default search action
PRDC 2007: Melbourne, Victoria, Australia
- 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia. IEEE Computer Society 2007, ISBN 0-7695-3054-0
Algorithms, Analysis, and Theory
- Christian Buckl, Matthias Regensburger, Alois C. Knoll, Gerhard Schrott:
Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time. 3-10 - Masato Kitakami, Yuta Noguchi:
Error Recovery Method for Multiple-Dictionary Compression Method. 11-18 - Masato Sakai, Hiroya Matsuba, Yutaka Ishikawa:
Fault Detection System Activated by Failure Information. 19-26 - Naixue Xiong, Yan Yang, Xavier Défago:
Comparative Analysis of QoS and Memory Usage of Adaptive Failure Detectors. 27-34 - Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi, Hiroyuki Okamura:
Quantifying Software Maintainability Based on a Fault-Detection/Correction Model. 35-42 - Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi:
PISRAT: Proportional Intensity-Based Software Reliability Assessment Tool. 43-52 - Tatsuhiro Tsuchiya, André Schiper:
An Automatic Real-Time Analysis of the Time to Reach Consensus. 53-60 - Gang Wang, Sheng Lin, Xiaoguang Liu, Guangjun Xie, Jing Liu:
Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage Systems. 61-68 - Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu:
Failure Detectors and Extended Paxos for k-Set Agreement. 69-76 - Shiyi Xu:
An Accurate Model of Software Reliability. 77-84 - Atifah Ali, Aamer Nadeem, Muhammad Zohaib Z. Iqbal, Muhammad Usman:
Regression Testing Based on UML Design Models. 85-88 - Matthias Regensburger, Christian Buckl, Alois C. Knoll, Gerhard Schrott:
Model Based Development of Safety-Critical Systems Using Template Based Code Generation. 89-92 - Hongyu Zhang, Xiuzhen Zhang, Ming Gu:
Predicting Defective Software Components from Code Complexity Measures. 93-96 - Ruilian Zhao, Shanshan Lv:
Neural-Network Based Test Cases Generation Using Genetic Algorithm. 97-100 - Chui Young Yoon, Keon-Myung Lee:
A Measurement Tool of End-User Computing Capability in Competency Perspective. 101-105
Dependable Networks
- Jenn-Wei Lin, Ming-Feng Yang, Jichiang Tsai:
Fault Tolerance for Super-Peers of P2P Systems. 107-114 - Song Huang, Yong Xu, Ling Zhang:
A Path Diversity Metric for End-to-End Network. 115-122 - Jiannong Cao, Michel Raynal, Corentin Travers, Weigang Wu:
The Eventual Leadership in Dynamic Mobile Networking Environments. 123-130 - Chiu-Wen Chen, Kuo-Feng Ssu, Hewijin Christine Jiau:
Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks. 131-138 - Ludovic Courtès, Ossama Hamouda, Mohamed Kaâniche, Marc-Olivier Killijian, David Powell:
Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices. 139-146 - Chia-Tai Tsai, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang:
Implementation of Highly Available OSPF Router on ATCA. 147-154 - Rafael R. Obelheiro, Joni da Silva Fraga:
Overlay Network Topology Reconfiguration in Byzantine Settings. 155-162 - Hong-Zu Chou, Szu-Chi Wang, Sy-Yen Kuo:
A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks. 163-170 - Ke-Ting Chen, Kuo-Feng Ssu, Wei-Tong Wang:
Fault Diagnosis for Time Synchronization in Sensor Networks. 171-178 - Junaid Ahsenali Chaudhry, Yonghwan Lee, Dugki Min, Seungkyu Park, Chun-Hyon Chang, Duckwon Chung:
Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks. 179-186 - Wei-Ming Wu, Kuochen Wang, Rong-Hong Jan, Chia-Yuan Huang:
A Fast Failure Detection and Failover Scheme for SIP High Availability Networks. 187-190 - Vahid Lari, Mehdi Dehbashi, Seyed Ghassem Miremadi, Navid Farazmand:
Assessment of Message Missing Failures in FlexRay-Based Networks. 191-194 - Guangping Xu, Gang Wang, Jing Liu:
A Hybrid Redundancy Approach for Data Availability in Structured P2P Network Systems. 195-199
