Journal Articles 2020(1 publication) [publication]Cerveira, F. and Barbosa, R. and Madeira, H. and Araujo, F. , "The Effects of Soft Errors and Mitigation Strategies for Virtualization Servers", IEEE Transactions on Cloud Computing, 2020 2018(2 publications) [publication]Barbosa, R. and Cerveira, F. and Gonçalo, L. and Madeira, H. , "Emulating representative software vulnerabilities using field data", Springer Computing, vol. 101, pp. 119-138, 2018 [publication]Madeira, H. and Castelo-Branco, M. and Duarte, C. and Castelhano, J. , "The role of the insula in intuitive expert bug detection in computer code: an fMRI study", Brain Imaging and Behavior, vol. 12, pp. 1-15, 2018 2016(1 publication) [publication]Natella, R. and Cotroneo, D. and Madeira, H. , "Assessing Dependability with Software Fault Injection: A Survey", ACM Computing Surveys, vol. 48, pp. 1-57, 2016 2015(3 publications) [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Marco Vieira and Madeira, H. , "A Benchmarking Process to Assess Software Requirements Documentation for Space Applications", Journal of Systems and Software (JSS), vol. 100, 2015 [publication]Costa, J.P. and Silva, J.G. and Madeira, H. , "Practical and Representative Faultloads for Large-Scale Software Systems", Journal of Systems and Software, vol. 103, pp. 182-197, 2015 [publication]Costa, P. .N.d. and Silva, J.G. and Madeira, H. , "Practical and representative faultloads for large-scale software systems", Journal of Systems and Software, vol. 103, pp. 182-197, 2015 2014(3 publications) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "A Technique for Deploying Robust Web Services", IEEE Transactions on Services Computing, vol. 47, 2014 [publication]José Fonseca and Seixas, N. and Marco Vieira and Madeira, H. , "Analysis of Field Data on Web Security Vulnerabilities", IEEE Transactions on Dependable and Secure Computing, vol. 11, 2014 [publication]José Fonseca and Marco Vieira and Madeira, H. , "Evaluation of Web Security Mechanisms using Vulnerability & Attack Injection", IEEE Transactions on Dependable and Secure Computing, vol. 11, 2014 2013(1 publication) [publication]Joao Duraes and Madeira, H. and Cotroneo, D. and Natella, R. , "On Fault Representativeness of Software Fault Injection", IEEE Transactions on Software Engineering, vol. 39, pp. 80-96, 2013 2012(3 publications) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "A Robustness Testing Approach for SOAP Web Services", Journal of Internet Services and Applications (JISA), 2012 [publication]Raquel Almeida and Vieira, J. and Marco Vieira and Madeira, H. and Jorge Bernardino , "Cost-Effective Data Allocation in Data Warehouse Striping", International Journal of Database Management Systems (IJDMS), ISSN: 0975-5705 (online) - 0975-5985 (print), vol. 4, 2012 [publication]Natella, R. and Cotroneo, D. and Madeira, H. , "On Fault Representativeness of Software Fault Injection", IEEE Transactions on Software Engineering, vol. 39, pp. 80-96, 2012 2008(1 publication) [publication]Pintér, G. and Madeira, H. and Marco Vieira and Majzik, I. and Pataricza, A. , "Integration of OLAP and Data Mining for Analysis of Results from Dependability Evaluation Experiments", in International Journal of Knowledge Management Studies (IJKMS), Volume 2 Issue 4, 2008 [citation][year=2010]1. F. Bourennani, G.M. Rizvi, D. Ross, D., "Plastic color mismatch causes identification using OLAP and data mining", 2010 Fifth International Conference on Digital Information Management, ICDIM 2010, Thunder Bay, Ontario, Canada, July 2010. [citation][year=2010]2. Piotr Gawkowski, Monika A. Kuczy?ska, Agnieszka Komorowska, "Fault Effects Analysis and Reporting System for Dependability Evaluation", Seventh International Conference on Rough Sets and Current Trends in Computing, RSCTC 2010, Warsaw, Poland, June 2010. 2006(1 publication) [publication]Joao Duraes and Madeira, H. , "Emulation of Software Faults: A Field Data Study and a Practical Approach", IEEE Transactions on Software Engineering, vol. 32, pp. 849-867, 2006 [citation][year=2009]Kai Pan, Sunghun Kim, and E. James Whitehead, Jr. "Toward Understanding of Bug Fix Patterns." Empirical Software Engineering, 14(3):286-315, June 2009. [citation][year=2008]Raul Barbosa, "Layared Fault Tolerance for Distributed Embedded Systems?, tese de doutoramento, Chalmers University, Suécia, 2008. [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2008]Gabriella Carrozza, "Software Faults Diagnosis in Complex, OTS-Based, Critical Systems?, PhD Thesis, "FEDERICO II? University of Naples, Naples, Italy, November, 2008. [citation][year=2008]Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou, "A PIN-Based Dynamic Software Fault Injection System", The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp.2160-2167, 18-21 November, 2008. 2005(2 publications) [publication]Marco Vieira and Joao Duraes and Madeira, H. , "Especificação e Validação de Benchmarks de Confiabilidade para Sistemas Transaccionais (How to Specify and Validate Dependability Benchmarks for Transactional Systems)", Revista IEEE América Latina (IEEE Latin America Transactions), ISSN 1548-0992, 2005 [citation][year=2007]1. José Maria Monteiro, Sérgio Lifschitz, Ângelo Brayner, “Extraindo Metadados de SGBDs”, Monografias em Ciência da Computação n° XX/07, ISSN 0103-9741, Departamento de Informática, Pontifícia Universidade Católica do Rio De Janeiro, December 2007. [citation][year=2007]2. Nádia Félix Felipe da Silva, “Armazenamento de Dados XML: Técnicas de Benchmark para avaliação”, Final Project, Bachelor in Computer Science, Universidade Federal de Goiás, Brazil, 2007. [citation][year=2006]1. Ricardo Czelusniak da Silva, “Benchmark em Banco de Dados Multimídia: Análise de Desempenho em Recuperação de Objetos Multimídia”, MSc Thesis, Federal University of Paraná, Curitiba, Brazil, 2006. [publication]Prata, P. and Mario Zenha-Rela and Madeira, H. and Silva, J.G. , "Robust Assertions and Fail-Bounded Behavior", Journal of the Brazilian Computer Society (Special Issue on Dependable Computing), 2005 2004(1 publication) [publication]Marco Vieira and Madeira, H. , "Joint Evaluation of Recovery and Performance of a COTS DBMS in the Presence of Operator Faults", Performance Evaluation Journal, 2004 [citation][year=2013]Madhu Jain, "Availability prediction of imperfect fault coverage system with reboot and common cause failure", International Journal of Operational Research, Vol. 17 Issue 3, June 2013. [citation][year=2007]1. Salvatore Orlando, “Software Aging Analysis of Off The Shelf Software Items”, PhD Thesis, “FEDERICO II” University of Naples, Naples, Italy, October 2007. 2003(1 publication) [publication]Joao Duraes and Madeira, H. , "Multidimensional Characterization of the Impact of Faulty Drivers on the Operating Systems Behavior", Transactions of IEICE (Institute of the Electronics, Information and Communication Engineers), 2003 [citation][year=2009]Constantin Sarbu, "Operational Pro_ling of OS Drivers?, PhD thesis, University of Darmstadt, Alemanha, 2009 [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2007]Andras Johansson, Neeraj Suri, Brendan Murphy "On the Selection of Error Model(s) For OS Robustness Evaluation?, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Edinburgo, Reino Unido, 25-28 de Junho de 2007. [citation][year=2005]Andréas Johansson and Neeraj Suri, "Error Propagation Profiling of Operating Systems?, IEEE/IFIP International Conference on Dependable Systems and Networks, Performance and Dependability Symposium, DSN-PDS 2005, Yokohama, Japão, 28 de Junho a 1 de Julho de 2005. 2002(1 publication) [publication]Jorge Bernardino and Furtado, P. and Madeira, H. , "Approximate Query Answering Using Data Warehouse Striping", Journal of Intelligent Information Systems- Integrating Artificial Intelligence and Database Technologies, vol. 19, 2002 [citation][year=2013]1 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Handling big dimensions in distributed data warehouses using the DWS technique http://dl.acm.org/citation.cfm?id=1031770 M Costa, H Madeira Proceedings of the 7th ACM international … 2004 dl.acm.org 2 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 DWS-AQA: A cost effective approach for very large data warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1029676 J Bernardino, P Furtado… Database Engineering and … 2002 ieeexplore.ieee.org 3 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Providing ranked cooperative query answers using the metricized knowledge abstraction hierarchy http://www.sciencedirect.com/science/article/pii/S095741740500357X MK Shin, SY Huh, W Lee Expert Systems with Applications 2007 Elsevier 4 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Method using a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921131&id=JhlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,131 2011 Google Patents 5 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 A middle layer for distributed data warehouses using the DWS-AQA technique. http://solutions.criticalsoftware.com.br/upload_product/wp/A_middle_layer_for_distributed_data_warehouses_using_the_DWS-AQA_technique.pdf M Costa, J Vieira, J Bernardino, P Furtado… … 2003 solutions.criticalsoftware.com.br 6 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Algorithms for efficient processing of complex queries in node-partitioned data warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1319785 P Furtado … and Applications Symposium, 2004. IDEAS'04. … 2004 ieeexplore.ieee.org 7 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Efficient compression of text attributes of data warehouse dimensions http://link.springer.com/chapter/10.1007/11546849_35 J Vieira, J Bernardino, H Madeira Data Warehousing and Knowledge … 2005 Springer 8 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Scalable Query Infrastructure http://www.google.com/patents?hl=en&lr;=&vid=USPATAPP11537476&id=qyOoAAAAEBAJ&oi=fnd&printsec=abstract A Rowstron, R Mortier, A Donnelly… US Patent App. 11/ … 2006 Google Patents 9 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 System of a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7860865&id=w0bwAAAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,860,865 2010 Google Patents 10 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Accuracy estimation in approximate query processing http://www.wseas.us/e-library/conferences/2010/Corfu/COMPUTERS/COMPUTERS2-08.pdf C Dell'Aquila, F Di Tria, E Lefons… Proceedings of the 14th … 2010 wseas.us 11 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 [CITATION][C] u-?? ???? ?? ??????? ???? ?? ??? ?? Link/NA ??? ?????????????? 2006 ??????????? 12 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Data warehouse access using multi-agent system http://link.springer.com/article/10.1007/s10619-009-7036-9 N Kolsi, A Abdellatif, K Ghedira Distributed and Parallel Databases 2009 Springer 13 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Building OLAP tools over large databases http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.109.4447&rep=rep1&type=pdf R Oliveira, J Bernardino Proceedings of IADIS Virtual Multi Conference 2006 Citeseer 14 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Metrics for approximate query engine evaluation http://dl.acm.org/citation.cfm?id=2245448 F Di Tria, E Lefons, F Tangorra Proceedings of the 27th Annual ACM … 2012 dl.acm.org 15 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Probabilistic model for accuracy estimation in approximate monodimensional analyses http://www.wseas.us/e-library/transactions/computers/2010/88-281.pdf C Dell'Aquila, F Di Tria, E Lefons… WSEAS Transactions on … 2010 wseas.us 16 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Multi agent systems in distributed datawarehousing http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5640491 TP Latchoumi, R Sunitha Computer and Communication … 2010 ieeexplore.ieee.org 17 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries http://www.proceedings2006.imcsit.org/pliks/122.pdf M Gorawski, E P?uciennik Proceedings of the … 2006 proceedings2006.imcsit.org 18 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Exploiting data access for dynamic fragmentation in data warehouse http://inderscience.metapress.com/index/N2583608V2G35686.pdf H Derrar, M Ahmed?Nacer, O Boussaid International Journal of … 2013 Inderscience 19 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 An Analysis of Data Warehouse Research http://www.academic-journals.org/EC/v4n1-2006-spring/ECSv4n1p1.pdf HY Lin, PY Hsu, YM Su Electronic Commerce Studies 2006 academic-journals.org 20 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 System and method for adding a storage server in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT8214388&id=hHMfAgAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 8,214,388 2012 Google Patents 21 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Method for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921087&id=5BRzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,087 2011 Google Patents 22 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 System for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921132&id=JxlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,132 2011 Google Patents 23 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 AGENT BASED DATA STORAGE AND DISTRIBUTION IN DATA WAREHOUSES http://www.worldscientific.com/doi/abs/10.1142/S0218194008003842 N Kolsi, A Abdellatif, K Ghedira International Journal of Software … 2008 World Scientific 24 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Data Warehouse System Evaluation and Selection Decisions http://thesis.lib.ncu.edu.tw/ETD-db/ETD-search/view_etd?URN=91441002 HY Lin Publication/NA 2006 thesis.lib.ncu.edu.tw 25 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 The F&A Methodology and Its Experimental Validation on a Real-Life Parallel Processing Database System http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6245571 L Bellatreche, S Benkrid, A Crolotte… … (CISIS), 2012 Sixth … 2012 ieeexplore.ieee.org 26 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Cost-Effective Data Allocation in Data Warehouse Striping http://www.doaj.org/doaj?func=fulltext&aId=1177338 R Almeida, J Vieira, M Vieira, H Madeira… International … 2012 doaj.org 27 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 A Query Cache Tool for Optimizing Repeatable and Parallel OLAP Queries http://link.springer.com/chapter/10.1007/978-3-642-03573-9_11 RJ Santos, J Bernardino Database and Expert Systems Applications 2009 Springer 28 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Particle swarm optimisation for data warehouse logical design http://inderscience.metapress.com/index/74N7768848255414.pdf HÁ Derrar, M Ahmed?Nacer, O Boussaid International Journal of Bio- … 2012 Inderscience 29 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6340224 RJ Santos, J Bernardino… Computer Software and … 2012 ieeexplore.ieee.org 30 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 [CITATION][C] Uma Solução para Business Intelligence http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6340224 Authors/NA Publication/NA Year/NA Publisher/NA [citation][year=2009]Nader Kolsi, Abdelaziz Abdellatif, and Khaled Ghedira, "Data warehouse access using multi-agent system?, Journal of Distributed and Parallel Databases, Volume 25, Numbers 1-2 / April, 2009 [citation][year=2008]Kolsi, Nader, Abdellatif, Abdelaziz, Ghedira, Khaled, "Agent Based Data Storage and Distribution in Data Warehouses?, International Journal of Software Engineering and Knowledge Engineering. Vol. 18, no. 5, pp. 597-617. Aug. 2008 [citation][year=2006]Marcin Gorawski, Ewa Płuciennik, "Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries?, proceedings of the International Multiconference on Computer Science and Information Technology, pp. 243 " 252, 2006 [citation][year=2006]Hua-Yang Lin, "Data Warehouse System Evaluation and Selection Decisions?, PhD thesis, 2006 (http://thesis.lib.ncu.edu.tw/ETD-db/ETD-search/getfile?URN=91441002&filename=91441002.pdf). 1998(1 publication) [publication]Carreira, J. and Madeira, H. and Silva, J.G. , "Xception: A technique for the evaluation of dependability in modern Computers", IEEE Transactions on Software Engineering, vol. 24, pp. 125-136, 1998 [citation][year=2009]Mithun Puthige Acharya, "Mining API Specifications from Source Code for Improving Software Reliability?, PhD Thesis North Carolina State University, EUA, 2009 [citation][year=2009]Thomas Naughton, Wesley Bland, Geoffroy Vallee, Christian Engelmann, Stephen L. Scott , "Fault injection framework for system resilience evaluation: fake faults for finding future failures?, High Performance Distributed Computing, Proceedings of the 2009 workshop on Resiliency in high performance, Garching, Germany, 2009 [citation][year=2008]Olivier Faurax, "ÿvaluation par simulation de la sécurité des circuits face aux attaques par faute?, Tese de doutoramento, l"Université de la Méditerranée, 2008 [citation][year=2008]Pierre Vanhauwaert, "Analyse de Surete par Injection de Fautes Dans un Environnement de Prototypage a Base de FPGA?, PhD thesis, Institut Polytechnique de Grenoble, 2008 [citation][year=2008]Alexander Gordeyev, Vyacheslav Kharchenko, Anton Andrashov, Boris Konorev, Vladimir Sklyar, and Artem Boyarchuk, "Case-based software reliability assessmentby fault injection unified procedures?, SEESE '08: ACM Proceedings of the 2008 international workshop on Software Engineering in east and south Europe, Leipzig, Germany, 2008 [citation][year=2008]A. Da Silva J. F. Martínez L. López A. B. García V. Hernández, "XML schema based faultset definition to improve faults injection tools interoperability?, Third International Conference on Dependability of Computer Systems DepCoS-RELCOMEX 2008 [citation][year=2008]Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift, "Analyzing the Effects of Disk-Pointer Corruption?, Proceedings of the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN'08), Anchorage, AK, USA, June 2008 [citation][year=2008]Michael Le, Andrew Gallagher, Yuval Tamir, "Challenges and Opportunities with Fault Injection in Virtualized Systems?, First International Wor kshop on Virtualization Performance: Analysis, Characterization, and Tools, Austin, Texas, April 2008 [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008. [citation][year=2008]Gabriella Carrozza, "Software Faults Diagnosis in Complex, OTS-Based, Critical Systems?, PhD Thesis, "FEDERICO II? University of Naples, Naples, Italy, November, 2008. [citation][year=2008]Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou, "A PIN-Based Dynamic Software Fault Injection System", The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp.2160-2167, 18-21 November, 2008. [citation][year=2007]S. Potyra, V. Sieh, M. Dal Cin, "Evaluating fault-tolerant system designs using FAUmachine?, ACM Proceedings of the 2007 workshop on Engineering Fault Tolerant Systems, Dubrovnik, Croatia, 2007. [citation][year=2007]WU Lei, LI Xin-ke, WANG Hong, "Research on the Reliability Testing of Web Services Based on Fault Injection Technology?, Journal of Chinese Computer Systems, Vo1 28, No1, 2007. [citation][year=2007]Marta Portela García, "Técnicas de inyección de fallos basadas en FPGAs para la evaluación de la tolerancia a fallos de tipo SEU en circuitos digitales?, tese de doutoramento, Universidad Carlos III de Madrid, 2007 [citation][year=2007]David de Andrés Martínez, "Speeding-Up Model-Based Fault Injection of Deep-Submicron Cmos Fault Models Through Dynamic and Partially Reconfigurable FPGAS?, PhD Thesis, University of Valencia, 2007 [citation][year=2007]Antonio da Silva, José-F Martínez, Lourdes López, Luís Redondo, "Exhaustif®: a fault injection tool for distributed heterogeneous embedded systems?, Proceedings of the 2007 Euro American conference on Telematics and Information Systems, ACM, Faro, Portugal, 2007 [citation][year=2007]LI Ai-guo, HONG Bing-rong, WAN Si, "SAVIE: An environment for identifying vulnerabilities in software?, Journal of Communication and Computer, ISSN1548-7709, Volume 4, No.5 (Serial No.30), USA, May 2007 [citation][year=2007]Cyrille Artho, Armin Biere, and Shinichi Honiden, "Exhaustive Testing of Exception Handlers with Enforcer?, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, Volume 4709/2007, book Formal Methods for Components and Objects, 2007. [citation][year=2007]Daniel Larsson and Reiner Hähnle, "Symbolic Fault Injection?, VERIFY'07, colocated with Conference on Automated Deduction (CADE), Bremen, Germany, 2007. [citation][year=2007]E. Touloupis, J. A. Flint, V. A. Chouliaras, and D. Ward, "Study of the Effects of SEU-Induced Faults on a Pipeline Protected Microprocessor?, IEEE Transactions on Computers, Vol. 56, issue 12, December 2007. [citation][year=2007]M. Portela-Garcia, C. Lopez-Ongil, M. Garcia-Valderas "A Rapid Fault Injection Approach for Measuring SEU Sensitivity in Complex Processors?, 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 2007. [citation][year=2007]Israel Koren and C. Mani Krishna. Fault-tolerant Systems. Morgan Kaufmann, 2007. [citation][year=2007]S. K. Kim, J. Choi, D. Lee, S. H. Noh, S. L. Min, "Virtual framework for testing the reliability of system software on embedded systems?, Proceedings of the 2007 ACM symposium on Applied computing, Seoul, Korea, 2007. [citation][year=2007]A. Benso, A. Bosio, S. D. Carlo, R. Mariani, "A Functional Verification based Fault Injection Environment?, International Symposium on Defect and Fault-Tolerance in VLSI Systems, Rome, Italy, Setembro 2007. [citation][year=2007]M. Alsaeed, N. A. Speirs, "A Wide Area Network Emulator for CORBA Applications?, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07), pp. 359-364, May 7-9, 2007. [citation][year=2006]Roshan G. Ragel, "Architectural Support for Security and Reliability in Embedded Processors?, PhD thesis, The University of New South Wales, Austrália, 2006 [citation][year=2006]Mohammod Shamim Hossain, "Web Service Based Software Implemented Fault Injection?, Information Technology Journal, 138-143, 2006 [citation][year=2006]Donald Shawa, Dhamin Al-Khalilib, "Automatic generation of defect injectable VHDL fault models for ASIC standard cell libraries?, Integration, the VLSI Journal, Volume 39, Issue 4, July 2006, Pages 382-406 [citation][year=2006]B. Nicolescu, N. Ignat, Y. Savaria, G. Nicolescu, "Analysis of Real-Time Systems Sensitivity to Transient Faults Using MicroC Kernel?, IEEE Transactions on Nuclear Science, VOL. 53, NO. 4, AUGUST, 2006 [citation][year=2006]G. Lukawski, K. Sapiecha, "Software Functional Fault Injector for SDDS?, GI-Edition Lectures Notes on Informatics, ARCS"06 Workshop proceedings, 2006 [citation][year=2006]U. Wappler, C. Fetzer, G. Dresden, "Hardware fault injection using dynamic binary instrumentation: FITgrind?, Sixth European Dependable Computing Conference (EDCC-6), vol. vol. Proceedings Supplemental Volume, October 2006, pp. 37"38. [citation][year=2006]Joost Visser, J.N. Oliveira, L.S. Barbosa, J.F. Ferreira, and A. Mendes, Camila Revival: VDM meets Haskell. In Fitzgerald, J. S., Larsen, P. G., Plat, N. (eds.), Towards Next Generation Tools for VDM: Contributions to the First International Overture Workshop, Newcastle, July 2005, Technical Report CS-TR969, School of Computing Science, Newcastle University, June 2006 [citation][year=2006]Christian Kobhio Bassek, Samuel Pierre and Alejandro Quintero, "Redundancy Schemes for High Availability Computer Clusters?, Journal of Computer Science 2 (1): 33-47, ISSN 1549-3636, 2006. [citation][year=2006]M. Sonza Reorda, L. Sterpone, M. Violante, M. Portela-Garcia, C. Lopez-Ongil, L. Entrena, "Fault Injection-based Reliability Evaluation of SoPCs," ets, pp. 75-82, Eleventh IEEE European Test Symposium (ETS'06), 2006. [citation][year=2006]V. Wong and M.Horowitz. Soft Error Resilience of Probabilistic Inference Applications. The Second Workshop on System Effects of Logic Soft Errors (SELSE), April 2006. [citation][year=2006]J. Sosnowski, P. Gawkowski, P. Zygulski, A. Tymoczko, "Enhancing Fault Injection Testbench," depcos-relcomex, pp. 76-83, International Conference on Dependability of Computer Systems (DEPCOS-RELCOMEX'06), 2006. [citation][year=2006]Daniel Larsson, "Formal Specification and Verification of Safety-Critical Software?, Thesis for the degree of Licentiate of Philosophy, Department of Computer Science and Engineering, Chalmers University of Technology and Goteborg University, SE-412 96 G¨oteborg, Sweden, October 2006. [citation][year=2006]Nuno Neves, Joao Antunes, Miguel Correia, Paulo Verissimo, Rui Neves, "Using Attack Injection to Discover New Vulnerabilities," dsn, pp. 457-466, International Conference on Dependable Systems and Networks (DSN'06), 2006. [citation][year=2006]CK Bassek, S Pierre, A Quintero, "Redundancy Schemes for High Availability Computer Clusters?, Journal of Computer Science Science 2 (1): 33-47, ISSN 1549-3636, 2006. [citation][year=2006]Jun Jie, Huang Qing-Cheng, Hong Bingmrong, Li Yuan, "Test Fault Sensitivity of a Digital Processor by a Pure Software Approach?, Journal of Astronautics Vo1. 27 No1, January 2006. [citation][year=2006]Cheng-Chun Tu, "Modeling Component Failures in Embedded Systems?, Master's Thesis, International Master´s Program in Dependable Computer Systems, Chalmers University of Technology, Department of Computer Science and Engineering, Goteborg, Sweden, 2006. [citation][year=2005]H. Schlingloff, S. Vulinovic, "Model based dependability evaluation for automotive control functions?, In SimSafe05, Modeling and simulation for public safety, P. Fritzson (ed.), Linköping, May 2005. [citation][year=2005]Alexandersson, Ruben; ÿhman, Peter: A technique for fault tolerance assessment of COTS. International Conference on Computer Safety, Reliability and Security (SAFECOMP), 2005. [citation][year=2005]P. Gawkowski, J. Sosnowski, "Analysing system susceptibility to faults with simulation tools?, XXI Autumn Meeting of Polish Information Processing Society, ISBN 83-922646-0-6, pp. 87-94, PIPS, 2005 [citation][year=2005]N. Looker, M. Munro, J. Xu, "A Comparison of Network Level Fault Injection with Code Insertion?, 29th Annual International Computer Software and Applications Conference, (COMPSAC), 2005. [citation][year=2005]Pete Broadwell Emil Ong, "A Comparison of Static Analysis and Fault Injection Techniques for Developing Robust System Services?, University of Berkely, Tech. Report. http://www.cs.berkeley.edu/~emilong/research/saswifi.pdf, 2005. [citation][year=2005]Q. Xie and A. M. Memon, "Rapid crash testing for continuously evolving GUI-based software applications?, In Proceedings of The International Conference on Software Maintenance, (ICSM'05), 2005. [citation][year=2005]Martin Hiller, Arshad Jhumkas, and Neeraj Suri, "Tracking the Propagation of Data Errors in Software?, Dependable Computing Systems. Edited by Hassan B. Diab and Albert Y. Zomaya, ISBN 0-471-67422-2 John Wiley & Sons, Inc., 2005. [citation][year=2005]Denise Eng, Dimitri Mostinski, and Martin Talbot, "Feasibility and Practical Considerations of Database Self-Managing Technologies?, CS848 Final Project, University of Waterloo, Waterloo, ON, Canada, 2005 (http://www.cs.uwaterloo.ca/~m2talbot/project/CS848-FINAL%20PROJECT.pdf). [citation][year=2005]Joost Visser, J.N. Oliveira, L.S. Barbosa, J.F. Ferreira, and A. Mendes, "Camila Revival: VDM meets Haskell?, In Nico Plat and Peter Gorm Larsen, editors, Overture Workshop (co-located with FM'05), University of Newcastle upon Tyne, UK, July, 2005. [citation][year=2005]R. Moraes, E. Martins, N. Mendes, "Fault injection approach based on dependence analysis?, Computer Software and Applications Conference, 2005. COMPSAC 2005. 29th Annual International, 26-28 July 2005 [citation][year=2005]Hassan Salmani, Seyed Ghassem Miremadi, "Contribution of Controller Area Network Controllers to Masquerade Failures?, in Proc. Of 11th IEEE International Symposium Pacific Rim Dependable Computing, PRDC2005, Changsha, Hunan, China, December 2005. [citation][year=2005]Cristian Constantinescu, Intel Corporation, "Dependability Benchmarking Using Environmental Test Tools?, Proceedings of IEEE Reliability and Maintainability Symposium, RAMS 2005. [citation][year=2005]Juan Pardo, Juan Carlos Ruiz, Jose-Carlos Campelo and Pedro Gil, "A Non-Intrusive SWIFI Technique for RTOS Robustness Testing", in 5th European Dependable Computing Conference, Budapest (Hungary) April 2005. [citation][year=2004]Nik Looker, Malcolm Munro and Jie Xu, "Simulating Errors in Web Services?, International Journal of Simulation: Systems, Sciences and Technology, Vol. 5 No. 5. 29, 2004. [citation][year=2004]Ana " Elena Rugina, "Etalonnage de la sûreté de fonctionnement de systèmes d"exploitation?, Stage de Recherche, Institut National Polytechnique de Toulouse, Ecole Nationale Supérieure d"Electrotechnique, d"Electronique, d"Informatique, d"Hydraulique Et des Télécommunications, 2004. [citation][year=2004]Siewiorek, D.P., Chillarege, R., and, Kalbarcyk. (2004) "Reflections on Industry Trends and Experimental research in Dependability?, IEEE Transactions on Dependable and Secure Computing, Volume 1, Number 2, pp. 109 " 127. IEEE Computer Society, 2004. [citation][year=2004]N. Looker, M. Munro and J. Xu, "Testing Web Services", the 16th IFIP International Conference on Testing of Communicating Systems, Oxford, 2004 [citation][year=2004]H. R. Zarandi, S. G. Miremadi, S. Hessabi, A. Ejlali, "A Mixed-Mode Simulation-based Environment to Test and Dependability Assessment of HDL Models?, in the Proceedings of International Conference on Embedded Systems and Applications (ESA 2004), USA, June 2004. [citation][year=2004]Fetzer C, Felber P, Hogstedt K "Automatic detection and masking of nonatomic exception handling" IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 30 (8): 547-560 AUG 2004. [citation][year=2004]Rajabzadeh, A.; Miremadi, S.G.; Mohandespour, M.; "Experimental evaluation of master/checker architecture using power supply-and software-based fault injection" On-Line Testing Symposium, 2004. IOLTS 2004. Proceedings. 10th IEEE International , 12-14 July 2004, Pages:239 - 244. [citation][year=2004]W Gu, Z Kalbarczyk, RK Iyer "Error Sensitivity of the Linux Kernel Executing on PowerPC G4 and Pentium 4 Processors" Dependable Systems and Networks, 2004 International Conference on , 28 June-1 July 2004. [citation][year=2004]Albinet, A.; Arlat, J.; Fabre, J.-C.; "Characterization of the impact of faulty drivers on the robustness of the Linux kernel" Dependable Systems and Networks, 2004 International Conference on , 28 June-1 July 2004, Pages:867 - 876. [citation][year=2004]Bertrand Bastien "A Technique for Performing Fault Injection in System Level Simulations for Dependability Assessment" MSc Thesis, Univ. of Virginia, USA; January 2004. [citation][year=2004]D. Gil, J. Garcia, and P. Gil, "Analysis of the influence of processor hidden registers on the accuracy of fault injection techniques? Ninth IEEE International High-Level Design Validation and Test Workshop. 10-12 Nov. 2004. [citation][year=2003]1. Peter Folkesson, Joakim Aidemark, snd Jonny Vinter, "Assessment and Application of Scan-Chain Implemented Fault Injection?, Technical Report 03-21, (27 pages) Chalmers University of Technology, Department of Computer Engineering, Göteborg, Sweden, 2003. [citation][year=2003]2. Gawkowski P, Sosnowski J "Dependability evaluation with fault injection experiments" IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS E86D (12): 2642-2649 DEC 2003 [citation][year=2003]3. Zarandi, H.R.; Miremadi, S.G.; Ejlali, A.; "Fault injection into verilog models for dependability evaluation of digital systems" Parallel and Distributed Computing, 2003. Proceedings. Second International Symposium on , 13-14 Oct. 2003, Pages:281 - 287. [citation][year=2003]4. Pedro Yuste, Juan Carlos Ruiz, Lenin Lemus, Pedro Gil "Non-intrusive Software-Implemented Fault Injection in Embedded Systems" Proc. First Latin-American Symposium on Dependable Computing, LADC 2003, 2003, October 2003, So Paulo, Brazil: Springer Verlag, Lecture Notes in Computer Science, LNCS 2847: p. 23-38, ISBN 3-540-20224-2. [citation][year=2003]5. Rajesh Venkatasubramanian; Hayes, J.P.; Murray, B.T.; "Low-cost on-line fault detection using control flow assertions" On-Line Testing Symposium, 2003. IOLTS 2003. 9th IEEE , 7-9 July 2003, Pages:137 - 143. [citation][year=2003]6. Ahyoung Sung, Byoungju Choi, "Interaction Testing in an Embedded System using Hardware Fault Injection and Program Mutation," Formal Approaches to Testing of Software(FATES'03) of the 18th IEEE ASE(Automated Software Engineering)'2003, Quebec Canada, 2003.10. [citation][year=2003]7. Jean Arlat, Yves Crouzet, Johan Karlsson, Peter Folkesson, Emmerich Fuchs, Günther Leber "Comparison of Physical and Software-Implemented Fault Injection Techniques" IEEE Transactions on Computers, Vol 52, No. 9, September 2003, pp. 1115-1133. [citation][year=2003]8. Ehret, Jürgen "Validation of Safety-Critical Distributed Real-Time Systems" PhD Thesis, Fakultät für Elektrotechnik und Informationstechnik , Technische Universität München , 2003. [citation][year=2003]9. P. Yuste, D. Andrés, L. Lemus, J. Serrano, and P. Gil, "INERTE: Integrated NExus-based real-time fault injection tool for embedded systems", EEE/IFIP International Conference on Dependable Systems and Networks, International Performance and Dependability Symposium, DSN-IPDS 2003, San Francisco, CA, USA, June 22-25, 2003. [citation][year=2003]10. P. Yuste, L. Lemus, J. Serrano, and P. Gil, "A methodology for software implemented fault injection using Nexus", Supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, Dependable Computing and Communications, DSN-DCC 2003, San Francisco, CA, USA, pp. B-12-B-13, June 22-25, 2003. [citation][year=2003]11. A. Ejlali, S. G. Miremadi, H. Zarandi, G. Asadi, "A hybrid fault injection approach based on simulation and emulation co-operation", EEE/IFIP International Conference on Dependable Systems and Networks, International Performance and Dependability Symposium, DSN-IPDS 2003, San Francisco, CA, USA, pp. 479-488, June 22-25, 2003. [citation][year=2003]12. Weining Gu, Z. Kalbarczyk, R. Iyer, Z. Yang, "Characterization of linux kernel behavior under errors", IEEE/IFIP International Conference on Dependable Systems and Networks, International Performance and Dependability Symposium, DSN-IPDS 2003, San Francisco, CA, USA, pp. 459-468, June 22-25, 2003. [citation][year=2003]13. Cristof Fetzer, K. Hogstedt, and P. Felber, "Automatic detection and masking of non-atomic exceptions handling", IEEE/IFIP International Conference on Dependable Systems and Networks, Dependable Computing and Communications, DSN-DCC 2003, San Francisco, CA, USA, pp. 445-454, June 22-25, 2003. [citation][year=2003]14. T. Jarboui, "Surete de Fonctionnement de Systemes Informatiques " ÿtalonage et Representativite des Fautes?, tese de doutoramento de Tahar Jarboui, LAAS-CNRS, Toulouse, França., Maio de 2003, LAAS-CNRS, Toulouse, França. [citation][year=2003]15. Andreas Steininger, Babak Rahbaran, Thomas Handl, "Built-In Fault Injectors - The logical Continuation of BIST?" Proc. of First Workshop on Intelligent Solutions in Embedded Systems (WISES), 2003. pp. 187-196. Reserach Report 56/2003, Real-Time Systems Research Group at the Vienna University of Technology. [citation][year=2003]16. Constantinescu C., "Experimental evaluation of error-detection mechanisms", IEEE Transactions on Reliability, 52 (1): pp. 53-57, March 2003. [citation][year=2003]17. Raviteja Varanasi, "Software Faults and Fault Injection Models?, Project of the coursework for CSC53, Advanced Software Engineering, Lousiana Tech University, USA, 2003 [citation][year=2003]18. Markus Jochim, "Automatische Erzeugung und Bewertung virtueller Duplexsysteme zur Erkennung von Betriebsfehlern in Mikroprozessoren?, Doktor der Naturwissenschaften, Fachbereich 6 des Standorts Essen der Universit¨at Duisburg-Essen am 27.03.2003 [citation][year=2002]1. P. Gawkowski and J. Sosnowski, "Using Software Implemented Fault Inserter in Dependability Analysis", Pacific Rim International Symposium on Dependable Computing, PRDC2002, pp. 81-88,Tsukuba, Japão, 16 a 18 de Dezembro de 2002. [citation][year=2002]2. Astrit Ademaj "A Methodology for Dependability Evaluation of the Time-Triggered Architecture Using Software Fault Injection", Proc. of EDCC-4, Toulouse, October 2002, p. 172-190, LNCS 2002 [citation][year=2002]3. Rezgui S., Swift G. M., Velazco R., Farmanesh F. F., "Validation of an SEU simulation technique for a complex processor: PowerPC7400", IEEE Transactions on Nuclear Science, 49 (6): 3156-3162, Part 1, Dec. 2002. [citation][year=2002]4. Cardarilli, G.C.; Kaddour, F.; Leandri, A.; Ottavi, M.; Pontarelli, S.; Velazco, R.; "Bit flip injection in processor-based architectures: a case study" On-Line Testing Workshop, 2002. Proceedings of the Eighth IEEE International , 8-10 July 2002, Pages:117 - 127. [citation][year=2002]5. Broadwell, P., N. Sastry, J. Traupman. "FIG: A Prototype Tool for Online Verification of Recovery Mechanisms" Proc. Workshop on Self-Healing, Adaptive and Self-MANaged Systems (SHAMAN), New York, NY, June 2002. [citation][year=2002]6. Ademaj, A.; Grillinger, P.; Herout, P.; Hlavicka, J.; "Fault tolerance evaluation using two software based fault injection methods" On-Line Testing Workshop, 2002. Proceedings of the Eighth IEEE International , 8-10 July 2002, Pages:21 - 25. [citation][year=2002]7. Alberto Arazo, "Surete de Fonctionnement de Systemes Logiciels Critiques : Validation Experimentale d"un Systeme de Contrôle-Comande du Commerceâ?, tese de doutoramento, LAAS-CNRS, Toulouse, França, Julho de 2002. [citation][year=2002]8. E Marsden, JC Fabre, J Arlat "Dependability of CORBA Systems: Service Characterization by Fault Injection" Symposium on reliable distributed systems, Osaka, Japan, 2002 [citation][year=2002]9. Rezgui S., Velazco R., Ecoffet R., "New methodology for simulation of soft errors in digital processors", Journal of Spacecraft and Rockets, 39 (4): pp. 495-500, July-Aug., 2002. [citation][year=2002]10. John DeVale and Philip Koopman, "Robust Software - No More Excuses", EEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. 