Dependable Computing: Third Latin-American Symposium, LADC 2007, Morelia, Mexico, September 26-28, 2007, Proceedings
Springer Science & Business Media, Sep 12, 2007 - Computers - 236 pages
This book constitutes the refereed proceedings of the Third Latin-American Symposium on Dependable Computing, LADC 2007, held in Morelia, Mexico, in September 2007. The 14 revised full papers presented together with 2 invited talks, and outlines of 3 tutorials and 2 panel sessions, were carefully reviewed and selected from 37 submissions. The papers are organized in topical sections on fault-tolerant algorithms, software engineering of dependable systems, networking and mobile computing, experimental dependability evaluation, as well as intrusion tolerance and security.
What people are saying - Write a review
We haven't found any reviews in the usual places.
FaultTolerant Dynamic Routing Based on Maximum Flow Evaluation
On the Implementation of CommunicationOptimal Failure Detectors
Connectivity in Eventually Quiescent Dynamic Distributed Systems
Implementing Fault Tolerance Using Aspect Oriented Programming
ArchitectureCentric Fault Tolerance with Exception Handling
CoverageOriented Prioritized Testing A Fuzzy Clustering Approach and Case Study
Error Propagation Monitoring on Windows MobileBased Devices
Adaptive and Reliable Broadcasting in MANETs
ComponentBased Software Certification Based on Experimental Risk Assessment
Integrated Intrusion Detection in Databases
Security Rationale for a Cooperative Backup Service for Mobile Devices
Do You Know How to Analyze and Share Results from Dependability Evaluation Experiments?
Security Patterns and Secure Systems Design
BARWhere Distributed Computing Meets Game Theory
Scaling Dependability and Security in Ad Hoc Networks
Assessing Measuring and Benchmarking Dependability and Resilience
Other editions - View all
ad hoc networks adaptive algorithm application approach Aspect Oriented Programming AspectC++ B-Method behavior Bondavalli broadcasting protocols certification command communication component Computer connectivity consider cooperation policies correct processes COTS crashes data owners database DBMS deﬁned dependability diﬀerent dynamic edge eﬀect embedded systems error evaluation exception exception handling execution failure detector fault injection fault tolerance ﬁrst ﬂooding ﬂow function gossiping graph hoc networks IEEE iFTE implementation input interfaces internal intrusion detection ISO/IEC LADC lemma LNCS MANETs mechanisms metrics module monitoring neighbors node density Notifications Broker number of nodes output overlay packet paper partition path pointcut presented Proc properties proposed reachability redundancy reliability represents risk route RTEMS RTLinux scenario Section simulation software architecture software fault software product software testing speciﬁcation SWPDC Sybil attacks techniques tool topology transactions update users variable veriﬁcation Windows Mobile