skip to main content
Skip header Section
Dependability: Basic Concepts and TerminologyFebruary 1992
Publisher:
  • Springer-Verlag
  • Berlin, Heidelberg
ISBN:978-0-387-82296-9
Published:01 February 1992
Pages:
268
Skip Bibliometrics Section
Bibliometrics
Abstract

No abstract available.

Cited By

  1. Souza L, Camboim K, Araujo J, Alencar F, Maciel P and Ferreira J (2023). Dependability evaluation and sensitivity analysis of data center cooling systems, The Journal of Supercomputing, 79:17, (19607-19635), Online publication date: 1-Nov-2023.
  2. Souza L, Camboim K and Alencar F (2022). A systematic literature review about integrating dependability attributes, performability and sustainability in the implantation of cooling subsystems in data center, The Journal of Supercomputing, 78:14, (15820-15856), Online publication date: 1-Sep-2022.
  3. ACM
    Procter S and Feiler P (2020). The AADL Error Library, ACM SIGAda Ada Letters, 39:1, (63-70), Online publication date: 10-Jan-2020.
  4. ACM
    Canal R, Hernandez C, Tornero R, Cilardo A, Massari G, Reghenzani F, Fornaciari W, Zapater M, Atienza D, Oleksiak A, PiĄtek W and Abella J (2020). Predictive Reliability and Fault Management in Exascale Systems, ACM Computing Surveys, 53:5, (1-32), Online publication date: 15-Oct-2020.
  5. Uriagereka G, Amparan E, Martinez C, Martinez J, Ibanez A, Morelli M, Radermacher A and Espinoza H Design-time safety assessment of robotic systems using fault injection simulation in a model-driven approach Proceedings of the 22nd International Conference on Model Driven Engineering Languages and Systems, (577-586)
  6. Malik A, Ahmed J, Qadir J and Ilyas M (2017). A measurement study of open source SDN layers in OpenStack under network perturbation, Computer Communications, 102:C, (139-149), Online publication date: 1-Apr-2017.
  7. Ahmed W, Hasan O, Pervez U and Qadir J (2017). Reliability modeling and analysis of communication networks, Journal of Network and Computer Applications, 78:C, (191-215), Online publication date: 15-Jan-2017.
  8. Matos R, Dantas J, Araujo J, Trivedi K and Maciel P (2017). Redundant Eucalyptus Private Clouds, Journal of Grid Computing, 15:1, (1-22), Online publication date: 1-Mar-2017.
  9. Tundis A, Buffoni L, Fritzson P, Garro A and Ramírez F (2017). Model-Based Dependability Analysis of Physical Systems with Modelica, Modelling and Simulation in Engineering, 2017, Online publication date: 1-Jan-2017.
  10. ACM
    Venkatakrishnan R and Vouk M (2016). Using Redundancy to Detect Security Anomalies: Towards IoT security attack detectors, Ubiquity, 2016:January, (1-19), Online publication date: 20-Jan-2016.
  11. Short M (2016). Bounds on Worst-Case Deadline Failure Probabilities in Controller Area Networks, Journal of Computer Networks and Communications, 2016, Online publication date: 1-Apr-2016.
  12. Garro A and Tundis A RAMSAS4Modelica Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative, (1-8)
  13. Gullhav A, Nygreen B and Heegaard P Approximating the Response Time Distribution of Fault-Tolerant Multi-tier Cloud Services Proceedings of the 2013 IEEE/ACM 6th International Conference on Utility and Cloud Computing, (287-291)
  14. ACM
    Hummer W, Inzinger C, Leitner P, Satzger B and Dustdar S Deriving a unified fault taxonomy for event-based systems Proceedings of the 6th ACM International Conference on Distributed Event-Based Systems, (167-178)
  15. Garro A and Tundis A A model-based method for system reliability analysis Proceedings of the 2012 Symposium on Theory of Modeling and Simulation - DEVS Integrative M&S Symposium, (1-8)
  16. Froihofer L, Starnberger G and Goeschka K Experience report Proceedings of the 11th IFIP WG 6.1 international conference on Distributed applications and interoperable systems, (228-242)
  17. Gaudel M Checking models, proving programs, and testing systems Proceedings of the 5th international conference on Tests and proofs, (1-13)
  18. Dacier M On the resilience of the dependability framework to the intrusion of new security threats Dependable and Historic Computing, (238-250)
  19. ACM
    Schryen G and Kadura R Open source vs. closed source software Proceedings of the 2009 ACM symposium on Applied Computing, (2016-2023)
  20. ACM
    Vazifehdan J, Hawas M, Hekmat R and Niemegeers I Design of dependable personal networks Proceedings of the 3rd international workshop on Adaptive and dependable mobile ubiquitous systems, (1-6)
  21. Proenza J, Miro-Julia J and Hansson H (2009). Managing redundancy in CAN-based networks supporting N-Version Programming, Computer Standards & Interfaces, 31:1, (120-127), Online publication date: 1-Jan-2009.
