The Community for Technology Leaders
Pacific Rim International Symposium on Dependable Computing, IEEE (2006)
Riverside, California
Dec. 18, 2006 to Dec. 20, 2006
ISBN: 0-7695-2724-8
TABLE OF CONTENTS
Introduction

Referees (PDF)

pp. xii
Session 1: Reliability Modeling

Two-Dimensional Software Reliability Models and Their Application (Abstract)

Tadashi Dohi , Hiroshima University
Tomotaka Ishii , Hiroshima University
pp. 3-10

A Strategy for Verification of Decomposable SCR Models (Abstract)

Dejan Desovski , West Virginia University, Morgantown, WV
Bojan Cukic , West Virginia University, Morgantown, WV
pp. 11-18

Detection and Correction Process Modeling Considering the Time Dependency (Abstract)

Q.P. Hu , National University of Singapore
Y.P. Wu , National University of Singapore
S.H. Ng , National University of Singapore
M. Xie , National University of Singapore
pp. 19-25

Detecting and Exploiting Symmetry in Discrete-state Markov Models (Abstract)

Michael G. McQuinn , University of Illinois
William H. Sanders , University of Illinois
W. Douglas II Obal , University of Illinois
pp. 26-38
Session 2: Fault Detection

An Evaluation of Similarity Coefficients for Software Fault Localization (Abstract)

Arjan J.C. van Gemund , Delft University of Technology
Rui Abreu , Delft University of Technology
Peter Zoeteweij , Delft University of Technology
pp. 39-46

SEVA: A Soft-Error- and Variation-Aware Cache Architecture (Abstract)

Shuichi Sakai , University of Tokyo
Masahiro Goshima , University of Tokyo
Luong D. Hung , University of Tokyo
pp. 47-54

An OS-level Framework for Providing Application-Aware Reliability (Abstract)

Zbigniew Kalbarczyk , University of Illinois at Urbana-Champaign, IL
Weining Gu , University of Illinois at Urbana-Champaign, IL
Ravishankar K. Iyer , University of Illinois at Urbana-Champaign, IL
Long Wang , University of Illinois at Urbana-Champaign, IL
pp. 55-62

Minimal System Conditions to Implement Unreliable Failure Detectors (Abstract)

Sergio Arevalo , LADyR, GSyC, Universidad Rey Juan Carlos, 28933 Mostoles, Spain
Ernesto Jimenez , EUI, Universidad Politecnica de Madrid, 28031 Madrid, Spain
Antonio Fernandez , LADyR, GSyC, Universidad Rey Juan Carlos, 28933 Mostoles, Spain
pp. 63-72
Session 3: Software Test

A Framework for Inheritance Testing from VDM++ Specifications (Abstract)

Michael R. Lyu , Chinese University of Hong Kong
Aamer Nadeem , Mohammad Ali Jinnah University
pp. 81-88

Assessment on Undetectable Burst Errors in Tandem CRCs (Abstract)

Bruce Orenstein , Network Centric Systems, Raytheon
Meng-Lai Yin , Engineering, Cal Poly Pomona
pp. 89-96

Efficient Built-In Self-Test Schemes for Video Coding Cores: a Case Study on DCT/IDCT Circuits (Abstract)

Wei-Yuan Liu , Fu-Jen Catholic University,Taipei, Taiwan
Ting-Yu Chen , Fu-Jen Catholic University,Taipei, Taiwan
Shyue-Kung Lu , Fu-Jen Catholic University,Taipei, Taiwan
pp. 97-104
Session 4: Security

Flexible, Cost-EffectiveMembership Agreement in Synchronous Systems (Abstract)

Johan Karlsson , Chalmers University of Technology, Sweden
Raul Barbosa , Chalmers University of Technology, Sweden
pp. 105-113

Towards Adaptive Secure Group Communication: Bridging the Gap between Formal Specification and Network Simulation (Abstract)

Mark-Oliver Stehr , SRI International, Menlo-Park, CA
Nalini Venkatasubramanian , University of California Irvine
Carolyn Talcott , SRI International, Menlo-Park, CA
Sebastian Gutierrez-Nolasco , University of California Irvine
pp. 113-120

Quantum Oblivious Transfer and Fair Digital Transactions (Abstract)

