Abstract is missing.
- Program Committee [doi]
- Preface [doi]
- Organizing Committee [doi]
- UML Based Reverse Engineering for the Verification of Railway Control LogicsChiara Abbaneo, Francesco Flammini, Armando Lazzaro, Pietro Marmo, Nicola Mazzocca, Angela Sanseviero. 3-10 [doi]
- Compatibility of Software Components - Modeling and VerificationD. C. Craig, Wlodzimierz M. Zuberek. 11-18 [doi]
- Feasibility Analysis of MDA-based Database DesignIwona Dubielewicz, Bogumila Hnatkowska, Zbigniew Huzar, Lech Tuzinkiewicz. 19-26 [doi]
- Embedded Systems Modeling LanguageArtur Krystosik. 27-34 [doi]
- State Model of Service ReliabilityZ. Lipinski. 35-42 [doi]
- Partially automatic generation of fault-trees with time dependenciesJan Magott, Pawel Skrobanek. 43-50 [doi]
- Formal Semantics and Reasoning about UML Class DiagramMarcin Szlenk. 51-59 [doi]
- Information Security Systems vs. Critical Information Infrastructure Protection Systems - Similarities and DifferencesAndrzej Bialas. 60-67 [doi]
- Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux SystemsRadoslaw Brendel, Henryk Krawczyk. 68-75 [doi]
- Enhancing Fault Injection TestbenchJanusz Sosnowski, Piotr Gawkowski, Przemyslaw Zygulski, Andrzej Tymoczko. 76-83 [doi]
- Hazard Prevention by Forced Time ConstraintsGrzegorz Golaszewski, Janusz Górski. 84-91 [doi]
- An Approach for Evaluating Trust in IT InfrastructureMarek Zagorski, Janusz Górski. 92-99 [doi]
- Introduction to the Dependability Modeling of Computer SystemsWojciech Zamojski, Dariusz Caban. 100-109 [doi]
- Survey of Recovery Schemes in MPLS NetworksLuísa Jorge, Teresa Gomes. 110-118 [doi]
- d-HMAC Dynamic HMAC functionMohannad Najjar, Firas Najjar. 119-126 [doi]
- Security Aspects of SCADA and Corporate Network Interconnection: An OverviewPaulo S. Motta Pires, Luiz Affonso H. G. Oliveira. 127-134 [doi]
- Building Dependable Intrusion Prevention SystemsJakub Botwicz, Piotr Buciak, Piotr Sapiecha. 135-142 [doi]
- Bandwidth control in redundant news server linksTomasz R. Surmacz. 143-149 [doi]
- Fault Tolerant Topological Design for Computer NetworksEwa Szlachcic. 150-159 [doi]
- Selecting Technology for Disaster RecoveryRafal Cegiela. 160-167 [doi]
- Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux SystemsJan-Thomas Czornack, Carsten Trinitis, Max Walter. 168-174 [doi]
- Applying Software Rejuvenation in a Two Node Cluster System for High AvailabilitVasilis P. Koutras, Agapios N. Platis. 175-182 [doi]
- Security of Web ServicesH. Krawczyk, M. Wiel. 183-190 [doi]
- Model-based Automatic Test Generation for Event-Driven Embedded Systems using Model CheckersZoltán Micskei, István Majzik. 191-198 [doi]
- An Empirical Study on a Specification-Based Program Review ApproachFumiko Nagoya, Yuting Chen, Shaoying Liu. 199-206 [doi]
- Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference MatrixLuai Al Shalabi, Zyad Shaaban. 207-214 [doi]
- Evaluation of Dependability of Multi-tier Internet Business Applications with Queueing NetworksAndrzej Zalewski, Andrzej Ratkowski. 215-222 [doi]
- Security Enhancement of Java Remote Method InvocationDominik Zalewski. 223-231 [doi]
- Byzantine Fault Tolerance for Agent SystemsTadashi Araragi. 232-239 [doi]
- CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host AttackVelik Bellemin, Tadashi Araragi. 240-247 [doi]
- Distributed Intrusion Detection Framework based on Autonomous and Mobile AgentsDalila Boughaci, Habiba Drias, Ahmed Bendib, Youcef Bouznit, Belaid Benhamou. 248-255 [doi]
- A Distributed Firewall using Autonomous AgentsDalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, Belaid Benhamou. 256-263 [doi]
- A Regulatory Software Maintenance Environment Using Agent-Based Software Configuration ManagementI-Hsin Chou, Chin-Feng Fan. 264-275 [doi]
- Self-Dual Modules in Design of Dependable Digital DevicesJanusz Biernat. 276-281 [doi]
- Low-cost and Universal Secure Scan: a Design- Architecture for Crypto ChipsMarcin Gomulkiewicz, Maciej Nikodem, Tadeusz Tomczak. 282-288 [doi]
- CAD software for designing of Totally Self Checking Sequential CircuitsJerzy W. Greblicki. 289-297 [doi]
- Residue Arithmetic in FPGA MatricesTadeusz Tomczak. 297-305 [doi]
- Risk Assessment Tool for Maintenance SelectionGeorge J. Anders, Jaroslaw Sugier. 306-313 [doi]
- Securing of Integrated Protection of Technical Information by Application of Special Engineering DecisionsO. V. Berestnev, E. M. Kharitonov. 314-318 [doi]
- A Multi-tier Architecture to Safely Share Digital Medical ImagesSamia Boucherkha, Mohamed Benmohamed. 319-326 [doi]
- Digital Instrumentation and Control Failure Events Derivation and Analysis for Advanced Boiling Water ReactorHui-Wen Huang, Wei-Yi Yang, Chunkuan Shih, Swu Yih, Chang Tzeng, Cherng-Tsong Kuo, Ming-Huei Chen, Yuan-Chang Yu, Li-Hsin Wang, Hsun-Ho Wang, Chun-Yu Chen, Wan-Tsz Tu. 327-334 [doi]
- A Fault Tolerant Optimization Algorithm based on Evolutionary ComputationFrancisco Fernández de Vega. 335-342 [doi]
- Efficiency of Reliability Evaluation of Large Electric Power SystemsB. Kalinowski, G. Anders. 343-350 [doi]
- Estimation of Impact of Maintenance Policies on Equipment Risk of FailureHenryk Maciejewski, George Anders. 351-357 [doi]
- Computer modeling and simulation of discrete transport system with dispatcher for reliability and economic analysisJacek Mazurkiewicz, Tomasz Walkowiak. 358-365 [doi]
- Fuzzy approach to economic analysis of dispatcher driven discrete transport systemsTomasz Walkowiak, Jacek Mazurkiewicz. 366-373 [doi]
- Conception of Composing Learning Content into Learning Tree to Ensure Reliability of Learning MaterialMarek Woda. 374-381 [doi]