Abstract is missing.
- Transparent Redundancy in the Time-Triggered ArchitectureGünther Bauer, Hermann Kopetz. 5-13 [doi]
- Resource Scheduling in Dependable Integrated Modular AvionicsYann-Hang Lee, Daeyoung Kim, Mohamed F. Younis, Jeffrey X. Zhou, James McElroy. 14-23 [doi]
- Executable Assertions for Detecting Data Errors in Embedded Control SystemsMartin Hiller. 24 [doi]
- Experiences with Group Communication MiddlewareScott Johnson, Farnam Jahanian, Sunondo Ghosh, Brian Van Voorst, Nicholas Weininger. 37-42 [doi]
- Towards Dependable Home Networking: An Experience ReportYi-Min Wang, Wilf Russell, Anish Arora, Rajesh Jagannathan, Jun Xu. 43-48 [doi]
- Design, Implementation, and Performance of Checkpointing in NetSolveAdnan Agbaria, James S. Plank. 49 [doi]
- Efficient Incremental Checkpointing of Java ProgramsJulia L. Lawall, Gilles Muller. 61-70 [doi]
- A C/C++ Source-to-Source Compiler for Dependable ApplicationsAlfredo Benso, Silvia Chiusano, Paolo Prinetto, Luca Tagliaferri. 71 [doi]
- Assessment of the Applicability of COTS Microprocessors in High-Confidence Computing Systems: A Case StudyYutao He, Algirdas Avizienis. 81-86 [doi]
- Evaluating COTS Standards for Design of Dependable SystemsChris J. Walter, Neeraj Suri, T. Monaghan. 87 [doi]
- Whither Generic Recovery from Application Faults? A Fault Study using Open-Source SoftwareSubhachandra Chandra, Peter M. Chen. 97-106 [doi]
- Software-Implemented Fault Detection for High-Performance Space ApplicationsMichael J. Turmon, Robert Granat, Daniel S. Katz. 107 [doi]
- An Automatic SPIN Validation of a Safety Critical Railway Control SystemStefania Gnesi, Diego Latella, Gabriele Lenzini, C. Abbaneo, Arturo M. Amendola, P. Marmo. 119-124 [doi]
- Sensitivity Analysis on Dependencies in Dynamic Availability Models for Large SystemsMeng-Lai Yin, Craig L. Hyde, Rafael R. Arellano. 125 [doi]
- Fault-Tolerant Execution of Mobile AgentsLuís Moura Silva, Victor Batista, João Gabriel Silva. 135-143 [doi]
- Exploiting Non-Determinism for Reliability of Mobile Agent SystemsAjay Mohindra, Apratim Purakayastha, Prasannaa Thati. 144-156 [doi]
- A New Rolling Stock Architecture Using Safety Computers and NetworksJean-Baptiste Boullié, Michel Brun. 157-162 [doi]
- Reliability-Availability-Serviceability Characteristics of a Compressed-Memory SystemJim Chen, David Har, Ken Mak, Charles O. Schulz, R. Brett Tremaine, Michael E. Wazlowski. 163-168 [doi]
- A Fault Tolerant Signal Processing ComputerKenneth Prager, Michael Vahey, William Farwell, James Whitney, Jon Lieb. 169 [doi]
- Performability of Algorithms for Connection Admission ControlJohn F. Meyer. 181-190 [doi]
- On the Quality of Service of Failure DetectorsWei Chen, Sam Toueg, Marcos Kawazoe Aguilera. 191 [doi]
- Fault-Secure Scheduling of Arbitrary Task Graphs to Multiprocessor SystemsKoji Hashimoto, Tatsuhiro Tsuchiya, Tohru Kikuno. 203-212 [doi]
- Diagnosis of Regular StructuresAntonio Caruso, Stefano Chessa, Piero Maestrini, Paolo Santi. 213 [doi]
- OFTT: A Fault Tolerance Middleware Toolkit for Process Monitoring and Control Windows NT ApplicationsMyron Hecht, Xuegao An, Bing Zhang, Yutao He. 225-230 [doi]
- DEEM: A Tool for the Dependability Modeling and Evaluation of Multiple Phased SystemsAndrea Bondavalli, Ivan Mura, Silvano Chiaradonna, Roberto Filippini, S. Poli, F. Sandrini. 231-236 [doi]
- Loki: A State-Driven Fault Injector for Distributed SystemsRamesh Chandra, Ryan M. Lefever, Michel Cukier, William H. Sanders. 237-242 [doi]
- Sensitivity Analysis for System Design ImprovementSergio Contini, Stefan Scheer, Marc Wilikens. 243 [doi]
- Joint Evaluation of Performance and Robustness of a COTS DBMS through Fault-InjectionDiamantino Costa, Tiago Rilho, Henrique Madeira. 251-260 [doi]
- Robustness Testing of the Microsoft Win32 APICharles P. Shelton, Philip Koopman, Kobey Devale. 261 [doi]
- From Crash Fault-Tolerance to Arbitrary-Fault Tolerance: Towards a Modular ApproachRoberto Baldoni, Jean-Michel Hélary, Michel Raynal. 273-282 [doi]
- Dynamic Byzantine Quorum SystemsLorenzo Alvisi, Evelyn Tumlin Pierce, Dahlia Malkhi, Michael K. Reiter, Rebecca N. Wright. 283 [doi]
- A Tool Suite for Diagnosis and Testing of Software Design SpecificationsJ. Jenny Li, Joseph Robert Horgan. 295-304 [doi]
- Enabling Automated Analysis through the Formalization of Object-Oriented Modeling DiagramsBetty H. C. Cheng, Laura A. Campbell, Enoch Y. Wang. 305 [doi]
