[Front cover] (PDF)
[Copyright notice] (PDF)
Table of contents (PDF)
Program Committee (PDF)
list-reviewer (PDF)
Title Page i (PDF)
Title Page iii (PDF)
Message from the General Chair (PDF)
Message from the Program Co-chairs (PDF)
Organizing Committee (PDF)
Small Delay Fault Simulation for Sequential Circuits (Abstract)
Prioritized Test Generation Strategy for Pair-Wise Testing (Abstract)
Test Case Reuse Based on Ontology (Abstract)
Evaluating the Use of Reference Run Models in Fault Injection Analysis (Abstract)
Low-Overhead Architecture for Security Tag (Abstract)
A Trust-Based Benchmark for DBMS Configurations (Abstract)
Parallel Training Strategy Based on Support Vector Regression Machine (Abstract)
A Lightweight Network Intrusion Detection Model Based on Feature Selection (Abstract)
Representing X-Code Using Latin Squares (Abstract)
Entropy Based Method for Network Anomaly Detection (Abstract)
Chip-Level Redundancy in Distributed Shared-Memory Multiprocessors (Abstract)
Making Overlay Networks more Robust to Massive Failures (Abstract)
A Regular Expression Matching Algorithm Using Transition Merging (Abstract)
A Novel Process Migration Method for MPI Applications (Abstract)
Delayed Processing Technique in Critical Sections for Real-Time Linux (Abstract)
A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes (Abstract)
[Publisher's information] (PDF)
Quantitative RAS Comparison of Sun CMT/Solaris and X86/Linux Servers (Abstract)
Efficient Fault-Tolerant Backbone Construction in Tmote Sky Sensor Networks (Abstract)
Quiescent Leader Election in Crash-Recovery Systems (Abstract)
Availability Modeling and Analysis of a Virtualized System (Abstract)
The Instruction Scheduling for Soft Errors Based on Data Flow Analysis (Abstract)
Author Index (PDF)