The Community for Technology Leaders
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2004)
Florence, Italy
June 28, 2004 to July 1, 2004
ISBN: 0-7695-2052-9
TABLE OF CONTENTS
Special Tracks

DCCS Reviewers (PDF)

pp. xx

PDS Reviewers (PDF)

pp. xxix
Keynote Address

Recent Discoveries from Paxos (PDF)

Leslie Lamport , Microsoft Corp, Mountain View, CA, USA
pp. 3
Session 1A: Overlay Networks

Performance and Dependability of Structured Peer-to-Peer Overlays (Abstract)

Antony Rowstron , Microsoft Research, UK
Manuel Costa , Microsoft Research, UK
Miguel Castro , Microsoft Research, UK
pp. 9

Robust Aggregation Protocols for Large-Scale Overlay Networks (Abstract)

Ozalp Babaoglu , University of Bologna, Italy
M?rk Jelasity , University of Bologna, Italy
Alberto Montresor , University of Bologna, Italy
pp. 19

Impact of Path Diversity on Multi-homed and Overlay Networks (Abstract)

Junghee Han , University of Michigan, Ann Arbor
Farnam Jahanian , University of Michigan, Ann Arbor
pp. 29
Session 1B: Fault Tolerance Hardware Design

Fault Detection and Isolation Techniques for Quasi Delay-Insensitive Circuits (Abstract)

Christopher LaFrieda , Cornell University, Ithaca, NY
Rajit Manohar , Cornell University, Ithaca, NY
pp. 41

Tolerating Hard Faults in Microprocessor Array Structures (Abstract)

Daniel J. Sorin , Duke University
Fred A. Bower , Duke University
Sule Ozev , Duke University
Paul G. Shealy , Duke University
pp. 51

Characterizing the Effects of Transient Faults on a High-Performance Processor Pipeline (Abstract)

Justin Quek , University of Illinois at Urbana-Champaign
Nicholas J. Wang , University of Illinois at Urbana-Champaign
Sanjay J. patel , University of Illinois at Urbana-Champaign
Todd M. Rafacz , University of Illinois at Urbana-Champaign
pp. 61
Session 2A: Security Attacks

Dynamic Quarantine of Internet Worms (Abstract)

Dawn Song , Carnegie Mellon University
Stan Bielski , Carnegie Mellon University
Cynthia Wong , Carnegie Mellon University
Gregory R. Ganger , Carnegie Mellon University
Chenxi Wang , Carnegie Mellon University
pp. 73

HOURS: Achieving DoS Resilience in an Open Service Hierarchy (Abstract)

Songwu Lu , University of California, Los Angeles
Lixia Zhang , University of California, Los Angeles
Haiyun Luo , University of California, Los Angeles
Yi Yang , University of California, Los Angeles
Hao Yang , University of California, Los Angeles
pp. 83

A Defense-Centric Taxonomy Based on Attack Manifestations (Abstract)

Roy A. Maxion , Carnegie Mellon University, Pittsburgh, Pennsylvania
Kevin S. Killourhy , Carnegie Mellon University, Pittsburgh, Pennsylvania
Kymie M. C. Tan , Carnegie Mellon University, Pittsburgh, Pennsylvania
pp. 102
Session 2B: Coding Techniques

A Decentralized Algorithm for Erasure-Coded Virtual Disks (Abstract)

Arif Merchant , HP Labs, Palo Alto, CA
Susan Spence , HP Labs, Palo Alto, CA
Alistair Veitch , HP Labs, Palo Alto, CA
Yasushi Saito , HP Labs, Palo Alto, CA
Svend Fr?lund , HP Labs, Palo Alto, CA
pp. 125

Efficient Byzantine-Tolerant Erasure-Coded Storage (Abstract)

Michael K. Reiter , Carnegie Mellon University
Jay J. Wylie , Carnegie Mellon University
Garth R. Goodson , Carnegie Mellon University
Gregory R. Ganger , Carnegie Mellon University
pp. 135

Cyclic Redundancy Code (CRC) Polynomial Selection For Embedded Networks (Abstract)

Philip Koopman , Carnegie Mellon University, Pittsburgh, PA
Tridib Chakravarty , Carnegie Mellon University, Pittsburgh, PA
pp. 145
Session 3A: Emerging Technologies

