Default Cover Image

Dependability of Computer Systems, International Conference on

June 30 2009 to July 2 2009

Brunow, Poland

ISBN: 978-0-7695-3674-3

Table of Contents

[Copyright notice]Freely available from IEEE.pp. iv-iv
Papers
Table of contentsFreely available from IEEE.pp. v-viii
Papers
Program CommitteeFreely available from IEEE.pp. xii-xiii
Papers
list-reviewerFreely available from IEEE.pp. xv-xvi
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
PrefaceFreely available from IEEE.pp. ix-xi
Papers
Organizing CommitteeFreely available from IEEE.pp. xiv
Papers
Ontology-Based Security Problem Definition and Solution for the Common Criteria Compliant Development ProcessFull-text access may be available. Sign in or learn about subscription options.pp. 3-10
Papers
UML 2 Interaction Overview Diagram ValidationFull-text access may be available. Sign in or learn about subscription options.pp. 11-16
Papers
Minimal Büchi Automata for Certain Classes of LTL FormulasFull-text access may be available. Sign in or learn about subscription options.pp. 17-24
Papers
Languages of CTL and RTCTL Calculi in Real-Time Analysis of a System Described by a Fault Tree with Time DependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 33-41
Papers
Dependability of Safety-Critical Computer Systems through Component-Based EvolutionFull-text access may be available. Sign in or learn about subscription options.pp. 42-49
Papers
UML-Based Reliability Modeling of Network Services, a UDP Echo Service Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 50-57
Papers
Separating Users' Views in a Development Process for Agile MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 61-68
Papers
Dataflow Approach to Testing Java ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 69-76
Papers
A Concept of a Web Application Blending Thin and Fat Client ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 84-90
Papers
The Design and Implementation of a Documentation Generator for the PRISM LanguageFull-text access may be available. Sign in or learn about subscription options.pp. 91-98
Papers
Software Rejuvenation for Higher Levels of VoIP Availability and Mean Time to FailureFull-text access may be available. Sign in or learn about subscription options.pp. 99-106
Papers
A Model Based Framework for Specifying and Executing Fault Injection ExperimentsFull-text access may be available. Sign in or learn about subscription options.pp. 107-114
Papers
A Comparison of Structural Testing Strategies Based on Subdomain Testing and Random TestingFull-text access may be available. Sign in or learn about subscription options.pp. 115-122
Papers
Siphon-Based Verification of Component CompatibilityFull-text access may be available. Sign in or learn about subscription options.pp. 123-132
Papers
Applying Queuing Models for Assessing Network Services Dependability Parameters in Modern Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 135-143
Papers
Ontology Oriented Threat Detection System (OOTDS)Full-text access may be available. Sign in or learn about subscription options.pp. 144-151
Papers
Inconsistent State Analysis of a Network Receiver with Colored Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 152-159
Papers
Dependability of Large Reconfigurable Information SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 160-167
Papers
Node Evaluation in the Chord P2P SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 168-175
Papers
Relational Approach Towards Feasibility Performance for Routing Algorithms in Wireless Sensor NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 176-183
Papers
Efficiency Analysis in Communication Networks Topology DesignFull-text access may be available. Sign in or learn about subscription options.pp. 184-191
Papers
Detecting Botnets in Computer Networks Using Multi-agent TechnologyFull-text access may be available. Sign in or learn about subscription options.pp. 192-201
Papers
Data Mining Techniques for Semi-automatic Signature GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 210-217
Papers
Information Systems Performance Analysis Using Task-Level SimulatorFull-text access may be available. Sign in or learn about subscription options.pp. 218-225
Papers
Model-Based Diagnostic Using Model CheckingFull-text access may be available. Sign in or learn about subscription options.pp. 229-236
Papers
[Roster]Freely available from IEEE.pp. 376
Papers
Fault-Masking Capabilities of Basic Circuit StructuresFull-text access may be available. Sign in or learn about subscription options.pp. 245-253
Papers
A Tool for Dependable and Distributable PresentationsFull-text access may be available. Sign in or learn about subscription options.pp. 254-260
Papers
A Consistency Model for Distributed Virtual Reality SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 271-278
Papers
On Complexity of Coordination of Parallel Graph Transformations in GRADIS FrameworkFull-text access may be available. Sign in or learn about subscription options.pp. 279-289
Papers
Application of Computations with Calculation Error Exclusion for Computation Geometry AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 290-295
Papers
Analysis of Possibilities and Effectiveness of Combine Rough Sets and Neighborhood Theories for Solving Dynamic Scheduling ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 296-303
Papers
The Use of Heuristics in Creating Speculation StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 304-312
Papers
Selection of Tripping Times for Distance Protection Using Probabilistic Fault Trees with Time DependenciesFull-text access may be available. Sign in or learn about subscription options.pp. 315-323
Papers
A Domain Specific Language in Dependability AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 324-331
Papers
Reliability Centered Maintenance of Repairable EquipmentFull-text access may be available. Sign in or learn about subscription options.pp. 332-339
Papers
Operational Availability of Railway Dispatch Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 340-347
Papers
Modifying Markov Models of Ageing Equipment for Modeling Changes in Maintenance PoliciesFull-text access may be available. Sign in or learn about subscription options.pp. 348-355
Papers
Spectral Graph Theory and Network DependabilityFull-text access may be available. Sign in or learn about subscription options.pp. 356-363
Papers
Analysis of Critical Situations in Discrete Transport SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 364-371
Papers
Author IndexFreely available from IEEE.pp. 373-374
Showing 54 out of 54