Abstract is missing.
- Parametric Bootstrapping for Assessing Software Reliability MeasuresToshio Kaneishi, Tadashi Dohi. 1-9 [doi]
- Estimating Software Intensity Function via Multiscale Analysis and Its Application to Reliability AssessmentXiao Xiao, Tadashi Dohi. 10-19 [doi]
- Unification of Software Reliability Models Using Markovian Arrival ProcessesHiroyuki Okamura, Tadashi Dohi. 20-27 [doi]
- Using Dependability Benchmarks to Support ISO/IEC SQuaREJesus Friginal, David de Andrés, Juan Carlos Ruiz, Regina Moraes. 28-37 [doi]
- Augmenting Functional Broadside Tests for Transition Fault Coverage with Bounded Switching ActivityIrith Pomeranz. 38-44 [doi]
- Generation of Mixed Broadside and Skewed-Load Diagnostic Test Sets for Transition FaultsIrith Pomeranz. 45-52 [doi]
- A Dependability Solution for Homogeneous MPSoCsXiao Zhang, Hans G. Kerkhoff. 53-62 [doi]
- Gossiping with Network CodingShun Tokuyama, Tatsuhiro Tsuchiya, Tohru Kikuno. 63-70 [doi]
- On Detecting Termination in Cognitive Radio NetworksShantanu Sharma 0001, Awadhesh Kumar Singh. 71-78 [doi]
- Utilizing Hidden Markov Models for Formal Reliability Analysis of Real-Time Communication Systems with ErrorsMaurice Sebastian, Philip Axer, Rolf Ernst. 79-88 [doi]
- RAMpage: Graceful Degradation Management for Memory Errors in Commodity Linux ServersHorst Schirmeier, Jens Neuhalfen, Ingo Korb, Olaf Spinczyk, Michael Engel. 89-98 [doi]
- Exploiting Total Order Multicast in Weakly Consistent Transactional CachesPedro Ruivo, Maria Couceiro, Paolo Romano, Luís Rodrigues. 99-108 [doi]
- COMeT: Continuous Online Memory TestMusfiq Rahman, Bruce R. Childers, Sangyeun Cho. 109-118 [doi]
- Efficient Task Allocation to FPGAs in the Safety Critical DomainPhilippa Conmy, Iain Bate. 119-128 [doi]
- Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power PlantsChi-Shiang Cho, Wei-Ho Chung, Deyun Gao, Hongke Zhang, Sy-Yen Kuo. 129-134 [doi]
- Dependability Improvement for Critical SystemsHerbert Hecht. 135-143 [doi]
- Numerical Defect Correction as an Algorithm-Based Fault Tolerance Technique for Iterative SolversFabian Oboril, Mehdi Baradaran Tahoori, Vincent Heuveline, Dimitar Lukarski, Jan-Philipp Weiss. 144-153 [doi]
- Bio-inspired Error Detection for Complex SystemsMartin Drozda, Iain Bate, Jon Timmis. 154-163 [doi]
- Self-Checking Components for Dependable Interactive Cockpits Using Formal Description TechniquesA. Tankeu-Choitat, David Navarre, Philippe A. Palanque, Yannick Deleris, Jean-Charles Fabre, Camille Fayollas. 164-173 [doi]
- Characterizing Attackers and Attacks: An Empirical StudyGabriel Salles-Loustau, Robin Berthier, Etienne Collange, Bertrand Sobesto, Michel Cukier. 174-183 [doi]
- Specification-Based Intrusion Detection for Advanced Metering InfrastructuresRobin Berthier, William H. Sanders. 184-193 [doi]
- A Clustering Approach for Web Vulnerabilities DetectionAnthony Dessiatnikoff, Rim Akrout, Eric Alata, Mohamed Kaâniche, Vincent Nicomette. 194-203 [doi]
- Workload Adaptive Checkpoint Scheduling of Virtual Machine ReplicationBalazs Gerofi, Yutaka Ishikawa. 204-213 [doi]
