


default search action
9th EDCC 2012: Sibiu, Romania
- Cristian Constantinescu, Miguel P. Correia:

2012 Ninth European Dependable Computing Conference, Sibiu, Romania, May 8-11, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-0938-7
Distributed Protocols
- José Valerio, Pascal Felber

, Martin Rajman
, Etienne Rivière:
CADA: Collaborative Auditing for Distributed Aggregation. 1-12 - Ali Ebnenasir, Aly Farahat:

Swarm Synthesis of Convergence for Symmetric Protocols. 13-24 - Léon Lim, Denis Conan

:
An Eventual alpha Partition-Participant Detector for MANETs. 25-36
Software and Data Replication
- João Sousa

, Alysson Neves Bessani
:
From Byzantine Consensus to BFT State Machine Replication: A Latency-Optimal Transformation. 37-48 - Peter Ulbrich

, Martin Hoffmann, Rüdiger Kapitza, Daniel Lohmann
, Wolfgang Schröder-Preikschat, Reiner N. Schmid:
Eliminating Single Points of Failure in Software-Based Redundancy. 49-60 - Ryan M. Lefever, Vikram S. Adve, William H. Sanders:

A Mirrored Data Structures Approach to Diverse Partial Memory Replication. 61-72
Embedded Systems and Critical Infrastructures
- David Powell, Jean Arlat, Hoang Nam Chu, Félix Ingrand

, Marc-Olivier Killijian:
Testing the Input Timing Robustness of Real-Time Control Software for Autonomous Systems. 73-83 - Silvano Chiaradonna, Felicita Di Giandomenico, Nicola Nostro

:
Analysis of Electric Power Systems Accounting for Interdependencies in Heterogeneous Scenarios. 84-93 - Chaunwen Chen, Navjot Singh, Shalini Yajnik:

Log Analytics for Dependable Enterprise Telephony. 94-101
Security in Large Scale Systems
- Oliviu Ghica, Cristina Nita-Rotaru, Goce Trajcevski, Peter Scheuermann:

Security of Electrostatic Field Persistent Routing: Attacks and Defense Mechanisms. 102-113 - Emmanuelle Anceaume, Yann Busnel

, Sébastien Gambs:
AnKLe: Detecting Attacks in Large Scale Systems via Information Divergence. 114-125 - Tudor Dumitras, Petros Efstathopoulos:

The Provenance of WINE. 126-131
Safety-Critical Systems
- Jan Nowotsch, Michael Paulitsch:

Leveraging Multi-core Computing Architectures in Avionics. 132-143 - Boris Malinowsky, Jesper Grønbæk, Hans-Peter Schwefel, Andrea Ceccarelli

, Andrea Bondavalli
, Edgar Nett:
Timed Broadcast via Off-the-Shelf WLAN Distributed Coordination Function for Safety-Critical Systems. 144-155 - Inna Pereverzeva, Elena Troubitsyna, Linas Laibinis:

Formal Development of Critical Multi-agent Systems: A Refinement Approach. 156-161
Dependability and Performance Benchmarking
- Domenico Cotroneo, Anna Lanzaro, Roberto Natella

, Ricardo Barbosa:
Experimental Analysis of Binary-Level Software Fault Injection in Complex Software. 162-172 - Raquel Almeida

, Marco Vieira
:
Changeloads for Resilience Benchmarking of Self-Adaptive Systems: A Risk-Based Approach. 173-184 - Anatoliy Gorbenko

, Vyacheslav S. Kharchenko
, Seyran Mamutov, Olga Tarasyuk
, Alexander B. Romanovsky
:
Exploring Uncertainty of Delays as a Factor in End-to-End Cloud Response Time. 185-190
Failure Detection and Diagnosis
- Fabíola Greve, Murilo Santos de Lima

, Luciana Arantes, Pierre Sens:
A Time-Free Byzantine Failure Detector for Dynamic Networks. 191-202 - Pedro Louro, João Garcia

, Paolo Romano
:
MultiPathPrivacy: Enhanced Privacy in Fault Replication. 203-211 - Denise Rotondi Azevedo, Ana Maria Ambrosio

, Marco Vieira
:
Applying Data Mining for Detecting Anomalies in Satellites. 212-217
Hardware Fault-Tolerance
- Hamed Farbeh

, Mahdi Fazeli
, Faramarz Khosravi, Seyed Ghassem Miremadi:
Memory Mapped SPM: Protecting Instruction Scratchpad Memory in Embedded Systems against Soft Errors. 218-226 - Jakob Lechner:

Designing Robust GALS Circuits with Triple Modular Redundancy. 227-236 - Dumitru-Mircea Chimerel, Costel Patrascu, Sabina Anghel, Yuval Katz, Wilfried Steiner:

On the Development of a Real-Time Ethernet Switch for Ultra-highly Dependable Applications. 237-242

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














