• Media type: E-Book; Conference Proceedings
  • Title: Dependable Computing : Third Latin-American Symposium, LADC 2007, Morella, Mexico, September 26-28, 2007. Proceedings
  • Contributor: Bondavalli, Andrea [Other]; Brasileiro, Francisco [Other]; Rajsbaum, Sergio [Other]
  • Published: Berlin, Heidelberg: Springer Berlin Heidelberg, 2007
  • Published in: Lecture notes in computer science ; 4746
    Bücher
  • Extent: Online-Ressource (XIX, 239 p, digital)
  • Language: English
  • DOI: 10.1007/978-3-540-75294-3
  • ISBN: 9783540752943
  • Identifier:
  • RVK notation: SS 4800 : Lecture notes in computer science
  • Keywords: Fehlertoleranz > Zuverlässigkeit
    Eingebettetes System > Fehlertoleranz > Zuverlässigkeit
    Systementwurf > Fehlertoleranz > Zuverlässigkeit
    Softwareentwicklung > Fehlertoleranz > Zuverlässigkeit
  • Origination:
  • Footnote:
  • Description: Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience.