<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DSN 2013</title>
	<atom:link href="http://2013.dsn.org/feed/" rel="self" type="application/rss+xml" />
	<link>http://2013.dsn.org</link>
	<description></description>
	<lastBuildDate>Mon, 24 Jun 2013 20:39:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
		<item>
		<title>City Guide and DSN Program</title>
		<link>http://2013.dsn.org/city-guide-and-dsn-program/</link>
		<comments>http://2013.dsn.org/city-guide-and-dsn-program/#comments</comments>
		<pubDate>Mon, 24 Jun 2013 13:40:38 +0000</pubDate>
		<dc:creator>huszerl</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1148</guid>
		<description><![CDATA[The Guide@Hand interactive city guide has a special edition for the DSN 2013 participants. To download it to your phone, follow the links (or directly the QR codes) on the Final Program page. GUIDE@HAND is an audio tourist guide application &#8230; <a href="http://2013.dsn.org/city-guide-and-dsn-program/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>The <a href="http://guideathand.com">Guide@Hand</a> interactive city guide has a special edition for the DSN 2013 participants. To download it to your phone, follow the links (or directly the QR codes) on the <a title="Final Program" href="http://2013.dsn.org/final-program/">Final Program</a> page.</p>
<p>GUIDE@HAND is an audio tourist guide application available on smart phones.<br />
<img style="float: left; padding-right: 25px; vertical-align: text-top;" alt="" src="http://2013.dsn.org/wp-content/uploads/2013/06/2013_GAtH_Budapest_DSN2013_iPhone_hajtas.png" height="300" /></p>
<ul>
<li>You can standalone discover the city during their one- or two-hour-long enjoyable walks.</li>
<li>You can get from one point to another by the help of voice instructions while walking.</li>
<li>They give you offline interactive maps, therefore, you do not have to pay for the Internet (e.g. roaming).</li>
<li>On your way, you can find useful places as well (e.g. restaurants, entertainment, shops, etc.) on the map.</li>
<li>You can use it in various languages.</li>
<li>And additional to all of that, you will have your DSN 2013 final program @Hand.</li>
</ul>
<p>&nbsp;</p>
<p>Some video tutorials of the application</p>
<ul>
<li><a href="http://files.elearning.sztaki.hu/demo/Budapest_EN_demo.mp4">How to visit Budapest with GUIDE@HAND</a></li>
<li><a href="http://files.elearning.sztaki.hu/demo/GAtH_2012MN_Events_demo_EN.mp4">Presenting events in GUIDE@HAND</a> (e.g. DSN 2013)</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/city-guide-and-dsn-program/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Final Program</title>
		<link>http://2013.dsn.org/final-program/</link>
		<comments>http://2013.dsn.org/final-program/#comments</comments>
		<pubDate>Mon, 24 Jun 2013 12:54:12 +0000</pubDate>
		<dc:creator>huszerl</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1132</guid>
		<description><![CDATA[The DSN 2013 final program can be downloaded here (PDF). Final program for Monday, 24th June. Final program for Tuesday, 25th June. Final program for Wednesday, 26th June. Final program for Thursday, 27th June. You may download to your phone &#8230; <a href="http://2013.dsn.org/final-program/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>The DSN 2013 final program can be downloaded <a title="DSN 2013 Final Program" href="http://2013.dsn.org/wp-content/uploads/2013/06/FinalProgram.pdf">here (PDF)</a>.</p>
<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
<p>You may download to your phone the Budapest GUIDE@HAND that besides being an interactive city guide, includes the DSN 2013 final program, as well.</p>
<table border="1">
<tr>
<th style="text-align:center">For Android</th>
<td rowspan="2"><a href="http://www.guideathand.com/"><img src="http://2013.dsn.org/wp-content/uploads/2013/06/2013_GAtH_Budapest_DSN2013_iPhone_hajtas.png" height="250" style="vertical-align:text-top" /></a></td>
<th style="text-align:center">For iPhone</th>
</tr>
<tr>
<td style="text-align:center"><a href="https://market.android.com/details?id=hu.sztaki.guideathand&#038;feature=search_result"><img alt="" src="http://2013.dsn.org/wp-content/uploads/2013/06/GuideAtHand_Google_qr_code.png" /></a></td>
<td style="text-align:center"><a href="http://itunes.apple.com/us/app/budapest-guide-hand-audio/id417961386?mt=8&#038;ls=1"><img alt="" src="http://2013.dsn.org/wp-content/uploads/2013/06/GuideAtHand_Apple_qr_code.png" /></a></td>
</tr>
</table>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/final-program/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Final Program &#8212; Wednesday</title>
		<link>http://2013.dsn.org/preliminary-program-wednesday-2/</link>
		<comments>http://2013.dsn.org/preliminary-program-wednesday-2/#comments</comments>
		<pubDate>Tue, 18 Jun 2013 11:51:43 +0000</pubDate>
		<dc:creator>Katalin Tasi</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1106</guid>
		<description><![CDATA[Final program for Monday, 24th June. Final program for Tuesday, 25th June. Final program for Wednesday, 26th June. Final program for Thursday, 27th June. Wednesday, 26 June Time Dependable Computing and Communications Symposium Performance and Dependability Symposium Plenary Session 8:30-9:45 &#8230; <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
<h2>Wednesday, 26 June</h2>
<table style="border: 1px solid black;">
<tbody>
<tr>
<th style="text-align: center; border: 1px solid black;">Time</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black;"><a title="DCCS 2013 — Welcome" href="http://2013.dsn.org/dccs-2013-welcome/">Dependable Computing and Communications Symposium</a></th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black;"><a title="PDS 2013 — Welcome" href="http://2013.dsn.org/pds-2013-welcome/">Performance and Dependability Symposium</a></th>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;" colspan="2">Plenary Session</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"> 8:30-9:45</td>
<td style="border: 1px solid black; text-align: center;" colspan="2">Keynote Address 2.<br />
<a title="Keynote Speach" href="http://2013.dsn.org/keynote-speaker-3/">Rashik Parmar: A Glimpse into the Future of Dependable Systems</a><br />(Chair: Doug Blough)</td>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">9:45-10:00</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="2">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">DCCS: Coping with Errors<br />(Chair: Saurabh Bagchi)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Memory and Caches<br />(Chair: Karama Kanoun)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="3">10:00-11:30</td>
<td style="border: 1px solid black;">Generative Software-based Memory Error Detection and Correction for Operating System Data Structures<br />
<em>C. Borchert, H. Schirmeier, O.Spinczyk</em></td>