- Resilient Virtual ClustersMichael Le, Israel Hsu, Yuval Tamir. 214-223 [doi]
- Recovery from Failures Due to Mandelbugs in IT SystemsKishor S. Trivedi, Rajesh K. Mansharamani, Dong Seong Kim, Michael Grottke, Manoj Nambiar. 224-233 [doi]
- Trend Analyses of Accidents and Dependability Improvement in Financial Information SystemsKoichi Bando, Kenji Tanaka. 234-243 [doi]
- Layered Diagnosis and Clock-Rate Correction for the TTEthernet Clock Synchronization ProtocolWilfried Steiner, Bruno Dutertre. 244-253 [doi]
- A Self-Stabilizing Synchronization Protocol for Arbitrary Digraphs: A Self-Stabilizing Distributed Clock Synchronization Protocol For Arbitrary DigraphsMahyar R. Malekpour. 254-263 [doi]
- Area-Per-Yield and Defect Level of Cascaded TMR for Pipelined ProcessorsMasayuki Arai, Kazuhiko Iwasaki. 264-271 [doi]
- Correcting DFT Codes with Modified Berlekamp-Massey Algorithm and Syndrome ExtensionG. Robert Redinbo. 272-273 [doi]
- Towards Making Dependability Visual - Combining Model-Based Design and Virtual RealitiesMatthias Güdemann, Michael Lipaczewski, Frank Ortmeier, Marco Schumann, Robert Eschbach. 274-275 [doi]
- A Method of Gate-Level Circuit Reliability Estimation Based on Iterative PTM ModelJie Xiao, Jianhui Jiang, Xuguang Zhu, Chengtian Ouyang. 276-277 [doi]
- A Framework for Systematic Testing of Multi-threaded ApplicationsMihai Florian. 278-279 [doi]
- Model Checking Multitask Applications for OSEK Compliant Real-Time Operating SystemsMark L. McKelvin Jr., Edward B. Gamble Jr., Gerard J. Holzmann. 280-281 [doi]
- Task Mapping and Partition Allocation for Mixed-Criticality Real-Time SystemsDomitian Tamas-Selicean, Paul Pop. 282-283 [doi]
- Revisiting Fault-Injection Experiment-Platform ArchitecturesHorst Schirmeier, Martin Hoffmann, Rüdiger Kapitza, Daniel Lohmann, Olaf Spinczyk. 284-285 [doi]
- Test Generation and Computational ComplexityJózsef Sziray. 286-287 [doi]
- One Optimization Method on the Navigation Performance Reliability of Planing CraftSonglin Yang, Ning Yu, Feng Zhu, Huilei Li. 288-289 [doi]
- Native Binary Mutation Analysis for Embedded Software and Virtual Prototypes in SystemCChristoph Kuznik, Wolfgang Müller 0003. 290-291 [doi]
- A Test Model for Hardware and SoftwareJózsef Sziray. 292-293 [doi]
- Tool Supported Model-Based Safety Analysis and OptimizationMatthias Güdemann, Michael Lipaczewski, Frank Ortmeier. 294-295 [doi]
- A Method of Calculating Safety Integrity Level for IEC 61508 Conformity SoftwareTakaji Fujiwara, Mitsuhiro Kimura, Yoshinobu Satoh, Shigeru Yamada. 296-301 [doi]
- Automatic Robustness Assessment of DDS-Compliant MiddlewareAniello Napolitano, Gabriella Carrozza, Antonio Bovenzi, Christian Esposito. 302-307 [doi]
- Failure Analysis of a Complex Learning Framework Incorporating Multi-modal and Semi-supervised LearningLaura L. Pullum, Christopher T. Symons. 308-313 [doi]
- Malware Profiler Based on Innovative Behavior-Awareness TechniqueShih-Yao Dai, Fyodor Yarochkin, Sy-Yen Kuo, Ming-Wei Wu, Yennun Huang. 314-319 [doi]
- Access Control of Web and Java Based ApplicationsKam S. Tso, Michael J. Pajevski, Bryan Johnson. 320-325 [doi]