William H. Sanders

According to our database1, William H. Sanders authored at least 222 papers between 1985 and 2018.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2003, "For contributions to the design of dependable systems and networks.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2018
Evaluating Detectors on Optimal Attack Vectors That Enable Electricity Theft and DER Fraud.
J. Sel. Topics Signal Processing, 2018

Cyberattacks on Primary Frequency Response Mechanisms in Power Grids.
IEEE Computer, 2018

Peer-to-peer Detection of DoS Attacks on City-Scale IoT Mesh Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Modeling Humans: A General Agent Model for the Evaluation of Security.
Proceedings of the Quantitative Evaluation of Systems - 15th International Conference, 2018

Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.
Proceedings of the 23rd IEEE Pacific Rim International Symposium on Dependable Computing, 2018

A Provenance Model for the European Union General Data Protection Regulation.
Proceedings of the Provenance and Annotation of Data and Processes, 2018

Detecting monitor compromise using evidential reasoning: poster.
Proceedings of the 5th Annual Symposium and Bootcamp on Hot Topics in the Science of Security, 2018

An Ontology Framework for Generating Discrete-Event Stochastic Models.
Proceedings of the Computer Performance Engineering - 15th European Workshop, 2018

An Efficient Strategy for Model Composition in the Möbius Modeling Environment.
Proceedings of the 14th European Dependable Computing Conference, 2018

POWERALERT: Integrity Checking Using Power Measurement and a Game-Theoretic Strategy.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Cross-App Poisoning in Software-Defined Networking.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
An Unsupervised Multi-Detector Approach for Identifying Malicious Lateral Movement.
Proceedings of the 36th IEEE Symposium on Reliable Distributed Systems, 2017

Data-Driven Model-Based Detection of Malicious Insiders via Physical Access Logs.
Proceedings of the Quantitative Evaluation of Systems - 14th International Conference, 2017

On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Accounting for the Human User in Predictive Security Models.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

Learning Process Behavioral Baselines for Anomaly Detection.
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017

ATTAIN: An Attack Injection Framework for Software-Defined Networking.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

REMAX: Reachability-Maximizing P2P Detection of Erroneous Readings in Wireless Sensor Networks.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

Automatically Generating Security Models from System Models to Aid in the Evaluation of AMI Deployment Options.
Proceedings of the Critical Information Infrastructures Security, 2017

Developing Models for Physical Attacks in Cyber-Physical Systems.
Proceedings of the 2017 Workshop on Cyber-Physical Systems Security and PrivaCy, 2017

2016
A Response Cost Model for Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2016

Reliability Analysis with Dynamic Reliability Block Diagrams in the Möbius Modeling Tool.
ICST Trans. Security Safety, 2016

Lateral Movement Detection Using Distributed Data Fusion.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016

A Comparison of Different Intrusion Detection Approaches in an Advanced Metering Infrastructure Network Using ADVISE.
Proceedings of the Quantitative Evaluation of Systems - 13th International Conference, 2016

Intrusion detection in enterprise systems by combining and clustering diverse monitor data.
Proceedings of the Symposium and Bootcamp on the Science of Security, 2016

A Game-Theoretic Approach to Respond to Attacker Lateral Movement.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

A Quantitative Methodology for Security Monitor Deployment.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

F-DETA: A Framework for Detecting Electricity Theft Attacks in Smart Grids.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

The Right Tool for the Job: A Case for Common Input Scenarios for Security Assessment.
Proceedings of the Graphical Models for Security - Third International Workshop, 2016

A Case Study Assessing the Effects of Cyber Attacks on a River Zonal Dispatcher.
Proceedings of the Critical Information Infrastructures Security, 2016

2015
Security Analysis of Urban Railway Systems: The Need for a Cyber-Physical Perspective.
Proceedings of the Computer Safety, Reliability, and Security, 2015

PCA-Based Method for Detecting Integrity Attacks on Advanced Metering Infrastructure.
Proceedings of the Quantitative Evaluation of Systems, 12th International Conference, 2015

Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Cyber-Physical Topology Language: Definition, Operations, and Application.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015

Quantitative security metrics with human in the loop.
Proceedings of the 2015 Symposium and Bootcamp on the Science of Security, 2015