<td style="border: 1px solid black;">FTSPM: A Fault-Tolerant Scratchpad Memory<br />
<em>A. M. H. Monazzah, H. Farbeh, S. G. Miremadi, M. Fazeli, H. Asadi</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">An Algorithmic Approach to Error Localization and Partial Recomputation for Low-Overhead Fault Tolerance<br />
<em>J. Sloan, G. Bronevetsky, R. Kumar</em></td>
<td style="border: 1px solid black;">PHYS: Profiled-Hybrid Sampling for Soft Error Reliability Benchmarking<br />
<em>J. Suh, M. Annavaram, M. Dubois</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">simFI: From Single to Simultaneous Software Fault Injections<br />
<em>S. Winter, M. Tretter, B. Sattler, N. Suri</em></td>
<td style="border: 1px solid black;">Error Detector Placement for Soft Computation<br />
<em>A. Thomas, K. Pattabiraman</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">11:45-12:00</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;" colspan="2">Special Address: Marina von Neumann<br />(Chair: Roberto Baldoni)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">12:00-12:45</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="2">Lunch</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">DCCS: Seamless, Graceful, and Transparent<br />(Chair: Gilles Muller)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Experimental Studies and Data Analysis<br />(Chair: Felicita di Giandomenico)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="3">12:45-14:15</td>
<td style="border: 1px solid black;">Chasing the Optimum in Replicated In-memory Transactional Platforms via Protocol Adaptation<br />
<em>M. Couceiro, P. Ruivo, P. Romano, L. Rodrigues</em></td>
<td style="border: 1px solid black;">A Practical Characterization of a NASA Spacecube Application through Fault Emulation and Laser Testing<br />
<em>J. P. Walters, K. Zick, M. French</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Seamless Kernel Updates<br />
<em>M. Siniavine, A. Goel</em></td>
<td style="border: 1px solid black;">An Empirical Investigation of Fault Repairs and Mitigations in Space Mission System Software<br />
<em>J. Alonso, M. Grottke, A. Nikora, K. Trivedi</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Application-Driven TCP Recovery and Non-Stop BGP<br />
<em>R. Surton, K. Birman, R. van Renesse</em></td>
<td style="border: 1px solid black;">Reading between the Lines of Failure Logs: Understanding How HPC Systems Fail<br />
<em>N. El-Sayed, B. Schroeder</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">14:15-14:30</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="2">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">DCCS: The Solid Bottom of the System Stack<br />(Chair: Zbigniew Kalbarczyk)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Wireless Networks<br />(Chair: Evgenia Smirni)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">14:30-15:30</td>
<td style="border: 1px solid black;">Operating SECDED-Based Caches at Ultra-Low Voltage with FLAIR<br />
<em>M. Qureshi, Z. Chishti</em></td>
<td style="border: 1px solid black;">Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach<br />
<em>F. Tan, Y. Wang, Q. Wang, L. Bu, R. Zheng, N. Suri</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Stress Balancing to Mitigate NBTI Effects in Register Files<br />
<em>H. Amrouch, T. Ebi, J. Henkel</em></td>
<td style="border: 1px solid black;">Wirelesshart Modeling And Performance Evaluation<br />
<em>A. Remke, X. Wu</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">15:50-22:30</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;" colspan="2"><a title="Excursion and Banquet" href="http://2013.dsn.org/excursion-and-banquet/">Excursion and Banquett</a></td>
</tr>
</tbody>
</table>
<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/preliminary-program-wednesday-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Final Program &#8212; Tuesday</title>
		<link>http://2013.dsn.org/preliminary-program-tuesday-2/</link>
		<comments>http://2013.dsn.org/preliminary-program-tuesday-2/#comments</comments>
		<pubDate>Tue, 18 Jun 2013 11:51:27 +0000</pubDate>
		<dc:creator>Katalin Tasi</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1100</guid>
		<description><![CDATA[Final program for Monday, 24th June. Final program for Tuesday, 25th June. Final program for Wednesday, 26th June. Final program for Thursday, 27th June. Tuesday, 25 June Time Dependable Computing and Communications Symposium Performance and Dependability Symposium 8:15-9:00 Welcome Address &#8230; <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
<h2>Tuesday, 25 June</h2>
<table style="border: 1px solid black;">
<tbody>
<tr>
<th style="text-align: center; border: 1px solid black;">Time</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black;"><a title="DCCS 2013 — Welcome" href="http://2013.dsn.org/dccs-2013-welcome/">Dependable Computing and Communications Symposium</a></th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black;"><a title="PDS 2013 — Welcome" href="http://2013.dsn.org/pds-2013-welcome/">Performance and Dependability Symposium</a></th>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"> 8:15-9:00</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;" colspan="2">Welcome Address</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;" colspan="2">Plenary Session</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"> 9:00-10:15</td>
<td style="border: 1px solid black; text-align: center;" colspan="2">Keynote Address 1.<br /><a title="Keynote Speach" href="http://2013.dsn.org/keynote-speaker-1/">Ken Birman: Adapting High Assurance Distributed Computing Techniques for Cloud-Scale Settings</a><br />(Chair: George Candea)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;" colspan="2">Presentation of the Carter Award Winner</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">10:15-10:45</td>
<td style="text-align: center; border: 1px solid black;" colspan="2">Hector: Detecting Resource-Release Omission Faults in Error-Handling Code for Systems Software<br />
<em>S. Saha, J.-P. Lozi, G. Thomas, J.  Lawall,  G. Muller</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">10:45-11:15</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="2">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">DCCS: Clouds We Can Trust<br />(Chair: Paulo Verissimo)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Operating Systems Security<br />(Chair: Marco Vieira)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="3">11:15-12:45</td>
<td style="border: 1px solid black;">CloudPD: Problem Determination and Diagnosis in Shared Dynamic Clouds<br />
<em>B. Sharma, P. Jayachandran, A. Verma, C. Das</em></td>
<td style="border: 1px solid black;">DRIP: A Framework for Purifying Trojaned Kernel Drivers<br />
<em>Z. Gu, W. N. Sumner, Z. Deng, X. Zhang, D. Xu</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Mitigating Access-Driven Timing Channels in Clouds using StopWatch<br />
