The SCEAS System
Navigation Menu

Conferences in DBLP

Dependable Systems and Networks (dsn)
2008 (conf/dsn/2008)


  1. Message from the DCCS program chair. [Citation Graph (, )][DBLP]


  2. Automotive Enhanced Vision Systems - Issues arising from placing users in the loop. [Citation Graph (, )][DBLP]


  3. Message from the PDS program chair. [Citation Graph (, )][DBLP]


  4. Message from the conference general chair and coordinator. [Citation Graph (, )][DBLP]


  5. Dependability on the last frontier. [Citation Graph (, )][DBLP]


  6. Coverage of a microarchitecture-level fault check regimen in a superscalar processor. [Citation Graph (, )][DBLP]


  7. Analysis and solutions to issue queue process variation. [Citation Graph (, )][DBLP]


  8. Trace-based microarchitecture-level diagnosis of permanent hardware faults. [Citation Graph (, )][DBLP]


  9. A study of cognitive resilience in a JPEG compressor. [Citation Graph (, )][DBLP]


  10. Scheduling algorithms for unpredictably heterogeneous CMP architectures. [Citation Graph (, )][DBLP]


  11. Automated duplicate detection for bug tracking systems. [Citation Graph (, )][DBLP]


  12. Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor. [Citation Graph (, )][DBLP]


  13. Using likely program invariants to detect hardware errors. [Citation Graph (, )][DBLP]


  14. Detouring: Translating software to circumvent hard faults in simple cores. [Citation Graph (, )][DBLP]


  15. Towards assessing the security of DBMS configurations. [Citation Graph (, )][DBLP]


  16. Experiences with formal specification of fault-tolerant file systems. [Citation Graph (, )][DBLP]


  17. Using an assurance case to support independent assessment of the transition to a new GPS ground control system. [Citation Graph (, )][DBLP]


  18. Silent Data Corruption - Myth or reality? [Citation Graph (, )][DBLP]


  19. End-system tools for enhancing email reliability. [Citation Graph (, )][DBLP]


  20. Tempest: Towards early identification of failure-prone binaries. [Citation Graph (, )][DBLP]


  21. Statistical Fault Injection. [Citation Graph (, )][DBLP]


  22. An accurate flip-flop selection technique for reducing logic SER. [Citation Graph (, )][DBLP]


  23. Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors. [Citation Graph (, )][DBLP]


  24. Reliability of flat XOR-based erasure codes on heterogeneous devices. [Citation Graph (, )][DBLP]


  25. ConfErr: A tool for assessing resilience to human configuration errors. [Citation Graph (, )][DBLP]


  26. Enhanced server fault-tolerance for improved user experience. [Citation Graph (, )][DBLP]


  27. Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. [Citation Graph (, )][DBLP]


  28. Security through redundant data diversity. [Citation Graph (, )][DBLP]


  29. Byzantine replication under attack. [Citation Graph (, )][DBLP]


  30. A robust and lightweight stable leader election service for dynamic systems. [Citation Graph (, )][DBLP]


  31. A fast restart mechanism for checkpoint/recovery protocols in networked environments. [Citation Graph (, )][DBLP]


  32. Tempest: Soft state replication in the service tier. [Citation Graph (, )][DBLP]


  33. AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP]


  34. Convicting exploitable software vulnerabilities: An efficient input provenance based approach. [Citation Graph (, )][DBLP]


  35. Mapping software faults with web security vulnerabilities. [Citation Graph (, )][DBLP]


  36. A fault-tolerant directory-based cache coherence protocol for CMP architectures. [Citation Graph (, )][DBLP]


  37. Probabilistic quorum systems in wireless ad hoc networks. [Citation Graph (, )][DBLP]


  38. BAR primer. [Citation Graph (, )][DBLP]


  39. Improving dependability of network configuration through policy classification. [Citation Graph (, )][DBLP]


  40. Traffic grooming in WDM mesh networks with guaranteed survivability. [Citation Graph (, )][DBLP]


  41. Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing. [Citation Graph (, )][DBLP]


  42. An integrated approach to resource pool management: Policies, efficiency and quality metrics. [Citation Graph (, )][DBLP]


  43. Scheduling for performance and availability in systems with temporal dependent workloads. [Citation Graph (, )][DBLP]


  44. Hot-spot prediction and alleviation in distributed stream processing applications. [Citation Graph (, )][DBLP]


  45. On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP]


  46. Automatic security assessment of critical cyber-infrastructures. [Citation Graph (, )][DBLP]


  47. Evaluating email's feasibility for botnet command and control. [Citation Graph (, )][DBLP]


  48. Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. [Citation Graph (, )][DBLP]


  49. WS-DREAM: A distributed reliability assessment Mechanism for Web Services. [Citation Graph (, )][DBLP]


  50. A log mining approach to failure analysis of enterprise telephony systems. [Citation Graph (, )][DBLP]


  51. Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL. [Citation Graph (, )][DBLP]


  52. Toward an understanding of the processing delay of peer-to-peer relay nodes. [Citation Graph (, )][DBLP]


  53. TCP covert timing channels: Design and detection. [Citation Graph (, )][DBLP]


  54. A smart triggering scheme to reduce service interruption during heterogeneous handovers. [Citation Graph (, )][DBLP]


  55. On representing knowledge in the dependability domain: a panel discussion. [Citation Graph (, )][DBLP]


  56. Evaluating availability under quasi-heavy-tailed repair times. [Citation Graph (, )][DBLP]


  57. Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. [Citation Graph (, )][DBLP]


  58. Survivability quantification of communication services. [Citation Graph (, )][DBLP]


  59. SymPLFIED: Symbolic program-level fault injection and error detection framework. [Citation Graph (, )][DBLP]


  60. A characterization of instruction-level error derating and its implications for error detection. [Citation Graph (, )][DBLP]


  61. Enhancing data availability in disk drives through background activities. [Citation Graph (, )][DBLP]


  62. Analyzing the effects of disk-pointer corruption. [Citation Graph (, )][DBLP]


  63. Architectural dependability evaluation with Arcade. [Citation Graph (, )][DBLP]


  64. An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. [Citation Graph (, )][DBLP]


  65. A recurrence-relation-based reward model for performability evaluation of embedded systems. [Citation Graph (, )][DBLP]


  66. International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008). [Citation Graph (, )][DBLP]


  67. Workshop on compiler and architectural techniques for application reliability and security (CATARS). [Citation Graph (, )][DBLP]


  68. Second workshop on dependable and secure nanocomputing. [Citation Graph (, )][DBLP]


  69. Workshop on Architecting Dependable Systems (WADS 2008). [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002