The Community for Technology Leaders
Pacific Rim International Symposium on Dependable Computing, IEEE (2005)
Changsha, Hunan, China
Dec. 12, 2005 to Dec. 14, 2005
ISBN: 0-7695-2492-3
TABLE OF CONTENTS
Introduction

Referees (PDF)

pp. xiv
Introduction

Committees (PDF)

pp. xii-xiii
Keynote Addresses
Session 1A: Distributed Protocols and Systems

Sigma: A Fault-Tolerant Mutual Exclusion Algorithm in Dynamic Distributed Systems Subject to Process Crashes and Memory Losses (Abstract)

Shiding Lin , Microsoft Research Asia
Wei Chen , Microsoft Research Asia
Qiao Lian , Microsoft Research Asia
Zheng Zhang , Microsoft Research Asia
pp. 7-14

Intersecting Sets: a Basic Abstraction for Asynchronous Agreement Problems (Abstract)

Achour MOSTEFAOUI , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
Roy FRIEDMAN , Technion, Haifa 32000, Israel
Michel RAYNAL , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
pp. 15-22

Decision Optimal Early-Stopping k-set Agreement in Synchronous Systems Prone to Send Omission Failures (Abstract)

Michel RAYNAL , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
Corentin TRAVERS , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
Philippe RAIPIN PARVEDY , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
pp. 23-30

Privacy-Preserving Bayesian Network Structure Learning on Distributed Heterogeneous Data (Abstract)

Zhao Zheng , Tianjin University, Tianjin 300072, China
Wang Hongmei , Tianjin University, Tianjin 300072, China
Sun Zhiwei , Tianjin University, Tianjin 300072, China
pp. 31-40
Session 1B: Software Reliability and Testing

Simultaneous Simulation of Alternative System Configurations (Abstract)

Shravan Gaonkar , University of Illinois at Urbana-Champaign, Urbana, IL
William H. Sanders , University of Illinois at Urbana-Champaign, Urbana, IL
pp. 41-48

Availability Assessment of SunOS/Solaris Unix Systems based on Syslogd and wtmpx log files: A case study (Abstract)

Cristina Simache , LAAS-CNRS, 31077 Toulouse Cedex 4 - France
Mohamed Kaaniche , LAAS-CNRS, 31077 Toulouse Cedex 4 - France
pp. 49-56

On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components (Abstract)

Juan-Carlos Ruiz , Technical University of Valencia, E-46022 Valencia, Spain.
Jose-Carlos Campelo , Technical University of Valencia, E-46022 Valencia, Spain.
Juan Pardo , Cardenal Herrera-CEU University, Valencia, Spain
Pedro Gil , Technical University of Valencia, E-46022 Valencia, Spain.
pp. 57-64

Bayesian Networks Modeling for Software Inspection Effectiveness (Abstract)

Q.P. Hu , National University of Singapore
S.H. Ng , National University of Singapore
M. Xie , National University of Singapore
Y.P. Wu , National University of Singapore
pp. 65-74
Session 2A: Fault Tolerance (1)

Application-Based Metrics for Strategic Placement of Detectors (Abstract)

Karthik Pattabiraman , University of Illinois at Urbana-Champaign
Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign
pp. 75-82

A Hardware Approach to Concurrent Error Detection Capability Enhancement in COTS Processors (Abstract)

Amir Rajabzadeh , University of Technology, Tehran, Iran
Seyed Ghassem Miremadi , University of Technology, Tehran, Iran
pp. 83-90

Optimal Fault-Tolerant Routing Scheme for Generalized Hypercube (Abstract)

Dafang Zhang , Hunan University, Changsha, China
Yingping Lu , University of Minnesota, Minneapolis, USA
Shaohuai Tian , Hunan University, Changsha, China
pp. 91-100
Session 2B: Validation and Modeling

High-Order Syndrome Testing for VLSI Circuits (Abstract)

Shiyi Xu , Shanghai University, Shanghai, 200072 China
pp. 101-108

A New BIST Solution for System-on-Chip (Abstract)

Kuang Jishun , Hunan University, China
Zhang Ling , Hunan University, China
pp. 109-113

A Failure-Aware Model for Estimating and Analyzing the Efficiency of Web Services Compositions (Abstract)

