The Community for Technology Leaders
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2011)
Hong Kong, China
June 27, 2011 to June 30, 2011
ISBN: 978-1-4244-9232-9
TABLE OF CONTENTS
Papers

Sponsors (PDF)

pp. 1

Message from the DCCS program chair (PDF)

Saurabh Bagchi , Purdue University, USA
pp. iv

Message from the PDS program chair (PDF)

Susanna Donatelli , University of Torino, Italy
pp. v

Keynote: "Dependable computing in banking and finance industry" (PDF)

Michael Leung , China Construction Bank (Asia), China
pp. xvi-xvii

Keynote: "Reliability and security of nano technologies" (PDF)

Way Kuo , City University of Hong Kong, China
pp. xviii
Papers

PDS 2011 sessions (PDF)

pp. xxx-xxxix

DSN 2011 workshops (PDF)

pp. xl-xli

Author index (PDF)

pp. xlii-xliii

Uni-directional trusted path: Transaction confirmation on just one device (Abstract)

Jonathan M. McCuney , CyLab, Carnegie Mellon University, USA
Marcel Winandy , Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany
Ahmad-Reza Sadeghiz , Center for Advanced Security Research Darmstadt / Technical University Darmstadt, Germany
Atanas Filyanov , Horst Görtz Institute for IT-Security, Ruhr-University Bochum, Germany
pp. 1-12

Boundless memory allocations for memory safety and high availability (Abstract)

Marc Brunink , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Christof Fetzer , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Martin Susskraut , Technische Universität Dresden, Department of Computer Science; 01062; Germany
pp. 13-24

A methodology for the generation of efficient error detection mechanisms (Abstract)

Saima Arif , Department of Computer Science, University of Warwick Coventry, UK, CV4 7AL
Matthew Leeke , Department of Computer Science, University of Warwick Coventry, UK, CV4 7AL
Arshad Jhumka , Department of Computer Science, University of Warwick Coventry, UK, CV4 7AL
Sarabjot Singh Anand , Department of Computer Science, University of Warwick Coventry, UK, CV4 7AL
pp. 25-36

Fault tolerant WSN-based structural health monitoring (Abstract)

H. Wu , Dept. of Computer Science, Sun Yat-sen Univ., GuangZhou, China
Md. Bhuiyan , Dept. of Computing, The Hong Kong Polytechnic Univ., China
G. Wang , School of Information Science and Engineering, Central South Univ., Changsha, China
J. Cao , Dept. of Computing, The Hong Kong Polytechnic Univ., China
S. Lai , Dept. of Computing, The Hong Kong Polytechnic Univ., China
X. Liu , Dept. of Computing, The Hong Kong Polytechnic Univ., China
pp. 37-48

Online detection of multi-component interactions in production systems (Abstract)

Adam J. Oliner , Department of Computer Science, Stanford University, USA
Alex Aiken , Department of Computer Science, Stanford University, USA
pp. 49-60

An empirical study of the performance, security and privacy implications of domain name prefetching (Abstract)

Srinivas Krishnan , Department of Computer Science, University of North Carolina at Chapel Hill, 27599, USA
Fabian Monrose , Department of Computer Science, University of North Carolina at Chapel Hill, 27599, USA
pp. 61-72

Efficient model checking of fault-tolerant distributed protocols (Abstract)

Marco Serafini , Yahoo! Research, Barcelona, Spain
Johannes Kinder , Technische Universität Darmstadt, Germany
Neeraj Suri , Technische Universität Darmstadt, Germany
Peter Bokor , Technische Universität Darmstadt, Germany
pp. 73-84

Unified debugging of distributed systems with Recon (Abstract)

Xiangyu Zhang , Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
Nick Sumner , Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
Patrick Eugster , Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
Kyu Hyung Lee , Department of Computer Science, Purdue University, West Lafayette, IN 47907, USA
pp. 85-96

Improving Log-based Field Failure Data Analysis of multi-node computing systems (Abstract)

