Abstract is missing.
- Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software FaultsIvano Irrera, João Durães, Marco Vieira, Henrique Madeira. 3-10 [doi]
- Searching Representative and Low Cost Fault Models for Intermittent Faults in Microcontrollers: A Case StudyJoaquin Gracia-Moran, Daniel Gil-Tomas, Juan Carlos Baraza, Luis J. Saiz-Adalid, Pedro J. Gil-Vicente. 11-18 [doi]
- Modeling the Propagation of Intermittent Hardware Faults in ProgramsLayali Rashid, Karthik Pattabiraman, Sathish Gopalakrishnan. 19-26 [doi]
- A Secure System-Wide Process Scheduler across Virtual MachinesHidekazu Tadokoro, Kenichi Kourai, Shigeru Chiba. 27-36 [doi]
- Implementing a Hybrid Virtual Machine Monitor for Flexible and Efficient Security MechanismsJunya Sawazaki, Toshiyuki Maeda, Akinori Yonezawa. 37-46 [doi]
- Customizing Virtual Machine with Fault Injector by Integrating with SpecC Device Model for a Software Testing Environment D-CloudToshihiro Hanawa, Hitoshi Koizumi, Takayuki Banzai, Mitsuhisa Sato, Shin'ichi Miura, Tadatoshi Ishii, Hidehisa Takamizawa. 47-54 [doi]
- FiRot: An Efficient Crosstalk Mitigation Method for Network-on-ChipsAhmad Patooghy, Mansour Shafaei, Seyed Ghassem Miremadi, H. Falahati, S. Taheri. 55-61 [doi]
- An Efficient Decision Unit for the Pair and Swap Methodology within Chip MultiprocessorsJames L. Weston, Masashi Imai, Tomohide Nagai, Takashi Nanya. 62-69 [doi]
- Address Remapping for Static NUCA in NoC-Based Degradable Chip-MultiprocessorsYing Wang, Lei Zhang 0008, Yinhe Han, Huawei Li, Xiaowei Li 0001. 70-76 [doi]
- Formal Verification of Industrial Software with Dynamic Memory ManagementSébastien Labbé, Arnaud Sangnier. 77-84 [doi]
- A Software Accelerated Life Testing ModelToshiya Fujii, Tadashi Dohi, Hiroyuki Okamura, Takaji Fujiwara. 85-92 [doi]
- Towards a Language for Communication among StakeholdersYutaka Matsuno, Jin Nakazawa, Makoto Takeyama, Midori Sugaya, Yutaka Ishikawa. 93-100 [doi]
- Sensitivity Analysis of the Minimum Task Period for Arbitrary Deadline Real-Time SystemsFengxiang Zhang, Alan Burns, Sanjoy K. Baruah. 101-108 [doi]
- An Improved Knowledge Connectivity Condition for Fault-Tolerant Consensus with Unknown ParticipantsJichiang Tsai, Che-Cheng Chang. 109-116 [doi]
- A Distributed Data Replication Protocol for File Versioning with Optimal Node AssignmentsTakahiko Ikeda, Mamoru Ohara, Satoshi Fukumoto, Masayuki Arai, Kazuhiko Iwasaki. 117-124 [doi]
- End-to-End Performability Analysis for Infrastructure-as-a-Service Cloud: An Interacting Stochastic Models ApproachRahul Ghosh, Kishor S. Trivedi, Vijay K. Naik, Dong Seong Kim. 125-132 [doi]
- Deadlock Detection Scheduling for Distributed Processes in the Presence of System FailuresAkikazu Izumi, Tadashi Dohi, Naoto Kaio. 133-140 [doi]
- Two Efficient Software Techniques to Detect and Correct Control-Flow ErrorsHamid R. Zarandi, Mohammad Maghsoudloo, Navid Khoshavi. 141-148 [doi]
- Analysis of Dependencies between Failures in the UNINETT IP Backbone NetworkAndrés J. Gonzalez, Bjarne E. Helvik, Jon Kåre Hellan, Pirkko Kuusela. 149-156 [doi]
