Abstract is missing.
- Two-Dimensional Software Reliability Models and Their ApplicationTomotaka Ishii, Tadashi Dohi. 3-10 [doi]
- A Strategy for Verification of Decomposable SCR ModelsDejan Desovski, Bojan Cukic. 11-18 [doi]
- Detection and Correction Process Modeling Considering the Time DependencyY. P. Wu, Q. P. Hu, M. Xie, S. H. Ng. 19-25 [doi]
- Detecting and Exploiting Symmetry in Discrete-state Markov ModelsW. Douglas Obal II, Michael G. McQuinn, William H. Sanders. 26-38 [doi]
- An Evaluation of Similarity Coefficients for Software Fault LocalizationRui Abreu, Peter Zoeteweij, Arjan J. C. van Gemund. 39-46 [doi]
- SEVA: A Soft-Error- and Variation-Aware Cache ArchitectureLuong Dinh Hung, Masahiro Goshima, Shuichi Sakai. 47-54 [doi]
- An OS-level Framework for Providing Application-Aware ReliabilityLong Wang, Zbigniew Kalbarczyk, Weining Gu, Ravishankar K. Iyer. 55-62 [doi]
- Minimal System Conditions to Implement Unreliable Failure DetectorsAntonio Fernández, Ernesto Jiménez, Sergio Arévalo. 63-72 [doi]
- A New Approach to Improving the Test Effectiveness in Software Testing Using Fault CollapsingShiyi Xu. 73-80 [doi]
- A Framework for Inheritance Testing from VDM++ SpecificationsAamer Nadeem, Michael R. Lyu. 81-88 [doi]
- Assessment on Undetectable Burst Errors in Tandem CRCsMeng-Lai Yin, Bruce Orenstein. 89-96 [doi]
- Efficient Built-In Self-Test Schemes for Video Coding Cores: a Case Study on DCT/IDCT CircuitsShyue-Kung Lu, Ting-Yu Chen, Wei-Yuan Liu. 97-104 [doi]
- Flexible, Cost-EffectiveMembership Agreement in Synchronous SystemsRaul Barbosa, Johan Karlsson. 105-113 [doi]
- Towards Adaptive Secure Group Communication: Bridging the Gap between Formal Specification and Network SimulationSebastian Gutierrez-Nolasco, Nalini Venkatasubramanian, Mark-Oliver Stehr, Carolyn L. Talcott. 113-120 [doi]
- Quantum Oblivious Transfer and Fair Digital TransactionsYao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen Kuo, Ing-Yi Chen. 121-128 [doi]
- Storing RSA Private Keys In Your HeadTaisya Krivoruchko, James Diamond, Jeff Hooper. 129-138 [doi]
- Database Transaction Management for High-Availability Cluster SystemKen-ichiro Fujiyama, Nobutatsu Nakamura, Ryuichi Hiraike. 139-146 [doi]
- Restoration Strategies In Mesh Optical Networks: Cost Vs. Service AvailabilityDaniel R. Jeske, Ashwin Sampath. 147-153 [doi]
- Modeling High AvailabilityKishor S. Trivedi, Ranjith Vasireddy, David Trindale, Swami Nathan, Rick Castro. 154-164 [doi]
- Base Address Recognition with Data Flow Tracking for Injection Attack DetectionSatoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, Kazuto Shimizu, Hidetsugu Irie, Masahiro Goshima, Shuichi Sakai. 165-172 [doi]
- A Stateful Approach to Spyware Detection and RemovalMing-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo. 173-182 [doi]
- A Best Practice Guide to Resources Forecasting for the Apache WebserverGünther A. Hoffmann, Kishor S. Trivedi, Miroslaw Malek. 183-193 [doi]
- Software Reliability Prediction and Assessment Using both Finite and Infinite Server Queueing ApproachesWei-Chih Huang, Chin-Yu Huang, Chuan-Ching Sue. 194-201 [doi]
- On Statistically Estimated Optimistic Delivery in Wide-Area Total Order ProtocolsJosé Mocito, Ana Respício, Luís Rodrigues. 202-209 [doi]
- Early Software Reliability Prediction with ANN ModelsQ. P. Hu, M. Xie, S. H. Ng. 210-220 [doi]
- A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media StreamingZheng Yi Huang, Sheng-De Wang. 221-229 [doi]
- A Pragmatic Protocol for Database Replication in Interconnected ClustersJ. Grov, L. Soares, Alfrânio Correia Jr., José Pereira, Rui Carlos Oliveira, Fernando Pedone. 230-237 [doi]
