default search action
22nd PRDC 2017: Christchurch, New Zealand
- Dong Seong Kim, Masato Kitakami, Vijay Varadharajan:
22nd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2017, Christchurch, New Zealand, January 22-25, 2017. IEEE Computer Society 2017, ISBN 978-1-5090-5652-1
Session 1A: Dependable Network 1
- Lewis Tseng:
Voting in the Presence of Byzantine Faults. 1-10 - Subrota K. Mondal, Abadhan Saumya Sabyasachi, Jogesh K. Muppala:
On Dependability, Cost and Security Trade-Off in Cloud Data Centers. 11-19 - Mizuki Miyanaga, Hidetsugu Irie, Shuichi Sakai:
Accelerating Integrity Verification on Secure Processors by Promissory Hash. 20-29
Session 1B: Evaluation of Dependability
- Tran Phuong Thao, Atsuko Miyaji, Mohammad Shahriar Rahman, Shinsaku Kiyomoto, Ayumu Kubota:
Robust ORAM: Enhancing Availability, Confidentiality and Integrity. 30-39 - Raquel Almeida, Afonso Araújo Neto, Henrique Madeira:
Resilience Benchmarking of Transactional Systems: Experimental Study of Alternative Metrics. 40-49 - Paulo R. M. Maciel, Rúbens de Souza Matos Júnior, Bruno Silva, Jair Figueiredo, Danilo Oliveira, Iure Fe, Ronierison Maciel, Jamilson Dantas:
Mercury: Performance and Dependability Evaluation of Systems with Exponential, Expolynomial, and General Distributions. 50-57
Session 2A: Testing
- Nentawe Gurumdimma, Arshad Jhumka:
Detection of Recovery Patterns in Cluster Systems Using Resource Usage Data. 58-67 - Behrooz Sangchoolie, Roger Johansson, Johan Karlsson:
Light-Weight Techniques for Improving the Controllability and Efficiency of ISA-Level Fault Injection Tools. 68-77 - Teru Ohashi, Tatsuhiro Tsuchiya:
Generating High Strength Test Suites for Combinatorial Interaction Testing Using ZDD-Based Graph Algorithms. 78-85
Session 2B: Industrial + Workshop 1
- Aleciano Lobo Junior, Rúbens de Souza Matos Júnior, Bruno Silva, Paulo R. M. Maciel:
Expolynomial Modelling for Supporting VANET Infrastructure Planning. 86-91 - Paulo Jorge Esteves Veríssimo, Marcus Völp, Jeremie Decouchant, Vincent Rahli, Francisco Rocha:
Meeting the Challenges of Critical and Extreme Dependability and Security. 92-97 - Robert Schadek, Oliver E. Theel:
Increasing the Accuracy of Cost and Availability Predictions of Quorum Protocols. 98-103 - Yunyu Fang, Bei-Bei Yin, Gao-Rong Ning, Zheng Zheng, Kai-Yuan Cai:
A Rejuvenation Strategy of Two-Granularity Software Based on Adaptive Control. 104-109
Session 3A: Dependable Network 2
- Itsuo Takanami, Masaru Fukushi:
A Built-in Circuit for Self-Repairing Mesh-Connected Processor Arrays with Spares on Diagonal. 110-117 - I-Chen Tsai, Chia-Mu Yu, Haruo Yokota, Sy-Yen Kuo:
Key Management in Internet of Things via Kronecker Product. 118-124
Session 3B: Dependable Systems
- Frederico Cerveira, Raul Barbosa, Henrique Madeira:
Soft Errors Susceptibility of Virtualization Servers. 125-134 - Fangyun Qin, Zheng Zheng, Xiaodan Li, Yu Qiao, Kishor S. Trivedi:
An Empirical Investigation of Fault Triggers in Android Operating System. 135-144
Session 4A: Security 1
- Ahmed M. Fawaz, William H. Sanders:
Learning Process Behavioral Baselines for Anomaly Detection. 145-154 - Tobias Rauter, Andrea Höller, Johannes Iber, Michael Krisper, Christian Kreiner:
Integration of Integrity Enforcing Technologies into Embedded Control Devices: Experiences and Evaluation. 155-164
Session 4B: Smart Grid
- Stephen Jackson, Bruce M. McMillin:
Application of Congestion Notifications in a Cyber-Physical System. 165-174 - Kubilay Demir, Neeraj Suri:
SeReCP: A Secure and Reliable Communication Platform for the Smart Grid. 175-184
Session 5A: Dependable VLSI
- Eberle A. Rambo, Christoph Seitz, Selma Saidi, Rolf Ernst:
Designing Networks-on-Chip for High Assurance Real-Time Systems. 185-194 - Vasily A. Sartakov, Rüdiger Kapitza:
Multi-site Synchronous VM Replication for Persistent Systems with Asymmetric Read/Write Latencies. 195-204 - Bernard Lim, Daniel Chen, Yongkyu An, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Attack Induced Common-Mode Failures on PLC-Based Safety System in a Nuclear Power Plant: Practical Experience Report. 205-210
