State Machine Replication for the Masses with BFT-SMART (Englisch)
- Neue Suche nach: Bessani, Alysson
- Neue Suche nach: Sousa, Joao
- Neue Suche nach: Alchieri, Eduardo E.P.
- Neue Suche nach: Bessani, Alysson
- Neue Suche nach: Sousa, Joao
- Neue Suche nach: Alchieri, Eduardo E.P.
In:
2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks
;
355-362
;
2014
-
ISBN:
- Aufsatz (Konferenz) / Elektronische Ressource
-
Titel:State Machine Replication for the Masses with BFT-SMART
-
Beteiligte:
-
Erschienen in:
-
Verlag:
- Neue Suche nach: IEEE
-
Erscheinungsdatum:01.06.2014
-
Format / Umfang:504937 byte
-
ISBN:
-
DOI:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Failure Analysis of Virtual and Physical Machines: Patterns, Causes and CharacteristicsBirke, Robert / Giurgiu, Ioana / Chen, Lydia Y. / Wiesmann, Dorothea / Engbersen, Ton et al. | 2014
- 13
-
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural InvariantsPham, Cuong / Estrada, Zachary / Cao, Phuong / Kalbarczyk, Zbigniew / Iyer, Ravishankar K. et al. | 2014
- 25
-
Lazy Checkpointing: Exploiting Temporal Locality in Failures to Mitigate Checkpointing Overheads on Extreme-Scale SystemsTiwari, Devesh / Gupta, Saurabh / Vazhkudai, Sudharshan S. et al. | 2014
- 37
-
Titan: Enabling Low Overhead and Multi-faceted Network Fingerprinting of a BotHaq, Osama / Ahmed, Waqar / Syed, Affan A. et al. | 2014
- 45
-
pSigene: Webcrawling to Generalize SQL Injection SignaturesHoward, Gaspar Modelo / Gutierrez, Christopher N. / Arshad, Fahad A. / Bagchi, Saurabh / Qi, Yuan et al. | 2014
- 57
-
Probabilistic Inference for Obfuscated Network Attack SequencesDu, Haitao / Yang, Shanchieh Jay et al. | 2014
- 68
-
Anomaly Characterization in Large Scale NetworksAnceaume, Emmanuelle / Busnel, Yann / Merrer, Erwan Le / Ludinard, Romaric / Marchand, Jean Louis / Sericola, Bruno et al. | 2014
- 80
-
SAND: A Fault-Tolerant Streaming Architecture for Network Traffic AnalyticsLiu, Qin / Lui, John C.S. / He, Cheng / Pan, Lujia / Fan, Wei / Shi, Yunlong et al. | 2014
- 88
-
An Adaptable Rule Placement for Software-Defined NetworksZhang, Shuyuan / Ivancic, Franjo / Lumezanu, Cristian / Yuan, Yifei / Gupta, Aarti / Malik, Sharad et al. | 2014
- 100
-
Detecting Malicious Javascript in PDF through Document InstrumentationLiu, Daiping / Wang, Haining / Stavrou, Angelos et al. | 2014
- 112
-
Scriptless Timing Attacks on Web Browser PrivacyLiang, Bin / You, Wei / Liu, Liangkun / Shi, Wenchang / Heiderich, Mario et al. | 2014
- 124
-
Automatically Fixing C Buffer Overflows Using Program TransformationsShaw, Alex / Doggett, Dusten / Hafiz, Munawar et al. | 2014
- 136
-
Application-Level Autonomic Hardware to Predict and Preempt Software Attacks on Industrial Control SystemsLerner, Lee W. / Franklin, Zane R. / Baumann, William T. / Patterson, Cameron D. et al. | 2014
- 148
-
Monitor Based Oracles for Cyber-Physical System Testing: Practical Experience ReportKane, Aaron / Fuhrman, Thomas / Koopman, Philip et al. | 2014
- 156
-
Security Threat Analytics and Countermeasure Synthesis for Power System State EstimationRahman, Mohammad Ashiqur / Shaer, Ehab Al / Kavasseri, Rajesh G. et al. | 2014
- 168
-
You Can Call but You Can't Hide: Detecting Caller ID Spoofing AttacksMustafa, Hossen / Xu, Wenyuan / Sadeghi, Ahmad Reza / Schulz, Steffen et al. | 2014
- 180
-
On Tracking Information Flows through JNI in Android ApplicationsQian, Chenxiong / Luo, Xiapu / Shao, Yuru / Chan, Alvin T.S. et al. | 2014
- 192
-
Optical Delusions: A Study of Malicious QR Codes in the WildKharraz, Amin / Kirda, Engin / Robertson, William / Balzarotti, Davide / Francillon, Aurelien et al. | 2014
- 204
-
