Default Cover Image

2003 International Conference on Dependable Systems and Networks, 2003. Proceedings.

June 22 2003 to June 25 2003

San Francisco, California

ISBN: 0-7695-1952-0

Table of Contents

Introduction
Welcome Message from the General ChairFreely available from IEEE.pp. xiii
Introduction
Conference OrganizersFreely available from IEEE.pp. xiv
Introduction
DCC Program CommitteeFreely available from IEEE.pp. xviii
Introduction
DCC ReviewersFreely available from IEEE.pp. xix
Introduction
W.C. Carter AwardFreely available from IEEE.pp. xxi
Introduction
IPDS Program and Steering CommitteesFreely available from IEEE.pp. xxiii
Introduction
IPDS ReviewersFreely available from IEEE.pp. xxv
Session 1A: Safety and Security
Masquerade Detection Using Enriched Command LinesFull-text access may be available. Sign in or learn about subscription options.pp. 5
Session 1A: Safety and Security
Decision-Support for Certification by Calculating the Evidential Volume of a ProductFull-text access may be available. Sign in or learn about subscription options.pp. 15
Session 1A: Safety and Security
Multi-Legged Arguments: The Impact of Diversity upon Confidence in Dependability ArgumentsFull-text access may be available. Sign in or learn about subscription options.pp. 25
Session 1B: Broadcast and Publish/Subscribe
Reliable Broadcast in a Computational Hybrid Model with Byzantine Faults, Crashes, and RecoveriesFull-text access may be available. Sign in or learn about subscription options.pp. 37
Session 1B: Broadcast and Publish/Subscribe
Adaptive Gossip-Based BroadcastFull-text access may be available. Sign in or learn about subscription options.pp. 47
Session 1B: Broadcast and Publish/Subscribe
Scalably Supporting Durable Subscriptions in a Publish/Subscribe SystemFull-text access may be available. Sign in or learn about subscription options.pp. 57
Session 2A: Practical Experience and Demonstrations — 1
Pragmatic Fault Tolerance for Railway Control and Safety Protection of the Channel TunnelFull-text access may be available. Sign in or learn about subscription options.pp. 69
Session 2A: Practical Experience and Demonstrations — 1
Dependability Assessment of Safety-Critical System Software by Static Analysis MethodsFull-text access may be available. Sign in or learn about subscription options.pp. 75
Session 2A: Practical Experience and Demonstrations — 1
Integrating Recovery Strategies into a Primary Substation Automation SystemFull-text access may be available. Sign in or learn about subscription options.pp. 80
Session 2A: Practical Experience and Demonstrations — 1
The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation ExperimentsFull-text access may be available. Sign in or learn about subscription options.pp. 86
Session 2B: Dependability Evaluation
Building SWIFI Tools from Temporal Logic SpecificationsFull-text access may be available. Sign in or learn about subscription options.pp. 95
Session 2B: Dependability Evaluation
Definition of Software Fault Emulation Operators: A Field Data StudyFull-text access may be available. Sign in or learn about subscription options.pp. 105
Session 2B: Dependability Evaluation
Robustness Benchmarking for Hardware Maintenance EventsFull-text access may be available. Sign in or learn about subscription options.pp. 115
Session 2B: Dependability Evaluation
Evaluation of Fault Handling of the Time-Triggered Architecture with Bus and Star TopologyFull-text access may be available. Sign in or learn about subscription options.pp. 123
Session 4A: Dependability Algorithms
LSRP: Local Stabilization in Shortest Path RoutingFull-text access may be available. Sign in or learn about subscription options.pp. 139
Session 4A: Dependability Algorithms
A Preemptive Deterministic Scheduling Algorithm for Multithreaded ReplicasFull-text access may be available. Sign in or learn about subscription options.pp. 149
Session 4A: Dependability Algorithms
An Algorithm for Automatically Obtaining Distributed and Fault-Tolerant Static SchedulesFull-text access may be available. Sign in or learn about subscription options.pp. 159
Session 5A: Network Fault Tolerance
Detection and Handling of MAC Layer Misbehavior in Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 173
Session 5A: Network Fault Tolerance
A Study of Packet Delivery Performance during Routing ConvergenceFull-text access may be available. Sign in or learn about subscription options.pp. 183
Session 5A: Network Fault Tolerance
Low Overhead Fault Tolerant Networking in MyrinetFull-text access may be available. Sign in or learn about subscription options.pp. 193
Session 6A: Services for Distributed Computing
Dependable and Secure Data Storage and Retrieval in Mobile, Wireless NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 207
Session 6A: Services for Distributed Computing
Design, Implementation, and Evaluation of Repairable File ServiceFull-text access may be available. Sign in or learn about subscription options.pp. 217
Session 6A: Services for Distributed Computing
From Crash Tolerance to Authenticated Byzantine Tolerance: A Structured Approach, the Cost and BenefitsFull-text access may be available. Sign in or learn about subscription options.pp. 227
Session 7A: Modeling and Formal Methods
Adaptive Software Rejuvenation: Degradation Model and Rejuvenation SchemeFull-text access may be available. Sign in or learn about subscription options.pp. 241
Session 7A: Modeling and Formal Methods
Human-Machine Diversity in the Use of Computerised Advisory Systems: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 249
