Abstract is missing.
- Dependable Computing in the Context of Mobility, Nomadicity, Ubiquity, and PervasivenessW. Kent Fuchs. 3 [doi]
- Why Do Software Projects Fail? Reasons and a Solution Using a Bayesian Classifier to Predict Potential RiskTohru Kikuno. 4 [doi]
- Sigma: A Fault-Tolerant Mutual Exclusion Algorithm in Dynamic Distributed Systems Subject to Process Crashes and Memory LossesWei Chen, Shiding Lin, Qiao Lian, Zheng Zhang. 7-14 [doi]
- Intersecting Sets: a Basic Abstraction for Asynchronous Agreement ProblemsRoy Friedman, Achour Mostéfaoui, Michel Raynal. 15-22 [doi]
- Decision Optimal Early-Stopping k-set Agreement in Synchronous Systems Prone to Send Omission FailuresPhilippe Raipin Parvédy, Michel Raynal, Corentin Travers. 23-30 [doi]
- Privacy-Preserving Bayesian Network Structure Learning on Distributed Heterogeneous DataHongmei Wang, Zheng Zhao, Zhi-Wei Sun. 31-40 [doi]
- Simultaneous Simulation of Alternative System ConfigurationsShravan Gaonkar, William H. Sanders. 41-48 [doi]
- Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case studyCristina Simache, Mohamed Kaâniche. 49-56 [doi]
- On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software ComponentsJuan Carlos Ruiz, José Carlos Campelo, Pedro J. Gil, Juan Pardo. 57-64 [doi]
- Bayesian Networks Modeling for Software Inspection EffectivenessY. P. Wu, Q. P. Hu, S. H. Ng, M. Xie. 65-74 [doi]
- Application-Based Metrics for Strategic Placement of DetectorsKarthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 75-82 [doi]
- A Hardware Approach to Concurrent Error Detection Capability Enhancement in COTS ProcessorsAmir Rajabzadeh, Seyed Ghassem Miremadi. 83-90 [doi]
- Optimal Fault-Tolerant Routing Scheme for Generalized HypercubeShaohuai Tian, Yingping Lu, Dafang Zhang. 91-100 [doi]
- High-Order Syndrome Testing for VLSI CircuitsShiyi Xu. 101-108 [doi]
- A New BIST Solution for System-on-ChipZhang Ling, Kuang Jishun. 109-113 [doi]
- A Failure-Aware Model for Estimating and Analyzing the Efficiency of Web Services CompositionsNeila Ben Lakhal, Takashi Kobayashi, Haruo Yokota. 114-124 [doi]
- Code Design and Decoding Methods for Burst Error Locating CodesMasato Kitakami, Junpei Sano. 125-132 [doi]
- An Evaluation of the Virtual Router Redundancy Protocol Extension with Load BalancingJen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai. 133-139 [doi]
- Formal Development of Software for Tolerating Transient FaultsDubravka Ilic, Elena Troubitsyna. 140-150 [doi]
- On the Fully-Informed Communication-Induced Checkpointing ProtocolJichiang Tsai, Jenn-Wei Lin. 151-158 [doi]
- Optimal Choice of Checkpointing Interval for High AvailabilityDiana Szentiványi, Simin Nadjm-Tehrani, John M. Noble. 159-166 [doi]
- An Improved Scheme of Index-Based CheckpointingYuan-sheng Luo, Dafang Zhang, Yinghua Min. 167-174 [doi]
- Compression/Scan Co-Design for Reducing Test Data Volume, Scan-in Power Dissipation and Test Application TimeYu Hu, Xiaowei Li, Huawei Li, Xiaoqing Wen. 175-182 [doi]
- Partitioned Cache Shadowing for Deep Sub-Micron (DSM) RegimeHeng Xu, Arun K. Somani. 183-192 [doi]
- Proxy Cryptography for Secure Inter-domain Information ExchangesShuanghe Peng, Zhen Han. 193-199 [doi]
- Anomaly Detection with High Deviations for System SecurityXinguang Peng, Kaifeng Ren. 200-207 [doi]
- A Multi-Faceted Approach towards Spam-Resistible MailMing-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo. 208-218 [doi]
- A Virtual Modeling and a Fast Algorithm for Grid Service ReliabilityYuan-Shun Dai, Xiaolong Wang, Min Xie. 219-226 [doi]
