Zbigniew T. Kalbarczyk
Orcid: 0009-0002-6040-6865Affiliations:
- University of Illinois at Urbana-Champaign, Coordinated Science Laboratory
According to our database1,
Zbigniew T. Kalbarczyk
authored at least 241 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
CoRR, 2024
One Queue Is All You Need: Resolving Head-of-Line Blocking in Large Language Model Serving.
CoRR, 2024
CoRR, 2024
Towards Automated Generation of Smart Grid Cyber Range for Cybersecurity Experiments and Training.
CoRR, 2024
Õ(T<sup>-1</sup>) Convergence to (Coarse) Correlated Equilibria in Full-Information General-Sum Markov Games.
CoRR, 2024
True Attacks, Attack Attempts, or Benign Triggers? An Empirical Measurement of Network Alerts in a Security Operations Center.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 USENIX Annual Technical Conference, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Proceedings of the Seventh Annual Conference on Machine Learning and Systems, 2024
$\widetilde{O}(T^{-1})$ {C}onvergence to (coarse) correlated equilibria in full-information general-sum markov games.
Proceedings of the 6th Annual Learning for Dynamics & Control Conference, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024
On Practicality of Using ARM TrustZone Trusted Execution Environment for Securing Programmable Logic Controllers.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
2023
ACM Trans. Cyber Phys. Syst., October, 2023
Empir. Softw. Eng., 2023
AWARE: Automate Workload Autoscaling with Reinforcement Learning in Production Cloud Systems.
Proceedings of the 2023 USENIX Annual Technical Conference, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Multi-Agent Meta-Reinforcement Learning: Sharper Convergence Rates with Task Similarity.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the ACM/IEEE 14th International Conference on Cyber-Physical Systems, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2023
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2023
2022
IEEE Trans. Smart Grid, 2022
CoRR, 2022
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022
Proceedings of the IEEE International Parallel and Distributed Processing Symposium, 2022
Proceedings of the EuroMLSys '22: Proceedings of the 2nd European Workshop on Machine Learning and Systems, Rennes, France, April 5, 2022
Exploiting Temporal Data Diversity for Detecting Safety-critical Faults in AV Compute Systems.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
SIMPPO: a scalable and incremental online learning framework for serverless resource management.
Proceedings of the 13th Symposium on Cloud Computing, SoCC 2022, 2022
2021
Watch out for the risky actors: Assessing risk in dynamic environments for safe driving.
CoRR, 2021
Proceedings of the WoSC '21: Proceedings of the Seventh International Workshop on Serverless Computing (WoSC7) 2021, 2021
Proceedings of the ICS '21: 2021 International Conference on Supercomputing, 2021
Proceedings of the ASPLOS '21: 26th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2021
2020
ACM Trans. Cyber Phys. Syst., 2020
Assessing and Mitigating Impact of Time Delay Attack: Case Studies for Power Grid Controls.
IEEE J. Sel. Areas Commun., 2020
CoRR, 2020
Challenges and Opportunities in the Detection of Safety-Critical Cyberphysical Attacks.
Computer, 2020
Proceedings of the International Conference for High Performance Computing, 2020
FIRM: An Intelligent Fine-grained Resource Management Framework for SLO-Oriented Microservices.
Proceedings of the 14th USENIX Symposium on Operating Systems Design and Implementation, 2020
Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, 2020
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020
Inductive-bias-driven Reinforcement Learning For Efficient Schedules in Heterogeneous Clusters.
Proceedings of the 37th International Conference on Machine Learning, 2020
Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
Proceedings of the APSys '20: 11th ACM SIGOPS Asia-Pacific Workshop on Systems, 2020
2019
RAINCOAT: Randomization of Network Communication in Power Grid Cyber Infrastructure to Mislead Attackers.
IEEE Trans. Smart Grid, 2019
IEEE Trans. Computers, 2019
Kayotee: A Fault Injection-based System to Assess the Safety and Reliability of Autonomous Vehicles to Faults and Errors.
CoRR, 2019
Understanding Fault Scenarios and Impacts through Fault Injection Experiments in Cielo.
CoRR, 2019
F-Pro: a Fast and Flexible Provenance-Aware Message Authentication Scheme for Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Smart Malware that Uses Leaked Control Data of Robotic Applications: The Case of Raven-II Surgical Robots.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation, 2019
Assessing and mitigating impact of time delay attack: a case study for power grid frequency control.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
Availability attacks on computing systems through alteration of environmental control: smart malware approach.
Proceedings of the 10th ACM/IEEE International Conference on Cyber-Physical Systems, 2019
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019
Proceedings of the 2019 IEEE Symposium on High-Performance Interconnects, 2019
ML-Based Fault Injection for Autonomous Vehicles: A Case for Bayesian Fault Injection.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019
AcMC <sup>2 </sup>: Accelerating Markov Chain Monte Carlo Algorithms for Probabilistic Models.
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems, 2019
2018
Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids.
IEEE Trans. Smart Grid, 2018
IEEE Trans. Smart Grid, 2018
Resiliency of HPC Interconnects: A Case Study of Interconnect Failures and Recovery in Blue Waters.