A Reliable 3D MLC PCM Architecture with Resistance Drift PredictorJalili, Majid / Arjomand, Mohammad / Azad, Hamid Sarbazi et al. | 2014
- 216
-
Mitigating Write Disturbance in Super-Dense Phase Change MemoriesJiang, Lei / Zhang, Youtao / Yang, Jun et al. | 2014
- 228
-
WL-Reviver: A Framework for Reviving any Wear-Leveling Techniques in the Face of Failures on Phase Change MemoryFan, Jie / Jiang, Song / Shu, Jiwu / Sun, Long / Hu, Qingda et al. | 2014
- 240
-
Performance Sensitive Replication in Geo-distributed Cloud DatastoresShankaranarayanan, P.N. / Sivakumar, Ashiwan / Rao, Sanjay / Tawarmalani, Mohit et al. | 2014
- 252
-
POD-Diagnosis: Error Diagnosis of Sporadic Operations on Cloud ApplicationsXu, Xiwei / Zhu, Liming / Weber, Ingo / Bass, Len / Sun, Daniel et al. | 2014
- 264
-
Catch Me If You Can: A Cloud-Enabled DDoS DefenseJia, Quan / Wang, Huangxin / Fleck, Dan / Li, Fei / Stavrou, Angelos / Powell, Walter et al. | 2014
- 276
-
Secure Ranked Multi-keyword Search for Multiple Data Owners in Cloud ComputingZhang, Wei / Xiao, Sheng / Lin, Yaping / Zhou, Ting / Zhou, Siwang et al. | 2014
- 287
-
S-MATCH: Verifiable Privacy-Preserving Profile Matching for Mobile Social ServicesLiao, Xiaojing / Uluagac, Selcuk / Beyah, Raheem A. et al. | 2014
- 299
-
Social Puzzles: Context-Based Access Control in Online Social NetworksJadliwala, Murtuza / Maiti, Anindya / Namboodiri, Vinod et al. | 2014
- 311
-
Mining Historical Issue Repositories to Heal Large-Scale Online Service SystemsDing, Rui / Fu, Qiang / Lou, Jian Guang / Lin, Qingwei / Zhang, Dongmei / Xie, Tao et al. | 2014
- 323
-
Understanding Interoperability Issues of Web Service FrameworksElia, Ivano Alessandro / Laranjeiro, Nuno / Vieira, Marco et al. | 2014
- 331
-
Scalable State-Machine ReplicationBezerra, Carlos Eduardo / Pedone, Fernando / Renesse, Robbert Van et al. | 2014
- 343
-
Clock-RSM: Low-Latency Inter-datacenter State Machine Replication Using Loosely Synchronized Physical ClocksDu, Jiaqing / Sciascia, Daniele / Elnikety, Sameh / Zwaenepoel, Willy / Pedone, Fernando et al. | 2014
- 355
-
State Machine Replication for the Masses with BFT-SMARTBessani, Alysson / Sousa, Joao / Alchieri, Eduardo E.P. et al. | 2014
- 363
-
Hardware-Software Integrated Diagnosis for Intermittent Hardware FaultsDadashi, Majid / Rashid, Layali / Pattabiraman, Karthik / Gopalakrishnan, Sathish et al. | 2014
- 375
-
Quantifying the Accuracy of High-Level Fault Injection Techniques for Hardware FaultsWei, Jiesheng / Thomas, Anna / Li, Guanpeng / Pattabiraman, Karthik et al. | 2014
- 383
-
Hard Drive Failure Prediction Using Classification and Regression TreesLi, Jing / Ji, Xinpu / Jia, Yuhan / Zhu, Bingpeng / Wang, Gang / Li, Zhongwei / Liu, Xiaoguang et al. | 2014
- 395
-
Developing Correctly Replicated Databases Using Formal ToolsSchiper, Nicolas / Rahli, Vincent / Renesse, Robbert Van / Bickford, Marck / Constable, Robert L. et al. | 2014
- 407
-
The Energy Efficiency of Database Replication ProtocolsSchiper, Nicolas / Pedone, Fernando / Renesse, Robbert Van et al. | 2014
- 419
-
Degraded-First Scheduling for MapReduce in Erasure-Coded Storage ClustersLi, Runhui / Lee, Patrick P.C. / Hu, Yuchong et al. | 2014
- 431
-
Warped-Shield: Tolerating Hard Faults in GPGPUsDweik, Waleed / Majeed, Mohammad Abdel / Annavaram, Murali et al. | 2014
- 443
-
A-ABFT: Autonomous Algorithm-Based Fault Tolerance for Matrix Multiplications on Graphics Processing UnitsBraun, Claus / Halder, Sebastian / Wunderlich, Hans Joachim et al. | 2014
- 455
-
Impact of GPUs Parallelism Management on Safety-Critical and HPC Applications ReliabilityRech, P. / Pilla, L.L. / Navaux, P.O.A. / Carro, L. et al. | 2014
- 467
-
Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability MemoryLuo, Yixin / Govindan, Sriram / Sharma, Bikash / Santaniello, Mark / Meza, Justin / Kansal, Aman / Liu, Jie / Khessib, Badriddine / Vaid, Kushagra / Mutlu, Onur et al. | 2014
- 479
-
Ocasta: Clustering Configuration Settings for Error RecoveryHuang, Zhen / Lie, David et al. | 2014
- 491
-
FACE-CHANGE: Application-Driven Dynamic Kernel View Switching in a Virtual MachineGu, Zhongshu / Saltaformaggio, Brendan / Zhang, Xiangyu / Xu, Dongyan et al. | 2014
- 503
-
Model Checking Stochastic Automata for Dependability and Performance MeasuresBuchholz, Peter / Krige, Jan / Scheftelowitsch, Dimitri et al. | 2014
- 515
-
Scalable Security Models for Assessing Effectiveness of Moving Target DefensesHong, Jin B. / Kim, Dong Seong et al. | 2014
- 527
-
A Novel Variable Ordering Heuristic for BDD-based K-Terminal ReliabilityLe, Minh / Weidendorfer, Josef / Walter, Max et al. | 2014
- 538
-
Adaptive Low-Power Architecture for High-Performance and Reliable Embedded ComputingFerreira, Ronaldo R. / Rolt, Jean da / Nazar, Gabriel L. / Moreira, Alvaro F. / Carro, Luigi et al. | 2014
- 550
-
HV Code: An All-Around MDS Code to Improve Efficiency and Reliability of RAID-6 SystemsShen, Zhirong / Shu, Jiwu et al. | 2014
- 562
-
Replication-Based Fault-Tolerance for Large-Scale Graph ProcessingWang, Peng / Zhang, Kaiyuan / Chen, Rong / Chen, Haibo / Guan, Haibing et al. | 2014
- 574
-
System Call Redirection: A Practical Approach to Meeting Real-World Virtual Machine Introspection NeedsWu, Rui / Chen, Ping / Liu, Peng / Mao, Bing et al. | 2014
- 586
-
Interoperability between Fingerprint Biometric Systems: An Empirical StudyMason, Stephen / Gashi, Ilir / Lugini, Luca / Marasco, Emanuela / Cukic, Bojan et al. | 2014
- 598
-
DNS Noise: Measuring the Pervasiveness of Disposable Domains in Modern DNS TrafficChen, Yizheng / Antonakakis, Manos / Perdisci, Roberto / Nadji, Yacin / Dagon, David / Lee, Wenke et al. | 2014
- 610
-
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue WatersMartino, Catello Di / Kalbarczyk, Zbigniew / Iyer, Ravishankar K. / Baccanico, Fabio / Fullop, Joseph / Kramer, William et al. | 2014
- 622
-
GemFI: A Fault Injection Tool for Studying the Behavior of Applications on Unreliable SubstratesParasyris, Konstantinos / Tziantzoulis, Georgios / Antonopoulos, Christos D. / Bellas, Nikolaos et al. | 2014
- 630
-
A Design and Implementation of an Assurance Case LanguageMatsuno, Yutaka et al. | 2014
- 642
-
Recovery for Failures in Rolling Upgrade on CloudsFu, Min / Zhu, Liming / Bass, Len / Liu, Anna et al. | 2014
- 648
-
Crosscheck: Hardening Replicated Multithreaded ServicesMartens, Arthur / Borchert, Christoph / Geissler, Tobias Oliver / Lohmann, Daniel / Spinczyk, Olaf / Kapitza, Rudiger et al. | 2014
- 654
-
NV-Hypervisor: Hypervisor-Based Persistence for Virtual MachinesSartakov, Vasily A. / Kapitza, Rudiger et al. | 2014
- 660
-
A Markov Decision Process Approach for Optimal Data Backup SchedulingXia, Ruofan / Machida, Fumio / Trivedi, Kishor et al. | 2014
- 666
-
Availability Evaluation of Digital Library Cloud ServicesAraujo, Julian / Maciel, Paulo / Torquato, Matheus / Callou, Gustavo / Andrade, Ermeson et al. | 2014
- 672
-
Defects per Million (DPM) Evaluation for a Cloud Dealing with VM Failures Using CheckpointingMondal, Subrota K. / Muppala, Jogesh K. et al. | 2014
- 678
-
Predicting Incident Reports for IT Help DeskAndrews, Anneliese / Lucente, Joseph et al. | 2014
- 684
-
What Vulnerability Do We Need to Patch First?Hong, Jin B. / Kim, Dong Seong / Haqiq, Abdelkrim et al. | 2014
- 690
-
What Logs Should You Look at When an Application Fails? Insights from an Industrial Case StudyCinque, Marcello / Cotroneo, Domenico / Corte, Raffaele Della / Pecchia, Antonio et al. | 2014