<em>P. Li, D. Gao, M. Reiter</em></td>
<td style="border: 1px solid black;">SPECTRE: A Dependable Introspection Framework via System Management Mode<br />
<em>F. Zhang, K. Leach, K. Sun, A. Stavrou</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">EagleEye: Towards Mandatory Security Monitoring in Virtualized Datacenter Environment<br />
<em>Y-S. Wu, P-K. Sun, C-C. Huang, S-F. Lai, Y-Y. Chen, S-J. Lu</em></td>
<td style="border: 1px solid black;">Manipulating Semantic Values in Kernel Data Structures: Attack Assessments and Implications<br />
<em>A. Prakash, E. Venkataramani, H. Yin, Z. Lin</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">12:45-14:00</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="2">Lunch</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">DCCS: Debugging and Diagnosis<br />(Chair: Ashvin Goel)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Stochastic Modeling Techniques<br />(Chair: Lydia Chen)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="3">14:00-15:30</td>
<td style="border: 1px solid black;">Why is My Smartphone Slow? On The Fly Diagnosis of Poor Performance on Mobile Internet<br />
<em>C. Amrutkar, M. Hiltunen, T. Jim, K. Joshi, O. Spatscheck, P. Traynor, S. Venkataraman</em></td>
<td style="border: 1px solid black;">A Logic for Model-Checking Mean-Field Models<br />
<em>A. Kolesnichenko, A. Remke, P.-T. de Boer, B. Haverkort</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Lightweight Message Tracing for Debugging Wireless Sensor Networks<br />
<em>V. Sundaram, P. Eugster</em></td>
<td style="border: 1px solid black;">Lumpability of Fluid Models with Heterogeneous Agent Types<br />
<em>G. Iacobelli, M. Tribastone</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Automating the Debugging of Datacenter Applications with ADDA<br />
<em>C. Zamfir, G. Altekar, I. Stoica</em></td>
<td style="border: 1px solid black;">Fitting Second-Order Acyclic Marked Markovian Arrival Processes<br />
<em>A. Sansottera, G. Casale, P. Cremonesi</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">15:30-16:00</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="2">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">DCCS: Distributed Dependability<br />(Chair: Neeraj Suri)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Virtualization<br />(Chair: Boudewijn Haverkort)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="3">16:00-17:30</td>
<td style="border: 1px solid black;">Fault Detection and Localization in Distributed Systems using Invariant Relationships<br />
<em>A. Sharma, H. Chen, M. Ding, K. Yoshihira, G. Jiang</em></td>
<td style="border: 1px solid black;">SIDE: Isolated and Efficient Execution of Unmodified Device Drivers<br />
<em>Y. Sun, T. Chiueh</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Increasing Network Resiliency by Optimally Assigning Diverse Variants to Routing Nodes<br />
<em>A Newell, D. Obenshain, T. Tantillo, C. Nita-Rotaru, Y. Amir</em></td>
<td style="border: 1px solid black;">Security Implications of Memory Deduplication in a Virtualized Environment<br />
<em>J. Xiao, Z. Xu, H. Huang. H. Wang</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Distal: A Framework for Implementing Fault-tolerant Distributed Algorithms<br />
<em>M. Biely, P. Delgado, Z. Milosevic, A. Schiper</em></td>
<td style="border: 1px solid black;">State-Of-The-Practice in Data Center Virtualization: Toward a Better Understanding of VM Usage<br />
<em>R. Birke, A. Podzimek, L. Y. Chen and E. Smirni</em></td>
</tr>
</tbody>
</table>
<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/preliminary-program-tuesday-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Final Program &#8212; Thursday</title>
		<link>http://2013.dsn.org/preliminary-program-thursday-2/</link>
		<comments>http://2013.dsn.org/preliminary-program-thursday-2/#comments</comments>
		<pubDate>Tue, 18 Jun 2013 11:51:08 +0000</pubDate>
		<dc:creator>Katalin Tasi</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1096</guid>
		<description><![CDATA[Final program for Monday, 24th June. Final program for Tuesday, 25th June. Final program for Wednesday, 26th June. Final program for Thursday, 27th June. Thursday, 27 June Time Dependable Computing and Communications Symposium Performance and Dependability Symposium Fast Abstracts Plenary &#8230; <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
<h2>Thursday, 27 June</h2>
<table style="border: 1px solid black;">
<tbody>
<tr>
<th style="text-align: center; border: 1px solid black;">Time</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black;"><a title="DCCS 2013 — Welcome" href="http://2013.dsn.org/dccs-2013-welcome/">Dependable Computing and Communications Symposium</a></th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black;"><a title="PDS 2013 — Welcome" href="http://2013.dsn.org/pds-2013-welcome/">Performance and Dependability Symposium</a></th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black;">Fast Abstracts</th>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;" colspan="3">Plenary Session</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"> 8:30-9:45</td>
<td style="border: 1px solid black; text-align: center;" colspan="3">Keynote Address 3.<br /><a title="Keynote Speach" href="http://2013.dsn.org/keynote-speaker-2/">László Lovász: Large Networks and Their Mathematical Theory</a><br />(Chair: András Pataricza)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">9:45-10:15</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="3">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">DCCS: Keeping Safe in a Connected World<br />(Chair: Cristina Nita-Rotaru)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Storage Systems<br />(Chair: Peter Kemper)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">Fast Abstracts 1.<br />(Chair: Elias Duarte)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="6">10:15-11:45</td>
<td style="border: 1px solid black;" rowspan="2">Detecting Malicious Landing Pages in Malware Distribution Networks<br />
<em>G. Wang, J. Stokes, C. Herley, D. Felstead</em></td>
<td style="border: 1px solid black;" rowspan="2">Improving SSD Reliability with RAID via Elastic Striping and Anywhere Parity<br />
<em>J. Kim, J. Choi, D. Lee, S. H. Noh</em></td>
<td style="border: 1px solid black;">A Review of Cloud Deployment Models For E-Learning Systems<br />
<em>E. Leloglu, T. Ayav, B. G. Aslan</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">A View on the Past and Future of Fault Injection<br />
<em>N. Silva, R. Barbosa, J. C. Cunha, M. Vieira</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Redefining Web Browser Principals with a Configurable Origin Policy<br />
<em>Y. Cao, V. Rastogi, Z. Li, Y. Chen, A. Moshchuk</em></td>
<td style="border: 1px solid black;" rowspan="2">Geo-Replicated Storage with Scalable Deferred Update Replication<br />
