Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PRDC
PRDC 2009
Generate Citations
Pacific Rim International Symposium on Dependable Computing, IEEE
Nov. 16 2009 to Nov. 18 2009
Shanghai, China
ISBN: 978-0-7695-3849-5
Table of Contents
Papers
Modelling and Analysing Dynamic Decentralised Systems: Application to Mobile Ad-Hoc Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-114
by
Christian Attiogbé
Papers
Safety and Liveness Properties Based on Activity Chain for Composite Web Services and the Compliance Verifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 115-120
by
Bo Chen
,
Guosun Zeng
Papers
Dependability and Error Manifestation for a Web Service Based on the Doubly Stochastic Model and Renewal Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 183-188
by
Tharam Dillon
,
Houwayda Elfawal Mansour
Papers
Signature Self Checking (SSC): A Low-Cost Reliable Control Logic for Pipelined Microprocessors
Full-text access may be available. Sign in or learn about subscription options.
pp. 252-255
by
Hassan Ghasemzadeh Mohammadi
,
Seyed Ghassem Miremadi
,
Alireza Ejlali
Papers
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning
Full-text access may be available. Sign in or learn about subscription options.
pp. 282-286
by
Chi-Yuan Chen
,
Yu-Shan Liang
,
Chia-Mu Yu
,
Chih-Hsiang Ho
,
Sy-Yen Kuo
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Table of contents
Freely available from IEEE.
pp. v-ix
Papers
Program Committee
Freely available from IEEE.
pp. xv-xvi
Papers
list-reviewer
Freely available from IEEE.
pp. xvii
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
Message from the General Chair
Freely available from IEEE.
pp. x
Papers
Message from the Program Co-chairs
Freely available from IEEE.
pp. xi
Papers
Organizing Committee
Freely available from IEEE.
pp. xii-xiv
Papers
Reliability Analysis of Single Bus Communication with Real-Time Requirements
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-10
by
Maurice Sebastian
,
Rolf Ernst
Papers
A Test Vector Compression/Decompression Scheme Based on Logic Operation between Adjacent Bits (LOBAB) Coding
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-16
by
Huaguo Liang
,
Wenfa Zhan
,
Qiang Luo
,
Cuiyun Jiang
Papers
Variation-Aware Scheduling for Chip Multiprocessors with Thread Level Redundancy
Full-text access may be available. Sign in or learn about subscription options.
pp. 17-22
by
Jianbo Dong
,
Lei Zhang
,
Yinhe Han
,
Guihai Yan
,
Xiaowei Li
Papers
Quantitative Analysis of Long-Latency Failures in System Software
Full-text access may be available. Sign in or learn about subscription options.
pp. 23-30
by
Keun Soo Yim
,
Zbigniew T. Kalbarczyk
,
Ravishankar K. Iyer
Papers
A Synthesis Software Reliability Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 31-36
by
Xiaoying Hu
,
Shiyi Xu
Papers
Using the NuSMV Model Checker for Test Generation from Statecharts
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-42
by
Masaya Kadono
,
Tatsuhiro Tsuchiya
,
Tohru Kikuno
Papers
A Novel Generation Algorithm of Pair-Wise Testing Cases
Full-text access may be available. Sign in or learn about subscription options.
pp. 43-48
by
Jianhua Gao
,
Yuefeng Hu
Parallel Training Strategy Based on Support Vector Regression Machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 159-164
by
Yong-mei Lei
,
Yu Yan
,
Shao-jun Chen
Papers
Impact of Hazards on Pattern Selection for Small Delay Defects
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-54
by
Jie Wang
,
Huawei Li
,
Yinghua Min
,
Xiaowei Li
,
Huaguo Liang
Papers
Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-62
by
Ang Jin
,
Jian-hui Jiang
Papers
Small Delay Fault Simulation for Sequential Circuits
Full-text access may be available. Sign in or learn about subscription options.
pp. 63-68
by
Li Liu
,
Jishun Kuang
,
Huawei Li
Papers
Built-In Self-Repair Techniques for Heterogeneous Memory Cores
Full-text access may be available. Sign in or learn about subscription options.
pp. 69-74
by
Zhen-Yu Wang
,
Yi-Ming Tsai
,
Shyue-Kung Lu
Papers
Flip-Flop Selection for Transition Test Pattern Reduction Using Partial Enhanced Scan
Full-text access may be available. Sign in or learn about subscription options.
