


default search action
DepCoS-RELCOMEX 2008: Szklarska Poreba, Poland
- Wojciech Zamojski, Jacek Mazurkiewicz, Jaroslaw Sugier, Tomasz Walkowiak:

Third International Conference on Dependability of Computer Systems, DepCoS-RELCOMEX 2008, June 26-28, 2008, Szklarska Poreba, Poland. IEEE Computer Society 2008, ISBN 978-0-7695-3179-3
Modelling
- Dariusz Dymek, Leszek Kotulski:

Using UML(VR) for Supporting the Automated Test Data Generation. 3-8 - Dariusz Dymek

, Leszek Kotulski:
Estimation of System Workload Time Characteristic Using UML Timing Diagrams. 9-14 - Paolo Maggi, Davide Pozza

, Riccardo Sisto
:
Vulnerability Modelling for the Analysis of Network Attacks. 15-22 - Henryk Piech:

Fuzzy strategies in modeling effects of technological implementations. 23-30 - Alfredo Pironti, Riccardo Sisto

:
Soundness Conditions for Cryptographic Algorithms and Parameters Abstractions in Formal Security Protocol Models. 31-38 - Antonio da Silva

, José-Fernán Martínez, Lourdes López-Santidrián
, Ana Belén García, Vicente Hernández
:
XML Schema Based Faultset Definition to Improve Faults Injection Tools Interoperability. 39-46 - Ian Philip Wolforth, Martin Walker

, Yiannis Papadopoulos
:
A Language for Failure Patterns and Application in Safety Analysis. 47-54 - Elena N. Zaitseva

, Vitaly G. Levashenko
:
Decision Diagrams for Reliability Analysis of Multi-State System. 55-62
Methodology and Tools
- Leonid Abrosimov, Sergey Kalashnikov, Matip Essounga Lazare:

Method of Matrix Writing Constructing of Topological Structure of Computer Network. 65-72 - Ali Al-Dahoud, Tomasz Walkowiak

, Marek Woda
:
Dependability Aspects of e-Learning Systems. 73-79 - Vasily V. Balashov

, Anatoly G. Bakhmurov, Maxim V. Chistolinov, Ruslan L. Smeliansky
, Dmitry Yu. Volkanov
, Nikita V. Youshchenko:
A Hardware-in-the-Loop Simulation Environment for Real-Time Systems Development and Architecture Evaluation. 80-86 - S. E. Bazhanov, S. V. Bogdanets, V. P. Kutepov:

Fault Tolerant Algorithm for Functional and Data Flow Parallel Programs Performance on Clusters. 87-94 - Lukasz Cyra, Janusz Górski

:
Standards Conformity Framework in Comparison with Contemporary Methods Supporting Standards Application. 95-102 - Lukasz Cyra, Janusz Górski

:
An Approach to Evaluation of Arguments in Trust Cases. 103-110 - Bernhard Fechner

, Andre Osterloh:
A True Random Number Generator with Built-in Attack Detection. 111-118 - Leszek Kotulski, Lukasz Fryz:

Conjugated Graph Grammars as a Mean to Assure Consistency of Systems of Conjugated Graphs. 119-126 - Vasilis P. Koutras

, Agapios N. Platis:
Semi-Markov Availability Modeling of a Redundant System with Partial and Full Rejuvenation Actions. 127-134 - Yuliya Prokhorova, Vyacheslav S. Kharchenko

, Sergey Ostroumov, Stanislav Yatsenko, Mykola Sidorenko, Boris Ostroumov:
Dependable SoPC-Based On-board Ice Protection System: From Research Project to Implementation. 135-142 - Krzysztof Sacha

:
Verification and Implementation of Dependable Controllers. 143-151 - Victor V. Toporkov

, Alexey Tselishchev:
Safety Strategies of Scheduling and Resource Co-allocation in Distributed Computing. 152-159
Dependability of Computer Networks
- Radoslaw Brendel, Henryk Krawczyk

:
Detection of Roles of Actors in Social Networks Using the Properties of Actors' Neighborhood Structure. 163-170 - Hugo Dworak:

Automatic Temporal Evaluation of the Accessibility of the World Wide Web and Its Standards Conformance. 171-178 - Alexander S. Frolov

, Igor Shchurov:
Non-Centralized Key Pre-Distribution in Computer Networks. 179-188 - Vyacheslav Klimanov, Artem Yermakov:

Complex Network Cluster Reliability Evolution. 189-194 - Ervin Tóth, Zoltán Hornák, Gergely Tóth:

Protection System against Overload and Distributed Denial of Service Attacks. 195-202 - Wojciech Tylman

:
Misuse-Based Intrusion Detection Using Bayesian Networks. 203-210 - Wojciech Tylman

:
Anomaly-Based Intrusion Detection Using Bayesian Networks. 211-218 - Shaoyan Zhang, Rui Zhang, Jianmin Jiang:

A Performance Management System for Telecommunication Network Using AI Techniques. 219-226 - Zi-Li Deng, Nenghai Yu, Zheng Li:

Designing Fault Tolerant Networks Topologies Based on Greedy Algorithm. 227-234
Software Security and Reliability
- Lukasz Bagrij, Katarzyna Michalska, Marek Woda

:
Dependability Evaluation of Service-oriented Information System Using Computer Simulation and Post-processing Results. 237-244 - Ammar Bessam, Mohamed Tahar Kimour:

Software Architecture Behavior Meta-model for Real-Time Systems. 245-252 - Ilona Bluemke

, Konrad Billewicz:
Aspects in the Maintenance of Compiled Programs. 253-260 - Anna Derezinska

, Anna Szustek:
Tool-Supported Advanced Mutation Approach for Verification of C# Programs. 261-268 - Feras Hanandeh:

Constraint & Test Verification in Parallel Database Systems. 269-276 - Jan Magott, Marek Woda

:
Evaluation of SOA Security Metrics Using Attack Graphs. 277-284 - Marek Woda

, Lukasz Bagrij:
Comprehensive Planning Platform Framework for Managing Service-Oriented Information Systems. 285-292 - Wlodek M. Zuberek

, Ilona Bluemke
:
Performance Analysis of Component-Based Systems. 293-300 - Michal Zyla, Dariusz Caban

:
Dependability Analysis of SOA Systems. 301-306
Hardware Design for Dependable Systems
- Eugene Babeshko

, Vyacheslav S. Kharchenko
, Anatoliy Gorbenko
:
Applying F(I)MEA-technique for SCADA-Based Industrial Control Systems Dependability Assessment and Ensuring. 309-315 - Janusz Biernat:

The Complexity of Fault-Tolerant Adder Structures. 316-323 - Andrey Chernetsov

, Olga Shamayeva:
Problems of Parallel Realization of Algorithms Calculation of Electronic Structure of Large Molecules. 324-331 - Krzysztof Kepa

, Fearghal Morgan, Krzysztof Kosciuszkiewicz, Tomasz Surmacz
:
SeReCon: A Trusted Environment for SoPC Design. 332-338 - Vyacheslav S. Kharchenko

, Alexandr Siora, Vladimir V. Sklyar
, Viktor Tokarev:
Scalable Diversity-Oriented Decisions and Technologies for Dependable SoPC-Based Safety-Critical Computer Systems and Infrastructures. 339-346 - Lukasz Krukowski, Jaroslaw Sugier:

Organization of AES Cryptographic Unit for Low Cost FPGA Implementation. 347-354 - Maciej Nikodem:

ElGamal Signature Scheme Immune to Fault Analysis. 355-362
Applications
- Andrea Ceccarelli

, István Majzik
, Danilo Iovino, Fausto Caneschi, Gergely Pintér, Andrea Bondavalli
:
A Resilient SIL 2 Driver Machine Interface for Train Control Systems. 365-374 - Grzegorz Debita

, Kamil Staniec:
Methodology of the Wireless Networks Planning in Mesh Topology. 375-382 - Dimitrios Gourgoulis, Charalambos Yakinthos:

An Intelligent Maritime Workplace using IT technologies. 383-389 - Vasily Y. Kharitonov

:
An Approach to Consistent Displaying of Virtual Reality Moving Objects. 390-397 - Henryk Maciejewski

, Tomasz Lipnicki:
Data Exploration Methods for Transport System Dependability Analysis. 398-405 - Jan Nikodem:

Autonomy and Cooperation as Factors of Dependability in Wireless Sensor Network. 406-413 - Dmitry Orlov:

On Opportunity of Application of Modular Arithmetic for Accuracy Improvement in Positioning of Virtual Reality Moving Objects. 414-421 - Miroslaw Siergiejczyk

:
Quality of Telematic Services in Transport. 422-429 - Tomasz Walkowiak

, Jacek Mazurkiewicz
:
Availability of Discrete Transport System Simulated by SSF Tool. 430-437

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