- 696
-
Towards a Taxonomy of Cloud Recovery StrategiesFu, Min / Bass, Len / Liu, Anna et al. | 2014
- 702
-
Toward Design Decisions to Enable Deployability: Empirical Study of Three Projects Reaching for the Continuous Delivery Holy GrailBellomo, Stephany / Ernst, Neil / Nord, Robert / Kazman, Rick et al. | 2014
- 708
-
Coarse-Grained Energy Modeling of Rollback/Recovery MechanismsIbtesham, Dewan / DeBonis, David / Arnold, Dorian / Ferreira, Kurt B. et al. | 2014
- 714
-
Grid-Oriented Process Clustering System for Partial Message LoggingJitsumoto, Hideyuki / Todoroki, Yuki / Ishikawa, Yutaka / Sato, Mitsuhisa et al. | 2014
- 720
-
Evaluating the Error Resilience of Parallel ProgramsFang, Bo / Pattabiraman, Karthik / Ripeanu, Matei / Gurumurthi, Sudhanva et al. | 2014
- 726
-
Comparison Criticality in Sorting AlgorithmsJones, Thomas B. / Ackley, David H. et al. | 2014
- 732
-
Radiation Sensitivity of High Performance Computing Applications on Kepler-Based GPGPUsOliveira, Daniel A.G. / Lunardi, Caio B. / Pilla, Laercio L. / Rech, Paolo / Navaux, Philippe O.A. / Carro, Luigi et al. | 2014
- 738
-
HeteroCheckpoint: Efficient Checkpointing for Accelerator-Based SystemsKannan, Sudarsun / Farooqui, Naila / Gavrilovska, Ada / Schwan, Karsten et al. | 2014
- 744
-
Harnessing Unreliable Cores in Heterogeneous Architecture: The PyDac Programming Model and RuntimeHuang, Bin / Sass, Ron / Debardeleben, Nathan / Blanchard, Sean et al. | 2014
- 750
-
Design and Evaluation of FA-MPI, a Transactional Resilience Scheme for Non-blocking MPIHassani, Amin / Skjellum, Anthony / Brightwell, Ron et al. | 2014
- 756
-
Extreme-Scale Viability of Collective Communication for Resilient Task Scheduling and Work StealingWilke, Jeremiah / Bennett, Janine / Kolla, Hemanth / Teranishi, Keita / Slattengren, Nicole / Floren, John et al. | 2014
- 762
-
Distributed Implementation of Wide-Area Monitoring Algorithms for Power Systems Using a US-Wide ExoGENI-WAMS TestbedZhang, Jianhua / Chakrabortty, Aranya / Xin, Yufeng et al. | 2014
- 768
-
Stateful Data Delivery Service for Wide Area Monitoring and Control ApplicationsWu, Yiming / Babazadeh, Davood / Nordstrom, Lars et al. | 2014
- 774
-
Hybrid Control Network Intrusion Detection Systems for Automated Power Distribution SystemsParvania, Masood / Koutsandria, Georgia / Muthukumary, Vishak / Peisert, Sean / McParland, Chuck / Scaglione, Anna et al. | 2014
- 780
-
Towards Secure Metering Data Analysis via Distributed Differential PrivacyLiao, Xiaojing / Formby, David / Day, Carson / Beyah, Raheem A. et al. | 2014
- 786
-
An Integrated Security Framework for GOSS Power Grid Analytics PlatformGibson, Tara / Ciraci, Selim / Sharma, Poorva / Allwardt, Craig / Rice, Mark / Akyol, Bora et al. | 2014
- 792
-
Ironstack: Performance, Stability and Security for Power Grid Data NetworksTeo, Zhiyuan / Kutsenko, Vera / Birman, Ken / Renesse, Robbert Van et al. | 2014
- 798
-
Author index| 2014
- 802
-
[Publisher's information]| 2014
- i
-
[Title page i]| 2014
- iii
-
[Title page iii]| 2014
- iv
-
[Copyright notice]| 2014
- v
-
Table of contents| 2014
- xiv
-
Message from General Chair| 2014
- xvi
-
Message from Program Chairs| 2014
- xvii
-
Organizing Committee| 2014
- xviii
-
Program Committee| 2014
- xx
-
Reviewers| 2014
- xxi
-
DCDV 2014 Workshop Committee| 2014
- xxii
-
DSSO 2014 Workshop Committee| 2014
- xxiii
-
FTXS 2014 Workshop Committee| 2014
- xxiv
-
ToSG 2014 Workshop Committee| 2014
- xxv
-
Sponsors/Conference Support| 2014
- xxvi
-
Keynote| 2014
- xxvii
-
Jean-Claude Laprie Award on Dependable Computing| 2014
- xxviii
-
William C. Carter Award| 2014