pp. 75-80
by
Songwei Pei
,
Huawei Li
,
Xiaowei Li
Papers
A GA-Based Method for High-Quality X-Filling to Reduce Launch Switching Activity in At-speed Scan Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 81-86
by
Yuta Yamato
,
Xiaoqing Wen
,
Kohei Miyase
,
Hiroshi Furukawa
,
Seiji Kajihara
Papers
Reliability & Performance Modeling to Speed-Up the NoC Design
Full-text access may be available. Sign in or learn about subscription options.
pp. 208-213
by
Ahmad Patooghy
,
Seyed Ghassem Miremadi
Papers
On the Computational Complexity of Parameter Estimation in Adaptive Testing Strategies
Full-text access may be available. Sign in or learn about subscription options.
pp. 87-92
by
Feng Ye
,
Chang Liu
,
Hai Hu
,
Chang-Hai Jiang
,
Kai-Yuan Cai
Papers
A New Approach to Automated Redundancy Reduction for Test Sequences
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-98
by
Huaikou Miao
,
Pan Liu
,
Jia Mei
,
Hongwei Zeng
Papers
Prioritized Test Generation Strategy for Pair-Wise Testing
Full-text access may be available. Sign in or learn about subscription options.
pp. 99-102
by
Jianhua Gao
,
Jie Zhu
An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 228-233
by
David de Andrés
,
Jesús Friginal
,
Juan-Carlos Ruiz
,
Pedro Gil
Papers
Test Case Reuse Based on Ontology
Full-text access may be available. Sign in or learn about subscription options.
pp. 103-108
by
Lizhi Cai
,
Weiqin Tong
,
Zhenyu Liu
,
Juan Zhang
Papers
Evaluating the Use of Reference Run Models in Fault Injection Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-124
by
Matthew Leeke
,
Arshad Jhumka
Papers
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics
Full-text access may be available. Sign in or learn about subscription options.
pp. 127-134
by
Sang Min Lee
,
Dong Seong Kim
,
YoungHyun Yoon
,
Jong Sou Park
Papers
Low-Overhead Architecture for Security Tag
Full-text access may be available. Sign in or learn about subscription options.
pp. 135-142
by
Ryota Shioya
,
Daewung Kim
,
Kazuo Horio
,
Masahiro Goshima
,
Shuichi Sakai
Papers
A Trust-Based Benchmark for DBMS Configurations
Full-text access may be available. Sign in or learn about subscription options.
pp. 143-150
by
Afonso Araújo Neto
,
Marco Vieira
Papers
Performance and Reliability of a Revocation Method Utilizing Encrypted Backup Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 151-158
by
Kazuki Takayama
,
Haruo Yokota
Papers
A Lightweight Network Intrusion Detection Model Based on Feature Selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-168
by
Dai Hong
,
Li Haibo
Papers
String-Wise Information Flow Tracking against Script Injection Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-176
by
Kunbo Li
,
Ryota Shioya
,
Masahiro Goshima
,
Shuichi Sakai
Papers
Representing X-Code Using Latin Squares
Full-text access may be available. Sign in or learn about subscription options.
pp. 177-182
by
Gang Wang
,
Sheng Lin
,
Xiaoguang Liu
,
Jing Liu
Papers
Entropy Based Method for Network Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 189-191
by
Qian Quan
,
Che Hong-Yi
,
Zhang Rui
Papers
Chip-Level Redundancy in Distributed Shared-Memory Multiprocessors
Full-text access may be available. Sign in or learn about subscription options.
pp. 195-201
by
Brian T. Gold
,
Babak Falsafi
,
James C. Hoe
Papers
A Reliable Non-volatile Memory System: Exploiting File-System Characteristics
Full-text access may be available. Sign in or learn about subscription options.
pp. 202-207
by
Chin-Hsien Wu
,
Wen-Yen Chang
,
Zen-Wei Hong
Papers
Making Overlay Networks more Robust to Massive Failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 214-221
by
Hakem Beitollahi
,
Geert Deconinck
Papers
Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc Environments
Full-text access may be available. Sign in or learn about subscription options.
pp. 222-227
by
Wei-Tong Wang
,
Kuo-Feng Ssu
,
Cheng-Chieh Chien
,
Yu-Yuan Lin
Papers
Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection
Full-text access may be available. Sign in or learn about subscription options.
