The Community for Technology Leaders
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2010)
Chicago, IL, USA
June 28, 2010 to July 1, 2010
ISBN: 978-1-4244-7500-1
TABLE OF CONTENTS
Papers

Message from the general chair and conference coordinator (PDF)

David Taylor , University of Waterloo, Canada
Fernam Jahanian , University of Michigan, USA
pp. iii

“Distributed computing theory through the ages” (PDF)

Nancy Lynch , EECS Department, Massachusetts Institute of Technology, USA
pp. xviii

William C. Carter Award paper (PDF)

Basel Alomair , University of Washington, USA
pp. xix

Author index (PDF)

pp. xlv-xlvi

Scalable RFID systems: a privacy-preserving protocol with constant-time identification (Abstract)

Radha Poovendran , Network Security Lab (NSL), University of Washington, Seattle, USA
Basel Alomair , Network Security Lab (NSL), University of Washington, Seattle, USA
Andrew Clark , Network Security Lab (NSL), University of Washington, Seattle, USA
Jorge Cuellar , Siemens Corporate Technology, München, Germany
pp. 1-10

Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring (Abstract)

Utpal Paul , Computer Science Department, Stony Brook University, NY 11794-4400, USA
Samir R. Das , Computer Science Department, Stony Brook University, NY 11794-4400, USA
Ritesh Maheshwari , Akamai Technologies, 8 Cambridge Center, MA 02142, USA
pp. 11-20

Detecting Sybil nodes in wireless networks with physical layer network coding (Abstract)

Alex Wyglinski , Department of ECE, Worcester Polytechnic Institute, MA 01609, USA
Weichao Wang , Department of SIS, Univ. North Carolina Charlotte, 28223, USA
Di Pu , Department of ECE, Worcester Polytechnic Institute, MA 01609, USA
pp. 21-30

Observable non-Sybil quorums construction in one-hop wireless ad hoc networks (Abstract)

Luis Rodrigues , INESC-ID/IST, Portugal
Carlos Ribeiro , INESC-ID/IST, Portugal
Joao Leitao , INESC-ID/IST, Portugal
Diogo Monica , INESC-ID/IST, Portugal
pp. 31-40

Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes (Abstract)

Zhen Wang , Reliable Computing Laboratory, Boston University, 8 Saint Mary's Street, MA, USA
Ajay Joshi , Reliable Computing Laboratory, Boston University, 8 Saint Mary's Street, MA, USA
Mark Karpovsky , Reliable Computing Laboratory, Boston University, 8 Saint Mary's Street, MA, USA
pp. 41-50

Code-M: A non-MDS erasure code scheme to support fast recovery from up to two-disk failures in storage systems (Abstract)

Shenggang Wan , School of Computer Sci. and Tech., Huazhong University of Sci. and Tech., Wuhan 430074, China
Changsheng Xie , School of Computer Sci. and Tech., Huazhong University of Sci. and Tech., Wuhan 430074, China
Qiang Cao , School of Computer Sci. and Tech., Huazhong University of Sci. and Tech., Wuhan 430074, China
Ben Eckart , Dept. of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, 38505, USA
Xubin He , Dept. of Electrical and Computer Engineering, Tennessee Technological University, Cookeville, 38505, USA
pp. 51-60

Decoding STAR code for tolerating simultaneous disk failure and silent errors (Abstract)

Cheng Huang , Microsoft Research, Redmond, WA 98052, USA
Lihao Xu , Wayne State University, Detroit, MI 48202, USA
Jianqiang Luo , Wayne State University, Detroit, MI 48202, USA
pp. 61-70

Diverse Partial Memory Replication (Abstract)

William H. Sanders , University of Illinois at Urbana-Champaign, 61801, USA
Ryan M. Lefever , University of Illinois at Urbana-Champaign, 61801, USA
Vikram S. Adve , University of Illinois at Urbana-Champaign, 61801, USA
pp. 71-80

Data recovery for web applications (Abstract)

Istemi Ekin Akkus , University of Toronto, Canada
Ashvin Goel , University of Toronto, Canada
pp. 81-90

Programming support and adaptive checkpointing for high-throughput data services with log-based recovery (Abstract)

Jingyu Zhou , Computer Science Department, Shanghai Jiao Tong University, China
Caijie Zhang , Google Inc., Mountain View, CA 94043, USA
Hong Tang , Yahoo Inc., Sunnyvale, CA 94089, USA
Jiesheng Wu , Microsoft, Redmond, WA 98052, USA
Tao Yang , University of California, Santa Barbara, 93106, USA
pp. 91-100

