| 2009 | 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2009, Shanghai, China, 16-18 November 2009 |
| 2009 | A GA-Based Method for High-Quality X-Filling to Reduce Launch Switching Activity in At-speed Scan Testing. Yuta Yamato, Xiaoqing Wen, Kohei Miyase, Hiroshi Furukawa, Seiji Kajihara |
| 2009 | A Lightweight Network Intrusion Detection Model Based on Feature Selection. Dai Hong, Haibo Li |
| 2009 | A Measurement System to Improve E-Business Capability of Human Resources in an Organizational Computing Environment. Chui Young Yoon, Keon-Myung Lee, Joongnam Jeon, In Sung Lee |
| 2009 | A New Approach to Automated Redundancy Reduction for Test Sequences. Huaikou Miao, Pan Liu, Jia Mei, Hongwei Zeng |
| 2009 | A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes. Binzhang Fu, Yinhe Han, Huawei Li, Xiaowei Li |
| 2009 | A Novel Generation Algorithm of Pair-Wise Testing Cases. Jianhua Gao, Yuefeng Hu |
| 2009 | A Novel Process Migration Method for MPI Applications. Tiantian Liu, Zhong Ma, Zhonghong Ou |
| 2009 | A Regular Expression Matching Algorithm Using Transition Merging. Jiekun Zhang, Dafang Zhang, Kun Huang |
| 2009 | A Reliable Non-volatile Memory System: Exploiting File-System Characteristics. Chin-Hsien Wu, Wen-Yen Chang, Zeng-Wei Hong |
| 2009 | A Synthesis Software Reliability Model. Xiaoying Hu, Shiyi Xu |
| 2009 | A Test Vector Compression/Decompression Scheme Based on Logic Operation between Adjacent Bits (LOBAB) Coding. Huaguo Liang, Wenfa Zhan, Qiang Luo, Cuiyun Jiang |
| 2009 | A Trust-Based Benchmark for DBMS Configurations. Afonso Araújo Neto, Marco Vieira |
| 2009 | An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks. David de Andrés, Jesus Friginal, Juan-Carlos Ruiz-Garcia, Pedro J. Gil |
| 2009 | An Early-Stopping Protocol for Computing Aggregate Functions in Sensor Networks. Antonio Fernández Anta, Miguel A. Mosteiro, Christopher Thraves |
| 2009 | Availability Modeling and Analysis of a Virtualized System. Dong Seong Kim, Fumio Machida, Kishor S. Trivedi |
| 2009 | Built-In Self-Repair Techniques for Heterogeneous Memory Cores. Zhen-Yu Wang, Yi-Ming Tsai, Shyue-Kung Lu |
| 2009 | Chip-Level Redundancy in Distributed Shared-Memory Multiprocessors. Brian T. Gold, Babak Falsafi, James C. Hoe |
| 2009 | Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. Nuno Antunes, Marco Vieira |
| 2009 | D2STM: Dependable Distributed Software Transactional Memory. Maria Couceiro, Paolo Romano, Nuno Carvalho, Luís E. T. Rodrigues |
| 2009 | Delayed Processing Technique in Critical Sections for Real-Time Linux. Maobing Dai, Yutaka Ishikawa |
| 2009 | Dependability Benchmarking Using Software Faults: How to Create Practical and Representative Faultloads. Pedro Costa, João Gabriel Silva, Henrique Madeira |
| 2009 | Dependability Evaluation for Internet-Based Remote Systems. Masato Kitakami, Akihiro Katada, Kazuteru Namba, Hideo Ito |
| 2009 | Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor Networks. Yu-Yuan Lin, Kuo-Feng Ssu |
| 2009 | Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time Systems. Wanfu Ding, Ruifeng Guo |
| 2009 | Entropy Based Method for Network Anomaly Detection. Quan Qian, Hongyi Che, Rui Zhang |
| 2009 | Evaluating the Impact of Irrecoverable Read Errors on Disk Array Reliability. Jehan-François Pâris, Ahmed Amer, Darrell D. E. Long, Thomas J. E. Schwarz |
| 2009 | Evaluating the Use of Reference Run Models in Fault Injection Analysis. Matthew Leeke, Arshad Jhumka |
