Fast Abstracts

Advance Program

15:30-17:00, June 29 - Room:313+314
Chair : Antonio Casimiro Costa (University of Lisbon, Portugal)
  1. A Novel Recurrent Neural Network Controller for Dynamic Buffer Size Tuning to Provide More Reliable End-to-End Client/Server Interaction
    Wilfred W. K. Lin (The Hong Kong Polytechnic University, China), Tharam S. Dillon (University of Technology, Sydney, Australia), and Allan K. Y. Wong (The Hong Kong Polytechnic University, China)
  2. Fault Tolerant SCADA with CORBA on LANE ATM
    David Selvakumar, Chester Rebeiro (Centre for Development of Advanced Computing, India), R Pitchiah (Department of Information Technology, India)
  3. Communication-efficient Implementation of Failure Detector Class <>P
    Mikel Larrea and Alberto Lafuente (The University of the Basque Country, Spain)
  4. Replication Buffering Relay Method: Storage-based Replication over Long Distances with No-data-loss for Disaster Recovery
    Masaki Kan, Jun-ichi Yamato, Yuji Kaneko, and Yoshihide Kikuchi (NEC Corporation, Japan)
  5. A Failure Rate Prediction Method for the Probabilistic Safety Assessment
    Ji-Young Kim (Chungnam National University, Korea), Dong-Young Lee (Korea Atomic Energy Research Institute, Korea), and Joon Lyou (Chungnam National University, Korea)
  6. Run Time Encoding of Function Pointers by Dynamic Linker
    Gyungho Lee (University of Illinois at Chicago, USA), Changwoo Pyo (Hongik University, Korea), and Tae-Jin Kim (University of Illinois at Chicago, USA)
  7. An Evaluation of Mean Delay and Jitter for 802.11e WLAN
    Norifumi Ikeda, Hiroei Imai (Niigata University, Japan), Masahiro Tsunoyama (Niigata Institute of Technology, Japan), and Ikuo Ishii (Niigata University, Japan)
  8. A Method of Software Reliability Assessment for Xfce Open Source Project
    Yoshinobu Tamura (Tottori University of Environmental Studies, Japan), Shigeru Yamada (Tottori University, Japan), and Mitsuhiro Kimura (Hosei University, Japan)
  9. Automated Discovery of Buffer Overflow Vulnerabilities in Executable Software without Source-Code
    João Durães (DEIS-ISEC/CISUC, Portugal) and Henrique Madeira (DEI/CISUC University of Coimbra, Portugal)
  10. Describing Inner Data Structure Management in Mobile IPv6 Using Multi-Nodes Finite State Machine
    Yujun Zhang and Zhongcheng Li (Institute of Computing Technology, Chinese Academy of Sciences, China)
  11. Extinction Time Distribution of Internet Worms in Stochastic Kill-Signal Model
    Hiroyuki Okamura, Hisashi Kobayashi, and Tadashi Dohi (Hiroshima University, Japan)
  12. Efficient Embedded Firewall for Communication Appliances
    Sachin Garg and Navjot Singh (Avaya Labs Research, USA)
  13. A Reasoning Approach to Security Analysis
    Junichi Miura and Jingde Cheng (Saitama University, Japan)
  14. Cost Efficient and Dependable: CAN in Advanced Applications
    Carl Bergenhem (National Testing and Research Institute, Sweden) and Håkan Sivencrona (Mecel, Delphi Corporation, Sweden)
 
08:30-10:00, June 30 - Room:313+314
Chair : François Taïani (Lancaster University, UK)
  1. Performance and Performability Evaluations for Networked Humanoid Robot System
    Takashi Okuda, Yoshimi Sago, Ikuo Maeda, Tetsuo Ideguchi, and Xuejun Tian (Aichi Prefectural University, Japan)
  2. Code Comprehension and MBTI Type
    David Greathead (University of Newcastle upon Tyne, UK)
  3. Impact of Comprehensive Security Services on Grid Computing Performance
    Syed Naqvi and Michel Riguidel (Graduate School of Telecommunications, France)
  4. Accessible Formal Verification for Safety-Critical Hardware Design
    John Lach, Scott Bingham, Carl Elks, Travis Lenhart (University of Virginia, USA), Thuy Nguyen, and Patrick Salaun (Electricité de France, France)
  5. Security Issues in Persistently Reactive Systems
    Takumi Endo, Junichi Miura, Koichi Nanashima, Shouichi Morimoto, Yuichi Goto, and Jingde Cheng (Saitama University, Japan)
  6. Detecting IIS Attacks based on Neural-Network
    Shi-Jinn Horng (Southwest Jiaotong University, National Taiwan University of Science and Technology, Taiwan), Pingzhi Fan, Yao-Ping Chou, and Yen-Cheng. Chang (National Taiwan University of Science and Technology, Taiwan)
  7. A Multi-Faced Approach towards Spam-Resistible Mail
    Ming-Wei Wu (National Taiwan University, Taiwan), Yennun Huang (AT&T Labs, USA), and Sy-Yen Kuo (National Taiwan University, Taiwan)
  8. A Formal Method for Verifying Security Specifications Based on International Standard ISO/IEC 15408
    Shoichi Morimoto, Shinjiro Shigematsu, and Jingde Cheng (Saitama University, Japan)
  9. How to Build a Dam: Fighting Application-Level DoS Attacks
    Gal Badishi (Technion, Israel), Amir Herzberg (Bar-Ilan University, Israel), and Idit Keidar (Technion, Israel)
  10. A Robust Service Discovery Approach for Hybrid Ad Hoc Networks
    Sung-Hee Lee and Young-Bae Ko (Ajou University, Korea)
  11. A Study on Open Network Communication by Using Data Diversity
    Keiji Miura and Masayoshi Sakai (The Nippon Signal Co.,Ltd., Japan)
  12. Surviving Survivability Specifications
    Lucia Cloth and Boudewijn R. Haverkort (University of Twente, the Netherlands)
  13. A Routing Protocol with Directional Antennas for Improving Robustness in Mobile Ad Hoc Networks
    Sung-Ho Kim and Young-Bae Ko (Ajou University, Korea)
 
