Default Cover Image

Dependable, Autonomic and Secure Computing, IEEE International Symposium on

Dec. 12 2011 to Dec. 14 2011

Sydney, New South Wales Australia

ISBN: 978-0-7695-4612-4

Table of Contents

Papers
A Uniform Semantic Web Framework for Co-authorship NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 958-965
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Table of contentsFreely available from IEEE.pp. v-xviii
Papers
Message from DASC 2011 ChairsFreely available from IEEE.pp. xix-xx
Papers
DASC 2011 Organizing CommitteeFreely available from IEEE.pp. xxi
Papers
DASC 2011 Program CommitteeFreely available from IEEE.pp. xxii-xxiii
Papers
Message from PICom 2011 ChairsFreely available from IEEE.pp. xxiv
Papers
PICom 2011 Organizing CommitteeFreely available from IEEE.pp. xxv-xxvi
Papers
Message from EmbeddedCom 2011 ChairsFreely available from IEEE.pp. xxvii-xxviii
Papers
EmbeddedCom 2011 Organizing CommitteeFreely available from IEEE.pp. xxix-xxx
Papers
Message from CGC 2011 ChairsFreely available from IEEE.pp. xxxi-xxxii
Papers
CGC 2011 Organizing CommitteeFreely available from IEEE.pp. xxxiii-xxxvii
Papers
Message from SCA 2011 ChairsFreely available from IEEE.pp. xxxviii-xxxix
Papers
SCA 2011 Organizing CommitteeFreely available from IEEE.pp. xl-xlii
Papers
Message from ACGS 2011 Program Co-chairsFreely available from IEEE.pp. xliii
Papers
Message from ASS 2011 Program Co-chairsFreely available from IEEE.pp. xliv
Papers
Message from WMSC 2011 Program Co-chairsFreely available from IEEE.pp. xlv
Papers
WMSC 2011 Organizing CommitteeFreely available from IEEE.pp. xlvi
Papers
Message from CMS 2011 Workshop Co-chairsFreely available from IEEE.pp. xlvii
Papers
CMS 2011 Organizing CommitteeFreely available from IEEE.pp. xlviii
Papers
Message from CTUW 2011 Program Co-chairsFreely available from IEEE.pp. xlvix
Papers
CTUW 2011 Organizing CommitteeFreely available from IEEE.pp. l
Papers
Message from CSN 2011 Workshop Co-chairsFreely available from IEEE.pp. li
Papers
CSN 2011 Organizing CommitteeFreely available from IEEE.pp. lii-liii
Papers
Service Injection: A Threat to Self-Managed Complex SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 1-6
Papers
S2XS2: A Server Side Approach to Automatically Detect XSS AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 7-14
Papers
Long-Term CPU Load PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 23-26
Papers
Application of Neural Networks to the Correction of a Stiffness Matrix by a Static TestFull-text access may be available. Sign in or learn about subscription options.pp. 27-30
Papers
New Latch-Up Model for Deep Sub-micron Integrated CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Papers
Self-Adaptive Authorization Framework for Policy Based RBAC/ABAC ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 37-44
Papers
Exact and Heuristic Algorithm for Multi-constrained Optimal Path ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 45-51
Papers
A Wide-Range Edge-Combining DLL with a Charge Pump for Low SpurFull-text access may be available. Sign in or learn about subscription options.pp. 52-55
Papers
Analysis of the New Latchup Model for Deep Sub-micron Integrated CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 56-62
Papers
A Trustful Infrastructure for the Internet of Things Based on EPOSMoteFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Papers
A 46MHz Biquad Gm-C High Q Bandpass Filter Design for Wireless ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 69-72
Papers
Ontology Based Modeling for Information Security ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 73-80
Papers
Towards Self-Awareness in Cloud Markets: A Monitoring MethodologyFull-text access may be available. Sign in or learn about subscription options.pp. 81-88
Papers
Intelligent Test Oracle Construction for Reactive Systems without Explicit SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 89-96
Papers
Workload Balancing for Highly Available Services: The Case of the N+M Redundancy ModelFull-text access may be available. Sign in or learn about subscription options.pp. 97-104
Papers
Reliability Implications of Register Utilization: An Empirical StudyFull-text access may be available. Sign in or learn about subscription options.pp. 105-112
Papers