69-78, June 145-153, 2002 (best paper award). [citation][year=2002]11. M. Rodriguez, A. Albinet, and J. Arlat, "MAFALDA-RT, a tool for dependability assessment of real-time systems", EEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. 267-272, June 23-26, 2002. [citation][year=2002]12. M. Jochim, "Detecting processor hardware faults by means of automatically generated virtual duplex systems", EEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. 399-407, June 23-26, 2002. [citation][year=2002]13. E. Martins, C. Rubira, and N. Leme, "Jaca: a reflective fault injection tool based on patterns", EEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. 483-487, June 23-26, 2002. [citation][year=2002]14. E. Marsden, J-C. Fabre, and J. Arlat, "Characterization approaches for CORBA systems by fault injection", supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. G16-G25, June 23-26, 2002. [citation][year=2002]15. Jun Xu, Zbigniew Kalbarczyk and Ravishankar K. Iyer. "HiPerFI: A High-Performance Fault Injector". In Proc. of IEEE Intl' Conf. on Dependable Systems and Networks (Fast Abstract), Washington DC, June, 2002. [citation][year=2002]16. R. Velazco, S. Rezgui, R. Eccofet, "Predicting Error Rate for Microprocessor-Based Digital Architectures Through CEU Injection", ISSN 1292-862 TIMA Lab. Research Reports, TIMA-RR-02-02-6-FR, 2002. [citation][year=2002]17. Broadwell, P., N. Sastry and J. Traupman., "FIG: A Prototype Tool for Online Verification of Recovery Mechanisms.", Workshop on Self-Healing, Adaptive and self-MANaged Systems (SHAMAN), New York, NY, June 2002. [citation][year=2002]18. Arlat J, Fabre JC, Rodriguez M, et al. "Dependability of COTS microkernel-based systems" IEEE Trans Computers 51 (2): 138-163 FEB 2002 [citation][year=2002]19. Yangyang Yu, Barry W. Johnson, "A Perspective on the State of Research on Fault Injection Techniques", Center for Safety Critical Systems Departments of Electrical and Computer Engineer and Computer Science The University of Virginia Technical Report UVA-CSCS-FIT-001 Prepared for U.S. Nuclear Regulatory Commission, May 2002. [citation][year=2002]20. Hiller M., Jhumka A., Suri N. "PROPANE: An Environment for Examining the Propagation of Errors in Software" International Symposium on Software Testing and Analysis (ISSTA), ACM Press Software Engineering Notes, Vol. 27, No.4, pp. 81-85, 2002 [citation][year=2002]21. A. Ademaj, P. Grillinger, P. Herout, and J. Hlavicka. "Fault tolerance evaluation using two software based fault injection methodsâ?, In Proceedings of IEEE International On-Line Testing Workshop IOLTW, Isle of Benedor, France, 2002. ISBN 0-7695-1641-6. [citation][year=2001]1. John DeVale; "High Performance Robust Computer Systems" PhD Thesis, Carnegie Mellon University, October 2001. [citation][year=2001]2. Piotr Gawkowski and Janusz Sosnowski "Experimental Evaluation of Fault Handling Mechanisms" SAFECOMP 2001, Budapest, Hungary, September 26-28, 2001. [citation][year=2001]3. Sosnowski, J.; "Analyzing BIST robustness" Defect and Fault Tolerance in VLSI Systems, 2001. Proceedings. 2001 IEEE International Symposium on , 24-26 Oct. 2001, Pages:104 - 109 [citation][year=2001]4. Eric Marsden, Jean-Charles Fabre, "Failure analysis of an ORB in presence of faults", deliverable of the project IST-1999-11585, Dependable Systems of Systems - DSoS, October 2001. [citation][year=2001]5. Gawkowski, P.; Sosnowski, J. "Analyzing fault effects in fault insertion experiments" On-Line Testing Workshop, 2001. Proceedings. Seventh International , 9-11 July 2001, Pages:21 - 24 [citation][year=2001]6. John DeVale, Philip Koopman "Performance Evaluation of Exception Handling in I/O Libraries" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 518-524. [citation][year=2001]7. Joakim Aidemark, Jonny Vinter, Peter Folkesson, Johan Karlsson"GOOFI: Generic Object-Oriented Fault In jection Tool" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 83-88. [citation][year=2001]8. Raphael R. Some, Won S. Kim, Garen Khanoyan, Leslie Callum, Anil Agrawal, and John J. Beahan "A Software-Implemented Fault Injection Methodology for Design and Validation of System Fault Tolerance" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 501-506. [citation][year=2001]9. Pascal Chevochot, Isabelle Puaut "Experimental evaluation of the fail-silent behavior of a distributed real-time run-time support built from COTS components" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 304-313. [citation][year=2001]10. Wee Teck Ng and Peter M. Chen "The Design and Verification of the Rio File Cache" IEEE Transactions on Computers, VOL. 50, NO. 4, APRIL 2001. [citation][year=2001]11. Maitrayi Sabaratnam, "Improving Dependability in Database Management Systems?, tese de doutoramento de Maitrayi Sabaratnam, Novembro de 2001, Universidade de Trondheim, Trondheim, Noruega. [citation][year=2000]1. Almeida C, Arazo A, Crouzet Y, Kanoun K "Dependability of computer control systems in power plants - Analytical and experimental evaluation" COMPUTER SAFETY, RELIABILITY AND SECURITY, PROCEEDINGS, LECTURE NOTES IN COMPUTER SCIENCE, 1943: 165-175 2000. [citation][year=2000]2. Cristian Constantinescu, "Teraflops supercomputer: Architecture and validation of the fault tolerance mechanisms?, IEEE Transactions On Computers, vol. 49, no. 9, Setembro 2000, pp. 886-894, ISSN 0018-9340. [citation][year=2000]3. Velazco R, Rezgui S, Ecoffet R "Predicting error rate for microprocessor-based digital architectures through CEU (Code Emulating Upsets) injection" IEEE T NUCL SCI 47 (6): 2405-2411 Part 3 DEC 2000 [citation][year=2000]4. D Lambright "Experiences in Measuring the Reliability of a Cache-Based Storage System" First Workshop on Industrial Experiences with Systems Software, October 22, 2000, San Diego, California, USA, Usenix. [citation][year=2000]5. S Rezgui, R Velazco, R Ecoffet, S Rodriguez "A New Methodology for the Simulation of Soft Errors in Digital Processors: a Case Study" 3rd annual Military and Aerospace Applications of Programmable Devices and Technologies International Conference, Laurel, Maryland, USA, September 26-28, 2000 [citation][year=2000]6. P. Chevochot and I. Puaut. Experimental evaluation of the fail-silent behavior of a distributed real-time run-time support built from COTS components. Technical Report 1370, IRISA, Oct. 2000 [citation][year=2000]7. Luis Claudio Rodrigues Gonçalves, Taisy Silva Weber " Injeção de Falhas via Depuradores" In: WSL2000, I Workshop de Software Livre (part of I FISL " Fórum Internacional de Software Livre), Porto Alegre, RS, Brasil, 04 e 05 de maio de 2000, SBC. [citation][year=2000]8. Pascal Chevochot, Isabelle Puaut, Gilbert Cabillic, Antoine Colin, David Decotigny, Michel Banatre "HADES: A distributed System for Dependable Hard Real-Time Applications Built from COTS Components", IRISA, RENNES, FRANCE, Tech Rep 1357, 2000, ISSN 1166-8687. [citation][year=2000]9. DT Stott "Automated Fault-Inject Based Dependability Analysis of Distributed Computer Systems" Report for the Preliminary PhD Exam, 2000, Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign [citation][year=2000]10. Luis Gonçalves e Taisy Weber, "FIDe Injeção de Falhas via Depuração?, 1o. Fórum Internacional Software Livre, 2000 (http://www.inf.ufrgs.br/pos/SemanaAcademica/Semana2000/LuisGoncalves/) [citation][year=1999]Reza Sedaghat, "Fault Emulation: Reconfigurable Hardware-Based Fault Simulation Using Logic Emulation Systems with Optimized Mapping?, PhD thesis, University of Hannover, December 1999 [citation][year=1999]Constantinescu, C.; "Using physical and simulated fault injection to evaluate error detection mechanisms" Pacific Rim International Symposium on Dependable Computing, Proceedings. 1999 , 16-17 Dec. 1999, Pages:186 - 192, IEEE Computer Society. [citation][year=1999]Wee Teck Ng e Peter Chen, "The Systematic Improvement of Fault Tolerance in the Rio File Cache?, Proceedings of the 29th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-29, 15 a 18 de Junho de 1999, Madison, Wisconsin, EUA, IEEE Computer Society Press, pp 76-83, ISBN 0-7695-0213-X; [citation][year=1999]Jean Arlat, Jérome Boué, Yves Crouzet "Validation-Based Development of Dependable Systems" IEEE MICRO, Vol. 19, No. 4; JULY-AUGUST 1999, pp. 66-79 [citation][year=1999]D. Powell, J. Arlat, L. Beus-Dukic, A. Bondavalli, P. Coppola, A. Fantechi, E. Jenn, C. Rabéjac, A. Wellings "GUARDS: A Generic Upgradable Architecture for Real-Time Dependable Systems" IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol. 10, No. 6; JUNE 1999, pp. 580-599. [citation][year=1999]Frédéric Salles, M. Rodríguez, Jean-Charles Fabre e Jean Arlat, "MetaKernels anf Fault Containment Wrappers?, Proceedings of the 29th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-29, 15 a 18 de Junho de 1999, Madison, Wisconsin, EUA, IEEE Computer Society Press, pp 22-29, ISBN 0-7695-0213-X; [citation][year=1999]Sosnowski, J.; Gawkowski, P. "Tracing fault effects in system environment" EUROMICRO Conference, 1999. Proceedings. 25th , Volume: 1 , 8-10 Sept. 1999, Pages:481 - 486 vol.1. [citation][year=1999]J. Sosnowski, T. Bech "Evaluating FPU tests with fault inserter" Third European Dependable Computing Conference, EDCC3, Praga, República Checa, Setembro de 1999, Fast abstract. [citation][year=1999]Manuel Rodríguez, F. Salles, Jean- Charles Fabre e Jean Arlat, "MAFALDA: Microkernel Assessment by Fault Injection and Design Aid?, Third European Dependable Computing Conference, EDCC3, Praga, República Checa, Setembro de 1999, Lecture Notes in Computer Science 1667, Spriger-Verlag, pp.143-160, 1999. [citation][year=1999]Cristian Constantinescu, "Assesssing Error Detection Coverage by Simulated Fault Injection?, Third European Dependable Computing Conference, Praga, República Checa, Setembro de 1999, Lecture Notes in Computer Science 1667, Spriger-Verlag, pp. 161-170, 1999. [citation][year=1999]Fabre, J.-C.; "On the use of COTS microkernels for dependable systems" Autonomous Decentralized Systems, 1999. Integration of Heterogeneous Systems. Proceedings. The Fourth International Symposium on , 21-23 March 1999, Pages:132 - 139. [citation][year=1999]Fabre, J.-C.; Salles, F.; Moreno, M.R.; Arlat, J. "Assessment of COTS microkernels by fault injection" Dependable Computing for Critical Applications 7, 1999 , 6-8 Jan. 1999, Pages:25 - 44 [citation][year=1999]Wee Teck Ng, "Design and Implementation of Reliable Main Memory?, tese de doutoramento, University of Michigan, USA, 1999. [citation][year=1998]1. John Bates, " The State of the Art in Distributed and Dependable Computing?, A CaberNet-Sponsored Report (CaberNet " Esprit Network of Excellence in distributed computing systems architectures, 21035), Outubro de 1998; 1991(1 publication) [publication]Madeira, H. , "A Watchdog Processor for Concurrent Error Detection in Multiple Processor Systems", Microprocessors and Microsystems, vol. 15, pp. 123-130, 1991 [citation][year=2006]John C. Munson, Allen P. Nikora, and Joseph S. Sherif, "Software faults: A quantifiable definition?, Advances in Engineering Software , Volume 37, Issue 5, May 2006. [citation][year=1996]Majzik I, Hohl W, Pataricza A, et al., "Multiprocessor checking using watchdog processors?, International Journal of Computer Systems Science & Egineering, No 11, Vol 5, pp. 301-310, Setembro de 1996. [citation][year=1994]I. Majzik, A. Pataricza, M. Dal Cin, W. Hohl, J. Honig, and V. Sieh, "Hierarchical Checking of Multiprocessors Using Watchdog Processors", in "Dependable Computing - EDCC-1", Klaus Echtle, Dieter Hammer, David Powell (Eds.) Lecture Notes in Computer Science 852, Springer Verlag, 1994, pp. 386-403. ISBN 3-540-58426-9. [citation][year=1992]Pedro-Joaquín G. Vicente, "Sistema Tolerante a Fallos con Procesador de Guardia: Validación mediante Inyección Física de Fallos", Tese de Doutoramento, Universidad Politécnica de Valencia, Valencia, Setembro de 1992. 1990(1 publication) [publication]Madeira, H. and Quadros, G. and Silva, J.G. , "Experimental Evaluation of a Set of Simple Error Detection Mechanisms", Microprocessing and Microprogramming, The EUROMICRO Journal, pp. 513-520, 1990 [citation][year=2002]1. Steininger A., Scherrer C., "Identifying efficient combinations of error detection mechanisms based on results of fault injection experiments", IEEE Transactions on Computers, 51 (2): pp. 235-239, Feb. 2002. [citation][year=1997]1. Ismaeel A.A., Bhatnagar. R., "Test for detection & location of intermittent faults in combinational circuits?, IEEE Transactions on Reliability, No. 46, Vol. 2, pp. 269-274, Junho1997. [citation][year=1997]2. A. Steininger, C. Scherrer "On Finding an Optimal Combination of Error Detection Mechanisms Based on Results of Fault Injection Experiments" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 238-247, ISBN 0-8186-7831-3 [citation][year=1996]1. Jürgen Bohne, Reny Grönberg "Adaptable Fault Tolerance for Distributed Process Control Using Exclusively Standard Components" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 21-34, ISBN 3-540-61772-8. [citation][year=1995]1. Rudi Cuyvers, "User-Adaptable Fault Tolerance for Message Passing Multiprocessors", tese de doutoramento, Katholieke Universiteit Leuven (Lovaina), Bélgica, Maio de 1995: [citation][year=1994]1. Janusz Sosnowski "Transient Fault-Tolerance in Digital Systems" IEEE Micro, Vol. 14, N. 1, Fevereiro de 1994, pp. 24-35. [citation][year=1993]1. Andreas Steininger, "Evaluation of Error Detection Mechanisms by Fault Injection: Literature Survey and Definition of an Experiment", Internal Report 93/05, Vienna University of Technology, Viena, Maio de 1993 [citation][year=1992]1. Eliane Martins, "Validation de Systèmes Répartis par Injection de Fautes", Tese de Doutoramento, LAAS - Laboratoire d'Automatique et d'Analyse des Systèmes du CNRS, Toulouse, Julho de 1992. Conference Articles 2020(1 publication) [publication]Martins, J. and Barbosa, R. and Lourenço, Nuno and Robin, J. and Madeira, H. , "Online Verification through Model Checking of Medical Critical Intelligent Systems", in Dependable and Secure Machine Learning (DSML 2020) co-located with the 50th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2020) , 2020 2019(8 publications) [publication]Couceiro, R. and Barbosa, R. and Joao Duraes and Duarte, G. and Castelhano, J. and Duarte, C. and Teixeira, C. and Laranjeiro, N. and Medeiros, J. and Castelo-Branco, M. and P. Carvalho and Madeira, H. , "Spotting problematic code lines using nonintrusive programmers’ biofeedback", in 30th International Symposium on Software Reliability Engineering (ISSRE 2019), 2019 [publication]Cerveira, F. and Barbosa, R. and Madeira, H. , "Fast Local VM Migration Against Hypervisor Corruption", in 2019 15th European Dependable Computing Conference (EDCC), 2019 [publication]Medeiros, J. and Couceiro, R. and Castelhano, J. and Duarte, G. and Duarte, C. and Joao Duraes and Madeira, H. and Carvalho, P. and Teixeira, C. and Branco, M.L. , "Software code complexity assessment using EEG features", in 2019 41st Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2019 [publication]Couceiro, R. and Duarte, G. and Joao Duraes and Castelhano, J. and Duarte, C. and Teixeira, C. and Castelo-Branco, M. and Carvalho, P. and Madeira, H. , "Pupillography as Indicator of Programmers' Mental Effort and Cognitive Overload", in 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2019 [publication]Couceiro, R. and Duarte, G. and Joao Duraes and Castelhano, J. and Duarte, C. and Teixeira, C. and Castelo-Branco, M. and P. Carvalho and Madeira, H. , "Pupillography as indicator of programmers’ mental effort and cognitive overload", in DSN, 2019 [publication]Medeiros, J. and Couceiro, R. and Castelhano, J. and Castelo-Branco, M. and Duarte, C. and Joao Duraes and Madeira, H. and P. Carvalho and Teixeira, C. , "Software code complexity assessment using EEG features", in Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC), 2019 [publication]Couceiro, R. and Duarte, G. and Joao Duraes and Castelhano, J. and Duarte, C. and Teixeira, C. and Castelo-Branco, M. and P. Carvalho and Madeira, H. , "Biofeedback augmented software engineering: monitoring of programmers' mental effort", in ICSE 2019, 2019 [publication]Robin, J. and Mazo, R. and Madeira, H. and Barbosa, R. and Diaz, D. and Abreu, S. , "A Self-certifiable Architecture for Critical Systems Powered by Probabilistic Logic Artificial Intelligence", in International Conference on Computer Safety, Reliability, and Security (SAFECOMP 2019), 2019 2018(3 publications) [publication]Mendes, D.F.d.C.M. and Naghmeh Ivaki and Madeira, H. , "Effects of GPS Spoo?ng on Unmanned Aerial Vehicles", in The 23rd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2018), 2018 [publication]Cerveira, F. and Kocsis, I. and Barbosa, R. and Madeira, H. and Pataricza, A. , "Exploratory Data Analysis of Fault Injection Campaigns", in 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS), 2018 [publication]Cerveira, F. and Alcides Fonseca and Barbosa, R. and Madeira, H. , "Evaluating the Inherent Sensitivity of Programming Languages to Soft Errors", in 2018 14th European Dependable Computing Conference (EDCC), 2018 2017(3 publications) [publication]Cerveira, F. and Barbosa, R. and Madeira, H. , "Soft Errors Susceptibility of Virtualization Servers", in 22nd IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2017), 2017 [publication]Cerveira, F. and Barbosa, R. and Madeira, H. , "On the Emulation of Vulnerabilities through Software Fault Injection", in European Dependable Computing Conferece (EDCC), 2017 [publication]Cerveira, F. and Barbosa, R. and Madeira, H. , "Experience Report: On the Impact of Software Faults in the Privileged Virtual Machine", in International Symposium on Software Reliability Engineering (ISSRE 2017), 2017 2016(1 publication) [publication]Pereira, G. and Barbosa, R. and Madeira, H. , "Practical Emulation of Software Defects in Source Code", in 12th European Dependable Computing Conference (EDCC 2016), 2016 2015(2 publications) [publication]Cerveira, F. and Barbosa, R. and Madeira, H. and Araujo, F. , "Recovery for Virtualized Environments", in 11th European Dependable Computing Conference (EDCC 2015), 2015 [publication]Olga Craveiro and Macedo, J. and Madeira, H. , "Temporal Analysis of CHAVE Collection", in SPIRE 2015 : International Symposium on String Processing and Information Retrieval, 2015 2014(4 publications) [publication]Mendes, N. and Joao Duraes and Madeira, H. , "Security Benchmarks for Web Serving Systems", in IEEE 25th International Symposium on Software Reliability Engineering (ISSRE 2014), 2014 [publication]Olga Craveiro and Macedo, J. and Madeira, H. , "Words Temporality for Improving Query Expansion", in Computational Processing of the Portuguese Language (PROPOR 2014), 2014 [publication]Olga Craveiro and Macedo, J. and Madeira, H. , "Query Expansion with Temporal Segmented Texts", in 36th European Conference on IR Research (ECIR 2014), 2014 [publication]Pereira, P. and Macedo, J. and Olga Craveiro and Madeira, H. , "Time-Aware Focused Web Crawling", in 36th European Conference on IR Research (ECIR 2014), 2014 2013(1 publication) [publication]Ivano Irrera and Joao Duraes and Marco Vieira and Madeira, H. , "Assessing the Impact of Virtualization on the Generation of Failure Prediction Data ", in Sixth Latin-American Symposium on Dependable Computing (LADC), 2013, 2013 2012(1 publication) [publication]Olga Craveiro and Macedo, J. and Madeira, H. , "It is the time for Portuguese texts!", in International Conference on Computational Processing of Portuguese (PROPOR ), 2012 2011(1 publication) [publication]Marco Vieira and Madeira, H. and Cruz, S. and Costa, M. and Cunha, J.C. , "Integrating GQM and Data Warehousing for the Definition of Software Reuse Metrics", in 34th Annual IEEE Software Engineering Workshop, 2011 [citation][year=2019]Nawfal El Moukhi, Ikram El Azami, Abdelaaziz Mouloudi, Abdelali ElMounadi, Requirements-based approach for multidimensional design, Procedia Computer Science, Volume 148, 2019, Pages 333-342, ISSN 1877-0509, https://doi.org/10.1016/j.procs.2019.01.041. (http://www.sciencedirect.com/science/article/pii/S1877050919300419) [citation][year=2018]N. El Moukhi, I. El Azami, A. Mouloudi and A. El Mounadi, "Requirements-driven modeling for decision-making systems," 2018 International Conference on Electronics, Control, Optimization and Computer Science (ICECOCS), Kenitra, 2018, pp. 1-7. doi: 10.1109/ICECOCS.2018.8610523 [citation][year=2016]Nicholas D.J. Crossley, Troy R. Dugger, David J. Honey, Samuel Sung-Ok Lee, Schuyler B. Matthews, Darcy L. Wiborg Weber, "Managing reusable artifacts using placeholders ", US patent US9275089 B2, 2016 [citation][year=2016]Nicholas D. J. Crossley, Troy R. Dugger, David J. Honey, Samuel Sung-Ok Lee, Schuyler B. Matthews, Darcy L. Wiborg Weber, "Versioning for configurations of reusable artifacts", US patent US9483505 B2, 2016 [citation][year=2015]Uma Pavan Kumar, Lakshma Reddy and Sreedevi.s.erady. Article: Improvement of Query Processing Speed in Data Warehousing with the Usage of Components-Bitmap Indexing, Iceberg and Uncertain Data. International Conference on Current Trends in Advanced Computing (ICCTAC-2015) ICCTAC 2015(1):27-31, May 2015 [citation][year=2014]Uma Pavan Kumar Kethavarapu And S.Saraswathi, "Integration Of Iceberg, Uncertain Data Processing With Bitmap Indexing Techniques In Data Warehousing For Better Performance", International Journal of Applied Engineering Research (IJAER), Volume 9, Number 20 (2014), pp.4459-4463 2010(11 publications) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "A Learning-Based Approach to Secure Web Services from SQL/XPath Injection Attacks", in The 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2010), 2010 [publication]Ivano Irrera and Joao Duraes and Marco Vieira and Madeira, H. , "Towards Identifying the Best Variables for Failure Prediction Using Injection of Realistic Software Faults", in The 16th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2010), 2010 [citation][year=2012]Atef S Mohamed, "Software Architecture-Based Failure Prediction", PhD Thesis, Queen's University, Kingston, Ontario, Canada, September 2012. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]1. A. Bovenzi, S. Russo, F. Brancati, A. Bondavalli, "Towards identifying OS-level anomalies to detect application software failures", 2011 IEEE International Workshop on Measurements and Networking (M&N), Anacapri, Italy, October 2011. [citation][year=2011]2. Antonio Bovenzi, Francesco Brancati, Stefano Russo, Andrea Bondavalli, "A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systems", 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, Naples, Italy, September 2011. [citation][year=2011]3. Antonio Bovenzi, Domenico Cotroneo, Roberto Pietrantuono, Gabriella Carrozza, “Error detection framework for complex software systems”, 13th European Workshop on Dependable Computin, EWDC '11, Pisa, Italy, May 11-12, 2011. [publication]José Fonseca and Marco Vieira and Madeira, H. , "The Web Attacker Perspective - A Field Study", in 21st annual International Symposium on Software Reliability Engineering, 2010 [citation][year=2013]D. A. Kindy, A.-S. K. Pathan, “A Detailed Survey on Various Aspects of SQL Injection: Vulnerabilities, Innovative Attacks, and Remedies”, International Journal of Communication Networks and Information Security (IJCNIS), Vol. 5, No. 2, August 2013. [citation][year=2013]Thijs Houtenbos, Dennis Pellikaan, "Automated vulnerability scanning and exploitation", University of Amsterdam, Amsterdam, Netherlands, July 2013. [citation][year=2011]1. Bruno Augusti Mozzaquatro, Renato Preigschadt de Azevedo, Raul Ceretta Nunes, Alice de Jesus Kozakevicius, Cristian Cappo, Christian Schaerer, "Anomaly-based Techniques for Web Attacks Detection", Journal of Applied Computing Research, ISSN: 2236-8434, Vol 1, No 2, 2011. [citation][year=2011]2. Salvatore D'Antonio, Luigi Coppolino, Ivano Alessandro Elia, Valerio Formicola, “Security issues of a phasor data concentrator for smart grid infrastructure”, 13th European Workshop on Dependable Computin, EWDC '11, Pisa, Italy, May 11-12, 2011. [publication]Raquel Almeida and Mendes, N. and Madeira, H. , "Sharing Experimental and Field Data: The AMBER Raw Data Repository Experience", in International Conference on Distributed Computing Systems Workshops, 2010 [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Silva, N. and Marco Vieira and Madeira, H. , "Errors on Space Software Requirements: A Field Study and Application Scenarios", in 21st annual International Symposium on Software Reliability Engineering, 2010 [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Pontes, R.P. and Marco Vieira and Madeira, H. , "Benchmarking Software Requirements Documentation for Space Application", in The 29th International Conference on Computer Safety, Reliability and Security (SAFECOMP 2010), 2010 [publication]Raquel Almeida and Madeira, H. and Marco Vieira , "Benchmarking the Resilience of Self-Adaptive Systems: A New Research Challenge", in 29th IEEE International Symposium on Reliable Distributed Systems (SRDS 2010), 2010 [citation][year=2012]1. Deb Bodeau, Rich Graubart, Len LaPadula, Peter, Kertzner, Arnie Rosenthal, Jay Brennan, "Cyber Resiliency Metrics, Version 1.0, Rev. 1", The MITRE Corporation, MP1 20053, Rev. 1, 2012. [publication]Olga Craveiro and Macedo, J. and Madeira, H. , "Leveraging temporal expressions for segmented-based information retrieval", in International Conference on Intelligent Systems Design and Applications (ISDA), 2010 [publication]Raquel Almeida and Madeira, H. and Marco Vieira , "From Performance to Resilience Benchmarking", in IEEE 30th International Conference on Distributed Computing Systems Workshops (ICDCSW), 2010 [publication]Veras, P.C. and Villani, E. and Ambrósio, A.M. and Marco Vieira and Madeira, H. , "Towards Benchmarking Software Requirements Documentation for Space Applications (fast abstract)", in Eigth European Dependable Computing Conference, EDCC 2010, 2010 [publication]Joao Duraes and Madeira, H. and Cotroneo, D. and Natella, R. , "Representativeness Analysis of Injected Software Faults in Complex Software", in 2010 IEEE/IFIP International Conference on Dependable Systems&Networks; (DSN), 2010 [citation][year=2012]Workload-Aware Online Anomaly Detection in Enterprise Applications with Local Outlier Factor, T Wang, W Zhang, J Wei, 2012 IEEE 36th Annual Computer Software and Applications Conference (COMPSAC), pp 25-34, 16-20, July, 1012, Izmir, Turkey, Print ISBN 978-1-4673-1990-4, E-ISBN 978-0-7695-4736-7, DOI http://dx.doi.org/10.1109/COMPSAC.2012.12 2009(13 publications) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Predicting Timing Failures in Web Services", in International Workshop on Managing Data Quality in Collaborative Information Systems (MCIS 2009) at the International Conference on Database Systems for Advanced Applications (DASFAA 2009), 2009 [citation][year=2012]1. Yan Hai and Li xiuli, “A Web Service QoS Predicting Algorithm based on QoS Ontology and BP Neutral Networks,” International Journal of Advancements in Computing Technology 4, no. 4, 199–207, March 2012. [citation][year=2012]2. A. Vani Vathsala and Hrushikesha Mohanty, “Checkpointing Orchestrated Web Services,” Special Issue of International Journal of Computer and Communication Technology (IJCCT) 3, no. 2: 36-42, January 2012. [citation][year=2012]Ignacio Peralta, “Probablistic Error Detection and Diagnosis in Large-scale Distributed Applications”, PhD Thesis, Purdue University, West Lafayette, Indiana, USA, December 2012. [citation][year=2012]Andreas Schönberger and Guido Wirtz, “Configurable analysis of sequential multi-­party choreographies,” Computer Systems: Science & Engineering 27, no. 2, March 2012. [citation][year=2011]1. A. Vani Vathsala, “Optimal Call Based Checkpointing for Orchestrated Web Services”, International Journal of Computer Applications, no. 8, Foundation of Computer Science, New York, USA, December 2011. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Improving Web Services Robustness", in IEEE International Conference on Web Services (ICWS 2009), 2009 [citation][year=2012]1. Marco Prandini and Marco Ramilli, “Raising Risk Awareness on the Adoption of Web 2.0 Technologies in Decision Making Processes”, Future Internet 4, no. 3, pp. 700–718, August 2012. [citation][year=2012]2. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2012]3. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing & Verification in Service-Oriented Architecture: A Survey", Software Testing, Verification and Reliability (STVR), Issn: 1099-1689, Wiley InterScience, 2012. [citation][year=2012]Marcelo Invert Palma Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Brasil, 7 December 2012. [citation][year=2012]Araceli Acosta, Cecilia Kilmurray, Pablo Castro, Nazareno Aguirre, “Model Checking Propositional Deontic Temporal Logic via a ?-Calculus Characterization”, Formal Methods: Foundations and Applications, ed. Rohit Gheyi and David Naumann, 2012. [citation][year=2011]1. Sammer Hanna, Amer AbuAli, “Platform Effect on Web Services Robustness Testing”, Journal of Applied Sciences 11, no. 2, 360-366, 2011. [citation][year=2010]1. Manoj Lall, Lucas Venter, and John van der Poll, “Evaluating the second generation Web services specifications for satisfying non-functional requirements,” World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Orlando, Florida, USA, ISBN: 1-880094-83-5, October 2010. [citation][year=2010]2. Yongbo Wang, Fuyuki Ishikawa, and Shinichi Honiden, “Business Semantics Centric Reliability Testing for Web Services in BPEL”, 6th World Congress on Services, SERVICES ’10, Washington, DC, USA, 2010. [citation][year=2010]3. Christopher Cannon, “Scenario-Driven Evaluation of Network-Centric Agent Systems,” MSc Thesis, Drexel University, Philadelphia, USA, March 2010. [citation][year=2009]1. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, Proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September 2009. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Protecting Database Centric Web Services against SQL/Xpath Injection Attacks", in 20th International Conference on Database and Expert Systems Applications (DEXA 2009), 2009 [citation][year=2011]1. Velu Shanmughaneethi, R. Ravichandran, S. Swamynathan, “PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications”, International Journal on Web Service Computing, no. 3: 192-201, September 2011 [citation][year=2011]2. Velu Shanmughaneethi, Ra. Yagna Pravin, S. Swamynathan, "XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming", Advances in Computing and Information Technology - Communications in Computer and Information Science, Springer Berlin Heidelberg, Vol. 198, ISBN: 978-3-642-22555-0, 2011. [publication]Nuno Antunes and Laranjeiro, N. and Marco Vieira and Madeira, H. , "Effective Detection of SQL/XPath Injection Vulnerabilities in Web Services", in IEEE International Conference on Services Computing (SCC 2009), 2009 [citation][year=2015]D. Appelt, C. D. Nguyen, and L. Briand, “Behind an Application Firewall, Are We Safe from SQL Injection Attacks?,” in 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST), 2015, pp. 1–10. [citation][year=2015]M. H. A. N. and C. Miao, “Structured Query Language Injection Penetration Test Case Generation Based on Formal Description,” Journal of Donghua University(English Edition), vol. 32, no. 3, pp. 446–452, 2015. [citation][year=2015]P. Mehta, J. Sharda, and M. L. Das, “SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data,” in Information Systems Security, S. Jajodia and C. Mazumdar, Eds. Springer International Publishing, 2015, pp. 192–206 [citation][year=2015]P. Shirani, M. A. Azgomi, and S. Alrabaee, “A method for intrusion detection in web services based on time series,” in 2015 IEEE 28th Canadian Conference on Electrical and Computer Engineering (CCECE), 2015, pp. 836–841. [citation][year=2015]T. Aghariya, “Security Testing on Web Application,” MSc Thesis, Charles Darwin University, Darwin, 2015 [Online]. Available: http://espace.cdu.edu.au/eserv/cdu:46186/Thesis_CDU_46186_Aghariya_T.pdf. [Accessed: 22-Aug-2015] [citation][year=2015]A. Mahadkar and N. Singh, “A review on approaches for web application vulnerabilities detection,” International journal of Advance Engineering and Research Development (IJAERD), vol. 2, no. 1, pp. 293–295, 2015. [citation][year=2014]T. K. Saha and A. S. Ali, “Web Application Security Attacks and Countermeasures,” Case Studies in Secure Computing: Achievements and Trends, p. 343, 2014. [citation][year=2014]V. Shanmuga Neethi, “Prevention of code injection vulnerabilities in web applications through web services,” Ph.D. Thesis, Anna University, Chennai, India, 2014. [citation][year=2014]D. Appelt, C. D. Nguyen, L. C. Briand, and N. Alshahwan, “Automated testing for SQL injection vulnerabilities: An input mutation approach,” in Proceedings of the 2014 International Symposium on Software Testing and Analysis, 2014, pp. 259–269 [Online]. Available: http://dl.acm.org/citation.cfm?id=2610403. [Accessed: 20-Jan-2016] [citation][year=2014]P. D. Buck, Q. Shi, and B. Zhou, “Monitoring and Testing Web Services,” in The 15th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting (PGNET 2014), Liverpool, UK, 2014 [Online]. Available: http://www.cms.livjm.ac.uk/PGNet2014/papers/1569959305.pdf. [Accessed: 09-Sep-2014] [citation][year=2014]M. Mirjalili, A. Nowroozi, and M. Alidoosti, “A survey on web penetration test,” Advances in Computer Science: an International Journal (ACSIJ), vol. 3, no. 6, 2014. [citation][year=2014]Zhuo Ying gun and Pan Renyi, “Design and implementation of website information disclosure assessment system,” Ph.D. Thesis, National Chung Cheng University, 2014. [citation][year=2014]D. Appelt, N. Alshahwan, D. C. Nguyen, and L. Briand, “Black-box SQL Injection Testing,” University of Luxembourg, TR-SnT-2014-1, 2014 [Online]. Available: http://orbilu.uni.lu/handle/10993/15121. [Accessed: 18-Sep-2014] [citation][year=2014]B. Mohamed Ibrahim and A. R. Mohamed Shanavas, “Severe SOA Security Threats on SOAP Web Services–A Critical Analysis,” IOSR Journal of Computer Engineering (IOSR-JCE), vol. 16, no. 2, pp. 135–141, 2014. [citation][year=2014]R. J. Manoj, A. Chandrasekhar, and M. A. Praveena, “An Approach to Detect and Prevent Tautology Type SQL Injection in Web Service Based on XSchema validation,” International Journal Of Engineering And Computer Science, vol. 3, no. 1, pp. 3695–3699, Jan. 2014. [citation][year=2014]E. Shafie, “Runtime Detection and Prevention for Structure Query Language Injection Attacks,” Ph.D. Thesis, De Montfort University, England, 2013 [Online]. Available: https://www.dora.dmu.ac.uk/xmlui/handle/2086/10076. [Accessed: 18-Sep-2014] [citation][year=2013]P. Zech, M. Felderer, M. Farwick, and R. Breu, “A Concept for Language-Oriented Security Testing,” in 2013 IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), 2013, pp. 53–62. [citation][year=2013]J. Lakhani, “Blind XPath Injection Attack: A Case Study,” International Journal of System & Software Engineering, vol. 1, no. 1, pp. 30–34, Jun. 2013. [citation][year=2013]Luo Qi-Han, Zhang Yu-Qing, and Liu Qi-Xu, “Design and implementation of a SQL injection vulnerability detection tool on RESTful API,” Journal of Graduate University of Chinese Academy of Sciences, vol. 30, no. 3, pp. 417–424, 2013. [citation][year=2013]L. Stage, “Entwurf einer Methodik zum Testen der Sicherheit von Web-Service-basierten Systemen,” University of Stuttgart, 2013 [Online]. Available: ftp://ftp.informatik.uni-stuttgart.de/pub/library/medoc.ustuttgart_fi/DIP-3501/DIP-3501.pdf. [Accessed: 13-Jan-2014] [citation][year=2013]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “XIPS: A Model-based Prevention Mechanism for Preventing Blind XPath Injection in Database-Centric Web Services Environment,” International Journal of Advancements in Computing Technology (IJACT), vol. 5, no. 10, 2013 [Online]. Available: http://www.aicit.org/IJACT/ppl/IJACT3093PPL.pdf. [Accessed: 11-Jun-2014] [citation][year=2013]L. Lei, X. Jing, L. Minglei, and Y. Jufeng, “A Dynamic SQL Injection Vulnerability Test Case Generation Model Based on the Multiple Phases Detection Approach,” in Computer Software and Applications Conference (COMPSAC), 2013 IEEE 37th Annual, 2013, pp. 256–261. [citation][year=2013]A. N. Gupta and P. S. Thilagam, “Attacks on Web Services Need To Secure XML on Web,” Computer Science & Engineering: An International Journal, vol. 3, no. 5, 2013 [Online]. Available: http://search.ebscohost.com/login.aspx?direct=true&profile=ehost&scope=site&authtype=crawler&jrnl=22313583&AN=92015920&h=iMqkcNK0LUFoRJIbd7JQYgPgr6yHFEz0Mjfg+LRf9wGQNss6EgEwDEGzmaZBHpOu2VaugC6VNulYB2RFkmRDzw==&crl=c. [Accessed: 16-Dec-2013] [citation][year=2013]N. Arora and S. Tanwani, “Emerging Web Services Trends and Challenges,” International Journal of Systems, Algorithms & Applications (IJSAA), vol. 3, no. ICRAET13, pp. 6–11, Mar. 2013. [citation][year=2013]A. Ghourabi, T. Abbes, and A. Bouhoula, “Characterization of attacks collected from the deployment of Web service honeypot,” Security and Communication Networks, 2013 [Online]. Available: http://onlinelibrary.wiley.com/doi/10.1002/sec.737/abstract. [Accessed: 04-Mar-2013] [citation][year=2013]Z. Z. Zhang, Q. Y. Wen, and Z. Zhang, “An Improved Approach for SQL Injection Vulnerabilities Detection,” Applied Mechanics and Materials, vol. 263, pp. 3017–3020, 2013. [citation][year=2013]W. Phocharoen and T. Senivongse, “A Security Attack Risk Assessment for Web Services Based on Data Schemas and Semantics,” in Proceedings of the 2012 International Conference on Information Technology and Software Engineering, W. Lu, G. Cai, W. Liu, and W. Xing, Eds. Springer Berlin Heidelberg, 2013, pp. 135–143 [citation][year=2012]I. Lundgren, “Securing public APIs using OAuth and OAuthLib,” BSc Thesis, Department of Computer Science, Electrical and Space Engineering, Luleå University of Technology, 2012. [citation][year=2012]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “Model-based system architecture for preventing XPath injection in database-centric web services environment,” in 7th International Conference on Computing and Convergence Technology (ICCCT 2012), Seoul, South Korea, 2012, pp. 621–625. [citation][year=2012]Xu Jing, Tian Wei, Liu Lei, Zhang Ying, and Yang Jufeng, “Model-driven web Application SQL Injection penetration testing,” High Technology Letters, vol. 22, no. 11, pp. 1161–1168, 2012. [citation][year=2012]K. Liu, H. B. K. Tan, and L. K. Shar, “Semi-Automated Verification of Defense against SQL Injection in Web Applications,” in 2012 19th Asia-Pacific Software Engineering Conference (APSEC), 2012, vol. 1, pp. 91 –96. [citation][year=2012]T. Wei, Y. Ju-Feng, X. Jing, and S. Guan-Nan, “Attack Model Based Penetration Test for SQL Injection Vulnerability,” in 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops (COMPSACW), Izmir, Turkey, 2012, pp. 589 –594. [citation][year=2012]V. Shanmughaneethi, R. Y. Praveen, and S. Swamynathan, “CIVD: detection of command injection vulnerabilities in web services through aspect–oriented programming,” International Journal of Computer Applications in Technology, vol. 44, no. 4, pp. 312–320, Jan. 2012. [citation][year=2011]F. van der Loo, “Comparison of penetration testing tools for web applications,” MSc Thesis, University of Radboud, Netherlands, 2011. [citation][year=2011]V. Shanmughaneethi, R. Ravichandran, and S. Swamynathan, “PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications,” International Journal on Web Service Computing, vol. 2, no. 3, pp. 192–201, Sep. 2011. [citation][year=2011]A. R. Pais, D. J. Deepak, and B. R. Chandavarkar, “Protection against Denial of Service and Input Manipulation Vulnerabilities in Service Oriented Architecture,” in Advances in Network Security and Applications, vol. 196, D. C. Wyld, M. Wozniak, N. Chaki, N. Meghanathan, and D. Nagamalai, Eds. Springer Berlin Heidelberg, 2011, pp. 331–343. [citation][year=2011]V. Shanmughaneethi, R. Y. Pravin, and S. Swamynathan, “XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming,” Advances in Computing and Information Technology, pp. 192–201, 2011. [citation][year=2010]A. S. Khader, “Preventing MS SQL Injection in Web Application,” MSc Thesis, University Utara Malaysia, 2010. [citation][year=2010]P. R. Yadav, “Protection Against Denial of Service Attack in Service Oriented Architecture,” MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Enginering, National Institute of Technology Karnataka (NITK), Surathkal, Mangalore, 2010. [citation][year=2010]D. J. Deepak, “Protection Against Input Manipulation vulnerabilities in Service Oriented Architecture,” MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Engineering - National Institute of Technology Karnataka, Mangalore, India, 2010. [citation][year=2010]A. Anchlia and S. Jain, “A Novel Injection Aware Approach for the Testing of Database Applications,” in 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, 2010, pp. 311–313. [citation][year=2010]S. Madan and S. Madan, “Security Standards Perspective to Fortify Web Database Applications from Code Injection Attacks,” in 2010 International Conference on Intelligent Systems, Modelling and Simulation, 2010, pp. 226–230. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Vulnerability & Attack Injection for Web Applications", in 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), 2009 [citation][year=2013]Nana Yaw Asabere, Wisdom Kwawu Torgby, "Towards a Perspective of Web Application Vulnerabilities and Security Threats", International Journal of Computer Science and Telecommunications, Vol. 4, Issue 5, May 2013. [citation][year=2012]L. Shar, H. Tan, H. "Defeating SQL Injection", IEEE Computer, 2012. [citation][year=2012]Kaiping Liu, Hee Beng Kuan Tan, and L.K. Shar, “Semi-­Automated Verification of Defense against SQL Injection in Web Applications”, 19th Asia-Pacific Software Engineering Conference, APSEC 2012, ­Hong Kong, December 4-7, 2012. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]M. Ghafari, H. Shoja, M. Y. Amirani, "Detection and Prevention of Data Manipulation from Client Side in Web Applications", IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, UK, June 25-27, 2012. [citation][year=2011]Geoffrey Vaughan, "Understanding SQL Injection Attacks Inside and Out", Faculty of Business and IT, University of Ontario Institute of Technology, Canada, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]Eidah Al-Khashab, Fawaz S. Al-Anzi, Ayed A. Salman, "PSIAQOP: preventing SQL injection attacks based on query optimization process", Second Kuwait Conference on e-Services and e-Systems, KCESS'11, Kuwait, Kuwait, April 5, 2011. [citation][year=2011]A. Bondavalli, P. Lollini, A. Bovenzi, M. Colajanni, L. Coppolino, C. Esposito, M. Fixxo, C. di Martino, L. Montecchi, R. Natella, A. Peccia, "D3.1: Modeling and Evaluation: State-of-the-art", deliverable of the project: Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures (DOTS-LCCI Project: PRIN 2008LWRBHF), Italy, March 2011. [citation][year=2011]Francisco Vieira, “Realistic Vulnerability Injections in PHP Web Applications”, MSc Thesis, Faculty of Sciences, University of Lisbon, Lisbon, Portugal, 2011. [citation][year=2010]1. Célio B. Taquary Segundo, Luis Fernando Rust C. Carmo, Luci Pirmez, “Uso de Árvores de Ataque e Técnicas de Mutação de Código na Segurança de Aplicações Web”, X Simpósio Brasileiro em Segurança da Informação e de Sistemas Computacionais, SBSeg’10, Fortaleza, Brazil, October 2010. [citation][year=2010]2. Rim Akrout, Anthony Dessiatnikoff, “An Attack-goal Driven Approach for Web Applications Security Assessment”, Eigth European Dependable Computing Conference, EDCC 2010, Valencia, Spain, April 2010. [citation][year=2009]1. Karthik Pattabiraman, Benjamin Zorn, “DoDOM: Leveraging DOM Invariants for Web 2.0 Application Reliability”, Technical Report, Microsoft Research - Redmond, USA, 2009. [publication]Marco Vieira and Nuno Antunes and Madeira, H. , "Using Web Security Scanners to Detect Vulnerabilities in Web Services", in 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2009), 2009 [citation][year=2014]M. K. N. Durai and K. Priyadharsini, “A Survey on Security Properties and Web Application Scanner,” International Journal of Computer Science and Mobile Computing, vol. 3, no. 10, pp. 517–527, 2014. [citation][year=2014]M. Mirjalili, A. Nowroozi, and M. Alidoosti, “A survey on web penetration test,” Advances in Computer Science: an International Journa, vol. 3, no. 6, 2014. [citation][year=2014]??? and ???, “Design and implementation of website information disclosure assessment system,” 2014. [citation][year=2014]T. P. Chiem, “A study of penetration testing tools and approaches,” MSc Thesis, Auckland University of Technology, Auckland, New Zealand, 2014. [citation][year=2014]P. D. Buck, Q. Shi, and B. Zhou, “Monitoring and Testing Web Services,” 2014. [citation][year=2014]R. M. Jnena, “Modern Approach for WEB Applications Vulnerability Analysis,” MSc Thesis, The Islamic University of Gaza, 2013. [citation][year=2014]D. Appelt, N. Alshahwan, D. C. Nguyen, and L. Briand, “Black-box SQL Injection Testing,” University of Luxembourg, TR-SnT-2014-1, 2014. [citation][year=2014]D. Appelt, N. Alshahwan, and L. Briand, “Assessing the Impact of Firewalls and Database Proxies on SQL Injection Testing,” in Future Internet Testing, T. E. J. Vos, K. Lakhotia, and S. Bauersfeld, Eds. Springer International Publishing, 2014, pp. 32–47. [citation][year=2014]M. Kranch and J. Bonneau, “Upgrading HTTPS in mid-air: An empirical study of strict transport security and key pinning.” [citation][year=2014]A. L. Doupé, “Advanced Automated Web Application Vulnerability Analysis,” Ph.D. Thesis, UNIVERSITY OF CALIFORNIA Santa Barbara, Santa Barbara, 2014. [citation][year=2014]M. I. P. Salas and E. Martins, “Security Testing Methodology for Vulnerabilities Detection of XSS in Web Services and WS-Security,” in Electronic Notes in Theoretical Computer Science, 2014, vol. 302, pp. 133–154. [citation][year=2014]S. Gil, A. Kott, and A.-L. Barabási, “A genetic epidemiology approach to cyber-security,” Sci. Rep., vol. 4, Jul. 2014. [citation][year=2014]S. Karumanchi and A. C. Squicciarini, “In the Wild: a Large Scale Study of Web Services Vulnerabilities,” presented at the 29th Symposium On Applied Computing, Gyeongju, Republic of Korea, 2014. [citation][year=2014]R. J. Manoj, A. Chandrasekhar, and M. A. Praveena, “An Approach to Detect and Prevent Tautology Type SQL Injection in Web Service Based on XSchema validation,” International Journal Of Engineering And Computer Science, vol. 3, no. 1, pp. 3695–3699, Jan. 2014. [citation][year=2014]I. Medeiros, N. F. Neves, and M. Correia, “Automatic Detection and Correction of Web Application Vulnerabilities using Data Mining to Predict False Positives,” in Proceedings of the International World Wide Web Conference (WWW), Seoul, Korea, 2014. [citation][year=2013]???, ???, and ???, “?? RESTful API ? SQL ??????????????,” ???????????, vol. 30, no. 3, pp. 417–424, 2013. [citation][year=2013]P. Zech, M. Felderer, M. Farwick, and R. Breu, “A Concept for Language-Oriented Security Testing,” in 2013 IEEE 7th International Conference on Software Security and Reliability-Companion (SERE-C), 2013, pp. 53–62. [citation][year=2013]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “XIPS: A Model-based Prevention Mechanism for Preventing Blind XPath Injection in Database-Centric Web Services Environment,” International Journal of Advancements in Computing Technology (IJACT), vol. 5, no. 10, 2013. [citation][year=2013]L. Stage, “Entwurf einer Methodik zum Testen der Sicherheit von Web-Service-basierten Systemen,” University of Stuttgart, 2013. [citation][year=2013]C. Ma, Y. Duan, X. Ju, and F. Xu, “WS-S Evaluation Based on User Preferences and Ranking Mechanism,” in 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), 2013, pp. 298–301. [citation][year=2013]Y.-C. Cho and J.-Y. Pan, “Vulnerability Assessment of IPv6 Websites to SQL Injection and other Application Level Attacks,” The Scientific World Journal, vol. 2013, 2013. [citation][year=2013]R. I. Hassan and N. H. B. M. Alwi, “Penetration Testing for Libyan Government Website,” presented at the Fourth International Conference on Computing and Informatics 2013 (ICOCI 2013), Kuching, Sarawak, Malaysia, 2013. [citation][year=2013]J. E. Stein, “Metodologia de Configuração de Vulnerabilidades para o Modsecurity,” Colégio Técnico Industrial de Santa Maria - Universidade Federal de Santa Maria, Santa Maria, RS, Brasil, Curso Superior de Tecnologia em Redes de Computadores, 2013. [citation][year=2013]N. F. Awang and A. A. Manaf, “Self Assessment Framework For Detecting Vulnerability In Web Applications,” in The Third International Conference on Digital Information and Communication Technology and its Applications (DICTAP2013), 2013, pp. 283–287. [citation][year=2013]I. Medeiros, N. F. Neves, and M. Correia, “Securing Energy Metering Software with Automatic Source Code Correction,” in 11th IEEE International Conference on Industrial Informatics (INDIN 2013). [citation][year=2013]Z. Zheng and M. R. Lyu, “Background Review,” in QoS Management of Web Services, Springer Berlin Heidelberg, 2013, pp. 9–17. [citation][year=2013]S. Wang, Y. Gong, G. Chen, Q. Sun, and F. Yang, “Service Vulnerability Scanning based on Service-oriented Architecture in Web Service Environments,” Journal of Systems Architecture. [citation][year=2013]P. Payet, A. Doupé, C. Kruegel, and G. Vigna, “EARs in the Wild: Large-Scale Analysis of Execution After Redirect Vulnerabilities,” 28th Symposium On Applied Computing, Mar. 2013. [citation][year=2012]A. Asmawi, L. S. Affendey, N. I. Udzir, and R. Mahmod, “Model-based system architecture for preventing XPath injection in database-centric web services environment,” in 7th International Conference on Computing and Convergence Technology (ICCCT 2012), Seoul, South Korea, 2012, pp. 621–625. [citation][year=2012]S. S. Venkatraman, “Systematically Enhancing Black-Box Web Vulnerability Scanners,” Master of Science, National University of Singapore Singapore, Singapore, 2012. [citation][year=2012]M. P. Salas and E. Martins, “Emulation of Malformed XML Using WSInject for Security Testing Against WS-Security,” presented at the IEEE Latin-American Conference on Communications (LATINCOM), Cuenca, Ecuador, 2012. [citation][year=2012]D. N. Swetha and B. S. Kumar, “Protocol Based Approach on Vulnerability Detection Tools of SQLIA along with Monitoring Tools,” International Journal of Computer Science Engineering and Technology (IJCSET), vol. 2, no. 11, pp. 1476–1482, Nov. 2012. [citation][year=2012]Z. Zheng, Y. Zhang, and M. Lyu, “Investigating QoS of Real-World Web Services,” IEEE Transactions on Services Computing, vol. PP, no. 99, p. 1, 2012. [citation][year=2012]D. Hauzar and J. Kofron, “On Security Analysis of PHP Web Applications,” in Computer Software and Applications Conference Workshops (COMPSACW), 2012 IEEE 36th Annual, 2012, pp. 577 –582. [citation][year=2012]S. Katkar Anjali and B. Kulkarni Raj, “Web Vulnerability Detection and Security Mechanism,” International Journal of Soft Computing and Engineering (IJSCE), vol. 2, no. 4, pp. 237–241, Sep. 2012. [citation][year=2012]M. P. Salas and E. Martins, “Emulação de Ataques do Tipo XPath Injection para Testes de Web Services usando Injeção de Falhas,” in XIII Workshop de Testes e Tolerância a Falhas, Ouro Preto - MG, Brasil, 2012. [citation][year=2012]D. Rocha, D. Kreutz, and R. Turchetti, “A free and extensible tool to detect vulnerabilities in Web systems,” in 2012 7th Iberian Conference on Information Systems and Technologies (CISTI), 2012, pp. 1 –6. [citation][year=2012]A. Malhotra, N. Navdeep, and G. S. Sekhon, “Browser Prevention Against Phishing Website Security Risk,” International journal of Computer Science & Communication, vol. III, no. 1, pp. 215–219, Jun. 2012. [citation][year=2012]WANG Li-Jie, LI Meng, CAI Si-Bo, LI Ge, XIE Bing, and YANG Fu-Qing, “Internet Information Search Based Approach to Enriching Textual Descriptions for Public Web Services,” Journal of Software, vol. 23, no. 6, 2012. [citation][year=2012]A. Doupé, L. Cavedon, C. Kruegel, and G. Vigna, “Enemy of the State: A State-Aware Black-Box Web Vulnerability Scanner,” in 21st USENIX Security Symposium (USENIX Security ’12), Bellevue, WA, 2012. [citation][year=2012]P. Zech, M. Felderer, and R. Breu, “Towards Risk–Driven Security Testing of Service Centric Systems,” presented at the QSIC, 2012. [citation][year=2012]M. H. Al-Ibrahim, “Are Our Educational Technology Systems Secure?,” International Journal of Innovation, Management and Technology (IJIMT), vol. 3, no. 3, pp. 241–245, 2012. [citation][year=2012]M. Murali and R. Srinivasan, “Inter-domain Authentication Scheme in a Distributed Mobile Network,” Research Journal of Information Technology, 2012. [citation][year=2012]V. Prasath, “Building Trust for Web Services Security Patterns,” International Journal of Applied Information Systems (IJAIS), vol. 3, no. 2, pp. 14–20, Jul. 2012. [citation][year=2011]D. Hauzar and J. Kofron, “Hunting Bugs Inside Web Applications,” Technical Report, Oct. 2011. [citation][year=2011]SU Bin and YANG Yin, “The Limitations of Network Applications Vulnerability Scanner,” Network and Computer Security, no. 5, pp. 77–79, 2011. [citation][year=2011]F. van der Loo, “Comparison of penetration testing tools for web applications,” MSc Thesis, University of Radboud, Netherlands, 2011. [citation][year=2011]V. Shanmughaneethi, R. Ravichandran, and S. Swamynathan, “PXpathV: Preventing XPath Injection Vulnerabilities in Web Applications,” International Journal on Web Service Computing, vol. 2, no. 3, pp. 192–201, Sep. 2011. [citation][year=2011]A. M. Ferreira and H. Kleppe, “Effectiveness of Automated Application Penetration Testing Tools,” 2011. [citation][year=2011]J. Chen and S. Kulkarni, “Effectiveness of Transition Systems to Model Faults,” in Proceedings of the 2nd International Workshop on Logical Aspects of Fault-Tolerance (LAFT) In conjunction with LICS’11., Toronto, Canada, 2011. [citation][year=2011]V. Shanmughaneethi, R. Y. Pravin, and S. Swamynathan, “XIVD: Runtime Detection of XPath Injection Vulnerabilities in XML Databases through Aspect Oriented Programming,” Advances in Computing and Information Technology, pp. 192–201, 2011. [citation][year=2011]Z. Zheng, “QoS Management of Web Services,” Ph.D. Thesis, The Chinese University of Hong Kong, Hong Kong, 2011. [citation][year=2011]Wang Xin, Wei Gengyu, Zhang Dongmei, Yang Yixian, "Web Application Vulnerability Detection Based on Reinforcement Learning", 3rd International Conference on Computer and Network Technology, ICCNT 2011, Taiyuan, China, February 26-28, 2011. [citation][year=2010]AOKI T. and YASUDA H., “Web Fingerprint: A New Scheme to Arbitrate Mismatch of Web Pages,” The Journal of the Institute of Image Electronics Engineers of Japan, vol. 39, no. 5, pp. 644–653, Sep. 2010. [citation][year=2010]X. Wang, L. Wang, G. Wei, D. Zhang, and Y. Yang, “Hidden web crawling for SQL injection detection,” in 3rd IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), Beijing, China, 2010, pp. 14–18. [citation][year=2010]M. P. Correia and P. J. Sousa, Segurança no Software. Lisboa, Portugal: FCA, 2010. [citation][year=2010]C. Lai-Cheng, “Enhancing Distributed Web Security Based on Kerberos Authentication Service,” in Web Information Systems and Mining, vol. 6318, F. Wang, Z. Gong, X. Luo, and J. Lei, Eds. Springer Berlin / Heidelberg, 2010, pp. 171–178. [citation][year=2010]D. A. Shelly, “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners,” MSc Thesis - Master of Science in Computer Engineering, Virginia Polytechnic Institute and State University, Blacksburg, Virginia, 2010. [citation][year=2010]T. Basso, R. L. O. Moraes, and M. Jino, “A Methodology for Effectiveness Analysis of Vulnerability Scanning Tools,” presented at the Terceiro Encontro dos Alunos e Docentes do Departamento de Engenharia de Computação e Automação Industrial, University of Campinas (UNICAMP), Brazil, 2010. [citation][year=2010]T. Basso, P. C. S. Fernandes, M. Jino, and R. L. O. Moraes, “Analysis of the Effect of Java Software Faults on Security Vulnerabilities and Their Detection by Commercial Web Vulnerability Scanner Tool,” in 4th Workshop on Recent Advances on Intrusion-Tolerant Systems, WRAITS 2010, in conjunction with The 40th IEEE/IFIP International Conference on Dependable Systems and Networks, Chicago, IL, USA, 2010. [citation][year=2010]A. Doupé, M. Cova, and G. Vigna, “Why Johnny Can’t Pentest: An Analysis of Black-Box Web Vulnerability Scanners,” Detection of Intrusions and Malware, and Vulnerability Assessment, pp. 111–131, 2010. [citation][year=2010]Z. Zheng, Y. Zhang, and M. R. Lyu, “Distributed QoS Evaluation for Real-World Web Services,” in 2010 IEEE International Conference on Web Services, 2010, pp. 83–90. [citation][year=2010]L. Wang, F. Liu, L. Zhang, G. Li, and B. Xie, “Enriching Descriptions for Public Web Services Using Information Captured from Related Web Pages on the Internet,” in 2010 Fifth IEEE International Symposium on Service Oriented System Engineering, 2010, pp. 141–150. [publication]Araújo Neto, A.C.d. and Marco Vieira and Madeira, H. , "An Appraisal to Assess the Security of Database Configurations", in International Conference on Dependability (DEPEND 2009), 2009 [citation][year=2013]Dilip kumar Choubey, Joy Bhattacharjee, Roopali Soni, "“Loss Minimization of Web Databases by Fine Grain Approach", International Journal of Engineering Research and Applications (IJERA), Vol. 3 Issue 1, January-February 2013. [citation][year=2012]Neera Batra, Hemant Aggarwal, "Autonomous Multilevel Policy Based Security tonomous Multilevel Policy Based Security Configuration in Distributed Database", International Journal of Computer Science Issues (IJCSI), Vol. 9 Issue 6 No 2, November 2012. [citation][year=2012]Dilip kumar Choubey, Roopali Soni, Joy Bhattacharjee, "Privacy protection and fine grained access control to web database", IRNetExplore, India, 2012. [citation][year=2011]Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo, "A method for system auditing based on baseline assessment", IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, May 27-29, 2011. [publication]Seixas, N. and José Fonseca and Marco Vieira and Madeira, H. , "Looking at Web Security Vulnerabilities from the Programming Language Perspective: A Field Study", in 20th annual International Symposium on Software Reliability Engineering, 2009 [citation][year=2012]M. Murali, R. Srinivasan, "Inter-domain Authentication Scheme in a Distributed Mobile Netwrok, Journal of Informattion Technology, ISSN: 1815-7432, 2012. [citation][year=2012]Theodoor Scholte, Davide Balzarotti, William Robertson, Engin Kirda, "An Empirical Analysis of Input Validation Mechanisms in Web Applications and Languages", 27th ACM Symposium On Applied Computing (SAC 2012), Trento, Italy, March 2012. [citation][year=2012]Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan, "A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies", CustomWare & International Islamic University Malaysia, Kuala Lumpur, Malaysia, 2012. [citation][year=2011]5. Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan, “A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques”, The 15th IEEE Symposium on Consumer Electronics, IEEE ISCE2011, Singapore, June, 2011. [citation][year=2011]1. Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]2. Lai-Cheng Cao, “Secure Negotiation Approach for Share-Secret-Key of Kerberos Service”, Artificial Intelligence and Computational Intelligence”, pp 101-107, Springer Berlin / Heidelberg, ISBN 978-3-642-23886-4, September, 2011. [citation][year=2011]3. Dimitris Mitropoulos, Vassilios Karakoidas, Panagiotis Louridas, Diomidis Spinellis, “Countering code injection attacks: A unified approach”, Information Management and Computer Security, 19(3), ISSN: 0968-5227, Emerald Journals, 2011. [citation][year=2011]4. Lai-Cheng Cao, “Secure Secret-Key Management of Kerberos Service”, Emerging Research in Artificial Intelligence and Computational Intelligence, pp 76-83, September, 2011. [citation][year=2010]1. Deepak D. J., “Protection Against Input Manipulation Vulnerabilities in Service Oriented Architecture”, MSc Thesis – Master of Technology in Computer Science & Engineering – Information Security, Department of Computer Engineering - National Institute of Technology Karnataka, Mangalore, India, July 2010. [citation][year=2010]2. C. Lai-Cheng, “Enhancing Distributed Web Security Based on Kerberos Authentication Service”, Web Information Systems and Mining, F. Wang, Z. Gong, X. Luo, and J. Lei, eds., Springer Berlin / Heidelberg, pp. 171-178, 2010. [publication]Marco Vieira and Madeira, H. and Ivano Irrera , "Fault Injection for Failure Prediction Methods Validation", in Fifth Workshop on Hot Topics in System Dependability (HotDep 2009), 2009 [citation][year=2012]1. A. Vashist, R. Izmailov, K. Manousakis, R. Chadha, C. J. Chiang, C. Serban, S. E. Ali, "Towards network invariant fault diagnosis in MANETs via statistical modeling: The global strength of local weak decisions", 2012 IEEE Network Operations and Management Symposium (NOMS 2012), Maui, Hawaii, USA, April 2012. [citation][year=2011]1. Maria Rita Di Berardini, Henry Muccini, Andrea Polini, Pengcheng Zhang, "Online Failure Prediction of Dynamically Evolving Systems", Technical Report TRCS 006/2011, Dipartimento di Informatica, University of L'Aquila, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2010]1. James Brandt, Frank Chen, Vincent De Sapio, Ann Gentile, Jackson Mayo, Philippe Pébay, Diana Roe, David Thompson, Matthew Wong, "Quantifying Effectiveness of Failure Prediction and Response in HPC Systems: Methodology and Example", 1st Workshop on Fault-Tolerance for HPC at Extreme Scale, FTXS 2010, in conjunction with The 40th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, IL, USA, 2010. [publication]Olga Craveiro and Macedo, J. and Madeira, H. , "Use of Co-occurrences for Temporal Expressions Annotation", in International Symposium on String Processing and Information (SPIRE), 2009 [publication]Marco Vieira and Madeira, H. , "From Performance to Dependability Benchmarking: A Mandatory Path", in First TPC Technology Conference on Performance Evaluation & Benchmarking, TPCTC 2009, (jointly organized with the 35th International Conference on Very Large Databases, VLDB09), 2009 [citation][year=2013]Alessandro Gustavo Farias Fior, "Under Pressure Benchmark: A Large-Scale Availability Benchmark For Distributed Databases", Msc Thesis, Universidade Federal Do Paraná, Curitiba, Brazil, 2013. [citation][year=2012]Anja Bog, "Benchmarking Composite Transaction and Analytical Processing Systems", University of Potsdam/Hasso-Plattner-Institut, Potsdam, Germany, June 2012. [citation][year=2010]1. Karl Huppler, “Price and the TPC", Second TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC'10, Singapure, September 2010. [citation][year=2010]2. Priya Sethuraman, H. Reza Taheri, "TPC-V: a benchmark for evaluating the performance of database applications in virtual environments", Second TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC'10, Singapure, September 2010. [publication]Mendes, N. and Joao Duraes and Marco Vieira and Madeira, H. , "Towards Assessing the Impact of Security Attacks in Web Servers (fast abstract)", in The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, 2009 [publication]Costa, P. .N.d. and Silva, J.G. and Madeira, H. , "Dependability Benchmarking using Software Faults: How to create practical and representative faultloads", in Proc. IEEE 15th Pacific Rim International Symposium on Dependable Computing (PRDC’09), 2009 2008(11 publications) [publication]José Fonseca and Marco Vieira and Madeira, H. , "Online Detection of Malicious Data Access Using DBMS Auditing", in 23rd Annual ACM Symposium on Applied Computing (ACM SAC 2008), 2008 [citation][year=2013]Abhijeet Sartape, Vasgi B. P., "Data-Base Security Using Different Techniques: A Survey", International Journal of Computer Trends and Technology (IJCTT), Vol. 4 Issue 4, April 2013. [citation][year=2013]Rita M. Barrios, "A Multi-Leveled Approach to Intrusion Detection and the Insider Threat", Journal of Information Security, 4, January 2013. [citation][year=2012]Asaf Shabtai, Yuval Elovici, Lior Rokach, "A Survey of Data Leackage Detection and Prevention Solutions", Springer Briefs in Computer Science, 2012. [citation][year=2012]Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2012]1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2011]A. Rezk, H. Ali, M. El-Mikkawy, S. Barakat, "Minimize the False Positive Rate in a Database Intrusion Detection System", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3 No 5, October 2011. [citation][year=2011]1. J. Harold Pardue, Priya Patidar, “Threats to Healthcare Data: A Threat Tree for Risk Assessment”, Issues in Information Systems, Volume XII, No. 1, pp. 106-113, 2011. [citation][year=2010]Dai Hual, Qin Xiaolin, Li Ziyuel, Sun Libin, Wu Don, "A DBSUIM-Based Suspicious User Isolation Mechanism for Database", Journal of Computer Research and Development, 47(Suppl), 2010. [citation][year=2010]1. Sunu Mathew, Michalis Petropoulos, Hung Q. Ngo, Shambhu Upadhyaya, “A data-centric approach to insider attack detection in database systems”, 13th international conference on Recent advances in intrusion detection, RAID'10, Ottawa, Ontario, Canada, September 15-17, 2010. [citation][year=2010]2. Ma'ayan Gafny, Asaf Shabtai, Lior Rokach, and Yuval Elovici, “Detecting data misuse by applying context-based data linkage”, 2010 ACM CCS Workshop on Insider threats (Insider Threats '10), Chicago, IL, USA, October 2010. [citation][year=2010]3. Amir Harel, Asaf Shabtai, Lior Rokach, Yuval Elovici, “M-score: estimating the potential damage of data leakage incident by assigning misuseability weight”, 2010 ACM CCS Workshop on Insider threats (Insider Threats '10), Chicago, IL, USA, October 2010. [citation][year=2009]Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li, "Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation", Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009 (in conjunction with ICEIS 2009), Milan, Italy, May 2009. [citation][year=2009]1. Hennayake M. Bandara, “Security Features in Oracle Database Management System”, MSc Thesis, California State University, Sacramento, USA, 2009. [citation][year=2009]2. Sunu Mathew, “Techniques for Cyber-Attack Comprehension through Analysis of Application Level Data”, PhD Thesis, State University of New York at Buffalo, USA, July 2009. [citation][year=2009]3. Platt, A., Mengle, S. S., Goharian, N., “Improving classification based off-topic search detection via category relationships”, 2009 ACM Symposium on Applied Computing, SAC '09, Honolulu, Hawaii, USA, March 9-12, 2009. [citation][year=2008]1. Jagdish Halde, "SQL Injection analysis, Detection and Prevention", MSc Thesis, Department of Computer Science, San Jose State University, San Jose, CA, USA, 2008. [publication]Vieira, J. and Marco Vieira and Costa, M.A. and Madeira, H. , "Redundant Array of Inexpensive Nodes for DWS", in The 13th International Conference on Database Systems for Advanced Applications (DASFAA 2008), 2008 [publication]Vieira, J. and Marco Vieira and Costa, M.A. and Madeira, H. , "RAIN: Always On Data Warehousing", in The 13th International Conference on Database Systems for Advanced Applications (DASFAA 2008), 2008 [publication]Marco Vieira and Vieira, J. and Madeira, H. , "Towards Data Security in Affordable Data Warehouses (Fast Abstract)", in 7th European Dependable Computing Conference (EDCC-7), 2008 [citation][year=2011]1. Amy Poh Ai Ling, Mukaidono Masao, “Grid Information Security Functional Requirement - Fulfilling Information Security of a Smart Grid System”, International Journal of Grid Computing & Applications (IJGCA), Vol.2, No.2, June 2011. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Experimental Robustness Evaluation of JMS Middleware", in IEEE International Conference on Services Computing (SCC 2008), 2008 [citation][year=2013]Antonio Bovenzi, Aniello Napolitano, Christian Esposito, Gabriella Carrozza, "JFIT: an Automatic Tool for Assessing Robustness of DDS-Compliant Middleware", Innovative Technologies for Dependable OTS-Based Critical Systems, 2013. [citation][year=2012]Marcelo Invert Palma Salas, “Metodologia de Testes de Segurança para Análise de Robustez de Web Services pela Injeção de Ataques”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Brazil, December 2012. [citation][year=2011]1. A. Napolitano, G. Carrozza, A. Bovenzi, C. Esposito, "Automatic Robustness Assessment of DDS-Compliant Middleware", 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), Pasadena, CA, USA, December 2011. [citation][year=2011]2. André Willik Valenti, “Testes de Robustez em Web Services por meio de Injeção de Falhas”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), July 2011. [citation][year=2010]1. Robert Henjes, “Performance Evaluation of Publish/Subscribe Middleware Architectures”, PhD Thesis, Julius-Maximilians-Universität Würzburg, Germany, April 2010. [citation][year=2009]1. Francis Tam, “Service Availability Standards for Carrier-Grade Platforms: Creation and Deployment in Mobile Networks,” PhD Thesis, Tampere University of Technology, Finland, 2009. [publication]Marco Vieira and Mendes, N. and Joao Duraes and Madeira, H. , "The AMBER Data Repository", in DSN 2008 Workshop on Resilience Assessment and Dependability Benchmarking (DSN-RADB08), IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), 2008 [citation][year=2011]1. J. Briffaut, P. Clemente, J.-F. Lalande, J. Rouzaud-Cornabas, "From Manual Cyber Attacks Forensic to Automatic Characterization of Attackers’ Pro?les", Rapport de Recherche, RR-2011-14, Laboratoire D'informatique Fondamentale D'Orleans (LIFO), Université D'Orleans, France, 2011. [citation][year=2010]1. Andreas Dittrich, Felix Salfner, "Experimental Responsiveness Evaluation of Decentralized Service Discovery", 15th IEEE Workshop on Dependable Parallel, Distributed and Network-Centric Systems,Atlanta, Georgia, USA, April 2010. [citation][year=2008]1. Andrea Ceccarelli, Danilo Iovino, Andrea Bondavalli, “A Fault Injection Tool for Trustworthy, Comparative Measurements and Analysis”, SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), Naples, Italy, October 5, 2008. [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Timing Failures Detection in Web Services", in IEEE Asia-Pacific Services Computing Conference (APSCC 2008), 2008 [citation][year=2012]Araceli Acosta, Cecilia Kilmurray, Pablo Castro, Nazareno Aguirre, “Model Checking Propositional Deontic Temporal Logic via a ?-Calculus Characterization”, Formal Methods: Foundations and Applications, ed. Rohit Gheyi and David Naumann, 2012. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Training Security Assurance Teams using Vulnerability Injection", in 14th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC\'08), 2008 [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2011]1. Paulo Véras, “Benchmarking Software Requirements Documentation for Space Application”, PhD Thesis, Instituto Tecnológico de Aeronáutica, São José dos Campos, SP, Brasil, 2011. [citation][year=2011]2. Francisco Vieira, “Realistic Vulnerability Injections in PHP Web Applications”, MSc Thesis, Faculty of Sciences, University of Lisbon, Lisbon, Portugal, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [publication]Mendes, N. and Araújo Neto, A.C.d. and Joao Duraes and Marco Vieira and Madeira, H. , "Assessing and Comparing Security of Web Servers", in 14th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC\'08), 2008 [citation][year=2013]B. Eshete, A. Villafiorita, K. Weldemariam, M. Zulkernine, “Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications”, IEEE 7th International Conference on Software Security and Reliability, SERE 2013, June 18-20, 2013. [citation][year=2012]1. L. Ertaul, Y. Martirosyan, “Implementation of a WEB Application for Evaluation of WEB Application Security Scanners”, 2012 International Conference on Security & Management, SAM’12, Las Vegas, USA, July 2012. [citation][year=2011]1. Birhanu Eshete, Komminist Weldemariam, Adolfo Villafiorita, “Early Detection of Security Misconfiguration Vulnerabilities in Web Applications”, Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011. [citation][year=2010]1. R. Priyadarshini, S. Aishwarya, A. A. Ahmed, "Search engine vulnerabilities and threats - a survey and proposed solution for a secured censored search platform", International Conference on Communication and Computational Intelligence, INCOCCI 2010, Erode, India, December 27-29, 2010. [citation][year=2009]1. Sérgio Rodrigues Nunes, "Web attack risk awareness with lessons learned from high interaction honeypots", MSc Thesis, University of Lisbon/Carnegie Mellon University, December 2009. [citation][year=2009]2. Yoshio Masuzawa, Takashi Hayakawa, Kazunori Kumakura, Toshio Morikawa, "Method for ensuring security, data storage apparatus, security ensuring server, and storage medium storing program for the same", United States Patent 7574743, August de 2009. [publication]Mendes, N. and Joao Duraes and Marco Vieira and Madeira, H. , "Security Assessment and Testing Tools Information Repository", in Workshop on Fault Tolerance (WTF2008) in the 26th Brazilian Symposium on Network Computing (SBRC2008), 2008 [publication]Raquel Almeida and Vieira, J. and Marco Vieira and Madeira, H. and Jorge Bernardino , "Efficient Data Distribution for DWS", in 10th International Conference on Data Warehousing and Knowledge Discovery (DaWaK \'08 ), 2008 [citation][year=2012]1. Lili Wu, Roshan Sumbaly, Chris Riccomini, Gordon Koo, Hyung Jin Kim, Jay Kreps, Sam Shah, "Avatara: OLAP for Web-scale Analytics Products", Proceedings of the VLDB Endowment, Vol. 5, No. 12, The 38th International Conference on Very Large Data Bases, Istanbul, Turkey, August 2012. [citation][year=2011]1. Doulkifli Boukraâ, Omar Boussaïd, Fadila Bentayeb, "Vertical Fragmentation of XML Data Warehouses Using Frequent Path Sets", 13th international conference on Data warehousing and knowledge discovery, DaWaK'11, Toulouse, France, August 2011. [citation][year=2011]2. Robert Jan Kopaczyk, "Scalable In-Memory Aggregation", MSc Thesis, Department of Computing, Imperial College London, London, UK, June 2011. [citation][year=2009]1. Yongping Zhang, "OLAP Database Computation with a Splitcube in a Cluster", MSc Theses, School of COmputing Science, Simon Fraser University, Burnaby, Canada, 2009. [citation][year=2009]2. Shah, N., Tsai, C., Marinov, M., Cooper, J., Vitliemov, P., Chao, K., “Ontological On-line Analytical Processing for Integrating Energy Sensor Data”, IETE Tech Rev 26:375-87, 2009. [citation][year=2009]3. Kolsi, N., Abdellatif, A., and Ghedira, K., “Data warehouse access using multi-agent system”, Distributed and Parallel Databases, Vol. 25, Issue 1-2, April 2009. 