Fault Tolerant Computation on Ensemble Quantum Computers (Abstract)

Vwani P. Roychowdhury , UCLA, Los Angeles, CA
P. Oscar Boykin , UCLA, Los Angeles, CA
Farrokh Vatan , California Institute of Technology, Pasadena, CA
Tal Mor , Technion, Israel
pp. 157

The Recursive NanoBox Processor Grid: A Reliable System Architecture for Unreliable Nanotechnology Devices (Abstract)

Kevin KleinOsowski , University of Minnesota, Minneapolis
A. J. KleinOsowski , University of Minnesota, Minneapolis
Priyadarshini Ranganath , University of Minnesota, Minneapolis
Vijay Rangarajan , University of Minnesota, Minneapolis
David J. Lilja , University of Minnesota, Minneapolis
pp. 167

The Impact of Technology Scaling on Lifetime Reliability (Abstract)

Sarita V. Adve , University of Illinois, Urbana-Champaign
Jayanth Srinivasan , University of Illinois, Urbana-Champaign
Pradip Bose , IBM T.J. Watson Research Center, Yorktown Heights, NY
Jude A. Rivers , IBM T.J. Watson Research Center, Yorktown Heights, NY
pp. 177
Session 3B: Formal Methods

Model Checking a Fault-Tolerant Startup Algorithm: From Design Exploration To Exhaustive Fault Simulation (Abstract)

Holger Pfeifer , Universit?t Ulm, Germany
John Rushby , SRI International, USA
Wilfried Steiner , Technische Universit?t Wien, Austria
Maria Sorea , Universit?t Ulm, Germany
pp. 189

Verifying Web Applications Using Bounded Model Checking (Abstract)

Yao-Wen Huang , National Taiwan University, Taipei; Academia Sinica, Taipei, Taiwan
D. T. Lee , National Taiwan University, Taipei; Academia Sinica, Taipei, Taiwan
Sy-Yen Kuo , National Taiwan University, Taipei
Christian Hang , RWTH Aachen, Germany
Fang Yu , Academia Sinica, Taipei, Taiwan
Chung-Hung Tsai , National Taiwan University, Taipei
pp. 199

Automated Synthesis of Multitolerance (Abstract)

Sandeep S. Kulkarni , Michigan State University, East Lansing
Ali Ebnenasir , Michigan State University, East Lansing
pp. 209
Session 5A: Broadcast & Multicast

Data-Aware Multicast (Abstract)

Rachid Guerraoui , Distributed Programming Laboratory, EPFL
Patrick Th. Eugster , Distributed Programming Laboratory, EPFL
S?bastien Baehni , Distributed Programming Laboratory, EPFL
pp. 233

Timed Uniform Consensus Resilient to Crash and Timing Faults (Abstract)

Taisuke Izumi , Osaka University, Japan
Akinori Saitoh , Osaka University, Japan
Toshimitsu Masuzawa , Osaka University, Japan
pp. 243

Caching-Enhanced Scalable Reliable Multicast (Abstract)

Idit Keidar , Dept. of Electrical Engineering, Technion
Carolos Livadas , BBN Technologies
pp. 253
Session 5B: Dependability Assessment

The Effect of Testing on Reliability of Fault-Tolerant Software (Abstract)

Peter Popov , Centre for Software Reliability, City University, London
Bev Littlewood , Centre for Software Reliability, City University, London
pp. 265

Quantifying the Reliability of Proven SPIDER Group Membership Service Guarantees (Abstract)

Elizabeth Latronico , Carnegie Mellon University, Pittsburgh, PA
Paul Miner , NASA Langley Research Center, Hampton, VA
Philip Koopman , Carnegie Mellon University, Pittsburgh, PA
pp. 275

Generic Faultloads Based on Software Faults for Dependability Benchmarking (Abstract)

Henrique Madeira , DEI/CISUC - University of Coimbra, Portugal
Jo?o Dur?es , ISEC/CISUC - Polytechnic Institute of Coimbra, Portugal
pp. 285

Improving System Dependability with Functional Alternatives (Abstract)

Philip Koopman , Carnegie Mellon University, Pittsburgh, PA
Charles P. Shelton , Robert Bosch Corporation, Pittsburgh, PA
pp. 295
Session 6A: Distributed Algorithms

Cheap Paxos (Abstract)