A Natural Classification Scheme for Software Security PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 113-120
Papers
Automatic Annotation of Software Configuration Models with Service Recovery InformationFull-text access may be available. Sign in or learn about subscription options.pp. 121-128
Papers
A Connection-Based Signature Approach for Control Flow Error DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 129-136
Papers
A Fuzzy Logic-Based Buffer Overflow Vulnerability AuditorFull-text access may be available. Sign in or learn about subscription options.pp. 137-144
Papers
A Bio-inspired Host-Based Multi-engine Detection System with Sequential Pattern RecognitionFull-text access may be available. Sign in or learn about subscription options.pp. 145-150
Papers
Polymorphic Malware Detection Using Hierarchical Hidden Markov ModelFull-text access may be available. Sign in or learn about subscription options.pp. 151-155
Papers
Personalized Searching for Web Service Using User InterestsFull-text access may be available. Sign in or learn about subscription options.pp. 156-163
Papers
Using Particle Swarm Optimization to Improve the Precision and Recall of Taxonomy ExtractionFull-text access may be available. Sign in or learn about subscription options.pp. 164-169
Papers
A Formal Model for Advanced Physical AnnotationsFull-text access may be available. Sign in or learn about subscription options.pp. 170-177
Papers
Pervasive Intelligent Routing in Content Centric Delay Tolerant NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 178-185
Papers
Protecting from Inside Attacks in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 186-191
Papers
First Prototype of Aquatic Tool Kit: Towards Low-Cost Intelligent Larval Fish Counting in HatcheriesFull-text access may be available. Sign in or learn about subscription options.pp. 192-195
Papers
A Carrier Aggregation Based Resource Allocation Scheme for Pervasive Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 196-201
Papers
The User-Group Based Recommendation for the Diverse Multimedia Contents in the Social Network EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 202-206
Papers
From Sensory Data to Situation Awareness: Enhanced Context Spaces Theory ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
Papers
Mapping for Activity Recognition in the Context-Aware Systems Using Software SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 215-221
Papers
Design and Implementation of P2P Reasoning System Based on Description LogicFull-text access may be available. Sign in or learn about subscription options.pp. 222-229
Papers
Recognizing Concurrent and Interleaved Activities in Social InteractionsFull-text access may be available. Sign in or learn about subscription options.pp. 230-237
Papers
Intelligent Sensor Network Simulation for Battlefield Resources ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 238-241
Papers
Crowdsourcing in Mobile: A Three Stage Context Based ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 242-245
Papers
Gesture-Based Easy-Computer Interaction Using a Linear Array of Low Cost Distance SensorsFull-text access may be available. Sign in or learn about subscription options.pp. 246-251
Papers
Load-Aware Dynamic Partial Reconfiguration Implementation of Crossbar SchedulerFull-text access may be available. Sign in or learn about subscription options.pp. 252-258
Papers
Efficient Pattern Detection for Embedded Optical Bio-sensing SystemFull-text access may be available. Sign in or learn about subscription options.pp. 259-266
Papers
Deriving High-Performance Real-Time Multicore Systems Based on Simulink ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 267-274
Papers
Analysis and Comparison of Two Different Implementations of MCS-51 Compatible MicrocontrollersFull-text access may be available. Sign in or learn about subscription options.pp. 275-278
Papers
Global Priority Table for Last-Level CachesFull-text access may be available. Sign in or learn about subscription options.pp. 279-285
Papers
Design and Implementation of a Peripheral Bus Based on a New Kind of Reconfigurable SystemFull-text access may be available. Sign in or learn about subscription options.pp. 286-291
Papers
