![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
7th EDCC 2008: Kaunas, Lithuania
- Seventh European Dependable Computing Conference, EDCC-7 2008, Kaunas, Lithuania, 7-9 May 2008. IEEE Computer Society 2008, ISBN 978-0-7695-3138-0
Fault Injection, Assessment and Diagnosis
- Bogdan Tomoyuki Nassu, Kiyonobu Uehara, Takashi Nanya:
Injecting Inconsistent Values Caused by Interaction Faults for Experimental Dependability Evaluation. 3-12 - Stéphanie Gaudan, Gilles Motet, Guillaume Auriol:
Metrics for Object-Oriented Software Reliability Assessment - Application to a Flight Manager. 13-24 - Gabriella Carrozza, Domenico Cotroneo, Stefano Russo
:
Software Faults Diagnosis in Complex OTS Based Safety Critical Systems. 25-34
Group Communication and Availability
- Stefan Pleisch, Olivier Rütti, André Schiper:
On the Specification of Partitionable Group Membership. 37-45 - Hein Meling, Joakim L. Gilje:
A Distributed Approach to Autonomous Fault Treatment in Spread. 46-55 - Christian Storm, Timo Warns:
Deriving Highly Available Quorum Systems from Structural Failure Models. 56-65
Practical Experience Reports
- Mohand Yazid Saidi, Bernard Cousin
, Jean-Louis Le Roux:
Targeted Distribution of Resource Allocation for Backup LSP Computation. 69-78 - David de Andrés, Juan-Carlos Ruiz-Garcia
, Daniel Gil, Pedro J. Gil:
Dependability Assessment for the Selection of Embedded Cores. 79-84 - Ana-Elena Rugina, Karama Kanoun, Mohamed Kaâniche:
The ADAPT Tool: From AADL Architectural Models to Stochastic Petri Nets through Model Transformation. 85-90 - Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger:
Practical Setup Time Violation Attacks on AES. 91-96
Security Issues
- Corrado Leita, Marc Dacier
:
SGNET: A Worldwide Deployable Framework to Support the Analysis of Malware Threat Models. 99-109 - Manuel Mendonça, Nuno Ferreira Neves
:
Fuzzing Wi-Fi Drivers to Locate Security Vulnerabilities. 110-119
Dependability for Hardware
- Roman Obermaisser, Hubert Kraut, Christian El Salloum:
A Transient-Resilient System-on-a-Chip Architecture with Support for On-Chip and Off-Chip TMR. 123-134 - Christian El Salloum, Roman Obermaisser, Bernhard Huber, Hermann Kopetz:
A Novel Naming Scheme for System-on-a-Chips Supporting Dynamic Resource Management. 135-144 - Daniel Skarin, Johan Karlsson:
Software Implemented Detection and Recovery of Soft Errors in a Brake-by-Wire System. 145-154
Methodologies
- Vincent Gramoli, Anne-Marie Kermarrec
, Erwan Le Merrer:
SONDe, a Self-Organizing Object Deployment Algorithm in Large-Scale Dynamic Systems. 157-166 - Alexei Iliasov, Alexander B. Romanovsky
:
Refinement Patterns for Fault Tolerant Systems. 167-176
Panel
- Andrea Bondavalli
:
How hard is Assessing and Measuring Resilience? Panel. 179-180 - Miroslaw Malek:
Online Dependability Assessment through Runtime Monitoring and Prediction. 181
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.