FEEDBACK Smiley face
Normal view MARC view ISBD view

Dependable Computing [electronic resource] :Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings /

Contributor(s): Bondavalli, Andrea [editor.] | Brasileiro, Francisco [editor.] | Rajsbaum, Sergio [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 4746Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.Description: XIV, 242 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540752943.Subject(s): Computer science | Logic design | Computer communication systems | Special purpose computers | Computer system failures | Software engineering | Coding theory | Computer Science | Computer Communication Networks | Special Purpose and Application-Based Systems | System Performance and Evaluation | Software Engineering | Logic Design | Coding and Information TheoryOnline resources: Click here to access online
Contents:
Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in