


default search action
DSN 2013: Budapest, Hungary
- 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Budapest, Hungary, June 24-27, 2013. IEEE Computer Society 2013, ISBN 978-1-4673-6471-3
- Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno, Takashi Horikawa:
Performability analysis of RAID10 versus RAID6. 1-2 - Yu-Sung Wu, Pei-Keng Sun, Chun-Chi Huang, Sung-Jer Lu, Syu-Fang Lai, Yi-Yung Chen:
EagleEye: Towards mandatory security monitoring in virtualized datacenter environment. 1-12 - Robert Surton, Ken Birman
, Robbert van Renesse:
Application-driven TCP recovery and non-stop BGP. 1-12 - Jinho Suh, Murali Annavaram
, Michel Dubois:
PHYS: Profiled-HYbrid Sampling for soft error reliability benchmarking. 1-12 - Jogesh K. Muppala
, Matti A. Hiltunen, Roy H. Campbell, Paulo Veríssimo
:
The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013. 1-2 - Domenico Cotroneo, Antonio Pecchia, Stefano Russo
:
Towards secure monitoring and control systems: Diversify! 1-2 - Jing Jin, Jeff Offutt, Nan Zheng, Feng Mao, Aaron Koehl, Haining Wang:
Evasive bots masquerading as human beings on the web. 1-12 - Yinzhi Cao, Vaibhav Rastogi, Zhichun Li, Yan Chen, Alexander Moshchuk:
Redefining web browser principals with a Configurable Origin Policy. 1-12 - Jidong Xiao, Zhang Xu, Hai Huang, Haining Wang:
Security implications of memory deduplication in a virtualized environment. 1-12 - Saurabh Bagchi, Fahad A. Arshad, Jan S. Rellermeyer
, Thomas H. Osiecki, Michael Kistler, Ahmed Gheith:
Lilliput meets brobdingnagian: Data center systems management through mobile devices. 1-6 - Stefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri
:
simFI: From single to simultaneous software fault injections. 1-12 - Andrew Newell, Daniel Obenshain, Thomas Tantillo, Cristina Nita-Rotaru, Yair Amir:
Increasing network resiliency by optimally assigning diverse variants to routing nodes. 1-12 - Yifeng Sun, Tzi-cker Chiueh:
SIDE: Isolated and efficient execution of unmodified device drivers. 1-12 - Yung-Li Hu, Wei-Bing Su, Li-ying Wu, Yennun Huang
, Sy-Yen Kuo
:
Design of event-based Intrusion Detection System on OpenFlow Network. 1-2 - Flavio Frattini, Rahul Ghosh, Marcello Cinque
, Andy J. Rindos, Kishor S. Trivedi:
Analysis of bugs in Apache Virtual Computing Lab. 1-6 - Feng Tan, Yufei Wang, Qixin Wang
, Lei Bu, Rong Zheng, Neeraj Suri
:
Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach. 1-12 - Vinaitheerthan Sundaram, Patrick Eugster:
Lightweight message tracing for debugging wireless sensor networks. 1-12 - Suman Saha, Jean-Pierre Lozi, Gaël Thomas, Julia L. Lawall, Gilles Muller:
Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software. 1-12 - Hussam Amrouch
, Thomas Ebi, Jörg Henkel:
Stress balancing to mitigate NBTI effects in register files. 1-10 - Muhammad Salman Malik, Mirko Montanari, Jun Ho Huh, Rakesh B. Bobba
, Roy H. Campbell:
Towards SDN enabled network control delegation in clouds. 1-6 - Martin Biely
, Pamela Delgado
, Zarko Milosevic, André Schiper:
Distal: A framework for implementing fault-tolerant distributed algorithms. 1-8 - Joseph Sloan, Rakesh Kumar, Greg Bronevetsky:
An algorithmic approach to error localization and partial recomputation for low-overhead fault tolerance. 1-12 - András Pataricza
:
