By Topic

13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007)

17-19 Dec. 2007

Filter Results

Displaying Results 1 - 25 of 66
  • 13th Pacific Rim International Symposium on Dependable Computing - Cover

    Publication Year: 2007, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (746 KB)
    Freely Available from IEEE
  • 13th Pacific Rim International Symposium on Dependable Computing - Title page

    Publication Year: 2007, Page(s):i - iii
    Request permission for commercial reuse | PDF file iconPDF (537 KB)
    Freely Available from IEEE
  • 13th Pacific Rim International Symposium on Dependable Computing - Copyright

    Publication Year: 2007, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (104 KB)
    Freely Available from IEEE
  • 13th Pacific Rim International Symposium on Dependable Computing - TOC

    Publication Year: 2007, Page(s):v - ix
    Request permission for commercial reuse | PDF file iconPDF (373 KB)
    Freely Available from IEEE
  • Message from the General and Program Committee Chairs

    Publication Year: 2007, Page(s): x
    Request permission for commercial reuse | PDF file iconPDF (208 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organizers

    Publication Year: 2007, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (204 KB)
    Freely Available from IEEE
  • Generic Fault-Tolerance Mechanisms Using the Concept of Logical Execution Time

    Publication Year: 2007, Page(s):3 - 10
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (378 KB) | HTML iconHTML

    Model-based development has become state of the art in software engineering. Unfortunately, the used code generators often focus on the pure application functionality. Features like automatic generation of fault-tolerance mechanisms are not covered. One main reason is the inadequacy of the used models. An adequate model must have amongst others explicit execution semantics and must be suited to su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Error Recovery Method for Multiple-Dictionary Compression Method

    Publication Year: 2007, Page(s):11 - 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4042 KB) | HTML iconHTML

    Data compression is popularly applied to communication systems and computer systems. Ziv-Lempel coding is a class of popular data compression method and uses dictionary which includes the tendency of the source data. The dictionary is classified into two types, dictionary including local tendency of the source data and the one including global tendency of the source data. The compressed data have ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Detection System Activated by Failure Information

    Publication Year: 2007, Page(s):19 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (515 KB) | HTML iconHTML

    We propose a fault detection system activated by an application when the application recognizes the occurrence of a failure, in order to realize self managing systems that automatically find the source of a failure. In existing detection systems, there are three issues for constructing self managing applications: i) the detection results are not sent to the applications, ii) they can not identify ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparative Analysis of QoS and Memory Usage of Adaptive Failure Detectors

    Publication Year: 2007, Page(s):27 - 34
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (310 KB) | HTML iconHTML

    This paper compares several parametric and adaptive failure detection schemes in terms of their respective QoS. We introduce an improvement over existing methods, and evaluate their benefits. First, we propose an optimization to enhance the adaptation of Chen's FD, which significantly improves QoS, especially in the aggressive range and when the network is unstable. Second, we address the problem ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Quantifying Software Maintainability Based on a Fault-Detection/Correction Model

    Publication Year: 2007, Page(s):35 - 42
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (325 KB) | HTML iconHTML

    The software fault correction profiles play significant roles to assess the quality of software testing as well as to keep the good software maintenance activity. In this paper we develop a quantitative method to evaluate the software maintainability based on a stochastic model. The model proposed here is a queueing model with an infinite number of servers, and is related to the software fault- de... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PISRAT: Proportional Intensity-Based Software Reliability Assessment Tool

    Publication Year: 2007, Page(s):43 - 52
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (990 KB) | HTML iconHTML

    In this paper we develop a software reliability assessment tool, called PISRAT: Proportional intensity-based software reliability assessment tool, by using several testing metrics data as well as software fault data observed in the testing phase. The fundamental idea is to use the proportional intensity-based software reliability models proposed by the same authors. PISRAT is written in Java langu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Automatic Real-Time Analysis of the Time to Reach Consensus

    Publication Year: 2007, Page(s):53 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (411 KB) | HTML iconHTML

    Consensus is one of the most fundamental problems in fault-tolerant distributed computing. This paper proposes a mechanical method for analyzing the condition that allows one to solve consensus. Specifically, we model check a distributed algorithm that implements a communication predicate, which is an alternative system abstraction to failure detectors. This model checking problem is challenging b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combinatorial Constructions of Multi-erasure-Correcting Codes with Independent Parity Symbols for Storage Systems

    Publication Year: 2007, Page(s):61 - 68
    Cited by:  Papers (5)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (516 KB) | HTML iconHTML

    In this paper, we present a new class of t-erasure horizontal codes with independent parity symbols based on Column-Hamiltonian Latin squares (CHLS). We call the codes PIHLatin (parity independent horizontal Latin) codes. We prove the necessary and sufficient condition of the existence of PIHLatin codes for t=2. For tges3, we prove some necessary conditions of the existence of PIHLatin codes. We a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Failure Detectors and Extended Paxos for k-Set Agreement

