Abstract is missing.
- Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution TimeChristian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott. 3-10 [doi]
- Error Recovery Method for Multiple-Dictionary Compression MethodMasato Kitakami, Yuta Noguchi. 11-18 [doi]
- Fault Detection System Activated by Failure InformationMasato Sakai, Hiroya Matsuba, Yutaka Ishikawa. 19-26 [doi]
- Comparative Analysis of QoS and Memory Usage of Adaptive Failure DetectorsNaixue Xiong, Yan Yang, Xavier Défago. 27-34 [doi]
- Quantifying Software Maintainability Based on a Fault-Detection/Correction ModelKazuya Shibata, Koichiro Rinsaka, Tadashi Dohi, Hiroyuki Okamura. 35-42 [doi]
- PISRAT: Proportional Intensity-Based Software Reliability Assessment ToolKazuya Shibata, Koichiro Rinsaka, Tadashi Dohi. 43-52 [doi]
- An Automatic Real-Time Analysis of the Time to Reach ConsensusTatsuhiro Tsuchiya, André Schiper. 53-60 [doi]
- Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage SystemsGang Wang, Sheng Lin, Xiaoguang Liu, Guangjun Xie, Jing Liu. 61-68 [doi]
- Failure Detectors and Extended Paxos for k-Set AgreementWei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu. 69-76 [doi]
- An Accurate Model of Software ReliabilityShiyi Xu. 77-84 [doi]
- Regression Testing Based on UML Design ModelsAtifah Ali, Aamer Nadeem, Muhammad Zohaib Z. Iqbal, Mohammad Usman. 85-88 [doi]
- Model Based Development of Safety-Critical Systems Using Template Based Code GenerationMatthias Regensburger, Christian Buckl, Alois Knoll, Gerhard Schrott. 89-92 [doi]
- Predicting Defective Software Components from Code Complexity MeasuresHongyu Zhang, Xiuzhen Zhang, Ming Gu. 93-96 [doi]
- Neural-Network Based Test Cases Generation Using Genetic AlgorithmRuilian Zhao, Shanshan Lv. 97-100 [doi]
- A Measurement Tool of End-User Computing Capability in Competency PerspectiveChui Young Yoon, Keon-Myung Lee. 101-105 [doi]
- Fault Tolerance for Super-Peers of P2P SystemsJenn-Wei Lin, Ming-Feng Yang, Jichiang Tsai. 107-114 [doi]
- A Path Diversity Metric for End-to-End NetworkSong Huang, Yong Xu, Ling Zhang. 115-122 [doi]
- The Eventual Leadership in Dynamic Mobile Networking EnvironmentsJiannong Cao, Michel Raynal, Corentin Travers, Weigang Wu. 123-130 [doi]
- Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor NetworksChiu-Wen Chen, Kuo-Feng Ssu, Hewijin Christine Jiau. 131-138 [doi]
- Dependability Evaluation of Cooperative Backup Strategies for Mobile DevicesLudovic Courtès, Ossama Hamouda, Mohamed Kaâniche, Marc-Olivier Killijian, David Powell. 139-146 [doi]
- Implementation of Highly Available OSPF Router on ATCAChia-Tai Tsai, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang. 147-154 [doi]
- Overlay Network Topology Reconfiguration in Byzantine SettingsRafael R. Obelheiro, Joni da Silva Fraga. 155-162 [doi]
- A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc NetworksHong-Zu Chou, Szu-Chi Wang, Sy-Yen Kuo. 163-170 [doi]
- Fault Diagnosis for Time Synchronization in Sensor NetworksKe-Ting Chen, Kuo-Feng Ssu, Wei-Tong Wang. 171-178 [doi]
- Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based NetworksJunaid Ahsenali Chaudhry, Yonghwan Lee, Dugki Min, Seungkyu Park, Chun-Hyon Chang, Duckwon Chung. 179-186 [doi]
- A Fast Failure Detection and Failover Scheme for SIP High Availability NetworksWei-Ming Wu, Kuochen Wang, Rong-Hong Jan, Chia-Yuan Huang. 187-190 [doi]
- Assessment of Message Missing Failures in FlexRay-Based NetworksVahid Lari, Mehdi Dehbashi, Seyed Ghassem Miremadi, Navid Farazmand. 191-194 [doi]
- A Hybrid Redundancy Approach for Data Availability in Structured P2P Network SystemsGuangping Xu, Gang Wang, Jing Liu. 195-199 [doi]
- A New Concurrent Detection of Control Flow Errors Based on DCT TechniqueHung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan. 201-209 [doi]
- Soft Error Rate Estimation in Deep Sub-micron CMOSLianlian Zeng, Paul Beckett. 210-216 [doi]
