Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
PRDC
PRDC 2010
Generate Citations
Pacific Rim International Symposium on Dependable Computing, IEEE
Dec. 13 2010 to Dec. 15 2010
Tokyo, Japan
ISBN: 978-0-7695-4289-8
Table of Contents
Papers
Title Page i
Freely available from IEEE.
pp. i
Papers
Title Page iii
Freely available from IEEE.
pp. iii
Papers
[Copyright notice]
Freely available from IEEE.
pp. iv
Papers
Table of contents
Freely available from IEEE.
pp. v-ix
Papers
Message from the General Chair
Freely available from IEEE.
pp. x
Papers
Message from the Program Co-Chairs
Freely available from IEEE.
pp. xi
Papers
Conference Committees
Freely available from IEEE.
pp. xii-xiv
Papers
Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software Faults
Full-text access may be available. Sign in or learn about subscription options.
pp. 3-10
by
Ivano Irrera
,
João Durães
,
Marco Vieira
,
Henrique Madeira
Referees
Freely available from IEEE.
pp. xv-xv
Papers
Searching Representative and Low Cost Fault Models for Intermittent Faults in Microcontrollers: A Case Study
Full-text access may be available. Sign in or learn about subscription options.
pp. 11-18
by
J. Gracia-Morán
,
D. Gil-Tomás
,
J.C. Baraza
,
L.J. Saiz-Adalid
,
P.J. Gil-Vicente
Papers
Modeling the Propagation of Intermittent Hardware Faults in Programs
Full-text access may be available. Sign in or learn about subscription options.
pp. 19-26
by
Layali Rashid
,
Karthik Pattabiraman
,
Sathish Gopalakrishnan
Papers
A Secure System-Wide Process Scheduler across Virtual Machines
Full-text access may be available. Sign in or learn about subscription options.
pp. 27-36
by
Hidekazu Tadokoro
,
Kenichi Kourai
,
Shigeru Chiba
Papers
Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-46
by
Junya Sawazaki
,
Toshiyuki Maeda
,
Akinori Yonezawa
Papers
Customizing Virtual Machine with Fault Injector by Integrating with SpecC Device Model for a Software Testing Environment D-Cloud
Full-text access may be available. Sign in or learn about subscription options.
pp. 47-54
by
Toshihiro Hanawa
,
Hitoshi Koizumi
,
Takayuki Banzai
,
Mitsuhisa Sato
,
Shin'ichi Miura
,
Tadatoshi Ishii
,
Hidehisa Takamizawa
Papers
FiRot: An Efficient Crosstalk Mitigation Method for Network-on-Chips
Full-text access may be available. Sign in or learn about subscription options.
pp. 55-61
by
A. Patooghy
,
M. Shafaei
,
S.G. Miremadi
,
H. Falahati
,
S. Taheri
Papers
An Efficient Decision Unit for the Pair and Swap Methodology within Chip Multiprocessors
Full-text access may be available. Sign in or learn about subscription options.
pp. 62-69
by
J.L. Weston
,
M. Imai
,
T. Nagai
,
T. Nanya
Papers
Address Remapping for Static NUCA in NoC-Based Degradable Chip-Multiprocessors
Full-text access may be available. Sign in or learn about subscription options.
pp. 70-76
by
Ying Wang
,
Lei Zhang
,
Yinhe Han
,
Huawei Li
,
Xiaowei Li
Papers
Formal Verification of Industrial Software with Dynamic Memory Management
Full-text access may be available. Sign in or learn about subscription options.
pp. 77-84
by
Sébastien Labbé
,
Arnaud Sangnier
Papers
A Software Accelerated Life Testing Model
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-92
by
Toshiya Fujii
,
Tadashi Dohi
,
Hiroyuki Okamura
,
Takaji Fujiwara
Papers
Towards a Language for Communication among Stakeholders
Full-text access may be available. Sign in or learn about subscription options.
pp. 93-100
by
Yutaka Matsuno
,
Jin Nakazawa
,
Makoto Takeyama
,
Midori Sugaya
,
Yutaka Ishikawa
Papers
Sensitivity Analysis of the Minimum Task Period for Arbitrary Deadline Real-Time Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 101-108
by
Fengxiang Zhang
,
Alan Burns
,
Sanjoy Baruah
Papers
An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown Participants
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-116
by
Jichiang Tsai
,
Che-Cheng Chang
Papers
A Distributed Data Replication Protocol for File Versioning with Optimal Node Assignments
Full-text access may be available. Sign in or learn about subscription options.
pp. 117-124
by
Takahiko Ikeda
,
Mamoru Ohara
,
Satoshi Fukumoto
,
Masayuki Arai
,
Kazuhiko Iwasaki
Papers
End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 125-132
by
Rahul Ghosh
,
Kishor S. Trivedi
,
Vijay K. Naik
,
Dong Seong Kim
Papers
Deadlock Detection Scheduling for Distributed Processes in the Presence of System Failures
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-140
by
Akikazu Izumi
,
Tadashi Dohi
,
Naoto Kaio
Papers
Two Efficient Software Techniques to Detect and Correct Control-Flow Errors
Full-text access may be available. Sign in or learn about subscription options.
pp. 141-148
by
Hamid R. Zarandi
,
Mohammad Maghsoudloo
,
Navid Khoshavi
Papers
Analysis of Dependencies between Failures in the UNINETT IP Backbone Network
Full-text access may be available. Sign in or learn about subscription options.