- System-Level Vulnerability Estimation for Data CachesAlireza Haghdoost, Hossein Asadi, Amirali Baniasadi. 157-164 [doi]
- Loris - A Dependable, Modular File-Based Storage StackRaja Appuswamy, David C. van Moolenbroek, Andrew S. Tanenbaum. 165-174 [doi]
- Design and Implementation of a Fault Tolerant Single IP Address ClusterJun Kato, Hajime Fujita, Yutaka Ishikawa. 175-183 [doi]
- On the Reliability of Cascaded TMR SystemsMasashi Hamamatsu, Tatsuhiro Tsuchiya, Tohru Kikuno. 184-190 [doi]
- A Learning-Based Approach to Secure Web Services from SQL/XPath Injection AttacksNuno Laranjeiro, Marco Vieira, Henrique Madeira. 191-198 [doi]
- Estimating Computer Virus Propagation Based on Markovian Arrival ProcessesHiroyuki Okamura, Tadashi Dohi. 199-206 [doi]
- Dynamic Multilayer Routing to Achieve Location-HidingHakem Beitollahi, Geert Deconinck. 207-214 [doi]
- Sequential Frequency Vector Based System Call Anomaly DetectionYing Wu, Jianhui Jiang, Liangliang Kong. 215-222 [doi]
- Composition Kernel: A Multi-core Processor Virtualization Layer for Highly Functional Embedded SystemsTatsuo Nakajima, Yuki Kinebuchi, Alexandre Courbot, Hiromasa Shimada, Tsung-Han Lin, Hitoshi Mitake. 223-224 [doi]
- Optimal Inventory of Computer Repair Parts: A Fuzzy Systems ApproachLes M. Sztandera. 225-226 [doi]
- A Replacement Strategy for Canary Flip-FlopsYuji Kunitake, Toshinori Sato, Hiroto Yasuura. 227-228 [doi]
- Quantitative Evaluation of Integrity for Remote System Using the InternetMasato Kitakami, Hiroshi Konno, Kazuteru Namba, Hideo Ito. 229-230 [doi]
- A Speculative Byzantine Algorithm for P2P SystemYusuke Matsumoto, Hiromi Kobayashi. 231-232 [doi]
- Core-Local Memory Assisted ProtectionYuki Kinebuchi, Tatsuo Nakajima, Vinod Ganapathy, Liviu Iftode. 233-234 [doi]
- P-Bus: Programming Interface Layer for Safe OS Kernel ExtensionsHajime Fujita, Motohiko Matsuda, Toshiyuki Maeda, Shin'ichi Miura, Yutaka Ishikawa. 235-236 [doi]
- A Minimal Roll-Back Based Recovery Scheme for Fault Toleration in Pipeline ProcessorsJun Yao, Ryoji Watanabe, Takashi Nakada, Hajime Shimada, Yasuhiko Nakashima, Kazutoshi Kobayashi. 237-238 [doi]
- Reliability Evaluation of Flip-Flops Based on Probabilistic Transfer MatricesChengtian Ouyang, Jianhui Jiang, Jie Xiao. 239-240 [doi]
- Automatic Static Fault Tree Analysis from System ModelsJianwen Xiang, Kazuo Yanoo. 241-242 [doi]
- An Asynchronous Checkpoint-Based Redundant Multithreading ArchitectureJie Yin, Jianhui Jiang. 243-244 [doi]
- A Safe Measurement-Based Worst-Case Execution Time Estimation Using Automatic Test-Data GenerationLiangliang Kong, Jianhui Jiang. 245-246 [doi]
- A Hierarchical Model for Reliability Analysis of Sensor NetworksDong Seong Kim, Rahul Ghosh, Kishor S. Trivedi. 247-248 [doi]
- The Performance Analysis and Hardware Acceleration of Crypto-computations for Enhanced SecurityJed Kao-Tung Chang, Shaoshan Liu, Jean-Luc Gaudiot, Chen Liu. 249-250 [doi]
- Formal Validation and Requirements Management Based on the Jackson's Reference Model for Requirements and SpecificationsTakashi Kitamura, Keishi Okamoto, Makoto Takeyama. 251-252 [doi]