首页 > 最新文献

International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks最新文献

英文 中文
1st workshop on fault-tolerance for HPC at extreme scale FTXS 2010 ftx2010极端规模HPC容错研讨会第一场
J. Daly, Nathan Debardeleben
With the emergence of many-core processors, accelerators, and alternative/heterogeneous architectures, the HPC community faces a new challenge: a scaling in number of processing elements that supersedes the historical trend of scaling in processor frequencies. The attendant increase in system complexity has first-order implications for fault tolerance. Mounting evidence invalidates traditional assumptions of HPC fault tolerance: faults are increasingly multiple-point instead of single-point and interdependent instead of independent; silent failures and silent data corruption are no longer rare enough to discount; stabilization time consumes a larger fraction of useful system lifetime, with failure rates projected to exceed one per hour on the largest systems; and application interrupt rates are apparently diverging from system failure rates.
随着多核处理器、加速器和可选/异构架构的出现,HPC社区面临着一个新的挑战:处理器频率的历史趋势将被处理元素数量的扩展所取代。随之而来的系统复杂性的增加对容错性具有一级含义。越来越多的证据证明传统的高性能计算容错假设是无效的:故障越来越多地是多点而不是单点,相互依赖而不是独立的;无声的故障和无声的数据损坏不再罕见到可以忽视的程度;稳定时间消耗了系统使用寿命的很大一部分,在最大的系统中,故障率预计超过每小时一次;应用程序中断率明显偏离了系统故障率。
{"title":"1st workshop on fault-tolerance for HPC at extreme scale FTXS 2010","authors":"J. Daly, Nathan Debardeleben","doi":"10.1109/DSN.2010.5544426","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544426","url":null,"abstract":"With the emergence of many-core processors, accelerators, and alternative/heterogeneous architectures, the HPC community faces a new challenge: a scaling in number of processing elements that supersedes the historical trend of scaling in processor frequencies. The attendant increase in system complexity has first-order implications for fault tolerance. Mounting evidence invalidates traditional assumptions of HPC fault tolerance: faults are increasingly multiple-point instead of single-point and interdependent instead of independent; silent failures and silent data corruption are no longer rare enough to discount; stabilization time consumes a larger fraction of useful system lifetime, with failure rates projected to exceed one per hour on the largest systems; and application interrupt rates are apparently diverging from system failure rates.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"1 1","pages":"615"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82589763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fourth workshop on dependable and secure nanocomputing 第四届可靠和安全纳米计算研讨会
J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis
Nanocomputing technologies hold the promise for higher performance, lower power consumption as well as increased functionality. However, the dependability of these unprecedentedly small scale devices remains uncertain. The main sources of concern are: • Nanometer devices are expected to be highly sensitive to process variations. The guard-bands used today for avoiding the impact of such variations will not represent a feasible solution in the future. Thus, timing errors may occur more frequently. • New failure modes, specific to new materials, are expected to raise serious challenges to the design and test engineers. • Environment induced errors, like single event upsets (SEU), are likely to occur more frequently than in the case of conventional semiconductor devices. • New hardware redundancy techniques are needed to enable development of energy efficient systems. • The increased complexity of the systems based on nanotechnology will require improved computer aided design (CAD) tools, as well as better validation techniques. • Security of nanocomputing systems may be threatened by malicious attacks targeting new vulnerable areas in the hardware.
纳米计算技术有望实现更高的性能、更低的功耗以及更高的功能。然而,这些前所未有的小型设备的可靠性仍然不确定。关注的主要来源是:•纳米器件预计对工艺变化高度敏感。目前用于避免此类变化影响的保护带在未来将不代表可行的解决方案。因此,定时错误可能会更频繁地发生。•针对新材料的新失效模式,预计会给设计和测试工程师带来严峻挑战。•环境引起的错误,如单事件干扰(SEU),可能比传统半导体器件更频繁地发生。•需要新的硬件冗余技术来开发节能系统。•基于纳米技术的系统复杂性的增加将需要改进的计算机辅助设计(CAD)工具,以及更好的验证技术。•纳米计算系统的安全性可能受到针对硬件中新的脆弱区域的恶意攻击的威胁。
{"title":"Fourth workshop on dependable and secure nanocomputing","authors":"J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis","doi":"10.1109/DSN.2010.5544423","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544423","url":null,"abstract":"Nanocomputing technologies hold the promise for higher performance, lower power consumption as well as increased functionality. However, the dependability of these unprecedentedly small scale devices remains uncertain. The main sources of concern are: • Nanometer devices are expected to be highly sensitive to process variations. The guard-bands used today for avoiding the impact of such variations will not represent a feasible solution in the future. Thus, timing errors may occur more frequently. • New failure modes, specific to new materials, are expected to raise serious challenges to the design and test engineers. • Environment induced errors, like single event upsets (SEU), are likely to occur more frequently than in the case of conventional semiconductor devices. • New hardware redundancy techniques are needed to enable development of energy efficient systems. • The increased complexity of the systems based on nanotechnology will require improved computer aided design (CAD) tools, as well as better validation techniques. • Security of nanocomputing systems may be threatened by malicious attacks targeting new vulnerable areas in the hardware.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"30 1","pages":"619-620"},"PeriodicalIF":0.0,"publicationDate":"2010-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73454740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM) 关于主动故障避免、恢复和维护(PFARM)的第二次研讨会
M. Malek, Felix Salfner, Kishor S. Trivedi
Proactive approaches to failure avoidance, recovery and maintenance have recently attracted increased interest among researchers and practitioners from various areas of dependable system design and operation. This first workshop provided a stimulating, and fruitful forum to foster collaboration among researchers working on proactive fault management, to discuss ideas, exchange experiences and to find new answers to the overall challenge of significantly improving system dependability in contemporary computing and communication systems.