Antonio Pecchia , Dipartimento di Informatica e Sistemistica, Universitè degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
Domenico Cotroneo , Dipartimento di Informatica e Sistemistica, Universitè degli Studi di Napoli Federico II, Via Claudio 21, 80125, Naples, Italy
Zbigniew Kalbarczyk , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Ravishankar K. Iyer , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
pp. 97-108

An analysis of signature overlaps in Intrusion Detection Systems (Abstract)

Yvan Labiche , Software Quality Engineering Laboratory, Department of Systems and Computer Engineering, Carleton University, Ottawa, Canada
Frederic Massicotte , Communications Research Centre Canada, Ottawa, Canada
pp. 109-120

Detecting stealthy P2P botnets using statistical traffic fingerprints (Abstract)

Wenke Lee , Georgia Institute of Technology, USA
Unum Sarfraz , Georgia Institute of Technology, USA
Junjie Zhang , Georgia Institute of Technology, USA
Xiapu Luo , Hong Kong Polytechnic University, Hong Kong
Roberto Perdisci , University of Georgia, USA
pp. 121-132

Applying game theory to analyze attacks and defenses in virtual coordinate systems (Abstract)

Radu Statey , University of Luxembourg, 6 rue Coudenhove-Kalergi, L-1359 Luxemburg, France
David Zage , Purdue University, West Lafayette, IN 47906, USA
Jeff Seibert , Purdue University, West Lafayette, IN 47906, USA
Cristina Nita-Rotaru , Purdue University, West Lafayette, IN 47906, USA
Sheila Beckery , University of Luxembourg, 6 rue Coudenhove-Kalergi, L-1359 Luxemburg, France
pp. 133-144

CEC: Continuous eventual checkpointing for data stream processing operators (Abstract)

Kostas Magoutis , Institute of Computer Science (ICS), Foundation for Research and Technology - Hellas (FORTH), Heraklion GR-70013, Crete, Greece
Zoe Sebepou , Institute of Computer Science (ICS), Foundation for Research and Technology - Hellas (FORTH), Heraklion GR-70013, Crete, Greece
pp. 145-156

Coercing clients into facilitating failover for object delivery (Abstract)

Michael J. Freedman , Princeton University, USA
Wyatt Lloyd , Princeton University, USA
pp. 157-168

Phase-based reboot: Reusing operating system execution phases for cheap reboot-based recovery (Abstract)

Kazuya Yamakita , Keio University, 3-14-1 Hiyoshi, Kohoku-ku, Yokohama, Japan
Kenji Kono , Keio University, JST CREST, 3-14-1 Hiyoshi, Kohoku-ku, Yokohama, Japan
Hiroshi Yamada , Keio University, JST CREST, 3-14-1 Hiyoshi, Kohoku-ku, Yokohama, Japan
pp. 169-180

Communix: A framework for collaborative deadlock immunity (Abstract)

Pinar Tozun , École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
George Candea , École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
Horatiu Jula , École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
pp. 181-188

CloudVal: A framework for validation of virtualization environment in cloud infrastructure (Abstract)

Daniel Chen , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Ravishankar K. Iyer , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Cuong Pham , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
Zbigniew Kalbarczyk , Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, 1308 W. Main Street, 61801, USA
pp. 189-196

Helmet: A resistance drift resilient architecture for multi-level cell phase change memory system (Abstract)

Wangyuan Zhang , Intelligent Design of Efficient Architectures Laboratory (IDEAL), Department of Electrical and Computer Engineering, University of Florida, USA
Tao Li , Intelligent Design of Efficient Architectures Laboratory (IDEAL), Department of Electrical and Computer Engineering, University of Florida, USA
pp. 197-208

HDP code: A Horizontal-Diagonal Parity Code to Optimize I/O load balancing in RAID-6 (Abstract)

