June 24-27, 2008 |
|
DSN 2008 |
Full Program |
For a more compact version of the program, click here.
Tuesday, June 24th |
|
08:30-09:00 |
Tutorial Registration |
09:00-12:30 |
Parallel Tutorials Tutorial 1:
Spam and Denial of Information
Attacks and Defenses Tutorial 2:
Software
Patterns for Fault Tolerance Tutorial 3: Database Replication and Clustering |
12:30-14:00 |
Lunch on your own |
14:00-17:30 |
Parallel Tutorials Tutorial 4: Secure Event
Dissemination in Publish-Subscribe Networks Tutorial 5:
Architecting Dependable Systems: Preventing and Tolerating Faults Tutorial 6:
Soft
Errors: Technology Trends, System Effects, and Protection Techniques
|
18:00-20:00 |
Conference Registration and Welcome Reception |
Wednesday, June 25th |
|
08:30-09:00 |
Breakfast [ |
09:00-10:30 |
Opening Ceremony and Keynote Address [ Keynote
Address 1: Dependability
on the Last Frontier [
|
10:30-11:00 |
Coffee Break |
11:00-12:30 |
DCCS - 1A: Hardware and Diagnosis [Aleutian] Chair: Cristian
Constantinescu (
Coverage of a Microarchitecture-level Fault Check Regimen in a Superscalar Processor Vimal Reddy(Qualcomm Inc) and Eric Rotenberg (
Analysis and Solutions to Issue Queue Process Variation Niranjan Soundararajan, Aditya Yanamandra, Chrysostomos Nicopolous, Vijaykrishnan Narayanan, Anand Sivasubramaniam, and Mary Irwin (The Pennsylvania State
University, USA)
Trace-Based Microarchitecture-Level Diagnosis of Permanent Hardware Faults Man-Lap Li, Pradeep Ramachandran, Swarup Sahoo, Sarita Adve, Vikram Adve, and Yuanyuan Zhou (University of Illinois at Urbana-Champaign, USA)
|
PDS – 1: Self-managing systems [ Chair: Veena Mendiratta (Bell
Labs/Alcatel-Lucent, USA) An Integrated Approach to Resource Pool Management: Policies, Efficiency and Quality Metrics Daniel Gmach (Technische Universität München, Germany), Jerry Rolia (Hewlett-Packard Laboratories, USA), Ludmila Cherkasova (Hewlett-Packard Laboratories, USA), Guillaume Belrose (Hewlett-Packard Laboratories, UK), Tom Turicchi (Hewlett-Packard, USA), and Alfons Kemper (Technische Universität München, Germany)
Scheduling for Performance and Availability in Systems with Temporal Dependent Workloads Ningfang Mi, Giuliano Casale, and Evgenia Smirni (
Hot-Spot Prediction and Alleviation in Distributed Stream Processing Applications Thomas Repantis and Vana Kalogeraki (
|
|
DCCS – 1B: Modeling 1 [Dillingham] Chair: Hermann Kopetz (TU Vienna,
A Study of Cognitive Resilience in a JPEG Compressor Damian Nowroth, Ilia Polian, and Bernd Becker (
Scheduling Algorithms for Unpredictably Heterogeneous CMP Architectures Jonathan Winter and David
Albonesi (
Automated Duplicate Detection for Bug Tracking Systems Nicholas Jalbert and Westley Weimer(
|
|
Workshop on Resilience Assessment and Dependability Benchmarking (RADB) Welcome & Introduction RADB – 1: Methodology for Measuring and Assessing Resilience [Katmai] Chair: Henrique Madeira (University of
Coimbra, Portugal) Invited
Talk: Resilience assessment and Dependability Benchmarking: the challenge of
prediction Lorenzo Strigini ( RODS: General Framework for Rigorous Observation of Distributed Systems Lorenzo Falai (ResilTech s.r.l., Trust Economics Feasibility Study Robert Coles (Merrill-Lynch), Jonathan Griffin (HP Labs), Hilary Johnson (University of Bath, UK), Brian Monahan (HP Labs), Simon Parkin (Newcastle University, UK), David Pym (HP Labs & University of Bath, UK), Angela Sasse (University College London, UK), and Aad van Moorsel (Newcastle University, UK) |
|
Chair: Marc-Olivier Killijian [King Salmon] Random-walk
Gossip-based Manycast with Partition Detection Mikael Asplund and Simin Nadjm-Tehrani ( Architecting
Fault Tolerance using Abstractions Patrick Brito (State A
Framework for Assessing the Dependability of Supercomputers via Automatic Log
Analysis Catello Di Martino (Universita’ di Napoli Federico II, Italy), Domenico
Cotroneo (Universita’ di Napoli Federico II, Italy), Zbigniew
