default search action
DSN 2010: Chicago, IL, USA
- IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2010), Chicago, Illinois, USA, June 28 - July 1, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-7729-6
1st Workshop on Fault-Tolerance for HPC at Extreme Scale (FTXS)
Session 1
- James Brandt, Frank Chen, Vincent De Sapio, Ann C. Gentile, Jackson R. Mayo, Philippe P. Pébay, Diana C. Roe, David C. Thompson, Matthew Wong:
Quantifying effectiveness of failure prediction and response in HPC systems: Methodology and example. 2-7
Session 2
- Joshua Thompson, David W. Dreisigmeyer, Terry Jones, Michael Kirby, Joshua Ladd:
Accurate fault prediction of BlueGene/P RAS logs via geometric reduction. 8-14 - Ziming Zheng, Zhiling Lan, Rinku Gupta, Susan Coghlan, Peter H. Beckman:
A practical failure prediction with location and lead time for Blue Gene/P. 15-22
Session 3
- Justin M. Wozniak, Seung Woo Son, Robert B. Ross:
Distributed object storage rebuild analysis via simulation with GOBS. 23-28 - Rolf Riesen, Kurt B. Ferreira, Jon Stearley:
See applications run and throughput jump: The case for redundant computing in HPC. 29-34
2nd Workshop on Proactive Failure Avoidance, Recovery, and Maintenance (PFARM)
Session 1: Design and Theory
- Kashif Hameed, Rob Williams, Jim Smith:
Aspect oriented software fault tolerance and analytically redundant design framework. 38-44 - Nidhal Mahmud, Yiannis Papadopoulos, Martin Walker:
A translation of State Machines to temporal fault trees. 45-51
Session 2: Monitoring and Alerting
- Adetokunbo Makanju, Nur Zincir-Heywood, Evangelos E. Milios:
Fast entropy based alert detection in super computer logs. 52-58 - Gergely János Paljak, Zoltán Égel, Dániel Tóth, Imre Kocsis, Tamás Kovácsházy, András Pataricza:
Qualitative performance control in supervised IT infrastructures. 59-65 - Domenico Cotroneo, Domenico Di Leo, Roberto Natella:
Adaptive monitoring in microkernel OSs. 66-72
Session 3: Modeling for Proactive Fault Management
- Leila Zouaghi, Achim Wagner, Essam Badreddin:
Hybrid, recursive, nested monitoring of control systems using Petri nets and particle filters. 73-79 - Robert S. Hanmer, Veena B. Mendiratta:
Rejuvenation with workload migration. 80-85
Session 4: Virtualization
- Kenichi Kourai:
CacheMind: Fast performance recovery using a virtual machine monitor. 86-92
4th Workshop on Dependable and Secure Nanocomputing (WDSN)
Session 1: Opening and Special Focus on Testing Issues for Nanoelectronics
- Bernd Becker, Sybille Hellebrand, Ilia Polian, Bernd Straube, Wolfgang Vermeiren, Hans-Joachim Wunderlich:
Massive statistical process variations: A grand challenge for testing nanoelectronic circuits. 95-100
Session 2: Soft Errors and Intermittent Faults
- Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan:
Towards understanding the effects of intermittent hardware faults on programs. 101-106 - Warin Sootkaneung, Kewal K. Saluja:
Gate input reconfiguration for combating soft errors in combinational circuits. 107-112 - Oscar Bailan, Umberto Rossi, Anne Wantens, Jean-Marc Daveau, Salvatore Nappi, Philippe Roche:
Verification of soft error detection mechanism through fault injection on hardware emulation platform. 113-118
Session 3: Fault-Tolerant Architectures and Resilience
- Masashi Imai, Tomohide Nagai, Takashi Nanya:
Pair and swap: An approach to graceful degradation for dependable chip multiprocessors. 119-124 - Thomas Panhofer, Werner Friesenbichler, Andreas Steininger:
Implementation of self-healing asynchronous circuits at the example of a video-processing algorithm. 125-130 - Vladimir Pasca, Lorena Anghel, Mounir Benabdenbi:
Fault tolerant communication in 3D integrated systems. 131-135
Session 4: Robustness Enhancement and Trust Management
- Markus Ferringer:
Towards self-timed logic in the Time-Triggered Protocol. 136-141 - Thilo Pionteck, Werner Brockmann:
A concept of a trust management architecture to increase the robustness of nano age devices. 142-147
4th Workshop on Recent Advances in Intrusion-Tollerant Systems (WRAITS)
Session 1: Dtetection Analysis
- Tânia Basso, Plinio Cesar Simoes Fernandes, Mário Jino, Regina Moraes:
Analysis of the effect of Java software faults on security vulnerabilities and their detection by commercial web vulnerability scanner tool. 150-155 - O. Patrick Kreidl:
Analysis of a Markov decision process model for intrusion tolerance. 156-161 - Bryan Dixon, Shivakant Mishra:
On rootkit and malware detection in smartphones. 162-163
Session 2: Systems and Architecture
- Ajay Nagarajan, Arun Sood:
SCIT and IDS architectures for reduced data ex-filtration. 164-169 - Carlos Silva, Paulo Sousa, Paulo Veríssimo:
RAVE: Replicated antivirus engine. 170-175 - Quyen L. Nguyen, Arun Sood:
Realizing S-Reliability for services via recovery-driven intrusion tolerance mechanism. 176-181
Session 3: Evaluation, Assessment and Governance
- Dylan Clarke, Paul D. Ezhilchelvan:
Assessing the attack resilience capabilities of a fortified primary-backup system. 182-187 - Yih Huang, Anup K. Ghosh, Tom Bracewell, Brian Mastropietro:
A security evaluation of a novel resilient web serving architecture: Lessons learned through industry/academia collaboration. 188-193 - Melvin Greer:
Survivability and information assurance in the cloud. 194-195
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.