The Community for Technology Leaders
2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (2013)
Budapest, Hungary Hungary
June 24, 2013 to June 27, 2013
ISSN: 1530-0889
ISBN: 978-1-4673-6471-3
TABLE OF CONTENTS
Papers

Message from the general chair (Abstract)

Andras Pataricza , Budapest University of Technology and Economics, Hungary
pp. 1

Message from the PDS program chair (Abstract)

Peter Kemper , College of William and Mary, USA
pp. 1

Author index (Abstract)

pp. 1-22

Sponsors (Abstract)

pp. 1

CloudPD: Problem determination and diagnosis in shared dynamic clouds (Abstract)

Bikash Sharma , Department of Computer Science and Engineering, Pennsylvania State University, University Park, USA
Praveen Jayachandran , IBM Research - India
Akshat Verma , IBM Research - India
Chita R. Das , Department of Computer Science and Engineering, Pennsylvania State University, University Park, USA
pp. 1-12

Mitigating access-driven timing channels in clouds using StopWatch (Abstract)

Peng Li , Department of Computer Science, University of North Carolina, USA
Debin Gao , School of Information Systems, Singapore Management University, USA
Michael K. Reiter , Department of Computer Science, University of North Carolina, USA
pp. 1-12

EagleEye: Towards mandatory security monitoring in virtualized datacenter environment (Abstract)

Yu-Sung Wu , Department of Computer Science, National Chiao Tung University, Taiwan
Pei-Keng Sun , Department of Computer Science, National Chiao Tung University, Taiwan
Chun-Chi Huang , Department of Computer Science, National Chiao Tung University, Taiwan
Sung-Jer Lu , Department of Computer Science, National Chiao Tung University, Taiwan
Syu-Fang Lai , Department of Computer Science, National Chiao Tung University, Taiwan
Yi-Yung Chen , Department of Computer Science, National Chiao Tung University, Taiwan
pp. 1-12

Why is my smartphone slow? On the fly diagnosis of underperformance on the mobile Internet (Abstract)

Chaitrali Amrutkar , Georgia Tech Information Security Center, Georgia Institute of Technology, USA
Matti Hiltunen , AT&T Labs - Research, Florham Park, NJ, USA
Trevor Jim , AT&T Labs - Research, Florham Park, NJ, USA
Kaustubh Joshi , AT&T Labs - Research, Florham Park, NJ, USA
Oliver Spatscheck , AT&T Labs - Research, Florham Park, NJ, USA
Patrick Traynor , Georgia Tech Information Security Center, Georgia Institute of Technology, USA
Shobha Venkataraman , AT&T Labs - Research, Florham Park, NJ, USA
pp. 1-8
Papers

Automating the debugging of datacenter applications with ADDA (Abstract)

Cristian Zamfir , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
Gautam Altekar , University of California, Berkeley, USA
Ion Stoica , University of California, Berkeley, USA
pp. 1-12

Fault detection and localization in distributed systems using invariant relationships (Abstract)

Abhishek B. Sharma , NEC Labs America, Princeton, NJ, USA
Haifeng Chen , NEC Labs America, Princeton, NJ, USA
Min Ding , NEC Labs America, Princeton, NJ, USA
Kenji Yoshihira , NEC Labs America, Princeton, NJ, USA
Guofei Jiang , NEC Labs America, Princeton, NJ, USA
pp. 1-8

Increasing network resiliency by optimally assigning diverse variants to routing nodes (Abstract)

Andrew Newell , Department of Computer Science at Purdue University, USA
Daniel Obenshain , Department of Computer Science at Johns Hopkins University, USA
Thomas Tantillo , Department of Computer Science at Johns Hopkins University, USA
Cristina Nita-Rotaru , Department of Computer Science at Purdue University, USA
Yair Amir , Department of Computer Science at Johns Hopkins University, USA
pp. 1-12

Distal: A framework for implementing fault-tolerant distributed algorithms (Abstract)

Martin Biely , Ecole Polytechnique Fédérale de Lausanne (EPFL), 1015, Switzerland
Pamela Delgado , Ecole Polytechnique Fédérale de Lausanne (EPFL), 1015, Switzerland
Zarko Milosevic , Ecole Polytechnique Fédérale de Lausanne (EPFL), 1015, Switzerland
Andre Schiper , Ecole Polytechnique Fédérale de Lausanne (EPFL), 1015, Switzerland
pp. 1-8

Generative software-based memory error detection and correction for operating system data structures (Abstract)

