Abstract is missing.
- Organizing Committees [doi]
- Referees [doi]
- Message from the General Co-Chairs [doi]
- A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics SystemYuan-Shun Dai, Michael G. Hinchey, Manish Madhusoodan, James L. Rash, Xukai Zou. 3-10 [doi]
- Adaptable and Autonomic Mission Manager for Dependable Aerospace ComputingIan A. Troxel, Alan D. George. 11-18 [doi]
- A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic SystemsJoaquín Peña, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés, Manuel Resinas. 19-30 [doi]
- A Reliable (k, n) Image Secret Sharing SchemeLi Bai. 31-36 [doi]
- Tamper-Evident Digital Signature Protecting Certification Authorities Against MalwareJong Youl Choi, Philippe Golle, Markus Jakobsson. 37-44 [doi]
- A Parallel GNFS Integrated with the Block Wiedemann s Algorithm for Integer FactorizationNa Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn. 45-50 [doi]
- A CRT-RSA Algorithm Secure against Hardware Fault AttacksSining Liu, Brian King, Wei Wang 0003. 51-60 [doi]
- A Game-Theoretic Approach to Stochastic Security and Dependability EvaluationKarin Sallhammar, Bjarne E. Helvik, Svein J. Knapskog. 61-68 [doi]
- Autonomous Decentralized Load Tracking Techniques and EvaluationTetsuya Masuishi, Koichi Shibata, Yasuyuki Oki, Kinji Mori. 69-76 [doi]
- Optimal Checkpoint Placement with Equality ConstraintsTadashi Dohi, Tatsuya Ozaki, Naoto Kaio. 77-84 [doi]
- Fault-Intrusion Tolerant Techniques in Wireless Sensor NetworksRuiping Ma, Liudong Xing, Howard E. Michel. 85-94 [doi]
- Modeling Security Vulnerabilities: A Constraints and Assumptions PerspectiveAnil Bazaz, James D. Arthur, Joseph G. Tront. 95-102 [doi]
- Assessing Vulnerabilities in Apache and IIS HTTP ServersSung-Whan Woo, Omar H. Alhazmi, Yashwant K. Malaiya. 103-110 [doi]
- Estimating Markov Modulated Software Reliability Models via EM AlgorithmTakao Ando, Hiroyuki Okamura, Tadashi Dohi. 111-118 [doi]
- Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow ModelingGustavo A. Chaparro-Baquero, Nayda G. Santiago, Wilson Rivera, Fernando Vega-Riveros. 119-128 [doi]
- Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1Xuejun Yang, Xiangli Qu, Chunmei Gui. 129-136 [doi]
- A Security-Supportive Middleware Architecture for Pervasive ComputingZhaoyu Liu, Dichao Peng. 137-144 [doi]
- Self-Adaptive Pervasive Computing Application Based on Code MobilitySongqiao Han, Shensheng Zhang, Yong Zhang. 145-154 [doi]
- Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy AttacksT. Paul Parker, Shouhuai Xu. 155-162 [doi]
- A Dynamic Countermeasure Method for Large-Scale Network AttacksZhaoyu Liu, Roopesh Uppala. 163-170 [doi]
- A Solution to Single Point of Failure Using Voter Replication and Disagreement DetectionAhmad Patooghy, Seyed Ghassem Miremadi, A. Javadtalab, Mahdi Fazeli, Navid Farazmand. 171-176 [doi]
- Runtime Security Verification for Itinerary-Driven Mobile AgentsZijiang Yang, Shiyong Lu, Ping Yang. 177-186 [doi]
- A Satisficing MOMIP Framework for Reliable Real-time Application SchedulingThanikesavan Sivanthi, Ulrich Killat. 187-194 [doi]
- Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based DatacentersQinghui Tang, Sandeep K. S. Gupta, Daniel Stanzione, Phil Cayton. 195-202 [doi]
- SmartC: A Component-Based Hierarchical Modeling Language for Automotive ElectronicsGuoqing Yang, Hong Li, Zhaohui Wu. 203-210 [doi]
- On Recognizing Virtual Honeypots and CountermeasuresXinwen Fu, Wei Yu, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham. 211-218 [doi]
- A Self-Tuning Multicast Flow Control Scheme Based on Autonomic TechnologyNaixue Xiong, Yanxiang He, Yan Yang, Laurence Tianruo Yang, Chao Peng. 219-226 [doi]
- Autonomic Security and Self-Protection based on Feature-Recognition with Virtual NeuronsYuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou. 227-234 [doi]
- Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple ProtocolsEmmanuel Hooper. 235-244 [doi]
- Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETsM. Masadeh Bani Yassein, Mohamed Ould-Khaoua, Lewis M. Mackenzie, Stylianos Papanastasiou. 245-249 [doi]
- Infrastructure Communication Reliability of Wireless Sensor NetworksAkhilesh Shrestha, Liudong Xing, Hong Liu. 250-257 [doi]
- Autonomic Sensor Networks: A New Paradigm for Collaborative Information ProcessingHui Kang, Xiaolin Li, Patrick J. Moran. 258-268 [doi]
- Architecture of Trustworthy NetworksXuehai Peng, Chuang Lin. 269-276 [doi]
- DRBTS: Distributed Reputation-based Beacon Trust SystemAvinash Srinivasan, Joshua Teitelbaum, Jie Wu. 277-283 [doi]
- Trusted Mobile Interaction via Extended Digital CertificatesWill Tao, Robert Steele. 284-292 [doi]
- Aclamate: An AOSD Security Framework for Access ControlAndrew Prunicki, Tzilla Elrad. 293-300 [doi]
- Composing Access Control Policies of Distributed ComponentsOmkar J. Tilak, Rajeev R. Raje, Xukai Zou. 301-307 [doi]
- PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer NetworkJunda Liu, Lin Ning, Yibo Xue, Dongsheng Wang. 308-314 [doi]
- An Algorithm for Privacy-Preserving Quantitative Association Rules MiningWeiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao. 315-324 [doi]
- Analysing Stream Authentication Protocols in Autonomous Agent-Based SystemsMehmet A. Orgun, Ji Ma, Chuchang Liu, Guido Governatori. 325-332 [doi]
- Automated Caching of Behavioral Patterns for Efficient Run-Time MonitoringNatalia Stakhanova, Samik Basu, Robyn R. Lutz, Johnny Wong. 333-340 [doi]
- Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication ServicesPhilip K. McKinley, Farshad A. Samimi, Jonathan K. Shapiro, Chiping Tang. 341-348 [doi]