pp. 149-156
by
Andres J. Gonzalez
,
Bjarne E. Helvik
,
Jon K. Hellan
,
Pirkko Kuusela
Papers
System-Level Vulnerability Estimation for Data Caches
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-164
by
Alireza Haghdoost
,
Hossein Asadi
,
Amirali Baniasadi
Papers
Loris - A Dependable, Modular File-Based Storage Stack
Full-text access may be available. Sign in or learn about subscription options.
pp. 165-174
by
Raja Appuswamy
,
David C. van Moolenbroek
,
Andrew S. Tanenbaum
Papers
Design and Implementation of a Fault Tolerant Single IP Address Cluster
Full-text access may be available. Sign in or learn about subscription options.
pp. 175-183
by
Jun Kato
,
Hajime Fujita
,
Yutaka Ishikawa
Papers
On the Reliability of Cascaded TMR Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 184-190
by
Masashi Hamamatsu
,
Tatsuhiro Tsuchiya
,
Tohru Kikuno
Papers
A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks
Full-text access may be available. Sign in or learn about subscription options.
pp. 191-198
by
Nuno Laranjeiro
,
Marco Vieira
,
Henrique Madeira
Papers
Estimating Computer Virus Propagation Based on Markovian Arrival Processes
Full-text access may be available. Sign in or learn about subscription options.
pp. 199-206
by
Hiroyuki Okamura
,
Tadashi Dohi
Papers
Dynamic Multilayer Routing to Achieve Location-Hiding
Full-text access may be available. Sign in or learn about subscription options.
pp. 207-214
by
Hakem Beitollahi
,
Geert Deconinck
Papers
Sequential Frequency Vector Based System Call Anomaly Detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 215-222
by
Ying Wu
,
Jianhui Jiang
,
Liangliang Kong
Papers
Composition Kernel: A Multi-core Processor Virtualization Layer for Highly Functional Embedded Systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 223-224
by
Tatsuo Nakajima
,
Yuki Kinebuchi
,
Alexandre Courbot
,
Hiromasa Shimada
,
Tsung-Han Lin
,
Hitoshi Mitake
Papers
Optimal Inventory of Computer Repair Parts: A Fuzzy Systems Approach
Full-text access may be available. Sign in or learn about subscription options.
pp. 225-226
by
Les M. Sztandera
Papers
A Replacement Strategy for Canary Flip-Flops
Full-text access may be available. Sign in or learn about subscription options.
pp. 227-228
by
Yuji Kunitake
,
Toshinori Sato
,
Hiroto Yasuura
Papers
Quantitative Evaluation of Integrity for Remote System Using the Internet
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-230
by
Masato Kitakami
,
Hiroshi Konno
,
Kazuteru Namba
,
Hideo Ito
Papers
A Speculative Byzantine Algorithm for P2P System
Full-text access may be available. Sign in or learn about subscription options.
pp. 231-232
by
Yusuke Matsumoto
,
Hiromi Kobayashi
Papers
Core-Local Memory Assisted Protection
Full-text access may be available. Sign in or learn about subscription options.
pp. 233-234
by
Yuki Kinebuchi
,
Tatsuo Nakajima
,
Vinod Ganapathy
,
Liviu Iftode
Papers
P-Bus: Programming Interface Layer for Safe OS Kernel Extensions
Full-text access may be available. Sign in or learn about subscription options.
pp. 235-236
by
Hajime Fujita
,
Motohiko Matsuda
,
Toshiyuki Maeda
,
Shin'ichi Miura
,
Yutaka Ishikawa
Papers
A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors
Full-text access may be available. Sign in or learn about subscription options.
pp. 237-238
by
Jun Yao
,
Ryoji Watanabe
,
Takashi Nakada
,
Hajime Shimada
,
Yasuhiko Nakashima
,
Kazutoshi Kobayashi
Papers
Reliability Evaluation of Flip-Flops Based on Probabilistic Transfer Matrices
Full-text access may be available. Sign in or learn about subscription options.
pp. 239-240
by
Chengtian Ouyang
,
Jianhui Jiang
,
Jie Xiao
Papers
Automatic Static Fault Tree Analysis from System Models
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-242
by
Jianwen Xiang
,
Kazuo Yanoo
Papers
An Asynchronous Checkpoint-Based Redundant Multithreading Architecture
Full-text access may be available. Sign in or learn about subscription options.
pp. 243-244
by
Jie Yin
,
Jianhui Jiang
Papers
A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data Generation
Full-text access may be available. Sign in or learn about subscription options.
pp. 245-246
by
Liangliang Kong
,
Jianhui Jiang
Papers
A Hierarchical Model for Reliability Analysis of Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 247-248
by
Dong Seong Kim
,
Rahul Ghosh
,
Kishor S. Trivedi
Papers
The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security
Full-text access may be available. Sign in or learn about subscription options.
pp. 249-250
by
Jed Kao-Tung Chang
,
Shaoshan Liu
,
Jean-Luc Gaudiot
,
Chen Liu
Papers
Formal Validation and Requirements Management Based on the Jackson's Reference Model for Requirements and Specifications
Full-text access may be available. Sign in or learn about subscription options.
pp. 251-252
by
Takashi Kitamura
,
Keishi Okamoto
,
Makoto Takeyama
Papers
Author Index
Freely available from IEEE.
pp. 253-254
Papers
[Publisher's information]
Freely available from IEEE.
pp. 256
Showing 52 out of 52