Shenggang Wan , Wuhan National Laboratory for Optoelectronics, Huazhong University of Science & Technology, China 430074
Xubin He , Department of Electrical & Computer Engineering, Virginia Commonwealth University, Richmond, VA 23284, USA
Chentao Wu , Department of Electrical & Computer Engineering, Virginia Commonwealth University, Richmond, VA 23284, USA
Changsheng Xie , Wuhan National Laboratory for Optoelectronics, Huazhong University of Science & Technology, China 430074
Xiaohua Liu , Wuhan National Laboratory for Optoelectronics, Huazhong University of Science & Technology, China 430074
Guanying Wu , Department of Electrical & Computer Engineering, Virginia Commonwealth University, Richmond, VA 23284, USA
Qiang Cao , Wuhan National Laboratory for Optoelectronics, Huazhong University of Science & Technology, China 430074
pp. 209-220

LLS: Cooperative integration of wear-leveling and salvaging for PCM main memory (Abstract)

Lei Jiang , Electrical and Computer Engineering Department, University of Pittsburgh, PA 15261, USA
Yu Du , Computer Science Department, University of Pittsburgh, PA 15260, USA
Youtao Zhang , Computer Science Department, University of Pittsburgh, PA 15260, USA
Jun Yang , Electrical and Computer Engineering Department, University of Pittsburgh, PA 15261, USA
Bruce R. Childers , Computer Science Department, University of Pittsburgh, PA 15260, USA
pp. 221-232

Get off my prefix! the need for dynamic, gerontocratic policies in inter-domain routing (Abstract)

Edmund L. Wong , Department of Computer Science, The University of Texas at Austin, USA
Vitaly Shmatikov , Department of Computer Science, The University of Texas at Austin, USA
pp. 233-244

Zab: High-performance broadcast for primary-backup systems (Abstract)

Benjamin C. Reed , Yahoo! Research, USA
Flavio P. Junqueira , Yahoo! Research, USA
Marco Serafini , Yahoo! Research, USA
pp. 245-256

Deadline-aware scheduling for Software Transactional Memory (Abstract)

Giller Muller , INRIA/LIP6, France
Walther Maldonado , University of Neuchâtel, Switzerland
Patrick Marlier , University of Neuchâtel, Switzerland
Pascal Felber , University of Neuchâtel, Switzerland
Julia Lawall , DIKU, Denmark
Etienne Riviere , University of Neuchâtel, Switzerland
pp. 257-268

A combinatorial approach to detecting buffer overflow vulnerabilities (Abstract)

Rick Kuhn , Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, Maryland 20899, USA
Donggang Liu , Department of Computer Science and Engineering, The University of Texas at Arlington, 76019, USA
Christoph Csallner , Department of Computer Science and Engineering, The University of Texas at Arlington, 76019, USA
Yu Lei , Department of Computer Science and Engineering, The University of Texas at Arlington, 76019, USA
Dazhi Zhang , Department of Computer Science and Engineering, The University of Texas at Arlington, 76019, USA
Raghu Kacker , Information Technology Laboratory, National Institute of Standards and Technology, Gaithersburg, Maryland 20899, USA
Wenhua Wang , Department of Computer Science and Engineering, The University of Texas at Arlington, 76019, USA
David Kung , Department of Computer Science and Engineering, The University of Texas at Arlington, 76019, USA
pp. 269-278

Cross-layer resilience using wearout aware design flow (Abstract)

Bardia Zandian , Electrical Engineering Department, University of Southern California, Los Angeles, USA
Murali Annavaram , Electrical Engineering Department, University of Southern California, Los Angeles, USA
pp. 279-290

Transparent dynamic binding with fault-tolerant cache coherence protocol for chip multiprocessors (Abstract)

Yu Hu , Key Laboratory of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences (CAS), Beijing, China
Shuchang Shan , Key Laboratory of Computer System and Architecture, Institute of Computing Technology, CAS, Beijing, China
Xiaowei Li , Key Laboratory of Computer System and Architecture, Institute of Computing Technology, Chinese Academy of Sciences (CAS), Beijing, China
pp. 291-302

Fault injection-based assessment of aspect-oriented implementation of fault tolerance (Abstract)

