Abstract is missing.
- Fault Tolerance in Autonomic Computing EnvironmentYoshihiro Tohma. 3-8 [doi]
- Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication SystemHariGovind V. Ramasamy, Michel Cukier, William H. Sanders. 9-18 [doi]
- Asynchronous Active Replication in Three-Tier Distributed SystemsRoberto Baldoni, Carlo Marchetti, Sara Tucci Piergiovanni. 19-28 [doi]
- On Characteristics of DEF Communication-Induced Checkpointing ProtocolsJichiang Tsai, Jenn-Wei Lin. 29-36 [doi]
- A Low Overhead heckpointing Protocol for Mobile Computing SystemsChi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo, Ing-Yi Chen. 37-44 [doi]
- The Cost of Checkpointing, Logging and Recovery for the Mobile Agent SystemsHyunjoo Kim, Heon Young Yeom, Taesoon Park, Hyoung-Woo Park. 45-50 [doi]
- Analysis of the Effects of Real and Injected Software Faults: Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, Thomas Marteau. 51-58 [doi]
- Principles of Multi-Level Reflection for Fault Tolerant Architectures59-66 [doi]
- Hardware/Software Co-Reliability of Configurable Digital SystemsMinsu Choi, Nohpill Park, Yong-Bin Kim, Fabrizio Lombardi. 67-74 [doi]
- Highly Fault-Tolerant FPGA Processor by Degrading StrategyYousuke Nakamura, Kei Hiraki. 75-80 [doi]
- Using Software Implemented Fault Inserter in Dependability AnalysisPiotr Gawkowski, Janusz Sosnowski. 81-88 [doi]
- Analyzing Network Reliability With Imperfect Nodes Using OBDDFu-Min Yeh, Hung-Yau Lin, Sy-Yen Kuo. 89-96 [doi]
- Reliability Analysis of Grid Computing SystemsY. S. Dai, Min Xie, Kim-Leng Poh. 97-104 [doi]
- A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control SystemsÖrjan Askerdal, Magnus Gäfvert, Martin Hiller, Neeraj Suri. 105-116 [doi]
- Caveat Emptor: Making Grid Services Dependable from the Client SideMiron Livny, Douglas Thain. 117-120 [doi]
- An Introduction to the Renaming ProblemMichel Raynal. 121-124 [doi]
- Passive Replication Schemes in AquaJennifer Ren, Paul Rubel, Mouna Seri, Michel Cukier, William H. Sanders, Tod Courtney. 125-130 [doi]
- Detecting Feature Interactions in Telecommunication Services with a SAT SolverTatsuhiro Tsuchiya, Masahide Nakamura, Tohru Kikuno. 131-136 [doi]
- Fault-Tolerant Properties of Generalized Hierarchical Completely-Connected NetworksToshinori Takabatake, Masato Kitakami, Hideo Ito. 137-144 [doi]
- Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc NetworksSangman Moh, Chansu Yu, Ben Lee, Hee Yong Youn. 145-152 [doi]
- Configurable PC Clusters Using a Hierarchical Complete-Connection-Based Switching NetworkNobuo Tsuda. 153-162 [doi]
- Perspectives on Dependable Computing for Solar System ExplorationLeon Alkalai. 163-166 [doi]
- Enhancing Access Control with SysGuard, Reference Monitor Supporting Portable and Composable Kernel ModuleYasushi Shinjo, Kotaro Eiraku, Atsushi Suzuki, Kozo Itano, Calton Pu. 167-176 [doi]
- An Adaptive High-Low Water Mark Destage Algorithm for Cached RAID5Young Jin Nam, Chanik Park. 177-184 [doi]
- A Packet-Based Caching Proxy with Loss Recovery for Video StreamingKuan-Sheng Hsueh, Sheng-De Wang. 185-192 [doi]
- Reliability Evaluation of Multi-state Systems Subject to Imperfect Coverage using OBDDYung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo. 193-200 [doi]
- Characterization of Operating Systems Behavior in the Presence of Faulty Drivers through Software Fault EmulationJoão Durães, Henrique Madeira. 201-209 [doi]
- Level Oriented Formal Model for Asynchronous Circuit Verification and its Efficient Analysis MethodTomoya Kitai, Yusuke Oguro, Tomohiro Yoneda, Eric Mercer, Chris J. Myers. 210-220 [doi]
- Consensus in Synchronous Systems: A Concise Guided TourMichel Raynal. 221-228 [doi]
- A Consensus Algorithm for Synchronous Distributed Systems using Mobile AgentJiannong Cao, Xianbing Wang, Siu Lo, Sajal K. Das. 229-238 [doi]
- Evaluation of Convolutional-Code-Based FEC under Limited Recovery Time and Its Application to Real-time TransmissionMasayuki Arai, Hitoshi Kurosu, Satoshi Fukumoto, Kazuhiko Iwasaki. 239-246 [doi]
- A Class of Random Multiple Bits in a Byte Error Correcting (S t/b EC)Codes for Semiconductor Memory SystemsGanesan Umanesan, Eiji Fujiwara. 247-256 [doi]
- Providing Persistence or Sensor Streams with Light Neighbor WALHideyuki Kawashima, Motomichi Toyama, Yuichiro Anzai, Michita Imai. 257-264 [doi]
- Definition of Faultloads Based on Operator Faults for DMBS Recovery BenchmarkingMarco Vieira, Henrique Madeira. 265-274 [doi]
- An Alternative Method of Generating Tests for Path Delay Faults Using N -Detection Test SetsHiroshi Takahashi, Kewal K. Saluja, Yuzo Takamatsu. 275-282 [doi]
- Enhancing Delay Fault Testability for Iterative Logic ArrayShyue-Kung Lu, Chien-Hung Yeh. 283-292 [doi]
- Comparison with Defect Compensation Methods for Feed-forward Neural NetworksKin ya Takahashi, Kunihito Yamamori, Ikuo Yoshihara, Susumu Horiguchi. 293-300 [doi]
- An Extreme Value Injection Approach with Reduced Learning Time to Make MLNs Multiple-Weight-Fault TolerantItsuo Takanami, Yasuhiro Oyama. 301-310 [doi]
- Event Log based Dependability Analysis of Windows NT and 2K SystemsCristina Simache, Mohamed Kaâniche, Ayda Saïdane. 311-315 [doi]
- Using VHDL-Based Fault Injection to exercise Error Detection Mechanisms in the Time-Triggered ArchitectureJoaquin Gracia, Daniel Gil, Juan Carlos Baraza, Pedro J. Gil. 316-320 [doi]
- Formal Verification of a Pipelined Processor with New MemoryHiroshi Nakamura, Takanori Arai, Masahiro Fujita. 321-324 [doi]