Abstract is missing.
- Masquerade Detection Using Enriched Command LinesRoy A. Maxion. 5-14 [doi]
- Decision-Support for Certification by Calculating the Evidential Volume of a ProductSilke Kuball, Gordon Hughes. 15-24 [doi]
- Multi-Legged Arguments: The Impact of Diversity upon Confidence in Dependability ArgumentsRobin E. Bloomfield, Bev Littlewood. 25 [doi]
- Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and RecoveriesMichael Backes, Christian Cachin. 37-46 [doi]
- Adaptive Gossip-Based BroadcastLuís Rodrigues, Sidath B. Handurukande, José Orlando Pereira, Rachid Guerraoui, Anne-Marie Kermarrec. 47-56 [doi]
- Scalably Supporting Durable Subscriptions in a Publish/Subscribe SystemSumeer Bhola, Yuanyuan Zhao, Joshua S. Auerbach. 57 [doi]
- Pragmatic Fault Tolerance for Railway Control and Safety Protection of the Channel TunnelSimon Pugh, Eric Aliot. 69-74 [doi]
- Dependability Assessment of Safety-Critical System Software by Static Analysis MethodsThuy Nguyen, Alain Ourghanlian. 75-79 [doi]
- Integrating Recovery Strategies into a Primary Substation Automation SystemGeert Deconinck, Vincenzo De Florio, Ronnie Belmans, Giovanna Dondossola, Judit Szanto. 80-85 [doi]
- The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation ExperimentsHenrique Madeira, João Pedro Costa, Marco Vieira. 86 [doi]
- Building SWIFI Tools from Temporal Logic SpecificationsManuel Rodríguez, Jean-Charles Fabre, Jean Arlat. 95-104 [doi]
- Definition of Software Fault Emulation Operators: A Field Data StudyJoão Durães, Henrique Madeira. 105-114 [doi]
- Robustness Benchmarking for Hardware Maintenance EventsJi Zhu, James Mauro, Ira Pramanick. 115-122 [doi]
- Evaluation of Fault Handling of the Time-Triggered Architecture with Bus and Star TopologyAstrit Ademaj, Håkan Sivencrona, Günther Bauer, Jan Torin. 123 [doi]
- LSRP: Local Stabilization in Shortest Path RoutingAnish Arora, Hongwei Zhang. 139-148 [doi]
- A Preemptive Deterministic Scheduling Algorithm for Multithreaded ReplicasClaudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 149-158 [doi]
- An Algorithm for Automatically Obtaining Distributed and Fault-Tolerant Static SchedulesAlain Girault, Hamoudi Kalla, Mihaela Sighireanu, Yves Sorel. 159 [doi]
- Detection and Handling of MAC Layer Misbehavior in Wireless NetworksPradeep Kyasanur, Nitin H. Vaidya. 173-182 [doi]
- A Study of Packet Delivery Performance during Routing ConvergenceDan Pei, Lan Wang, Daniel Massey, Shyhtsun Felix Wu, Lixia Zhang. 183-192 [doi]
- Low Overhead Fault Tolerant Networking in MyrinetVijay Lakamraju, Israel Koren, C. Mani Krishna. 193 [doi]
- Dependable and Secure Data Storage and Retrieval in Mobile, Wireless NetworksStefano Chessa, Piero Maestrini. 207-216 [doi]
- Design, Implementation, and Evaluation of Repairable File ServiceNingning Zhu, Tzi-cker Chiueh. 217-226 [doi]
- From Crash Tolerance to Authenticated Byzantine Tolerance: A Structured Approach, the Cost and BenefitsDimane Mpoeleng, Paul D. Ezhilchelvan, Neil A. Speirs. 227 [doi]
- Adaptive Software Rejuvenation: Degradation Model and Rejuvenation SchemeYujuan Bao, Xiaobai Sun, Kishor S. Trivedi. 241-248 [doi]
- Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case StudyLorenzo Strigini, Andrey Povyakalo, Eugenio Alberdi. 249-258 [doi]
- RAMBO II: Rapidly Reconfigurable Atomic Memory for Dynamic NetworksSeth Gilbert, Nancy A. Lynch, Alexander A. Shvartsman. 259 [doi]
- The Design of Wearable Systems: A Shift in Development EffortJohn G. Dorsey, Daniel P. Siewiorek. 273-280 [doi]
- Dynamic Verification of End-to-End Multiprocessor InvariantsDaniel J. Sorin, Mark D. Hill, David A. Wood. 281-290 [doi]
- ICR: In-Cache Replication for Enhancing Data Cache ReliabilityWei Zhang 0002, Sudhanva Gurumurthi, Mahmut T. Kandemir, Anand Sivasubramaniam. 291 [doi]