    Publication Year: 2007, Page(s):69 - 76
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    Failure detector class Omegakappa has been defined in (G. Neiger, 1995) as an extension to failure detector Omega, and an algorithm has been given in (A. Mostefaoui et al., 2005) to solve k-set agreement using Omegakappa in asynchronous message-passing systems. In this paper, we extend these previous work in two directions. First, we define two new classes of failure detector... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Accurate Model of Software Reliability

    Publication Year: 2007, Page(s):77 - 84
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    Software reliability is one of the important attributions of dependable systems. However, for the time being, the assumptions that software reliability measurement makes do not deal with some important factors that influence the accuracy of the software reliability models such as the complexity of the software and the effectiveness of test suite, resulting in inaccuracy or even incorrectness in ev... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Regression Testing Based on UML Design Models

    Publication Year: 2007, Page(s):85 - 88
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (749 KB) | HTML iconHTML

    This paper presents a methodology for identifying changes and test case selection based on the UML designs of the system. Design artifacts used for this purpose are UML class diagram and sequence diagrams, which are used to generate an extended concurrent control flow graph (ECCFG) which is further used for regression testing, i.e., change identification and test case selection. A proof- of-concep... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Model Based Development of Safety-Critical Systems Using Template Based Code Generation

    Publication Year: 2007, Page(s):89 - 92
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Model-based development is state of the art in software engineering, due to its potential regarding automatic code synthesis. Nevertheless for embedded systems, where there exists a huge heterogeneity of used platforms, it is obvious that it is impossible to design a code generator that supports a priori all required platforms. Instead a code generator architecture is needed that is suited for an ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predicting Defective Software Components from Code Complexity Measures

    Publication Year: 2007, Page(s):93 - 96
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (439 KB) | HTML iconHTML

    The ability to predict defective modules can help us allocate limited quality assurance resources effectively and efficiently. In this paper, we propose a complexity- based method for predicting defect-prone components. Our method takes three code-level complexity measures as input, namely Lines of Code, McCabe's Cyclomatic Complexity and Halstead's Volume, and classifies components as either defe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Neural-Network Based Test Cases Generation Using Genetic Algorithm

    Publication Year: 2007, Page(s):97 - 100
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (376 KB) | HTML iconHTML

    A key issue in black-box testing is how to select adequate test cases from input domain on the basis of specification. However, for some kinds of software, developing test cases from output domain is more suitable than from input domain. In this paper, we present a novel approach to automatically generate test cases from output domain. A model is created via neural network to take as a function su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Measurement Tool of End-User Computing Capability in Competency Perspective

    Publication Year: 2007, Page(s):101 - 105
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    A measurement tool is developed to totally measure the end-user computing capability in a computing environment, and the tool provides the method and process to effectively measure it. The validity of the tool construct is presented by factor analysis through a survey measurement of 137 respondents, and a 17-item measurement tool is proposed. The application of the tool is confirmed by applying it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault Tolerance for Super-Peers of P2P Systems

    Publication Year: 2007, Page(s):107 - 114
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (895 KB) | HTML iconHTML

    This paper presents an efficient fault-tolerant approach for the super-peers of peer-to-peer (P2P) file sharing systems. In the super-peer based P2P file sharing system, peers are organized into multiple groups. In each group, it has a special peer called super peer to serve the regular peers within the group. In this hierarchical architecture, if the super peer departs (fails), any file queries t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Path Diversity Metric for End-to-End Network

    Publication Year: 2007, Page(s):115 - 122
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (481 KB) | HTML iconHTML

    Path diversity is an important index of the dependability and fault tolerance capability of networks. Most path diversity metrics are designed under an implicit hypothesis that all candidate paths for a divergence node are always equally chosen. This may not be true due to the effect of routing policy with consideration of cost or other factors. A new simple metric is proposed in this paper for pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Eventual Leadership in Dynamic Mobile Networking Environments

    Publication Year: 2007, Page(s):123 - 130
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB) | HTML iconHTML

    Eventual leadership has been identified as a basic building block to solve synchronization or coordination problems in distributed computing systems. However, it is a challenging task to implement the eventual leadership facility, especially in dynamic distributed systems, where the global system structure is unknown to the processes and can vary over time. This paper studies the implementation of... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault-Tolerant Topology Control with Adjustable Transmission Ranges in Wireless Sensor Networks

    Publication Year: 2007, Page(s):131 - 138
    Cited by:  Papers (14)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (993 KB) | HTML iconHTML

    A topology control algorithm can be applied to wireless sensor networks to construct a virtual backbone for maintaining network connectivity. For handling node failure, previous algorithms typically prefer to have redundant nodes so the power efficiency was compromised. This paper describes a Power-CDS (P-CDS) mechanism that schedules active and backup sensor nodes in the backbone for tolerating f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.