Dependable Systems and Hardware
- Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan:
A New Concurrent Detection of Control Flow Errors Based on DCT Technique. 201-209 - Lianlian Zeng, Paul Beckett:
Soft Error Rate Estimation in Deep Sub-micron CMOS. 210-216 - Chia Hsiang Hsu, Cheng-Juei Yu, Sheng-De Wang:
Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning. 217-223 - Chun-Lin Yang, Yuang-Cheng Hsiao, Shyue-Kung Lu:
Efficient BISR Techniques for Embedded Memories Considering Cluster Faults. 224-231 - Thomas Kottke, Andreas Steininger:
A Fail-Silent Reconfigurable Superscalar Processor. 232-239 - Vinaitheerthan Sundaram, Sandip HomChaudhuri, Sachin Garg, Chandra M. R. Kintala, Saurabh Bagchi:
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. 240-247 - Shuming Chen, Xiao Hu, Biwei Liu, Jihua Chen:
An On-Line Control Flow Checking Method for VLIW Processor. 248-255 - Casey M. Jeffery, Renato J. O. Figueiredo:
Towards Byzantine Fault Tolerance in Many-Core Computing Platforms. 256-259 - Yousuke Nakamura, Kei Hiraki:
Heterogeneous Functional Units for High Speed Fault-Tolerant Execution Stage. 260-263 - Ahmad Patooghy, Mahdi Fazeli, Seyed Ghassem Miremadi:
A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips. 264-267 - Toshinori Sato, Toshimasa Funaki:
Power-Performance Trade-Off of a Dependable Multicore Processor. 268-273
Distributed Systems
- Ming-Wei Wu, Sy-Yen Kuo:
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. 275-281 - Carl Bergenhem, Johan Karlsson:
A Process Group Membership Service for Active Safety Systems Using TT/ET Communication Scheduling. 282-289 - Damián Serrano, Marta Patiño-Martínez, Ricardo Jiménez-Peris, Bettina Kemme:
Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-Isolation. 290-297 - Jangwoo Kim, Jared C. Smolens, Babak Falsafi, James C. Hoe:
PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM Servers. 298-305 - Jichiang Tsai, Chia-Yang Chen, Ming-Fa Hu, Jenn-Wei Lin:
Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols. 306-313 - Kai Han, Binoy Ravindran, E. Douglas Jensen:
RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable Networks. 314-321 - Marco Vieira, Nuno Laranjeiro, Henrique Madeira:
Benchmarking the Robustness of Web Services. 322-329 - Andrew Maloney, Andrzej Goscinski:
The Cost of Storing Checkpoints to Multiple Volatile Storage Locations Using at-least-k Semantics. 330-333 - Takeshi Mishima, Hiroshi Nakamura:
A Proposal of New Dependable Database Middleware with Consistency and Concurrency Control. 334-337 - Tim Moors, Patrick Chu:
Improving Email Reliability by Sender Retransmission. 338-341 - Raul Barbosa, António Ferreira, Johan Karlsson:
Implementation of a Flexible Membership Protocol on a Real-Time Ethernet Prototype. 342-347
Security Issues
- Shih-Yao Dai, Sy-Yen Kuo:
MAPMon: A Host-Based Malware Detection Tool. 349-356 - Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo:
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. 357-364 - José Fonseca, Marco Vieira, Henrique Madeira:
Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. 365-372 - Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. 373-380 - Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. 381-388 - Myeong-Hyeon Lee, Yoon-Hwa Choi:
A Fault-Tolerant Bloom Filter for Deep Packet Inspection. 389-396 - Bernhard Riedl, Veronika Grascher, Thomas Neubauer:
Applying a Threshold Scheme to the Pseudonymization of Health Data. 397-400 - Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo:
On the Effects of Finite Memory on Intrusion-Tolerant Systems. 401-404 - Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. 405-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.