<em>D. Sciascia, F. Pedone</em></td>
<td style="border: 1px solid black;">An Adaptive Approach to Dependable Circuits for a Digital Power Control<br />
<em>A Saysanasongkham, K. Imai, M. Aarai, S. Fukumoto, K. Wada</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Modeling and Analysing Operation Processes for Dependability<br />
<em>X. Xu, L. Zhu, J. Li, L. Bass, Q. Lu, M. Fu</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Practical Automated Vulnerability Monitoring Using Program State Invariants<br />
<em>C. Giuffrida, L. Cavallaro, A. S. Tanenbaum</em></td>
<td style="border: 1px solid black;" rowspan="2">Consistency or Latency? A Quantitative Analysis of Replication Systems Based on Replicated State Machines<br />
<em>X. Wang, H. Sun, T. Deng</em></td>
<td style="border: 1px solid black;">Design of Event-Based Intrusion Detection System on OpenFlow Network<br />
<em>Y.-Li Hu, W.-B. Su, L.-Y. Wu, Y. Huang, S.-Y. Kuo</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Evaluating Xilinx SEU Controller Macro for Fault Injection<br />
<em>J. L. Nunes, J. C. Cunha, R. Barbosa, M. Zenha-Rela</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">11:45-12:45</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="3">Lunch</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">Student Papers: Software &amp; Network Dependability<br />(Chair: Takashi Nanya)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Network security<br />(Chair: Ilier Gashi)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">Fast Abstracts 2.<br />(Chair: Dong Seong Kim)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="5">12:45-14:15</td>
<td style="border: 1px solid black;" rowspan="2">A Framework for Runtime V&amp;V in Business-Critical Service Oriented Architectures<br />
<em>C. Areias</em></td>
<td style="border: 1px solid black;" rowspan="2">Uniform Node Sampling Service Robust Against Collusions of Malicious Nodes<br />
<em>E. Anceaume, Y. Busnel, B. Sericola</em></td>
<td style="border: 1px solid black;">Complementing Static and Dynamic Analysis Approaches For Better Network Defense<br />
<em>H. Pareek</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Network Traffic Anomaly Detection based on Growing Hierarchical SOM<br />
<em>S.-Y. Huang, Y.-N. Huang</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" >Barley: Modelling Program Behavior with Resource Usage<br />
<em> K. Leach</em></td>
<td style="border: 1px solid black;">Implementing the ADVISE Security Modeling Formalism in MOBIUS<br />
<em>M. Ford, K. Keefe, E. LeMay, W. Sanders, C. Muehrcke</em></td>
<td style="border: 1px solid black;">Performability analysis of RAID10 versus RAID6<br />
<em>F. Machida, J. Xiang, K. Tadano, Y. Maeno, T. Horikawa</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Fault-Tolerant Broadcast Algorithms for the Virtual Hypercube Topology<br />
<em>L. A. Rodrigues</em></td>
<td style="border: 1px solid black;" rowspan="2">Crossing the Threshold: Detecting Network Malfeasance via Sequential Hypothesis Testing<br />
<em>S. Krishnan, T. Taylor, F. Monrose, J. McHugh</em></td>
<td style="border: 1px solid black;">The Architecture of a Resilience Infrastructure for Computing and Communication Systems<br />
<em>A. Avizienis</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Towards Secure Monitoring and Control Systems: Diversify!<br />
<em>D. Cotroneo, A. Pecchia, S. Russo</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">14:15-14:30</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="3">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">Student Papers: Hardware Dependability<br />(Chair: Yair Amir)</td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;">PDS: Internet Security<br />(Chair: Robin Berthier)</td>
<td style="border: 1px solid black;" rowspan="4"></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="3">14:30-15:30</td>
<td style="border: 1px solid black;">Improving the Dependability of FPGA-based real-time embedded systems with Partial Dynamic Reconfiguration<br />
<em>J. L. Nunes</em></td>
<td style="border: 1px solid black;">Locality Matters: Reducing Internet Traffic Graphs Using Location Analysis<br />
<em>A. Berger, S. Rührup, W. Gansterer, O. Jung</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Detecting and Tolerating Data Corruptions Due to Device Driver Defects<br />
<em>F. Fucci</em></td>
<td style="border: 1px solid black;" rowspan="2">Evasive Bots Masquerading as Human Beings on the Web<br />
<em>J. Jin, J. Offutt, N. Zheng, F. Mao, A. Koehl, H. Wang</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">IOCheck: A Framework to Enhance the Security of I/O Devices at Runtime<br />
<em>F. Zhang</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; border: 1px solid black; text-align: center;" colspan="3">Technical Committee Meeting</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">15:30-16:30</td>
<td style="border: 1px solid black; text-align: center;" colspan="3">(open to all)</td>
</tr>
</tbody>
</table>
<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/preliminary-program-thursday-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Final Program &#8212; Monday</title>
		<link>http://2013.dsn.org/preliminary-program-monday-2/</link>
		<comments>http://2013.dsn.org/preliminary-program-monday-2/#comments</comments>
		<pubDate>Tue, 18 Jun 2013 11:50:43 +0000</pubDate>
		<dc:creator>huszerl</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1087</guid>
		<description><![CDATA[Final program for Monday, 24th June. Final program for Tuesday, 25th June. Final program for Wednesday, 26th June. Final program for Thursday, 27th June. Monday, 24 June (Workshop-Tutorial Day) Time DCDV RSDA WORCS WSR Tutorial 1 Tutorial 2 (Chair: Robert &#8230; <a href="http://2013.dsn.org/preliminary-program-monday-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
<h2>Monday, 24 June</h2>
<p>(Workshop-Tutorial Day)</p>
<table style="border: 1px solid black;">
<tbody>
<tr>
<th style="text-align: center; border: 1px solid black; border-bottom-style:none; ">Time</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black; border-bottom-style:none;">DCDV</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black; border-bottom-style:none;">RSDA</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black; border-bottom-style:none;">WORCS</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black; border-bottom-style:none;">WSR</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black; border-bottom-style:none;">Tutorial 1</th>
