Default Cover Image

Proceedings 2002 Pacific Rim International Symposium on Dependable Computing

Dec. 16 2002 to Dec. 18 2002

Tsukuba City, Ibaraki, Japan

Table of Contents

Introduction
General Chair's MessageFreely available from IEEE.pp. ix
Introduction
Program Co-Chairs' MessageFreely available from IEEE.pp. x
Introduction
Organizing CommitteeFreely available from IEEE.pp. xi
Introduction
Steering CommitteeFreely available from IEEE.pp. xii
Introduction
Program CommitteeFreely available from IEEE.pp. xiii
Introduction
ReviewersFreely available from IEEE.pp. xiv
Keynote Speech (I)
Fault Tolerance in Autonomic Computing EnvironmentFull-text access may be available. Sign in or learn about subscription options.pp. 3
Session 1A:Dependable Distributed Systems (I)
Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication SystemFull-text access may be available. Sign in or learn about subscription options.pp. 9
Session 1A:Dependable Distributed Systems (I)
Asynchronous Active Replication in Three-Tier Distributed SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 19
Session 1B:Checkpointing
On Characteristics of DEF Communication-Induced Checkpointing ProtocolsFull-text access may be available. Sign in or learn about subscription options.pp. 29
Session 1B:Checkpointing
A Low Overhead heckpointing Protocol for Mobile Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 37
Session 1B:Checkpointing
The Cost of Checkpointing,Logging and Recovery for the Mobile Agent SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 45
Session 2A:Dependable Systems (I)
Analysis of the Effects of Real and Injected Software Faults:Full-text access may be available. Sign in or learn about subscription options.pp. 51
Session 2A:Dependable Systems (I)
Principles of Multi-Level Reflection for Fault Tolerant ArchitecturesFull-text access may be available. Sign in or learn about subscription options.pp. 59
Session 2A:Dependable Systems (I)
Hardware/Software Co-Reliability of Configurable Digital SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 67
Session 2A:Dependable Systems (I)
Highly Fault-Tolerant FPGA Processor by Degrading StrategyFull-text access may be available. Sign in or learn about subscription options.pp. 75
Session 2B:Reliability/Dependability Analysis
Using Software Implemented Fault Inserter in Dependability AnalysisFull-text access may be available. Sign in or learn about subscription options.pp. 81
Session 2B:Reliability/Dependability Analysis
Analyzing Network Reliability With Imperfect Nodes Using OBDDFull-text access may be available. Sign in or learn about subscription options.pp. 89
Session 2B:Reliability/Dependability Analysis
Reliability Analysis of Grid Computing SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 97
Session 2B:Reliability/Dependability Analysis
A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 105
Keynote Speech (II)
Caveat Emptor:Making Grid Services Dependable from the Client SideFull-text access may be available. Sign in or learn about subscription options.pp. 117
Session 3A:Dependable Distributed Systems (II)
An Introduction to the Renaming ProblemFull-text access may be available. Sign in or learn about subscription options.pp. 121
Session 3A:Dependable Distributed Systems (II)
PASSIVE REPLICATION SCHEMES IN AQUAFull-text access may be available. Sign in or learn about subscription options.pp. 125
Session 3A:Dependable Distributed Systems (II)
Detecting Feature Interactions in Telecommunication Services with a SAT SolverFull-text access may be available. Sign in or learn about subscription options.pp. 131
Session 3B:Dependable Networks
Fault-Tolerant Properties of Generalized Hierarchical Completely-Connected NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 137
Session 3B:Dependable Networks
Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 145
Session 3B:Dependable Networks
Configurable PC Clusters Using a Hierarchical Complete-Connection-Based Switching NetworkFull-text access may be available. Sign in or learn about subscription options.pp. 153
Keynote Speech (III)
Perspectives on Dependable Computing for Solar System ExplorationFull-text access may be available. Sign in or learn about subscription options.pp. 163
Session 4A:Dependable Systems (II)
Enhancing Access Control with SysGuard, Reference Monitor Supporting Portable and Composable Kernel ModuleFull-text access may be available. Sign in or learn about subscription options.pp. 167
Session 4A:Dependable Systems (II)
An Adaptive High-Low Water Mark Destage Algorithm for Cached RAID5Full-text access may be available. Sign in or learn about subscription options.pp. 177
Session 4A:Dependable Systems (II)
A Packet-Based Caching Proxy with Loss Recovery for Video StreamingFull-text access may be available. Sign in or learn about subscription options.pp. 185
Session 4B:Dependability Evaluation and Verification
Reliability Evaluation of Multi-state Systems Subject to Imperfect Coverage using OBDDFull-text access may be available. Sign in or learn about subscription options.pp. 193
Session 4B:Dependability Evaluation and Verification
Characterization of Operating Systems Behavior in the Presence of Faulty Drivers through Software Fault EmulationFull-text access may be available. Sign in or learn about subscription options.pp. 201
Session 4B:Dependability Evaluation and Verification
Level Oriented Formal Model for Asynchronous Circuit Verification and its Efficient Analysis MethodFull-text access may be available. Sign in or learn about subscription options.pp. 210
Session 5A:Consensus in Distributed Systems
Consensus in Synchronous Systems:A Concise Guided TourFull-text access may be available. Sign in or learn about subscription options.pp. 221
Session 5A:Consensus in Distributed Systems
A Consensus Algorithm for Synchronous Distributed Systems using Mobile AgentFull-text access may be available. Sign in or learn about subscription options.pp. 229
Session 5B:Coding
A Class of Random Multiple Bits in a Byte Error Correcting (S t/b EC)Codes for Semiconductor Memory SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 247
Session 6A:Dependable Database
Providing Persistence or Sensor Streams with Light Neighbor WALFull-text access may be available. Sign in or learn about subscription options.pp. 257
Session 6A:Dependable Database
Definition of Faultloads Based on Operator Faults for DMBS Recovery BenchmarkingFull-text access may be available. Sign in or learn about subscription options.pp. 265
Session 6B:Test
An Alternative Method of Generating Tests for Path Delay Faults Using N -Detection Test SetsFull-text access may be available. Sign in or learn about subscription options.pp. 275
Session 6B:Test
Enhancing Delay Fault Testability for Iterative Logic ArraysFull-text access may be available. Sign in or learn about subscription options.pp. 283
Session 7A:Neural Network
Comparison with Defect Compensation Methods for Feed-forward Neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 293
Session 7A:Neural Network
An Extreme Value Injection Approach with Reduced Learning Time to Make MLNs Multiple-Weight-Fault TolerantFull-text access may be available. Sign in or learn about subscription options.pp. 301
Session 7B:Practical Reports
Event Log based Dependability Analysis of Windows NT and 2K SystemsFull-text access may be available. Sign in or learn about subscription options.pp. 311
Session 7B:Practical Reports
Using VHDL-Based Fault Injection to exercise Error Detection Mechanisms in the Time-Triggered ArchitectureFull-text access may be available. Sign in or learn about subscription options.pp. 316
Session 7B:Practical Reports
Formal Verification of a Pipelined Processor with New MemoryFull-text access may be available. Sign in or learn about subscription options.pp. 321
Author Index
Author IndexFreely available from IEEE.pp. 325
Showing 49 out of 49