


default search action
22nd PRDC 2017: Christchurch, New Zealand
- Dong Seong Kim, Masato Kitakami, Vijay Varadharajan:

22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017, Christchurch, New Zealand, January 22-25, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5652-1
Session 1A: Dependable Network 1
- Lewis Tseng

:
Voting in the Presence of Byzantine Faults. 1-10 - Subrota K. Mondal, Abadhan Saumya Sabyasachi

, Jogesh K. Muppala:
On Dependability, Cost and Security Trade-Off in Cloud Data Centers. 11-19 - Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai

:
Accelerating Integrity Verification on Secure Processors by Promissory Hash. 20-29
Session 1B: Evaluation of Dependability
- Tran Phuong Thao, Atsuko Miyaji

, Mohammad Shahriar Rahman
, Shinsaku Kiyomoto, Ayumu Kubota:
Robust ORAM: Enhancing Availability, Confidentiality and Integrity. 30-39 - Raquel Almeida, Afonso Araújo Neto, Henrique Madeira

:
Resilience Benchmarking of Transactional Systems: Experimental Study of Alternative Metrics. 40-49 - Paulo R. M. Maciel, Rúbens de Souza Matos Júnior, Bruno Silva, Jair Figueiredo, Danilo Oliveira, Iure Fe, Ronierison Maciel

, Jamilson Dantas:
Mercury: Performance and Dependability Evaluation of Systems with Exponential, Expolynomial, and General Distributions. 50-57
Session 2A: Testing
- Nentawe Gurumdimma

, Arshad Jhumka:
Detection of Recovery Patterns in Cluster Systems Using Resource Usage Data. 58-67 - Behrooz Sangchoolie, Roger Johansson, Johan Karlsson:

Light-Weight Techniques for Improving the Controllability and Efficiency of ISA-Level Fault Injection Tools. 68-77 - Teru Ohashi, Tatsuhiro Tsuchiya

:
Generating High Strength Test Suites for Combinatorial Interaction Testing Using ZDD-Based Graph Algorithms. 78-85
Session 2B: Industrial + Workshop 1
- Aleciano Lobo Junior, Rúbens de Souza Matos Júnior, Bruno Silva, Paulo R. M. Maciel:

Expolynomial Modelling for Supporting VANET Infrastructure Planning. 86-91 - Paulo Jorge Esteves Veríssimo, Marcus Völp

, Jeremie Decouchant
, Vincent Rahli
, Francisco Rocha:
Meeting the Challenges of Critical and Extreme Dependability and Security. 92-97 - Robert Schadek, Oliver E. Theel:

Increasing the Accuracy of Cost and Availability Predictions of Quorum Protocols. 98-103 - Yunyu Fang, Bei-Bei Yin, Gao-Rong Ning, Zheng Zheng, Kai-Yuan Cai:

A Rejuvenation Strategy of Two-Granularity Software Based on Adaptive Control. 104-109
Session 3A: Dependable Network 2
- Itsuo Takanami, Masaru Fukushi:

A Built-in Circuit for Self-Repairing Mesh-Connected Processor Arrays with Spares on Diagonal. 110-117 - I-Chen Tsai, Chia-Mu Yu, Haruo Yokota

, Sy-Yen Kuo
:
Key Management in Internet of Things via Kronecker Product. 118-124
Session 3B: Dependable Systems
- Frederico Cerveira

, Raul Barbosa
, Henrique Madeira
:
Soft Errors Susceptibility of Virtualization Servers. 125-134 - Fangyun Qin, Zheng Zheng

, Xiaodan Li, Yu Qiao, Kishor S. Trivedi:
An Empirical Investigation of Fault Triggers in Android Operating System. 135-144
Session 4A: Security 1
- Ahmed M. Fawaz, William H. Sanders:

Learning Process Behavioral Baselines for Anomaly Detection. 145-154 - Tobias Rauter, Andrea Höller, Johannes Iber, Michael Krisper

, Christian Kreiner
:
Integration of Integrity Enforcing Technologies into Embedded Control Devices: Experiences and Evaluation. 155-164
Session 4B: Smart Grid
- Stephen Jackson, Bruce M. McMillin:

Application of Congestion Notifications in a Cyber-Physical System. 165-174 - Kubilay Demir

, Neeraj Suri
:
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid. 175-184
Session 5A: Dependable VLSI
- Eberle A. Rambo, Christoph Seitz, Selma Saidi, Rolf Ernst:

Designing Networks-on-Chip for High Assurance Real-Time Systems. 185-194 - Vasily A. Sartakov, Rüdiger Kapitza:

Multi-site Synchronous VM Replication for Persistent Systems with Asymmetric Read/Write Latencies. 195-204 - Bernard Lim, Daniel Chen, Yongkyu An, Zbigniew Kalbarczyk, Ravishankar K. Iyer:

Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report. 205-210
Session 5B: Fast Abstracts
- Seunghyun Yoon

, Jiae Lee, Yohan Kim, Sunghwan Kim, Hyuk Lim:
Fast Controller Switching for Fault-Tolerant Cyber-Physical Systems on Software-Defined Networks. 211-212 - Dan Takahashi, Masayuki Arai:

Spare-Tile-Based Dependable Logic Design for Sea-of-Tiles Architecture with Ambipolar Devices. 213-214 - Hironori Arai, Masayuki Arai:

Erasure-Code-Based DTN Multi-path Routing for Contact Avoidance. 215-216 - Toshinori Hosokawa, Hideyuki Takano, Hiroshi Yamazaki, Koji Yamazaki:

A Diagnostic Fault Simulation Method for a Single Universal Logical Fault Model. 217-218 - Lewis Tseng

:
Bitcoin's Consistency Property. 219-220 - Masayoshi Yoshimura, Tomohiro Bouyashiki, Toshinori Hosokawa:

A Hardware Trojan Circuit Detection Method Using Activation Sequence Generations. 221-222 - Klaus Echtle, Zoha Moztarzadeh:

Efficient Fault-Tolerant Clock Synchronization in Ring Topologies. 223-224 - Mohammad Shahriar Rahman

, Anirban Basu, Shinsaku Kiyomoto:
Towards Outsourced Privacy-Preserving Multiparty DBSCAN. 225-226
Posters
- Wuxain Zhang, Hung-Min Sun:

Instagram Spam Detection. 227-228 - Armin Zimmermann

, Paulo R. M. Maciel:
Dependability Evaluation of AFDX Real-Time Avionic Communication Networks. 229-230 - Kiat Siong Ng

, Pei-Yin Chen
, Pi-Hui Ting:
Smart Cage Implementation with Dependable Safety Agent for Dogs. 231-232 - Koichi Bando, Yutaka Matsuno, Yang Ishigaki, Kenji Tanaka:

Trend Analyses of Failures in Information Systems: A Case Study on Communications Networks and Financial Information Systems. 233-234
Session 6A: Security 2
- Giedre Sabaliauskaite

, Geok See Ng
, Justin Ruths, Aditya Mathur:
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems. 235-244 - Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:

An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms. 245-254
Session 6B: Industrial + Workshop 2
- Carlos Melo

, Rúbens de Souza Matos Júnior, Jamilson Dantas, Paulo R. M. Maciel:
Capacity-Oriented Availability Model for Resources Estimation on Private Cloud Infrastructure. 255-260 - Shinya Nakano, Tatsuhiro Tsuchiya

:
Method and Case Study of Model Checking Concurrent Systems That Use Unbounded Timestamps. 261-266 - Zeineb Zhioua, Yves Roudier, Rabéa Ameur-Boulifa:

Formal Specification and Verification of Security Guidelines. 267-273
Session 7A: Dependability for Traffic Systems 1
- William G. Temple, Bao Anh N. Tran, Binbin Chen

, Zbigniew Kalbarczyk, William H. Sanders:
On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure. 274-283 - Muneyuki Nakamura, Koji Konomi, Mamoru Ohara, Kazuya Sakai, Satoshi Fukumoto:

Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANs. 284-291
Session 7B: Coding
- Hiroaki Akutsu, Takahiro Yamamoto, Kazunori Ueda, Hideo Saito:

MEC: Network Optimized Multi-stage Erasure Coding for Scalable Storage Systems. 292-300 - Awais Usman, Robert Schadek, Oliver E. Theel:

A Novel Highly Available Data Replication Strategy Exploiting Data Semantics, Coding Techniques and Prior At-Hand Knowledge. 301-310
Session 8A: Dependability for Traffic Systems 2
- Negin Fathollahnejad, Raul Barbosa

, Johan Karlsson:
A Probabilistic Analysis of a Leader Election Protocol for Virtual Traffic Lights. 311-320 - Mikael Asplund, Jakob Lovhall, Emília Villani:

Specification, Implementation and Verification of Dynamic Group Membership for Vehicle Coordination. 321-328
Session 8B: Security 3
- Mohammad A. Noureddine, Andrew Marturano, Ken Keefe, Masooda N. Bashir, William H. Sanders:

Accounting for the Human User in Predictive Security Models. 329-338 - Hung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang

, Chia-Ming Lin:
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy. 339-347

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