<th style="background-color: #cccccc; text-align: center; border: 1px solid black; border-bottom-style:none;">Tutorial 2</th>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black; border-top-style:none;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black; border-top-style:none;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black; border-top-style:none;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black; border-top-style:none;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black; border-top-style:none;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black; border-top-style:none;">(Chair: Robert Schwarz)</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black; border-top-style:none;">(Chair: Allen Wood)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">8:30-8:45</td>
<td style="border: 1px solid black;">Opening remarks</td>
<td style="border: 1px solid black;">Opening remarks<br />
<em>C. Di Martino, A. Pecchia, J. Stearly</em></td>
<td style="border: 1px solid black;">Introduction<br />
<em>M. Kaâniche</em></td>
<td style="border: 1px solid black;" rowspan="6"></td>
<td style="border: 1px solid black;" rowspan="6"><a title="Tutorial (P. Veríssimo)" href="http://2013.dsn.org/tutorial-p-verissimo/">P. Verissimo: Beyond the Glamour of Byzantine Fault Tolerance: Or Why Resisting Intrusions Means More than BFT </a>(half day)</td>
<td style="border: 1px solid black;" rowspan="6"><a title="Tutorial (A. Romanovsky)" href="http://2013.dsn.org/tutorial-a-romanovsky/">A. Romanovsky: Correct-by-Construction Development of Dependable Systems</a> (full day)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 1: Cloud and Data Center Networking</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 1: Security Data Analysis and Modeling</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 1: Human Interactive Automated Driving Systems</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="4">8:45-10:00</td>
<td style="border: 1px solid black;" rowspan="2">Towards SDN Enabled Network Control Delegation in Clouds<br />
<em>S. Malik, M. Montanari, J. Ho Huh, R. Bobba, R. Campbell</em></td>
<td style="border: 1px solid black;">Keynote: The Role of Data for Safety Critical Systems Development and Validation<br />
<em>N. Silva (Critical Software Inc.)</em></td>
<td style="border: 1px solid black;" rowspan="2">Keynote: Toward Vehicle Automation- ADAS The New Challenges<br />
<em>S. Boverie</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Data Fusion-Based Anomaly Detection in Networked Critical Infrastructures<br />
<em>B. Genge, C. Siaterlis, G. Karopoulos</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Fault-Tolerance Characteristics of Data Center Network Topologies Using Fault Regions<br />
<em>Y. Liu, J. Muppala</em></td>
<td style="border: 1px solid black;">Investigating DNS Traffic Anomalies for Malicious Activities<br />
<em>F. Yarochkin, V. Kropotov, Y. Huang, S.-Y. Kuo, G.-K. Ni, I.-Y Chen</em></td>
<td style="border: 1px solid black;" rowspan="2">Autonomous Emergency Braking: A System-of-Systems Perspective<br />
<em>H. Kopetz, S. Poledna</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Scalable Security Analysis in Hierarchical Attack Representation Model using Centrality Measures<br />
<em>J. B. Hong, D. S. Kim</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">10:00-10:15</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="6">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">10:15-10:30</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="3"></td>
<td style="border: 1px solid black;">Chair&#8217;s Welcome Remarks<br />
<em>H. Maruyama</em></td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="2"></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 2: Dependability Evaluation</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 2: Failures and Robustness Analysis</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 2: Security</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 1: Resilience Definitions and Research Opportunities<br />(Chair: Patricia Longstaff)</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Tutorial 1</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Tutorial 2</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="4">10:30-12:00</td>
<td style="border: 1px solid black;">Availability Study on Cloud Computing Environments: Live Migration as a Rejuvenation Mechanism<br />
<em>M. Melo, P. Maciel, J. Araujo, R. Matos, C. Araújo</em></td>
<td style="border: 1px solid black;">Automatic Collection of Failure Data from the iOS Platform<br />
<em>M. Cinque, D. Cotroneo, C. R. Dominguez, J. L. Garrido</em></td>
<td style="border: 1px solid black;">Keynote: Detecting Cognitive State for Operators of Cyber-Physical Systems: Design of Experiments<br />
<em>R. Maxion</em></td>
<td style="border: 1px solid black;">Towards Systems Resilience<br />
<em>H. Maruyama</em></td>
<td style="border: 1px solid black;" rowspan="4">P. Verissimo: Beyond the Glamour of Byzantine Fault Tolerance: Or Why Resisting Intrusions Means More than BFT (half day, cont&#8217;d)</td>
<td style="border: 1px solid black;" rowspan="4">A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont&#8217;d)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Dependability Models for Designing Disaster Tolerant Cloud Computing Systems<br />
<em>B. Silva, P. Maciel, E. Tavares, A. Zimmermann</em></td>
<td style="border: 1px solid black;">Towards Evaluating the Impact of Data Quality on Service Applications<br />
<em>N. Ivaki, N. Laranjeiro, M. Vieira</em></td>
<td style="border: 1px solid black;" rowspan="3">A Survey of Security Threats and Protection Mechanisms in Embedded Automotive Networks<br />
<em>I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaâniche, Y. Laarouchi</em></td>
<td style="border: 1px solid black;">FORISK: Formalizing Information Security Risk and Compliance Management<br />
<em>S. Fenz, T. Neubauer, R. Accorsi, T. Koslowski</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Analysis of Bugs in Apache Virtual Computing Lab<br />
<em>F. Frattini, R. Ghosh, M. Cinque, A. Rindos, K. Trivedi</em></td>
<td style="border: 1px solid black;">Golden-run Alignment for Analysis of Robustness Testing Results: Dealing with Diagnostics Issues<br />
<em>G. Lemos, E. Martins</em></td>
<td style="border: 1px solid black;">Key Issues in Service Systems Resilience<br />
<em>K. Furuta, T. Kanno</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="text-align: center; border: 1px solid black;">Author&#8217;s Panel</td>
<td style="border: 1px solid black;">SCoRe: An Across-the-Board Metric for Computer Systems Resilience<br />
Benchmarking<br />
<em>R. Almeida, A. Araújo Neto, M. Vieira</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">12:00-13:30</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="6">Lunch</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 3: Mobile and Cloud Computing</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 3: Data-Driven Dependability</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 3: Smart Cooperative Driving</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 2: Modeling Resilience<br />(Chair: Thomas Koslowski)</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Tutorial 3</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Tutorial 2</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="4">13:30-15:00</td>