- Benchmarking the Dependability of Different OLTP SystemsMarco Vieira, Henrique Madeira. 305-310 [doi]
- Persistent-State Checkpoint Comparison for Troubleshooting Configuration FailuresYi-Min Wang, Chad Verbowski, Daniel R. Simon. 311-316 [doi]
- HEALERS: A Toolkit for Enhancing the Robustness and Security of Existing ApplicationsChristof Fetzer, Zhen Xiao. 317-322 [doi]
- The Anacapa SystemRuppert R. Koch, Sanjay Hortikar, Sivaguru Sankaridurg, Paul Ngan, Michael O. Neary, Dirk Wagner. 323 [doi]
- Node Failure Detection and Membership in CANELyJosé Rufino, Paulo Veríssimo, Guilherme Arroz. 331-340 [doi]
- Design and Implementation of a Consistent Time Service for Fault-Tolerant Distributed SystemsWenbing Zhao, Louise E. Moser, P. M. Melliar-Smith. 341-350 [doi]
- Asynchronous Implementation of Failure DetectorsAchour Mostéfaoui, Eric Mourgaya, Michel Raynal. 351-360 [doi]
- Communication Strategies for Heartbeat-Style Failure Detectors in Wireless Ad Hoc NetworksSzu-Chi Wang, Sy-Yen Kuo. 361 [doi]
- TCP Server Fault Tolerance Using Connection Migration to a Backup ServerManish Marwah, Shivakant Mishra, Christof Fetzer. 373-382 [doi]
- Transparent TCP Connection FailoverRuppert R. Koch, Sanjay Hortikar, Louise E. Moser, P. M. Melliar-Smith. 383-392 [doi]
- Engineering Fault-Tolerant TCP/IP Servers Using FT-TCPDmitrii Zagorodnov, Keith Marzullo, Lorenzo Alvisi, Thomas C. Bressoud. 393-402 [doi]
- N-Way Fail-Over Infrastructure for Reliable Servers and RoutersYair Amir, Ryan Caudy, Ashima Munjal, Theo Schlossnagle, Ciprian Tutu. 403 [doi]
- On the Design of Robust Integrators for Fail-Bounded Control SystemsJonny Vinter, Andréas Johansson, Peter Folkesson, Johan Karlsson. 415-424 [doi]
- A Fault-Tolerant Java Virtual MachineJeff Napper, Lorenzo Alvisi, Harrick M. Vin. 425-434 [doi]
- Towards Implementing Multi-Layer Reflection for Fault-ToleranceFrançois Taïani, Jean-Charles Fabre, Marc-Olivier Killijian. 435-444 [doi]
- Automatic Detection and Masking of Non-Atomic Exception HandlingChristof Fetzer, Karin Högstedt, Pascal Felber. 445 [doi]
- Characterization of Linux Kernel Behavior under ErrorsWeining Gu, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Zhen-Yu Yang. 459-468 [doi]
- Reproducible Dependability Benchmarking Experiments Based on Unambiguous Benchmark Setup DescriptionsKerstin Buchacker, Mario Dal Cin, Hans-Jörg Höxer, Roland Karch, Volkmar Sieh, Oliver Tschäche. 469-478 [doi]
- A Hybrid Fault Injection Approach Based on Simulation and Emulation Co-operationAli Reza Ejlali, Seyed Ghassem Miremadi, Hamid R. Zarandi, Ghazanfar Asadi, Siavash Bayat Sarmadi. 479 [doi]
- Pre-Processing Input Data to Augment Fault Tolerance in Space ApplicationsJayakrishnan Nair, Zahava Koren, Israel Koren, C. Mani Krishna. 491-500 [doi]
- Duplex: A Reusable Fault Tolerance Extension Framework for Network Access DevicesSrikant Sharma, Jiawu Chen, Wei Li, Kartik Gopalan, Tzi-cker Chiueh. 501-510 [doi]
- Reliable Communication in Overlay NetworksYair Amir, Claudiu Danilov. 511-520 [doi]
- Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy TechniquesDongyan Chen, Sachin Garg, Chandra M. R. Kintala, Kishor S. Trivedi. 521 [doi]
- Cost-Optimization of the IPv4 Zeroconf ProtocolHenrik C. Bohnenkamp, Peter van der Stok, Holger Hermanns, Frits W. Vaandrager. 531-540 [doi]
- Evaluating the Condition-Based Approach to Solve ConsensusAchour Mostéfaoui, Eric Mourgaya, Philippe Raipin Parvédy, Michel Raynal. 541-550 [doi]
- How Bad Are Wrong Suspicions? Towards Adaptive Distributed ProtocolsLívia M. R. Sampaio, Francisco Vilar Brasileiro, Walfredo Cirne, Jorge C. A. de Figueiredo. 551 [doi]
- A Combinatorial Method for the Evaluation of Yield of Fault-Tolerant Systems-on-ChipDoru P. Munteanu, Víctor Suñé, Rosa Rodríguez-Montañés, Juan A. Carrasco. 563-572 [doi]
