The SCEAS System
Navigation Menu

Conferences in DBLP

Pacific Rim International Symposium on Dependable Computing (prdc)
2005 (conf/prdc/2005)

  1. W. Kent Fuchs
    Dependable Computing in the Context of Mobility, Nomadicity, Ubiquity, and Pervasiveness. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:3- [Conf]
  2. Tohru Kikuno
    Why Do Software Projects Fail? Reasons and a Solution Using a Bayesian Classifier to Predict Potential Risk. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:4- [Conf]
  3. Wei Chen, Shiding Lin, Qiao Lian, Zheng Zhang
    Sigma: A Fault-Tolerant Mutual Exclusion Algorithm in Dynamic Distributed Systems Subject to Process Crashes and Memory Losses. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:7-14 [Conf]
  4. Roy Friedman, Achour Mostéfaoui, Michel Raynal
    Intersecting Sets: a Basic Abstraction for Asynchronous Agreement Problems. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:15-22 [Conf]
  5. Philippe Raipin Parvédy, Michel Raynal, Corentin Travers
    Decision Optimal Early-Stopping k-set Agreement in Synchronous Systems Prone to Send Omission Failures. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:23-30 [Conf]
  6. Hongmei Wang, Zheng Zhao, Zhi-Wei Sun
    Privacy-Preserving Bayesian Network Structure Learning on Distributed Heterogeneous Data. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:31-40 [Conf]
  7. Shravan Gaonkar, William H. Sanders
    Simultaneous Simulation of Alternative System Configurations. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:41-48 [Conf]
  8. Cristina Simache, Mohamed Kaâniche
    Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:49-56 [Conf]
  9. Juan Carlos Ruiz, José Carlos Campelo, Pedro J. Gil, Juan Pardo
    On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:57-64 [Conf]
  10. Y. P. Wu, Q. P. Hu, S. H. Ng, M. Xie
    Bayesian Networks Modeling for Software Inspection Effectiveness. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:65-74 [Conf]
  11. Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer
    Application-Based Metrics for Strategic Placement of Detectors. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:75-82 [Conf]
  12. Amir Rajabzadeh, Seyed Ghassem Miremadi
    A Hardware Approach to Concurrent Error Detection Capability Enhancement in COTS Processors. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:83-90 [Conf]
  13. Shaohuai Tian, Yingping Lu, Dafang Zhang
    Optimal Fault-Tolerant Routing Scheme for Generalized Hypercube. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:91-100 [Conf]
  14. Shiyi Xu
    High-Order Syndrome Testing for VLSI Circuits. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:101-108 [Conf]
  15. Zhang Ling, Kuang Jishun
    A New BIST Solution for System-on-Chip. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:109-113 [Conf]
  16. Neila Ben Lakhal, Takashi Kobayashi, Haruo Yokota
    A Failure-Aware Model for Estimating and Analyzing the Efficiency of Web Services Compositions. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:114-124 [Conf]
  17. Masato Kitakami, Junpei Sano
    Code Design and Decoding Methods for Burst Error Locating Codes. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:125-132 [Conf]
  18. Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai
    An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:133-139 [Conf]
  19. Dubravka Ilic, Elena Troubitsyna
    Formal Development of Software for Tolerating Transient Faults. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:140-150 [Conf]
  20. Jichiang Tsai, Jenn-Wei Lin
    On the Fully-Informed Communication-Induced Checkpointing Protocol. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:151-158 [Conf]
  21. Diana Szentiványi, Simin Nadjm-Tehrani, John M. Noble
    Optimal Choice of Checkpointing Interval for High Availability. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:159-166 [Conf]
  22. Yuan-sheng Luo, Dafang Zhang, Yinghua Min
    An Improved Scheme of Index-Based Checkpointing. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:167-174 [Conf]
  23. Yu Hu, Xiaowei Li, Huawei Li, Xiao-Qing Wen
    Compression/Scan Co-Design for Reducing Test Data Volume, Scan-in Power Dissipation and Test Application Time. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:175-182 [Conf]
  24. Heng Xu, Arun K. Somani
    Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:183-192 [Conf]
  25. Shuanghe Peng, Zhen Han
    Proxy Cryptography for Secure Inter-domain Information Exchanges. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:193-199 [Conf]
  26. Xinguang Peng, Kaifeng Ren
    Anomaly Detection with High Deviations for System Security. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:200-207 [Conf]
  27. Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo
    A Multi-Faceted Approach towards Spam-Resistible Mail. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:208-218 [Conf]
  28. Yuan-Shun Dai, Xiao-Long Wang, Min Xie
    A Virtual Modeling and a Fast Algorithm for Grid Service Reliability. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:219-226 [Conf]
