Default Cover Image

37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'07)

June 25 2007 to June 28 2007

Edinburgh

Table of Contents

Introduction
Message from the Conference General Chair and CoordinatorFreely available from IEEE.pp. xiv
Introduction
Message from the DCCS Track Program ChairFreely available from IEEE.pp. xv
Introduction
Message from the PDS Track Program ChairFreely available from IEEE.pp. xvi
Introduction
William C. Carter AwardFull-text access may be available. Sign in or learn about subscription options.pp. xvii
Introduction
Conference OrganizersFreely available from IEEE.pp. xviii
Introduction
DSN Steering CommitteeFreely available from IEEE.pp. xix
Introduction
DCCS Program CommitteeFreely available from IEEE.pp. xx
Introduction
Reviewers for DCCSFreely available from IEEE.pp. xxi-xxiii
Introduction
PDS Program CommitteeFreely available from IEEE.pp. xxiv
Introduction
Reviewers for PDSFreely available from IEEE.pp. xxv
Keynote Address
Science and Engineering: A Collusion of CulturesFull-text access may be available. Sign in or learn about subscription options.pp. 2-9
Session 1A: Security Protection: Architectural Approaches
Augmenting Branch Predictor to Secure Program ExecutionFull-text access may be available. Sign in or learn about subscription options.pp. 10-19
Session 1A: Security Protection: Architectural Approaches
A Firewall for Routers: Protecting against Routing MisbehaviorFull-text access may be available. Sign in or learn about subscription options.pp. 20-29
Session 1A: Security Protection: Architectural Approaches
An Architectural Approach to Preventing Code Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 30-40
Session 1B: Software Fault Tolerance
Failure Resilience for Device DriversFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Session 1B: Software Fault Tolerance
Fault Tolerance Connectors for Unreliable Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Session 1B: Software Fault Tolerance
Robustness and Security Hardening of COTS Software LibrariesFull-text access may be available. Sign in or learn about subscription options.pp. 61-71
Session 2A: Distributed Consensus
Automatic Verification and Discovery of Byzantine Consensus ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 72-81
On a Modeling Framework for the Analysis of Interdependencies in Electric Power SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 185-195
Session 2A: Distributed Consensus
Knowledge Connectivity vs. Synchrony Requirements for Fault-Tolerant Agreement in Unknown NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 82-91
Session 2A: Distributed Consensus
Communication Predicates: A High-Level Abstraction for Coping with Transient and Dynamic FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 92-101
Session 2A: Distributed Consensus
Synchronous Consensus with Mortal ByzantinesFull-text access may be available. Sign in or learn about subscription options.pp. 102-112
Session 2B: Practical Experience Reports
Reliability Techniques for RFID-Based Object Tracking ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 113-118
Session 2B: Practical Experience Reports
Profiling Attacker Behavior Following SSH CompromisesFull-text access may be available. Sign in or learn about subscription options.pp. 119-124
Session 2B: Practical Experience Reports
Dependability Assessment of Grid MiddlewareFull-text access may be available. Sign in or learn about subscription options.pp. 125-130
Session 2B: Practical Experience Reports
Assessing Robustness of Web-Services InfrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 131-136
Session 2B: Practical Experience Reports
Protecting Cryptographic Keys from Memory Disclosure AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 137-143
Session 3A: Embedded Systems
Fault Tolerant Planning for Critical RobotsFull-text access may be available. Sign in or learn about subscription options.pp. 144-153
Session 3A: Embedded Systems
Insights into the Sensitivity of the BRAIN (Braided Ring Availability Integrity Network)--On Platform Robustness in Extended OperationFull-text access may be available. Sign in or learn about subscription options.pp. 154-163
Session 3A: Embedded Systems
A Tunable Add-On Diagnostic Protocol for Time-Triggered SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 164-174
Session 3B: Dependability Modeling
Enhanced Reliability Modeling of RAID Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 175-184
Session 4A: Hardware Fault Tolerance: Emerging Challenges
Superscalar Processor Performance Enhancement through Reliable Dynamic Clock Frequency TuningFull-text access may be available. Sign in or learn about subscription options.pp. 196-205
Session 4A: Hardware Fault Tolerance: Emerging Challenges
Determining Fault Tolerance of XOR-Based Erasure Codes EfficientlyFull-text access may be available. Sign in or learn about subscription options.pp. 206-215
Session 4A: Hardware Fault Tolerance: Emerging Challenges
Fault Tolerant Approaches to Nanoelectronic Programmable Logic ArraysFull-text access may be available. Sign in or learn about subscription options.pp. 216-224
Session 4B: VM Rejuvenation and Network Reliability
Concilium: Collaborative Diagnosis of Broken Overlay RoutesFull-text access may be available. Sign in or learn about subscription options.pp. 225-234
Session 4B: VM Rejuvenation and Network Reliability
