The Community for Technology Leaders
Dependable Systems and Networks Workshops (2011)
Hong Kong, China
June 27, 2011 to June 30, 2011
ISBN: 978-1-4577-0374-4
TABLE OF CONTENTS
Papers

Front cover (PDF)

pp. c1

WRAITS guest talk: "Empirical studies in cybersecurity" (PDF)

Michel Cukier , University of Maryland, College Park, USA
pp. x-xii

WDSN committees (PDF)

pp. xiii

WDSN keynote talk: "Stochastic computing: Embracing errors in architecture and design of processors and applications" (PDF)

Rakesh Kumar , Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, USA
pp. xiv-xvi

DCDV committees (PDF)

pp. xvii

DCDV program (PDF)

pp. xviii-xix

HotDep program (PDF)

pp. xxi-xxii

WOSD committees (PDF)

pp. xxiii

WOSD program (PDF)

pp. xxiv-xxv

PFARM committees (PDF)

pp. xxvi

PFARM guest talk: "Proactivity = observation + analysis + knowledge extraction + action planning?" (PDF)

Andras Pataricza , Budapest University of Technology and Economics, Hungary
pp. xxvii-xxviii

ADAMUS committees (PDF)

pp. xxix

ADAMUS program (PDF)

pp. xxx

Author index (PDF)

pp. xxxi-xxxii

5<sup>th</sup> Workshop on recent advances in intrusion-tolerant systems WRAITS 2011 (Abstract)

Alysson Besani , University of Lisbon, Faculty of Sciences, Lisbon, Portugal
Partha Pal , Raytheon BBN Technologies, Cambridge, USA
pp. 1-2

The time-free approach to Byzantine failure detection in dynamic networks (Abstract)

Fabiola Greve , DCC - Federal University of Bahia (UFBA), Campus de Ondina, Salvador, Bahia, Brasil
Pierre Sens , LIP6, University of Paris 6, CNRS, INRIA, 4 - Place Jussieu, 75005, Paris, France
Murilo Santos de Lima , DCC - Federal University of Bahia (UFBA), Campus de Ondina, Salvador, Bahia, Brasil
Luciana Arantes , LIP6, University of Paris 6, CNRS, INRIA, 4 - Place Jussieu, 75005, Paris, France
pp. 3-8

Managing business health in the presence of malicious attacks (Abstract)

Zbigniew T. Kalbarczyk , University of Illinois at Urbana-Champaign
Kevin McAuliffe , IBM Research
Aashish Sharma , University of Illinois at Urbana-Champaign
William H. Sanders , University of Illinois at Urbana-Champaign
HariGovind V. Ramasamy , IBM Research
Birgit Pfitzmann , IBM Research
Saman A. Zonouz , University of Illinois at Urbana-Champaign
Eric Cope , IBM Research
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
pp. 9-14

From Byzantine fault tolerance to intrusion tolerance (a position paper) (Abstract)

Alysson Neves Bessani , LaSIGE, University of Lisbon, Faculty of Sciences - Lisbon, Portugal
pp. 15-18

Anomaly-based intrusion detection in software as a service (Abstract)

Gustavo Nascimento , Portugal Telecom - Portugal
Miguel Correia , Instituto Superior Técnico / INESC-ID - Portugal
pp. 19-24

Combining intrusion detection and recovery for enhancing system dependability (Abstract)

Ajay Nagarajan , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030
Arun Sood , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030
Robert Banks , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030
Quyen Nguyen , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030
pp. 25-30

A cloud-based intrusion detection and response system for mobile phones (Abstract)

Saman A. Zonouz , University of Illinois at Urbana-Champaign
Amir Houmansadr , University of Illinois at Urbana-Champaign
Robin Berthier , University of Illinois at Urbana-Champaign
pp. 31-32

Continuous mission-oriented assessment (CMA) of assurance (Abstract)

Patrick Hurley , Air Force Research Laboratory, BBN Technologies, Purdue University
Partha Pal , Air Force Research Laboratory, BBN Technologies, Purdue University
Amy Fedyk , Air Force Research Laboratory, BBN Technologies, Purdue University
Mathew Tan Creti , Air Force Research Laboratory, BBN Technologies, Purdue University
pp. 33-38

