Default Cover Image

2008 IEEE International Conference on Dependable Systems and Networks With FTCS and DCC (DSN)

June 24 2008 to June 27 2008

Anchorage, AK

Table of Contents

William C. Carter AwardFreely available from IEEE.
DSN 2008 organizersFreely available from IEEE.
DSN 2008 Steering CommitteeFreely available from IEEE.
DCCS 2008 Program CommitteeFreely available from IEEE.
DCCS reviewersFreely available from IEEE.
PDS 2008 Program CommitteeFreely available from IEEE.
PDS reviewersFreely available from IEEE.
DSN 2008 subCommitteesFreely available from IEEE.
Citation informationFreely available from IEEE.
Dependability on the last frontierFreely available from IEEE.
Coverage of a microarchitecture-level fault check regimen in a superscalar processorFull-text access may be available. Sign in or learn about subscription options.
A study of cognitive resilience in a JPEG compressorFull-text access may be available. Sign in or learn about subscription options.
Scheduling algorithms for unpredictably heterogeneous CMP architecturesFull-text access may be available. Sign in or learn about subscription options.
Automated duplicate detection for bug tracking systemsFull-text access may be available. Sign in or learn about subscription options.
Detouring: Translating software to circumvent hard faults in simple coresFull-text access may be available. Sign in or learn about subscription options.
Towards assessing the security of DBMS configurationsFull-text access may be available. Sign in or learn about subscription options.
Experiences with formal specification of fault-tolerant file systemsFull-text access may be available. Sign in or learn about subscription options.
End-system tools for enhancing email reliabilityFull-text access may be available. Sign in or learn about subscription options.
Tempest: Towards early identification of failure-prone binariesFull-text access may be available. Sign in or learn about subscription options.
Statistical Fault InjectionFull-text access may be available. Sign in or learn about subscription options.
An accurate flip-flop selection technique for reducing logic SERFull-text access may be available. Sign in or learn about subscription options.
Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processorsFull-text access may be available. Sign in or learn about subscription options.
Reliability of flat XOR-based erasure codes on heterogeneous devicesFull-text access may be available. Sign in or learn about subscription options.
ConfErr: A tool for assessing resilience to human configuration errorsFull-text access may be available. Sign in or learn about subscription options.
Enhanced server fault-tolerance for improved user experienceFull-text access may be available. Sign in or learn about subscription options.
Security through redundant data diversityFull-text access may be available. Sign in or learn about subscription options.
Byzantine replication under attackFull-text access may be available. Sign in or learn about subscription options.
A robust and lightweight stable leader election service for dynamic systemsFull-text access may be available. Sign in or learn about subscription options.
A fast restart mechanism for checkpoint/recovery protocols in networked environmentsFull-text access may be available. Sign in or learn about subscription options.
Tempest: Soft state replication in the service tierFull-text access may be available. Sign in or learn about subscription options.
AGIS: Towards automatic generation of infection signaturesFull-text access may be available. Sign in or learn about subscription options.
Convicting exploitable software vulnerabilities: An efficient input provenance based approachFull-text access may be available. Sign in or learn about subscription options.
Mapping software faults with web security vulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.
Probabilistic quorum systems in wireless ad hoc networksFull-text access may be available. Sign in or learn about subscription options.
BAR primerFull-text access may be available. Sign in or learn about subscription options.
Improving dependability of network configuration through policy classificationFull-text access may be available. Sign in or learn about subscription options.
Traffic grooming in WDM mesh networks with guaranteed survivabilityFull-text access may be available. Sign in or learn about subscription options.
Scheduling for performance and availability in systems with temporal dependent workloadsFull-text access may be available. Sign in or learn about subscription options.
Hot-spot prediction and alleviation in distributed stream processing applicationsFull-text access may be available. Sign in or learn about subscription options.
On localization attacks to Internet Threat Monitors: An information-theoretic frameworkFull-text access may be available. Sign in or learn about subscription options.
Automatic security assessment of critical cyber-infrastructuresFull-text access may be available. Sign in or learn about subscription options.
Evaluating email’s feasibility for botnet command and controlFull-text access may be available. Sign in or learn about subscription options.
WS-DREAM: A distributed reliability assessment Mechanism for Web ServicesFull-text access may be available. Sign in or learn about subscription options.
A log mining approach to failure analysis of enterprise telephony systemsFull-text access may be available. Sign in or learn about subscription options.
Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQLFull-text access may be available. Sign in or learn about subscription options.
Toward an understanding of the processing delay of peer-to-peer relay nodesFull-text access may be available. Sign in or learn about subscription options.
TCP covert timing channels: Design and detectionFull-text access may be available. Sign in or learn about subscription options.
Evaluating availability under quasi-heavy-tailed repair timesFull-text access may be available. Sign in or learn about subscription options.
Survivability quantification of communication servicesFull-text access may be available. Sign in or learn about subscription options.
A characterization of instruction-level error derating and its implications for error detectionFull-text access may be available. Sign in or learn about subscription options.
Enhancing data availability in disk drives through background activitiesFull-text access may be available. Sign in or learn about subscription options.
Architectural dependability evaluation with ArcadeFull-text access may be available. Sign in or learn about subscription options.
A recurrence-relation-based reward model for performability evaluation of embedded systemsFull-text access may be available. Sign in or learn about subscription options.
Second workshop on dependable and secure nanocomputingFull-text access may be available. Sign in or learn about subscription options.
Workshop on Architecting Dependable Systems (WADS 2008)Full-text access may be available. Sign in or learn about subscription options.
Showing 77 out of 77