default search action
DepCoS-RELCOMEX 2008: Szklarska Poreba, Poland
- Wojciech Zamojski, Jacek Mazurkiewicz, Jaroslaw Sugier, Tomasz Walkowiak:
Third International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2008, June 26-28, 2008, Szklarska Poreba, Poland. IEEE Computer Society 2008, ISBN 978-0-7695-3179-3
Modelling
- Dariusz Dymek, Leszek Kotulski:
Using UML(VR) for Supporting the Automated Test Data Generation. 3-8 - Dariusz Dymek, Leszek Kotulski:
Estimation of System Workload Time Characteristic Using UML Timing Diagrams. 9-14 - Paolo Maggi, Davide Pozza, Riccardo Sisto:
Vulnerability Modelling for the Analysis of Network Attacks. 15-22 - Henryk Piech:
Fuzzy strategies in modeling effects of technological implementations. 23-30 - Alfredo Pironti, Riccardo Sisto:
Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models. 31-38 - Antonio da Silva, José-Fernán Martínez, Lourdes López-Santidrián, Ana Belén García, Vicente Hernández:
XML Schema Based Faultset Definition to Improve Faults Injection Tools Interoperability. 39-46 - Ian Philip Wolforth, Martin Walker, Yiannis Papadopoulos:
A Language for Failure Patterns and Application in Safety Analysis. 47-54 - Elena N. Zaitseva, Vitaly G. Levashenko:
Decision Diagrams for Reliability Analysis of Multi-State System. 55-62
Methodology and Tools
- Leonid Abrosimov, Sergey Kalashnikov, Matip Essounga Lazare:
Method of Matrix Writing Constructing of Topological Structure of Computer Network. 65-72 - Ali Al-Dahoud, Tomasz Walkowiak, Marek Woda:
Dependability Aspects of e-Learning Systems. 73-79 - Vasily V. Balashov, Anatoly G. Bakhmurov, Maxim V. Chistolinov, Ruslan L. Smeliansky, Dmitry Yu. Volkanov, Nikita V. Youshchenko:
A Hardware-in-the-Loop Simulation Environment for Real-Time Systems Development and Architecture Evaluation. 80-86 - S. E. Bazhanov, S. V. Bogdanets, V. P. Kutepov:
Fault Tolerant Algorithm for Functional and Data Flow Parallel Programs Performance on Clusters. 87-94 - Lukasz Cyra, Janusz Górski:
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application. 95-102 - Lukasz Cyra, Janusz Górski:
An Approach to Evaluation of Arguments in Trust Cases. 103-110 - Bernhard Fechner, Andre Osterloh:
A True Random Number Generator with Built-in Attack Detection. 111-118 - Leszek Kotulski, Lukasz Fryz:
Conjugated Graph Grammars as a Mean to Assure Consistency of Systems of Conjugated Graphs. 119-126 - Vasilis P. Koutras, Agapios N. Platis:
Semi-Markov Availability Modeling of a Redundant System with Partial and Full Rejuvenation Actions. 127-134 - Yuliya Prokhorova, Vyacheslav S. Kharchenko, Sergey Ostroumov, Stanislav Yatsenko, Mykola Sidorenko, Boris Ostroumov:
Dependable SoPC-Based On-board Ice Protection System: From Research Project to Implementation. 135-142 - Krzysztof Sacha:
Verification and Implementation of Dependable Controllers. 143-151 - Victor V. Toporkov, Alexey Tselishchev:
Safety Strategies of Scheduling and Resource Co-allocation in Distributed Computing. 152-159
Dependability of Computer Networks
- Radoslaw Brendel, Henryk Krawczyk:
Detection of Roles of Actors in Social Networks Using the Properties of Actors' Neighborhood Structure. 163-170 - Hugo Dworak:
Automatic Temporal Evaluation of the Accessibility of the World Wide Web and Its Standards Conformance. 171-178 - Alexander S. Frolov, Igor Shchurov:
Non-Centralized Key Pre-Distribution in Computer Networks. 179-188 - Vyacheslav Klimanov, Artem Yermakov:
Complex Network Cluster Reliability Evolution. 189-194 - Ervin Tóth, Zoltán Hornák, Gergely Tóth:
Protection System against Overload and Distributed Denial of Service Attacks. 195-202 - Wojciech Tylman:
Misuse-Based Intrusion Detection Using Bayesian Networks. 203-210 - Wojciech Tylman:
Anomaly-Based Intrusion Detection Using Bayesian Networks. 211-218 - Shaoyan Zhang, Rui Zhang, Jianmin Jiang:
A Performance Management System for Telecommunication Network Using AI Techniques. 219-226 - Zi-Li Deng, Nenghai Yu, Zheng Li:
Designing Fault Tolerant Networks Topologies Based on Greedy Algorithm. 227-234
Software Security and Reliability
- Lukasz Bagrij, Katarzyna Michalska, Marek Woda:
Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results. 237-244 - Ammar Bessam, Mohamed Tahar Kimour:
Software Architecture Behavior Meta-model for Real-Time Systems. 245-252 - Ilona Bluemke, Konrad Billewicz:
Aspects in the Maintenance of Compiled Programs. 253-260 - Anna Derezinska, Anna Szustek:
Tool-Supported Advanced Mutation Approach for Verification of C# Programs. 261-268 - Feras Hanandeh:
Constraint & Test Verification in Parallel Database Systems. 269-276 - Jan Magott, Marek Woda:
Evaluation of SOA Security Metrics Using Attack Graphs. 277-284 - Marek Woda, Lukasz Bagrij:
Comprehensive Planning Platform Framework for Managing Service-Oriented Information Systems. 285-292 - Wlodek M. Zuberek, Ilona Bluemke:
Performance Analysis of Component-Based Systems. 293-300 - Michal Zyla, Dariusz Caban:
Dependability Analysis of SOA Systems. 301-306
Hardware Design for Dependable Systems
- Eugene Babeshko, Vyacheslav S. Kharchenko, Anatoliy Gorbenko:
Applying F(I)MEA-technique for SCADA-Based Industrial Control Systems Dependability Assessment and Ensuring. 309-315 - Janusz Biernat:
The Complexity of Fault-Tolerant Adder Structures. 316-323 - Andrey Chernetsov, Olga Shamayeva:
Problems of Parallel Realization of Algorithms Calculation of Electronic Structure of Large Molecules. 324-331 - Krzysztof Kepa, Fearghal Morgan, Krzysztof Kosciuszkiewicz, Tomasz Surmacz:
SeReCon: A Trusted Environment for SoPC Design. 332-338 - Vyacheslav S. Kharchenko, Alexandr Siora, Vladimir V. Sklyar, Viktor Tokarev:
Scalable Diversity-Oriented Decisions and Technologies for Dependable SoPC-Based Safety-Critical Computer Systems and Infrastructures. 339-346 - Lukasz Krukowski, Jaroslaw Sugier:
Organization of AES Cryptographic Unit for Low Cost FPGA Implementation. 347-354 - Maciej Nikodem:
ElGamal Signature Scheme Immune to Fault Analysis. 355-362
Applications
- Andrea Ceccarelli, István Majzik, Danilo Iovino, Fausto Caneschi, Gergely Pintér, Andrea Bondavalli:
A Resilient SIL 2 Driver Machine Interface for Train Control Systems. 365-374 - Grzegorz Debita, Kamil Staniec:
Methodology of the Wireless Networks Planning in Mesh Topology. 375-382 - Dimitrios Gourgoulis, Charalambos Yakinthos:
An Intelligent Maritime Workplace using IT technologies. 383-389 - Vasily Y. Kharitonov:
An Approach to Consistent Displaying of Virtual Reality Moving Objects. 390-397 - Henryk Maciejewski, Tomasz Lipnicki:
Data Exploration Methods for Transport System Dependability Analysis. 398-405 - Jan Nikodem:
Autonomy and Cooperation as Factors of Dependability in Wireless Sensor Network. 406-413 - Dmitry Orlov:
On Opportunity of Application of Modular Arithmetic for Accuracy Improvement in Positioning of Virtual Reality Moving Objects. 414-421 - Miroslaw Siergiejczyk:
Quality of Telematic Services in Transport. 422-429 - Tomasz Walkowiak, Jacek Mazurkiewicz:
Availability of Discrete Transport System Simulated by SSF Tool. 430-437
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.