ARIMA-Based Modeling and Validation of Consumption Readings in Power Grids.
Proceedings of the Critical Information Infrastructures Security, 2015

2014
SOCCA: A Security-Oriented Cyber-Physical Contingency Analysis in Power Infrastructures.
IEEE Trans. Smart Grid, 2014

A Framework for Evaluating Intrusion Detection Architectures in Advanced Metering Infrastructures.
IEEE Trans. Smart Grid, 2014

Quantitative Security Metrics: Unattainable Holy Grail or a Vital Breakthrough within Our Reach?
IEEE Security & Privacy, 2014

Randomized Timed and Hybrid Models for Critical Infrastructures (Dagstuhl Seminar 14031).
Dagstuhl Reports, 2014

Automatic Generation of Security Argument Graphs.
Proceedings of the 20th IEEE Pacific Rim International Symposium on Dependable Computing, 2014

Enabling Collaborative Research for Security and Resiliency of Energy Cyber Physical Systems.
Proceedings of the IEEE International Conference on Distributed Computing in Sensor Systems, 2014

2013
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones.
Computers & Security, 2013

An Actor-centric, Asset-Based Monitor Deployment Model for Cloud Computing.
Proceedings of the IEEE/ACM 6th International Conference on Utility and Cloud Computing, 2013

Malicious data detection in state estimation leveraging system losses & estimation of perturbed parameters.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Formal design of communication checkers for ICCP using UPPAAL.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Reconciling security protection and monitoring requirements in Advanced Metering Infrastructures.
Proceedings of the IEEE Fourth International Conference on Smart Grid Communications, 2013

Möbius Shell: A Command-Line Interface for Möbius.
Proceedings of the Quantitative Evaluation of Systems - 10th International Conference, 2013

Go with the flow: toward workflow-oriented security assessment.
Proceedings of the New Security Paradigms Workshop, 2013

Smart grid protocol testing through cyber-physical testbeds.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2013

Content-Based Scheduling of Virtual Machines (VMs) in the Cloud.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

PSCloud: a durable context-aware personal storage cloud.
Proceedings of the 9th Workshop on Hot Topics in Dependable Systems, 2013

Implementing the ADVISE security modeling formalism in Möbius.
Proceedings of the 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013

Toward a cyber-physical topology language: applications to NERC CIP audit.
Proceedings of the SEGS'13, 2013

2012
SCPSE: Security-Oriented Cyber-Physical State Estimation for Power Grid Critical Infrastructures.
IEEE Trans. Smart Grid, 2012

Assuring the trustworthiness of the smarter electric grid.
Proceedings of the Third Joint WOSP/SIPEW International Conference on Performance Engineering, 2012

Learning from Early Attempts to Measure Information Security Performance.
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, 2012

AMI threats, intrusion detection requirements and deployment recommendations.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

Cost modeling of response actions for automated response and recovery in AMI.
Proceedings of the IEEE Third International Conference on Smart Grid Communications, 2012

State-Based Analysis in ADVISE.
Proceedings of the Ninth International Conference on Quantitative Evaluation of Systems, 2012

Assuring the trustworthiness of the smarter electric grid.
Proceedings of the 11th IEEE International Symposium on Network Computing and Applications, 2012

TCIPG: Trustworthy cyber infrastructure for the power grid overview.
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

Building resilient infrastructures for smart energy systems (abstract).
Proceedings of the IEEE PES Innovative Smart Grid Technologies Conference, 2012

A Mirrored Data Structures Approach to Diverse Partial Memory Replication.
Proceedings of the 2012 Ninth European Dependable Computing Conference, 2012

Safeguarding academic accounts and resources with the University Credential Abuse Auditing System.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

A framework for efficient evaluation of the fault tolerance of deduplicated storage systems.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks, 2012

2011
Using link gradients to predict the impact of network latency on multitier applications.
IEEE/ACM Trans. Netw., 2011

Probabilistic Model-Driven Recovery in Distributed Systems.
IEEE Trans. Dependable Sec. Comput., 2011

Modeling the Fault Tolerance Consequences of Deduplication.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems (SRDS 2011), 2011

FloGuard: Cost-Aware Systemwide Intrusion Defense via Online Forensics and On-Demand IDS Deployment.
Proceedings of the Computer Safety, Reliability, and Security, 2011