- Research on Architecture and Design Principles of COTS Components Based Generic Fault-Tolerant ComputerZhonghong Ou, Youguang Yuan, Xiaoyong Zhao. 227-234 [doi]
- Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision CoverageLili Pan, Junyi Li, Beiji Zou, Hao Chen. 235-244 [doi]
- A Reliable Routing Algorithm Based on Fuzzy Applicability of F sets in MANETRong Hu, Zhigang Hu, Hao Ma. 245-249 [doi]
- An Efficient Approach to Tolerating Route Errors in Mobile Ad Hoc NetworksJenn-Wei Lin, Jichiang Tsai, Chao-Ying Chiu. 250-257 [doi]
- A Novel Approach to Kernel Construction of China Bridge CAJian Leng, DongQin Xie. 258-268 [doi]
- Optimizing Service Strategy for Systems with Deferred RepairHairong Sun, Dong Tang, Robert B. Wood. 269-274 [doi]
- Trust-Enhanced Alteration Scenario for Universal ComputerJiang-chun Ren, Kui Dai, Zhiying Wang. 275-280 [doi]
- Mining Alarm Database of Telecommunication Network for Alarm Association RulesYangyang Wu, Shuguang Du, Wei Luo. 281-286 [doi]
- On Automating Failure Mode Analysis and Enhancing its IntegrityKam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkalai. 287-294 [doi]
- A Novel R:::2:::-FLC Dynamic Buffer Size Tuner to Support Time-Critical Applications over the Internet by Improving Logical Channel Fault Tolerance to Shorten Roundtrip TimeWilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon. 295-299 [doi]
- Design of Defect Tolerant Wallace MultiplierKazuteru Namba, Hideo Ito. 300-304 [doi]
- Resilient State Machine ReplicationPaulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo. 305-309 [doi]
- Contribution of Controller Area Networks Controllers to Masquerade FailuresHassan Salmani, Seyed Ghassem Miremadi. 310-316 [doi]
- Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc NetworksMichael Pan, Sheng-Yan Chuang, Sheng-De Wang. 317-324 [doi]
- Centralized Surveillance of Unused Address Space by using Virtual NetworksTakashi Minohara, Satoshi Ishikawa, Masahiro Amano. 325-332 [doi]
- A Distributed Location Service for Reducing Query Failures in Geographic Ad Hoc RoutingChih-Hsun Chou, Kuo-Feng Ssu, Hewijin Christine Jiau. 333-342 [doi]
- Server Protection through Dynamic PatchingNicolas Loriant, Marc Ségura-Devillechaise, Jean-Marc Menaud. 343-349 [doi]
- Detection of Malicious Transactions in DBMSMarco Vieira, Henrique Madeira. 350-357 [doi]
- Dynamic Window-based Adaptive Fault Monitoring for Ubiquitous Computing SystemsSu Myeong Lee, Hee Yong Youn. 358-368 [doi]
- Research on Control Flags-based Weighted Authentication Trustworthiness ModelLunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang. 369-373 [doi]
- Towards Push-of-a-Button Stability Verification for Discrete-Time Hybrid SystemsHenning Burchardt, Jens Oehlerking, Oliver E. Theel. 374-378 [doi]
- Reliability Prediction and Assessment of Fielded Software Based on Multiple Change-Point ModelsChin-Yu Huang, Chu-Ti Lin. 379-386 [doi]
- A Note on a Simple Equivalence between Round-based Synchronous and Asynchronous ModelsMichel Raynal, Matthieu Roy. 387-392 [doi]
- Neural Network based on Dynamic Tunneling Technique for Weather ForecastZheng Qin, Jinmin Yang, Haoliang Wang, Bin Wang, Jianjun Zou. 393-397 [doi]
- FPGA Authentication Header (AH) Implementation for Internet AppliancesChang-Chun Cheng, Wei-Ming Chen, Han-Chieh Chao, Yao-Po Wang. 398-403 [doi]
- Development of Dependable Real-Time Systems with ZerberusChristian Buckl, Alois Knoll, Gerhard Schrott. 404-408 [doi]