Session 7A: Modeling and Formal Methods
RAMBO II: Rapidly Reconfigurable Atomic Memory for Dynamic NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 259
Session 8A: Computer Design
The Design of Wearable Systems: A Shift in Development EffortFull-text access may be available. Sign in or learn about subscription options.pp. 273
Session 8A: Computer Design
Dynamic Verification of End-to-End Multiprocessor InvariantsFull-text access may be available. Sign in or learn about subscription options.pp. 281
Session 8A: Computer Design
ICR: In-Cache Replication for Enhancing Data Cache ReliabilityFull-text access may be available. Sign in or learn about subscription options.pp. 291
Session 9A: Practical Experiences and Demonstrations — 2
Benchmarking the Dependability of Different OLTP SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 305
Session 9A: Practical Experiences and Demonstrations — 2
Persistent-State Checkpoint Comparison for Troubleshooting Configuration FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 311
Session 9A: Practical Experiences and Demonstrations — 2
HEALERS: A Toolkit for Enhancing the Robustness and Security of Existing ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 317
Session 9A: Practical Experiences and Demonstrations — 2
The Anacapa SystemFull-text access may be available. Sign in or learn about subscription options.pp. 323
Session 9B: Distributed Systems and Services
Node Failure Detection and Membership in CANELyFull-text access may be available. Sign in or learn about subscription options.pp. 331
Session 9B: Distributed Systems and Services
Design and Implementation of a Consistent Time Service for Fault-Tolerant Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 341
Session 9B: Distributed Systems and Services
Asynchronous Implementation of Failure DetectorsFull-text access may be available. Sign in or learn about subscription options.pp. 351
Session 9B: Distributed Systems and Services
Communication Strategies for Heartbeat-Style Failure Detectors in Wireless Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 361
Session 10A: TCP Connection Management
TCP Server Fault Tolerance Using Connection Migration to a Backup ServerFull-text access may be available. Sign in or learn about subscription options.pp. 373
Session 10A: TCP Connection Management
Transparent TCP Connection FailoverFull-text access may be available. Sign in or learn about subscription options.pp. 383
Session 10A: TCP Connection Management
Engineering Fault-Tolerant TCP/IP Servers Using FT-TCPFull-text access may be available. Sign in or learn about subscription options.pp. 393
Session 10A: TCP Connection Management
N-Way Fail-Over Infrastructure for Reliable Servers and RoutersFull-text access may be available. Sign in or learn about subscription options.pp. 403
Session 10B: Robust Software
On the Design of Robust Integrators for Fail-Bounded Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 415
Session 10B: Robust Software
A Fault-Tolerant Java Virtual MachineFull-text access may be available. Sign in or learn about subscription options.pp. 425
Session 10B: Robust Software
Towards Implementing Multi-Layer Reflection for Fault-ToleranceFull-text access may be available. Sign in or learn about subscription options.pp. 435
Session 10B: Robust Software
Automatic Detection and Masking of Non-Atomic Exception HandlingFull-text access may be available. Sign in or learn about subscription options.pp. 445
Session 1C: Measurement-Based System Dependability Evaluation
Characterization of Linux Kernel Behavior under ErrorsFull-text access may be available. Sign in or learn about subscription options.pp. 459
Session 1C: Measurement-Based System Dependability Evaluation
Reproducible Dependability Benchmarking Experiments Based on Unambiguous Benchmark Setup DescriptionsFull-text access may be available. Sign in or learn about subscription options.pp. 469
Session 1C: Measurement-Based System Dependability Evaluation
A Hybrid Fault Injection Approach Based on Simulation and Emulation Co-operationFull-text access may be available. Sign in or learn about subscription options.pp. 479
Session 2C: Techniques to Improve System and Network Dependability
Pre-Processing Input Data to Augment Fault Tolerance in Space ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 491
Session 2C: Techniques to Improve System and Network Dependability
Duplex: A Reusable Fault Tolerance Extension Framework for Network Access DevicesFull-text access may be available. Sign in or learn about subscription options.pp. 501
Session 2C: Techniques to Improve System and Network Dependability
Reliable Communication in Overlay NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 511
Session 2C: Techniques to Improve System and Network Dependability
Dependability Enhancement for IEEE 802.11 Wireless LAN with Redundancy TechniquesFull-text access may be available. Sign in or learn about subscription options.pp. 521
Session 3C: Analysis of Fault-Tolerant Protocols
Cost-Optimization of the IPv4 Zeroconf ProtocolFull-text access may be available. Sign in or learn about subscription options.pp. 531
Session 3C: Analysis of Fault-Tolerant Protocols
Evaluating the Condition-Based Approach to Solve ConsensusFull-text access may be available. Sign in or learn about subscription options.pp. 541
Session 3C: Analysis of Fault-Tolerant Protocols
How Bad Are Wrong Suspicions? Towards Adaptive Distributed ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 551