10:30-12:00, June 30 - Room:313+314
Chair : Matti Hiltunen (AT&T Labs - Research, USA)
  1. Comparing Fault Recovery Mechanisms for Superscalar Processors
    Toshinori Sato (PRESTO, Japan Science and Technology Agency, Japan)
  2. Fault-Tolerant CMP Design Using a Write Cache Checker
    Elias Mizan (The University of Texas at Austin, USA) and Marcos De Alba (Tecnologico de Monterrey, Mexico)
  3. Dependability Evaluation of Mobile Devices' System Software
    Mário Zenha-Rela, Marco Vieira (University of Coimbra, Portugal), João Carlos Cunha, and João Durães (Polytechnic Institute of Coimbra, Portugal)
  4. Performability Modeling for a Calendar Server
    Sarma Vempati, Dong Tang, Pedro Vazquez, and Swami Nathan (Sun Microsystems, Inc., USA)
  5. Proactive Fault Manager for High Performance Computing
    Yawei Li and Zhiling Lan (Illinois Institute of Technology, USA)
  6. Towards Replication of Web Services in WANs
    Jorge Salas, Francisco Perez-Sorrosal, Marta Patiño-Martínez and Ricardo Jiménez-Peris (Universidad Politécnica de Madrid, Spain)
  7. Continuous Access to Remote Devices in the Presence of Device Migration
    Ryota Ozaki (The Graduate University for Advanced Studies, Japan), Soichiro Hidaka, Kazuya Kodama, and Katsumi Maruyama (National Institute of Informatics, Research Organization of Information and Systems, The Graduate University for Advanced Studies, Japan)
  8. Address Space Obfuscation to Tolerate Windows Code Injection Attacks
    Tufan Demir, Karl Levitt, Lynn Nguyen, and Jeff Rowe (UC Davis, USA)
  9. Proactive Problem Determination in Transaction-Oriented Applications
    Soila Pertet, Priya Narasimhan (Carnegie Mellon University, USA), Anca Sailer, and Gautam Kar (IBM T.J. Watson Research Center, USA)
  10. Epidemic Multicast with Optimal Node Selection in Ad-Hoc Networks
    Ruben Torres, Vinita Apte, and Saurabh Bagchi (Purdue University, USA)
  11. Reliable Data Dissemination using Trust in Multi-hop Sensor Networks
    Ravish Khosla, Yu Cheng, and Saurabh Bagchi (Purdue University, USA)
  12. Resource Fault Prediction for Fine-Grained Cycle Sharing
    Xiaojuan Ren, Seyong Lee, Saurabh Bagchi, and Rudolf Eigenmann (Purdue University, USA)
  13. Overview of a New CNES Architectural EDAC Concept for High Speed Memory Protection
    Michel Pignol (CNES, France)
  14. Challenges in Realizing Distributed Adaptive Dependability
    Jean-Charles Fabre (LAAS-CNRS, France), Priya Narasimhan (Carnegie Mellon University, USA)
 
13:00-15:00, June 30 - Room:302
Poster Session
Room 302 Layout




Call for Paper

Fast Abstracts are lightly refereed short presentations of work in progress or opinion pieces that can cover any and all facets of dependable systems and networks. Because they are brief and have a later deadline, Fast Abstracts allow their authors to:
  • Report on work that may or may not be complete.
  • Introduce new ideas to the community.
  • State positions on controversial issues.
As such, they provide an excellent opportunity to present new work and receive early feedback from the community. We particularly encourage submission from conference participants that would not otherwise present their work at the conference.
Submissions should be at most two pages, formatted using standard two-column IEEE format. They are refereed primarily based on their relevance to the conference. Accepted Fast Abstracts will be published in the Supplement of the 2005 International Conference on Dependable Systems and Networks.
All participants in this track will have an opportunity to present a poster; selected participants will also present a 5 minute talk, including 1 minute for questions.
 
Go to Fast Abstracts submission page

Chair

Matti Hiltunen (AT&T Labs - Research, NJ, USA) <hiltunen@research.att.com>

Program Committee

Antonio Casimiro Costa (University of Lisbon)
David Bakken (Washington State University)

Deadlines

Submission: April 8, 2005
Notification: April 28, 2005