Default Cover Image

2012 IEEE 31st International Symposium on Reliable Distributed Systems (SRDS 2012)

Oct. 8 2012 to Oct. 11 2012

Irvine, CA

Table of Contents

Papers
[Title page i]Freely available from IEEE.pp. i
Papers
[Title page iii]Freely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-xi
Papers
Message from General ChairsFreely available from IEEE.pp. xii
Papers
Message from Technical Program Co-chairsFreely available from IEEE.pp. xiii
Papers
Organizing CommitteeFreely available from IEEE.pp. xiv
Papers
Technical Program CommitteeFreely available from IEEE.pp. xv
Papers
External ReviewersFreely available from IEEE.pp. xvi-xvii
Papers
Detecting Anomalous User Behaviors in Workflow-Driven Web ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 1-10
Papers
Susceptibility Analysis of Structured P2P Systems to Localized Eclipse AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 11-20
Papers
Benchmarking Dependability of MapReduce SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 21-30
Papers
Aggregating CVSS Base Scores for Semantics-Rich Network Security MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 31-40
Papers
First Step toward Cloud-Based FirewallingFull-text access may be available. Sign in or learn about subscription options.pp. 41-50
Papers
Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 51-60
Papers
TailCon: Power-Minimizing Tail Percentile Control of Response Time in Server ClustersFull-text access may be available. Sign in or learn about subscription options.pp. 61-70
Papers
LogMaster: Mining Event Correlations in Logs of Large-Scale Cluster SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 71-80
Papers
RAM-DUR: In-Memory Deferred Update ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 81-90
Papers
SPECULA: Speculative Replication of Software Transactional MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 91-100
Model-Driven Comparison of State-Machine-Based and Deferred-Update Replication SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 101-110
Papers
S-Paxos: Offloading the Leader for High Throughput State Machine ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 111-120
Papers
FORTRESS: Adding Intrusion-Resilience to Primary-Backup Server SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 121-130
Papers
From Backup to Hot Standby: High Availability for HDFSFull-text access may be available. Sign in or learn about subscription options.pp. 131-140
Papers
Availability Modeling and Analysis for Data Backup and Restore OperationsFull-text access may be available. Sign in or learn about subscription options.pp. 141-150
Availability-Based Methods for Distributed Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 151-160
Papers
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal ConditionsFull-text access may be available. Sign in or learn about subscription options.pp. 161-170
Papers
GRADE: Graceful Degradation in Byzantine Quorum SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 171-180
Papers
Scalable and Secure Polling in Dynamic Distributed NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 181-190
Papers
Distributed and Private Group ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 191-200
Papers
Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 207-212
Papers
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some SolutionsFull-text access may be available. Sign in or learn about subscription options.pp. 213-218
Papers
Impact of Operational Reliability Re-assessment during Aircraft MissionsFull-text access may be available. Sign in or learn about subscription options.pp. 219-224
Papers
Automatic Generation of Graceful ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 225-230
Papers
RD2: Resilient Dynamic Desynchronization for TDMA over Lossy NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 231-236
Papers
Providing Uniform Reliable Broadcast Delivery for Mobile Ad Hoc Networks with MANET Liveness PropertyFull-text access may be available. Sign in or learn about subscription options.pp. 237-242
Papers
Fault Localization in MANET-Hosted Service-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 243-248
Papers
Fast Optimization Algorithms for Designing Cellular Networks with Guard ChannelFull-text access may be available. Sign in or learn about subscription options.pp. 249-254
Papers
A Quick and Reliable Routing for Infrastructure Surveillance with Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 255-260
Papers
Causally Coordinated Snapshot Isolation for Geographically Replicated DataFull-text access may be available. Sign in or learn about subscription options.pp. 261-266
Papers
GSFord: Towards a Reliable Geo-social Notification SystemFull-text access may be available. Sign in or learn about subscription options.pp. 267-272
Papers
Performance Issue Diagnosis for Online Service SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 273-278
