Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
SRDS
SRDS 2010
Generate Citations
Reliable Distributed Systems, IEEE Symposium on
Oct. 31 2010 to Nov. 3 2010
New Delhi, Punjab India
ISSN: 1060-9857
ISBN: 978-0-7695-4250-8
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-ix
Papers
Message from General Co-chairs
Freely available from IEEE.
pp. x
Papers
Message from Technical Program Co-chairs
Freely available from IEEE.
pp. xi
Papers
Conference Committees
Freely available from IEEE.
pp. xii-xiii
Papers
Technical Program Committee
Freely available from IEEE.
pp. xiv-xv
Papers
list-reviewer
Freely available from IEEE.
pp. xvi
Papers
PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-10
by
Santhosh Muthyapu
,
Sanjay Kumar Madria
,
Mark Linderman
Papers
Securing Mobile Unattended WSNs against a Mobile Adversary
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-20
by
Roberto Di Pietro
,
Gabriele Oligeri
,
Claudio Soriente
,
Gene Tsudik
Papers
Attack Injection to Support the Evaluation of Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 21-29
by
Jesús Friginal
,
David de Andrés
,
Juan-Carlos Ruiz
,
Pedro Gil
Optimization Based Topology Control for Wireless Ad Hoc Networks to Meet QoS Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 30-36
by
Yadu Kishore K.
,
Ashish Tiwari
,
O.G. Kakde
Papers
Fault-Tolerant Aggregation for Dynamic Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-43
by
Paulo Jesus
,
Carlos Baquero
,
Paulo Sérgio Almeida
Papers
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 44-53
by
Arshad Jhumka
Papers
Fixed Cost Maintenance for Information Dissemination in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 54-63
by
Rajesh Krishna Panta
,
Madalina Vintila
,
Saurabh Bagchi
Papers
A Resource-Efficient Adaptive Caching Scheme for Mobile Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 64-71
by
Dan Hirsch
,
Sanjay Madria
Papers
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 72-81
by
Guofu Xiang
,
Hai Jin
,
Deqing Zou
,
Xinwen Zhang
,
Sha Wen
,
Feng Zhao
Papers
DKSM: Subverting Virtual Machine Introspection for Fun and Profit
Full-text access may be available. Sign in or learn about subscription options.
pp. 82-91
by
Sina Bahram
,
Xuxian Jiang
,
Zhi Wang
,
Mike Grace
,
Jinku Li
,
Deepa Srinivasan
,
Junghwan Rhee
,
Dongyan Xu
Papers
Real Distribution of Response Time Instability in Service-Oriented Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 92-99
by
Anatoliy Gorbenko
,
Vyacheslav Kharchenko
,
Seyran Mamutov
,
Olga Tarasyuk
,
Yuhui Chen
,
Alexander Romanovsky
Papers
Lightweight Task Graph Inference for Distributed Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 100-110
by
Bin Xin
,
Patrick Eugster
,
Xiangyu Zhang
,
Jinlin Yang
Papers
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 111-120
by
Haifeng Chen
,
Guofei Jiang
,
Hui Zhang
,
Kenji Yoshihira
Papers
Uncertainty Propagation in Analytic Availability Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-130
by
Amita Devaraj
,
Kesari Mishra
,
Kishor S. Trivedi
Papers
Monitoring Local Progress with Watchdog Timers Deduced from Global Properties
Full-text access may be available. Sign in or learn about subscription options.
pp. 131-140
by
Raul Barbosa
Papers
Adaptare-FD: A Dependability-Oriented Adaptive Failure Detector
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-147
by
Mônica Dixit
,
António Casimiro
Papers
GAUL: Gestalt Analysis of Unstructured Logs for Diagnosing Recurring Problems in Large Enterprise Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 148-159
by
Pin Zhou
,
Binny Gill
,
Wendy Belluomini
,
Avani Wildani
Papers
Invariants Based Failure Diagnosis in Distributed Computing Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-166
by
Haifeng Chen
,
Guofei Jiang
,
Kenji Yoshihira
,
Akhilesh Saxena
Papers
Shedding Light on Enterprise Network Failures Using Spotlight
Full-text access may be available. Sign in or learn about subscription options.