Haruo Yokota , Tokyo Institute of Technology, Global Scientific Information and Computing Center
Neila Ben Lakhal , Tokyo Institute of Technology, Japan
Takashi Kobayashi , Tokyo Institute of Technology, Global Scientific Information and Computing Center
pp. 114-124
Session 3A: Fault Tolerance (2)

Code Design and Decoding Methods for Burst Error Locating Codes (Abstract)

Junpei SANO , Chiba University
Masato KITAKAMI , Chiba University
pp. 125-132

An Evaluation of the Virtual Router Redundancy Protocol Extension with Load Balancing (Abstract)

Pang-Ting Liao , Pang-Ting Liao
Jen-Hao Kuo , Jen-Hao Kuo
Chin-Laung c Lei , Chin-Laung Lei
Chun-Ying Huang , Chun-Ying Huang
Zsehong Tsai , Zsehong Tsai
Pan-Lung Tsai , Pan-Lung Tsai
Yennun Huang , Yennun Huang
Siong-Ui Te , Siong-Ui Te
Sy-Yen Kuo , Sy-Yen Kuo
pp. 133-139

Formal Development of Software for Tolerating Transient Faults (Abstract)

Dubravka IliC , TUCS, Abo Akademi University, Turku, Finland
Elena Troubitsyna , TUCS, Abo Akademi University, Turku, Finland
pp. 140-150
Session 3B: Checkpointing and Recovery

On the Fully-Informed Communication-Induced Checkpointing Protocol (Abstract)

Jichiang Tsai , National Chung Hsing University
Jenn-Wei Lin , Fu Jen Catholic University Taipei, Taiwan
pp. 151-158

Optimal Choice of Checkpointing Interval for High Availability (Abstract)

John M. Noble , Linkoping University, Sweden
Diana Szentivanyi , Linkoping University, Sweden
Simin Nadjm-Tehrani , Linkoping University, Sweden
pp. 159-166

An Improved Scheme of Index-Based Checkpointing (Abstract)

Yuan-sheng Luo , Hunan University, Changsha, Hunan, China
Dafang Zhang , Hunan University, Changsha, Hunan, China
Yinghua Min , Chinese Academy of Sciences, Beijing, China
pp. 167-174
Session 4A: High-Performance Systems

Compression/Scan Co-Design for Reducing Test Data Volume, Scan-in Power Dissipation and Test Application Time (Abstract)

Xiao-Qing Wen , Kyushu Institute of Technology, Japan
Xiao-Wei Li , Institute of Computing Technology, CAS Beijing , China
Hua-Wei Li , Institute of Computing Technology, CAS Beijing , China
Yu Hu , Institute of Computing Technology, CAS Beijing , China
pp. 175-182

Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime (Abstract)

Heng Xu , Iowa State University, Ames, IA
Arun Somani , Iowa State University, Ames, IA
pp. 183-192
Session 4B: Security

Proxy Cryptography for Secure Inter-domain Information Exchanges (Abstract)

Zhen Han , Beijing Jiaotong University
Shuanghe Peng , Beijing Jiaotong University
pp. 193-199

Anomaly Detection with High Deviations for System Security (Abstract)

Peng Xinguang , Taiyuan University of Technology, 030024 Taiyuan, P. R. China
Ren Kaifeng , Taiyuan University of Technology, 030024 Taiyuan, P. R. China
pp. 200-207

A Multi-Faceted Approach towards Spam-Resistible Mail (Abstract)

Shyue-Kung Lu , National Taiwan University, Taipei, Taiwan
Sy-Yen Kuo , National Taiwan University, Taipei, Taiwan
Ing-Yi Chen , National Taiwan University, Taipei, Taiwan
Ming-Wei Wu , National Taiwan University, Taipei, Taiwan
Yennun Huang , National Taiwan University, Taipei, Taiwan
pp. 208-218
Session 5A: Distributed Systems Modeling (1)

A Virtual Modeling and a Fast Algorithm for Grid Service Reliability (Abstract)

Min Xie , National University of Singapore, Singapore
Xiao-Long Wang , Purdue Univ at Indianapolis, Indiana
Yuan-Shun Dai , Purdue Univ at Indianapolis, Indiana
pp. 219-226