Papers
RADAR: Adaptive Rate Allocation in Distributed Stream Processing Systems under Bursty WorkloadsFull-text access may be available. Sign in or learn about subscription options.pp. 285-290
Papers
Efficient Asynchronous Low Power Listening for Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 291-300
Papers
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 301-310
Papers
Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable LinksFull-text access may be available. Sign in or learn about subscription options.pp. 311-320
Papers
Efficient and Reliable Multicast in Multi-radio NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 321-330
Papers
Fair Comparison of Gossip Algorithms over Large-Scale Random TopologiesFull-text access may be available. Sign in or learn about subscription options.pp. 331-340
Papers
A Theory of Packet Flows Based on Law-of-Mass-Action SchedulingFull-text access may be available. Sign in or learn about subscription options.pp. 341-351
Papers
HybCAST: Rich Content Dissemination in Hybrid Cellular and 802.11 Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 352-361
Papers
A Quantitative Comparison of Reactive and Proactive Replicated Storage SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 384-389
Papers
PGV: A Storage Enforcing Remote Verification SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 390-395
Papers
AAD: Adaptive Anomaly Detection System for Cloud Computing InfrastructuresFull-text access may be available. Sign in or learn about subscription options.pp. 396-397
Papers
Distributed Monitoring of Temporal System Properties Using Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 398-399
Papers
Secure Cloud Browser: Model and Architecture to Support Secure WEB NavigationFull-text access may be available. Sign in or learn about subscription options.pp. 402-403
Papers
Towards Identifying Root Causes of Faults in Service-Based ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 404-405
Papers
Anonymous On-Demand Routing and Secure Checking of Traffic Forwarding for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 406-411
Papers
Pairwise Key Generation Scheme for Cellular Mobile CommunicationFull-text access may be available. Sign in or learn about subscription options.pp. 412-417
Papers
Data De-duplication and Event Processing for Security Applications on an Embedded ProcessorFull-text access may be available. Sign in or learn about subscription options.pp. 418-423
Papers
Query Plan Execution in a Heterogeneous Stream Management System for Situational AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 424-429
Papers
Private Anonymous MessagingFull-text access may be available. Sign in or learn about subscription options.pp. 430-435
Regenerating Codes: A System PerspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 436-441
Papers
Banking on Decoupling: Budget-Driven Sustainability for HPC Applications on EC2 Spot InstancesFull-text access may be available. Sign in or learn about subscription options.pp. 442-447
Papers
On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 448-453
Papers
Byzantine Fault-Tolerant Publish/Subscribe: A Cloud Computing InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 454-456
Papers
Energy Efficient Hadoop Using Mirrored Data Block Replication PolicyFull-text access may be available. Sign in or learn about subscription options.pp. 457-462
Papers
Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the ProblemsFull-text access may be available. Sign in or learn about subscription options.pp. 463-468
Papers
Versatile Key Management for Secure Cloud StorageFull-text access may be available. Sign in or learn about subscription options.pp. 469-474
Papers
Securing a Wireless Networked Control System Using Information FusionFull-text access may be available. Sign in or learn about subscription options.pp. 475-476
Papers
Exploring Compile Time Caching of Explicit Queries in Programming CodesFull-text access may be available. Sign in or learn about subscription options.pp. 477-478
Papers
Three Point Encryption (3PE): Secure Communications in Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 479-480
Papers
TAIRO: Trust-Aware Automatic Incremental Routing for Opportunistic Resource Utilization NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 481-482
Papers
Strategies for Reliable, Cloud-Based Distributed Real-Time and Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 483-484
Papers
Towards Reliable Communication in Intelligent Transportation SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 485-486
Papers
Reliable On-Chip Memory Design for CMPsFull-text access may be available. Sign in or learn about subscription options.pp. 487-488
Papers
Author indexFreely available from IEEE.pp. 489-491
Papers
[Publisher's information]Freely available from IEEE.pp. 492
Showing 83 out of 83