Yao-Hsin Chou , National Taiwan University
Chien-Ming Ko , National Taiwan University
I-Ming Tsai , National Taiwan University
Ing-Yi Chen , National Taipei University of Technology
Sy-Yen Kuo , National Taiwan University
pp. 121-128

Storing RSA Private Keys In Your Head (Abstract)

Jeff Hooper , Acadia University
James Diamond , Acadia University
Taisya Krivoruchko , Acadia University
pp. 129-138
Session 5: Availability

Database Transaction Management for High-Availability Cluster System (Abstract)

Ryuichi HIRAIKE , Internet Systems Research Laboratories, NEC Corporation
Ken-ichiro FUJIYAMA , Internet Systems Research Laboratories, NEC Corporation
Nobutatsu NAKAMURA , Internet Systems Research Laboratories, NEC Corporation
pp. 139-146

Restoration Strategies In Mesh Optical Networks: Cost Vs. Service Availability (Abstract)

Daniel R. Jeske , University of California - Riverside
Ashwin Sampath , Qualcomm Incorporated, San Diego, CA
pp. 147-153

Modeling High Availability (Abstract)

Swami Nathan , Sun Microsystems, USA
Ranjith Vasireddy , Duke University
Rick Castro , Sun Microsystems, USA
Kishor S. Trivede , Duke University
David Trindale , Sun Microsystems, USA
pp. 154-164
Session 6: Intrusion Detection

Base Address Recognition with Data Flow Tracking for Injection Attack Detection (Abstract)

Hiroyuki Kurita , University of Tokyo
Satoshi Katsunuma , University of Tokyo
Hidetsugu Irie , Japan Science and Technology Agency
Shuichi Sakai , University of Tokyo
Masahiro Goshima , University of Tokyo
Kazuto Shimizu , University of Tokyo
Ryota Shioya , University of Tokyo
pp. 165-172

A Stateful Approach to Spyware Detection and Removal (Abstract)

Yennun Huang , AT&T Labs, Florham Park, NJ
Yi-Min Wang , Microsoft Research
Ming-Wei Wu , National Taiwan University
Sy-Yen Kuo , National Taiwan University
pp. 173-182
Session 7: Reliability Prediction and Optimization

A Best Practice Guide to Resources Forecasting for the Apache Webserver (Abstract)

Gunther A. Hoffmann , Duke University
Miroslaw Malek , Humboldt University Berlin, Germany
Kishor S. Trivedi , Duke University
pp. 183-193
Session 7: Reliability Prediction and Optimization

On Statistically Estimated Optimistic Delivery in Wide-Area Total Order Protocols (Abstract)

Ana Respicio , University of Lisbon
Jose Mocito , University of Lisbon
Luis Rodrigues , University of Lisbon
pp. 202-209

Early Software Reliability Prediction with ANN Models (Abstract)

Q.P. Hu , National University of Singapore, Singapore
M. Xie , National University of Singapore, Singapore
S.H. Ng , National University of Singapore, Singapore
pp. 210-220
Session 8: Dependability Applications

A Dependable Outbound Bandwidth Based Approach for Peer to Peer Media Streaming (Abstract)

Zheng-Yi Huang , National Taiwan University, Taipei, TAIWAN
Sheng-De Wang , National Taiwan University, Taipei, TAIWAN
pp. 221-229

A Pragmatic Protocol for Database Replication in Interconnected Clusters (Abstract)

R. Oliveira , U. Minho
F. Pedone , U. Lugano
J. Pereira , U. Minho
A. Jr. Correia , U. Minho
J. Grov , U. Oslo
L. Soares , U. Minho
pp. 230-237

An Efficient Commit Protocol Exploiting Primary-Backup Placement in a Distributed Storage System (Abstract)

Xiangyong Ouyang , Tokyo Institute of Technology
Tomohiro Yoshiharay , Tokyo Institute of Technology
Haruo Yokota , Tokyo Institute of Technology
pp. 238-247

Reliable Video Transmission Techniques for Wireless MPEG-4 Streaming Systems (Abstract)

Sheng-Tzong Cheng , National Cheng Kung University, Tainan, Taiwan
Jian-Liang Lin , National Cheng Kung University, Tainan, Taiwan
pp. 248-258
Session 9: Survivability

