Abstract is missing.
- Middleware of Real-Time Object Based Fault-Tolerant Distributed Computing Systems: Issues and Some ApproachesK. H. (Kane) Kim. 3-10 [doi]
- Novel Fault-Tolerant Techniques for High Capacity RAMsChih-Hsien Hsu, Shyue-Kung Lu, Sy-Yen Kuo. 11-18 [doi]
- Connectivity-Based Multichip Module RepairMinsu Choi, Nohpill Park, Fred J. Meyer, Fabrizio Lombardi. 19-26 [doi]
- SSD: An Affordable Fault Tolerant Architecture for Superscalar ProcessorsSeongwoo Kim, Arun K. Somani. 27-34 [doi]
- A Design-Diversity Based Fault-Tolerant COTS Avionics Bus NetworkSavio N. Chau, Joseph Smith, Ann T. Tai. 35-44 [doi]
- On the Choice of Checkpoint Interval Using Memory Usage Profile and Adaptive Time Series AnalysisJiman Hong, Sangsu Kim, Yookun Cho, Heon Young Yeom, Taesoon Park. 45-48 [doi]
- A Secure Checkpointing SystemHyo-Chang Nam, Jong Kim, Sung Je Hong, Sunggu Lee. 49-56 [doi]
- Optimal Checkpoint Interval Analysis Using Stochastic Petri NetGyung-Leen Park, Hee Yong Youn, Hyunseung Choo. 57-62 [doi]
- Dependability Analysis of a Fault-Tolerant ProcessorCristian Constantinescu. 63-67 [doi]
- Modeling the Dependability of N-Modular Redundancy on Demand under Malicious AgreementFabrizio Lombardi, Nohpill Park, Mohammad A. Al-Hashimi, Huay-min H. Pu. 68-75 [doi]
- OpenSESAME: An Intuitive Dependability Modeling Environment Supporting Inter-Component DependenciesMax Walter, Carsten Trinitis, Wolfgang Karl. 76-86 [doi]
- Optimal Software Rejuvenation Policy with DiscountingTadashi Dohi, Takashi Danjou, Hiroyuki Okamura. 87-94 [doi]
- Automatic Verification of Fault Tolerance Using Model CheckingTomoyuki Yokogawa, Tatsuhiro Tsuchiya, Tsuchiya Kikuno. 95-102 [doi]
- Analysis of Periodic Preventive Maintenance with General System Failure DistributionDongyan Chen, Kishor S. Trivedi. 103-110 [doi]
- Fault-Tolerant Routing in Two-Dimensional Mesh Networks with Less-Restricted Fault PatternsSheng-De Wang, Pao Hwa Sui. 111-118 [doi]
- Availability Considerations in Network DesignJacques Philippe Sauvé, Flávia Estelia Silva Coelho. 119-126 [doi]
- Escape and Restoration Routing: Suspensive Deadlock Recovery in Interconnection NetworksToshinori Takabatake, Masato Kitakami, Hideo Ito. 127-136 [doi]
- Impact of a Failure Detection Mechanism on the Performance of ConsensusNicole Sergent, Xavier Défago, André Schiper. 137-145 [doi]
- An Adaptive Failure Detection ProtocolChristof Fetzer, Michel Raynal, Frederic Tronel. 146-153 [doi]
- Rejuvenation and Failure Detection in Partitionable SystemsChristof Fetzer, Karin Högstedt. 154-164 [doi]
- Implications of Dependable Computing in Banking IndustrySam Soo Pyo. 165-168 [doi]
- Automatic Reconfiguration of an Autonomous Disk ClusterDaisuke Ito, Haruo Yokota. 169-172 [doi]
- Partial Order Reduction in Verification of Wheel Structured Parameterized CircuitsTomoya Kitai, Tomohiro Yoneda. 173-182 [doi]
- ECC: Extended Condition Coverage for Design Verification Using Excitation and ObservationByeong Min, Gwan Choi. 183-190 [doi]
- Development of a Fail-Safe Microprocessor LSI with Self-Diagnosis Mechanism Depending on an M-Sequence Code SignatureSei Takahashi, Munehisa Taira, Hidetaka Saegusa, Takehiko Hoshino, Hideo Nakamura. 191-198 [doi]
- Cache Management of Dynamic Source Routing for Fault Tolerance in Mobile Ad Hoc NetworksChing-Hua Chuan, Sy-Yen Kuo. 199-205 [doi]
- An Adaptive Routing Protocol Supporting Reliable Communication in Wireless Ad-Hoc Network EnvironmentsMoon Jeong Kim, Young Ik Eom. 206-213 [doi]
