


default search action
21st PRDC 2015: Zhangjiajie, China
- Guojun Wang, Tatsuhiro Tsuchiya, Dong Xiang:

21st IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2015, Zhangjiajie, China, November 18-20, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9376-8
Regular Papers 1: Fault Injection and Monitoring
- Jose Luis Nunes

, Tamas Pecserke, João Carlos Cunha
, Mário Zenha Rela
:
FIRED - Fault Injector for Reconfigurable Embedded Devices. 1-10 - Claudio Ciccotelli, Leonardo Aniello

, Federico Lombardi
, Luca Montanari, Leonardo Querzoni
, Roberto Baldoni:
NIRVANA: A Non-intrusive Black-Box Monitoring Framework for Rack-Level Fault Detection. 11-20
Regular Papers 2: Software Aspects of Dependable Computing
- Bruno Cabral

, Alcides Fonseca
, Paulo Marques, Jonathan Aldrich
:
Cooperative Exceptions for Concurrent Objects. 21-31 - Aurélien Cavelan, Yves Robert

, Hongyang Sun, Frédéric Vivien
:
Scheduling Independent Tasks with Voltage Overscaling. 32-41 - Maryam Mouzarani, Babak Sadeghiyan, Mohammad Zolfaghari:

A Smart Fuzzing Method for Detecting Heap-Based Buffer Overflow in Executable Codes. 42-49
Regular Papers 3: Cyber Physical Systems
- Igor Kaitovic, Slobodan Lukovic

, Miroslaw Malek:
Unifying Dependability of Critical Infrastructures: Electric Power System and ICT: Concepts, Figures of Merit and Taxonomy. 50-59 - Carmen Cheh

, Gabriel A. Weaver, William H. Sanders:
Cyber-Physical Topology Language: Definition, Operations, and Application. 60-69 - Giedre Sabaliauskaite

, Geok See Ng
, Justin Ruths, Aditya P. Mathur:
Experimental Evaluation of Stealthy Attack Detection in a Robot. 70-79
Regular Papers 4: Distributed Computing
- Dilshod Rahmatov, Jan Steffen Becker, Oliver E. Theel:

A Transformational Approach for the Hardening of Region-Adherent Algorithms. 80-90
Regular Papers 5: Sensor Networks
- Md. Zakirul Alam Bhuiyan, Guojun Wang, Jie Wu, Xiaofei Xing, Xiangyong Liu:

Application-Oriented Sensor Network Architecture for Dependable Structural Health Monitoring. 91-98 - Chen Gu

, Matthew Bradbury
, Arshad Jhumka, Matthew Leeke:
Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. 99-108 - Katarina Balac, Mauro Prevostini, Miroslaw Malek:

Optimizing Sensor Nodes Placement for Fault-Tolerant Trilateration-Based Localization. 109-118
Regular Papers 6: Safety Contracts and Other Issues
- Omar Jaradat

, Iain Bate:
Deriving Hierarchical Safety Contracts. 119-128 - Irfan Sljivo

, Barbara Gallina, Jan Carlson, Hans Hansson:
Using Safety Contracts to Guide the Integration of Reusable Safety Elements within ISO 26262. 129-138 - Koichi Bando, Yutaka Matsuno, Kenji Tanaka:

Failure Analyses of Communications Systems and Networks by Publicly Available Failure Information from the viewpoint of Dependability. 139-148
Regular Papers 7: Dependability Modeling and Analysis
- Zhipeng Yi, Tadashi Dohi, Hiroyuki Okamura:

Survivability Quantification of Wireless Ad Hoc Network Taking Account of Border Effects. 149-158 - Tuan Anh Nguyen

, Taehoon Eom, SeongMo An, Jong Sou Park, Jin B. Hong
, Dong Seong Kim
:
Availability Modeling and Analysis for Software Defined Networks. 159-168 - Ruofan Xia, Fumio Machida, Kishor S. Trivedi:

A Scalable Optimization Framework for Storage Backup Operations Using Markov Decision Processes. 169-178 - Nuno Laranjeiro

