default search action
DSN 2012: Boston, MA, USA
- IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, DSN 2012, Boston, MA, USA, June 25-28, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-2264-5
Workshop on Open Resilient human-aware Cyber-physical Systems (WORCS-2012)
Resilient Medical and Health Care Cyber-Physical Systems
- Insup Lee:
Invited talk: Challenges in Medical Cyber-Physical Systems. 1 - Daniel P. Siewiorek:
Invited talk: Virtual coaches in health care. 1
User Centric Approaches
- Jane W.-S. Liu:
Invited talk: A model and simulation for user-centric automation devices and systems. 1 - George S. Avrunin, Lori A. Clarke, Leon J. Osterweil, Julian M. Goldman, Tracy L. Rausch:
Smart checklists for human-intensive medical systems. 1-6
Design, Monitoring, Security
- Homa Alemzadeh, Catello Di Martino, Zhanpeng Jin, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Towards resiliency in embedded medical monitoring devices. 1-6 - John S. Fitzgerald, Ken G. Pierce, Carl Gamble:
A rigorous approach to the design of resilient cyber-physical systems through co-simulation. 1-6 - Jakub Szefer, Pramod A. Jamkhedkar, Yu-Yuan Chen, Ruby B. Lee:
Physical attack protection with human-secure virtualization in data centers. 1-6 - Kevin Mueller, Michael Paulitsch, Sergey Tverdyshev, Holger Blasum:
MILS-related information flow control in the avionic domain: A view on security-enhancing software architectures. 1-6
Workshop on Fault Tolerance for HPC at Extreme Scale (FTXS 2012)
- Nageswara S. V. Rao:
Chaotic-identity maps for robustness estimation of exascale computations. 1-6 - Kathryn M. Mohror, Adam Moody, Bronis R. de Supinski:
Asynchronous checkpoint migration with MRNet in the Scalable Checkpoint / Restart Library. 1-6 - Jon Stearley, Kurt B. Ferreira, David J. Robinson, Jim Laros, Kevin T. Pedretti, Dorian C. Arnold, Patrick G. Bridges, Rolf Riesen:
Does partial replication pay off? 1-6 - Mohammed el Mehdi Diouri, Olivier Glück, Laurent Lefèvre, Franck Cappello:
Energy considerations in checkpointing and fault tolerance protocols. 1-6 - Saurabh Hukerikar, Pedro C. Diniz, Robert F. Lucas:
A programming model for resilience in extreme scale computing. 1-6 - Jacob Lidman, Daniel J. Quinlan, Chunhua Liao, Sally A. McKee:
ROSE: : FTTransform - A source-to-source translation framework for exascale fault-tolerance research. 1-6 - Esteban Meneses, Xiang Ni, Laxmikant V. Kalé:
A message-logging protocol for multicore systems. 1-6 - Sean Hogan, Jeff R. Hammond, Andrew A. Chien:
An evaluation of difference and threshold techniques for efficient checkpoints. 1-6 - Yves Robert, Frédéric Vivien, Dounia Zaidouni:
On the complexity of scheduling checkpoints for computational workflows. 1-6 - Ashwin A. Mendon, Ron Sass, Zachary K. Baker, Justin L. Tripp:
Design and implementation of a hardware checkpoint/restart core. 1-6 - Gengbin Zheng, Xiang Ni, Laxmikant V. Kalé:
A scalable double in-memory checkpoint and restart scheme towards exascale. 1-6
6th Workshop on Recent Advances in Intrusion Tolerance and reSilience (WRAITS 2012)
- Michael Atighetchi, Partha P. Pal, Joseph P. Loyall, Asher Sinclair:
Avoiding common security flaws in composed service-oriented systems. 1-6 - Quyen L. Nguyen, Arun Sood:
Improving resilience of SOA services along space-time dimensions. 1-6 - Gregory Frazier:
People-oriented cyber security. 1 - Farid Molazem Tabrizi, Karthik Pattabiraman:
A model for security analysis of smart meters. 1-6 - Christian Cachin, Birgit Junker, Alessandro Sorniotti:
On limitations of using cloud storage for data replication. 1-6 - Saman A. Zonouz, Robin Berthier, Negin Arhami:
Towards incorporating human intelligence into online security solutions. 1-2 - Engin Kirda:
A security analysis of Amazon's Elastic Compute Cloud service. 1
2nd International Workshop on Dependability of Clouds, Data Centers and Virtual Machine Technology (DCDV 2012)
Cloud Dependability
- Paulo Veríssimo, Alysson Neves Bessani, Marcelo Pasin:
The TClouds architecture: Open and resilient cloud-of-clouds computing. 1-6 - Cuong Manh Pham, Phuong Cao, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Toward a high availability cloud: Techniques and challenges. 1-6 - Jan S. Rellermeyer, Saurabh Bagchi:
Dependability as a cloud service - a modular approach. 1-6
Virtualization and OS
- Jan Sacha, Jeff Napper, Sape J. Mullender, Jim McKie:
Osprey: Operating system for predictable clouds. 1-6 - Yubin Xia, Yutao Liu, Haibo Chen, Binyu Zang:
Defending against VM rollback attack. 1-5 - Cheng Tan, Yubin Xia, Haibo Chen, Binyu Zang:
TinyChecker: Transparent protection of VMs against hypervisor failures with nested virtualization. 1-6
Cloud Security
- David Zage, James Obert:
Utilizing linear subspaces to improve cloud security. 1-6 - Mirko Montanari, Jun Ho Huh, Derek Dagit, Rakesh Bobba, Roy H. Campbell:
Evidence of log integrity in policy-based security monitoring. 1-6 - António Casimiro, Paulo Veríssimo, Diego Kreutz, Filipe Araújo, Raul Barbosa, Samuel Neves, Bruno Sousa, Marília Curado, Carlos Silva, Rajeev Gandhi, Priya Narasimhan:
TRONE: Trustworthy and Resilient Operations in a Network Environment. 1-6
Dependability Evaluation and Verification
- Rajeshwari Ganesan, Santonu Sarkar, Naveen Tewari:
An independent verification of errors and vulnerabilities in SaaS cloud. 1-6 - Yang Liu, Dong Lin, Jogesh K. Muppala, Mounir Hamdi:
A study of fault-tolerance characteristics of data center networks. 1-6 - Gustavo Rau de Almeida Callou, Paulo Romero Martins Maciel, Dietmar Tutsch, Julian Araujo:
Models for dependability and sustainability analysis of data center cooling architectures. 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.