StageWeb: Interweaving pipeline stages into a wearout and variation tolerant CMP fabric (Abstract)

Shantanu Gupta , Advanced Computer Architecture Laboratory, University of Michigan - Ann Arbor, USA
Shuguang Feng , Advanced Computer Architecture Laboratory, University of Michigan - Ann Arbor, USA
Amin Ansari , Advanced Computer Architecture Laboratory, University of Michigan - Ann Arbor, USA
Scott Mahlke , Advanced Computer Architecture Laboratory, University of Michigan - Ann Arbor, USA
pp. 101-110

Architecting reliable multi-core network-on-chip for small scale processing technology (Abstract)

Xin Fu , CS Department, University of Illinois at Urbana-Champaign, USA
Tao Li , ECE Department, University of Florida, USA
Jose A. B. Fortes , ECE Department, University of Florida, USA
pp. 111-120

Energy-efficient fault tolerance in chip multiprocessors using Critical Value Forwarding (Abstract)

Kewal K. Saluja , University of Wisconsin-Madison, USA
Virendra Singh , Indian Institute of Science, Bangalore, India
Erik Larsson , Linköping University, Sweden
Pramod Subramanyan , Indian Institute of Science, Bangalore, India
pp. 121-130

A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems design (Abstract)

Seyed Nematollah Ahmadian , Sharif University of Technology, Department of Computer Engineering, Tehran, IRAN
Mahdi Fazeli , Sharif University of Technology, Department of Computer Engineering, Tehran, IRAN
Seyed Ghassem Miremadi , Sharif University of Technology, Department of Computer Engineering, Tehran, IRAN
Hossein Asadi , Sharif University of Technology, Department of Computer Engineering, Tehran, IRAN
pp. 131-140

Bit-slice logic interleaving for spatial multi-bit soft-error tolerance (Abstract)

Nishant J. George , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
John Lach , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
Barry W. Johnson , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
Carl R. Elks , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
pp. 141-150

WearMon: Reliability monitoring using adaptive critical path testing (Abstract)

Bardia Zandian , Electrical Engineering Department, University of Southern California, USA
Waleed Dweik , Electrical Engineering Department, University of Southern California, USA
Murali Annavaram , Electrical Engineering Department, University of Southern California, USA
Thomas Punihaole , Electrical Engineering Department, University of Southern California, USA
Suk Hun Kang , Electrical Engineering Department, University of Southern California, USA
pp. 151-160

A numerical optimization-based methodology for application robustification: Transforming applications for error tolerance (Abstract)

David Kesler , University of Illinois, Urbana-Champaign, USA
Rakesh Kumar , University of Illinois, Urbana-Champaign, USA
Joseph Sloan , University of Illinois, Urbana-Champaign, USA
Ali Rahimi , Intel Labs, Berkeley, USA
pp. 161-170

Blue Banana: resilience to avatar mobility in distributed MMOGs (Abstract)

Sebastien Monnet , LIP6/UPMC/CNRS/INRIA, 104 av. du Président Kennedy, 75016 Paris - France
Sergey Legtchenko , LIP6/UPMC/CNRS/INRIA, 104 av. du Président Kennedy, 75016 Paris - France
Gael Thomas , LIP6/UPMC/CNRS/INRIA, 104 av. du Président Kennedy, 75016 Paris - France
pp. 171-180

Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive (Abstract)

Arif Merchant , Hewlett-Packard Laboratories, USA
Joseph Tucek , Hewlett-Packard Laboratories, USA
Jay J. Wylie , Hewlett-Packard Laboratories, USA
Eric Anderson , Hewlett-Packard Laboratories, USA
Kevin Smathers , Hewlett-Packard Laboratories, USA
Mehul A. Shah , Hewlett-Packard Laboratories, USA
Xiaozhou Li , Hewlett-Packard Laboratories, USA
Mustafa Uysal , Hewlett-Packard Laboratories, USA
pp. 181-190

Using correlated surprise to infer shared influence (Abstract)

Adam J. Oliner , Stanford University, Department of Computer Science, USA
Alex Aiken , Stanford University, Department of Computer Science, USA
Ashutosh V. Kulkarni , Stanford University, Department of Computer Science, USA
pp. 191-200

Keystroke biometrics with number-pad input (Abstract)