Model-based Security Metrics Using ADversary VIew Security Evaluation (ADVISE).
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

The Multiple-Asymmetric-Utility System Model: A Framework for Modeling Cyber-Human Systems.
Proceedings of the Eighth International Conference on Quantitative Evaluation of Systems, 2011

Specification-Based Intrusion Detection for Advanced Metering Infrastructures.
Proceedings of the 17th IEEE Pacific Rim International Symposium on Dependable Computing, 2011

Managing business health in the presence of malicious attacks.
Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W 2011), 2011

2010
Blackbox prediction of the impact of DVFS on end-to-end performance of multitier systems.
SIGMETRICS Performance Evaluation Review, 2010

Cost-aware systemwide intrusion defense via online forensics and on-demand detector deployment.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Quantitative Evaluation of Security Metrics.
Proceedings of the QEST 2010, 2010

Experiences Validating the Access Policy Tool in Industrial Settings.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

CPU gradients: Performance-aware energy conservation in multitier systems.
Proceedings of the International Green Computing Conference 2010, 2010

Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

Diverse Partial Memory Replication.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
Performance and dependability modeling with Möbius.
SIGMETRICS Performance Evaluation Review, 2009

G-SSASC: Simultaneous Simulation of System Models with bounded Hazard Rates.
Proceedings of the 2009 Winter Simulation Conference, 2009

Remote Job Management in the Mobius Modeling Framework.
Proceedings of the QEST 2009, 2009

Link Gradients: Predicting the Impact of Network Latency on Multitier Applications.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009

RRE: A game-theoretic intrusion Response and Recovery Engine.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models.
Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, 2009

2008
Experiences with building an intrusion-tolerant group communication system.
Softw., Pract. Exper., 2008

Usable Global Network Access Policy for Process Control Systems.
IEEE Security & Privacy, 2008

Modeling Peer-to-Peer Botnets.
Proceedings of the Fifth International Conference on the Quantitative Evaluaiton of Systems (QEST 2008), 2008

A Kalman-Based Coordination for Hierarchical State Estimation: Agorithm and Analysis.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

A recurrence-relation-based reward model for performability evaluation of embedded systems.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution.
IEEE Trans. Dependable Sec. Comput., 2007

Möbius: an integrated discrete-event modeling environment.
Bioinformatics, 2007

Modeling and analysis of worm defense using stochastic activity networks.
Proceedings of the 2007 Spring Simulation Multiconference, 2007

Dependability Analysis with Markov Chains: How Symmetries Improve Symbolic Computations.
Proceedings of the Fourth International Conference on the Quantitative Evaluaiton of Systems (QEST 2007), 2007

Design of Experiments within the Mobius Modeling Environment.
Proceedings of the Fourth International Conference on the Quantitative Evaluaiton of Systems (QEST 2007), 2007

The coBFIT toolkit.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

Securing Current and Future Process Control Systems.
Proceedings of the Critical Infrastructure Protection, 2007

Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
An architecture for adaptive intrusion-tolerant applications.
Softw., Pract. Exper., 2006

Modelling techniques and tools for computer performance evaluation.
Perform. Eval., 2006

Dynamic partitioning for hybrid simulation of the bistable HIV-1 transactivation network.
Bioinformatics, 2006

Proactive Resilience Revisited: The Delicate Balance Between Resisting Intrusions and Remaining Available.
Proceedings of the 25th IEEE Symposium on Reliable Distributed Systems (SRDS 2006), 2006

Bound-Preserving Composition for Markov Reward Models.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

Data Analysis and Visualization within the Möbius Modeling Environment.
Proceedings of the Third International Conference on the Quantitative Evaluation of Systems (QEST 2006), 2006

Detecting and Exploiting Symmetry in Discrete-state Markov Models.
Proceedings of the 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 2006

A Component-Level Path Composition Approach for Efficient Transient Analysis of Large CTMCs.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Automatic Recovery Using Bounded Partially Observable Markov Decision Processes.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Barbarians in the Gate: An Experimental Validation of NIC-based Distributed Firewall Performance and Flood Tolerance.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

Designing dependable storage solutions for shared application environments.
Proceedings of the 2006 International Conference on Dependable Systems and Networks (DSN 2006), 2006

