Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
EDCC
EDCC 2016
Generate Citations
2016 12th European Dependable Computing Conference (EDCC)
Sept. 5 2016 to Sept. 9 2016
Gothenburg, Sweden
Table of Contents
Title Page i
Freely available from IEEE.
pp. i-i
Title Page iii
Freely available from IEEE.
pp. iii-iii
Copyright Page
Freely available from IEEE.
pp. iv-iv
Table of Contents
Freely available from IEEE.
pp. v-vii
Message from General Chair
Freely available from IEEE.
pp. viii-viii
Message from Program Chair
Freely available from IEEE.
pp. ix-ix
Conference Organization
Freely available from IEEE.
pp. x-x
Program Committee
Freely available from IEEE.
pp. xi-xii
External Reviewers
Freely available from IEEE.
pp. xiii-xiii
Finding Resilience-Friendly Compiler Optimizations Using Meta-Heuristic Search Techniques
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
Nithya Narayanamurthy
,
Karthik Pattabiraman
,
Matei Ripeanu
Diversity, Safety and Security in Embedded Systems: Modelling Adversary Effort and Supply Chain Risks
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-24
by
Ilir Gashi
,
Andrey Povyakalo
,
Lorenzo Strigini
A System-Level Architecture for Fine-Grained Privacy Control in Location-Based Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-36
by
Arielle Moro
,
Benoît Garbinato
Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-44
by
Henrique Alves
,
Baldoino Fonseca
,
Nuno Antunes
Coverage Metrics and Detection of Injection Vulnerabilities: An Experimental Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 45-52
by
Ana Paula Sayuri Matsunaga
,
Nuno Antunes
,
Regina Moraes
Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 53-64
by
Eric Totel
,
Mouna Hkimi
,
Michel Hurfin
,
Mourad Leslous
,
Yvan Labiche
CrossCheck: A Holistic Approach for Tolerating Crash-Faults and Arbitrary Failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 65-76
by
Arthur Martens
,
Christoph Borchert
,
Manuel Nieke
,
Olaf Spinczyk
,
Rüdiger Kapitza
SAREK: Optimistic Parallel Ordering in Byzantine Fault Tolerance
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-88
by
Bijun Li
,
Wenbo Xu
,
Muhammad Zeeshan Abid
,
Tobias Distler
,
Rüdiger Kapitza
On the Effects of Cumulative SEUs in FPGA-Based Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 89-96
by
José Luís Nunes
,
João Carlos Cunha
,
Mário Zenha-Rela
3D-DPS: An Efficient 3D-CAC for Reliable Data Transfer in 3D ICs
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-107
by
Zahra Shirmohammadi
,
Nezam Rohbani
,
Seyed Ghassem Miremadi
Ultrafast Error Correction Codes for Double Error Detection/Correction
Full-text access may be available. Sign in or learn about subscription options.
pp. 108-119
by
Luis-J. Saiz-Adalid
,
Pedro Gil
,
Juan-Carlos Ruiz
,
Joaquín Gracia-Morán
,
Daniel Gil-Tomás
,
J.-Carlos Baraza-Calvo
Investigating the Effects of Process Variations and System Workloads on Reliability of STT-RAM Caches
Full-text access may be available. Sign in or learn about subscription options.
pp. 120-129
by
Elham Cheshmikhani
,
Amir Mahdi Hosseini Monazzah
,
Hamed Farbeh
,
Seyed Ghassem Miremadi
Practical Emulation of Software Defects in Source Code
Full-text access may be available. Sign in or learn about subscription options.
pp. 130-140
by
Gonçalo Pereira
,
Raul Barbosa
,
Henrique Madeira
Prediction of the Testing Effort for the Safety Certification of Open-Source Software: A Case Study on a Real-Time Operating System
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-152
by
Domenico Cotroneo
,
Domenico Di Leo
,
Roberto Natella
,
Roberto Pietrantuono
Virtual Worlds for Testing Robot Navigation: A Study on the Difficulty Level
Full-text access may be available. Sign in or learn about subscription options.
pp. 153-160
by
Thierry Sotiropoulos
Experimental Assessment of NoSQL Databases Dependability
Full-text access may be available. Sign in or learn about subscription options.
pp. 161-168
by
Luís Ventura
,
Nuno Antunes
Design and Implementation of a Consistent Data Store for a Distributed SDN Control Plane
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-180
by
Fábio Botelho
,
Tulio A. Ribeiro
,
Paulo Ferreira
,
Fernando M. V. Ramos
,
Alysson Bessani
Assuring Dependable Cloud-Based System Engineering: A Cloud Accountability Method
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-184
by
David Ebo Adjepon-Yamoah
,
Zhenyu Wen
Expert-Guided Automatic Diagnosis of Performance Problems in Enterprise Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 185-188
by
Christoph Heger
,
André Van Hoorn
,
Dušan Okanović
,
Stefan Siegl
,
Alexander Wert
Towards a Common Safety Ontology for Automobiles and Railway Vehicles
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-192
by
Bernhard Hulin
,
Hermann Kaindl
,
Thomas Rathfux
,
Roman Popp
,
Edin Arnautovic
,
Roland Beckert
Multidimensional Log Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-196
by
Marcin Kubacki
,
Janusz Sosnowski
Combining SAN and P-Graphs for the Analysis and Optimization of Industrial Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 197-207
by
Riccardo Bernini
,
Andrea Bondavalli
,
Paolo Lollini
,
Leonardo Montecchi
Dwarf: Shortening Downtime of Reboot-Based Kernel Updates
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-217
by
Ken Terada
,
Hiroshi Yamada
Adaptive Deployment Infrastructure for Android Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 218-228
by
Junior Cupe Casquina
,
Jane D. A. Sandim Eleuterio
,
Cecilia M. F. Rubira
An RSU Replication Scheme for Dependable Wireless Vehicular Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-240
by
João Almeida
,
Joaquim Ferreira
,
Arnaldo S. R. Oliveira
Transitioning Fault Prediction Models to a New Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-248
by
Jesper Derehag
,
Elaine Weyuker
,
Thomas J. Ostrand
,
Daniel Sundmark
A Performance Comparison of Algorithms for Byzantine Agreement in Distributed Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-260
by
Shreya Agrawal
,
Khuzaima Daudjee
Author Index
Freely available from IEEE.
pp. 261-262
Publisher's Information
Freely available from IEEE.
pp. 264-264
Showing 38 out of 38