


default search action
29th PRDC 2024: Osaka, Japan
- 29th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2024, Osaka, Japan, November 13-15, 2024. IEEE 2024, ISBN 979-8-3315-4074-6

- Ilknur Mustafazade

, Anup Das, Nagarajan Kandasamy:
Efficient Built-In Self-Test Strategy for Neuromorphic Hardware Based On Alarm Placement. 1-10 - Abhishek Kumar Mishra

, Anup Das, Nagarajan Kandasamy:
Model-Based Approach Towards Correctness Checking of Neuromorphic Computing Systems. 11-21 - Jawaher Alharbi, Arshad Jhumka:

CheckIn: Efficiently Checkpointing Intermittent Sensor-Based Internet of Things (IoT) Networks. 22-32 - Jun Yajima

, Satoko Shiga, Kyoko Ohashi, Masaru Ide, Hiroshi Tanaka, Sachiko Onodera:
Toward a Trustworthy Artificial Intelligence System Considering Security, Ethics, and Quality. 33-42 - Tommaso Zoppi, Fahad Ahmed KhoKhar, Andrea Ceccarelli

, Leonardo Montecchi, Andrea Bondavalli
:
Fail-Controlled Classifiers: Do they Know when they don't Know? 43-54 - Md Mashrur Arifin, Jyh-Haw Yeh:

cTIMS: Correlated Textual and Image based Metrics Suites for Assessing GAN-Synthesized Android Malware Images. 55-65 - Sara Alosaime, Arshad Jhumka:

FLARE: Availability Awareness for Resource-Efficient Federated Learning. 66-75 - Yucheng Sun

, Ruomu Hou, Haifeng Yu:
Robust and Low-degree Overlay for Secure Flooding Against Resource-bounded Adversaries. 76-86 - Taras Lykhenko, Rafael Soares, Luís Rodrigues:

PrompTCC: Transactional Causally Consistent Reads Can Be Fast and Fresh. 87-97 - Liangrong Zhao, Qin Wang, Joseph K. Liu, Jiangshan Yu

:
Juno: Aggregated Vector Consensus for Optimal Asynchronous Common Subset. 98-108 - Naoshi Yamane, Satoshi Munakata, Luis Guillen, Takaki Nakamura, Takuo Suganuma:

Durability Evaluation of Erasure Coding Applying Risk-aware Data Protection in Large-scale Disasters. 109-119 - Joon Kuy Han, Dennis Wong, Zhoulai Fu, Byungkon Kang:

AuthZit: Personalized Visual-Spatial and Loci-Tagging Fallback Authentication. 120-130 - Eri Ogawa, Tetsuro Yamazaki

, Ryota Shioya:
Dynamic Controllability Analysis for Preventing Injection Attacks. 131-142 - Rajesh Kumar, Swapnil Pandey, Debanshu Das:

PALM: A framework to identify novel attacks in an e-commerce system. 143-152 - Jingchi Wu, Tadashi Dohi, Hiroyuki Okamura:

Refined Software Reliability Prediction: A Bagging Approacha. 153-162 - Ilyas Hadjou, Young-Woo Kwon:

RL-Based Approach to Enhance Reliability and Efficiency in Autoscaling for Heterogeneous Edge Serverless Computing Environments. 163-172 - Marco Thomas, Claas Lorenz, Alf Zugenmaier:

Optimal Deployment of High-Level Access Control Policies in Heterogeneous Enforcement Infrastructures. 173-179 - Dong Kyu Lee, Jung Min Pak, Choon Ki Ahn:

Secure Finite-Memory Target Tracking in Heterogeneous Sensor Networks Under Cyber Attacks. 180-186 - Homu Omura, Kazuteru Namba:

FPGA Cluster Based System with Adaptive TMR/DMR for Soft Error Mitigation. 187-188 - Ryoichi Ishigami, Sho Matsumoto, Tomohiko Takagi:

Construction of VDM++ Specifications from Extended Screen Transition Diagrams for Validation of Microservice-based Web Applications. 189-190 - Sang Su Lee, Kwan Soo Kim, Dong Kyu Lee, Gyun Ha Kim, Choon Ki Ahn:

Distributed Control Framework for UAV Resilience Against Faults and Cyber Attacks with Finite-Memory Approach. 191-192 - Leonardo Alexandrino De Melo, Mauricio Gomes de Queiroz, Alberto Bosio, Rodrigo Possamai Bastos:

Robustness of Redundancy-Hardened Convolutional Neural Networks Against Adversarial Attacks. 193-194 - Aoi Ono, Tatsuhiro Tsuchiya:

Describing and verifying malicious fault-tolerant consensus algorithms using PlusCAL and C languages. 195-196 - Koki Matsui, Tatsuhiro Tsuchiya:

Selecting Nodes to Protect in Interdependent Networks Using Shapley Value Analysis. 197-198 - Hiroki Hanada, Keisuke Ishibashi:

Empirical Study on Request Timeout and Retry for Microservices Communication. 199-200 - Hongxue Chen, Xiaoya Hu, Weihong Ma, Zonghua Zhang:

Comparative Studies of Security Assessment Methods for Railway Control Systems. 201-207 - Tommaso Zoppi, Irene Bicchierai, Francesco Brancati, Andrea Bondavalli

, Hans-Peter Schwefel:
Deploying a Generic Threat Model for Detecting Anomalies in a Power Grid Digital Twin. 208-215 - Phaiboon Jaradnaparatana

, Buntita Sriarunothai, Chutikarn Kamsem, Supithcha Jongphoemwatthanaphon, Burit Sihabut
, Duong Dinh Tran, Toshiaki Aoki:
Bridging Gaps between Scenario-Based Safety Analysis and Simulation-based Testing for Autonomous Driving Systems. 216-219 - Xiaoqi Weng, Razvan Beuran:

Smart Building Control System Emulation Platform for Security Testing. 220-223 - Tatsuhiro Tsuchiya:

Sequential programming for distributed algorithm verification. 224-226 - Kazuaki Kawabata, Naohiro Hayashibara:

Towards a Pragmatic ORAM Implementation Using Caching and Prefetching. 227-230 - Jingchi Wu, Junjun Zheng, Tadashi Dohi, Hiroyuki Okamura:

An Alternative Boosting-based Software Reliability Prediction Method. 231-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