2005
A component-level path-based simulation approach for efficient analysis of large Markov models.
Proceedings of the 37th Winter Simulation Conference, Orlando, FL, USA, December 4-7, 2005, 2005

Automatic Model-Driven Recovery in Distributed Systems.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

The Mobius Modeling Environment: Recent Extensions - 2005.
Proceedings of the Second International Conference on the Quantitative Evaluaiton of Systems (QEST 2005), 2005

Evaluating the Dependability of a LEO Satellite Network for Scientific Applications.
Proceedings of the Second International Conference on the Quantitative Evaluaiton of Systems (QEST 2005), 2005

Simultaneous Simulation of Alternative System Configurations.
Proceedings of the 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 2005

Probabilistic Validation of Computer System Survivability.
Proceedings of the Dependable Computing, Second Latin-American Symposium, 2005

Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Execution.
Proceedings of the Dependable Computing, Second Latin-American Symposium, 2005

A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

Application-Driven Coordination-Free Distributed Checkpointing.
Proceedings of the 25th International Conference on Distributed Computing Systems (ICDCS 2005), 2005

A Performability-Oriented Software Rejuvenation Framework for Distributed Applications.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

Lumping Matrix Diagram Representations of Markov Models.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

2004
A Global-State-Triggered Fault Injector for Distributed System Evaluation.
IEEE Trans. Parallel Distrib. Syst., 2004

Model-Based Evaluation: From Dependability to Security.
IEEE Trans. Dependable Sec. Comput., 2004

Performability analysis of guarded-operation duration: a translation approach for reward model solutions.
Perform. Eval., 2004

Online model-based adaptation for optimizing performance and dependability.
Proceedings of the 1st ACM SIGSOFT Workshop on Self-Managed Systems, 2004

Model-Based Validation of an Intrusion-Tolerant Information System.
Proceedings of the 23rd International Symposium on Reliable Distributed Systems (SRDS 2004), 2004

A Structured Path-Based Approach for Computing Transient Rewards of Large CTMCs.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

The Möbius Modeling Environment: Recent Developments.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

Approximate Computation of Transient Results for Large Markov Chains.
Proceedings of the 1st International Conference on Quantitative Evaluation of Systems (QEST 2004), 2004

Ferret: A Host Vulnerability Checking Tool.
Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 2004

Distributed Snapshots for Mobile Computing Systems.
Proceedings of the Second IEEE International Conference on Pervasive Computing and Communications (PerCom 2004), 2004

The evolution of dependable computing at the University of Illinois.
Proceedings of the Building the Information Society, 2004

CoBFIT: A Component-Based Framework for Intrusion Tolerance.
Proceedings of the 30th EUROMICRO Conference 2004, 31 August, 2004

Cluster-Based Failure Detection Service for Large-Scale Ad Hoc Wireless Network Applications.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

Stochastic Methods for Dependability, Performability, and Security Evaluation.
Proceedings of the Applications and Theory of Petri Nets 2004, 2004

2003
An Adaptive Quality of Service Aware Middleware for Replicated Services.
IEEE Trans. Parallel Distrib. Syst., 2003

AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
IEEE Trans. Computers, 2003

Optimal state-space lumping in Markov chains.
Inf. Process. Lett., 2003

An Experimental Evaluation of Correlated Network Partitions in the Coda Distributed File System.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

Dependability and Performance Evaluation of Intrusion-Tolerant Server Architectures.
Proceedings of the Dependable Computing, First Latin-American Symposium, 2003

Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case Study.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Probabilistic Validation of an Intrusion-Tolerant Replication System.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

On Integrating the MÖBIUS and MODEST Modeling Tools.
Proceedings of the 2003 International Conference on Dependable Systems and Networks (DSN 2003), 2003

Protecting Distributed Software Upgrades that Involve Message-Passing Interface Changes.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003

2002
The Möbius Framework and Its Implementation.
IEEE Trans. Software Eng., 2002

Low-Cost Error Containment and Recovery for Onboard Guarded Software Upgrading and Beyond.
IEEE Trans. Computers, 2002

Performance Evaluation of a Probabilistic Replica Selection Algorithm.
Proceedings of the 7th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2002), 2002

Passive Replication Schemes in Aqua.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System.
Proceedings of the 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 2002

