Abstract is missing.
- Towards Dependable Web ServicesMarkus Debusmann, Kurt Geihs. 5-14 [doi]
- Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous ReceiversGunjan Khanna, Saurabh Bagchi, John Rogers. 15-24 [doi]
- An Algorithmic Approach to Identifying Link FailuresMohit Lad, Akash Nanavati, Daniel Massey, Lixia Zhang. 25-34 [doi]
- Cache Scrubbing in Microprocessors: Myth or Necessity?Shubhendu S. Mukherjee, Joel S. Emer, Tryggve Fossum, Steven K. Reinhardt. 37-42 [doi]
- Application-Level Fault Tolerance in the Orbital Thermal Imaging SpectrometerE. Ciocca, Israel Koren, Zahava Koren, C. Mani Krishna, Daniel S. Katz. 43-48 [doi]
- Error Detection Enhancement in COTS Superscalar Processors with Event Monitoring FeaturesAmir Rajabzadeh, Mirzad Mohandespour, Seyed Ghassem Miremadi. 49-54 [doi]
- A Hybrid Approach for Building Eventually Accurate Failure DetectorsAchour Mostéfaoui, David Powell, Michel Raynal. 57-65 [doi]
- Systematic Comparisons of RDT Communication-Induced Checkpointing ProtocolsJichiang Tsai. 66-75 [doi]
- On the Effects of Partial Membership Knowledge on Reliability of Gossip-Based MulticastTatsuhiro Tsuchiya, Tohru Kikuno. 76-83 [doi]
- Measuring Notification Loss in Publish/Subscribe Communication SystemsRoberto Baldoni, Roberto Beraldi, Sara Tucci Piergiovanni, Antonino Virgillito. 84-93 [doi]
- Safety Testing of Safety Critical Software Based on Critical Mission DurationShiping Yang, Nan Sang, Guangze Xiong. 97-102 [doi]
- Optimal Allocation of Testing-Resource Considering Cost, Reliability, and Testing-EffortChin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, Michael R. Lyu. 103-112 [doi]
- Quantifying the Variance in Application ReliabilitySwapna S. Gokhale. 113-121 [doi]
- Software Rejuvenation Policies for Cluster Systems under Varying WorkloadWei Xie, Yiguang Hong, Kishor S. Trivedi. 122-129 [doi]
- Using Modulo Rulers for Optimal Recovery Schemes in Distributed ComputingKamilla Klonowska, Lars Lundberg, Håkan Lennerstad, Charlie Svahnberg. 133-142 [doi]
- Analysis of Read and Write Availability for Generalized Hybrid Data Replication ProtocolMasayuki Arai, Tabito Suzuki, Mamoru Ohara, Satoshi Fukumoto, Kazuhiko Iwasaki, Hee Yong Youn. 143-150 [doi]
- A Dynamic Checkpointing Scheme Based on Reinforcement LearningHiroyuki Okamura, Yuki Nishimura, Tadashi Dohi. 151-158 [doi]
- Availabilities and Costs of Reliable Fat-BtreesJun Miyazaki, Yohei Abe, Haruo Yokota. 163-172 [doi]
- Node-to-Node Internally Disjoint Paths Problem in Bubble-Sort GraphsKeiichi Kaneko, Yasuto Suzuki. 173-182 [doi]
- Fault-Tolerant Message Switching Based on Wormhole Switching and BacktrackingManabu Sueishi, Masato Kitakami, Hideo Ito. 183-190 [doi]
- Reliability Evaluation of Dependable Distributed Computing Systems Based on Recursive Merge and BDDYung-Ruei Chang, Hung-Yau Lin, Sy-Yen Kuo. 197-206 [doi]
- Expected-Reliability Analysis for Wireless CORBA with Imperfect ComponentsXinyu Chen, Michael R. Lyu. 207-215 [doi]
- Nonsystematic M-Ary Asymmetric Error Correcting Codes Designed by Multilevel Coding MethodHaruhiko Kaneko, Mariko Numakami, Eiji Fujiwara. 219-226 [doi]
- Protecting Wavelet Lifting TransformsG. Robert Redinbo, Cung Nguyen. 227-236 [doi]
- Connecting Network Partitions with Location-Assisted Forwarding Nodes in Mobile Ad Hoc EnvironmentsChia-Ho Ou, Kuo-Feng Ssu, Hewijin Christine Jiau. 239-247 [doi]
- Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc NetworkSerdar Cabuk, Nipoon Malhotra, Longbi Lin, Saurabh Bagchi, Ness B. Shroff. 248-257 [doi]
- Benchmarking Operating System Dependability: Windows 2000 as a Case StudyAli Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun. 261-270 [doi]
- The System Recovery BenchmarkJames Mauro, Ji Zhu, Ira Pramanick. 271-280 [doi]
- Aspects for Improvement of Performance in Fault-Tolerant SoftwareDiana Szentiványi, Simin Nadjm-Tehrani. 283-291 [doi]
- A Freshness Detection Mechanism for Railway ApplicationsAndrea Bondavalli, Enrico De Giudici, Stefano Porcarelli, Salvatore Sabina, Fabrizio Zanini. 292-301 [doi]
- RedCAN: Simulations of Two Fault Recovery Algorithms for CANHåkan Sivencrona, Torbjörn Olsson, Roger Johansson, Jan Torin. 302-311 [doi]
- Evaluation of Memory Built-in Self Repair Techniques for High Defect Density TechnologieLorena Anghel, Nadir Achouri, Michael Nicolaidis. 315-320 [doi]
- Efficient Built-in Self-Test Techniques for Memory-Based FFT ProcessorsShyue-Kung Lu, Chien-Hung Yeh, Han-Wen Lin. 321-326 [doi]
- Evaluation of Fault-Tolerant Designs Implemented on SRAM-Based FPGAsGhazanfar Asadi, Seyed Ghassem Miremadi, Hamid R. Zarandi, Ali Reza Ejlali. 327-332 [doi]
- Panel Summary StatementsRaphael R. Some, Algirdas Avizienis, Jiri Gaisler, Hirokazu Ihara, Shubu Mukherjee, Neeraj Suri. 335-40 [doi]
- Improving AI Systems? Dependability by Utilizing Historical KnowledgeRainer Knauf, Setsuo Tsuruta, Hirokazu Ihara, Avelino J. Gonzalez, Torsten Kurbad. 343-352 [doi]
- Representing User Workarounds as a Component of System DependabilityChristopher Martin, Philip Koopman. 353-362 [doi]
- Stochastic Petri Nets and Inheritance for Dependability ModellingSimona Bernardi, Susanna Donatelli. 363-372 [doi]
- Dependability Analysis of a Class of Probabilistic Petri NetsHsu-Chun Yen, Lien-Po Yu. 373-380 [doi]
- Honeypots: Practical Means to Validate Malicious Fault AssumptionsMarc Dacier, Fabien Pouget, Hervé Debar. 383-388 [doi]
- Ferret: A Host Vulnerability Checking ToolAnil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders. 389-394 [doi]
- WINDAR: A Multithreaded Rollback-Recovery Toolkit on WindowsJin-Min Yang, Da-Fang Zhang, Zheng Qin, Xue Dong Yang. 395-400 [doi]
- Periodic Partial Validation: Cost-Effective Source Code Validation Process in Cross-Platform Software Development EnvironmentSheng Li, Jun Xu, Lijun Deng. 401-406 [doi]