Formerly a postdoc in the PERFORM group.
Now at the University of Haifa and Intel.
Publications with the Performability Engineering Research Group
Overcoming Byzantine Failures using Checkpointing.
A. Agbaria and R. Friedman. (03AGB02)
University of Illinois at Urbana-Champaign Coordinated Science Laboratory technical report no. UILU-ENG-03-2228 (CRHC-03-14), December 2003.
Semi-Passive Replication in the Presence of Byzantine Faults.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (04RAM01)
University of Illinois at Urbana-Champaign Coordinated Science Laboratory technical report no. UILU-ENG-04-2202 (CRHC-04-02), February 2004.
Distributed Snapshots for Mobile Computing Systems.
A. Agbaria and W. H. Sanders. (03AGB01)
Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications, Orlando, FL, March 14-17, 2004, pp. 177-186. [IEEE Xplore entry]
CoBFIT: A Component-Based Framework for Intrusion Tolerance.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (04RAM03)
Proceedings of the 30th Euromicro Conference, Rennes, France, August 31-September 3, 2004, pp. 591-600. [IEEE Xplore entry]
Model-Based Validation of an Intrusion-Tolerant Information System.
F. Stevens, T. Courtney, S. Singh, A. Agbaria, J. F. Meyer, W. H. Sanders, and P. Pal. (04STE02)
Proceedings of the 23rd Symposium on Reliable Distributed Systems (SRDS 2004), Florianópolis, Brazil, October 18-20, 2004, pp. 184-194. [IEEE Xplore entry]
Online Model-Based Adaptation for Optimizing Performance and Dependability.
K. R. Joshi, M. Hiltunen, R. Schlichting, W. H. Sanders, and A. Agbaria. (04JOS03)
Proceedings of the Workshop on Self-Managed Systems (WOSS 2004), Newport Beach, CA, October 31-November 1, 2004 (CD-ROM).
A Compiler-Enabled Model- and Measurement-Driven Adaptation Environment for Dependability and Performance.
V. S. Adve, A. Agbaria, M. A. Hiltunen, R. K. Iyer, K. R. Joshi, Z. Kalbarczyk, R. M. Lefever, R. Plante, W. H. Sanders, and R. D. Schlichting. (05ADV01)
Proceedings of the Next Generation Software (NGS) Workshop at the International Parallel & Distributed Processing Symposium (IPDPS), Denver, Colorado, April 4, 2005 (CD-ROM). [IEEE Xplore entry]
A Replication- and Checkpoint-Based Approach for Anomaly-Based Intrusion Detection and Recovery.
A. Agbaria and R. Friedman. (05AGB02)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (section on the 2nd International Workshop on Security in Distributed Computing Systems (SDCS ’05)), Columbus, Ohio, June 6-10, 2005, pp. 137-143. [IEEE Xplore entry]
Application-Driven Coordination-Free Distributed Checkpointing.
A. Agbaria and W. H. Sanders. (05AGB01)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, Columbus, Ohio, June 6-10, 2005, pp. 177-186. [IEEE Xplore entry]
Validation of a Survivable Publish-Subscribe System.
S. Singh, A. Agbaria, F. Stevens, T. Courtney, J. F. Meyer, W. H. Sanders, and P. Pal. (05SIN01)
International Scientific Journal of “Computing,” vol. 4, no. 2, 2005.
Parsimony-Based Approach for Obtaining Resource-Efficient and Trustworthy Execution.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (05RAM01)
Dependable Computing: Proceedings of the 2nd Latin-American Symposium (LADC 2005), Salvador, Brazil, October 25-28, 2005, LNCS vol. 3747, Springer-Verlag, pp. 206-225.
The Parsimonious Approach to Constructing Fault-Tolerant Protocols.
H. V. Ramasamy, C. Cachin, A. Agbaria, and W. H. Sanders. (06RAM01)
Fast Abstract at the International Conference on Dependable Systems and Networks (DSN-2006), Philadelphia, PA, USA, June 25-28, 2006.
An Architecture for Adaptive Intrusion-Tolerant Applications.
P. Pal, P. Rubel, M. Atighetchi, F. Webber, W. H. Sanders, M. Seri, H. Ramasamy, J. Lyons, T. Courtney, A. Agbaria, M. Cukier, J. Gossett, and I. Keidar. (04PAL01)
Special issue of Software: Practice and Experience on Experiences with Auto-adaptive and Reconfigurable Systems, vol. 36, no. 11-12, September-October 2006, pp. 1331-1354.
A Parsimonious Approach for Obtaining Resource-Efficient and Trustworthy Execution.
H. V. Ramasamy, A. Agbaria, and W. H. Sanders. (05RAM04)
IEEE Transactions on Dependable and Secure Computing, vol. 4, no. 1, January-March 2007, pp. 1-17. [IEEE Xplore entry]
COPYRIGHT NOTICES: The above electronic files are presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author’s copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
The following copyright notice applies to all of the above items that appear in IEEE publications: “Personal use of this material is permitted. However, permission to reprint/publish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from IEEE.”
With respect to items published by the ACM: Items are © by the authors listed and by the ACM, in the year listed on each item. The files posted here are the authors’ versions of the work. They are posted here for your personal use and are not for redistribution. The definitive Version of Record was published as indicated in the bibliographic citations provided, and is available from the ACM Digital Library from the ACM Digital Object Identifier listed for each publication.