Overview: An Integrated Framework for Performance Engineering and Resource-Aware Compilation.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Experimental Evaluation of the Unavailability Induced by a Group Membership Protocol.
Proceedings of the Dependable Computing, 2002

Modeling of Service-Level Agreements for Composed Services.
Proceedings of the Management Technologies for E-Commerce and E-Business Applications, 2002

Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation Approach.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

Quantifying the Cost of Providing Intrusion Tolerance in Group Communication Systems.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

An Adaptive Framework for Tunable Consistency and Timeliness Using Replication.
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002

The Möbius State-Level Abstract Functional Interface.
Proceedings of the Computer Performance Evaluation, 2002

2001
An Adaptive Algorithm for Tolerating Value Faults and Crash Failures.
IEEE Trans. Parallel Distrib. Syst., 2001

On the effectiveness of a message-driven confidence-driven protocol for guarded software upgrading.
Perform. Eval., 2001

Measure-adaptive state-space construction.
Perform. Eval., 2001

Möbius: Framework and Atomic Models.
Proceedings of the 9th International Workshop on Petri Nets and Performance Models, 2001

The Möbius Execution Policy.
Proceedings of the 9th International Workshop on Petri Nets and Performance Models, 2001

The Möbius Modeling Tool.
Proceedings of the 9th International Workshop on Petri Nets and Performance Models, 2001

Implementing a Stochastic Process Algebra within the Möbius Modeling Framework.
Proceedings of the Process Algebra and Probabilistic Methods, 2001

Low-Cost Flexible Software Fault Tolerance for Distributed Computing.
Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), 2001

Synergistic Coordination between Software and Hardware Fault Tolerance Techniques.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

Business Meeting: IEEE Technical Committee on Fault Tolerance.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

A Dynamic Replica Selection Algorithm for Tolerating Timing Faults.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

A Connection Formalism for the Solution of Large and Stiff Models.
Proceedings of the Proceedings 34th Annual Simulation Symposium (SS 2001), 2001

2000
Dynamic Node Management and Measure Estimation in a State-Driven Fault Injector.
Proceedings of the 19th IEEE Symposium on Reliable Distributed Systems, 2000

On Low-Cost Error Containment and Recovery Methods for Guarded Software Upgrading.
Proceedings of the 20th International Conference on Distributed Computing Systems, 2000

GSU middleware architecture design.
Proceedings of the 5th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2000), 2000

Stochastic Activity Networks: Formal Definitions and Concepts.
Proceedings of the Lectures on Formal Methods and Performance Analysis, 2000

Loki: A State-Driven Fault Injector for Distributed Systems.
Proceedings of the 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 2000

Möbius: An Extensible Tool for Performance and Dependability Modeling.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 2000

1999
Guest Editorial: Introduction to the Special Section - Dependable Computing for Critical Applications (DCCA-6).
IEEE Trans. Software Eng., 1999

State-Space Support for Path-Based Reward Variables.
Perform. Eval., 1999

Fault Injection based on a Partial View of the Global State of a Distributed System.
Proceedings of the Eighteenth Symposium on Reliable Distributed Systems, 1999

Integrated frameworks for multi-level and multi-formalism modeling.
Proceedings of the 8th International Workshop on Petri Nets and Performance Models, 1999

An efficient well-specified check.
Proceedings of the 8th International Workshop on Petri Nets and Performance Models, 1999

Building Dependable Distributed Applications Using AQUA.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

1998
"On-the-Fly'' Solution Techniques for Stochastic Petri Nets and Extensions.
IEEE Trans. Software Eng., 1998

Performance Analysis of the Knockout Switch Under Bursty Traffic Based on a Stochastic Activity Network Model.
Simulation, 1998

An Efficient Disk-Based Tool for Solving Large Markov Models.
Perform. Eval., 1998

AQuA: An Adaptive Architecture that Provides Dependable Distributed Objects.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

1997
Probabilistic Verification of a Synchronous Round-Based Consensus Protocol.
Proceedings of the Sixteenth Symposium on Reliable Distributed Systems, 1997

"On-the-fly" solution techniques for stochastic Petri nets and extensions.
Proceedings of the Seventh International Workshop on Petri Nets and Performance Models, 1997

