Conferences

13th IEEE Pacific Rim Dependable Computing conference

Program (DRAFT)

The prgram listed below is current as of 12th November, 2007.

Sunday 16th December, 2007
2:00 pm
Registration
6:00 pm
Conference Welcome Reception
RoomConference Room 1 (TBC)
7:30 pm
Close

Monday 17th December, 2007
8:00 am
Registration
8:45 am
Conference Openning
RoomPlenary Room     ChairDr Micahel Hobbs (Deakin U.)
9:00 am
Keynote 1 - Prof. William H. Sanders, University of Illinois at Urbana-Champaign, USA
RoomPlenary Room     ChairProf Wanlei Zhou (Deakin U.)
10:00 am
Morning Tea
10:30 am
Session 1A: Algorithms, Analysis, and Theory (I)
RoomConference Room 1
ChairTBC
Session 1B: Dependable Networks (I)
RoomConference Room 2
Chair
TBC
Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time
Christian Buckl, Matthias Regensburger, Alois Knoll, Gerhard Schrott
Fault Tolerance for Super-Peers of P2P Systems
Jenn-Wei Lin, Ming-Feng Yang, Jichiang Tsai
Error Recovery Method for Multiple-Dictionary Compression Method
Masato Kitakami, Yuta Noguchi
A Path Diversity Metric for End-to-End Network
Song Huang, Yong Xu, Ling Zhang
Fault Detection System Activated by Failure Information
Masato Sakai, Hiroya Matsuba, Yutaka Ishikawa
The Eventual Leadership in Dynamic Mobile Networking Environments
Jiannong Cao, Michel Raynal, Corentin Travers, Weigang Wu
Comparative Analysis of QoS and Memory Usage of Adaptive Failure Detectors
Naixue Xiong, Y. Yang, Xavier Défago
Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks
Chiu-Wen Chen, Kuo-Feng Ssu, Hewijin Christine Jiau
12:30 pm
Lunch
1:30 pm
Session 2A: Algorithms, Analysis, and Theory (II)
RoomConference Room 1
ChairTBC
Session 2B: Dependable Systems and Hardware (I)
RoomConference Room 2
Chair
TBC
Quantifying Software Maintainability Based on a Fault-Detection/Correction Model
Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi, Hiroyuki Okamura
A New Concurrent Detection of Control Flow Errors Based on DCT Technique
Hung-Chuan Lai, Shi-Jinn Horng, Yong-Yuan Chen, Pingzhi Fan, Yi Pan
PISRAT: Proportional Intensity-Based Software Reliability Assessment Tool
Kazuya Shibata, Koichiro Rinsaka, Tadashi Dohi
Soft Error Rate Estimation in Deep Sub-micron CMOS
Lianlian Zeng, Paul Beckett
An Automatic Real-Time Analysis of the Time to Reach Consensus
Tatsuhiro Tsuchiya, André Schiper
Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning
Chia Hsiang Hsu, Cheng-Juei Yu, Sheng-De Wang
Combinatorial Constructions of Multi-Erasure-Correcting Codes with Independent Parity Symbols for Storage Systems
Gang Wang, Sheng Lin, Xiaoguang Liu, Guangjun Xie, Jing Liu
Efficient BISR Techniques for Embedded Memories Considering Cluster Faults
Chun-Lin Yang, Yuang-Cheng Hsiao, Shyue-Kung Lu
3:30 pm
Break
4:00 pm
Session 3A: Distributed Systems (I)
RoomConference Room 1
ChairTBC
Session 3B: Dependable Networks (II)
RoomConference Room 2
Chair
TBC
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring
Ming-Wei Wu, Sy-Yen Kuo
Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices
Ludovic Courtès, Ossama Hamouda, Mohamed Kaâniche, Marc-Olivier Killijian, David Powell
A Process Group Membership Service for Active Safety Systems Using TT/ET Communication Scheduling
Carl Bergenhem, Johan Karlsson
Implementation of Highly Available OSPF Router on ATCA
Chia-Tai Tsai, Rong-Hong Jan, Chien Chen, Chia-Yuan Huang
Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-Isolation
D. Serrano, M. Patiño-Martínez, R. Jiménez-Peris, B. Kemme
Overlay Network Topology Reconfiguration in Byzantine Settings
Rafael R. Obelheiro, Joni da Silva Fraga
5:30 pm
Close

