


default search action
PRDC 2004: Papeete, Tahiti
- 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 3-5 March 2004, Papeete, Tahiti. IEEE Computer Society 2004, ISBN 0-7695-2076-6

Web and WAN Dependability
- Markus Debusmann, Kurt Geihs

:
Towards Dependable Web Services. 5-14 - Gunjan Khanna, Saurabh Bagchi, John Rogers:

Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers. 15-24 - Mohit Lad, Akash Nanavati, Daniel Massey, Lixia Zhang:

An Algorithmic Approach to Identifying Link Failures. 25-34
Practical Experience Reports I
- Shubhendu S. Mukherjee, Joel S. Emer, Tryggve Fossum, Steven K. Reinhardt:

Cache Scrubbing in Microprocessors: Myth or Necessity? 37-42 - E. Ciocca, Israel Koren, Zahava Koren, C. Mani Krishna, Daniel S. Katz

:
Application-Level Fault Tolerance in the Orbital Thermal Imaging Spectrometer. 43-48 - Amir Rajabzadeh

, Mirzad Mohandespour, Seyed Ghassem Miremadi:
Error Detection Enhancement in COTS Superscalar Processors with Event Monitoring Features. 49-54
Distributed Protocols and Systems
- Achour Mostéfaoui, David Powell, Michel Raynal:

A Hybrid Approach for Building Eventually Accurate Failure Detectors. 57-65 - Jichiang Tsai:

Systematic Comparisons of RDT Communication-Induced Checkpointing Protocols. 66-75 - Tatsuhiro Tsuchiya

, Tohru Kikuno:
On the Effects of Partial Membership Knowledge on Reliability of Gossip-Based Multicast. 76-83 - Roberto Baldoni, Roberto Beraldi, Sara Tucci Piergiovanni, Antonino Virgillito:

Measuring Notification Loss in Publish/Subscribe Communication Systems. 84-93
Software Reliability and Testing
- Shiping Yang, Nan Sang, Guangze Xiong:

Safety Testing of Safety Critical Software Based on Critical Mission Duration. 97-102 - Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, Michael R. Lyu:

Optimal Allocation of Testing-Resource Considering Cost, Reliability, and Testing-Effort. 103-112 - Swapna S. Gokhale:

Quantifying the Variance in Application Reliability. 113-121 - Wei Xie, Yiguang Hong, Kishor S. Trivedi:

Software Rejuvenation Policies for Cluster Systems under Varying Workload. 122-129
Checkpointing and Recovery
- Kamilla Klonowska, Lars Lundberg, Håkan Lennerstad, Charlie Svahnberg:

Using Modulo Rulers for Optimal Recovery Schemes in Distributed Computing. 133-142 - Masayuki Arai, Tabito Suzuki, Mamoru Ohara, Satoshi Fukumoto, Kazuhiko Iwasaki, Hee Yong Youn:

Analysis of Read and Write Availability for Generalized Hybrid Data Replication Protocol. 143-150 - Hiroyuki Okamura

, Yuki Nishimura, Tadashi Dohi
:
A Dynamic Checkpointing Scheme Based on Reinforcement Learning. 151-158
Parallel and High-Performance Systems
- Jun Miyazaki, Yohei Abe, Haruo Yokota:

Availabilities and Costs of Reliable Fat-Btrees. 163-172 - Keiichi Kaneko

, Yasuto Suzuki:
Node-to-Node Internally Disjoint Paths Problem in Bubble-Sort Graphs. 173-182 - Manabu Sueishi, Masato Kitakami, Hideo Ito:

Fault-Tolerant Message Switching Based on Wormhole Switching and Backtracking. 183-190
Distributed Systems Modeling
- Yung-Ruei Chang, Hung-Yau Lin, Sy-Yen Kuo:

Reliability Evaluation of Dependable Distributed Computing Systems Based on Recursive Merge and BDD. 197-206 - Xinyu Chen, Michael R. Lyu:

Expected-Reliability Analysis for Wireless CORBA with Imperfect Components. 207-215
Coding
- Haruhiko Kaneko, Mariko Numakami, Eiji Fujiwara:

Nonsystematic M-Ary Asymmetric Error Correcting Codes Designed by Multilevel Coding Method. 219-226 - G. Robert Redinbo, Cung Nguyen:

Protecting Wavelet Lifting Transforms. 227-236
Mobile Systems and Networks
- Chia-Ho Ou, Kuo-Feng Ssu, Hewijin Christine Jiau:

Connecting Network Partitions with Location-Assisted Forwarding Nodes in Mobile Ad Hoc Environments. 239-247 - Serdar Cabuk, Nipoon Malhotra, Longbi Lin, Saurabh Bagchi, Ness B. Shroff:

Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc Network. 248-257
Dependability Benchmarking
- Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun:

Benchmarking Operating System Dependability: Windows 2000 as a Case Study. 261-270 - James Mauro, Ji Zhu, Ira Pramanick:

The System Recovery Benchmark. 271-280
Fault Tolerance
- Diana Szentiványi, Simin Nadjm-Tehrani:

Aspects for Improvement of Performance in Fault-Tolerant Software. 283-291 - Andrea Bondavalli

, Enrico De Giudici, Stefano Porcarelli, Salvatore Sabina, Fabrizio Zanini:
A Freshness Detection Mechanism for Railway Applications. 292-301 - Håkan Sivencrona, Torbjörn Olsson, Roger Johansson, Jan Torin:

RedCAN: Simulations of Two Fault Recovery Algorithms for CAN. 302-311
Practical Experience Reports II
- Lorena Anghel

, Nadir Achouri, Michael Nicolaidis:
Evaluation of Memory Built-in Self Repair Techniques for High Defect Density Technologie. 315-320 - Shyue-Kung Lu, Chien-Hung Yeh, Han-Wen Lin:

Efficient Built-in Self-Test Techniques for Memory-Based FFT Processors. 321-326 - Ghazanfar Asadi

, Seyed Ghassem Miremadi, Hamid R. Zarandi, Ali Reza Ejlali:
Evaluation of Fault-Tolerant Designs Implemented on SRAM-Based FPGAs. 327-332
Panel
- Raphael R. Some, Algirdas Avizienis, Jiri Gaisler, Hirokazu Ihara, Shubu Mukherjee, Neeraj Suri

:
Panel Summary Statements. 335-40
Validation and Modeling
- Rainer Knauf, Setsuo Tsuruta, Hirokazu Ihara, Avelino J. Gonzalez, Torsten Kurbad:

Improving AI Systems? Dependability by Utilizing Historical Knowledge. 343-352 - Christopher Martin, Philip Koopman:

Representing User Workarounds as a Component of System Dependability. 353-362 - Simona Bernardi

, Susanna Donatelli:
Stochastic Petri Nets and Inheritance for Dependability Modelling. 363-372 - Hsu-Chun Yen, Lien-Po Yu:

Dependability Analysis of a Class of Probabilistic Petri Nets. 373-380
Practical Experience Reports III
- Marc Dacier

, Fabien Pouget, Hervé Debar
:
Honeypots: Practical Means to Validate Malicious Fault Assumptions. 383-388 - Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders:

Ferret: A Host Vulnerability Checking Tool. 389-394 - Jinmin Yang, Dafang Zhang, Zheng Qin, Xue Dong Yang:

WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows. 395-400 - Sheng Li, Jun Xu, Lijun Deng:

Periodic Partial Validation: Cost-Effective Source Code Validation Process in Cross-Platform Software Development Environment. 401-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