2007(11 publications) [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "Towards Timely ACID Transactions in DBMS", in The 12th International Conference on Database Systems for Advanced Applications (DASFAA 2007), 2007 [citation][year=2010]Adnan Gohar, “Analyzing Service Oriented Architecture (SOA) in Open Source Products”, Master Thesis in Software Engineering, School of Innovation, Design and Engineering (IDT), Mälardalen University, Sweden, October 2010. [publication]Barbosa, R. and Silva, N. and Silva, N. and Joao Duraes and Madeira, H. , "Verification and Validation of (Real Time) COTS Products using Fault Injection Techniques", in 6th IEEE International Conference on COTS-based Software Systems, 2007 [publication]Marco Vieira and Laranjeiro, N. and Madeira, H. , "Assessing Robustness of Web-services Infrastructures", in Dependable Computing and Communications Symposium (DCCS), 2007 [citation][year=2013]Sébastien Salva and Antoine Rollet, “A pragmatic approach for testing stateless and stateful Web Service Robustness,” Studia Informatica Universalis 10, no. 2: 139–179, 2013. [citation][year=2013]Stefan Winter, Michael Tretter, Benjamin Sattler, and Neeraj Suri, “simFI: From Single to Simultaneous Software Fault Injections,” The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary: IEEE Computer Society, 24 June 2013. [citation][year=2013]Zibin Zheng and Michael R Lyu, “QoS-Aware Fault Tolerance for Web Services,” QoS Management of Web Services, 97–118. Advanced Topics in Science and Technology in China, Springer, 2013. [citation][year=2012]1. Issam Rabhi, “Testabilité des services Web”, PhD Thesis, École Doctorale Sciences pour l’Ingénieur de Clermont-Ferrand. Université Blaise Pascal – Clermont II, 5 October 2012. [citation][year=2012]2. Ali Shahrokni, Robert Feldt, “A Systematic Review of Software Robustness”, Information and Software Technology (Elsevier), ISSN 0950-5849, June 2012. [citation][year=2012]3. Issam Rabhi and Patrice Laurençot, “Robustesse des Services Web Composés”, Conférence en IngénieriE du Logiciel (CIEL), Rennes, France, 18 June 2012. [citation][year=2012]4. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2012]5. Yuhui Chen, Anatoliy Gorbenko, Vyacheslav Kharchenko, Alexander Romanovsky, “Measuring and Dealing with the Uncertainty of SOA Solutions,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, ed. Valeria Cardellini, Emiliano Casalichio, Kalinka Castelo Branco, Júlio Cezar Estrella, and Francisco José Monaco, IGI Global, ISBN: 1609607945, 2012. [citation][year=2012]6. Anatoliy Gorbenko, Vyacheslav Kharchenko, Seyran Mamutov, Olga Tarasyuk, Alexander Romanovsky, “Exploring Uncertainty of Delays as a Factor in End-to-End Cloud Response Time”, 9th European Dependable Computing Conference (EDCC 2012), Sibiu, Romenia, May 2012. [citation][year=2011]1. Fahad A. Arshad, Saurabh Bagchi, “Dangers and Joys of Stock Trading on the Web: Failure Characterization of a Three-Tier Web Service,” IEEE 30th International Symposium on Reliable Distributed Systems, SRDS 2011, Madrid, Spain, October 2011. [citation][year=2011]2. Khaled Farj, “Fault Injection Testing Method of Software Implemented Fault Tolerance Mechanisms of Web Service Systems”, PhD Thesis, Newcastle University, Newcastle upon Tyne, UK, September 2011. [citation][year=2011]3. Rich Pietravalle and Dan Lanz, “Resiliency Research Snapshot”, Technical Report. 11-3023, MITRE Corporation, June 2011. [citation][year=2011]4. Zibin Zheng, “QoS Management of Web Services”, PhD Thesis, The Chinese University of Hong Kong, Hing Kong, January 2011. [citation][year=2011]Yuhui Chen, Anatoliy Gorbenko, Vyacheslav Kharchenko, and Alexander Romanovsky, “Measuring and Dealing with the Uncertainty of SOA Solutions,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, ed. Valeria Cardellini, Emiliano Casalichio, Kalinka Castelo Branco, Júlio Cezar Estrella, and Francisco José Monaco, 265-294, IGI Global, ISBN: 1609607945, July 2011. [citation][year=2010]1. Yongbo Wang, Fuyuki Ishikawa, and Shinichi Honiden, “Business Semantics Centric Reliability Testing for Web Services in BPEL”, 6th World Congress on Services, SERVICES ’10, Washington, DC, USA, 2010. [citation][year=2010]2. Zibin Zheng, M.R. Lyu, “Optimal Fault Tolerance Strategy Selection for Web Services,” International Journal of Web Service Research (JWSR), Vol. 7, no. 4, pp. 21-40, 2010. [citation][year=2010]3. Anatoliy Gorbenko, “Instability Analysis of Delays Contributing to Web Service Response Time”, Radioelectronic and computer systems, National Aerospace University, Ukraine. Vol. 6, no. 47, 2010. [citation][year=2010]4. Manoj Lall, Lucas Venter, and John van der Poll, “Evaluating the second generation Web services specifications for satisfying non-functional requirements,” World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, Orlando, Florida, USA, ISBN: 1-880094-83-5, October 2010. [citation][year=2010]5. Sébastien Salva, Issam Rabhi, “Stateful web service robustness”, Fifth International Conference on Internet and Web Applications and Services, Barcelona, Spain, May 2010. [citation][year=2010]6. Sébastien Salva, Issam Rabhi, “Robustesse des Services Web Persistants,” 8ème Conférence Internationale de MOdélisation et SIMulation (MOSIM 2010), Hammamet, Tunisia: IEEE Computer Society, May 2010. [citation][year=2010]7. Anatoliy Gorbenko, Vyacheslav Kharchenko, Seyran Mamutov, Olga Tarasyuk, Yuhui Chen, and Alexander Romanovsky, “Real Distribution of Response Time Instability in Service-Oriented Architecture”, 29th IEEE Symposium on Reliable Distributed Systems, pp. 92-99, New Delhi, India, November 2010. [citation][year=2009]1. Gorbenko, A., Kharchenko, V., Mamutov, S., Tarasyuk, O., Chen, Y., Romanovsky, “A Real Distribution of Response Time Instability in Service-Oriented Architecture”, CS-TR-1182, Technical Report Series, School of Computing Science, University of Newcastle Upon Tyne, UK, December 2009. [citation][year=2009]2. Zibin Zheng, Michael R. Lyu, “An Adaptive QoS-Aware Fault Tolerance Strategy for Web Services”, Springer Journal of Empirical Software Engineering (EMSE), December 2009. [citation][year=2009]3. Seung Hak Kuk, Hyeon Soo Kim, "Robustness testing framework for Web services composition", IEEE Asia-Pacific Services Computing Conference (APSCC 2009), Singapore, December 2009. [citation][year=2009]4. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September de 2009. [citation][year=2009]5. Zibin Zheng, Michael R. Lyu, “A QoS-Aware Fault Tolerant Middleware for Dependable Service Composition”, The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Lisbon, Portugal, June 29-July 2, 2009. [citation][year=2009]6. Zibin Zheng, Michael R. Lyu, “A Runtime Dependability Evaluation Framework for Fault Tolerant Web Services”, Workshop on Proactive Failure Avoidance, Recovery and Maintenance, PFARM (jointly organized with The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009), Lisbon, Portugal, June 29, 2009. [citation][year=2009]7. Sébastien Salva, Issam Rabhi, “Automatic web service robustness testing from WSDL descriptions”, 12th European Workshop on Dependable Computing, EWDC 2009, Toulouse, France, May 14-15, 2009. [citation][year=2009]8. Y. Chen, A. Gorbenko, V. Kharchenko, S. Mamutov, A. Romanovsky, O. Tarasyuk, “Benchmarking Dependability of a System Biology Application”, 14th IEEE International Conference on Engineering of Complex Computer Systems, Potsdam, Germany, June 2009. [citation][year=2008]1. A. Gorbenko, A. Romanovsky, V. Kharchenko, A. Mikhaylichenko, “Experimenting with exception propagation mechanisms in service-oriented architecture”, 4th international Workshop on Exception Handling, WEH’08, Atlanta, Georgia, USA, November 14, 2008. [citation][year=2008]2. Z. Zheng, M.R. Lyu, “A QoS-Aware Middleware for Fault Tolerant Web services”, IEEE International Symposium on Software Reliability Engineering (ISSRE'08), Seattle, USA, November 11-14, 2008. [citation][year=2008]3. A. Gorbenko, V. Kharchenko, O. Tarasyuk, Y. Chen, A. Romanovsky, “The Threat of Uncertainty in Service-Oriented Architecture”, 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, Newcastle upon Tyne, United Kingdom, November 2008. [citation][year=2008]4. Zibin Zheng, Michael R. Lyu, “A Distributed Replication Strategy Evaluation and Selection Framework for Fault Tolerant Web Services”, IEEE International Conference on Web Services (ICWS'08), Beijing, China, September 23-26, 2008. [citation][year=2008]5. Chen Yuhui, “WS-Mediator for Improving Dependability of Service Composition”, PhD Thesis, CS-TR: 1116 Technical Report Series, School of Computing Science, University of Newcastle Upon Tyne, UK, August 2008. [citation][year=2008]6. Z. Zheng, M.R. Lyu, "WS-DREAM: A Distributed Reliability Assessment Mechanism for Web Services", 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, Anchorage, Alaska, USA, June 24-27, 2008. [publication]Moraes, R. and Joao Duraes and Barbosa, R. and Martins, E. and Madeira, H. , "Experimental Risk Assessment and Comparison Using Software Fault Injection", in Dependable Computing and Communications Symposium (DCCS), 2007 [citation][year=2008]Gabriella Carrozza, "Software Faults Diagnosis in Complex, OTS-Based, Critical Systems?, PhD Thesis, "FEDERICO II? University of Naples, Naples, Italy, November, 2008. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Correlating security vulnerabilities with software faults (Fast Abstract)", in 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), 2007 [publication]Costa, A.C. and Marco Vieira and Madeira, H. , "Middleware Support for Time-Elastic Database Applications (Fast Abstract)", in 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2007), 2007 [publication]José Fonseca and Marco Vieira and Madeira, H. , "Detecting malicious SQL", in 4th International Conference on Trust, Privacy & Security in Digital Business (in conjunction with the 18th International Conference on Database and Expert Systems Applications (DEXA 2007)), TrusBus\'07, 2007 [citation][year=2013]Manju Khari, Anjali Karar, "Preventing SQL-Based Attacks Using Intrusion Detection System", International Journal of Science and Engineering Applications, Vol. 2 Issue 6, 2013. [citation][year=2013]Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013. [citation][year=2013]Gang Lu, Kevin Lü, "Logical Trees: an Essential Method of Parsing SQL Statement withSemantic Analysis", International Journal of Advancements in Computing Technology (IJACT), Vol. 5 No 1, January 2013. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]1. Yakkala V. Naga Manikanta, Anjali Sardana, "Protecting web applications from SQL injection attacks by using framework and database firewall", International Conference on Advances in Computing, Communications and Informatics (ICACCI '12), New York, NY, USA, August 2012. [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Integrated Intrusion Detection in Databases", in Third Latin-American Symposium on Dependable Computing (LADC 2007), 2007 [citation][year=2013]Elisa Costante, Sokratis Vavilis, Sandro Etall, Milan Petkovic, Nicola Zannone, "Database Anomalous Activities: Detection and Quantification", 10th International Conference on Security and Cryptography, SECRYPT 2013, Reykjavík, Iceland, July 29-31, 2013. [citation][year=2013]Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013. [citation][year=2012]1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2011]A. Rezk, H. Ali, M. El-Mikkawy, S. Barakat, "Minimize the False Positive Rate in a Database Intrusion Detection System", International Journal of Computer Science & Information Technology (IJCSIT), Vol. 3 No 5, October 2011. [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [citation][year=2011]2. Hua Dai, Xiaolin Qin, Guineng Zheng, Ziyue Li, “SQRM: An Effective Solution to Suspicious Users in Database”, The Third International Conference on Advances in Databases, Knowledge, and Data Applications (DBKDA 2011), St. Maarten, The Netherlands Antilles, January, 2011. [citation][year=2010]Dai Hual, Qin Xiaolin, Li Ziyuel, Sun Libin, Wu Don, "A DBSUIM-Based Suspicious User Isolation Mechanism for Database", Journal of Computer Research and Development, 47(Suppl), 2010. [citation][year=2010]Dai Hua,Qin Xiaolin?Bai Chuanjie, "A Malicious Transaction Detection Method Based on Transaction Template", Journal of computer research and development, 47(5), 2010. [citation][year=2009]Yawei Zhang, Xiaojun Ye, Feng Xie, Yong Peng, "A Practical Database Intrusion Detection System Framework", Ninth IEEE International Conference on Computer and Information Technology, CIT '09, Xiamen, China, October 11-14, 2009. [citation][year=2009]1. Wu, G. Z., Osborn, S. L., Jin, X., “Database Intrusion Detection Using Role Profiling with Role Hierarchy”, 6th VLDB Workshop on Secure Data Management, Lyon, France, August 2009. [citation][year=2009]2. Mohammad Hossein Haratian, “An Architectural Design For a Hybrid Intrusion Detection System for Database”, MSc Thesis, Centre for Advanced Software Engineering (CASE), Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, April 2009. [publication]Marco Vieira and Madeira, H. , "Do you know... How to analyze and share results from dependability evaluation experiments? (Tutorial)", in Third Latin-American Symposium on Dependable Computing (LADC 2007), 2007 [publication]Marco Vieira and Laranjeiro, N. and Madeira, H. , "Benchmarking the Robustness of Web Services", in The 13th IEEE Pacific Rim Dependable Computing Conference (PRDC 2007), 2007 [citation][year=2013]Sachin Kumar, Saibal K. Pal, "Customized TDD in Post Trade Automation for Non Expert Workforce", International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 9, September 2013. [citation][year=2012]1. Scott Bourne, Claudia Szabo, and QuanZ. Sheng, “Ensuring Well-Formed Conversations between Control and Operational Behaviors of Web Services,” Service-Oriented Computing, ed. Chengfei Liu, Heiko Ludwig, Farouk Toumani, and Qi Yu, 7636:507–515. Vol. 7636. Lecture Notes in Computer Science, Springer Berlin Heidelberg, ISBN: 978-3-642-34320-9. http://dx.doi.org/10.1007/978-3-642-34321-6_34, 2012 [citation][year=2012]2. Quan Z. Sheng, Zakaria Maamar, Lina Yao, Claudia Szabo, and Scott Bourne, “Behavior Modeling and Automated Verification of Web Services,” Information Sciences (Elsevier), 2012. [citation][year=2012]3. Ali Shahrokni, Robert Feldt, “A Systematic Review of Software Robustness”, Information and Software Technology (Elsevier), ISSN 0950-5849, June 2012. [citation][year=2012]4. Marcelo Invert Palma Salas and Eliane Martins, “Metodologia de Testes de Robustez por Injeção de Falhas para WS-Security”, Technical Report. Anais do VII Workshop de Teses, Dissertações e Trabalhos de Iniciação Científica em Andamento do IC-UNICAMP IC-12-19. Alex Grilo, Ariadne Carvalho, Daniel Cugler, Everton Silva, Gustavo Alkmim, Ivelize Rocha, Leonardo Tampelini, et al. (Eds.), Instituto de Computação, Universidade Estadual de Campinas, June 2012. [citation][year=2011]1. Lina Bentakouk, “Test symbolique de services Web composites”, PhD Thesis, Université Paris-Sud XI, France, 16 December 2011. [citation][year=2011]2. Paulo Véras, “Benchmarking Software Requirements Documentation for Space Application”, PhD Thesis, Instituto Tecnológico de Aeronáutica, São José dos Campos, SP, Brasil, 2011. [citation][year=2011]3. Mustafa Bozkurt, Mark Harman, “Automatically Generating Realistic Test Input From Web Services”, The 6th IEEE Symposium on Service-Oriented System Engineering, Irvine, CA, USA, December 12-14, 2011. [citation][year=2011]4. Sammer Hanna, Amer AbuAli, “Platform Effect on Web Services Robustness Testing”, Journal of Applied Sciences 11, no. 2, 360-366, 2011. [citation][year=2011]5. André Willik Valenti, “Testes de Robustez em Web Services por meio de Injeção de Falhas”, MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), July 2011. [citation][year=2011]6. Mustafa Bozkurt, Mark Harman, “Generating Realistic Test Input Using Web Services”, Research Note. RN/11/17, Department of Computer Science, University College London, July 2011. [citation][year=2010]1. André Willik Valenti, Willian Yabusame Maja, Eliane Martins, Fayçal Bessayah, Ana Cavalli, “WSInject: A Fault Injection Tool for Web Services”, Technical Report - IC-10-22, Instituto de Computação, Universidade Estadual de Campinas, Campinas, Brazil, July 2010. [citation][year=2010]2. Garth Heward, Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg, “Assessing the Performance Impact of Service Monitoring”, 21st Australian Software Engineering Conference, Auckland, New Zealand, April 2010. [citation][year=2010]3. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing Web Services: A Survey", Department of Computer Science, King's College London, UK, TR-10-01, January 2010. [citation][year=2009]1. Mustafa Bozkurt, Mark Harman, Youssef Hassoun, "Testing & Verification in Service-Oriented Architecture: A Survey", Software Testing, Verification and Reliability (STVR), Issn: 1099-1689, Wiley InterScience, 2009. [citation][year=2009]2. Karthik Pattabiraman, Benjamin Zorn, “DoDOM: Leveraging DOM Invariants for Web 2.0 Application Reliability”, Technical Report, Microsoft Research - Redmond, USA, 2009. [citation][year=2009]3. Francis Tam, “Service Availability Standards for Carrier-Grade Platforms: Creation and Deployment in Mobile Networks”, PhD Thesis, Tampere University of Technology, Finland, 2009. [citation][year=2009]4. Marcelo Palma Salas, Eliane Martins, “Metodologia de Testes de Robustez para Segurança em Serviços WEB”, proceedings of the 5o Workshop de Teses de Doutorado em Andamento do IC-UNICAMP, IC-09-026 – Technical Report, Mariana Piquet Dias, Cecília Mary F. Rubira, Rodolfo Jardim de Azevedo, Carla G. N. Macario, Joana E. G. Malaverr, Jefersson Alex dos Santos, Luiz Fernando Bittencourt, Ricardo Caceffo, Roberto Pereira, Vânia Paula de A. Neris (Eds.), September de 2009. [citation][year=2008]Kaiou Wang, “Improving the Reliability of Web Service Based Workflows”, MSc Thesis, University of York, UK, 2008. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Testing and comparing web vulnerability scanning tools for SQL injection and XSS attacks", in 13th IEEE Pacific Rim Dependable Computing Conference (PRDC 2007), 2007 [citation][year=2013]N. Awang and A. Manaf, “Detecting Vulnerabilities in Web Applications Using Automated Black Box and Manual Penetration Testing,” in Advances in Security of Information and Communication Networks, vol. 381, A. Awad, A. Hassanien, and K. Baba, Eds. Springer Berlin Heidelberg, 2013. [citation][year=2013]P. Santhosh Reddy, G.Sireesha, "Automated Security Test by using Formal Threat Models on Leakage Detection", International Journal of Advanced and Innovative Research (IJAIR), Vol. 2 Issue 2, 2013. [citation][year=2013]Prashant Belhekar, Alka Londhe, Bhavana Lucy, Santosh Kumar, "Finding Bugs In Web Applications Using Dynamic Test Generation", International Journal of Engineering Research & Technology (IJERT), Vol. 2 Issue 5, May 2013. [citation][year=2013]Michelle Elaine Ruse, "Model checking techniques for vulnerability analysis of Web applications", PhD Thesis, Iowa State University, Ames, Iowa, 2013. [citation][year=2013]Eric Alata, Mohamed Kaaniche, Vincent Nicomette, Rim Akrout, "An Automated Approach to Generate Web Applications Attack Scenarios", Sixth Latin-American Symposium on Dependable Computing, LADC 2013, Rio de Janeiro, RJ, Brazil, April 1-5 2013. [citation][year=2013]Pallavali Radha, G. Sireesha, "Security Test by Using FTM and Data Allocation Strategies on Leakage Detection", International Journal Of Coputers & Technology, Vol. 4 No 2, March 2013. [citation][year=2013]Hannes Holm, Mathias Ekstedt, Teodor Sommestad, "Effort Estimates on Web Application Vulnerability Discovery", 46th Hawaii International Conference on System Sciences, HICSS 2013, January 7-10 2013. [citation][year=2013]A. Marback, H. Do, K. He, s. Kondamarri, D. Xu, "A threat model-based approach to security testing", Software: Practice and Experience, Vol. 43 Issue 2, February 2013. [citation][year=2012]Sanon Chimmanee, Thanyada Veeraprasit, Kritsada Sriphaew, Aniwat Hemanidhi, "A Performance Comparison of Vulnerability Detection between Netclarity Auditor and Open Source Nessus", Recent Advances in Communications, Circuits and Technological Innovation, Paris, France, December 2-4, 2012. [citation][year=2012]D. N. Swetha, B. S. Kumar, “Protocol Based Approach on Vulnerability Detection Tools of SQLIA along with Monitoring Tools”, International Journal of Computer Science Engineering and Technology (IJCSET), vol. 2, no. 11, November 2012. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]T. Koskinen, P. Ihantola, V. Karavirta, "Quality of WordPress Plug-Ins: An Overview of Security and User Ratings", International Conference on Privacy, Security, Risk and Trust and International Conference on Social Computing, PASSAT 2012 and SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012. [citation][year=2012]D. Hauzar, J. Kofron, "On Security Analysis of PHP Web Applications", IEEE 36th Annual Computer Software and Applications Conference Workshops, COMPSACW 2012, Izmir, Turkey, July 16-20, 2012. [citation][year=2012]Douglas Rocha, Diego Kreutz, Rogerio Turchetti, "A free and extensible tool to detect vulnerabilities in Web systems", 2012 7th Iberian Conference on Information Systems and Technologies, CISTI 2012, Madrid, Spain, June 2012. [citation][year=2012]Mike Samuel, Úlfar Erlingsson, "Let's parse to prevent pwnage", 5th USENIX conference on Large-Scale Exploits and Emergent Threats, LEET'12, San Jose, CA, USA, April 2012. [citation][year=2012]D. Xu, M. Tu, M. Sanford, L. Thomas, D. Woodraska, W. Xu, "Automated Security Test Generation with Formal Threat Models", IEEE Transactions on Dependable and Secure Computing, TSC, ISSN: 1545-5971, Issue:99, February 2012. [citation][year=2011]A. Dessiatnikoff, R. Akrout, E. Alata, M. Kaaniche, V. Nicomette, “A Clustering Approach for Web Vulnerabilities Detection", 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC 2011), Pasadena, CA, USA, December 2011. [citation][year=2011]Nidal Khoury, Pavol Zavarsky, Dale Lindskog Ron Ruhl, "Testing and assessing web vulnerability scanners for persistent SQL injection attacks", First International Workshop on Security and Privacy Preserving in e-Societies (SeceS '11), New York, NY, USA, 2011. [citation][year=2011]D. Hauzar, J. Kofron, “Hunting Bugs Inside Web Applications”, Formal Verification of Object-Oriented Software, Technical report, Department of Informatics, KIT, October 2011. [citation][year=2011]Zhushou Tang, Haojin Zhu, Zhenfu Cao, Shuai Zhao, "L-WMxD: Lexical based Webmail XSS Discoverer", 2011 IEEE Conference on Computer Communications Workshops, INFOCOM WKSHPS 2011, Hyannis, MA, USA, October 10-12, 2011. [citation][year=2011]N. Khoury, P. Zavarsky, D. Lindskog, R. Ruhl, "An Analysis of Black-Box Web Application Security Scanners against Stored SQL Injection", 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT 2011) and 2011 IEEE Third International Conference on Social Computing (SOCIALCOM 2011), Boston, USA, October 2011. [citation][year=2011]Jeff Stuckman, James Purtilo, "A Testbed for the Evaluation of Web Intrusion Prevention Systems", 2011 Third International Workshop on Security Measurements and Metrics, Metrisec, September 2011. [citation][year=2011]Birhanu Eshete, Komminist Weldemariam, Adolfo Villafiorita, “Early Detection of Security Misconfiguration Vulnerabilities in Web Applications”, Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011. [citation][year=2011]Sangita Roy, Avinash Kumar Singh, Ashok Singh Sairam, "Detecting and Defeating SQL Injection Attacks", International Journal of Information and Electronics Engineering, Vol. 1 , No. 1, July 2011. [citation][year=2011]Thomas, L., Weifeng Xu, Dianxiang Xu, "Mutation Analysis of Magento for Evaluating Threat Model-Based Security Testing", IEEE 35th Annual Computer Software and Applications Conference Workshops (COMPSACW), pp. 184 - 189, Minuch, Germany, July, 2011. [citation][year=2011]Daniel Woodraska, Michael Sanford, Dianxiang Xu, “Security mutation testing of the FileZilla FTP server”, 2011 ACM Symposium on Applied Computing, ACM SAC '11, Taichung, Taiwan, March 21-24, 2011. [citation][year=2011]Geert Smelt, “Programming web applications securely”, BSc Thesis, Faculty of Science, Radboud University of Nijmegen, Nijmegen, Netherlands, January 2011. [citation][year=2010]Dmitri Nikulin, "Assertions For Self-Testing Web Applications", Faculty of Information Technology - Monash University, Clayton, Victoria, Australia, 2010. [citation][year=2010]Huning Dai, Michael Glass, E. Gail Kaiser, "Baseline: Metrics for setting a baseline for web vulnerability scanners", Technical Report, CUCS-023-10, Columbia University, New York, NY, 2010. [citation][year=2010]P. Roberts-Morpeth, J. Ellman, "Some security issues for web based frameworks", 2010 7th International Symposium on Communication Systems Networks and Digital Signal Processing, CSNDSP 2010, New Castle, UK, July 2010 [citation][year=2010]Shahriar, M. Zulkernine, “Mitigating Program Security Vulnerabilities: Approaches and Challenges”, ACM Computing Surveys, ACM, 2010. [citation][year=2010]D.A. Shelly, “Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners”, MSc Thesis, Virginia Polytechnic Institute and State University, July 2010. [citation][year=2010]Tânia Basso, Plínio César Simões Fernandes, Mario Jino, Regina Moraes, “Analysis of the Effect of Java Software Faults on Security Vulnerabilities and Their Detection by Commercial Web Vulnerability Scanner Tool”, 4th Workshop on Recent Advances on Intrusion-Tolerant Systems, WRAITS 2010, in conjunction with The 40th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), Chicago, IL, USA, 2010. [citation][year=2010]Muhammad Sajid Farooq, Muhammad Khalid Khan, Muhammad Qasim Pasta, “Model Based Web Application Backend Testing Using Requirement Specification Table”, Journal of Engineering and Sciences 4, no. 1. Technology Forces, January – June, 2010. [citation][year=2010]Hossain Shahriar, “Mitigating and Monitoring Program Security Vulnerabilities”, PhD Thesis, School of Computing - Queen’s University, Kingston, Ontario, Canada, June 2010. [citation][year=2010]J. Bau, E. Bursztein, D. Gupta, J.C. Mitchell, “State of the Art: Automated Black-Box Web Application Vulnerability Testing”, Proceedings IEEE Symposium on Security and Privacy, May 2010. [citation][year=2010]Tania Basso, Regina L. O. Moraes, Mario Jino, "A Methodology for Effectiveness Analysis of Vulnerability Scanning Tools", III EADCA - Terceiro Encontro dos Alunos e Docentes do Departamento de Engenharia de Computação e Automação Industrial, University of Campinas (UNICAMP), Brazil, March 2010. [citation][year=2009]1. Shahriar, H., Zulkernine, M. “MUTEC: Mutation-based testing of Cross Site Scripting”, 2009 ICSE Workshop on Software Engineering For Secure Systems, International Conference on Software Engineering, Vancouver, Canada, May 19, 2009. [citation][year=2009]2. H. Shahriar, M. Zulkernine, “Automatic Testing of Program Security Vulnerabilities", 1st IEEE International Workshop on Test Automation, 2009 33rd Annual IEEE International Computer Software and Applications Conference, IEEE CS Press, Seattle, USA, July 2009. [citation][year=2008]1. Jagdish Halde, "SQL Injection analysis, Detection and Prevention", MSc Thesis, Department of Computer Science, San Jose State University, San Jose, CA, USA, 2008. 2006(8 publications) [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "Towards Timely ACID Transactions in DBMS (Short Paper)", in The IEEE 12th International Symposium Pacific Rim Dependable Computing (PRDC 2006), 2006 [citation][year=2010]1. Adnan Gohar, “Analyzing Service Oriented Architecture (SOA) in Open Source Products”, Master Thesis in Software Engineering, School of Innovation, Design and Engineering (IDT), Mälardalen University, Sweden, October 2010. [publication]José Fonseca and Marco Vieira and Madeira, H. , "Monitoring Database Application Behavior for Intrusion Detection (Short Paper)", in The IEEE 12th International Symposium Pacific Rim Dependable Computing (PRDC 2006), 2006 [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [citation][year=2010]1. Yi Hu, Brajendra Panda, "Mining Inter-transaction Data Dependencies for Database Intrusion Detection", Innovations and Advances in Computer Sciences and Engineering, Springer Netherlands, ISBN978-90-481-3657-5, March 2010. [citation][year=2009]1. Mohammad Hossein Haratian, “An Architectural Design For a Hybrid Intrusion Detection System for Database”, MSc Thesis, Centre for Advanced Software Engineering (CASE), Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia, Malaysia, April 2009. [citation][year=2007]Clay Brockman, "Why Monitoring Database Application Behavior is the Best Database Intrusion Detection Method", Position Paper - ITK 478: Fall 2007, Illinois State University, 2007. [publication]Silva, L. and Madeira, H. and Silva, J.G. , "Software Aging and Rejuvenation in a SOAP-based Server", in IEEE-NCA, Network Computing and Applications, 2006 [citation][year=2007]Salvatore Orlando, "Software Aging Analysis of Off The Shelf Software Items?, PhD Thesis Salvatore Orlando, "FEDERICO II? University of Naples, Naples, Italy, October, 2007. [publication]Mendes, N. and Moraes, R. and Martins, E. and Madeira, H. , "Improving dependability of software components by using wrappers", in VII Workshop de Testes e Tolerância a Falhas, 2006 [publication]Barbosa, R. and Costa, D. and Madeira, H. , "An Empirical Approach to Assess Software Off-The-Shelf Components Using Fault Injection", in International Conference on Data Systems in Aerospace, DASIA 2006, 2006 [publication]Moraes, R. and Joao Duraes and Martins, E. and Madeira, H. , "A field data study on the use of software metrics to define representative fault distribution", in Workshop on Empirical Evaluation of Dependability and Security (WEEDS), 2006 [publication]Moraes, R. and Barbosa, R. and Joao Duraes and Mendes, N. and Martins, E. and Madeira, H. , "Injection of faults at component interfaces and inside the component code: are they equivalent?", in 6th European Dependable Computing Conference â?? EDCC-6, 2006 [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2008]Gabriella Carrozza, "Software Faults Diagnosis in Complex, OTS-Based, Critical Systems?, PhD Thesis, "FEDERICO II? University of Naples, Naples, Italy, November, 2008. [citation][year=2008]Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou, "A PIN-Based Dynamic Software Fault Injection System", The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp.2160-2167, 18-21 November, 2008. [citation][year=2007]Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, and Andrew S. Tanenbaum, "Failure Resilience for Device Drivers?, Dependable Computing and Communications Symposium (DCCS), 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Edinburgo, Reino Unido, 25-28 de Junho de 2007. [citation][year=2007]Andreas Johansson, Neeraj Suri, Brendan Murphy "On the Selection of Error Model(s) For OS Robustness Evaluation?, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Edinburgo, Reino Unido, 25-28 de Junho de 2007 [publication]Mendes, N. and Moraes, R. and Martins, E. and Madeira, H. , "Jaca Tool Improvements for Speeding Up Fault Injection Campaigns", in Brasilien Symposium on Software Engineering, 2006 2005(8 publications) [publication]Pintér, G. and Madeira, H. and Marco Vieira and Pataricza, A. and Majzik, I. , "A Data Mining Approach to Identify Key Factors in Dependability Experiments", in Fifth European Dependable Computing Conference (EDCC-5), 2005 [citation][year=2013]Matthew Leeke, Arshad Jhumka, Sarabjot Singh Anand, "Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors", The Computer Journal, 56 (6), 2013. [citation][year=2011]1. Matthew Leeke, Saima Arif, Arshad Jhumka, Sarabjot Singh Anand , “A Methodology for the Generation of Efficient Error Detection Mechanisms”, 41st IEEE/IFIP International Conference on Dependable Systems and Networks, DSN'11, Hong Kong, China, June 27-30, 2011. [citation][year=2010]1. Piotr Gawkowski, Monika A. Kuczy?ska, Agnieszka Komorowska, "Fault Effects Analysis and Reporting System for Dependability Evaluation", Seventh International Conference on Rough Sets and Current Trends in Computing, RSCTC 2010, Warsaw, Poland, June 2010. [citation][year=2007]1. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]2. Domenico Cotroneo, Roberto Pietrantuono, Leonardo Mariani, Fabrizio Pastore, “Investigation of failure causes in workload-driven reliability testing”, Foundations of Software Engineering archive, Fourth international workshop on Software quality assurance: in conjunction with the 6th ESEC/FSE joint meeting, Dubrovnik, Croatia, 2007. [citation][year=2006]1. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [publication]Marco Vieira and Madeira, H. , "Towards a security benchmark for Database Management Systems", in IEEE/IFIP International Conference on Dependable Systems and Networks, DSN2005, 2005 [citation][year=2011]1. Rich Pietravalle and Dan Lanz, “Resiliency Research Snapshot”, Technical Report. 11-3023, MITRE Corporation, June 2011. [citation][year=2008]YE Xiao-jun, WANG Jian-min, "Design of Database System Dependability Benchmarking Tools", Computer Science Journal, 35(8), 2008. [citation][year=2007]1. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December de 2007. [citation][year=2006]Randy Robertson, "In Support of Security Standards for Organizations", Position Paper - ITK 478: Fall 2006, Illinois State University, 2006. [citation][year=2006]1. J. Saul Gonzalez-Campos, “Secure Groups: Enhanced Management of Encrypted Data in Databases”, Seventh Mexican International Conference on Computer Science, ENC '06, September 2006. [citation][year=2006]2. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "TACID Transactions", in 1st Workshop on Hot Topics in System Dependability (HotDep-05), 2005 [citation][year=2007]2. Raul Barbosa, “An Essay on Real-Time Databases”, Department of Computer Science and Engineering, Chalmers University of Technology, Göteborg, Sweden, January 2007. [citation][year=2007]1. John D. McGregor, Tacksoo Im, “A Qualitative Approach to Dependability Engineering”, Dagstuhl Seminar, Germany, January 2007. [publication]Maia, R. and Henriques, L. and Barbosa, R. and Costa, D. and Madeira, H. , "Xception fault injection and robustness testing framework: a case-study of testing RTEMS", in VI Test and Fault Tolerance Workshop (jointly organized with the 23rd Brazilian Symposium on Computer Networks (SBRC)), 2005 [publication]Vieira, J. and Jorge Bernardino and Madeira, H. , "Efficient compression of text attributes of data warehouse dimensions", in 7th International Conference on Data Warehousing and Knowledge Discovery - DaWak, 2005 [citation][year=2013]1 "Efficient compression of text attributes of data warehouse dimensions [citation][year=2013]" 13984315614883010982 Optimizing multi storage parallel backup for real time database systems http://www.ijesat.org/Volumes/2012_Vol_02_Iss_05/IJESAT_2012_02_05_48.pdf M Muthukumar, T Ravichandran IJESAT Year/NA ijesat.org 2 "Efficient compression of text attributes of data warehouse dimensions [citation][year=2013]" 13984315614883010982 OPTIMIZING AND ENHANCING PARALLEL MULTI STORAGE BACKUP COMPRESSION FOR REAL-TIME DATABASE SYSTEMS http://www.doaj.org/doaj?func=fulltext&aId=1108088 C Coimbatore Publication/NA Year/NA doaj.org 3 "Efficient compression of text attributes of data warehouse dimensions [citation][year=2013]" 13984315614883010982 Pervasive Business Intelligence http://amsdottorato.cib.unibo.it/5232/ E Turricchia Publication/NA 2013 amsdottorato.cib.unibo.it 4 "Efficient compression of text attributes of data warehouse dimensions [citation][year=2013]" 13984315614883010982 Query-relevant document representation for text clustering http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5664205 M Makrehchi … (ICDIM), 2010 Fifth International Conference on 2010 ieeexplore.ieee.org 5 "Efficient compression of text attributes of data warehouse dimensions [citation][year=2013]" 13984315614883010982 Cost-Effective Data Allocation in Data Warehouse Striping http://www.doaj.org/doaj?func=fulltext&aId=1177338 R Almeida, J Vieira, M Vieira, H Madeira… International … 2012 doaj.org [publication]Kanoun, K. and Madeira, H. and Moreira, F. and Cin, M.D. and García, J.C. , "DBench - Dependability Benchmarking", in Fifth European Dependable Computing Conference (EDCC-5), 2005 [publication]Joao Duraes and Madeira, H. , "A methodology for the automated identification of buffer overflow vulnerabilities in executable software without source-code", in Second Latin-American Symposium on Dependable Computing, LADC, 2005 [publication]Marco Vieira and Madeira, H. , "Detection of malicious transactions in DBMS", in The 11th IEEE International Symposium Pacific Rim Dependable Computing, PRDC2005, 2005 [citation][year=2013]Sudam Kokane, Aishwarya Jadhav, Nikita Mandhare, Mayur Darekar, "Intrusion Detection in RBAC Model", International Journal of Innovative Reserach & Studies (IJIRS), Vol. 2 Issue 5, May 2013. [citation][year=2013]Gang Lu, Kevin Lü, "Logical Trees: an Essential Method of Parsing SQL Statement withSemantic Analysis", International Journal of Advancements in Computing Technology (IJACT), Vol. 5 No 1, January 2013. [citation][year=2012]Y. A. Rathod, M. B. Chaudhari, G. B. Jethava, "Database intrusion detection by transaction signature", Third International Conference on Computing Communication & Networking Technologies, ICCCNT 2012, Tamilnadu, India, July 26-28, 2012. [citation][year=2012]1. Amira Rezk, H. A. Ali, S. I. Barakat, "Database Security Protection based on a New Mechanism", International Journal of Computer Applications (0975 – 8887), Volume 49 - No.19, July 2012. [citation][year=2011]1. Udai Pratap Rao, Dhiren R Patel, "Design and Implementation of Database Intrusion Detection System for Security in Database", International Journal of Computer Applications, 35(9):32-40, December 2011. [citation][year=2011]2. Udai Pratap Rao, Dhiren R. Patel, "Database Security Architecture for Detection of Malicious Transactions in Database", The 2011 International Conference on Security & Management, SAM 2011, Las Vegas Nevada, USA, July 2011. [citation][year=2010]Dai Hua,Qin Xiaolin?Bai Chuanjie, "AMalicious Transaction Detection Method Based on Transaction Template", Journal of computer research and development, 47(5), 2010. [citation][year=2010]Chen Changqing, Liu Xiaofeng, Liu Yunsheng, Pei Xiaobing, Zhou Heng, "Architectures for Intrusion Tolerant Real-Time Database System", Journal of Computer Research and Development, 47 (Suppl), 2010. [citation][year=2010]Yunqi Ye, Liangliang Xiao, I-Ling Yen, Farokh Bastani, "Cloud Storage Design Based on Hybrid of Replication and Data Partitioning", 2010 IEEE 16th International Conference on Parallel and Distributed Systems, ICPADS 2010, Shangai, China, December 2010. [citation][year=2010]Yunqi Ye, Liangliang Xiao, I-Ling Yen, F. Bastani, "Secure, Dependable, and High Performance Cloud Storage", 2010 29th IEEE Symposium on Reliable Distributed Systems, SRDS 2010, New Delhi, India, November 2010. [citation][year=2010]Udai Pratap Rao, G. J. Sahani, Dhiren R. Patel, “Machine Learning Proposed Approach for Detecting Database Intrusions in RBAC Enabled Databases”, Second International Conference on Computing, Communication and Networking Technologies, ICCCNT10, Karur, Tamilnadu, India, July 2010. [citation][year=2010]Udai Pratap Rao,G. J. Sahani, Dhiren R. Patel, “Clustering Based Machine Learning Approach for Detecting Database Intrusions in RBAC Enabled Databases”, International Journal of Computer and Network Security, IJCNS, Vol.2, No.6, June 2010. [citation][year=2010]Ahlem Bouchahda-Ben Tekaya, Nhan Le Thanh, Adel Bouhoula, Faten Labbene-Ayachi, "An access control model for web databases", 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy, DBSec'10, Rome, Italy, June 2010. [citation][year=2009]Jonathan White, Brajendra Panda, Quassai Yassen, Khanh Nguyen, Weihan Li, "Detecting Malicious Insider Threats using a Null Affinity Temporal Three Dimensional Matrix Relation", Proceedings of the 7th International Workshop on Security in Information Systems, WOSIS 2009 (in conjunction with ICEIS 2009), Milan, Italy, May 2009. [citation][year=2009]1. Himanshu Gahlaut, “Prevention of Malicious Transactions in Database Management Systems”, BSc Thesis, Department of Computer Science and Engineering – National Institute of Technology, Rourkela, India, May 2009. [citation][year=2008]CAI Min, YE Zhen, "Design of a model of database intrusion detection", Journal Of Hefei University Of Technology (Natural Science), 31(4), 2008. [citation][year=2007]Clay Brockman, "Why Monitoring Database Application Behavior is the Best Database Intrusion Detection Method", Position Paper - ITK 478: Fall 2007, Illinois State University, 2007. [citation][year=2007]1. Jinfu Chen, Yansheng Lu, Xiaodong Xie, “An Auto-Generating Approach of Transactions Profile Graph in Detection of Malicious Transactions”, Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP 2007, September 2007. 