| 2009 | Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification. Ang Jin, Jianhui Jiang |
| 2009 | Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor Networks. Sung-Jib Yim, Yoon-Hwa Choi |
| 2009 | Flip-Flop Selection for Transition Test Pattern Reduction Using Partial Enhanced Scan. Songwei Pei, Huawei Li, Xiaowei Li |
| 2009 | Holography: A Hardware Virtualization Tool for Malware Analysis. Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo |
| 2009 | Impact of Hazards on Pattern Selection for Small Delay Defects. Jie Wang, Huawei Li, Yinghua Min, Xiaowei Li, Huaguo Liang |
| 2009 | Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc Environments. Wei-Tong Wang, Kuo-Feng Ssu, Cheng-Chieh Chien, Yu-Yuan Lin |
| 2009 | Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. Chi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo |
| 2009 | Low-Overhead Architecture for Security Tag. Ryota Shioya, Daewung Kim, Kazuo Horio, Masahiro Goshima, Shuichi Sakai |
| 2009 | Making Overlay Networks more Robust to Massive Failures. Hakem Beitollahi, Geert Deconinck |
| 2009 | On the Computational Complexity of Parameter Estimation in Adaptive Testing Strategies. Feng Ye, Chang Liu, Hai Hu, Chang-Hai Jiang, Kai-Yuan Cai |
| 2009 | Online Computing and Predicting Architectural Vulnerability Factor of Microprocessor Structures. Songjun Pan, Yu Hu, Xiaowei Li |
| 2009 | Parallel Training Strategy Based on Support Vector Regression Machine. Yong-mei Lei, Yu Yan, Shao-jun Chen |
| 2009 | Performance and Reliability of a Revocation Method Utilizing Encrypted Backup Data. Kazuki Takayama, Haruo Yokota |
| 2009 | Prioritized Test Generation Strategy for Pair-Wise Testing. Jianhua Gao, Jie Zhu |
| 2009 | Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT. Tobias Goldschmidt, Andreas Dittrich, Miroslaw Malek |
| 2009 | Quantitative Analysis of Long-Latency Failures in System Software. Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
| 2009 | Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics. Sang Min Lee, Dong Seong Kim, Younghyun Yoon, Jong Sou Park |
| 2009 | Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux Servers. Dong Tang, William Bryson |
| 2009 | Quiescent Leader Election in Crash-Recovery Systems. Mikel Larrea, Cristian Martín |
| 2009 | Reliability Analysis of Single Bus Communication with Real-Time Requirements. Maurice Sebastian, Rolf Ernst |
| 2009 | Representing X-Code Using Latin Squares. Gang Wang, Sheng Lin, Xiaoguang Liu, Jing Liu |
| 2009 | Small Delay Fault Simulation for Sequential Circuits. Li Liu, Jishun Kuang, Huawei Li |
| 2009 | String-Wise Information Flow Tracking against Script Injection Attacks. Kunbo Li, Ryota Shioya, Masahiro Goshima, Shuichi Sakai |
| 2009 | Test Case Reuse Based on Ontology. Lizhi Cai, Weiqin Tong, Zhenyu Liu, Juan Zhang |
| 2009 | The Instruction Scheduling for Soft Errors Based on Data Flow Analysis. Jianjun Xu, Qingping Tan, Rui Shen |
| 2009 | Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection. Andrea Ceccarelli, Andrea Bondavalli, Danilo Iovino |
| 2009 | Using the NuSMV Model Checker for Test Generation from Statecharts. Masaya Kadono, Tatsuhiro Tsuchiya, Tohru Kikuno |
| 2009 | Variation-Aware Scheduling for Chip Multiprocessors with Thread Level Redundancy. Jianbo Dong, Lei Zhang, Yinhe Han, Guihai Yan, Xiaowei Li |
| 2009 | Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel Reliability. Roberto Jung Drebes, Takashi Nanya |