IEEE Trans. Dependable Secur. Comput., 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Indirect cyber attacks by perturbation of environment control: a data driven attack model: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
Hands Off the Wheel in Autonomous Vehicles?: A Systems Perspective on over a Million Miles of Field Data.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018
Proceedings of the IEEE International Conference on Cluster Computing, 2018
Proceedings of the ACM Symposium on Cloud Computing, 2018
2017
IEEE Trans. Reliab., 2017
IEEE Trans. Parallel Distributed Syst., 2017
Modeling and Mitigating Impact of False Data Injection Attacks on Automatic Generation Control.
IEEE Trans. Inf. Forensics Secur., 2017
Using OS Design Patterns to Provide Reliability and Security as-a-Service for VM-based Clouds.
Proceedings of the 13th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, 2017
Reconciling Systems-Theoretic and Component-Centric Methods for Safety and Security Co-analysis.
Proceedings of the Computer Safety, Reliability, and Security, 2017
Systems-Theoretic Likelihood and Severity Analysis for Safety and Security Co-engineering.
Proceedings of the Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification, 2017
On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Inter-ictal Seizure Onset Zone localization using unsupervised clustering and Bayesian Filtering.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017
Proceedings of the 2017 IEEE International Conference on Cloud Engineering, 2017
Proceedings of the 27th International Conference on Field Programmable Logic and Applications, 2017
Proceedings of the 2017 ACM/SIGDA International Symposium on Field-Programmable Gate Arrays, 2017
Proceedings of the 2017 39th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2017
Smart Maintenance via Dynamic Fault Tree Analysis: A Case Study on Singapore MRT System.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017
Enhancing Anomaly Diagnosis of Automatic Train Supervision System Based on Operation Log.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2017
Proceedings of the 2017 IEEE International Conference on Cluster Computing, 2017
2016
Proceedings of the 2016 IEEE International Conference on Smart Computing, 2016
Proceedings of the 2016 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2016
Multi-agent System for Detecting False Data Injection Attacks Against the Power Grid.
Proceedings of the 2nd Annual Industrial Control System Security Workshop, 2016
Optimal False Data Injection Attack against Automatic Generation Control in Power Grids.
Proceedings of the 7th ACM/IEEE International Conference on Cyber-Physical Systems, 2016
Proceedings of the ACM International Workshop on Data-Intensive Distributed Computing, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Targeted Attacks on Teleoperated Surgical Robots: Dynamic Model-Based Detection and Mitigation.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016
Attacking supercomputers through targeted alteration of environmental control: A data driven case study.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
A Simulation Study on Smart Grid Resilience under Software-Defined Networking Controller Failures.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016
Towards longitudinal analysis of a population's electronic health records using factor graphs.
Proceedings of the 3rd IEEE/ACM International Conference on Big Data Computing, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015
VM-μCheckpoint: Design, Modeling, and Assessment of Lightweight In-Memory VM Checkpointing.
IEEE Trans. Dependable Secur. Comput., 2015
Performance Comparison and Tuning of Virtual Machines For Sequence Alignment Software.
Scalable Comput. Pract. Exp., 2015
CoRR, 2015
Hypervisor Introspection: A Technique for Evading Passive Virtual Machine Monitoring.
Proceedings of the 9th USENIX Workshop on Offensive Technologies, 2015
Proceedings of the Computer Safety, Reliability, and Security, 2015
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 9th International Conference on Pervasive Computing Technologies for Healthcare, 2015
Proceedings of the 5th Workshop on Fault Tolerance for HPC at eXtreme Scale, 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
Measuring and Understanding Extreme-Scale Application Resilience: A Field Study of 5, 000, 000 HPC Application Runs.
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 1st ACM Workshop on Cyber-Physical System Security, 2015
2014
IEEE Secur. Priv., 2014
Proceedings of the ACM/SPEC International Conference on Performance Engineering, 2014
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster).
Proceedings of the 7th International Conference on Security of Information and Networks, 2014
Proceedings of the Quantitative Evaluation of Systems - 11th International Conference, 2014
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014
IICPS 2014 workshop keynote: Computing through failures and cyber attacks: Case for resilient smart power grid.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
Characterization of operational failures from a business data processing SaaS platform.
Proceedings of the 36th International Conference on Software Engineering, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014
Reliability and Security Monitoring of Virtual Machines Using Hardware Architectural Invariants.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Lessons Learned from the Analysis of System Failures at Petascale: The Case of Blue Waters.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014
Proceedings of the 17th Euromicro Conference on Digital System Design, 2014
Proceedings of the 14th IEEE/ACM International Symposium on Cluster, 2014
Automated Classification of Computer-Based Medical Device Recalls: An Application of Natural Language Processing and Statistical Learning.
Proceedings of the 2014 IEEE 27th International Symposium on Computer-Based Medical Systems, 2014
Proceedings of the 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, June 27, 2014
2013
IEEE Trans. Computers, 2013
IEEE Secur. Priv., 2013
Proceedings of the New Security Paradigms Workshop, 2013
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013
Proceedings of the Design, Automation and Test in Europe, 2013
Adapting Bro into SCADA: building a specification-based intrusion detection system for the DNP3 protocol.
