


default search action
PRDC 2005: Changsha, Hunan, China
- 11th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2005), 12-14 December, 2005, Changsha, Hunan, China. IEEE Computer Society 2005, ISBN 0-7695-2492-3

Keynote Addresses
- W. Kent Fuchs:

Dependable Computing in the Context of Mobility, Nomadicity, Ubiquity, and Pervasiveness. 3 - Tohru Kikuno:

Why Do Software Projects Fail? Reasons and a Solution Using a Bayesian Classifier to Predict Potential Risk. 4
Distributed Protocols and Systems
- Wei Chen

, Shiding Lin, Qiao Lian, Zheng Zhang:
Sigma: A Fault-Tolerant Mutual Exclusion Algorithm in Dynamic Distributed Systems Subject to Process Crashes and Memory Losses. 7-14 - Roy Friedman, Achour Mostéfaoui, Michel Raynal:

Intersecting Sets: a Basic Abstraction for Asynchronous Agreement Problems. 15-22 - Philippe Raipin Parvédy, Michel Raynal, Corentin Travers:

Decision Optimal Early-Stopping k-set Agreement in Synchronous Systems Prone to Send Omission Failures. 23-30 - Hongmei Wang, Zheng Zhao, Zhi-Wei Sun:

Privacy-Preserving Bayesian Network Structure Learning on Distributed Heterogeneous Data. 31-40
Software Reliability and Testing
- Shravan Gaonkar, William H. Sanders:

Simultaneous Simulation of Alternative System Configurations. 41-48 - Cristina Simache, Mohamed Kaâniche:

Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study. 49-56 - Juan-Carlos Ruiz-Garcia

, José Carlos Campelo
, Pedro J. Gil, Juan Pardo
:
On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components. 57-64 - Y. P. Wu, Q. P. Hu

, Szu Hui Ng, Min Xie
:
Bayesian Networks Modeling for Software Inspection Effectiveness. 65-74
Fault Tolerance (1)
- Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Application-Based Metrics for Strategic Placement of Detectors. 75-82 - Amir Rajabzadeh

, Seyed Ghassem Miremadi:
A Hardware Approach to Concurrent Error Detection Capability Enhancement in COTS Processors. 83-90 - Shaohuai Tian, Yingping Lu, Dafang Zhang:

Optimal Fault-Tolerant Routing Scheme for Generalized Hypercube. 91-100
Validation and Modeling
- Shiyi Xu:

High-Order Syndrome Testing for VLSI Circuits. 101-108 - Ling Zhang, Jishun Kuang:

A New BIST Solution for System-on-Chip. 109-113 - Neila Ben Lakhal

, Takashi Kobayashi, Haruo Yokota
:
A Failure-Aware Model for Estimating and Analyzing the Efficiency of Web Services Compositions. 114-124
Fault Tolerance (2)
- Masato Kitakami, Junpei Sano:

Code Design and Decoding Methods for Burst Error Locating Codes. 125-132 - Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang

, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo
, Yennun Huang
, Zsehong Tsai:
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. 133-139 - Dubravka Ilic, Elena Troubitsyna:

Formal Development of Software for Tolerating Transient Faults. 140-150
Checkpointing and Recovery
- Jichiang Tsai, Jenn-Wei Lin:

On the Fully-Informed Communication-Induced Checkpointing Protocol. 151-158 - Diana Szentiványi, Simin Nadjm-Tehrani, John M. Noble:

Optimal Choice of Checkpointing Interval for High Availability. 159-166 - Yuan-sheng Luo, Dafang Zhang, Yinghua Min:

An Improved Scheme of Index-Based Checkpointing. 167-174
High-Performance Systems
- Yu Hu, Xiaowei Li, Huawei Li

, Xiaoqing Wen:
Compression/Scan Co-Design for Reducing Test Data Volume, Scan-in Power Dissipation and Test Application Time. 175-182 - Heng Xu, Arun K. Somani:

Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime. 183-192
Security
- Shuanghe Peng, Zhen Han:

Proxy Cryptography for Secure Inter-domain Information Exchanges. 193-199 - Xinguang Peng, Kaifeng Ren:

Anomaly Detection with High Deviations for System Security. 200-207 - Ming-Wei Wu, Yennun Huang

, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo
:
A Multi-Faceted Approach towards Spam-Resistible Mail. 208-218
Distributed Systems Modeling (1)
- Yuan-Shun Dai, Xiaolong Wang, Min Xie

:
A Virtual Modeling and a Fast Algorithm for Grid Service Reliability. 219-226 - Zhonghong Ou, Youguang Yuan, Xiaoyong Zhao:

Research on Architecture and Design Principles of COTS Components Based Generic Fault-Tolerant Computer. 227-234 - Lili Pan, Junyi Li, Beiji Zou, Hao Chen:

Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision Coverage. 235-244
Mobile Systems and Networks (1)
- Rong Hu, Zhigang Hu, Hao Ma:

A Reliable Routing Algorithm Based on Fuzzy Applicability of F sets in MANET. 245-249 - Jenn-Wei Lin, Jichiang Tsai, Chao-Ying Chiu:

An Efficient Approach to Tolerating Route Errors in Mobile Ad Hoc Networks. 250-257 - Jian Leng, DongQin Xie:

A Novel Approach to Kernel Construction of China Bridge CA. 258-268
Practical Experience Reports
- Hairong Sun, Dong Tang, Robert B. Wood:

Optimizing Service Strategy for Systems with Deferred Repair. 269-274 - Jiangchun Ren, Kui Dai, Zhiying Wang:

Trust-Enhanced Alteration Scenario for Universal Computer. 275-280 - Yangyang Wu, Shuguang Du, Wei Luo:

Mining Alarm Database of Telecommunication Network for Alarm Association Rules. 281-286 - Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkalai:

On Automating Failure Mode Analysis and Enhancing its Integrity. 287-294
Fault Tolerance (3)
- Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon:

A Novel R2-FLC Dynamic Buffer Size Tuner to Support Time-Critical Applications over the Internet by Improving Logical Channel Fault Tolerance to Shorten Roundtrip Time. 295-299 - Kazuteru Namba, Hideo Ito:

Design of Defect Tolerant Wallace Multiplier. 300-304 - Paulo Sousa

, Nuno Ferreira Neves
, Paulo Veríssimo
:
Resilient State Machine Replication. 305-309 - Hassan Salmani, Seyed Ghassem Miremadi:

Contribution of Controller Area Networks Controllers to Masquerade Failures. 310-316
Mobile Systems and Networks (2)
- Michael Pan, Sheng-Yan Chuang, Sheng-De Wang:

Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks. 317-324 - Takashi Minohara, Satoshi Ishikawa, Masahiro Amano:

Centralized Surveillance of Unused Address Space by using Virtual Networks. 325-332 - Chih-Hsun Chou, Kuo-Feng Ssu, Hewijin Christine Jiau:

A Distributed Location Service for Reducing Query Failures in Geographic Ad Hoc Routing. 333-342
Fault Tolerance (4)
- Nicolas Loriant, Marc Ségura-Devillechaise, Jean-Marc Menaud:

Server Protection through Dynamic Patching. 343-349 - Marco Vieira

, Henrique Madeira
:
Detection of Malicious Transactions in DBMS. 350-357 - Su Myeong Lee, Hee Yong Youn:

Dynamic Window-based Adaptive Fault Monitoring for Ubiquitous Computing Systems. 358-368
Distributed Systems Modeling (2)
- Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang:

Research on Control Flags-based Weighted Authentication Trustworthiness Model. 369-373 - Henning Burchardt, Jens Oehlerking, Oliver E. Theel:

Towards Push-of-a-Button Stability Verification for Discrete-Time Hybrid Systems. 374-378 - Chin-Yu Huang, Chu-Ti Lin:

Reliability Prediction and Assessment of Fielded Software Based on Multiple Change-Point Models. 379-386 - Michel Raynal, Matthieu Roy:

A Note on a Simple Equivalence between Round-based Synchronous and Asynchronous Models. 387-392
Code & Language
- Zheng Qin, Jinmin Yang, Haoliang Wang, Bin Wang, Jianjun Zou:

Neural Network based on Dynamic Tunneling Technique for Weather Forecast. 393-397 - Chang-Chun Cheng, Wei-Ming Chen, Han-Chieh Chao

, Yao-Po Wang:
FPGA Authentication Header (AH) Implementation for Internet Appliances. 398-403 - Christian Buckl, Alois C. Knoll, Gerhard Schrott:

Development of Dependable Real-Time Systems with Zerberus. 404-408

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