主动避免、恢复和维护故障的方法最近引起了来自各个可靠系统设计和操作领域的研究人员和实践者越来越多的兴趣。第一次研讨会提供了一个鼓舞人心的、富有成果的论坛,以促进在主动故障管理方面工作的研究人员之间的合作,讨论想法,交流经验,并为显着提高当代计算和通信系统的系统可靠性的总体挑战找到新的答案。
{"title":"Second workshop on proactive failure avoidance, recovery, and maintenance (PFARM)","authors":"M. Malek, Felix Salfner, Kishor S. Trivedi","doi":"10.1109/DSN.2010.5544422","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544422","url":null,"abstract":"Proactive approaches to failure avoidance, recovery and maintenance have recently attracted increased interest among researchers and practitioners from various areas of dependable system design and operation. This first workshop provided a stimulating, and fruitful forum to foster collaboration among researchers working on proactive fault management, to discuss ideas, exchange experiences and to find new answers to the overall challenge of significantly improving system dependability in contemporary computing and communication systems.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"100 1","pages":"616-618"},"PeriodicalIF":0.0,"publicationDate":"2010-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76259665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010 第四届入侵容忍系统最新进展研讨会,2010
M. Correia, P. Pal
Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems. The idea of tolerating intrusions gained prominence during the late 1990s and early 2000s. Major research efforts led to the development of several intrusion-tolerant algorithms and architectures. It is now possible to grasp the fundamental principles of building practical intrusiontolerant systems, the issues underlying the validation and acceptance/certification of intrusion-tolerant systems, and also the continued effective and intelligent management and operation of such systems once they are put in operation. Despite significant progress, most modern systems are still not built as intrusion-tolerant systems. There are a number of reasons for this ranging from a false sense of security, such as lack of understanding of the risk, absence of any major cyber-disaster that is publicly acknowledged, the continued and fast paced innovation in information and software construction technologies, and the perception that Intrusion Tolerance is expensive. Combined with changing technology landscape, Intrusion Tolerance is a moving target that also needs to accommodate and adapt to changes. Unlike fault tolerance, Intrusion Tolerance faces an intelligent adversary who can adapt and evolve as the system adapts and recovers. New technologies make older solutions obsolete and introduce new vulnerabilities. How to make Intrusion Tolerance an integral part of the software engineering of modern information systems? What can be done to make system developers and architects more comfortable and confident about Intrusion Tolerance technologies? How to continue to stay ahead of the increasingly sophisticated adversaries? How to enlighten and empower the practitioners to navigate the ever-changing technology landscape so that they can build systems that can be trusted, and can operate through attacks? The 4th Workshop on Recent Advances in IntrusionTolerant Systems, held in conjunction with DSN 2010, a
在当今复杂的计算机系统中,设计和操作漏洞被认为是不可避免的。目前正在使用和正在开发的系统的分布式和网络化性质,促进了以越来越新的和更容易的方式发现和利用这些缺陷。入侵容忍承认完全防止攻击和入侵是不可能的,而且通常不可能准确地检测入侵行为并尽早阻止它。因此,入侵容忍研究旨在开发技术,使计算机系统在受到攻击时仍能继续正常运行,并阻止攻击者/入侵者取得他们所寻求的成功。例如,耐受入侵的系统可能会由于攻击而遭受部分服务或资源的损失,但它将继续以降级模式提供关键服务,或触发自动机制来重新获得和恢复受损的服务和资源。在生存性、拜占庭容错、自我再生和自主系统方面也在追求类似的目标。容忍入侵的想法在20世纪90年代末和21世纪初得到了突出。主要的研究工作导致了几种入侵容忍算法和体系结构的发展。现在,我们可以掌握构建实际的容错系统的基本原则、容错系统的验证和验收/认证的基础问题,以及一旦这些系统投入运行后,如何继续有效和智能地管理和运行这些系统。尽管取得了重大进展,但大多数现代系统仍然没有被构建为可容忍入侵的系统。造成这种情况的原因有很多,包括错误的安全感,比如缺乏对风险的理解,没有任何公开承认的重大网络灾难,信息和软件构建技术的持续和快节奏创新,以及认为入侵容忍是昂贵的。结合不断变化的技术环境,入侵容忍是一个不断变化的目标,也需要适应和适应变化。与容错不同,入侵容忍面对的是一个聪明的对手,它可以随着系统的适应和恢复而适应和发展。新技术使旧的解决方案过时,并引入新的漏洞。如何使入侵容忍成为现代信息系统软件工程的重要组成部分?怎样才能使系统开发人员和架构师对入侵容忍技术更放心、更有信心?如何继续领先于日益老练的对手?如何启发和授权从业者驾驭不断变化的技术环境,以便他们能够构建可信任的系统,并能够在攻击中运行?与DSN 2010联合举办的第四届耐侵入系统最新进展研讨会旨在为研究人员和从业人员提供一个亲密的场所,讨论和合作有关此类问题的突破性新想法和新结果。
