By Topic

Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International Symposium on

Date 10-12 Oct. 2007

Filter Results

Displaying Results 1 - 25 of 38
  • 26th IEEE International Symposium on Reliable Distributed Systems - Cover

    Publication Year: 2007
    Request permission for commercial reuse | PDF file iconPDF (348 KB)
    Freely Available from IEEE
  • 26th IEEE International Symposium on Reliable Distributed Systems - Introduction

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (67 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 26th IEEE International Symposium on Reliable Distributed Systems - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • 26th IEEE International Symposium on Reliable Distributed Systems - Table of contents

    Publication Year: 2007, Page(s):v - vii
    Request permission for commercial reuse | PDF file iconPDF (52 KB)
    Freely Available from IEEE
  • Message from the Symposium Chair

    Publication Year: 2007, Page(s): viii
    Request permission for commercial reuse | PDF file iconPDF (92 KB) | HTML iconHTML
    Freely Available from IEEE
  • Welcome from the Technical Program Co-Chairs

    Publication Year: 2007, Page(s): ix
    Request permission for commercial reuse | PDF file iconPDF (101 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2007, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (94 KB)
    Freely Available from IEEE
  • External reviewers

    Publication Year: 2007, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (71 KB)
    Freely Available from IEEE
  • ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks

    Publication Year: 2007, Page(s):3 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (317 KB) | HTML iconHTML

    We consider the problem of robust node deployment and fault-tolerant localization in wireless sensor networks for emergency and first response applications. Signature-based localization algorithms are a popular choice for use in such applications due to the non-uniform nature of the sensor node deployment. But, random destruction/disablement of sensor nodes in such networks adversely affects the d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks

    Publication Year: 2007, Page(s):13 - 22
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (291 KB) | HTML iconHTML

    In this paper, we propose a novel reliable probabilistic dissemination protocol, RAPID, for mobile wireless ad-hoc networks that tolerates message omissions, node crashes, and selfish behavior. The protocol employs a combination of probabilistic forwarding with deterministic corrective measures. The forwarding probability is set based on the observed number of nodes in each one-hop neighborhood, w... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Eventual Clusterer Oracle and Its Application to Consensus in MANETs

    Publication Year: 2007, Page(s):23 - 32
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (402 KB) | HTML iconHTML

    This paper studies the design of hierarchical consensus protocols for mobile ad hoc networks. A two-layer hierarchy is imposed on the mobile hosts by grouping them into clusters, each with a clusterhead. The messages from and to the hosts in the same cluster are merged/unmerged by the clusterhead so as to reduce the message cost and improve the scalability. We adopt a modular method in the design,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Assessing the Dependability ofWireless Sensor Networks

    Publication Year: 2007, Page(s):33 - 44
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (583 KB) | HTML iconHTML

    This paper proposes a flexible framework for dependability modeling and assessing of Wireless Sensor Networks (WSNs). The framework takes into account network related aspects (topology, routing, network traffic) as well as hardware/software characteristics of nodes (type of sensors, running applications, power consumption). It is composed of two basic elements: i) a parametric Stochastic Activity ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing Edge Computing with Database Replication

    Publication Year: 2007, Page(s):45 - 54
    Cited by:  Papers (6)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (458 KB) | HTML iconHTML

    As the use of the Internet continues to grow explosively, edge computing has emerged as an important technique for delivering Web content over the Internet. Edge computing moves data and computation closer to end-users for fast local access and better load distribution. Current approaches use caching, which does not work well with highly dynamic data. In this paper, we propose a different approach... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage

    Publication Year: 2007, Page(s):55 - 64
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (405 KB) | HTML iconHTML

    We are witnessing a revival of storage service providers in the form of new vendors as well as traditional players. While storage outsourcing is cost-effective, many companies are hesitating to outsource their storage due to security concerns. The success of storage outsourcing is highly dependent on how well the providers can establish trust with their consumers. While significant work has been d... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Customizable Fault Tolerance forWide-Area Replication

    Publication Year: 2007, Page(s):65 - 82
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (600 KB) | HTML iconHTML

    Constructing logical machines out of collections of physical machines is a well-known technique for improving the robustness and fault tolerance of distributed systems. We present a new, scalable replication architecture, built upon logical machines specifically designed to perform well in wide-area systems spanning multiple sites. The physical machines in each site implement a logical machine by ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hypervisor-Based Efficient Proactive Recovery