2004(7 publications) [publication]Marco Vieira and Madeira, H. , "Portable Faultloads Based on Operator Faults for DBMS Dependability Benchmarking", in The 28th Annual International Computer Software and Applications Conference, COMPSAC 2004, 2004 [citation][year=2013]Mohamed Helmy Khafagy, "Agent-Based Software Fault Tolerance to Highly Improve Database Availability", PhD Thesis, Helwan University, Egypt, 2013. [citation][year=2008]1. Kimberly Keeton, Arif Merchant, john Wilkes, “System and method for interposition-based selective simulation of faults for access requests to a data storage system", United States Patent 7467333, December 2008. [citation][year=2007]1. Andréas Johansson, “Robustness Evaluation of Operating Systems”, PhD Thesis, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany, 2007. [publication]Joao Duraes and Marco Vieira and Madeira, H. , "Dependability Benchmarking of Web-Servers", in The 23rd International Conference on Computer Safety, Reliability and Security, SAFECOMP 2004, 2004 [citation][year=2012]1. Amit Sangroya, Damián Serrano, Sara Bouchenak, "Benchmarking Dependability of MapReduce Systems", 31st IEEE International Symposium on Reliable Distributed Systems, Irvine, CA, USA, October 2012. [citation][year=2012]2. Hajime Fujita, Yutaka Matsuno, Toshihiro Hanawa, Mitsuhisa Sato, Shinpei Kato, Yutaka Ishikawa, "DS-Bench Toolset: Tools for dependability benchmarking with simulation and assurance", 2012 42nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2012), Boston, MA, USA, June 2012. [citation][year=2012]3. Anatoliy Gorbenko, Vyacheslav Kharchenko, Seyran Mamutov, Olga Tarasyuk, Alexander Romanovsky, “Exploring Uncertainty of Delays as a Factor in End-to-End Cloud Response Time”, 9th European Dependable Computing Conference (EDCC 2012), Sibiu, Romenia, May 2012. [citation][year=2012]4. Yuhui Chen, Anatoliy Gorbenko, Vyacheslav Kharchenko, and Alexander Romanovsky, “Measuring and Dealing with the Uncertainty of SOA Solutions,” Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, ed. Valeria Cardellini, Emiliano Casalichio, Kalinka Castelo Branco, Júlio Cezar Estrella, and Francisco José Monaco, IGI Global, ISBN: 1609607945, 2012. [citation][year=2011]1. Paulo Véras, “Benchmarking Software Requirements Documentation for Space Application”, PhD Thesis, Instituto Tecnológico de Aeronáutica, São José dos Campos, SP, Brasil, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2009]1. Gustavo M. D. Vieira, Willy Zwaenepoel, Luis E. Buzato, “Dynamic Content Web Applications: Crash, Failover, and Recovery Analysis”, The 39th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Lisbon, Portugal, June 29-July 2, 2009. [citation][year=2009]2. Y. Chen, A. Gorbenko, V. Kharchenko, S. Mamutov, A. Romanovsky, O. Tarasyuk, “Benchmarking Dependability of a System Biology Application”, 14th IEEE International Conference on Engineering of Complex Computer Systems, Potsdam, Germany, June 2009. [citation][year=2008]1. Bailey, D., Frank-Schultz, E., Lindeque, P., Temple, J. L., "Three reliability engineering techniques and their application to evaluating the availability of IT systems : An introduction", IBM Systems Journal, ISSN 0018-8670, Vol. 47, no4, 2008. [citation][year=2008]2. A. Gorbenko, V. Kharchenko, O. Tarasyuk, Y. Chen, A. Romanovsky, “The Threat of Uncertainty in Service-Oriented Architecture”, 2008 RISE/EFTS Joint International Workshop on Software Engineering for Resilient Systems, Newcastle upon Tyne, United Kingdom, November 2008. [citation][year=2008]3. A. Gorbenko, A. Romanovsky, V. Kharchenko, A. Mikhaylichenko, “Experimenting with exception propagation mechanisms in service-oriented architecture”, 4th international Workshop on Exception Handling, WEH’08, Atlanta, Georgia, November 14, 2008. [citation][year=2007]1. Gergely Pintér, “Model Based Program Synthesis and Runtime Error Detection for Dependable Embedded Systems”, PhD Thesis, Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary, 2007. [citation][year=2006]1. L. Strigini et al., “Resilience-Building Technologies: State of Knowledge – ReSIST NoE Deliverable D12”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2006. [citation][year=2006]2. S Tixeuil, LM Silva, W Hoarau, “An Overview of Existing Tools for Fault-Injection and Dependability Benchmarking in Grids”, Second CoreGRID Workshop on Grid and Peer to Peer Systems, 2006. [citation][year=2005]1. Rogério de Lemos, “Architecting Web Services Applications for Improving Availability”, Lecture Notes in Computer Science, Architecting Dependable Systems III, Springer, ISSN 0302-9743 (Print) 1611-3349 (Online), Volume 3549/2005, 2005. [citation][year=2005]2. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [publication]Marco Vieira and Costa, A.C. and Madeira, H. , "Timely ACID Transactions in DBMS (Fast Abstract)", in The International Conference on Dependable Systems and Networks, DSN-2004, 2004 [citation][year=2009]1. M. Rallapalli, "Managing and Achieving Process Integrity in SOA", Second International Conference on Computer and Electrical Engineering, ICCEE '09, Dubai, UAE, December 28-30, 2009. [publication]Joao Duraes and Madeira, H. , "Generic Faultloads Based on Software Faults for Dependability Benchmarking", in IEEE/IFIP International Conference on Dependable Systems and Networks - Dependable Computing and Communications, DSN-DCCS 2004, 2004 [citation][year=2008]Gabriella Carrozza, "Software Faults Diagnosis in Complex, OTS-Based, Critical Systems?, PhD Thesis, "FEDERICO II? University of Naples, Naples, Italy, November, 2008. [citation][year=2008]Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou, "A PIN-Based Dynamic Software Fault Injection System", The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp.2160-2167, 18-21 November, 2008. [citation][year=2007]Salvatore Orlando, "Software Aging Analysis of Off The Shelf Software Items?, PhD Thesis Salvatore Orlando, "FEDERICO II? University of Naples, Naples, Italy, October, 2007. [publication]Joao Duraes and Madeira, H. , "Web-server Availability from the End-user Viewpoint: a Comparative Study (Fast Abstract)", in IEEE/IFIP International Conference on Dependable Systems and Networks - Dependable Computing and Communications, DSN-DCCS 2004, 2004 [publication]Costa, M.A. and Madeira, H. , "Handling big dimensions in distributed data warehouses using the DWS technique", in ACM Seventh International Workshop on Data Warehousing and OLAP, DOLAP 2004, 2004 [citation][year=2007]C. D. de Aguiar Ciferri, R.R. Ciferri, D. T. Forlani, "Horizontal fragmentation as a technique to improve the performance of drill-down and roll-up queries?, Proceedings of the 2007 ACM symposium on Applied computing, Seoul, Korea 2007. [citation][year=2006]Evelin Giuliana Lima, Marina Teresa Pires Vieira, "Ferramenta para Geração de Modelo Dimensional para Data Warehouses?, Simpósium Brasileiro de Banco de Dados, Florianópolis, SC, Brasil, 2006. [citation][year=2006]Diogo Tuler Forlani, Cristina Dutra de Aguiar Ciferri, Ricardo Rodrigues Ciferri, "Melhorando o Desempenho do Processamento de Consultas Drill-Across em Ambientes de Data Warehousing, Simpósium Brasileiro de Banco de Dados, Florianópolis, SC, Brasil, 2006. [publication]Marco Vieira and Joao Duraes and Madeira, H. , "How to Specify Dependability Benchmarks for OLTP Application Environments", in IX Conference on Software Engineering and Databases (JISBD 2004), 2004 [citation][year=2007]1. Karsten Wolke, Higher Availability of Services in Heterogeneous Distributed Systems, PhD Thesis, De Montfort University, Leicester, UK, October 2007. 2003(8 publications) [publication]Marco Vieira and Madeira, H. , "Benchmarking the Dependability of Different OLTP Systems", in International Conference on Dependable Systems and Networks, DSN-DCC 2003, 2003 [citation][year=2013]Anna Lanzaro, Roberto Natella, Ricardo Barbosa, "Tools for Injecting Software Faults at the Binary and Source-Code Level", Innovative Technologies for Dependable OTS-Based Critical Systems, 2013. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2009]1. Young Jun Cho, Yun Chan Cho, Jae Wook Jeon, "D-Bus based user device driver framework design for Linux mobile software platform", IEEE International Symposium on Industrial Electronics (ISIE 2009), Seoul, Korea, July 2009. [citation][year=2008]1. Gustavo M. D. Vieira, Willy Zwaenepoel, Luiz E. Buzato, “Dynamic Content Web Applications: Crash, Failover, and Recovery Analysis”, Technical Report - IC-08-34, Instituto de Computacão, University of Campinas, Campinas, Brazil, December 2008. [citation][year=2008]2. Arnaud Albinet, Jean Arlat, Jean-Charles Fabre, “Benchmarking the Impact of Faulty Drivers: Application to the Linux Kernel”, Dependability Benchmarking for Computer Systems, Lisa Spainhower & Karama Kanoun Eds., August 2008. [citation][year=2008]Kamalendu Majumdar, "Designing of Bibliographical Data-Base Management System: An Object Oriented Approach", PhD Thesis, Guru Ghasidas University, Bilaspur(CG), India, 2008. [citation][year=2006]1. L. Strigini et al., “Resilience-Building Technologies: State of Knowledge – ReSIST NoE Deliverable D12”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2006. [citation][year=2005]1. Ricardo Gimenes, “Avaliação da Confiabilidade da Informação Utilizada em Sistemas de Informação e em Sistemas Críticos”, MSc Thesis, University of São Paulo, São Paulo, Brazil, 2005. [citation][year=2005]2. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]3. Richard Elling, “Availability Benchmarking”, RAS Engineering Group, Performance and Availability Engineering, Sun Microsystems, Inc., 2005. [citation][year=2005]4. Cristian Constantinescu, “Dependability Benchmarking Using Environmental Test Tools”, Proceedings of IEEE Reliability and Maintainability Symposium, RAMS 2005, January 24-27, 2005. [citation][year=2004]1. Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, “Benchmarking Operating System Dependability: Windows 2000 as a Case Study”, 10th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC2004, Papeete, Tahiti, French Polynesia, March 3-5, 2004. [citation][year=2004]2. Arnaud Albinet, Jean Arlat, Jean-Charles Fabre, “Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]3. Dong Tang, Dileep Kumar, Sreeram Duvur, Oystein Torbjornsen, “Availability Measurement and Modelling for An Application Server”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]4. A. Romanovsky et al., “CaberNet Vision of Research and Technology Development in Distributed and Dependable Systems”, Network of Excellence in Distributed and Dependable Computing Systems, IST Contract No. IST-2000-25088, January 2004. [citation][year=2003]1. Aaron Brown, “A Recovery-Oriented Approach to Dependable Services: Repairing Past Errors with System-Wide Undo”, PhD Thesis, EECS Computer Science Division - University of California, Berkeley, California, USA, December 2003. [publication]Joao Duraes and Madeira, H. , "Definition of Software Fault Emulation Operators: a Field Data Study", in The International Conference on Dependability Systems and Networks, DSN-2003, 2003 [citation][year=2008]Raul Barbosa, "Layared Fault Tolerance for Distributed Embedded Systems?, tese de doutoramento, Chalmers University, Suécia, 2008. [citation][year=2008]Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou, "A PIN-Based Dynamic Software Fault Injection System", The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp.2160-2167, 18-21 November, 2008. [citation][year=2007]Salvatore Orlando, "Software Aging Analysis of Off The Shelf Software Items?, PhD Thesis Salvatore Orlando, "FEDERICO II? University of Naples, Naples, Italy, October, 2007. [citation][year=2007]Cheng-Chun Tu, "Modeling Component Failures in Embedded Systems?, Master's Thesis, International Master´s Program in Dependable Computer Systems, Chalmers University of Technology, Department of Computer Science and Engineering, Goteborg, Sweden, 2006. [citation][year=2006]Using Attack Injection to Discover New Vulnerabilities N. Neves J. Antunes M. Correia P. Verissimo R. Neves Fac. de Ciencias, Univ. de Lisboa, Lisbon; [citation][year=2005]Alexandersson, Ruben; ÿhman, Peter: A technique for fault tolerance assessment of COTS. International Conference on Computer Safety, Reliability and Security (SAFECOMP), 2005. [publication]Madeira, H. and Costa, J.P. and Marco Vieira , "The OLAP and Data Warehousing Approaches for Analysis and Sharing of Results from Dependability Evaluation Experiments", in International Conference on Dependable Systems and Networks, DSN-DCC 2003, 2003 [citation][year=2013]Truong Minh Thai, Frédéric Amblard, Benoit Gaudou, "Combination Framework of BI solution & Multi-agent platform (CFBM) for multi-agent based simulations", 13e Conférence Francophone sur l'Extraction et la Gestion de Connaissances, EGC'2013, Toulouse, France, January 29, 2013. [citation][year=2013]A. Bondavalli, F. Brancati, A. Flammini, S. Rinaldi, "Master Failure Detection Protocol in Internal Synchronization Environment", IEEE Transactions on Instrumentation and Measurement, vol.PP, no.99, January 2013. [citation][year=2011]1. A. Bondavalli, F. Brancati, F., A. Flammini, S. Rinaldi, S., "A Reliable and Self-Aware Clock for reference time failure detection in internal synchronization environment", 2011 IEEE International Workshop on Measurements and Networking (M&N), Anacapri, Italy, October 2011. [citation][year=2011]2. A. Bovenzi, S. Russo, F. Brancati, A. Bondavalli, "Towards identifying OS-level anomalies to detect application software failures", 2011 IEEE International Workshop on Measurements and Networking (M&N), Anacapri, Italy, October 2011. [citation][year=2011]3. Antonio Bovenzi, Francesco Brancati, Stefano Russo, Andrea Bondavalli, "A Statistical Anomaly-Based Algorithm for On-line Fault Detection in Complex Software Critical Systems", 30th International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2011, Naples, Italy, September 2011. [citation][year=2011]Dimara Kusuma Hakim, "Development of License Report Application with Online Analytical Processing", Jurnal Informatika, JUITA, Vol. 1 N0. 3, 2011. [citation][year=2010]1. Andrea Bondavalli, Andrea Ceccarelli, Paolo Lollini, “Architecting and validating dependable systems: experiences and visions”, Architecting dependable systems VII, (Antonio Casimiro, Rogério de Lemos, and Cristina Gacek Eds.), Springer-Verlag, 2010. [citation][year=2010]2. F. Brancati, A. Bondavalli, "Practical Aspects in Analyzing and Sharing the Results of Experimental Evaluation", 29th IEEE Symposium on Reliable Distributed Systems, SRDS 2010, New Delhi, india, October 31 - November 03, 2010 [citation][year=2010]3. Piotr Gawkowski, Monika A. Kuczy?ska, Agnieszka Komorowska, "Fault Effects Analysis and Reporting System for Dependability Evaluation", Seventh International Conference on Rough Sets and Current Trends in Computing, RSCTC 2010, Warsaw, Poland, June 2010. [citation][year=2010]4. P. Sendín-Raña, E. Rodríguez-Fernández, F. J. González-Castaño, E. Costa-Montenegro, P. S. Rodríguez-Hernãndez, J. M. Pousada-Carballo, J. C. Burguillo-Rial, “Web-oriented business intelligence solution based on Associative Query Logic”, Software: Practice and Experience, Vol. 40, No 9, pg. 779-796, 2010. [citation][year=2010]5. A. Bondavalli, A. Ceccarelli, L. Falai, M. Vadursi, “A new approach and a related tool for dependability measurements on distributed systems”, IEEE Transactions on Instrumentation and Measurements 2010, 2010. [citation][year=2009]Andrea Ceccarelli, Andrea Bondavalli, Danilo Iovino, "Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection", 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC'09, Shanghai, China, November 2009. [citation][year=2009]János Oláh, István Majzik, "A Model Based Framework for Specifying and Executing Fault Injection Experiments", 2009 Fourth International Conference on Dependability of Computer Systems, 2009. [citation][year=2009]Pablo Sendín-Raña, Francisco J. González-Castaño, Enrique Pérez-Barros, Pedro S. Rodríguez-Hernández, Felipe Gil-Castiñeira, José M. Pousada-Carballo, “Improving the performance and functionality of Mondrian open-source OLAP systems”, Software: Practice and Experience, Vol. 39 N. 3, pg. 279-298, John Wiley & Sons, Ltd, 2009. [citation][year=2009]Li Xiao-gen, Wang Zong-minl, Huang Zhi-quan, "Visualization of large scene watershed model in real-time and interactive manner based on cache technique", Application Research of Computers, Vol. 26 No. 4, April 2009. [citation][year=2009]Yuan Zheng-wu, Zhao Rui-jing, Zhu Zhi-hui, “Reserach of indoor positioning method based on ray-tracing”, Application Reserach of Computers, Vol. 26 No. 4, April 2009. [citation][year=2008]Andrea Ceccarelli, Danilo Iovino, Andrea Bondavalli, “A Fault Injection Tool for Trustworthy, Comparative Measurements and Analysis”, SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), Naples, Italy, October 5, 2008. [citation][year=2008]Lorenzo Falai, Andrea Bondavalli, “RODS: General Framework for Rigorous Observation of Distributed Systems”, DSN 2008 Workshop on Resilience Assessment and Dependability Benchmarking, DSN-RADB08 (jointly organized with the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008), Anchorage, Alaska, USA, June 25, 2008. [citation][year=2008]Paolo Lollini et al., "Application of the evaluation framework to the complete scenario", Formal Deliverable Project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), 2008. [citation][year=2008]WANG Xiao hong, WANG Guo ren, YU Yong qian, HONG Yang, "Study of closed loop decision support system based on telecommunication field", Application Research of Computers, Vol. 25 No. 4, April 2008. [citation][year=2008]CHU Yu-zhi, SUN Li-feng, ZHONG Yu-zhuo, XIE Jian, "IPv6 supporting multi-view video on demand system?, Application Research of Computers, Vol. 25 Nº 4, April 2008. [citation][year=2008]CAO Li-juan, XIE Qiang, DING Qiu-lin, "Research of Web-OLAP system based on distributed data cache technology", Computer Applications Journal, Vol.28 No.2, February 2008. [citation][year=2007]1. Paolo Lollini et al., "D4.2.1. Application of the evaluation framework to the complete scenario", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]2. Gergely Pintér, “Model Based Program Synthesis and Runtime Error Detection for Dependable Embedded Systems”, PhD Thesis, Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary, 2007. [citation][year=2007]3. Xie Qiang, Yu Ya-li, Ding Qiu-ling, “Web-OLAP System Based on Object Pool and Data Caching”, Journal of Applied Sciences, China, pages 161-165, Vol.25, No.2, 2007. [citation][year=2007]4. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]5. Lorenzo Falai, “Observing, Monitoring and Evaluating Distributed Systems”, PhD Thesis, Department of Systems and Informatics, University of Florence, Italy, December 2007. [citation][year=2006]1. Wei-Pin Chang, Yi-Ching Lin, Der-Ming Liou, "Experiences from Implementation of the Hospital Executive Information System in Taipei City Hospital", Taipei City Medical Journal, Vol.3 No. 12, December 2006. [citation][year=2006]2. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December de 2006. [citation][year=2006]3. Z. Micskei, I. Majzik, and F. Tam, “Robustness testing techniques for high availability middleware solutions”, International Workshop on Engineering of Fault Tolerant Systems, EFTS2006, Luxemburg, Luxemburg, June 12-13, 2006. [citation][year=2005]1. Ricardo Gimenes, “Avaliação da Confiabilidade da Informação Utilizada em Sistemas de Informação e em Sistemas Críticos”, MSc Thesis, University of São Paulo, São Paulo, Brasil, 2005. [citation][year=2003]1. Hsiao-Wen Wu, “Establishment of Data Warehouse in Hospital Executive Information Systems? A Case Study of the Self-management in a Regional Hospital”, MSc Thesis, Computer Science and Information Management, Providence University, Taiwan, 2003. [publication]Marco Vieira and Madeira, H. , "A Dependability Benchmark for OLTP Application Environments", in Very Large Databases Conference - VLDB2003, 2003 [citation][year=2013]Domenico Cotroneo, Roberto Natella, Stefano Russo, Fabio Scippacercola, "State-Driven Testing of Distributed Systems", 17th International Conference on Principles of Distributed Systems, OPODIS 2013, Nice, France, December 16-18, 2013. [citation][year=2013]Alessandro Gustavo Fior, Jorge Augusto Meira, Eduardo Cunha de Almeida, Ricardo Gonçalves Coelho, Marcos Didonet Del Fabro, Yves Le Traon, “Under Pressure Benchmark for DBMS Availability”, Journal of Information and Data Management, Vol. 4 No. 3, 2013. [citation][year=2013]Alessandro Gustavo Farias Fior, "Under Pressure Benchmark: A Large-Scale Availability Benchmark For Distributed Databases", Msc Thesis, Universidade Federal Do Paraná, Curitiba, Brazil, 2013. [citation][year=2013]Roberto Natella, Fabio Scippacercola, "Issues and Ongoing Work on State-Driven Workload Generation for Distributed Systems", 14th European Workshop on Dependable Computing, EWDC 2013, Coimbra, Portugal, May 14-15, 2013. [citation][year=2013]Domenico Di Leo, “Robustness Evaluation of Software Systems through Fault Injection”, PhD Thesis, Universit a degli Studi di Napoli Federico II, Italy, 2013. [citation][year=2012]Fabio Scippacercola, "State-Driven Workload Generation in Distributed Systems, Tesi di Laurea Magistrale, Universita' Degli Studi di Napoli Federico II, Naples, Italy, 2012. [citation][year=2012]Amit Sangroya, Damián Serrano, Sara Bouchenak, "Benchmarking Dependability of MapReduce Systems", 31st IEEE International Symposium on Reliable Distributed Systems, Irvine, CA, USA, October 2012. [citation][year=2012]Seung-Ho Lim, Hyun Jin Choi, Doo-Soon Park, "Efficient journaling writeback schemes for reliable and high-performance storage systems", Personal and Ubiquitous Computing, September 2012. [citation][year=2012]Domenico Cotroneo, Francesco Fucci, Roberto Natella, "Towards a State driven Workload Generation Framework for Dependability Assessment", The Fifth International Conference on Dependability, DEPEND 2012, Rome, Italy, August 19 - 24, 2012. [citation][year=2012]Anja Bog, "Benchmarking Composite Transaction and Analytical Processing Systems", University of Potsdam/Hasso-Plattner-Institut, Potsdam, Germany, June 2012. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]Yantao Li, Charles Levine, “Extending TPC-E to Measure Availability in Database Systems”, Third TPC Technology Conference on Performance Evaluation and Benchmarking, TPCTC 2011, Seattle, WA, USA, August 29, 2011. [citation][year=2011]Bo Li, Haiying Zhou, Decheng Zuo, Zhan Zhang, Peng Zhou, Long Jia, "Performance modeling and benchmarking of bank intermediary business on high-performance fault-tolerant computers", 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops, Hong Kong, June 2011. [citation][year=2011]A. Bondavalli, P. Lollini, A. Bovenzi, M. Colajanni, L. Coppolino, C. Esposito, M. Fixxo, C. di Martino, L. Montecchi, R. Natella, A. Peccia, "D3.1: Modeling and Evaluation: State-of-the-art", deliverable of the project: Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures (DOTS-LCCI Project: PRIN 2008LWRBHF), Italy, March 2011. [citation][year=2010]4. Fábio Oliveira, "Towards Mistake-Aware Systems", PhD Thesis, Graduate School—New Brunswick Rutgers, The State University of New Jersey, October 2010. [citation][year=2010]5. Philipp Reinecke, Katinka Wolter, Miroslaw Malek, “#A Survey on Fault-Models for QoS Studies of Service-Oriented Systems”, Technical Report number B-2010-02, Freie Universität Berlin, February, 2010. [citation][year=2010]6. Manuel José Ferreira Carneiro Mendonça, "Vulnerability Detection in Device Drivers", PhD Thesis Proposal, University of Lisbon, Portugal, January 2010. [citation][year=2010]1. Anja Bog, Hasso Plattner, Alexander Zeier, "A mixed transaction processing and operational reporting benchmark", Information Systems Frontiers, Springer Netherlands, ISSN: 1387-3326, November 2010. [citation][year=2010]2. Goetz Graefe, Arnd Christian Konig, Harumi Kuno, Volker Markl, Kai-Uwe Sattler, "Robust Query Processing", Abstracts Collection and Executive Summary - Dagstuhl Seminar 20381, Dagstuhl, September 2010. [citation][year=2010]3. Bo Li, Haiying Zhou, Decheng Zuo, Zhan Zhang, "Study for Performance Benchmark of Bank Intermediary Business on High-Performance Fault-Tolerant Computers”, International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, September 2010. [citation][year=2009]1. Hongfei Guo Dan Jones Jennifer Beckmann Praveen Seshadri, “Declarative Management in Microsoft SQL Server”, 35th International Conference on Very Large Databases, VLDB09, Lyon, France, August 24-28, 2009. [citation][year=2009]2. Tsz-kin Lau, Peter Kin Leung Shum, "Quantitative measurement of the autonomic capabilities of computing systems", International Business Machines Corporation (IBM), United States Patent 7539904, May 2009. [citation][year=2009]3. Goetz Graefe, Harumi A. Kuno, Janet L. Wiener, “Visualizing the robustness of query execution”, Fourth Biennial Conference on Innovative Data Systems Research, CIDR 2009, Asilomar, CA, USA, January 4-7, 2009. [citation][year=2009]4. Choi, H. J., Lim, S., and Park, K. H., “JFTL: A flash translation layer based on a journal remapping for flash memory”, ACM Transactions on Storage, Vol 4, Issue, January 2009. [citation][year=2008]1. Gustavo M. D. Vieira, Willy Zwaenepoel, Luiz E. Buzato, “Dynamic Content Web Applications: Crash, Failover, and Recovery Analysis”, Technical Report - IC-08-34, Instituto de Computacão, University of Campinas, Campinas, Brazil, December 2008. [citation][year=2008]2. A. Bog, J. Krueger, J. Schaffner, “A Composite Benchmark for Online Transaction Processing and Operational Reporting”, IEEE Symposium on Advanced Management of Information for Globalized Enterprises (AMIGE'08), Tianjin, China, 2008. [citation][year=2008]3. Imre Kocsis, Zsolt Kocsis, Imre Malatinszki, András Pararicza, “Dependabilty Benchmarks and System Supervision”, SRDS 2008 Workshop on Sharing Field Data and Experiment Measurements on Resilience of Distributed Computing Systems (jointly organized with the 27th International Symposium on Reliable Distributed Systems, IEEE SRDS 2008), Naples, Italy, October 5, 2008. [citation][year=2008]4. Sung Hoon Baek, Kyu Ho Park, "Prefetching with Adaptive Cache Culling for Striped Disk Arrays", The 2008 USENIX Annual Technical Conference, Boston, USA, June 25-27, 2008. [citation][year=2007]1. Gergely Pintér, “Model Based Program Synthesis and Runtime Error Detection for Dependable Embedded Systems”, PhD Thesis, Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary, 2007. [citation][year=2007]2. M. Banatre, A. Pataricza, A. van Moorsel, P. Palanque, L. Strigini, “From Resilience-Building to Resilience-Scaling Technologies: Directions – ReSIST NoE Deliverable D13”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2007. [citation][year=2007]3. S. H. Baek, K. H. Park, “Matrix-Stripe-Cache-Based Contiguity Transform for Fragmented Writes in RAID-5”, IEEE Transactions on Computers, Volume 56 , Issue 8 , August, 2007. [citation][year=2007]4. Manuel Mendonça, Nuno Neves, “Robustness Testing of the Windows DDK”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, Edinburgh, UK, June 25-28, 2007. [citation][year=2007]5. David C.C. Ong, Rytis Sileika, Souheil Khaddaj, Radouane Oudrhiri, “Alternative data storage solution for mobile messaging services”, Mobile Information Systems, Volume 3, Number 1, pp. 39 – 54, 2007. [citation][year=2007]6. André Cardeal Santana; Sueli de Fatima Poppi Borba, “Desempenho de Dados em Modelos de Relacionamentos por Herança”, Campo Digit@l, ISSN 1981-092X, vol.2 nº1, 2007. [citation][year=2006]1. Shih-Han Chiu, "Toward a More Generalized Benchmark Workload Model for Data Warehouse and Data Mining", PhD Thesis, National Chengchi University, 2006. [citation][year=2006]2. Farès Saad Khorchef, “Un Cadre Formel pour le Test de Robustesse des Protocoles de Communication”, PhD Thesis, LAAS-CNRS, Toulouse, France, December 2006. [citation][year=2005]1. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]2. F. Oliveira, K. Nagaraja, R. Bachwani, R. Bianchini, R. P. Martin, and T. Nguyen. "Understanding and Validating Database System Administration", 2005 USENIX Annual Technical Conference, USENIX '05, May 30-June 3, 2005. [citation][year=2004]1. Ali Kalakech, Karama Kanoun, Yves Crouzet, Jean Arlat, “Benchmarking The Dependability of Windows NT4, 2000 and XP”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [publication]Costa, M.A. and Vieira, J. and Jorge Bernardino and Furtado, P. and Madeira, H. , "A middle layer for distributed data warehouses using the DWS-AQA technique", in VIII Jornadas de Ingenieria del Software y Bases de Datos, 2003 [citation][year=2013]1 "A middle layer for distributed data warehouses using the DWS-AQA technique [citation][year=2013]" 579784189063319719 Handling big dimensions in distributed data warehouses using the DWS technique http://dl.acm.org/citation.cfm?id=1031770 M Costa, H Madeira Proceedings of the 7th ACM international … 2004 dl.acm.org 2 "A middle layer for distributed data warehouses using the DWS-AQA technique [citation][year=2013]" 579784189063319719 Model and procedure for performance and availability-wise parallel warehouses http://link.springer.com/article/10.1007/s10619-009-7038-7 P Furtado Distributed and Parallel Databases 2009 Springer 3 "A middle layer for distributed data warehouses using the DWS-AQA technique [citation][year=2013]" 579784189063319719 Efficient compression of text attributes of data warehouse dimensions http://link.springer.com/chapter/10.1007/11546849_35 J Vieira, J Bernardino, H Madeira Data Warehousing and Knowledge … 2005 Springer 4 "A middle layer for distributed data warehouses using the DWS-AQA technique [citation][year=2013]" 579784189063319719 AGENT BASED DATA STORAGE AND DISTRIBUTION IN DATA WAREHOUSES http://www.worldscientific.com/doi/abs/10.1142/S0218194008003842 N Kolsi, A Abdellatif, K Ghedira International Journal of Software … 2008 World Scientific 5 "A middle layer for distributed data warehouses using the DWS-AQA technique [citation][year=2013]" 579784189063319719 Optimizer and Scheduling for the Community Data Warehouse Architecture http://link.springer.com/chapter/10.1007/978-3-642-02196-1_2 RL de Carvalho Costa, R Antunes… Methods and Supporting … 2009 Springer [publication]Marques, A. and Rino, B.L. and Madeira, H. , "iGen: plataforma de geração de código com ciclo de desenvolvimento completo", in 8th Conference on Software Engineering and Databases, 2003 [publication]Costa, P. .N.d. and Marco Vieira and Madeira, H. and Silva, J.G. , "Plug and Play Fault Injector for Dependability Benchmarking", in First Latin-American Symposium on Dependable Computing, LADC, 2003 [citation][year=2013]Stefan Winter, Michael Tretter, Benjamin Sattler, and Neeraj Suri, “simFI: From Single to Simultaneous Software Fault Injections”, The 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Budapest, Hungary, June 2013. [citation][year=2011]1. Gianpiero Cabodi, Marco Murciano, Massimo Violante, “Boosting software fault injection for dependability analysis of real-time embedded applications”, ACM Transactions on Embeded Computing Systems, Vol. 10, Issue 2, January 2011. [publication]Madeira, H. and Joao Duraes and Marco Vieira , "Emulation of Software Faults: Representativeness and Usefulness", in First Latin-American Symposium on Dependable Computing, LADC, 2003 [citation][year=2007]1. Pardo, J. Campelo, J.C. Ruiz, J.C. Gil, P., "Embedded Software Validation Using On-Chip Debugging Mechanisms", Software engineering of fault tolerant systems (P. Pelliccione, H. Muccini, N. Guelfi, A. Romanovsky Eds), Series on Software Engineering and Knowledge Engineering, World Scientific Publishing Co, Vol. 19, pp 121-149, 2007. [citation][year=2005]1. J.-C. Ruiz, J. Pardo, J.-C. Campelo, P. Gil, “On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components”, IEEE 11th International Sysmposium Pacific Rim Dependable Computing (PRDC2005), Changsha, Hunan, China, December 2005. 