


default search action
PRDC 2006: University of California, Riverside, USA
- 12th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2006), 18-20 December, 2006, University of California, Riverside, USA. IEEE Computer Society 2006, ISBN 0-7695-2724-8

Reliability Modeling
- Tomotaka Ishii, Tadashi Dohi

:
Two-Dimensional Software Reliability Models and Their Application. 3-10 - Dejan Desovski, Bojan Cukic

:
A Strategy for Verification of Decomposable SCR Models. 11-18 - Y. P. Wu, Q. P. Hu

, Min Xie
, Szu Hui Ng:
Detection and Correction Process Modeling Considering the Time Dependency. 19-25 - W. Douglas Obal II, Michael G. McQuinn, William H. Sanders:

Detecting and Exploiting Symmetry in Discrete-state Markov Models. 26-38
Fault Detection
- Rui Abreu

, Peter Zoeteweij, Arjan J. C. van Gemund:
An Evaluation of Similarity Coefficients for Software Fault Localization. 39-46 - Luong Dinh Hung, Masahiro Goshima, Shuichi Sakai

:
SEVA: A Soft-Error- and Variation-Aware Cache Architecture. 47-54 - Long Wang, Zbigniew Kalbarczyk, Weining Gu, Ravishankar K. Iyer:

An OS-level Framework for Providing Application-Aware Reliability. 55-62 - Antonio Fernández, Ernesto Jiménez

, Sergio Arévalo
:
Minimal System Conditions to Implement Unreliable Failure Detectors. 63-72
Software Test
- Shiyi Xu:

A New Approach to Improving the Test Effectiveness in Software Testing Using Fault Collapsing. 73-80 - Aamer Nadeem

, Michael R. Lyu:
A Framework for Inheritance Testing from VDM++ Specifications. 81-88 - Meng-Lai Yin, Bruce Orenstein:

Assessment on Undetectable Burst Errors in Tandem CRCs. 89-96 - Shyue-Kung Lu, Ting-Yu Chen, Wei-Yuan Liu:

Efficient Built-In Self-Test Schemes for Video Coding Cores: a Case Study on DCT/IDCT Circuits. 97-104
Security
- Raul Barbosa

, Johan Karlsson:
Flexible, Cost-EffectiveMembership Agreement in Synchronous Systems. 105-113 - Sebastian Gutierrez-Nolasco, Nalini Venkatasubramanian, Mark-Oliver Stehr, Carolyn L. Talcott:

Towards Adaptive Secure Group Communication: Bridging the Gap between Formal Specification and Network Simulation. 113-120 - Yao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen Kuo

, Ing-Yi Chen:
Quantum Oblivious Transfer and Fair Digital Transactions. 121-128 - Taisya Krivoruchko, James Diamond, Jeff Hooper:

Storing RSA Private Keys In Your Head. 129-138
Availability
- Ken-ichiro Fujiyama, Nobutatsu Nakamura, Ryuichi Hiraike:

Database Transaction Management for High-Availability Cluster System. 139-146 - Daniel R. Jeske, Ashwin Sampath:

Restoration Strategies In Mesh Optical Networks: Cost Vs. Service Availability. 147-153 - Kishor S. Trivedi, Ranjith Vasireddy, David Trindale, Swami Nathan, Rick Castro:

Modeling High Availability. 154-164
Intrusion Detection
- Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, Kazuto Shimizu, Hidetsugu Irie, Masahiro Goshima, Shuichi Sakai

:
Base Address Recognition with Data Flow Tracking for Injection Attack Detection. 165-172 - Ming-Wei Wu, Yennun Huang

, Yi-Min Wang, Sy-Yen Kuo
:
A Stateful Approach to Spyware Detection and Removal. 173-182
Reliability Prediction and Optimization
- Günther A. Hoffmann, Kishor S. Trivedi, Miroslaw Malek:

A Best Practice Guide to Resources Forecasting for the Apache Webserver. 183-193 - Wei-Chih Huang, Chin-Yu Huang, Chuan-Ching Sue:

Software Reliability Prediction and Assessment Using both Finite and Infinite Server Queueing Approaches. 194-201 - José Mocito, Ana Respício

, Luís E. T. Rodrigues:
On Statistically Estimated Optimistic Delivery in Wide-Area Total Order Protocols. 202-209 - Q. P. Hu

, Min Xie
, Szu Hui Ng:
Early Software Reliability Prediction with ANN Models. 210-220
Dependability Applications
- Zheng Yi Huang, Sheng-De Wang:

A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming. 221-229 - Jon Grov, Luís Soares, Alfrânio Correia Jr., José Pereira