  22. ACM
    Florio V and Blondia C (2008). A survey of linguistic structures for application-level fault tolerance, ACM Computing Surveys, 40:2, (1-37), Online publication date: 1-Apr-2008.
  23. ACM
    Krings A Design for survivability Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, (1-4)
  24. Streichert T, Glaß M, Wanka R, Haubelt C and Teich J Topology-aware replica placement in fault-tolerant embedded networks Proceedings of the 21st international conference on Architecture of computing systems, (23-37)
  25. Eusgeld I References Dependability metrics, (267-300)
  26. ACM
    Pant D and Joshi K (2007). Software fault tolerant computing, Ubiquity, 2007:April, (1-1), Online publication date: 1-Apr-2007.
  27. ACM
    Fradet P and Ha S Aspects of availability Proceedings of the 6th international conference on Generative programming and component engineering, (165-174)
  28. ACM
    Martin D, Procter R, Mariani J and Rouncefield M Working the contract Proceedings of the 19th Australasian conference on Computer-Human Interaction: Entertaining User Interfaces, (241-248)
  29. Shirtz D, Bluvband Z, Elovici Y and Shoval P Computer Systems & Information SSR Proceedings of the 2007 Annual Reliability and Maintainability Symposium, (427-433)
  30. Pang Y, Wang H and Du Y Experiment of Event Injection Technology for Network Dependability Evaluation Proceedings of the 7th international conference on Computational Science, Part III: ICCS 2007, (141-144)
  31. Grunske L, Lindsay P, Bondarev E, Papadopoulos Y and Parker D An outline of an architecture-based method for optimizing dependability attributes of software-intensive systems Architecting dependable systems IV, (188-209)
  32. Cortellessa V and Grassi V A modeling approach to analyze the impact of error propagation on reliability of component-based systems Proceedings of the 10th international conference on Component-based software engineering, (140-156)
  33. ACM
    Prodan L, Udrescu M, Boncalo O and Vladutiu M (2007). Design for dependability in emerging technologies, ACM Journal on Emerging Technologies in Computing Systems, 3:2, (6-es), Online publication date: 1-Jul-2007.
  34. Mustafiz S, Sun X, Kienzle J and Vangheluwe H Model-Driven assessment of use cases for dependable systems Proceedings of the 9th international conference on Model Driven Engineering Languages and Systems, (558-573)
  35. Conte de Leon D and Alves-Foss J (2006). Hidden Implementation Dependencies in High Assurance and Critical Computing Systems, IEEE Transactions on Software Engineering, 32:10, (790-811), Online publication date: 1-Oct-2006.
  36. ACM
    Prodan L, Udrescu M and Vladutiu M A dependability perspective on emerging technologies Proceedings of the 3rd conference on Computing frontiers, (187-198)
  37. ACM
    Bougueroua L, George L and Midonnet S An execution overrun management mechanism for the temporal robustness of Java real-time systems Proceedings of the 4th international workshop on Java technologies for real-time and embedded systems, (188-195)
  38. ACM
    Becker S, Hasselbring W, Paul A, Boskovic M, Koziolek H, Ploski J, Dhama A, Lipskoch H, Rohr M, Winteler D, Giesecke S, Meyer R, Swaminathan M, Happe J, Muhle M and Warns T (2006). Trustworthy software systems, ACM SIGSOFT Software Engineering Notes, 31:6, (1-18), Online publication date: 1-Nov-2006.
