Conferences
Self-Supervised Representation Learning for Adversarial Attack Detection Yi Li , Plamen Angelov, Neeraj Suri Proc. of ECCV, 2024 | ||
Investigating Location-Aware Advertisements in Anycast IP Networks Savvas Kastanakis, Ioana Livadariu, Vasileios Giotsas, Neeraj Suri Proc. of ANRW, 2024 | ||
Rethinking Self-Supervised Learning for Cross-Domain Adversarial Sample Recovery Yi Li, Plamen Angelov, Neeraj Suri Proc. of IJCNN, 2024 | ||
Federated Adversarial Learning for Robust Autonomous Landing Runway Detection Yi Li, Plamen Angelov, Zhengxin Yu, Alvaro Lopez Pellicer, Neeraj Suri Proc. of ICANN, 2024 | ||
UNICAD: A Unified Approach for Attack Detection, Noise Reduction and Novel Class Identification Alvaro Lopez Pellcier, Kittipos Giatgong, Yi Li, Neeraj Suri, Plamen Angelov Proc. of IJCNN, 2024 | ||
Real Arithmetic in TLAPM Ovini V.W. Gunasekera, Andrew Sogokon, Antonios Gouglidis, and Neeraj Suri Proc. of NFM, 2024 | ||
Compilation as a Defense: Enhancing DL Model Attack Robustness via Tensor Optimization. Stefan Trawicki, William Hackett, Lewis Birch, Neeraj Suri, Peter Garraghan Proc. of CAMLIS, 2023 | ||
Model Leeching: An Extraction Attack Targeting LLMs. Lewis Birch, William Hackett, Stefan Trawicki, Neeraj Suri, Peter Garraghan Proc. of CAMLIS, 2023 | ||
Fuzzy Detectors Against Adversarial Attacks. Yi Li, Plamen Angelov, Neeraj Suri Proc. of IEEE SSCI, 2023 | ||
20 Years of Inferring Inter-domain Routing Policies. Savvas Kastanakis, Vasileios Giotsas, Ioana Livadariu, Neeraj Suri Proc. of ACM IMC, 2023 | ||
Federated Meta Learning for Visual Navigation in GPS-denied Urban Airspace. Burak Yuksek, Zhengxin Yu, Neeraj Suri, Gokhan Inalhan Proc. of DASC, 2023 | ||
RAFL: A Robust and Adaptive Federated Meta-Learning Framework Against Adversaries. Zhengxin Yu, Yang Lu, and Neeraj Suri Proc. of IEEE MASS, 2023 | ||
Domain Generalization and Feature Fusion for Cross-domain Imperceptible Adversarial Attack Detection. Yi Li, Yang Lu, Plamen Angelov and Neeraj Suri Proc. of IEEE IJCNN, 2023 | ||
Cloud Security Requirement Based Threat Analysis Ahmed Taha, Alexander Lawall, and Neeraj Suri Proc. of IEEE ICNC, 2023 | ||
PPFM: An Adaptive and Hierarchical Peer-to-Peer Federated Meta-Learning Framework. Zhengxin Yu, Yang Lu, Plamen Angelov and Neeraj Suri Proc. of IEEE MSN, 2022 | ||
Effectiveness of Moving Target Defense Techniques to Disrupt Attacks in the Cloud. Salman Manzoor, Antonios Gouglidis Matthew Bradbury and Neeraj Suri Proc. of ACM CCS (Poster), 2022 | bib | |
Multi-Layer Threat Analysis of the Cloud Salman Manzoor, Antonios Gouglidis Matthew Bradbury and Neeraj Suri Proc. of ACM CCS (Poster), 2022 | bib | |
Understanding the confounding factors of inter-domain routing modeling Savvas Kastanakis, Vasilios Giotsas and Neeraj Suri Proc. of ACM IMC (Poster), 2022 | bib | |
Similarity-based Deep Neural Network to Detect Imperceptible Adversarial Attacks Eduardo Soares, Plamen Angelov and Neeraj Suri Proc. of IEEE CIDUE/SSCI, 2022 | bib | |
Towards Effective Performance Fuzzing Yiqun Chen, Matthew Bradbury and Neeraj Suri Proc. of ISSRE (FA), 2022 | bib | |
SlowCoach: Mutating Code to Simulate Performance Bugs Yiqun Chen, Oliver Schwahn, Roberto Natella, Matthew Bradbury and Neeraj Suri Proc. of ISSRE, 2022 | bib | |
Failure Diagnosis for Cluster Systems using Partial Correlations Edward Chuah, Arshad Jhumka, Samantha Alt, Todd Evans, Neeraj Suri Proc. of ISPA, 2021 | bib | |
Challenges in Identifying Network Attacks Using Netflow Data Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt Proc. of NCA, 2021 | bib | |
Fast Kernel Error Propagation Analysis in Virtualized Environments Nicolas Coppik, Oliver Schwahn and Neeraj Suri Proc. of ICST, 2021 | bib | |
Decentralized Runtime Monitoring Approach Relying on the Ethereum Blockchain Infrastructure Ahmed Taha, Ahmed Zakaria, Dongseong Kim and Neeraj Suri Proc. of IC2E, 2020 | bib | |
Inferring Performance Bug Patterns from Developer Commits Yiqun Chen, Stefan Winter and Neeraj Suri Proc. of ISSRE, 2019 | bib | |
Gyro: A Modular Scale-Out Layer for Single-Server DBMSs Habib Saissi, Marco Serafini and Neeraj Suri Proc. of SRDS, 2019 | bib | |
Extracting Safe Thread Schedules from Incomplete Model Checking Results Patrick Metzler, Neeraj Suri and Georg Weissenbacher Proc. of SPIN, 2019 | bib | |
Assessing the State and Improving the Art of Parallel Testing for C Oliver Schwahn, Nicolas Coppik, Stefan Winter, Neeraj Suri Proc. of ISSTA, 2019 | bib | |
MemFuzz: Using Memory Accesses to Guide Fuzzing Nicolas Coppik, Oliver Schwahn and Neeraj Suri Proc. of ICST, 2019 | bib | |
InfoLeak: Scheduling-based Information Leakage Tsvetoslava Vateva-Gurova, Salman Manzoor, Yennun Huang and Neeraj Suri Proc. of PRDC, 2018 | bib | |
Threat Modeling the Cloud: An Ontology Based Approach Salman Manzoor, Tsvetoslava Vateva-Gurova, Ruben Trapero and Neeraj Suri Proc. of LNCS IOSEC, 2018 | bib | |
Flashlight: A Novel Monitoring Path Identification Schema for Securing Cloud Services Heng Zhang, Ruben Trapero, Jesus Luna, Neeraj Suri Intl. Conference on Availability, Reliability and Security (ARES), 2018 | bib | |
A Composite Malicious Peer Eviction Mechanism for Super-P2P Systems Hatem Ismail, Stefanie Roos and Neeraj Suri IEEE TrustComm, 2018 | bib | |
QRES: Quantitative Reasoning on Encrypted Security SLAs Ahmed Taha, Spyros Boukoros, Jesus Luna, Stefan Katzenbeisser, and Neeraj Suri https://arxiv.org/abs/1804.04426, 2018 | ||
