default search action
DepCoS-RELCOMEX 2007: Szklarska Poreba, Poland
- 2007 International Conference on Dependability of Computer Systems (DepCoS-RELCOMEX 2007), June 14-16, 2007, Szklarska Poreba, Poland. IEEE Computer Society 2007, ISBN 0-7695-2850-3
Modelling
- Andrzej Bialas:
Semiformal Approach to the IT Security Development. 3-10 - Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Evaluating the Combined Effect of Vulnerabilities and Faults on Large Distributed Systems. 11-18 - Iwona Dubielewicz, Bogumila Hnatkowska, Zbigniew Huzar, Lech Tuzinkiewicz:
Evaluation of MDA/PSM database model quality in the context of selected non-functional requirements. 19-26 - Sandrine Duflos, Alpha Amadou Diallo, Gwendal Le Grand:
An Overlay Simulator for Interdependent Critical Information Infrastructures. 27-34 - Dariusz Dymek, Leszek Kotulski:
The Influence of Relations among Different Levels of UML Diagrams onto Software Maintenance. 35-42 - Vyacheslav S. Kharchenko, Vladimir V. Sklyar, Andriy V. Volkoviy:
Multi-version Information Technologies and Development of Dependable Systems out of Undependable Components. 43-50 - Lukasz Fryz, Leszek Kotulski:
Assurance of System Consistency During Independent Creation of UML Diagrams. 51-58 - Mikhaylov Ilya Sergeevitch:
Information Systems Metamodels Developing for Providing Structural and Semantic Interoperability. 59-64 - Katarzyna Nowak, Lukasz Bagrij:
Using Distributed Multilevel Agent-based Monitoring Technique for Automated Network Modelling Approach. 61-72 - Victor V. Toporkov:
Dataflow Analysis of Distributed Programs Using Generalized Marked Nets. 73-80 - Elena N. Zaitseva, Vitaly G. Levashenko:
Investigation Multi-State System Reliability by Structure Function. 81-90
Methodology and Tools
- Lukasz Cyra, Janusz Górski:
Supporting Compliance with Security Standards by Trust Case Templates. 91-98 - Bernhard Fechner, Andre Osterloh:
Transient Fault Detection in State-Automata. 99-106 - Pawel Gluchowski:
Duration Calculus for Analysis of Fault Trees with Time Dependencies. 107-114 - I. I. Ladygin, S. G. Yankov:
Technique for Analyzing Items Reliability by Simulating Their Behaviour over Time Intervals. 115-118 - Lotfi Majdoub, Riadh Robbana:
Testing Duration Systems using an approximation method. 119-126 - Maciej Nikodem:
Error Prevention, Detection and Diffusion Algorithms for Cryptographic Hardware. 127-134 - Reijo Savola:
Requirement Centric Security Evaluation of Software Intensive Systems. 135-144
Dependability of Computer Networks
- Radoslaw Brendel, Henryk Krawczyk:
Detection Methods of Dynamic Spammers' Behavior. 145-152 - Manuel Cheminod, Ivan Cibrario Bertolotti, Luca Durante, Riccardo Sisto, Adriano Valenzano:
Experimental Comparison of Automatic Tools for the Formal Analysis of Cryptographic Protocols. 153-160 - Alexandr P. Eremeev, Pavel R. Varshavsky:
Methods and Tools for Reasoning by Analogy in Intelligent Decision Support Systems. 161-168 - Przemyslaw Krekora:
An approach to change availability of the service by adding forecasting module to firewall. 169-176 - Przemyslaw Krekora, Dariusz Caban:
Dependability analysis of reconfigurable information systems. 177-184 - Przemyslaw Nowak, Bartosz Sakowicz, George J. Anders, Andrzej Napieralski:
Intrusion Detection and Internet Services Failure Reporting System. 185-190 - Vladimir L. Shirokov:
The basics of methodology for estimation and choosing parameters of multi-service telecommunication systems. 191-197 - Tomasz R. Surmacz:
Reliability of e-mail delivery in the era of spam. 198-204 - Tomasz Walkowiak, Tomasz Wilk:
Incident Detection and Analysis in Communication and Information Systems by Fuzzy Logic. 205-212 - Wojciech Zamojski, Dariusz Caban:
Maintenance Policy of a Network with Traffic Reconfiguration. 213-222
Software Security and Dependability
- Meriem Belguidoum, Fabien Dagnat:
Dependability in Software Component Deployment. 223-230 - Kadhim M. Breesam:
Metrics for Object-Oriented Design Focusing on Class Inheritance Metrics. 231-237 - Cagatay Catal, Banu Diri, Bulent Ozumut:
An Artificial Immune System Approach for Fault Prediction in Object-Oriented Software. 238-245 - Marcin Gorawski, Pawel Marks:
Towards Reliability and Fault-Tolerance of Distributed Stream Processing System. 246-253 - Ireneusz J. Jozwiak, Krzysztof Marczak:
A Hardware-Based Software Protection Systems - Analysis of Security Dongles with Time Meters. 254-261 - Vasilis P. Koutras, Agapios N. Platis:
VoIP Availability and Service Reliability through Software Rejuvenation Policies. 262-269 - A. Lesiak, Piotr Gawkowski, Janusz Sosnowski:
Error Recovery Problems. 270-277 - Jan Magott, Pawel Skrobanek, Marek Woda:
Analysis of Timing Requirements for Intrusion Detection System. 278-285 - Andrzej Zalewski:
A FMECA framework for Service Oriented Systems based on Web Services. 286-293 - Donald C. Craig, Wlodzimierz M. Zuberek:
Verification of Component Behavioral Compatibility. 294-304
Applications
- Vasily Y. Kharitonov:
Methods of Efficiency Enhancement of Network Interaction in Distributed Systems of Virtual Reality. 305-308 - Henryk Maciejewski, George J. Anders:
Problem of Model Selection for Estimation of Equipment Remaining Life. 309-315 - Henryk Maciejewski, Lukasz Konarski:
Building a predictive model from data in high dimensions with application to analysis of microarray experiments. 316-323 - A. Yu. Nedelina, Alexandr P. Eremeev, Wolfgang Fengler:
Development of distributed planner for decision support systems. 324-330 - Dmitry Orlov:
Performance Analysis of System of 3D Scenes Networked Parallel Dynamic Visualization. 331-335 - Jaroslaw Sugier, George J. Anders:
Modeling Changes in Maintenance Activities through Fine-Tuning Markov Models of Ageing Equipment. 336-343 - Dawid Trawczynski, Janusz Sosnowski, Janusz Zalewski:
The Effect of Large Clock Drifts on Performance of Event and Time Triggered Network Interfaces. 344-351 - Tomasz Walkowiak, Jacek Mazurkiewicz:
Discrete transport system simulated by SSF for reliability and functional analysis. 352-359 - Slawomir Zielski, Janusz Sosnowski:
The SCSI interface conformance tests generation. 360-367 - Leonid Abrosimov:
Methodology for Analysis of Networks Performance. 368-376
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.