<td style="border: 1px solid black;">Model-based Performance Analysis of Local Re-execution Scheme in Offloading System<br />
<em>Q. Wang, H. Wu, K. Wolter</em></td>
<td style="border: 1px solid black;">Reducing Service Failures by Failure and Workload aware Load Balancing in SaaS Clouds<br />
<em>A. Roy, R. Ganesan, D. Dash, S. Sarkar</em></td>
<td style="border: 1px solid black;">On Reliability Analysis of Leader Election Protocols for Virtual Traffic Lights<br />
<em>N. Fathollahneja, E. Villani, R. Pathan, R. Barbosa , J. Karlsson</em></td>
<td style="border: 1px solid black;">Model-Based Evaluation of System Resilience<br />
<em>J. Meyer</em></td>
<td style="border: 1px solid black;" rowspan="4"><a title="Tutorial (R. Baldoni)" href="http://2013.dsn.org/tutorial-r-baldoni/">R. Baldoni: Living in a Trustworthy Cyberspace </a>(half day)</td>
<td style="border: 1px solid black;" rowspan="4">A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont&#8217;d)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">DataFlasks: an epidemic dependable key-value substrate<br />
<em>F. Maia, M.Matos, R. Vilaça, J. Pereira, R. Oliveira, E. Riviere</em></td>
<td style="border: 1px solid black;">Storage-Efficient Data Replica Number Computation for Multi-level Priority Data in Distributed Storage System<br />
<em>C. Cai, C. Abad, R. Campbell</em></td>
<td style="border: 1px solid black;" rowspan="2">The KARYON project: Predictable and Safe Coordination in Cooperative Vehicular Systems<br />
<em>A. Casimiro, J. Kaiser, E. M. Schiller, P. Costa, J. Parizi, R. Johansson, R. Librino</em></td>
<td style="border: 1px solid black;">Resilience Modeling by Means of a Set of Recursive Functions<br />
<em>M. T. Signes, J. M. García, H. Mora, J. Mora</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Lilliput meets Brobdingnagian: Data Center Systems Management through Mobile Devices<br />
<em>S. Bagchi, F.Arshad, J. Rellermeyer, T. Osiecki, M. Kistler, A. Gheith</em></td>
<td style="border: 1px solid black;">Predicting Job Completion Times Using System Logs in Supercomputing Clusters<br />
<em>X. Chen, C -D. Lu, K. Pattabiraman</em></td>
<td style="border: 1px solid black;" rowspan="2">Behavioral aspects for agent-based models of resilient urban systems<br />
<em>T. Brudermann, Y. Yamagata</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Reliable Mission Deployment in Vulnerable Distributed Systems<br />
<em>M. Albanese, S. Jajodia, R. Jhawar, V. Piuri</em></td>
<td style="border: 1px solid black;">Driver Performance in the Presence of Adaptive Cruise Control Related-Failures<br />
<em>J. Nilsson, N. Strand, P. Falcone, J. Vinter</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">15:00-15:15</td>
<td style="background-color: #98fb98; text-align: center; border: 1px solid black;" colspan="6">Break</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 4: Virtualization and Cloud</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 4: Data-Driven Security</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 4: Panel and Workshop Wrap-up</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Session 3: Building Resilient Systems<br />(Chair: Kazuhiro Minami)</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;"></td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;">Tutorial 2</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="5">15:15-17:00</td>
<td style="border: 1px solid black;">Increasing the Trustworthiness of Commodity Hardware Through Software<br />
<em>K. Elphinstone, Y. Shen</em></td>
<td style="border: 1px solid black;">Practical Experiences with Real-world Systems: Security in the World of Reliable and Safe Systems<br />
<em>N. Silva, R. Lopes</em></td>
<td style="border: 1px solid black;" rowspan="3">Panel: Human Interactive Autonomous Driving: Future Trends, Resilience Challenges and Research perspectives<br />
<em>Panelists: S. Boverie, J. Karlsson, H. Kopetz, J. Vinter</em></td>
<td style="border: 1px solid black;">An Intrusion-Tolerant Firewall Design for Protecting SIEM Systems<br />
<em>M. Garcia, N. Neves, A. Bessani</em></td>
<td style="border: 1px solid black;" rowspan="5"></td>
<td style="border: 1px solid black;" rowspan="5">A. Romanovsky: Correct-by-Construction Development of Dependable Systems (full day, cont&#8217;d)</td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Intrusion Detection and Honeypots in Nested Virtualization Environments<br />
<em>M. Beham, M. Vlad, H. P. Reiser</em></td>
<td style="border: 1px solid black;">Interoperability in Fingerprint Recognition &#8211; A Large Scale Empirical Study<br />
<em>L. Lugini, E. Marasco, B. Cukic, I. Gashi </em></td>
<td style="border: 1px solid black;">Community-based Resilient Electricity Sharing: Optimal Spatial Clustering<br />
<em>Y. Yamagata, H. Seya</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">SAFE: Shoulder-Surfing Attack Filibustered With Ease<br />
<em>N. Gowraj, P. V. Ravi, S. Avireddy , S. Prabhu </em></td>
<td style="border: 1px solid black;" rowspan="3">Cyber Security Problem based on Multi-Objective Distributed Constraint Optimization Technique<br />
<em>T. Okimoto, N. Ikegai, T. Ribeiro, K. Inoue, H. Okada, H. Maruyama</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;" rowspan="2">Addressing Memory Exhaustion Failures in Virtual Machines in a Cloud Environment<br />
<em>J. Navas Molina, S. Mishra</em></td>
<td style="border: 1px solid black;">Authors&#8217; Panel</td>
<td style="border: 1px solid black;" rowspan="2">Workshop Wrap-up and Conclusions<br />
<em></em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">Concluding remarks<br />
<em>C. Di Martino, A. Pecchia, J. Stearley</em></td>
</tr>
<tr style="font-size: 70%;">
<td style="border: 1px solid black;">18:30-20:00</td>
<td style="background-color: #cccccc; text-align: center; border: 1px solid black;" colspan="6">Welcome Reception<br />Location: Hungarian Academy of Sciences</td>
</tr>
</tbody>
</table>
<p>Final program for <a href="http://2013.dsn.org/preliminary-program-monday-2/">Monday, 24th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-tuesday-2/">Tuesday, 25th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-wednesday-2/">Wednesday, 26th June</a>.<br />
Final program for <a href="http://2013.dsn.org/preliminary-program-thursday-2/">Thursday, 27th June</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/preliminary-program-monday-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Danube flood has no impact on DSN</title>
		<link>http://2013.dsn.org/danube-flood-has-no-impact-on-dsn/</link>
		<comments>http://2013.dsn.org/danube-flood-has-no-impact-on-dsn/#comments</comments>
