Default Cover Image

Reliable Distributed Systems, IEEE Symposium on

Oct. 31 2010 to Nov. 3 2010

New Delhi, Punjab India

ISSN: 1060-9857

ISBN: 978-0-7695-4250-8

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-ix
Papers
Message from General Co-chairsFreely available from IEEE.pp. x
Papers
Message from Technical Program Co-chairsFreely available from IEEE.pp. xi
Papers
Conference CommitteesFreely available from IEEE.pp. xii-xiii
Papers
Technical Program CommitteeFreely available from IEEE.pp. xiv-xv
Papers
list-reviewerFreely available from IEEE.pp. xvi
Papers
PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Securing Mobile Unattended WSNs against a Mobile AdversaryFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Papers
Attack Injection to Support the Evaluation of Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 21-29
Optimization Based Topology Control for Wireless Ad Hoc Networks to Meet QoS RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 30-36
Papers
Fault-Tolerant Aggregation for Dynamic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 37-43
Papers
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 44-53
Papers
Fixed Cost Maintenance for Information Dissemination in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 54-63
Papers
A Resource-Efficient Adaptive Caching Scheme for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 64-71
Papers
VMDriver: A Driver-Based Monitoring Mechanism for VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 72-81
Papers
DKSM: Subverting Virtual Machine Introspection for Fun and ProfitFull-text access may be available. Sign in or learn about subscription options.pp. 82-91
Papers
Lightweight Task Graph Inference for Distributed ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 100-110
Papers
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 111-120
Papers
Uncertainty Propagation in Analytic Availability ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
Papers
Monitoring Local Progress with Watchdog Timers Deduced from Global PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 131-140
Papers
Adaptare-FD: A Dependability-Oriented Adaptive Failure DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 141-147
Papers
GAUL: Gestalt Analysis of Unstructured Logs for Diagnosing Recurring Problems in Large Enterprise Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 148-159
Papers
Invariants Based Failure Diagnosis in Distributed Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 160-166
Papers
Shedding Light on Enterprise Network Failures Using SpotlightFull-text access may be available. Sign in or learn about subscription options.pp. 167-176
Papers
CloudRank: A QoS-Driven Component Ranking Framework for Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 184-193
Papers
Secure, Dependable, and High Performance Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 194-203
Papers
On-Demand Recovery in Middleware Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 204-213
Papers
P-Store: Genuine Partial Replication in Wide Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 214-224
Papers
FireSpam: Spam Resilient Gossiping in the BAR ModelFull-text access may be available. Sign in or learn about subscription options.pp. 225-234
Papers
Semias: Self-Healing Active Replication on Top of a Structured Peer-to-Peer OverlayFull-text access may be available. Sign in or learn about subscription options.pp. 235-244
Papers
Experimental Validation of a Synchronization Uncertainty-Aware Software ClockFull-text access may be available. Sign in or learn about subscription options.pp. 245-254
Papers
Applying Text Classification Algorithms in Web Services Robustness TestingFull-text access may be available. Sign in or learn about subscription options.pp. 255-264
Papers
Availability Assessment of HA Standby Redundant ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 265-274
Papers
Diskless Checkpointing with Rollback-Dependency TrackabilityFull-text access may be available. Sign in or learn about subscription options.pp. 275-281
Papers
Swift Algorithms for Repeated ConsensusFull-text access may be available. Sign in or learn about subscription options.pp. 282-292
Papers
Thicket: A Protocol for Building and Maintaining Multiple Trees in a P2P OverlayFull-text access may be available. Sign in or learn about subscription options.pp. 293-302
Papers
A Tactical Information Management Middleware for Resource-Constrained Mobile P2P NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 303-307
Papers
On Optimizing Traffic Signal Phase Ordering in Road NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 308-312
Papers
Lightweight Fault-Tolerance for Peer-to-Peer MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 313-317
Papers
Adaptive Routing Scheme for Emerging Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 318-322
Papers
Towards Mobile Data Streaming in Service Oriented ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 323-327
Papers
Practical Aspects in Analyzing and Sharing the Results of Experimental EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 328-332
Papers
A Study on Latent VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 333-337
Papers
CReW: Cloud Resilience for Windows Guests through Monitored VirtualizationFull-text access may be available. Sign in or learn about subscription options.pp. 338-342
Papers
Quantifying Resiliency of IaaS CloudFull-text access may be available. Sign in or learn about subscription options.pp. 343-347
Papers
Benchmarking the Resilience of Self-Adaptive Systems: A New Research ChallengeFull-text access may be available. Sign in or learn about subscription options.pp. 348-352
Papers
Data-Mining-Based Link Failure Detection for Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 353-357
Papers
Data Validity and Dependable Perception in Networked Sensor-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 358-362
Papers
A Multi-step Simulation Approach toward Secure Fault Tolerant System EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 363-367
Papers
Author IndexFreely available from IEEE.pp. 373-374
Papers
[Publisher's information]Freely available from IEEE.pp. 376
Showing 57 out of 57