The SCEAS System
Navigation Menu

Conferences in DBLP

Pacific Rim International Symposium on Dependable Computing (prdc)
2007 (conf/prdc/2007)


  1. Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time. [Citation Graph (, )][DBLP]


  2. Error Recovery Method for Multiple-Dictionary Compression Method. [Citation Graph (, )][DBLP]


  3. Fault Detection System Activated by Failure Information. [Citation Graph (, )][DBLP]


  4. Comparative Analysis of QoS and Memory Usage of Adaptive Failure Detectors. [Citation Graph (, )][DBLP]


  5. Quantifying Software Maintainability Based on a Fault-Detection/Correction Model. [Citation Graph (, )][DBLP]


  6. PISRAT: Proportional Intensity-Based Software Reliability Assessment Tool. [Citation Graph (, )][DBLP]


  7. An Automatic Real-Time Analysis of the Time to Reach Consensus. [Citation Graph (, )][DBLP]


  8. Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage Systems. [Citation Graph (, )][DBLP]


  9. Failure Detectors and Extended Paxos for k-Set Agreement. [Citation Graph (, )][DBLP]


  10. An Accurate Model of Software Reliability. [Citation Graph (, )][DBLP]


  11. Regression Testing Based on UML Design Models. [Citation Graph (, )][DBLP]


  12. Model Based Development of Safety-Critical Systems Using Template Based Code Generation. [Citation Graph (, )][DBLP]


  13. Predicting Defective Software Components from Code Complexity Measures. [Citation Graph (, )][DBLP]


  14. Neural-Network Based Test Cases Generation Using Genetic Algorithm. [Citation Graph (, )][DBLP]


  15. A Measurement Tool of End-User Computing Capability in Competency Perspective. [Citation Graph (, )][DBLP]


  16. Fault Tolerance for Super-Peers of P2P Systems. [Citation Graph (, )][DBLP]


  17. A Path Diversity Metric for End-to-End Network. [Citation Graph (, )][DBLP]


  18. The Eventual Leadership in Dynamic Mobile Networking Environments. [Citation Graph (, )][DBLP]


  19. Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  20. Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices. [Citation Graph (, )][DBLP]


  21. Implementation of Highly Available OSPF Router on ATCA. [Citation Graph (, )][DBLP]


  22. Overlay Network Topology Reconfiguration in Byzantine Settings. [Citation Graph (, )][DBLP]


  23. A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  24. Fault Diagnosis for Time Synchronization in Sensor Networks. [Citation Graph (, )][DBLP]


  25. Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks. [Citation Graph (, )][DBLP]


  26. A Fast Failure Detection and Failover Scheme for SIP High Availability Networks. [Citation Graph (, )][DBLP]


  27. Assessment of Message Missing Failures in FlexRay-Based Networks. [Citation Graph (, )][DBLP]


  28. A Hybrid Redundancy Approach for Data Availability in Structured P2P Network Systems. [Citation Graph (, )][DBLP]


  29. A New Concurrent Detection of Control Flow Errors Based on DCT Technique. [Citation Graph (, )][DBLP]


  30. Soft Error Rate Estimation in Deep Sub-micron CMOS. [Citation Graph (, )][DBLP]


  31. Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning. [Citation Graph (, )][DBLP]


  32. Efficient BISR Techniques for Embedded Memories Considering Cluster Faults. [Citation Graph (, )][DBLP]


  33. A Fail-Silent Reconfigurable Superscalar Processor. [Citation Graph (, )][DBLP]


  34. Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. [Citation Graph (, )][DBLP]


  35. An On-Line Control Flow Checking Method for VLIW Processor. [Citation Graph (, )][DBLP]


  36. Towards Byzantine Fault Tolerance in Many-Core Computing Platforms. [Citation Graph (, )][DBLP]


  37. Heterogeneous Functional Units for High Speed Fault-Tolerant Execution Stage. [Citation Graph (, )][DBLP]


  38. A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips. [Citation Graph (, )][DBLP]


  39. Power-Performance Trade-Off of a Dependable Multicore Processor. [Citation Graph (, )][DBLP]


  40. Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. [Citation Graph (, )][DBLP]


  41. A Process Group Membership Service for Active Safety Systems Using TT/ET Communication Scheduling. [Citation Graph (, )][DBLP]


  42. Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-Isolation. [Citation Graph (, )][DBLP]


  43. PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM Servers. [Citation Graph (, )][DBLP]


  44. Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols. [Citation Graph (, )][DBLP]


  45. RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable Networks. [Citation Graph (, )][DBLP]


  46. Benchmarking the Robustness of Web Services. [Citation Graph (, )][DBLP]


  47. The Cost of Storing Checkpoints to Multiple Volatile Storage Locations Using at-least-k Semantics. [Citation Graph (, )][DBLP]


  48. A Proposal of New Dependable Database Middleware with Consistency and Concurrency Control. [Citation Graph (, )][DBLP]


  49. Improving Email Reliability by Sender Retransmission. [Citation Graph (, )][DBLP]


  50. Implementation of a Flexible Membership Protocol on a Real-Time Ethernet Prototype. [Citation Graph (, )][DBLP]


  51. MAPMon: A Host-Based Malware Detection Tool. [Citation Graph (, )][DBLP]


  52. Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. [Citation Graph (, )][DBLP]


  53. Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. [Citation Graph (, )][DBLP]


  54. Resilient Intrusion Tolerance through Proactive and Reactive Recovery. [Citation Graph (, )][DBLP]


  55. Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. [Citation Graph (, )][DBLP]


  56. A Fault-Tolerant Bloom Filter for Deep Packet Inspection. [Citation Graph (, )][DBLP]


  57. Applying a Threshold Scheme to the Pseudonymization of Health Data. [Citation Graph (, )][DBLP]


  58. On the Effects of Finite Memory on Intrusion-Tolerant Systems. [Citation Graph (, )][DBLP]


  59. An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002