Search Results - "2016 12th European Dependable Computing Conference (EDCC)"

Refine Results
  1. 1

    Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study by Alves, Henrique, Fonseca, Baldoino, Antunes, Nuno

    “…Code with certain characteristics is more prone to have security vulnerabilities. In fact, studies show that code not following best practices is harder to…”
    Get full text
    Conference Proceeding
  2. 2

    Design and Implementation of a Consistent Data Store for a Distributed SDN Control Plane by Botelho, Fabio, Ribeiro, Tulio A., Ferreira, Paulo, Ramos, Fernando M. V., Bessani, Alysson

    “…Scalable and fault-tolerant distributed Software-Defined Networking (SDN) controllers usually give up strong consistency for the network state, adopting…”
    Get full text
    Conference Proceeding
  3. 3

    Finding Resilience-Friendly Compiler Optimizations Using Meta-Heuristic Search Techniques by Narayanamurthy, Nithya, Pattabiraman, Karthik, Ripeanu, Matei

    “…With the projected future increase in hardware error rates, application software needs to be resilient to hardware faults. An important factor affecting an…”
    Get full text
    Conference Proceeding
  4. 4

    Investigating the Effects of Process Variations and System Workloads on Reliability of STT-RAM Caches by Cheshmikhani, Elham, Monazzah, Amir Mahdi Hosseini, Farbeh, Hamed, Miremadi, Seyed Ghassem

    “…In recent years, STT-RAMs have been proposed as a promising replacement for SRAMs in on-chip caches. Although STT-RAMs benefit from high-density,…”
    Get full text
    Conference Proceeding
  5. 5

    Virtual Worlds for Testing Robot Navigation: A Study on the Difficulty Level by Sotiropoulos, Thierry, Guiochet, Jeremie, Ingrand, Felix, Waeselynck, Helene

    “…The ability to navigate in diverse and previously unknown environments is a critical service of autonomous robots. We propose a test framework based on MORSE…”
    Get full text
    Conference Proceeding
  6. 6

    SAREK: Optimistic Parallel Ordering in Byzantine Fault Tolerance by Bijun Li, Wenbo Xu, Abid, Muhammad Zeeshan, Distler, Tobias, Kapitza, Rudiger

    “…Recently proposed Byzantine fault-tolerant (BFT) systems achieve high throughput by processing requests in parallel. However, as their agreement protocols rely…”
    Get full text
    Conference Proceeding
  7. 7

    Expert-Guided Automatic Diagnosis of Performance Problems in Enterprise Applications by Heger, Christoph, Van Hoorn, Andre, Okanovic, Dusan, Siegl, Stefan, Wert, Alexander

    “…Application performance management (APM) is a necessity to detect and solve performance problems during operation of enterprise applications. While existing…”
    Get full text
    Conference Proceeding
  8. 8

    Multidimensional Log Analysis by Kubacki, Marcin, Sosnowski, Janusz

    “…Various event and performance logs are available in computer systems. They are considered as useful data source characterizing system operational profiles and…”
    Get full text
    Conference Proceeding
  9. 9

    Ultrafast Error Correction Codes for Double Error Detection/Correction by Saiz-Adalid, Luis J., Gil, Pedro, Ruiz, Juan-Carlos, Gracia-Moran, Joaquin, Gil-Tomas, Daniel, Baraza-Calvo, J-Carlos

    “…Register protection against soft errors remains a major concern for deep sub-micron systems due to technology scaling. Error Correction Codes (ECCs) improve…”
    Get full text
    Conference Proceeding
  10. 10

    Experimental Assessment of NoSQL Databases Dependability by Ventura, Luis, Antunes, Nuno

    “…NoSQL databases are the response to the sheer volume of data being generated, stored, and analysed by modern users and applications. They are extremely…”
    Get full text
    Conference Proceeding
  11. 11

    Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection by Totel, Eric, Hkimi, Mouna, Hurfin, Michel, Leslous, Mourad, Labiche, Yvan

    “…As distributed computations become more and more common in highly distributed environments like the cloud, intrusion detection systems have to follow these…”
    Get full text
    Conference Proceeding
  12. 12

    Diversity, Safety and Security in Embedded Systems: Modelling Adversary Effort and Supply Chain Risks by Gashi, Ilir, Povyakalo, Andrey, Strigini, Lorenzo

    “…We present quantitative considerations for the design of redundancy and diversity in embedded systems with security requirements. The potential for malicious…”
    Get full text
    Conference Proceeding
  13. 13

    Towards a Common Safety Ontology for Automobiles and Railway Vehicles by Hulin, Bernhard, Kaindl, Hermann, Rathfux, Thomas, Popp, Roman, Arnautovic, Edin, Beckert, Roland

    “…Automobiles and railway vehicles have their specific safety standards, respectively. Still, they are both land vehicles and thus share a large set of common…”
    Get full text
    Conference Proceeding
  14. 14

    Adaptive Deployment Infrastructure for Android Applications by Casquina, Junior Cupe, Sandim Eleuterio, Jane D. A., Rubira, Cecilia M. F.

    “…Due to the popularization of mobile devices, the number of mobile applications has increased in recent years. Mobile devices are constantly evolving on…”
    Get full text
    Conference Proceeding
  15. 15

    3D-DPS: An Efficient 3D-CAC for Reliable Data Transfer in 3D ICs by Shirmohammadi, Zahra, Rohbani, Nezam, Miremadi, Seyed Ghassem

    “…Migration to Three Dimensional Integrated Circuits (3D ICs) can provide higher scalability, higher throughput, and lower power consumption with respect to Two…”
    Get full text
    Conference Proceeding
  16. 16

    Prediction of the Testing Effort for the Safety Certification of Open-Source Software: A Case Study on a Real-Time Operating System by Cotroneo, Domenico, Di Leo, Domenico, Natella, Roberto, Pietrantuono, Roberto

    “…The reuse of Open Source Software (OSS) for safety-critical systems is seen with interest by industries, such as automotive, medical, and aerospace, as it…”
    Get full text
    Conference Proceeding
  17. 17

    A Performance Comparison of Algorithms for Byzantine Agreement in Distributed Systems by Agrawal, Shreya, Daudjee, Khuzaima

    “…Reaching agreement in the presence of byzantine processes is an important task in distributed systems. Theoretical analysis of algorithms for Byzantine…”
    Get full text
    Conference Proceeding
  18. 18

    Practical Emulation of Software Defects in Source Code by Pereira, Goncalo, Barbosa, Raul, Madeira, Henrique

    “…Software fault injection is a fundamental technique to evaluate the behavior of systems in presence of software defects. However, in spite of the considerable…”
    Get full text
    Conference Proceeding
  19. 19

    CrossCheck: A Holistic Approach for Tolerating Crash-Faults and Arbitrary Failures by Martens, Arthur, Borchert, Christoph, Nieke, Manuel, Spinczyk, Olaf, Kapitza, Rudiger

    “…High availability is no longer optional since more and more Internet-based services provide economical or otherwise critical offerings. Traditionally, crash…”
    Get full text
    Conference Proceeding
  20. 20

    Assuring Dependable Cloud-Based System Engineering: A Cloud Accountability Method by Adjepon-Yamoah, David Ebo, Zhenyu Wen

    “…This work introduces a methodology for cloud accountability that assures system dependability in terms of availability and reliability. This assurance is…”
    Get full text
    Conference Proceeding