The Community for Technology Leaders
Pacific Rim International Symposium on Dependable Computing, IEEE (2002)
Tsukuba, Japan
Dec. 16, 2002 to Dec. 18, 2002
ISBN: 0-7695-1852-4

Program Committee (PDF)

pp. xiii

Reviewers (PDF)

pp. xiv
Keynote Speech (I)
Session 1A:Dependable Distributed Systems (I)

Formal Specification and Verification of a Group Membership Protocol for an Intrusion-Tolerant Group Communication System (Abstract)

HariGovind V. Ramasamy , University of Illinois at Urbana-Champaign
Michel Cukier , University of Maryland at College Park
William H. Sanders , University of Illinois at Urbana-Champaign
pp. 9

Asynchronous Active Replication in Three-Tier Distributed Systems (Abstract)

Roberto Baldoni , Università di Roma "La Sapienza"
Carlo Marchetti , Università di Roma "La Sapienza"
Sara Tucci Piergiovanni , Università di Roma "La Sapienza"
pp. 19
Session 1B:Checkpointing

On Characteristics of DEF Communication-Induced Checkpointing Protocols (Abstract)

Jichiang Tsai , National Chung Hsing University
Jenn-Wei Lin , Fu Jen Catholic University
pp. 29

A Low Overhead heckpointing Protocol for Mobile Computing Systems (Abstract)

Chi-Yi Lin , National Taiwan University
Szu-Chi Wang , National Taiwan University
Sy-Yen Kuo , National Taiwan University
Ing-Yi Chen , Chung Yuan Christian University
pp. 37

The Cost of Checkpointing,Logging and Recovery for the Mobile Agent Systems (Abstract)

Hyunjoo Kim , Seoul National University
Heon Y. Yeom , Seoul National University
Taesoon Park , Sejong Park
pp. 45
Session 2A:Dependable Systems (I)

Hardware/Software Co-Reliability of Configurable Digital Systems (Abstract)

M. Choi , University of Missouri-Rolla
N. Park , Oklahoma State University
Y. Kim , Northeastern University
F. Lombardi , Northeastern University
pp. 67

Highly Fault-Tolerant FPGA Processor by Degrading Strategy (Abstract)

Yousuke Nakamura , University of Tokyo
Kei Hiraki , University of Tokyo
pp. 75
Session 2B:Reliability/Dependability Analysis

Using Software Implemented Fault Inserter in Dependability Analysis (Abstract)

P. Gawkowski , Warsaw University of Technology
J. Sosnowski , Warsaw University of Technology
pp. 81

Analyzing Network Reliability With Imperfect Nodes Using OBDD (Abstract)

Fu-Min Yeh , Chung-Shan Institute of Science and Technology
Hung-Yau Lin , National Taiwan University
Sy-Yen Kuo , National Taiwan University
pp. 89

Reliability Analysis of Grid Computing Systems (Abstract)

Y.S. Dai , National University of Singapore
M. Xie , National University of Singapore
K.L. Poh , National University of Singapore
pp. 97

A Control Theory Approach for Analyzing the Effects of Data Errors in Safety-Critical Control Systems (Abstract)

Örjan Askerdal , Chalmers University of Technology
Magnus Gäfvert , Lund Institute of Technology
Martin Hiller , Chalmers University of Technology
Neeraj Suri , Chalmers University of Technology
pp. 105
Keynote Speech (II)

Caveat Emptor:Making Grid Services Dependable from the Client Side (PDF)

Miron Livny , University of Wisconsin-Madison
Doug Thain , University of Wisconsin-Madison
pp. 117
Session 3A:Dependable Distributed Systems (II)


Yansong (Jennifer) Ren , Bell Laboratories
Paul Rubel , BBN Technologies
Mouna Seri , University of Illinois at Urbana-Champaign
Michel Cukier , University of Maryland at College Park
William H. Sanders , University of Illinois at Urbana-Champaign
Tod Courtney , University of Illinois at Urbana-Champaign
pp. 125

Detecting Feature Interactions in Telecommunication Services with a SAT Solver (Abstract)

Tatsuhiro Tsuchiya , Osaka University
Masahide Nakamura , Nara Institute of Science &Technology
Tohru Kikuno , Osaka University
pp. 131
Session 3B:Dependable Networks

Energy Efficient and Robust Multicast Protocol for Mobile Ad Hoc Networks (Abstract)

