default search action
11th EDCC 2015: Paris, France
- 11th European Dependable Computing Conference, EDCC 2015, Paris, France, September 7-11, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9289-1
Distinguished Papers
- Farid Molazem Tabrizi, Karthik Pattabiraman:
Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems. 1-12 - Sayali Salvi, Daniel Kästner, Christian Ferdinand, Tom Bienmüller:
Exploiting Synergies between Static Analysis and Model-Based Testing. 13-24 - Frederico Cerveira, Raul Barbosa, Henrique Madeira, Filipe Araújo:
Recovery for Virtualized Environments. 25-36
Cloud Computing Reliability and Security
- Xiwei Xu, Liming Zhu, Daniel Sun, An Binh Tran, Ingo Weber, Min Fu, Len Bass:
Error Diagnosis of Cloud Application Operation Using Bayesian Networks and Online Optimisation. 37-48 - Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. 49-60 - Zachary Estrada, Cuong Manh Pham, Fei Deng, Lok K. Yan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Dynamic VM Dependability Monitoring Using Hypervisor Probes. 61-72
Dependable Embedded and Real-Time Systems
- Hélène Martorell, Jean-Charles Fabre, Michaël Lauer, Matthieu Roy, Régis Valentin:
Partial Updates of AUTOSAR Embedded Applications - To What Extent? 73-84 - Thorsten Piper, Stefan Winter, Neeraj Suri, Thomas E. Fuhrman:
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms. 85-96 - Seyedeh Golsana Ghaemi, Amir Mahdi Hosseini Monazzah, Hamed Farbeh, Seyed Ghassem Miremadi:
LATED: Lifetime-Aware Tag for Enduring Design. 97-107
Dependability Modeling and Tools
- Mattias Nyberg, Jonas Westman:
Failure Propagation Modeling Based on Contracts Theory. 108-119 - Carla Sauvanaud, Guthemberg Silvestre, Mohamed Kaâniche, Karama Kanoun:
Data Stream Clustering for Online Anomaly Detection in Cloud Applications. 120-131 - Luis R. Rodriguez, Julia Lawall:
Increasing Automation in the Backporting of Linux Drivers Using Coccinelle. 132-143 - Luis J. Saiz-Adalid, Pedro J. Gil, Joaquin Gracia-Moran, Daniel Gil-Tomas, Juan-Carlos Baraza-Calvo:
Ultrafast Single Error Correction Codes for Protecting Processor Registers. 144-154
Hardware Dependability
- Yanyan Shen, Kevin Elphinstone:
Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware. 155-166 - Peter Munk, Mohammad Shadi Al Hakeem, Raphael Lisicki, Helge Parzyjegla, Jan Richling, Hans-Ulrich Heiss:
Toward a Fault-Tolerance Framework for COTS Many-Core Systems. 167-177 - Behrooz Sangchoolie, Fatemeh Ayatolahi, Roger Johansson, Johan Karlsson:
A Comparison of Inject-on-Read and Inject-on-Write in ISA-Level Fault Injection. 178-189 - Jaime Espinosa, David de Andrés, Pedro J. Gil:
Increasing the Dependability of VLSI Systems through Early Detection of Fugacious Faults. 190-197
Fault-Tolerance and Secure Systems and Networks
- Jehan-François Pâris, Darrell D. E. Long:
Reducing the Energy Footprint of a Distributed Consensus Algorithm. 198-204 - Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
Security of ISP Access Networks: Practical Experiments. 205-212 - Paul Rimba, Liming Zhu, Len Bass, Ihor Kuz, Steve Reeves:
Composing Patterns to Construct Secure Systems. 213-224
Characterisation, Verification and Validation Methods
- Edward Chuah, Arshad Jhumka, James C. Browne, Bill Barth, Sai Narasimhamurthy:
Insights into the Diagnosis of System Failures from Cluster Message Logs. 225-232 - Jordan Adamek, Mikhail Nesterenko, Sébastien Tixeuil:
Evaluating and Optimizing Stabilizing Dining Philosophers. 233-244 - Horst Schirmeier, Martin Hoffmann, Christian Dietrich, Michael Lenz, Daniel Lohmann, Olaf Spinczyk:
FAIL*: An Open and Versatile Fault-Injection Framework for the Assessment of Software-Implemented Hardware Fault Tolerance. 245-255 - Negin Fathollahnejad, Risat Pathan, Johan Karlsson:
On the Probability of Unsafe Disagreement in Group Formation Algorithms for Vehicular Ad Hoc Networks. 256-267
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.