, Seyma Nur Soydemir, Jorge Bernardino
:
A Survey on Data Quality: Classifying Poor Data. 179-188
Regular Papers 8: Systems for Availability, Integrity, and Resilience
- Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche, Guillaume Averlant:

Design and Implementation of a Hardware Assisted Security Architecture for Software Integrity Monitoring. 189-198 - Song Huang, Song Fu

, Nathan DeBardeleben, Qiang Guan, Cheng-Zhong Xu
:
Differentiated Failure Remediation with Action Selection for Resilient Computing. 199-208
Regular Papers 9: Networks and Distributed Systems
- Christian Fernández-Campusano

, Mikel Larrea
, Roberto Cortiñas
, Michel Raynal:
Eventual Leader Election Despite Crash-Recovery and Omission Failures. 209-214
Regular Papers 10: Dependable Computer Architectures
- Farshad Baharvand, Seyed Ghassem Miremadi:

ARMOR: Adaptive Reliability Management by On-the-Fly Redundancy in Multicore Embedded Processors. 215-224 - Farah Naz Taher, Joseph Callenes-Sloan:

Hardware Fault Compensation Using Discriminative Learning. 225-234
Regular Papers 11: Dependable Storages
- Thomas J. E. Schwarz, Ahmed Amer, Jehan-François Pâris:

Combining Low IO-Operations During Data Recovery with Low Parity Overhead in Two-Failure Tolerant Archival Storage Systems. 235-244 - Thomas J. E. Schwarz, Darrell D. E. Long, Jehan-François Pâris:

Triple Failure Tolerant Storage Systems Using Only Exclusive-Or Parity Calculations. 245-254 - Haruhiko Kaneko

:
Failure Recovery Cost Reduction of Disk Arrays Using Adaptive Erasure Correction Coding and Data Compression. 255-263
Regular Papers 12: Cloud and Web Systems
- Matthew Ruffell, Jin B. Hong

, Dong Seong Kim
:
Analyzing the Effectiveness of Privacy Related Add-Ons Employed to Thwart Web Based Tracking. 264-272
Regular Papers 13: Testing and Verification
- Renji Ono, Satoshi Ohtake:

A Method of Diagnostic Test Generation for Transition Faults. 273-278 - Mikio Hashimoto, Naoko Yamada, Jun Kanai:

TREBIVETM: A TREe Based Integrity Verification Environment for Non-volatile Memory System. 279-289
Regular Papers 14: Recovery and Real-Time Computing
- Xiao Chen, Jian-Hui Jiang, Qu Jiang:

A Method of Self-Adaptive Pre-Copy Container Checkpoint. 290-300 - Junjun Zheng

, Hiroyuki Okamura, Tadashi Dohi:
Component Importance Measures for Real-Time Computing Systems in the Presence of Common-Cause Failures. 301-310
Fast Abstracts 15
- Lujia Wang

, Qingpei Hu
, Min Xie
:
Bayesian Analysis for Software Reliability with Fault Detection and Correction Data. 311-312 - Satoshi Fukumoto, Mamoru Ohara:

Software Rejuvenation Schemes for Time Warp-Based PDES. 313-314 - Aromhack Saysanasongkham, Satoshi Fukumoto:

A Dual-FPGA Architecture with Rejuvenation for Realtime Applications. 315-316 - Jae J. Jang, Jaekun Moon, Im Young Jung:

A Personalized Access Control Based on IoT. 317-318
Industry Track Paper 16
- Sumeet Jauhar, Binbin Chen

, William G. Temple, Xinshu Dong, Zbigniew T. Kalbarczyk, William H. Sanders, David M. Nicol:
Model-Based Cybersecurity Assessment with NESCOR Smart Grid Failure Scenarios. 319-324
Poster Papers 17
- Weiguang Sheng, Zhongyuan Zhao, Zhigang Mao:

Parasitic Parameters Impacts Investigation on Soft Error Rate by a Circuit Level Framework. 325-326 - Eunji Pak, Young-Mok Ha, Jeman Park, Yongyeon Kim, Moonsub Song, Taeho Kim:

SYNDICATE: Software Platform for Distributed Real-Time System. 327-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