- An Efficient Commit Protocol Exploiting Primary-Backup Placement in a Distributed Storage SystemXiangyong Ouyang, Tomohiro Yoshihara, Haruo Yokota. 238-247 [doi]
- Reliable Video Transmission Techniques for Wireless MPEG-4 Streaming SystemsSheng-Tzong Cheng, Jian-Liang Lin. 248-258 [doi]
- On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing systemAchour Mostéfaoui, Michel Raynal, Gilles Trédan. 259-266 [doi]
- Synchronous Set Agreement: a Concise Guided Tour (including a new algorithm and a list of open problems)Michel Raynal, Corentin Travers. 267-274 [doi]
- Dependable Multithreaded Processing Using Runtime ValidationKaiyu Chen, Sharad Malik. 275-286 [doi]
- Improving Fast Paxos: being optimistic with no overheadBernadette Charron-Bost, André Schiper. 287-295 [doi]
- Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor SystemsHakem Beitollahi, Geert Deconinck. 296-304 [doi]
- Resource Availability Optimization for Priority Classes in a WebsiteVasilis P. Koutras, Agapios N. Platis. 305-314 [doi]
- Design Trade-Offs and Deadlock Prevention in Transient Fault-Tolerant SMT ProcessorsXiaobin Li, Jean-Luc Gaudiot. 315-322 [doi]
- Incorporating Network Connectivity Analysis in Maintenance PlanningMeng-Lai Yin, Rafael R. Arellano. 323-328 [doi]
- Low-Overhead Run-Time Memory Leak Detection and RecoveryTimothy Tsai, Kalyan Vaidyanathan, Kenny C. Gross. 329-340 [doi]
- End-to-end consensus using end-to-end channelsMatthias Wiesmann, Xavier Défago. 341-350 [doi]
- Performance and Reliability Analysis ofWeb Server Software ArchitecturesSwapna S. Gokhale, Paul J. Vandal, Jijun Lu. 351-358 [doi]
- A Single-Chip Fail-Safe Microprocessor with Memory Data Comparison FeatureKotaro Shimamura, Takeshi Takehara, Yosuke Shima, Kunihiko Tsunedomi. 359-368 [doi]
- Evaluating the Impact of Fault Recovery on Superscalar Processor PerformanceToshinori Sato, Akihiro Chiyonobu. 369-370 [doi]
- A Scenario of Tolerating Interaction Faults Between Otherwise Correct SystemsBogdan Tomoyuki Nassu, Takashi Nanya. 371-372 [doi]
- Detection and Recovery for Disconnection Failures in a Web-based Medical Teleconsultation SystemKuo-Feng Ssu, Chih-Hsun Chou, Wei-Te Shih, Pau-Choo Chung, Hewijin Christine Jiau. 373-374 [doi]
- Leader Election in the Timed Finite Average Response Time ModelChristof Fetzer, Martin Süßkraut. 375-376 [doi]
- A Replication Model for Trading Data Integrity against AvailabilityJohannes Osrael, Lorenz Froihofer, Karl M. Göschka. 377-378 [doi]
- Improving Data Transmission with Helping Nodes for Geographical Ad Hoc RoutingShin-Hung Chung, Kuo-Feng Ssu, Chih-Hsun Chou, Hewijin Christine Jiau. 379-380 [doi]
- Towards Timely ACID Transactions in DBMSMarco Vieira, António Casimiro Costa, Henrique Madeira. 381-382 [doi]
- Monitoring Database Application Behavior for Intrusion DetectionJosé Fonseca, Marco Vieira, Henrique Madeira. 383-386 [doi]
- Implementation Results of a Configurable Membership Protocol for Active Safety SystemsCarl Bergenhem, Johan Karlsson, Christian Archer, Andreas Sjoblom. 387-388 [doi]
- Ontology based IT-security planningStefan Fenz, Edgar Weippl. 389-390 [doi]
- The Hierarchy of BGP Convergence on the Self-Organized InternetJinjing Zhao, Peidong Zhu, Xicheng Lu, Feng Zhao. 391-392 [doi]
- Dynamic Reconfiguration Policies for Reconfigurable Coded-WDM PONsChuan-Ching Sue. 393-394 [doi]
- Fault-Tolerant Rate-Monotonic Scheduling Algorithm in Uniprocessor Embedded SystemsHakem Beitollahi, Geert Deconinck. 395-396 [doi]
- The Survivability of the Augmented Logical Ring Topology in WDM NetworksYung-Chiao Chen, Chuan-Ching Sue, Sy-Yen Kuo. 397-398 [doi]
- A Hybrid Multipath Routing in Mobile ad hoc NetworksChuan-Ching Sue, Ren-Jie Chiou. 399-400 [doi]
- A Generic Trust Overlay Simulator for P2P NetworksWei Wang, Guosun Zeng. 401-402 [doi]