Whetstone: Reliable Monitoring of Cloud Heng Zhang, Jesus Luna Garcia, Neeraj Suri and Ruben Trapero Proc. of Smartcomp, 2018 | bib | |
A Detection Mechanism for Internal Attacks in P2P Streaming Systems Hatem Ismail, Stefanie Roos, Neeraj Suri Proc. IEEE WoWMoM, 2018 | bib | |
Monitoring Path Discovery for Supporting Indirect Monitoring of Cloud Heng Zhang, Salman Manzoor, and Neeraj Suri Proc. of IC2E (IEEE Intl. Conf on Cloud Engg – Doctoral Symposium), 2018 | ||
Threat Modeling and Analysis for the Cloud Ecosystem Salman Manzoor, Heng Zhang, Neeraj Suri Proc. of IC2E (IEEE Intl. Conf on Cloud Engg – Doctoral Symposium), 2018 | bib | |
Quick Verification of Concurrent Programs by Iteratively Relaxed Scheduling Patrick Metzler, Habib Saissi, Peter Bokor and Neeraj Suri Proc. of IEEE/ACM Automated Software Engg. (ASE), 2017 | bib | |
TrEKer: Tracing Error Propagation in Operating System Kernels Nicolas Coppik, Oliver Schwahn, Stefan Winter and Neeraj Suri Proc. of IEEE/ACM Automated Software Engg. (ASE), 2017 | bib | |
Towards DDoS Attack Resilient Wide Area Monitoring Systems Kubilay Demir and Neeraj Suri Proc. of Security in Critical Infrastructures Workshop @IEEE ARES, 2017 | ||
C’MON: Monitoring the Compliance of Cloud Services to Contracted Properties Soha Albaghdady, Stefan Winter, Ahmed Taha, Heng Zhang, Neeraj Suri Proc. of Intl. Conference on Availability, Reliability and Security (ARES), 2017 | bib | |
AttackDive: Diving Deep into the Cloud Ecosystem to Explore Attack Surfaces Salman Manzoor, Jesus Luna and Neeraj Suri Proc. of IEEE Services Computing (SCC), 2017 | bib | |
A Security Architecture for Railway Signalling C. Schlehuber, M. Heinrich, T. Vateva-Gurova, S. Katzenbeisser and N. Suri Intl. Conference on Computer Safety, Reliability and Security (SAFECOMP), 2017 | bib | |
SLA-based Service Selection for Multi-Cloud Environments Ahmed Taha, Salman Manzoor and Neeraj Suri Proc. of IEEE EDGE Computing (EGDE), 2017 | bib | |
deQAM: A Dependency Based Indirect Monitoring Approach for Cloud Services Heng Zhang, Jesus Luna, Ruben Trapero and Neeraj Suri Proc. of IEEE Services Computing (SCC), 2017 | bib | |
A Framework for Ranking Cloud Security Services Ahmed Taha, Ruben Trapero, Jesus Luna, Neeraj Suri Proc. of IEEE Services Computing (SCC), 2017 | bib | |
Effectiveness of Driver Isolation and Testing in User Space Oliver Schwahn EuroSys Doctoral Workshop, 2017 | ||
Challenges and Approaches in Securing Safety-Relevant Railway Signalling Christian Schlehuber, Markus Heinrich, Tsvetoslava Vateva-Gurova, Stefan Katzenbeisser, and Neeraj Suri Proc. of S4CIP, 2017 | bib | |
Error Propagation Analysis of Multithreaded Programs Using Likely Invariants Abraham Chan, Stefan Winter, Habib Saissi, Karthik Pattabiraman, Neeraj Suri Proc. of ICST, 2017 | ||
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid Kubilay Demir, Neeraj Suri Proc. of PRDC, 2017 | bib | |
Malicious Peers Eviction for P2P Overlays Hatem Ismail, Daniel Germanus, Neeraj Suri Proc. of CNS, 2016 | bib | |
Efficient Verification of Program Fragments: Eager POR Patrick Metzler, Habib Saissi, Péter Bokor, Robin Hesse and Neeraj Suri Proc of ATVA, 2016 | bib | |
Practical Formal Verification for Model Based Development of Cyber-Physical Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter, Neeraj Suri Proc. of IEEE/IFIP Embedded and Ubiquitous Computing (EUC), 2016 | ||
Sentry: A novel approach for mitigating application layer DDoS security Heng Zhang, Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri Proc. TrustCom, 2016 | bib | |
Trust Validation of Cloud IaaS: A Customer Centric Approach Salman Manzoor, Ahmed Taha and Neeraj Suri Proc. TrustCom, 2016 | bib | |
Identifying and Utilizing Dependencies Across Cloud Security Services Ahmed Taha, Patrick Metzler, Ruben Trapero, Jesus Luna, Neeraj Suri Proc. of Asia CCS, 2016 | bib | |
Reliable Memory-Efficient Name Forwarding in Named Data Networking Divya Saxena, Vaskar Raychoudhury, Christian Becker and Neeraj Suri Proc. EUC, 2016 | bib | |
Detecting and Mitigating Sophisticated P2P Eclipse Attacks Hatem Ismail, Daniel Germanus and Neeraj Suri Proc. IEEE ICPADS, 2015 | bib | |
The Impact of Hypervisor Scheduling on Compromising Virtualized Environments Tsvetoslava Vateva-Gurova, Neeraj Suri, Avi Mendelson Proc. of DASC, 2015 | bib | |
Fault-Tolerance for Transient and Permanent Data Errors in Wireless Sensor Networks Azad Ali, Abdelmajid Khalil and Neeraj Suri Proc. of SRDS, 2015 | ||
PASS: An Address Space Slicing Framework for P2P Eclipse Attack Mitigation Daniel Germanus, Hatem Ismail and Neeraj Suri Proc of SRDS, 2015 | bib | |
PBMC: Symbolic Slicing for the Verification of Concurrent Programs Habib Saissi, Peter Bokor, Neeraj Suri Symposium on Automated Technology for Verification and Analysis, ATVA, 2015 | bib | |
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms Thorsten Piper, Stefan Winter, Neeraj Suri and Thomas E. Fuhrman Proc. of EDCC, 2015 | ||
In the Compression Hornet’s Nest: A Security Study of Data Compression in Network Services Giancarlo Pellegrino, Davide Balzarotti, Stefan Winter, Neeraj Suri Proc. of USENIX Security Symposium, 2015 | bib | |
GRINDER: On Reusability of Fault Injection Tools Stefan Winter, Thorsten Piper, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo Proc. of ICSE/AST, 2015 | bib | |
Quantitative Assessment and Comparison of Cloud Service Providers’ Privacy Practices J. M. del Alamo, R. Trapero, Y. S. MartÃn, J. C. Yelmo and N. Suri Proc. CITA, 2015 | ||
