Default Cover Image

Proceedings International Conference on Dependable Systems and Networks

June 23 2002 to June 26 2002

Washington, DC, USA

Table of Contents

Introduction
Welcome Message from the General ChairFreely available from IEEE.pp. xv
Introduction
Conference OrganizersFreely available from IEEE.pp. xvi
Introduction
DCC Program CommitteeFreely available from IEEE.pp. xx
Introduction
DCC ReviewersFreely available from IEEE.pp. xxi
Introduction
W.C. Carter AwardFreely available from IEEE.pp. xxiv
Introduction
IPDS ReviewersFreely available from IEEE.pp. xxvii
Session 1A: Distributed Systems 1
Exactly-once Delivery in a Content-based Publish-Subscribe SystemFull-text access may be available. Sign in or learn about subscription options.pp. 7
Session 1A: Distributed Systems 1
An Adaptive Framework for Tunable Consistency and Timeliness Using ReplicationFull-text access may be available. Sign in or learn about subscription options.pp. 17
Session 1A: Distributed Systems 1
Generic Timing Fault Tolerance using a Timely Computing BaseFull-text access may be available. Sign in or learn about subscription options.pp. 27
Session 1B: Practical Experience Reports 1
Lessons Learned in Building a Fault-Tolerant CORBA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 39
Session 1B: Practical Experience Reports 1
Model Checking Safety Properties of Servo-Loop Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 45
Session 1B: Practical Experience Reports 1
Formal Development of an Embedded Verifier for Java Card Byte CodeFull-text access may be available. Sign in or learn about subscription options.pp. 51
Session 2A: Dependable Networking
Detection of Invalid Routing Announcement in the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 59
Session 2A: Dependable Networking
An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 69
Session 2A: Dependable Networking
Edge-Based Fault Detection in a DiffServ NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 79
Session 2A: Dependable Networking
An Evaluation of Connectivity in Mobile Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 89
Session 3A: Modeling & Evaluation
Model Checking Performability PropertiesFull-text access may be available. Sign in or learn about subscription options.pp. 103
Session 3A: Modeling & Evaluation
Process Modelling to Support Dependability ArgumentsFull-text access may be available. Sign in or learn about subscription options.pp. 113
Session 3A: Modeling & Evaluation
On the Use of Disaster Prediction for Failure-Tolerance in Feedback Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 123
Session 3B: Software Techniques
On the Placement of Software Mechanisms for Detection of Data ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 135
Session 3B: Software Techniques
Robust Software — No More ExcusesFull-text access may be available. Sign in or learn about subscription options.pp. 145
Session 3B: Software Techniques
An Automated Approach to Increasing the Robustness of C LibrariesFull-text access may be available. Sign in or learn about subscription options.pp. 155
Session 4A: Distributed Systems II
Secure Intrusion-tolerant Replication on the InternetFull-text access may be available. Sign in or learn about subscription options.pp. 167
Session 4A: Distributed Systems II
Coordination of Mobile Processes with Mobile GroupsFull-text access may be available. Sign in or learn about subscription options.pp. 177
Session 4A: Distributed Systems II
Optimizing Buffer Management for Reliable MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 187
Session 4B: Practical Experience Reports II
Reliability and Survivability in the Reduced Ship?s Crew by Virtual Presence SystemFull-text access may be available. Sign in or learn about subscription options.pp. 199
Session 4B: Practical Experience Reports II
Impact of Deep Submicron Technology on Dependability of VLSI CircuitsFull-text access may be available. Sign in or learn about subscription options.pp. 205
Session 4B: Practical Experience Reports II
Experimental Evaluation of Time-redundant Execution for a Brake-by-wire ApplicationFull-text access may be available. Sign in or learn about subscription options.pp. 210
Session 5A: Security & Intrusion Tolerance
Masquerade Detection Using Truncated Command LinesFull-text access may be available. Sign in or learn about subscription options.pp. 219
Session 5A: Security & Intrusion Tolerance
Quantifying the Cost of Providing Intrusion Tolerance in Group Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 229
Session 5A: Security & Intrusion Tolerance
Developing a Heterogeneous Intrusion Tolerant CORBA SystemFull-text access may be available. Sign in or learn about subscription options.pp. 239
Session 5A: Security & Intrusion Tolerance
Distributed Object Middleware to Support Dependable Information Sharing between OrganisationsFull-text access may be available. Sign in or learn about subscription options.pp. 249
Session 6A: Panel: Dependability and the Grid
Dependability and the Grid: Issues and ChallengesFull-text access may be available. Sign in or learn about subscription options.pp. 263
Session 6B: Software and System Demonstrations
MAFALDA-RT: A Tool for Dependability Assassment of Real-Time SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 267
Session 6B: Software and System Demonstrations
Mr. Fusion: A Programmable Data Fusion Middleware Subsystem with a Tunable Statistical Profiling ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 273
Session 6B: Software and System Demonstrations
