EDCC

Paris, September 2015

EDCC 2015 Accepted Papers


Thorsten Piper, Stefan Winter, Neeraj Suri and Thomas E. Fuhrman. On the Effective Use of Fault Injection for the Assessment of AUTOSAR Safety Mechanisms
Xiwei Xu, Liming Zhu, Daniel Sun, An Binh Tran, Ingo Weber, Min Fu and Len Bass. Error Diagnosis of Cloud Application Operation Using Bayesian Networks and Online Optimisation
Yanyan Shen and Kevin Elphinstone. Microkernel Mechanisms for Improving the Trustworthiness of Commodity Hardware
Farid Molazem Tabrizi and Karthik Pattabiraman. Flexible Intrusion Detection Systems for Memory-Constrained Embedded Systems
Peter Munk, Mohammad Shadi Alhakeem, Raphael Lisicki, Helge Parzyjegla, Jan Richling and Hans-Ulrich Heiß. Toward an Adaptive Safety Framework for COTS Many-Core Systems
Paul Rimba, Liming Zhu, Len Bass, Ihor Kuz and Steve Reeves. Composing Patterns to Construct Secure Systems
Hélène Martorell, Jean-Charles Fabre, Michael Lauer, Matthieu Roy and Régis Valentin. Partial Updates of AUTOSAR Embedded Applications — To What Extent?
Thibaut Probst, Eric Alata, Mohamed Kaâniche and Vincent Nicomette. An Approach for the Automated Evaluation of NIDS in Cloud Computing Virtual Infrastructures
Zachary J Estrada, Cuong Pham, Fei Deng, Lok Yan, Zbigniew Kalbarczyk and Ravishankar K. Iyer. Dynamic VM Dependability Monitoring Using Hypervisor Probes
Seyedeh Golsana Ghaemi, Amir Mahdi Hosseini Monazzah, Hamed Farbeh and Seyed Ghassem Miremadi. LATED: Lifetime-Aware Tag for Enduring Design
Edward Chuah, Arshad Jhumka, James C. Browne, Bill Barth and Sai Narasimhamurthy. Insights into the Diagnosis of System Failures from Cluster Message Logs
Sayali Salvi, Daniel Kästner, Tom Bienmüller and Christian Ferdinand. Exploiting Synergies between Static Analysis and Model-Based Testing
Mattias Nyberg and Jonas Westman. Failure Propagation Modeling based on Contracts Theory
Carla Sauvanaud, Guthemberg Silvestre, Mohamed Kaâniche and Karama Kanoun. Data Stream Clustering for Online Anomaly Detection in Cloud Applications
Luis R. Rodriguez and Julia Lawall. Increasing Automation in the Backporting of Linux Drivers Using Coccinelle
Behrooz Sangchoolie, Fatemeh Ayatolahi, Roger Johansson and Johan Karlsson. A Comparison of Inject-on-Read and Inject-on-Write in ISA-Level Fault Injection
Jehan-Francois Paris and Darrell Long. Reducing the Energy Footprint of a Distributed Consensus Algorithm
Frederico Cerveira, Raul Barbosa, Henrique Madeira and Filipe Araujo. Recovery for Virtualized Cloud Environments
Yann Bachy, Vincent Nicomette, Eric Alata, Mohamed Kaaniche and Jean-Christophe Courrège. Security of ISP Access Networks: practical experiments
Jaime Espinosa, David de Andrés and Pedro Gil. Increasing the Safety of VLSI Systems Through Early Detection of Fugacious Faults
Jordan Adamek, Mikhail Nesterenko and Sebastien Tixeuil. Evaluating and Optimizing Stabilizing Dining Philosophers
Horst Schirmeier, Martin Hoffmann, Christian Dietrich, Michael Lenz, Daniel Lohmann and Olaf Spinczyk. Fail*: An Open and Versatile Fault-Injection Framework for the Assessment of Software-Implemented Hardware Fault Tolerance
Negin Fathollah Nejad Asl, Risat Pathan and Johan Karlsson. On the Probability of Unsafe Disagreement in Group Formation Algorithms for Vehicular Ad hoc Networks
Luis-J. Saiz-Adalid, Pedro Gil Vicente, Joaquin Gracia, Daniel Gil and Juan C. Baraza. Ultrafast Single Error Correction Codes for Protecting Processor Registers

Organized by

Organized by

Organized by

Support


Supported by

Supported by

Supported by

Supported by