Dependable Computing [electronic resource] : Third Latin-American Symposium, LADC 2007, Morelia, Mexico, September 26-28, 2007, Proceedings /
Material type: TextSeries: Theoretical Computer Science and General Issues ; 4746Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007Edition: 1st ed. 2007Description: XIV, 242 p. online resourceContent type:- text
- computer
- online resource
- 9783540752943
- Computer networks
- Computers, Special purpose
- Electronic digital computers -- Evaluation
- Software engineering
- Logic design
- Coding theory
- Information theory
- Computer Communication Networks
- Special Purpose and Application-Based Systems
- System Performance and Evaluation
- Software Engineering
- Logic Design
- Coding and Information Theory
- 004.6 23
- TK5105.5-5105.9
Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience.
There are no comments on this title.