Tuesday 18th December, 2007
8:00-9:00 am
Registration
9:00 am
Keynote 2 - Prof. Paulo Verissimo, University of Lisboa, PORTUGAL
RoomPlenary Room     ChairProf Wanlei Zhou (Deakin U.)
10:00 am
Morning Tea
10:30 am
Session 4A: Distributed Systems (II)
RoomConference Room 1
ChairTBC
Session 4B: Dependable Systems and Hardware (II)
RoomConference Room 2
Chair
TBC
PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM Servers
Jangwoo Kim, Jared C. Smolens, Babak Falsafi, James C. Hoe
A Fail-Silent Reconfigurable Superscalar Processor
Thomas Kottke, Andreas Steininger
Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols
Jichiang Tsai, Chia-Yang Chen, Ming-Fa Hu, Jenn-Wei Lin
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems
Vinaitheerthan Sundaram, Sandip HomChadhuri, Sachin Garg, Chandra Kintala, Saurabh Bagchi
RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable Networks
Kai Han, Binoy Ravindran, E. D. Jensen
An On-Line Control Flow Checking Method for VLIW Processor
Shuming Chen, Xiao Hu, Biwei Liu, Jihua Chen
Benchmarking the Robustness of Web Services
Marco Vieira, Nuno Laranjeiro, Henrique Madeira
Power-Performance Trade-Off of a Dependable Multicore Processor
Toshinori Sato, Toshimasa Funaki
12:30 pm
Lunch
1:30 pm
Session 5A: Distributed Systems (III)
RoomConference Room 1
ChairTBC
Session 5B: Algorithms, Analysis, and Theory (III)
RoomConference Room 2
Chair
TBC
The Cost of Storing Checkpoints to Multiple Volatile Storage Locations Using at-least-k Semantics
Andrew Maloney, Andrzej Goscinski
Failure Detectors and Extended Paxos for k-Set Agreement
Wei Chen, Jialin Zhang, Yu Chen, Xuezheng Liu
A Proposal of New Dependable Database Middleware with Consistency and Concurrency Control
Takeshi Mishima, Hiroshi Nakamura
An Accurate Model of Software Reliability
Shiyi Xu
Improving Email Reliability by Sender Retransmission
Tim Moors, Patrick Chu
Regression Testing Based on UML Design Models
Atifah Ali, Aamer Nadeem, Muhammad Zohaib Z. Iqbal, Mohammad Usman
Implementation of a Flexible Membership Protocol on a Real-Time Ethernet Prototype
Raul Barbosa, António Ferreira, Johan Karlsson
Model Based Development of Safety-Critical Systems Using Template Based Code Generation
Matthias Regensburger, Christian Buckl, Alois Knoll, Gerhard Schrott
3:30 pm
Break
4:00 pm
Session 6A: Security Issues (I)
RoomConference Room 1
ChairTBC
Session 6B: Dependable Networks (III)
RoomConference Room 2
Chair
TBC
MAPMon: A Host-Based Malware Detection Tool
Shih-Yao Dai, Sy-Yen Kuo
A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks
Hong-Zu Chou, Szu-Chi Wang, Sy-Yen Kuo
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation
Henrique Moniz, Nuno Ferreira Neves, Miguel Correia, António Casimiro, Paulo Veríssimo
Fault Diagnosis for Time Synchronization in Sensor Networks
Ke-Ting Chen, Kuo-Feng Ssu, Wei-Tong Wang
Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks
José Fonseca, Marco Vieira, Henrique Madeira
Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks
Junaid Ahsenali Chaudhry, Yonghwan Lee, Dugki Min, Seungkyu Park, Chun-Hyon Chang, Duckwon Chung
5:30 pm
Close
6:30 pm
Conference Dinner
RoomPlenary Room (TBC)
10:00pm
Dinner Close

Wednesday 19th December, 2007
9:00 am
Session 7A: Algorithms, Analysis, and Theory (IV)
RoomConference Room 1
ChairTBC
Session 7B: Dependable Networks (IV)
RoomConference Room 2
Chair
TBC
Predicting Defective Software Components from Code Complexity Measures
Hongyu Zhang, Xiuzhen Zhang, Ming Gu
A Fast Failure Detection and Failover Scheme for SIP High Availability Networks
Wei-Ming Wu, Kuochen Wang, Rong-Hong Jan, Chia-Yuan Huang
Neural-Network Based Test Cases Generation Using Genetic Algorithm
Ruilian Zhao,Shanshan Lv
Assessment of Message Missing Failures in FlexRay-Based Networks
Vahid Lari, Mehdi Dehbashi, Seyed Ghassem Miremadi, Navid Farazmand
A Measurement Tool of End-User Computing Capability in Competency Perspective
Chui Young Yoon, Keon Myung Lee
A Hybrid Redundancy Approach for Data Availability in Structured P2P Network Systems
Guangping Xu, Gang Wang, Jing Liu
10:30 am
Morning Tea
11:00 am
Session 8A: Security Issues (II)
RoomConference Room 1
ChairTBC
Session 8B: Dependable Systems and Hardware (III)
RoomConference Room 2
Chair
TBC
Resilient Intrusion Tolerance through Proactive and Reactive Recovery
Paulo Sousa, Alysson Bessani, Miguel Correia, Nuno Ferreira Neves, Paulo Verissimo
Heterogeneous Functional Units for High Speed Fault-Tolerant Execution Stage
Yousuke Nakamura, Kei Hiraki
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard
Stefan Fenz, Gernot Goluch, Andreas Ekelhart, Bernhard Riedl, Edgar Weippl
A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips
A. Patooghy, M. Fazeli, S. G. Miremadi
A Fault-Tolerant Bloom Filter for Deep Packet Inspection
Myeong-Hyeon Lee, Yoon-Hwa Choi
Towards Byzantine Fault Tolerance in Many-core Computing Platforms
Casey M. Jeffery, Renato J. O. Figueiredo
12:30 pm
Lunch
11:00 am
Session 9A: Security Issues (III)
RoomConference Room 1
ChairTBC
Applying a Threshold Scheme to the Pseudonymization of Health Data
Bernhard Riedl, Veronika Grascher, Thomas Neubauer
On the Effects of Finite Memory on Intrusion-Tolerant Systems
Giuliana Santos Veronese, Miguel Correia, Lau Cheuk Lung, Paulo Verissimo
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise
Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang
3:30 pm
Break
4:00 pm
Close

Deakin University acknowledges the traditional land owners of present campus sites.

14th November 2007