Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
DEPCOS-RELCOMEX
DEPCOS-RELCOMEX 2009
Generate Citations
Dependability of Computer Systems, International Conference on
June 30 2009 to July 2 2009
Brunow, Poland
ISBN: 978-0-7695-3674-3
Table of Contents
[Copyright notice]
Freely available from IEEE.
pp. iv-iv
Papers
Table of contents
Freely available from IEEE.
pp. v-viii
Papers
Program Committee
Freely available from IEEE.
pp. xii-xiii
Papers
list-reviewer
Freely available from IEEE.
pp. xv-xvi
Extended Dependability Analysis of Information and Control Systems by FME(C)A-technique: Models, Procedures, Application
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-32
by
Iraj Elyasi Komari
,
Vyacheslav Kharchenko
,
Eugene Babeshko
,
Anatoliy Gorbenko
,
Alexander Siora
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Preface
Freely available from IEEE.
pp. ix-xi
Papers
Organizing Committee
Freely available from IEEE.
pp. xiv
Papers
Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development Process
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-10
by
Andrzej Bialas
Papers
UML 2 Interaction Overview Diagram Validation
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-16
by
Thouraya Bouabana-Tebibel
Papers
Minimal Büchi Automata for Certain Classes of LTL Formulas
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-24
by
Jacek Cichon
,
Adam Czubak
,
Andrzej Jasinski
Papers
Languages of CTL and RTCTL Calculi in Real-Time Analysis of a System Described by a Fault Tree with Time Dependencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 33-41
by
Pawel Gluchowski
Papers
Dependability of Safety-Critical Computer Systems through Component-Based Evolution
Full-text access may be available. Sign in or learn about subscription options.
pp. 42-49
by
Vyacheslav Kharchenko
,
Vladimir Sklyar
,
Alexandr Siora
Papers
UML-Based Reliability Modeling of Network Services, a UDP Echo Service Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 50-57
by
Zbigniew Lipinski
Papers
Separating Users' Views in a Development Process for Agile Methods
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-68
by
Ammar Bessam
,
Mohamed Tahar Kimour
,
Ali Melit
Papers
Dataflow Approach to Testing Java Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-76
by
Ilona Bluemke
,
Artur Rembiszewski
Papers
Design and Implementation of a Java Fault Injector for Exhaustif
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-83
by
Antonio Da Silva
,
Alberto Gonzalez-Calero
,
José Fernán Martínez
,
Lourdes López
,
Ana Belen García
,
Vicente Hernández
Papers
A Concept of a Web Application Blending Thin and Fat Client Architectures
Full-text access may be available. Sign in or learn about subscription options.
pp. 84-90
by
Hugo Dworak
Papers
The Design and Implementation of a Documentation Generator for the PRISM Language
Full-text access may be available. Sign in or learn about subscription options.
pp. 91-98
by
Hugo Dworak
Papers
Software Rejuvenation for Higher Levels of VoIP Availability and Mean Time to Failure
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-106
by
Vasilis P. Koutras
,
Christoforos-Panagiotis S. Salagaras
,
Agapios N. Platis
On the Use of Dynamic Binary Instrumentation to Perform Faults Injection in Transaction Level Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-244
by
Antonio da Silva Farina
,
Sebastián Sánchez Prieto
Papers
A Model Based Framework for Specifying and Executing Fault Injection Experiments
Full-text access may be available. Sign in or learn about subscription options.
pp. 107-114
by
János Oláh
,
István Majzik
Papers
A Comparison of Structural Testing Strategies Based on Subdomain Testing and Random Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-122
by
Kazimierz Worwa
Papers
Siphon-Based Verification of Component Compatibility
Full-text access may be available. Sign in or learn about subscription options.
pp. 123-132
by
Wlodek M. Zuberek
Papers
Applying Queuing Models for Assessing Network Services Dependability Parameters in Modern Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-143
by
Lukasz Bagrij
,
Katarzyna Michalska
,
Marek Woda
Papers
Ontology Oriented Threat Detection System (OOTDS)
Full-text access may be available. Sign in or learn about subscription options.
pp. 144-151
by
Karol Banczyk
,
Henryk Krawczyk
Papers
Inconsistent State Analysis of a Network Receiver with Colored Petri Nets
Full-text access may be available. Sign in or learn about subscription options.
