default search action
PRDC 2005: Changsha, Hunan, China
- 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China. IEEE Computer Society 2005, ISBN 0-7695-2492-3
Keynote Addresses
- W. Kent Fuchs:
Dependable Computing in the Context of Mobility, Nomadicity, Ubiquity, and Pervasiveness. 3 - Tohru Kikuno:
Why Do Software Projects Fail? Reasons and a Solution Using a Bayesian Classifier to Predict Potential Risk. 4
Distributed Protocols and Systems
- Wei Chen, Shiding Lin, Qiao Lian, Zheng Zhang:
Sigma: A Fault-Tolerant Mutual Exclusion Algorithm in Dynamic Distributed Systems Subject to Process Crashes and Memory Losses. 7-14 - Roy Friedman, Achour Mostéfaoui, Michel Raynal:
Intersecting Sets: a Basic Abstraction for Asynchronous Agreement Problems. 15-22 - Philippe Raipin Parvédy, Michel Raynal, Corentin Travers:
Decision Optimal Early-Stopping k-set Agreement in Synchronous Systems Prone to Send Omission Failures. 23-30 - Hongmei Wang, Zheng Zhao, Zhi-Wei Sun:
Privacy-Preserving Bayesian Network Structure Learning on Distributed Heterogeneous Data. 31-40
Software Reliability and Testing
- Shravan Gaonkar, William H. Sanders:
Simultaneous Simulation of Alternative System Configurations. 41-48 - Cristina Simache, Mohamed Kaâniche:
Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study. 49-56 - Juan-Carlos Ruiz-Garcia, José Carlos Campelo, Pedro J. Gil, Juan Pardo:
On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components. 57-64 - Y. P. Wu, Q. P. Hu, Szu Hui Ng, Min Xie:
Bayesian Networks Modeling for Software Inspection Effectiveness. 65-74
Fault Tolerance (1)
- Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Application-Based Metrics for Strategic Placement of Detectors. 75-82 - Amir Rajabzadeh, Seyed Ghassem Miremadi:
A Hardware Approach to Concurrent Error Detection Capability Enhancement in COTS Processors. 83-90 - Shaohuai Tian, Yingping Lu, Dafang Zhang:
Optimal Fault-Tolerant Routing Scheme for Generalized Hypercube. 91-100
Validation and Modeling
- Shiyi Xu:
High-Order Syndrome Testing for VLSI Circuits. 101-108 - Ling Zhang, Jishun Kuang:
A New BIST Solution for System-on-Chip. 109-113 - Neila Ben Lakhal, Takashi Kobayashi, Haruo Yokota:
A Failure-Aware Model for Estimating and Analyzing the Efficiency of Web Services Compositions. 114-124
Fault Tolerance (2)
- Masato Kitakami, Junpei Sano:
Code Design and Decoding Methods for Burst Error Locating Codes. 125-132 - Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai:
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. 133-139 - Dubravka Ilic, Elena Troubitsyna:
Formal Development of Software for Tolerating Transient Faults. 140-150
Checkpointing and Recovery
- Jichiang Tsai, Jenn-Wei Lin:
On the Fully-Informed Communication-Induced Checkpointing Protocol. 151-158 - Diana Szentiványi, Simin Nadjm-Tehrani, John M. Noble:
Optimal Choice of Checkpointing Interval for High Availability. 159-166 - Yuan-sheng Luo, Dafang Zhang, Yinghua Min:
An Improved Scheme of Index-Based Checkpointing. 167-174
High-Performance Systems
- Yu Hu, Xiaowei Li, Huawei Li, Xiaoqing Wen:
Compression/Scan Co-Design for Reducing Test Data Volume, Scan-in Power Dissipation and Test Application Time. 175-182 - Heng Xu, Arun K. Somani:
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime. 183-192
Security
- Shuanghe Peng, Zhen Han:
Proxy Cryptography for Secure Inter-domain Information Exchanges. 193-199 - Xinguang Peng, Kaifeng Ren:
Anomaly Detection with High Deviations for System Security. 200-207 - Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo:
A Multi-Faceted Approach towards Spam-Resistible Mail. 208-218
Distributed Systems Modeling (1)