Message from the general chair. 1 - Andrea Sansottera, Giuliano Casale, Paolo Cremonesi
:
Fitting second-order acyclic Marked Markovian Arrival Processes. 1-12 - Abhishek B. Sharma, Haifeng Chen, Min Ding, Kenji Yoshihira, Guofei Jiang:
Fault detection and localization in distributed systems using invariant relationships. 1-8 - Xu Wang, Hailong Sun, Ting Deng
, Jinpeng Huai:
Consistency or latency? A quantitative analysis of replication systems based on replicated state machines. 1-12 - Jaeho Kim, Jongmin Lee, Jongmoo Choi, Donghee Lee, Sam H. Noh:
Improving SSD reliability with RAID via Elastic Striping and Anywhere Parity. 1-12 - Zhongshu Gu, William N. Sumner
, Zhui Deng, Xiangyu Zhang, Dongyan Xu:
DRIP: A framework for purifying trojaned kernel drivers. 1-12 - Fengwei Zhang, Kevin Leach, Kun Sun
, Angelos Stavrou
:
SPECTRE: A dependable introspection framework via System Management Mode. 1-12 - Yang Liu, Jogesh K. Muppala
:
Fault-tolerance characteristics of data center network topologies using fault regions. 1-6 - Michael D. Ford, Ken Keefe, Elizabeth LeMay, William H. Sanders, Carol Muehrcke:
Implementing the ADVISE security modeling formalism in Möbius. 1-8 - Amir Mahdi Hosseini Monazzah
, Hamed Farbeh
, Seyed Ghassem Miremadi, Mahdi Fazeli
, Hossein Asadi
:
FTSPM: A Fault-Tolerant ScratchPad Memory. 1-10 - Giulio Iacobelli
, Mirco Tribastone
:
Lumpability of fluid models with heterogeneous agent types. 1-11 - George Candea:
Message from the DCCS program chair. 1 - Andreas Berger, Stefan Ruehrup, Wilfried N. Gansterer, Oliver Jung:
Locality matters: Reducing Internet traffic graphs using location analysis. 1-12 - Nosayba El-Sayed, Bianca Schroeder:
Reading between the lines of failure logs: Understanding how HPC systems fail. 1-12 - John Paul Walters, Kenneth M. Zick, Matthew French:
A practical characterization of a NASA SpaceCube application through fault emulation and laser testing. 1-8 - Michael Beham, Marius Vlad, Hans P. Reiser
:
Intrusion detection and honeypots in nested virtualization environments. 1-6 - Bikash Sharma, Praveen Jayachandran, Akshat Verma, Chita R. Das:
CloudPD: Problem determination and diagnosis in shared dynamic clouds. 1-12 - Daniele Sciascia, Fernando Pedone
:
Geo-replicated storage with scalable deferred update replication. 1-12 - Robert Birke, Andrej Podzimek, Lydia Y. Chen, Evgenia Smirni:
State-of-the-practice in data center virtualization: Toward a better understanding of VM usage. 1-12 - Anne Remke, Xian Wu:
WirelessHART modeling and performance evaluation. 1-12 - Christoph Borchert, Horst Schirmeier
, Olaf Spinczyk:
Generative software-based memory error detection and correction for operating system data structures. 1-12 - Kevin Elphinstone, Yanyan Shen:
Increasing the trustworthiness of commodity hardware through software. 1-6 - Aravind Prakash, Eknath Venkataramani
, Heng Yin
, Zhiqiang Lin:
Manipulating semantic values in kernel data structures: Attack assessments and implications. 1-12 - Maxim Siniavine, Ashvin Goel:
Seamless kernel updates. 1-12 - Jose Antonio Navas Molina, Shivakant Mishra:
Addressing memory exhaustion failures in Virtual Machines in a cloud environment. 1-6 - Matheus D'Eça Torquato de Melo
, Paulo Romero Martins Maciel, Jean Araujo
, Rúbens de Souza Matos Júnior
, Carlos Araújo:
Availability study on cloud computing environments: Live migration as a rejuvenation mechanism. 1-6 - Peng Li, Debin Gao
, Michael K. Reiter:
Mitigating access-driven timing channels in clouds using StopWatch. 1-12 - Jose Luis Nunes
, João Carlos Cunha
, Raul Barbosa
, Mário Zenha Rela
:
Evaluating Xilinx SEU Controller Macro for fault injection. 1-2 - Shin-Ying Huang, Yennun Huang
:
Network traffic anomaly detection based on growing hierarchical SOM. 1-2 - Chaitrali Amrutkar, Matti A. Hiltunen, Trevor Jim, Kaustubh R. Joshi, Oliver Spatscheck, Patrick Traynor, Shobha Venkataraman:
Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet. 1-8 - Aromhack Saysanasongkham, Kenta Imai, Masayuki Arai, Satoshi Fukumoto, Keiji Wada
:
An adaptive approach to dependable circuits for a digital power control. 1-2 - Xiwei Xu, Liming Zhu
, Jim Zhanwen Li, Len Bass, Qinghua Lu, Min Fu:
Modeling and analysing operation processes for dependability. 1-2 - Algirdas Avizienis:
The architecture of a resilience infrastructure for computing and communication systems. 1-2 - Moinuddin K. Qureshi, Zeshan Chishti:
Operating SECDED-based caches at ultra-low voltage with FLAIR. 1-11 - Francisco Maia
, Miguel Matos
, Ricardo Manuel Pereira Vilaça
, José Pereira
, Rui Oliveira
, Etienne Rivière:
DATAFLASKS: An epidemic dependable key-value substrate. 1-6 - Qiushi Wang, Huaming Wu, Katinka Wolter:
Model-based performance analysis of local re-execution scheme in offloading system. 1-6 - Cristian Zamfir, Gautam Altekar, Ion Stoica:
Automating the debugging of datacenter applications with ADDA. 1-12 - Engin Leloglu, Tolga Ayav
, Burak Galip Aslan:
A review of cloud deployment models for e-learning systems. 1-2 - Nuno Silva, Ricardo Barbosa, João Carlos Cunha
, Marco Vieira
:
A view on the past and future of fault injection. 1-2 - Javier Alonso, Michael Grottke
, Allen P. Nikora, Kishor S. Trivedi:
An empirical investigation of fault repairs and mitigations in space mission system software. 1-8 - Himanshu Pareek, N. Sarat Chandra Babu:
Complementing static and dynamic analysis approaches for better network defense. 1-2 - Anna Kolesnichenko, Pieter-Tjerk de Boer, Anne Remke, Boudewijn R. Haverkort
:
A logic for model-checking mean-field models. 1-12 - Gang Wang, Jack W. Stokes, Cormac Herley, David Felstead:
Detecting malicious landing pages in Malware Distribution Networks. 1-11 - Maria Couceiro, Pedro Ruivo, Paolo Romano
, Luís E. T. Rodrigues:
Chasing the optimum in replicated in-memory transactional platforms via protocol adaptation. 1-12 - Bruno Silva, Paulo Romero Martins Maciel, Eduardo Tavares
, Armin Zimmermann
:
Dependability models for designing disaster tolerant cloud computing systems. 1-6 - Emmanuelle Anceaume, Yann Busnel
, Bruno Sericola:
Uniform node sampling service robust against collusions of malicious nodes. 1-12 - Peter Kemper:
Message from the PDS program chair. 1 - Anna Thomas, Karthik Pattabiraman:
Error detector placement for soft computation. 1-12 - Cristiano Giuffrida
, Lorenzo Cavallaro
, Andrew S. Tanenbaum
:
Practical automated vulnerability monitoring using program state invariants. 1-12 - Srinivas Krishnan, Teryl Taylor, Fabian Monrose, John McHugh:
Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing. 1-12

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.