2002(10 publications) [publication]Joao Duraes and Madeira, H. , "Characterization of Operating Systems Behavior in the presence of Faulty Drivers through Software Fault Emulation", in The Pacific Rim International Dependability Symposium, PRDC-2002, 2002 [citation][year=2009]Constantin Sarbu, "Operational Pro_ling of OS Drivers?, PhD thesis, University of Darmstadt, Alemanha, 2009 [citation][year=2007]Laurent Burgy, Laurent Réveillère, Julia Lawall, Gilles Muller, "A Language-Based Approach for Improving the Robustness of Network Application Protocol Implementations?, Technical Report, Institut National de Recherche en Informatique et en Automatique, INRIA, February, 2007. [citation][year=2007]Manuel Mendonça, Nuno Ferreira Neves, Robustness Testing of the Windows DDK, Proceedings of the International Conference on Dependable Systems and Networks (DSN), Edinburgh, UK, June 2007. [citation][year=2006]S Tixeuil, LM Silva, W Hoarau, "An Overview of Existing Tools for Fault-Injection and Dependability Benchmarking in Grids?, Second CoreGRID Workshop on Grid and Peer to Peer Systems, 2006 [citation][year=2004]Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, "Benchmarking Operating System Dependability: Windows 2000 as a Case Study?, 10th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC2004, Papeete, Tahiti, French Polynesia, 03 a 05 de Março de 2004. [citation][year=2004]Ali Kalakech, Karama Kanoun, Yves Crouzet and Jean Arlat, "Benchmarking The Dependability of Windows NT4, 2000 and XP?, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florença, Itália, 28 Junho a 1 Julho de 2004. [citation][year=2004]Arnaud Albinet, Jean Arlat, Jean-Charles Fabre, "Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel?, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florença, Itália, 28 Junho a 1 Julho de 2004. [citation][year=2003]Raviteja Varanasi, "Software Faults and Fault Injection Models?, Project of the coursework for CSC53, Advanced Software Engineering, Lousiana Tech University, USA, 2003 [publication]Joao Duraes and Madeira, H. , "Emulation of Software Faults by Selective Mutations at Machine-Code Level", in The 13th, International Symposium on Software Reliability Engineering, ISSRE-2002, 2002 [citation][year=2009]Constantin Sarbu, "Operational Pro_ling of OS Drivers?, PhD thesis, University of Darmstadt, Alemanha, 2009 [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2006]Cheng-Chun Tu, "Modeling Component Failures in Embedded Systems?, Master's Thesis, International Master´s Program in Dependable Computer Systems, Chalmers University of Technology, Department of Computer Science and Engineering, Goteborg, Sweden, 2006. [citation][year=2006]U. Wappler, C. Fetzer, G. Dresden, "Hardware fault injection using dynamic binary instrumentation: FITgrind?, Sixth European Dependable Computing Conference (EDCC-6), vol. vol. Proceedings Supplemental Volume, October 2006, pp. 37"38. [citation][year=2005]Alexandersson, Ruben; ÿhman, Peter: A technique for fault tolerance assessment of COTS. International Conference on Computer Safety, Reliability and Security (SAFECOMP), 2005. [citation][year=2005]Jonas Myhrman, "Studying Fault Injection in WCDMA Base Station Processors Using Simics Simulator?, Master thesis, Chalmers University of Technology, Gotenburgh, Sweden, 2005 [publication]Madeira, H. and Some, R.R. and Moreira, F. and Costa, D. and Rennels, D. , "Experimental evaluation of a COTS system for space applications", in The International Conference on Dependable Systems and Networks, DSN-2002, 2002 [citation][year=2009]Navid Aghdaie and Yuval Tamir, "CoRAL: A transparent fault-tolerant web service?, Journal of Systems and Software, Volume 82, Issue 1, January 2009, Pages 131-143 [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2008]Mahdi Fazeli, Reza Farivar, and Seyed Ghassem Miremadi, "Error Detection Enhancement in PowerPC Architecture-based Embedded Processors?, Journal of Electronic Testing, Volume 24, Numbers 1-3 / June, 2008 [citation][year=2006]J. Sosnowski, P. Gawkowski, P. Zygulski, A. Tymoczko, "Enhancing Fault Injection Testbench," depcos-relcomex, pp. 76-83, International Conference on Dependability of Computer Systems (DEPCOS-RELCOMEX'06), 2006. [citation][year=2006]Ana Maria Ambrosio, Eliane Martins, Nandamudi L. Vijaykumar, Solon V. de Carvalho, "A Conformance Testing Process for Space Applications Software Services?, Journal of Aerospace Computing, Information and Communication, 3(4), pp. 146-158, 2006. [citation][year=2006]André Fidalgo, Manuel Gericota, Gustavo Alves, José Ferreira, "Test and verification: Using NEXUS compliant debuggers for real time fault injection on microprocessors?, Proceedings of the 19th annual symposium on Integrated circuits and systems design SBCCI '06, August 2006 [citation][year=2006]Yen-Jen Chang, "An Energy-Efficient BTB Lookup Scheme for Embedded Processors," Circuits and Systems II: Express Briefs, IEEE Transactions on , vol.53, no.9, pp.817-821, Sept. 2006 [citation][year=2005]1. Amir Rajabzadeh, Seyed Ghassem Miremadi, "A Hardware Approach to Concurrent Error Detection Capability Enhancement?, in COTS Processors in Proc. Of 11th IEEE International Symposium Pacific Rim Dependable Computing, PRDC2005, Changsha, Hunan, China, December 2005. [citation][year=2005]2. N. Aghdaie and Y. Tamir, ""Efficient Client-Transparent Fault Tolerance for Video Conferencing,"" Proceedings of the 3rd IASTED International Conference on Communications and Computer Networks, Marina del Rey, CA, October 2005. [citation][year=2005]3. Navid Aghdaie, "Transparent Fault-Tolerant Network Services Using Off-the-Shelf Components?, PhD thesis, University of Calofornia, Los Angeles, 2005. [citation][year=2005]4. Mahdi Fazeli, Reza Farivar, Ghassem Miremadi, "A Software-Based Concurrent Error Detection Technique for PowerPC Processor-based Embedded Systems?, 20th IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'05), Moterey, CA, EUA, Outubro 2005. [citation][year=2005]5. P. Gawkowski, J. Sosnowski, "Analysing system susceptibility to faults with simulation tools?, XXI Autumn Meeting of Polish Information Processing Society, ISBN 83-922646-0-6, pp. 87-94, PIPS, 2005. [citation][year=2004]P Bernadat, DD Mannaru, "Susceptibility of Commodity Systems and Software to Memory Soft Errors?, IEEE Transactions on Computers, December 2004 (Vol. 53, No. 12), 2004. [citation][year=2004]K. Whisnant et al., "The Effects of an Armor-Based SIFT Environment on the Performance and Dependability of User Applications,? IEEE Trans. Software Eng., vol. 30, no. 4, 2004. [citation][year=2004]Alan Messer et al., "Susceptibility of commodity systems and software to memory soft errors,? IEEE Transactions on Computing, December 2004 (Vol. 53, No. 12), 2004. [citation][year=2004]Amir Rajabzadeh, Seyed Ghassem Miremadi, and Mirzad Mohandespour, "Error Detection Enhancement in COTS Superscalar Processors with Performance Monitoring Features?, Journal of Electronic Testing, Springer Science+Business Media B.V., Formerly Kluwer Academic Publishers B.V., ISSN: 0923-8174, Volume 20, Number 5, Outubro de 2004. [citation][year=2004]Arnaud Albinet, Jean Arlat, Jean-Charles Fabre, "Characterization of the Impact of Faulty Drivers on the Robustness of the Linux Kernel?, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florença, Itália, 28 Junho a 1 Julho de 2004. [citation][year=2004]Joakim Aidemark, Peter Folkesson and Johan Karlsson, "Experimental Dependability Evaluation of the Artk68-FT Real-time Kernel?, International Conference on Real-Time and Embedded Computing Systems and Applications, Göteborg, Suécia, 2004. [citation][year=2003]P. Gawkowski, J. Sosnowski, "Assessing Software Implemented Fault Detection and Fault Tolerance Mechanisms?, Proceedings of the IEEE 12th Asian Test Symposium (ATS"03), 16-19 de Novembro de 2003. [citation][year=2003]Weining Gu, Z. Kalbarczyk, R. Iyer, Z. Yang, "Characterization of linux kernel behavior under errors", IEEE/IFIP International Conference on Dependable Systems and Networks, International Performance and Dependability Symposium, DSN-IPDS 2003, San Francisco, CA, USA, pp. 459-468, June 22-25, 2003. [citation][year=2003]Katz D. S., Some R. R., "NASA advances robotic space exploration", IEEE Computer, 36 (1): 52-+, Jan. 2003. [citation][year=2002]D. Wilson, B. Murphy, and L. Spainhower, "Progress on defining standardized classes for comparing the dependability of computer systems", supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. F1-F5, June 23-26, 2002. [citation][year=2002]Iyer R. K., Kalbarczyk Z., "Measurement-based analysis of system dependability using fault injection and field failure data", Performance Evaluation of Complex Systems: Techniques and Tools , Lecture Notes in Computer Science, 2459: pp. 290-317, 2002. [publication]Marco Vieira and Madeira, H. , "Definition of Faultloads Based on Operator Faults for DMBS Recovery Benchmarking", in Pacific Rim International Symposium on Dependable Computing, PRDC2002, 2002 [citation][year=2010]1. Philipp Reinecke, Katinka Wolter, Miroslaw Malek, “#A Survey on Fault-Models for QoS Studies of Service-Oriented Systems”, Technical Report number B-2010-02, Freie Universität Berlin, February, 2010. [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2007]1. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]2. Andréas Johansson, “Robustness Evaluation of Operating Systems”, tese de doutoramento de Andréas Johansson, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany, 2007. [citation][year=2007]3. Manuel Mendonça, Nuno Ferreira Neves, Localização de Vulnerabilidades de Segurança em Gestores de Dispositivos Wi-Fi com Técnicas de Fuzzing, Actas da 3ª Conferência Nacional Sobre Segurança Informática nas Organizações (SINO07), Lisbon, Portugal, October 2007. [citation][year=2006]1. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [citation][year=2004]1. Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson, “Experience with Evaluating Human-Assisted Recovery Processes”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]2. Ali Kalakech, Karama Kanoun, Yves Crouzet and Jean Arlat, “Benchmarking The Dependability of Windows NT4, 2000 and XP”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2004]3. Ali Kalakech, Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, “Benchmarking Operating System Dependability: Windows 2000 as a Case Study”, 10th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC2004, Papeete, Tahiti, French Polynesia, March 3-5, 2004. [citation][year=2003]1. Aaron Brown, “A Recovery-Oriented Approach to Dependable Services: Reairing Past Errors with System-Wide Undo”, PhD Thesis, EECS Computer Science Division - University of California, Berkeley, California, USA, December 2003. [citation][year=2003]2. Kersten Buchacker, Mario Dal Cin, H. Hoxer, R. Karch, Volkmar Sieh, Oliver Tschache, "Reproducible dependability benchmarking experiments based on unambiguous benchmark setup descriptions", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2003, San Francisco, California, USA, June 22-25, 2003. [publication]Marco Vieira and Madeira, H. , "Recovery and Performance Balance of a COTS DBMS in the Presence of Operator Faults", in The International Symposium on Dependable Systems and Networks, DSN-IPDS 2002, 2002 [citation][year=2012]Bo Yang, Ji Wu, Chao Liu, "Mining Data Chain Graph for Fault Localization", IEEE 36th Annual Computer Software and Applications Conference Workshops, COMPSACW 2012, Izmir, Turkey, July 16-20, 2012. [citation][year=2011]Gong Zhang, Ling Liu, "Why do migrations fail and what can we do about it?", 25th international conference on Large Installation System Administration, LISA'11, Boston, MA, USA, December 4-9, 2011. [citation][year=2011]Gong Zhang, "Data and Application Migration in Cloud Based Data Centers: Architectures and Techniques", PhD Thesis, Georgia Institute of Technology, USA, August 2011. [citation][year=2010]1. Nikola Milanovic, Bratislav Milic, “Automatic Generation of Service Availability Models”, IEEE Transactions on Services Computing, no. 1, ISSN: 1939-1374, March 2010. [citation][year=2008]1. Lakshmi Narayanan Bairavasundaram, “Characteristics, Impact, and Tolerance of Partial Disk Failures”, PhD Thesis, University of Wisconsin–Madison, USA, 2008. [citation][year=2008]2. Lorenzo Keller, Prasang Upadhyaya, George Candea, “ConfErr: A Tool for Assessing Resilience to Human Configuration Errors”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, Anchorage, Alaska, USA, June 24-27, 2008. [citation][year=2008]3. Bogdan Tomoyuki Nassu, Kiyonobu Uehara, Takashi Nanya, “Injecting Inconsistent Values Caused by Interaction Faults for Experimental Dependability Evaluation”, Seventh European Dependable Computing Conference, EDCC 2008, Kaunas, Lithuania, May 7-9, 2008. [citation][year=2007]1. Andréas Johansson, “Robustness Evaluation of Operating Systems”, PhD Thesis, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany, 2007. [citation][year=2007]Eliane Martins, Regina Moraes, "Research in Software Testing at State University of Campinas", Technical Report - REVVIS Project, 2007. [citation][year=2005]1. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]2. Regina Moraes, Eliane Martins, Naaliel Mendes, "Fault injection approach based on dependence analysis", 29th Annual International Conference on Computer Software and Applications, COMPSAC 2005, Edinburgh, Scotland, UK, July 26-28, 2005. [citation][year=2004]1. Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson, “Experience with Evaluating Human-Assisted Recovery Processes”, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florence, Italy, June 28-July 1, 2004. [citation][year=2003]1. Aaron Brown, “A Recovery-Oriented Approach to Dependable Services: Reairing Past Errors with System-Wide Undo”, PhD Thesis, EECS Computer Science Division - University of California, Berkeley, California, USA, December 2003. [citation][year=2003]2. Regina Morais, Eliane Martins, "A strategy for validating an ODBMS Component Using a High-Level Software Fault Injection Tool", First Latin-American Symposium on Dependable Computing, LADC 2003, São Paulo, Brazil, October 21-24, 2003. [citation][year=2002]1. David Oppenheimer, Aaron B. Brown, Jonathan Traupman, Pete Broadwell, David A. Patterson, “Practical Issues in Dependability Benchmarking”, Second Workshop on Evaluating and Architecting System Dependability (EASY), São Jose, California, USA, October 6, 2002. [publication]Madeira, H. and Costa, J.P. and Marco Vieira and Costa, D. , "Data warehousing approach for the analysis of dependability benchmarking experiments (Fast Abstract)", in Fourth European Dependable Computing Conference (EDCC-4), 2002 [publication]Kanoun, K. and Madeira, H. and Arlat, J. , "A Framework for Dependability Benchmarking", in Workshop on Dependability Benchmarking, ointly organized with the IEEE/IFIP International Conference on Dependable Systems and Networks, 2002 [citation][year=2008]Aaron B. Brown, John W. Sweitzer, IBM, "Method and apparatus for detecting dependability vulnerabilities?, US patent number: 7467068 B2, 2008 [citation][year=2008]Andreas Johansson, "Robustness Evaluation of Operating Systems?, PhD thesis, Darmstadt University, 2008 [citation][year=2007]Wolfgang Forster, Christof Kutschera, Dietmar Schreiner, Karl M. Goschka, "A Unified Benchmarking Process for Components in Automotive Embedded Systems Software," isorc, pp. 41-45, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07), 2007 [citation][year=2005]Jeffrey O. Kephart, "State of the art: Research challenges of autonomic computing?, Proceedings of the 27th international conference on Software engineering ICSE '05 , Proceedings of the 27th international conference on Software engineering ICSE '05, May 2005 [citation][year=2005]Aaron B. Brown, Anupam Chanda, Rik Farrow, Alexandra Fedorova, Petros Maniatis, and Michael L. Scott, "The Many Faces of Systems Research"and How to Evaluate Them?, HotOS X, Tenth Workshop on Hot Topic on Operating Systems, Santa Fe, NM, June 2005. [citation][year=2005]J. Kephart, "Research Challenges of Autonomic Computing?, Proceedings of the 27th International Conference on Software Engineering (ICSE), St. Louis, MO, USA 2005. [citation][year=2005]A. Brown and C. Redlin, "Measuring the effectiveness of self-healing autonomic systems?, In Proceedings of the Second International Conference on Autonomic Computing. IEEE Computer Society, 2005. [citation][year=2005]Ji Zhu, James Mauro, Ira Pramanick, "R3: A Framework for Benchmarking System Availability?, IEEE/IFIP International Conference on Dependable Systems and Networks, Performance and Dependability Symposium, DSN-PDS 2004, Yokohama, Japão, 28 de Junho a 1 de Julho de 2005. [citation][year=2005]Denise Eng, Dimitri Mostinski, and Martin Talbot, "Feasibility and Practical Considerations of Database Self-Managing Technologies?, CS848 Final Project, University of Waterloo, Waterloo, ON, Canada, 2005 (http://www.cs.uwaterloo.ca/~m2talbot/project/CS848-FINAL%20PROJECT.pdf). [citation][year=2004]O Larses, J El-khoury, "Multidisciplinary Modeling and Tool Support for EE Architecture Design?, Proceedings of the 30th World Automotive Congress, FISITA 2004, Barcelona, Spain, 23-27 May 2004. [citation][year=2004]Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson, "Experience with Evaluating Human-Assisted Recovery Processes?, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florença, Itália, 28 Junho a 1 Julho de 2004. [citation][year=2004]Aaron B. Brown, Joseph Hellerstein, Matt Hogstrom, Tony Lau, Sam Lightstone, Peter Shum, Mary Peterson Yos, "Benchmarking Autonomic Capabilities: Promises and Pitfalls?, Proceedings of the IEEE International Conference on Autonomic Computing (ICAC"04), Nova Iorque, 17 de Maio de 2004. [citation][year=2003]Larses O. "Modern Automotive Electronics from a Dependable systems perspective.?, Technical Report TRITA-MMK 2003:38 ISSN 1400-1179, ISRN/KTH/MMK/R-03/38-SE. Mechatronics Lab. Royal Institute of Technology. Stockholm. 2003. [citation][year=2003]Aaron Brown, "A Recovery-Oriented Approach to Dependable Services: Reairing Past Errors with System-Wide Undo?, tese de doutoramento de Aaron Brown, EECS Computer Science Division - University of California, Berkeley, California, EUA, Dezembro de 2003 [publication]Jorge Bernardino and Furtado, P. and Madeira, H. , "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses", in International Database Engineering & Applications Symposium, 2002 [citation][year=2013]1 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 From federated databases to a federated data warehouse system http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4439099 S Berger, M Schrefl … on System Sciences, Proceedings of the … 2008 ieeexplore.ieee.org 2 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Node partitioned data warehouses: experimental evidence and improvements http://www.igi-global.com/article/journal-database-management-jdm/3352 P Furtado Journal of Database Management (JDM) 2006 igi-global.com 3 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 A middle layer for distributed data warehouses using the DWS-AQA technique. http://solutions.criticalsoftware.com.br/upload_product/wp/A_middle_layer_for_distributed_data_warehouses_using_the_DWS-AQA_technique.pdf M Costa, J Vieira, J Bernardino, P Furtado… … 2003 solutions.criticalsoftware.com.br 4 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Star Schema Implementation for Automation of Examination Records http://elrond.informatik.tu-freiberg.de/papers/WorldComp2012/FEC3568.pdf EMA Butt, SMK Quadri, EM Zaman Publication/NA 2012 elrond.informatik.tu-freiberg.de 5 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries http://www.proceedings2006.imcsit.org/pliks/122.pdf M Gorawski, E P?uciennik Proceedings of the … 2006 proceedings2006.imcsit.org 6 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Information Integration: An Enterprise Solution http://www.ijesit.com/Volume 2/Issue 1/IJESIT201301_44.pdf EM Zaman, EMA Butt International Journal of Engineering Science and … Year/NA ijesit.com 7 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Fast accurate summary warehouses with distributed summaries http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1214958 P Furtado, JP Costa Database Engineering and Applications … 2003 ieeexplore.ieee.org 8 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Integrating Information from Heterogeneous Data Sources http://www.jgrcs.info/index.php/jgrcs/article/view/389 MA Butt Journal of Global Research in Computer Science 2012 jgrcs.info 9 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Data Warehouse Implementation of Examination Databases http://elrond.informatik.tu-freiberg.de/papers/WorldComp2012/FEC3561.pdf EM Zaman, SMK Quadri, EMA Butt Publication/NA Year/NA elrond.informatik.tu-freiberg.de 10 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 DSQoS-distributed architecture providing QoS in summary warehouses http://dl.acm.org/citation.cfm?id=956060.956068 JP Costa, P Furtado Proceedings of the 6th ACM international … 2003 dl.acm.org 11 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 Convert Database Structure into Star Schema Structure for Data Warehouse http://www.ijser.org/researchpaper\Convert-Database-Structure-into-Star-Schema-Structure-for-Data-Warehouse.pdf M Abdulameer, UT Malaysia, N Suryana, HA Abdullah… Publication/NA Year/NA ijser.org 12 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 LEQUVC" KUGE RV http://eden.dei.uc.pt/~pnf/my_papers/QoS-DSfurtado.pdf II Pólo Publication/NA 2000 eden.dei.uc.pt 13 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 User Manual for FedDW Global Schema Architect: UML-based Design Tool for Data Mart Integration http://www.dke.jku.at/staff/berger/GSA User Manual.pdf S Berger Publication/NA Year/NA dke.jku.at 14 "DWS-AQA: A Cost Effective Approach for Very Large Data Warehouses [citation][year=2013]" 1010773772019368122 [CITATION][C] CISUC DEI-UC/DEI-ISEC http://www.dke.jku.at/staff/berger/GSA User Manual.pdf P Furtado, JP Costa IDEAS... 2003 IEEE Computer Society [citation][year=2006]Marcin Gorawski, Ewa Płuciennik, "Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries?, proceedings of the International Multiconference on Computer Science and Information Technology, pp. 243 " 252, 2006 [publication]Bizarro, P. and Madeira, H. , "Adding a performance-oriented perspective to data warehouse design", in 4th International Conference on Data Warehousing and Knowledge Discovery - DaWaK 2002, 2002 [citation][year=2006]Implementing Real-Time OLAP with Multidimensional Dynamic Clustering Martin, Michael Wayne PhD Thesis, North Carolina State University [publication]Maia, R. and Henriques, L. and Costa, D. and Madeira, H. , "Xception - Enhanced Automated Fault-Injection Environment", 2002 [citation][year=2004]Anna Derezińska, "Estimating Dependability of Parallel FFT Application using Fault Injection?, Proceedings of the IEEE International Conference on Parallel Computing in Electrical Engineering (PARELEC"04), Dresden, Germany, September 7-10, 2004 2001(9 publications) [publication]Bizarro, P. and Madeira, H. , "A new index for data warehouses", in XVI Brazilian Symposium on Databases (SBBD2001), 2001 [citation][year=2005]Kamel Aouiche, "Techniques de fouille de données pour l"optimisation automatique des performances des entrepôts de données?, PhD thesis, Université Lumière Lyon 2, December 2005 [citation][year=2004]Hayder k. Al-Ameed, Shaikha O. Al-Ketbi, Amna A. Al Kaabi, Khadija S.Al Shebli, Naila F. Al Shamsi, Noura H. Al Nuaimi, Shaikha S. Al Muhairi, "A New Oracle Text Control Panel Tool: Design And Implementation?, The 2004 International Research Conference on Innovations in Information Technology, Dubai, 2004. [citation][year=2004]Eduardo Cunha de Almeida, "Estudo de viabilidade de uma plataforma de baixo custo para Data Warehouse?, Tese de doutoramento, Universidade Federal do Paraná, Brasil, 2004. [publication]Jorge Bernardino and Madeira, H. , "Data Warehouse Striping: Improved Query Warehouse Striping Response Time", in International Conference on Enterprise Information Systems, ICEIS-2001, 2001 [publication]Jorge Bernardino and Madeira, H. , "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses", in International Symposium on Database Engineering and Applications, IDEAS 2001, 2001 [citation][year=2013]1 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Approximate query answering using data warehouse striping http://link.springer.com/article/10.1023/A:1016551309288 JR Bernardino, PS Furtado, HC Madeira Journal of Intelligent Information … 2002 Springer 2 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Handling big dimensions in distributed data warehouses using the DWS technique http://dl.acm.org/citation.cfm?id=1031770 M Costa, H Madeira Proceedings of the 7th ACM international … 2004 dl.acm.org 3 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 DWS-AQA: A cost effective approach for very large data warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1029676 J Bernardino, P Furtado… Database Engineering and … 2002 ieeexplore.ieee.org 4 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Efficient data distribution for DWS http://link.springer.com/chapter/10.1007/978-3-540-85836-2_8 R Almeida, J Vieira, M Vieira, H Madeira… Data Warehousing and … 2008 Springer 5 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Method using a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921131&id=JhlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,131 2011 Google Patents 6 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 System of a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7860865&id=w0bwAAAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,860,865 2010 Google Patents 7 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Redundant array of inexpensive nodes for DWS http://link.springer.com/chapter/10.1007/978-3-540-78568-2_49 J Vieira, M Vieira, M Costa, H Madeira Database Systems for Advanced … 2008 Springer 8 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Adding a performance-oriented perspective to data warehouse design http://link.springer.com/chapter/10.1007/3-540-46145-0_23 P Bizarro, H Madeira Data Warehousing and Knowledge Discovery 2002 Springer 9 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 System and method for adding a storage server in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT8214388&id=hHMfAgAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 8,214,388 2012 Google Patents 10 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Method for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921087&id=5BRzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,087 2011 Google Patents 11 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 System for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921132&id=JxlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,132 2011 Google Patents 12 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Verification of partitioning and allocation techniques on teradata DBMS http://link.springer.com/chapter/10.1007/978-3-642-24650-0_14 L Bellatreche, S Benkrid, A Ghazal, A Crolotte… … and Architectures for … 2011 Springer 13 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Efficiency in Cluster Database Systems http://www.opus-bayern.de/uni-passau/volltexte/2011/2582/pdf/Rabl_Tilmann.pdf DIT Rabl Publication/NA 2011 opus-bayern.de 14 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Efficiently repairing and measuring replica consistency in distributed databases http://link.springer.com/article/10.1007/s10619-012-7116-0 J García-García, C Ordonez, PT Tosic Distributed and Parallel Databases 2013 Springer 15 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 Cost-Effective Data Allocation in Data Warehouse Striping http://www.doaj.org/doaj?func=fulltext&aId=1177338 R Almeida, J Vieira, M Vieira, H Madeira… International … 2012 doaj.org 16 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 A Query Cache Tool for Optimizing Repeatable and Parallel OLAP Queries http://link.springer.com/chapter/10.1007/978-3-642-03573-9_11 RJ Santos, J Bernardino Database and Expert Systems Applications 2009 Springer 17 "Experimental Evaluation of a New Distributed Partitioning Technique for Data Warehouses [citation][year=2013]" 11493051655856142060 ????? ???????? ? ??????????? ??????????? ?????? ? ???? http://www.mathnet.ru/rus/trspy580 ?? ???????? ????? ??????? 2013 mathnet.ru [publication]Costa, D. and Rilho, T. and Marco Vieira and Madeira, H. , "ESFFI - A novel technique for the Emulation of Software Faults in COTS Components", in 8th Annual IEEE International Conference on the Engineering of Computer-Based Systems, ECBS 2001, 2001 [citation][year=2012]Adesh Panwar, "Verification Platform for FPGA Based Architecture", International Conference on Advances in Computing, ICADC 2012, Bangalore, Karnataka, India, July 4-6, 2012. [citation][year=2011]LIU Jia-xiang, JIANG Jian-hui, JIN Ang, LOU Jun-gang, "A Static Fault Injection Tool for Java Programs", Acta Scientiarum Naturalium Universitatis Neimongol, 42(5), 2011. [citation][year=2010]1. M. Di Marzio, M. Grosso, M. Sonza Reorda, L. Sterpone, G. Audisio, M. Sabatini, “A Novel Scalable and Reconfigurable Emulation Platform for Embedded Systems Verification”, IEEE International Symposium on Circuits and Systems, ISCS 2010, Paris, France, May 30 – June 2, 2010. [citation][year=2009]1. Ang Jin, Jian-hui Jiang, "Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification", 15th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC'09, Shanghai, China, November 2009. [citation][year=2008]1. Ang Jin, Jianhui Jiang, Jiawei Hu, Jungang Lou, "A PIN-Based Dynamic Software Fault Injection System", The 9th International Conference for Young Computer Scientists, ICYCS 2008, pp.2160-2167, November 18-21, 2008. [citation][year=2005]1. Ruben Alexandersson, D. Krishna Chaitanya, Peter Öhman, Yasir Sira, “A technique for fault tolerance assessment of COTS Based Systems”, International Conference on Computer Safety, Reliability and Security (SAFECOMP2005), Fredrikstad, Norway, September 2005. [citation][year=2005]2. Wu Ji, JIA Xiaoxia, Liu Chang, Y Haiyan, Liu Chao, “Finds in Testing Experiments for Model Evaluation”, Tsinghua Science and Technology Journal, Vol.10 No.3 P.298-303, 2005. [citation][year=2003]1. Saraswati Bharthipudi, “Comparison of Numerical Result Checking Mechanisms for FFT Computations Under Faults”, PhD Thesis, School of Electrical and Computer Engineering, Georgia Institute of Technology, USA, December 2003. [citation][year=2003]2. Tahar Jarboui, “Surete de Fonctionnement de Systemes Informatiques – Étalonage et Representativite des Fautes”, PhD Thesis, LAAS-CNRS, Toulouse, France, May 2003. [citation][year=2003]Raviteja Varanasi, "Software Faults and Fault Injection Models", CSC532 - Advanced Software Engineering, Louisiana Tech University, 2003. [citation][year=2002]1. Andreas Johansson, “Software Implemented Fault Injection Used for Software Evaluation”, Predicting System Trustworthiness for Software Component Trustworthiness, Artech House, July 2002. [publication]Jorge Bernardino and Madeira, H. , "A New Technique to Speedup Queries in Data Warehousing", in ABDIS-DASFA, Symposium on Advances in Databases and Information Systems - Enlarged Fourth East-European Conference on Advances in Databases and Information Systems, 2001 [citation][year=2013]" 4543013994316329237 Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries http://www.proceedings2006.imcsit.org/pliks/122.pdf M Gorawski, E P?uciennik Proceedings of the … 2006 proceedings2006.imcsit.org 18 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Exploiting data access for dynamic fragmentation in data warehouse http://inderscience.metapress.com/index/N2583608V2G35686.pdf H Derrar, M Ahmed?Nacer, O Boussaid International Journal of … 2013 Inderscience 19 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 An Analysis of Data Warehouse Research http://www.academic-journals.org/EC/v4n1-2006-spring/ECSv4n1p1.pdf HY Lin, PY Hsu, YM Su Electronic Commerce Studies 2006 academic-journals.org 20 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 System and method for adding a storage server in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT8214388&id=hHMfAgAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 8,214,388 2012 Google Patents 21 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Method for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921087&id=5BRzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,087 2011 Google Patents 22 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 System for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921132&id=JxlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,132 2011 Google Patents 23 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 AGENT BASED DATA STORAGE AND DISTRIBUTION IN DATA WAREHOUSES http://www.worldscientific.com/doi/abs/10.1142/S0218194008003842 N Kolsi, A Abdellatif, K Ghedira International Journal of Software … 2008 World Scientific 24 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Data Warehouse System Evaluation and Selection Decisions http://thesis.lib.ncu.edu.tw/ETD-db/ETD-search/view_etd?URN=91441002 HY Lin Publication/NA 2006 thesis.lib.ncu.edu.tw 25 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 The F&A Methodology and Its Experimental Validation on a Real-Life Parallel Processing Database System http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6245571 L Bellatreche, S Benkrid, A Crolotte… … (CISIS), 2012 Sixth … 2012 ieeexplore.ieee.org 26 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Cost-Effective Data Allocation in Data Warehouse Striping http://www.doaj.org/doaj?func=fulltext&aId=1177338 R Almeida, J Vieira, M Vieira, H Madeira… International … 2012 doaj.org 27 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 A Query Cache Tool for Optimizing Repeatable and Parallel OLAP Queries http://link.springer.com/chapter/10.1007/978-3-642-03573-9_11 RJ Santos, J Bernardino Database and Expert Systems Applications 2009 Springer 28 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Particle swarm optimisation for data warehouse logical design http://inderscience.metapress.com/index/74N7768848255414.pdf HÁ Derrar, M Ahmed?Nacer, O Boussaid International Journal of Bio- … 2012 Inderscience 29 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6340224 RJ Santos, J Bernardino… Computer Software and … 2012 ieeexplore.ieee.org 30 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 [CITATION][C] Uma Solução para Business Intelligence http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6340224 Authors/NA Publication/NA Year/NA Publisher/NA [citation][year=2013]1 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Handling big dimensions in distributed data warehouses using the DWS technique http://dl.acm.org/citation.cfm?id=1031770 M Costa, H Madeira Proceedings of the 7th ACM international … 2004 dl.acm.org 2 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 DWS-AQA: A cost effective approach for very large data warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1029676 J Bernardino, P Furtado… Database Engineering and … 2002 ieeexplore.ieee.org 3 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Providing ranked cooperative query answers using the metricized knowledge abstraction hierarchy http://www.sciencedirect.com/science/article/pii/S095741740500357X MK Shin, SY Huh, W Lee Expert Systems with Applications 2007 Elsevier 4 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Method using a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921131&id=JhlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,131 2011 Google Patents 5 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 A middle layer for distributed data warehouses using the DWS-AQA technique. http://solutions.criticalsoftware.com.br/upload_product/wp/A_middle_layer_for_distributed_data_warehouses_using_the_DWS-AQA_technique.pdf M Costa, J Vieira, J Bernardino, P Furtado… … 2003 solutions.criticalsoftware.com.br 6 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Algorithms for efficient processing of complex queries in node-partitioned data warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1319785 P Furtado … and Applications Symposium, 2004. IDEAS'04. … 2004 ieeexplore.ieee.org 7 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Efficient compression of text attributes of data warehouse dimensions http://link.springer.com/chapter/10.1007/11546849_35 J Vieira, J Bernardino, H Madeira Data Warehousing and Knowledge … 2005 Springer 8 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Scalable Query Infrastructure http://www.google.com/patents?hl=en&lr;=&vid=USPATAPP11537476&id=qyOoAAAAEBAJ&oi=fnd&printsec=abstract A Rowstron, R Mortier, A Donnelly… US Patent App. 11/ … 2006 Google Patents 9 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 System of a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7860865&id=w0bwAAAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,860,865 2010 Google Patents 10 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Accuracy estimation in approximate query processing http://www.wseas.us/e-library/conferences/2010/Corfu/COMPUTERS/COMPUTERS2-08.pdf C Dell'Aquila, F Di Tria, E Lefons… Proceedings of the 14th … 2010 wseas.us 11 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 [CITATION][C] u-?? ???? ?? ??????? ???? ?? ??? ?? Link/NA ??? ?????????????? 2006 ??????????? 12 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Data warehouse access using multi-agent system http://link.springer.com/article/10.1007/s10619-009-7036-9 N Kolsi, A Abdellatif, K Ghedira Distributed and Parallel Databases 2009 Springer 13 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Building OLAP tools over large databases http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.109.4447&rep=rep1&type=pdf R Oliveira, J Bernardino Proceedings of IADIS Virtual Multi Conference 2006 Citeseer 14 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Metrics for approximate query engine evaluation http://dl.acm.org/citation.cfm?id=2245448 F Di Tria, E Lefons, F Tangorra Proceedings of the 27th Annual ACM … 2012 dl.acm.org 15 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Probabilistic model for accuracy estimation in approximate monodimensional analyses http://www.wseas.us/e-library/transactions/computers/2010/88-281.pdf C Dell'Aquila, F Di Tria, E Lefons… WSEAS Transactions on … 2010 wseas.us 16 "A New Technique to Speedup Queries in Data Warehousing [citation][year=2013]" 4543013994316329237 Multi agent systems in distributed datawarehousing http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5640491 TP Latchoumi, R Sunitha Computer and Communication … 2010 ieeexplore.ieee.org 17 "A New Technique to Speedup Queries in Data Warehousing [publication]Costa, D. and Marco Vieira and Madeira, H. , "Optimization of Performance and Recovery of Database Systems in the Presence of Operation Faults (Fast Abstract)", in The International Conference on Dependable Systems and Networks, DSN-2001, 2001 [publication]Joao Duraes and Madeira, H. , "Accuracy of the Emulation of Software Faults by Machine-Code Level Errors (Fast Abstract)", in Dependable Systems and Networks DSN-01, 2001 [publication]Jorge Bernardino and Madeira, H. and Furtado, P. , "Approximate Query Answering Using Data Warehouse Striping", in DaWaK, Data Warehousing and Knowledge Discovery, 2001 [citation][year=2013]1 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Handling big dimensions in distributed data warehouses using the DWS technique http://dl.acm.org/citation.cfm?id=1031770 M Costa, H Madeira Proceedings of the 7th ACM international … 2004 dl.acm.org 2 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 DWS-AQA: A cost effective approach for very large data warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1029676 J Bernardino, P Furtado… Database Engineering and … 2002 ieeexplore.ieee.org 3 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Providing ranked cooperative query answers using the metricized knowledge abstraction hierarchy http://www.sciencedirect.com/science/article/pii/S095741740500357X MK Shin, SY Huh, W Lee Expert Systems with Applications 2007 Elsevier 4 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Method using a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921131&id=JhlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,131 2011 Google Patents 5 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 A middle layer for distributed data warehouses using the DWS-AQA technique. http://solutions.criticalsoftware.com.br/upload_product/wp/A_middle_layer_for_distributed_data_warehouses_using_the_DWS-AQA_technique.pdf M Costa, J Vieira, J Bernardino, P Furtado… … 2003 solutions.criticalsoftware.com.br 6 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Algorithms for efficient processing of complex queries in node-partitioned data warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1319785 P Furtado … and Applications Symposium, 2004. IDEAS'04. … 2004 ieeexplore.ieee.org 7 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Efficient compression of text attributes of data warehouse dimensions http://link.springer.com/chapter/10.1007/11546849_35 J Vieira, J Bernardino, H Madeira Data Warehousing and Knowledge … 2005 Springer 8 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Scalable Query Infrastructure http://www.google.com/patents?hl=en&lr;=&vid=USPATAPP11537476&id=qyOoAAAAEBAJ&oi=fnd&printsec=abstract A Rowstron, R Mortier, A Donnelly… US Patent App. 11/ … 2006 Google Patents 9 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 System of a hierarchy of servers for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7860865&id=w0bwAAAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,860,865 2010 Google Patents 10 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Accuracy estimation in approximate query processing http://www.wseas.us/e-library/conferences/2010/Corfu/COMPUTERS/COMPUTERS2-08.pdf C Dell'Aquila, F Di Tria, E Lefons… Proceedings of the 14th … 2010 wseas.us 11 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 [CITATION][C] u-?? ???? ?? ??????? ???? ?? ??? ?? Link/NA ??? ?????????????? 