PRDC C

57 papers

YearTitle / Authors
20092009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November 2009
2009A GA-Based Method for High-Quality X-Filling to Reduce Launch Switching Activity in At-speed Scan Testing.
Yuta Yamato, Xiaoqing Wen, Kohei Miyase, Hiroshi Furukawa, Seiji Kajihara
2009A Lightweight Network Intrusion Detection Model Based on Feature Selection.
Dai Hong, Haibo Li
2009A Measurement System to Improve E-Business Capability of Human Resources in an Organizational Computing Environment.
Chui Young Yoon, Keon-Myung Lee, Joongnam Jeon, In Sung Lee
2009A New Approach to Automated Redundancy Reduction for Test Sequences.
Huaikou Miao, Pan Liu, Jia Mei, Hongwei Zeng
2009A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes.
Binzhang Fu, Yinhe Han, Huawei Li, Xiaowei Li
2009A Novel Generation Algorithm of Pair-Wise Testing Cases.
Jianhua Gao, Yuefeng Hu
2009A Novel Process Migration Method for MPI Applications.
Tiantian Liu, Zhong Ma, Zhonghong Ou
2009A Regular Expression Matching Algorithm Using Transition Merging.
Jiekun Zhang, Dafang Zhang, Kun Huang
2009A Reliable Non-volatile Memory System: Exploiting File-System Characteristics.
Chin-Hsien Wu, Wen-Yen Chang, Zeng-Wei Hong
2009A Synthesis Software Reliability Model.
Xiaoying Hu, Shiyi Xu
2009A Test Vector Compression/Decompression Scheme Based on Logic Operation between Adjacent Bits (LOBAB) Coding.
Huaguo Liang, Wenfa Zhan, Qiang Luo, Cuiyun Jiang
2009A Trust-Based Benchmark for DBMS Configurations.
Afonso Araújo Neto, Marco Vieira
2009An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks.
David de Andrés, Jesus Friginal, Juan-Carlos Ruiz-Garcia, Pedro J. Gil
2009An Early-Stopping Protocol for Computing Aggregate Functions in Sensor Networks.
Antonio Fernández Anta, Miguel A. Mosteiro, Christopher Thraves
2009Availability Modeling and Analysis of a Virtualized System.
Dong Seong Kim, Fumio Machida, Kishor S. Trivedi
2009Built-In Self-Repair Techniques for Heterogeneous Memory Cores.
Zhen-Yu Wang, Yi-Ming Tsai, Shyue-Kung Lu
2009Chip-Level Redundancy in Distributed Shared-Memory Multiprocessors.
Brian T. Gold, Babak Falsafi, James C. Hoe
2009Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services.
Nuno Antunes, Marco Vieira
2009D2STM: Dependable Distributed Software Transactional Memory.
Maria Couceiro, Paolo Romano, Nuno Carvalho, Luís E. T. Rodrigues
2009Delayed Processing Technique in Critical Sections for Real-Time Linux.
Maobing Dai, Yutaka Ishikawa
2009Dependability Benchmarking Using Software Faults: How to Create Practical and Representative Faultloads.
Pedro Costa, João Gabriel Silva, Henrique Madeira
2009Dependability Evaluation for Internet-Based Remote Systems.
Masato Kitakami, Akihiro Katada, Kazuteru Namba, Hideo Ito
2009Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor Networks.
Yu-Yuan Lin, Kuo-Feng Ssu
2009Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time Systems.
Wanfu Ding, Ruifeng Guo
2009Entropy Based Method for Network Anomaly Detection.
Quan Qian, Hongyi Che, Rui Zhang
2009Evaluating the Impact of Irrecoverable Read Errors on Disk Array Reliability.
Jehan-François Pâris, Ahmed Amer, Darrell D. E. Long, Thomas J. E. Schwarz
2009Evaluating the Use of Reference Run Models in Fault Injection Analysis.
Matthew Leeke, Arshad Jhumka
2009Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification.
Ang Jin, Jianhui Jiang
2009Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor Networks.
Sung-Jib Yim, Yoon-Hwa Choi
2009Flip-Flop Selection for Transition Test Pattern Reduction Using Partial Enhanced Scan.
Songwei Pei, Huawei Li, Xiaowei Li
2009Holography: A Hardware Virtualization Tool for Malware Analysis.
Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo
2009Impact of Hazards on Pattern Selection for Small Delay Defects.
Jie Wang, Huawei Li, Yinghua Min, Xiaowei Li, Huaguo Liang
2009Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc Environments.
Wei-Tong Wang, Kuo-Feng Ssu, Cheng-Chieh Chien, Yu-Yuan Lin
2009Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning.
Chi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo
2009Low-Overhead Architecture for Security Tag.
Ryota Shioya, Daewung Kim, Kazuo Horio, Masahiro Goshima, Shuichi Sakai
2009Making Overlay Networks more Robust to Massive Failures.
Hakem Beitollahi, Geert Deconinck
2009On the Computational Complexity of Parameter Estimation in Adaptive Testing Strategies.
Feng Ye, Chang Liu, Hai Hu, Chang-Hai Jiang, Kai-Yuan Cai
2009Online Computing and Predicting Architectural Vulnerability Factor of Microprocessor Structures.
Songjun Pan, Yu Hu, Xiaowei Li
2009Parallel Training Strategy Based on Support Vector Regression Machine.
Yong-mei Lei, Yu Yan, Shao-jun Chen
2009Performance and Reliability of a Revocation Method Utilizing Encrypted Backup Data.
Kazuki Takayama, Haruo Yokota
2009Prioritized Test Generation Strategy for Pair-Wise Testing.
Jianhua Gao, Jie Zhu
2009Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT.
Tobias Goldschmidt, Andreas Dittrich, Miroslaw Malek
2009Quantitative Analysis of Long-Latency Failures in System Software.
Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer
2009Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics.
Sang Min Lee, Dong Seong Kim, Younghyun Yoon, Jong Sou Park
2009Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux Servers.
Dong Tang, William Bryson
2009Quiescent Leader Election in Crash-Recovery Systems.
Mikel Larrea, Cristian Martín
2009Reliability Analysis of Single Bus Communication with Real-Time Requirements.
Maurice Sebastian, Rolf Ernst
2009Representing X-Code Using Latin Squares.
Gang Wang, Sheng Lin, Xiaoguang Liu, Jing Liu
2009Small Delay Fault Simulation for Sequential Circuits.
Li Liu, Jishun Kuang, Huawei Li
2009String-Wise Information Flow Tracking against Script Injection Attacks.
Kunbo Li, Ryota Shioya, Masahiro Goshima, Shuichi Sakai
2009Test Case Reuse Based on Ontology.
Lizhi Cai, Weiqin Tong, Zhenyu Liu, Juan Zhang
2009The Instruction Scheduling for Soft Errors Based on Data Flow Analysis.
Jianjun Xu, Qingping Tan, Rui Shen
2009Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection.
Andrea Ceccarelli, Andrea Bondavalli, Danilo Iovino
2009Using the NuSMV Model Checker for Test Generation from Statecharts.
Masaya Kadono, Tatsuhiro Tsuchiya, Tohru Kikuno
2009Variation-Aware Scheduling for Chip Multiprocessors with Thread Level Redundancy.
Jianbo Dong, Lei Zhang, Yinhe Han, Guihai Yan, Xiaowei Li
2009Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel Reliability.
Roberto Jung Drebes, Takashi Nanya