		<pubDate>Tue, 11 Jun 2013 14:52:30 +0000</pubDate>
		<dc:creator>pataric</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1073</guid>
		<description><![CDATA[Fortunately, the Danube flood has no impact on DSN. The water level of the river reached a historic record height but is decreasing (see the webcam ). The hotel is located at least by one meter higher, then the road &#8230; <a href="http://2013.dsn.org/danube-flood-has-no-impact-on-dsn/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Fortunately, the Danube flood has no impact on DSN.</p>
<p>The water level of the river reached a historic record height but is decreasing (see the <a title="Danube flood" href="http://online.bme.hu/dflood/" target="_blank">webcam</a> ). The hotel is located at least by one meter higher, then the road with the trafic. It is expected, that at the time of DSN the city returns completely to its normal life.</p>
<p>The below pictures were taken just in front of the conference hotel during the flood (during the last days preparations for DSN 2013 at the hotel). The normal state is when the Danube does not flood the lower road along the river. Look for the inclination of the small bridges connecting the ships and the road. The upper road (look for the tram track on the right side of the first picture and on the left side of the third picture) was not flooded. The highest flood now was 35-40 cm below the level of the upper road. But the downtown of Budapest was safe because of this lower and upper roads and the river wall made of stone by our ancestors.</p>
<table>
<tr>
<td><img src="http://2013.dsn.org/wp-content/uploads/2013/06/Kép0120r.jpg" height="200" /></td>
<td>&nbsp;</td>
</tr>
<tr>
<td><img src="http://2013.dsn.org/wp-content/uploads/2013/06/Kép0107r.jpg" height="200" /></td>
<td><img src="http://2013.dsn.org/wp-content/uploads/2013/06/Kép0108r.jpg" height="200" /></td>
</tr>
<tr>
<td><img src="http://2013.dsn.org/wp-content/uploads/2013/06/Kép0109r.jpg" height="200" /></td>
<td><img src="http://2013.dsn.org/wp-content/uploads/2013/06/Kép0110r.jpg" height="200" /></td>
</tr>
<tr>
<td><img src="http://2013.dsn.org/wp-content/uploads/2013/06/Kép0117r.jpg" height="200" /></td>
<td><img src="http://2013.dsn.org/wp-content/uploads/2013/06/Kép0118r.jpg" height="200" /></td>
</tr>
<tr>
<td></td>
<td></td>
</tr>
</table>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/danube-flood-has-no-impact-on-dsn/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Presentations Instructions</title>
		<link>http://2013.dsn.org/presentations-instruction/</link>
		<comments>http://2013.dsn.org/presentations-instruction/#comments</comments>
		<pubDate>Mon, 10 Jun 2013 21:19:49 +0000</pubDate>
		<dc:creator>huszerl</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1066</guid>
		<description><![CDATA[Please read the information below carefully before preparing your presentation for the DSN 2013 conference. We will continuously update this page, please come back and check time to time. The organizers will provide computers with beamers to use when presenting &#8230; <a href="http://2013.dsn.org/presentations-instruction/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p>Please read the information below carefully before preparing your presentation for the DSN 2013 conference. We will continuously update this page, please come back and check time to time.</p>
<ul>
<li>The organizers will provide computers with beamers to use when presenting your work. You may expect preinstalled software to play PDF and PPT(X) files. To avoid long presentation switching times please do not use your own computer and please upload and test your presentation on the provided computer before(!) your session starts.</li>
<li>For the <strong>DCCS</strong> and <strong>PDS</strong> sessions please plan your presentation not to exceed 25 minutes. Every presentation will be followed by a 5 minutes discussion slot.</li>
<li>For the <strong>DCDV</strong>, and <strong>WORCS</strong> workshop presentations and for the <strong>Student Papers</strong> the same &#8220;25+5 minutes rule&#8221; applies. For the <strong>WSR</strong> workshop presentations expect 20+5 minutes. For the <strong>RSDA</strong> workshop presentations expect only 15 minutes (and 5 minutes discussion).</li>
<li>In the <strong>Fast Abstracts</strong> session 10 minutes presentations will be followed by 5 minutes discussions.</li>
</ul>
<p>We are looking forward to seeing your valuable presentations.</p>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/presentations-instruction/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>William C. Carter Award</title>
		<link>http://2013.dsn.org/william-c-carter-award-2/</link>
		<comments>http://2013.dsn.org/william-c-carter-award-2/#comments</comments>
		<pubDate>Wed, 05 Jun 2013 21:01:09 +0000</pubDate>
		<dc:creator>huszerl</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1057</guid>
		<description><![CDATA[Dr. William C. Carter (1917-1996) was a key figure in the formation and development of the field of dependable computing and fault tolerance. He graduated in mathematics at the Balliol College in Oxford, England, and received his doctorate in mathematics from  Harvard University in 1947. His career spanned over four &#8230; <a href="http://2013.dsn.org/william-c-carter-award-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><a href="http://2013.dsn.org/wp-content/uploads/2013/06/carter.gif"><img class="alignleft" alt="Dr. William C. Carter (1917-1996)" src="http://2013.dsn.org/wp-content/uploads/2013/06/carter.gif" height="150" /></a>Dr. William C. Carter (1917-1996) was a key figure in the formation and development of the field of dependable computing and fault tolerance. He graduated in mathematics at the Balliol College in Oxford, England, and received his doctorate in mathematics from  Harvard University in 1947. His career spanned over four decades, from programming, debugging, and recovery in ENlAC, through reliability, availability and serviceability during the evolution and definition of IBM mainframes. He designed and developed computers and programming systems for Raytheon, Datamatic, Honeywell and IBM, he was a fellow of IEEE, and he with his brother established a Carter Professorship in Mathematics at the Colby College, Waterville, Maine.</p>
<p>In particular, he took great interest in the future of the field and was instrumental in promoting the work of young contributors. It was characteristic of Bill to take the initiative in reaching out to students and younger colleagues. Despite the demands of his own career, he knew the value of taking the time to encourage, mentor, and inspire newcomers to the field.</p>