Mitigating Timing Error Propagation in Mixed-Criticality Automotive Systems Thorsten Piper, Stefan Winter, Oliver Schwahn, Suman Bidarahalli and Neeraj Suri Proc. of ISORC, 2015 | bib | |
Optimizing Multi-Cloud Application Deployments with Security Controls as Constraints Philippe Massonet, Jesus Luna, Alain Pannetrat and Ruben Trapero Intl. Symposium on Engineering Secure Software and Systems (ESSoS), 2015 | ||
No PAIN, No Gain? The utility of PArallel fault INjections Stefan Winter, Oliver Schwahn, Roberto Natella, Neeraj Suri, Domenico Cotroneo Intl. Conf on Software Engg (ICSE), 2015 | bib | |
Event pattern discovery on IDS traces of Cloud Services Shin-Ying Huang, Yennun Huang, Neeraj Suri Proc. IEEE Intl Conf on Big Data and Cloud Computing (BDCloud), 2014 | bib | |
AHP-Based Quantitative Approach for Assessing & Comparing Cloud Security Ahmed Taha, Ruben Trapero, Jesus Luna and Neeraj Suri Proc. of TrustComm, 2014 | bib | |
Robust and Real-time Communication on Heterogeneous Networks for Smart Distribution Grid Kubilay Demir, Daniel Germanus and Neeraj Suri Proc. of SmartGridComm, 2014 | bib | |
Towards a Framework for Assessing the Feasibility of Side-channel Attacks in Virtualized Environments Tsvetoslava Vateva-Gurova, Jesus Luna, Ginacarlo Pellegrino, Neeraj Suri Proc. of SECRYPT, 2014 | bib | |
Mitigating Eclipse Attacks in Peer-to-Peer Networks Daniel Germanus, Stefanie Roos, Thorsten Strufe, Neeraj Suri Proc. of CNS, 2014 | bib | |
Practical Use of Formal Verification for Safety Critical Cyber-Physical Systems: A Case Study Tasuku Ishigooka, Habib Saissi, Thorsten Piper, Stefan Winter and Neeraj Suri Proc CPSNA, 2014 | bib | |
An Empirical Study of Injected versus Actual Interface Errors Anna Lanzaro, Roberto Natella, Stefan Winter, Domenico Cotroneo and Neeraj Suri Proc. of ISSTA, 2014 | bib | |
Robust Compressive Data Gathering in Wireless Sensor Networks with Linear Topology Mohammadreza Mahmudimanesh and Neeraj Suri Proc. of DCOSS, 2014 | bib | |
Efficient Agile Sink Selection in Wireless Sensor Networks based on Compressed Sensing Mohammadreza Mahmudimanesh, Amir Naseri, and Neeraj Suri Proc. of DCOSS, 2014 | bib | |
Towards a Framework for Benchmarking Privacy-ABC Technologies Fatbardh Veseli1, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, and Neeraj Suri Proc. of IFIP SEC, 2014 | bib | |
Agile Sink Selection in Wireless Sensor Networks Mohammadreza Mahmudimanesh, Neeraj Suri Proc. of SECON, 2014 | bib | |
User-Centric Security Assessment of Software Configurations: A Case Study Hamza Ghani, Jesus Luna Garcia, Ivaylo Petkov and Neeraj Suri Proc. ESSoS, 2014 | bib | |
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics Hamza Ghani, Jesus Luna Garcia and Neeraj Suri Proc. Of CRISIS, 2013 | bib | |
Predictive Vulnerability Scoring in the Context of Insufficient Information Availability Hamza Ghani, Jesus Luna Garcia, Neeraj Suri, Abdelmajid Khelil and Najib Alkadri CRISIS, 2013 | bib | |
Quantitative Assessment of Software Vulnerabilities Based on Economic-Driven Security Metrics Hamza Ghani, Jesus Luna Garcia and Neeraj Suri Proc. of CRISIS, 2013 | bib | |
PoWerStore: Proofs of Writing for Efficient and Robust Storage Dan Dobre, Ghassan Karame, Wenting Li, Matthias Majuntke, Neeraj Suri and Marko Vukoliç Proc. of ACM CCS, 2013 | bib | |
Coral: Reliable and Low-latency P2P Convergecast for Critical Sensor Data Collection Daniel Germanus, Johannes Schwandke, Abdelmajid Khelil, Neeraj Suri Proc. of IEEE SmartGridComm Symposium, 2013 | bib | |
Efficient Verification of Distributed Protocols Using Stateful Model Checking Habib Saissi, Peter Bokor, Can Arda Müftüoglu, Marco Serafini and Neeraj Suri Proc. of SRDS, 2013 | bib | |
On Using Threat Modeling for Financial Damage Estimation Hamza Ghani, Jesus Luna, Fabian Letzkus and Neeraj Suri Proc. of NETYS, 2013 | ||
Negotiating and Brokering Cloud Resources based on Security Level Agreements Jesus Luna, Tsvetoslava Vateva-Gurova, Neeraj Suri, Massimiliano Rak, Loredana Liccardo Proc. of the International Conference on Cloud Computing and Services Science, 2013 | bib | |
simFI: From single to simultaneous software fault injections Stefan Winter, Michael Tretter, Benjamin Sattler, Neeraj Suri Proc. of DSN-DCCS, 2013 | bib | |
Guaranteeing Proper-Temporal-Embedding Safety Rules in Wireless CPS: A Hybrid Formal Modeling Approach Tan Feng, Qixin Wang, Lei Bu, Rong Zheng, Yufei Wang, Neeraj Suri Proc. of DSN-PDS, 2013 | ||
Information Quality Aware Co-design of Sampling and Transport in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri Proc. WMNC, 2013 | bib | |
Sampling and Transport Co-design in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri Proc. of Wireless On-Demand Network Systems & Services (WONS), 2013 | bib | |
Trading Transport Timeliness and Reliability for Efficiency in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, D. Umap, Matthias Majuntke, Neeraj Suri Proc. Intl Conf on Networking Sensing and Control (ICNSC), 2013 | bib | |
Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees Jesus Luna, Robert Langenberg, Neeraj Suri Proc. of CCSW (ACM Cloud Computing Security Workshop), 2012 | bib | |
Privacy-by-Design Based on Quantitative Threat Modeling Jesus Luna, Neeraj Suri, Ioannis Krontiris Proc. of Conference on Risks and Security of Internet and Systems (CRISIS), 2012 | bib | |
On Co-modeling the Sampling and Transport in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, David Noack and Neeraj Suri Proceedings of the 11th GI/ITG KuVS Fachgespr, 2012 | ||
