|
Conferences in DBLP
Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time. [Citation Graph (, )][DBLP]
Error Recovery Method for Multiple-Dictionary Compression Method. [Citation Graph (, )][DBLP]
Fault Detection System Activated by Failure Information. [Citation Graph (, )][DBLP]
Comparative Analysis of QoS and Memory Usage of Adaptive Failure Detectors. [Citation Graph (, )][DBLP]
Quantifying Software Maintainability Based on a Fault-Detection/Correction Model. [Citation Graph (, )][DBLP]
PISRAT: Proportional Intensity-Based Software Reliability Assessment Tool. [Citation Graph (, )][DBLP]
An Automatic Real-Time Analysis of the Time to Reach Consensus. [Citation Graph (, )][DBLP]
Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage Systems. [Citation Graph (, )][DBLP]
Failure Detectors and Extended Paxos for k-Set Agreement. [Citation Graph (, )][DBLP]
An Accurate Model of Software Reliability. [Citation Graph (, )][DBLP]
Regression Testing Based on UML Design Models. [Citation Graph (, )][DBLP]
Model Based Development of Safety-Critical Systems Using Template Based Code Generation. [Citation Graph (, )][DBLP]
Predicting Defective Software Components from Code Complexity Measures. [Citation Graph (, )][DBLP]
Neural-Network Based Test Cases Generation Using Genetic Algorithm. [Citation Graph (, )][DBLP]
A Measurement Tool of End-User Computing Capability in Competency Perspective. [Citation Graph (, )][DBLP]
Fault Tolerance for Super-Peers of P2P Systems. [Citation Graph (, )][DBLP]
A Path Diversity Metric for End-to-End Network. [Citation Graph (, )][DBLP]
The Eventual Leadership in Dynamic Mobile Networking Environments. [Citation Graph (, )][DBLP]
Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices. [Citation Graph (, )][DBLP]
Implementation of Highly Available OSPF Router on ATCA. [Citation Graph (, )][DBLP]
Overlay Network Topology Reconfiguration in Byzantine Settings. [Citation Graph (, )][DBLP]
A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]
Fault Diagnosis for Time Synchronization in Sensor Networks. [Citation Graph (, )][DBLP]
Applied Self-Healing: Self-Aware Service Request Optimization for Gateway Stability in Ubiquitous Zone-Based Networks. [Citation Graph (, )][DBLP]
A Fast Failure Detection and Failover Scheme for SIP High Availability Networks. [Citation Graph (, )][DBLP]
Assessment of Message Missing Failures in FlexRay-Based Networks. [Citation Graph (, )][DBLP]
A Hybrid Redundancy Approach for Data Availability in Structured P2P Network Systems. [Citation Graph (, )][DBLP]
A New Concurrent Detection of Control Flow Errors Based on DCT Technique. [Citation Graph (, )][DBLP]
Soft Error Rate Estimation in Deep Sub-micron CMOS. [Citation Graph (, )][DBLP]
Energy Saving Based on CPU Voltage Scaling and Hardware Software Partitioning. [Citation Graph (, )][DBLP]
Efficient BISR Techniques for Embedded Memories Considering Cluster Faults. [Citation Graph (, )][DBLP]
A Fail-Silent Reconfigurable Superscalar Processor. [Citation Graph (, )][DBLP]
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. [Citation Graph (, )][DBLP]
An On-Line Control Flow Checking Method for VLIW Processor. [Citation Graph (, )][DBLP]
Towards Byzantine Fault Tolerance in Many-Core Computing Platforms. [Citation Graph (, )][DBLP]
Heterogeneous Functional Units for High Speed Fault-Tolerant Execution Stage. [Citation Graph (, )][DBLP]
A Low-Power and SEU-Tolerant Switch Architecture for Network on Chips. [Citation Graph (, )][DBLP]
Power-Performance Trade-Off of a Dependable Multicore Processor. [Citation Graph (, )][DBLP]
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring. [Citation Graph (, )][DBLP]
A Process Group Membership Service for Active Safety Systems Using TT/ET Communication Scheduling. [Citation Graph (, )][DBLP]
Boosting Database Replication Scalability through Partial Replication and 1-Copy-Snapshot-Isolation. [Citation Graph (, )][DBLP]
PAI: A Lightweight Mechanism for Single-Node Memory Recovery in DSM Servers. [Citation Graph (, )][DBLP]
Self-Adjusting Indexing Techniques for Communication-Induced Checkpointing Protocols. [Citation Graph (, )][DBLP]
RTG-L: Dependably Scheduling Real-Time Distributable Threads in Large-Scale, Unreliable Networks. [Citation Graph (, )][DBLP]
Benchmarking the Robustness of Web Services. [Citation Graph (, )][DBLP]
The Cost of Storing Checkpoints to Multiple Volatile Storage Locations Using at-least-k Semantics. [Citation Graph (, )][DBLP]
A Proposal of New Dependable Database Middleware with Consistency and Concurrency Control. [Citation Graph (, )][DBLP]
Improving Email Reliability by Sender Retransmission. [Citation Graph (, )][DBLP]
Implementation of a Flexible Membership Protocol on a Real-Time Ethernet Prototype. [Citation Graph (, )][DBLP]
MAPMon: A Host-Based Malware Detection Tool. [Citation Graph (, )][DBLP]
Intrusion Tolerance in Wireless Environments: An Experimental Evaluation. [Citation Graph (, )][DBLP]
Testing and Comparing Web Vulnerability Scanning Tools for SQL Injection and XSS Attacks. [Citation Graph (, )][DBLP]
Resilient Intrusion Tolerance through Proactive and Reactive Recovery. [Citation Graph (, )][DBLP]
Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard. [Citation Graph (, )][DBLP]
A Fault-Tolerant Bloom Filter for Deep Packet Inspection. [Citation Graph (, )][DBLP]
Applying a Threshold Scheme to the Pseudonymization of Health Data. [Citation Graph (, )][DBLP]
On the Effects of Finite Memory on Intrusion-Tolerant Systems. [Citation Graph (, )][DBLP]
An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. [Citation Graph (, )][DBLP]
|