


default search action
PRDC 2011: Pasadena, CA, USA
- Leon Alkalai, Timothy Tsai, Tomohiro Yoneda:
17th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2011, Pasadena, CA, USA, December 12-14, 2011. IEEE Computer Society 2011, ISBN 978-1-4577-2005-5
Software Reliability and Evaluation
- Toshio Kaneishi, Tadashi Dohi
:
Parametric Bootstrapping for Assessing Software Reliability Measures. 1-9 - Xiao Xiao
, Tadashi Dohi
:
Estimating Software Intensity Function via Multiscale Analysis and Its Application to Reliability Assessment. 10-19 - Hiroyuki Okamura
, Tadashi Dohi
:
Unification of Software Reliability Models Using Markovian Arrival Processes. 20-27 - Jesus Friginal
, David de Andrés, Juan-Carlos Ruiz-Garcia
, Regina Moraes
:
Using Dependability Benchmarks to Support ISO/IEC SQuaRE. 28-37
Testing
- Irith Pomeranz:
Augmenting Functional Broadside Tests for Transition Fault Coverage with Bounded Switching Activity. 38-44 - Irith Pomeranz:
Generation of Mixed Broadside and Skewed-Load Diagnostic Test Sets for Transition Faults. 45-52 - Xiao Zhang
, Hans G. Kerkhoff:
A Dependability Solution for Homogeneous MPSoCs. 53-62
Communications and Networks
- Shun Tokuyama, Tatsuhiro Tsuchiya
, Tohru Kikuno:
Gossiping with Network Coding. 63-70 - Shantanu Sharma, Awadhesh Kumar Singh:
On Detecting Termination in Cognitive Radio Networks. 71-78 - Maurice Sebastian, Philip Axer, Rolf Ernst:
Utilizing Hidden Markov Models for Formal Reliability Analysis of Real-Time Communication Systems with Errors. 79-88
Memories
- Horst Schirmeier
, Jens Neuhalfen, Ingo Korb, Olaf Spinczyk, Michael Engel:
RAMpage: Graceful Degradation Management for Memory Errors in Commodity Linux Servers. 89-98 - Pedro Ruivo, Maria Couceiro, Paolo Romano
, Luís E. T. Rodrigues:
Exploiting Total Order Multicast in Weakly Consistent Transactional Caches. 99-108 - Musfiq Rahman, Bruce R. Childers, Sangyeun Cho:
COMeT: Continuous Online Memory Test. 109-118
Safety
- Philippa Conmy, Iain Bate:
Efficient Task Allocation to FPGAs in the Safety Critical Domain. 119-128 - Chi-Shiang Cho, Wei-Ho Chung, Deyun Gao, Hongke Zhang, Sy-Yen Kuo
:
Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power Plants. 129-134 - Herbert Hecht:
Dependability Improvement for Critical Systems. 135-143
Detection and Recovery
- Fabian Oboril, Mehdi Baradaran Tahoori, Vincent Heuveline
, Dimitar Lukarski, Jan-Philipp Weiss:
Numerical Defect Correction as an Algorithm-Based Fault Tolerance Technique for Iterative Solvers. 144-153 - Martin Drozda
, Iain Bate, Jon Timmis
:
Bio-inspired Error Detection for Complex Systems. 154-163 - A. Tankeu-Choitat, David Navarre
, Philippe A. Palanque, Yannick Deleris, Jean-Charles Fabre, Camille Fayollas:
Self-Checking Components for Dependable Interactive Cockpits Using Formal Description Techniques. 164-173
Security
- Gabriel Salles-Loustau, Robin Berthier, Etienne Collange, Bertrand Sobesto, Michel Cukier:
Characterizing Attackers and Attacks: An Empirical Study. 174-183 - Robin Berthier, William H. Sanders:
Specification-Based Intrusion Detection for Advanced Metering Infrastructures. 184-193 - Anthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
A Clustering Approach for Web Vulnerabilities Detection. 194-203
Virtualization and Analysis of Systems