, Rui Oliveira
, Fernando Pedone
:
A Pragmatic Protocol for Database Replication in Interconnected Clusters. 230-237 - Xiangyong Ouyang, Tomohiro Yoshihara, Haruo Yokota

:
An Efficient Commit Protocol Exploiting Primary-Backup Placement in a Distributed Storage System. 238-247 - Sheng-Tzong Cheng, Jian-Liang Lin:

Reliable Video Transmission Techniques for Wireless MPEG-4 Streaming Systems. 248-258
Survivability
- Achour Mostéfaoui, Michel Raynal, Gilles Trédan:

On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing system. 259-266 - Michel Raynal, Corentin Travers:

Synchronous Set Agreement: a Concise Guided Tour (including a new algorithm and a list of open problems). 267-274 - Kaiyu Chen, Sharad Malik

:
Dependable Multithreaded Processing Using Runtime Validation. 275-286
Optimization
- Bernadette Charron-Bost, André Schiper:

Improving Fast Paxos: being optimistic with no overhead. 287-295 - Hakem Beitollahi, Geert Deconinck

:
Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor Systems. 296-304 - Vasilis P. Koutras, Agapios N. Platis:

Resource Availability Optimization for Priority Classes in a Website. 305-314
Maintenance and Recovery
- Xiaobin Li, Jean-Luc Gaudiot:

Design Trade-Offs and Deadlock Prevention in Transient Fault-Tolerant SMT Processors. 315-322 - Meng-Lai Yin, Rafael R. Arellano:

Incorporating Network Connectivity Analysis in Maintenance Planning. 323-328 - Timothy Tsai, Kalyan Vaidyanathan, Kenny C. Gross:

Low-Overhead Run-Time Memory Leak Detection and Recovery. 329-340
Performance and Reliability
- Matthias Wiesmann, Xavier Défago

:
End-to-end consensus using end-to-end channels. 341-350 - Swapna S. Gokhale, Paul J. Vandal, Jijun Lu:

Performance and Reliability Analysis ofWeb Server Software Architectures. 351-358 - Kotaro Shimamura, Takeshi Takehara, Yosuke Shima, Kunihiko Tsunedomi:

A Single-Chip Fail-Safe Microprocessor with Memory Data Comparison Feature. 359-368
Short Paper Track 1
- Toshinori Sato

, Akihiro Chiyonobu:
Evaluating the Impact of Fault Recovery on Superscalar Processor Performance. 369-370 - Bogdan Tomoyuki Nassu, Takashi Nanya:

A Scenario of Tolerating Interaction Faults Between Otherwise Correct Systems. 371-372 - Kuo-Feng Ssu, Chih-Hsun Chou, Wei-Te Shih, Pau-Choo Chung, Hewijin Christine Jiau:

Detection and Recovery for Disconnection Failures in a Web-based Medical Teleconsultation System. 373-374 - Christof Fetzer, Martin Süßkraut:

Leader Election in the Timed Finite Average Response Time Model. 375-376 - Johannes Osrael, Lorenz Froihofer, Karl M. Göschka:

A Replication Model for Trading Data Integrity against Availability. 377-378 - Shin-Hung Chung, Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Jiau:

Improving Data Transmission with Helping Nodes for Geographical Ad Hoc Routing. 379-380 - Marco Vieira

, António Casimiro Costa, Henrique Madeira
:
Towards Timely ACID Transactions in DBMS. 381-382 - José Fonseca

, Marco Vieira
, Henrique Madeira
:
Monitoring Database Application Behavior for Intrusion Detection. 383-386
Short Paper Track 2
- Carl Bergenhem, Johan Karlsson, Christian Archer, Andreas Sjoblom:

Implementation Results of a Configurable Membership Protocol for Active Safety Systems. 387-388 - Stefan Fenz, Edgar R. Weippl

:
Ontology based IT-security planning. 389-390 - Jinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao:

The Hierarchy of BGP Convergence on the Self-Organized Internet. 391-392 - Chuan-Ching Sue:

Dynamic Reconfiguration Policies for Reconfigurable Coded-WDM PONs. 393-394 - Hakem Beitollahi, Geert Deconinck

:
Fault-Tolerant Rate-Monotonic Scheduling Algorithm in Uniprocessor Embedded Systems. 395-396 - Yung-Chiao Chen, Chuan-Ching Sue, Sy-Yen Kuo

:
The Survivability of the Augmented Logical Ring Topology in WDM Networks. 397-398 - Chuan-Ching Sue, Ren-Jie Chiou:

A Hybrid Multipath Routing in Mobile ad hoc Networks. 399-400 - Wei Wang, Guosun Zeng:

A Generic Trust Overlay Simulator for P2P Networks. 401-402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














