Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SRDS
SRDS 2008
Generate Citations
Reliable Distributed Systems, IEEE Symposium on
Oct. 6 2008 to Oct. 8 2008
ISSN: 1060-9857
ISBN: 978-0-7695-3410-7
Table of Contents
Papers
Self-Stabilization in Tree-Structured Peer-to-Peer Service Discovery Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-216
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Table of contents
Freely available from IEEE.
pp. v-vii
Papers
list-reviewer
Freely available from IEEE.
pp. xii
Analytical Assessment of the Precision Degradation Caused by Faults in a Fault-Tolerant Master/Slave Clock Synchronization Service for CAN
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-42
by
Guillermo Rodriguez-Navas
,
Julián Proenza
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
An Autonomic Approach for Replication of Internet-based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-136
by
Damián Serrano
,
Marta Patino-Martinez
,
Ricardo Jimenez-Peris
,
Bettina Kemme
Papers
Message from the General Chair
Freely available from IEEE.
pp. viii
Papers
Welcome from the Technical Program Co-Chairs
Freely available from IEEE.
pp. ix
Papers
Conference Committees
Freely available from IEEE.
pp. x-xi
Papers
Assuring Resilient Time Synchronization
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-12
by
Andrea Bondavalli
,
Andrea Ceccarelli
,
Lorenzo Falai
Papers
Application-Level Recovery Mechanisms for Context-Aware Pervasive Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-22
by
Devdatta Kulkarni
,
Anand Tripathi
Papers
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-32
by
Vinaitheerthan Sundaram
,
Saurabh Bagchi
,
Yung-Hsiang Lu
,
Zhiyuan Li
Papers
ALPS: Authenticating Live Peer-to-Peer Live Streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-52
by
Remo Meier
,
Roger Wattenhofer
Papers
The Search for Efficiency in Automated Intrusion Response for Distributed Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-62
by
Yu-Sung Wu
,
Gaspar Modelo-Howard
,
Bingrui Foo
,
Saurabh Bagchi
,
Eugene H. Spafford
Papers
Mitigating Distributed Denial of Service Attacks in Multiparty Applications in the Presence of Clock Drifts
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-72
by
Zhang Fu
,
Marina Papatriantafilou
,
Philippas Tsigas
Papers
Protecting BitTorrent: Design and Evaluation of Effective Countermeasures against DoS Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-82
by
Marinho P. Barcellos
,
Daniel Bauermann
,
Henrique Sant?anna
,
Matheus Lehmann
,
Rodrigo Mansilha
Papers
Dynamically Quantifying and Improving the Reliability of Distributed Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-94
by
Rekha Bachwani
,
Leszek Gryz
,
Ricardo Bianchini
,
Cezary Dubnicki
Papers
An Absolute-Relative Risk Assessment Methodology Approach to Current Safety Critical Systems and its Application to the ADS-B based Air Traffic Control System
Full-text access may be available. Sign in or learn about subscription options.
pp. 95-104
by
Lucio Flavio Vismari
,
Jo?o Batista Camargo Junior
Papers
Systematic Structural Testing of Firewall Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 105-114
by
JeeHyun Hwang
,
Tao Xie
,
Fei Chen
,
Alex X. Liu
Papers
An Empirical Study of Denial of Service Mitigation Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-124
by
Gal Badishi
,
Amir Herzberg
,
Idit Keidar
,
Oleg Romanov
,
Avital Yachin
Papers
[Roster]
Freely available from IEEE.
pp. 288
Papers
Gumshoe: Diagnosing Performance Problems in Replicated File-Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 137-146
by
Soila Kavulya
,
Rajeev Gandhi
,
Priya Narasimhan
Papers
Probabilistic Failure Detection for Efficient Distributed Storage Maintenance
Full-text access may be available. Sign in or learn about subscription options.
pp. 147-156
by
Jing Tian
,
Zhi Yang
,
Wei Chen
,
Ben Y. Zhao
,
Yafei Dai
Papers
An Incremental File System Consistency Checker for Block-Level CDP Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-162
by
Maohua Lu
,
Tzi-cker Chiueh
,
Shibiao Lin
Papers
Scalable Topology Discovery and Link State Detection Using Routing Events
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-174
by
Mudhakar Srivatsa
,
Bong-Jun Ko
,
Alina Beygelzimer
,
Venkateshwara Madduri
Papers
Fault-Tolerant Coverage Planning in Wireless Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-184
by
Svilen Ivanov
,
Edgar Nett
Papers
POSH: Proactive co-Operative Self-Healing in Unattended Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-194
by
Roberto Di Pietro
,
Di Ma
,
Claudio Soriente
,
Gene Tsudik
Papers
Towards Reliable Reputations for Dynamic Networked Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-204
by
Gayatri Swamynathan
,
Ben Y. Zhao
,
Kevin C. Almeroth
,
S. Rao Jammalamadaka
Papers
Adaptive Internal Clock Synchronization
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-226
by
Zbigniew Jerzak
,
Robert Fach
,
Christof Fetzer
Papers
Extending Paxos/LastVoting with an Adequate Communication Layer for Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-236
by
Fatemeh Borran
,
Ravi Prakash
,
Andr? Schiper
Papers
Investigating the Existence and the Regularity of Logarithmic Harary Graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-246
by
Roberto Baldoni
,
Silvia Bonomi
,
Leonardo Querzoni
,
Sara Tucci Piergiovanni
Papers
A Probabilistic Analysis of Snapshot Isolation with Partial Replication
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-258
by
Josep M. Bernab?-Gisbert
,
Vaid? Zuikeviciute
,
Francesc D. Mu?oz-Esco?
,
Fernando Pedone
Papers
Using Tractable and Realistic Churn Models to Analyze Quiescence Behavior of Distributed Protocols
Full-text access may be available. Sign in or learn about subscription options.
pp. 259-268
by
Steven Y. Ko
,
Imranul Hoque
,
Indranil Gupta
Papers
Formalizing System Behavior for Evaluating a System Hang Detector
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-278
by
Long Wang
,
Zbigniew Kalbarczyk
,
Ravishankar K. Iyer
Papers
Availability of Globally Distributed Nodes: An Empirical Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-284
by
Timo Warns
,
Christian Storm
,
Wilhelm Hasselbring
Papers
Author Index
Freely available from IEEE.
pp. 285-286
Showing 38 out of 38