{"title":"4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010","authors":"M. Correia, P. Pal","doi":"10.1109/DSN.2010.5544420","DOIUrl":"https://doi.org/10.1109/DSN.2010.5544420","url":null,"abstract":"Design and operational vulnerabilities are accepted as inevitable in today’s complex computer systems. The distributed and networked nature of the systems that are currently in use and being developed facilitate discovery and exploitation of these flaws in increasingly new and easier ways. Intrusion Tolerance acknowledges that it is impossible to completely prevent attacks and intrusions, and that it is often impossible to accurately detect the act of intrusion and stop it early enough. Intrusion Tolerance research therefore aims to develop technologies that enable computer systems to continue to operate correctly despite attacks, and deny the attacker/intruder the success they seek. For instance, an intrusion-tolerant system may suffer partial loss of service or resources due to the attack, but it will continue to provide critical services in a degraded mode or trigger automatic mechanisms to regain and recover the compromised services and resources. Similar goals are being pursued in Survivability, Byzantine Fault Tolerance, Self-regenerative and Autonomic Systems. The idea of tolerating intrusions gained prominence during the late 1990s and early 2000s. Major research efforts led to the development of several intrusion-tolerant algorithms and architectures. It is now possible to grasp the fundamental principles of building practical intrusiontolerant systems, the issues underlying the validation and acceptance/certification of intrusion-tolerant systems, and also the continued effective and intelligent management and operation of such systems once they are put in operation. Despite significant progress, most modern systems are still not built as intrusion-tolerant systems. There are a number of reasons for this ranging from a false sense of security, such as lack of understanding of the risk, absence of any major cyber-disaster that is publicly acknowledged, the continued and fast paced innovation in information and software construction technologies, and the perception that Intrusion Tolerance is expensive. Combined with changing technology landscape, Intrusion Tolerance is a moving target that also needs to accommodate and adapt to changes. Unlike fault tolerance, Intrusion Tolerance faces an intelligent adversary who can adapt and evolve as the system adapts and recovers. New technologies make older solutions obsolete and introduce new vulnerabilities. How to make Intrusion Tolerance an integral part of the software engineering of modern information systems? What can be done to make system developers and architects more comfortable and confident about Intrusion Tolerance technologies? How to continue to stay ahead of the increasingly sophisticated adversaries? How to enlighten and empower the practitioners to navigate the ever-changing technology landscape so that they can build systems that can be trusted, and can operate through attacks? The 4th Workshop on Recent Advances in IntrusionTolerant Systems, held in conjunction with DSN 2010, a","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"3 1","pages":"621-622"},"PeriodicalIF":0.0,"publicationDate":"2010-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81873396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009 第三届入侵容忍系统研究研讨会,2009
S. Bagchi, M. Correia, P. Pal
The 3rd Workshop on Recent Advances in Intrusion- Tolerant Systems, held in conjunction with DSN 2009, aims to provide the researchers and practitioners an intimate venue to discuss and collaborate on ground-breaking new ideas and fresh results.