Leslie Lamport , Microsoft
Mike Massa , Microsoft
pp. 307

The Join Problem in Dynamic Network Algorithms (Abstract)

Alexander A. Shvartsman , University of Connecticut, Storrs; MIT Computer Science and Artificial Intelligence Laboratory, Cambridge, MA
Kishori M. Konwar , University of Connecticut, Storrs
Dariusz R. Kowalski , Max-Planck-Institut f?r Informatik, Germany; Uniwersytet Warszawski, Poland
pp. 315

A Framework for Dynamic Byzantine Storage (Abstract)

Lorenzo Alvisi , The University of Texas at Austin
Jean-Philippe Martin , The University of Texas at Austin
pp. 325

Dependable Initialization of Large-Scale Distributed Software (Abstract)

Rick Buskens , Bell Laboratories, Lucent Technologies
Oscar Gonzalez , Bell Laboratories, Lucent Technologies
Yansong (Jennifer) Ren , Bell Laboratories, Lucent Technologies
pp. 335
Session 7A: Embedded & Real-Time Systems

Proactive Recovery in Distributed CORBA Applications (Abstract)

Soila Pertet , Carnegie Mellon University, Pittsburgh, PA
Priya Narasimhan , Carnegie Mellon University, Pittsburgh, PA
pp. 357

Assured Reconfiguration of Embedded Real-Time Software (Abstract)

Elisabeth A. Strunk , University of Virginia, Charlottesville
John C. Knight , University of Virginia, Charlottesville
pp. 367

Fault Tolerance Tradeoffs in Moving from Decentralized to Centralized Embedded Systems (Abstract)

Daniel Kroening , Carnegie Mellon University
Jennifer Morris , Carnegie Mellon University
Philip Koopman , Carnegie Mellon University
pp. 377
Session 7B: Practical Experience of Evaluation Tools & Methods

Fault Diversity among Off-The-Shelf SQL Database Servers (Abstract)

Lorenzo Strigini , City University, London
Ilir Gashi , City University, London
Peter Popov , City University, London
pp. 389

Does Your Result Checker Really Check? (Abstract)

Lan Guo , West Virginia University, Morgantown, WV
Bojan Cukic , West Virginia University, Morgantown, WV
Supratik Mukhopadhyay , West Virginia University, Morgantown, WV
pp. 399

Experience with Evaluating Human-Assisted Recovery Processes (Abstract)

Leonard Chung , University of California, Berkeley
David A. Patterson , University of California, Berkeley
Calvin Ling , University of California, Berkeley
William Kakes , University of California, Berkeley
Aaron B. Brown , University of California, Berkeley
pp. 405

Automated System Design for Availability (Abstract)

Jose Renato Santos , Hewlett-Packard Laboratories
Yoshio Turner , Hewlett-Packard Laboratories
G. (John) Janakiraman , Hewlett-Packard Laboratories
pp. 411
Session 8A: Intrusion Detection & Intrusion Tolerance

Secure Distributed DNS (Abstract)

Asad Samar , Carnegie Mellon University, Pittsburgh, PA
Christian Cachin , IBM Research, Switzerland
pp. 423

SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments (Abstract)

Navjot Singh , Avaya Labs
Sachin Garg , Avaya Labs
Tim Tsai , Sun Microsystems
Saurabh Bagchi , Purdue University
Yu-Sung Wu , Purdue University
pp. 433

A Qualitative Analysis of the Intrusion-Tolerance Capabilities of the MAFTIA Architecture (Abstract)

Peter Ryan , University of Newcastle upon Tyne, UK
Ian Welch , Victoria University of Wellington, New Zealand
John Warne , University of Newcastle upon Tyne, UK
Robert Stroud , University of Newcastle upon Tyne, UK
pp. 453
Session 8B: Fault-Tolerant Routing

Analyses of the Reverse Path Forwarding Routing Algorithm (Abstract)

Gavin Lowe , Oxford University Computing Laboratory
Christie Bolton , Oxford University Computing Laboratory
pp. 485

Delivering Packets During The Routing Convergence Latency Interval Through Highly Connected Detours (Abstract)

Jaime Cohen , State University of Ponta Grossa, Brazil
Rog?rio Santini , Federal University of Paran?, Brazil
Elias Proc?pio Duarte Jr. , Federal University of Paran?, Brazil
pp. 495
Session 9A: Dissemination and Diffusion

