Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DSN
DSN 2008
Generate Citations
2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)
June 24 2008 to June 27 2008
Anchorage, AK
Table of Contents
Message from the conference general chair and coordinator
Freely available from IEEE.
by
Philip Koopman
,
Henrique Madeira
Message from the PDS program chair
Freely available from IEEE.
by
Kimberly Keeton
William C. Carter Award
Freely available from IEEE.
DSN 2008 organizers
Freely available from IEEE.
DSN 2008 Steering Committee
Freely available from IEEE.
DCCS 2008 Program Committee
Freely available from IEEE.
DCCS reviewers
Freely available from IEEE.
PDS 2008 Program Committee
Freely available from IEEE.
PDS reviewers
Freely available from IEEE.
DSN 2008 subCommittees
Freely available from IEEE.
Citation information
Freely available from IEEE.
Dependability on the last frontier
Freely available from IEEE.
by
Alex Hills
Automotive Enhanced Vision Systems - Issues arising from placing users in the loop
Freely available from IEEE.
by
Thomas Seder
Coverage of a microarchitecture-level fault check regimen in a superscalar processor
Full-text access may be available. Sign in or learn about subscription options.
by
Vimal Reddy
,
Eric Rotenberg
Analysis and solutions to issue queue process variation
Full-text access may be available. Sign in or learn about subscription options.
by
Niranjan Soundararajan
,
Aditya Yanamandra
,
Chrysostomos Nicopoulos
,
N. Vijaykrishnan
,
Anand Sivasubramaniam
,
Mary Jane Irwin
Trace-based microarchitecture-level diagnosis of permanent hardware faults
Full-text access may be available. Sign in or learn about subscription options.
by
Man-Lap Li
,
Pradeep Ramachandran
,
Swarup K. Sahoo
,
Sarita V. Adve
,
Vikram S. Adve
,
Yuanyuan Zhou
A study of cognitive resilience in a JPEG compressor
Full-text access may be available. Sign in or learn about subscription options.
by
Damian Nowroth
,
Ilia Polian
,
Bernd Becker
Scheduling algorithms for unpredictably heterogeneous CMP architectures
Full-text access may be available. Sign in or learn about subscription options.
by
Jonathan A. Winter
,
David H. Albonesi
Automated duplicate detection for bug tracking systems
Full-text access may be available. Sign in or learn about subscription options.
by
Nicholas Jalbert
,
Westley Weimer
Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-69
by
Hisashige Ando
,
Ryuji Kan
,
Yoshiharu Tosaka
,
Keiji Takahisa
,
Kichiji Hatanaka
Using likely program invariants to detect hardware errors
Full-text access may be available. Sign in or learn about subscription options.
by
Swarup Kumar Sahoo
,
Man-Lap Li
,
Pradeep Ramachandran
,
Sarita V. Adve
,
Vikram S. Adve
,
Yuanyuan Zhou
Detouring: Translating software to circumvent hard faults in simple cores
Full-text access may be available. Sign in or learn about subscription options.
by
Albert Meixner
,
Daniel J. Sorin
Towards assessing the security of DBMS configurations
Full-text access may be available. Sign in or learn about subscription options.
by
Afonso Araujo Neto
,
Marco Vieira
Experiences with formal specification of fault-tolerant file systems
Full-text access may be available. Sign in or learn about subscription options.
by
Roxana Geambasu
,
Andrew Birrell
,
John MacCormick
Using an assurance case to support independent assessment of the transition to a new GPS ground control system
Full-text access may be available. Sign in or learn about subscription options.
by
Elisabeth A. Nguyen
,
William S. Greenwell
,
Myron J. Hecht
Silent Data Corruption — Myth or reality?
Freely available from IEEE.
by
Cristian Constantinescu
,
Ishwar Parulkar
,
Rick Harper
,
Sarah Michalak
End-system tools for enhancing email reliability
Full-text access may be available. Sign in or learn about subscription options.
by
Tim Moors
,
Patrick Chu
Tempest: Towards early identification of failure-prone binaries
Full-text access may be available. Sign in or learn about subscription options.
by
Thirumalesh Bhat
,
Nachiappan Nagappan
Statistical Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
by
Pradeep Ramachandran
,
Prabhakar Kudva
,
Jeffrey Kellington
,
John Schumann
,
Pia Sanda
An accurate flip-flop selection technique for reducing logic SER
Full-text access may be available. Sign in or learn about subscription options.
by
Eric L. Hill
,
Mikko H. Lipasti
,
Kewal K. Saluja
Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors
Full-text access may be available. Sign in or learn about subscription options.
