Search For:

Displaying 1-50 out of 104 total
Optimal Software Release Policy Based on Cost and Reliability with Testing Efficiency
Found in: Computer Software and Applications Conference, Annual International
By Chin-Yu Huang, Sy-Yen Kuo, Sy-Yen Kuo, Michael R. Lyu
Issue Date:October 1999
pp. 468
In this paper, we study the optimal software release problem considering cost, reliability and testing efficiency. We first propose a generalized logistic testing-effort function that can be used to describe the actual consumption of resources during the s...
 
An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Jen-Hao Kuo, Siong-Ui Te, Pang-Ting Liao, Chun-Ying Huang, Pan-Lung Tsai, Chin-Laung c Lei, Sy-Yen Kuo, Yennun Huang, Zsehong Tsai
Issue Date:December 2005
pp. 133-139
Virtual Router Redundancy Protocol (VRRP) is designed to eliminate the single point of failure in the static default routing environment in LAN. The original VRRP protocol does not support load balancing for both incoming and outgoing traffic. This paper d...
 
Reliability Evaluation of Dependable Distributed Computing Systems Based on Recursive Merge and BDD
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Yung-Ruei Chang, Hung-Yau Lin, Sy-Yen Kuo
Issue Date:March 2004
pp. 197-206
System reliability evaluation, sensitivity analysis, importance measures, failure frequency analysis and optimal design have become important issues for distributed dependable computing. Finding all the Minimal File Spanning Trees (MFST) and avoiding repea...
 
OBDD-Based Evaluation of Reliability and Importance Measures for Multistate Systems Subject to Imperfect Fault Coverage
Found in: IEEE Transactions on Dependable and Secure Computing
By Yung-Ruei Chang, Suprasad V. Amari, Sy-Yen Kuo
Issue Date:October 2005
pp. 336-347
Algorithms for evaluating the reliability of a complex system such as a multistate fault-tolerant computer system have become more important recently. They are designed to obtain the complete results quickly and accurately even when there exist a number of...
 
CSI: Compressed sensing-based clone identification in sensor networks
Found in: Pervasive Computing and Communications Workshops, IEEE International Conference on
By Chia-Mu Yu,Chun-Shien Lu,Sy-Yen Kuo
Issue Date:March 2012
pp. 290-295
The clone detection, aiming to detect the illegal copies with all of the credentials of legitimate sensor nodes, is of great importance for sensor networks because of the substantial impact of clones on network operations like routing, data collection, and...
 
Malware Profiler Based on Innovative Behavior-Awareness Technique
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Shih-Yao Dai,Yarochkin Fyodor,Sy-Yen Kuo,Ming-Wei Wu,Yennun Huang
Issue Date:December 2011
pp. 314-319
In order to steal valuable data, hackers are uninterrupted research and development new techniques to intrude computer systems. Opposite to hackers, security researchers are uninterrupted analysis and tracking new malicious techniques for protecting sensit...
 
Handling Nondeterminism in Logic Simulation So That Your Waveform Can Be Trusted Again
Found in: IEEE Design and Test of Computers
By Kai-hui Chang,Hong-Zu Chou,Haiqian Yu,Dylan Dobbyn,Sy-Yen Kuo
Publication Date: June 2011
pp. N/A
The increasing complexity of integrated circuits pushes for more aggressive design optimizations, such as resetting only part of design registers, that can leave some registers in nondeterministic (X) states. Such Xs may invalidate the correctness of logic...
 
Examining Web-Based Spyware Invasion with Stateful Behavior Monitoring
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Ming-Wei Wu, Sy-Yen Kuo
Issue Date:December 2007
pp. 275-281
Spyware infection that exploits the vulnerabilities of client-side Web application, especially browser, to install malicious programs has gain significant popularity in recent years. Unlike traditional infection vectors such as software bundling in sharewa...
 
Efficient Exact Spare Allocation via Boolean Satisfiability
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Fang Yu, Chung-Hung Tsai, Yao-Wen Huang, D. T. Lee, Hung-Yau Lin, Sy-Yen Kuo
Issue Date:October 2005
pp. 361-370
<p>Fabricating large memory and processor arrays is subject to physical failures resulting in yield degradation. The strategy of incorporating spare rows and columns to obtain reasonable production yields was first proposed in the 1970s, and continue...
 
Verifying Web Applications Using Bounded Model Checking
Found in: Dependable Systems and Networks, International Conference on
By Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
Issue Date:July 2004
pp. 199
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowing both verification and assurance to occur without user intervention. Model c...
 