  29. Zhonghong Ou, Youguang Yuan, Xiaoyong Zhao
    Research on Architecture and Design Principles of COTS Components Based Generic Fault-Tolerant Computer. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:227-234 [Conf]
  30. Lili Pan, Junyi Li, Beiji Zou, Hao Chen
    Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision Coverage. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:235-244 [Conf]
  31. Rong Hu, Zhigang Hu, Hao Ma
    A Reliable Routing Algorithm Based on Fuzzy Applicability of F sets in MANET. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:245-249 [Conf]
  32. Jenn-Wei Lin, Jichiang Tsai, Chao-Ying Chiu
    An Efficient Approach to Tolerating Route Errors in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:250-257 [Conf]
  33. Jian Leng, DongQin Xie
    A Novel Approach to Kernel Construction of China Bridge CA. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:258-268 [Conf]
  34. Hairong Sun, Dong Tang, Robert B. Wood
    Optimizing Service Strategy for Systems with Deferred Repair. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:269-274 [Conf]
  35. Jiang-chun Ren, Kui Dai, Zhiying Wang
    Trust-Enhanced Alteration Scenario for Universal Computer. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:275-280 [Conf]
  36. Yangyang Wu, Shuguang Du, Wei Luo
    Mining Alarm Database of Telecommunication Network for Alarm Association Rules. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:281-286 [Conf]
  37. Kam S. Tso, Ann T. Tai, Savio N. Chau, Leon Alkalai
    On Automating Failure Mode Analysis and Enhancing its Integrity. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:287-294 [Conf]
  38. Wilfred W. K. Lin, Allan K. Y. Wong, Tharam S. Dillon
    A Novel R2-FLC Dynamic Buffer Size Tuner to Support Time-Critical Applications over the Internet by Improving Logical Channel Fault Tolerance to Shorten Roundtrip Time. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:295-299 [Conf]
  39. Kazuteru Namba, Hideo Ito
    Design of Defect Tolerant Wallace Multiplier. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:300-304 [Conf]
  40. Paulo Sousa, Nuno Ferreira Neves, Paulo Veríssimo
    Resilient State Machine Replication. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:305-309 [Conf]
  41. Hassan Salmani, Seyed Ghassem Miremadi
    Contribution of Controller Area Networks Controllers to Masquerade Failures. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:310-316 [Conf]
  42. Michael Pan, Sheng-Yan Chuang, Sheng-De Wang
    Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:317-324 [Conf]
  43. Takashi Minohara, Satoshi Ishikawa, Masahiro Amano
    Centralized Surveillance of Unused Address Space by using Virtual Networks. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:325-332 [Conf]
  44. Chih-Hsun Chou, Kuo-Feng Ssu, Hewijin Christine Jiau
    A Distributed Location Service for Reducing Query Failures in Geographic Ad Hoc Routing. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:333-342 [Conf]
  45. Nicolas Loriant, Marc Ségura-Devillechaise, Jean-Marc Menaud
    Server Protection through Dynamic Patching. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:343-349 [Conf]
  46. Marco Vieira, Henrique Madeira
    Detection of Malicious Transactions in DBMS. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:350-357 [Conf]
  47. Su Myeong Lee, Hee Yong Youn
    Dynamic Window-based Adaptive Fault Monitoring for Ubiquitous Computing Systems. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:358-368 [Conf]
  48. Lunwei Wang, Lianyue He, Xiangke Liao, Huaimin Wang
    Research on Control Flags-based Weighted Authentication Trustworthiness Model. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:369-373 [Conf]
  49. Henning Burchardt, Jens Oehlerking, Oliver E. Theel
    Towards Push-of-a-Button Stability Verification for Discrete-Time Hybrid Systems. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:374-378 [Conf]
  50. Chin-Yu Huang, Chu-Ti Lin
    Reliability Prediction and Assessment of Fielded Software Based on Multiple Change-Point Models. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:379-386 [Conf]
  51. Michel Raynal, Matthieu Roy
    A Note on a Simple Equivalence between Round-based Synchronous and Asynchronous Models. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:387-392 [Conf]
  52. Zheng Qin, Jinmin Yang, Haoliang Wang, Bin Wang, Jianjun Zou
    Neural Network based on Dynamic Tunneling Technique for Weather Forecast. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:393-397 [Conf]
  53. Chang-Chun Cheng, Wei-Ming Chen, Han-Chieh Chao, Yao-Po Wang
    FPGA Authentication Header (AH) Implementation for Internet Appliances. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:398-403 [Conf]
  54. Christian Buckl, Alois Knoll, Gerhard Schrott
    Development of Dependable Real-Time Systems with Zerberus. [Citation Graph (0, 0)][DBLP]
    PRDC, 2005, pp:404-408 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002