Abstract is missing.
- Flexible Intrusion Detection Systems for Memory-Constrained Embedded SystemsFarid Molazem Tabrizi, Karthik Pattabiraman. 1-12 [doi]
- Exploiting Synergies between Static Analysis and Model-Based TestingSayali Salvi, Daniel Kästner, Christian Ferdinand, Tom Bienmüller. 13-24 [doi]
- Recovery for Virtualized EnvironmentsFrederico Cerveira, Raul Barbosa, Henrique Madeira, Filipe Araujo. 25-36 [doi]
- Error Diagnosis of Cloud Application Operation Using Bayesian Networks and Online OptimisationXiwei Xu, Liming Zhu, Daniel Sun, An Binh Tran, Ingo Weber, Min Fu, Len Bass. 37-48 [doi]
- Automated Evaluation of Network Intrusion Detection Systems in IaaS CloudsThibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. 49-60 [doi]
- Dynamic VM Dependability Monitoring Using Hypervisor ProbesZachary Estrada, Cuong Manh Pham, Fei Deng, Lok Yan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer. 61-72 [doi]
- Partial Updates of AUTOSAR Embedded Applications - To What Extent?Hélène Martorell, Jean-Charles Fabre, Michael Lauer, Matthieu Roy, Régis Valentin. 73-84 [doi]
- On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety MechanismsThorsten Piper, Stefan Winter, Neeraj Suri, Thomas E. Fuhrman. 85-96 [doi]
- LATED: Lifetime-Aware Tag for Enduring DesignSeyedeh Golsana Ghaemi, Amir Mahdi Hosseini Monazzah, Hamed Farbeh, Seyed Ghassem Miremadi. 97-107 [doi]
- Failure Propagation Modeling Based on Contracts TheoryMattias Nyberg, Jonas Westman. 108-119 [doi]
- Data Stream Clustering for Online Anomaly Detection in Cloud ApplicationsCarla Sauvanaud, Guthemberg Silvestre, Mohamed Kaâniche, Karama Kanoun. 120-131 [doi]
- Increasing Automation in the Backporting of Linux Drivers Using CoccinelleLuis R. Rodriguez, Julia Lawall. 132-143 [doi]
- Ultrafast Single Error Correction Codes for Protecting Processor RegistersLuis J. Saiz-Adalid, Pedro J. Gil, Joaquin Gracia-Moran, Daniel Gil-Tomas, Juan-Carlos Baraza-Calvo. 144-154 [doi]
- Microkernel Mechanisms for Improving the Trustworthiness of Commodity HardwareYanyan Shen, Kevin Elphinstone. 155-166 [doi]
- Toward a Fault-Tolerance Framework for COTS Many-Core SystemsPeter Munk, Mohammad Shadi Al Hakeem, Raphael Lisicki, Helge Parzyjegla, Jan Richling, Hans-Ulrich Heiss. 167-177 [doi]
- A Comparison of Inject-on-Read and Inject-on-Write in ISA-Level Fault InjectionBehrooz Sangchoolie, Fatemeh Ayatolahi, Roger Johansson, Johan Karlsson. 178-189 [doi]
- Increasing the Dependability of VLSI Systems through Early Detection of Fugacious FaultsJaime Espinosa, David de Andrés, Pedro J. Gil. 190-197 [doi]
- Reducing the Energy Footprint of a Distributed Consensus AlgorithmJehan-François Pâris, Darrell D. E. Long. 198-204 [doi]
- Security of ISP Access Networks: Practical ExperimentsYann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège. 205-212 [doi]
- Composing Patterns to Construct Secure SystemsPaul Rimba, Liming Zhu, Len Bass, Ihor Kuz, Steve Reeves. 213-224 [doi]
- Insights into the Diagnosis of System Failures from Cluster Message LogsEdward Chuah, Arshad Jhumka, James C. Browne, Bill Barth, Sai Narasimhamurthy. 225-232 [doi]
- Evaluating and Optimizing Stabilizing Dining PhilosophersJordan Adamek, Mikhail Nesterenko, Sébastien Tixeuil. 233-244 [doi]
- FAIL*: An Open and Versatile Fault-Injection Framework for the Assessment of Software-Implemented Hardware Fault ToleranceHorst Schirmeier, Martin Hoffmann, Christian Dietrich 0001, Michael Lenz, Daniel Lohmann, Olaf Spinczyk. 245-255 [doi]
- On the Probability of Unsafe Disagreement in Group Formation Algorithms for Vehicular Ad Hoc NetworksNegin Fathollahnejad, Risat Pathan, Johan Karlsson. 256-267 [doi]