An Efficient Disk-Based Tool for Solving Very Large Markov Models.
Proceedings of the Computer Performance Evaluation: Modelling Techniques and Tools, 1997

1996
An Efficient Two-Stage Iterative Method for the Steady-State Analysis of Markov Regenerative Stochastic Petri Net Models.
Perform. Eval., 1996

Numerical performability evaluation of a group multicast protocol.
Distributed Systems Engineering, 1996

Using ZPL to Develop a Parallel Chaos Router Simulator.
Proceedings of the 28th conference on Winter simulation, 1996

A New Methodology for Calculating Distributions of Reward Accumulated During a Finite Interval.
Proceedings of the Digest of Papers: FTCS-26, 1996

Expected Impulsive Rewards in Markov Regenerative Stochastic Petri Nets.
Proceedings of the Application and Theory of Petri Nets 1996, 1996

Computation of the Asymptotic Bias and Variance for Simulation of Markov Reward Models.
Proceedings of the Proceedings 29st Annual Simulation Symposium (SS '96), 1996

1995
The UltraSAN Modeling Environment.
Perform. Eval., 1995

Algorithms for the generation of state-level representations of stochastic activity networks with general reward structures.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

Numerical evaluation of a group-oriented multicast protocol using stochastic activity networks.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

UltraSAN version 3 overview.
Proceedings of the Sixth International Workshop on Petri Nets and Performance Models, 1995

The Effect of Workload on the Performance and Availability of Voting Algorithms.
Proceedings of the MASCOTS '95, 1995

Loss process analysis of the knockout switch using stochastic activity networks.
Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), 1995

1994
Importance Sampling Simulation in UltraSAN.
Simulation, 1994

Reward Model Solution Methods with Impulse and Rate Rewards: An Algorithm and Numerical Results.
Perform. Eval., 1994

An Environment for Importance Sampling Based on Stochastic Activity Networks.
Proceedings of the 13th Symposium on Reliable Distributed Systems, 1994

1993
Performance evaluation of a picture archiving and communication network using stochastic activity networks.
IEEE Trans. Med. Imaging, 1993

A modular method for evaluating the performance of picture archiving and communication systems.
J. Digital Imaging, 1993

Frameworks for evaluating discrete event dynamic systems.
Discrete Event Dynamic Systems, 1993

Efficient simulation of hierarchical stochastic activity network models.
Discrete Event Dynamic Systems, 1993

Dependability Evaluation Using UltraSAN.
Proceedings of the Digest of Papers: FTCS-23, 1993

1992
Dependability Evaluation Using Composed SAN-Based Reward Models.
J. Parallel Distrib. Comput., 1992

Recently asked questions (RAQS).
Proceedings of the 20st Annual ACM SIGUCCS Conference on User Services, 1992

A modular method for evaluating the performance of picture archiving and communication systems.
Proceedings of the Fifth Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'92), 1992

1991
Performability Modeling with UltraSAN.
IEEE Software, 1991

Performability Evaluation of CASMA/CD and CASMA/DCR Protocols under Transient Fault Conditions.
Proceedings of the Tenth Symposium on Reliable Distributed Systems, 1991

Performability Modeling with UltraSAN.
Proceedings of the Fourth International Workshop on Petri Nets and Performance Models, 1991

1989
Reduced Base Model Construction Methods for Stochastic Activity Networks.
Proceedings of the Third International Workshop on Petri Nets and Performance Models, 1989

Panel: Applications of Performance Petri Nets.
Proceedings of the Third International Workshop on Petri Nets and Performance Models, 1989

Performability of a token bus network under transient fault conditions.
Proceedings of the Nineteenth International Symposium on Fault-Tolerant Computing, 1989

1987
Performability Evaluation of Distributed Systems Using Stochastic Activity Networks.
Proceedings of the Second International Workshop on Petri Nets and Performance Models, 1987

Performance Variable Driven Construction Methods for Stochastic Activity Networks.
Proceedings of the Computer Performance and Reliability, 1987

1986
METASAN: A Performability Evaluation Tool Based on Stochastic Acitivity Networks.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986

1985
Stochastic Activity Networks: Structure, Behavior, and Application.
Proceedings of the International Workshop on Timed Petri Nets, 1985


  Loading...