Ruben Alexandersson , Department of Computer Science & Engineering, Chalmers University of Technology, SE-41296, Gothenburg, Sweden
Johan Karlsson , Department of Computer Science & Engineering, Chalmers University of Technology, SE-41296, Gothenburg, Sweden
pp. 303-314

A framework for early stage quality-fault tolerance analysis of embedded control systems (Abstract)

P. P. Chakrabarti , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India
Purnendu Sinha , Electrical and Software Architecture Group, General Motors India Science Lab, Bangalore, India
Dipankar Das , Electrical and Software Architecture Group, General Motors India Science Lab, Bangalore, India
S. G. Vadlamudi , Department of Computer Science and Engineering, Indian Institute of Technology Kharagpur, India
pp. 315-322

Characterization of logical masking and error propagation in combinational circuits and effects on system vulnerability (Abstract)

Nishant George , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, Charlottesville, USA
John Lach , Charles L. Brown Department of Electrical and Computer Engineering, University of Virginia, Charlottesville, USA
pp. 323-334

A scalable availability model for Infrastructure-as-a-Service cloud (Abstract)

Kishor S. Trivedi , Dept. of Electrical and Computer Engineering, Duke University, Durham, NC 27708, USA
Francesco Longo , Dipartimento di Matematica, Università degli Studi di Messina, Contrada di Dio, S.Agata, 98166, Italia
Vijay K. Naik , IBM T. J. Watson Research Center, Hawthorne, NY 10532, USA
Rahul Ghosh , Dept. of Electrical and Computer Engineering, Duke University, Durham, NC 27708, USA
pp. 335-346

Modeling and evaluating targeted attacks in large scale dynamic systems (Abstract)

Romaric Ludinard , Supélec, France
Frederic Tronel , Supélec, France
Emmanuelle Anceaume , CNRS IRISA, France
Bruno Sericola , INRIA Rennes Bretagne-Atlantique, France
pp. 347-358

Incremental quantitative verification for Markov decision processes (Abstract)

Hongyang Qu , Department of Computer Science, University of Oxford, Parks Road, OX1 3QD, UK
Marta Kwiatkowska , Department of Computer Science, University of Oxford, Parks Road, OX1 3QD, UK
David Parker , Department of Computer Science, University of Oxford, Parks Road, OX1 3QD, UK
pp. 359-370

Hypervisor-assisted application checkpointing in virtualized environments (Abstract)

Navjot Singh , Avaya Labs, Basking Ridge, NJ 07920, USA
A. S. Krishnakumar , Avaya Labs, Basking Ridge, NJ 07920, USA
P. Krishnan , Avaya Labs, Basking Ridge, NJ 07920, USA
Min Lee , Georgia Institute of Technology, Atlanta, 30332, USA
Shalini Yajnik , Avaya Labs, Basking Ridge, NJ 07920, USA
pp. 371-382

OS diversity for intrusion tolerance: Myth or reality? (Abstract)

Nuno Neves , LaSIGE, University of Lisbon, Faculty of Sciences - Portugal
Miguel Garcia , LaSIGE, University of Lisbon, Faculty of Sciences - Portugal
Alysson Bessani , LaSIGE, University of Lisbon, Faculty of Sciences - Portugal
Ilir Gashi , Center for Software Reliability, City University London - UK
Rafael Obelheiro , Computer Science Department, State University of Santa Catarina - Joinville, Brazil
pp. 383-394

Resource and virtualization costs up in the cloud: Models and design choices (Abstract)

Jerry Rolia , HP Labs, Bristol, UK
Daniel Gmach , HP Labs, Palo Alto, CA, USA
Ludmila Cherkasova , HP Labs, Palo Alto, CA, USA
pp. 395-402

WaRR: A tool for high-fidelity web application record and replay (Abstract)

George Candea , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
Silviu Andrica , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
pp. 403-410

Aaron: An adaptable execution environment (Abstract)

Thomas Knauth , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Christof Fetzer , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Martin Susskraut , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Marc Brunink , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Andre Schmitt , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Stephan Creutz , Technische Universität Dresden, Department of Computer Science; 01062; Germany
Ute Schiffel , Technische Universität Dresden, Department of Computer Science; 01062; Germany
pp. 411-421

