


default search action
PRDC 2002: Tsukuba-City, Ibarski, Japan
- 9th Pacific Rim International Symposium on Dependable Computing (PRDC 2002), 16-18 December 2002, Tsukuba-City, Ibarski, Japan. IEEE Computer Society 2002, ISBN 0-7695-1852-4

Keynote Speech (I)
- Yoshihiro Tohma:

Fault Tolerance in Autonomic Computing Environment. 3-8
Dependable Distributed Systems (I)
- HariGovind V. Ramasamy, Michel Cukier, William H. Sanders:

Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System. 9-18 - Roberto Baldoni, Carlo Marchetti

, Sara Tucci Piergiovanni:
Asynchronous Active Replication in Three-Tier Distributed Systems. 19-28
Checkpointing
- Jichiang Tsai, Jenn-Wei Lin:

On Characteristics of DEF Communication-Induced Checkpointing Protocols. 29-36 - Chi-Yi Lin, Szu-Chi Wang, Sy-Yen Kuo

, Ing-Yi Chen:
A Low Overhead heckpointing Protocol for Mobile Computing Systems. 37-44 - Hyunjoo Kim, Heon Young Yeom, Taesoon Park, Hyoung-Woo Park:

The Cost of Checkpointing, Logging and Recovery for the Mobile Agent Systems. 45-50
Dependable Systems (I)
- Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, Thomas Marteau:

Analysis of the Effects of Real and Injected Software Faults: . 51-58 - François Taïani

, Jean-Charles Fabre, Marc-Olivier Killijian:
Principles of Multi-Level Reflection for Fault Tolerant Architectures. 59-66 - Minsu Choi, Nohpill Park, Yong-Bin Kim, Fabrizio Lombardi:

Hardware/Software Co-Reliability of Configurable Digital Systems. 67-74 - Yousuke Nakamura, Kei Hiraki:

Highly Fault-Tolerant FPGA Processor by Degrading Strategy. 75-80
Reliability/Dependability Analysis
- Piotr Gawkowski

, Janusz Sosnowski
:
Using Software Implemented Fault Inserter in Dependability Analysis. 81-88 - Fu-Min Yeh, Hung-Yau Lin, Sy-Yen Kuo

:
Analyzing Network Reliability With Imperfect Nodes Using OBDD. 89-96 - Yuan-Shun Dai, Min Xie

, Kim-Leng Poh:
Reliability Analysis of Grid Computing Systems. 97-104 - Örjan Askerdal, Magnus Gäfvert

, Martin Hiller, Neeraj Suri
:
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems. 105-116
Keynote Speech (II)
- Miron Livny, Douglas Thain

:
Caveat Emptor: Making Grid Services Dependable from the Client Side. 117-120
Dependable Distributed Systems (II)
- Michel Raynal:

An Introduction to the Renaming Problem. 121-124 - Jennifer Ren, Paul Rubel, Mouna Seri, Michel Cukier, William H. Sanders, Tod Courtney:

Passive Replication Schemes in Aqua. 125-130 - Tatsuhiro Tsuchiya

, Masahide Nakamura
, Tohru Kikuno:
Detecting Feature Interactions in Telecommunication Services with a SAT Solver. 131-136
Dependable Networks
- Toshinori Takabatake, Masato Kitakami, Hideo Ito:

Fault-Tolerant Properties of Generalized Hierarchical Completely-Connected Networks. 137-144 - Sangman Moh, Chansu Yu, Ben Lee, Hee Yong Youn:

Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks. 145-152 - Nobuo Tsuda:

Configurable PC Clusters Using a Hierarchical Complete-Connection-Based Switching Network. 153-162
Keynote Speech (III)
- Leon Alkalai:

Perspectives on Dependable Computing for Solar System Exploration. 163-166
Dependable Systems (II)
- Yasushi Shinjo, Kotaro Eiraku, Atsushi Suzuki, Kozo Itano, Calton Pu:

Enhancing Access Control with SysGuard, Reference Monitor Supporting Portable and Composable Kernel Module. 167-176 - Young Jin Nam, Chanik Park:

An Adaptive High-Low Water Mark Destage Algorithm for Cached RAID5. 177-184 - Kuan-Sheng Hsueh, Sheng-De Wang:

A Packet-Based Caching Proxy with Loss Recovery for Video Streaming. 185-192
Dependability Evaluation and Verification
- Yung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo

:
Reliability Evaluation of Multi-state Systems Subject to Imperfect Coverage using OBDD. 193-200 - João Durães

, Henrique Madeira
:
Characterization of Operating Systems Behavior in the Presence of Faulty Drivers through Software Fault Emulation. 201-209 - Tomoya Kitai, Yusuke Oguro, Tomohiro Yoneda, Eric Mercer, Chris J. Myers

:
Level Oriented Formal Model for Asynchronous Circuit Verification and its Efficient Analysis Method. 210-220
Consensus in Distributed Systems
- Michel Raynal:

Consensus in Synchronous Systems: A Concise Guided Tour. 221-228 - Jiannong Cao

, Xianbing Wang, Siu Lo
, Sajal K. Das
:
A Consensus Algorithm for Synchronous Distributed Systems using Mobile Agent. 229-238
Coding
- Masayuki Arai, Hitoshi Kurosu, Satoshi Fukumoto, Kazuhiko Iwasaki:

Evaluation of Convolutional-Code-Based FEC under Limited Recovery Time and Its Application to Real-time Transmission. 239-246 - Ganesan Umanesan, Eiji Fujiwara:

A Class of Random Multiple Bits in a Byte Error Correcting (S t/b EC)Codes for Semiconductor Memory Systems. 247-256
Dependable Database
- Hideyuki Kawashima, Motomichi Toyama, Yuichiro Anzai, Michita Imai:

Providing Persistence or Sensor Streams with Light Neighbor WAL. 257-264 - Marco Vieira

, Henrique Madeira
:
Definition of Faultloads Based on Operator Faults for DMBS Recovery Benchmarking. 265-274
Test
- Hiroshi Takahashi, Kewal K. Saluja, Yuzo Takamatsu:

An Alternative Method of Generating Tests for Path Delay Faults Using N -Detection Test Sets. 275-282 - Shyue-Kung Lu, Chien-Hung Yeh:

Enhancing Delay Fault Testability for Iterative Logic Array. 283-292
Neural Network
- Kin'ya Takahashi, Kunihito Yamamori, Ikuo Yoshihara, Susumu Horiguchi:

Comparison with Defect Compensation Methods for Feed-forward Neural Networks. 293-300 - Itsuo Takanami, Yasuhiro Oyama:

An Extreme Value Injection Approach with Reduced Learning Time to Make MLNs Multiple-Weight-Fault Tolerant. 301-310
Practical Reports
- Cristina Simache, Mohamed Kaâniche, Ayda Saïdane:

Event Log based Dependability Analysis of Windows NT and 2K Systems. 311-315 - Joaquin Gracia, Daniel Gil, Juan Carlos Baraza, Pedro J. Gil:

Using VHDL-Based Fault Injection to exercise Error Detection Mechanisms in the Time-Triggered Architecture. 316-320 - Hiroshi Nakamura

, Takanori Arai, Masahiro Fujita:
Formal Verification of a Pipelined Processor with New Memory. 321-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