Balanced Spatio-Temporal Compressive Sensing for Multi-hop Wireless Sensor Networks Mohammadreza Mahmudimanesh, Abdelmajid Khelil, Neeraj Suri Proceedings of Mobile Ad hoc and Sensor Systems (MASS), 2012 | bib | |
The Hierarchical Microkernel: A Flexible and Robust OS Architecture Stefan Winter, Martin Tsarev, Dennis Feldmann, Robert Reinecke Proc. of Dependable Systems & Networks (DSN), 2012 (Supplemental Proceedings) | ||
Susceptibility Analysis of Structured P2P Systems to Localized Eclipse Attacks Daniel Germanus, Robert Langenberg, Abdelmajid Khelil, Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 11-20, 2012 | bib | |
Quantitative Assessment of Cloud Security Levels: A Case Study Jesus Luna, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri Proc. of Security and Cryptography (SECRYPT), pp. 64-73, 2012 | bib | |
Instrumenting AUTOSAR for Dependability Assessment: A Guidance Framework Thorsten Piper, Stefan Winter, Paul Manns and Neeraj Suri Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 1-12, 2012 | bib | |
Information Quality Aware Co-design of Sampling and Transport in Wireless Sensor Networks Vinay Sachidananda, Abdelmajid Khelil, Neeraj Suri Proc. of European Conference on Wireless Sensor Networks (EWSN), Poster, 2012 | ||
The impact of fault models on software robustness evaluations Stefan Winter, Constantin Sarbu, Neeraj Suri, Brendan Murphy Proc. of ICSE 2011, pp 51-60 | bib | |
DKM: Distributed k-Connectivity Maintenance in Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil, Neeraj Suri Proc. of WONS, pp. 83-90, 2011 | bib | |
Assessing the Comparative Effectiveness of Map Construction Protocols in Wireless Sensor Networks Abdelmajid Khelil, Hanbin Chang, Neeraj Suri Proc. of IPCCC, pp. 1-6, 2011 | ||
Fork-Consistent Constructions From Registers Matthias Majuntke, Dan Dobre, Christian Cachin and Neeraj Suri Proc. of OPODIS, pp. 283-298, 2011 | bib | |
An Adaptive and Composite Spatio-Temporal Data Compression Approach for Wireless Sensor Networks Azad Ali, Abdelmajid Khelil, Piotr Szczytowski and Neeraj Suri Proc. of ACM Intl Conf on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM), pp. 67-76, 2011 | bib | |
Supporting Domain-Specific State Space Reductions through Local Partial-Order Reduction Peter Bokor, Marco Serafini, Johannes Kinder, Neeraj Suri Proc. of Automated Software Engineering (ASE), pp. 113-122, 2011 | bib | |
To Crash or Not To Crash: Efficient Modeling of Fail-Stop Faults Habib Saissi, Peter Bokor, Marco Serafini and Neeraj Suri Proc. of Logical Aspects of Fault Tolerance (LAFT), 2011 (invited paper) | ||
A Security Metrics Framework for the Cloud Jesus Luna, Hamza Ghani, Daniel Germanus, and Neeraj Suri Proc. of International Conference on Security and Cryptography (SECRYPT), pp. 245-250, 2011 | bib | |
TOM: Topology Oriented Maintenance in Sparse Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil, Azad Ali and Neeraj Suri Proc. of Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pp. 548-556, 2011 | bib | |
The Complexity of Robust Atomic Storage Dan Dobre, Rachid Guerraoui, Matthias Majuntke, Neeraj Suri and Marko Vukolic Proc. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pp. 59-68, 2011 | bib | |
Fork-Consistent Constructions From Registers Matthias Majuntke, Dan Dobre and Neeraj Suri Proc. ACM SIGACT-SIGOPS Symposium on Principles of Distributed Computing (PODC), pp. 209-210, 2011 (Brief Announcement) | bib | |
Efficient Model Checking of Fault-Tolerant Distributed Protocols Peter Bokor, Johannes Kinder, Marco Serafini and Neeraj Suri Proc. of DSN/DCCS, pp. 73-84, 2011 | bib | |
INDEXYS, A Logical Step Beyond GENESYS – INDustrial EXploitation of the genesYS cross-domain architecture Andreas Eckel, Neeraj Suri et al Proc. of Symposium on Computer Safety, Reliability and Security (SAFECOMP), 2010 | ||
Simulation and Evaluation of Mixed-Mode Environments: Towards Higher Quality of Simulations Vinay Sachidananda, Diego Costantini, Christian Reinl, Dominik Haumann, Karen Petersen, Parag S. Mogre, and Abdelmajid Khelil Proc. of Simulation, Modeling and Programming for Autonomous Robots (SIMPAR), 2010 | ||
Quality of Information in Wireless Sensor Networks: A Survey Vinay Sachidananda, Abdelmajid Khelil, Neeraj Suri Proc. of Information Quality (ICIQ), 2010 | bib | |
Leveraging the Next-Generation Power Grid: Data Sharing and Associated Partnerships Ionna Dionysiou, Harald Gjermundrod, Daniel Germanus, Abdelmajid Khelil, Neeraj Suri, David E. Bakken, and Carl Hauser Proc. ISGT, 2010 | ||
Eventually Linearizable Shared Objects Marco Serafini, Dan Dobre, Matthias Majuntke, Peter Bokor and Neeraj Suri Proc. of ACM Symposium on Principles of Distributed Computing (PODC), pp. 95-104, 2010 | bib | |
Mobility Assisted Adaptive Sampling in Wireless Sensor Networks Piotr Szczytowski, Faisal Karim Shaikh, Vinay Sachidananda, Abdelmajid Khelil and Neeraj Suri Proc. of International Conference on Networked Sensing Systems (INSS), Demo Session, 2010 | ||
Increasing the Resilience of Critical SCADA Systems Using Peer-to-Peer Overlays Daniel Germanus, Abdelmajid Khelil and Neeraj Suri Proc. of International Symposium on Architecting Critical Systems (ISARCS), pp. 161-178, 2010 | bib | |
On Efficient Models for Model Checking Message-Passing Distributed Protocols Peter Bokor, Marco Serafini, Neeraj Suri Proc. of Formal Methods for Distributed Systems (FORTE), pp. 216-223, 2010 | bib | |
