


default search action
PRDC 2007: Melbourne, Victoria, Australia
- 13th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2007), 17-19 December, 2007, Melbourne, Victoria, Australia. IEEE Computer Society 2007, ISBN 0-7695-3054-0

Algorithms, Analysis, and Theory
- Christian Buckl

, Matthias Regensburger, Alois C. Knoll
, Gerhard Schrott:
Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time. 3-10 - Masato Kitakami, Yuta Noguchi:

Error Recovery Method for Multiple-Dictionary Compression Method. 11-18 - Masato Sakai, Hiroya Matsuba, Yutaka Ishikawa:

Fault Detection System Activated by Failure Information. 19-26 - Naixue Xiong, Yan Yang, Xavier Défago

:
Comparative Analysis of QoS and Memory Usage of Adaptive Failure Detectors. 27-34 - Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi, Hiroyuki Okamura:

Quantifying Software Maintainability Based on a Fault-Detection/Correction Model. 35-42 - Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi:

PISRAT: Proportional Intensity-Based Software Reliability Assessment Tool. 43-52 - Tatsuhiro Tsuchiya, André Schiper:

An Automatic Real-Time Analysis of the Time to Reach Consensus. 53-60 - Gang Wang, Sheng Lin, Xiaoguang Liu, Guangjun Xie, Jing Liu:

Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage Systems. 61-68 - Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu:

Failure Detectors and Extended Paxos for k-Set Agreement. 69-76 - Shiyi Xu:

An Accurate Model of Software Reliability. 77-84 - Atifah Ali, Aamer Nadeem, Muhammad Zohaib Z. Iqbal, Muhammad Usman:

Regression Testing Based on UML Design Models. 85-88 - Matthias Regensburger, Christian Buckl

, Alois C. Knoll
, Gerhard Schrott:
Model Based Development of Safety-Critical Systems Using Template Based Code Generation. 89-92 - Hongyu Zhang

, Xiuzhen Zhang, Ming Gu:
Predicting Defective Software Components from Code Complexity Measures. 93-96 - Ruilian Zhao, Shanshan Lv:

Neural-Network Based Test Cases Generation Using Genetic Algorithm. 97-100 - Chui Young Yoon, Keon-Myung Lee:

A Measurement Tool of End-User Computing Capability in Competency Perspective. 101-105
Dependable Networks
- Jenn-Wei Lin, Ming-Feng Yang, Jichiang Tsai:

Fault Tolerance for Super-Peers of P2P Systems. 107-114 - Song Huang, Yong Xu, Ling Zhang:

A Path Diversity Metric for End-to-End Network. 115-122 - Jiannong Cao, Michel Raynal, Corentin Travers, Weigang Wu:

The Eventual Leadership in Dynamic Mobile Networking Environments. 123-130 - Chiu-Wen Chen, Kuo-Feng Ssu, Hewijin Christine Jiau:

Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks. 131-138 - Ludovic Courtès, Ossama Hamouda, Mohamed Kaâniche, Marc-Olivier Killijian, David Powell:

Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices. 139-146 - Chia-Tai Tsai, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang:

Implementation of Highly Available OSPF Router on ATCA. 147-154 - Rafael R. Obelheiro, Joni da Silva Fraga:

Overlay Network Topology Reconfiguration in Byzantine Settings. 155-162 - Hong-Zu Chou, Szu-Chi Wang, Sy-Yen Kuo:

A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks. 163-170 - Ke-Ting Chen, Kuo-Feng Ssu, Wei-Tong Wang:

Fault Diagnosis for Time Synchronization in Sensor Networks. 171-178 - Junaid Ahsenali Chaudhry, Yonghwan Lee, Dugki Min, Seungkyu Park, Chun-Hyon Chang, Duckwon Chung:

Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks. 179-186 - Wei-Ming Wu, Kuochen Wang, Rong-Hong Jan, Chia-Yuan Huang:

A Fast Failure Detection and Failover Scheme for SIP High Availability Networks. 187-190 - Vahid Lari, Mehdi Dehbashi, Seyed Ghassem Miremadi, Navid Farazmand:

Assessment of Message Missing Failures in FlexRay-Based Networks. 191-194 - Guangping Xu, Gang Wang, Jing Liu:

A Hybrid Redundancy Approach for Data Availability in Structured P2P Network Systems. 195-199
Dependable Systems and Hardware
- Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan:

A New Concurrent Detection of Control Flow Errors Based on DCT Technique. 201-209 - Lianlian Zeng, Paul Beckett:

Soft Error Rate Estimation in Deep Sub-micron CMOS. 210-216 - Chia Hsiang Hsu, Cheng-Juei Yu, Sheng-De Wang:

Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning. 217-223 - Chun-Lin Yang, Yuang-Cheng Hsiao, Shyue-Kung Lu:

Efficient BISR Techniques for Embedded Memories Considering Cluster Faults. 224-231 - Thomas Kottke, Andreas Steininger

:
A Fail-Silent Reconfigurable Superscalar Processor. 232-239 - Vinaitheerthan Sundaram, Sandip HomChaudhuri, Sachin Garg, Chandra M. R. Kintala, Saurabh Bagchi:

Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. 240-247 - Shuming Chen, Xiao Hu, Biwei Liu, Jihua Chen:

An On-Line Control Flow Checking Method for VLIW Processor. 248-255 - Casey M. Jeffery, Renato J. O. Figueiredo:

Towards Byzantine Fault Tolerance in Many-Core Computing Platforms. 256-259 - Yousuke Nakamura, Kei Hiraki:

Heterogeneous Functional Units for High Speed Fault-Tolerant Execution Stage. 260-263 - Ahmad Patooghy, Mahdi Fazeli, Seyed Ghassem Miremadi:

A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips. 264-267 - Toshinori Sato, Toshimasa Funaki:

Power-Performance Trade-Off of a Dependable Multicore Processor. 268-273
Distributed Systems
- Ming-Wei Wu, Sy-Yen Kuo:

Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. 275-281 - Carl Bergenhem, Johan Karlsson:

A Process Group Membership Service for Active Safety Systems Using TT/ET Communication Scheduling. 282-289 - Damián Serrano, Marta Patiño-Martínez, Ricardo Jiménez-Peris, Bettina Kemme:

Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-Isolation. 290-297 - Jangwoo Kim, Jared C. Smolens, Babak Falsafi, James C. Hoe:

PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM Servers. 298-305 - Jichiang Tsai, Chia-Yang Chen, Ming-Fa Hu, Jenn-Wei Lin:

Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols. 306-313 - Kai Han, Binoy Ravindran, E. Douglas Jensen:

RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable Networks. 314-321 - Marco Vieira, Nuno Laranjeiro, Henrique Madeira:

Benchmarking the Robustness of Web Services. 322-329 - Andrew Maloney, Andrzej Goscinski:

The Cost of Storing Checkpoints to Multiple Volatile Storage Locations Using at-least-k Semantics. 330-333 - Takeshi Mishima, Hiroshi Nakamura:

A Proposal of New Dependable Database Middleware with Consistency and Concurrency Control. 334-337 - Tim Moors, Patrick Chu:

Improving Email Reliability by Sender Retransmission. 338-341 - Raul Barbosa, António Ferreira, Johan Karlsson:

Implementation of a Flexible Membership Protocol on a Real-Time Ethernet Prototype. 342-347
Security Issues
- Shih-Yao Dai, Sy-Yen Kuo:

MAPMon: A Host-Based Malware Detection Tool. 349-356 - Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo:

Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. 357-364 - José Fonseca, Marco Vieira, Henrique Madeira:

Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. 365-372 - Paulo Sousa

, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. 373-380 - Stefan Fenz, Gernot Goluch, Andreas Ekelhart

, Bernhard Riedl, Edgar R. Weippl:
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. 381-388 - Myeong-Hyeon Lee, Yoon-Hwa Choi:

A Fault-Tolerant Bloom Filter for Deep Packet Inspection. 389-396 - Bernhard Riedl, Veronika Grascher, Thomas Neubauer:

Applying a Threshold Scheme to the Pseudonymization of Health Data. 397-400 - Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo:

On the Effects of Finite Memory on Intrusion-Tolerant Systems. 401-404 - Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang:

An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. 405-408

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