  39. ACM
    Hanmer R Error containment Proceedings of the 2006 conference on Pattern languages of programs, (1-11)
  40. Schiper A Dependable systems Dependable Systems, (34-54)
  41. Ilić D, Troubitsyna E, Laibinis L and Snook C Formal development of mechanisms for tolerating transient faults Rigorous Development of Complex Fault-Tolerant Systems, (189-209)
  42. Katz S Rigorous fault tolerance using aspects and formal methods Rigorous Development of Complex Fault-Tolerant Systems, (226-240)
  43. Schiper A Group communication Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science, (117-136)
  44. Grunske L Towards an integration of standard component-based safety evaluation techniques with SaveCCM Proceedings of the Second international conference on Quality of Software Architectures, (199-213)
  45. Le Traon Y, Baudry B and Jezequel J (2006). Design by Contract to Improve Software Vigilance, IEEE Transactions on Software Engineering, 32:8, (571-586), Online publication date: 1-Aug-2006.
  46. ACM
    Han M, Thiery T and Song X Managing exceptions in the medical workflow systems Proceedings of the 28th international conference on Software engineering, (741-750)
  47. Grunske L, Kaiser B and Papadopoulos Y Model-Driven safety evaluation with state-event-based component failure annotations Proceedings of the 8th international conference on Component-Based Software Engineering, (33-48)
  48. Zulkernine M and Seviora R (2005). Towards automatic monitoring of component-based software systems, Journal of Systems and Software, 74:1, (15-24), Online publication date: 1-Jan-2005.
  49. ACM
    Giese H, Kindler E, Klein F and Wagner R Reconciling scenario-centered controller design with state-based system models Proceedings of the fourth international workshop on Scenarios and state machines: models, algorithms and tools, (1-5)
  50. ACM
    Yan J and Randell B A systematic classification of cheating in online games Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games, (1-9)
  51. Donzelli P, Zelkowitz M, Basili V, Allard D and Meyer K (2005). Evaluating COTS Component Dependability in Context, IEEE Software, 22:4, (46-53), Online publication date: 1-Jul-2005.
  52. Yumerefendi A and Chase J The role of accountability in dependable distributed systems Proceedings of the First conference on Hot topics in system dependability, (3-3)
  53. Ljungquist B and Thelin T An IEC 62061 compliant safety system design method for machinery Proceedings of the 24th international conference on Computer Safety, Reliability, and Security, (330-343)
  54. Jones C Specification before satisfaction Proceedings of the 4th international conference on Formal Specification and Development in Z and B, (1-5)
  55. Kim H and Chung Y Automatic translation form requirements model into use cases modeling on UML Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part III, (769-777)
  56. Hamid B and Mosbah M A formal model for fault-tolerance in distributed systems Proceedings of the 24th international conference on Computer Safety, Reliability, and Security, (108-121)
  57. Zenha-Rela M, Cunha J, Silva C and da Silva L On the effects of errors during boot Proceedings of the Second Latin-American conference on Dependable Computing, (131-142)
  58. Huang L A value-based process for achieving software dependability Proceedings of the 2005 international conference on Unifying the Software Process Spectrum, (108-121)
  59. Grunske L and Kaiser B An automated dependability analysis method for COTS-based systems Proceedings of the 4th international conference on COTS-Based Software Systems, (178-190)
  60. Bouyssounouse B and Sifakis J Tools for requirements capture and exploration Embedded Systems Design, (39-53)
  61. Laibinis L and Troubitsyna E Formal development of reactive fault tolerant systems Proceedings of the Second international conference on Rapid Integration of Software Engineering Techniques, (234-249)
  62. Jhumka A, Klaus S and Huss S A Dependability-Driven System-Level Design Approach for Embedded Systems Proceedings of the conference on Design, Automation and Test in Europe - Volume 1, (372-377)
  63. ACM
    Giese H, Kindler E, Klein F and Wagner R (2005). Reconciling scenario-centered controller design with state-based system models, ACM SIGSOFT Software Engineering Notes, 30:4, (1-5), Online publication date: 1-Jul-2005.
