By Topic

Reliable Distributed Systems, 2010 29th IEEE Symposium on

Date Oct. 31 2010-Nov. 3 2010

Filter Results

Displaying Results 1 - 25 of 58
  • [Front cover]

    Publication Year: 2010 , Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (677 KB)  
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010 , Page(s): i
    Save to Project icon | Request Permissions | PDF file iconPDF (69 KB)  
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010 , Page(s): iii
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB)  
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (109 KB)  
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010 , Page(s): v - ix
    Save to Project icon | Request Permissions | PDF file iconPDF (268 KB)  
    Freely Available from IEEE
  • Message from General Co-chairs

    Publication Year: 2010 , Page(s): x
    Save to Project icon | Request Permissions | PDF file iconPDF (90 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Message from Technical Program Co-chairs

    Publication Year: 2010 , Page(s): xi
    Save to Project icon | Request Permissions | PDF file iconPDF (76 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Conference Committees

    Publication Year: 2010 , Page(s): xii - xiii
    Save to Project icon | Request Permissions | PDF file iconPDF (80 KB)  
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2010 , Page(s): xiv - xv
    Save to Project icon | Request Permissions | PDF file iconPDF (88 KB)  
    Freely Available from IEEE
  • list-reviewer

    Publication Year: 2010 , Page(s): xvi
    Save to Project icon | Request Permissions | PDF file iconPDF (48 KB)  
    Freely Available from IEEE
  • PrEServD - Privacy Ensured Service Discovery in Mobile Peer-to-Peer Networks

    Publication Year: 2010 , Page(s): 1 - 10
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (501 KB) |  | HTML iconHTML  

    In mobile peer-to-peer networks, proposed service discovery protocols disregard the exposure of the participating peers' privacy details (privileged information). In these methods, the participating peers must provide their identities during the service discovery process to be authorized to utilize services. However, a peer may not be willing to reveal its privileged information until it identifie... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Securing Mobile Unattended WSNs against a Mobile Adversary

    Publication Year: 2010 , Page(s): 11 - 20
    Cited by:  Papers (6)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (605 KB) |  | HTML iconHTML  

    One important factor complicating security in Wireless Sensor Networks (WSNs) is lack of inexpensive tamper-resistant hardware in commodity sensors. Once an adversary compromises a sensor, all memory and forms of storage become exposed, along with all secrets. Thereafter, any cryptographic remedy ceases to be effective. Regaining sensor security after compromise (i.e., intrusion-resilience) is a f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Attack Injection to Support the Evaluation of Ad Hoc Networks

    Publication Year: 2010 , Page(s): 21 - 29
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1802 KB) |  | HTML iconHTML  

    The increasing emergence of mobile computing devices seamlessly providing wireless communication capabilities opens a wide range of new application domains for ad hoc networks. However, the sensitivity of ad hoc routing protocols to malicious faults (attacks) limits in practice their confident use in commercial products. This requires not only practical means to enforce the security of these proto... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization Based Topology Control for Wireless Ad Hoc Networks to Meet QoS Requirements

    Publication Year: 2010 , Page(s): 30 - 36
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (573 KB) |  | HTML iconHTML  

    This paper proposes a technique for topology control (TC) of wireless nodes to meet Quality of Service (QoS) requirements between source and destination node pairs. The nodes are assumed to use a TDMA (Time Division Multiple Access) based MAC (Medium Access Control) layer. Given a set of QoS requirements, a set of wireless nodes and their initial positions, the goal is to find a topology of the no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-Tolerant Aggregation for Dynamic Networks

    Publication Year: 2010 , Page(s): 37 - 43
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (757 KB) |  | HTML iconHTML  

    Data aggregation is a fundamental building block of modern distributed systems. Averaging based approaches, commonly designated gossip-based, are an important class of aggregation algorithms as they allow all nodes to produce a result, converge to any required accuracy, and work independently from the network topology. However, existing approaches exhibit many dependability issues when used in fau... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 44 - 53
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (418 KB) |  | HTML iconHTML  

    Data aggregation scheduling, or converge cast, is a fundamental pattern of communication in wireless sensor networks (WSNs), where sensor nodes aggregate and relay data to a sink node. For WSN applications that require fast response time, it is imperative that the data reaches the sink as fast as possible. For such timeliness guarantees, TDMA-based scheduling can be used to assign time slots to no... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fixed Cost Maintenance for Information Dissemination in Wireless Sensor Networks

    Publication Year: 2010 , Page(s): 54 - 63
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (448 KB) |  | HTML iconHTML  

    Because of transient wireless link failures, incremental node deployment, and node mobility, existing information dissemination protocols used in wireless ad-hoc and sensor networks cause nodes to periodically broadcast "advertisement" containing the version of their current data item even in the "steady state" when no dissemination is being done. This is to ensure that all nodes in the network ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Resource-Efficient Adaptive Caching Scheme for Mobile Ad Hoc Networks

    Publication Year: 2010 , Page(s): 64 - 71
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (763 KB) |  | HTML iconHTML  

    In a Mobile Ad-Hoc Network environment, wireless devices have finite resources such as memory, energy and they work within the wireless constraints such as limited bandwidth and unreliable communication. Therefore, storage space, bandwidth, and battery life must be managed effectively in order to extend the usefulness and lifespan of wireless devices and the network. Caching is one of those techni... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • VMDriver: A Driver-Based Monitoring Mechanism for Virtualization

    Publication Year: 2010 , Page(s): 72 - 81
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (796 KB) |  | HTML iconHTML  

    Monitoring virtual machine (VM) is an essential function for virtualized platforms. Existing solutions are either coarse-grained - monitoring in granularity of VM level, or not general - only support specific monitoring functions for particular guest operating system (OS). Thus they do not satisfy the monitoring requirement in large-scale server cluster such as data center and public cloud platfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DKSM: Subverting Virtual Machine Introspection for Fun and Profit

    Publication Year: 2010 , Page(s): 82 - 91
    Cited by:  Papers (19)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (383 KB) |  | HTML iconHTML  

    Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection solutions share a common questionable assumption. This assumption is embodied in the expectation that original kernel data structures are respected by the untrusted guest and thus can be directly used to bridge the well-kno... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real Distribution of Response Time Instability in Service-Oriented Architecture

    Publication Year: 2010 , Page(s): 92 - 99
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1536 KB) |  | HTML iconHTML  

    This paper reports our practical experience of benchmarking a complex System Biology Web Service, and investigates the instability of its behaviour and the delays induced by the communication medium. We present the results of our statistical data analysis and distributions which fit and predict the response time instability typical of Service-Oriented Architectures (SOAs) built over the Internet. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Lightweight Task Graph Inference for Distributed Applications

    Publication Year: 2010 , Page(s): 100 - 110
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (523 KB) |  | HTML iconHTML  

    Recent paradigm shifts in distributed computing such as the advent of cloud computing pose new challenges to the analysis of distributed executions. One important new characteristic is that the management staff of computing platforms and the developers of applications are separated by corporate boundaries. The net result is that once applications go wrong, the most readily available debugging aids... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cooperative Sampling Approach to Discovering Optimal Configurations in Large Scale Computing Systems

    Publication Year: 2010 , Page(s): 111 - 120
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (686 KB) |  | HTML iconHTML  

    With the growing scale of current computing systems, traditional configuration tuning methods become less effective because they usually assume a small number of parameters in the system. In order to handle the scalability issue of configuration tuning, this paper proposes a cooperative optimization framework, which mimics the behavior of team playing to discover the optimal configuration setting ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Uncertainty Propagation in Analytic Availability Models

    Publication Year: 2010 , Page(s): 121 - 130
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (636 KB) |  | HTML iconHTML  

    In this paper, we discuss a Monte Carlo sampling based method for propagating the epistemic uncertainty in model parameters, through the system availability model. We also outline methods to compute the number of samples needed to obtain a desired confidence interval for various scenarios. We illustrate this method with a real system example and discuss the results obtained. While our example disc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Monitoring Local Progress with Watchdog Timers Deduced from Global Properties

    Publication Year: 2010 , Page(s): 131 - 140
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (469 KB) |  | HTML iconHTML  

    Distributed systems are used in numerous applications where failures can be costly. Due to concerns that some of the nodes may become faulty, critical services are usually replicated across several nodes, which execute distributed algorithms to ensure correct service in spite of failures. To prevent replica-exhaustion, it is fundamental to detect errors and trigger appropriate recovery actions. In... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.