The Community for Technology Leaders
Green Image
Issue No. 04 - July/August (vol. 8)
ISSN: 1545-5971

A New Diskless Checkpointing Approach for Multiple Processor Failures (Abstract)

Ge-Ming Chiu , National Taiwan University of Science and Technology, Taipei
Jane-Ferng Chiu , Tungnan University, Taipei
pp. 481-493

Anomaly Detection in Network Traffic Based on Statistical Inference and \alpha-Stable Modeling (Abstract)

Federico Simmross-Wattenberg , Universidad de Valladolid, Valladolid
Juan Ignacio Asensio-Pérez , University of Valladolid, Valladolid
Pablo Casaseca-de-la-Higuera , University of Valladolid, Valladolid
Marcos Martín-Fernández , University of Valladolid, Valladolid
Ioannis A. Dimitriadis , University of Valladolid, Valladolid
Carlos Alberola-López , University of Valladolid, Valladolid
pp. 494-509

Efficient Fault Detection and Diagnosis in Complex Software Systems with Information-Theoretic Monitoring (Abstract)

Miao Jiang , University of Waterloo, Waterloo
Mohammad A. Munawar , University of Waterloo, Waterloo
Thomas Reidemeister , University of Waterloo, Waterloo
Paul A.S. Ward , University of Waterloo, Waterloo
pp. 510-522

ELMO: Energy Aware Local Monitoring in Sensor Networks (Abstract)

Issa M. Khalil , United Arab Emirates University, UAE, Al Ain
pp. 523-536

Modeling and Mitigating Transient Errors in Logic Circuits (Abstract)

Ilia Polian , Albert-Ludwigs-University of Freiburg, Freiburg
John P. Hayes , University of Michigan, Ann Arbor
Sudhakar M. Reddy , University of Iowa, Iowa City
Bernd Becker , Albert-Ludwigs-University Albert-Ludwigs-University, Freibutg
pp. 537-547

On Ultralightweight RFID Authentication Protocols (Abstract)

Paolo D'Arco , Università degli Studi di Salerno, Fisciano
Alfredo De Santis , Università degli Studi di Salerno, Fisciano
pp. 548-563

Prime: Byzantine Replication under Attack (Abstract)

Yair Amir , Johns Hopkins University, Baltimore
Brian Coan , Telcordia Technologies, Piscataway
Jonathan Kirsch , Johns Hopkins University, Baltimore
John Lane , Johns Hopkins University, Baltimore
pp. 564-577

Privacy-Preserving Updates to Anonymous and Confidential Databases (Abstract)

Alberto Trombetta , University of Insubria, Varese
Wei Jiang , Missouri Science and Technology University, Rolla
Elisa Bertino , Purdue University, West Lafayette
Lorenzo Bossi , University of Insubria, Varese
pp. 578-587

Runtime Defense against Code Injection Attacks Using Replicated Execution (Abstract)

Babak Salamat , University of California, Irvine, Irvine
Todd Jackson , University of California, Irvine, Irvine
Gregor Wagner , University of California, Irvine, Irvine
Christian Wimmer , University of California, Irvine, Irvine
Michael Franz , University of California, Irvine, Irvine
pp. 588-601

Self-Healing Control Flow Protection in Sensor Applications (Abstract)

Christopher Ferguson , Texas State University - San Marcos, San Marcos
Qijun Gu , Texas State University - San Marcos, San Marcos
pp. 602-616
Short Papers

Dynamics of Malware Spread in Decentralized Peer-to-Peer Networks (Abstract)

Krishna K. Ramachandran , Rensselaer Polytechnic Institute, Troy
Biplab Sikdar , Rensselaer Polytechnic Institute, Troy
pp. 617-623
88 ms
(Ver 3.3 (11022016))