  64. Pinho L, Vasques F and Wellings A (2004). Replication Management in Reliable Real-Time Systems, Real-Time Systems, 26:3, (261-296), Online publication date: 1-Apr-2004.
  65. Siewiorek D, Chillarege R and T. Kalbarczyk Z (2004). Reflections on Industry Trends and Experimental Research in Dependability, IEEE Transactions on Dependable and Secure Computing, 1:2, (109-127), Online publication date: 1-Apr-2004.
  66. ACM
    Tichy M, Schilling D and Giese H Design of self-managing dependable systems with UML and fault tolerance patterns Proceedings of the 1st ACM SIGSOFT workshop on Self-managed systems, (105-109)
  67. Pinello C, Carloni L and Sangiovanni-Vincentelli A Fault-Tolerant Deployment of Embedded Software for Cost-Sensitive Real-Time Feedback-Control Applications Proceedings of the conference on Design, automation and test in Europe - Volume 2
  68. Basili V, Donzelli P and Asgari S (2004). A Unified Model of Dependability, IEEE Software, 21:6, (19-25), Online publication date: 1-Nov-2004.
  69. Chen X, Zhao X and Teng Q Research directions for embedded operating systems Proceedings of the First international conference on Embedded Software and Systems, (430-436)
  70. Walter C and Suri N (2003). The customizable fault/error model for dependable distributed systems, Theoretical Computer Science, 290:2, (1223-1251), Online publication date: 2-Jan-2003.
  71. ACM
    Lin M and Yongsen X (2003). An adaptive dependability model of component-based software, ACM SIGSOFT Software Engineering Notes, 28:2, (10), Online publication date: 1-Mar-2003.
  72. Majzik I, Pataricza A and Bondavalli A Stochastic dependability analysis of system architecture based on UML models Architecting dependable systems, (219-244)
  73. Kaufman L, Johnson B and Dugan J (2002). Coverage Estimation Using Statistics of the Extremes for When Testing Reveals No Failures, IEEE Transactions on Computers, 51:1, (3-12), Online publication date: 1-Jan-2002.
  74. ACM
    Bustamante F, Poellabauer C and Schwan K AIMS Proceedings of the 10th workshop on ACM SIGOPS European workshop, (153-156)
  75. ACM
    Candea G and Fox A A utility-centered approach to building dependable infrastructure services Proceedings of the 10th workshop on ACM SIGOPS European workshop, (213-218)
  76. ACM
    Pollock N and Cornford J Fitting standard software to non-standard organisations Proceedings of the 2002 ACM symposium on Applied computing, (721-725)
  77. ACM
    Besnard D and Lawrie A Lessons from industrial design for software engineering through constraints identification, solution space optimisation and reuse Proceedings of the 2002 ACM symposium on Applied computing, (732-738)
  78. ACM
    Hiller M, Jhumka A and Suri N (2002). PROPANE, ACM SIGSOFT Software Engineering Notes, 27:4, (81-85), Online publication date: 1-Jul-2002.
  79. ACM
    Hiller M, Jhumka A and Suri N PROPANE Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis, (81-85)
  80. ACM
    Raz O, Koopman P and Shaw M Semantic anomaly detection in online data sources Proceedings of the 24th International Conference on Software Engineering, (302-312)
  81. ACM
    Raz O Research abstract for semantic anomaly detection in dynamic data feeds with incomplete specifications Proceedings of the 24th International Conference on Software Engineering, (733-734)
  82. ACM
    Lawrie T and Gacek C (2002). Issues of dependability in open source software development, ACM SIGSOFT Software Engineering Notes, 27:3, (34-37), Online publication date: 1-May-2002.
  83. Kaufman L, Johnson B and Dugan J (2002). Coverage estimation using statistic of the extremes for when testing reveals no failures, IEEE Transactions on Computers, 51:1, (12), Online publication date: 1-Jan-2002.