2006 ??????????? 12 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Data warehouse access using multi-agent system http://link.springer.com/article/10.1007/s10619-009-7036-9 N Kolsi, A Abdellatif, K Ghedira Distributed and Parallel Databases 2009 Springer 13 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Building OLAP tools over large databases http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.109.4447&rep=rep1&type=pdf R Oliveira, J Bernardino Proceedings of IADIS Virtual Multi Conference 2006 Citeseer 14 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Metrics for approximate query engine evaluation http://dl.acm.org/citation.cfm?id=2245448 F Di Tria, E Lefons, F Tangorra Proceedings of the 27th Annual ACM … 2012 dl.acm.org 15 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Probabilistic model for accuracy estimation in approximate monodimensional analyses http://www.wseas.us/e-library/transactions/computers/2010/88-281.pdf C Dell'Aquila, F Di Tria, E Lefons… WSEAS Transactions on … 2010 wseas.us 16 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Multi agent systems in distributed datawarehousing http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5640491 TP Latchoumi, R Sunitha Computer and Communication … 2010 ieeexplore.ieee.org 17 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries http://www.proceedings2006.imcsit.org/pliks/122.pdf M Gorawski, E P?uciennik Proceedings of the … 2006 proceedings2006.imcsit.org 18 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Exploiting data access for dynamic fragmentation in data warehouse http://inderscience.metapress.com/index/N2583608V2G35686.pdf H Derrar, M Ahmed?Nacer, O Boussaid International Journal of … 2013 Inderscience 19 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 An Analysis of Data Warehouse Research http://www.academic-journals.org/EC/v4n1-2006-spring/ECSv4n1p1.pdf HY Lin, PY Hsu, YM Su Electronic Commerce Studies 2006 academic-journals.org 20 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 System and method for adding a storage server in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT8214388&id=hHMfAgAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 8,214,388 2012 Google Patents 21 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Method for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921087&id=5BRzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,087 2011 Google Patents 22 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 System for query processing of column chunks in a distributed column chunk data store http://www.google.com/patents?hl=en&lr;=&vid=USPAT7921132&id=JxlzAQAAEBAJ&oi=fnd&printsec=abstract RK Uppala US Patent 7,921,132 2011 Google Patents 23 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 AGENT BASED DATA STORAGE AND DISTRIBUTION IN DATA WAREHOUSES http://www.worldscientific.com/doi/abs/10.1142/S0218194008003842 N Kolsi, A Abdellatif, K Ghedira International Journal of Software … 2008 World Scientific 24 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Data Warehouse System Evaluation and Selection Decisions http://thesis.lib.ncu.edu.tw/ETD-db/ETD-search/view_etd?URN=91441002 HY Lin Publication/NA 2006 thesis.lib.ncu.edu.tw 25 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 The F&A Methodology and Its Experimental Validation on a Real-Life Parallel Processing Database System http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6245571 L Bellatreche, S Benkrid, A Crolotte… … (CISIS), 2012 Sixth … 2012 ieeexplore.ieee.org 26 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Cost-Effective Data Allocation in Data Warehouse Striping http://www.doaj.org/doaj?func=fulltext&aId=1177338 R Almeida, J Vieira, M Vieira, H Madeira… International … 2012 doaj.org 27 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 A Query Cache Tool for Optimizing Repeatable and Parallel OLAP Queries http://link.springer.com/chapter/10.1007/978-3-642-03573-9_11 RJ Santos, J Bernardino Database and Expert Systems Applications 2009 Springer 28 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Particle swarm optimisation for data warehouse logical design http://inderscience.metapress.com/index/74N7768848255414.pdf HÁ Derrar, M Ahmed?Nacer, O Boussaid International Journal of Bio- … 2012 Inderscience 29 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 Leveraging 24/7 Availability and Performance for Distributed Real-Time Data Warehouses http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6340224 RJ Santos, J Bernardino… Computer Software and … 2012 ieeexplore.ieee.org 30 "Approximate Query Answering Using Data Warehouse Striping [citation][year=2013]" 4543013994316329237 [CITATION][C] Uma Solução para Business Intelligence http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6340224 Authors/NA Publication/NA Year/NA Publisher/NA [publication]Madeira, H. and Koopman, P. , "Dependability Benchmarking: making choices in an n-dimensional problem space", in First Workshop on Evaluating and Architecting System Dependability (EASY), 2001 [citation][year=2007]Wolfgang Forster, Christof Kutschera, Dietmar Schreiner, Karl M. Goschka, "A Unified Benchmarking Process for Components in Automotive Embedded Systems Software," isorc, pp. 41-45, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07), 2007 [citation][year=2007]Marios D. Dikaiakos, "Grid benchmarking: vision, challenges, and current status?, Concurrency And Computation: Practice and Experience, 19:89"105, Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/cpe.1086, 2007 [citation][year=2006]Marios D. Dikaiakos, "Grid benchmarking: vision, challenges, and current status?, Concurrency and Computation: Practice and Experience, Volume 19, Issue 1 , Pages 89 " 105, Published Online, John Wiley & Sons, Ltd, 13 Jun 2006 [citation][year=2005]Denise Eng, Dimitri Mostinski, and Martin Talbot, "Feasibility and Practical Considerations of Database Self-Managing Technologies?, CS848 Final Project, University of Waterloo, Waterloo, ON, Canada, 2005 (http://www.cs.uwaterloo.ca/~m2talbot/project/CS848-FINAL%20PROJECT.pdf) [citation][year=2005]Ji Zhu, James Mauro, Ira Pramanick, "R3: A Framework for Benchmarking System Availability?, IEEE/IFIP International Conference on Dependable Systems and Networks, Performance and Dependability Symposium, DSN-PDS 2005, Yokohama, Japão, 28 de Junho a 1 de Julho de 2005 [citation][year=2004]Aaron B. Brown, Leonard Chung, William Kakes, Calvin Ling, David A. Patterson, "Experience with Evaluating Human-Assisted Recovery Processes?, IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2004, Florença, Itália, 28 Junho a 1 Julho de 2004. [citation][year=2004]J. G. Geraldi, "Managing Perturbations IN AN International Business Network?, Proceedings of Global Project and Manufacturing Management Symposium, Siegen, Alemanha, 6 e 7 de Maio de 2004. [citation][year=2004]Aaron B. Brown and Joseph L. Hellerstein, "An Approach to Benchmarking Configuration Complexity?, Proceedings of the 11th ACM SIGOPS European Workshop, Lovaina, Bélgica, Setembro de 2004. [citation][year=2004]Aaron B. Brown, Joseph Hellerstein, Matt Hogstrom, Tony Lau, Sam Lightstone, Peter Shum, Mary Peterson Yos, "Benchmarking Autonomic Capabilities: Promises and Pitfalls?, Proceedings of the IEEE International Conference on Autonomic Computing (ICAC"04), Nova Iorque, 17 de Maio de 2004. [citation][year=2003]Ji Zhu, James Mauro, and Ira Pramanick, "Robustness Benchmarking for Hardware Maintenance Events", IEEE/IFIP International Conference on Dependable Systems and Networks, Dependable Computing and Communications, DSN-DCC 2003, San Francisco, CA, USA, pp. 115-122, June 22-25, 2003. [citation][year=2003]Aaron Brown, "A Recovery-Oriented Approach to Dependable Services: Repairing Past Errors with System-Wide Undo?, Report No. UCB//CSD-04-1304, Computer Science Division (EECS), University of California, Berkeley, California 94720, December 2003. [citation][year=2003]Ji Zhu, James Mauro, and Ira Pramanick, "R3 - A framework for availability benchmarking", Supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, Dependable Computing and Communications, DSN-DCC 2003, San Francisco, CA, USA, pp. B86-B87, June 22-25, 2003. [citation][year=2003]T. Jarboui, "Surete de Fonctionnement de Systemes Informatiques " ÿtalonage et Representativite des Fautes?, tese de doutoramento de Tahar Jarboui, LAAS-CNRS, Toulouse, França., Maio de 2003, LAAS-CNRS, Toulouse, França. [citation][year=2002]David Oppenheimer, Aaron B. Brown, Jonathan Traupman, Pete Broadwell, David A. Patterson, "Practical Issues in Dependability Benchmarking?, Second Workshop on Evaluating and Architecting System Dependability (EASY), São Jose, California, EUA, 6 de Outubro de 2002. [citation][year=2002]George W. Herbert, "Failure from the Field: Complexity Kills?, Second Workshop on Evaluating and Architecting System Dependability (EASY), São Jose, California, EUA, 6 de Outubro de 2002. [citation][year=2002]George Herbert, "Failure from the Field: Complexity Kills", Second Workshop on Evaluating and Architecting System dependabilitY (EASY), San Jose, California, EUA, 6 Outubro de 2002. [citation][year=2002]A. Brown, L. Chung, and D. Patterson, "Including the human factor in dependability benchmarks", supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. F9-F14, 23 a 26 de Junho de 2002. [citation][year=2002]M. Cukier and C. Smidts, "Using bayesian theory for estimating dependability benchmark measures", supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. B17-F18, 23 a 26 de Junho de 2002. [citation][year=2002]J. Zhu, J. Mauro, I. Pramanick, "System recovery benchmark", supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. B27-F28, June 23-26, 2002. 2000(7 publications) [publication]Furtado, P. and Madeira, H. , "FCompress: A New Technique for Queriable Compression of Facts and Datacubes", in International Database Engineering and Applications Symposium, IDEASâ??2000, 2000 [publication]Furtado, P. and Madeira, H. , "Data Cube Compression with QuantiCubes", in 2nd International Conference on Data Warehousing and Knowledge Discovery, Dawak'00, 2000 [citation][year=2005]Shi-Ming Huang, Binshan Lin, Qun-Shi Deng, "Intelligent Cache Management for Mobile Data Warehouse Systems?, Journal of Database Management, 16(2), 46-65, April-June 2005, edited by Keng Siau, Copyright © 2005, Idea Group Inc, 2005. [citation][year=2002]Owen Kaser, "Compressing MOLAP arrays by attribute-value reordering: An experimental analysis?, Technical Report TR-02-001, Dept. of CS and Appl. Stats, U. of New Brunswick, Saint John, Canada, August 2002. [publication]Furtado, P. and Madeira, H. , "VMHIST: Improved Adaptable Multidimensional Histograms", in 2nd International Conference on Data Warehousing and Knowledge Discovery, Dawak\'00, 2000 [publication]Madeira, H. and Marco Vieira and Costa, D. , "On the Emulation of Software Faults by Software Fault Injection", in Dependable Systems and Networks Conference â?? DSN-2000, 2000 [citation][year=2013]K. Jayashree, Sheila Anand, "Web Service Diagnoser Model for managing faults in web services", Computer Standards & Interfaces, Elsevier, July 2013. [citation][year=2013]Patrick Pape, "A Methodology for Increasing the Dependability of Open Source Software Components", PhD Thesis, Auburn University, Auburn, Alabama, May 2013. [citation][year=2012]Piotr Gawkowski, Mariusz Markowski, Grzegorz Smulko, ?ukasz Karolewski, "Fault Injection Techniques Towards Software Quality Assessment", Modern ICT for Evaluation of Business Information Systems - Information Systems in Management XVI, Warsaw University of Life Sciences, Warsaw, Poland, 2012. [citation][year=2012]Xavier Kauffmann-Tourkestansky, “Analyses sécuritaires de code de carte à puce sous attaques physiques simulées”, PhD Thesis, Université D’Orléans, France, November 2012. [citation][year=2012]Rim Akrout, "Analyse de vulnérabilités et évaluation de systèmes de détection d'intrusions pour les applications Web", PhD Thesis, Institut National des Sciences Appliquées de Toulouse (INSA Toulouse), Toulouse, France, October 2012. [citation][year=2012]Joon S. Park, Pratheep Chandramohan, Avinash T. Suresh, Joseph V. Giordano, Kevin A. Kwiat, "Component survivability at runtime for mission-critical distributed systems", The Journal of Supercomputing, September 2012 [citation][year=2012]Thorsten Piper, Stefan Winter, Paul Manns, Neeraj Suri, "Instrumenting AUTOSAR for dependability assessment: A guidance framework", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2012, Boston, MA, USA, June 2012. [citation][year=2012]Domenico Cotroneo, Anna Lanzaro, Roberto Natella, Ricardo Barbosa, "Experimental Analysis of Binary-Level Software Fault Injection in Complex Software", Ninth European Dependable Computing Conference, EDCC-9, Sibiu, Romania, May 2012. [citation][year=2011]John Thomson, Andre Guerreiro, Paulo Trezentos, Jeff Johnson, "Package Upgrade Robustness: An Analysis for GNU/Linux Package Management Systems", Open Source Systems: Grounding Research, IFIP Advances in Information and Communication Technology, (Eds. Scott Hissam, Barbara Russo, Manoel de Mendonça Neto, Fabio Kon), Springer Boston, ISBN: 978-3-642-24417-9, 2011. [citation][year=2011]Roberto Natella, “Achieving Representative Faultloads in Software Fault Injection”, PhD Thesis, Universita' Degli Studi di Napoli Federico II, Italy, November 2011. [citation][year=2011]Y. Oyama, Y. Hoshi, "A Hypervisor for Injecting Scenario-Based Attack Effects", 2011 IEEE 35th Annual Computer Software and Applications Conference (COMPSAC 2011), Munich, Germany, July 2011. [citation][year=2011]Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu, Ravishankar K. Iyer, “Fault injection-based assessment of partial fault tolerance in stream processing applications”, 5th ACM international conference on Distributed event-based system, DEBS '11, New York, NY, USA, July 11-15, 2011. [citation][year=2011]Daniele Esposito, “Strategie per il miglioramento dei log applicativi basate su Software Fault Injection”, Tesi di Laurea, Facoltà di Ingegneria, Universita' degle Studi di Napoli Federico II, 2011. [citation][year=2011]A. Bondavalli, P. Lollini, A. Bovenzi, M. Colajanni, L. Coppolino, C. Esposito, M. Fixxo, C. di Martino, L. Montecchi, R. Natella, A. Peccia, "D3.1: Modeling and Evaluation: State-of-the-art", deliverable of the project: Dependable Off-The-Shelf based Middleware Systems for Large-scale Complex Critical Infrastructures (DOTS-LCCI Project: PRIN 2008LWRBHF), Italy, March 2011. [citation][year=2010]1. S.M. Nematollahzadeh, A. A. Jamshidifar, "Simulation of the Effects of Radiation on a Satellite Memory and Improving Its Fault-Tolerant Ability, Using SIHFT", Book Title: Ultra-Wideband, Short Pulse Electromagnetics 9, ISBN: 978-0-387-77845-7, Springer New York, 2010. [citation][year=2010]2. Ravishankar K. Iyer, Nithin Nakka, Zbigniew Kalbarczyk, Weining Gu, "Fault Injection, Encyclopedia of Software Engineering, Ch 25, Nov 2010. [citation][year=2010]3. Hameed, K., Williams, R., Smith, J., "Analytically redundant controllers for fault tolerance: Implementation with separation of concerns," American Control Conference, ACC 2010, B altimore, Maryland, USA, June 30 - July 2, 2010. [citation][year=2010]4. Roberto Natella, Domenico Cotroneo, “Emulation of Transient Software Faults for Dependability Assessment: A Case Study”, Eigth European Dependable Computing Conference, EDCC 2010, Valencia, Spain, April 2010. [citation][year=2009]1. Anderson Nunes Paiva Morais, "injecção de Ataques Baseado em Modelo para Teste de Protocolos de Segurança", MSc Thesis, Instituto de Computação, Universidade Estadual de Campinas (UNICAMP), Campinas, Brazil, 2009. [citation][year=2009]2. Giuseppe Scafuti, "Valutazione sperimentale di tecniche di testing per software in relazione ai tipi di fault", Tesi de Laurea, Universita degli Studi di Napoli Federico II, Naples, Italy, May 2009. [citation][year=2009]3. Stefano Rago, “Un approccio per la Software Fault Injection in Sistemi Software Complessi e Distribuiti”, MSc Thesis, Universita' degli Studi di Napoli Federico II, Facoltà de Ingegneria, Italy, 2009. [citation][year=2009]4. Christopher Dabrowski, “Reliability in grid computing systems”, Concurrency and Computation: Practice and Experience, Wiley InterScience, John Wiley & Sons, 2009. [citation][year=2008]1. Gabriella Carrozza, “Software Faults Diagnosis in Complex, OTS-Based, Critical Systems”, tese de doutoramento de Gabriella Carrozza, “FEDERICO II” University of Naples, Naples, Italy, November 2008. [citation][year=2008]2. Jeffrey Michael Napper, “Robust Multithreaded Applications”, PhD Thesis, Graduate School of The University of Texas at Austin, USA, 2008. [citation][year=2008]3. Douglas John Buettner, "Designing an Optimal Software Intensive System Acquisition: A Game Theoretic Approach", Phd Thesis, University of Southern California, September 2008. [citation][year=2007]1. E. Touloupis, J. A. Flint, V. A. Chouliaras, and D. Ward, “Study of the Effects of SEU-Induced Faults on a Pipeline Protected Microprocessor”, IEEE Transactions on Computers, Vol. 56, issue 12, December 2007. [citation][year=2007]2. Pardo, J. Campelo, J.C. Ruiz, J.C. Gil, P., "Embedded Software Validation Using On-Chip Debugging Mechanisms", Software engineering of fault tolerant systems (P. Pelliccione, H. Muccini, N. Guelfi, A. Romanovsky Eds), Series on Software Engineering and Knowledge Engineering, World Scientific Publishing Co, Vol. 19, pp 121-149, 2007. [citation][year=2007]3. Paolo Lollini et al., "D4.1.2. Evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2007. [citation][year=2007]4. Andréas Johansson, “Robustness Evaluation of Operating Systems”, tese de doutoramento de Andréas Johansson, Vom Fachbereich Informatik der Technischen Universit, University of Darmstad, Germany 2007. [citation][year=2007]5. S. Bruning, S. Weißleder, M. Malek, “A fault taxonomy for service-oriented architecture”, Humboldt-Universit¨at zu Berlin, Tech. Rep. 215, 2007. [citation][year=2007]6. Joon S. Park, Joseph Giordano, "Software component survivability in information warfare", Cyber Warfare and Cyber Terrorism, Information Science Reference, IGI-Gloabl, ISBN: 1591409918. 2007. [citation][year=2007]7. Joon Park, “Dynamic Hybrid Component Test For Mission-Critical Distributed Systems”, Technical Report AFRL-IF-RS-TR-2007-149, Syracuse University, Air Force Research Laboratory, Information Directorate, Rome Research Site, Rome, New York,USA, June 2007. [citation][year=2006]1. V.V. Phoha, S. Phoha, A. Ray, K.S. Balagani, A.U. Nadgar, R. Varanasi, "Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks", Sensor Network Operations, IEEE Press/Wiley, ISBN 0-387-19826-1, eds. S. Phoha, T. LaPorta and C. Griffin, Chapter 10, 2006. [citation][year=2006]2. Juan Pardo, José-Carlos Campelo, Juan-Carlos Ruiz, Pedro Gil, "Temporal Characterization of Embedded Systems Using Nexus", Sixth European Dependable Computing Conference, EDCC-6, Coimbra, Portugal, October 18-20, 2006. [citation][year=2006]3. Paolo Lollini et al., "D4.1.1. Identification and development of evaluation methodologies, techniques and tools", deliverable of the project: Highly dependable ip-based networks and services Project (HIDENETS Project: IST-FP6-STREP- 26979), December 2006. [citation][year=2006]4. L. Strigini et al., “Resilience-Building Technologies: State of Knowledge – ReSIST NoE Deliverable D12”, deliverable of the project: ReSIST: Resilience for Survivability in IST - A European Network of Excellence (ReSIST: Contract Number: 026764), September 2006. [citation][year=2006]5. Richard Torkar, “Towards Automated Software Testing: Techniques, Classifications and Frameworks”, PhD Thesis, Blekinge Institute of Technology, Sweden, 2006. [citation][year=2006]6. Cheng-Chun Tu, “Modeling Component Failures in Embedded Systems”, Master's Thesis, International Master’s Program in Dependable Computer Systems, Chalmers University of Technology, Department of Computer Science and Engineering, Goteborg, Sweden, 2006. [citation][year=2005]1. Ali Kalakech, “Étalonnage de la sûreté de fonctionnement des systèmes d’exploitation – Spécifications et mise en œuvre”, PhD Thesis, LAAS-CNRS, Toulouse, France, August 2005. [citation][year=2005]2. Arnaud Albinet, “Caractérisation de Systèmes D’exploitation en Présence de Pilotes Défaillants”, PhD Thesis, Laboratoire d’Analyse et d’Architecture des Systèmes (LAAS-CNRS), Toulouse, France, 2005. [citation][year=2005]3. N. Looker, M. Munro, J. Xu, "Simulating Errors in Web Services", International Journal of Simulation: Systems, Science & Technology, Vol. 5 No. 5 ISSN 1473-804x, 2005. [citation][year=2005]4. Joon S. Park, Pratheep Chandramohan, Ganesh Devarajan, Joseph Giordano, “Trusted Component Sharing by Runtime Test and Immunization for Survivable Distributed Systems”, Security and Privacy in the Age of Ubiquitous Computing: IFIP TC11 20th International Information Security Conference, Chiba, Japan, May 30-June 1, 2005. [citation][year=2005]5. Ruben Alexandersson, Peter Öhman, “A technique for fault tolerance assessment of COTS”, International Conference on Computer Safety, Reliability and Security (SAFECOMP2005), Fredrikstad, Norway, September 2005. [citation][year=2005]6. J.-C. Ruiz, J. Pardo, J.-C. Campelo, P. Gil, “On-chip Debugging-based Fault Emulation for Robustness Evaluation of Embedded Software Components”, IEEE 11th International Symposium Pacific Rim Dependable Computing (PRDC2005), Changsha, Hunan, China, December 2005. [citation][year=2005]7. Wu Ji, JIA Xiaoxia, Liu Chang, Y Haiyan, Liu Chao, “Finds in Testing Experiments for Model Evaluation”, Tsinghua Science and Technology Journal, Vol.10 No.3 P.298-303, 2005. [citation][year=2005]8. Jonas Myhrman, “Studying Fault Injection in WCDMA Base Station Processors Using Simics Simulator”, tese de mestrado de Jonas Myhrman, Chalmers University of Technology, Gothenburg, Sweden, 2005. [citation][year=2005]9. M. F. Lau, Y. T. Yu, “An extended fault class hierarchy for specification-based testing”, ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 14 , Issue 3 , July 2005. [citation][year=2005]10. J. Pardo, J. C. Ruiz, J.-C. Campelo, P. Gil, "A Non-Intrusive SWIFI Technique for RTOS Robustness Testing" 5th European Dependable Computing Conference, EDCC5, Budapest, Hungary, April 2005. [citation][year=2005]11. D. Coppit, J. M. Haddox-Schatz, “On the Use of Specification-Based Assertions as Test Oracles”, 29th Annual IEEE/NASA Software Engineering Workshop (SEW’05), Greenbelt, MA, USA, April 2005. [citation][year=2004]1. S. Bagchi, Z. Kalbarczyk, R. Iyer, and Y. Levendel. "Design and Evaluation of Preemptive Control Signature (PECOS) Checking", IEEE Transactions on Computers, September 2004. [citation][year=2004]2. Ana – Elena Rugina, “Etalonnage de la sûreté de fonctionnement de systèmes d’exploitation”, Stage de Recherche, Institut National Polytechnique de Toulouse, Ecole Nationale Supérieure d’Electrotechnique, d’Electronique, d’Informatique, d’Hydraulique Et des Télécommunications, 2004. [citation][year=2004]3. M. Hiller, A. Jhumka, N. Suri, “EPIC: Profiling the Propagation and Effect of Data Errors in Software”, IEEE Trans. on Computers, 53(5):512–530, May 2004. [citation][year=2004]4. Marco Serafini, “Una Metodologia per Modellizzare e Valutare la Dependability di Sistemi Safety-Critical”, PhD thesis, Universit a degli Studi di Firenze (University of Florence), Italy, 2004. [citation][year=2004]5. G. Pintér and I. Majzik, “Impact of Statechart Implementation Techniques on the Effectiveness of Fault Detection Mechanisms”, Proceedings of the 30th IEEE EUROMICRO Conference (EUROMICRO’04), Rennes – France, September 1-3, 2004. [citation][year=2004]6. H. R. Zarandi, S. G. Miremadi, S. Hessabi, A. Ejlali, “A Mixed-Mode Simulation-based Environment to Test and Dependability Assessment of HDL Models”, in the Proceedings of International Conference on Embedded Systems and Applications (ESA 2004), USA, June 2004. [citation][year=2004]7. D. Xu, D. Berleant, G. Takle, and Z. Pan, “A better understanding of the effects of software defects in weather simulation”, WRF/MM5 User’s Workshop poster session, Boulder, June 2004. [citation][year=2004]8. Nik Looker, Malcolm Munro, Jie Xu, “Testing Web Services”, The 16th IFIP International Conference on Testing of Communicating Systems, Oxford, UK, March 17-19, 2004. [citation][year=2004]9. Éric Marsden, “Caractérisation de la Sûreté de Fonctionnement de Systèmes à base d’Intergiciel”, PhD Thesis, Laboratoire d’Analyse et d’Architecture des Systèmes du CNRS, Toulouse, France, February 2004. [citation][year=2004]10. Gergely Pinter and Istvan Majzik, “Impact of statechart implementation techniques on the effectiveness of fault detection mechanisms” In Proceedings of the 30th EUROMICRO Conference, IEEE Computer Society Press, 2004. [citation][year=2003]1. Pedro Yeste Pérez, “Contribución a la Validación de la Confiabilidad en los Sistemas Empotrados Tolerantes a Fallos”, tese de doutoramento de Pedro Yeste Pérez, Universidad Politécnica de Valencia, Departamento de Informática de Sistemas Y Computadores, Valencia, Spain, 2003. [citation][year=2003]2. A. Pataricza and G. Pintér “Data Mining in Fault Injection”, In Proc. DDECS 2003. IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems, Poznan, Poland, April, 2003. [citation][year=2003]3. H. R. Zarandi, S. G. Miremadi and A. R. Ejlali, "Fault Injection into Verilog Models for Dependability Evaluation of Digital Systems," in the Proceedings of the International Symposium on Parallel and Distributed Computing (ISPDC 2003), IEEE-CS Press, Slovenia, October 2003. [citation][year=2003]4. Pedro Yuste, Juan-Carlos Ruiz-Garcia, Lenin Lemus, Pedro J. Gil, “Non-intrusive Software-Implemented Fault Injection in Embedded Systems", First Latin-American Symposium on Dependable Computing, LADC 2003, São Paulo, Brazil, October 21-24, 2003. [citation][year=2003]5. Shu Xiao, Lijun Deng, Sheng Li, Xiangrong Wang, “Integrated TCP/IP Protocol Software Testing for Vulnerability Detection”, 2003 International Conference on Computer Networks and Mobile Computing, ICCNMC’03, Shanghai, China, October 20-23, 2003. [citation][year=2003]6. Jean Arlat, Yves Crouzet, Johan Karlsson, Peter Folkesson, Emmerich Fuchs, Günther H. Leber, “Comparison of Physical and Software-Implemented Fault Injection Techniques,” IEEE Transactions on Computers Archive, Volume 52, Issue 9, September de 2003. [citation][year=2003]7. Tahar Jarboui, “Surete de Fonctionnement de Systemes Informatiques – Étalonage et Representativite des Fautes”, PhD Thesis, LAAS-CNRS, Toulouse, France, May 2003. [citation][year=2003]8. Shu Xiao, Sheng Li, Xiangrong Wang, Lijun Deng, “Fault-oriented Software Robustness Assessment for Multicast Protocols”, Second IEEE International Symposium on Network Computing and Applications, Cambridge, Massachusetts, USA, April 16-18, 2003. [citation][year=2003]9. András Pataricza, Gergely Pinter, “Data Mining in Fault Injection”, 6th IEEE International Workshop on Design and Diagnostics of Electronic Circuits and Systems, DDECS-2003, Poznan, Poland, April 14-16, 2003 [citation][year=2003]10. Ravi Iyer, "Design of Reliable Systems and Networks", ECE 442/CS 436, Course Papers, Spring 2003, Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, Urbana, IL, USA, 2003. (http://courses.ece.uiuc.edu/ece442/papers.htm). [citation][year=2002]1. Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, T. Marteau, "Analysis of the Effect of Real and Injected Software Faults: Linux as a Case Study", Pacific Rim International Symposium on Dependable Computing, PRDC2002, Tsukuba, Japan, December 16-18, 2002. [citation][year=2002]2. Eric Marsden, Jean-Charles Fabre, Jean Arlat, “Dependability of CORBA Systems: Service Characterization by Fault Injection”, 21st IEEE Symposium on Reliable Distributed Systems, SRDS02, Osaka University, Suita, Japan, October 13-16, 2002. [citation][year=2002]3. Manuel Rodriguez, “Technologie d’empaquetage pour la surete de fonctionnement des systemes temps-reel”, PhD Thesis, LAAS-CNRS, Toulouse, France, July 2002. [citation][year=2002]4. B. Floering, B. Brothers, Zbigniew Kalbarczyk, Ravishankar K. Iyer, “An Adaptive Architecture for Monitoring and Failure Analysis of High-Speed Networks”, 2002 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]5. Manuel Rodriguez, Arnaud Albinet, Jean Arlat, "MAFALDA-RT, a tool for dependability assessment of real-time systems", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]6. Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun, "Experimental analysis of the errors induced into linux by three fault injection techniques", EEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]7. Eliane Martins, Cecilia Rubira, Nelson Leme, "Jaca: a reflective fault injection tool based on patterns", EEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]8. Jean Arlat, Yves Crouzet, "Faultload representativeness for dependability benchmarking", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]9. Eric Marsden, Jean-Charles Fabre, Jean Arlat, "Characterization approaches for CORBA systems by fault injection", IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2002, Bethesda, Maryland, USA, June 23-26, 2002. [citation][year=2002]10. Jean Arlat, “From Experimental Assessment of Fault-Tolerant Systems to Dependability Benchmarking”, 16th International Parallel and Distributed Processing Symposium, IPDPS 2002, Fort Lauderdale, Florida, USA, April 15-19, 2002. [citation][year=2002]11. Jean Arlat, Jean-Charles Fabre, Manuel Rodriguez, Frédéric Salles, "Dependability of COTS microkernel-based systems", IEEE Transactions on Computers, 51 (2): pp. 138-163, February 2002. [citation][year=2002]12. Jean Arlat, “From Experimental Assessment of Fault-Tolerant Systems to Dependability Benchmarking”, Proceedings of the International Parallel and Distributed Processing Symposium (IPDPS’02), 2002. [citation][year=2002]13. Jean Arlat, "From Fault Injection Experiments to Dependability Benchmarking", Workshop "Challenges and Directions for Dependable Computing, 41st Meeting of IFIP WG 10.4, Saint John, US, January 4-8, 2002. [citation][year=2001]1. Eric Marsden, Jean-Charles Fabre, “Failure Mode Analysis of CORBA Service Implementations”, Middleware 2001: IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, Heidelberg, Germany, November 12-16, 2001. [citation][year=2001]2. Eric Marsden, Jean-Charles Fabre, “Failure analysis of an ORB in presence of faults”, DSoS. IST-1999-11585. Dependable Systems of Systems, DSoS Project (IST-1999-11585), Deliverable IC3, October 2001. [citation][year=2001]3. Maitrayi Sabaratnam, “Improving Dependability in Database Management Systems”, PhD Thesis, University of Trondheim, Trondheim, Norway, November 2001. [citation][year=2001]4. Laurent Réveillère, Gilles Muller, “Improving Driver Robustness: an Evaluation of the Devil Approach”, IEEE/IFIP International Dependable Systems and Networks Conference, DSN 2001, Gothenburg, Sweden, July 1-4, 2001. [citation][year=2001]5. Elisa Nakagawa, José C. Maldonado, "Software-Fault Injection Based on Mutant Operators", IX Brazilian Symposium on Fault-Tolerant Computing, SCTF 2001, Florianópolis, Santa Catarina, Brazil, March 5-7, 2001. [publication]Costa, D. and Rilho, T. and Madeira, H. , "Joint Evaluation of Performance and Robustness of a COTS DBMS Through Fault-Injection", in Dependable Systems and Networks Conference, DSN-2000, 2000 [citation][year=2008]Gabriella Carrozza, "Software Faults Diagnosis in Complex, OTS-Based, Critical Systems?, PhD Thesis, "FEDERICO II? University of Naples, Naples, Italy, November, 2008. [citation][year=2007]Salvatore Orlando, "Software Aging Analysis of Off The Shelf Software Items?, PhD Thesis Salvatore Orlando, "FEDERICO II? University of Naples, Naples, Italy, October, 2007. [citation][year=2005]Denise Eng, Dimitri Mostinski, and Martin Talbot, "Feasibility and Practical Considerations of Database Self-Managing Technologies?, CS848 Final Project, University of Waterloo, Waterloo, ON, Canada, 2005 (http://www.cs.uwaterloo.ca/~m2talbot/project/CS848-FINAL%20PROJECT.pdf) [citation][year=2003]Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen, "Quantifying and Improving the Availability of High-Performance Cluster-Based Internet Services?, In Proceedings of SC-2003, Phoenix, AZ, November, 2003 [citation][year=2003]Regina Moraes, "Strategy for testing of an object oriented database using software fault injection", Supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, Dependable Computing and Communications, DSN-DCC 2003, San Francisco, CA, USA, pp. A-43-A-45, June 22-25, 2003. [citation][year=2003]Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini, Richard P. Martin, Thu D. Nguyen, "Quantifying and Improving the Availability of Cooperative Cluster-Based Internet Service", DCS-TR-517, Technical Report, Rutgers State University, NJ, USA, 2003. [citation][year=2002]Ravishankar K. Iyer, Zbigniew Kalbarczyk, "Hardware and Software Error Detection", Book Chapter (44 pages), used in classes at the Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W. Main Street, Urbana, IL 61801, 2002. [citation][year=2002]Alberto Arazo, "Surete de Fonctionnement de Systemes Logiciels Critiques : Validation Experimentale d"un Systeme de Contrôle-Comande du Commerce?, tese de doutoramento, LAAS-CNRS, Toulouse, França, Julho de 2002. [citation][year=2001]Maitrayi Sabaratnam, "Improving Dependability in Database Management Systems?, tese de doutoramento de Maitrayi Sabaratnam, Novembro de 2001, Universidade de Trondheim, Trondheim, Noruega. [citation][year=2000]Subhachandra Chandra "An Evaluation of the Recovery-Related Properties of Software Faults" PhD Thesis, University of Michigan, USA, 2000. [citation][year=2000]P. Chevochot and I. Puaut. Experimental evaluation of the fail-silent behavior of a distributed real-time run-time support built from COTS components. Technical Report 1370, IRISA, Oct. 2000 [publication]Rilho, T. and Costa, D. and Marco Vieira and Madeira, H. , "Run-time Software Implemented Fault-Injection (RTSWIFI): an Approach to Emulate Software Faults in COTS (Fast Abstract)", in Dependable Systems and Networks Conference, DSN-2000, 2000 [publication]Jorge Bernardino and Madeira, H. , "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing", in 12th Conference on Advanced Information Systems Engineering, 2000 [citation][year=2013]1 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Distributed Spatial Data Warehouse Indexed with Virtual Memory Aggregation Tree. http://www.engr.sjsu.edu/fayad/current.courses/cmpe226-fall07/docs/lecture8/STDBM04-ProceedingsL08fn.pdf#page=30 M Gorawski, R Malczok STDBM 2004 engr.sjsu.edu 2 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Materialized aR-tree in distributed spatial data warehouse http://iospress.metapress.com/index/0XPB4Q8LEFTN7E4W.pdf M Gorawski, R Malczok Intelligent Data Analysis 2006 IOS Press 3 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Accelerating foreign-key joins using asymmetric memory channels http://planet-data.eu/sites/default/files/publications/CWI_ADMS2011.pdf H Pirk, S Manegold, M Kersten VLDB-Workshop on Accelerating … 2011 planet-data.eu 4 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Architecture of Parallel Spatial Data Warehouse: Balancing Algorithm and Resumption of Data Extraction http://books.google.com/books?hl=en&lr;=&id=sArznQV2GcIC&oi=fnd&pg=PA49&ots=Vv5CL0QQ1O&sig=V1h7OLGwANsdzi167-vyOrRyCys K Zieliriski, T Szmuc Software Engineering: Evolution And … 2005 books.google.com 5 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Strategic Alignment in Data Warehouses Two Case Studies http://researchbank.rmit.edu.au/view/rmit:6307 N Bhansali Publication/NA 2007 researchbank.rmit.edu.au 6 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Distributed spatial data warehouse http://link.springer.com/chapter/10.1007/978-3-540-24669-5_88 M Gorawski, R Malczok Parallel Processing and Applied Mathematics 2004 Springer 7 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Spatial Telemetric Data Warehouse Balancing Algorithm in Oracle9i/Java Environment http://link.springer.com/chapter/10.1007/3-540-32392-9_37 M Gorawski, R Chechelski Intelligent Information Processing and Web … 2005 Springer 8 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Strategic data warehousing: achieving alignment with business http://books.google.com/books?hl=en&lr;=&id=7dp-XRmkD1UC&oi=fnd&pg=PP1&ots=C0RztH3U1z&sig=eEvVSYigAyPFI27WjJpxWUWbQzg N Bhansali Publication/NA 2009 books.google.com 9 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Parallel telemetric data warehouse balancing algorithm http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1578816 M Gorawski, R Chechelski Intelligent Systems Design and … 2005 ieeexplore.ieee.org 10 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Updating aggregation tree in distributed spatial telemetric data warehouse http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=1386076 M Gorawski, R Malczok Parallel, Distributed and Network- … 2005 ieeexplore.ieee.org 11 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Selection of structures with grid optimization, in multiagent data warehouse http://link.springer.com/chapter/10.1007/978-3-642-15381-5_36 M Gorawski, S Ba?kowski, M Gorawski Intelligent Data Engineering and … 2010 Springer 12 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Systemy rozproszone http://zti.polsl.pl/zbdihd/ZBDiHD - Systemy rozproszone.pdf M Gorawski, R Malczok Laboratorium hurtowni danych, Gliwice 2004 zti.polsl.pl 13 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 ????????? OLAP ?? http://d.wanfangdata.com.cn/periodical_hkjmzzjs200302005.aspx ??? ??? ???????? 