Research on Architecture and Design Principles of COTS Components Based Generic Fault-Tolerant Computer (Abstract)

Ou Zhonghong , Harbin Engineering University, Harbin, PRC
Zhao Xiaoyong , Center of Software Engineering, Three Gorges University,Yichang, PRC
Yuan Youguang , Wuhan Digital Engineering Institute, Luoyu Road 718#, Wuhan, PRC
pp. 227-234

Bi-Objective Model for Test-Suite Reduction Based on Modified Condition/Decision Coverage (Abstract)

Junyi Li , Hunan University Changsha, Hunan, China
Hao Chen , Hunan University Changsha, Hunan, China
Lili Pan , Hunan University, Changsha, Hunan, China
Beiji Zou , Central South University Changsha, Hunan, China
pp. 235-244
Session 5B: Mobile Systems and Networks (1)

A Reliable Routing Algorithm Based on Fuzzy Applicability of F sets in MANET (Abstract)

HU Zhigang , Central South University Changsha, P. R. China
MA Hao , Central South University Changsha, P. R. China
HU Rong , Central South University Changsha, P. R. China
pp. 245-249

An Efficient Approach to Tolerating Route Errors in Mobile Ad Hoc Networks (Abstract)

Jenn-Wei Lin , Fun Jen Catholic University Taipei, Taiwan
Chao-Ying Chiu , Fun Jen Catholic University Taipei, Taiwan
Jichiang Tsai , National Chung Hsing University Taichung, Taiwan
pp. 250-257

A Novel Approach to Kernel Construction of China Bridge CA (Abstract)

LENG Jian , Hunan University, Changsha
XIE Dong-Qin , The Chinese Academy of Sciences, Beijing, 100081, PRC
pp. 258-268
Session 6A: Practical Experience Reports

Optimizing Service Strategy for Systems with Deferred Repair (Abstract)

Hairong Sun , Sun Microsystems, Inc.
Dong Tang , Sun Microsystems, Inc.
Robert Wood , Sun Microsystems, Inc.
pp. 269-274

Trust-Enhanced Alteration Scenario for Universal Computer (Abstract)

Zhiying Wang , National University of Defense Technology, P.R.China
Kui Dai , National University of Defense Technology, P.R.China
Jiangchun Ren , National University of Defense Technology, P.R.China
pp. 275-280

Mining Alarm Database of Telecommunication Network for Alarm Association Rules (Abstract)

Yangyang Wu , HuaQiao University, Quanzhou, Fujian, China
Wei Luo , HuaQiao University, Quanzhou, Fujian, China
Shuguang Du , HuaQiao University, Quanzhou, Fujian, China
pp. 281-286

On Automating Failure Mode Analysis and Enhancing its Integrity (Abstract)

Savio N. Chau , California Institute of Technology
Leon Alkalai , California Institute of Technology
Kam S. Tso , IA Tech, Inc., Los Angeles, California
Ann T. Tai , IA Tech, Inc., Los Angeles, California
pp. 287-294
Session 6B: Fault Tolerance (3)

A Novel R^2-FLC Dynamic Buffer Size Tuner to Support Time-Critical Applications over the Internet by Improving Logical Channel Fault Tolerance to Shorten Roundtrip Time (Abstract)

Allan K.Y. Wong , Hong Kong Polytechnic University, Hong Kong
Tharam S. Dillon , University of Technology Sydney, Sydney, Australia
Wilfred W. K. Lin , Hong Kong Polytechnic University, Hong Kong
pp. 295-299

Design of Defect Tolerant Wallace Multiplier (Abstract)

Kazuteru NAMBA , Chiba University, Japan
Hideo IT0 , Chiba University, Japan
pp. 300-304

Resilient State Machine Replication (Abstract)

Paulo Sousa , Univ. of Lisboa
Paulo Verissimo , Univ. of Lisboa
Nuno Ferreira Neves , Univ. of Lisboa
pp. 305-309

Contribution of Controller Area Networks Controllers to Masquerade Failures (Abstract)

Seyed Ghassem Miremadi , Sharif University of Technology
Hassan Salmani , Sharif University of Technology
pp. 310-316
Session 7A: Mobile Systems and Networks (2)

Local Repair Mechanisms for On-Demand Routing in Mobile Ad hoc Networks (Abstract)