A Simple and Efficient Deadlock Recovery Scheme for Wormhole Routed 2-Dimensional Meshes
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Shih-Chang Wang, Hung-Yau Lin, Sy-Yen Kuo, Yennun Huang
Issue Date:December 1999
pp. 210
In order to avoid deadlocks, prevention-based routing algorithms impose certain routing restrictions which lead to high hardware complexity or low adaptability. If deadlock occurrences are extremely rare, recovery-based routing algorithms become more attra...
 
A Unified Scheme of Some Nonhomogenous Poisson Process Models for Software Reliability Estimation
Found in: IEEE Transactions on Software Engineering
By Chin-Yu Huang, Michael R. Lyu, Sy-Yen Kuo
Issue Date:March 2003
pp. 261-269
<p><b>Abstract</b>—In this paper, we describe how several existing software reliability growth models based on Nonhomogeneous Poisson processes (NHPPs) can be comprehensively derived by applying the concept of weighted arithmetic, weighte...
 
Optimal Release Times for Software Systems with Scheduled Delivery Time Based on the HGDM
Found in: IEEE Transactions on Computers
By Rong-Huei Hou, Sy-Yen Kuo, Yi-Ping Chang
Issue Date:February 1997
pp. 216-221
<p><b>Abstract</b>—The Hyper-Geometric Distribution software reliability growth Model (HGDM) was developed to estimate the number of remaining software faults after completing the test/debug phase. An important problem in the software dev...
 
A Multi-Faceted Approach towards Spam-Resistible Mail
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Ming-Wei Wu, Yennun Huang, Shyue-Kung Lu, Ing-Yi Chen, Sy-Yen Kuo
Issue Date:December 2005
pp. 208-218
As checking SPAM became part of our daily life, unsolicited bulk e-mails (UBE) have become unmanageable and intolerable. Bulk volume of spam e-mails delivering to mail transfer agents (MTAs) is similar to the effect of denial of services (DDoS) attacks as ...
 
An Extended XQDD Representation for Multiple-Valued Quantum Logic
Found in: IEEE Transactions on Computers
By Chin-Yung Lu,Shiou-An Wang,Sy-Yen Kuo
Issue Date:October 2011
pp. 1377-1389
X-decomposition Quantum Decision Diagram (XQDD) can represent a quantum operation and perform matrix operations. It can be used to verify quantum and reversible circuits even if the reversible circuits have different number of garbage qubits. It is efficie...
 
MAPMon: A Host-Based Malware Detection Tool
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Shih-Yao Dai, Sy-Yen Kuo
Issue Date:December 2007
pp. 349-356
In order for financial-motivated malware programs such as spyware, virus and worm to survive after system rebooted, they have to modify entries in auto start extensibility points (ASEPs), system calls or system files on a comprised system. We call these sy...
 
Fault Tolerance Techniques for Systolic Arrays
Found in: Computer
By J.A. Abraham, P. Banerjee, Chien-Yi Chen, W.K. Fuchs, Sy-Yen Kuo, A.L. Narasimha Reddy
Issue Date:July 1987
pp. 65-75
No summary available.
 
Enhancing Data Integrity and Privacy in the Cloud: An Agenda
Found in: Computer
By David S.L. Wei,San Murugesan,Sy-Yen Kuo,Kshirasagar Naik,Danny Krizanc
Issue Date:November 2013
pp. 87-90
To address users' security concerns, cloud service providers must implement strategies that enhance data integrity and privacy. New data auditing and encryption methods open a path toward these goals.
 
Design of event-based Intrusion Detection System on OpenFlow Network
Found in: 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
By Yung-Li Hu,Wei-Bing Su,Li-Ying Wu,Yennun Huang,Sy-Yen Kuo
Issue Date:June 2013
pp. 1-2
OpenFlow (OF) Network is a novel network architecture many famous cloud service providers have applied it to build their data center network. The difference between OF Network and traditional network architecture is the decoupling of controller planes and ...
 
Civil UAV Path Planning Algorithm for Considering Connection with Cellular Data Network
Found in: 2012 IEEE 12th International Conference on Computer and Information Technology (CIT)
By Ting-Yun Chi,Yi Ming, Tseng,Sy-Yen Kuo,Chih-Chiun Liao
Issue Date:October 2012
pp. 327-331
The UAV is used in modern war widely. The military can control the UAV and send image to remote base in time through satellite link. Currently the Civil UAV use the wireless analog video and RF control signal to provides similar function as a recon drone. ...
 