pp. 167-176
by
Dipu John
,
Pawan Prakash
,
Ramana Rao Kompella
,
Ranveer Chandra
Papers
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-183
by
Pelin Angin
,
Bharat Bhargava
,
Rohit Ranchal
,
Noopur Singh
,
Mark Linderman
,
Lotfi Ben Othmane
,
Leszek Lilien
Papers
CloudRank: A QoS-Driven Component Ranking Framework for Cloud Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-193
by
Zibin Zheng
,
Yilei Zhang
,
Michael R. lyu
Papers
Secure, Dependable, and High Performance Cloud Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 194-203
by
Yunqi Ye
,
Liangliang Xiao
,
I-Ling Yen
,
Farokh Bastani
Papers
On-Demand Recovery in Middleware Storage Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 204-213
by
Lásaro Camargos
,
Fernando Pedone
,
Alex Pilchin
,
Marcin Wieloch
Papers
P-Store: Genuine Partial Replication in Wide Area Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-224
by
Nicolas Schiper
,
Pierre Sutra
,
Fernando Pedone
Papers
FireSpam: Spam Resilient Gossiping in the BAR Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-234
by
Sonia Ben Mokhtar
,
Alessio Pace
,
Vivien Quéma
Papers
Semias: Self-Healing Active Replication on Top of a Structured Peer-to-Peer Overlay
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-244
by
Stefania Costache
,
Thomas Ropars
,
Christine Morin
Papers
Experimental Validation of a Synchronization Uncertainty-Aware Software Clock
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-254
by
Andrea Bondavalli
,
Francesco Brancati
,
Andrea Ceccarelli
,
Michele Vadursi
Papers
Applying Text Classification Algorithms in Web Services Robustness Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 255-264
by
Nuno Laranjeiro
,
Rui Oliveira
,
Marco Vieira
Papers
Availability Assessment of HA Standby Redundant Clusters
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-274
by
Salvatore Distefano
,
Francesco Longo
,
Marco Scarpa
Papers
Diskless Checkpointing with Rollback-Dependency Trackability
Full-text access may be available. Sign in or learn about subscription options.
pp. 275-281
by
Raphael Marcos Menderico
,
Islene Calciolari Garcia
Papers
Swift Algorithms for Repeated Consensus
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-292
by
Fatemeh Borran
,
Martin Hutle
,
Nuno Santos
,
André Schiper
Papers
Thicket: A Protocol for Building and Maintaining Multiple Trees in a P2P Overlay
Full-text access may be available. Sign in or learn about subscription options.
pp. 293-302
by
Mário Ferreira
,
João Leitão
,
Luís Rodrigues
Papers
A Tactical Information Management Middleware for Resource-Constrained Mobile P2P Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 303-307
by
Bo Xu
,
Mark Linderman
,
Sanjay Madria
,
Ouri Wolfson
Papers
On Optimizing Traffic Signal Phase Ordering in Road Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 308-312
by
Jason Barnes
,
Vamsi Paruchuri
,
Sriram Chellappan
Papers
Lightweight Fault-Tolerance for Peer-to-Peer Middleware
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-317
by
Rolando Martins
,
Priya Narasimhan
,
Luís Lopes
,
Fernando Silva
Papers
Adaptive Routing Scheme for Emerging Wireless Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 318-322
by
Behdis Eslamnour
,
S. Jagannatahn
Papers
Towards Mobile Data Streaming in Service Oriented Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 323-327
by
Norman Ahmed
,
Mark Linderman
,
Jason Bryant
Papers
Practical Aspects in Analyzing and Sharing the Results of Experimental Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 328-332
by
Francesco Brancati
,
Andrea Bondavalli
Papers
A Study on Latent Vulnerabilities
Full-text access may be available. Sign in or learn about subscription options.
pp. 333-337
by
Beng Heng Ng
,
Xin Hu
,
Atul Prakash
Papers
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization
Full-text access may be available. Sign in or learn about subscription options.
pp. 338-342
by
Flavio Lombardi
,
Roberto Di Pietro
,
Claudio Soriente
Papers
Quantifying Resiliency of IaaS Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 343-347
by
Rahul Ghosh
,
Francesco Longo
,
Vijay K. Naik
,
Kishor S. Trivedi
Papers
Benchmarking the Resilience of Self-Adaptive Systems: A New Research Challenge
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-352
by
Raquel Almeida
,
Henrique Madeira
,
Marco Vieira
Papers
Data-Mining-Based Link Failure Detection for Wireless Mesh Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 353-357
by
Timo Lindhorst
,
Georg Lukas
,
Edgar Nett
,
Michael Mock
Papers
Data Validity and Dependable Perception in Networked Sensor-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 358-362
by
Luís Marques
,
António Casimiro
Papers
A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation
Full-text access may be available. Sign in or learn about subscription options.
pp. 363-367
by
Ruchika Mehresh
,
Shambhu J. Upadhyaya
,
Kevin Kwiat
Papers
Protection of Identity Information in Cloud Computing without Trusted Third Party
Full-text access may be available. Sign in or learn about subscription options.
pp. 368-372
by
Rohit Ranchal
,
Bharat Bhargava
,
Lotfi Ben Othmane
,
Leszek Lilien
,
Anya Kim
,
Myong Kang
,
Mark Linderman
Papers
Author Index
Freely available from IEEE.
pp. 373-374
Papers
[Publisher's information]
Freely available from IEEE.
pp. 376
Showing 57 out of 57