Abstract is missing.
- TRUSTED ILLIAC: A Configurable Hardware Framework for a Trusted Computing BaseRavishankar K. Iyer. 3 [doi]
- Goal-Oriented Patterns for UML-Based Modeling of Embedded Systems RequirementsHeather Goldsby, Sascha Konrad, Betty H. C. Cheng. 7-14 [doi]
- Integrating Product-Line Fault Tree Analysis into AADL ModelsHongyu Sun, Miriam Hauptman, Robyn R. Lutz. 15-22 [doi]
- Arguing safety with Problem Oriented Software EngineeringJon G. Hall, Derek Mannering, Lucia Rapanotti. 23-32 [doi]
- CROWN-C: A High-Assurance Service-Oriented Grid Middleware SystemPaul Townend, Nik Looker, Dacheng Zhang, Jie Xu, Jianxin Li, Liang Zhong, Jinpeng Huai. 35-44 [doi]
- Systems Architectures for Transactional Network InterfaceManish Marwah, Shivakant Mishra, Christof Fetzer. 45-52 [doi]
- An Efficient Experimental Methodology for Configuring Search-Based Design AlgorithmsSimon M. Poulding, Paul Emberson, Iain Bate, John Clark. 53-62 [doi]
- A Typed Compositional Language for Real-Time SystemsJean-Paul Etienne, Samia Bouzefrane. 63-72 [doi]
- One in a Baker s Dozen: Debugging DebuggingJeffrey M. Voas, Keith W. Miller. 75-81 [doi]
- Delegation-Based Security Model for Web ServicesWei She, Bhavani M. Thuraisingham, I-Ling Yen. 82-91 [doi]
- Model Validation using Automatically Generated Requirements-Based TestsAjitha Rajan, Michael W. Whalen, Mats Per Erik Heimdahl. 95-104 [doi]
- A Coverage Relationship Model for Test Case Selection and Ranking for Multi-version SoftwareWei-Tek Tsai, Xinyu Zhou, Raymond A. Paul, Yinong Chen, Xiaoying Bai. 105-112 [doi]
- Enhanced Traverse of Web PagesLihua Duan, Yan Wang, Jessica Chen. 113-122 [doi]
- How can Previous Component Use Contribute to Assessing the Use of COTS?Silke Kuball. 123-130 [doi]
- Placement in Dependable and Secure Peer-to-Peer Data GridsManghui Tu, Liangliang Xiao, Hui Ma, I-Ling Yen, Farokh B. Bastani. 133-140 [doi]
- Vulnerability Discovery in Multi-Version Software SystemsJinyoo Kim, Yashwant K. Malaiya, Indrakshi Ray. 141-148 [doi]
- Testing Security Rules with Decomposable ActivitiesWissam Mallouli, Ana R. Cavalli. 149-155 [doi]
- Flexible Authorization with Decentralized Access Control Model for Grid ComputingXinwen Zhang, Qi Li, Jean-Pierre Seifert, Mingwei Xu. 156-165 [doi]
- Sustaining Property Verification of Synchronous Dependable Protocols Over ImplementationPéter Bokor, Marco Serafini, Áron Sisak, András Pataricza, Neeraj Suri. 169-178 [doi]
- Scalable, Adaptive, Time-Bounded Node Failure DetectionMatthew Gillen, Kurt Rohloff, Prakash Manghwani, Richard E. Schantz. 179-186 [doi]
- SyncProbe: Providing Assurance of Message Latency through Predictive Monitoring of Internet PathsJawwad Shamsi, Monica Brockmeyer. 187-196 [doi]
- Behavioral Fault Modeling for Model-based Safety AnalysisAnjali Joshi, Mats Per Erik Heimdahl. 199-208 [doi]
- Transformation-Based Library Adaptation for Embedded SystemsVictor L. Winter, Azamatbek Mametjanov, Steven E. Morrison, James A. McCoy, Gregory L. Wickstrom. 209-218 [doi]
- Multi-layered Data Consistency Technology, An Enhanced Autonomous Decentralized Data Consistency Technology for IC Card Ticket SystemAkio Shiibashi, Tsuyoshi Nakaniwa, Motoharu Yamana, Kinji Mori. 219-226 [doi]
- Model Transformation for High-Integrity Software Development in Derivative Vehicle Control System DesignShige Wang. 227-234 [doi]
- Precise Documentation of Critical SoftwareDavid Lorge Parnas, Sergiy A. Vilkomir. 237-244 [doi]
- Combining Software Quality Analysis with Dynamic Event/Fault Trees for High Assurance Systems EngineeringJoanne Bechta Dugan, Ganesh Pai, Hong Xu. 245-255 [doi]
- On the Verifiability of Programs Written in the Feature Language ExtensionsWu-Hon F. Leung. 256-263 [doi]
- Improving Reliability and Safety by Trading off Software Failure CriticalitiesAtef Mohamed, Mohammad Zulkernine. 267-274 [doi]
- Pattern-Based Modeling and Analysis of Failsafe Fault-Tolerance in UMLAli Ebnenasir, Betty H. C. Cheng. 275-282 [doi]
- A Stochastic Characterization of a Fault-Tolerant Gossip AlgorithmXiaohu Li, T. Paul Parker, Shouhuai Xu. 283-290 [doi]
- A New Architecture for Single-Event Detection & Reconfiguration of SRAM-based FPGAsEze Kamanu, Pratapa Reddy, Kenneth Hsu, Marcin Lukowiak. 291-298 [doi]
- On Exceptions, Exception Handling, Requirements and Software LifecycleAlexander Romanovsky. 301 [doi]
