default search action
29. SRDS 2010: New Delhi, Punjab, India
- 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31 - November 3, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-4250-8
Security
- Santhosh Muthyapu, Sanjay Kumar Madria, Mark Linderman:
PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer Networks. 1-10 - Roberto Di Pietro, Gabriele Oligeri, Claudio Soriente, Gene Tsudik:
Securing Mobile Unattended WSNs against a Mobile Adversary. 11-20 - Jesus Friginal, David de Andrés, Juan-Carlos Ruiz-Garcia, Pedro J. Gil:
Attack Injection to Support the Evaluation of Ad Hoc Networks. 21-29
Mobile Networks
- Yadu Kishore K, Ashish Tiwari, Omprakash G. Kakde:
Optimization Based Topology Control for Wireless Ad Hoc Networks to Meet QoS Requirements. 30-36 - Paulo Jesus, Carlos Baquero, Paulo Sérgio Almeida:
Fault-Tolerant Aggregation for Dynamic Networks. 37-43 - Arshad Jhumka:
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks. 44-53 - Rajesh Krishna Panta, Madalina Vintila, Saurabh Bagchi:
Fixed Cost Maintenance for Information Dissemination in Wireless Sensor Networks. 54-63 - Dan Hirsch, Sanjay Madria:
A Resource-Efficient Adaptive Caching Scheme for Mobile Ad Hoc Networks. 64-71
Virtualization/SOA
- Guofu Xiang, Hai Jin, Deqing Zou, Xinwen Zhang, Sha Wen, Feng Zhao:
VMDriver: A Driver-Based Monitoring Mechanism for Virtualization. 72-81 - Sina Bahram, Xuxian Jiang, Zhi Wang, Mike Grace, Jinku Li, Deepa Srinivasan, Junghwan Rhee, Dongyan Xu:
DKSM: Subverting Virtual Machine Introspection for Fun and Profit. 82-91 - Anatoliy Gorbenko, Vyacheslav S. Kharchenko, Seyran Mamutov, Olga Tarasyuk, Yuhui Chen, Alexander B. Romanovsky:
Real Distribution of Response Time Instability in Service-Oriented Architecture. 92-99 - Bin Xin, Patrick Th. Eugster, Xiangyu Zhang, Jinlin Yang:
Lightweight Task Graph Inference for Distributed Applications. 100-110
Monitoring
- Haifeng Chen, Guofei Jiang, Hui Zhang, Kenji Yoshihira:
A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems. 111-120 - Amita Devaraj, Kesari Mishra, Kishor S. Trivedi:
Uncertainty Propagation in Analytic Availability Models. 121-130 - Raul Barbosa:
Monitoring Local Progress with Watchdog Timers Deduced from Global Properties. 131-140
Fault Detection/Diagnosis
- Monica Dixit, António Casimiro:
Adaptare-FD: A Dependability-Oriented Adaptive Failure Detector. 141-147 - Pin Zhou, Binny S. Gill, Wendy Belluomini, Avani Wildani:
GAUL: Gestalt Analysis of Unstructured Logs for Diagnosing Recurring Problems in Large Enterprise Storage Systems. 148-159 - Haifeng Chen, Guofei Jiang, Kenji Yoshihira, Akhilesh Saxena:
Invariants Based Failure Diagnosis in Distributed Computing Systems. 160-166 - Dipu John, Pawan Prakash, Ramana Rao Kompella, Ranveer Chandra:
Shedding Light on Enterprise Network Failures Using Spotlight. 167-176
Cloud and Middleware
- Pelin Angin, Bharat K. Bhargava, Rohit Ranchal, Noopur Singh, Mark Linderman, Lotfi Ben Othmane, Leszek Lilien:
An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing. 177-183 - Zibin Zheng, Yilei Zhang, Michael R. Lyu:
CloudRank: A QoS-Driven Component Ranking Framework for Cloud Computing. 184-193 - Yunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh B. Bastani:
Secure, Dependable, and High Performance Cloud Storage. 194-203 - Lásaro J. Camargos, Fernando Pedone, Alex Pilchin, Marcin Wieloch:
On-Demand Recovery in Middleware Storage Systems. 204-213
Data Management
- Nicolas Schiper, Pierre Sutra, Fernando Pedone:
P-Store: Genuine Partial Replication in Wide Area Networks. 214-224 - Sonia Ben Mokhtar, Alessio Pace, Vivien Quéma:
FireSpam: Spam Resilient Gossiping in the BAR Model. 225-234 - Stefania Costache, Thomas Ropars, Christine Morin:
Semias: Self-Healing Active Replication on Top of a Structured Peer-to-Peer Overlay. 235-244
Testing/Assessment
- Andrea Bondavalli, Francesco Brancati, Andrea Ceccarelli, Michele Vadursi:
Experimental Validation of a Synchronization Uncertainty-Aware Software Clock. 245-254 - Nuno Laranjeiro, Rui André Oliveira, Marco Vieira:
Applying Text Classification Algorithms in Web Services Robustness Testing. 255-264 - Salvatore Distefano, Francesco Longo, Marco Scarpa:
Availability Assessment of HA Standby Redundant Clusters. 265-274
Algorithms
- Raphael Marcos Menderico, Islene Calciolari Garcia:
Diskless Checkpointing with Rollback-Dependency Trackability. 275-281 - Fatemeh Borran, Martin Hutle, Nuno Santos, André Schiper:
Swift Algorithms for Repeated Consensus. 282-292 - Mário F. S. Ferreira, João Leitão, Luís E. T. Rodrigues:
Thicket: A Protocol for Building and Maintaining Multiple Trees in a P2P Overlay. 293-302
C-EMNs 2010: Workshop on Issues in Computing over Emerging Mobile Networks
- Bo Xu, Mark Linderman, Sanjay Madria, Ouri Wolfson:
A Tactical Information Management Middleware for Resource-Constrained Mobile P2P Networks. 303-307 - Jason Barnes, Vamsi Paruchuri, Sriram Chellappan:
On Optimizing Traffic Signal Phase Ordering in Road Networks. 308-312 - Rolando Martins, Priya Narasimhan, Luís M. B. Lopes, Fernando M. A. Silva:
Lightweight Fault-Tolerance for Peer-to-Peer Middleware. 313-317 - Behdis Eslamnour, Sarangapani Jagannathan:
Adaptive Routing Scheme for Emerging Wireless Ad Hoc Networks. 318-322 - Norman Ahmed, Mark Linderman, Jason Bryant:
Towards Mobile Data Streaming in Service Oriented Architecture. 323-327
RACOS 2010: Workshop on Resilience Assessment of Complex Systems
- Francesco Brancati, Andrea Bondavalli:
Practical Aspects in Analyzing and Sharing the Results of Experimental Evaluation. 328-332 - Beng Heng Ng, Xin Hu, Atul Prakash:
A Study on Latent Vulnerabilities. 333-337 - Flavio Lombardi, Roberto Di Pietro, Claudio Soriente:
CReW: Cloud Resilience for Windows Guests through Monitored Virtualization. 338-342 - Rahul Ghosh, Francesco Longo, Vijay K. Naik, Kishor S. Trivedi:
Quantifying Resiliency of IaaS Cloud. 343-347 - Raquel Almeida, Henrique Madeira, Marco Vieira:
Benchmarking the Resilience of Self-Adaptive Systems: A New Research Challenge. 348-352
DNCMS 2010: Workshop on Dependable Network Computing and Mobile Systems
- Timo Lindhorst, Georg Lukas, Edgar Nett, Michael Mock:
Data-Mining-Based Link Failure Detection for Wireless Mesh Networks. 353-357 - Luis Marques, António Casimiro:
Data Validity and Dependable Perception in Networked Sensor-Based Systems. 358-362 - Ruchika Mehresh, Shambhu J. Upadhyaya, Kevin A. Kwiat:
A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation. 363-367 - Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othmane, Leszek Lilien, Anya Kim, Myong H. Kang, Mark Linderman:
Protection of Identity Information in Cloud Computing without Trusted Third Party. 368-372
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.