Session 5B: Fast Abstracts
- Seunghyun Yoon, Jiae Lee, Yohan Kim, Sunghwan Kim, Hyuk Lim:
Fast Controller Switching for Fault-Tolerant Cyber-Physical Systems on Software-Defined Networks. 211-212 - Dan Takahashi, Masayuki Arai:
Spare-Tile-Based Dependable Logic Design for Sea-of-Tiles Architecture with Ambipolar Devices. 213-214 - Hironori Arai, Masayuki Arai:
Erasure-Code-Based DTN Multi-path Routing for Contact Avoidance. 215-216 - Toshinori Hosokawa, Hideyuki Takano, Hiroshi Yamazaki, Koji Yamazaki:
A Diagnostic Fault Simulation Method for a Single Universal Logical Fault Model. 217-218 - Lewis Tseng:
Bitcoin's Consistency Property. 219-220 - Masayoshi Yoshimura, Tomohiro Bouyashiki, Toshinori Hosokawa:
A Hardware Trojan Circuit Detection Method Using Activation Sequence Generations. 221-222 - Klaus Echtle, Zoha Moztarzadeh:
Efficient Fault-Tolerant Clock Synchronization in Ring Topologies. 223-224 - Mohammad Shahriar Rahman, Anirban Basu, Shinsaku Kiyomoto:
Towards Outsourced Privacy-Preserving Multiparty DBSCAN. 225-226
Posters
- Wuxain Zhang, Hung-Min Sun:
Instagram Spam Detection. 227-228 - Armin Zimmermann, Paulo R. M. Maciel:
Dependability Evaluation of AFDX Real-Time Avionic Communication Networks. 229-230 - Kiat Siong Ng, Pei-Yin Chen, Pi-Hui Ting:
Smart Cage Implementation with Dependable Safety Agent for Dogs. 231-232 - Koichi Bando, Yutaka Matsuno, Yang Ishigaki, Kenji Tanaka:
Trend Analyses of Failures in Information Systems: A Case Study on Communications Networks and Financial Information Systems. 233-234
Session 6A: Security 2
- Giedre Sabaliauskaite, Geok See Ng, Justin Ruths, Aditya Mathur:
Comparison of Corrupted Sensor Data Detection Methods in Detecting Stealthy Attacks on Cyber-Physical Systems. 235-244 - Guillaume Averlant, Benoît Morgan, Eric Alata, Vincent Nicomette, Mohamed Kaâniche:
An Abstraction Model and a Comparative Analysis of Intel and ARM Hardware Isolation Mechanisms. 245-254
Session 6B: Industrial + Workshop 2
- Carlos Melo, Rúbens de Souza Matos Júnior, Jamilson Dantas, Paulo R. M. Maciel:
Capacity-Oriented Availability Model for Resources Estimation on Private Cloud Infrastructure. 255-260 - Shinya Nakano, Tatsuhiro Tsuchiya:
Method and Case Study of Model Checking Concurrent Systems That Use Unbounded Timestamps. 261-266 - Zeineb Zhioua, Yves Roudier, Rabéa Ameur-Boulifa:
Formal Specification and Verification of Security Guidelines. 267-273
Session 7A: Dependability for Traffic Systems 1
- William G. Temple, Bao Anh N. Tran, Binbin Chen, Zbigniew Kalbarczyk, William H. Sanders:
On Train Automatic Stop Control Using Balises: Attacks and a Software-Only Countermeasure. 274-283 - Muneyuki Nakamura, Koji Konomi, Mamoru Ohara, Kazuya Sakai, Satoshi Fukumoto:
Electromagnetic Noise Tolerant Hybrid Communication Protocol for CANs. 284-291
Session 7B: Coding
- Hiroaki Akutsu, Takahiro Yamamoto, Kazunori Ueda, Hideo Saito:
MEC: Network Optimized Multi-stage Erasure Coding for Scalable Storage Systems. 292-300 - Awais Usman, Robert Schadek, Oliver E. Theel:
A Novel Highly Available Data Replication Strategy Exploiting Data Semantics, Coding Techniques and Prior At-Hand Knowledge. 301-310
Session 8A: Dependability for Traffic Systems 2
- Negin Fathollahnejad, Raul Barbosa, Johan Karlsson:
A Probabilistic Analysis of a Leader Election Protocol for Virtual Traffic Lights. 311-320 - Mikael Asplund, Jakob Lovhall, Emília Villani:
Specification, Implementation and Verification of Dynamic Group Membership for Vehicle Coordination. 321-328
Session 8B: Security 3
- Mohammad A. Noureddine, Andrew Marturano, Ken Keefe, Masooda N. Bashir, William H. Sanders:
Accounting for the Human User in Predictive Security Models. 329-338 - Hung-Li Chen, Jia-Yang Chen, Yao-Tung Tsou, Chia-Mu Yu, Bo-Chen Tai, Szu-Chuang Li, Yennun Huang, Chia-Ming Lin:
Evaluating the Risk of Data Disclosure Using Noise Estimation for Differential Privacy. 339-347
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.