default search action
DepCoS-RELCOMEX 2006: Szklarska Poreba, Poland
- 2006 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2006), 24-28 May 2006, Szklarska Poreba, Poland. IEEE Computer Society 2006, ISBN 0-7695-2565-2
Introduction
- Program Committee.
- Organizing Committee.
- Preface.
Modeling
- Chiara Abbaneo, Francesco Flammini, Armando Lazzaro, Pietro Marmo, Nicola Mazzocca, Angela Sanseviero:
UML Based Reverse Engineering for the Verification of Railway Control Logics. 3-10 - Donald C. Craig, Wlodzimierz M. Zuberek:
Compatibility of Software Components - Modeling and Verification. 11-18 - Iwona Dubielewicz, Bogumila Hnatkowska, Zbigniew Huzar, Lech Tuzinkiewicz:
Feasibility Analysis of MDA-based Database Design. 19-26 - Artur Krystosik:
Embedded Systems Modeling Language. 27-34 - Zbigniew Lipinski:
State Model of Service Reliability. 35-42 - Jan Magott, Pawel Skrobanek:
Partially automatic generation of fault-trees with time dependencies. 43-50 - Marcin Szlenk:
Formal Semantics and Reasoning about UML Class Diagram. 51-59
Methodology and Tools
- Andrzej Bialas:
Information Security Systems vs. Critical Information Infrastructure Protection Systems - Similarities and Differences. 60-67 - Radoslaw Brendel, Henryk Krawczyk:
Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems. 68-75 - Janusz Sosnowski, Piotr Gawkowski, Przemyslaw Zygulski, Andrzej Tymoczko:
Enhancing Fault Injection Testbench. 76-83 - Grzegorz Golaszewski, Janusz Górski:
Hazard Prevention by Forced Time Constraints. 84-91 - Marek Zagorski, Janusz Górski:
An Approach for Evaluating Trust in IT Infrastructure. 92-99 - Wojciech Zamojski, Dariusz Caban:
Introduction to the Dependability Modeling of Computer Systems. 100-109
Dependability of Computer Networks
- Luísa Jorge, Teresa Gomes:
Survey of Recovery Schemes in MPLS Networks. 110-118 - Mohannad Najjar, Firas Najjar:
d-HMAC Dynamic HMAC function. 119-126 - Paulo S. Motta Pires, Luiz Affonso H. G. Oliveira:
Security Aspects of SCADA and Corporate Network Interconnection: An Overview. 127-134 - Jakub Botwicz, Piotr Buciak, Piotr Sapiecha:
Building Dependable Intrusion Prevention Systems. 135-142 - Tomasz R. Surmacz:
Bandwidth control in redundant news server links. 143-149 - Ewa Szlachcic:
Fault Tolerant Topological Design for Computer Networks. 150-159
Software Security and Reliability
- Rafal Cegiela:
Selecting Technology for Disaster Recovery. 160-167 - Jan-Thomas Czornack, Carsten Trinitis, Max Walter:
Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems. 168-174 - Vasilis P. Koutras, Agapios N. Platis:
Applying Software Rejuvenation in a Two Node Cluster System for High Availabilit. 175-182 - Henryk Krawczyk, M. Wiel:
Security of Web Services. 183-190 - Zoltán Micskei, István Majzik:
Model-based Automatic Test Generation for Event-Driven Embedded Systems using Model Checkers. 191-198 - Fumiko Nagoya, Yuting Chen, Shaoying Liu:
An Empirical Study on a Specification-Based Program Review Approach. 199-206 - Luai A. Al Shalabi, Zyad Shaaban:
Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix. 207-214 - Andrzej Zalewski, Andrzej Ratkowski:
Evaluation of Dependability of Multi-tier Internet Business Applications with Queueing Networks. 215-222 - Dominik Zalewski:
Security Enhancement of Java Remote Method Invocation. 223-231
Multi-Agent Systems
- Tadashi Araragi:
Byzantine Fault Tolerance for Agent Systems. 232-239 - Velik Bellemin, Tadashi Araragi:
CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack. 240-247 - Dalila Boughaci, Habiba Drias, Ahmed Bendib, Youcef Bouznit, Belaid Benhamou:
Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents. 248-255 - Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, Belaid Benhamou:
A Distributed Firewall using Autonomous Agents. 256-263 - I-Hsin Chou, Chin-Feng Fan:
A Regulatory Software Maintenance Environment Using Agent-Based Software Configuration Management. 264-275
Fault Tolerance in Digital Systems
- Janusz Biernat:
Self-Dual Modules in Design of Dependable Digital Devices. 276-281 - Marcin Gomulkiewicz, Maciej Nikodem, Tadeusz Tomczak:
Low-cost and Universal Secure Scan: a Design- Architecture for Crypto Chips. 282-288 - Jerzy W. Greblicki:
CAD software for designing of Totally Self Checking Sequential Circuits. 289-297 - Tadeusz Tomczak:
Residue Arithmetic in FPGA Matrices. 297-305
Applications
- George J. Anders, Jaroslaw Sugier:
Risk Assessment Tool for Maintenance Selection. 306-313 - O. V. Berestnev, E. M. Kharitonov:
Securing of Integrated Protection of Technical Information by Application of Special Engineering Decisions. 314-318 - Samia Boucherkha, Mohamed Benmohamed:
A Multi-tier Architecture to Safely Share Digital Medical Images. 319-326 - Hui-Wen Huang, Wei-Yi Yang, Chunkuan Shih, Chun-Yu Chen, Swu Yih, Chang Tzeng, Cherng-Tsong Kuo, Ming-Huei Chen, Yuan-Chang Yu, Li-Hsin Wang, Hsun-Ho Wang, Wan-Tsz Tu:
Digital Instrumentation and Control Failure Events Derivation and Analysis for Advanced Boiling Water Reactor. 327-334 - Francisco Fernández de Vega:
A Fault Tolerant Optimization Algorithm based on Evolutionary Computation. 335-342 - B. Kalinowski, George J. Anders:
Efficiency of Reliability Evaluation of Large Electric Power Systems. 343-350 - Henryk Maciejewski, George J. Anders:
Estimation of Impact of Maintenance Policies on Equipment Risk of Failure. 351-357 - Jacek Mazurkiewicz, Tomasz Walkowiak:
Computer modeling and simulation of discrete transport system with dispatcher for reliability and economic analysis. 358-365 - Tomasz Walkowiak, Jacek Mazurkiewicz:
Fuzzy approach to economic analysis of dispatcher driven discrete transport systems. 366-373 - Marek Woda:
Conception of Composing Learning Content into Learning Tree to Ensure Reliability of Learning Material. 374-381
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.