Abstract is missing.
- Reliability Analysis of Single Bus Communication with Real-Time RequirementsMaurice Sebastian, Rolf Ernst. 3-10 [doi]
- A Test Vector Compression/Decompression Scheme Based on Logic Operation between Adjacent Bits (LOBAB) CodingHuaguo Liang, Wenfa Zhan, Qiang Luo, Cuiyun Jiang. 11-16 [doi]
- Variation-Aware Scheduling for Chip Multiprocessors with Thread Level RedundancyJianbo Dong, Lei Zhang, Yinhe Han, Guihai Yan, Xiaowei Li. 17-22 [doi]
- Quantitative Analysis of Long-Latency Failures in System SoftwareKeun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer. 23-30 [doi]
- A Synthesis Software Reliability ModelXiaoying Hu, Shiyi Xu. 31-36 [doi]
- Using the NuSMV Model Checker for Test Generation from StatechartsMasaya Kadono, Tatsuhiro Tsuchiya, Tohru Kikuno. 37-42 [doi]
- A Novel Generation Algorithm of Pair-Wise Testing CasesJianhua Gao, Yuefeng Hu. 43-48 [doi]
- Impact of Hazards on Pattern Selection for Small Delay DefectsJie Wang, Huawei Li, Yinghua Min, Xiaowei Li, Huaguo Liang. 49-54 [doi]
- Fault Injection Scheme for Embedded Systems at Machine Code Level and VerificationAng Jin, Jianhui Jiang. 55-62 [doi]
- Small Delay Fault Simulation for Sequential CircuitsLi Liu, Jishun Kuang, Huawei Li. 63-68 [doi]
- Built-In Self-Repair Techniques for Heterogeneous Memory CoresZhen-Yu Wang, Yi-Ming Tsai, Shyue-Kung Lu. 69-74 [doi]
- Flip-Flop Selection for Transition Test Pattern Reduction Using Partial Enhanced ScanSongwei Pei, Huawei Li, Xiaowei Li. 75-80 [doi]
- A GA-Based Method for High-Quality X-Filling to Reduce Launch Switching Activity in At-speed Scan TestingYuta Yamato, Xiaoqing Wen, Kohei Miyase, Hiroshi Furukawa, Seiji Kajihara. 81-86 [doi]
- On the Computational Complexity of Parameter Estimation in Adaptive Testing StrategiesFeng Ye, Chang Liu, Hai Hu, Chang-Hai Jiang, Kai-Yuan Cai. 87-92 [doi]
- A New Approach to Automated Redundancy Reduction for Test SequencesHuaikou Miao, Pan Liu, Jia Mei, Hongwei Zeng. 93-98 [doi]
- Prioritized Test Generation Strategy for Pair-Wise TestingJianhua Gao, Jie Zhu. 99-102 [doi]
- Test Case Reuse Based on OntologyLizhi Cai, Weiqin Tong, Zhenyu Liu, Juan Zhang. 103-108 [doi]
- Evaluating the Use of Reference Run Models in Fault Injection AnalysisMatthew Leeke, Arshad Jhumka. 121-124 [doi]
- Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity MetricsSang Min Lee, Dong Seong Kim, YoungHyun Yoon, Jong Sou Park. 127-134 [doi]
- Low-Overhead Architecture for Security TagRyota Shioya, Daewung Kim, Kazuo Horio, Masahiro Goshima, Shuichi Sakai. 135-142 [doi]
- A Trust-Based Benchmark for DBMS ConfigurationsAfonso Araújo Neto, Marco Vieira. 143-150 [doi]
- Performance and Reliability of a Revocation Method Utilizing Encrypted Backup DataKazuki Takayama, Haruo Yokota. 151-158 [doi]
- Parallel Training Strategy Based on Support Vector Regression MachineYong-mei Lei, Yu Yan, Shao-jun Chen. 159-164 [doi]
- A Lightweight Network Intrusion Detection Model Based on Feature SelectionDai Hong, Haibo Li. 165-168 [doi]
- String-Wise Information Flow Tracking against Script Injection AttacksKunbo Li, Ryota Shioya, Masahiro Goshima, Shuichi Sakai. 169-176 [doi]
- Representing X-Code Using Latin SquaresGang Wang, Sheng Lin, Xiaoguang Liu, Jing Liu. 177-182 [doi]
- Entropy Based Method for Network Anomaly DetectionQian Quan, Che Hong-Yi, Zhang Rui. 189-191 [doi]
- Chip-Level Redundancy in Distributed Shared-Memory MultiprocessorsBrian T. Gold, Babak Falsafi, James C. Hoe. 195-201 [doi]
- A Reliable Non-volatile Memory System: Exploiting File-System CharacteristicsChin-Hsien Wu, Wen-Yen Chang, Zen-Wei Hong. 202-207 [doi]