Christoph Borchert , Dept. of Comput. Sci. 12, Tech. Univ. Dortmund, Dortmund, Germany
Horst Schirmeier , Dept. of Comput. Sci. 12, Tech. Univ. Dortmund, Dortmund, Germany
Olaf Spinczyk , Dept. of Comput. Sci. 12, Tech. Univ. Dortmund, Dortmund, Germany
pp. 1-12
Papers

An algorithmic approach to error localization and partial recomputation for low-overhead fault tolerance (Abstract)

Joseph Sloan , University of Illinois, Urbana-Champaign, USA
Rakesh Kumar , University of Illinois, Urbana-Champaign, USA
Greg Bronevetsky , Lawrence Livermore National Laboratory, CA, USA
pp. 1-12

simFI: From single to simultaneous software fault injections (Abstract)

Stefan Winter , DEEDS Group, Dept. of CS, TU Darmstadt, Germany
Michael Tretter , DEEDS Group, Dept. of CS, TU Darmstadt, Germany
Benjamin Sattler , DEEDS Group, Dept. of CS, TU Darmstadt, Germany
Neeraj Suri , DEEDS Group, Dept. of CS, TU Darmstadt, Germany
pp. 1-12

Chasing the optimum in replicated in-memory transactional platforms via protocol adaptation (Abstract)

Maria Couceiro , INESC-ID Lisboa/Instituto Superior Técnico, Universidade Técnica de Lisboa, Portugal
Pedro Ruivo , Red Hat Inc., Republic of Ireland
Paolo Romano , INESC-ID Lisboa/Instituto Superior Técnico, Universidade Técnica de Lisboa, Portugal
Luis Rodrigues , INESC-ID Lisboa/Instituto Superior Técnico, Universidade Técnica de Lisboa, Portugal
pp. 1-12

Seamless kernel updates (Abstract)

Maxim Siniavine , University of Toronto, Canada
Ashvin Goel , University of Toronto, Canada
pp. 1-12

Application-driven TCP recovery and non-stop BGP (Abstract)

Robert Surton , Department of Computer Science, Cornell University, USA
Ken Birman , Department of Computer Science, Cornell University, USA
Robbert van Renesse , Department of Computer Science, Cornell University, USA
pp. 1-12

Operating SECDED-based caches at ultra-low voltage with FLAIR (Abstract)

Moinuddin K. Qureshi , Georgia Institute of Technology, Atlanta, USA
Zeshan Chishti , Intel Labs, Hillsboro, Oregon, USA
pp. 1-11

Stress balancing to mitigate NBTI effects in register files (Abstract)

Hussam Amrouch , Karsruhe Institute of Technology (KIT), Germany
Thomas Ebi , Karsruhe Institute of Technology (KIT), Germany
Jorg Henkel , Karsruhe Institute of Technology (KIT), Germany
pp. 1-10

Detecting malicious landing pages in Malware Distribution Networks (Abstract)

Gang Wang , Computer Science, UC Santa Barbara, CA 93106, USA
Jack W. Stokes , Microsoft Research, One Microsoft Way, Redmond, WA 98052, USA
Cormac Herley , Microsoft Research, One Microsoft Way, Redmond, WA 98052, USA
David Felstead , Microsoft Corporation, One Microsoft Way, Redmond, WA 98052, USA
pp. 1-11

Redefining web browser principals with a Configurable Origin Policy (Abstract)

Yinzhi Cao , Northwestern University, USA
Vaibhav Rastogi , Northwestern University, USA
Zhichun Li , NEC Labs America, USA
Yan Chen , Northwestern University, USA
Alexander Moshchuk , Microsoft Research, USA
pp. 1-12

Practical automated vulnerability monitoring using program state invariants (Abstract)

Cristiano Giuffrida , Vrije Universiteit Amsterdam, The Netherlands
Lorenzo Cavallaro , Royal Holloway, University of London, UK
Andrew S. Tanenbaum , Vrije Universiteit Amsterdam, The Netherlands
pp. 1-12

The Third International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology DCDV 2013 (Abstract)

Jogesh K. Muppala , Dept. of Comp. Sci. and Eng., HKUST, Hong Kong, China
Matti Hiltunen , AT&T Labs-Research, Florham Park, NJ, USA
Roy Campbell , University of Illinois, Urbana, 61801-2302 USA
Paulo Verissimo , Universidade de Lisboa, 1700 - Portugal
pp. 1-2

Towards SDN enabled network control delegation in clouds (Abstract)

