default search action
PRDC 2010: Tokyo, Japan
- Yutaka Ishikawa, Dong Tang, Hiroshi Nakamura:
16th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2010, Tokyo, Japan, December 13-15, 2010. IEEE Computer Society 2010, ISBN 978-1-4244-8975-6
Fault Injection
- Ivano Irrera, João Durães, Marco Vieira, Henrique Madeira:
Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software Faults. 3-10 - Joaquin Gracia-Moran, Daniel Gil-Tomas, Juan Carlos Baraza, Luis J. Saiz-Adalid, Pedro J. Gil-Vicente:
Searching Representative and Low Cost Fault Models for Intermittent Faults in Microcontrollers: A Case Study. 11-18 - Layali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan:
Modeling the Propagation of Intermittent Hardware Faults in Programs. 19-26
Virtual Machines
- Hidekazu Tadokoro, Kenichi Kourai, Shigeru Chiba:
A Secure System-Wide Process Scheduler across Virtual Machines. 27-36 - Junya Sawazaki, Toshiyuki Maeda, Akinori Yonezawa:
Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security Mechanisms. 37-46 - Toshihiro Hanawa, Hitoshi Koizumi, Takayuki Banzai, Mitsuhisa Sato, Shin'ichi Miura, Tadatoshi Ishii, Hidehisa Takamizawa:
Customizing Virtual Machine with Fault Injector by Integrating with SpecC Device Model for a Software Testing Environment D-Cloud. 47-54
Chip Multiprocessors
- Ahmad Patooghy, Mansour Shafaei, Seyed Ghassem Miremadi, Hajar Falahati, Somayyeh Taheri:
FiRot: An Efficient Crosstalk Mitigation Method for Network-on-Chips. 55-61 - James L. Weston, Masashi Imai, Tomohide Nagai, Takashi Nanya:
An Efficient Decision Unit for the Pair and Swap Methodology within Chip Multiprocessors. 62-69 - Ying Wang, Lei Zhang, Yinhe Han, Huawei Li, Xiaowei Li:
Address Remapping for Static NUCA in NoC-Based Degradable Chip-Multiprocessors. 70-76
Software Reliability
- Sébastien Labbé, Arnaud Sangnier:
Formal Verification of Industrial Software with Dynamic Memory Management. 77-84 - Toshiya Fujii, Tadashi Dohi, Hiroyuki Okamura, Takaji Fujiwara:
A Software Accelerated Life Testing Model. 85-92 - Yutaka Matsuno, Jin Nakazawa, Makoto Takeyama, Midori Sugaya, Yutaka Ishikawa:
Towards a Language for Communication among Stakeholders. 93-100
Real-Time/Networked Systems
- Fengxiang Zhang, Alan Burns, Sanjoy K. Baruah:
Sensitivity Analysis of the Minimum Task Period for Arbitrary Deadline Real-Time Systems. 101-108 - Jichiang Tsai, Che-Cheng Chang:
An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown Participants. 109-116 - Takahiko Ikeda, Mamoru Ohara, Satoshi Fukumoto, Masayuki Arai, Kazuhiko Iwasaki:
A Distributed Data Replication Protocol for File Versioning with Optimal Node Assignments. 117-124 - Rahul Ghosh, Kishor S. Trivedi, Vijay K. Naik, Dong Seong Kim:
End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models Approach. 125-132
Failure Detection/Dependency
- Akikazu Izumi, Tadashi Dohi, Naoto Kaio:
Deadlock Detection Scheduling for Distributed Processes in the Presence of System Failures. 133-140 - Hamid R. Zarandi, Mohammad Maghsoudloo, Navid Khoshavi:
Two Efficient Software Techniques to Detect and Correct Control-Flow Errors. 141-148 - Andrés J. Gonzalez, Bjarne E. Helvik, Jon Kåre Hellan, Pirkko Kuusela:
Analysis of Dependencies between Failures in the UNINETT IP Backbone Network. 149-156
Architectures
- Alireza Haghdoost, Hossein Asadi, Amirali Baniasadi:
System-Level Vulnerability Estimation for Data Caches. 157-164 - Raja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum:
Loris - A Dependable, Modular File-Based Storage Stack. 165-174 - Jun Kato, Hajime Fujita, Yutaka Ishikawa:
Design and Implementation of a Fault Tolerant Single IP Address Cluster. 175-183 - Masashi Hamamatsu, Tatsuhiro Tsuchiya, Tohru Kikuno:
On the Reliability of Cascaded TMR Systems. 184-190
System Security
- Nuno Laranjeiro, Marco Vieira, Henrique Madeira:
A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks. 191-198 - Hiroyuki Okamura, Tadashi Dohi:
Estimating Computer Virus Propagation Based on Markovian Arrival Processes. 199-206 - Hakem Beitollahi, Geert Deconinck:
Dynamic Multilayer Routing to Achieve Location-Hiding. 207-214 - Ying Wu, Jianhui Jiang, Liangliang Kong:
Sequential Frequency Vector Based System Call Anomaly Detection. 215-222
Fast Abstracts
- Tatsuo Nakajima, Yuki Kinebuchi, Alexandre Courbot, Hiromasa Shimada, Tsung-Han Lin, Hitoshi Mitake:
Composition Kernel: A Multi-core Processor Virtualization Layer for Highly Functional Embedded Systems. 223-224 - Les M. Sztandera:
Optimal Inventory of Computer Repair Parts: A Fuzzy Systems Approach. 225-226 - Yuji Kunitake, Toshinori Sato, Hiroto Yasuura:
A Replacement Strategy for Canary Flip-Flops. 227-228 - Masato Kitakami, Hiroshi Konno, Kazuteru Namba, Hideo Ito:
Quantitative Evaluation of Integrity for Remote System Using the Internet. 229-230 - Yusuke Matsumoto, Hiromi Kobayashi:
A Speculative Byzantine Algorithm for P2P System. 231-232 - Yuki Kinebuchi, Tatsuo Nakajima, Vinod Ganapathy, Liviu Iftode:
Core-Local Memory Assisted Protection. 233-234 - Hajime Fujita, Motohiko Matsuda, Toshiyuki Maeda, Shin'ichi Miura, Yutaka Ishikawa:
P-Bus: Programming Interface Layer for Safe OS Kernel Extensions. 235-236 - Jun Yao, Ryoji Watanabe, Takashi Nakada, Hajime Shimada, Yasuhiko Nakashima, Kazutoshi Kobayashi:
A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline Processors. 237-238 - Chengtian Ouyang, Jianhui Jiang, Jie Xiao:
Reliability Evaluation of Flip-Flops Based on Probabilistic Transfer Matrices. 239-240 - Jianwen Xiang, Kazuo Yanoo:
Automatic Static Fault Tree Analysis from System Models. 241-242 - Jie Yin, Jianhui Jiang:
An Asynchronous Checkpoint-Based Redundant Multithreading Architecture. 243-244 - Liangliang Kong, Jianhui Jiang:
A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data Generation. 245-246 - Dong Seong Kim, Rahul Ghosh, Kishor S. Trivedi:
A Hierarchical Model for Reliability Analysis of Sensor Networks. 247-248 - Jed Kao-Tung Chang, Shaoshan Liu, Jean-Luc Gaudiot, Chen Liu:
The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced Security. 249-250 - Takashi Kitamura, Keishi Okamoto, Makoto Takeyama:
Formal Validation and Requirements Management Based on the Jackson's Reference Model for Requirements and Specifications. 251-252
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.