- Yuan-Shun Dai, Xiaolong Wang, Min Xie:
A Virtual Modeling and a Fast Algorithm for Grid Service Reliability. 219-226 - Zhonghong Ou, Youguang Yuan, Xiaoyong Zhao:
Research on Architecture and Design Principles of COTS Components Based Generic Fault-Tolerant Computer. 227-234 - Lili Pan, Junyi Li, Beiji Zou, Hao Chen:
Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision Coverage. 235-244
Mobile Systems and Networks (1)
- Rong Hu, Zhigang Hu, Hao Ma:
A Reliable Routing Algorithm Based on Fuzzy Applicability of F sets in MANET. 245-249 - Jenn-Wei Lin, Jichiang Tsai, Chao-Ying Chiu:
An Efficient Approach to Tolerating Route Errors in Mobile Ad Hoc Networks. 250-257 - Jian Leng, DongQin Xie:
A Novel Approach to Kernel Construction of China Bridge CA. 258-268
Practical Experience Reports
- Hairong Sun, Dong Tang, Robert B. Wood:
Optimizing Service Strategy for Systems with Deferred Repair. 269-274 - Jiangchun Ren, Kui Dai, Zhiying Wang:
Trust-Enhanced Alteration Scenario for Universal Computer. 275-280 - Yangyang Wu, Shuguang Du, Wei Luo:
Mining Alarm Database of Telecommunication Network for Alarm Association Rules. 281-286 - Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkalai:
On Automating Failure Mode Analysis and Enhancing its Integrity. 287-294
Fault Tolerance (3)
- Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:
A Novel R2-FLC Dynamic Buffer Size Tuner to Support Time-Critical Applications over the Internet by Improving Logical Channel Fault Tolerance to Shorten Roundtrip Time. 295-299 - Kazuteru Namba, Hideo Ito:
Design of Defect Tolerant Wallace Multiplier. 300-304 - Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo:
Resilient State Machine Replication. 305-309 - Hassan Salmani, Seyed Ghassem Miremadi:
Contribution of Controller Area Networks Controllers to Masquerade Failures. 310-316
Mobile Systems and Networks (2)
- Michael Pan, Sheng-Yan Chuang, Sheng-De Wang:
Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks. 317-324 - Takashi Minohara, Satoshi Ishikawa, Masahiro Amano:
Centralized Surveillance of Unused Address Space by using Virtual Networks. 325-332 - Chih-Hsun Chou, Kuo-Feng Ssu, Hewijin Christine Jiau:
A Distributed Location Service for Reducing Query Failures in Geographic Ad Hoc Routing. 333-342
Fault Tolerance (4)
- Nicolas Loriant, Marc Ségura-Devillechaise, Jean-Marc Menaud:
Server Protection through Dynamic Patching. 343-349 - Marco Vieira, Henrique Madeira:
Detection of Malicious Transactions in DBMS. 350-357 - Su Myeong Lee, Hee Yong Youn:
Dynamic Window-based Adaptive Fault Monitoring for Ubiquitous Computing Systems. 358-368
Distributed Systems Modeling (2)
- Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang:
Research on Control Flags-based Weighted Authentication Trustworthiness Model. 369-373 - Henning Burchardt, Jens Oehlerking, Oliver E. Theel:
Towards Push-of-a-Button Stability Verification for Discrete-Time Hybrid Systems. 374-378 - Chin-Yu Huang, Chu-Ti Lin:
Reliability Prediction and Assessment of Fielded Software Based on Multiple Change-Point Models. 379-386 - Michel Raynal, Matthieu Roy:
A Note on a Simple Equivalence between Round-based Synchronous and Asynchronous Models. 387-392
Code & Language
- Zheng Qin, Jinmin Yang, Haoliang Wang, Bin Wang, Jianjun Zou:
Neural Network based on Dynamic Tunneling Technique for Weather Forecast. 393-397 - Chang-Chun Cheng, Wei-Ming Chen, Han-Chieh Chao, Yao-Po Wang:
FPGA Authentication Header (AH) Implementation for Internet Appliances. 398-403 - Christian Buckl, Alois C. Knoll, Gerhard Schrott:
Development of Dependable Real-Time Systems with Zerberus. 404-408
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.