Muhammad Salman Malik , University of Illinois, Urbana-Champaign, USA
Mirko Montanari , University of Illinois, Urbana-Champaign, USA
Jun Ho Huh , University of Illinois, Urbana-Champaign, USA
Rakesh B. Bobba , University of Illinois, Urbana-Champaign, USA
Roy H. Campbell , University of Illinois, Urbana-Champaign, USA
pp. 1-6

Fault-tolerance characteristics of data center network topologies using fault regions (Abstract)

Yang Liu , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, HKSAR
Jogesh Muppala , Department of Computer Science and Engineering, Hong Kong University of Science and Technology, HKSAR
pp. 1-6

Availability study on cloud computing environments: Live migration as a rejuvenation mechanism (Abstract)

Matheus Melo , Informatics Center, Federal University of Pernambuco, Recife, Brazil
Paulo Maciel , Informatics Center, Federal University of Pernambuco, Recife, Brazil
Jean Araujo , Informatics Center, Federal University of Pernambuco, Recife, Brazil
Rubens Matos , Informatics Center, Federal University of Pernambuco, Recife, Brazil
Carlos Araujo , Informatics Center, Federal University of Pernambuco, Recife, Brazil
pp. 1-6

Dependability models for designing disaster tolerant cloud computing systems (Abstract)

Bruno Silva , Center for Informatics (CIn), Federal University of Pernambuco (UFPE), Recife, Brazil
Paulo Maciel , Center for Informatics (CIn), Federal University of Pernambuco (UFPE), Recife, Brazil
Eduardo Tavares , Center for Informatics (CIn), Federal University of Pernambuco (UFPE), Recife, Brazil
Armin Zimmermann , System & Software Engineering, Ilmenau University of Technology, Germany
pp. 1-6

Analysis of bugs in Apache Virtual Computing Lab (Abstract)

Flavio Frattini , University of Naples Federico II (Italy)
Rahul Ghosh , IBM Software Group (Research Triangle Park, NC, USA)
Marcello Cinque , University of Naples Federico II (Italy)
Andy Rindos , IBM Software Group (Research Triangle Park, NC, USA)
Kishor S. Trivedi , Duke University (Durham, NC, USA)
pp. 1-6

Model-based performance analysis of local re-execution scheme in offloading system (Abstract)

Qiushi Wang , Department of Mathematics and Computer Science, Freie Universität Berlin, Takustr.9, Germany
Huaming Wu , Department of Mathematics and Computer Science, Freie Universität Berlin, Takustr.9, Germany
Katinka Wolter , Department of Mathematics and Computer Science, Freie Universität Berlin, Takustr.9, Germany
pp. 1-6

DATAFLASKS: An epidemic dependable key-value substrate (Abstract)

Francisco Maia , High Assurance Software Laboratory, INESC TEC and UMinho, Braga, Portugal
Miguel Matos , High Assurance Software Laboratory, INESC TEC and UMinho, Braga, Portugal
Ricardo Vilaca , High Assurance Software Laboratory, INESC TEC and UMinho, Braga, Portugal
Jose Pereira , High Assurance Software Laboratory, INESC TEC and UMinho, Braga, Portugal
Rui Oliveira , High Assurance Software Laboratory, INESC TEC and UMinho, Braga, Portugal
Etienne Riviere , Université de Neuchätel, Switzerland
pp. 1-6

Lilliput meets brobdingnagian: Data center systems management through mobile devices (Abstract)

Saurabh Bagchi , Purdue University, USA
Fahad Arshad , Purdue University, USA
Jan Rellermeyer , IBM Research Austin, USA
Thomas Osiecki , IBM Research Austin, USA
Michael Kistler , IBM Research Austin, USA
Ahmed Gheith , IBM Research Austin, USA
pp. 1-6

Increasing the trustworthiness of commodity hardware through software (Abstract)

Kevin Elphinstone , NICTA and University of New South Wales, Sydney, Australia
Yanyan Shen , NICTA and University of New South Wales, Sydney, Australia
pp. 1-6

Intrusion detection and honeypots in nested virtualization environments (Abstract)

Michael Beham , Institute of IT-Security and Security Law, University of Passau, Germany
Marius Vlad , Institute of IT-Security and Security Law, University of Passau, Germany
Hans P. Reiser , Institute of IT-Security and Security Law, University of Passau, Germany
pp. 1-6

Addressing memory exhaustion failures in Virtual Machines in a cloud environment (Abstract)