Moving Object Extraction Using Compressed Domain Features of H.264 INTRA Frames
Found in: 2012 9th IEEE International Conference on Advanced Video and Signal Based Surveillance (AVSS)
By Fu-Ping Wang,Wei-Ho Chung,Guo-Kai Ni,Ing-Yi Chen,Sy-Yen Kuo
Issue Date:September 2012
pp. 258-263
A new efficient algorithm using the compressed domain features of H.264 INTRA frames is proposed for moving object extraction on huge video surveillance archives. To achieve searching efficiency, we propose to locate moving objects by scrutinizing only the...
 
Quantum Blind Computation with Teleportation-based Computation
Found in: Information Technology: New Generations, Third International Conference on
By Nai-Hui Chia,Chia-Hung Chien,Wei-Ho Chung,Sy-Yen Kuo
Issue Date:April 2012
pp. 769-774
We propose a protocol based on quantum teleportation and measurement-based computation allowing clients to conduct blind computation on the server with less information of input, output and computation revealed. Our protocol also requires less quantum reso...
 
Reactor Containment Dependability Analysis in Safety Critical Nuclear Power Plants: Design, Implementation and Experience
Found in: Parallel and Distributed Systems, International Conference on
By Chi-Shiang Cho,Wei-Ho Chung,Deyun Gao,Hongke Zhang,Sy-Yen Kuo
Issue Date:December 2011
pp. 906-911
The use of nuclear energy to generate electric power is crucial in meeting the high energy demand of modern economy. The dependability analysis of nuclear power plants has been a critical issue and the reactor containment is the most important safety struc...
 
Dependability Enhancement of Reactor Containment in Safety Critical Nuclear Power Plants
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Chi-Shiang Cho,Wei-Ho Chung,Deyun Gao,Hongke Zhang,Sy-Yen Kuo
Issue Date:December 2011
pp. 129-134
The use of nuclear energy to generate electric power is crucial in meeting the high energy demand of modern economy. The dependability of nuclear power plants has been a critical issue and the reactor containment is the most important safety structure acti...
 
Applying verification intention for design customization via property mining under constrained testbenches
Found in: Computer Design, International Conference on
By Chih-Neng Chung,Chia-Wei Chang,Kai-Hui Chang,Sy-Yen Kuo
Issue Date:October 2011
pp. 84-89
Most synthesis tools perform optimizations based on the design itself and do not utilize the information present in the verification environment. Not using such information greatly limits the optimization capabilities of synthesis tools, which is especiall...
 
Message from the general chair and conference coordinator
Found in: Dependable Systems and Networks, International Conference on
By Michael R. Lyu,Sy-Yen Kuo
Issue Date:June 2011
pp. ii-iii
On behalf of the Organizing Committee, we warmly welcome your participation in the 2011 International Conference on Dependable Systems and Networks in Hong Kong, a vibrant city where West meets East, modern blends with tradition, on June 27 -- 30, 2011.
   
Formal reset recovery slack calculation at the register transfer level
Found in: 2011 Design, Automation & Test in Europe
By Chih-Neng Chung, Chia-Wei Chang, Kai-Hui Chang, Sy-Yen Kuo
Issue Date:March 2011
pp. 1-4
Reset is one of the most important signals in many designs. Since reset is typically not timing critical, it is handled at late physical design stages. However, the large fanout of reset and the lack of routing resources at these stages can create variant ...
   
Holography: A Hardware Virtualization Tool for Malware Analysis
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Shih-Yao Dai,Yarochkin Fyodor,Jain-Shing Wu,Chih-Hung Lin,Yennun Huang,Sy-Yen Kuo
Issue Date:November 2009
pp. 263-268
Behavior-based detection methods have the ability to detect unknown malicious software (malware). The success of behavior-based detection methods must depend on sufficient number of abnormal behavior models. Insufficient number of abnormal behavior models ...
 
Quantum Transmission Integrity Mechanism for Indirect Communication
Found in: Computer Communications and Networks, International Conference on
By Tien-Sheng Lin, I-Ming Tsai, Sy-Yen Kuo
Issue Date:August 2009
pp. 1-6
No summary available.
 
Towards Adaptive Covert Communication System
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Fedor V. Yarochkin, Shih-Yao Dai, Chih-Hung Lin, Yennun Huang, Sy-Yen Kuo
Issue Date:December 2008
pp. 153-159
Covert channels are secret communication paths, which existance is not expected in the original system design. Covert channels can be used as legimate tools of censorship resistance, anonimity and privacy preservation to address issues with
 
QBIST: Quantum Built-in Self-Test for any Boolean Circuit
Found in: VLSI Test Symposium, IEEE
By Yao-Hsin Chou, Sy-Yen Kuo, I-Ming Tsai
Issue Date:May 2008
pp. 261-266
Recently, a systematic procedure was proposed to derive a minimum space quantum circuit for any given classical logic with the generalized quantum Toffoli gate which is universal in boolean logic. Since quantum computation is reversible, we can apply this ...
 
