default search action
PRDC 2009: Shanghai, China
- 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November 2009. IEEE Computer Society 2009, ISBN 978-0-7695-3849-5
Testing Algorithm, Analysis and Theory
- Maurice Sebastian, Rolf Ernst:
Reliability Analysis of Single Bus Communication with Real-Time Requirements. 3-10 - Huaguo Liang, Wenfa Zhan, Qiang Luo, Cuiyun Jiang:
A Test Vector Compression/Decompression Scheme Based on Logic Operation between Adjacent Bits (LOBAB) Coding. 11-16 - Jianbo Dong, Lei Zhang, Yinhe Han, Guihai Yan, Xiaowei Li:
Variation-Aware Scheduling for Chip Multiprocessors with Thread Level Redundancy. 17-22 - Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Quantitative Analysis of Long-Latency Failures in System Software. 23-30 - Xiaoying Hu, Shiyi Xu:
A Synthesis Software Reliability Model. 31-36 - Masaya Kadono, Tatsuhiro Tsuchiya, Tohru Kikuno:
Using the NuSMV Model Checker for Test Generation from Statecharts. 37-42 - Jianhua Gao, Yuefeng Hu:
A Novel Generation Algorithm of Pair-Wise Testing Cases. 43-48 - Jie Wang, Huawei Li, Yinghua Min, Xiaowei Li, Huaguo Liang:
Impact of Hazards on Pattern Selection for Small Delay Defects. 49-54 - Ang Jin, Jianhui Jiang:
Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification. 55-62 - Li Liu, Jishun Kuang, Huawei Li:
Small Delay Fault Simulation for Sequential Circuits. 63-68 - Zhen-Yu Wang, Yi-Ming Tsai, Shyue-Kung Lu:
Built-In Self-Repair Techniques for Heterogeneous Memory Cores. 69-74 - Songwei Pei, Huawei Li, Xiaowei Li:
Flip-Flop Selection for Transition Test Pattern Reduction Using Partial Enhanced Scan. 75-80 - Yuta Yamato, Xiaoqing Wen, Kohei Miyase, Hiroshi Furukawa, Seiji Kajihara:
A GA-Based Method for High-Quality X-Filling to Reduce Launch Switching Activity in At-speed Scan Testing. 81-86 - Feng Ye, Chang Liu, Hai Hu, Chang-Hai Jiang, Kai-Yuan Cai:
On the Computational Complexity of Parameter Estimation in Adaptive Testing Strategies. 87-92 - Huaikou Miao, Pan Liu, Jia Mei, Hongwei Zeng:
A New Approach to Automated Redundancy Reduction for Test Sequences. 93-98 - Jianhua Gao, Jie Zhu:
Prioritized Test Generation Strategy for Pair-Wise Testing. 99-102 - Lizhi Cai, Weiqin Tong, Zhenyu Liu, Juan Zhang:
Test Case Reuse Based on Ontology. 103-108 - Matthew Leeke, Arshad Jhumka:
Evaluating the Use of Reference Run Models in Fault Injection Analysis. 121-124
Dependable Networks
- Sang Min Lee, Dong Seong Kim, YoungHyun Yoon, Jong Sou Park:
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics. 127-134 - Ryota Shioya, Daewung Kim, Kazuo Horio, Masahiro Goshima, Shuichi Sakai:
Low-Overhead Architecture for Security Tag. 135-142 - Afonso Araújo Neto, Marco Vieira:
A Trust-Based Benchmark for DBMS Configurations. 143-150 - Kazuki Takayama, Haruo Yokota:
Performance and Reliability of a Revocation Method Utilizing Encrypted Backup Data. 151-158 - Yong-mei Lei, Yu Yan, Shao-jun Chen:
Parallel Training Strategy Based on Support Vector Regression Machine. 159-164 - Dai Hong, Haibo Li:
A Lightweight Network Intrusion Detection Model Based on Feature Selection. 165-168 - Kunbo Li, Ryota Shioya, Masahiro Goshima, Shuichi Sakai:
String-Wise Information Flow Tracking against Script Injection Attacks. 169-176 - Gang Wang, Sheng Lin, Xiaoguang Liu, Jing Liu:
Representing X-Code Using Latin Squares. 177-182 - Quan Qian, Hongyi Che, Rui Zhang:
Entropy Based Method for Network Anomaly Detection. 189-191
Dependable Systems, Hardware and Software
- Brian T. Gold, Babak Falsafi, James C. Hoe:
Chip-Level Redundancy in Distributed Shared-Memory Multiprocessors. 195-201 - Chin-Hsien Wu, Wen-Yen Chang, Zeng-Wei Hong:
A Reliable Non-volatile Memory System: Exploiting File-System Characteristics. 202-207 - Hakem Beitollahi, Geert Deconinck:
Making Overlay Networks more Robust to Massive Failures. 214-221 - Wei-Tong Wang, Kuo-Feng Ssu, Cheng-Chieh Chien, Yu-Yuan Lin:
Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc Environments. 222-227 - David de Andrés, Jesus Friginal, Juan-Carlos Ruiz-Garcia, Pedro J. Gil:
An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks. 228-233 - Andrea Ceccarelli, Andrea Bondavalli, Danilo Iovino:
Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection. 234-241 - Jiekun Zhang, Dafang Zhang, Kun Huang:
A Regular Expression Matching Algorithm Using Transition Merging. 242-246 - Tiantian Liu, Zhong Ma, Zhonghong Ou:
A Novel Process Migration Method for MPI Applications. 247-251 - Masato Kitakami, Akihiro Katada, Kazuteru Namba, Hideo Ito:
Dependability Evaluation for Internet-Based Remote Systems. 256-259
Design for Dependability
- Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo:
Holography: A Hardware Virtualization Tool for Malware Analysis. 263-268 - Maobing Dai, Yutaka Ishikawa:
Delayed Processing Technique in Critical Sections for Real-Time Linux. 269-275 - Binzhang Fu, Yinhe Han, Huawei Li, Xiaowei Li:
A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes. 276-281 - Chi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo:
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. PRDC 2009: 282-
Fault-Tolerance and Security Qualification
- Pedro Costa, João Gabriel Silva, Henrique Madeira:
Dependability Benchmarking Using Software Faults: How to Create Practical and Representative Faultloads. 289-294 - Roberto Jung Drebes, Takashi Nanya:
Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel Reliability. 295-300 - Nuno Antunes, Marco Vieira:
Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. 301-306 - Maria Couceiro, Paolo Romano, Nuno Carvalho, Luís E. T. Rodrigues:
D2STM: Dependable Distributed Software Transactional Memory. 307-313 - Dong Tang, William Bryson:
Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux Servers. 314-318 - Yu-Yuan Lin, Kuo-Feng Ssu:
Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor Networks. 319-324 - Mikel Larrea, Cristian Martín:
Quiescent Leader Election in Crash-Recovery Systems. 325-330 - Sung-Jib Yim, Yoon-Hwa Choi:
Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor Networks. 331-335 - Tobias Goldschmidt, Andreas Dittrich, Miroslaw Malek:
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT. 336-341
Modeling, Analysis and Theory
- Songjun Pan, Yu Hu, Xiaowei Li:
Online Computing and Predicting Architectural Vulnerability Factor of Microprocessor Structures. 345-350 - Wanfu Ding, Ruifeng Guo:
Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time Systems. 351-356 - Antonio Fernández Anta, Miguel A. Mosteiro, Christopher Thraves:
An Early-Stopping Protocol for Computing Aggregate Functions in Sensor Networks. 357-364 - Dong Seong Kim, Fumio Machida, Kishor S. Trivedi:
Availability Modeling and Analysis of a Virtualized System. 365-371 - Jianjun Xu, Qingping Tan, Rui Shen:
The Instruction Scheduling for Soft Errors Based on Data Flow Analysis. 372-378 - Jehan-François Pâris, Ahmed Amer, Darrell D. E. Long, Thomas J. E. Schwarz:
Evaluating the Impact of Irrecoverable Read Errors on Disk Array Reliability. 379-384 - Chui Young Yoon, Keon-Myung Lee, Joongnam Jeon, In Sung Lee:
A Measurement System to Improve E-Business Capability of Human Resources in an Organizational Computing Environment. 385-388
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.