Heuristic Reachability Analysis for Fault Tolerance Protocols Modelled in SDL. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:466-475 [Conf]
- Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Ramendra K. Sahoo, José E. Moreira, Manish Gupta
Filtering Failure Logs for a BlueGene/L Prototype. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:476-485 [Conf]
- Elizabeth Latronico, Philip Koopman
Design Time Reliability Analysis of Distributed Fault Tolerance Algorithms. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:486-495 [Conf]
- Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers
SoftArch: An Architecture Level Tool for Modeling and Analyzing Soft Errors. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:496-505 [Conf]
- Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:508-517 [Conf]
- Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:518-527 [Conf]
- Sarah Sellke, Ness B. Shroff, Saurabh Bagchi
Modeling and Automated Containment of Worms. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:528-537 [Conf]
- Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage
Fatih: Detecting and Isolating Malicious Routers. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:538-547 [Conf]
- Peter Kemper, Dennis Müller, Axel Thümmler
Combining Response Surface Methodology with Numerical Models for Optimization of Class-Based Queueing Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:550-559 [Conf]
- Michael Grottke, Kishor S. Trivedi
On a Method for Mending Time to Failure Distributions. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:560-569 [Conf]
- Ann T. Tai, Kam S. Tso, William H. Sanders, Savio N. Chau
A Performability-Oriented Software Rejuvenation Framework for Distributed Applications. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:570-579 [Conf]
- Xiapu Luo, Rocky K. C. Chang
Optimizing the Pulsing Denial-of-Service Attacks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:582-591 [Conf]
- Marco Vieira, Henrique Madeira
Towards a Security Benchmark for Database Management Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:592-601 [Conf]
- Susmit Panjwani, Stephanie Tan, Keith M. Jarrin, Michel Cukier
An Experimental Evaluation to Determine if Port Scans are Precursors to an Attack. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:602-611 [Conf]
- Issa Khalil, Saurabh Bagchi, Ness B. Shroff
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:612-621 [Conf]
- Lorenzo Falai, Andrea Bondavalli
Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:624-633 [Conf]
- Adam J. Oliner, Larry Rudolph, Ramendra K. Sahoo, José E. Moreira, Manish Gupta
Probabilistic QoS Guarantees for Supercomputing Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:634-643 [Conf]
- Steve Zhang, Ira Cohen, Moisés Goldszmidt, Julie Symons, Armando Fox
Ensembles of Models for Automated Diagnosis of System Performance Problems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:644-653 [Conf]
- Joakim Aidemark, Peter Folkesson, Johan Karlsson
A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:656-665 [Conf]
- Jonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson
Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:666-671 [Conf]
- Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:672-681 [Conf]
- Sherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon
Improving TCP Performance for Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:684-693 [Conf]
- Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano Gaeta, Michele Garetto, Daniele Manini, Matteo Sereno
A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:694-703 [Conf]
- Henrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen
Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:704-709 [Conf]
- Axel Thümmler, Peter Buchholz, Miklós Telek
A Novel Approach for Fitting Probability Distributions to Real Trace Data with the EM Algorithm. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:712-721 [Conf]
- Lucia Cloth, Joost-Pieter Katoen, Maneesh Khattri, Reza Pulungan
Model Checking Markov Reward Models with Impulse Rewards. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:722-731 [Conf]
- Yi Zhang, David Parker, Marta Z. Kwiatkowska
A Wavefront Parallelisation of CTMC Solution Using MTBDDs. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:732-741 [Conf]
- Salem Derisavi, Peter Kemper, William H. Sanders
Lumping Matrix Diagram Representations of Markov Models. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:742-751 [Conf]
- Cristian Constantinescu
Neutron SER Characterization of Microprocessors. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:754-759 [Conf]
- Giacinto Paolo Saggese, Anoop Vetteth, Zbigniew Kalbarczyk, Ravishankar K. Iyer
Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:760-769 [Conf]
- Gokhan Memik, Masud H. Chowdhury, Arindam Mallik, Yehea I. Ismail
Engineering Over-Clocking: Reliability-Performance Trade-Offs for High-Performance Register Files. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:770-779 [Conf]
- Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki
Analysis of Probabilistic Trapezoid Protocol for Data Replication. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:782-791 [Conf]
- A. Sousa, José Pereira, L. Soares, Afrânio Correia Jr., L. Rocha, Rui Carlos Oliveira, Francisco Moura
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:792-801 [Conf]
- Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau
Model-Based Failure Analysis of Journaling File Systems. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:802-811 [Conf]
- Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood
Modeling Coordinated Checkpointing for Large-Scale Supercomputers. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:812-821 [Conf]
- Takuya Katayama, Yutaka Ishikawa, Yoshiki Kinoshita
Workshop on Dependable Software - Tools and Methods - Workshop Abstract. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:824- [Conf]
- George Candea, David L. Oppenheimer
Workshop on Hot Topics in System Depend - Workshop Abstract. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:826-827 [Conf]
- Saïda Benlarbi
Workshop on Assurance of Networking Systems Dependability Service Level Agreements - Workshop Abstract. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:830- [Conf]
|