A Dependable SNMP-based Tool for Distributed Network ManagementFull-text access may be available. Sign in or learn about subscription options.pp. 279
Session 6B: Software and System Demonstrations
The Design and Implementation of an Intrusion Tolerant SystemFull-text access may be available. Sign in or learn about subscription options.pp. 285
Session 7A: Group Communication
Reducing the Cost of Group Communication with Semantic View SynchronyFull-text access may be available. Sign in or learn about subscription options.pp. 293
Session 7A: Group Communication
SWIM: Scalable Weakly-consistent Infection-style Process Group Membership ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 303
Session 7A: Group Communication
Probabilistic MulticastFull-text access may be available. Sign in or learn about subscription options.pp. 313
Session 7B: Practical Experience Reports III
Experimental Evaluation of a COTS System for Space ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 325
Session 7B: Practical Experience Reports III
Experimental Analysis of the Errors Induced into Linux by Three Fault Injection TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 331
Session 7B: Practical Experience Reports III
Reliability and Availability Analysis for the JPL Remote Exploration and Experimentation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 337
Session 8A: Consensus & Failure Detectors
A Realistic Look At Failure DetectorsFull-text access may be available. Sign in or learn about subscription options.pp. 345
Session 8A: Consensus & Failure Detectors
Implementation and Performance Evaluation of an Adaptable Failure DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 354
Session 8A: Consensus & Failure Detectors
A Versatile and Modular Consensus ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 364
Session 8A: Consensus & Failure Detectors
Small Byzantine Quorum SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 374
Session 9A: Hardware Architecture and Design
Modeling the Effect of Technology Trends on the Soft Error Rate of Combinational LogicFull-text access may be available. Sign in or learn about subscription options.pp. 389
Session 9A: Hardware Architecture and Design
Detecting Processor Hardware Faults by Means of Automatically Generated Virtual Duplex SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 399
Session 9A: Hardware Architecture and Design
A Portable and Fault-Tolerant Microprocessor Based on the SPARC V8 ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 409
Session 9A: Hardware Architecture and Design
Soft Error Sensitivity Characterization for Microprocessor Dependability Enhancement StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 416
Session 9B: Detection and Correction
Track-Based Disk LoggingFull-text access may be available. Sign in or learn about subscription options.pp. 429
Session 9B: Detection and Correction
Transactional Rollback for Language-Based SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 439
Session 9B: Detection and Correction
Time-Constrained Failure Diagnosis in Distributed Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 449
Session 9B: Detection and Correction
32-Bit Cyclic Redundancy Codes for Internet ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 459
Session 1C: IPDS Practical Experience Reports
Measuring End-User Availability on the Web: Practical ExperienceFull-text access may be available. Sign in or learn about subscription options.pp. 473
Session 1C: IPDS Practical Experience Reports
Advanced Pattern Recognition for Detection of Complex Software Aging Phenomena in Online Transaction Processing ServersFull-text access may be available. Sign in or learn about subscription options.pp. 478
Session 1C: IPDS Practical Experience Reports
Jaca: A Reflective Fault Injection Tool Based on PatternsFull-text access may be available. Sign in or learn about subscription options.pp. 483
Session 1C: IPDS Practical Experience Reports
Automatic Generation of Availability Models in RAScadFull-text access may be available. Sign in or learn about subscription options.pp. 488
Session 2C: Security and Fault Tolerance
Evaluating the Security Threat of Firewall Data Corruption Caused by Transient ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 495
Session 2C: Security and Fault Tolerance
Modeling and Quantification of Security Attributes of Software SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 505
Session 2C: Security and Fault Tolerance
Stepwise Construction and Refinement of Dependability ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 515
Ditto processorFull-text access may be available. Sign in or learn about subscription options.pp. 525-534
Session 3C: Modeling, Simulation, and Evaluation Tools
CAVEAT : A Tool for Software ValidationFull-text access may be available. Sign in or learn about subscription options.pp. 537
Session 3C: Modeling, Simulation, and Evaluation Tools
CLAIRE: An Event-Driven Simulation Tool for Test and Validation of Software ProgramsFull-text access may be available. Sign in or learn about subscription options.pp. 538
Session 3C: Modeling, Simulation, and Evaluation Tools
C-Sim — The C Language Enhancement for Discrete-Time SimulationsFull-text access may be available. Sign in or learn about subscription options.pp. 539
Session 3C: Modeling, Simulation, and Evaluation Tools
DrawNet++: A Flexible Framework for Building Dependability ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 540
Session 3C: Modeling, Simulation, and Evaluation Tools
Libsafe: Transparent System-wide Protection Against Buffer Overflow AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 541
