Abstract is missing.
- CADA: Collaborative Auditing for Distributed AggregationJosé Valerio, Pascal Felber, Martin Rajman, Etienne Riviere. 1-12 [doi]
- Swarm Synthesis of Convergence for Symmetric ProtocolsAli Ebnenasir, Aly Farahat. 13-24 [doi]
- An Eventual alpha Partition-Participant Detector for MANETsLéon Lim, Denis Conan. 25-36 [doi]
- From Byzantine Consensus to BFT State Machine Replication: A Latency-Optimal TransformationJoão Sousa, Alysson Neves Bessani. 37-48 [doi]
- Eliminating Single Points of Failure in Software-Based RedundancyPeter Ulbrich, Martin Hoffmann, Rüdiger Kapitza, Daniel Lohmann, Wolfgang Schröder-Preikschat, Reiner Schmid. 49-60 [doi]
- A Mirrored Data Structures Approach to Diverse Partial Memory ReplicationRyan M. Lefever, Vikram S. Adve, William H. Sanders. 61-72 [doi]
- Testing the Input Timing Robustness of Real-Time Control Software for Autonomous SystemsDavid Powell, Jean Arlat, Hoang Nam Chu, Félix Ingrand, Marc-Olivier Killijian. 73-83 [doi]
- Analysis of Electric Power Systems Accounting for Interdependencies in Heterogeneous ScenariosSilvano Chiaradonna, Felicita Di Giandomenico, Nicola Nostro. 84-93 [doi]
- Log Analytics for Dependable Enterprise TelephonyChaunwen Chen, Navjot Singh, Shalini Yajnik. 94-101 [doi]
- Security of Electrostatic Field Persistent Routing: Attacks and Defense MechanismsOliviu Ghica, Cristina Nita-Rotaru, Goce Trajcevski, Peter Scheuermann. 102-113 [doi]
- AnKLe: Detecting Attacks in Large Scale Systems via Information DivergenceEmmanuelle Anceaume, Yann Busnel, Sébastien Gambs. 114-125 [doi]
- The Provenance of WINETudor Dumitras, Petros Efstathopoulos. 126-131 [doi]
- Leveraging Multi-core Computing Architectures in AvionicsJan Nowotsch, Michael Paulitsch. 132-143 [doi]
- Timed Broadcast via Off-the-Shelf WLAN Distributed Coordination Function for Safety-Critical SystemsBoris Malinowsky, Jesper Grønbæk, Hans-Peter Schwefel, Andrea Ceccarelli, Andrea Bondavalli, Edgar Nett. 144-155 [doi]
- Formal Development of Critical Multi-agent Systems: A Refinement ApproachInna Pereverzeva, Elena Troubitsyna, Linas Laibinis. 156-161 [doi]
- Experimental Analysis of Binary-Level Software Fault Injection in Complex SoftwareDomenico Cotroneo, Anna Lanzaro, Roberto Natella, Ricardo Barbosa. 162-172 [doi]
- Changeloads for Resilience Benchmarking of Self-Adaptive Systems: A Risk-Based ApproachRaquel Almeida, Marco Vieira. 173-184 [doi]
- Exploring Uncertainty of Delays as a Factor in End-to-End Cloud Response TimeAnatoliy Gorbenko, Vyacheslav S. Kharchenko, Seyran Mamutov, Olga Tarasyuk, Alexander Romanovsky. 185-190 [doi]
- A Time-Free Byzantine Failure Detector for Dynamic NetworksFabíola Greve, Murilo Santos de Lima, Luciana Arantes, Pierre Sens. 191-202 [doi]
- MultiPathPrivacy: Enhanced Privacy in Fault ReplicationPedro Louro, João Garcia, Paolo Romano. 203-211 [doi]
- Applying Data Mining for Detecting Anomalies in SatellitesDenise Rotondi Azevedo, Ana Maria Ambrosio, Marco Vieira. 212-217 [doi]
- Memory Mapped SPM: Protecting Instruction Scratchpad Memory in Embedded Systems against Soft ErrorsHamed Farbeh, Mahdi Fazeli, Faramarz Khosravi, Seyed Ghassem Miremadi. 218-226 [doi]
- Designing Robust GALS Circuits with Triple Modular RedundancyJakob Lechner. 227-236 [doi]
- On the Development of a Real-Time Ethernet Switch for Ultra-highly Dependable ApplicationsDumitru-Mircea Chimerel, Costel Patrascu, Sabina Anghel, Yuval Katz, Wilfried Steiner. 237-242 [doi]