On the fly estimation of the processes that are alive/crashed in an asynchronous message-passing system (Abstract)

Achour MOSTEFAOUI , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
Michel RAYNAL , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
Gilles TREDAN , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
pp. 259-266

Synchronous Set Agreement: a Concise Guided Tour (including a new algorithm and a list of open problems) (Abstract)

Corentin TRAVERS , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
Michel RAYNAL , IRISA, Universite de Rennes 1, Campus de Beaulieu, 35042 Rennes Cedex, France
pp. 267-274

Dependable Multithreaded Processing Using Runtime Validation (Abstract)

Kaiyu Chen , Princeton University, Princeton, NJ
Sharad Malik , Princeton University, Princeton, NJ
pp. 275-286
Session 10: Optimization

Improving Fast Paxos: being optimistic with no overhead (Abstract)

Bernadette Charron-Bost , Ecole polytechnique, France
Andre Schiper , EPFL, Lausanne, Switzerland
pp. 287-295

Fault-Tolerant Partitioning Scheduling Algorithms in Real-Time Multiprocessor Systems (Abstract)

Hakem Beitollahi , Katholieke Universiteit Leuven, Electrical Engineering, Kasteelpark Arenberg 10, Leuven, Belgium
Geert Deconinck , Katholieke Universiteit Leuven, Electrical Engineering, Kasteelpark Arenberg 10, Leuven, Belgium
pp. 296-304

Resource Availability Optimization for Priority Classes in a Website (Abstract)

V. P. Koutras , University of the Aegean,Greece
A. N. Platis , University of the Aegean,Greece
pp. 305-314
Session 11: Maintenance and Recovery

Design Trade-Offs and Deadlock Prevention in Transient Fault-Tolerant SMT Processors (Abstract)

Xiaobin Li , Enterprise Microprocessor Group Intel Corporation
Jean-Luc Gaudiot , University of California, Irvine
pp. 315-322

Incorporating Network Connectivity Analysis in Maintenance Planning (Abstract)

Meng-Lai Yin , Cal Poly Pomona
Rafael R. Arellano , Network Centric Systems, Raytheon
pp. 323-328

Low-Overhead Run-Time Memory Leak Detection and Recovery (Abstract)

Kalyan Vaidyanathan , Sun Microsystems, Inc.
Kenny Gross , Sun Microsystems, Inc.
Timothy Tsai , Sun Microsystems, Inc.
pp. 329-340
Session 12: Performance and Reliability

End-to-end consensus using end-to-end channels (Abstract)

Matthias Wiesmann , Japan Advanced Institute of Science and Technology
Xavier D?fago , Japan Advanced Institute of Science and Technology
pp. 341-350

Performance and Reliability Analysis ofWeb Server Software Architectures (Abstract)

Jijun Lu , University of Connecticut, Storrs, CT 06269, USA
Paul J. Vandal , University of Connecticut, Storrs, CT 06269, USA
Swapna S. Gokhale , University of Connecticut, Storrs, CT 06269, USA
pp. 351-358

A Single-Chip Fail-Safe Microprocessor with Memory Data Comparison Feature (Abstract)

Kunihiko Tsunedomi , Hitachi Research Laboratory, Hitachi, Ltd.
Kotaro Shimamura , Hitachi Research Laboratory, Hitachi, Ltd.
Yosuke Shima , Mito Transportation Systems Product Division, Hitachi, Ltd.
Takeshi Takehara , Mito Transportation Systems Product Division, Hitachi, Ltd.
pp. 359-368
Short Paper Track 1

Evaluating the Impact of Fault Recovery on Superscalar Processor Performance (Abstract)

Toshinori Sato , Kyushu University
Akihiro Chiyonobu , Kyushu Institute of Technology
pp. 369-370

Detection and Recovery for Disconnection Failures in a Web-based Medical Teleconsultation System (Abstract)

Pau-Choo Chung , National Cheng Kung University
Wei-Te Shih , National Cheng Kung University
Hewijin C. Jiau , National Cheng Kung University
Kuo-Feng Ssu , National Cheng Kung University
Chih-Hsun Chou , National Cheng Kung University
pp. 373-374