Toward dependability benchmarking of partitioning operating systems (Abstract)

Johan Karlsson , Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Gothenburg, Sweden
Qiu Yu , Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Gothenburg, Sweden
Xiaozhen Mao , Department of Computer Science and Engineering, Chalmers University of Technology, SE-412 96 Gothenburg, Sweden
Raul Barbosa , Department of Informatics Engineering, University of Coimbra, 3030-290, Portugal
pp. 422-429

Modeling stream processing applications for dependability evaluation (Abstract)

Gabriela Jacques-Silva , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Ravishankar K. Iyer , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Bugra Gedik , Thomas J. Watson Research Center, IBM Research, USA
Henrique Andrade , Thomas J. Watson Research Center, IBM Research, USA
Zbigniew Kalbarczyk , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
Kun-Lung Wu , Thomas J. Watson Research Center, IBM Research, USA
pp. 430-441

Modeling and analysis of the impact of failures in Electric Power Systems organized in interconnected regions (Abstract)

Silvano Chiaradonna , ISTI-CNR, via Moruzzi 1, I-56124, Pisa, Italy
Nicola Nostro , ISTI-CNR, via Moruzzi 1, I-56124, Pisa, Italy
Felicita Di Giandomenico , ISTI-CNR, via Moruzzi 1, I-56124, Pisa, Italy
pp. 442-453

High performance state-machine replication (Abstract)

Parisa Jalili Marandi , University of Lugano (USI), Switzerland
Marco Primi , University of Lugano (USI), Switzerland
Fernando Pedone , University of Lugano (USI), Switzerland
pp. 454-465

How secure are networked office devices? (Abstract)

Michel Cukier , Center for Risk and Reliability, Institute for Systems Research, University of Maryland, College Park, USA
Zaina Afoulki , École Nationale Superiéure d'Ingénieurs de Bourges, France
Edward Condon , Center for Risk and Reliability, University of Maryland, College Park, USA
Emily Cummins , Rochester Institute of Technology, New York, USA
pp. 465-472

A combinatorial approach to network covert communications with applications in Web Leaks (Abstract)

Rocky K. C. Chang , The Hong Kong Polytechnic University, China
Peng Zhou , The Hong Kong Polytechnic University, China
Wenke Lee , Georgia Institute of Technology, USA
Edmond W. W. Chan , The Hong Kong Polytechnic University, China
Xiapu Luo , The Hong Kong Polytechnic University, China
pp. 474-485

Crash graphs: An aggregated view of multiple crashes to improve crash triage (Abstract)

Thomas Zimmermann , Microsoft Research, Redmond, WA, USA
Nachiappan Nagappan , Microsoft Research, Redmond, WA, USA
Sunghun Kim , Hong Kong University of Science and Technology, Hong Kong
pp. 486-493

Amplifying limited expert input to sanitize large network traces (Abstract)

Xin Huang , Department of Computer Science, University of North Carolina at Chapel Hill, USA
Fabian Monrose , Department of Computer Science, University of North Carolina at Chapel Hill, USA
Michael K. Reiter , Department of Computer Science, University of North Carolina at Chapel Hill, USA
pp. 494-505

Analysis of security data from a large computing organization (Abstract)

Z. Kalbarczyk , University of Illinois at Urbana-Champaign, 1308. Main St., 61801, USA
J. Barlow , University of Illinois at Urbana-Champaign, 1308. Main St., 61801, USA
A. Sharma , University of Illinois at Urbana-Champaign, 1308. Main St., 61801, USA
R. Iyer , University of Illinois at Urbana-Champaign, 1308. Main St., 61801, USA
pp. 506-517

Impact of temperature on hard disk drive reliability in large datacenters (Abstract)

Mark Shaw , Microsoft Corporation, Redmond, WA, USA
Sriram Sankar , Microsoft Corporation, Redmond, WA, USA
Kushagra Vaid , Microsoft Corporation, Redmond, WA, USA
pp. 530-537

