Sciweavers

DSN
2008
IEEE
13 years 11 months ago
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)
This workshop summary gives a brief overview of the workshop on “Resilience Assessment and Dependability Benchmarking” held in conjunction with the 38th IEEE/IFIP Internationa...
Andrea Bondavalli, István Majzik, Aad P. A....
DSN
2008
IEEE
13 years 11 months ago
Trace-based microarchitecture-level diagnosis of permanent hardware faults
As devices continue to scale, future shipped hardware will likely fail due to in-the-field hardware faults. As traditional redundancy-based hardware reliability solutions that ta...
Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sah...
DSN
2008
IEEE
13 years 11 months ago
AGIS: Towards automatic generation of infection signatures
An important yet largely uncharted problem in malware defense is how to automate generation of infection signatures for detecting compromised systems, i.e., signatures that charac...
Zhuowei Li, XiaoFeng Wang, Zhenkai Liang, Michael ...
DSN
2008
IEEE
13 years 11 months ago
Architectural dependability evaluation with Arcade
This paper proposes a formally well-rooted and extensible framework for dependability evaluation: Arcade (architectural dependability evaluation). It has been designed to combine ...
Hichem Boudali, Pepijn Crouzen, Boudewijn R. Haver...
DSN
2008
IEEE
13 years 11 months ago
A robust and lightweight stable leader election service for dynamic systems
We describe the implementation and experimental evaluation of a fault-tolerant leader election service for dynamic systems. Intuitively, distributed applications can use this serv...
Nicolas Schiper, Sam Toueg
DSN
2008
IEEE
13 years 11 months ago
Security through redundant data diversity
Unlike other diversity-based approaches, N-variant systems thwart attacks without requiring secrets. Instead, they use redundancy (to require an attacker to simultaneously comprom...
Anh Nguyen-Tuong, David Evans, John C. Knight, Ben...
DSN
2008
IEEE
13 years 11 months ago
Scheduling for performance and availability in systems with temporal dependent workloads
Temporal locality in workloads creates conditions in which a server, in order to remain available, should quickly process bursts of requests with large service requirements. In th...
Ningfang Mi, Giuliano Casale, Evgenia Smirni
DSN
2008
IEEE
13 years 11 months ago
A recurrence-relation-based reward model for performability evaluation of embedded systems
Embedded systems for closed-loop applications often behave as discrete-time semi-Markov processes (DTSMPs). Performability measures most meaningful to iterative embedded systems, ...
Ann T. Tai, Kam S. Tso, William H. Sanders
DSN
2008
IEEE
13 years 11 months ago
Byzantine replication under attack
Existing Byzantine-resilient replication protocols satisfy two standard correctness criteria, safety and liveness, in the presence of Byzantine faults. In practice, however, fault...
Yair Amir, Brian A. Coan, Jonathan Kirsch, John La...
DSN
2008
IEEE
13 years 11 months ago
Automated duplicate detection for bug tracking systems
Bug tracking systems are important tools that guide the maintenance activities of software developers. The utility of these systems is hampered by an excessive number of duplicate...
Nicholas Jalbert, Westley Weimer