    Publication Year: 2007, Page(s):83 - 92
    Cited by:  Papers (11)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (385 KB) | HTML iconHTML

    Proactive recovery is a promising approach for building fault and intrusion tolerant systems that tolerate an arbitrary number of faults during system lifetime. This paper investigates the benefits that a virtualization-based replication infrastructure can offer for implementing proactive recovery. Our approach uses the hypervisor to initialize a new replica in parallel to normal system execution ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Test & Set, Adaptive Renaming and Set Agreement: a Guided Visit to Asynchronous Computability

    Publication Year: 2007, Page(s):93 - 102
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    An important issue in fault-tolerant asynchronous computing is the respective power of an object type with respect to another object type. This question has received a lot of attention, mainly in the context of the consensus problem where a major advance has been the introduction of the consensus number notion that allows ranking the synchronization power of base object types (atomic registers, qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Fail-Heterogeneous Architectural Model

    Publication Year: 2007, Page(s):103 - 113
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB) | HTML iconHTML

    Fault tolerant distributed protocols typically utilize a homogeneous fault model, either fail-crash or fail-Byzantine, where all processors are assumed to fail in the same manner. In practice, due to complexity and evolvability reasons, only a subset of the nodes can actually be designed to have a restricted, fail-crash failure mode, provided that they are free of design faults. Based on this cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Paxos Register

    Publication Year: 2007, Page(s):114 - 126
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (7677 KB) | HTML iconHTML

    We introduce the Paxos register to simplify and unify the presentation of Paxos-style consensus protocols. We use our register to show how Lamport's Classic Paxos and Castro and Liskov's Byzantine Paxos are the same consensus protocol, but for different failure models. We also use our register to compare and contrast Byzantine Paxos with Martin and Alvisi's fast Byzantine consensus. The Paxos regi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterizing Aging Phenomena of the Java Virtual Machine

    Publication Year: 2007, Page(s):127 - 136
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (651 KB) | HTML iconHTML

    In this work we investigate software aging phenomena inside the Java Virtual Machine (JVM). Starting from an experimental campaign on real world testbeds, this work isolates the contribution of the JVM to the overall aging trend, and identifies, through statistical methods, which workload parameters are more relevant to aging dynamics. Experimental results show that the Sun Hotpost JVM experiences... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Checking of Consensus Algorit

    Publication Year: 2007, Page(s):137 - 148
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (351 KB) | HTML iconHTML

    We show for the first time that standard model checking allows one to completely verify asynchronous algorithms for solving consensus, a fundamental problem in fault-tolerant distributed computing. Model checking is a powerful verification methodology based on state exploration. However it has rarely been applied to consensus algorithms, because these algorithms induce huge, often infinite state s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations

    Publication Year: 2007, Page(s):149 - 160
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB) | HTML iconHTML

    The secure and robust functioning of a network relies on the defect-free implementation of network applications. As network protocols have become increasingly complex, however, hand-writing network message processing code has become increasingly error-prone. In this paper, we present a domain-specific language, Zebu, for generating robust and efficient message processing layers. A Zebu specificati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using Hidden Semi-Markov Models for Effective Online Failure Prediction

    Publication Year: 2007, Page(s):161 - 174
    Cited by:  Papers (31)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (527 KB) | HTML iconHTML

    A proactive handling of faults requires that the risk of upcoming failures is continuously assessed. One of the promising approaches is online failure prediction, which means that the current state of the system is evaluated in order to predict the occurrence of failures in the near future. More specifically, we focus on methods that use event-driven sources such as errors. We use hidden semi-Mark... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying Temporal and Spatial Correlation of Failure Events for Proactive Management

    Publication Year: 2007, Page(s):175 - 184
    Cited by:  Papers (30)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    Networked computing systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these environments. Moreover, failure events exhibit strong correlations in time and space domain. In this paper, we develop a spherical covariance model with an adjustable timescale parameter to quantify the temporal correlation... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Diagnosis of Failures in a Three Tier E-Commerce System

    Publication Year: 2007, Page(s):185 - 198
    Cited by:  Papers (9)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (534 KB) | HTML iconHTML

    For dependability outages in distributed Internet infrastructures, it is often not enough to detect a failure, but it is also required to diagnose it, i.e., to identify its source. Complex applications deployed in multi-tier environments make diagnosis challenging because of fast error propagation, black-box applications, high diagnosis delay, the amount of states that can be maintained, and imper... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.