Kevin S. Killourhy , Dependable Systems Laboratory, Computer Science Department, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213 / USA
Roy A. Maxion , Dependable Systems Laboratory, Computer Science Department, Carnegie Mellon University, Pittsburgh, Pennsylvania 15213 / USA
pp. 201-210

Using Bayesian networks for cyber security analysis (Abstract)

Peng Xie , Intelligent Automation Inc. Rockville, MD, USA
Jason H Li , Intelligent Automation Inc. Rockville, MD, USA
Xinming Ou , Kansas State University, Manhattan, USA
Renato Levy , Intelligent Automation Inc. Rockville, MD, USA
Peng Liu , Penn State University, University Park, USA
pp. 211-220

A study of the internal and external effects of concurrency bugs (Abstract)

Pedro Fonseca , Max Planck Institute for Software Systems (MPI-SWS), Germany
Vishal Singhal , Max Planck Institute for Software Systems (MPI-SWS), Germany
Cheng Li , Max Planck Institute for Software Systems (MPI-SWS), Germany
Rodrigo Rodrigues , Max Planck Institute for Software Systems (MPI-SWS), Germany
pp. 221-230

AutomaDeD: Automata-based debugging for dissimilar parallel tasks (Abstract)

Dong H. Ahn , Lawrence Livermore National Laboratory, USA
Greg Bronevetsky , Lawrence Livermore National Laboratory, USA
Saurabh Bagchi , Purdue University, USA
Bronis R. de Supinski , Lawrence Livermore National Laboratory, USA
Ignacio Laguna , Purdue University, USA
Martin Schulz , Lawrence Livermore National Laboratory, USA
pp. 231-240

Detecting vulnerabilities in C programs using trace-based testing (Abstract)

Dazhi Zhang , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
Christoph Csallner , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
Wenhua Wang , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
Yu Lei , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
Donggang Liu , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
David Kung , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
pp. 241-250

Mash-IF: Practical information-flow control within client-side mashups (Abstract)

Kehuan Zhang , Indiana University at Bloomington, USA
Zhou Li , Indiana University at Bloomington, USA
XiaoFeng Wang , Indiana University at Bloomington, USA
pp. 251-260

DataGuard: Dynamic data attestation in wireless sensor networks (Abstract)

Dazhi Zhang , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
Donggang Liu , Department of Computer Science and Engineering, The University of Texas at Arlington, USA
pp. 261-270

iProve: A scalable technique for consumer-verifiable software guarantees (Abstract)

George Candea , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
Silviu Andrica , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
Horatiu Jula , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
pp. 271-280

Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction (Abstract)

Zhiqiang Lin , Department of Computer Science and CERIAS, Purdue University, USA
Xiangyu Zhang , Department of Computer Science and CERIAS, Purdue University, USA
Dongyan Xu , Department of Computer Science and CERIAS, Purdue University, USA
pp. 281-290

Detection of botnets using combined host- and network-level information (Abstract)

Yuanyuan Zeng , Univ. of Michigan, Ann Arbor, MI, USA
Xin Hu , Univ. of Michigan, Ann Arbor, MI, USA
K G Shin , Univ. of Michigan, Ann Arbor, MI, USA
pp. 291-300
Papers

Why software hangs and what can be done with it (Abstract)

Binyu Zang , Parallel Processing Institute, Fudan University, China
Xiang Song , Parallel Processing Institute, Fudan University, China
Haibo Chen , Parallel Processing Institute, Fudan University, China
pp. 311-316

Finding stable cliques of PlanetLab nodes (Abstract)

Alexandre P. Zuge , Federal University of Paraná - Dept. Informatics - P.O. Box 19018 Curitiba PR 81531-980 Brazil
Renato Carmo , Federal University of Paraná - Dept. Informatics - P.O. Box 19018 Curitiba PR 81531-980 Brazil
Luis C. E. Bona , Federal University of Paraná - Dept. Informatics - P.O. Box 19018 Curitiba PR 81531-980 Brazil
Elias P. Duarte , Federal University of Paraná - Dept. Informatics - P.O. Box 19018 Curitiba PR 81531-980 Brazil
Thiago Garrett , Federal University of Paraná - Dept. Informatics - P.O. Box 19018 Curitiba PR 81531-980 Brazil
pp. 317-322

Who is peeping at your passwords at Starbucks? — To catch an evil twin access point (Abstract)

Yimin Song , Texas A&M University, USA
Chao Yang , Texas A&M University, USA
Guofei Gu , Texas A&M University, USA
pp. 323-332