Session 4C: Analytical Methods
A Combinatorial Method for the Evaluation of Yield of Fault-Tolerant Systems-on-ChipFull-text access may be available. Sign in or learn about subscription options.pp. 563
DCC author indexFreely available from IEEE.pp. 769,770,771,772
Session 4C: Analytical Methods
Real-Time Estimation of Event-Driven Traffic Latency Distributions when Layered on Static SchedulesFull-text access may be available. Sign in or learn about subscription options.pp. 573
Session 4C: Analytical Methods
ParEs — A Parameter-Estimation-ToolFull-text access may be available. Sign in or learn about subscription options.pp. 583
Session 5C: Validation of System Security and Timing
Compiler-Directed Program-Fault Coverage for Highly Available Java Internet ServicesFull-text access may be available. Sign in or learn about subscription options.pp. 595
Session 5C: Validation of System Security and Timing
A Data-Driven Finite State Machine Model for Analyzing Security VulnerabilitiesFull-text access may be available. Sign in or learn about subscription options.pp. 605
Session 5C: Validation of System Security and Timing
Probabilistic Validation of an Intrusion-Tolerant Replication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 615
Session 5C: Validation of System Security and Timing
An Abstract Interpretation-Based Timing Validation of Hard Real-Time Avionics SoftwareFull-text access may be available. Sign in or learn about subscription options.pp. 625
Session 6C: Analysis of Fault-Tolerant Mechanisms
Performance Analysis of a Hierarchical Failure DetectorFull-text access may be available. Sign in or learn about subscription options.pp. 635
Session 6C: Analysis of Fault-Tolerant Mechanisms
Comparison of Failure Detectors and Group Membership: Performance Study of Two Atomic Broadcast AlgorithmsFull-text access may be available. Sign in or learn about subscription options.pp. 645
Session 6C: Analysis of Fault-Tolerant Mechanisms
Opportunity-Adaptive QoS Enhancement in Satellite Constellations: A Case StudyFull-text access may be available. Sign in or learn about subscription options.pp. 655
Session 7C: Tool Demonstrations
Jaca — A Software Fault Injection ToolFull-text access may be available. Sign in or learn about subscription options.pp. 667
Session 7C: Tool Demonstrations
GOOFI: Generic Object-Oriented Fault Injection ToolFull-text access may be available. Sign in or learn about subscription options.pp. 668
Session 7C: Tool Demonstrations
INERTE: Integrated NExus-Based Real-Time Fault Injection Tool for Embedded SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 669
Session 7C: Tool Demonstrations
Hardware Fault Injection with UMLinuxFull-text access may be available. Sign in or learn about subscription options.pp. 670
Session 7C: Tool Demonstrations
On Integrating the MÖBIUS and MODEST Modeling ToolsFull-text access may be available. Sign in or learn about subscription options.pp. 671
Session 7C: Tool Demonstrations
Dependable LQNS: A Performability Modeling Tool for Layered SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 672
Session 7C: Tool Demonstrations
ETMCC: Model Checking Performability Properties of Markov ChainsFull-text access may be available. Sign in or learn about subscription options.pp. 673
Session 9C: Dependability and Performance Analysis
A Methodology for Dependability and Performability Analysis in SAMFull-text access may be available. Sign in or learn about subscription options.pp. 679
Session 9C: Dependability and Performance Analysis
Reliability Analysis of Fault-Tolerant Systems with Common-Cause FailuresFull-text access may be available. Sign in or learn about subscription options.pp. 689
Session 9C: Dependability and Performance Analysis
Validation of Approximate Dependability Models of a RAID Architecture with Orthogonal OrganizationFull-text access may be available. Sign in or learn about subscription options.pp. 699
Session 9C: Dependability and Performance Analysis
A User-Perceived Availability Evaluation of a Web Based Travel AgencyFull-text access may be available. Sign in or learn about subscription options.pp. 709
Session 10C: Techniques for Improving Software Dependability
Software Aging and Multifractality of Memory ResourcesFull-text access may be available. Sign in or learn about subscription options.pp. 721
Session 10C: Techniques for Improving Software Dependability
Deadlock Resolution via Exceptions for Dependable Java ApplicationsFull-text access may be available. Sign in or learn about subscription options.pp. 731
Session 10C: Techniques for Improving Software Dependability
A Voltage Scheduling Heuristic for Real-Time Task GraphsFull-text access may be available. Sign in or learn about subscription options.pp. 741
Session 10C: Techniques for Improving Software Dependability
On Dynamic Assignment of Impatient Customers to Parallel QueuesFull-text access may be available. Sign in or learn about subscription options.pp. 751
Workshops
PoDSy 2003: Principles of Dependable SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 763
Workshops
Model Checking for Dependable Software-Intensive SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 764
Workshops
First Workshop on the Design of Self-Managing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 765
Workshops
Self-Stabilization WorkshopFreely available from IEEE.pp. 766
Author Indexs
DCC Author IndexFreely available from IEEE.pp. 769
Author Indexs
IPDS Author IndexFreely available from IEEE.pp. 771
Showing 97 out of 97