R-Sentry: Providing Continuous Sensor Services against Random Node FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 235-244
Session 4B: VM Rejuvenation and Network Reliability
A Fast Rejuvenation Technique for Server Consolidation with Virtual MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 245-255
Session 5A: Soft Errors: Analysis and Protection
A Cost-Effective Dependable Microcontroller Architecture with Instruction-Level Rollback for Soft Error RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 256-265
Session 5A: Soft Errors: Analysis and Protection
Architecture-Level Soft Error Analysis: Examining the Limits of Common AssumptionsFull-text access may be available. Sign in or learn about subscription options.pp. 266-275
Session 5A: Soft Errors: Analysis and Protection
Feedback Redundancy: A Power Efficient SEU-Tolerant Latch Design for Deep Sub-Micron TechnologiesFull-text access may be available. Sign in or learn about subscription options.pp. 276-285
Session 5A: Soft Errors: Analysis and Protection
Using Register Lifetime Predictions to Protect Register Files against Soft ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 286-296
Session 5B: Processor Level Fault Tolerance
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 297-306
Session 5B: Processor Level Fault Tolerance
Inherent Time Redundancy (ITR): Using Program Repetition for Low-Overhead Fault ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 307-316
Session 5B: Processor Level Fault Tolerance
Utilizing Dynamically Coupled Cores to Form a Resilient Chip MultiprocessorFull-text access may be available. Sign in or learn about subscription options.pp. 317-326
Session 5B: Processor Level Fault Tolerance
BlackJack: Hard Error Detection with Redundant Threads on SMTFull-text access may be available. Sign in or learn about subscription options.pp. 327-337
Session 6A: Critical Systems: Risk Analysis and Assurance
Confidence: Its Role in Dependability Cases for Risk AssessmentFull-text access may be available. Sign in or learn about subscription options.pp. 338-346
Session 6A: Critical Systems: Risk Analysis and Assurance
Assurance Based Development of Critical SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 347-357
Session 6B: Security Threats and Novel Detection
Multiprocessors May Reduce System Dependability under File-Based Race Condition AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 358-367
Session 6B: Security Threats and Novel Detection
Understanding Resiliency of Internet Topology against Prefix Hijack AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 368-377
Session 6B: Security Threats and Novel Detection
User Discrimination through Structured Writing on PDAsFull-text access may be available. Sign in or learn about subscription options.pp. 378-388
Session 7A: Timing Model and Network Protocols
How to Choose a Timing Model?Full-text access may be available. Sign in or learn about subscription options.pp. 389-398
Session 7A: Timing Model and Network Protocols
Electing an Eventual Leader in an Asynchronous Shared Memory SystemFull-text access may be available. Sign in or learn about subscription options.pp. 399-408
Session 7A: Timing Model and Network Protocols
Minimizing Response Time for Quorum-System Protocols over Wide-Area NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 409-418
Session 7A: Timing Model and Network Protocols
HyParView: A Membership Protocol for Reliable Gossip-Based BroadcastFull-text access may be available. Sign in or learn about subscription options.pp. 419-429
Session 7B: Security Protection: Algorithmic Approaches
A Lightweight Mechanism for Dependable Communication in Untrusted NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 430-439
Session 7B: Security Protection: Algorithmic Approaches
Dynamic Cross-Realm Authentication for Multi-Party Service InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 440-449
Session 7B: Security Protection: Algorithmic Approaches
Enhancing DNS Resilience against Denial of Service AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 450-459
Session 7B: Security Protection: Algorithmic Approaches
Automatic Cookie Usage Setting with CookiePickerFull-text access may be available. Sign in or learn about subscription options.pp. 460-470
Session 8A: Networking
Greedy Receivers in IEEE 802.11 HotspotsFull-text access may be available. Sign in or learn about subscription options.pp. 471-480
Session 8A: Networking
Emergent Structure in Unstructured Epidemic MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 481-490
Session 8A: Networking
The Case for FEC-Based Reliable Multicast in Wireless Mesh NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 491-501
Session 8B: Experimental Dependability Assessment
On the Selection of Error Model(s) for OS Robustness EvaluationFull-text access may be available. Sign in or learn about subscription options.pp. 502-511
Session 8B: Experimental Dependability Assessment
Experimental Risk Assessment and Comparison Using Software Fault InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 512-521
Session 8B: Experimental Dependability Assessment
Foundations of Measurement Theory Applied to the Evaluation of Dependability AttributesFull-text access may be available. Sign in or learn about subscription options.pp. 522-533
Session 1C: System Architecture and Software Assessment
A Framework for Architecture-Level Lifetime Reliability ModelingFull-text access may be available. Sign in or learn about subscription options.pp. 534-543