Improving privacy and lifetime of PCM-based main memory (Abstract)

Jingfei Kong , School of Computer Science, University of Central Florida, USA
Huiyang Zhou , Dept of Electrical and Computer Engineering, North Carolina State University, USA
pp. 333-342

Generic construction of consensus algorithms for benign and Byzantine faults (Abstract)

Olivier Rutti , Ecole Polytechnique Fédérale de Lausanne (EPFL), 1015, Switzerland
Zarko Milosevic , Ecole Polytechnique Fédérale de Lausanne (EPFL), 1015, Switzerland
Andre Schiper , Ecole Polytechnique Fédérale de Lausanne (EPFL), 1015, Switzerland
pp. 343-352

Scrooge: Reducing the costs of fast Byzantine replication in presence of unresponsive replicas (Abstract)

Neeraj Suri , Dept. of CS, TU Darmstadt, Germany
Matthias Majuntke , Dept. of CS, TU Darmstadt, Germany
Peter Bokor , Dept. of CS, TU Darmstadt, Germany
Marco Serafini , Dept. of CS, TU Darmstadt, Germany
Dan Dobre , Dept. of CS, TU Darmstadt, Germany
pp. 353-362

Zzyzx: Scalable fault tolerance through Byzantine locking (Abstract)

Michael K. Reiter , University of North Carolina at Chapel Hill, USA
James Hendricks , Carnegie Mellon University, USA
Gregory R. Ganger , Carnegie Mellon University, USA
Shafeeq Sinnamohideen , Carnegie Mellon University, USA
pp. 363-372

Doubly-expedited one-step Byzantine consensus (Abstract)

Nazreen Banu , Graduate school of Engineering, Nagoya Institute of Technology, Gokisho-cho, Showa-ku, Aichi, 466-8555, Japan
Koichi Wada , Graduate school of Engineering, Nagoya Institute of Technology, Gokisho-cho, Showa-ku, Aichi, 466-8555, Japan
Taisuke Izumi , Graduate school of Engineering, Nagoya Institute of Technology, Gokisho-cho, Showa-ku, Aichi, 466-8555, Japan
pp. 373-382

A passive approach to wireless device fingerprinting (Abstract)

Ke Gao , Department of Computer Science, Georgia State University, Atlanta, 30303, USA
Cherita Corbett , Department of Computer Science, University of California, Davis, 95616, USA
Raheem Beyah , Department of Computer Science, Georgia State University, Atlanta, 30303, USA
pp. 383-392

Exploiting diverse observation perspectives to get insights on the malware landscape (Abstract)

Engin Kirda , Institute Eurecom, Sophia Antipolis, France
Corrado Leita , Symantec Research Labs, Sophia Antipolis, France
Ulrich Bayer , Technical University Vienna, Austria
pp. 393-402

Combined performance and risk analysis for border management applications (Abstract)

Mayra Sacanamboy , Lane Department of CSEE, West Virginia University, US
Bojan Cukic , Lane Department of CSEE, West Virginia University, US
pp. 403-412

Experimental validation of a fault tolerant microcomputer system against intermittent faults (Abstract)

J.C. Baraza , Grupo de Sistemas Tolerantes a Fallos (GSTF) - Instituto ITACA, Universidad Politécnica de Valencia, Spain
L.J. Saiz-Adalid , Grupo de Sistemas Tolerantes a Fallos (GSTF) - Instituto ITACA, Universidad Politécnica de Valencia, Spain
J. Gracia-Moran , Grupo de Sistemas Tolerantes a Fallos (GSTF) - Instituto ITACA, Universidad Politécnica de Valencia, Spain
D. Gil-Tomas , Grupo de Sistemas Tolerantes a Fallos (GSTF) - Instituto ITACA, Universidad Politécnica de Valencia, Spain
P.J. Gil-Vicente , Grupo de Sistemas Tolerantes a Fallos (GSTF) - Instituto ITACA, Universidad Politécnica de Valencia, Spain
pp. 413-418

Evaluating repair strategies for a water-treatment facility using Arcade (Abstract)

A. Remke , University of Twente, NL
S. Roolvink , University of Twente, NL
B.R. Haverkort , University of Twente, NL
M. Kuntz , University of Konstanz, D
M.I.A. Stoelinga , University of Twente, NL
pp. 419-424

Application of a fault injection based dependability assessment process to a commercial safety critical nuclear reactor protection system (Abstract)