- Making Overlay Networks more Robust to Massive FailuresHakem Beitollahi, Geert Deconinck. 214-221 [doi]
- Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc EnvironmentsWei-Tong Wang, Kuo-Feng Ssu, Cheng-Chieh Chien, Yu-Yuan Lin. 222-227 [doi]
- An Attack Injection Approach to Evaluate the Robustness of Ad Hoc NetworksDavid de Andrés, Jesus Friginal, Juan Carlos Ruiz, Pedro J. Gil. 228-233 [doi]
- Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault InjectionAndrea Ceccarelli, Andrea Bondavalli, Danilo Iovino. 234-241 [doi]
- A Regular Expression Matching Algorithm Using Transition MergingJiekun Zhang, Dafang Zhang, Kun Huang. 242-246 [doi]
- A Novel Process Migration Method for MPI ApplicationsTiantian Liu, Zhong Ma, Zhonghong Ou. 247-251 [doi]
- Dependability Evaluation for Internet-Based Remote SystemsMasato Kitakami, Akihiro Katada, Kazuteru Namba, Hideo Ito. 256-259 [doi]
- Holography: A Hardware Virtualization Tool for Malware AnalysisShih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo. 263-268 [doi]
- Delayed Processing Technique in Critical Sections for Real-Time LinuxMaobing Dai, Yutaka Ishikawa. 269-275 [doi]
- A New Multiple-Round DOR Routing for 2D Network-on-Chip MeshesBinzhang Fu, Yinhe Han, Huawei Li, Xiaowei Li. 276-281 [doi]
- Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks PlanningChi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo. 282
- Dependability Benchmarking Using Software Faults: How to Create Practical and Representative FaultloadsPedro Costa, João Gabriel Silva, Henrique Madeira. 289-294 [doi]
- Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel ReliabilityRoberto Jung Drebes, Takashi Nanya. 295-300 [doi]
- Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web ServicesNuno Antunes, Marco Vieira. 301-306 [doi]
- D2STM: Dependable Distributed Software Transactional MemoryMaria Couceiro, Paolo Romano, Nuno Carvalho, LuÃs Rodrigues. 307-313 [doi]
- Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux ServersDong Tang, William Bryson. 314-318 [doi]
- Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor NetworksYu-Yuan Lin, Kuo-Feng Ssu. 319-324 [doi]
- Quiescent Leader Election in Crash-Recovery SystemsMikel Larrea, Cristian MartÃn. 325-330 [doi]
- Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor NetworksSung-Jib Yim, Yoon-Hwa Choi. 331-335 [doi]
- Quantifying Criticality of Dependability-Related IT Organization Processes in CobiTTobias Goldschmidt, Andreas Dittrich, Miroslaw Malek. 336-341 [doi]
- Online Computing and Predicting Architectural Vulnerability Factor of Microprocessor StructuresSongjun Pan, Yu Hu, Xiaowei Li. 345-350 [doi]
- Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time SystemsWanfu Ding, Ruifeng Guo. 351-356 [doi]
- An Early-Stopping Protocol for Computing Aggregate Functions in Sensor NetworksAntonio Fernández Anta, Miguel A. Mosteiro, Christopher Thraves. 357-364 [doi]
- Availability Modeling and Analysis of a Virtualized SystemDong Seong Kim, Fumio Machida, Kishor S. Trivedi. 365-371 [doi]
- The Instruction Scheduling for Soft Errors Based on Data Flow AnalysisJianjun Xu, Qingping Tan, Rui Shen. 372-378 [doi]
- Evaluating the Impact of Irrecoverable Read Errors on Disk Array ReliabilityJehan-François Pâris, Ahmed Amer, Darrell D. E. Long, Thomas J. E. Schwarz. 379-384 [doi]
- A Measurement System to Improve E-Business Capability of Human Resources in an Organizational Computing EnvironmentChui Young Yoon, Keon-Myung Lee, Joongnam Jeon, In-Sung Lee. 385-388 [doi]