Session 3C: Modeling, Simulation, and Evaluation Tools
NFTAPE: Networked Fault Tolerance and Performance EvaluatorFull-text access may be available. Sign in or learn about subscription options.pp. 542
Session 3C: Modeling, Simulation, and Evaluation Tools
PhFit: A General Phase-type Fitting ToolFull-text access may be available. Sign in or learn about subscription options.pp. 543
Session 3C: Modeling, Simulation, and Evaluation Tools
SHARPE 2002: Symbolic Hierarchical Automated Reliability and Performance EvaluatorFull-text access may be available. Sign in or learn about subscription options.pp. 544
Session 3C: Modeling, Simulation, and Evaluation Tools
SMART: Stochastic Model-checking Analyzer for Reliability and TimingFull-text access may be available. Sign in or learn about subscription options.pp. 545
IPDS Author IndexFreely available from IEEE.pp. 797,798
Session 3C: Modeling, Simulation, and Evaluation Tools
SREPT: A Tool for Software Reliability Estimation and PredictionFull-text access may be available. Sign in or learn about subscription options.pp. 546
Session 3C: Modeling, Simulation, and Evaluation Tools
Xception™ - Enhanced Automated Fault-Injection EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 547
Session 4C: Performance and Dependability Modeling
Performance Analysis of a Consensus Algorithm Combining Stochastic Activity Networks and MeasurementsFull-text access may be available. Sign in or learn about subscription options.pp. 551
Session 4C: Performance and Dependability Modeling
Performability Analysis of Guarded-Operation Duration: A Successive Model-Translation ApproachFull-text access may be available. Sign in or learn about subscription options.pp. 561
Session 4C: Performance and Dependability Modeling
A Simple Characterization of Provably Efficient Prefetching AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 571
Session 5C: Fault Tolerant Design and Evaluation
An Experimental Evaluation of the REE SIFT Environment for Spaceborne ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 585
Session 5C: Fault Tolerant Design and Evaluation
Pinpoint: Problem Determination in Large, Dynamic Internet ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 595
Session 5C: Fault Tolerant Design and Evaluation
Reducing Recovery Time in a Small Recursively Restartable SystemFull-text access may be available. Sign in or learn about subscription options.pp. 605
Session 5C: Fault Tolerant Design and Evaluation
Recovery and Performance Balance of a COTS DBMS in the Presence of Operator FaultsFull-text access may be available. Sign in or learn about subscription options.pp. 615
Session 6C: Modeling Techniques
The Scale Factor: A New Degree of Freedom in Phase Type ApproximationFull-text access may be available. Sign in or learn about subscription options.pp. 627
Session 6C: Modeling Techniques
Efficient State Space Generation of GSPNs using Decision DiagramsFull-text access may be available. Sign in or learn about subscription options.pp. 637
Session 6C: Modeling Techniques
An Adaptive Decomposition Approach for the Analysis of Stochastic Petri NetsFull-text access may be available. Sign in or learn about subscription options.pp. 647
Session 6C: Modeling Techniques
Parallel Randomization for Large Structured Markov ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 657
Session 7C: Invited Industry Session: Measurements and Evaluation
Test and Development Process Retrospective — A Case Study using ODC TriggersFull-text access may be available. Sign in or learn about subscription options.pp. 669
Session 7C: Invited Industry Session: Measurements and Evaluation
Impact of Fault Management Server and Its Failure-related Parameters on High-Availability Communication SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 679
Session 7C: Invited Industry Session: Measurements and Evaluation
Analysis of Failure and Recovery Rates in a Wireless Telecommunications SystemFull-text access may be available. Sign in or learn about subscription options.pp. 687
Session 7C: Invited Industry Session: Measurements and Evaluation
Application Performance using End-to-End User Level MonitoringFull-text access may be available. Sign in or learn about subscription options.pp. 694
Session 8C: Internet Performance and Dependability
Resource Management Policies in GPRS Wireless Internet Access SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 707
Session 8C: Internet Performance and Dependability
Evaluating the Impact of Different Document Types on the Performance of Web Cache Replacement SchemesFull-text access may be available. Sign in or learn about subscription options.pp. 717
Session 8C: Internet Performance and Dependability
A Validation of the Pseudo Self-Similar Traffic ModelFull-text access may be available. Sign in or learn about subscription options.pp. 727
Session 8C: Internet Performance and Dependability
Evaluation of the Maximum Level Reached by a Queue Over a Finite PeriodFull-text access may be available. Sign in or learn about subscription options.pp. 735
Session 9C: Modeling, Measurement and Analysis of Distributed Systems
Modeling the Coverage and Effectiveness of Fault-Management Architectures in Layered Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 745
Session 9C: Modeling, Measurement and Analysis of Distributed Systems
Self-Organizing Systems with Self-DiagnosabilityFull-text access may be available. Sign in or learn about subscription options.pp. 755
Session 9C: Modeling, Measurement and Analysis of Distributed Systems
A Compositional Approach to Monitoring Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 763
Showing 100 out of 110