


default search action
DSN 2007: Edinburgh, UK
- The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings. IEEE Computer Society 2007, ISBN 0-7695-2855-4

Keynote Address
- Tony Hoare:

Science and Engineering: A Collusion of Cultures. 2-9
Dependable Computing and Communications Symposium (DCCS)
Session 1A: Security Protection: Architectural Approaches
- Yixin Shi, Gyungho Lee:

Augmenting Branch Predictor to Secure Program Execution. 10-19 - Ying Zhang, Zhuoqing Morley Mao, Jia Wang:

A Firewall for Routers: Protecting against Routing Misbehavior. 20-29 - Ryan D. Riley

, Xuxian Jiang, Dongyan Xu:
An Architectural Approach to Preventing Code Injection Attacks. 30-40
Session 1B: Software Fault Tolerance
- Jorrit N. Herder, Herbert Bos

, Ben Gras, Philip Homburg, Andrew S. Tanenbaum:
Failure Resilience for Device Drivers. 41-50 - Nicolas Salatgé, Jean-Charles Fabre:

Fault Tolerance Connectors for Unreliable Web Services. 51-60 - Martin Süßkraut, Christof Fetzer:

Robustness and Security Hardening of COTS Software Libraries. 61-71
Session 2A: Distributed Consensus
- Piotr Zielinski:

Automatic Verification and Discovery of Byzantine Consensus Protocols. 72-81 - Fabíola Greve, Sébastien Tixeuil:

Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown Networks. 82-91 - Martin Hutle, André Schiper:

Communication Predicates: A High-Level Abstraction for Coping with Transient and Dynamic Faults. 92-101 - Josef Widder

, Günther Gridling, Bettina Weiss, Jean-Paul Blanquart:
Synchronous Consensus with Mortal Byzantines. 102-112
Session 2B: Practical Experience Reports
- Ahmad Rahmati, Lin Zhong, Matti A. Hiltunen, Rittwik Jana:

Reliability Techniques for RFID-Based Object Tracking Applications. 113-118 - Daniel Ramsbrock, Robin Berthier, Michel Cukier:

Profiling Attacker Behavior Following SSH Compromises. 119-124 - Nik Looker, Jie Xu:

Dependability Assessment of Grid Middleware. 125-130 - Marco Vieira

, Nuno Laranjeiro
, Henrique Madeira
:
Assessing Robustness of Web-Services Infrastructures. 131-136 - Keith Harrison, Shouhuai Xu:

Protecting Cryptographic Keys from Memory Disclosure Attacks. 137-143
Session 3A: Embedded Systems
- Benjamin Lussier, Matthieu Gallien, Jérémie Guiochet, Félix Ingrand

, Marc-Olivier Killijian, David Powell:
Fault Tolerant Planning for Critical Robots. 144-153 - Michael Paulitsch, Brendan Hall:

Insights into the Sensitivity of the BRAIN (Braided Ring Availability Integrity Network) - On Platform Robustness in Extended Operation. 154-163 - Marco Serafini, Neeraj Suri

, Jonny Vinter
, Astrit Ademaj, Wolfgang Brandstätter, Fulvio Tagliabo, Jens Koch:
A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems. 164-174
Session 3B: Dependability Modeling
- Jon G. Elerath, Michael G. Pecht

:
Enhanced Reliability Modeling of RAID Storage Systems. 175-184 - Silvano Chiaradonna, Paolo Lollini

, Felicita Di Giandomenico:
On a Modeling Framework for the Analysis of Interdependencies in Electric Power Systems. 185-195
Session 4A: Hardware Fault Tolerance: Emerging Challenges
- Viswanathan Subramanian, Mikel Bezdek, Naga Durga Prasad Avirneni, Arun K. Somani:

Superscalar Processor Performance Enhancement through Reliable Dynamic Clock Frequency Tuning. 196-205 - Jay J. Wylie, Ram Swaminathan:

Determining Fault Tolerance of XOR-Based Erasure Codes Efficiently. 206-215 - Wenjing Rao, Alex Orailoglu, Ramesh Karri

:
Fault Tolerant Approaches to Nanoelectronic Programmable Logic Arrays. 216-224
Session 4B: VM Rejuvenation and Network Reliability
- James W. Mickens, Brian D. Noble:

Concilium: Collaborative Diagnosis of Broken Overlay Routes. 225-234 - Shengchao Yu, Yanyong Zhang:

R-Sentry: Providing Continuous Sensor Services against Random Node Failures. 235-244 - Kenichi Kourai

, Shigeru Chiba:
A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines. 245-255
Session 5A: Soft Errors: Analysis and Protection
- Teruaki Sakata, Teppei Hirotsu, Hiromichi Yamada, Takeshi Kataoka:

A Cost-Effective Dependable Microcontroller Architecture with Instruction-Level Rollback for Soft Error Recovery. 256-265 - Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. Rivers:

Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions. 266-275 - Mahdi Fazeli

, Ahmad Patooghy
, Seyed Ghassem Miremadi, Alireza Ejlali:
Feedback Redundancy: A Power Efficient SEU-Tolerant Latch Design for Deep Sub-Micron Technologies. 276-285 - Pablo Montesinos, Wei Liu, Josep Torrellas:

Using Register Lifetime Predictions to Protect Register Files against Soft Errors. 286-296
Session 5B: Processor Level Fault Tolerance
- Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Joseph Blomstedt, Daniel A. Connors:

Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance. 297-306 - Vimal K. Reddy, Eric Rotenberg

:
Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault Tolerance. 307-316 - Christopher LaFrieda, Engin Ipek, José F. Martínez

, Rajit Manohar:
Utilizing Dynamically Coupled Cores to Form a Resilient Chip Multiprocessor. 317-326 - Ethan Schuchman, T. N. Vijaykumar:

BlackJack: Hard Error Detection with Redundant Threads on SMT. 327-337
Session 6A: Critical Systems: Risk Analysis and Assurance
- Robin E. Bloomfield, Bev Littlewood, David Wright:

Confidence: Its Role in Dependability Cases for Risk Assessment. 338-346 - Patrick J. Graydon, John C. Knight, Elisabeth A. Strunk:

Assurance Based Development of Critical Systems. 347-357
Session 6B: Security Threats and Novel Detection
- Jinpeng Wei, Calton Pu:

Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks. 358-367 - Mohit Lad, Ricardo V. Oliveira, Beichuan Zhang, Lixia Zhang:

Understanding Resiliency of Internet Topology against Prefix Hijack Attacks. 368-377 - Rachel R. M. Roberts, Roy A. Maxion, Kevin S. Killourhy, Fahd Arshad:

User Discrimination through Structured Writing on PDAs. 378-388
Session 7A: Timing Model and Network Protocols
- Idit Keidar, Alexander Shraer:

How to Choose a Timing Model? 389-398 - Antonio Fernández, Ernesto Jiménez

, Michel Raynal:
Electing an Eventual Leader in an Asynchronous Shared Memory System. 399-408 - Florian Oprea, Michael K. Reiter:

Minimizing Response Time for Quorum-System Protocols over Wide-Area Networks. 409-418 - João Leitão

, José Pereira
, Luís E. T. Rodrigues:
HyParView: A Membership Protocol for Reliable Gossip-Based Broadcast. 419-429
Session 7B: Security Protection: Algorithmic Approaches
- Michael Rogers, Saleem Bhatti

:
A Lightweight Mechanism for Dependable Communication in Untrusted Networks. 430-439 - Dacheng Zhang, Jie Xu, Xianxian Li:

Dynamic Cross-Realm Authentication for Multi-Party Service Interactions. 440-449 - Vasileios Pappas, Daniel Massey, Lixia Zhang:

Enhancing DNS Resilience against Denial of Service Attacks. 450-459 - Chuan Yue, Mengjun Xie

, Haining Wang:
Automatic Cookie Usage Setting with CookiePicker. 460-470
Session 8A: Networking
- Mi Kyung Han, Brian Overstreet, Lili Qiu:

Greedy Receivers in IEEE 802.11 Hotspots. 471-480 - Nuno Carvalho, José Pereira

, Rui Oliveira
, Luís E. T. Rodrigues:
Emergent Structure in Unstructured Epidemic Multicast. 481-490 - Dimitrios Koutsonikolas, Y. Charlie Hu:

The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks. 491-501
Session 8B: Experimental Dependability Assessment
- Andréas Johansson, Neeraj Suri

, Brendan Murphy:
On the Selection of Error Model(s) for OS Robustness Evaluation. 502-511 - Regina Lúcia de Oliveira Moraes

, João Durães
, Ricardo Barbosa, Eliane Martins, Henrique Madeira
:
Experimental Risk Assessment and Comparison Using Software Fault Injection. 512-521 - Andrea Bondavalli

, Andrea Ceccarelli
, Lorenzo Falai, Michele Vadursi
:
Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes. 522-533
Performance and Dependability Symposium (PDS)
Session 1C: System Architecture and Software Assessment
- Jeonghee Shin, Victor V. Zyuban, Zhigang Hu, Jude A. Rivers, Pradip Bose:

A Framework for Architecture-Level Lifetime Reliability Modeling. 534-543 - Nithin Nakka, Karthik Pattabiraman, Ravishankar K. Iyer:

Processor-Level Selective Replication. 544-553 - Manuel Mendonça, Nuno Ferreira Neves

:
Robustness Testing of the Windows DDK. 554-564
Session 2C: Measurement and Monitoring
- Issa M. Khalil

, Saurabh Bagchi, Ness B. Shroff:
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks. 565-574 - Adam J. Oliner, Jon Stearley:

What Supercomputers Say: A Study of Five System Logs. 575-584 - Marcello Cinque

, Domenico Cotroneo, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart Phones. 585-594 - Kuai Xu

, Feng Wang
, Supratik Bhattacharyya, Zhi-Li Zhang:
A Real-Time Network Traffic Profiling System. 595-605
Session 3C: Practical Experience Reports
- Alan Wood, Swami Nathan:

RAS by the Yard. 606-611 - Marcelo De Barros, Jing Shiau, Chen Shang, Kenton Gidewall, Hui Shi, Joe Forsmann:

Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web Services. 612-617 - Xi Chen, Juejing Feng, Martin Hiller, Vera Lauer:

Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems. 618-624
Session 4C: Distributed Algorithms
- Lívia M. R. Sampaio, Michel Hurfin, Francisco Vilar Brasileiro

, Fabíola Greve:
Evaluating the Impact of Simultaneous Round Participation and Decentralized Decision on the Performance of Consensus. 625-634 - Olivier Rütti, Sergio Mena, Richard Ekwall, André Schiper:

On the Cost of Modularity in Atomic Broadcast. 635-644 - Yantao Song, Scott M. Pike:

Eventually k-Bounded Wait-Free Distributed Daemons. 645-655
Session 5C: Availability of Distributed Systems
- Mikael Asplund

, Simin Nadjm-Tehrani, Stefan Beyer, Pablo Galdámez:
Measuring Availability in Optimistic Partition-Tolerant Systems with Data Constraints. 656-665 - Kaloian Manassiev, Cristiana Amza:

Scaling and Continuous Availability in Database Server Clusters through Multiversion Replication. 666-676 - Marcos Kawazoe Aguilera, Kimberly Keeton

, Arif Merchant
, Kiran-Kumar Muniswamy-Reddy, Mustafa Uysal
:
Improving Recoverability in Multi-tier Storage Systems. 677-686 - Ningning Zhu, Tzi-cker Chiueh:

Portable and Efficient Continuous Data Protection for Network File Servers. 687-697
Session 6C: Modeling and Evaluation
- Hiroyuki Okamura

, Michael Grottke
, Tadashi Dohi
, Kishor S. Trivedi:
Variational Bayesian Approach for Interval Estimation of NHPP-Based Software Reliability Models. 698-707 - Hichem Boudali, Pepijn Crouzen, Mariëlle Stoelinga

:
Dynamic Fault Tree Analysis Using Input/Output Interactive Markov Chains. 708-717 - Holger Hermanns

, Sven Johr:
Uniformity by Construction in the Analysis of Nondeterministic Stochastic Systems. 718-728
Session 7C: Quality of Service and Error Recovery
- Qijun Zhu, Chun Yuan:

A Reinforcement Learning Approach to Automatic Error Recovery. 729-738 - Tiejun Ma, Jane Hillston, Stuart Anderson

:
On the Quality of Service of Crash-Recovery Failure Detectors. 739-748 - Sandip Agarwala, Fernando Alegre, Karsten Schwan, Jegannathan Mehalingham:

E2EProf: Automated End-to-End Performance Management for Enterprise Systems. 749-758 - Chun-Ying Huang

, Chin-Laung Lei:
Bounding Peer-to-Peer Upload Traffic in Client Networks. 759-769
Session 8C: Stochastic Modeling
- Hans-Peter Schwefel, Imad Antonios:

Performability Models for Multi-Server Systems with High-Variance Repair Durations. 770-779 - Lucia Cloth, Marijn R. Jongerden

, Boudewijn R. Haverkort
:
Computing Battery Lifetime Distributions. 780-789 - Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens:

Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. 790-800
Special Tracks
- Luís E. T. Rodrigues:

DSN 2007 Tutorials. 801 - Christof Fetzer:

DSN 2007 Workshops. 802 - Paul D. Ezhilchelvan

, Michel Raynal, Ajoy Kumar Datta:
Workshop on Dependable Application Support for Self-Organizing Networks (DASSON 2007). 803 - Miguel Castro, John Wilkes:

Third Workshop on Hot Topics in System Dependability HotDep'07. 804 - Rogério de Lemos, Felicita Di Giandomenico, Cristina Gacek:

Workshop on Architecting Dependable Systems (WADS 2007). 805-806 - Robin E. Bloomfield, Marcelo Masera, Ann Miller, O. Sami Saydjari

, Charles B. Weinstock:
Assurance Cases for Security: The Metrics Challenge. 807-808 - Jean Arlat, Ravishankar K. Iyer, Michael Nicolaidis:

Workshop on Dependable and Secure Nanocomputing. 809-810 - Farnam Jahanian:

Student Forum. 811 - Hiroshi Nakamura:

Fast Abstracts. 812 - Brian Randell:

The National Programme for Information Technology in the UK Health Service: Dependability Challenges and Strategies. 813 - Lisa Spainhower:

Industry Session. 814

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