- Deadlock Detection of EFSMs Using Simultaneous Reachability AnalysisBengi Karaçali, Kuo-Chung Tai, Mladen A. Vouk. 315 [doi]
- A Low Latency, Loss Tolerant Architecture and Protocol for Wide Area Group CommunicationYair Amir, Claudiu Danilov, Jonathan Robert Stanton. 327-336 [doi]
- A Reliable Many-to-Many Multicast Protocol for Group Communication over ATM NetworksRuppert R. Koch, Louise E. Moser, P. M. Melliar-Smith. 337-346 [doi]
- A Gossip-Based Reliable Multicast for Large-Scale High-Throughput ApplicationsQixiang Sun, Daniel C. Sturman. 347 [doi]
- Fault-Tolerant Ethernet for IP-Based Process Control: A DemonstrationS. Song, Jiandong Huang, P. Kappler, R. Freimark, J. Gustin, T. Kozlik. 361-366 [doi]
- Demonstration of the Remote Exploration and Experimentation (REE) Fault-Tolerant Parallel-Processing Supercomputer for Spacecraft Onboard Scientific Data ProcessingFannie Chen, Loring Craymer, Jeff Deifik, Alvin J. Fogel, Daniel S. Katz, Alfred G. Silliman Jr., Raphael R. Some, Sean A. Upchurch, Keith Whisnant. 367 [doi]
- Test-Point Insertion to Enhance Test Compaction for Scan DesignsIrith Pomeranz, Sudhakar M. Reddy. 375-381 [doi]
- Method to Recover Internet Packet Losses Using (n, n - 1, m) Convolutional CodesMasayuki Arai, Anna Yamaguchi, Kazuhiko Iwasaki. 382 [doi]
- One-Shot Reed-Solomon Decoding for High-Performance Dependable SystemsYasunao Katayama, Sumio Morioka. 390 [doi]
- A Fault Injection Approach Based on Reflective ProgrammingEliane Martins, Amanda C. A. Rosa. 407-416 [doi]
- On the Emulation of Software Faults by Software Fault InjectionHenrique Madeira, Diamantino Costa, Marco Vieira. 417-426 [doi]
- Reliability Testing of Applications on Windows NTTimothy K. Tsai, Navjot Singh. 427 [doi]
- Implementing Flexible Object Group Invocation in Networked SystemsGraham Morgan, Santosh K. Shrivastava. 439-448 [doi]
- Implementing e-Transactions with Asynchronous ReplicationSvend Frølund, Rachid Guerraoui. 449-458 [doi]
- Data Replication Strategies for Fault Tolerance and Availability on Commodity ClustersCristiana Amza, Alan L. Cox, Willy Zwaenepoel. 459 [doi]
- Designing High-Performance & Reliable Superscalar Architectures: The out of Order Reliable Superscalar (O3RS) ApproachAvi Mendelson, Neeraj Suri. 473-481 [doi]
- Fault Tolerance through Re-Execution in Multiscalar ArchitectureFaisal Rashid, Kewal K. Saluja, Parameswaran Ramanathan. 482-491 [doi]
- A Fault Tolerance Infrastructure for Dependable Computing with High-Performance COTS ComponentsAlgirdas Avizienis. 492-500 [doi]
- Synthesis of Interconnection Networks: A Novel ApproachVijay Lakamraju, Zahava Koren, C. Mani Krishna. 501 [doi]
- The Best of Both Worlds: A Hybrid Approach to Solve ConsensusAchour Mostéfaoui, Michel Raynal, Frederic Tronel. 513-522 [doi]
- Synchronous System and Perfect Failure Detector: Solvability and Efficiency IssueBernadette Charron-Bost, Rachid Guerraoui, André Schiper. 523-532 [doi]
- he Timely Computing Base: Timely Actions in the Presence of Uncertain TimelinessPaulo Veríssimo, Antonio Casimiro, Christof Fetzer. 533-542 [doi]
- Reconfiguration Based Failure Restoration in Wavelength-Routed WDM NetworksG. Sai Kiran Reddy, C. Siva Ram Murthy, G. Manimaran. 543 [doi]
- Towards Continuous Availability of Internet Services through Availability DomainsNicholas S. Bowen, Daniel C. Sturman, Tina Ting Liu. 559-566 [doi]
- Issues in Interoperability and Performance Verification in a Multi-ORB Telecommunications EnvironmentCheng J. Lin, Alberto Avritzer, Elaine J. Weyuker, Sai Lai Lo. 567-575 [doi]
- Algorithms for Improving the Dependability of Firewall and Filter Rule ListsScott Hazelhurst, Adi Attar, Raymond Sinnappan. 576-585 [doi]
- Dynamic-Distributed Differentiated Service for Multimedia ApplicationsDam Q. Hai, Son T. Vuong. 586 [doi]
- Testing for Software Vulnerability Using Environment PerturbationWenliang Du, Aditya P. Mathur. 603-612 [doi]
- Survivability Analysis of Network SpecificationsSanjay K. Jha, Jeannette M. Wing, Richard C. Linger, Thomas A. Longstaff. 613-622 [doi]
- Benchmarking Anomaly-Based Detection SystemsRoy A. Maxion, Kymie M. C. Tan. 623-630 [doi]
- Avoiding Loss of Fairness Owing to Process Crashes in Fair Data Exchange ProtocolsPeng Liu, Peng Ning, Sushil Jajodia. 631-640 [doi]
- A Formal-Specification Based Approach for Protecting the Domain Name SystemSteven Cheung, Karl N. Levitt. 641 [doi]