DSN 2005:
Yokohama,
Japan
2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June - 1 July 2005, Yokohama, Japan, Proceedings.
IEEE Computer Society 2005, ISBN 0-7695-2282-3 BibTeX
Introduction
Keynote Address
Session 1A:
Fault Tolerant Architectures and Algorithms
- Elisabeth A. Strunk, John C. Knight, M. Anthony Aiello:
Assured Reconfiguration of Fail-Stop Systems.
2-11
Electronic Edition (link) BibTeX
- David Bernick, Bill Bruckert, Paul Del Vigna, David Garcia, Robert Jardine, Jim Klecka, Jim Smullen:
NonStop® Advanced Architecture.
12-21
Electronic Edition (link) BibTeX
- Partha Dutta, Rachid Guerraoui, Leslie Lamport:
How Fast Can Eventual Synchrony Lead to Consensus?.
22-27
Electronic Edition (link) BibTeX
Session 1B:
Dependability in VLSI
Session 2A:
Experimental Validation
Session 2B:
System Security
Session 3A:
Multicast
Session 3B:
Wide Area Networks
Session 4A:
Detection and Adaptation
Session 4B:
FT Communications
Session 5A:
Operating Systems and Mechanisms
Session 5B:
Networking
Session 6A:
Codes
- Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy:
A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications.
316-325
Electronic Edition (link) BibTeX
- James S. Plank, Adam L. Buchsbaum, Rebecca L. Collins, Michael G. Thomason:
Small Parity-Check Erasure Codes - Exploration and Observations.
326-335
Electronic Edition (link) BibTeX
- Marcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu:
Using Erasure Codes Efficiently for Storage in a Distributed System.
336-345
Electronic Edition (link) BibTeX
- Michael Paulitsch, Jennifer Morris, Brendan Hall, Kevin Driscoll, Elizabeth Latronico, Philip Koopman:
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems.
346-355
Electronic Edition (link) BibTeX
Session 6B:
Critical Infrastructures Protection
- Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, Richard D. Schlichting:
Authenticated System Calls.
358-367
Electronic Edition (link) BibTeX
- Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, Chad Verbowski:
Detecting Stealth Software with Strider GhostBuster.
368-377
Electronic Edition (link) BibTeX
- Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Defeating Memory Corruption Attacks via Pointer Taintedness Detection.
378-387
Electronic Edition (link) BibTeX
- Lap-Chung Lam, Tzi-cker Chiueh:
Checking Array Bound Violation Using Segmentation Hardware.
388-397
Electronic Edition (link) BibTeX
Panel:
Dependability Benchmarking of Computing Systems
Session 7A:
Consensus
Session 7B:
Hardware and Codesign
Session 8A:
Dependability Modeling and Prediction
Session 8B:
Intrusion Detection and Tolerance
- Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment.
508-517
Electronic Edition (link) BibTeX
- Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks.
518-527
Electronic Edition (link) BibTeX
- Sarah H. Sellke, Ness B. Shroff, Saurabh Bagchi:
Modeling and Automated Containment of Worms.
528-537
Electronic Edition (link) BibTeX
- Alper Tugay Mizrak, Yu-Chung Cheng, Keith Marzullo, Stefan Savage:
Fatih: Detecting and Isolating Malicious Routers.
538-547
Electronic Edition (link) BibTeX
Session 1C:
Software Reliability,
Rejuvenation and Optimization
Session 2C:
Security Evaluation
Session 3C:
Evaluation of QoS and Self-Healing Systems
Session 4C:
Experimental Evaluation of Fault-Tolerance
- Joakim Aidemark, Peter Folkesson, Johan Karlsson:
A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems.
656-665
Electronic Edition (link) BibTeX
- Jonny Vinter, Olof Hannius, Torbjörn Norlander, Peter Folkesson, Johan Karlsson:
Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control System for Unmanned Aerial Vehicles.
666-671
Electronic Edition (link) BibTeX
- Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu:
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks.
672-681
Electronic Edition (link) BibTeX
Session 5C:
Performance Evaluation of Networks and Protocols
- Sherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon:
Improving TCP Performance for Multihop Wireless Networks.
684-693
Electronic Edition (link) BibTeX
- Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano Gaeta, Michele Garetto, Daniele Manini, Matteo Sereno:
A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks.
694-703
Electronic Edition (link) BibTeX
- Henrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen:
Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks.
704-709
Electronic Edition (link) BibTeX
Session 6C:
Markovian Models for Performance and Dependability
Session 7C:
Experimental Microprocessor Evaluation
Session 8C:
Replication and Checkpointing Protocol Evaluation
- Tabito Suzuki, Mamoru Ohara, Masayuki Arai, Satoshi Fukumoto, Kazuhiko Iwasaki:
Analysis of Probabilistic Trapezoid Protocol for Data Replication.
782-791
Electronic Edition (link) BibTeX
- A. Sousa, José Pereira, L. Soares, Alfrânio Correia Jr., L. Rocha, Rui Carlos Oliveira, Francisco Moura:
Testing the Dependability and Performance of Group Communication Based Database Replication Protocols.
792-801
Electronic Edition (link) BibTeX
- Vijayan Prabhakaran, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau:
Model-Based Failure Analysis of Journaling File Systems.
802-811
Electronic Edition (link) BibTeX
- Long Wang, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Lawrence G. Votta, Christopher A. Vick, Alan Wood:
Modeling Coordinated Checkpointing for Large-Scale Supercomputers.
812-821
Electronic Edition (link) BibTeX
Workshop Abstracts
Copyright © Sat May 16 23:07:32 2009
by Michael Ley (ley@uni-trier.de)