A Randomized Distributed Algorithm for Peer-to-Peer Data Replication in Wireless Ad Hoc Networks
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Hong-Zu Chou, Szu-Chi Wang, Sy-Yen Kuo
Issue Date:December 2007
pp. 163-170
In this paper, we focus on enhancing the data accessibility of ad hoc networks, with emphasis on peer-to-peer communications. To achieve this goal, we propose a randomized distributed algorithm for data replication. Furthermore, a probabilistic approach is...
 
Attack Probability Based Deterministic Key Predistribution Mechanism for Non-Uniform Sensor Deployment
Found in: Distributed Computing Systems Workshops, International Conference on
By Chia-Mu Yu, Cheng-Chung Li, Chun-Shien Lu, Der-Tsai Lee, Sy-Yen Kuo
Issue Date:June 2007
pp. 18
Secure communication is a challenging problem in wireless sensor networks. In this paper, we investigate an attack probability-based deterministic key predis- tribution method for non-uniform sensor deployment. First, we design a reasonable model for group...
 
Enhanced UPnP Control and Management in a Campus Network
Found in: Multimedia and Ubiquitous Engineering, International Conference on
By Wally Chen, Sy-Yen Kuo, Han-Chieh Chao
Issue Date:April 2007
pp. 331-335
Consumer electronics and intelligent appliances can is successful and widely used in home networks. In this paper, we present an approach for UPnP devices connecting to outer networks via UPnP aware gateway. We develop service
 
Dependabilities in a High-performance Quantum Real-time Distributed System
Found in: Information Technology: New Generations, Third International Conference on
By Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo
Issue Date:April 2007
pp. 1107-1112
Two processors jointly provide a real-time service which can be completed by exactly one processor. Assuming each processor is allowed to announce only a one-bit information in a distributed way to decide which one should process the job, inevitably some o...
 
Quantum Entanglement, Non-Locality and Secure Computation
Found in: Quantum, Nano, and Micro Technologies, First International Conference on
By Yao-Hsin Chou, I-Ming Tsai, Chin-Shyurng Fahn, Shi-Jinn Horng, Sy-Yen Kuo
Issue Date:January 2007
pp. 15
In this paper, we demonstrate that nanoscale phenomenon can be applied not only in device level but also in high layer applications, such as secure computation. We study the possibility of performing secure computation by building non-local machines based ...
 
A Stateful Approach to Spyware Detection and Removal
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Ming-Wei Wu, Yennun Huang, Yi-Min Wang, Sy-Yen Kuo
Issue Date:December 2006
pp. 173-182
Spyware, a type of potentially unwanted programs (PUPs), has become a significant threat to most Internet users as it introduces serious privacy disclosure and potential security breach to the systems. Current anti-spyware tools use signatures to detect sp...
 
Quantum Oblivious Transfer and Fair Digital Transactions
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Yao-Hsin Chou, I-Ming Tsai, Chien-Ming Ko, Sy-Yen Kuo, Ing-Yi Chen
Issue Date:December 2006
pp. 121-128
Quantum entanglement is a phenomenon available only at nanometer scale. In this paper, we show how quantum entanglement can be used to build cryptographic primitives such as oblivious transfer. In addition to studying the protocol itself, we also show how ...
 
The Survivability of the Augmented Logical Ring Topology in WDM Networks
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Yung-Chiao Chen, Chuan-Ching Sue, Sy-Yen Kuo
Issue Date:December 2006
pp. 397-398
The logical ring topology is a simple protection scheme in WDM networks. The failure of a single physical fiber link may cause the failure of multiple lightpaths. The service becomes unprotected if the failure propagates to the logical ring topology. In th...
 
A Functional Verification Environment for Advanced Switching Architecture
Found in: Electronic Design, Test and Applications, IEEE International Workshop on
By Min-An Song, Ting-Chun Huang, Sy-Yen Kuo
Issue Date:January 2006
pp. 201-204
In this paper, Intra-chip design has long been the main research area for the past years, resulting in several folds of computing power increase per year. In contrast, the speed of cross-chip connection, or even cross-system connection, has not been enhanc...
 
