Abstract is missing.
- An Autonomic Implementation of Reliable Broadcast Based on Dynamic Spanning TreesLuiz A. Rodrigues, Luciana Arantes, Elias Procópio Duarte Jr.. 1-12 [doi]
- Improving the Kuo-Lu-Yeh Algorithm for Assessing Two-Terminal ReliabilityMinh Lê, Max Walter, Josef Weidendorfer. 13-22 [doi]
- On Probabilistic Analysis of Disagreement in Synchronous Consensus ProtocolsNegin Fathollahnejad, Emília Villani, Risat Pathan, Raul Barbosa, Johan Karlsson. 23-34 [doi]
- Deviation Estimation between Distributed Data StreamsEmmanuelle Anceaume, Yann Busnel. 35-45 [doi]
- From Resilient Computing Architectural Concepts to Wireless Sensor Network-Based Applications (Short Paper)Miruna Stoicescu, Jean-Charles Fabre, Matthieu Roy, Animesh Pathak. 46-49 [doi]
- Mining Invariants from SaaS Application Logs (Practical Experience Report)Santonu Sarkar, Rajeshwari Ganesan, Marcello Cinque, Flavio Frattini, Stefano Russo, Agostino Savignano. 50-57 [doi]
- Towards a Dependability Control Center for Large Software Landscapes (Short Paper)Florian Fittkau, André van Hoorn, Wilhelm Hasselbring. 58-61 [doi]
- Modified Hamming Codes to Enhance Short Burst Error Detection in Semiconductor Memories (Short Paper)Luis J. Saiz-Adalid, Pedro J. Gil, Juan-Carlos Baraza-Calvo, Juan Carlos Ruiz, Daniel Gil-Tomas, Joaquin Gracia-Moran. 62-65 [doi]
- Increasing Dependability of Component-Based Software Systems by Online Failure Prediction (Short Paper)Teerat Pitakrat, André van Hoorn, Lars Grunske. 66-69 [doi]
- Do I Need to Fix a Failed Component Now, or Can I Wait Until Tomorrow?Muffy Calder, Michele Sevegnani. 70-81 [doi]
- A DSL-Supported Workflow for the Automated Assembly of Large Stochastic ModelsLeonardo Montecchi, Paolo Lollini, Andrea Bondavalli. 82-93 [doi]
- Markov Modeling of Availability and Unavailability DataPeter Buchholz, Jan Kriege. 94-105 [doi]
- Software Diversity as a Measure for Reducing Development RiskPeter T. Popov, Andrey Povyakalo, Vladimir Stankovic, Lorenzo Strigini. 106-117 [doi]
- On the Soundness of Silence: Investigating Silent Failures Using Fault Injection ExperimentsErik van der Kouwe, Cristiano Giuffrida, Andrew S. Tanenbaum. 118-129 [doi]
- Gaining Confidence on Dependability Benchmarks' Conclusions through "Back-to-Back" Testing (Practical Experience Report)Miquel Martínez, David de Andrés, Juan Carlos Ruiz. 130-137 [doi]
- Binary-Level Fault Injection for AUTOSAR Systems (Short Paper)Mafijul Md. Islam, Nithilan Meenakshi Karunakaran, Johan Haraldsson, Fredrik Bernin, Johan Karlsson. 138-141 [doi]
- A Framework for Creating Binary Rewriting Tools (Short Paper)Jason Hiser, Anh Nguyen-Tuong, Michele Co, Benjamin D. Rodes, Matthew Hall, Clark L. Coleman, John C. Knight, Jack W. Davidson. 142-145 [doi]
- A Study of the Impact of Bit-Flip Errors on Programs Compiled with Different Optimization LevelsBehrooz Sangchoolie, Fatemeh Ayatolahi, Roger Johansson, Johan Karlsson. 146-157 [doi]
- Application of Statistical Testing to the Data Processing and Control System for the Dungeness B Nuclear Power Plant (Practical Experience Report)Helen Gough, Silke Kuball. 158-165 [doi]
- On a Modeling Approach to Analyze Resilience of a Smart Grid InfrastructureSilvano Chiaradonna, Felicita Di Giandomenico, Nadir Murru. 166-177 [doi]
- A Layered Model for Structuring Automotive Safety Arguments (Short Paper)John Birch, Roger Rivett, Ibrahim Habli, Ben Bradshaw, John Botham, Dave Higham, Helen Monkhouse, Robert Palin. 178-181 [doi]
- On MILS I/O Sharing Targeting Avionic SystemsKevin Mueller, Georg Sigl, Benoit Triquet, Michael Paulitsch. 182-193 [doi]
- Towards a Resilience Benchmarking Description Language for the Context of Satellite Simulators (Short Paper)Denise Rotondi Azevedo, Ana Maria Ambrosio, Marco Vieira. 194-197 [doi]
- An Approach for Assessing the Impact of Dependability on Usability: Application to Interactive CockpitsCamille Fayollas, Célia Martinie, Philippe A. Palanque, Yannick Deleris, Jean-Charles Fabre, David Navarre. 198-209 [doi]
- Speculative Software Modification and its Use in Securing SOUPBenjamin D. Rodes, John C. Knight. 210-221 [doi]
- Geo-Location Inference Attacks: From Modelling to Privacy Risk Assessment (Short Paper)Miguel Núñez del Prado Cortez, Jesus Frignal. 222-225 [doi]
- Stochastic Game-Based Analysis of the DNS Bandwidth Amplification Attack Using Probabilistic Model CheckingTushar Deshpande, Panagiotis Katsaros, Scott A. Smolka, Scott D. Stoller. 226-237 [doi]
- To B or not to B: Blessing OS Commands with Software DNA Shotgun SequencingAnh Nguyen-Tuong, Jason Hiser, Michele Co, Nathan Kennedy, David Melski, William Ella, David Hyde, Jack W. Davidson, John C. Knight. 238-249 [doi]