Localized Energy Hole Profiling in Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. IEEE symposium on Computers and Communications (ISCC), pp. 100-106, 2010 | bib | |
Towards Benchmarking of P2P Technologies from a SCADA Systems Protection Perspective Abdelmajid Khelil, Sebastian Jeckel, Daniel Germanus and Neeraj Suri Proc. of Mobile Lightweight Wireless Systems (MOBILIGHT), pp. 400-414, 2010 | bib | |
Data-based Agreement for Inter-Vehicle Coordination Brahim Ayari, Abdelmajid Khelil, Kamel Saffar and Neeraj Suri Proc. of Mobile Data Management (MDM), Demo Track, 2010 | bib | |
Scrooge: Reducing the Costs of Fast Byzantine Replication in Presence of Unresponsive Replicas Marco Serafini, Peter Bokor, Dan Dobre, Matthias Majuntke and Neeraj Suri Proc. of DSN-DCCS, pp. 353-362, 2010 | bib | |
HP: Hybrid Paxos for WANs Dan Dobre, Matthias Majuntke, Marco Serafini and Neeraj Suri Proc. of European Dependable Computing Conference (EDCC), pp. 117-126, 2010 | bib | |
Generic Information Transport for Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil, Brahim Ayari, Piotr Szczytowski and Neeraj Suri Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 27-34, 2010 | bib | |
ASample: Adaptive Spatial Sampling in Wireless Sensor Networks Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 35-42, 2010 | bib | |
Reordering for Better Compressibility: Efficient Spatial Sampling in Wireless Sensor Networks Mohammadreza Mahmudimanesh, Abdelmajid Khelil and Neeraj Suri Proc. of Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC), pp. 50-57, 2010 | ||
ParTAC: A Partition-Tolerant Atomic Commit Protocol for MANETs Brahim Ayari, Abdelmajid Khelil and Neeraj Suri Proc. of Mobile Data Management (MDM), pp. 135-144, 2010 | bib | |
TRCCIT: Tunable Reliability with Congestion Control for Information Transport in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil, Azad Ali and Neeraj Suri Proc. of Wireless Internet Conference (WICON), pp. 1-9, 2010 | bib | |
Abortable Fork-Linearizable Storage Matthias Majuntke, Dan Dobre, Marco Serafini, and Neeraj Suri Proc. of OPODIS, pp. 255-269, 2009 | bib | |
Role-Based Symmetry Reduction of Fault-tolerant Distributed Protocols with Language Support Peter Bokor, Marco Serafini, Neeraj Suri and Helmut Veith Proc. of Formal Methods and Software Engineering (ICFEM), pp. 147-166, 2009 | bib | |
Efficient Robust Storage Using Secret Tokens Dan Dobre, Matthias Majuntke, Marco Serafini and Neeraj Suri Proc. of Stabilization, Safety, and Security of Distributed Systems (SSS), pp. 269-283, 2009 | bib | |
MPM: Map based Predictive Monitoring for Wireless Sensor Networks Azad Ali, Abdelmajid Khelil, Faisal Karim Shaikh, and Neeraj Suri Proc. of Autonomics, pp. 79-95, 2009 | bib | |
Design and Formal Verification of Membership Middleware for Dependable Automotive Network Systems Kohei Sakurai, Marco Serafini, Peter Bokor and Neeraj Suri International Congress on Electronic Systems for Vehicles, 2009 | ||
Brief Announcement: Efficient Model Checking of Fault-tolerant Distributed Protocols Using Symmetry Reduction Peter Bokor, Marco Serafini, Neeraj Suri and Hermann Veith Proc. of Distributed Computing DISC, 2009 | bib | |
Map-Based Modeling and Design of Wireless Sensor Networks with OMNeT++ Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. of Performance Evaluation of Computer and Telecommunication Systems (SPECTS), pp. 162-169, 2009 | bib | |
AReIT: Adaptable Reliable Information Transport for Service Availability in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil and Neeraj Suri Proc. of Wireless Networks (ICWN), 2009 | bib | |
Map-based Compressive Sensing Model for Wireless Sensor Network Architecture, A Starting Point Mohammadreza Mahmudimanesh, Abdelmauid Khelil, Nasser Yazdani Proc. of Wireless Sensor Networks Architectures, Simulation and Programming (WASP), 2009 | ||
MAP++: Support for Map-Based WSN Modeling and Design with OMNeT++ Piotr Szczytowski, Abdelmajid Khelil and Neeraj Suri Proc. of Workshop on OMNeT++, pp. 77-87, 2009 | bib | |
On Equivalence Partitioning of Code Paths inside OS Kernel Components Constantin Sârbu, Nachiappan Nagappan and Neeraj Suri Proc. of Software Technologies for Future Dependable Distributed Systems (STFSSD), 2009 | ||
gMAP: Efficient Construction of Global Maps for Mobility-Assisted Wireless Sensor Networks Abdelmajid Khelil, Faisal Karim Shaikh, Azad Ali and Neeraj Suri Proc. of Wireless On demand Network Systems and Services (WONS), pp. 189-196, 2009 | ||
Implementation and Evaluation of Delay-Aware and Fault-Tolerant Mobile Transactions Brahim Ayari, Abdelmajid Khelil, Neeraj Suri and Eugen Bleim Proc. of E-Medical Systems (E-Medisys’08), 2008 [Invited] | ||
On the Time-Complexity of Robust and Amnesic Storage Dan Dobre, Matthias Majuntke and Neeraj Suri Proc. OPODIS, pp. 197-216, 2008 | bib | |
Reducing the Costs of Large-Scale BFT Replication Marco Serafini and Neeraj Suri Proc. LADIS, 2008 | ||
Low-latency Access to Robust Amnesic Storage Dan Dobre, Matthias Majuntke and Neeraj Suri Proc. LADIS, 2008 | ||
Aiding Modular Design and Verification of Safety-Critical Time-Triggered Systems by use of Executable Formal Specifications Kohei Sakurai, Peter Bokor, Neeraj Suri Proc. HASE, pp. 261-270, 2008 | bib | |
Dependable and Cost-Effective Architecture for X-by-Wire with Membership Middleware Kohei Sakurai, Masahiro Matsubara, Marco Serafini, Neeraj Suri Proc. FISITA, 2008 | ||