- Energy Saving Based on CPU Voltage Scaling and Hardware Software PartitioningChia Hsiang Hsu, Cheng-Juei Yu, Sheng-De Wang. 217-223 [doi]
- Efficient BISR Techniques for Embedded Memories Considering Cluster FaultsChun-Lin Yang, Yuang-Cheng Hsiao, Shyue-Kung Lu. 224-231 [doi]
- A Fail-Silent Reconfigurable Superscalar ProcessorThomas Kottke, Andreas Steininger. 232-239 [doi]
- Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded SystemsVinaitheerthan Sundaram, Sandip HomChaudhuri, Sachin Garg, Chandra M. R. Kintala, Saurabh Bagchi. 240-247 [doi]
- An On-Line Control Flow Checking Method for VLIW ProcessorShuming Chen, Xiao Hu, Biwei Liu, Jihua Chen. 248-255 [doi]
- Towards Byzantine Fault Tolerance in Many-Core Computing PlatformsCasey M. Jeffery, Renato J. O. Figueiredo. 256-259 [doi]
- Heterogeneous Functional Units for High Speed Fault-Tolerant Execution StageYousuke Nakamura, Kei Hiraki. 260-263 [doi]
- A Low-Power and SEU-Tolerant Switch Architecture for Network on ChipsAhmad Patooghy, Mahdi Fazeli, Seyed Ghassem Miremadi. 264-267 [doi]
- Power-Performance Trade-Off of a Dependable Multicore ProcessorToshinori Sato, Toshimasa Funaki. 268-273 [doi]
- Examining Web-Based Spyware Invasion with Stateful Behavior MonitoringMing-Wei Wu, Sy-Yen Kuo. 275-281 [doi]
- A Process Group Membership Service for Active Safety Systems Using TT/ET Communication SchedulingCarl Bergenhem, Johan Karlsson. 282-289 [doi]
- Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-IsolationDamián Serrano, Marta Patiño-Martínez, Ricardo Jiménez-Peris, Bettina Kemme. 290-297 [doi]
- PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM ServersJangwoo Kim, Jared C. Smolens, Babak Falsafi, James C. Hoe. 298-305 [doi]
- Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing ProtocolsJichiang Tsai, Chia-Yang Chen, Ming-Fa Hu, Jenn-Wei Lin. 306-313 [doi]
- RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable NetworksKai Han, Binoy Ravindran, E. Douglas Jensen. 314-321 [doi]
- Benchmarking the Robustness of Web ServicesMarco Vieira, Nuno Laranjeiro, Henrique Madeira. 322-329 [doi]
- The Cost of Storing Checkpoints to Multiple Volatile Storage Locations Using at-least-k SemanticsAndrew Maloney, Andrzej Goscinski. 330-333 [doi]
- A Proposal of New Dependable Database Middleware with Consistency and Concurrency ControlTakeshi Mishima, Hiroshi Nakamura. 334-337 [doi]
- Improving Email Reliability by Sender RetransmissionTim Moors, Patrick Chu. 338-341 [doi]
- Implementation of a Flexible Membership Protocol on a Real-Time Ethernet PrototypeRaul Barbosa, António Ferreira, Johan Karlsson. 342-347 [doi]
- MAPMon: A Host-Based Malware Detection ToolShih-Yao Dai, Sy-Yen Kuo. 349-356 [doi]
- Intrusion Tolerance in Wireless Environments: An Experimental EvaluationHenrique Moniz, Nuno Ferreira Neves, Miguel Correia, Antonio Casimiro, Paulo Veríssimo. 357-364 [doi]
- Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS AttacksJosé Fonseca, Marco Vieira, Henrique Madeira. 365-372 [doi]
- Resilient Intrusion Tolerance through Proactive and Reactive RecoveryPaulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Veríssimo. 373-380 [doi]
- Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 StandardStefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar R. Weippl. 381-388 [doi]
- A Fault-Tolerant Bloom Filter for Deep Packet InspectionMyeong-Hyeon Lee, Yoon-Hwa Choi. 389-396 [doi]
- Applying a Threshold Scheme to the Pseudonymization of Health DataBernhard Riedl, Veronika Grascher, Thomas Neubauer. 397-400 [doi]
- On the Effects of Finite Memory on Intrusion-Tolerant SystemsGiuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Veríssimo. 401-404 [doi]
- An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server CompromiseHongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang. 405-408 [doi]