


default search action
11th EDCC 2015: Paris, France
- 11th European Dependable Computing Conference, EDCC 2015, Paris, France, September 7-11, 2015. IEEE Computer Society 2015, ISBN 978-1-4673-9289-1
Distinguished Papers
- Farid Molazem Tabrizi, Karthik Pattabiraman:
Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems. 1-12 - Sayali Salvi, Daniel Kästner, Christian Ferdinand, Tom Bienmüller:
Exploiting Synergies between Static Analysis and Model-Based Testing. 13-24 - Frederico Cerveira
, Raul Barbosa
, Henrique Madeira
, Filipe Araújo
:
Recovery for Virtualized Environments. 25-36
Cloud Computing Reliability and Security
- Xiwei Xu, Liming Zhu
, Daniel Sun, An Binh Tran, Ingo Weber, Min Fu, Len Bass:
Error Diagnosis of Cloud Application Operation Using Bayesian Networks and Online Optimisation. 37-48 - Thibaut Probst, Eric Alata, Mohamed Kaâniche, Vincent Nicomette:
Automated Evaluation of Network Intrusion Detection Systems in IaaS Clouds. 49-60 - Zachary Estrada, Cuong Manh Pham, Fei Deng, Lok K. Yan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer:
Dynamic VM Dependability Monitoring Using Hypervisor Probes. 61-72
Dependable Embedded and Real-Time Systems
- Hélène Martorell, Jean-Charles Fabre, Michaël Lauer, Matthieu Roy, Régis Valentin:
Partial Updates of AUTOSAR Embedded Applications - To What Extent? 73-84 - Thorsten Piper, Stefan Winter, Neeraj Suri
, Thomas E. Fuhrman:
On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms. 85-96 - Seyedeh Golsana Ghaemi, Amir Mahdi Hosseini Monazzah
, Hamed Farbeh
, Seyed Ghassem Miremadi:
LATED: Lifetime-Aware Tag for Enduring Design. 97-107
Dependability Modeling and Tools
- Mattias Nyberg, Jonas Westman:
Failure Propagation Modeling Based on Contracts Theory. 108-119 - Carla Sauvanaud
, Guthemberg Silvestre, Mohamed Kaâniche, Karama Kanoun:
Data Stream Clustering for Online Anomaly Detection in Cloud Applications. 120-131 - Luis R. Rodriguez, Julia Lawall:
Increasing Automation in the Backporting of Linux Drivers Using Coccinelle. 132-143 - Luis J. Saiz-Adalid
, Pedro J. Gil, Joaquin Gracia-Moran
, Daniel Gil-Tomas, Juan-Carlos Baraza-Calvo
:
Ultrafast Single Error Correction Codes for Protecting Processor Registers. 144-154
Hardware Dependability
- Yanyan Shen, Kevin Elphinstone:
Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware. 155-166 - Peter Munk
, Mohammad Shadi Al Hakeem
, Raphael Lisicki, Helge Parzyjegla, Jan Richling, Hans-Ulrich Heiss:
Toward a Fault-Tolerance Framework for COTS Many-Core Systems. 167-177 - Behrooz Sangchoolie, Fatemeh Ayatolahi, Roger Johansson, Johan Karlsson:
A Comparison of Inject-on-Read and Inject-on-Write in ISA-Level Fault Injection. 178-189 - Jaime Espinosa
, David de Andrés, Pedro J. Gil:
Increasing the Dependability of VLSI Systems through Early Detection of Fugacious Faults. 190-197
Fault-Tolerance and Secure Systems and Networks
- Jehan-François Pâris, Darrell D. E. Long:
Reducing the Energy Footprint of a Distributed Consensus Algorithm. 198-204 - Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaâniche, Jean-Christophe Courrège:
Security of ISP Access Networks: Practical Experiments. 205-212 - Paul Rimba, Liming Zhu
, Len Bass, Ihor Kuz, Steve Reeves
:
Composing Patterns to Construct Secure Systems. 213-224
Characterisation, Verification and Validation Methods
- Edward Chuah
, Arshad Jhumka, James C. Browne, Bill Barth, Sai Narasimhamurthy:
Insights into the Diagnosis of System Failures from Cluster Message Logs. 225-232 - Jordan Adamek, Mikhail Nesterenko, Sébastien Tixeuil:
Evaluating and Optimizing Stabilizing Dining Philosophers. 233-244 - Horst Schirmeier
, Martin Hoffmann, Christian Dietrich
, Michael Lenz, Daniel Lohmann
, Olaf Spinczyk:
FAIL*: An Open and Versatile Fault-Injection Framework for the Assessment of Software-Implemented Hardware Fault Tolerance. 245-255 - Negin Fathollahnejad, Risat Pathan, Johan Karlsson:
On the Probability of Unsafe Disagreement in Group Formation Algorithms for Vehicular Ad Hoc Networks. 256-267

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.