GALS-JOP: A Java Embedded Processor for GALS Reactive ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 292-299
Papers
A Study on QoS Routing Schem for Tactical Ad Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 300-304
Papers
Scheduling Instructions for Soft Errors in Register FilesFull-text access may be available. Sign in or learn about subscription options.pp. 305-312
Papers
System Level Performance Simulation of Distributed GENESYS Applications on Multi-core PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 313-320
Papers
Benchmarking Embedded Devices for Broadband Performance TestingFull-text access may be available. Sign in or learn about subscription options.pp. 321-327
Papers
An Efficient Test Design for Verification of Cache Coherence in CMPsFull-text access may be available. Sign in or learn about subscription options.pp. 328-334
Papers
Impact of Inaccurate Design of Branch Predictors on Processors' Power ConsumptionFull-text access may be available. Sign in or learn about subscription options.pp. 335-342
Papers
A Balanced Clustering Algorithm for Non-uniformly Deployed Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 343-350
Papers
Coprocessing Architecture in System-on-Programmable-Chip for Walk on the Boundary Method to Calculate CapacitanceFull-text access may be available. Sign in or learn about subscription options.pp. 351-355
Papers
An Elastic OLAP Cloud PlatformFull-text access may be available. Sign in or learn about subscription options.pp. 356-363
Papers
Analysis of Power-Saving Techniques over a Large Multi-use ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 364-371
Papers
Energy Efficient Task Allocation over Mobile NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 380-387
Papers
Application Behavior Mapping across Heterogeneous Hardware PlatformsFull-text access may be available. Sign in or learn about subscription options.pp. 388-395
Papers
Performance Evaluation of Image Conversion Module Based on MapReduce for Transcoding and Transmoding in SMCCSEFull-text access may be available. Sign in or learn about subscription options.pp. 396-403
Papers
ALARM: Autonomic Load-Aware Resource Management for P2P Key-Value Stores in CloudFull-text access may be available. Sign in or learn about subscription options.pp. 404-410
Papers
BoostPred: An Automatic Demand Predictor for the CloudFull-text access may be available. Sign in or learn about subscription options.pp. 411-418
Papers
Accurate Mutlicore Processor Power Models for Power-Aware Resource ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 419-426
Papers
CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 427-434
Papers
A Measurement Study of Server Utilization in Public CloudsFull-text access may be available. Sign in or learn about subscription options.pp. 435-442
Papers
Energy Prediction for MapReduce WorkloadsFull-text access may be available. Sign in or learn about subscription options.pp. 443-448
Papers
Towards a Service Lifecycle Based Methodology for Risk Assessment in Cloud ComputingFull-text access may be available. Sign in or learn about subscription options.pp. 449-456
Papers
Migrating Complex Business Process to Cloud Based on Mspoa and CBPMFull-text access may be available. Sign in or learn about subscription options.pp. 457-464
Papers
On Reference Node Deployment for Precise Clock Synchronization in Smart Power GridFull-text access may be available. Sign in or learn about subscription options.pp. 465-472
Papers
An Intelligent Real-Time Odor Monitoring System Using a Pattern Extraction AlgorithmFull-text access may be available. Sign in or learn about subscription options.pp. 473-479
Papers
Cost and Energy Reduction Evaluation for ARM Based Web ServersFull-text access may be available. Sign in or learn about subscription options.pp. 480-487
Papers
A Distributed Application Component Placement Approach for Cloud Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 488-495
Papers
A Novel Cost-Effective Dynamic Data Replication Strategy for Reliability in Cloud Data CentresFull-text access may be available. Sign in or learn about subscription options.pp. 496-502
Papers
Priority-Based Scheduling for Large-Scale Distribute Systems with Energy AwarenessFull-text access may be available. Sign in or learn about subscription options.pp. 503-509
Showing 100 out of 207