Introduction to the fifth workshop on dependable and secure nanocomputing (Abstract)

Alan Wood , Oracle, 501 Island Parkway, Belmont, CA 94002 - USA
Takashi Nanya , Canon Inc., 3-30-2 Shimomaruko, Ohta-ku, Tokyo 146-8501 - Japan
Cristian Constantinescu , AMD, 2950 E Harmony Rd., Fort Collins, CO 80528 - USA
Johan Karlsson , Dept. of Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg - Sweden
Jean Arlat , LAAS-CNRS and Université de Toulouse, 7, Av. du Colonel Roche 31077 Toulouse - France
pp. 39-40

Study of the effects of SET induced faults on submicron technologies (Abstract)

Alireza Rohani , Testable Design and Test of Integrated Systems Group, CTIT, University of Twente, Enschede, Netherlands
Hans. G. Kerkhoff , Testable Design and Test of Integrated Systems Group, CTIT, University of Twente, Enschede, Netherlands
pp. 41-46

Investigating the impact of process variations on an asynchronous Time-Triggered-Protocol controller (Abstract)

Markus Ferringer , Department of Computer Engineering, Embedded Computing Systems Group, Vienna University of Technology
pp. 47-52

Comparing the effects of intermittent and transient hardware faults on programs (Abstract)

Layali Rashid , Department of Electrical and Computer Engineering, The University of British Columbia, Canada
Karthik Pattabiraman , Department of Electrical and Computer Engineering, The University of British Columbia, Canada
Jiesheng Wei , Department of Electrical and Computer Engineering, The University of British Columbia, Canada
Sathish Gopalakrishnan , Department of Electrical and Computer Engineering, The University of British Columbia, Canada
pp. 53-58

Level of confidence evaluation and its usage for Roll-back Recovery with Checkpointing optimization (Abstract)

Urban Ingelsson , Department of Computer Science Linköping University, Sweden
Virendra Singh , Supercomputer Education and Research Centre, Indian Institute of Science, India
Dimitar Nikolov , Department of Computer Science Linköping University, Sweden
Erik Larsson , Department of Computer Science Linköping University, Sweden
pp. 59-64

A digitalized management mechanism for low-cost low-power multiple-voltage 3D designs (Abstract)

Pin-Jui Lai , Dept. of Electronic Engineering, Feng Chia University, 100, Wenhwa Road, Seatwen, Taichung Taiwan R.O.C.
Ching-Hwa Cheng , Dept. of Electronic Engineering, Feng Chia University, 100, Wenhwa Road, Seatwen, Taichung Taiwan R.O.C.
Ming-Hsuan Wu , Dept. of Electronic Engineering, Feng Chia University, 100, Wenhwa Road, Seatwen, Taichung Taiwan R.O.C.
Chia-Hao Ku , Dept. of Electronic Engineering, Feng Chia University, 100, Wenhwa Road, Seatwen, Taichung Taiwan R.O.C.
pp. 65-68

An efficient and reliable 1.5-way processor by fusion of space and time redundancies (Abstract)

Yasuhiko Nakashima , Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
Kazuhiro Yoshimura , Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
Hajime Shimada , Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
Jun Yao , Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
Ryoji Watanabe , Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
Takashi Nakada , Graduate School of Information Science, Nara Institute of Science and Technology, Ikoma 630-0192, Japan
pp. 69-74

A non-volatile microcontroller with integrated floating-gate transistors (Abstract)

Wing-kei Yu , Cornell University, Ithaca, NY 14853, USA
Edwin Kan , Cornell University, Ithaca, NY 14853, USA
Sung-En Wang , Cornell University, Ithaca, NY 14853, USA
Shantanu Rajwade , Cornell University, Ithaca, NY 14853, USA
G. Edward Suh , Cornell University, Ithaca, NY 14853, USA
Bob Lian , Cornell University, Ithaca, NY 14853, USA
pp. 75-80

Built-in fine resolution clipping with calibration technique for high-speed testing by using wireless testers (Abstract)

