Fast Abstracts
Advance Program
- 15:30-17:00, June 29 - Room:313+314
- Chair : Antonio Casimiro Costa (University of Lisbon, Portugal)
- A Novel Recurrent Neural Network Controller for Dynamic Buffer Size Tuning to Provide More Reliable End-to-End Client/Server Interaction
Wilfred W. K. Lin (The Hong Kong Polytechnic University, China),
Tharam S. Dillon (University of Technology, Sydney, Australia),
and Allan K. Y. Wong (The Hong Kong Polytechnic University, China)
- Fault Tolerant SCADA with CORBA on LANE ATM
David Selvakumar, Chester Rebeiro (Centre for Development of Advanced Computing, India),
R Pitchiah (Department of Information Technology, India)
- Communication-efficient Implementation of Failure Detector Class <>P
Mikel Larrea and Alberto Lafuente (The University of the Basque Country, Spain)
- Replication Buffering Relay Method: Storage-based Replication over Long Distances with No-data-loss for Disaster Recovery
Masaki Kan, Jun-ichi Yamato, Yuji Kaneko, and Yoshihide Kikuchi (NEC Corporation, Japan)
- A Failure Rate Prediction Method for the Probabilistic Safety Assessment
Ji-Young Kim (Chungnam National University, Korea),
Dong-Young Lee (Korea Atomic Energy Research Institute, Korea),
and Joon Lyou (Chungnam National University, Korea)
- Run Time Encoding of Function Pointers by Dynamic Linker
Gyungho Lee (University of Illinois at Chicago, USA),
Changwoo Pyo (Hongik University, Korea),
and Tae-Jin Kim (University of Illinois at Chicago, USA)
- An Evaluation of Mean Delay and Jitter for 802.11e WLAN
Norifumi Ikeda, Hiroei Imai (Niigata University, Japan),
Masahiro Tsunoyama (Niigata Institute of Technology, Japan),
and Ikuo Ishii (Niigata University, Japan)
- A Method of Software Reliability Assessment for Xfce Open Source Project
Yoshinobu Tamura (Tottori University of Environmental Studies, Japan),
Shigeru Yamada (Tottori University, Japan),
and Mitsuhiro Kimura (Hosei University, Japan)
- Automated Discovery of Buffer Overflow Vulnerabilities in Executable Software without Source-Code
João Durães (DEIS-ISEC/CISUC, Portugal)
and Henrique Madeira (DEI/CISUC University of Coimbra, Portugal)
- Describing Inner Data Structure Management in Mobile IPv6 Using Multi-Nodes Finite State Machine
Yujun Zhang and Zhongcheng Li (Institute of Computing Technology, Chinese Academy of Sciences, China)
- Extinction Time Distribution of Internet Worms in Stochastic Kill-Signal Model
Hiroyuki Okamura, Hisashi Kobayashi, and Tadashi Dohi (Hiroshima University, Japan)
- Efficient Embedded Firewall for Communication Appliances
Sachin Garg and Navjot Singh (Avaya Labs Research, USA)
- A Reasoning Approach to Security Analysis
Junichi Miura and Jingde Cheng (Saitama University, Japan)
- Cost Efficient and Dependable: CAN in Advanced Applications
Carl Bergenhem (National Testing and Research Institute, Sweden)
and Håkan Sivencrona (Mecel, Delphi Corporation, Sweden)
-
- 08:30-10:00, June 30 - Room:313+314
- Chair : François Taïani (Lancaster University, UK)
- Performance and Performability Evaluations for Networked Humanoid Robot System
Takashi Okuda, Yoshimi Sago, Ikuo Maeda, Tetsuo Ideguchi, and Xuejun Tian (Aichi Prefectural University, Japan)
- Code Comprehension and MBTI Type
David Greathead (University of Newcastle upon Tyne, UK)
- Impact of Comprehensive Security Services on Grid Computing Performance
Syed Naqvi and Michel Riguidel (Graduate School of Telecommunications, France)
- Accessible Formal Verification for Safety-Critical Hardware Design
John Lach, Scott Bingham, Carl Elks, Travis Lenhart (University of Virginia, USA),
Thuy Nguyen, and Patrick Salaun (Electricité de France, France)
- Security Issues in Persistently Reactive Systems
Takumi Endo, Junichi Miura, Koichi Nanashima, Shouichi Morimoto, Yuichi Goto, and Jingde Cheng (Saitama University, Japan)
- Detecting IIS Attacks based on Neural-Network
Shi-Jinn Horng (Southwest Jiaotong University, National Taiwan University of Science and Technology, Taiwan),
Pingzhi Fan, Yao-Ping Chou, and Yen-Cheng. Chang (National Taiwan University of Science and Technology, Taiwan)
- A Multi-Faced Approach towards Spam-Resistible Mail
Ming-Wei Wu (National Taiwan University, Taiwan),
Yennun Huang (AT&T Labs, USA),
and Sy-Yen Kuo (National Taiwan University, Taiwan)
- A Formal Method for Verifying Security Specifications Based on International Standard ISO/IEC 15408
Shoichi Morimoto, Shinjiro Shigematsu, and Jingde Cheng (Saitama University, Japan)
- How to Build a Dam: Fighting Application-Level DoS Attacks