Sheng-De Wang , National Taiwan University
Sheng-Yan Chuang , National Taiwan University
Michael Pan , National Taiwan University
pp. 317-324

Centralized Surveillance of Unused Address Space by using Virtual Networks (Abstract)

Takashi Minohara , Takushoku University, Japan
Satoshi Ishikawa , Takushoku University, Japan
Masahiro Amano , Takushoku University, Japan
pp. 325-332

A Distributed Location Service for Reducing Query Failures in Geographic Ad Hoc Routing (Abstract)

Kuo-Feng Ssu , National Cheng Kung University Tainan, Taiwan
Chih-Hsun Chou , National Cheng Kung University Tainan, Taiwan
Hewijin Christine Jiau , National Cheng Kung University Tainan, Taiwan
pp. 333-342
Session 7B: Fault Tolerance (4)

Server Protection through Dynamic Patching (Abstract)

Jean-Marc Menaud , EMN-INRIA, LINA, Cedex, France
Marc Segura-Devillechaise , EMN-INRIA, LINA, Cedex, France
Nicolas Loriant , EMN-INRIA, LINA, Cedex, France
pp. 343-349

Detection of Malicious Transactions in DBMS (Abstract)

Marco Vieira , CISUC - University of Coimbra, Coimbra - Portugal
Henrique Madeira , CISUC - University of Coimbra, Coimbra - Portugal
pp. 350-357

Dynamic Window-based Adaptive Fault Monitoring for Ubiquitous Computing Systems (Abstract)

Hee Yong Youn , SungKyunKwan University,Suwon, Korea
Su Myeong Lee , SungKyunKwan University,Suwon, Korea
pp. 358-368
Session 8A: Distributed Systems Modeling (2)

Research on Control Flags-based Weighted Authentication Trustworthiness Model (Abstract)

Wang Huaimin , National University of Defense Technology, Changsha, China
Wang Lunwei , National University of Defense Technology, Changsha, China
He Lianyue , National University of Defense Technology, Changsha, China
Liao Xiangke , National University of Defense Technology, Changsha, China
pp. 369-373

Towards Push-of-a-Button Stability Verification for Discrete-Time Hybrid Systems (Abstract)

Henning Burchardt , University of Oldenburg, Germany
Oliver Theel , University of Oldenburg, Germany
Jens Oehlerking , University of Oldenburg, Germany
pp. 374-378

Reliability Prediction and Assessment of Fielded Software Based on Multiple Change-Point Models (Abstract)

Chin-Yu Huang , National Tsing Hua University Hsinchu, Taiwan
Chu-Ti Lin , National Tsing Hua University Hsinchu, Taiwan
pp. 379-386

A Note on a Simple Equivalence between Round-based Synchronous and Asynchronous Models (Abstract)

Michel RAYNAL , IRISA Universite de Rennes, France
Matthieu v , LAAS-CNRS, Toulouse, France
pp. 387-392
Session 8B: Code & Language

Neural Network based on Dynamic Tunneling Technique for Weather Forecast (Abstract)

Haoliang Wang , Dongguan University of Technology, Dongguan, P.R.China
Bin Wang , Dongguan University of Technology, Dongguan, P.R.China
Jianjun Zou , Dongguan University of Technology, Dongguan, P.R.China
Zheng Qin , College of Software, Hunan University,ChangSha, P.R.China
Jinmin Yang , College of Software, Hunan University,ChangSha, P.R.China
pp. 393-397

FPGA Authentication Header (AH) Implementation for Internet Appliances (Abstract)

Chang-Chun Cheng , National Dong Hwa University, Hualien, Taiwan
Yao-Po Wang , National Dong Hwa University, Hualien, Taiwan
Wei-Ming Chen , National Dong Hwa University, Hualien, Taiwan
Han-Chieh Chao , National Dong Hwa University, Hualien, Taiwan
pp. 398-403

Development of Dependable Real-Time Systems with Zerberus (Abstract)

Christian Buckl , TU Munchen Garching b. Munchen, Germany
Gerhard Schrott , TU Munchen Garching b. Munchen, Germany
Alois Knoll , TU Munchen Garching b. Munchen, Germany
pp. 404-408
107 ms
(Ver )