Kalbarczyk (University of Illinois at Urbana –
Champaign, USA), and Ravishankar K. Iyer (University of Illinois at Urbana – Champaign, USA) Black
Hole Attack Injection in Ad hoc Networks Jesus Friginal,
Juan-Carlos Ruiz, David de-Andres, and Pedro Gil (Universidad AA
– A Software Architecture Aware Environment for Dependable Systems Cristina Gacek ( Closing
the Dependability Gap: Converging Software Engineering with Middleware Karl M. Goeschka, and Lorenz Froihofer
( From
Dependability to Resilience Jean-Claude Laprie ( On
The Structure of Unstructured Overlay Networks João Leitão (INESC-ID/IST, Portugal), José Pereira (University of Minho,
Portugal), Luís Rodrigues (INESC-ID/IST, Portugal) Towards
Decentralized Management of Graceful Degradation in Distributed Embedded
Systems Osamah Rawashdeh ( |
|
12:30-14:00 |
Lunch |
14:00-15:30 |
DCCS – 2A: Hardware Reliability Chair: Subhashish
Mitra [ Validation
of Hardware Error Recovery mechanism for the SPARC64 V Microprocessor Hisashige Ando (Fujitsu
Ltd., Japan), Ryuji, Kan (Fujitsu Ltd., Japan), Yoshiharu Tosaka
(Fujitsu Laboratories, Japan), Keiji Takahisa (Osaka University, Japan), and Kichiji Hatanaka (Osaka
University, Japan) Using
Likely Program Invariants to Detect Hardware Errors Swarup Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita Adve, Vikram Adve, and Yuanyuan Zhou (University of Illinois at
Urbana-Champaign, USA) Detouring:
Translating Software to Circumvent Hard Faults in Simple Cores Albert Meixner and Daniel Sorin ( |
PDS – 2: Security 1 [Alaska] Chair: Marco Vieira (University of Coimbra,
Portugal) On Localization Attacks to Internet Threat Monitors: An Information-Theoretic Framework Wei Yu, Automatic Security Assessment of Critical Cyber-Infrastructures Zahid Anwar, Ravinder Shankesi, and Roy Campbell ( Evaluating Email's Feasibility for Botnet Command and Control Kapil Singh, Abhinav Srivastava,
Jonathon Giffin, and Wenke
Lee (Georgia Institute of |
|
DCCS – 2B: Practical Experience Reports [Dillingham] Chair: Dave Bakken (
Towards Assessing the Security of DBMS Configurations Afonso Neto and Marco Vieira (University of Coimbra, Portugal) Experiences with Formal Specification of Fault-Tolerant File Systems Roxana Geambasu (
Using an Assurance Case to Support Independent Assessment of the Transition to a New GPS Ground Control System Elisabeth Nguyen, William
Greenwell, and Myron Hecht (The Aerospace Corporation,
|
|
Workshop on Resilience Assessment and Dependability Benchmarking (RADB) RADB – 2: Hardware Assessment [Katmai] Chair:
A Field Failure Analysis of Microprocessors used in Information Systems Syed Z. Shazli, Mohammed
Abdul-Aziz, Mehdi B. Tahoori,
David R. Kaeli (Northeastern
Towards Dependability Benchmarking of Hardware Cores for Embedded Systems David de Andres,
Juan-Carlos Ruiz, Daniel Gil and Pedro Gil (Universidad
A Framework based on Boolean Satisfiability for Soft Error Rate Estimation in Early Design Stages Syed
Z. Shazli and Mehdi B. Tahoori (Northeastern |
|
Chair: Juan-Carlos Ruiz
Garcia (Universidad STAMP:
Toward Reclaiming Email Address Privacy Kurt Ackermann, Camille Gaspard, Ramana Kompella, and Cristina
Nita-Rotaru (Purdue University, USA) Balancing
of Dependability and Security in Online Auctions Lorenz Froihofer and Karl M. Goeschka
( Dependability
Assessment of Operating Systems in Multi-core Architectures Gabriela Jacques-Silva, Zbigniew Kalbarczyk, and Ravishankar K. Iyer ( Robustness
Measurement in OS Forecast and Selection Xiaoen Ju, Hengming
Zou ( Increasing
SoC Dependability via Know Good Tile NoC Testing Hans Kerkhoff, Oscar Kuiken,
and Xiao Zhang ( Workload
Representation in the Modeling of Border Inspection Points Mayra Sacanamboy,
and Bojan Cukic ( |
|
15:30-16:00 |
Coffee Break |
16:00-17:30 |
DCCS – 3A:
Panel: Silent Data Corruption –
Myth or Reality? [ Panel organizer: Cristian
Constantinescu ( Panelists: Ishwar
Parulkar (Sun Microsystems, |
PDS – 3: Practical
Experience Reports and Demos [ Chair: Sy-Yen
Kuo ( Scaling
File Systems to Support Petascale Clusters: A
Dependability Analysis to Support Informed Design Choices Shravan Gaonkar, Eric Rozier, Anthony Tong, and William Sanders ( WS-DREAM:
A Distributed Reliability Assessment Mechanism for Web Services Zibin Zheng and Michael Lyu (The Chinese A
Log Mining Approach to Failure Analysis of Chinghway Lim ( Integration
and Evaluation of Multi-Instance-Precommit Schemes
within PostgreSQL Paolo Romano and Francesco Quaglia (Sapienza Universit_a di Roma, Italy) |
|
DCCS – 3B: Tools and
Practical Experience Reports [Dillingham] Chair: Martin Hiller ( End-system
tools for enhancing email reliability Tim Moors and Patrick Chu
( Tempest:
Towards Early Identification of Failure-prone Binaries Thirumalesh Bhat (Microsoft
Corporation) and Nachiappan Nagappan
(Microsoft Research) Statistical
Fault Injection Pradeep Ramachandran, Prabhakar
Kudva, Jeffrey Kellington,
John Schumann, and Pia Sanda
( |
|
Workshop on Resilience Assessment and Dependability Benchmarking (RADB) Organizers: RADB – 3: Characterization of
Resilience [Katmai] Chair: Aad
van Moorsel ( Enhancing
the NekoStat Tool with Uncertainty, Resolution and
Intrusiveness Evaluation Capabilities Failure
Characterization of a Large Mei-Chen Hsueh ( The
AMBER Data Repository Marco Vieira, Naaliel Mendes, João Duraes, and Henrique Madeira
(University of Coimbra, Portugal) Workshop Wrap-up |
|
18:00-20:00 |
Birds of a Feather |
BoF 1 – Key Dependability Issues and Future
Directions for Research in the Area of Computing with Cell Phones [Dillingham] Organizer:
Shivakant Mishra ( Organizer: Shivakant Mishra |
|
BoF 2 – Reliability Issues and Opportunities
for Multicore, Multithreaded Microprocessors [Katmai] Organizer: Alan Wood (Sun Microsystems, |
|
BoF 3 – Education in Resilient Computing
Systems: why and how? [King Salmon] Organizer: Jean-Claude Laprie ( |
Thursday, June 26th |
|
08:00-09:00 |
Breakfast [ |
09:00-10:30 |
Student travel grant presentations [Alaska Ballroom] Keynote
Address 2: Automotive
Enhanced Vision Systems - Issues Arising from Placing Users in the Loop [ Thomas Seder (General Motors,
|
09:00-10:30 |
Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS)
Welcome & Introduction CATARS – 1: Architectural
Techniques for Application Reliability and Security [King Salmon] Chair: Karthik
Pattabiraman ( Towards
Transient Fault Tolerance for Heterogeneous Computing Platforms Nishant George, John Lach, and Sudhanva Gurumurthi ( IOTA:
Detecting Erroneous I/O Behavior via I/O Transaction Auditing Albert Meixner and Daniel
J. Sorin ( Using
Open Compilation to Simplify the Design of Fault-Tolerant VLSI Systems Juan-Carlos Ruiz, David de Andrés, Pedro Gil, and Sara Blanc (Universidad
Politécnica de Valencia, Spain) |
10:30-11:00 |
Coffee Break |
11:00-12:30 |
DCCS – 4: Soft-Errors [Aleutian] Chair: Taksahi
Nanya ( An
Accurate Flip-flop Selection Technique for Reducing Logic SER Eric Hill, Mikko Lipasti, and Kewal Saluja ( Combined
Circuit and Microarchitecture Techniques for
Effective Soft Error Robustness in SMT Processors Xin Fu, Tao Li, and José Fortes (
|
PDS – 4: Networks and Mobile Systems
[ Chair: Peter Kemper ( Toward
an Understanding of the Processing Delay of Peer-to-Peer Relay Nodes Kuan-Ta Chen and Jing-Kai Lou (Academia TCP
Covert Timing Channels: Design and Detection Xiapu Luo, A
Smart Triggering Scheme to Reduce Service Interruption During Heterogonous
Handovers Huaiyu Liu (Intel, USA), Christian Maciocco (Intel, USA), Vijay Kesavan (Intel, USA), and Andy Low (British Telecom Labs, Asian Research Center, Malaysia)
|
|
Industry Forum on Critical Topics in Dependability Session 1: Dependability
Considerations in Commercial Servers
[Dillingham] Chair: Brendan Murphy ( z10
Processor Core: Design for Dependability Kevin Shum ( Error
Processing Across A Multi-Initiator Network Tram Nguyen ( Increase
System Availability with Concurrent Upgrade or Repair of Central Electronics
Complex Kanisha Patel ( Discussion and Q&A |
|
Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS) CATARS – 2: Compiler
techniques for Application Reliability and Security [King Salmon] Chair: Shuo
Chen (Microsoft Research, Count&Check: Counting Instructions to Detect Incorrect Paths Long Wang and Ravishankar
K. Iyer ( Reverse
Stack Execution in a Multi-Variant Execution Environment Babak Salamat, Andreas
Gal and Michael Franz ( Intrusion
Detection via Instrumented Software William Mahoney and William Sousan ( |
|
Student Forum [Katmai] Chair: Ravishakar
Iyer ( Towards
a Less Reactive and More Proactive Cloud Claris Castillo ( Dependability
of the Wireless Multimedia Sensor
Networks Mohamed Elsersy ( An
Authentication Broker Service for Scalable EPC Network Imran Ali Jokhio ( An
Exception Handling Framework Nikolas Nehmer (
|
|
12:30-14:00 |
Lunch |
14:00-15:30 |
DCCS – 5: Storage and server
dependability [Aleutian] Chair: Matti
Hiltunen (AT&T, Reliability
of flat XOR-based erasure codes on heterogeneous devices Kevin Greenan
( ConfErr: A Tool for Assessing Resilience to Human Configuration Errors Lorenzo Keller, Prasang Upadhyaya, and George Candea (EPFL, Enhanced
Server Fault-Tolerance for Improved User Experience Manish Marwah (Hewlett.Packard
Laboratories, |
PDS – 5: Panel Discussion: “On Representing Knowledge in the Dependability Domain” [ Panel organizer: Algirdas Avizienis ( Panelists: Ravishakar Iyer (
|
|
Industry Forum on Critical Topics in Dependability Session 2: System-Level
Dependability Challenges [Dillingham] Chair: Lisa Spainhower ( Dependability
Considerations for Safety Critical Electronics System Bob Yeh
( Using
Automated Discovery for End-to-End Availability Assessment Hari Govind Ramasamy
(IBM Potential
Dependability Consequences of Power Conservation Alan Wood (Sun
Microsystems, Discussion and Q&A |
|
Workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS) CATARS – 3: Panel Discussion on “Towards fault- and attack- resilient applications: where processor architects and compiler designers should converge” [King Salmon] Moderator: Zbigniew Kalbarczyk ( Panelists: Subhasish Mitra
( |
|
Fast
Abstracts 3 [Katmai] Chair: Xavier Défago (JAIST, Japan) Using
Automated Reverse Engineering for the Safe Execution of Untrusted
Device Drivers Vitaly Chipounov, George Candea, and Willy Zwaenepoel
(EPFL, Detecting
Hidden Shared Dependencies via Covert Channels Kaustubh Joshi
(AT&T Labs Yield
Enhancement Techniques for Content-Addressable Memories Shyue-Kung Lu (Fu On
improving the Reliability of Cluster based Voice over IP Services Ayari Narjess (France Telecom R&D, France), Lefevre Laurent (France
Telecom R&D, France), Barbaron Denis (Université de Lyon, France), and
Primet Pascale (Université de Lyon, France) Self
Tuning With Self Confidence Miguel Matos, José
Pereira, and Rui Oliveira ( Component-Dependency
based Micro-Rejuvenation Scheduling Vinaitheerthan Sundaram, Matthew Tan Creti, Rajesh K. Panta, and
Saurabh Bagchi (
|
|
16:45-23:30 |
Bus Boarding at 16:45. Bus departure promptly at 17:00. |
Friday, June 27th |
|
08:00-09:00 |
Breakfast [ |
09:00-10:30 |
DCCS – 6A: Intrusion Tolerance [Aleutian] Chair: Bojan
Cukic ( Towards
an Understanding of Anti-virtualization and Anti-debugging Behavior in Modern
Malware Xu Chen (University of Michigan, USA), Jonathon
Andersen (University of Michigan, USA), Z. Morley Mao (University of
Michigan, USA), Michael Bailey (Univ. of Michigan, USA), and Jose Nazário (Arbor Networks, USA) Security
through Redundant Data Diversity Anh Nguyen-Tuong, David Evans,
John Knight, Benjamin Cox, and Jack Davidson ( Byzantine
Replication Under Attack Yair Amir (
|
PDS – 6: Evaluation and Measurement [ Chair: Felicita di Giandomenico (ISTI-CNR, Italy) Evaluating
Availability under Quasi-Heavy-tailed Repair Times Sei Kato and Takayuki Osogami
(IBM Anomaly?
Application Change? or Workload Change? Towards Automated
Detection of Application Performance Anomaly and Change Ludmila Cherkasova
(Hewlett-Packard Labs, USA), Kivanc Ozonat (Hewlett-Packard Labs, USA), Ningfang
Mi (College of William and Mary, USA), Julie Symons (Hewlett-Packard Labs,
USA), and Evgenia Smirni (College of William and Mary, USA) Survivability
Quantification of Communication Services Poul Heegaard (
|
|
DCCS – 6B: Dynamic Systems and
Replication [Dillingham] Chair: Cristina Nita-Rotaru ( A
Robust and Lightweight Stable Leader Election Service for Dynamic Systems Nicolas Schiper ( A
Fast Restart Mechanism for Checkpoint/Recovery Protocols in Networked
Environments Yawei Li and Zhiling Lan (Illinois
Institute of Tempest:
Tudor Marian, Mahesh Balakrishnan, Ken Birman, and Robbert van Renesse (
|
|
Second Workshop on Dependable and Secure Nanocomputing (WDSN) WDSN – 1: Opening and Defect & Failure Modes in Nanoscale Technologies WDSN – 1a: Introduction and Invited
Talk [Katmai] Chair: Ravishankar
K. Iyer ( Invited
talk: Sustaining Error Resilience: Case Study of the IBM POWER6™
Microprocessor Pia Sanda, IBM Systems &
Technology Group, WDSN – 1b: Defect and Fault Models in Nanoscale Technologies
[Katmai] Chair: Alan Wood (Sun
Microsystems, Developing
Fault Models for Nanowire Logic Circuits Daniel Gil, David de
Andrés, Juan-Carlos Ruiz, and Pedro Gil (Universidad SER
Characterization of an Advanced Network Processor using Accelerated Neutron
Beam Nelson Tam (Marvell
Semiconductor, Inc., USA), ShiJie Wen (Cisco
Systems, USA), Noam Lewis (Marvell Israel Ltd, Israel), Richard Wong (Cisco
Systems, USA), Armen Karapetov
(EZchip Technologies Ltd, Israel), Oded Rozenstein (EZchip Technologies Ltd, Israel), Oded
Rozenstein (EZchip
Technologies Ltd, Israel), Haim Boot (Marvell
Israel Ltd, Israel), Reuven Cohen (Marvell Israel Ltd, Israel), and Usama Nassir (Marvell Semiconductor, Inc., USA) Modeling
Microprocessor Faults on High-Level Decision Diagrams Raimund Ubar (Tallinn Univ. of Technology, Estonia), Jaan Raik (Tallinn Univ. of Technology, Estonia), Artur Jutman (Tallinn Univ. of Technology, Estonia), Maksim Jenihhin (Tallinn Univ. of Technology, Estonia), Martin Instenberg (Ilmenau Technical University, Germany), and Heinz-Dietrich Wuttke (Ilmenau Technical University, Germany)
|
|
Seventh Workshop on Architecting Dependable Systems (WADS)
Welcome & Introduction WADS – 1: Architecting
Dependable Service Oriented Architectures [King Salmon] Chair: Jean-Charles Fabre (LAAS-CNRS, France) Keynote:
Search for the Holy Grail: Are SOAs the Answer? Rick Schlichting
(AT&T Labs Inc., Discussion |
|
10:30-11:00 |
Coffee Break |
11:00-12:30 |
DCCS – 7A: Security 2 [Aleutian] Chair: Yair
Amir ( AGIS:
Towards Automatic Generation of Infection Signatures Zhuowei Li (Indiana University at Bloomington, USA), XiaoFeng Wang
(Indiana University at Bloomington, USA), Zhenkai
Liang (Carnegie Mellon University, USA), and Michael Reiter(Univ. of North
Carolina at Chapel Hill, USA) Convicting
Exploitable Software Vulnerabilities: An Efficient Input Provenance Based
Approach Zhiqiang Lin, Xiangyu Zhang, and Dongyan Xu ( Mapping
Software Faults with Web Security Vulnerabilities José Fonseca and Marco Vieira (University of Coimbra, Portugal) |
PDS – 7: Error Detection [ Chair: Armando Fox ( SymPLFIED : Symbolic Program-Level Fault-Injection and
Error-Detection Framework Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, and Ravishankar Iyer ( A
Characterization of Instruction-Level Error Derating
and its Implications for Error Detection Jeffrey Cook and
Craig Zilles (
|
|
DCCS – 7B: Distributed Protocols [Dillingham] Chair: Xavier Defago (JAIST, A
fault-tolerant directory-based cache coherence protocol for CMP architectures Ricardo Fernández-Pascual (Universidad de Murcia, Spain), José
García (Universidad de Murcia, Spain), Manuel Acacio (Universidad de Murcia,
Spain), and José Duato (Universidad Politécnica de Valencia, Spain) Probabilistic
Quorum Systems in Wireless Ad Hoc Networks Roy Friedman (Israel
Institute of BAR
Primer Allen Clement (Univ. of Texas at Austin, USA), Harry Li (Univ. of Texas at Austin, USA), Jeff Napper (Univ. of Texas at Austin, USA), Jean-Philipe Martin (Microsoft Research, UK), Lorenzo Alvisi (Univ. of Texas at Austin, USA), and Mike Dahlin (Univ. of Texas at Austin, USA)
|
|
Second Workshop on Dependable and Secure Nanocomputing (WDSN) WDSN – 2: Performance and Security Issues in Hardware Design WDSN – 2a: Asynchronous Circuits [Katmai] Chair: Nithin
M. Nakka ( Performance
Comparison between Self-timed Circuits and Synchronous Circuits Based on the
Technology Roadmap of Semiconductors Masashi Imai and Takashi Nanya (The University of Concurrent
Fault Detection for Secure QDI Asynchronous Circuits Konrad J. Kulikowski, Mark G. Karpovsky, Alexander Taubin,
and Zhen Wang ( WDSN – 2b: Intrusion Detection Devices
[Katmai] Chair: Daniel J. Sorin ( Hardware
Implementation of Information Flow Signatures Derived via Program Analysis Paul Dabrowski
(University of Illinois at Urbana-Champaign, USA), William Healey (University
of Illinois at Urbana-Champaign, USA), Karthik Pattabiraman (University of Illinois at Urbana-Champaign,
USA), Shelley Chen (SAIC, USA), Zbigniew Kalbarczyk (University of Illinois at Urbana-Champaign,
USA), and Ravishankar K. Iyer(University
of Illinois at Urbana-Champaign, USA) Low-Cost
Self-Test of Crypto Devices G. Di Natale,
M. Doulcier, M. L. Flottes,
and B. Rouzeyre Quantum
Wireless Intrusion Detection Mechanism Tien-Sheng Lin, I-Ming Tsai, Sy-Yen Kuo (Université de Montpellier, France)
|
|
Seventh Workshop on Architecting Dependable Systems (WADS) WADS – 2: Software
Architectures and Dependability
[King Salmon] Chair: Rogério
de Lemos ( Architecture-Based
Software Reliability Estimation: Problem Space, Challenges, and
Strategies Ivo Krka, Leslie Cheung,
George Edwards, Leana Golubchik,
and Nenad Medvidovic1( Architecting
for Reliability – Detection Mechanisms Robert S. Hanmer and Veena B. Mendiratta ( Toward
a Reasoning Framework for Dependability Tacksoo Im and John D. McGregor ( Ensuring
Architectural Conformance in Message-Based Systems Daniel Popescu and Nenad
Medvidovic ( |
|
12:30-14:00 |
Lunch |
14:00-15:30 |
DCCS – 8: Networks [Aleutian] Chair: Zbigniew
Kalbarczyk ( Improving
Dependability of Network Configuration through Policy Classification Sihyung Lee, Tina Wong, and Hyong
Kim ( Traffic
Grooming in WDM Mesh Networks with Guaranteed Survivability Ataul Bari, Quazi Rahman, Arunita Jaekel, and Subir Bandyopadhyay ( Implementation
and Evaluation of a Distributed and Cooperative Load-Balancing Mechanism for
Dependable Volunteer Computing Yoshitomo Murata (
|
PDS – 8A: Storage Systems
[ Chair: Aad
van Moorsel ( Enhancing
Data Availability in Disk Drives through Background Activities Ningfang Mi (College of William and Mary, USA), Alma Riska (Seagate Research, USA), Evgenia
Smirni (College of William and Mary, USA), and Erik
Riedel (Seagate Research, USA) Analyzing
the Effects of Disk-Pointer Corruption Lakshmi Bairavasundaram (University of Wisconsin, USA), Meenali Rungta (Google, Inc., USA), Nitin Agrawal (University of Wisconsin, USA), Andrea Arpaci-Dusseau (University of Wisconsin, USA), Remzi Arpaci-Dusseau (University of Wisconsin, USA), and Michael Swift (University of Wisconsin, USA)
|
|
PDS – 8B: Modeling 2
[Dillingham] Chair: Peter Buchholz ( Architectural
dependability evaluation with Arcade Hichem Boudali (University of Twente, Netherlands), Pepijn Crouzen (Saarland University, Denmark), Boudewijn R. Haverkort
(University of Twente, Netherlands), Matthias Kuntz
(University of Twente, Netherlands, and Marielle Stoelinga (University
of Twente, Netherlands) An
Information-Theoretic Approach to Detecting Performance Anomalies and Changes
for Large-scale Distributed Web Services Kivanc Ozonat (Hewlett-Packard
Labs, A
Recurrence-Relation-Based Reward Model for Performability
Evaluation of Embedded Systems Ann Tai (IA Tech, Inc.,
|
|
Second Workshop on Dependable and Secure Nanocomputing (WDSN) WDSN – 3: Mitigation and Resilience Techniques for Nanocomputing WDSN – 3a: Fault Tolerance Techniques [Katmai] Chair: Juan-Carlos Ruiz
(Universidad Politécnica de Valencia, Blocking
and Non-blocking Checkpointing and Rollback
Recovery for Networks-on-Chip Claudia Rusu (Université de Grenoble, France), Cristian Grecu (University
of British Columbia, Vancouver, Canada), Lorena Anghel (Université de
Grenoble, France) No
Free Lunch in Soft Error Protection? Ilia Polian ( WDSN – 3b: Reconfigurable Nanoscale Circuits
[Katmai] Chair: Michael Nicolaïdis (TIMA, France) Fault
Tolerance of the Input/Output Ports in Massively Defective Multicore Processor Chips Piotr Zając ( BISM:
Built-in Self Map for Crossbar Nano-Architectures Mehdi Tahoori (Northeastern Combined
Defect and Fault Tolerance for Reconfigurable Nanofabrics David de Andrés,
Juan-Carlos Ruiz, Daniel Gil, and Pedro Gil (Universidad WDSN – 3c: Workshop Wrap up [Katmai] Chair: Cristian
Constantinescu (
|
|
Seventh Workshop on Architecting Dependable Systems (WADS) WADS – 3: Dependable
Service Oriented Architectures [King Salmon] Chair: Cristina Gacek ( Invited
Talk: Service-Oriented Management Software Aad van Moorsel ( What
SOA can do for Software Dependability K. Goeschka,
L. Froihofer, and S. Dustdar
( Analyzable
Architectural Models of Service-Based Embedded Systems J. Hudak,
L. Wrage, and J. Hansson ( Behavioral
Contracts and Service Substitutability: A Contribution to Dependable SOA H. Samset
and R. Bræk ( Wrap-Up/Future Directions
|
|
15:30-16:00 |
Coffee Break |
16:00-17:30 |
IEEE TC on Dependable Computing and FT business meeting |