Merging ultra-low duty cycle networks (Abstract)

Matthew Dobson , Department of Computer Science, Vrije Universiteit, Amsterdam, Netherlands
Maarten van Steen , Department of Computer Science, Vrije Universiteit, Amsterdam, Netherlands
Spyros Voulgaris , Department of Computer Science, Vrije Universiteit, Amsterdam, Netherlands
pp. 538-549

Modeling time correlation in passive network loss tomography (Abstract)

Aiyou Chen , Google Inc, Mountain View, CA, USA
Patrick P. C. Lee , Dept of Computer Science and Engineering, The Chinese University of Hong Kong, Shatin, Hong Kong
Jin Cao , Bell Labs, Alcatel-Lucent, Murray Hill, New Jersey, 07974, USA
pp. 550-561

Simple bounds for a transient queue (Abstract)

Takayuki Osogami , IBM Research - Tokyo, 1623-14 Shimotsuruma, Yamato-shi 242-8502, Japan
Rudy Raymond , IBM Research - Tokyo, 1623-14 Shimotsuruma, Yamato-shi 242-8502, Japan
pp. 562-573

Approximate analysis of blocking queueing networks with temporal dependence (Abstract)

Giuliano Casale , Imperial College London, U.K.
Vittoria de Nitto Persone , University of Rome Tor Vergata, Italy
Evgenia Smirni , College of William and Mary, VA, U.S.A.
pp. 574-585

5<sup>th</sup> Workshop on Recent Advances in Intrusion-Tolerant Systems WRAITS 2011 (Abstract)

Alysson Besani , University of Lisbon, Faculty of Sciences, Portugal
Partha Pal , Raytheon BBN Technologies, Cambridge, USA
pp. 586-587

Introduction to the fifth workshop on dependable and secure nanocomputing (Abstract)

Johan Karlsson , Dept. of Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg - Sweden
Jean Arlat , LAAS-CNRS and Université de Toulouse, 7, Av. du Colonel Roche 31077 - France
Takashi Nanya , Canon Inc., 3-30-2 Shimomaruko, Ohta-ku, Tokyo 146-8501 - Japan
Cristian Constantinescu , AMD, 2950 E Harmony Rd., Fort Collins, CO 80528 - USA
Alan Wood , Oracle, 501 Island Parkway, Belmont, CA 94002 - USA
pp. 588-589

The First International Workshop on Dependability of Clouds, data centers and Virtual Computing Environments (Abstract)

Ji Wang , NLPDP, NUDT, Changsha, China
Jogesh K. Muppala , Dept. of Comp. Sci. and Eng., HKUST, Hong Kong, China
Robert Stroud , Center for Softw. Reliability, City University, London, UK
Matti Hiltunen , AT&T Labs-Research, Florham Park, NJ, USA
pp. 590-591

Seventh workshop on hot topics in system dependability (HotDep'11) (Abstract)

Andreas Haeberlen , University of Pennsylvania, USA
Mootaz Elnozahy , IBM Research, USA
pp. 592

WOSD 2011 the first international workshop on open systems dependability (Abstract)

Karama Kanoun , LAAS_CNRS, Toulouse, France
Kimio Kuramitsu , Yokohama National University, Japan
Mario Tokoro , Sony CSL, Inc., Tokyo, Japan
Jean-Charles Fabre , LAAS_CNRS, Toulouse, France
pp. 593-594

Third workshop on proactive failure avoidance, recovery, and maintenance (PFARM) (Abstract)

Kishor S. Trivedi , Duke University, NC USA
Felix Salfner , Humboldt-Universität zu Berlin, Germany
Miroslaw Malek , Humboldt-Universität zu Berlin, Germany
pp. 595-596

5th international workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011 (Abstract)

Vincenzo De Florio , Universiteit Antwerpen/PATS & IBBT, Belgium
Domenico Cotroneo , Dipartimento di Informatica e Sistemistica, Università di Napoli Federico II, Italy
pp. 597-598
402 ms
(Ver 3.1 (10032016))