An Adaptive Algorithm for Efficient Message Diffusion in Unreliable Environments (Abstract)

Beno? Garbinato , Universit? de Lausanne, Switzerland
Rodrigo Schmidt , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Switzerland
Fernando Pedone , ?cole Polytechnique F?d?rale de Lausanne (EPFL), Switzerland
pp. 507

Efficient Hierarchic Management For Reconfiguration of Networked Information Systems (Abstract)

Jonathan C. Rowanhill , University of Virginia, Charlottesville
John C. Knight , University of Virginia, Charlottesville
Philip E. Varner , University of Virginia, Charlottesville
pp. 517

Collective Endorsement and the Dissemination Problem in Malicious Environments (Abstract)

Mustaque Ahamad , Georgia Institute of Technology, Atlanta
Deepak J. Manohar , Georgia Institute of Technology, Atlanta
H. Venkateswaran , Georgia Institute of Technology, Atlanta
Subramanian Lakshmanan , Georgia Institute of Technology, Atlanta
pp. 527

Support for Mobility and Fault Tolerance in Mykil (Abstract)

Jyh-How Huang , University of Colorado, Boulder
Shivakant Mishra , University of Colorado, Boulder
pp. 537
Session 9B: Practical Experience in Fault-Tolerance & Real-Time

Implementing Simple Replication Protocols using CORBA Portable Interceptors and Java Serialization (Abstract)

Marc-Olivier Killijian , LAAS-CNRS, France
Eric Marsden , LAAS-CNRS, France
Jean-Charles Fabre , LAAS-CNRS, France
Fran?ois Ta?ani , LAAS-CNRS, France
Laurent Blain , LAAS-CNRS, France
Ludovic Courtes , LAAS-CNRS, France
Taha Bennani , LAAS-CNRS, France
pp. 549

In Advance Activation of Backup Channels for Real-Time Transmission (Abstract)

Enrique Hern?ndez Orallo , Universidad Polit?cnica de Valencia
Joan Vila Carb? , Universidad Polit?cnica de Valencia
pp. 555

Why PCs Are Fragile and What We Can Do About It: A Study of Windows Registry Problems (Abstract)

Yi-Min Wang , Microsoft Research, Redmond, WA
Archana Ganapathi , University of California, Berkeley
Ni Lao , Microsoft Research, Beijing, China
Ji-Rong Wen , Microsoft Research, Beijing, China
pp. 561

Dependable Adaptive Real-Time Applications in Wormhole-based Systems (Abstract)

Pedro Martins , Univ. of Lisboa
Paulo Ver?ssimo , Univ. of Lisboa
Paulo Sousa , Univ. of Lisboa
Ant?nio Casimiro , Univ. of Lisboa
pp. 567
Session 10A: Support for Security & Dependability

High Throughput Byzantine Fault Tolerance (Abstract)

Ramakrishna Kotla , The University of Texas at Austin
Mike Dahlin , The University of Texas at Austin
pp. 575

An Architectural Framework for Providing Reliability and Security Support (Abstract)

J. Xu , North Carolina State University
R. K. Iyer , University of Illinois at Urbana-Champaign
Z. Kalbarczyk , University of Illinois at Urbana-Champaign
N. Nakka , University of Illinois at Urbana-Champaign
pp. 585

Diverse Firewall Design (Abstract)

Mohamed G. Gouda , The University of Texas at Austin
Alex X. Liu , The University of Texas at Austin
pp. 595

Component Middleware to Support Non-repudiable Service Interactions (Abstract)

Paul Robinson , University of Newcastle, UK
Nick Cook , University of Newcastle, UK
Santosh Shrivastava , University of Newcastle, UK
pp. 605
Session 10B: Mobility & Wireless Systems

Customizing Dependability Attributes for Mobile Service Platforms (Abstract)

Matti A. Hiltunen , AT&T Labs-Research, Florham Park, NJ
Jun He , University of Arizona, Tucson
Richard D. Schlichting , AT&T Labs-Research, Florham Park, NJ
pp. 617

Discovering 1-FT Routes in Mobile Ad Hoc Networks (Abstract)

John P. Hayes , University of Michigan, Ann Arbor
Rajesh Venkatasubramanian , University of Michigan, Ann Arbor
pp. 627

