


default search action
29th PRDC 2024: Osaka, Japa
- 29th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2024, Osaka, Japan, November 13-15, 2024. IEEE 2024, ISBN 979-8-3315-4074-6
- Ilknur Mustafazade
, Anup Das, Nagarajan Kandasamy:
Efficient Built-In Self-Test Strategy for Neuromorphic Hardware Based On Alarm Placement. 1-10 - Abhishek Kumar Mishra, Anupam Das, Nagarajan Kandasamy:
Model-Based Approach Towards Correctness Checking of Neuromorphic Computing Systems. 11-21 - Jawaher Alharbi, Arshad Jhumka:
CheckIn: Efficiently Checkpointing Intermittent Sensor-Based Internet of Things (IoT) Networks. 22-32 - Jun Yajima
, Satoko Shiga, Kyoko Ohashi, Masaru Ide, Hiroshi Tanaka, Sachiko Onodera:
Toward a Trustworthy Artificial Intelligence System Considering Security, Ethics, and Quality. 33-42 - Tommaso Zoppi, Fahad Ahmed KhoKhar, Andrea Ceccarelli
, Leonardo Montecchi, Andrea Bondavalli
:
Fail-Controlled Classifiers: Do they Know when they don't Know? 43-54 - Md Mashrur Arifin, Jyh-Haw Yeh:
cTIMS: Correlated Textual and Image based Metrics Suites for Assessing GAN-Synthesized Android Malware Images. 55-65 - Sara Alosaime, Arshad Jhumka:
FLARE: Availability Awareness for Resource-Efficient Federated Learning. 66-75 - Yucheng Sun, Ruomu Hou, Haifeng Yu:
Robust and Low-degree Overlay for Secure Flooding Against Resource-bounded Adversaries. 76-86 - Taras Lykhenko, Rafael Soares, Luís Rodrigues:
PrompTCC: Transactional Causally Consistent Reads Can Be Fast and Fresh. 87-97 - Liangrong Zhao, Qin Wang, Joseph K. Liu, Jiangshan Yu:
Juno: Aggregated Vector Consensus for Optimal Asynchronous Common Subset. 98-108 - Naoshi Yamane, Satoshi Munakata, Luis Guillen, Takaki Nakamura, Takuo Suganuma:
Durability Evaluation of Erasure Coding Applying Risk-aware Data Protection in Large-scale Disasters. 109-119 - Joon Kuy Han, Dennis Wong, Zhoulai Fu, Byungkon Kang:
AuthZit: Personalized Visual-Spatial and Loci-Tagging Fallback Authentication. 120-130 - Eri Ogawa, Tetsuro Yamazaki, Ryota Shioya:
Dynamic Controllability Analysis for Preventing Injection Attacks. 131-142 - Rajesh Kumar, Swapnil Pandey, Debanshu Das:
PALM: A framework to identify novel attacks in an e-commerce system. 143-152 - Jingchi Wu, Tadashi Dohi, Hiroyuki Okamura:
Refined Software Reliability Prediction: A Bagging Approacha. 153-162 - Ilyas Hadjou, Young-Woo Kwon:
RL-Based Approach to Enhance Reliability and Efficiency in Autoscaling for Heterogeneous Edge Serverless Computing Environments. 163-172 - Marco Thomas, Claas Lorenz, Alf Zugenmaier:
Optimal Deployment of High-Level Access Control Policies in Heterogeneous Enforcement Infrastructures. 173-179 - Dong Kyu Lee, Jung Min Pak, Choon Ki Ahn:
Secure Finite-Memory Target Tracking in Heterogeneous Sensor Networks Under Cyber Attacks. 180-186 - Homu Omura, Kazuteru Namba:
FPGA Cluster Based System with Adaptive TMR/DMR for Soft Error Mitigation. 187-188 - Ryoichi Ishigami, Sho Matsumoto, Tomohiko Takagi:
Construction of VDM++ Specifications from Extended Screen Transition Diagrams for Validation of Microservice-based Web Applications. 189-190 - Sang Su Lee, Kwan Soo Kim, Dong Kyu Lee, Gyun Ha Kim, Choon Ki Ahn:
Distributed Control Framework for UAV Resilience Against Faults and Cyber Attacks with Finite-Memory Approach. 191-192 - Leonardo Alexandrino De Melo, Mauricio Gomes de Queiroz, Alberto Bosio, Rodrigo Possamai Bastos:
Robustness of Redundancy-Hardened Convolutional Neural Networks Against Adversarial Attacks. 193-194 - Aoi Ono, Tatsuhiro Tsuchiya:
Describing and verifying malicious fault-tolerant consensus algorithms using PlusCAL and C languages. 195-196 - Koki Matsui, Tatsuhiro Tsuchiya:
Selecting Nodes to Protect in Interdependent Networks Using Shapley Value Analysis. 197-198 - Hiroki Hanada, Keisuke Ishibashi:
Empirical Study on Request Timeout and Retry for Microservices Communication. 199-200 - Hongxue Chen, Xiaoya Hu, Weihong Ma, Zonghua Zhang:
Comparative Studies of Security Assessment Methods for Railway Control Systems. 201-207 - Tommaso Zoppi, Irene Bicchierai, Francesco Brancati, Andrea Bondavalli
, Hans-Peter Schwefel:
Deploying a Generic Threat Model for Detecting Anomalies in a Power Grid Digital Twin. 208-215 - Phaiboon Jaradnaparatana
, Buntita Sriarunothai, Chutikarn Kamsem, Supithcha Jongphoemwatthanaphon, Burit Sihabut
, Duong Dinh Tran, Toshiaki Aoki:
Bridging Gaps between Scenario-Based Safety Analysis and Simulation-based Testing for Autonomous Driving Systems. 216-219 - Xiaoqi Weng, Razvan Beuran:
Smart Building Control System Emulation Platform for Security Testing. 220-223 - Tatsuhiro Tsuchiya:
Sequential programming for distributed algorithm verification. 224-226 - Kazuaki Kawabata, Naohiro Hayashibara:
Towards a Pragmatic ORAM Implementation Using Caching and Prefetching. 227-230 - Jingchi Wu, Junjun Zheng, Tadashi Dohi, Hiroyuki Okamura:
An Alternative Boosting-based Software Reliability Prediction Method. 231-234

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.