default search action
31. SRDS 2012: Irvine, CA, USA
- IEEE 31st Symposium on Reliable Distributed Systems, SRDS 2012, Irvine, CA, USA, October 8-11, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2397-0
- Xiaowei Li, Yuan Xue, Bradley A. Malin:
Detecting Anomalous User Behaviors in Workflow-Driven Web Applications. 1-10 - Daniel Germanus, Robert Langenberg, Abdelmajid Khelil, Neeraj Suri:
Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks. 11-20 - Amit Sangroya, Damián Serrano, Sara Bouchenak:
Benchmarking Dependability of MapReduce Systems. 21-30 - Pengsu Cheng, Lingyu Wang, Sushil Jajodia, Anoop Singhal:
Aggregating CVSS Base Scores for Semantics-Rich Network Security Metrics. 31-40 - Amir R. Khakpour, Alex X. Liu:
First Step toward Cloud-Based Firewalling. 41-50 - Henry C. H. Chen, Patrick P. C. Lee:
Enabling Data Integrity Protection in Regenerating-Coding-Based Cloud Storage. 51-60 - Xi Chen, Xue Liu, Shengquan Wang, Xiao-Wen Chang:
TailCon: Power-Minimizing Tail Percentile Control of Response Time in Server Clusters. 61-70 - Xiaoyu Fu, Rui Ren, Jianfeng Zhan, Wei Zhou, Zhen Jia, Gang Lu:
LogMaster: Mining Event Correlations in Logs of Large-Scale Cluster Systems. 71-80 - Daniele Sciascia, Fernando Pedone:
RAM-DUR: In-Memory Deferred Update Replication. 81-90 - Sebastiano Peluso, Joao Fernandes, Paolo Romano, Francesco Quaglia, Luís E. T. Rodrigues:
SPECULA: Speculative Replication of Software Transactional Memory. 91-100 - Pawel T. Wojciechowski, Tadeusz Kobus, Maciej Kokocinski:
Model-Driven Comparison of State-Machine-Based and Deferred-Update Replication Schemes. 101-110 - Martin Biely, Zarko Milosevic, Nuno Santos, André Schiper:
S-Paxos: Offloading the Leader for High Throughput State Machine Replication. 111-120 - Dylan Clarke, Paul D. Ezhilchelvan:
FORTRESS: Adding Intrusion-Resilience to Primary-Backup Server Systems. 121-130 - Andre Oriani, Islene C. Garcia:
From Backup to Hot Standby: High Availability for HDFS. 131-140 - Xiaoyan Yin, Javier Alonso, Fumio Machida, Ermeson C. Andrade, Kishor S. Trivedi:
Availability Modeling and Analysis for Data Backup and Restore Operations. 141-150 - Anne-Marie Kermarrec, Erwan Le Merrer, Gilles Straub, Alexandre van Kempen:
Availability-Based Methods for Distributed Storage Systems. 151-160 - Bruno Vavala, Nuno Ferreira Neves:
Robust and Speculative Byzantine Randomized Consensus with Constant Time Complexity in Normal Conditions. 161-170 - Jingqiang Lin, Bo Luo, Jiwu Jing, Xiaokun Zhang:
GRADE: Graceful Degradation in Byzantine Quorum Systems. 171-180 - Sébastien Gambs, Rachid Guerraoui, Hamza Harkous, Florian Huc, Anne-Marie Kermarrec:
Scalable and Secure Polling in Dynamic Distributed Networks. 181-190 - Olivier Heen, Erwan Le Merrer, Christoph Neumann, Stéphane Onno:
Distributed and Private Group Management. 191-200 - Andrea Ceccarelli, Andrea Bondavalli, Francesco Brancati, Ernesto La Mattina:
Improving Security of Internet Services through Continuous and Transparent User Identity Verification. 201-206 - Zhang Fu, Marina Papatriantafilou:
Off the Wall: Lightweight Distributed Filtering to Mitigate Distributed Denial of Service Attacks. 207-212 - Roberto Di Pietro, Fabio Martinelli, Nino Vincenzo Verde:
Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions. 213-218 - Kossi Tiassou, Karama Kanoun, Mohamed Kaâniche, Christel Seguin, Chris Papadopoulos:
Impact of Operational Reliability Re-assessment during Aircraft Missions. 219-224 - Yiyan Lin, Sandeep S. Kulkarni:
Automatic Generation of Graceful Programs. 225-230 - Thomas Hinterhofer, Hans-Peter Schwefel, Slobodanka Tomic:
RD2: Resilient Dynamic Desynchronization for TDMA over Lossy Networks. 231-236 - Jerzy Brzezinski, Michal Kalewski, Jacek Kobusinski:
Providing Uniform Reliable Broadcast Delivery for Mobile Ad Hoc Networks with MANET Liveness Property. 237-242 - Petr Novotný, Alexander L. Wolf, Bong Jun Ko:
Fault Localization in MANET-Hosted Service-Based Systems. 243-248 - Kousaburo Hari, Tadashi Dohi, Kishor S. Trivedi:
Fast Optimization Algorithms for Designing Cellular Networks with Guard Channel. 249-254 - Zhen Jiang, Jie Wu, Minyi Guo, Zhenping Zhao, Donghong Wu:
A Quick and Reliable Routing for Infrastructure Surveillance with Wireless Sensor Networks. 255-260 - Vinit Padhye, Anand Tripathi:
Causally Coordinated Snapshot Isolation for Geographically Replicated Data. 261-266 - Kyungbaek Kim, Ye Zhao, Nalini Venkatasubramanian:
GSFord: Towards a Reliable Geo-social Notification System. 267-272 - Qiang Fu, Jian-Guang Lou, Qingwei Lin, Rui Ding, Dongmei Zhang, Zihao Ye, Tao Xie:
Performance Issue Diagnosis for Online Service Systems. 273-278 - Mehdi Azarmi, Bharat K. Bhargava, Pelin Angin, Rohit Ranchal, Norman Ahmed, Asher Sinclair, Mark Linderman, Lotfi Ben Othmane:
An End-to-End Security Auditing Approach for Service Oriented Architectures. 279-284 - Ioannis Boutsis, Vana Kalogeraki:
RADAR: Adaptive Rate Allocation in Distributed Stream Processing Systems under Bursty Workloads. 285-290 - Rajesh Krishna Panta, James A. Pelletier, Gregg T. Vesonder:
Efficient Asynchronous Low Power Listening for Wireless Sensor Networks. 291-300 - Md. Zakirul Alam Bhuiyan, Jiannong Cao, Guojun Wang, Xuefeng Liu:
Energy-Efficient and Fault-Tolerant Structural Health Monitoring in Wireless Sensor Networks. 301-310 - Mingjun Xiao, Jie Wu, Liusheng Huang:
Time-Sensitive Utility-Based Routing in Duty-Cycle Wireless Sensor Networks with Unreliable Links. 311-320 - Roy Friedman, Alex Kogan:
Efficient and Reliable Multicast in Multi-radio Networks. 321-330 - Ruijing Hu, Julien Sopena, Luciana Arantes, Pierre Sens, Isabelle M. Demeure:
Fair Comparison of Gossip Algorithms over Large-Scale Random Topologies. 331-340 - Thomas Meyer, Christian F. Tschudin:
A Theory of Packet Flows Based on Law-of-Mass-Action Scheduling. 341-351 - Ngoc Minh Do, Cheng-Hsin Hsu, Nalini Venkatasubramanian:
HybCAST: Rich Content Dissemination in Hybrid Cellular and 802.11 Ad Hoc Networks. 352-361 - Akshay Dabholkar, Abhishek Dubey, Aniruddha S. Gokhale, Gabor Karsai, Nagabhushan Mahadevan:
Reliable Distributed Real-Time and Embedded Systems through Safe Middleware Adaptation. 362-371 - James R. Edmondson, Aniruddha S. Gokhale, Douglas C. Schmidt:
Approximation Techniques for Maintaining Real-Time Deployments Informed by User-Provided Dataflows within a Cloud. 372-377 - Qingyang Wang, Yasuhiko Kanemasa, Jack Li, Deepal Jayasinghe, Motoyuki Kawaba, Calton Pu:
Response Time Reliability in Cloud Environments: An Empirical Study of n-Tier Applications at High Resource Utilization. 378-383 - Rossana Motta, Joseph Pasquale:
A Quantitative Comparison of Reactive and Proactive Replicated Storage Systems. 384-389 - Mohammad Iftekhar Husain, Steve Uurtamo, Steven Y. Ko, Atri Rudra, Ramalingam Sridhar:
PGV: A Storage Enforcing Remote Verification Scheme. 390-395 - Husanbir Singh Pannu, Jianguo Liu, Song Fu:
AAD: Adaptive Anomaly Detection System for Cloud Computing Infrastructures. 396-397 - Olivier Baldellon, Jean-Charles Fabre, Matthieu Roy:
Distributed Monitoring of Temporal System Properties Using Petri Nets. 398-399 - Prithviraj Patil, Aniruddha S. Gokhale:
Improving the Reliability and Availability of Vehicular Communications Using Voronoi Diagram-Based Placement of Road Side Units. 400-401 - Marta Palanques, Roberto Di Pietro, Carlos del Ojo, Marcel Malet, Miquel Marino, Toni Felguera:
Secure Cloud Browser: Model and Architecture to Support Secure WEB Navigation. 402-403 - Christian Inzinger, Waldemar Hummer, Benjamin Satzger, Philipp Leitner, Schahram Dustdar:
Towards Identifying Root Causes of Faults in Service-Based Applications. 404-405 - Rui Jiang, Yuan Xing:
Anonymous On-Demand Routing and Secure Checking of Traffic Forwarding for Mobile Ad Hoc Networks. 406-411 - Chetan Jaiswal, Vijay Kumar:
Pairwise Key Generation Scheme for Cellular Mobile Communication. 412-417 - Harsha Nagarajaiah, Shambhu J. Upadhyaya, Vinodh Gopal:
Data De-duplication and Event Processing for Security Applications on an Embedded Processor. 418-423 - Indrakshi Ray, Sanjay Kumar Madria, Mark Linderman:
Query Plan Execution in a Heterogeneous Stream Management System for Situational Awareness. 424-429 - Ruchith Fernando, Bharat K. Bhargava, Mark Linderman:
Private Anonymous Messaging. 430-435 - Steve Jiekak, Anne-Marie Kermarrec, Nicolas Le Scouarnec, Gilles Straub, Alexandre van Kempen:
Regenerating Codes: A System Perspective. 436-441 - Moussa Taifi:
Banking on Decoupling: Budget-Driven Sustainability for HPC Applications on EC2 Spot Instances. 442-447 - Miguel Correia, Pedro A. R. S. Costa, Marcelo Pasin, Alysson Neves Bessani, Fernando M. V. Ramos, Paulo Veríssimo:
On the Feasibility of Byzantine Fault-Tolerant MapReduce in Clouds-of-Clouds. 448-453 - Tiancheng Chang, Hein Meling:
Byzantine Fault-Tolerant Publish/Subscribe: A Cloud Computing Infrastructure. 454-456 - Sara Arbab Yazd, Subbarayan Venkatesan, Neeraj Mittal:
Energy Efficient Hadoop Using Mirrored Data Block Replication Policy. 457-462 - Mehmet Tahir Sandikkaya, Ali Emre Harmanci:
Security Problems of Platform-as-a-Service (PaaS) Clouds and Practical Solutions to the Problems. 463-468 - Sebastian Graf, Patrick Lang, Stefan A. Hohenadel, Marcel Waldvogel:
Versatile Key Management for Secure Cloud Storage. 469-474 - Brijesh Kashyap Chejerla, Sanjay Madria:
Securing a Wireless Networked Control System Using Information Fusion. 475-476 - Venkata Krishna Suhas Nerella, Sanjay Madria, Thomas Weigert:
Exploring Compile Time Caching of Explicit Queries in Programming Codes. 477-478 - Roy Cabaniss, Vimal Kumar, Sanjay Madria:
Three Point Encryption (3PE): Secure Communications in Delay Tolerant Networks. 479-480 - Joseph W. Baird:
TAIRO: Trust-Aware Automatic Incremental Routing for Opportunistic Resource Utilization Networks. 481-482 - Kyoungho An:
Strategies for Reliable, Cloud-Based Distributed Real-Time and Embedded Systems. 483-484 - Prithviraj Patil:
Towards Reliable Communication in Intelligent Transportation Systems. 485-486 - Abbas BanaiyanMofrad:
Reliable On-Chip Memory Design for CMPs. 487-488
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.