- Enhanced Token Delivery Scheme for Reliable Multicasting in Wireless NetworksJi Y. Lim, Tai M. Chung. 214-217 [doi]
- Ticket Based Authentication and Payment Protocol for Mobile Telecommunications SystemsByung-Rae Lee, Tai-Yun Kim, Sang-Seung Kang. 218-224 [doi]
- Evaluating Low-Cost Fault-Tolerance Mechanism for Microprocessors on Multimedia ApplicationsToshinori Sato, Itsujiro Arita. 225-232 [doi]
- Analytical Results for Reconfiguration of E-11/2- Track Switch Torus Arrays with Multiple Fault TypesTadayoshi Horita, Itsuo Takanami. 233-240 [doi]
- A Generic Availability Model for Clustered Computing SystemHairong Sun, James J. Han, Haim Levendel. 241-250 [doi]
- ARQ in Optical NetworksPaul Oprisan, Bella Bose. 251-257 [doi]
- Analysis of Using Convolutional Codes to Recover Packet Losses over Burst Erasure ChannelsMasayuki Arai, Anna Yamamoto, Anna Yamaguchi, Satoshi Fukumoto, Kazuhiko Iwasaki. 258-265 [doi]
- Secure Access to Personalized Web ServicesG. B. Barone, N. Margarita, Antonino Mazzeo, Nicola Mazzocca, Luigi Romano. 266-272 [doi]
- Failure Detection Mechanism for Distributed Object Computing Using CORBAWei-Cheng Su, Szu-Chi Wang, Sy-Yen Kuo. 273-280 [doi]
- The Implementation and Analysis of OCI-Based Group Communication Support in CORBADongman Lee, Dukyun Nam, Hee Yong Youn, Chansu Yu. 281-288 [doi]
- Ticket-Based Secure Delegation Service Supporting Multiple Domain ModelsKyung-Ah Chang, Tae-Seung Lee, Bang-Hung Chun, Tai-Yun Kim. 289-294 [doi]
- A Study on the System Call for the Protection of Intellectual Property Rights on Linux BaseHeun Kim, Dae-Joon Hwang. 295-298 [doi]
- Extended BLP Security Model Based on Process Reliability for Secure Linux KernelJung-Min Kang, Wook Shin, C.-G. Park, Dong-Ik Lee. 299-303 [doi]
- Real-Time Fingerprints Recognition Mechanism-Based on Digital Contents Protection System for Interaction on WebYang-Koo Kang, Moon-Hyun Kim. 304-310 [doi]
- A Case Study: Validation of Guidance Control Software Requirements for Completeness, Consistency and Fault ToleranceFrederick T. Sheldon, Hye Yeon Kim, Zhihe Zhou. 311-318 [doi]
- Fault-Tolerance of Functional Programs Based on the Parallel Graph ReductionMasato Kitakami, Shunji Kubota, Hideo Ito. 319-324 [doi]
- TREG: Transactional Services Based on Incremental MessagesCarlos Pérez, Germán Fabregat, Rafael J. Martínez, Juan J. Villaplana. 325-332 [doi]
- Approximation Method for Probability Distribution Functions Using Cox Distribution to Evaluate Multimedia SystemsYukie Sasaki, Hiroei Imai, Masahiro Tsunoyama, Ikuo Ishii. 333-340 [doi]
- Dependable Automatic Train Control System Using Digital Track SignalsMasayuki Matsumoto, Tadao Tsurumaki, Tatsuya Shigeta, Korefumi Tashiro, Dai Watanabe. 341-346 [doi]
- Validating Real-Time Constraints in Embedded SystemsR. K. Shyamasundar, J. V. Aghav. 347-355 [doi]
- Table Driven Proportional Access Based Real-Time Ethernet for Safety-Critical Real-Time SystemsDaeyoung Kim, Yoonmee Doh, Yann-Hang Lee. 356-363 [doi]
- Intelligent Fault-Tolerant CORBA Service on Real-Time CORBAYoungjae Kim, Sungjune Hong, Kiyong Park, Keecheon Kim, Sunyoung Han. 364-370 [doi]
- Instantaneous Availability and Interval Availability for Systems with Time-Varying Failure Rate: Stair-Step ApproximationHairong Sun, James J. Han. 371-374 [doi]
- Safety Analysis by Box Modeling Method of System Behavior -- Application to Train Control SystemShigeto Hiraguri, Noriyuki Nishibori, Yasuko Hidaka, Takayuki Kasai, Hideo Nakamura. 375-378 [doi]
- Safety Analysis Using Temporal DatabaseHiromi Kobayashi. 379-382 [doi]