Jose Antonio Navas Molina , Dept. of Comput. Sci., Univ. of Colorado, Boulder, CO, USA
Shivakant Mishra , Dept. of Comput. Sci., Univ. of Colorado, Boulder, CO, USA
pp. 1-6
Papers

A review of cloud deployment models for e-learning systems (Abstract)

Engin Leloglu , Dept. of Computer Engineering, Izmir Institute of Technology, TURKEY
Tolga Ayav , Dept. of Computer Engineering, Izmir Institute of Technology, TURKEY
Burak Galip Aslan , Dept. of Computer Engineering, Izmir Institute of Technology, TURKEY
pp. 1-2

A view on the past and future of fault injection (Abstract)

Nuno Silva , Critical Software SA, Coimbra, Portugal
Ricardo Barbosa , Critical Software SA, Coimbra, Portugal
Joao Carlos Cunha , Polytechnic Institute of Coimbra/CISUC, Portugal
Marco Vieira , CISUC-University of Coimbra, Portugal
pp. 1-2

An adaptive approach to dependable circuits for a digital power control (Abstract)

Aromhack Saysanasongkham , Graduate School of System Design, Tokyo Metropolitan University, 6-6, Asahigaoka, Hino, 191-0065, Japan
Kenta Imai , Graduate School of System Design, Tokyo Metropolitan University, 6-6, Asahigaoka, Hino, 191-0065, Japan
Masayuki Arai , Faculty of System Design, Tokyo Metropolitan University, 6-6, Asahigaoka, Hino, 191-0065, Japan
Satoshi Fukumoto , Faculty of System Design, Tokyo Metropolitan University, 6-6, Asahigaoka, Hino, 191-0065, Japan
pp. 1-2

Complementing static and dynamic analysis approaches for better network defense (Abstract)

Himanshu Pareek , Center for Development of Advanced Computing, Hyderabad, India
N. Sarat Chandra Babu , Center for Development of Advanced Computing, Bangalore, India
pp. 1-2

Design of event-based Intrusion Detection System on OpenFlow Network (Abstract)

Yung-Li Hu , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
Wei-Bing Su , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
Li-Ying Wu , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
Yennun Huang , Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan
Sy-Yen Kuo , Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan
pp. 1-2

Evaluating Xilinx SEU Controller Macro for fault injection (Abstract)

Jose Luis Nunes , Polytechnic Institute of Coimbra/CISUC, Portugal
Joao Carlos Cunha , Polytechnic Institute of Coimbra/CISUC, Portugal
Raul Barbosa , University of Coimbra/CISUC, Portugal
Mario Zenha-Rela , University of Coimbra/CISUC, Portugal
pp. 1-2

Modeling and analysing operation processes for dependability (Abstract)

Xiwei Xu , NICTA Sydney Australia, School of Computing Science and Engineering, University of New South Wales, Australia
Liming Zhu , NICTA Sydney Australia, School of Computing Science and Engineering, University of New South Wales, Australia
Jim Li , NICTA Sydney Australia, School of Computing Science and Engineering, University of New South Wales, Australia
Len Bass , NICTA Sydney Australia, School of Computing Science and Engineering, University of New South Wales, Australia
Qinghua Lu , NICTA Sydney Australia, School of Computing Science and Engineering, University of New South Wales, Australia
Min Fu , NICTA Sydney Australia, School of Computing Science and Engineering, University of New South Wales, Australia
pp. 1-2

Network traffic anomaly detection based on growing hierarchical SOM (Abstract)

Shin-Ying Huang , Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan
Yen-Nun Huang , Research Center for Information Technology Innovation, Academia Sinica, Taipei, Taiwan
pp. 1-2

Performability analysis of RAID10 versus RAID6 (Abstract)

Fumio Machida , NEC Knowledge Discovery Research Laboratories, Japan
Jianwen Xiang , NEC Knowledge Discovery Research Laboratories, Japan
Kumiko Tadano , NEC Knowledge Discovery Research Laboratories, Japan
Yoshiharu Maeno , NEC Knowledge Discovery Research Laboratories, Japan
Takashi Horikawa , NEC Knowledge Discovery Research Laboratories, Japan
pp. 1-2

DRIP: A framework for purifying trojaned kernel drivers (Abstract)

Zhongshu Gu , Department of Computer Science and CERIAS, Purdue University, West Lafayette, IN, USA, 47907-2107
William N. Sumner , Department of Computer Science and CERIAS, Purdue University, West Lafayette, IN, USA, 47907-2107
Zhui Deng , Department of Computer Science and CERIAS, Purdue University, West Lafayette, IN, USA, 47907-2107
Xiangyu Zhang , Department of Computer Science and CERIAS, Purdue University, West Lafayette, IN, USA, 47907-2107
Dongyan Xu , Department of Computer Science and CERIAS, Purdue University, West Lafayette, IN, USA, 47907-2107
pp. 1-12

