Search Results - "2016 12th European Dependable Computing Conference (EDCC)"
-
1
Software Metrics and Security Vulnerabilities: Dataset and Exploratory Study
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Code with certain characteristics is more prone to have security vulnerabilities. In fact, studies show that code not following best practices is harder to…”
Get full text
Conference Proceeding -
2
Design and Implementation of a Consistent Data Store for a Distributed SDN Control Plane
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Scalable and fault-tolerant distributed Software-Defined Networking (SDN) controllers usually give up strong consistency for the network state, adopting…”
Get full text
Conference Proceeding -
3
Finding Resilience-Friendly Compiler Optimizations Using Meta-Heuristic Search Techniques
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…With the projected future increase in hardware error rates, application software needs to be resilient to hardware faults. An important factor affecting an…”
Get full text
Conference Proceeding -
4
Investigating the Effects of Process Variations and System Workloads on Reliability of STT-RAM Caches
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…In recent years, STT-RAMs have been proposed as a promising replacement for SRAMs in on-chip caches. Although STT-RAMs benefit from high-density,…”
Get full text
Conference Proceeding -
5
Virtual Worlds for Testing Robot Navigation: A Study on the Difficulty Level
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…The ability to navigate in diverse and previously unknown environments is a critical service of autonomous robots. We propose a test framework based on MORSE…”
Get full text
Conference Proceeding -
6
SAREK: Optimistic Parallel Ordering in Byzantine Fault Tolerance
Published in 2016 12TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2016) (01-09-2016)“…Recently proposed Byzantine fault-tolerant (BFT) systems achieve high throughput by processing requests in parallel. However, as their agreement protocols rely…”
Get full text
Conference Proceeding -
7
Expert-Guided Automatic Diagnosis of Performance Problems in Enterprise Applications
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Application performance management (APM) is a necessity to detect and solve performance problems during operation of enterprise applications. While existing…”
Get full text
Conference Proceeding -
8
Multidimensional Log Analysis
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Various event and performance logs are available in computer systems. They are considered as useful data source characterizing system operational profiles and…”
Get full text
Conference Proceeding -
9
Ultrafast Error Correction Codes for Double Error Detection/Correction
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Register protection against soft errors remains a major concern for deep sub-micron systems due to technology scaling. Error Correction Codes (ECCs) improve…”
Get full text
Conference Proceeding -
10
Experimental Assessment of NoSQL Databases Dependability
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…NoSQL databases are the response to the sheer volume of data being generated, stored, and analysed by modern users and applications. They are extremely…”
Get full text
Conference Proceeding -
11
Inferring a Distributed Application Behavior Model for Anomaly Based Intrusion Detection
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…As distributed computations become more and more common in highly distributed environments like the cloud, intrusion detection systems have to follow these…”
Get full text
Conference Proceeding -
12
Diversity, Safety and Security in Embedded Systems: Modelling Adversary Effort and Supply Chain Risks
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…We present quantitative considerations for the design of redundancy and diversity in embedded systems with security requirements. The potential for malicious…”
Get full text
Conference Proceeding -
13
Towards a Common Safety Ontology for Automobiles and Railway Vehicles
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Automobiles and railway vehicles have their specific safety standards, respectively. Still, they are both land vehicles and thus share a large set of common…”
Get full text
Conference Proceeding -
14
Adaptive Deployment Infrastructure for Android Applications
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Due to the popularization of mobile devices, the number of mobile applications has increased in recent years. Mobile devices are constantly evolving on…”
Get full text
Conference Proceeding -
15
3D-DPS: An Efficient 3D-CAC for Reliable Data Transfer in 3D ICs
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Migration to Three Dimensional Integrated Circuits (3D ICs) can provide higher scalability, higher throughput, and lower power consumption with respect to Two…”
Get full text
Conference Proceeding -
16
Prediction of the Testing Effort for the Safety Certification of Open-Source Software: A Case Study on a Real-Time Operating System
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…The reuse of Open Source Software (OSS) for safety-critical systems is seen with interest by industries, such as automotive, medical, and aerospace, as it…”
Get full text
Conference Proceeding -
17
A Performance Comparison of Algorithms for Byzantine Agreement in Distributed Systems
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Reaching agreement in the presence of byzantine processes is an important task in distributed systems. Theoretical analysis of algorithms for Byzantine…”
Get full text
Conference Proceeding -
18
Practical Emulation of Software Defects in Source Code
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…Software fault injection is a fundamental technique to evaluate the behavior of systems in presence of software defects. However, in spite of the considerable…”
Get full text
Conference Proceeding -
19
CrossCheck: A Holistic Approach for Tolerating Crash-Faults and Arbitrary Failures
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…High availability is no longer optional since more and more Internet-based services provide economical or otherwise critical offerings. Traditionally, crash…”
Get full text
Conference Proceeding -
20
Assuring Dependable Cloud-Based System Engineering: A Cloud Accountability Method
Published in 2016 12th European Dependable Computing Conference (EDCC) (01-09-2016)“…This work introduces a methodology for cloud accountability that assures system dependability in terms of availability and reliability. This assurance is…”
Get full text
Conference Proceeding