  84. Dimitrakos T A service-oriented trust management framework Proceedings of the 2002 international conference on Trust, reputation, and security: theories and practice, (53-72)
  85. Heisel M, Pfitzmann A and Santen T Confidentiality-Preserving Refinement Proceedings of the 14th IEEE workshop on Computer Security Foundations
  86. Fault-Tolerant Static Scheduling for Real-Time Distributed Embedded Systems (Extended Abstract) Proceedings of the The 21st International Conference on Distributed Computing Systems
  87. Cunha J, Maia R, Rela M and Silva J A Study of Failure Models in Feedback Control Systems Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), (314-326)
  88. Bernardi S and Donatelli S Performance Validation of Fault-Tolerance Software Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS), (379-388)
  89. ACM
    Littlewood B and Strigini L Software reliability and dependability Proceedings of the Conference on The Future of Software Engineering, (175-188)
  90. ACM
    Jonsson E, Strömberg L and Lindskog S On the functional relation between security and dependability impairments Proceedings of the 1999 workshop on New security paradigms, (104-111)
  91. Schiller F and Schröder J (1999). Combining qualitative model-based diagnosis and observation within fault-tolerant systems, AI Communications, 12:1-2, (79-98), Online publication date: 1-Jan-1999.
  92. Troubitsyna E (1999). Reliability assessment through probabilistic refinement, Nordic Journal of Computing, 6:3, (320-342), Online publication date: 1-Sep-1999.
  93. Cherif A and Katayama T (1998). Replica Management for Fault-Tolerant Systems, IEEE Micro, 18:5, (54-65), Online publication date: 1-Sep-1998.
  94. ACM
    Carreira J and Silva J (1998). Why do some (weird) people inject faults?, ACM SIGSOFT Software Engineering Notes, 23:1, (42-43), Online publication date: 1-Jan-1998.
  95. ACM
    Pinho L and Vasques F Multi-μ Proceedings of the 1998 annual ACM SIGAda international conference on Ada, (52-60)
  96. ACM
    Pinho L and Vasques F (1998). Multi-μ, ACM SIGAda Ada Letters, XVIII:6, (52-60), Online publication date: 1-Nov-1998.
  97. ACM
    Jonsson E An integrated framework for security and dependability Proceedings of the 1998 workshop on New security paradigms, (22-29)
  98. ACM
    Foley S Evaluating system integrity Proceedings of the 1998 workshop on New security paradigms, (40-47)
  99. Gong L (1997). Java Security, IEEE Micro, 17:3, (14-19), Online publication date: 1-May-1997.
  100. Vermesan A Quality assessment of knowledge-based software Proceedings of the 3rd International Software Engineering Standards Symposium (ISESS '97)
  101. ACM
    Daran M and Thévenod-Fosse P (1996). Software error analysis, ACM SIGSOFT Software Engineering Notes, 21:3, (158-171), Online publication date: 1-May-1996.
  102. ACM
    Daran M and Thévenod-Fosse P Software error analysis Proceedings of the 1996 ACM SIGSOFT international symposium on Software testing and analysis, (158-171)
  103. ACM
    Jøsang A The right type of trust for distributed systems Proceedings of the 1996 workshop on New security paradigms, (119-131)
  104. ACM
    Bertolino A and Strigini L Using testability measures for dependability assessment Proceedings of the 17th international conference on Software engineering, (61-70)
  105. Watanabe A and Sakamura K Improving design dependability based on the TRON loose standardization approach Proceedings of the The 12th TRON Project International Symposium, 1995
  106. Guthoff J Combining Software-Implemented and Simulation-Based Fault Injection into a Single Fault Injection Method Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
  107. Chillarege R, Biyani S and Rosenthal J Measurement of Failure Rate in Widely Distributed Software Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
  108. Messaros R On the Development of Fault-Tolerant On-Board Control Software and Its Evaluation by Fault Injection Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
  109. Steininger A and Schweinzer H A Model for the Analysis of the Fault Injection Process Proceedings of the Twenty-Fifth International Symposium on Fault-Tolerant Computing
  110. Powell D (1994). Distributed Fault Tolerance, IEEE Micro, 14:1, (36-47), Online publication date: 1-Feb-1994.
  111. Iyenghar P, Wessels S, Noyer A, Pulvermueller E and Westerkamp C A novel approach towards model-driven reliability analysis of Simulink models 2016 IEEE 21st International Conference on Emerging Technologies and Factory Automation (ETFA), (1-6)
Contributors
  • University of Toulouse
  • University of California, Los Angeles
  • Vienna University of Technology

Recommendations