pp. 234-241
by
Andrea Ceccarelli
,
Andrea Bondavalli
,
Danilo Iovino
Papers
A Regular Expression Matching Algorithm Using Transition Merging
Full-text access may be available. Sign in or learn about subscription options.
pp. 242-246
by
Jiekun Zhang
,
Dafang Zhang
,
Kun Huang
Papers
A Novel Process Migration Method for MPI Applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-251
by
Tiantian Liu
,
Zhong Ma
,
Zhonghong Ou
Papers
Dependability Evaluation for Internet-Based Remote Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 256-259
by
Masato Kitakami
,
Akihiro Katada
,
Kazuteru Namba
,
Hideo Ito
Papers
Holography: A Hardware Virtualization Tool for Malware Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 263-268
by
Shih-Yao Dai
,
Yarochkin Fyodor
,
Jain-Shing Wu
,
Chih-Hung Lin
,
Yennun Huang
,
Sy-Yen Kuo
Papers
Delayed Processing Technique in Critical Sections for Real-Time Linux
Full-text access may be available. Sign in or learn about subscription options.
pp. 269-275
by
Maobing Dai
,
Yutaka Ishikawa
Papers
A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes
Full-text access may be available. Sign in or learn about subscription options.
pp. 276-281
by
Binzhang Fu
,
Yinhe Han
,
Huawei Li
,
Xiaowei Li
Papers
Dependability Benchmarking Using Software Faults: How to Create Practical and Representative Faultloads
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-294
by
Pedro Costa
,
João Gabriel Silva
,
Henrique Madeira
Papers
Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 295-300
by
Roberto Jung Drebes
,
Takashi Nanya
Papers
[Publisher's information]
Freely available from IEEE.
pp. 392
Reliability & Performance Modeling to Speed-Up the NoC Design
Full-text access may be available. Sign in or learn about subscription options.
by
Ahmad Patooghy
,
Seyed Ghassem Miremnadi
Papers
Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-306
by
Nuno Antunes
,
Marco Vieira
Papers
D2STM: Dependable Distributed Software Transactional Memory
Full-text access may be available. Sign in or learn about subscription options.
pp. 307-313
by
Maria Couceiro
,
Paolo Romano
,
Nuno Carvalho
,
Luís Rodrigues
Papers
Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux Servers
Full-text access may be available. Sign in or learn about subscription options.
pp. 314-318
by
Dong Tang
,
William Bryson
Papers
Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 319-324
by
Yu-Yuan Lin
,
Kuo-Feng Ssu
Papers
Quiescent Leader Election in Crash-Recovery Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-330
by
Mikel Larrea
,
Cristian Martín
Papers
Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 331-335
by
Sung-Jib Yim
,
Yoon-Hwa Choi
Papers
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT
Full-text access may be available. Sign in or learn about subscription options.
pp. 336-341
by
Tobias Goldschmidt
,
Andreas Dittrich
,
Miroslaw Malek
Papers
Online Computing and Predicting Architectural Vulnerability Factor of Microprocessor Structures
Full-text access may be available. Sign in or learn about subscription options.
pp. 345-350
by
Songjun Pan
,
Yu Hu
,
Xiaowei Li
Papers
Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 351-356
by
Wanfu Ding
,
Ruifeng Guo
Papers
An Early-Stopping Protocol for Computing Aggregate Functions in Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 357-364
by
Antonio Fernández Anta
,
Miguel A. Mosteiro
,
Christopher Thraves
Papers
Availability Modeling and Analysis of a Virtualized System
Full-text access may be available. Sign in or learn about subscription options.
pp. 365-371
by
Dong Seong Kim
,
Fumio Machida
,
Kishor S. Trivedi
Papers
The Instruction Scheduling for Soft Errors Based on Data Flow Analysis
Full-text access may be available. Sign in or learn about subscription options.
pp. 372-378
by
Jianjun Xu
,
Qingping Tan
,
Rui Shen
Papers
Evaluating the Impact of Irrecoverable Read Errors on Disk Array Reliability
Full-text access may be available. Sign in or learn about subscription options.
pp. 379-384
by
Jehan-François Pâris
,
Ahmed Amer
,
Darrell D. E. Long
,
Thomas J. E. Schwarz
Papers
A Measurement System to Improve E-Business Capability of Human Resources in an Organizational Computing Environment
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-388
by
Chui Young Yoon
,
Keon Myung Lee
,
Joong Nam Jeon
,
In Sung Lee
Papers
Author Index
Freely available from IEEE.
pp. 389-391
Showing 73 out of 73