04648nam 22008655 450 99646609950331620230405232237.03-540-75294-310.1007/978-3-540-75294-3(CKB)1000000000490496(SSID)ssj0000317167(PQKBManifestationID)11246648(PQKBTitleCode)TC0000317167(PQKBWorkID)10287398(PQKB)10499167(DE-He213)978-3-540-75294-3(MiAaPQ)EBC3063235(MiAaPQ)EBC6709261(Au-PeEL)EBL6709261(PPN)123165431(EXLCZ)99100000000049049620100301d2007 u| 0engurnn|008mamaatxtccrDependable Computing[electronic resource] Third Latin-American Symposium, LADC 2007, Morelia, Mexico, September 26-28, 2007, Proceedings /edited by Andrea Bondavalli, Francisco Brasileiro, Sergio Rajsbaum1st ed. 2007.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2007.1 online resource (XIV, 242 p.) Theoretical Computer Science and General Issues,2512-2029 ;4746Bibliographic Level Mode of Issuance: Monograph3-540-75293-5 Includes bibliographical references and index.Invited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing – A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR—Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience.Theoretical Computer Science and General Issues,2512-2029 ;4746Computer networksComputers, Special purposeElectronic digital computers—EvaluationSoftware engineeringLogic designCoding theoryInformation theoryComputer Communication NetworksSpecial Purpose and Application-Based SystemsSystem Performance and EvaluationSoftware EngineeringLogic DesignCoding and Information TheoryComputer networks.Computers, Special purpose.Electronic digital computers—Evaluation.Software engineering.Logic design.Coding theory.Information theory.Computer Communication Networks.Special Purpose and Application-Based Systems.System Performance and Evaluation.Software Engineering.Logic Design.Coding and Information Theory.004.2Bondavalli AndreaBrasileiro Francisco Vilar1965-Rajsbaum SergioLADC 2007MiAaPQMiAaPQMiAaPQBOOK996466099503316Dependable Computing772138UNISA