Sciweavers

DSN
2008
IEEE
14 years 6 months ago
A fault-tolerant directory-based cache coherence protocol for CMP architectures
Current technology trends of increased scale of integration are pushing CMOS technology into the deepsubmicron domain, enabling the creation of chips with a significantly greater...
Ricardo Fernández Pascual, José M. G...
DSN
2008
IEEE
14 years 6 months ago
On localization attacks to Internet Threat Monitors: An information-theoretic framework
Internet Threat Monitoring (ITM) systems are a widely deployed facility to detect, analyze, and characterize dangerous Internet threats such as worms and distributed denial-of-ser...
Wei Yu, Nan Zhang 0004, Xinwen Fu, Riccardo Bettat...
DSN
2008
IEEE
14 years 6 months ago
WS-DREAM: A distributed reliability assessment Mechanism for Web Services
It is critical to guarantee the reliability of serviceoriented applications. This is because they may employ remote Web Services as components, which may easily become unavailable...
Zibin Zheng, Michael R. Lyu
DSN
2008
IEEE
14 years 6 months ago
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change
: Automated tools for understanding application behavior and its changes during the application life-cycle are essential for many performance analysis and debugging tasks. Applicat...
Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi,...
DSN
2008
IEEE
14 years 6 months ago
TCP covert timing channels: Design and detection
Exploiting packets’ timing information for covert communication in the Internet has been explored by several network timing channels and watermarking schemes. Several of them em...
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
DSN
2008
IEEE
14 years 6 months ago
Tempest: Soft state replication in the service tier
Soft state in the middle tier is key to enabling scalable and responsive three tier service architectures. While softstate can be reconstructed upon failure, replicating it across...
Tudor Marian, Mahesh Balakrishnan, Ken Birman, Rob...
DSN
2008
IEEE
14 years 6 months ago
Probabilistic quorum systems in wireless ad hoc networks
Quorums are a basic construct in solving many fundamental distributed computing problems. One of the known ways of making quorums scalable and efficient is by weakening their int...
Roy Friedman, Gabriel Kliot, Chen Avin
DSN
2008
IEEE
14 years 6 months ago
Evaluating email's feasibility for botnet command and control
The usefulness ofemail has been tempered by its role in the widespread distribution ofspam and malicious content. Security solutions have.focused on filtering out malicious payloa...
Kapil Singh, Abhinav Srivastava, Jonathon T. Giffi...
DSN
2008
IEEE
14 years 6 months ago
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008)
This workshop summary gives a brief overview of the workshop on “Resilience Assessment and Dependability Benchmarking” held in conjunction with the 38th IEEE/IFIP Internationa...
Andrea Bondavalli, István Majzik, Aad P. A....
DSN
2008
IEEE
14 years 6 months ago
Trace-based microarchitecture-level diagnosis of permanent hardware faults
As devices continue to scale, future shipped hardware will likely fail due to in-the-field hardware faults. As traditional redundancy-based hardware reliability solutions that ta...
Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sah...