Marko Miklo , University of Virginia, Department of Electrical and Computer Engineering, Charlottesville, 22904, China
Scott Bingham , University of Virginia, Department of Electrical and Computer Engineering, Charlottesville, 22904, China
Michael Waterman , US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, Rockville, MD, 20555, USA
Ron Williams , University of Virginia, Department of Electrical and Computer Engineering, Charlottesville, 22904, China
Carl R. Elks , University of Virginia, Department of Electrical and Computer Engineering, Charlottesville, 22904, China
Barry W. Johnson , University of Virginia, Department of Electrical and Computer Engineering, Charlottesville, 22904, China
Jeanne Dion , US Nuclear Regulatory Commission, Office of Nuclear Regulatory Research, Rockville, MD, 20555, USA
Nishant George , University of Virginia, Department of Electrical and Computer Engineering, Charlottesville, 22904, China
Michael Reynolds , University of Virginia, Department of Electrical and Computer Engineering, Charlottesville, 22904, China
pp. 425-430

Measurement-based analysis of fault and error sensitivities of dynamic memory (Abstract)

Zbigniew Kalbarczyk , Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 61801, USA
Ravishankar K. Iyer , Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 61801, USA
Keun Soo Yim , Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 61801, USA
pp. 431-436

Representativeness analysis of injected software faults in complex software (Abstract)

Joao Duraes , CISUC, University of Coimbra, 3030-290, Portugal
Domenico Cotroneo , DIS, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
Roberto Natella , DIS, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
Henrique Madeira , CISUC, University of Coimbra, 3030-290, Portugal
pp. 437-446

An empirical investigation of fault types in space mission system software (Abstract)

Michael Grottke , University of Erlangen-Nuremberg, Germany
Kishor S. Trivedi , Duke University, USA
Allen P. Nikora , Jet Propulsion Laboratory, California Institute of Technology, USA
pp. 447-456

Assessing and improving the effectiveness of logs for the analysis of software faults (Abstract)

Domenico Cotroneo , Dipartimento di Informatica e Sistemistica, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
Antonio Pecchia , Dipartimento di Informatica e Sistemistica, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
Marcello Cinque , Dipartimento di Informatica e Sistemistica, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
Roberto Natella , Dipartimento di Informatica e Sistemistica, Università degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
pp. 457-466

Statistical guarantees of performance for MIMO designs (Abstract)

Shobha Vasudevan , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Jayanand Asok Kumar , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
pp. 467-476

Transient fault models and AVF estimation revisited (Abstract)

Nishant J. George , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
John Lach , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
Carl R. Elks , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
Barry W. Johnson , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, 351 McCormick Rd., Charlottesville, 22904, USA
pp. 477-486

A unified model for timing speculation: Evaluating the impact of technology scaling, CMOS design style, and fault recovery mechanism (Abstract)

Marc de Kruijf , Vertical Research Group, University of Wisconsin - Madison, USA
Karthikeyan Sankaralingam , Vertical Research Group, University of Wisconsin - Madison, USA
Shuou Nomura , Vertical Research Group, University of Wisconsin - Madison, USA
pp. 487-496

Performance and availability aware regeneration for cloud based multitier applications (Abstract)

Calton Pu , College of Computing, Georgia Institute of Technology, Atlanta, USA
Gueyoung Jung , College of Computing, Georgia Institute of Technology, Atlanta, USA
Kaustubh R. Joshi , AT&T Labs Research, 180 Park Ave., Florham Park, NJ, USA
Matti A. Hiltunen , AT&T Labs Research, 180 Park Ave., Florham Park, NJ, USA
Richard D. Schlichting , AT&T Labs Research, 180 Park Ave., Florham Park, NJ, USA
pp. 497-506

Adaptive on-line software aging prediction based on machine learning (Abstract)

Javier Alonso , Barcelona Supercomputing Center, Dept. of Computer Architecture, Technical University of Catalonia, Spain
Ricard Gavalda , Dept. of Software, Technical University of Catalonia, Spain
Josep Ll. Berral , Dept. of Software, Technical University of Catalonia, Spain
Jordi Torres , Barcelona Supercomputing Center, Dept. of Computer Architecture, Technical University of Catalonia, Spain
pp. 507-516

Correlating failures with asynchronous changes for root cause analysis in enterprise environments (Abstract)