SPECTRE: A dependable introspection framework via System Management Mode (Abstract)

Fengwei Zhang , Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA
Kevin Leach , Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA
Kun Sun , Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA
Angelos Stavrou , Center for Secure Information Systems, George Mason University, Fairfax, VA 22030, USA
pp. 1-12

Manipulating semantic values in kernel data structures: Attack assessments and implications (Abstract)

Aravind Prakash , Department of EECS, Syracuse University, USA
Eknath Venkataramani , Department of EECS, Syracuse University, USA
Heng Yin , Department of EECS, Syracuse University, USA
Zhiqiang Lin , Department of Computer Science, University of Texas at Dallas, USA
pp. 1-12

A logic for model-checking mean-field models (Abstract)

Anna Kolesnichenko , Centre for Telematics & Information Technology, University of Twente, Enschede, The Netherlands
Pieter-Tjerk de Boer , Centre for Telematics & Information Technology, University of Twente, Enschede, The Netherlands
Anne Remke , Centre for Telematics & Information Technology, University of Twente, Enschede, The Netherlands
Boudewijn R. Haverkort , Centre for Telematics & Information Technology, University of Twente, Enschede, The Netherlands
pp. 1-12

Lumpability of fluid models with heterogeneous agent types (Abstract)

Giulio Iacobelli , Department for Informatics, Ludwig Maximilians University of Munich, Germany
Mirco Tribastone , Department for Informatics, Ludwig Maximilians University of Munich, Germany
pp. 1-11

Fitting second-order acyclic Marked Markovian Arrival Processes (Abstract)

Andrea Sansottera , Dipt. di Elettron., Inf. e Bioingegneria, Politec. di Milano\, Milan, Italy
Giuliano Casale , Dept. of Comput., Imperial Coll. London, London, UK
Paolo Cremonesi , Dipt. di Elettron., Inf. e Bioingegneria, Politec. di Milano\, Milan, Italy
pp. 1-12
Papers

Security implications of memory deduplication in a virtualized environment (Abstract)

Jidong Xiao , The College of William and Mary, Williamsburg, Virginia, USA
Zhang Xu , The College of William and Mary, Williamsburg, Virginia, USA
Hai Huang , IBM T. J. Watson Research Center, Hawthorne, New York, USA
Haining Wang , The College of William and Mary, Williamsburg, Virginia, USA
pp. 1-12

State-of-the-practice in data center virtualization: Toward a better understanding of VM usage (Abstract)

Robert Birke , IBM Research Zurich Lab, Rüschlikon, Switzerland
Andrej Podzimek , IBM Research Zurich Lab, Rüschlikon, Switzerland
Lydia Y. Chen , IBM Research Zurich Lab, Rüschlikon, Switzerland
Evgenia Smirni , College of William and Mary, Virginia, USA
pp. 1-12

FTSPM: A Fault-Tolerant ScratchPad Memory (Abstract)

Amir Mahdi Hosseini Monazzah , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran 11155-9517
Hamed Farbeh , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran 11155-9517
Seyed Ghassem Miremadi , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran 11155-9517
Mahdi Fazeli , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran 11155-9517
Hossein Asadi , Department of Computer Engineering, Sharif University of Technology, Tehran, Iran 11155-9517
pp. 1-10

PHYS: Profiled-HYbrid Sampling for soft error reliability benchmarking (Abstract)

Jinho Suh , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA
Murali Annavaram , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA
Michel Dubois , Ming Hsieh Department of Electrical Engineering, University of Southern California, Los Angeles, USA
pp. 1-12

Error detector placement for soft computation (Abstract)

Anna Thomas , Department of Electrical and Computer Engineering, University of British Columbia (UBC), Vancouver, Canada
Karthik Pattabiraman , Department of Electrical and Computer Engineering, University of British Columbia (UBC), Vancouver, Canada
pp. 1-12

A practical characterization of a NASA SpaceCube application through fault emulation and laser testing (Abstract)

John Paul Walters , Information Sciences Institute, University of Southern California, Arlington, 22203, USA
Kenneth M. Zick , Information Sciences Institute, University of Southern California, Arlington, 22203, USA
Matthew French , Information Sciences Institute, University of Southern California, Arlington, 22203, USA
pp. 1-8