- Balazs Gerofi, Yutaka Ishikawa:
Workload Adaptive Checkpoint Scheduling of Virtual Machine Replication. 204-213 - Michael Le, Israel Hsu, Yuval Tamir:
Resilient Virtual Clusters. 214-223 - Kishor S. Trivedi, Rajesh K. Mansharamani, Dong Seong Kim
, Michael Grottke
, Manoj Nambiar:
Recovery from Failures Due to Mandelbugs in IT Systems. 224-233 - Koichi Bando, Kenji Tanaka:
Trend Analyses of Accidents and Dependability Improvement in Financial Information Systems. 234-243
Processors and Hardware
- Wilfried Steiner, Bruno Dutertre:
Layered Diagnosis and Clock-Rate Correction for the TTEthernet Clock Synchronization Protocol. 244-253 - Mahyar R. Malekpour:
A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs: A Self-Stabilizing Distributed Clock Synchronization Protocol For Arbitrary Digraphs. 254-263 - Masayuki Arai, Kazuhiko Iwasaki:
Area-Per-Yield and Defect Level of Cascaded TMR for Pipelined Processors. 264-271
Fast Abstracts
- G. Robert Redinbo:
Correcting DFT Codes with Modified Berlekamp-Massey Algorithm and Syndrome Extension. 272-273 - Matthias Güdemann
, Michael Lipaczewski, Frank Ortmeier, Marco Schumann, Robert Eschbach:
Towards Making Dependability Visual - Combining Model-Based Design and Virtual Realities. 274-275 - Jie Xiao, Jianhui Jiang, Xuguang Zhu, Chengtian Ouyang:
A Method of Gate-Level Circuit Reliability Estimation Based on Iterative PTM Model. 276-277 - Mihai Florian:
A Framework for Systematic Testing of Multi-threaded Applications. 278-279 - Mark L. McKelvin Jr., Edward B. Gamble Jr., Gerard J. Holzmann:
Model Checking Multitask Applications for OSEK Compliant Real-Time Operating Systems. 280-281 - Domitian Tamas-Selicean, Paul Pop
:
Task Mapping and Partition Allocation for Mixed-Criticality Real-Time Systems. 282-283 - Horst Schirmeier
, Martin Hoffmann, Rüdiger Kapitza, Daniel Lohmann
, Olaf Spinczyk:
Revisiting Fault-Injection Experiment-Platform Architectures. 284-285 - József Sziray:
Test Generation and Computational Complexity. 286-287 - Songlin Yang, Ning Yu, Feng Zhu, Huilei Li:
One Optimization Method on the Navigation Performance Reliability of Planing Craft. 288-289 - Christoph Kuznik, Wolfgang Müller:
Native Binary Mutation Analysis for Embedded Software and Virtual Prototypes in SystemC. 290-291 - József Sziray:
A Test Model for Hardware and Software. 292-293 - Matthias Güdemann
, Michael Lipaczewski, Frank Ortmeier:
Tool Supported Model-Based Safety Analysis and Optimization. 294-295
Industry Track
- Takaji Fujiwara, Mitsuhiro Kimura, Yoshinobu Satoh, Shigeru Yamada:
A Method of Calculating Safety Integrity Level for IEC 61508 Conformity Software. 296-301 - Aniello Napolitano, Gabriella Carrozza, Antonio Bovenzi, Christian Esposito
:
Automatic Robustness Assessment of DDS-Compliant Middleware. 302-307 - Laura L. Pullum
, Christopher T. Symons:
Failure Analysis of a Complex Learning Framework Incorporating Multi-modal and Semi-supervised Learning. 308-313 - Shih-Yao Dai, Fyodor Yarochkin, Sy-Yen Kuo
, Ming-Wei Wu, Yennun Huang
:
Malware Profiler Based on Innovative Behavior-Awareness Technique. 314-319 - Kam S. Tso, Michael J. Pajevski, Bryan Johnson:
Access Control of Web and Java Based Applications. 320-325

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.