Chen-I Chung , Department of Electronic Engineering, Feng-Chia University, Taiwan
Ching-Hwa Cheng , Department of Electronic Engineering, Feng-Chia University, Taiwan
pp. 81-84

Genetic algorithm based approach for segmented testing (Abstract)

Seiji Kajihara , Dept. of CSE, Kyushu Institute of Technology
Sudhakar M Reddy , Dept. of ECE, University of Iowa
Yasuo Sato , Dept. of CSE, Kyushu Institute of Technology
Xiaoxin Fan , Dept. of ECE, University of Iowa
Senling Wang , Dept. of CSE, Kyushu Institute of Technology
pp. 85-90

Model-based fault injection for failure effect analysis -- Evaluation of dependable SRAM for vehicle control units (Abstract)

Yusuke Takeuchi , Graduate School of System Informatics, Kobe University, Kobe, 657-8501 Japan
Shunsuke Okumura , Graduate School of System Informatics, Kobe University, Kobe, 657-8501 Japan
Yasuhiro Ito , Central Research Laboratory, Hitachi, Ltd., Kokubunji, 185-8601 Japan
Shigeru Oho , Central Research Laboratory, Hitachi, Ltd., Kokubunji, 185-8601 Japan
Yohei Nakata , Graduate School of System Informatics, Kobe University, Kobe, 657-8501 Japan
Masahiko Yoshimoto , Graduate School of System Informatics, Kobe University, Kobe, 657-8501 Japan
Yasuo Sugure , Central Research Laboratory, Hitachi, Ltd., Kokubunji, 185-8601 Japan
Hiroshi Kawaguchi , Graduate School of System Informatics, Kobe University, Kobe, 657-8501 Japan
pp. 91-96

The first international workshop on dependability of clouds, data centers and virtual computing environments: DCDV 2011 (Abstract)

Matti Hiltunen , AT&T Labs-Research, Florham Park, NJ, USA
Ji Wang , NLPDP, NUDT, Changsha, P.R. China
Robert Stroud , Center for Softw. Reliability City University, London, UK
Jogesh K. Muppala , Dept. of Comp. Sci. and Eng., HKUST, Hong Kong, PRC
pp. 97-98

CAWRM: A remote mirroring system based on AoDI volume (Abstract)

Fangliang Xu , Nankai-Baidu Joint Lab, College of I.T., Nankai University, Tianjin, China, 300071
Xiaoguang Liu , Nankai-Baidu Joint Lab, College of I.T., Nankai University, Tianjin, China, 300071
Rui Cao , Nankai-Baidu Joint Lab, College of I.T., Nankai University, Tianjin, China, 300071
Gang Wang , Nankai-Baidu Joint Lab, College of I.T., Nankai University, Tianjin, China, 300071
Tingting Qin , Nankai-Baidu Joint Lab, College of I.T., Nankai University, Tianjin, China, 300071
Zhenhai Zhao , Nankai-Baidu Joint Lab, College of I.T., Nankai University, Tianjin, China, 300071
pp. 99-104

An epidemic approach to dependable key-value substrates (Abstract)

Ricardo Vilaca , Universidade do Minho Braga, Portugal
Jose Pereira , Universidade do Minho Braga, Portugal
Miguel Matos , Universidade do Minho Braga, Portugal
Rui Oliveira , Universidade do Minho Braga, Portugal
pp. 105-110

The case for dynamic security solutions in public cloud workflow deployments (Abstract)

Aad van Moorsel , School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK
John C. Mace , School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK
Paul Watson , School of Computing Science & Centre for Cybercrime and Computer Security (CCCS), Newcastle University, Newcastle upon Tyne, NE1 7RU, UK
pp. 111-116

Recursive virtual machines for advanced security mechanisms (Abstract)

Bernhard Kauer , Universidade de Lisboa, Faculdade de Ciências, LaSIGE
Paulo Verissimo , Universidade de Lisboa, Faculdade de Ciências, LaSIGE
Alysson Bessani , Universidade de Lisboa, Faculdade de Ciências, LaSIGE
pp. 117-122