Proceedings of the Cyber Security and Information Intelligence, 2013
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013
Semantic security analysis of SCADA networks to detect malicious control commands in power grids.
Proceedings of the SEGS'13, 2013
2012
IEEE Secur. Priv., 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2012
2011
IEEE Trans. Dependable Secur. Comput., 2011
Automated Derivation of Application-Aware Error Detectors Using Static Analysis: The Trusted Illiac Approach.
IEEE Trans. Dependable Secur. Comput., 2011
Identifying Compromised Users in Shared Computing Infrastructures: A Data-Driven Bayesian Network Approach.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011
An embedded reconfigurable architecture for patient-specific multi-paramater medical monitoring.
Proceedings of the 33rd Annual International Conference of the IEEE Engineering in Medicine and Biology Society, 2011
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
CloudVal: A framework for validation of virtualization environment in cloud infrastructure.
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
Proceedings of the 16th IEEE International On-Line Testing Symposium (IOLTS 2010), 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
Proceedings of the International Conference on Body Sensor Networks, 2010
2009
Proceedings of the Emerging Challenges for Security, 2009
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009
Proceedings of the 3rd International Conference on Pervasive Computing Technologies for Healthcare, 2009
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS).
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
An end-to-end approach for the automatic derivation of application-aware error detectors.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009
2008
Reconfigurable Tamper-resistant Hardware Support Against Insider Threats: The Trusted ILLIAC Approach.
Proceedings of the Insider Attack and Cyber Security - Beyond the Hacker, 2008
Proceedings of the 27th IEEE Symposium on Reliable Distributed Systems (SRDS 2008), 2008
Error Behavior Comparison of Multiple Computing Systems: A Case Study Using Linux on Pentium, Solaris on SPARC, and AIX on POWER.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008
Workshop on compiler and architectural techniques for application reliability and security (CATARS).
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
IEEE Trans. Reliab., 2007
IEEE Trans. Mob. Comput., 2007
Proceedings of the 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 2007
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007
2006
IEEE Trans. Parallel Distributed Syst., 2006
Proc. IEEE, 2006
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006
Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware.
Proceedings of the Sixth European Dependable Computing Conference, 2006
Proceedings of the Sixth European Dependable Computing Conference, 2006
An Approach for Detecting and Distinguishing Errors versus Attacks in Sensor Networks.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006
2005
IEEE Micro, 2005
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005
A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
Proceedings of the Dependable Computing, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
Microprocessor Sensitivity to Failures: Control vs Execution and Combinational vs Sequential Logic.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005
2004
The Effects of an ARMOR-Based SIFT Environment on the Performance and Dependability of User Applications.
IEEE Trans. Software Eng., 2004
IEEE Trans. Dependable Secur. Comput., 2004
Dependable Systems and Networks-Performance and Dependability Symposium (DSN-PDS) 2002: Selected Papers.
Perform. Evaluation, 2004
Modeling and evaluating the security threats of transient errors in firewall software.
Perform. Evaluation, 2004
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
Proceedings of the Security and Protection in Information Processing Systems, 2004
Proceedings of the Building the Information Society, 2004
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004
2003
Proceedings of the 9th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS Fall 2003), 2003
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003
Proceedings of the 9th IEEE International On-Line Testing Symposium (IOLTS 2003), 2003
Proceedings of the 10th IEEE International Conference on Engineering of Computer-Based Systems (ECBS 2003), 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003
2002
Proceedings of the 21st Symposium on Reliable Distributed Systems (SRDS 2002), 2002
Measurement-Based Analysis of System Dependability Using Fault Injection and Field Failure Data.
Proceedings of the Performance Evaluation of Complex Systems: Techniques and Tools, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
Joint Panel - IPDS and Workshop on Dependability Benchmarking.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server.
Proceedings of the 15th International Parallel & Distributed Processing Symposium (IPDPS-01), 2001
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001
A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001
2000
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment.
IEEE Trans. Knowl. Data Eng., 2000
Proceedings of the 6th IEEE International On-Line Testing Workshop (IOLTW 2000), 2000
Proceedings of the Performance Evaluation: Origins and Directions, 2000
1999
Hierarchical Simulation Approach to Accurate Fault Modeling for System Dependability Evaluation.
IEEE Trans. Software Eng., 1999
IEEE Trans. Parallel Distributed Syst., 1999
Proceedings of the 12th International Conference on VLSI Design (VLSI Design 1999), 1999
A Software Multilevel Fault Injection Mechanism: Case Study Evaluating the Virtual Interface Architecture.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999
Proceedings of the 1999 Pacific Rim International Symposium on Dependable Computing (PRDC 1999), 1999
1998
A Speculation-based Approach for Performance and Dependability Analysis: A Case Study.
Proceedings of the 30th conference on Winter simulation, 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 1998
A Hierarchical Approach for Dependability Analysis of a Commercial Cache-Based RAID Storage Architecture.
Proceedings of the Digest of Papers: FTCS-28, 1998
1997
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997
1995
Proceedings of the 14th International Conference on Computer Safety, 1995
1994
Microprocess. Microprogramming, 1994