MM-ulator: Towards a Common Evaluation Platform for Mixed Mode Environments Matthias Krop , Arthur Herzog, Daniel Jacobi, Kim Listmann, Karen Petersen, Katayon Radkhah, Christian Reinl, Faisal Karim Shaikh, Armin Strobel and Oskar von Stryk Proc. of Simulation, Modeling, and Programming for Autonomous Robots (SIMPAR), 2008 | ||
Profiling the Operational Behavior of OS Device Drivers Constantin Sârbu, Andréas Johansson, Neeraj Suri and Nachi Nagappan ISSRE, pp. 127-136, 2008 | bib | |
MWM: A Map-based World Model for Event-driven Wireless Sensor Networks Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Ayari and Neeraj Suri Proc. of Autonomic Computing and Communication Systems (AUTONOMICS), 2008 | bib | |
INcreasing Security and Protection through Infrastructure REsilience: the INSPIRE Project Salvatore D’Antonio, Abdelmajid Khelil, Luigi Romano and Neeraj Suri Proc. of Critical Information Infrastructures Security (CRITIS), pp. 109-118, 2008 | ||
Delay-Aware Mobile Transactions Brahim Ayari, Abdelmajid Khelil and Neeraj Suri Proc. of Software Technologies for Future Embedded & Ubiquitous Systems (SEUS), pp. 280-291, 2008 | bib | |
Strengthened State Transitions for Complete Invariant Verification in Practical Depth-Induction Peter Bokor, Sandeep Shukla, András Pataricza and Neeraj Suri AFM, 2008 | ||
Trust Characterization for Dependable Distributed Systems Marco Serafini and Neeraj Suri EUROSYS. Doctoral Workshop, 2008 | ||
Efficient Asynchronous Agreement Protocols Dan Dobre and Neeraj Suri EUROSYS. Doctoral Workshop, 2008 | ||
Semantic Property Preserving Abstractions for Automated Verification of Fault-Tolerance Peter Bokor and Neeraj Suri EUROSYS. Doctoral Workshop, 2008 | ||
On Building (and Sojourning) the State-space of Windows Device Drivers Constantin Sârbu and Neeraj Suri Workshop on State-space Exploration for Automated Testing (SSEAT), 2008 | ||
Execution Path Profiling for OS Device Drivers: Viability and Methodology Constantin Sârbu, Andréas Johansson and Neeraj Suri Proc. of Service Availability Symposium (ISAS), Tokyo, Japan. Lecture Notes in Computer Science 5017, Springer Verlag, pp. 90-109, 2008 | bib | |
A Comparative study of Data Transport Protocols in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil and Neeraj Suri Proc. of World of Wireless, Mobile and Multimedia Networks (WOWMOM), pp. 1-9, 2008 | ||
Sustaining Property Verification of Synchronous Dependable Protocols Over Implementation Péter Bokor, Marco Serafini, Áron Sisak, András Pataricza and Neeraj Suri Proc. of High Assurance Systems Engineering Symposium (HASE), pp. 169-178, 2007 | ||
A Multi Variable Optimization Approach for the Design of Integrated Dependable Real-Time Embedded Systems Shariful Islam and Neeraj Suri Proc. of Embedded and Ubiquitous Computing (EUC), pp. 517-530, 2007 | bib | |
On the Impact of Injection Triggers for OS Robustness Evaluation Andréas Johansson, Brendan Murphy and Neeraj Suri Proc. of International Symposium on Software Reliability Engineering (ISSRE), pp. 117-126, 2007 | bib | |
The Fail-Heterogeneous Architectural Model Marco Serafini and Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 103-113, 2007 | bib | |
On the Latency-Efficiency of Message-Parsimonious Asynchronous Atomic Broadcast Dan Dobre, HariGovind V. Ramasamy and Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 311-322, 2007 | bib | |
Model-Based Development of Distributed Embedded Real-Time Systems with the DECOS Tool-Chain Wolfgang Herzner, Rupert Schlick, Martin Schlager, Bernhard Leiner, Bernhard Huber, András Balogh, György Csertan, Alain LeGuennec, Thierry LeSergent, Neeraj Suri and Shariful Islam Proc. SAE Aerotech, 2007 | ||
Gossiping: Adaptive and Reliable Broadcasting in MANETs Abdelmajid Khelil and Neeraj Suri Proc. of Latin-American Symposium on Dependable Computing (LADC), Sep. 2007 | bib | |
On Detecting Termination in the Crash-Recovery Model Felix C. Freiling, Matthias Majuntke, Neeraj Mittal Proc. of European Conference on Parallel and Distributed Computing (Euro-Par), 2007 | ||
Latency-Efficient Atomic Broadcast for WANs Dan Dobre, Matthias Majuntke, Neeraj Suri Large-Scale Distributed Systems and Middleware (LADIS), 2007 | bib | |
On the Selection of Error Model(s) For OS Robustness Evaluation Andréas Johansson, Neeraj Suri and Brendan Murphy Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 502-511, 2007 | bib | |
A Tunable Add-On Diagnostic Protocol for Time-Triggered Systems Marco Serafini, Neeraj Suri et al. Proc. of Dependable Systems & Networks (DSN/DCCS), pp. 164-174, 2007 | bib | |
Meeting the Evolving Reliability Requirements for WSN Applications Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri European Conference on Wireless Sensor Networks (EWSN), 2007 | ||
A Line in the Sand: Emerging Embedded System Challenges Neeraj Suri Microelectronics Keynote, 2006 | ||
On Modeling the Reliability of Data Transport in Wireless Sensor Networks Faisal Karim Shaikh, Abdelmajid Khelil, Neeraj Suri Proc. of Parallel, Distributed and Network-based Processing (PDP), pp. 395-402, 2007 | bib | |
Supporting Heterogeneous Applications in the DECOS Integrated Architecture Christian El-Salloum, Roman Obermaisser, Bernhard Huber, Hermann Kopetz, Neeraj Suri Microelectronics ME, 2006 | ||
A SW-HW Integration Process for the Generation of Platform Specific Models Shariful Islam, György Csertán, András Balogh, Wolfgang Herzner, Thierry Le Sergent, András Pataricza, Neeraj Suri Microelectronics ME, 2006 | ||