Designing SCIT architecture pattern in a Cloud-based environment (Abstract)

Arun Sood , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030
Quyen L. Nguyen , International Cyber Center and Department of Computer Science, George Mason University, Fairfax, VA 22030
pp. 123-128

Lucy in the sky without diamonds: Stealing confidential data in the cloud (Abstract)

Francisco Rocha , Universidade de Lisboa, Faculdade de Ciências and Carnegie Mellon University - Portugal/USA
Miguel Correia , Instituto Superior Técnico / INESC-ID - Portugal
pp. 129-134

Performance problems online detection in cloud computing systems via analyzing request execution paths (Abstract)

Huaimin Wang , National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, China
Hua Cai , Computing Platform, Alibaba Cloud Computing Company, Hangzhou, China
Qi Zhou , Computing Platform, Alibaba Cloud Computing Company, Hangzhou, China
Gang Yin , National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, China
Tingtao Sun , Computing Platform, Alibaba Cloud Computing Company, Hangzhou, China
Haibo Mi , National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, China
pp. 135-139

Identifying faults in large-scale distributed systems by filtering noisy error logs (Abstract)

Qi Zhou , Computing Platform, Alibaba Cloud Computing Corporation, Hangzhou, P.R. China
Dianxi Shi , National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, P.R. China 410073
Hua Cai , Computing Platform, Alibaba Cloud Computing Corporation, Hangzhou, P.R. China
Huaimin Wang , National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, P.R. China 410073
Tingtao Sun , Computing Platform, Alibaba Cloud Computing Corporation, Hangzhou, P.R. China
Xiang Rao , National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, P.R. China 410073
Zhenbang Chen , National Laboratory for Parallel and Distributed Processing, National University of Defense Technology, Changsha, P.R. China 410073
pp. 140-145

Enhancing application robustness in Infrastructure-as-a-Service clouds (Abstract)

Andres Rodriguez , Department of Computer Engineering, University of Toronto
Cristiana Amza , Department of Computer Engineering, University of Toronto
Madalin Mihailescu , Department of Computer Science, University of Toronto
pp. 146-151

Power-performance trade-offs in IaaS cloud: A scalable analytic approach (Abstract)

Kishor S. Trivedi , Duke University, USA
Rahul Ghosh , Duke University, USA
Vijay K. Naik , IBM T. J. Watson Research Center, USA
pp. 152-157

A virtual resource placement service (Abstract)

Erez Hadad , IBM Haifa Research Center, Haifa, Israel
Ofer Biran , IBM Haifa Research Center, Haifa, Israel
Richard E. Harper , IBM T.J. Watson Research Center, Yorktown Heights, NY, USA
Lorrie Tomek , IBM Systems and Technology Group, Raleigh, NC, USA
pp. 158-163

Integrated end-to-end dependability in the Loris storage stack (Abstract)

Raja Appuswamy , Dept. of Computer Science, Vrije Universiteit, Amsterdam, Netherlands
David C. van Moolenbroek , Dept. of Computer Science, Vrije Universiteit, Amsterdam, Netherlands
Andrew S. Tanenbaum , Dept. of Computer Science, Vrije Universiteit, Amsterdam, Netherlands
pp. 165-170

Scalable Byzantine fault-tolerant storage (Abstract)

Ricardo Padilha , University of Lugano, Switzerland
Fernando Pedone , University of Lugano, Switzerland
pp. 171-175

Lock-free transactional support for large-scale storage systems (Abstract)

Maysam Yabandeh , Yahoo! Research
Flavio Junqueira , Yahoo! Research
Benjamin Reed , Yahoo! Research
pp. 176-181

TO BEnchmark or NOT TO BEnchmark security: That is the question (Abstract)

Afonso Araujo Neto , CISUC, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal
Marco Vieira , CISUC, Department of Informatics Engineering, University of Coimbra, Coimbra, Portugal
pp. 182-187

Automated vulnerability discovery in distributed systems (Abstract)

George Candea , School of Computer and Communication Sciences, EPFL, Lausanne, Switzerland
Radu Banabic , School of Computer and Communication Sciences, EPFL, Lausanne, Switzerland
Rachid Guerraoui , School of Computer and Communication Sciences, EPFL, Lausanne, Switzerland
pp. 188-193

