LEADER 04648nam 22008655 450 001 996466099503316 005 20230405232237.0 010 $a3-540-75294-3 024 7 $a10.1007/978-3-540-75294-3 035 $a(CKB)1000000000490496 035 $a(SSID)ssj0000317167 035 $a(PQKBManifestationID)11246648 035 $a(PQKBTitleCode)TC0000317167 035 $a(PQKBWorkID)10287398 035 $a(PQKB)10499167 035 $a(DE-He213)978-3-540-75294-3 035 $a(MiAaPQ)EBC3063235 035 $a(MiAaPQ)EBC6709261 035 $a(Au-PeEL)EBL6709261 035 $a(PPN)123165431 035 $a(EXLCZ)991000000000490496 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aDependable Computing$b[electronic resource] $eThird Latin-American Symposium, LADC 2007, Morelia, Mexico, September 26-28, 2007, Proceedings /$fedited by Andrea Bondavalli, Francisco Brasileiro, Sergio Rajsbaum 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XIV, 242 p.) 225 1 $aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4746 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-75293-5 320 $aIncludes bibliographical references and index. 327 $aInvited Talks -- Reliability, Safety, and Security in Everyday Embedded Systems (Extended Abstract) -- Nanoscale Technologies: Prospect or Hazard to Dependable and Secure Computing? -- Fault-Tolerant Algorithms -- Fault-Tolerant Dynamic Routing Based on Maximum Flow Evaluation -- On the Implementation of Communication-Optimal Failure Detectors -- Connectivity in Eventually Quiescent Dynamic Distributed Systems -- Software Engineering of Dependable Systems -- Implementing Fault Tolerance Using Aspect Oriented Programming -- Architecture-Centric Fault Tolerance with Exception Handling -- Coverage-Oriented, Prioritized Testing ? A Fuzzy Clustering Approach and Case Study -- Networking and Mobile Computing -- Error Propagation Monitoring on Windows Mobile-Based Devices -- Gossiping: Adaptive and Reliable Broadcasting in MANETs -- On the Behavior of Broadcasting Protocols for MANETs Under Omission Faults Scenarios -- Experimental Dependability Evaluation -- Failure Boundedness in Discrete Applications -- Designing Fault Injection Experiments Using State-Based Model to Test a Space Software -- Component-Based Software Certification Based on Experimental Risk Assessment -- Intrusion Tolerance and Security -- Integrated Intrusion Detection in Databases -- Security Rationale for a Cooperative Backup Service for Mobile Devices -- Tutorials -- Do You Know... How to Analyze and Share Results from Dependability Evaluation Experiments? -- Security Patterns and Secure Systems Design -- BAR?Where Distributed Computing Meets Game Theory -- Panels -- Scaling Dependability and Security in Ad Hoc Networks -- Assessing, Measuring, and Benchmarking Dependability and Resilience. 410 0$aTheoretical Computer Science and General Issues,$x2512-2029 ;$v4746 606 $aComputer networks 606 $aComputers, Special purpose 606 $aElectronic digital computers?Evaluation 606 $aSoftware engineering 606 $aLogic design 606 $aCoding theory 606 $aInformation theory 606 $aComputer Communication Networks 606 $aSpecial Purpose and Application-Based Systems 606 $aSystem Performance and Evaluation 606 $aSoftware Engineering 606 $aLogic Design 606 $aCoding and Information Theory 615 0$aComputer networks. 615 0$aComputers, Special purpose. 615 0$aElectronic digital computers?Evaluation. 615 0$aSoftware engineering. 615 0$aLogic design. 615 0$aCoding theory. 615 0$aInformation theory. 615 14$aComputer Communication Networks. 615 24$aSpecial Purpose and Application-Based Systems. 615 24$aSystem Performance and Evaluation. 615 24$aSoftware Engineering. 615 24$aLogic Design. 615 24$aCoding and Information Theory. 676 $a004.2 702 $aBondavalli$b Andrea 702 $aBrasileiro$b Francisco Vilar$f1965- 702 $aRajsbaum$b Sergio 712 12$aLADC 2007 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466099503316 996 $aDependable Computing$9772138 997 $aUNISA