Leader Election in the Timed Finite Average Response Time Model (Abstract)

Martin Subkraut , Technische Universitat Dresden, Germany
Christof Fetzer , Technische Universitat Dresden, Germany
pp. 375-376

A Replication Model for Trading Data Integrity against Availability (Abstract)

Johannes Osrael , Vienna University of Technology
Karl M. Goeschka , Vienna University of Technology
Lorenz Froihofer , Vienna University of Technology
pp. 377-378

Improving Data Transmission with Helping Nodes for Geographical Ad Hoc Routing (Abstract)

Shin-Hung Chung , National Cheng Kung University, Tainan, Taiwan
Hewijin Christine Jiau , National Cheng Kung University, Tainan, Taiwan
Kuo-Feng Ssu , National Cheng Kung University, Tainan, Taiwan
Chih-Hsun Chou , National Cheng Kung University, Tainan, Taiwan
pp. 379-380

Towards Timely ACID Transactions in DBMS (Abstract)

Marco Vieira , CISUC - University of Coimbra, Portugal
Henrique Madeira , CISUC - University of Coimbra, Portugal
Ant?nio Casimiro Costa , FC - University of Lisbon, Portugal
pp. 381-382

Monitoring Database Application Behavior for Intrusion Detection (Abstract)

Henrique Madeira , CISUC - Polithecnic Institute of Guarda, Portugal
Jose Fonseca , CISUC - Polithecnic Institute of Guarda, Portugal
Marco Vieira , CISUC - Polithecnic Institute of Guarda, Portugal
pp. 383-386
Short Paper Track 2

Implementation Results of a Configurable Membership Protocol for Active Safety Systems (Abstract)

Christian Archer , Chalmers University of Technology, Sweden
Johan Karlsson , Chalmers University of Technology, Sweden
Andreas Sjoblom , Chalmers University of Technology, Sweden
Carl Bergenhem , National Testing and Research Institute, Sweden
pp. 387-388

Ontology based IT-security planning (Abstract)

Stefan Fenz , Secure Business Austria - Security Research, Vienna, Austria
Edgar Weippl , Secure Business Austria - Security Research, Vienna, Austria
pp. 389-390

The Hierarchy of BGP Convergence on the Self-Organized Internet (Abstract)

Jinjing Zhao , National University of Defense Technology, Changsha 410073, China
Feng Zhao , National University of Defense Technology, Changsha 410073, China
Peidong Zhu , National University of Defense Technology, Changsha 410073, China
Xicheng Lu , National University of Defense Technology, Changsha 410073, China
pp. 391-392

Dynamic Reconfiguration Policies for Reconfigurable Coded-WDM PONs (Abstract)

Chuan-Ching Sue , National Cheng Kung University, Tainan, Taiwan
pp. 393-394

Fault-Tolerant Rate-Monotonic Scheduling Algorithm in Uniprocessor Embedded Systems (Abstract)

Hakem Beitollahi , Katholieke Universiteit Leuven, Electrical Engineering, Kasteelpark Arenberg 10, Leuven, Belgium
Geert Deconinck , Katholieke Universiteit Leuven, Electrical Engineering, Kasteelpark Arenberg 10, Leuven, Belgium
pp. 395-396

The Survivability of the Augmented Logical Ring Topology in WDM Networks (Abstract)

Yung-Chiao Chen , National Taiwan University, Taipei, Taiwan
Sy-Yen Kuo , National Taiwan University, Taipei, Taiwan
Chuan-Ching Sue , National Cheng Kung University, Tainan, Taiwa
pp. 397-398

A Hybrid Multipath Routing in Mobile ad hoc Networks (Abstract)

Ren-Jie Chiou , National Cheng Kung University, Tainan, Taiwan
Chuan-Ching Sue , National Cheng Kung University, Tainan, Taiwan
pp. 399-400

A Generic Trust Overlay Simulator for P2P Networks (Abstract)

Guosun Zeng , Tongji Branch, National Engineering and Computing, Shanghai 201804, China
Wei Wang , Tongji University, Shanghai
pp. 401-402
Author Index

Author Index (PDF)

pp. 403
89 ms
(Ver )