<p>The William C. Carter Award has been presented annually since 1997, and was established by the IEEE Technical Committee on Fault-Tolerant Computing (TC-FTC) together with the IFIP Working Group on Dependable Computing and Fault Tolerance (WG lOA). The award is intended to honor and carry on Dr. Carter&#8217;s legacy by recognizing an outstanding paper based<br />
on a graduate dissertation.</p>
<p>To qualify, a paper based on a student&#8217;s dissertation must have been submitted as a regular conference paper to DSN, with the student as the first author. Both current graduate students and former graduate students, no more than two years past the completion of their dissertation, are eligible. All Carter Award submissions accepted as regular DCCS and PDS<br />
papers were evaluated by the DSN Steering Committee.</p>
<p>The winner of the 2013 William C. Carter Award is</p>
<p style="text-align: center;"><strong>Suman Saha</strong><br />
Laboratory of Computer Sciences, Paris 6, France<br />
for the paper entitled<br />
<strong>Hector: Detecting Resource-Release Omission Faults</strong><br />
<strong> in Error-Handling Code for Systems Software</strong><br />
<em>Suman Saha, Jean-Pierre Lozi, Gael Thomas, Julia Lawall, Gilles Muller</em></p>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/william-c-carter-award-2/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Jean-Claude Laprie Award in Dependable Computing</title>
		<link>http://2013.dsn.org/jean-claude-laprie-award-in-dependable-computing/</link>
		<comments>http://2013.dsn.org/jean-claude-laprie-award-in-dependable-computing/#comments</comments>
		<pubDate>Wed, 05 Jun 2013 17:08:15 +0000</pubDate>
		<dc:creator>pataric</dc:creator>
		
		<guid isPermaLink="false">http://2013.dsn.org/?page_id=1037</guid>
		<description><![CDATA[Dr. Jean-Claude Laprie was Directeur de Recherche at LAAS-CNRS, Toulouse, France. He devoted his entire career to research on the dependability of computing systems. His unique capability of abstraction and formalization, and his contributions to the formulation of the concepts &#8230; <a href="http://2013.dsn.org/jean-claude-laprie-award-in-dependable-computing/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
				<content:encoded><![CDATA[<p><em><a href="http://2013.dsn.org/wp-content/uploads/2013/06/JCL.png"><img class="alignleft  wp-image-1043" alt="JCL" src="http://2013.dsn.org/wp-content/uploads/2013/06/JCL-300x234.png" width="194" height="150" /></a>Dr. Jean-Claude Laprie was Directeur de Recherche at LAAS-CNRS, Toulouse, France. He devoted his entire career to research on the dependability of computing systems. His unique capability of abstraction and formalization, and his contributions to the formulation of the concepts and methodologies of dependability, rapidly led to national and international recognition. </em></p>
<p><em>He received the IFIP Silver Core in 1992, the Silver Medal of French Scientific Research in 1993, and the Grand Prize in Informatics of the French Academy of Science in 2009. He was made Chevalier de l&#8217;Ordre National du Mérite in 2002.</em></p>
<p>The IFIP 10.4 Working Group on Dependable Computing created the award in his honor in 2011. It recognizes outstanding papers that have significantly influenced the theory and/or practice of Dependable Computing. For 2013, the award committee decided to recognize three seminal papers, one in each of the award’s impact categories:</p>
<ul>
<li>L. Lamport, R. Shostak, and M. Pease, <strong>“The Byzantine Generals Problem”</strong>,<em> ACM Transactions on Programming Languages and Systems</em>, vol. 4, no. 3, July 1982 pp. 382-401 .</li>
<li>J. Gray, <strong>“Why Do Computers Stop and What Can Be Done About It?”</strong>, In <em>Symposium on Reliability in Distributed Software and Database Systems</em>, pp. 3-12. IEEE, 1986.</li>
<li>W.G. Bouricius, W.C. Carter and P.R. Schneider, “<strong>Reliability Modeling Techniques for Self-Repairing Computer Systems</strong>”, In <em>Proceedings of the 24th ACM National Conference</em>, pp. 295-309. ACM, 1969.</li>
</ul>
<p>Lamport’s “<strong>The Byzantine Generals Problem</strong>” is the seminal paper on dealing with Byzantine faults in the replication and distribution of information to the redundant/replicated components of a fault tolerant system. Indeed the term Byzantine fault originated with this paper. Universally common in redundant systems before this paper was an implicit assumption that all redundant components in a fault tolerant system were receiving identical information. Sadly this is an all too common assumption even in contemporary fault tolerant systems. This paper highlighted the exposure of non-Byzantine proofed system to a failure caused by a single Byzantine fault. Given that other failures required multiple fault sequences, the failure due to a single Byzantine fault is frequently the dominant (though unmodeled) mode of failure for unproofed systems.</p>
<p>Gray’s “<strong>Why Do Computers Stop and What Can Be Done About It?</strong>,” had enormous impact on both industry and the academic research on fault tolerant computing. This was the seminal paper compiling and analyzing from empirical data the sources and causes of computer system failures, and how they could be addressed. This paper turned much of the FT community from its primary focus on hardware failures, to the issues of software failures and operational missteps leading to system failures, still the primary and most difficult to address causes of systems failures. It was the first to bring to the communities attention the concept of Heisenbugs (soft) and Bohrbugs (hard) for software. The observation or hypothesis that most software failures are Heisenbugs, that is, they occur only infrequently due to seldom occurring and difficult to repeat circumstances is now key to most strategies for recovering from software failures.</p>
<p>Bouricius, Carter and Schneider’s, “<strong>Reliability Modeling Techniques for Self-Repairing Computer Systems</strong>,” set the foundation for reliability modeling of fault tolerant computing systems, which we now find so fundamental. It was the first paper to rigorously analyze not only the impact of redundant components on a fault tolerant system (as suggested by Von Neuman in his assertion that systems of arbitrary reliability could be built using redundant components) but also rigorously analyzed the impact that coverage and effectiveness of the recovery mechanism (the paper studied the failure of the switch-over mechanism to effect the switch) had on reliability. The rigor and refinement made reliability modeling an essential part of fault tolerant systems design and architecture. Primitive though some of this work may seem by current standards of sophistication, it is the shoulders of this work on which much of the highly refined modeling now rests.</p>
]]></content:encoded>
			<wfw:commentRss>http://2013.dsn.org/jean-claude-laprie-award-in-dependable-computing/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