An empirical investigation of fault repairs and mitigations in space mission system software (Abstract)

Javier Alonso , Duke University, USA
Michael Grottke , Friedrich-Alexander-Universität, Erlangen-Nürnberg, Germany
Allen P. Nikora , Jet Propulsion Laboratory, California Institute of Technology, USA
Kishor S. Trivedi , Duke University, USA
pp. 1-8

Reading between the lines of failure logs: Understanding how HPC systems fail (Abstract)

Nosayba El-Sayed , Department of Computer Science, University of Toronto, Canada
Bianca Schroeder , Department of Computer Science, University of Toronto, Canada
pp. 1-12

Guaranteeing Proper-Temporal-Embedding safety rules in wireless CPS: A hybrid formal modeling approach (Abstract)

Feng Tan , Dept. of Computing, The Hong Kong Polytechnic Univ., Hong Kong S.A.R.
Yufei Wang , Dept. of Computing, The Hong Kong Polytechnic Univ., Hong Kong S.A.R.
Qixin Wang , Dept. of Computing, The Hong Kong Polytechnic Univ., Hong Kong S.A.R.
Lei Bu , State Key Lab for Novel Software Technology, Dept. of Computer Sci. and Tech., Nanjing Univ., China
Rong Zheng , Dept. of Computing and Software, McMaster Univ., Canada
Neeraj Suri , Dept. of Computer Science, TU Darmstadt, Germany
pp. 1-12

WirelessHART modeling and performance evaluation (Abstract)

Anne Remke , Centre for Telematics & Information Technology, University of Twente, Enschede, The Netherlands
Xian Wu , Centre for Telematics & Information Technology, University of Twente, Enschede, The Netherlands
pp. 1-12

Improving SSD reliability with RAID via Elastic Striping and Anywhere Parity (Abstract)

Jaeho Kim , University of Seoul, Korea
Jongmin Lee , University of Seoul, Korea
Jongmoo Choi , Dankook University, Korea
Donghee Lee , University of Seoul, Korea
Sam H. Noh , Hongik University, Korea
pp. 1-12

Geo-replicated storage with scalable deferred update replication (Abstract)

Daniele Sciascia , University of Lugano (USI), Switzerland
Fernando Pedone , University of Lugano (USI), Switzerland
pp. 1-12

Consistency or latency? A quantitative analysis of replication systems based on replicated state machines (Abstract)

Xu Wang , School of Computer Science and Engineering, Beihang University, Beijing, China
Hailong Sun , School of Computer Science and Engineering, Beihang University, Beijing, China
Ting Deng , School of Computer Science and Engineering, Beihang University, Beijing, China
Jinpeng Huai , School of Computer Science and Engineering, Beihang University, Beijing, China
pp. 1-12

Implementing the ADVISE security modeling formalism in Möbius (Abstract)

Carol Muehrcke , Cyber Defense Agency, Wisconsin Rapids, USA
pp. 1-8

Uniform node sampling service robust against collusions of malicious nodes (Abstract)

Emmanuelle Anceaume , IRISA / CNRS, Rennes, France
Yann Busnel , LINA / Université de Nantes, France
Bruno Sericola , Inria Rennes - Bretagne, Atlantique, France
pp. 1-12

Crossing the threshold: Detecting network malfeasance via sequential hypothesis testing (Abstract)

Srinivas Krishnan , Department of Computer Science, University of North Carolina at Chapel Hill, USA
Teryl Taylor , Department of Computer Science, University of North Carolina at Chapel Hill, USA
Fabian Monrose , Department of Computer Science, University of North Carolina at Chapel Hill, USA
John McHugh , RedJack, Brazil
pp. 1-12

Locality matters: Reducing Internet traffic graphs using location analysis (Abstract)

Andreas Berger , FTW Telecommunications Research Center Vienna, Austria
Stefan Ruehrup , FTW Telecommunications Research Center Vienna, Austria
Wilfried N. Gansterer , University of Vienna, Faculty of Computer Science, Austria
Oliver Jung , FTW Telecommunications Research Center Vienna, Austria
pp. 1-12

Evasive bots masquerading as human beings on the web (Abstract)

Jing Jin , George Mason University, USA
Jeff Offutt , George Mason University, USA
Nan Zheng , College of William and Mary, USA
Feng Mao , Itron Inc, USA
Aaron Koehl , College of William and Mary, USA
Haining Wang , College of William and Mary, USA
pp. 1-12
80 ms
(Ver 3.3 (11022016))