Abstract is missing.
- FIRED - Fault Injector for Reconfigurable Embedded DevicesJose Luis Nunes, Tamas Pecserke, João Carlos Cunha, Mário Zenha Rela. 1-10 [doi]
- NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault DetectionClaudio Ciccotelli, Leonardo Aniello, Federico Lombardi, Luca Montanari, Leonardo Querzoni, Roberto Baldoni. 11-20 [doi]
- Cooperative Exceptions for Concurrent ObjectsBruno Cabral, Alcides Fonseca, Paulo Marques, Jonathan Aldrich. 21-31 [doi]
- Scheduling Independent Tasks with Voltage OverscalingAurélien Cavelan, Yves Robert, Hongyang Sun, Frédéric Vivien. 32-41 [doi]
- A Smart Fuzzing Method for Detecting Heap-Based Buffer Overflow in Executable CodesMaryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari. 42-49 [doi]
- Unifying Dependability of Critical Infrastructures: Electric Power System and ICT: Concepts, Figures of Merit and TaxonomyIgor Kaitovic, Slobodan Lukovic, Miroslaw Malek. 50-59 [doi]
- Cyber-Physical Topology Language: Definition, Operations, and ApplicationCarmen Cheh, Gabriel A. Weaver, William H. Sanders. 60-69 [doi]
- Experimental Evaluation of Stealthy Attack Detection in a RobotGiedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya P. Mathur. 70-79 [doi]
- A Transformational Approach for the Hardening of Region-Adherent AlgorithmsDilshod Rahmatov, Jan Steffen Becker, Oliver E. Theel. 80-90 [doi]
- Application-Oriented Sensor Network Architecture for Dependable Structural Health MonitoringMd. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xiaofei Xing, Xiangyong Liu. 91-98 [doi]
- Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor NetworksChen Gu, Matthew Bradbury, Arshad Jhumka, Matthew Leeke. 99-108 [doi]
- Optimizing Sensor Nodes Placement for Fault-Tolerant Trilateration-Based LocalizationKatarina Balac, Mauro Prevostini, Miroslaw Malek. 109-118 [doi]
- Deriving Hierarchical Safety ContractsOmar Jaradat, Iain Bate. 119-128 [doi]
- Using Safety Contracts to Guide the Integration of Reusable Safety Elements within ISO 26262Irfan Sljivo, Barbara Gallina, Jan Carlson, Hans Hansson. 129-138 [doi]
- Failure Analyses of Communications Systems and Networks by Publicly Available Failure Information from the viewpoint of DependabilityKoichi Bando, Yutaka Matsuno, Kenji Tanaka. 139-148 [doi]
- Survivability Quantification of Wireless Ad Hoc Network Taking Account of Border EffectsZhipeng Yi, Tadashi Dohi, Hiroyuki Okamura. 149-158 [doi]
- Availability Modeling and Analysis for Software Defined NetworksTuan-Anh Nguyen, Taehoon Eom, SeongMo An, Jong Sou Park, Jin B. Hong, Dong Seong Kim. 159-168 [doi]
- A Scalable Optimization Framework for Storage Backup Operations Using Markov Decision ProcessesRuofan Xia, Fumio Machida, Kishor S. Trivedi. 169-178 [doi]
- A Survey on Data Quality: Classifying Poor DataNuno Laranjeiro, Seyma Nur Soydemir, Jorge Bernardino. 179-188 [doi]
- Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity MonitoringBenoit Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant. 189-198 [doi]
- Differentiated Failure Remediation with Action Selection for Resilient ComputingSong Huang, Song Fu, Nathan DeBardeleben, Qiang Guan, Cheng-Zhong Xu. 199-208 [doi]
- Eventual Leader Election Despite Crash-Recovery and Omission FailuresChristian Fernández-Campusano, Mikel Larrea, Roberto Cortiñas, Michel Raynal. 209-214 [doi]
- ARMOR: Adaptive Reliability Management by On-the-Fly Redundancy in Multicore Embedded ProcessorsFarshad Baharvand, Seyed Ghassem Miremadi. 215-224 [doi]
- Hardware Fault Compensation Using Discriminative LearningFarah Naz Taher, Joseph Callenes-Sloan. 225-234 [doi]
- Combining Low IO-Operations During Data Recovery with Low Parity Overhead in Two-Failure Tolerant Archival Storage SystemsThomas J. E. Schwarz, Ahmed Amer, Jehan-François Pâris. 235-244 [doi]
- Triple Failure Tolerant Storage Systems Using Only Exclusive-Or Parity CalculationsThomas J. E. Schwarz, Darrell D. E. Long, Jehan-François Pâris. 245-254 [doi]
- Failure Recovery Cost Reduction of Disk Arrays Using Adaptive Erasure Correction Coding and Data CompressionHaruhiko Kaneko. 255-263 [doi]
- Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based TrackingMatthew Ruffell, Jin B. Hong, Dong Seong Kim. 264-272 [doi]
- A Method of Diagnostic Test Generation for Transition FaultsRenji Ono, Satoshi Ohtake. 273-278 [doi]
- TREBIVETM: A TREe Based Integrity Verification Environment for Non-volatile Memory SystemMikio Hashimoto, Naoko Yamada, Jun Kanai. 279-289 [doi]
- A Method of Self-Adaptive Pre-Copy Container CheckpointXiao Chen, Jian-Hui Jiang, Qu Jiang. 290-300 [doi]
- Component Importance Measures for Real-Time Computing Systems in the Presence of Common-Cause FailuresJunjun Zheng, Hiroyuki Okamura, Tadashi Dohi. 301-310 [doi]
- Bayesian Analysis for Software Reliability with Fault Detection and Correction DataLujia Wang, Qingpei Hu, Min Xie. 311-312 [doi]
- Software Rejuvenation Schemes for Time Warp-Based PDESSatoshi Fukumoto, Mamoru Ohara. 313-314 [doi]
- A Dual-FPGA Architecture with Rejuvenation for Realtime ApplicationsAromhack Saysanasongkham, Satoshi Fukumoto. 315-316 [doi]
- A Personalized Access Control Based on IoTJae J. Jang, Jaekun Moon, Im Y. Jung. 317-318 [doi]
- Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure ScenariosSumeet Jauhar, Binbin Chen, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol. 319-324 [doi]
- Parasitic Parameters Impacts Investigation on Soft Error Rate by a Circuit Level FrameworkWeiguang Sheng, Zhongyuan Zhao, Zhigang Mao. 325-326 [doi]
- SYNDICATE: Software Platform for Distributed Real-Time SystemEunji Pak, Young Mok Ha, Jeman Park, Yongyeon Kim, Moonsub Song, Taeho Kim. 327-328 [doi]