Custom cover image
Custom cover image

Dependable Computing : Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings / edited by Andrea Bondavalli, Francisco Brasileiro, Sergio Rajsbaum

Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: SpringerLink Bücher | Lecture notes in computer science ; 4746Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Description: Online-Ressource (XIX, 239 p, digital)ISBN:
  • 9783540752943
Subject(s): Genre/Form: Additional physical formats: 9783540752936 | Buchausg. u.d.T.: Dependable computing. Berlin : Springer, 2007. XIV, 236 S.DDC classification:
  • 004.6
  • 004.2
  • Z
  • 004 Z
LOC classification:
  • TK7874.6
  • QA76.9.F3
DOI: DOI: 10.1007/978-3-540-75294-3Online resources: Summary: Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience.PPN: PPN: 1646903129Package identifier: Produktsigel: ZDB-2-LNC | ZDB-2-SCS | ZDB-2-SXCS | ZDB-2-SEB | ZDB-2-LNC
No physical items for this record