DSN 2006:
Philadelphia,
Pennsylvania,
USA
2006 International Conference on Dependable Systems and Networks (DSN 2006), 25-28 June 2006, Philadelphia, Pennsylvania, USA, Proceedings.
IEEE Computer Society 2006, ISBN 0-7695-2607-1
Introduction
- Welcome Message from the General Chair.
- Welcome Message from the Conference Coordinator.
- Conference Organizers.
- Message from the Dependable Computing and Communications Symposium (DCCS) Program Chair.
- DCCS Program Committee.
- List of Reviewers for DCCS.
- William C. Carter Award.
- Message from the Performance and Dependability Symposium (PDS) Program Chair.
- PDS Program Committee.
- List of Reviewers for PDS.
Keynote Address
- Ambuj Goyal:
Delivering Dependability: A Moving Target.
Dependable Computing and Communications Symposium (DCCS)
Session 1A:
Real-Time and Embedded Systems
Session 2A:
Safety-Critical Systems
Session 3A:
Architecture and Operating Systems
Session 4A:
Byzantine Faults
- Yair Amir, Claudiu Danilov, Jonathan Kirsch, John Lane, Danny Dolev, Cristina Nita-Rotaru, Josh Olsen, David John Zage:
Scaling Byzantine Fault-Tolerant Replication toWide Area Networks.
105-114
- Christian Cachin, Stefano Tessaro:
Optimal Resilience for Erasure-Coded Byzantine Distributed Storage.
115-124
- Rachid Guerraoui, Ron R. Levy, Marko Vukolic:
Lucky Read/Write Access to Robust Atomic Storage.
125-136
Session 5A:
Consensus and Leader Election
Session 5B:
Intrusion Detection and Tolerance
Session 6A:
Storage Systems
Session 7A:
Complex and Large-Scale Systems
Session 7C:
VLSI
Session 8A:
Networking
Performance and Dependability Symposium (PDS)
Session 1B:
Dependable Storage
Session 2B:
Attack Prevention and Mitigation
- Michel Cukier, Robin Berthier, Susmit Panjwani, Stephanie Tan:
A Statistical Analysis of Attack Data to Separate Attacks.
383-392
- Hemant Sengar, Duminda Wijesekera, Haining Wang, Sushil Jajodia:
VoIP Intrusion Detection Through Interacting Protocol State Machines.
393-402
- Chun-Ying Huang, Kuan-Ta Chen, Chin-Laung Lei:
Mitigating Active Attacks Towards Client Networks Using the Bitmap Filter.
403-412
- Lap-Chung Lam, Wei Li, Tzi-cker Chiueh:
Accurate and Automated System Call Policy-Based Intrusion Prevention.
413-424
Session 3B:
Dependability Models
- Yinglung Liang, Yanyong Zhang, Anand Sivasubramaniam, Morris Jette, Ramendra K. Sahoo:
BlueGene/L Failure Analysis and Prediction Models.
425-434
- Alberto Avritzer, Andre B. Bondi, Michael Grottke, Kishor S. Trivedi, Elaine J. Weyuker:
Performance Assurance via Software Rejuvenation: Monitoring, Statistics and Algorithms.
435-444
- Kaustubh R. Joshi, William H. Sanders, Matti A. Hiltunen, Richard D. Schlichting:
Automatic Recovery Using Bounded Partially Observable Markov Decision Processes.
445-456
Session 4B:
Attack Analysis
Session 6B:
Measuring and Modeling
Session 7B:
Multiple-Server Systems
Session 8B:
Distributed Algorithms
Special Tracks
Copyright © Sun Mar 14 23:01:09 2010
by Michael Ley (ley@uni-trier.de)