Limiting cache-based side-channel in multi-tenant cloud using dynamic page coloring (Abstract)

Haibo Chen , Parallel Processing Institute, Fudan University
Binyu Zang , Parallel Processing Institute, Fudan University
Xiang Song , Parallel Processing Institute, Fudan University
Jicheng Shi , Parallel Processing Institute, Fudan University
pp. 194-199

Exterminating bugs via collective information recycling (Abstract)

George Candea , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
pp. 200-204

Platform-wide deadlock immunity for mobile phones (Abstract)

George Candea , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
Horatiu Jula , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
Thomas Rensch , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Lausanne, Switzerland
pp. 205-210

Enabling sophisticated analyses of ×86 binaries with RevGen (Abstract)

Vitaly Chipounov , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
George Candea , School of Computer and Communication Sciences, École Polytechnique Fédérale de Lausanne (EPFL), Switzerland
pp. 211-216

Secure MMU: Architectural support for memory isolation among virtual machines (Abstract)

Seongwook Jin , Computer Science, KAIST (Korea Adanced Institute of Science and Technology)
Jaehyuk Huh , Computer Science, KAIST (Korea Adanced Institute of Science and Technology)
pp. 217-222

Transactional memory for dependable embedded systems (Abstract)

Pascal Felber , University of Neuchâtel Neuchâtel, Switzerland
Christof Fetzer , Dresden University of Technology, Dresden, Germany
pp. 223-227

WOSD 2011: The first international workshop on open systems dependability (Abstract)

Kimio Kuramitsu , Yokohama National, University, Japan
Jean-Charles Fabre , LAAS_CNRS Toulouse, France
Karama Kanoun , LAAS_CNRS Toulouse, France
Mario Tokoro , Sony CSL, Inc., Tokyo, Japan
pp. 228-229

On finding vestiges of Internet backbone failures for optimizing wide area data replication (Abstract)

Hirotake Abe , Cybermedia Center, Osaka University, Ibaraki, Osaka 567-0047 Japan
Hirotaka Moriya , Graduate School of Engineering, Toyohashi University of Technology, Toyohashi, Aichi 441-8580 Japan
Kyoji Umemura , Department of Computer Science and Engineering, Toyohashi University of Technology, Toyohashi, Aichi 441-8580 Japan
pp. 230-233

Performance modeling and benchmarking of bank intermediary business on high-performance fault-tolerant computers (Abstract)

Peng Zhou , School of computer Science and technology, Harbin Institute of Technology, Harbin, China
Long Jia , School of computer Science and technology, Harbin Institute of Technology, Harbin, China
Haiying Zhou , School of computer Science and technology, Harbin Institute of Technology, Harbin, China
Decheng Zuo , School of computer Science and technology, Harbin Institute of Technology, Harbin, China
Zhan Zhang , School of computer Science and technology, Harbin Institute of Technology, Harbin, China
Bo Li , School of computer Science and technology, Harbin Institute of Technology, Harbin, China
pp. 234-239

Composite dependability modeling for in-vehicle networks (Abstract)

Mutsumi Abe , Toyota InfoTecnology Center, Co., Ltd. 6-6-20 Akasaka, Minato-ku, Tokyo 107-0052 Japan
Shin'ichi Shiraishi , Toyota InfoTecnology Center, Co., Ltd. 6-6-20 Akasaka, Minato-ku, Tokyo 107-0052 Japan
Tadashi Dohi , Department of Information Engineering, Graduate School of Engineering, Hiroshima University, 1-4-1 Kagamiyama, Higashi-Hiroshima 739-8527 Japan
Hiroyuki Okamura , Department of Information Engineering, Graduate School of Engineering, Hiroshima University, 1-4-1 Kagamiyama, Higashi-Hiroshima 739-8527 Japan
pp. 240-245

Architecting resilient computing systems: Overall approach and open issues (Abstract)

Jean-Charles Fabre , CNRS; LAAS; 7 avenue du colonel Roche, F-31077 Toulouse Cedex 4, France
pp. 246-247

