Default Cover Image

Pacific Rim International Symposium on Dependable Computing, IEEE

Dec. 13 2010 to Dec. 15 2010

Tokyo, Japan

ISBN: 978-0-7695-4289-8

Table of Contents

Papers
Title Page iFreely available from IEEE.pp. i
Papers
Title Page iiiFreely available from IEEE.pp. iii
Papers
[Copyright notice]Freely available from IEEE.pp. iv
Papers
Table of contentsFreely available from IEEE.pp. v-ix
Papers
Message from the General ChairFreely available from IEEE.pp. x
Papers
Message from the Program Co-ChairsFreely available from IEEE.pp. xi
Papers
Conference CommitteesFreely available from IEEE.pp. xii-xiv
RefereesFreely available from IEEE.pp. xv-xv
Papers
Modeling the Propagation of Intermittent Hardware Faults in ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 19-26
Papers
A Secure System-Wide Process Scheduler across Virtual MachinesFull-text access may be available. Sign in or learn about subscription options.pp. 27-36
Papers
Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security MechanismsFull-text access may be available. Sign in or learn about subscription options.pp. 37-46
Papers
FiRot: An Efficient Crosstalk Mitigation Method for Network-on-ChipsFull-text access may be available. Sign in or learn about subscription options.pp. 55-61
Papers
An Efficient Decision Unit for the Pair and Swap Methodology within Chip MultiprocessorsFull-text access may be available. Sign in or learn about subscription options.pp. 62-69
Papers
Address Remapping for Static NUCA in NoC-Based Degradable Chip-MultiprocessorsFull-text access may be available. Sign in or learn about subscription options.pp. 70-76
Papers
Formal Verification of Industrial Software with Dynamic Memory ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 77-84
Papers
A Software Accelerated Life Testing ModelFull-text access may be available. Sign in or learn about subscription options.pp. 85-92
Papers
Towards a Language for Communication among StakeholdersFull-text access may be available. Sign in or learn about subscription options.pp. 93-100
Papers
Sensitivity Analysis of the Minimum Task Period for Arbitrary Deadline Real-Time SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 101-108
Papers
An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown ParticipantsFull-text access may be available. Sign in or learn about subscription options.pp. 109-116
Papers
A Distributed Data Replication Protocol for File Versioning with Optimal Node AssignmentsFull-text access may be available. Sign in or learn about subscription options.pp. 117-124
Papers
Deadlock Detection Scheduling for Distributed Processes in the Presence of System FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 133-140
Papers
Two Efficient Software Techniques to Detect and Correct Control-Flow ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 141-148
Papers
Analysis of Dependencies between Failures in the UNINETT IP Backbone NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 149-156
Papers
System-Level Vulnerability Estimation for Data CachesFull-text access may be available. Sign in or learn about subscription options.pp. 157-164
Papers
Loris - A Dependable, Modular File-Based Storage StackFull-text access may be available. Sign in or learn about subscription options.pp. 165-174
Papers
Design and Implementation of a Fault Tolerant Single IP Address ClusterFull-text access may be available. Sign in or learn about subscription options.pp. 175-183
Papers
On the Reliability of Cascaded TMR SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 184-190
Papers
A Learning-Based Approach to Secure Web Services from SQL/XPath Injection AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 191-198
Papers
Estimating Computer Virus Propagation Based on Markovian Arrival ProcessesFull-text access may be available. Sign in or learn about subscription options.pp. 199-206
Papers
Dynamic Multilayer Routing to Achieve Location-HidingFull-text access may be available. Sign in or learn about subscription options.pp. 207-214
Papers
Sequential Frequency Vector Based System Call Anomaly DetectionFull-text access may be available. Sign in or learn about subscription options.pp. 215-222
Papers
Optimal Inventory of Computer Repair Parts: A Fuzzy Systems ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 225-226
Papers
A Replacement Strategy for Canary Flip-FlopsFull-text access may be available. Sign in or learn about subscription options.pp. 227-228
Papers
Quantitative Evaluation of Integrity for Remote System Using the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 229-230
Papers
A Speculative Byzantine Algorithm for P2P SystemFull-text access may be available. Sign in or learn about subscription options.pp. 231-232
Papers
Core-Local Memory Assisted ProtectionFull-text access may be available. Sign in or learn about subscription options.pp. 233-234
Papers
P-Bus: Programming Interface Layer for Safe OS Kernel ExtensionsFull-text access may be available. Sign in or learn about subscription options.pp. 235-236
Papers
Reliability Evaluation of Flip-Flops Based on Probabilistic Transfer MatricesFull-text access may be available. Sign in or learn about subscription options.pp. 239-240
Papers
Automatic Static Fault Tree Analysis from System ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 241-242
Papers
An Asynchronous Checkpoint-Based Redundant Multithreading ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 243-244
Papers
A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data GenerationFull-text access may be available. Sign in or learn about subscription options.pp. 245-246
Papers
A Hierarchical Model for Reliability Analysis of Sensor NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 247-248
Papers
The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced SecurityFull-text access may be available. Sign in or learn about subscription options.pp. 249-250
Papers
Author IndexFreely available from IEEE.pp. 253-254
Papers
[Publisher's information]Freely available from IEEE.pp. 256
Showing 52 out of 52