Gal Badishi (Technion, Israel),
Amir Herzberg (Bar-Ilan University, Israel),
and Idit Keidar (Technion, Israel)
- A Robust Service Discovery Approach for Hybrid Ad Hoc Networks
Sung-Hee Lee and Young-Bae Ko (Ajou University, Korea)
- A Study on Open Network Communication by Using Data Diversity
Keiji Miura and Masayoshi Sakai (The Nippon Signal Co.,Ltd., Japan)
- Surviving Survivability Specifications
Lucia Cloth and Boudewijn R. Haverkort (University of Twente, the Netherlands)
- A Routing Protocol with Directional Antennas for Improving Robustness in Mobile Ad Hoc Networks
Sung-Ho Kim and Young-Bae Ko (Ajou University, Korea)
-
- 10:30-12:00, June 30 - Room:313+314
- Chair : Matti Hiltunen (AT&T Labs - Research, USA)
- Comparing Fault Recovery Mechanisms for Superscalar Processors
Toshinori Sato (PRESTO, Japan Science and Technology Agency, Japan)
- Fault-Tolerant CMP Design Using a Write Cache Checker
Elias Mizan (The University of Texas at Austin, USA)
and Marcos De Alba (Tecnologico de Monterrey, Mexico)
- Dependability Evaluation of Mobile Devices' System Software
Mário Zenha-Rela, Marco Vieira (University of Coimbra, Portugal),
João Carlos Cunha, and João Durães (Polytechnic Institute of Coimbra, Portugal)
- Performability Modeling for a Calendar Server
Sarma Vempati, Dong Tang, Pedro Vazquez, and Swami Nathan (Sun Microsystems, Inc., USA)
- Proactive Fault Manager for High Performance Computing
Yawei Li and Zhiling Lan (Illinois Institute of Technology, USA)
- Towards Replication of Web Services in WANs
Jorge Salas, Francisco Perez-Sorrosal, Marta Patiño-Martínez and Ricardo Jiménez-Peris (Universidad Politécnica de Madrid, Spain)
- Continuous Access to Remote Devices in the Presence of Device Migration
Ryota Ozaki (The Graduate University for Advanced Studies, Japan),
Soichiro Hidaka, Kazuya Kodama, and Katsumi Maruyama (National Institute of Informatics, Research Organization of Information and Systems, The Graduate University for Advanced Studies, Japan)
- Address Space Obfuscation to Tolerate Windows Code Injection Attacks
Tufan Demir, Karl Levitt, Lynn Nguyen, and Jeff Rowe (UC Davis, USA)
- Proactive Problem Determination in Transaction-Oriented Applications
Soila Pertet, Priya Narasimhan (Carnegie Mellon University, USA),
Anca Sailer, and Gautam Kar (IBM T.J. Watson Research Center, USA)
- Epidemic Multicast with Optimal Node Selection in Ad-Hoc Networks
Ruben Torres, Vinita Apte, and Saurabh Bagchi (Purdue University, USA)
- Reliable Data Dissemination using Trust in Multi-hop Sensor Networks
Ravish Khosla, Yu Cheng, and Saurabh Bagchi (Purdue University, USA)
- Resource Fault Prediction for Fine-Grained Cycle Sharing
Xiaojuan Ren, Seyong Lee, Saurabh Bagchi, and Rudolf Eigenmann (Purdue University, USA)
- Overview of a New CNES Architectural EDAC Concept for High Speed Memory Protection
Michel Pignol (CNES, France)
- Challenges in Realizing Distributed Adaptive Dependability
Jean-Charles Fabre (LAAS-CNRS, France), Priya Narasimhan (Carnegie Mellon University, USA)
-
- 13:00-15:00, June 30 - Room:302
- Poster Session
Call for Paper
- Fast Abstracts are lightly refereed short presentations of work in progress or opinion pieces that can cover any and all facets of dependable systems and networks. Because they are brief and have a later deadline, Fast Abstracts allow their authors to:
- Report on work that may or may not be complete.
- Introduce new ideas to the community.
- State positions on controversial issues.
- As such, they provide an excellent opportunity to present new
work and receive early feedback from the community. We particularly
encourage submission from conference participants that would not
otherwise present their work at the conference.
- Submissions should be at most two pages, formatted using
standard two-column IEEE format. They are refereed primarily
based on their relevance to the conference. Accepted Fast Abstracts
will be published in the Supplement of the 2005 International
Conference on Dependable Systems and Networks.
- All participants in this track will have an opportunity to
present a poster; selected participants will also present a 5 minute
talk, including 1 minute for questions.
-
- Go to
Fast Abstracts submission page
- Matti Hiltunen (AT&T Labs - Research, NJ, USA)
<[email protected]>
Program Committee
- Antonio Casimiro Costa
(University of Lisbon)
David Bakken
(Washington State University)
- Submission: April 8, 2005
- Notification: April 28, 2005