- Real-Time Estimation of Event-Driven Traffic Latency Distributions when Layered on Static SchedulesPam Binns. 573-582 [doi]
- ParEs - A Parameter-Estimation-ToolFelix Engelhard, Stefan Greiner, Reinhard German. 583 [doi]
- Compiler-Directed Program-Fault Coverage for Highly Available Java Internet ServicesChen Fu, Richard P. Martin, Kiran Nagaraja, Thu D. Nguyen, Barbara G. Ryder, David Wonnacott. 595-604 [doi]
- A Data-Driven Finite State Machine Model for Analyzing Security VulnerabilitiesShuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishankar K. Iyer. 605-614 [doi]
- Probabilistic Validation of an Intrusion-Tolerant Replication SystemSankalp Singh, Michel Cukier, William H. Sanders. 615-624 [doi]
- An Abstract Interpretation-Based Timing Validation of Hard Real-Time Avionics SoftwareStephan Thesing, Jean Souyris, Reinhold Heckmann, Famantanantsoa Randimbivololona, Marc Langenbach, Reinhard Wilhelm, Christian Ferdinand. 625 [doi]
- Performance Analysis of a Hierarchical Failure DetectorMarin Bertier, Olivier Marin, Pierre Sens. 635-644 [doi]
- Comparison of Failure Detectors and Group Membership: Performance Study of Two Atomic Broadcast AlgorithmsPéter Urbán, Ilya Shnayderman, André Schiper. 645-654 [doi]
- Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case StudyAnn T. Tai, Kam S. Tso, Leon Alkalai, Savio N. Chau, William H. Sanders. 655 [doi]
- Jaca - A Software Fault Injection ToolRegina Lúcia de Oliveira Moraes, Eliane Martins. 667 [doi]
- GOOFI: Generic Object-Oriented Fault Injection ToolJoakim Aidemark, Jonny Vinter, Peter Folkesson, Johan Karlsson. 668 [doi]
- INERTE: Integrated NExus-Based Real-Time Fault Injection Tool for Embedded SystemsPedro Yuste, David de Andrés, Lenin Lemus, Juan José Serrano, Pedro J. Gil. 669 [doi]
- Hardware Fault Injection with UMLinuxKerstin Buchacker, Mario Dal Cin, Hans-Jörg Höxer, Volkmar Sieh, Oliver Tschäche, Martin Waitz. 670 [doi]
- On Integrating the MÖBIUS and MODEST Modeling ToolsHenrik C. Bohnenkamp, Tod Courtney, David Daly, Salem Derisavi, Holger Hermanns, Joost-Pieter Katoen, Ric Klaren, Vinh Vi Lam, William H. Sanders. 671 [doi]
- Dependable LQNS: A Performability Modeling Tool for Layered SystemsOlivia Das, C. Murray Woodside. 672 [doi]
- ETMCC: Model Checking Performability Properties of Markov ChainsHolger Hermanns, Joost-Pieter Katoen, Joachim Meyer-Kayser, Markus Siegle. 673 [doi]
- A Methodology for Dependability and Performability Analysis in SAMTianjun Shi, Xudong He. 679-688 [doi]
- Reliability Analysis of Fault-Tolerant Systems with Common-Cause FailuresLiudong Xing. 689-698 [doi]
- Validation of Approximate Dependability Models of a RAID Architecture with Orthogonal OrganizationJuan A. Carrasco. 699-708 [doi]
- A User-Perceived Availability Evaluation of a Web Based Travel AgencyMohamed Kaâniche, Karama Kanoun, Magnos Martinello. 709 [doi]
- Software Aging and Multifractality of Memory ResourcesMark Shereshevsky, Jonathan Crowell, Bojan Cukic, Vijai Gandikota, Yan Liu. 721-730 [doi]
- Deadlock Resolution via Exceptions for Dependable Java ApplicationsZeng Fancong. 731-740 [doi]
- A Voltage Scheduling Heuristic for Real-Time Task GraphsDiganta Roychowdhury, Israel Koren, C. Mani Krishna, Yann-Hang Lee. 741-750 [doi]
- On Dynamic Assignment of Impatient Customers to Parallel QueuesAli Movaghar. 751 [doi]
- PoDSy 2003: Principles of Dependable SystemsFelix C. Gärtner, Klaus Kursawe, Levente Buttyán. 763 [doi]
- Model Checking for Dependable Software-Intensive SystemsEdmund M. Clarke, Masahiro Fujita, David P. Gluch. 764 [doi]
- First Workshop on the Design of Self-Managing SystemsLisa Spainhower, Aad P. A. van Moorsel. 765 [doi]
- Self-Stabilization WorkshopShing-Tsaan Huang, Ted Herman. 766 [doi]