An Area-Efficient Architecture of Reed-Solomon Codec for Advanced RAID Systems
Found in: Parallel and Distributed Systems, International Conference on
By Min-An Song, I-Feng Lan, Sy-Yen Kuo
Issue Date:July 2005
pp. 620-626
<p>In this paper, a simple codec algorithm based on Reed- Solomon (RS) codes is proposed for erasure correcting in RAID level 6 systems. Unlike conventional RS codes, here this scheme with a mathematical reduction method, called Reduced Static-Checks...
 
Group Partition and Restoration Strategies for Survivable WDM Networks
Found in: Advanced Information Networking and Applications, International Conference on
By Chen-Shie Ho, Sy-Yen Kuo, Shih-Yi Yuan
Issue Date:March 2005
pp. 786-791
Rather than conventional segment partition methods in link/path/subpath based protection switching schemes,in this paper we discuss the multi-metrics resource-based network partition approaches to meet the requirement of group switching and adapt to dynami...
 
Non-Detrimental Web Application Security Scanning
Found in: Software Reliability Engineering, International Symposium on
By Yao-Wen Huang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo
Issue Date:November 2004
pp. 219-230
The World Wide Web has become a sophisticated platform capable of delivering a broad range of applications. However, its rapid growth has resulted in numerous security problems that current technologies cannot address. Researchers from both academic and pr...
 
An XOR Based Reed-Solomon Algorithm for Advanced RAID Systems
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Ping-Hsun Hsieh, Ing-Yi Chen, Yu-Ting Lin, Sy-Yen Kuo
Issue Date:October 2004
pp. 165-172
In this paper, a simple codec algorithm based on Reed-Solomon (RS) codes is proposed for erasure correcting in RAID (Redundant Array of Independent Disks) level 6 systems. Unlike conventional RS codes, here this scheme with a mathematical reduction method,...
 
An Efficient Algorithm for Reconfiguring Shared Spare RRAM
Found in: Computer Design, International Conference on
By Hung-Yau Lin, Hong-Zu v, Fu-Min Yeh, Ing-Yi Chen, Sy-Yen Kuo
Issue Date:October 2004
pp. 544-546
Redundant rows and columns have been used for years to improve the yield of DRAM fabrication. However, finding a memory repair solution has been proved to be an NP-complete problem. This paper presents an efficient algorithm which is able to find a repair ...
 
An Efficient Perfect Algorithm for Memory Repair Problems
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Hung-Yau Lin, Fu-Min Yeh, Ing-Yi Chen, Sy-Yen Kuo
Issue Date:October 2004
pp. 306-313
Memory repair by using spare rows/columns to replace faulty rows/columns has been proved to be NP-complete. Traditional perfect algorithms are comparison-based exhaustive search algorithms and are not efficient enough for complex problems. To overcome the ...
 
IC HTOL Test Stress Condition Optimization
Found in: Defect and Fault-Tolerance in VLSI Systems, IEEE International Symposium on
By Brian Peng, Ing-Yi Chen, Sy-Yen Kuo, Colin Bolger
Issue Date:October 2004
pp. 272-279
HTOL (High Temperature Operation Life) test is used to determine the effects of bias and temperature stress conditions on solid-state devices over time. It simulates the devices' operating condition in an accelerated manner, and is primarily for device rel...
 
Software Reliability Growth Models Incorporating Fault Dependency with Various Debugging Time Lags
Found in: Computer Software and Applications Conference, Annual International
By Chin-Yu Huang, Chu-Ti Lin, Sy-Yen Kuo, Michael R. Lyu, Chuan-Ching Sue
Issue Date:September 2004
pp. 186-191
Software reliability is defined as the probability of failure-free software operation for a specified period of time in a specified environment. Over the past 30 years, many software reliability growth models (SRGMs) have been proposed and most SRGMs assum...
 
Load-Balanced Anycast Routing
Found in: Parallel and Distributed Systems, International Conference on
By Ching-Yu Lin, Jung-Hua Lo, Sy-Yen Kuo
Issue Date:July 2004
pp. 701
For fault-tolerance and load-balance purposes, many modern Internet applications may require that a group of replicated servers dispersed widely over the world. The anycast as a new communication style defined in IPv6 provides the capability to route packe...
 
Optimal Allocation of Testing-Resource Considering Cost, Reliability, and Testing-Effort
Found in: Pacific Rim International Symposium on Dependable Computing, IEEE
By Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, Michael R. Lyu
Issue Date:March 2004
pp. 103-112
We investigate an optimal resource allocation problem in modular software systems during testing phase. The main purpose is to minimize the cost of software development when the number of remaining faults and a desired reliability objective are given. An e...
 
 1  2 Next >>