default search action
PRDC 2004: Papeete, Tahiti
- 10th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2004), 3-5 March 2004, Papeete, Tahiti. IEEE Computer Society 2004, ISBN 0-7695-2076-6
Web and WAN Dependability
- Markus Debusmann, Kurt Geihs:
Towards Dependable Web Services. 5-14 - Gunjan Khanna, Saurabh Bagchi, John Rogers:
Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers. 15-24 - Mohit Lad, Akash Nanavati, Daniel Massey, Lixia Zhang:
An Algorithmic Approach to Identifying Link Failures. 25-34
Practical Experience Reports I
- Shubhendu S. Mukherjee, Joel S. Emer, Tryggve Fossum, Steven K. Reinhardt:
Cache Scrubbing in Microprocessors: Myth or Necessity? 37-42 - E. Ciocca, Israel Koren, Zahava Koren, C. Mani Krishna, Daniel S. Katz:
Application-Level Fault Tolerance in the Orbital Thermal Imaging Spectrometer. 43-48 - Amir Rajabzadeh, Mirzad Mohandespour, Seyed Ghassem Miremadi:
Error Detection Enhancement in COTS Superscalar Processors with Event Monitoring Features. 49-54
Distributed Protocols and Systems
- Achour Mostéfaoui, David Powell, Michel Raynal:
A Hybrid Approach for Building Eventually Accurate Failure Detectors. 57-65 - Jichiang Tsai:
Systematic Comparisons of RDT Communication-Induced Checkpointing Protocols. 66-75 - Tatsuhiro Tsuchiya, Tohru Kikuno:
On the Effects of Partial Membership Knowledge on Reliability of Gossip-Based Multicast. 76-83 - Roberto Baldoni, Roberto Beraldi, Sara Tucci Piergiovanni, Antonino Virgillito:
Measuring Notification Loss in Publish/Subscribe Communication Systems. 84-93
Software Reliability and Testing
- Shiping Yang, Nan Sang, Guangze Xiong:
Safety Testing of Safety Critical Software Based on Critical Mission Duration. 97-102 - Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, Michael R. Lyu:
Optimal Allocation of Testing-Resource Considering Cost, Reliability, and Testing-Effort. 103-112 - Swapna S. Gokhale:
Quantifying the Variance in Application Reliability. 113-121 - Wei Xie, Yiguang Hong, Kishor S. Trivedi:
Software Rejuvenation Policies for Cluster Systems under Varying Workload. 122-129
Checkpointing and Recovery
- Kamilla Klonowska, Lars Lundberg, Håkan Lennerstad, Charlie Svahnberg:
Using Modulo Rulers for Optimal Recovery Schemes in Distributed Computing. 133-142 - Masayuki Arai, Tabito Suzuki, Mamoru Ohara, Satoshi Fukumoto, Kazuhiko Iwasaki, Hee Yong Youn:
Analysis of Read and Write Availability for Generalized Hybrid Data Replication Protocol. 143-150 - Hiroyuki Okamura, Yuki Nishimura, Tadashi Dohi:
A Dynamic Checkpointing Scheme Based on Reinforcement Learning. 151-158
Parallel and High-Performance Systems
- Jun Miyazaki, Yohei Abe, Haruo Yokota:
Availabilities and Costs of Reliable Fat-Btrees. 163-172 - Keiichi Kaneko, Yasuto Suzuki:
Node-to-Node Internally Disjoint Paths Problem in Bubble-Sort Graphs. 173-182 - Manabu Sueishi, Masato Kitakami, Hideo Ito:
Fault-Tolerant Message Switching Based on Wormhole Switching and Backtracking. 183-190
Distributed Systems Modeling
- Yung-Ruei Chang, Hung-Yau Lin, Sy-Yen Kuo:
Reliability Evaluation of Dependable Distributed Computing Systems Based on Recursive Merge and BDD. 197-206 - Xinyu Chen, Michael R. Lyu:
Expected-Reliability Analysis for Wireless CORBA with Imperfect Components. 207-215
Coding
- Haruhiko Kaneko, Mariko Numakami, Eiji Fujiwara:
Nonsystematic M-Ary Asymmetric Error Correcting Codes Designed by Multilevel Coding Method. 219-226 - G. Robert Redinbo, Cung Nguyen:
Protecting Wavelet Lifting Transforms. 227-236
Mobile Systems and Networks
- Chia-Ho Ou, Kuo-Feng Ssu, Hewijin Christine Jiau:
Connecting Network Partitions with Location-Assisted Forwarding Nodes in Mobile Ad Hoc Environments. 239-247 - Serdar Cabuk, Nipoon Malhotra, Longbi Lin, Saurabh Bagchi, Ness B. Shroff:
Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc Network. 248-257
Dependability Benchmarking
- Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun:
Benchmarking Operating System Dependability: Windows 2000 as a Case Study. 261-270 - James Mauro, Ji Zhu, Ira Pramanick:
The System Recovery Benchmark. 271-280
Fault Tolerance
- Diana Szentiványi, Simin Nadjm-Tehrani:
Aspects for Improvement of Performance in Fault-Tolerant Software. 283-291 - Andrea Bondavalli, Enrico De Giudici, Stefano Porcarelli, Salvatore Sabina, Fabrizio Zanini:
A Freshness Detection Mechanism for Railway Applications. 292-301 - Håkan Sivencrona, Torbjörn Olsson, Roger Johansson, Jan Torin:
RedCAN: Simulations of Two Fault Recovery Algorithms for CAN. 302-311
Practical Experience Reports II
- Lorena Anghel, Nadir Achouri, Michael Nicolaidis:
Evaluation of Memory Built-in Self Repair Techniques for High Defect Density Technologie. 315-320 - Shyue-Kung Lu, Chien-Hung Yeh, Han-Wen Lin:
Efficient Built-in Self-Test Techniques for Memory-Based FFT Processors. 321-326 - Ghazanfar Asadi, Seyed Ghassem Miremadi, Hamid R. Zarandi, Ali Reza Ejlali:
Evaluation of Fault-Tolerant Designs Implemented on SRAM-Based FPGAs. 327-332
Panel
- Raphael R. Some, Algirdas Avizienis, Jiri Gaisler, Hirokazu Ihara, Shubu Mukherjee, Neeraj Suri:
Panel Summary Statements. 335-40
Validation and Modeling
- Rainer Knauf, Setsuo Tsuruta, Hirokazu Ihara, Avelino J. Gonzalez, Torsten Kurbad:
Improving AI Systems? Dependability by Utilizing Historical Knowledge. 343-352 - Christopher Martin, Philip Koopman:
Representing User Workarounds as a Component of System Dependability. 353-362 - Simona Bernardi, Susanna Donatelli:
Stochastic Petri Nets and Inheritance for Dependability Modelling. 363-372 - Hsu-Chun Yen, Lien-Po Yu:
Dependability Analysis of a Class of Probabilistic Petri Nets. 373-380
Practical Experience Reports III
- Marc Dacier, Fabien Pouget, Hervé Debar:
Honeypots: Practical Means to Validate Malicious Fault Assumptions. 383-388 - Anil Sharma, Jason R. Martin, Nitin Anand, Michel Cukier, William H. Sanders:
Ferret: A Host Vulnerability Checking Tool. 389-394 - Jinmin Yang, Dafang Zhang, Zheng Qin, Xue Dong Yang:
WINDAR: A Multithreaded Rollback-Recovery Toolkit on Windows. 395-400 - Sheng Li, Jun Xu, Lijun Deng:
Periodic Partial Validation: Cost-Effective Source Code Validation Process in Cross-Platform Software Development Environment. 401-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.