|
Conferences in DBLP
Denali: a scalable isolation kernel. [Citation Graph (, )][DBLP]
Security architectures revisited. [Citation Graph (, )][DBLP]
The case for transient authentication. [Citation Graph (, )][DBLP]
InfoSpect: using a logic language for system health monitoring in distributed systems. [Citation Graph (, )][DBLP]
Dependable software needs pervasive debugging. [Citation Graph (, )][DBLP]
Specifying and verifying systems with TLA+. [Citation Graph (, )][DBLP]
Rigour is good for you and feasible: reflections on formal treatments of C and UDP sockets. [Citation Graph (, )][DBLP]
Capturing OS expertise in an event type system: the Bossa experience. [Citation Graph (, )][DBLP]
Overload management as a fundamental service design primitive. [Citation Graph (, )][DBLP]
Rewind, repair, replay: three R's to dependability. [Citation Graph (, )][DBLP]
Brittle systems will break - not bend: can aspect-oriented programming help? [Citation Graph (, )][DBLP]
The case for cyber foraging. [Citation Graph (, )][DBLP]
Automating data dependability. [Citation Graph (, )][DBLP]
Nooks: an architecture for reliable device drivers. [Citation Graph (, )][DBLP]
Sub-operating systems: a new approach to application security. [Citation Graph (, )][DBLP]
The design of a robust peer-to-peer system. [Citation Graph (, )][DBLP]
Self-organization in peer-to-peer systems. [Citation Graph (, )][DBLP]
HiScamp: self-organizing hierarchical membership protocol. [Citation Graph (, )][DBLP]
One ring to rule them all: service discovery and binding in structured peer-to-peer overlay networks. [Citation Graph (, )][DBLP]
A design of the persistent operating system with non-volatile memory. [Citation Graph (, )][DBLP]
AIMS: robustness through sensible introspection. [Citation Graph (, )][DBLP]
An approach for a dependable Java embedded environment. [Citation Graph (, )][DBLP]
An online evolutionary approach to developing internet services. [Citation Graph (, )][DBLP]
Applying source-code verification to a microkernel: the VFiasco project. [Citation Graph (, )][DBLP]
Back to the future: dependable computing = dependable services. [Citation Graph (, )][DBLP]
Dependency on O.S. in long-term programs: experience report in space programs. [Citation Graph (, )][DBLP]
Design and implementation of the Lambda mu-kernel based operating system for embedded systems. [Citation Graph (, )][DBLP]
Efficient heartbeats and repair of softstate in decentralized object location and routing systems. [Citation Graph (, )][DBLP]
Event-driven programming for robust software. [Citation Graph (, )][DBLP]
Execution time limitation of interrupt handlers in a Java operating system. [Citation Graph (, )][DBLP]
Extensible distributed operating system for reliable control systems. [Citation Graph (, )][DBLP]
Fault tolerance and avoidance in biomedical systems. [Citation Graph (, )][DBLP]
Gaining and maintaining confidence in operating systems security. [Citation Graph (, )][DBLP]
High-confidence operating systems. [Citation Graph (, )][DBLP]
Increasing smart card dependability. [Citation Graph (, )][DBLP]
A utility-centered approach to building dependable infrastructure services. [Citation Graph (, )][DBLP]
Model checking system software with CMC. [Citation Graph (, )][DBLP]
OASIS project: deterministic real-time for safety critical embedded systems. [Citation Graph (, )][DBLP]
Operating system support for massive replication. [Citation Graph (, )][DBLP]
Pangaea: a symbiotic wide-area file system. [Citation Graph (, )][DBLP]
Replica management should be a game. [Citation Graph (, )][DBLP]
Secure coprocessor-based intrusion detection. [Citation Graph (, )][DBLP]
THINK: a secure distributed systems architecture. [Citation Graph (, )][DBLP]
Timing fault detection for safety-critical real-time embedded systems. [Citation Graph (, )][DBLP]
Towards trusted systems from the ground up. [Citation Graph (, )][DBLP]
Studying and using failure data from large-scale internet services. [Citation Graph (, )][DBLP]
|