pp. 152-159
by
Mohamed Bouali
,
Pavol Barger
,
Walter Schon
Papers
Dependability of Large Reconfigurable Information Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 160-167
by
Dariusz Caban
Papers
Node Evaluation in the Chord P2P Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 168-175
by
Jacek Cichon
,
Krzysztof Cichon
,
Przemyslaw Kobylanski
Papers
Relational Approach Towards Feasibility Performance for Routing Algorithms in Wireless Sensor Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 176-183
by
Jan Nikodem
Papers
Efficiency Analysis in Communication Networks Topology Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-191
by
Ewa Szlachcic
,
Jacek Mlynek
Papers
Detecting Botnets in Computer Networks Using Multi-agent Technology
Full-text access may be available. Sign in or learn about subscription options.
pp. 192-201
by
Miroslaw Szymczyk
Papers
Job and Application-Level Scheduling: An Integrated Approach for Achieving Quality of Service in Distributed Computing
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-209
by
Victor V. Toporkov
,
Anna Toporkova
,
Alexey Tselishchev
,
Dmitry Yemelyanov
Papers
Data Mining Techniques for Semi-automatic Signature Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 210-217
by
Wojciech Tylman
Papers
Information Systems Performance Analysis Using Task-Level Simulator
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-225
by
Tomasz Walkowiak
Papers
Model-Based Diagnostic Using Model Checking
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-236
by
Mustapha Bourahla
Papers
[Roster]
Freely available from IEEE.
pp. 376
Papers
Fault-Masking Capabilities of Basic Circuit Structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-253
by
Bernhard Fechner
Papers
A Tool for Dependable and Distributable Presentations
Full-text access may be available. Sign in or learn about subscription options.
pp. 254-260
by
Bernhard Fechner
,
Oliver Körber
Papers
On Hardware and Software Implementation of Arithmetic in Finite Fields of Characteristic 7 for Calculation of Pairings
Full-text access may be available. Sign in or learn about subscription options.
pp. 261-270
by
Sergei Gashkov
,
Anatoli Bolotov
,
Alexej Burtzev
,
Alexander Frolov
,
Sergei Zhebet
Papers
A Consistency Model for Distributed Virtual Reality Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 271-278
by
Vasily Y. Kharitonov
Papers
On Complexity of Coordination of Parallel Graph Transformations in GRADIS Framework
Full-text access may be available. Sign in or learn about subscription options.
pp. 279-289
by
Leszek Kotulski
,
Adam Sedziwy
Papers
Application of Computations with Calculation Error Exclusion for Computation Geometry Algorithms
Full-text access may be available. Sign in or learn about subscription options.
pp. 290-295
by
Dmitry Orlov
Papers
Analysis of Possibilities and Effectiveness of Combine Rough Sets and Neighborhood Theories for Solving Dynamic Scheduling Problem
Full-text access may be available. Sign in or learn about subscription options.
pp. 296-303
by
Henryk Piech
Papers
The Use of Heuristics in Creating Speculation Strategy
Full-text access may be available. Sign in or learn about subscription options.
pp. 304-312
by
Henryk Piech
,
Urszula Górnik
Papers
Selection of Tripping Times for Distance Protection Using Probabilistic Fault Trees with Time Dependencies
Full-text access may be available. Sign in or learn about subscription options.
pp. 315-323
by
Tomasz Babczynski
,
Miroslaw Lukowicz
,
Jan Magott
Papers
A Domain Specific Language in Dependability Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 324-331
by
Marcin Kowalski
,
Kazimierz Wilkosz
Papers
Reliability Centered Maintenance of Repairable Equipment
Full-text access may be available. Sign in or learn about subscription options.
pp. 332-339
by
Henryk Maciejewski
Papers
Operational Availability of Railway Dispatch Communication System
Full-text access may be available. Sign in or learn about subscription options.
pp. 340-347
by
Miroslaw Siergiejczyk
Papers
Modifying Markov Models of Ageing Equipment for Modeling Changes in Maintenance Policies
Full-text access may be available. Sign in or learn about subscription options.
pp. 348-355
by
Jaroslaw Sugier
,
George J. Anders
Papers
Spectral Graph Theory and Network Dependability
Full-text access may be available. Sign in or learn about subscription options.
pp. 356-363
by
Alvaro Torres
,
George Anders
Papers
Analysis of Critical Situations in Discrete Transport Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 364-371
by
Tomasz Walkowiak
,
Jacek Mazurkiewicz
Papers
Author Index
Freely available from IEEE.
pp. 373-374
Showing 54 out of 54