Fault model of foreign function interface across different domains (Abstract)

Kimio Kuramitsu , Yokohama National University, Japan
Shinpei Nakata , Dept. of Electrical and Computer Engineering, Yokohama National University, Japan
Midori Sugaya , Yokohama National University, Japan
pp. 248-253

Enforcing dependable operations by model checking a visualization layer (Abstract)

Shuichi Oikawa , Department of Computer Science, University of Tsukuba, Tsukuba, Ibaraki, Japan
pp. 254-256

Third workshop on proactive failure avoidance, recovery, and maintenance (PFARM) (Abstract)

Kishor S. Trivedi , Duke University, NC USA
Felix Salfner , Humboldt-Universität zu Berlin, Germany
Miroslaw Malek , Humboldt-Universität zu Berlin, Germany
pp. 257-258

Practical online failure prediction for Blue Gene/P: Period-based vs event-driven (Abstract)

Zhiling Lan , Department of Computer Science, Illinois Institute of Technology
Ziming Zheng , Department of Computer Science, Illinois Institute of Technology
Susan Coghlan , Leadership Computing Facility, Argonne National Laboratory
Li Yu , Department of Computer Science, Illinois Institute of Technology
pp. 259-264

Detecting resource leaks through dynamical mining of resource usage patterns (Abstract)

Huxing Zhang , School of Software, Shanghai Jiao Tong University, Shanghai, 200240, China
Kingsum Chow , Intel Corporation
XueZhi Xing , Intel Corporation
Zhidong Yu , Intel Corporation
Gang Wu , School of Software, Shanghai Jiao Tong University, Shanghai, 200240, China
pp. 265-270

DynaPlan: Resource placement for application-level clustering (Abstract)

Ravi Shankar , IBM Systems and Technology Group, Poughkeepsie, NY, USA
David Frank , IBM T.J. Watson Research Center, Yorktown Heights, NY, USA
Kyung Dong Ryu , IBM T.J. Watson Research Center, Yorktown Heights, NY, USA
Lisa Spainhower , IBM Systems and Technology Group, Poughkeepsie, NY, USA
Tom Weaver , IBM Systems and Technology Group, Poughkeepsie, NY, USA
Richard E. Harper , IBM T.J. Watson Research Center, Yorktown Heights, NY, USA
pp. 271-277

5th International workshop on adaptive and dependable mobile ubiquitous systems ADAMUS 2011 (Abstract)

Vincenzo De Florio , Universiteit Antwerpen/PATS & IBBT, Belgium
Domenico Cotroneo , Dipartimento di Informatica e Sistemistica, Università di Napoli Federico II, Italy
pp. 278-279

Adaptive collaborative sensing using mobile phones and stationary sensors (Abstract)

Junjie Xiong , Department of Computer Science and Engineering, Chinese University of Hong Kong, China
Edith C.-H. Ngai , Department of Information Technology, Uppsala University, Sweden
pp. 280-285

Enabling on-line dependability assessment of Android smart phones (Abstract)

Marcello Cinque , Dipartimento di Informatica e Sistemistica, Universita' degli Studi di Napoli Federico II, Via Claudio 21, 80125 - Naples, Italy
pp. 286-291

A novel design of node-disjoint multi-path QoS routing in multi-hop ad hoc networks (Abstract)

Wen-Hsiung Liu , Department of Air Transportation Management, Aletheia University, Tainan, Taiwan
Szu-Lin Su , Department of Electronic Engineering, National Cheng Kung University, Tainan, Taiwan
Yi-Wen Su , Department of Electronic Engineering, National Cheng Kung University, Tainan, Taiwan
Chien-Sheng Chen , Department of Information Management, Tainan, University of Technology, Tainan, Taiwan
pp. 292-296

Privacy leakage in two-party group nearest neighbor queries (Abstract)

Yan Huang , Department of Computer Science and Engineering, University of North Texas, Denton, Texas
Cai Chen , Department of Computer Science and Engineering, University of North Texas, Denton, Texas
pp. 297-300
94 ms
(Ver )