Intrusion Tolerance and Anti-Traffic Analysis Strategies For Wireless Sensor Networks (Abstract)

Shivakant Mishra , University of Colorado at Boulder
Jing Deng , University of Colorado at Boulder
Richard Han , University of Colorado at Boulder
pp. 637
Session 1C: Fault Trees & Modelling

Repairable Fault Tree for the Automatic Evaluation of Repair Policies (Abstract)

Valeria Vittorini , Universit? di Napoli "Federico II", Italy
Mauro Iacono , Seconda Universit? di Napoli, Italy
Giuliana Franceschinis , Universit? del Piemonte Orientale, Italy
Daniele Codetta Raiteri , Universit? di Torino, Italy
pp. 659

Availability Measurement and Modeling for An Application Server (Abstract)

Sreeram Duvur , Sun Microsystems, Inc., Santa Clara, CA
Oystein Torbjornsen , Sun Microsystems, Inc., Santa Clara, CA
Dong Tang , Sun Microsystems, Inc., Santa Clara, CA
Dileep Kumar , Sun Microsystems, Inc., Santa Clara, CA
pp. 669
Session 3C: Practical Experience on Dependability and Performance Assessment

Benchmarking The Dependability of Windows NT4, 2000 and XP (Abstract)

Jean Arlat , LAAS-CNRS, France
Ali Kalakech , LAAS-CNRS, France
Yves Crouzet , LAAS-CNRS, France
Karama Kanoun , LAAS-CNRS, France
pp. 681

Checkpointing of Control Structures in Main Memory Database Systems (Abstract)

H. Vora , Mascon IT Ltd., Schaumburg, IL
Z. Kalbarczyk , University of Illinois at Urbana-Champaign
L. Wang , University of Illinois at Urbana-Champaign
R. K. Iyer , University of Illinois at Urbana-Champaign
T. Chahande , Mascon IT Ltd., Schaumburg, IL
pp. 687
Session 5C: Model Checking

Model Checking Action- and State-Labelled Markov Chains (Abstract)

Boudewijn Haverkort , University of Twente
Matthias Kuntz , University of the Federal Armed Forces Munich
Lucia Cloth , University of Twente
Christel Baier , Universit?t Bonn
Markus Siegle , University of the Federal Armed Forces Munich
pp. 701

Model Checking Dependability Attributes of Wireless Group Communication (Abstract)

Mieke Massink , C.N.R.-ISTI, Italy
Diego Latella , C.N.R.-ISTI, Italy
Joost-Pieter Katoen , Univ. of Twente, The Netherlands
pp. 711

Min-Max Checkpoint Placement under Incomplete Failure Information (Abstract)

Hiroyuki Okamura , Hiroshima University
Tadashi Dohi , Hiroshima University
Naoto Kaio , Hiroshima Shudo University
Tatsuya Ozaki , Hiroshima University
pp. 721

Assessing the Impact of Dynamic Power Management on the Functionality and the Performance of Battery-Powered Appliances (Abstract)

E. Bont? , Universit? di Urbino "Carlo Bo", Italy
E. Lattanzi , Universit? di Urbino "Carlo Bo", Italy
A. Bogliolo , Universit? di Urbino "Carlo Bo", Italy
M. Bernardo , Universit? di Urbino "Carlo Bo", Italy
A. Acquaviva , Universit? di Urbino "Carlo Bo", Italy
A. Aldini , Universit? di Urbino "Carlo Bo", Italy
pp. 731
Session 6C: QoS and Performance Evaluation

An SLA-Oriented Capacity Planning Tool for Streaming Media Services (Abstract)

Sharad Singhal , Hewlett-Packard Laboratories, Palo Alto, CA
Wenting Tang , Hewlett-Packard Laboratories, Palo Alto, CA
Ludmila Cherkasova , Hewlett-Packard Laboratories, Palo Alto, CA
pp. 743

QoS of Timeout-Based Self-Tuned Failure Detectors: The Effects of the Communication Delay Predictor and the Safety Margin (Abstract)

Raul Ceretta Nunes , Federal University of Santa Maria, Brazil
Ingrid Jansch-P?rto , Federal University of Rio Grande do Sul, Brazil
pp. 753