Manoj K Agarwal , IBM India Research Lab, Institutional Area, Vasant Kunj, New Delhi - 110 070, India
Venkateswara R Madduri , IBM India Research Lab, Institutional Area, Vasant Kunj, New Delhi - 110 070, India
pp. 517-526

Ring Paxos: A high-throughput atomic broadcast protocol (Abstract)

Marco Primi , University of Lugano, Switzerland
Parisa Jalili Marandi , University of Lugano, Switzerland
Fernando Pedone , University of Lugano, Switzerland
Nicolas Schiper , University of Lugano, Switzerland
pp. 527-536

Turquois: Byzantine consensus in wireless ad hoc networks (Abstract)

Miguel Correia , University of Lisboa, Portugal
Henrique Moniz , University of Lisboa, Portugal
Nuno Ferreira Neves , University of Lisboa, Portugal
pp. 537-546

Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation (Abstract)

Ann T. Tai , IA Tech, Inc., Los Angeles, CA 90094, USA
Kam S. Tso , IA Tech, Inc., Los Angeles, CA 90094, USA
William H. Sanders , University of Illinois, Urbana, 61801, USA
pp. 547-556

GOOFI-2: A tool for experimental dependability assessment (Abstract)

Raul Barbosa , Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden
Daniel Skarin , Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden
Johan Karlsson , Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Göteborg, Sweden
pp. 557-562
Papers

Experiences with a CANoe-based fault injection framework for AUTOSAR (Abstract)

Patrick E. Lanigan , ECE Department, Carnegie Mellon University, Pittsburgh, PA 15213, USA
Priya Narasimhan , ECE Department, Carnegie Mellon University, Pittsburgh, PA 15213, USA
Thomas E. Fuhrman , General Motors Research & Development, Warren, MI 48090, USA
pp. 569-574

Empirical characterization of uncongested optical lambda networks and 10GbE commodity endpoints (Abstract)

Ken Birman , Computer Science Department, Cornell University, Ithaca, NY 14850, USA
Tudor Marian , Computer Science Department, Cornell University, Ithaca, NY 14850, USA
Daniel A. Freedman , Computer Science Department, Cornell University, Ithaca, NY 14850, USA
Hakim Weatherspoon , Computer Science Department, Cornell University, Ithaca, NY 14850, USA
pp. 575-584

On/off process modeling of IP network failures (Abstract)

Pirkko Kuusela , VTT, Technical Research Center of Finland, P.O.Box 1000, FI-020044 VTT, Finland
Ilkka Norros , VTT, Technical Research Center of Finland, P.O.Box 1000, FI-020044 VTT, Finland
pp. 585-594

An automated technique to support the verification and validation of simulation models (Abstract)

Peter Kemper , College of William and Mary, Department of Computer Science, Williamsburg, VA 23187, USA
Samuel K. Klock , College of William and Mary, Department of Computer Science, Williamsburg, VA 23187, USA
pp. 595-604

Model checking CSL<sup>TA</sup> with Deterministic and Stochastic Petri Nets (Abstract)

Elvio Gilberto Amparore , Dipartimento di Informatica, Università di Torino, Italy
Susanna Donatelli , Dipartimento di Informatica, Università di Torino, Italy
pp. 605-614

1<sup>st</sup> workshop on fault-tolerance for HPC at extreme scale FTXS 2010 (PDF)

John Daly , Center for Exceptional Computing / Department of Defense, USA
Nathan DeBardeleben , Center for Exceptional Computing / Department of Defense, USA
pp. 615

Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM) (PDF)

Miroslaw Malek , Humboldt-Universität zu Berlin, Germany
Kishor S. Trivedi , Duke University, Durham, USA
Felix Salfner , Humboldt-Universität zu Berlin, Germany
pp. 616-618

Fourth workshop on dependable and secure nanocomputing (PDF)

Johan Karlsson , Dept. Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg - Sweden
Jean Arlat , LAAS-CNRS and Université de Toulouse, 7, Av. du Colonel Roche 31077, France
Ravishankar K. Iyer , Coordinated Science Laboratory, UIUC, 1308 West Main Street, Urbana, IL 61801 - USA
Michael Nicolaidis , TIMA (CNRS, Grenoble INP, UJF), 46, Av. Felix Viallet, 38031, France
Cristian Constantinescu , AMD, 2950 E Harmony Rd., Fort Collins, CO 80528 - USA
pp. 619-620

4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010 (PDF)

Miguel Correia , University of Lisboa, Portugal
Patha Pal , BBN Technologies, USA
pp. 621-622
106 ms
(Ver )