


default search action
47th DSN 2017: Denver, CO, USA - Workshops
- 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN Workshops 2017, Denver, CO, USA, June 26-29, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-2272-8

The Third International Workshop on Safety and Security of Intelligent Vehicles (SSIV)
- João Carlos Cunha

, Kalinka Branco, António Casimiro
, Urbano Nunes
:
SSIV 2017 Welcome. 1 - Pranav Jetley, P. B. Sujit, Srikanth Saripalli:

Safe Landing of Fixed Wing UAVs. 2-9 - Wenbo Xu, Martin Wegner, Lars C. Wolf, Rüdiger Kapitza:

Byzantine Agreement Service for Cooperative Wireless Embedded Systems. 10-15 - Caroline Bianca Santos Tancredi Molina, Jorge Rady de Almeida Jr.

, Lucio Flavio Vismari, Rodrigo Ignacio R. Gonzalez, Jamil Kalil Naufal Jr., João Batista Camargo Jr.
:
Assuring Fully Autonomous Vehicles Safety by Design: The Autonomous Vehicle Control (AVC) Module Strategy. 16-21 - Ayhan Mehmed, Sasikumar Punnekkat, Wilfried Steiner:

Deterministic Ethernet: Addressing the Challenges of Asynchronous Sensing in Sensor Fusion Systems. 22-28 - Matthieu Amy, Jean-Charles Fabre, Michaël Lauer:

Towards Adaptive Fault Tolerance on ROS for Advanced Driver Assistance Systems. 29-35 - Madeline Cheah

, Jeremy W. Bryans
, Daniel S. Fowler
, Siraj Ahmed Shaikh
:
Threat Intelligence for Bluetooth-Enabled Systems with Automotive Applications: An Empirical Study. 36-43
Recent Advances in the DependabIlity AssessmeNt of Complex Systems (RADIANCE)
- Nuno Antunes, Ariadne Maria Brito Rizzoni Carvalho, Andrea Ceccarelli

:
RADIANCE Welcome. 44 - Jin Bum Hong

, Dong Seong Kim
:
Discovering and Mitigating New Attack Paths Using Graphical Security Models. 45-52 - Mengmeng Ge, Huy Kang Kim, Dong Seong Kim

:
Evaluating Security and Availability of Multiple Redundancy Designs when Applying Security Patches. 53-60 - Gary White

, Andrei Palade, Christian Cabrera
, Siobhán Clarke
:
Quantitative Evaluation of QoS Prediction in IoT. 61-66 - Johannes Iber, Tobias Rauter, Michael Krisper

, Christian Kreiner
:
An Integrated Approach for Resilience in Industrial Control Systems. 67-74 - Roberta Mayumi Matsunaga, Ivan Ricarte

, Tânia Basso, Regina Moraes
:
Towards an Ontology-Based Definition of Data Anonymization Policy for Cloud Computing and Big Data. 75-82 - Leydi Erazo

, Eliane Martins, Juliana Galvani Greghi:
MARITACA: From Textual Use Case Descriptions to Behavior Models. 83-90 - Li Tan, Nathan DeBardeleben, Qiang Guan, Sean Blanchard, Michael Lang:

RSVP: Soft Error Resilient Power Savings at Near-Threshold Voltage Using Register Vulnerability. 91-98
Fast Abstracts
- Jinwoo Kim, Seungwon Shin:

Software-Defined HoneyNet: Towards Mitigating Link Flooding Attacks. 99-100 - Shuang Wei, Yijing Ding, Xinhui Han:

TDSC: Two-Stage DDoS Detection and Defense System Based on Clustering. 101-102 - Patrick J. Graydon:

The Many Conflicting Visions of 'Safety Case'. 103-104 - Yudai Komori, Kazuya Sakai, Satoshi Fukumoto:

RFID Tag Grouping Protocols Made Private. 105-106 - Mamoru Ohara, Satoshi Fukumoto:

Off-Path Caching for File Versioning in Named Data Networking. 107-108 - Joshua A. Alcorn, Scott Melton, C. Edward Chow:

Portable SDN Testbed Prototype. 109-110 - Joshua A. Alcorn, Scott Melton, C. Edward Chow:

A Framework for SDN Network Evaluation. 111-112 - Algirdas Avizienis:

Document Faults: An Extension of the Taxonomy of Dependable and Secure Computing. 113-114 - Kate Gill, Rob Ashmore:

Opportunities and Challenges of Third-Party Sustainment of Critical Software in Dependable Systems. 115-116
Industry Track
Industry Track I: Architecture and Evaluation of (Dependable) Systems and Networks
- Athanasios Chatzidimitriou, Manolis Kaliorakis, Dimitris Gizopoulos, Maurizio Iacaruso, Mauro Pipponzi, Riccardo Mariani, Stefano Di Carlo

:
RT Level vs. Microarchitecture-Level Reliability Assessment: Case Study on ARM(R) Cortex(R)-A9 CPU. 117-120 - Vincent Debieux, Yvonne-Anne Pignolet, Thanikesavan Sivanthi:

Faster Exact Reliability Computation. 121-124
Industry Track II: Cloud Computing and the Internet of Things (IoT)
- Long Wang, Harigovind V. Ramasamy, Alexei Karve, Richard E. Harper:

Providing Resiliency to Orchestration and Automation Engines in Hybrid Cloud. 125-128 - Sreekrishnan Venkateswaran, Santonu Sarkar:

Uptime-Optimized Cloud Architecture as a Brokered Service. 129-132
Industry Track III: Dependability Data and Security
- Yan Li, Binbin Chen

, Vincent W. Zheng, William G. Temple, Zbigniew Kalbarczyk, Yue Wu:
Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log. 133-136 - Elisabeth Baseman, Nathan DeBardeleben, Kurt B. Ferreira, Vilas Sridharan, Taniya Siddiqua, Olena Tkachenko:

Automating DRAM Fault Mitigation By Learning From Experience. 137-140 - Karim Eldefrawy, Norrathep Rattanavipanon

, Gene Tsudik:
FUsing Hybrid Remote Attestation with a Formally Verified Microkernel: Lessons Learned. 141-144 - Chia-Wei Tien, Tse-Yung Huang, Ting-Chun Huang, Wei-Ho Chung

, Sy-Yen Kuo
:
MAS: Mobile-Apps Assessment and Analysis System. 145-148 - Algirdas Avizienis:

A Visit to the Jungle of Terminology. 149-152
Student Forum
- Guanpeng Li:

Modeling Error Propagation in Programs. 153-155 - Abraham Chan:

Automated Program Diversity Using Program Synthesis. 156-159 - Carina Pilch:

Student Research Paper: Evaluation of the Dependability of Critical Infrastructures Using Hybrid Petri Nets with Random Variables and Stochastic Simulation. 160-163 - Peng Li:

Enabling Low Degraded Read Latency and Fast Recovery for Erasure Coded Cloud Storage Systems. 164-167
Best of SELSE
- Alan Wood:

Special Session at DSN for the Best Papers from SELSE 2017. 168 - Fernando Fernandes dos Santos

, Lucas Draghetti, Lucas Weigel, Luigi Carro, Philippe O. A. Navaux, Paolo Rech
:
Evaluation and Mitigation of Soft-Errors in Neural Network-Based Object Detection in Three GPU Architectures. 169-176 - Seong-Lyong Gong, Jungrae Kim, Mattan Erez:

DRAM Scaling Error Evaluation Model Using Various Retention Time. 177-183 - Xinfei Guo

, Mircea R. Stan
:
Deep Healing: Ease the BTI and EM Wearout Crisis by Activating Recovery. 184-191

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