与DSN 2009联合举办的第三届入侵容忍系统最新进展研讨会旨在为研究人员和从业者提供一个亲密的场所,讨论和合作突破性的新想法和新结果。
{"title":"3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009","authors":"S. Bagchi, M. Correia, P. Pal","doi":"10.1109/DSN.2009.5270281","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270281","url":null,"abstract":"The 3rd Workshop on Recent Advances in Intrusion- Tolerant Systems, held in conjunction with DSN 2009, aims to provide the researchers and practitioners an intimate venue to discuss and collaborate on ground-breaking new ideas and fresh results.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"36 1","pages":"600-601"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75642190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Fifth Workshop on Hot Topics in System Dependability (HotDep 2009) 第五次系统可靠性热点专题研讨会(HotDep 2009)
C. Fetzer, R. Rodrigues
The FifthWorkshop on Hot Topics in System Dependability (HotDep'09) brings forth cutting-edge research ideas in fault tolerance, reliability and systems. This year's edition of the workshop will feature a total of 10 presentations of original research on wide array of topics, including cloud computing, storage, program analysis, operating systems, replication protocols, or failure prediction.
第五届系统可靠性热点研讨会(HotDep'09)提出了在容错、可靠性和系统方面的前沿研究思想。今年的研讨会将以10篇原创研究报告为特色,涉及广泛的主题,包括云计算、存储、程序分析、操作系统、复制协议或故障预测。
{"title":"Fifth Workshop on Hot Topics in System Dependability (HotDep 2009)","authors":"C. Fetzer, R. Rodrigues","doi":"10.1109/DSN.2009.5270287","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270287","url":null,"abstract":"The FifthWorkshop on Hot Topics in System Dependability (HotDep'09) brings forth cutting-edge research ideas in fault tolerance, reliability and systems. This year's edition of the workshop will feature a total of 10 presentations of original research on wide array of topics, including cloud computing, storage, program analysis, operating systems, replication protocols, or failure prediction.","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"36 1","pages":"594-595"},"PeriodicalIF":0.0,"publicationDate":"2009-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85473913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Future prospects of research on security and dependability 安全可靠性研究的未来展望
Jacques Bus
{"title":"Future prospects of research on security and dependability","authors":"Jacques Bus","doi":"10.1109/DSN.2009.5270361","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270361","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"3 1","pages":"1"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75529103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dependability - How does the market value it? 可靠性——市场如何评价它?
G. Quadros
{"title":"Dependability - How does the market value it?","authors":"G. Quadros","doi":"10.1109/DSN.2009.5270362","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270362","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"2004 1","pages":"2"},"PeriodicalIF":0.0,"publicationDate":"2009-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86262357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Abstracts 快速提取
L. Romano
{"title":"Fast Abstracts","authors":"L. Romano","doi":"10.1109/DSN.2009.5270280","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270280","url":null,"abstract":"","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"17 1","pages":"593"},"PeriodicalIF":0.0,"publicationDate":"2009-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81970990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Third workshop on dependable and secure nanocomputing 第三届关于可靠和安全纳米计算的研讨会
J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis
LAAS-CNRS and Université de Toulouse, 7, Avenue du Colonel Roche 31077 Toulouse – France AMD, 2950 E Harmony Rd., Fort Collins, CO 80528 – USA Coordinated Science Laboratory, UIUC, 1308 West Main Street, Urbana, IL 61801 – USA Dept. of Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg – Sweden TIMA (CNRS, Grenoble INP, UJF), 46, Avenue Felix Viallet, 38031 Grenoble – France
LAAS-CNRS和图卢兹大学,法国图卢兹罗氏上校大道31077号7号,柯林斯堡E Harmony Rd 2950号,CO 80528;美国伊利诺伊大学uc协调科学实验室,厄巴纳西大街1308号,伊利诺伊州61801;美国计算机科学与工程系。TIMA (CNRS,格勒诺布尔INP, UJF), 46, Avenue Felix Viallet,格勒诺布尔38031 -法国
{"title":"Third workshop on dependable and secure nanocomputing","authors":"J. Arlat, C. Constantinescu, R. Iyer, J. Karlsson, M. Nicolaidis","doi":"10.1109/DSN.2009.5270283","DOIUrl":"https://doi.org/10.1109/DSN.2009.5270283","url":null,"abstract":"LAAS-CNRS and Université de Toulouse, 7, Avenue du Colonel Roche 31077 Toulouse – France <jean.arlat@laas.fr> AMD, 2950 E Harmony Rd., Fort Collins, CO 80528 – USA <cristian.constantinescu@amd.com> Coordinated Science Laboratory, UIUC, 1308 West Main Street, Urbana, IL 61801 – USA <iyer@crhc.uiuc.edu> Dept. of Computer Science & Eng., Chalmers University of Technology, 41296 Göteborg – Sweden <johan@chalmers.se> TIMA (CNRS, Grenoble INP, UJF), 46, Avenue Felix Viallet, 38031 Grenoble – France <michael.nicolaidis@imag.fr>","PeriodicalId":90852,"journal":{"name":"International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks","volume":"2002 1","pages":"596-597"},"PeriodicalIF":0.0,"publicationDate":"2009-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86402439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Conference on Dependable Systems and Networks workshops : [proceedings]. International Conference on Dependable Systems and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1