Optimal Object State Transfer - Recovery Policies for Fault Tolerant Distributed Systems (Abstract)

Panagiotis Katsaros , Aristotle University of Thessaloniki
Constantine Lazos , Aristotle University of Thessaloniki
pp. 762

Failure Data Analysis of a Large-Scale Heterogeneous Server Environment (Abstract)

Ramendra K. Sahoo , IBM Thomas J. Watson Research Center, Yorktown Heights, NY
Yanyong Zhang , Rutgers University, Piscataway, NJ
Anand Sivasubramaniam , Pennsylvania State University, University Park, PA
Mark S. Squillante , IBM Thomas J. Watson Research Center, Yorktown Heights, NY
pp. 772
Session 7C: Sensor Networks

Evaluating the Impact of Limited Resource on the Performance of Flooding in Wireless Sensor Networks (Abstract)

Rachel Cardell-Oliver , The University of Western Australia
Patrick Downey , The University of Western Australia
pp. 785

Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks (Abstract)

Yu-Sung Wu , Purdue University, West Lafayette, IN
Gunjan Khanna , Purdue University, West Lafayette, IN
Saurabh Bagchi , Purdue University, West Lafayette, IN
pp. 795

Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications (Abstract)

Kam S. Tso , IA Tech, Inc., Los Angeles, CA
William H. Sanders , University of Illinois, Urbana, IL
Ann T. Tai , IA Tech, Inc., Los Angeles, CA
pp. 805
Session 8C: Evaluation Theory

A Markov Reward Model for Reliable Synchronous Dataflow System Design (Abstract)

John Lach , University of Virginia
Vinu Vijay Kumar , University of Virginia
Joanne Bechta Dugan , University of Virginia
Rashi Verma , University of Virginia
pp. 817

A Method for Performance Analysis of Earliest-Deadline-First Scheduling Policy (Abstract)

Ali Movaghar , Sharif University of Technology and School of Computer Science, IPM, Tehran, Iran
Mehdi Kargahi , Sharif University of Technology and School of Computer Science, IPM, Tehran, Iran
pp. 826

An Efficient Algorithm for the Transient Analysis of a Class of Deterministic Stochastic Petri Nets (Abstract)

M. Gribaudo , Universit? di Torino, Italia
M. Sereno , Universit? di Torino, Italia
pp. 835

Analysis of Second-Order Markov Reward Models (Abstract)

M. Telek , Technical University of Budapest, Hungary
S. R?cz , Technical University of Budapest, Hungary
G. Horv?th , Technical University of Budapest, Hungary
pp. 845
Session 9C: Dependability Benchmarking

On Benchmarking the Dependability of Automotive Engine Control Applications (Abstract)

Pedro Gil , Technical University of Valencia (UPV), Valencia, Spain
Juan-Carlos Ruiz , Technical University of Valencia (UPV), Valencia, Spain
Pedro Yuste , Technical University of Valencia (UPV), Valencia, Spain
Lenin Lemus , Technical University of Valencia (UPV), Valencia, Spain
pp. 857

A Framework for Evaluating Storage System Dependability (Abstract)

Kimberly Keeton , HP Labs, Palo Alto, CA
Arif Merchant , HP Labs, Palo Alto, CA
pp. 877

Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors (Abstract)

Weining Gu , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
pp. 887
Special Tracks

DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks (PDF)

Douglas M. Blough , Georgia Institute of Technology, USA
Saurabh Bagchi , Purdue University, USA
Paolo Santi , IIT-CNR, Italy
Nitin Vaidya , University of Illinois, USA
pp. 900

Twin Workshops on Architecting Dependable Systems (WADS 2004) (PDF)

Cristina Gacek , University of Newcastle, UK
Alexander Romanovsky , University of Newcastle, UK
Rog?rio de Lemos , University of Kent, Canterbury, UK
pp. 901

Workshop on Fault Diagnosis and Tolerance in Cryptography (PDF)

Israel Koren , University of Massachusetts, Amherst
Luca Breveglieri , Politecnico di Milano, Italy
pp. 902

Student Forum (PDF)

Susanna Donatelli , University of Turin, Italy
pp. 904

Fast Abstracts (PDF)

Felicita Di Giandomenico , ISTI - CNR, Italy
pp. 905

Author Index (PDF)

pp. 907
90 ms
(Ver )