Conferences

13th IEEE Pacific Rim Dependable Computing conference

PRDC'07 Accepted Papers

  • A fail-silent reconfigurable superscalar processor
    Thomas Kottke and Andreas Steininger
  • Comparative Analysis of QoS and Memory Usage of Adaptive Failure Detectors
    Naixue Xiong, Y. Yang, Xavier D'efago
  • Fault Tolerance for Super-peers of P2P Systems
    Jenn-Wei Lin, Ming-Feng Yang, and Jichiang Tsai
  • An On-Line Control Flow Checking Method for VLIW Processor
    Xiao Hu
  • Failure Detectors and Extended Paxos for k-Set Agreement
    Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu
  • Soft Error Rate Estimation in Deep Sub-Micron CMOS
    Lianlian Zeng, Paul Beckett
  • Efficient BISR Techniques for Embedded Memories Considering Cluster Faults
    Chun-Lin Yang and Shyue-Kung Lu
  • A Path Diversity Metric for End-to-end Network
    SONG HUANG, YONG XU and LING ZHANG
  • PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM Servers
    Jangwoo Kim, Jared C. Smolens, Babak Falsafi, James C. Hoe
  • PISRAT: Proportional Intensity-based Software Reliability Assessment Tool
    Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi
  • A Process Membership Service for Active Safety Systems
    Carl Bergenhem, Johan Karlsson
  • The Eventual Leadership in Dynamic Mobile Networking Environments
    Jiannong Cao, Michel Raynal, Corentin Travers, Weigang Wu
  • Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
    Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Edgar Weippl
  • Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks
    Hong-Zu Chou, Szu-Chi Wang, and Sy-Yen Kuo
  • Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time
    Christian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott
  • Quantifying Software Maintainability Based on a Fault-Detection/Correction Model
    K. Shibata, K. Rinsaka, T. Dohi and H. Okamura
  • A New Concurrent Detection of Control Flow Errors Based on DCT Technique
    Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen
  • An Automatic Real-Time Analysis of the Time to Reach Consensus
    Tatsuhiro Tsuchiya, André Schiper
  • Resilient Intrusion Tolerance through Proactive and Reactive Recovery
    Paulo Sousa, Alysson Neves Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo
  • Intrusion Tolerance in Wireless Environments: An Experimental Evaluation
    Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, Antonio Casimiro, Paulo Verissimo
  • Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices
    Ludovic Courtès, Ossama Hamouda, Mohamed Kaâniche, Marc-Olivier Killijian, David Powell
  • Benchmarking the Robustness of Web-services
    Marco Vieira, Nuno Laranjeiro, Henrique Madeira
  • Error Recovery Method for Multiple-Dictionary Compression Method
    Masato Kitakami and Yuta Noguchi
  • Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks
    José Fonseca, Marco Vieira, and Henrique Madeira
  • An accurate Model of Software Reliability
    Shiyi Xu
  • Improving Dependability using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems
    Vinaitheerthan Sundaram, Sandip HomChaudhuri, Sachin Garg, Chandra Kintala
  • MAPMon: A Host-Based Malware Detection Tool
    Shih-Yao Dai,Sy-Yen Kuo
  • Fault Detection System Activated by Failure Information
    Masato Sakai, Hiroya Matsuba, and Yutaka Ishikawa
  • A Fault-Tolerant Bloom Filter for Deep Packet Inspection
    Yoon-Hwa Choi and Myeong-Hyeon Lee
  • RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable Networks
    Kai Han, Binoy Ravindran, E.D.Jensen
  • Examining Web-based Spyware Invasion with Stateful Behavior Monitoring
    Ming-Wei Wu, Sy-Yen Kuo
  • Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-Isolation
    Damian Serrano, Marta Patiño-Martínez, Ricardo Jiménez-Peris, Bettina Kemme
  • Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols
    Jichiang Tsai, Chia-Yang Chen, Jenn-Wei Lin, and Ming-Fa Hu
  • Fault Diagnosis for Time Synchronization in Sensor Networks
    Ke-Ting Chen, Kuo-Feng Ssu, and Wei-Tong Wang
  • Overlay Network Topology Reconfiguration in Byzantine Settings
    Rafael R. Obelheiro and Joni da Silva Fraga
  • Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks
    Chiu-Wen Chen and Kuo-Feng Ssu
  • Implementation of Highly Available OSPF Router on ATCA
    Chia-Tai Tsai, Rong-Hong Jan, Chien Chen, Fu-Wen Chen, Chia-Yuan Huang
  • Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning
    Chia Hsiang Hsu, Cheng-Juei Yu and Sheng-De Wang
  • Combinatorial Constructions of Multi-Erasure-Correcting Codes with Independent Parity Symbols for Storage Systems
    Gang Wang, Sheng Lin, Xiaoguang Liu, Guangjun Xie and Jing Liu
  • A hybrid redundancy approach for data availability in structured P2P network systems
    Guangping Xu
  • A Fast Failure Detection And Failover Scheme For SIP High Availability Networks
    Wei-Ming Wu, Kuochen Wang, Rong-Hong Jan, Chia-Yuan Huang
  • End-system tools for enhancing email reliability
    Tim Moors and Patrick Chu
  • Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-based Networks
    Junaid Ahsenali Chaudhry
  • Predicting Defective Software Components from Code Complexity Measures
    Hongyu Zhang, Xiuzhen Zhang and Ming Gu
  • Pseudonymization for securing e-health applications
    Bernhard Riedl, Veronika Grascher, Thomas Neubauer
  • A Flexible Membership Protocol for Distributed Real-Time Systems
    Raul Barbosa, Antonio Ferreira, and Johan Karlsson
  • Assessment of Message Missing Failures in FlexRay-Based Networks
    Vahid Lari, Mehdi Dehbashi, Seyed Ghasem Miremadi, Navid Farazmand
  • On the Effects of Finite Memory on Intrusion-Tolerant Systems
    Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung and Paulo Verissimo
  • Heterogeneous Functional Units for High Speed Fault-tolerant Execution Stage
    Yousuke Nakamura, Kei Hiraki
  • A Proposal of New Dependable Database Middleware with Consistency and Concurrency Control
    Takeshi Mishima, Hiroshi Nakamura
  • Model Based Development of Safety-Critical Systems Using Template Based Code Generation
    Matthias Regensburger,Christian Buckl,Alois Knoll,Gerhard Schrott
  • Towards Byzantine Fault Tolerance in Many-core Computing Platforms
    Casey M. Jeffery and Renato J.O. Figueiredo
  • Power-Performance Trade-off of a Dependable Multicore Processor
    Toshinori Sato and Toshimasa Funaki
  • Neural-Network Based Test Case Generation Using Genetic Algorithm
    Ruilian Zhao,Shanshan Lv
  • A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips
    Ahmad Patooghy, Mahdi Fazeli, Seyed Ghasem Miremadi
  • Regression Testing based on UML Design Models
    Atifah Ali, Aamer Nadeem, Zohaib Zafar, Mohammad Usman
  • Storing Checkpoints to Multiple Volatile Storage Locations Simultaneously using at-least-k and the GENESIS Checkpointing Facility v2.0
    Andrew Maloney and Andrzej Goscinski
  • A Measurement Tool of End-User Computing Capability in Competency Perspective
    Chui Young Yoon and Keon Myung Lee
  • An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise
    Zhu Hongfeng, Liu Tianhua, Liu Jie, Chang Guiran

Deakin University acknowledges the traditional land owners of present campus sites.

19th October 2007