- Simulation Models and Implementation of a Simulator for the Performability Analysis of Electric Power Systems Considering InterdependenciesFrancesco Romani, Silvano Chiaradonna, Felicita Di Giandomenico, Luca Simoncini. 305-312 [doi]
- Empirical Study of Embedded Software Quality and ProductivityMichael F. Siok, Jeff Tian. 313-320 [doi]
- Availability Monitor for a Software Based SystemMarc Haberkorn, Kishor S. Trivedi. 321-328 [doi]
- Validation Support for Distributed Real-Time Embedded Systems in VDM++John S. Fitzgerald, Simon Tjell, Peter Gorm Larsen, Marcel Verhoef. 331-340 [doi]
- Verification of Automatically Generated Pattern-Based LTL SpecificationsSalamah Salamah, Ann Q. Gates, Vladik Kreinovich, Steve Roach. 341-348 [doi]
- Utilizing Test Case Generation to Inspect Formal Specifications for Completeness and FeasibilityShaoying Liu. 349-356 [doi]
- Multiple Pre/Post Specifications for Heap-Manipulating MethodsWei-Ngan Chin, Cristina David, Huu Hai Nguyen, Shengchao Qin. 357-364 [doi]
- A Fault Taxonomy for Service-Oriented ArchitectureStefan Brüning, Stephan Weißleder, Miroslaw Malek. 367-368 [doi]
- Advances in Quantum Computing Fault Tolerance and TestingDavid Y. Feinstein, V. S. S. Nair, Mitchell A. Thornton. 369-370 [doi]
- Preliminary Models of the Cost of Fault ToleranceRonald J. Leach. 371-372 [doi]
- Adding Autonomic Capabilities to Network Fault Management SystemYan Liu, Michael Jiang, David Raymer. 373-374 [doi]
- Information Assurance Architecture with Storyboarding ModelsAsesh Das. 377-378 [doi]
- Fuzzing Wi-Fi Drivers to Locate Security VulnerabilitiesManuel Mendonça, Nuno Ferreira Neves. 379-380 [doi]
- Towards a High Assurance Secure Computing PlatformMichael D. DiRossi. 381-382 [doi]
- High-Assurance Distributed, Adaptive Software for Dynamic SystemsKurt Rohloff, Joseph P. Loyall, Partha Pratim Pal, Richard E. Schantz. 385-386 [doi]
- Finance Sector: Requirements for High Assurance within Spatial SOA Based Grid InfrastructuresP. C. Donachy, Ronald H. Perrott, Terence J. Harmer, F. Sharkey. 387-388 [doi]
- A Mobile Agent-based Multi-Robot Design Method for High-AssuranceSung-Ook Shin, Jung-Oog Lee, Doo-Kwon Baik. 389-390 [doi]
- Building High Assurance Multidisciplinary Design Optimization FrameworkJeong-Oog Lee, Ho-Jun Lee. 391-392 [doi]
- Analytic Model for Web Anomalies ClassificationNasser Alaeddine, Jeff Tian. 395-396 [doi]
- Development of Custom Selling System Using Ad Hoc NetworksMasato Asada, Tomoyuki Ohta, Kenji Ishida, Yoshiaki Kakuda. 397-398 [doi]
- Research on Noise Problem of Reputation Estimation in Virtual EnterpriseShaofei Wu, Shixian Wang. 399-400 [doi]
- Measuring Reliability as a Mean Failure CostAli Mili, Frederick T. Sheldon. 403-404 [doi]
- An Early-Reply Based Framework: Reliable Concurrency that Is VerifiableStephen W. Cook, Bjarne Stroustrup, Scott M. Pike. 405-406 [doi]
- A Safety Analysis Framework for COTS Microprocessors in Safety-Critical ApplicationsJason D. Lee, Praveen Bhojwani, Rabi N. Mahapatra. 407-408 [doi]
- Automated Test Data Generation and Reliability Assessment for Software in High Assurance SystemsBranson W. Murrill. 409-410 [doi]
- Parsimonious Classifiers for Software Quality AssessmentMiyoung Shin, Sunida Ratanothayanon, Amrit L. Goel, Raymond A. Paul. 411-412 [doi]
- Methodology for Evaluating Aeronautical Regulations using Formal SpecificationsEduardo Rafael López Ruiz. 415-416 [doi]
- Model-Checker-Based Testing of LTL SpecificationsLuis García, Steve Roach. 417-418 [doi]
- A Formal Approach to Website MaintenanceLihua Duan, Jessica Chen. 419-420 [doi]
- A Secure and Scalable Update Protocol for P2P Data GridsManghui Tu, Nasser Tadayon, Zhonghang Xia, Enyue Lu. 423-424 [doi]
- Design of a Fairness Guarantee Mechanism Based on Network MeasurementXin Wang, Xiaochen Zhang, Shuang Yang, Xiangyang Xue. 425-426 [doi]
- All-Optical Routing for High Assurance Computer SystemsEkpe Okorafor. 427-428 [doi]
- Duplication Based Integrated Task and Message Scheduling on a Heterogeneous Network of Workstations (NOWs)Nitin Auluck. 429-430 [doi]
- Modelling and Exploration Environment for Application Specific Multiprocessor SystemsIsmail Assayad, Sergio Yovine. 433-434 [doi]
- A Nonparametric Cusum Algorithm for Timeslot Sequences with Applications to Network SurveillanceQi Zhang, Carlos Rendón, Veronica Montes De Oca, Daniel R. Jeske, Mazda Marvasti. 435-436 [doi]
- High Assurance GPS Integrity Monitoring System Using Particle Filtering ApproachJeong-Oog Lee, Dae Hee Won, Sangkyung Sung, Taesam Kang, Young Jae Lee. 437-438 [doi]