default search action
PRDC 2006: University of California, Riverside, USA
- 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA. IEEE Computer Society 2006, ISBN 0-7695-2724-8
Reliability Modeling
- Tomotaka Ishii, Tadashi Dohi:
Two-Dimensional Software Reliability Models and Their Application. 3-10 - Dejan Desovski, Bojan Cukic:
A Strategy for Verification of Decomposable SCR Models. 11-18 - Y. P. Wu, Q. P. Hu, Min Xie, Szu Hui Ng:
Detection and Correction Process Modeling Considering the Time Dependency. 19-25 - W. Douglas Obal II, Michael G. McQuinn, William H. Sanders:
Detecting and Exploiting Symmetry in Discrete-state Markov Models. 26-38
Fault Detection
- Rui Abreu, Peter Zoeteweij, Arjan J. C. van Gemund:
An Evaluation of Similarity Coefficients for Software Fault Localization. 39-46 - Luong Dinh Hung, Masahiro Goshima, Shuichi Sakai:
SEVA: A Soft-Error- and Variation-Aware Cache Architecture. 47-54 - Long Wang, Zbigniew Kalbarczyk, Weining Gu, Ravishankar K. Iyer:
An OS-level Framework for Providing Application-Aware Reliability. 55-62 - Antonio Fernández, Ernesto Jiménez, Sergio Arévalo:
Minimal System Conditions to Implement Unreliable Failure Detectors. 63-72
Software Test
- Shiyi Xu:
A New Approach to Improving the Test Effectiveness in Software Testing Using Fault Collapsing. 73-80 - Aamer Nadeem, Michael R. Lyu:
A Framework for Inheritance Testing from VDM++ Specifications. 81-88 - Meng-Lai Yin, Bruce Orenstein:
Assessment on Undetectable Burst Errors in Tandem CRCs. 89-96 - Shyue-Kung Lu, Ting-Yu Chen, Wei-Yuan Liu:
Efficient Built-In Self-Test Schemes for Video Coding Cores: a Case Study on DCT/IDCT Circuits. 97-104
Security
- Raul Barbosa, Johan Karlsson:
Flexible, Cost-EffectiveMembership Agreement in Synchronous Systems. 105-113 - Sebastian Gutierrez-Nolasco, Nalini Venkatasubramanian, Mark-Oliver Stehr, Carolyn L. Talcott:
Towards Adaptive Secure Group Communication: Bridging the Gap between Formal Specification and Network Simulation. 113-120 - Yao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen Kuo, Ing-Yi Chen:
Quantum Oblivious Transfer and Fair Digital Transactions. 121-128 - Taisya Krivoruchko, James Diamond, Jeff Hooper:
Storing RSA Private Keys In Your Head. 129-138
Availability
- Ken-ichiro Fujiyama, Nobutatsu Nakamura, Ryuichi Hiraike:
Database Transaction Management for High-Availability Cluster System. 139-146 - Daniel R. Jeske, Ashwin Sampath:
Restoration Strategies In Mesh Optical Networks: Cost Vs. Service Availability. 147-153 - Kishor S. Trivedi, Ranjith Vasireddy, David Trindale, Swami Nathan, Rick Castro:
Modeling High Availability. 154-164
Intrusion Detection
- Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, Kazuto Shimizu, Hidetsugu Irie, Masahiro Goshima, Shuichi Sakai:
Base Address Recognition with Data Flow Tracking for Injection Attack Detection. 165-172 - Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo:
A Stateful Approach to Spyware Detection and Removal. 173-182
Reliability Prediction and Optimization
- Günther A. Hoffmann, Kishor S. Trivedi, Miroslaw Malek:
A Best Practice Guide to Resources Forecasting for the Apache Webserver. 183-193 - Wei-Chih Huang, Chin-Yu Huang, Chuan-Ching Sue:
Software Reliability Prediction and Assessment Using both Finite and Infinite Server Queueing Approaches. 194-201 - José Mocito, Ana Respício, Luís E. T. Rodrigues:
On Statistically Estimated Optimistic Delivery in Wide-Area Total Order Protocols. 202-209 - Q. P. Hu, Min Xie, Szu Hui Ng:
Early Software Reliability Prediction with ANN Models. 210-220
Dependability Applications
- Zheng Yi Huang, Sheng-De Wang:
A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming. 221-229 - Jon Grov, Luís Soares, Alfrânio Correia Jr., José Pereira, Rui Oliveira, Fernando Pedone:
A Pragmatic Protocol for Database Replication in Interconnected Clusters. 230-237 - Xiangyong Ouyang, Tomohiro Yoshihara, Haruo Yokota:
An Efficient Commit Protocol Exploiting Primary-Backup Placement in a Distributed Storage System. 238-247 - Sheng-Tzong Cheng, Jian-Liang Lin:
Reliable Video Transmission Techniques for Wireless MPEG-4 Streaming Systems. 248-258
Survivability
- Achour Mostéfaoui, Michel Raynal, Gilles Trédan:
On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing system. 259-266 - Michel Raynal, Corentin Travers:
Synchronous Set Agreement: a Concise Guided Tour (including a new algorithm and a list of open problems). 267-274 - Kaiyu Chen, Sharad Malik:
Dependable Multithreaded Processing Using Runtime Validation. 275-286
Optimization
- Bernadette Charron-Bost, André Schiper:
Improving Fast Paxos: being optimistic with no overhead. 287-295 - Hakem Beitollahi, Geert Deconinck:
Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor Systems. 296-304 - Vasilis P. Koutras, Agapios N. Platis:
Resource Availability Optimization for Priority Classes in a Website. 305-314
Maintenance and Recovery
- Xiaobin Li, Jean-Luc Gaudiot:
Design Trade-Offs and Deadlock Prevention in Transient Fault-Tolerant SMT Processors. 315-322 - Meng-Lai Yin, Rafael R. Arellano:
Incorporating Network Connectivity Analysis in Maintenance Planning. 323-328 - Timothy Tsai, Kalyan Vaidyanathan, Kenny C. Gross:
Low-Overhead Run-Time Memory Leak Detection and Recovery. 329-340
Performance and Reliability
- Matthias Wiesmann, Xavier Défago:
End-to-end consensus using end-to-end channels. 341-350 - Swapna S. Gokhale, Paul J. Vandal, Jijun Lu:
Performance and Reliability Analysis ofWeb Server Software Architectures. 351-358 - Kotaro Shimamura, Takeshi Takehara, Yosuke Shima, Kunihiko Tsunedomi:
A Single-Chip Fail-Safe Microprocessor with Memory Data Comparison Feature. 359-368
Short Paper Track 1
- Toshinori Sato, Akihiro Chiyonobu:
Evaluating the Impact of Fault Recovery on Superscalar Processor Performance. 369-370 - Bogdan Tomoyuki Nassu, Takashi Nanya:
A Scenario of Tolerating Interaction Faults Between Otherwise Correct Systems. 371-372 - Kuo-Feng Ssu, Chih-Hsun Chou, Wei-Te Shih, Pau-Choo Chung, Hewijin Christine Jiau:
Detection and Recovery for Disconnection Failures in a Web-based Medical Teleconsultation System. 373-374 - Christof Fetzer, Martin Süßkraut:
Leader Election in the Timed Finite Average Response Time Model. 375-376 - Johannes Osrael, Lorenz Froihofer, Karl M. Göschka:
A Replication Model for Trading Data Integrity against Availability. 377-378 - Shin-Hung Chung, Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Jiau:
Improving Data Transmission with Helping Nodes for Geographical Ad Hoc Routing. 379-380 - Marco Vieira, António Casimiro Costa, Henrique Madeira:
Towards Timely ACID Transactions in DBMS. 381-382 - José Fonseca, Marco Vieira, Henrique Madeira:
Monitoring Database Application Behavior for Intrusion Detection. 383-386
Short Paper Track 2
- Carl Bergenhem, Johan Karlsson, Christian Archer, Andreas Sjoblom:
Implementation Results of a Configurable Membership Protocol for Active Safety Systems. 387-388 - Stefan Fenz, Edgar R. Weippl:
Ontology based IT-security planning. 389-390 - Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao:
The Hierarchy of BGP Convergence on the Self-Organized Internet. 391-392 - Chuan-Ching Sue:
Dynamic Reconfiguration Policies for Reconfigurable Coded-WDM PONs. 393-394 - Hakem Beitollahi, Geert Deconinck:
Fault-Tolerant Rate-Monotonic Scheduling Algorithm in Uniprocessor Embedded Systems. 395-396 - Yung-Chiao Chen, Chuan-Ching Sue, Sy-Yen Kuo:
The Survivability of the Augmented Logical Ring Topology in WDM Networks. 397-398 - Chuan-Ching Sue, Ren-Jie Chiou:
A Hybrid Multipath Routing in Mobile ad hoc Networks. 399-400 - Wei Wang, Guosun Zeng:
A Generic Trust Overlay Simulator for P2P Networks. 401-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.