by
Xin Fu
,
Tao Li
,
Jose Fortes
Reliability of flat XOR-based erasure codes on heterogeneous devices
Full-text access may be available. Sign in or learn about subscription options.
by
Kevin M. Greenan
,
Ethan L. Miller
,
Jay J. Wylie
ConfErr: A tool for assessing resilience to human configuration errors
Full-text access may be available. Sign in or learn about subscription options.
by
Lorenzo Keller
,
Prasang Upadhyaya
,
George Candea
Enhanced server fault-tolerance for improved user experience
Full-text access may be available. Sign in or learn about subscription options.
by
Manish Marwah
,
Shivakant Mishra
,
Christof Fetzer
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware
Full-text access may be available. Sign in or learn about subscription options.
by
Xu Chen
,
Jon Andersen
,
Z. Morley Mao
,
Michael Bailey
,
Jose Nazario
Security through redundant data diversity
Full-text access may be available. Sign in or learn about subscription options.
by
Anh Nguyen-Tuong
,
David Evans
,
John C. Knight
,
Benjamin Cox
,
Jack W. Davidson
Byzantine replication under attack
Full-text access may be available. Sign in or learn about subscription options.
by
Yair Amir
,
Brian Coan
,
Jonathan Kirsch
,
John Lane
A robust and lightweight stable leader election service for dynamic systems
Full-text access may be available. Sign in or learn about subscription options.
by
Nicolas Schiper
,
Sam Toueg
A fast restart mechanism for checkpoint/recovery protocols in networked environments
Full-text access may be available. Sign in or learn about subscription options.
by
Yawei Li
,
Zhiling Lan
Tempest: Soft state replication in the service tier
Full-text access may be available. Sign in or learn about subscription options.
by
Tudor Marian
,
Mahesh Balakrishnan
,
Ken Birman
,
Robbert van Renesse
AGIS: Towards automatic generation of infection signatures
Full-text access may be available. Sign in or learn about subscription options.
by
Zhuowei Li
,
XiaoFeng Wang
,
Zhenkai Liang
,
Michael K. Reiter
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Full-text access may be available. Sign in or learn about subscription options.
by
Zhiqiang Lin
,
Xiangyu Zhang
,
Dongyan Xu
Mapping software faults with web security vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
by
Jose Fonseca
,
Marco Vieira
A fault-tolerant directory-based cache coherence protocol for CMP architectures
Full-text access may be available. Sign in or learn about subscription options.
by
Ricardo Fernandez-Pascual
,
Jose M. Garcia
,
Manuel E. Acacio
,
Jose Duato
Probabilistic quorum systems in wireless ad hoc networks
Full-text access may be available. Sign in or learn about subscription options.
by
Roy Friedman
,
Gabriel Kliot
,
Chen Avin
BAR primer
Full-text access may be available. Sign in or learn about subscription options.
by
Allen Clement
,
Harry Li
,
Jeff Napper
,
Jean-Philippe Martin
,
Lorenzo Alvisi
,
Mike Dahlin
Improving dependability of network configuration through policy classification
Full-text access may be available. Sign in or learn about subscription options.
by
Sihyung Lee
,
Tina Wong
,
Hyong S. Kim
Traffic grooming in WDM mesh networks with guaranteed survivability
Full-text access may be available. Sign in or learn about subscription options.
by
A. Bari
,
Q. Rahman
,
A Jaekel
,
S. Bandyopadhyay
Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing
Full-text access may be available. Sign in or learn about subscription options.
by
Yoshitomo Murata
,
Tsutomu Inaba
,
Hiroyuki Takizawa
,
Hiroaki Kobayashi
An integrated approach to resource pool management: Policies, efficiency and quality metrics
Full-text access may be available. Sign in or learn about subscription options.
by
Daniel Gmach
,
Jerry Rolia
,
Ludmila Cherkasova
,
Guillaume Belrose
,
Tom Turicchi
,
Alfons Kemper
Scheduling for performance and availability in systems with temporal dependent workloads
Full-text access may be available. Sign in or learn about subscription options.
by
Ningfang Mi
,
Giuliano Casale
,
Evgenia Smirni
Hot-spot prediction and alleviation in distributed stream processing applications
Full-text access may be available. Sign in or learn about subscription options.
by
Thomas Repantis
,
Vana Kalogeraki
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Full-text access may be available. Sign in or learn about subscription options.
by
Wei
,
Nan Zhang
,
Xinwen Fu
,
Riccardo Bettati
,
Wei Zhao
Automatic security assessment of critical cyber-infrastructures
Full-text access may be available. Sign in or learn about subscription options.
