The SCEAS System
Navigation Menu

Conferences in DBLP

Pacific Rim International Symposium on Dependable Computing (prdc)
2009 (conf/prdc/2009)


  1. Reliability Analysis of Single Bus Communication with Real-Time Requirements. [Citation Graph (, )][DBLP]


  2. A Test Vector Compression/Decompression Scheme Based on Logic Operation between Adjacent Bits (LOBAB) Coding. [Citation Graph (, )][DBLP]


  3. Variation-Aware Scheduling for Chip Multiprocessors with Thread Level Redundancy. [Citation Graph (, )][DBLP]


  4. Quantitative Analysis of Long-Latency Failures in System Software. [Citation Graph (, )][DBLP]


  5. A Synthesis Software Reliability Model. [Citation Graph (, )][DBLP]


  6. Using the NuSMV Model Checker for Test Generation from Statecharts. [Citation Graph (, )][DBLP]


  7. A Novel Generation Algorithm of Pair-Wise Testing Cases. [Citation Graph (, )][DBLP]


  8. Impact of Hazards on Pattern Selection for Small Delay Defects. [Citation Graph (, )][DBLP]


  9. Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification. [Citation Graph (, )][DBLP]


  10. Small Delay Fault Simulation for Sequential Circuits. [Citation Graph (, )][DBLP]


  11. Built-In Self-Repair Techniques for Heterogeneous Memory Cores. [Citation Graph (, )][DBLP]


  12. Flip-Flop Selection for Transition Test Pattern Reduction Using Partial Enhanced Scan. [Citation Graph (, )][DBLP]


  13. A GA-Based Method for High-Quality X-Filling to Reduce Launch Switching Activity in At-speed Scan Testing. [Citation Graph (, )][DBLP]


  14. On the Computational Complexity of Parameter Estimation in Adaptive Testing Strategies. [Citation Graph (, )][DBLP]


  15. A New Approach to Automated Redundancy Reduction for Test Sequences. [Citation Graph (, )][DBLP]


  16. Prioritized Test Generation Strategy for Pair-Wise Testing. [Citation Graph (, )][DBLP]


  17. Test Case Reuse Based on Ontology. [Citation Graph (, )][DBLP]


  18. Evaluating the Use of Reference Run Models in Fault Injection Analysis. [Citation Graph (, )][DBLP]


  19. Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics. [Citation Graph (, )][DBLP]


  20. Low-Overhead Architecture for Security Tag. [Citation Graph (, )][DBLP]


  21. A Trust-Based Benchmark for DBMS Configurations. [Citation Graph (, )][DBLP]


  22. Performance and Reliability of a Revocation Method Utilizing Encrypted Backup Data. [Citation Graph (, )][DBLP]


  23. Parallel Training Strategy Based on Support Vector Regression Machine. [Citation Graph (, )][DBLP]


  24. A Lightweight Network Intrusion Detection Model Based on Feature Selection. [Citation Graph (, )][DBLP]


  25. String-Wise Information Flow Tracking against Script Injection Attacks. [Citation Graph (, )][DBLP]


  26. Representing X-Code Using Latin Squares. [Citation Graph (, )][DBLP]


  27. Entropy Based Method for Network Anomaly Detection. [Citation Graph (, )][DBLP]


  28. Chip-Level Redundancy in Distributed Shared-Memory Multiprocessors. [Citation Graph (, )][DBLP]


  29. A Reliable Non-volatile Memory System: Exploiting File-System Characteristics. [Citation Graph (, )][DBLP]


  30. Making Overlay Networks more Robust to Massive Failures. [Citation Graph (, )][DBLP]


  31. Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc Environments. [Citation Graph (, )][DBLP]


  32. An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks. [Citation Graph (, )][DBLP]


  33. Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection. [Citation Graph (, )][DBLP]


  34. A Regular Expression Matching Algorithm Using Transition Merging. [Citation Graph (, )][DBLP]


  35. A Novel Process Migration Method for MPI Applications. [Citation Graph (, )][DBLP]


  36. Dependability Evaluation for Internet-Based Remote Systems. [Citation Graph (, )][DBLP]


  37. Holography: A Hardware Virtualization Tool for Malware Analysis. [Citation Graph (, )][DBLP]


  38. Delayed Processing Technique in Critical Sections for Real-Time Linux. [Citation Graph (, )][DBLP]


  39. A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes. [Citation Graph (, )][DBLP]


  40. Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. [Citation Graph (, )][DBLP]


  41. Dependability Benchmarking Using Software Faults: How to Create Practical and Representative Faultloads. [Citation Graph (, )][DBLP]


  42. Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel Reliability. [Citation Graph (, )][DBLP]


  43. Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. [Citation Graph (, )][DBLP]


  44. D2STM: Dependable Distributed Software Transactional Memory. [Citation Graph (, )][DBLP]


  45. Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux Servers. [Citation Graph (, )][DBLP]


  46. Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor Networks. [Citation Graph (, )][DBLP]


  47. Quiescent Leader Election in Crash-Recovery Systems. [Citation Graph (, )][DBLP]


  48. Fault-Tolerant Event Detection Using Two Thresholds in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  49. Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT. [Citation Graph (, )][DBLP]


  50. Online Computing and Predicting Architectural Vulnerability Factor of Microprocessor Structures. [Citation Graph (, )][DBLP]


  51. Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time Systems. [Citation Graph (, )][DBLP]


  52. An Early-Stopping Protocol for Computing Aggregate Functions in Sensor Networks. [Citation Graph (, )][DBLP]


  53. Availability Modeling and Analysis of a Virtualized System. [Citation Graph (, )][DBLP]


  54. The Instruction Scheduling for Soft Errors Based on Data Flow Analysis. [Citation Graph (, )][DBLP]


  55. Evaluating the Impact of Irrecoverable Read Errors on Disk Array Reliability. [Citation Graph (, )][DBLP]


  56. A Measurement System to Improve E-Business Capability of Human Resources in an Organizational Computing Environment. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002