Accepted Papers
SRDS 2007 paper review process has been finished. SRDS 2007 received more than 200 submissions this year; only 29 papers are accepted. Author notification has been send out by June 25, 2007.
We are sorry to inform you that the camera-ready submission due is changed from July 25, 2007 to July 20, 2007. The camera ready version of all the accepted paper should be submitted by Author’s Kit by July 20, 2007. Authors should follow the instruction in the notification and author’s kit guidance e-mail.
If you have any questions, don’t hesitate to contact us. (Send mail to ).
All the accepted papers are listed as follows:
Paper No. | Authors | Paper title |
8 | Jingqiang Lin, Jiwu Jing and Peng Liu | A Framework for Intrusion Tolerant Certification Authority System Evaluation |
25 | Murtuza Jadliwala, Shambhu Upadhyaya and Manik Taneja | ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks |
31 | Domenico Cotroneo, Salvatore Orlando and Stefano Russo | Characterizing Aging Phenomena of the Java Virtual Machine |
39 | Tatsuhiro Tsuchiya and André Schiper | Model Checking of Consensus Algorithms |
59 | Jianxin Li, Jinpeng Huai and Chunming Hu | PEACE-VO: A Secure Policy-Enabled Collaboration Framework for Virtual Organizations |
74 | Ming Chen, Wei Chen, Likun Liu and Zheng Zhang | An Analytical Framework and Its Applications for Studying Brick Storage Reliability |
76 | Hans P Reiser and Ruediger Kapitza | Hypervisor-Based Efficient Proactive Recovery |
85 | Vadim Drabkin, Roy Friedman, Gabi Kliot and Marc Segal | RAPID: Reliable Probabilistic Dissemination in Wireless Ad-Hoc Networks |
97 | Xuxian Jiang, Helen Wang, Dongyan Xu and Yi-Min Wang | RandSys: A Two-Dimensional Randomization Approach to Thwarting Code Injection Attacks |
110 | Michel Raynal, Corentin TRAVERS and Eli Gafni | Test-and-Set, Adaptive Renaming and Set Agreement: a Guided Visit to Asynchronous Computability |
112 | Wei SUN, Yuanyuan ZHANG and Xavier Défago | Hybrid Overloading and Stochastic Analysis for Redundant Scheduling in Real-time Multiprocessor Systems |
115 | Weigang Wu, Jiannong Cao and Michel Raynal | The Eventual Clusterer Oracle and Its Application to Consensus in MANETs |
119 | Guowei Huang, Zhi Chen and Gongyi Wu | Activity monitoring to guarantee file availability in structured P2P file-sharing systems |
125 | Laurent Burgy, Laurent Réveillère, Julia Lawall and Gilles Muller | A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations |
128 | Wagner Dantas, Alysson Bessani, Joni da Silva Fraga and Miguel Correia | Evaluating Byzantine Quorum Systems |
130 | João Leitão, Jose Pereira and Luís Rodrigues | Epidemic Broadcast Trees |
135 | Gunjan Khanna, Ignacio Laguna, Fahad A Arshad and Saurabh Bagchi | Stateful Detection in High Throughput Distributed Systems |
158 | Felix Salfner and Miroslaw Malek | Using Hidden Semi-Markov Models for Effective Online Failure Prediction |
188 | Yi Lin, Bettina Kemme, Marta Patino-Martinez and Ricardo Jimenez-Peris | Enhancing Edge Computing with Database Replication |
195 | Cheng-Zhong Xu and Song Fu | Quantifying Spatio-Temporal Event Correlations for Proactive Failure Management |
200 | Dan Dobre, HariGovind Ramasamy and Neeraj Suri | On the Latency-Efficiency of Message-Parsimonious Asynchronous Atomic |
204 | Gunjan Khanna, Fahad A. Arshad, Ignacio Laguna and Saurabh Bagchi | Distributed Diagnosis of Failures in a Three Tier E-Commerce System |
205 | Marco Serafini and Neeraj Suri | The Fail-Heterogeneous Architectural Model |
211 | Vishal Kher and Yongdae Kim | Building Trust in Storage Outsourcing: Secure Accounting of Utility Storage |
216 | Yair Amir, Brian Coan, Jonathan Kirsch and John Lane | Customizable Fault Tolerance for Wide-Area Replication |
217 | Mouna Allani, Benoît Garbinato, Fernando Pedone and Marija Stamenkovic | Scalable & Reliable Stream Diffusion: A Cynical Resource-Aware Approach |
223 | Yi Yang, Xinran Wang, Sencun Zhu and Guohong Cao | Distributed Software-based Attestation for Node Compromise Detection in Sensor Networks |
236 | Harry Li, Allen Clement, Amitanand Aiyer and Lorenzo Alvisi | The Paxos Register |
243 | Marcello Cinque, Domenico Cotroneo, Catello Di Martino and Stefano Russo | Modeling and Assessing the Dependability of Wireless Sensor Networks |