by
Zahid Anwar
,
Ravinder Shankesi
,
Roy. H. Campbell
Evaluating email’s feasibility for botnet command and control
Full-text access may be available. Sign in or learn about subscription options.
by
Kapil Singh
,
Abhinav Srivastava
,
Jonathon Giffin
,
Wenke Lee
Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices
Full-text access may be available. Sign in or learn about subscription options.
by
Shravan Gaonkar
,
Eric Rozier
,
Anthony Tong
,
William H. Sanders
WS-DREAM: A distributed reliability assessment Mechanism for Web Services
Full-text access may be available. Sign in or learn about subscription options.
by
Zibin Zheng
,
Michael R. Lyu
A log mining approach to failure analysis of enterprise telephony systems
Full-text access may be available. Sign in or learn about subscription options.
by
Chinghway Lim
,
Navjot Singh
,
Shalini Yajnik
Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL
Full-text access may be available. Sign in or learn about subscription options.
by
Paolo Romano
,
Francesco Quaglia
Toward an understanding of the processing delay of peer-to-peer relay nodes
Full-text access may be available. Sign in or learn about subscription options.
by
Kuan-Ta Chen
,
Jing-Kai Lou
TCP covert timing channels: Design and detection
Full-text access may be available. Sign in or learn about subscription options.
by
Xiapu Luo
,
Edmond W. W. Chan
,
Rocky K. C. Chang
A smart triggering scheme to reduce service interruption during heterogeneous handovers
Full-text access may be available. Sign in or learn about subscription options.
by
Huaiyu Liu
,
Christian Maciocco
,
Vijay Kesavan
,
Andy Low
On representing knowledge in the dependability domain: a panel discussion
Freely available from IEEE.
by
Algirdas Avizienis
Evaluating availability under quasi-heavy-tailed repair times
Full-text access may be available. Sign in or learn about subscription options.
by
Sei Kato
,
Takayuki Osogami
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
Full-text access may be available. Sign in or learn about subscription options.
by
Ludmila Cherkasova
,
Kivanc Ozonat
,
Ningfang Mi
,
Julie Symons
,
Evgenia Smirni
Survivability quantification of communication services
Full-text access may be available. Sign in or learn about subscription options.
by
Poul E. Heegaard
,
Kishor S. Trivedi
SymPLFIED: Symbolic program-level fault injection and error detection framework
Full-text access may be available. Sign in or learn about subscription options.
by
Karthik Pattabiraman
,
Nithin Nakka
,
Zbigniew Kalbarczyk
,
Ravishankar Iyer
A characterization of instruction-level error derating and its implications for error detection
Full-text access may be available. Sign in or learn about subscription options.
by
Jeffrey J. Cook
,
Craig Zilles
Enhancing data availability in disk drives through background activities
Full-text access may be available. Sign in or learn about subscription options.
by
Ningfang Mi
,
Alma Riska
,
Evgenia Smirni
,
Erik Riedel
Analyzing the effects of disk-pointer corruption
Full-text access may be available. Sign in or learn about subscription options.
by
Lakshmi N. Bairavasundaram
,
Meenali Rungta
,
Nitin Agrawa
,
Andrea C. Arpaci-Dusseau
,
Remzi H. Arpaci-Dusseau
,
Michael M. Swift
Architectural dependability evaluation with Arcade
Full-text access may be available. Sign in or learn about subscription options.
by
H. Boudali
,
P. Crouzen
,
B. R. Haverkort
,
M. Kuntz
,
M.I.A. Stoelinga
An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services
Full-text access may be available. Sign in or learn about subscription options.
by
Kivanc Ozonat
A recurrence-relation-based reward model for performability evaluation of embedded systems
Full-text access may be available. Sign in or learn about subscription options.
by
Ann T. Tai
,
Kam S. Tso
,
William H. Sanders
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)
Full-text access may be available. Sign in or learn about subscription options.
by
Andrea Bondavalli
,
Istvan Majzik
,
Aad van Moorsel
Workshop on compiler and architectural techniques for application reliability and security (CATARS)
Full-text access may be available. Sign in or learn about subscription options.
by
Karthik Pattabiraman
,
Shuo Chen
,
Zbigniew Kalbarczyk
Second workshop on dependable and secure nanocomputing
Full-text access may be available. Sign in or learn about subscription options.
by
Jean Arlat
,
Cristian Constantinescu
,
Ravishankar K. Iyer
,
Michael Nicolaidis
Workshop on Architecting Dependable Systems (WADS 2008)
Full-text access may be available. Sign in or learn about subscription options.
by
Rogerio de Lemos
,
Jean-Charles Fabre
,
Cristina Gacek
Showing 77 out of 77