Session 1C: System Architecture and Software Assessment
Processor-Level Selective ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 544-553
Session 1C: System Architecture and Software Assessment
Robustness Testing of the Windows DDKFull-text access may be available. Sign in or learn about subscription options.pp. 554-564
Session 2C: Measurement and Monitoring
SLAM: Sleep-Wake Aware Local Monitoring in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 565-574
Session 2C: Measurement and Monitoring
What Supercomputers Say: A Study of Five System LogsFull-text access may be available. Sign in or learn about subscription options.pp. 575-584
Session 2C: Measurement and Monitoring
How Do Mobile Phones Fail? A Failure Data Analysis of Symbian OS Smart PhonesFull-text access may be available. Sign in or learn about subscription options.pp. 585-594
Session 2C: Measurement and Monitoring
A Real-Time Network Traffic Profiling SystemFull-text access may be available. Sign in or learn about subscription options.pp. 595-605
Session 3C: Practical Experience Reports
RAS by the YardFull-text access may be available. Sign in or learn about subscription options.pp. 606-611
Session 3C: Practical Experience Reports
Web Services Wind Tunnel: On Performance Testing Large-Scale Stateful Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 612-617
Session 3C: Practical Experience Reports
Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 618-624
Session 4C: Distributed Algorithms
Evaluating the Impact of Simultaneous Round Participation and Decentralized Decision on the Performance of ConsensusFull-text access may be available. Sign in or learn about subscription options.pp. 625-634
Session 4C: Distributed Algorithms
On the Cost of Modularity in Atomic BroadcastFull-text access may be available. Sign in or learn about subscription options.pp. 635-644
Session 4C: Distributed Algorithms
Eventually k-Bounded Wait-Free Distributed DaemonsFull-text access may be available. Sign in or learn about subscription options.pp. 645-655
Session 5C: Availability of Distributed Systems
Measuring Availability in Optimistic Partition-Tolerant Systems with Data ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 656-665
Session 5C: Availability of Distributed Systems
Scaling and Continuous Availability in Database Server Clusters through Multiversion ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 666-676
Session 5C: Availability of Distributed Systems
Improving Recoverability in Multi-tier Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 677-686
Session 5C: Availability of Distributed Systems
Portable and Efficient Continuous Data Protection for Network File ServersFull-text access may be available. Sign in or learn about subscription options.pp. 687-697
DSN 2007 WorkshopsFreely available from IEEE.pp. 802-802
Session 6C: Modeling and Evaluation
Variational Bayesian Approach for Interval Estimation of NHPP-Based Software Reliability ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 698-707
Session 6C: Modeling and Evaluation
Dynamic Fault Tree Analysis Using Input/Output Interactive Markov ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 708-717
Session 6C: Modeling and Evaluation
Uniformity by Construction in the Analysis of Nondeterministic Stochastic SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 718-728
Workshop on Architecting Dependable Systems (WADS 2007)Full-text access may be available. Sign in or learn about subscription options.pp. 805-806
Session 7C: Quality of Service and Error Recovery
A Reinforcement Learning Approach to Automatic Error RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 729-738
Session 7C: Quality of Service and Error Recovery
On the Quality of Service of Crash-Recovery Failure DetectorsFull-text access may be available. Sign in or learn about subscription options.pp. 739-748
Workshop on Dependable and Secure NanocomputingFull-text access may be available. Sign in or learn about subscription options.pp. 809-810
Session 7C: Quality of Service and Error Recovery
E2EProf: Automated End-to-End Performance Management for Enterprise SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 749-758
Session 7C: Quality of Service and Error Recovery
Bounding Peer-to-Peer Upload Traffic in Client NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 759-769
Session 8C: Stochastic Modeling
Performability Models for Multi-Server Systems with High-Variance Repair DurationsFull-text access may be available. Sign in or learn about subscription options.pp. 770-779
Session 8C: Stochastic Modeling
Computing Battery Lifetime DistributionsFull-text access may be available. Sign in or learn about subscription options.pp. 780-789
Session 8C: Stochastic Modeling
Quantifying the Effectiveness of Mobile Phone Virus Response MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 790-800
SPECIAL TRACKS
DSN 2007 TutorialsFull-text access may be available. Sign in or learn about subscription options.pp. 801
SPECIAL TRACKS
Workshop on Dependable Application Support for Self-Organizing Networks (DASSON 2007)Full-text access may be available. Sign in or learn about subscription options.pp. 803
SPECIAL TRACKS
Third Workshop on Hot Topics in System Dependability HotDep'07Full-text access may be available. Sign in or learn about subscription options.pp. 804
Showing 100 out of 106