Default Cover Image

Pacific Rim International Symposium on Dependable Computing, IEEE

Nov. 16 2009 to Nov. 18 2009

Shanghai, China

ISBN: 978-0-7695-3849-5

Table of Contents

Papers
Modelling and Analysing Dynamic Decentralised Systems: Application to Mobile Ad-Hoc NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 109-114
Papers
Safety and Liveness Properties Based on Activity Chain for Composite Web Services and the Compliance VerificationsFull-text access may be available. Sign in or learn about subscription options.pp. 115-120
Papers
Dependability and Error Manifestation for a Web Service Based on the Doubly Stochastic Model and Renewal ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 183-188
Papers
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks PlanningFull-text access may be available. Sign in or learn about subscription options.pp. 282-286
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Table of contentsFreely available from IEEE.pp. v-ix
Papers
Program CommitteeFreely available from IEEE.pp. xv-xvi
Papers
list-reviewerFreely available from IEEE.pp. xvii
Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
Message from the General ChairFreely available from IEEE.pp. x
Papers
Message from the Program Co-chairsFreely available from IEEE.pp. xi
Papers
Organizing CommitteeFreely available from IEEE.pp. xii-xiv
Papers
Reliability Analysis of Single Bus Communication with Real-Time RequirementsFull-text access may be available. Sign in or learn about subscription options.pp. 3-10
Papers
A Test Vector Compression/Decompression Scheme Based on Logic Operation between Adjacent Bits (LOBAB) CodingFull-text access may be available. Sign in or learn about subscription options.pp. 11-16
Papers
Variation-Aware Scheduling for Chip Multiprocessors with Thread Level RedundancyFull-text access may be available. Sign in or learn about subscription options.pp. 17-22
Papers
Quantitative Analysis of Long-Latency Failures in System SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 23-30
Papers
A Synthesis Software Reliability ModelFull-text access may be available. Sign in or learn about subscription options.pp. 31-36
Papers
Using the NuSMV Model Checker for Test Generation from StatechartsFull-text access may be available. Sign in or learn about subscription options.pp. 37-42
Papers
A Novel Generation Algorithm of Pair-Wise Testing CasesFull-text access may be available. Sign in or learn about subscription options.pp. 43-48
Parallel Training Strategy Based on Support Vector Regression MachineFull-text access may be available. Sign in or learn about subscription options.pp. 159-164
Papers
Impact of Hazards on Pattern Selection for Small Delay DefectsFull-text access may be available. Sign in or learn about subscription options.pp. 49-54
Papers
Fault Injection Scheme for Embedded Systems at Machine Code Level and VerificationFull-text access may be available. Sign in or learn about subscription options.pp. 55-62
Papers
Small Delay Fault Simulation for Sequential CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 63-68
Papers
Built-In Self-Repair Techniques for Heterogeneous Memory CoresFull-text access may be available. Sign in or learn about subscription options.pp. 69-74
Papers
Flip-Flop Selection for Transition Test Pattern Reduction Using Partial Enhanced ScanFull-text access may be available. Sign in or learn about subscription options.pp. 75-80
Papers
Reliability & Performance Modeling to Speed-Up the NoC DesignFull-text access may be available. Sign in or learn about subscription options.pp. 208-213
Papers
On the Computational Complexity of Parameter Estimation in Adaptive Testing StrategiesFull-text access may be available. Sign in or learn about subscription options.pp. 87-92
Papers
A New Approach to Automated Redundancy Reduction for Test SequencesFull-text access may be available. Sign in or learn about subscription options.pp. 93-98
Papers
Prioritized Test Generation Strategy for Pair-Wise TestingFull-text access may be available. Sign in or learn about subscription options.pp. 99-102
An Attack Injection Approach to Evaluate the Robustness of Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 228-233
Papers
Test Case Reuse Based on OntologyFull-text access may be available. Sign in or learn about subscription options.pp. 103-108
Papers
Evaluating the Use of Reference Run Models in Fault Injection AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 121-124
Papers
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity MetricsFull-text access may be available. Sign in or learn about subscription options.pp. 127-134
Papers
Low-Overhead Architecture for Security TagFull-text access may be available. Sign in or learn about subscription options.pp. 135-142
Papers
A Trust-Based Benchmark for DBMS ConfigurationsFull-text access may be available. Sign in or learn about subscription options.pp. 143-150
Papers
Performance and Reliability of a Revocation Method Utilizing Encrypted Backup DataFull-text access may be available. Sign in or learn about subscription options.pp. 151-158
Papers
A Lightweight Network Intrusion Detection Model Based on Feature SelectionFull-text access may be available. Sign in or learn about subscription options.pp. 165-168
Papers
String-Wise Information Flow Tracking against Script Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 169-176
Papers
Representing X-Code Using Latin SquaresFull-text access may be available. Sign in or learn about subscription options.pp. 177-182
Papers
Entropy Based Method for Network Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 189-191
Papers
Chip-Level Redundancy in Distributed Shared-Memory MultiprocessorsFull-text access may be available. Sign in or learn about subscription options.pp. 195-201
Papers
A Reliable Non-volatile Memory System: Exploiting File-System CharacteristicsFull-text access may be available. Sign in or learn about subscription options.pp. 202-207
Papers
Making Overlay Networks more Robust to Massive FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 214-221
Papers
Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc EnvironmentsFull-text access may be available. Sign in or learn about subscription options.pp. 222-227
Papers
Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault InjectionFull-text access may be available. Sign in or learn about subscription options.pp. 234-241
Papers
A Regular Expression Matching Algorithm Using Transition MergingFull-text access may be available. Sign in or learn about subscription options.pp. 242-246
Papers
A Novel Process Migration Method for MPI ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 247-251
Papers
Dependability Evaluation for Internet-Based Remote SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 256-259
Papers
Holography: A Hardware Virtualization Tool for Malware AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 263-268
Papers
Delayed Processing Technique in Critical Sections for Real-Time LinuxFull-text access may be available. Sign in or learn about subscription options.pp. 269-275
Papers
A New Multiple-Round DOR Routing for 2D Network-on-Chip MeshesFull-text access may be available. Sign in or learn about subscription options.pp. 276-281
Papers
Dependability Benchmarking Using Software Faults: How to Create Practical and Representative FaultloadsFull-text access may be available. Sign in or learn about subscription options.pp. 289-294
Papers
Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 295-300
Papers
[Publisher's information]Freely available from IEEE.pp. 392
Reliability & Performance Modeling to Speed-Up the NoC DesignFull-text access may be available. Sign in or learn about subscription options.
Papers
D2STM: Dependable Distributed Software Transactional MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 307-313
Papers
Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux ServersFull-text access may be available. Sign in or learn about subscription options.pp. 314-318
Papers
Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 319-324
Papers
Quiescent Leader Election in Crash-Recovery SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 325-330
Papers
Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 331-335
Papers
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiTFull-text access may be available. Sign in or learn about subscription options.pp. 336-341
Papers
Online Computing and Predicting Architectural Vulnerability Factor of Microprocessor StructuresFull-text access may be available. Sign in or learn about subscription options.pp. 345-350
Papers
Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 351-356
Papers
An Early-Stopping Protocol for Computing Aggregate Functions in Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 357-364
Papers
Availability Modeling and Analysis of a Virtualized SystemFull-text access may be available. Sign in or learn about subscription options.pp. 365-371
Papers
The Instruction Scheduling for Soft Errors Based on Data Flow AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 372-378
Papers
Evaluating the Impact of Irrecoverable Read Errors on Disk Array ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 379-384
Papers
Author IndexFreely available from IEEE.pp. 389-391
Showing 73 out of 73