From Model-Based Design to Deployment of Integrated, Embedded, Real-Time Systems: The DECOS Tool-Chain Wolfgang Herzner, Martin Schlager, Thierry Le Sergent, Bernhard Huber, Shariful Islam, Neeraj Suri, András Balogh Microelectronics ME, 2006 | ||
FT-PPTC: An Efficient and Fault-Tolerant Commit Protocol for Mobile Environments Brahim Ayari, Abdelmajid Khelil, Neeraj Suri Proc. of Symposium on Reliable Distributed Systems (SRDS), pp. 96-105, 2006 | ||
Termination Detection in an Asynchronous Distributed System with Crash-Recovery Failures Felix C. Freiling, Matthias Majuntke and Neeraj Mittal Proc. of Stabilization, Safety, and Security of Distributed Systems (SSS), 2006 | ||
Mobility-Aware Buffering for Delay-Tolerant Broadcasting in MANETs Abdelmajid Khelil Proc. of Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’06), 2006 | ||
Closing the Gap in Failure Analysis Brendan Murphy, Mario Garzia and Neeraj Suri Workshop on Applied SW Reliability @ Proc. of Dependable Systems and Networks (DSN), 2006 | ||
One Step Consensus with Zero Degradation Dan Dobre and Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 137-146, 2006 | bib | |
Improving Robustness Testing of COTS OS Extensions Constantin Sârbu, Andréas Johansson, Falk Fraikin and Neeraj Suri Proc. of International Service Availability Symposium (ISAS), Published in Lecture Notes in Computer Science 4328, Springer Verlag, pp. 120-139, 2006 | bib | |
Dependability Driven Integration of Mixed Criticality SW Components Shariful Islam, Robert Lindström and Neeraj Suri 9th IEEE International Symposium on Object and Component-oriented Real-time distributed Computing (ISORC), pp. 485-495, 2006 | bib | |
Evaluation of Partition-Aware MANET Protocols and Applications with ns-2 Abdelmajid Khelil, Pedro José Marrón, R. Dietrich, and Kurt Rothermel Proc. of Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS’05), 2005 | ||
Contact-Based Mobility Metrics for Delay-Tolerant Ad Hoc Networking Abdelmajid Khelil, Pedro José Marrón, and Kurt Rothermel Proc. of Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS), 2005 | ||
Designing Efficient Fail-Safe Multi-tolerant Systems Arshad Jhumka and Neeraj Suri Proc. of Formal Techniques for Networked and Distributed Systems (FORTE), pp. 428-442, 2005 | ||
Error Propagation Profiling of Operating Systems Andréas Johansson and Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 86-95, 2005 | bib | |
Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications Felix Gärtner and Arshad Jhumka Proc. of Formal Techniques in Real-Time and Fault Tolerant System (FTRTFT), 2004 | ||
Survivability of Operating Systems: Profiling Vulnerabilities Neeraj Suri and Andréas Johansson FuDiCo II: Bertinoro Workshop on Future Directions in Distributed Computing, Bertinoro, Italy, 2004 | ||
On Enhancing the Robustness of Commercial Operating Systems Andréas Johansson, Adina Sârbu, Arshad Jhumka and Neeraj Suri Proc. of International Service Availability Symposium (ISAS), 2004. Springer Verlag, pp. 148-159, 2004 | bib | |
On Dependability Driven Software and Hardware Integration Neeraj Suri Proc. of Workshop on Software Technologies for Embedded and Ubiquitous Computing Systems/International Symp, 2004 | ||
Providing Event Triggered Channels on a Time-triggered Base Vilgot Claesson and Neeraj Suri Proc. of International Conference on Engineering of Complex Computer Systems (ICECCS), 2004 | ||
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems Arshad Jhumka, Martin Hiller, Neeraj Suri High Assurance Systems Engineering Conference (HASE), pp. 69-78, 2004 | bib | |
Challenges for Dependable Embedded Systems: Developing the Information Society Infrastructure Neeraj Suri (invited talk) SRDS: WDES/WLGC Joint Keynote, 2003 | bib | |
On the Limits of the Precise Specification of Component Interfaces Hermann Kopetz and Neeraj Suri Proc. of Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Capri, 2003 | ||
Practical Aspects of Designing an IP Take Over Mechanism Christof Fetzer, Karin Högstedt, and Neeraj Suri Proc. of Workshop on Object-oriented Real-time Dependable Systems (WORDS 2003), Capri, 2003 | bib | |
Software Profiling for Designing Dependable Systems Martin Hiller, Arshad Jhumka and Neeraj Suri Proc. of Space Mission Challenges for Information Technology (SMC-IT), JPL Publication 03-13A, pp. 59-66, Jul. 2003 | ||
A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs Arshad Jhumka, Martin Hiller, Neeraj Suri Software and Compilers for Embedded Systems (SCOPES03), 2003 | bib | |
Compositional Design of Real-Time Systems: A Conceptual Basis for Specification of Linking Interfaces Hermann Kopetz, and Neeraj Suri Proc. of International Symposium on Object-oriented Real-time distributed Computing (ISORC), pp. 51-60, 2003 | bib | |
The Event-Triggered and Time-Triggered Media Access Methods Vilgot Claesson, Cecilia Ekelin, Neeraj Suri Proc. of International Symposium on Object-oriented Real-time distributed Computing (ISORC), pp. 131-134, 2003 | ||
On the Effect of Transient Data-Errors in Controller Implementation Magnus Gäfvert, Björn Wittenmark , Örjan Askerdal American Control Conference (ACC), 2003 | ||
Toward an efficient solution for dynamic ad hoc network interoperability Daniel Prince, Andrew Scott and Dough Shepherd Proc. of PGNet, 2002 | ||
An Epidemic Model for Information Diffusion in MANETs Abdelmajid Khelil, Christian Becker, Jing Tian, Kurt Rothermel Proc. of Workshop on Modeling, Analysis and Simulation of Wireless and Mobile Systems, 2002 | ||
