Default Cover Image

Dependability of Computer Systems, International Conference on

May 25 2006 to May 27 2006

Szklarska Poreba, Poland

ISBN: 0-7695-2565-2

Table of Contents

Introduction
Program CommitteeFreely available from IEEE.pp. ix
Introduction
Organizing CommitteeFreely available from IEEE.pp. x
Introduction
PrefaceFreely available from IEEE.pp. xi
Modeling
Compatibility of Software Components - Modeling and VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 11-18
Modeling
Feasibility Analysis of MDA-based Database DesignFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Modeling
Embedded Systems Modeling LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 27-34
Modeling
State Model of Service ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 35-42
Modeling
Partially automatic generation of fault-trees with time dependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 43-50
Modeling
Formal Semantics and Reasoning about UML Class DiagramFull-text access may be available. Sign in or learn about subscription options.pp. 51-59
Methodology and Tools
Information Security Systems vs. Critical Information Infrastructure Protection Systems - Similarities and DifferencesFull-text access may be available. Sign in or learn about subscription options.pp. 60-67
Methodology and Tools
Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 68-75
Methodology and Tools
Enhancing Fault Injection TestbenchFull-text access may be available. Sign in or learn about subscription options.pp. 76-83
Methodology and Tools
Hazard Prevention by Forced Time ConstraintsFull-text access may be available. Sign in or learn about subscription options.pp. 84-91
Security of Web ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 183-190
Methodology and Tools
An Approach for Evaluating Trust in IT InfrastructureFull-text access may be available. Sign in or learn about subscription options.pp. 92-99
Methodology and Tools
Introduction to the Dependability Modeling of Computer SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 100-109
Dependability og Computer Networks
Survey of Recovery Schemes in MPLS NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 110-118
Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference MatrixFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
Dependability og Computer Networks
d-HMAC Dynamic HMAC functionFull-text access may be available. Sign in or learn about subscription options.pp. 119-126
Dependability og Computer Networks
Security Aspects of SCADA and Corporate Network Interconnection: An OverviewFull-text access may be available. Sign in or learn about subscription options.pp. 127-134
Dependability og Computer Networks
Building Dependable Intrusion Prevention SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
Dependability og Computer Networks
Bandwidth control in redundant news server linksFull-text access may be available. Sign in or learn about subscription options.pp. 143-149
Dependability og Computer Networks
Fault Tolerant Topological Design for Computer NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 150-159
Software Security and Reliability
Selecting Technology for Disaster RecoveryFull-text access may be available. Sign in or learn about subscription options.pp. 160-167
Software Security and Reliability
Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 168-174
Software Security and Reliability
Applying Software Rejuvenation in a Two Node Cluster System for High AvailabilitFull-text access may be available. Sign in or learn about subscription options.pp. 175-182
Software Security and Reliability
Model-based Automatic Test Generation for Event-Driven Embedded Systems using Model CheckersFull-text access may be available. Sign in or learn about subscription options.pp. 191-198
Software Security and Reliability
An Empirical Study on a Specification-Based Program Review ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 199-206
Software Security and Reliability
Evaluation of Dependability of Multi-tier Internet Business Applications with Queueing NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 215-222
Software Security and Reliability
Security Enhancement of Java Remote Method InvocationFull-text access may be available. Sign in or learn about subscription options.pp. 223-231
Multi-Agent Systems
Byzantine Fault Tolerance for Agent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 232-239
Multi-Agent Systems
CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host AttackFull-text access may be available. Sign in or learn about subscription options.pp. 240-247
Multi-Agent Systems
Distributed Intrusion Detection Framework based on Autonomous and Mobile AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 248-255
Multi-Agent Systems
A Distributed Firewall using Autonomous AgentsFull-text access may be available. Sign in or learn about subscription options.pp. 256-263
Multi-Agent Systems
A Regulatory Software Maintenance Environment Using Agent-Based Software Configuration ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 264-275
Fault Tolerance in Digital Systems
Self-Dual Modules in Design of Dependable Digital DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 276-281
Fault Tolerance in Digital Systems
Low-cost and Universal Secure Scan: a Design- Architecture for Crypto ChipsFull-text access may be available. Sign in or learn about subscription options.pp. 282-288
Fault Tolerance in Digital Systems
CAD software for designing of Totally Self Checking Sequential CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 289-297
Fault Tolerance in Digital Systems
Residue Arithmetic in FPGA MatricesFull-text access may be available. Sign in or learn about subscription options.pp. 297-305
Applications
Risk Assessment Tool for Maintenance SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 306-313
Applications
Securing of Integrated Protection of Technical Information by Application of Special Engineering DecisionsFull-text access may be available. Sign in or learn about subscription options.pp. 314-318
Applications
A Multi-tier Architecture to Safely Share Digital Medical ImagesFull-text access may be available. Sign in or learn about subscription options.pp. 319-326
Applications
A Fault Tolerant Optimization Algorithm based on Evolutionary ComputationFull-text access may be available. Sign in or learn about subscription options.pp. 335-342
Applications
Efficiency of Reliability Evaluation of Large Electric Power SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 343-350
Applications
Estimation of Impact of Maintenance Policies on Equipment Risk of FailureFull-text access may be available. Sign in or learn about subscription options.pp. 351-357
Applications
Computer modeling and simulation of discrete transport system with dispatcher for reliability and economic analysisFull-text access may be available. Sign in or learn about subscription options.pp. 358-365
Applications
Fuzzy approach to economic analysis of dispatcher driven discrete transport systemsFull-text access may be available. Sign in or learn about subscription options.pp. 366-373
Applications
Conception of Composing Learning Content into Learning Tree to Ensure Reliability of Learning MaterialFull-text access may be available. Sign in or learn about subscription options.pp. 374-381
Author Index
Author IndexFreely available from IEEE.pp. 382
Showing 54 out of 54