Sangman Moh , Electronics and Telecommunications Research Institute
Chansu Yu , Cleveland State Univ
Ben Lee , Oregon State Univ.
Hee Yong Youn , Sungkyunkwan Univ.
pp. 145
Keynote Speech (III)
Session 4A:Dependable Systems (II)

Enhancing Access Control with SysGuard, Reference Monitor Supporting Portable and Composable Kernel Module (Abstract)

Yasushi Shinjo , University of Tsukuba
Kotaro Eiraku , University of Tsukuba
Atsushi Suzuki , University of Tsukuba
Kozo Itano , University of Tsukuba
Calton Pu , Georgia Institute of Technology
pp. 167

An Adaptive High-Low Water Mark Destage Algorithm for Cached RAID5 (Abstract)

Young Jin Nam , Pohang University of Science and Technology
Chanik Park , Pohang University of Science and Technology
pp. 177

A Packet-Based Caching Proxy with Loss Recovery for Video Streaming (Abstract)

Kuan-Sheng Hsueh , National Taiwan University
Sheng-De Wang , National Taiwan University
pp. 185
Session 4B:Dependability Evaluation and Verification

Reliability Evaluation of Multi-state Systems Subject to Imperfect Coverage using OBDD (Abstract)

Yung-Ruei Chang , National Taiwan University
Suprasad V. Amari , Relex Software Corporation
Sy-Yen Kuo , National Taiwan University
pp. 193

Level Oriented Formal Model for Asynchronous Circuit Verification and its Efficient Analysis Method (Abstract)

Yusuke Oguro , To yo Institute of Technology
Tomohiro Yoneda , National Institute of Informatics
Eric Mercer , Brigham Young University
Chris Myers , University of Utah
pp. 210
Session 5A:Consensus in Distributed Systems

A Consensus Algorithm for Synchronous Distributed Systems using Mobile Agent (Abstract)

Jiannong Cao , Hong Kong Polytechnic University
Xianbing Wang , Hong Kong Polytechnic University and Wuhan University
Siu Lo , Hong Kong Polytechnic University
Sajal K. Das , University of Texas at Arlington
pp. 229
Session 5B:Coding

Evaluation of Convolutional-Code-Based FEC under Limited Recovery Time and Its Application to Real-time Transmission (Abstract)

Masayuki Arai , Tokyo Metropolitan University
Hitoshi Kurosu , Tokyo Metropolitan University
Satoshi Fukumoto , Tokyo Metropolitan University
Kazuhiko Iwasaki , Tokyo Metropolitan University
pp. 239
Session 6A:Dependable Database

Providing Persistence or Sensor Streams with Light Neighbor WAL (Abstract)

Hideyuki Kawashima , Keio University
Motomichi Toyama , Keio University
Yuichiro Anzai , Keio University
Michita Imai , Keio University
pp. 257

Definition of Faultloads Based on Operator Faults for DMBS Recovery Benchmarking (Abstract)

Marco Vieira , Polytechnic Institute of Coimbra
Henrique Madeira , University of Coimbra
pp. 265
Session 6B:Test

Enhancing Delay Fault Testability for Iterative Logic Arrays (Abstract)

Shyue-Kung Lu , Fu Jen Catholic University
Chien-Hung Yeh , Fu Jen Catholic University
pp. 283
Session 7A:Neural Network

Comparison with Defect Compensation Methods for Feed-forward Neural Networks (Abstract)

Kin ?ya TAKAHASHI , Miyazaki University
Kunihito YAMAMORI , Miyazaki University
Ikuo YOSHIHARA , Miyazaki University
Susumu HORIGUCHI , Japan Advanced Institute of Science and Technology
pp. 293
Session 7B:Practical Reports

Using VHDL-Based Fault Injection to exercise Error Detection Mechanisms in the Time-Triggered Architecture (Abstract)

I. Gracia , Universidad Politecnica de Valencia.
D. Gil , Universidad Politecnica de Valencia.
I. C. Baraza , Universidad Politecnica de Valencia.
P. J. Gil , Universidad Politecnica de Valencia
pp. 316

Formal Verification of a Pipelined Processor with New Memory (Abstract)

Hiroshi NAKAMURA , University of Tokyo
Takanori ARAI , University of Tokyo
Masahiro FUJITA , University of Tokyo
pp. 321
Author Index

Author Index (PDF)

pp. 325
92 ms
(Ver 3.3 (11022016))