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems Örjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri Proc. of Pacific Rim International Symposium on Dependable Computing (PRDC), 2002 | ||
An Approach to Specify and Test Component-Based Dependable Software Arshad Jhumka, Martin Hiller, Neeraj Suri Proc. of High Assurance Systems Engineering (HASE), 211-220, 2002 | ||
Component-Based Synthesis of Dependable Embedded Software Arshad Jhumka, Martin Hiller, Neeraj Suri Proc. of Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT), pp. 111-118, 2002 | ||
PROPANE: An Environment for Examining the Propagation of Errors in Software Martin Hiller, Arshad Jhumka, Neeraj Suri Proc. of International Symposium on Software Testing and Analysis (ISSTA), ACM SIGSOFT, Vol. 27, #4, pp. 81-85, 2002 | ||
On the Placement of Software Mechanisms for Detection of Data Errors Martin Hiller, Arshad Jhumka, Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 135-144, 2002 | ||
On Systematic Design of Globally Consistent Executable Assertions in Embedded Software Arshad Jhumka, Martin Hiller, Vilgot Claesson, Neeraj Suri ACM Joint Conference – Languages, Compilers and Tools for Embedded Systems/Software and Compilers for Embedded Systems (LCTES/SCOPES), pp. 74-83, 2002 | ||
On Simplifying Modular Specification and Verification of Distributed Protocols Purnendu Sinha, Neeraj Suri High Assurance Systems Engineering (HASE), pp. 173-181, 2001 | ||
An Efficient TDMA Synchronization Approach for Distributed Embedded Systems Vilgot Claesson, Henrik Lönn, Neeraj Suri Proc. of Symposium on Reliable and Distributed Systems (SRDS), pp. 198-201, 2001 | ||
Assessing Inter-Modular Error Propagation in Distributed Software Arshad Jhumka, Martin Hiller, Neeraj Suri Proc. of Symposium on Reliable and Distributed Systems (SRDS), pp. 152-161, 2001 | ||
An Approach for Analysing the Propagation of Data Errors in Software Martin Hiller, Arshad Jhumka, Neeraj Suri Proc. of Dependable Systems and Networks (DSN) 2001, pp. 161-170, 2001 | ||
DBench (Dependability Benchmarking) Karama Kanoun et al. (Neeraj Suri) EC DEPPY Workshop, Supplement DSN, 2001 | ||
Modular Composition of Redundancy Management Protocols in Distributed Protocols: An Outlook on Simplifying Protocol Level Specification & Verification Purnendu Sinha, Neeraj Suri Proc. of International Conference on Distributed Computing Systems (ICDCS), pp. 255-263, 2001 | ||
Executable Assertions for Detecting Data Errors in Embedded Control Systems Martin Hiller Proc. of Dependable Systems and Networks (DSN) 2000, pp. 24-33, 2000 | ||
Designing High-Performance & Reliable Superscalar Architectures: The Out of Order Reliable Superscalar (O3Rs) Approach Avi Mendelson, Neeraj Suri Proc. of Dependable Systems and Networks (DSN), pp. 473-481, 2000 | ||
Evaluation of COTS Standards for Dependable Systems Design Chris J. Walter, Neeraj Suri, Tim Monaghan Proc. of Dependable Systems and Networks (DSN), 2000 | ||
Error Recovery Using Forced Validity Assisted by Executable Assertions for Error Detection: An Experimental Evaluation Martin Hiller Proc. of EUROMICRO Conference, Vol. II, pp. 105-112, 1999 | ||
On the Use of Formal Techniques for Analyzing Dependable Real-Time Protocols Purnendu Sinha, Neeraj Suri Proc. of Real-Time Systems Symposium (RTSS), pp. 126-135, 1999 | ||
Identification of Test Cases Using a Formal FI Approach Purnendu Sinha, Neeraj Suri Proc. of Fault-Tolerant Computing Symposium (FTCS-29), pp. 314-321, 1999 | ||
An Experimental Comparison of Fault and Error Injection Jorgen Christmansson, Martin Hiller, Marcus Rimén Proc. of International Symposium on Software Reliability Engineering (ISSRE), pp. 378-396, 1998 | ||
A Framework for Dependability Driven SW Integration Neeraj Suri, Sunundu Ghosh, Tom Marlowe Proc. of International Conference on Distributed Computing Systems (ICDCS), pp. 405-416, 1998 | ||
The XBW Model for Dependable Real-Time Systems Vilgot Claesson , Stefan Poledna, Jan Söderberg Proc. of International Conference on Parallel and Distributed Systems, 1998 | ||
On the Use of Formal Techniques for Validation Neeraj Suri, Purnendu Sinha Proc. of Fault-Tolerant Computing Symposium (FTCS-28), pp. 390-401, 1998 | ||
Prototype Implementation Using the XBW Software Model Vilgot Claesson Proceedings of the Swedish National Real-Time Workshop (SNART) ’97, Lund, Sweden, 1997 | ||
Cache Based Fault Recovery in Distributed Systems Avi Mendelson, Neeraj Suri International Conference on Engineering of Complex Computer Systems, 1997 | ||
Roll-Forward Recovery: The Bi-Directional Cache Approach Avi Mendelson, Neeraj Suri Fault-Tolerant Parallel and Distributed Systems, 1995 | ||
Dependability Issues in the Reuse of Standard Components in Open Architectures Chris J. Walter, Neeraj Suri 10th Conf. on Computing in Aerospace, 1995 | ||
A System Level On-Line Testing Approach Neeraj Suri On-Line Testing, 1995 | ||
Evaluating Fault Coverage Using an Integrated Inductive and Deductive Approach Chris J. Walter, Neeraj Suri Fault and Error Models of Failures in Computer Systems, 1993 | ||
Reliability Modeling of Large Fault-Tolerant Systems Neeraj Suri, M. Hugue, Chris J. Walter 22nd International Symposium on Fault-Tolerant Computing (FTCS-22), 1992 | ||
Continual On-Line Diagnosis of Hybrid Faults Chris J. Walter, M. Hugue, Neeraj Suri Proc. of Dependable Computing for Critical Applications (DCCA-4), 1994 | ||
BDG-Torus Union Graph: An Algorithmically Specialized Parallel Interconnect Neeraj Suri, Avi Mendelson, Dhiraj Pradhan Symposium on Parallel and Distributed Processing (SPDP), 1991 |