2003 ???????? 14 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Data warehouse access using multi-agent system http://link.springer.com/article/10.1007/s10619-009-7036-9 N Kolsi, A Abdellatif, K Ghedira Distributed and Parallel Databases 2009 Springer 15 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Version-Manager: For vital simulating advantages in data warehouse http://cis.uws.ac.uk/research/journal/V11n2/VersionManager.doc MK Shahzad COMPUTING AND INFORMATION SYSTEMS 2007 cis.uws.ac.uk 16 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Multi agent systems in distributed datawarehousing http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5640491 TP Latchoumi, R Sunitha Computer and Communication … 2010 ieeexplore.ieee.org 17 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Architecture for virtualization in data warehouse http://link.springer.com/chapter/10.1007/978-1-4020-6268-1_44 JA Nasir, MK Shahzad … and advanced techniques in computer and … 2007 Springer 18 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries http://www.proceedings2006.imcsit.org/pliks/122.pdf M Gorawski, E P?uciennik Proceedings of the … 2006 proceedings2006.imcsit.org 19 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Online balancing of ar-tree indexed distributed spatial data warehouse http://link.springer.com/chapter/10.1007/11752578_57 M Gorawski, R Chechelski Parallel Processing and Applied Mathematics 2006 Springer 20 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Cloud Computing: Data-intensive Computing and Scheduling http://books.google.com/books?hl=en&lr;=&id=06c4jn6kV7AC&oi=fnd&pg=PP1&ots=LhXdt-_YMi&sig=unyAUdGSgF5xmWWLDbUW2fPwoIA F Magoulès, J Pan, F Teng Publication/NA 2012 books.google.com 21 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 AGENT BASED DATA STORAGE AND DISTRIBUTION IN DATA WAREHOUSES http://www.worldscientific.com/doi/abs/10.1142/S0218194008003842 N Kolsi, A Abdellatif, K Ghedira International Journal of Software … 2008 World Scientific 22 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Version Manager: A step towards Synthetic-Warehouse-Builder extension http://link.springer.com/chapter/10.1007/978-1-4020-6268-1_52 MK Shahzad Innovations and advanced techniques in computer and … 2007 Springer 23 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Pembangunan Aplikasi Pelaporan Perijinan dengan Online Analytical Processing (OLAP)(Development of License Report Application with Online Analytical … http://jurnal.ump.ac.id/index.php/juita/article/view/92 DK Hakim JUITA 2011 jurnal.ump.ac.id 24 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 ?? Tree-lib ?????????? http://d.wanfangdata.com.cn/periodical_jsjkx201306041.aspx ???? ?? ????? 2013 ???????? 25 "Data Warehousing and OLAP: Improving Query Performance Using Distributed Computing [citation][year=2013]" 2517340332268281606 Analityczne rozszerzenia SQL w rozproszonej, homogenicznej strukturze danych http://www.cs.put.poznan.pl/kkntpd/tpd_pliki/publikacja/pub/45.pdf M Gorawski, E P?uciennik Publication/NA Year/NA cs.put.poznan.pl [citation][year=2009]Nader Kolsi, Abdelaziz Abdellatif, and Khaled Ghedira, "Data warehouse access using multi-agent system?, Journal of Distributed and Parallel Databases, Volume 25, Numbers 1-2 / April, 2009 [citation][year=2006]Marcin Gorawski, Ewa Płuciennik, "Spatial Telemetric Data Warehouse and Software Agents as Environment to Distributed Execute SQL Queries?, proceedings of the International Multiconference on Computer Science and Information Technology, pp. 243 " 252, 2006 [citation][year=2006]Marcin Gorawski, Ewa Płuciennik, "Materialized aR-Tree in Distributed Spatial Data Warehouse?, Intelligent Data Analysis Journal, Volume 10, Number 4, 2006. [citation][year=2006]M Gorawski, R Chechelski, "Online Balancing of aR-Tree Indexed Distributed Spatial Data Warehouse?, - Lecture Notes in Computer Science, 2006 " Springer, Parallel Processing and Applied Mathematics, Volume 3911, 2006. [citation][year=2005]Marcin Gorawski and Rafal Malczok, "Updating Aggregation Tree in Distributed Spatial Telemetric DataWarehouse", Proceedings of the IEEE 13th Euromicro Conference on Parallel, Distributed and Network-Based Processing (Euromicro-PDP"05), 2005. [citation][year=2005]Marcin Gorawski and Rafal Malczok, "Parallel Telemetric Data Warehouse Balancing Algorithm?, Proceedings. 5th International Conference on Intelligent Systems Design and Applications, ISDA '05, 2005 [citation][year=2004]Marcin Gorawski and Rafal Malczok, "Distributed Spatial Data Warehouse Indexed with Virtual Memory Aggregation Tree?, Proceedings of the Second Workshop on Spatio-Temporal Database Management (STDBM"04), Toronto, Canada, August 30th, 2004. [citation][year=2003]Marcin Gorawski and Rafal Malczok, "Distributed Spatial Data Warehouse", Parallel Processing and Applied Mathematics: 5th International Conference, PPAM 2003, Lecture Notes in Computer Science, Springer-Verlag Czestochowa, Poland, September 7-10, 2003 1999(2 publications) [publication]Koopman, P. and Madeira, H. , "Dependability Benchmarking & Prediction: A Grand Challenge Technology Problem", in 1st IEEE International Workshop on Real-Time Mission-Critical Systems: Grand Challenge Problems, 1999 [citation][year=2006]S Tixeuil, LM Silva, W Hoarau, "An Overview of Existing Tools for Fault-Injection and Dependability Benchmarking in Grids?, Second CoreGRID Workshop on Grid and Peer to Peer Systems, 2006 [citation][year=2005]G Schweitzer, "Safety and Reliability Aspects for Active Magnetic Bearing Applications - A Survey?, Proceedings of the Institution of Mechanical Engineers, Part I: Journal of Systems and Control Engineering, Professional Engineering Publishing, ISSN 0959-651, Volume 219, Number 6, 2005. [citation][year=2002]F. E. Bustamante, C. Poellabauer, and K. Schwan. Aims: Robustness through sensible introspection. In Proc. of the Tenth ACM SIGOPS European Workshop, Saint-Emilion, France, September 2002 [publication]Costa, D. and Madeira, H. , "Experimental Assessment of COTS DBMS Rubustness Under Transient Faults", in PRDC 99, 1999 [citation][year=2005]Denise Eng, Dimitri Mostinski, and Martin Talbot, "Feasibility and Practical Considerations of Database Self-Managing Technologies?, CS848 Final Project, University of Waterloo, Waterloo, ON, Canada, 2005 (http://www.cs.uwaterloo.ca/~m2talbot/project/CS848-FINAL%20PROJECT.pdf) [citation][year=2003]Regina Lucia de Oliveira Moraes, Eliane Martins, "A Strategy for Validating an ODBMS Component using a High-Level Software Fault Injection Tool?, LADC 2003, First Latin-American Symposium on Dependable Computing, São Paulo, Brazil, October 2003 1998(2 publications) [publication]Silva, J.G. and Prata, P. and Mario Zenha-Rela and Madeira, H. , "Practical Issues in the Use of ABFT and a new Failure Model", in FTCS - 28, 1998 [citation][year=2009]Robert Granat, Kiri L. Wagstaff, Benjamin Bornstein, Benyang Tang, and Michael Turmon. Simulating and Detecting Radiation-Induced Errors for Onboard Machine Learning. Proceedings of the Third IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT), 19 a 23 de July, Pasadena, CA, EUA, 2009 [citation][year=2008]Daniel Skarin, Johan Karlsson, "Software Implemented Detection and Recovery of Soft Errors in a Brake-by-Wire System?, Seventh European Dependable Computing Conference, EDCC 2008, Kaunas, Lituánia, 07 a 09 de Maio de 2008 [citation][year=2005]Sumant Kowshik, Girish Baliga, Scott Graham, Lui Sha, "Co-design Based Approach to Improve Robustness in Networked Control Systems?, IEEE/IFIP International Conference on Dependable Systems and Networks, Performance and Dependability Symposium, DSN-PDS 2005, Yokohama, Japão, 28 de Junho a 1 de Julho de 2005. [citation][year=2005]Jonny Vinter, Olaf Hannius, Torbjorn Norlander, Peter Folkesson, Johan Karlsson, ?Experimental Dependability Evaluation of a Fail-Bounded Jet Engine Control Syste,m for Unmanned Aerial Vehicles", IEEE/IFIP International Conference on Dependable Systems and Networks, Performance and Dependability Symposium, DSN-PDS 2005, Yokohama, Japão, 28 de Junho a 1 de Julho de 2005. [citation][year=2005]Jonny Vinter, "On the Effects of Soft Errors in Embedded Control Systems?, PhD Thesis, Department of Computer Science and Engineering, Chalmers University of Technology, Göteborg, Sweden, 2005, ISBN 91-7291-630-3 [citation][year=2004]Christoforos N. Hadjicostis, "Coding Techniques for Fault-Tolerant Parallel Prefix Computations in Abelian Groups?, The Computer Journal, 47(3):329-341, © The British Computer Society, 2004 [citation][year=2003]J. Z. Lou, "Tests and Tolerances for High-Performance Software-Implemented Fault Detection?, IEEE Transactions on Computers 0018-9340/03, © 2003 IEEE Published by the IEEE Computer Society Vol. 52, No. 5; MAY 2003, pp. 579-591. (Science Citation Index Expanded) [citation][year=2003]M. Turmon, R. Granat, D. S. Katz, J. Z. Lou, "Tests and Tolerances for High-Performance Software-Implemented Fault Detection,? IEEE Trans. Computers, 2003. Volume 52, Issue 5, May 2003 Page(s):579 - 591 (Science Citation Index Expanded) [citation][year=2003]ÿrjan Askerdal, "On Impact and Tolerance of Data Errors with Varied Duration in Microprocessors", tese de doutoramento, Chalmers University of Technology, Gotemburgo, Suécia, ISBN 91-7291-285-5, 2003. [citation][year=2003]Jonny Vinter, A. Johansson, P. Folkesson, and J. Karlsson, "On the design of robust integrators for fail-bounded control systems", IEEE/IFIP International Conference on Dependable Systems and Networks, Dependable Computing and Communications, DSN-DCC 2003, San Francisco, CA, USA, pp. 415-424, 22 a 25 de Junho de 2003 [citation][year=2002]1. J. Norberg, T. Ersson, J. Vinter, M. Torngren, P. Folkesson, J. Karlsson, "A co-design approach for error handling in computer control systems", supplemental volume of the IEEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. B-22-B23, June 23-26, 2002. [publication]Furtado, P. and Madeira, H. , "Summary Grids: Building Accurate Multidimensional Histograms", in Dasfaa 1998, 1998 [citation][year=2004]The History of Histograms (abridged) YE Ioannidis - VLDB, 2003 - cs.uml.edu 1996(2 publications) [publication]Mario Zenha-Rela and Madeira, H. and Silva, J.G. , "Experimental Evaluation of the Fail-Silent Behaviour in Programs with Consistency Checks", in 26th Symposium on Fault Tolerant Computer Systems (FTCS-26), 1996 [citation][year=2007]Karthik Pattabiraman, "Automated Derivation of Application-aware Error and Attack Detectors?, PhD Preliminary Examination Report, Department of Computer Science, University of Illinois (Urbana-Champaign), USA, January, 2007 [citation][year=2007]A. Garg, "Soft error fault tolerant systems: cs456 survey," http://www.ece.rochester.edu/~garg/documents/garg.cs456survey05.pdf [citation][year=2007]AG Jorgensen, G Moruz, T Molhave, "Priority Queues Resilient to Memory Faults?, volume 4619/2007, Book Algorithms and Data Structures, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2007 [citation][year=2007]Mattan Erez, "MERRIMAC " High-Performance and Highly-Efficient Scientific Computing With Streams?, PhD thesis, Stanford University, May 2007 [citation][year=2007]Gerth Stølting Brodal, Rolf Fagerberg, Irene Finocchi, Fabrizio Grandoni, Giuseppe F. Italiano, Allan Grønlund Jørgensen, Gabriel Moruz, and Thomas Mølhave, "Optimal Resilient Dynamic Dictionaries?, volume 4698/2007, Book Algorithms " ESA 2007, Lecture Notes in Computer Science, Springer Berlin / Heidelberg, 2007 [citation][year=2006]Roshan G. Ragel, "Architectural Support for Security and Reliability in Embedded Processors?, PhD thesis, The University of New South Wales, Austrália, 2006 [citation][year=2006]Meine J. P. van der Meulen and Miguel A. Revilla. Experiences with the design of a run-time check. In Janusz G´orski, editor, Computer Safety, Reliability, and Security. 25th International Conference, SAFECOMP 2006. Proceedings, pages 302"315, Gdansk, September 2006. Springer [citation][year=2006]Goutam Kumar Saha, "Software based fault tolerant computing?, ACM Journal of Ubiquity, volume 6, no. 40, 2006. [citation][year=2006]Pattabiraman, K.; Saggese, G.P.; Chen, D.; Kalbarczyk, Z.; Iyer, R.K., "Dynamic Derivation of Application-Specific Error Detectors and their Implementation in Hardware," Dependable Computing Conference, 2006. EDCC '06. Sixth European , vol., no., pp.97-108, 18-20 Oct. 2006 [citation][year=2006]Goutam Kumar Saha, "Application Semantic Driven Assertions toward Fault Tolerant Computing?, ACM Ubiquity, 7(22), June 2006, ACM Press, USA [citation][year=2006]Goutam Kumar Saha, "Software based fault tolerance: a survey?, ACM Ubiquity, 7(25), 2006, ACM Press, USA. [citation][year=2005]M.J.P. van der Meulen, L. Strigini, and M. Revilla. On the effectiveness of runtime checks. In B.A. Gran and R. Winter, editors, Computer Safety, Reliability and Security, Proceedings of the 23nd international conference, Safecomp 2005, pages 151"64, Fredrikstad, Norway, September 2005 [citation][year=2005]Goutam Kumar Saha, "Transient Fault Tolerance in Mobile Agent Based Computing,? INFOCOMP Journal of Computer Science, Vol. 4, no.4, UFLA, Brazil, 2005, pp. 1-11 [citation][year=2005]Armengaud, E.; Rothensteiner, F.; Steininger, A.; Pallierer, R.; Horauer, M.; Zauner, M., "A structured approach for the systematic test of embedded automotive communication systems," Test Conference, 2005. Proceedings. ITC 2005. IEEE International , vol., no., pp.8 pp.-8, 8-8 Nov. 2005 [citation][year=2005]Goutam Kumar Saha, "Software based fault tolerant computing?, ACM Journal of Ubiquity, volume 6, no. 40, 2006 [citation][year=2005]Mattan Erez, Nuwan Jayasena, Timothy J. Knight, William J. Dally, "Fault Tolerance Techniques for the Merrimac Streaming Supercomputer?, Proceedings of the 2005 ACM/IEEE conference on Supercomputing SC '05, November 2005. [citation][year=2005]F. Li, G. Chen, M. Kandemir, I. Kolcu, "Improving scratch-pad memory reliability through compiler-guided data block duplication?, Proceedings of the 2005 IEEE/ACM International conference on Computer-aided design ICCAD '05, May 2005. [citation][year=2005]Sri Hari Krishna N, Seung Woo Son, Mahmut Kandemir, Feihui Li, "Using loop invariants to fight soft errors in data caches?, Proceedings of the 2005 conference on Asia South Pacific design automation ASP-DAC '05, January 2005. [citation][year=2003]1. Rajesh Venkatasubramanian; Hayes, J.P.; Murray, B.T.; "Low-cost on-line fault detection using control flow assertions" On-Line Testing Symposium, 2003. IOLTS 2003. 9th IEEE , 7-9 July 2003, Pages:137 - 143. [citation][year=2003]2. Ã?rjan Askerdal "On Impact and Tolerance of Data Errors with Varied Duration in Microprocessors" PhD Thesis, Departament of Computer Engineering, Chalmers University of Technology, Sweden, 2003, ISBN 91-7291-285-5. [citation][year=2003]3. J. Sellberg, "Saekerhetskrav och Feltolerans", Master's Thesis, Department of Information Technology, Computing Science division, Uppsala University, Sweden, April 2003 [citation][year=2003]4. A. Benso, S. Di Carlo, G. Di Natale, P. Prinetto, L. Tagliaferri, "Data Criticality Estimation In Software Applicationsâ?, IEEE ITC International Test Conference, 2003. [citation][year=2001]1. Pascal Chevochot, Isabelle Puaut "Experimental evaluation of the fail-silent behavior of a distributed real-time run-time support built from COTS components" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 304-313. [citation][year=2001]2. Wee Teck Ng and Peter M. Chen "The Design and Verification of the Rio File Cache" IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 4, APRIL 2001. [citation][year=2000]1. P. Chevochot and I. Puaut. Experimental evaluation of the fail-silent behavior of a distributed real-time run-time support built from COTS components. Technical Report 1370, IRISA, Oct. 2000 [citation][year=2000]2. Maurizio Rebaudengo, Matteo Sonza Reorda, Marco Torchiano, Massimo Violante, "An Experimental Evaluation of the Effectiveness of Automatic Rule-Based Transformations for Safety-Critical Applications", IEEE International Symposium on Defect and Fault Tolerance in VLSI Systems (DFT'00), Yamanashi, Japan, October 25 - 27, 2000 [citation][year=2000]3. Steininger A "Testing and built-in self-test - A survey" J SYST ARCHITECT 46 (9): 721-747 JUL 2000 [citation][year=2000]4. A. Benso, S. Chiusano, P.Prinetto, L. Tagliaferri "A C/C++ Source-to-Source Compiler for Dependable Applications" Proc. of DSN-2000 - The International Conference on Dependable Systems and Networks (FTCS-30, DCCA-8), 25-28 June 2000, New York, USA, IEEE Computer Society Press, ISBN 0-7695-0707-7, pp. 71-78. [citation][year=2000]5. M Rebaudengo, MS Reorda, "Evaluating cost and effectiveness of software redundancy techniques for hardware errors detection", International On-Line Test Workshop (IOLTW2000), Mallorca, 2000 [citation][year=1999]1. Wee Teck Ng e Peter Chen, "The Systematic Improvement of Fault Tolerance in the Rio File Cacheâ?, Proceedings of the 29th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-29, 15 a 18 de Junho de 1999, Madison, Wisconsin, EUA, IEEE Computer Society Press, pp 76-83, ISBN 0-7695-0213-X; [citation][year=1999]2. Seungjae Han, Kang G. Shin "Experimental Evaluation of Behavior-Based Failure-Detection Schemes in Real-Time Communication Networks" IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol. 10, No. 6; JUNE 1999, pp. 613-626 [citation][year=1999]3. M.Rebaudengo, M.Sonza Reorda, M.Torchiano, M.Violante, "Soft-error detection through software fault-tolerance techniques" in Proc. of 1999 IEEE Int. Symp. on Defect and Fault Tolerance in VLSI Systems (DFT'99), Albuquerque, USA, November 1-3, 1999. [citation][year=1999]4. Wee Teck Ng, "Design and Implementation of Reliable Main Memoryâ?, tese de doutoramento, University of Michigan, USA, 1999. [citation][year=1998]David Thomas Stott "Software-Implemented Fault Injection ForDependability Analysis Of High-Speed Computer Networks", MSc Thesis, Univ. Illinois Urbana-Champaign, 1998. [citation][year=1998]D. T. Stott, G. Ries, M-C. Hsueh, R. K. Iyer "Dependability Analysis of a High-Speed Network Using Software-Implemented Fault Injection and Simulated Fault Injection" IEEE Transactions on Computers, January 1998, Vol. 47, No. 1, pp. 108-119. [citation][year=1998]Christopher Temple "Avoiding the Babbling-Idiot Failure in a Time-Triggered Communication System" Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp 218-227, ISBN 0-8186-8470-4. [citation][year=1998]M. Rebaudengo, M. Sonza Reorda "Evaluating cost and effectiveness of software redundancy techniques for hardware error detection" Digest of Fast Abstracts of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp. 88-89, ISBN 0-8186-8588-3. [citation][year=1997]D. T. Stott, M-C Hsueh, G. L. Ries, R. K. Iyer "Dependability Analysis of a Commercial High-Speed Network" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp. 248-257, ISBN 0-8186-7831-3. [citation][year=1997]A.Steininger, C. Scherrer "On Finding an Optimal Combination of Error Detection Mechanisms Based on Results of Fault Injection Experiments" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 238-247, ISBN 0-8186-7831-3. [citation][year=1997]S. Han, K. G. Shin "Experimental Evaluation of Failure Detection Schemes in Real-Time Communication Networks" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 122-131, ISBN 0-8186-7831-3. [citation][year=1997]Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1997]John Chapin, "Hive: Operating System Fault Containment For Shared-Memory Multiprocessors?, Ph.D Thesis, Technical Report No. CSL-TR-97-712, Computer Systems Laboratory, Dept. of Electrical Engineering and Computer Science, Stanford University, Janeiro de 1997; [citation][year=1997]M. Dal Cin, W. Hohl e V. Sieh, "Hardware-Supported Fault Tolerance for Multiprocessors?, Proceedings of the 14. ITG/GI-Fachtagung Architektur von Rechensystemen, Rostock, Alemanha, VDE-Verlag, Setembro de 1997, pp 13-22. [publication]Silva, J.G. and Carreira, J. and Madeira, H. and Costa, D. and Moreira, F. , "Experimental Assessment of Parallel Systems", in Twenty-Six Annual International Symposium on Fault-Tolerant Computing (FTCS-26), 1996 [citation][year=2004]1. Charng-da Lu, Daniel A. Reed, "Assessing Fault Sensitivity in MPI Applicationsâ?, Proceedings of the ACM/IEEE SC2004 Conference (SC'04), Pittsburgh, PA, USA, 2004. [citation][year=2004]2. Gong Su, "MOVE: Mobility with Persistent Network Connectionsâ?, tese de doutoramento, Columbia University, USA, 2004. [citation][year=2004]3. Charng-da Lu; Reed, D.A., "Assessing Fault Sensitivity in MPI Applicationsâ?, Proceedings of the ACM/IEEE SC2004 Supercomputing Conference, (High Performance Computing, Networking and Storage Conference) 2004 Page(s):37 " 37. [citation][year=2003]1. Constantinescu C., "Experimental evaluation of error-detection mechanisms", IEEE Transactions on Reliability, 52 (1): pp. 53-57 March 2003. [citation][year=2003]2. A. Benso, S. Di Carlo, G. Di Natale, P. Prinetto, L. Tagliaferri, "Data Criticality Estimation In Software Applications?, IEEE ITC International Test Conference, 2003. [citation][year=2001]1. Wee Teck Ng and Peter M. Chen "The Design and Verification of the Rio File Cache" IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 4, APRIL 2001. [citation][year=2000]1. Cristian Constantinescu, "Teraflops supercomputer: Architecture and validation of the fault tolerance mechanisms?, IEEE Transactions on Computers, vol. 49, no. 9, Setembro de 2000, pp. 886-894. [citation][year=2000]2. A. Benso, S. Chiusano, P.Prinetto, L. Tagliaferri "A C/C++ Source-to-Source Compiler for Dependable Applications" Proc. of DSN-2000 - The International Conference on Dependable Systems and Networks (FTCS-30, DCCA-8), 25-28 June 2000, New York, USA, IEEE Computer Society Press, ISBN 0-7695-0707-7, pp. 71-78. [citation][year=1999]1. Constantinescu, C.; "Using physical and simulated fault injection to evaluate error detection mechanisms" Pacific Rim International Symposium on Dependable Computing, Proceedings. 1999 , 16-17 Dec. 1999, Pages:186 - 192, IEEE Computer Society. [citation][year=1999]2. Seungjae Han, Kang G. Shin "Experimental Evaluation of Behavior-Based Failure-Detection Schemes in Real-Time Communication Networks" IEEE Transactions On Parallel And Distributed Systems, Vol. 10, No. 6; JUNE 1999, pp. 613-626, ISSN 1045-9219. [citation][year=1999]3. Lettner R, Prammer M, Scherrer C, Steininger A, "Assessment of computer fault tolerance - a fault-injection toolset and the rationale behind it?, Computer Standards & Interfaces, Elsevier Science BV, Amsterdam, vol. 21, no. 4, Setembro 1999, pp. 357-369, ISSN: 0920-5489. [citation][year=1999]4. Wee Teck Ng e Peter Chen, "The Systematic Improvement of Fault Tolerance in the Rio File Cache?, Proceedings of the 29th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-29, 15 a 18 de Junho de 1999, Madison, Wisconsin, EUA, IEEE Computer Society Press, pp 76-83, ISBN 0-7695-0213-X; [citation][year=1999]5. Cristian Constantinescu, "Assesssing Error Detection Coverage by Simulated Fault Injection?, Third European Dependable Computing Conference, EDCC-3, Praga, República Checa, Setembro de 1999, Lecture Notes in Computer Science 1667, Spriger-Verlag, pp. 161-170. [citation][year=1999]6. Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza Reorda "Fault Injection for Embedded Microprocessor-based Systems", Journal of Universal Computer Science, Volume 5 / Issue 10, October 1999, Springer, pp. 693-711. [citation][year=1999]7. Wee Teck Ng, "Design and Implementation of Reliable Main Memory?, tese de doutoramento, University of Michigan, USA, 1999. [citation][year=1998]1. A. Benso, P. Prinetto, M. Rebaudengo and M. Sonza Reorda "EXFI: a low-cost fault injection system for embedded microprocessor-based boards" ACM Transactions on Design Automation of Electronic Systems, Volume 3 , Issue 4 (1998) pp 626-634. [citation][year=1998]2.M. Kaaniche, L. Romano, Z. Kalbarczyk, R.K. Iyer and R. Karcich, "A Hierarchical Approach for Dependability Analysis of a Commercial Cached RAID Storage Architecture?, Center for Reliable and High-Performance Computing, University of Illinois at Urbana-Champaign, Technical Report UILU-ENG-98-2205. ARPA, Fevereiro 1998. [citation][year=1998]3. N. Neves and W. K. Fuchs, "Coordinated Checkpointing without Direct Coordination," Proceedings of IEEE International Computer Performance & Dependability Symposium, pp. 23--31, Sept. 1998. [citation][year=1998]4. Cristian Constantinescu "Validation of the Fault/Error Handling Mechanisms of the Teraflop Computer" Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp 382-389, ISBN 0-8186-8470-4. [citation][year=1998]5. M. Kaaniche, L. Romano, Z. Kalbarczyk, R. Iyer, R. Karcich " A Hierarchical Approach for Dependability Analysis of a Comercial Cache-Based RAID Storage Architecture" Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp 6-15, ISBN 0-8186-8470-4. [citation][year=1997]1. Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1997]2. D. T. Stott, M-C Hsueh, G. L. Ries, R. K. Iyer "Dependability Analysis of a Commercial High-Speed Network" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 248-257, ISBN 0-8186-7831-3. [citation][year=1997]3. D. Blough, T. Torii "Fault-Injection-Based Testing of Fault-Tolerant Algorithms in Message Passing Parallel Computers" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp. 258-267, ISBN 0-8186-7831-3. [citation][year=1997]4. A. Steininger, C. Scherrer "On Finding an Optimal Combination of Error Detection Mechanisms Based on Results of Fault Injection Experiments" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 238-247, ISBN 0-8186-7831-3. [citation][year=1997]5. Uwe Wildner "Experimental Evaluation of Assigned Signature Checking With Return Address Hashing on Different Platforms" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 3-18. [citation][year=1997]6. N. Neves e W. Kent Fuchs, "Fault detection using hints from the socket layer", Proceedings of the IEEE Symposium on Reliable Distributed Systems, Outubro de 1997, pp. 64-71; [citation][year=1997]7. John Chapin, "Hive: Operating System Fault Containment For Shared-Memory Multiprocessors?, Tese de Doutoramento, Technical Report No. CSL-TR-97-712, Computer Systems Laboratory, Dept. of Electrical Engineering and Computer Science, Stanford University, Janeiro de 1997; [citation][year=1996]1. N. Neves e W. K. Fuchs, "Using time to improve the performance of coordinated checkpointing", Proceedings of the International Computer Performance & Dependability Symposium, Setembro de 1996, pp. 282-291; [citation][year=1996]2. David Powell Michel Cukier Jean Arlat e Yves Crouzet, "Estimation of Time-Dependent Coverage?, LAAS-CNRS, 7 avenue du Colonel Roche - 31077 TOULOUSE Cedex 4, France - Research Report 96466 " 4 de Dezembro de 1996; 1995(4 publications) [publication]Costa, D. and Moreira, F. and Madeira, H. and Mario Zenha-Rela and Silva, J.G. , "Experimental Evaluation of the Impact of Processor Faults on Parallel Applications", in 14th IEEE Symposium on Reliable Distributed Systems (SRDS-14), 1995 [citation][year=2004]1. Hadjicostis CN "Coding techniques for fault-tolerant parallel prefix computations in Abelian groups" Computer Journal, 47 (3): 329-341 May 2004. [citation][year=1997]A. Bondavalli, F. Di Giandomenico and I. Mura "Value-Driven Resource Assignment in Object-Oriented Real-Time Dependable Systems," in Proc. WORDS 97, Third International Workshop on Object-oriented Real-time Dependable Systems, Newport Beach, California, USA, IEEE Computer Society Press, 1997, pp. 92-99. [citation][year=1997]Uwe Wildner "Experimental Evaluation of Assigned Signature Checking With Return Address Hashing on Different Platforms" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 3-18. [citation][year=1997]A. Bondavalli, F. Di Giandomenico and I. Mura "A Value-Based Approach to Flexible Decision Making in Real-Time Dependable Systems," in Proc. 2nd Int. Workshop on Mechatronical Computer Systems, Pisa, Italy, 1997, pp. 155-163. [citation][year=1997]Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1996]Geert Deconninck, "User-Triggered Checkpointing And Rollback In Massively Parallel Systems", PhD. Thesis, Katholieke Universiteit Leuven, Bélgica, December 1996. [citation][year=1996]I. Mura, F. Di Giandomenico, A. Bondavalli "Real-Time Multiprocessor Systems: Performability Evaluation," IEI-CNR, Pisa, Italy, Internal Report (B4-07-02-96), 1996. [publication]Madeira, H. and Carreira, J. and Silva, J.G. , "Injection of Faults in Complex Computers", in Workshop on Evaluation Techniques for Dependable Systems, 1995 [citation][year=2004]1. William Hoarau, "FAIL - FAult Injection Language?, Rapport de stage pour le DEA ID, Laboratoire de Recherche en Informatique, Université de Paris-Sud, 2004. [citation][year=1999]1. R. J. Martínez, P. J. Gil, G. Martín, C. Pérez, J.J. Serrano. "Experimental Validation of High-Speed Fault-Tolerant Systems Using Physical Fault Injection". Dependable Computing and Fault Tolerant Systems. Volume 12.A. Avizienis, H. Kopetz, J.C. Laprie Eds. IEEE Computer Society. ISBN 0-7695-0284-9, pp. Pág 249-264, 1999. [publication]Carreira, J. and Madeira, H. and Silva, J.G. , "Xception: Software Fault Injection and Monitoring in Processor Functional Units", in Fifth IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-5), 1995 [citation][year=2008]Mohamed Khalgui, Emanuele Carpanzano, Hans-Michael Hanisch, "An optimised simulation of component-based embedded systems in manufacturing industry?, International Journal of Simulation and Process Modelling, Volume 4, Number 2 / 2008 [citation][year=2008]K Keeton, A Merchant, J Wilkes, "System and method for interposition-based selective simulation of faults for access requests to a data storage system?, US Patent 7,467,333, 2008. [citation][year=2008]A. Bondavalli, A. Ceccarelli, L. Falai, and M. Vadursi. Enhancing the nekostat tool with uncertainty, resolution and intrusiveness evaluation capabilities. In DSN 2008 Workshop on Resilience Assessment and Dependability Benchmarking, June 2008. [citation][year=2008]A. Ejlali, S.G. Miremadi, "Error propagation analysis using FPGA-based SEU-fault injection?, Microelectronics Reliability, 48 (2008), Elsevier, 319"328, 2008 [citation][year=2008]Alexander Gordeyev, Vyacheslav Kharchenko, Anton Andrashov, Boris Konorev, Vladimir Sklyar, and Artem Boyarchuk, "Case-based software reliability assessmentby fault injection unified procedures?, SEESE '08: ACM Proceedings of the 2008 international workshop on Software Engineering in east and south Europe, Leipzig, Germany, 2008 [citation][year=2007]Manuel Mendonça, Nuno Ferreira Neves, Localização de Vulnerabilidades de Segurança em Gestores de Dispositivos Wi-Fi com Técnicas de Fuzzing, Actas da 3ª Conferência Nacional Sobre Segurança Informática nas Organizações (SINO07), Lisboa, Portugal, October, 2007. [citation][year=2007]Damian Nowroth, "Untersuchungen von akzeptablen Fehlern in einem JPEG-Kompressor?, Diplomarbeit, Albert-Ludwigs-Universit¨at Freiburg, Institut f¨ur Informatik, 18. Oktober 2007 [citation][year=2007]Murciano, M.; Violante, M., "Validating the dependability of embedded systems through fault injection by means of loadable kernel modules," High Level Design Validation and Test Workshop, 2007. HLVDT 2007. IEEE International , vol., no., pp.179-186, 7-9 Nov. 2007 [citation][year=2007]Pradipta De, "MiNT: A Reconfigurable Mobile Muli-hopWireless Network Testbed?, PhD thesis, STONY Brook University, USA, 2007 [citation][year=2007]Lorenzo Falai, "Observing, Monitoring and Evaluating Distributed Systems?, PhD Thesis, University of Florence, Italy, 2007 [citation][year=2007]DP Siewiorek, XZ Yang, R Chillarege, ZT Kalbarczyk, "Industry trends and research in dependable computing?, - Jisuanji Xuebao/Chinese Journal of Computers, Vol. 30, no. 10, pp. 1645-1661. Oct. 2007 [citation][year=2007]L. Anghel, M. Rebaudengo, M. Sonza Reorda, and M. Violante, ?Multi-level Fault Effects Evaluation?, in the book "Radiation Effects on Embedded Systems?, Eds. RAOUL VELAZCO, PASCAL FOUILLAT and RICARDO REIS, Springer Netherlands, 10.1007/978-1-4020-5646-8, 2007 [citation][year=2007]Pradipta De, "MiNT: A Reconfigurable Mobile Muli-hop Wireless Network Testbed?, PhD Thesis, Stony Brook University, May 2007. [citation][year=2007]Andrea Bondavalli and Michele Vadursi, "Foundations of measurement theory applied to the evaluation of dependability attributes?, 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Edinburgo, Reino Unido, 25-28 de Junho de 2007. [citation][year=2006]PENG Jun-jie, HUANG Qing-cheng, HONG Bing-rong, LI Rui, YUAN Cheng-jun, WEI Zhen-hua, "Test Fault Sensitivity of a Digital Processor by a Pure Software Approach?, Journal of Astronautics, China, 2006. [citation][year=2006]Junjie Peng, Jun Ma, Bingrong Hong, "Evaluation of Embedded Operating System by a Software Method?, Journal of Communication and Computer, ISSN1548-7709, USA, Jan. 2006, Volume 3, No.1 (Serial No.14), 2006. [citation][year=2006]Roshan G. Ragel, "Architectural Support for Security and Reliability in Embedded Processors?, PhD thesis, The University of New South Wales, Austrália, 2006 [citation][year=2005]Martin Hiller, Arshad Jhumkas, and Neeraj Suri, "Tracking the Propagation of Data Errors in Software?, Dependable Computing Systems. Edited by Hassan B. Diab and Albert Y. Zomaya, ISBN 0-471-67422-2 John Wiley & Sons, Inc., 2005 [citation][year=2005]Ejlali, A., Al-Hashimi, B. M. and Miremadi, S. G. "Fast Observation Architecture for FPGA-based SEU Analysis?, In Proceedings of the 10th European Test Symposium, Tallinn, Estonia, May 22-25, 2005. [citation][year=2004]William Hoarau, "FAIL - FAult Injection Language?, Rapport de stage pour le DEA ID, Laboratoire de Recherche en Informatique, Université de Paris-Sud, 2004. [citation][year=2004]Paris D. Wiley, "Fault Tolerant Design Verification Through - The Use of Laser Fault Injection?, MSc thesis, Department of Electrical Engineering, College of Engineering, University of South Florida, Feb. 2004. [citation][year=2003]1. Regina Lúcia de Oliveira Morais, Eliane Martins "A strategy for validating an ODBMS Component Using a High-Level Software Fault Injection Tool" Proc. First Latin-American Symposium on Dependable Computing, LADC 2003, 2003, October 2003, São Paulo, Brazil: Springer Verlag, Lecture Notes in Computer Science, LNCS 2847: p. 56-68, ISBN 3-540-20224-2. [citation][year=2003]2. Perez, J.; Sonza Reorda, M.; Violante, M.; "Accurate dependability analysis of CAN-based networked systems" Integrated Circuits and Systems Design, 2003. SBCCI 2003. Proceedings. 16th Symposium on , 8-11 Sept. 2003, Pages:337 - 342. [citation][year=2003]3. Pradipta De, Anindya Neogi, Tzi-cker Chiueh, ``VirtualWire: A Fault Injection and Analysis Tool for Network Protocols', Proceedings of International Conference on Distributed Computing Systems (ICDCS 2003), May 2003. [citation][year=2003]4. António Casimiro, "Timely Actions in the Presence of Uncertain Timeliness?, Tese de doutoramento, Faculdade de Ciências da Universidade de Lisboa, Abril de 2003. [citation][year=2002]1. Volkmar Sieh, Kerstin Buchacker "UMLinux - A Versatile SWIFI Tool", Proc. of EDCC-4, Toulouse, October 2002, p. 159-171, LNCS 2002. [citation][year=2002]2. Civera P, Macchiarulo L, Rebaudengo M, et al. "An FPGA-based approach for speeding-up fault injection campaigns on safety-critical circuits" J ELECTRON TEST 18 (3): 261-271 JUN 2002. [citation][year=2001]1. Saurabh Bagchi, Gautam Kar, Joe Hellerstein "Dependency analysis in distributed systems using fault injection: Application to problem an e-commerce envrironment" in: O. Festor and A. Pras (Eds.) : 12th International Worshop on Distributed Systems: Operations and ManagementDSOM'2001 Nancy France, October 15-17, 2001. [citation][year=2001]2. Thitima Srivatanakul "Mutation Testing for Concurrency" MSc Thesis, The Department of Computer Science, University of York, September 2001. [citation][year=2001]3. Civera, P.; Macchiarulo, L.; Rebaudengo, M.; Reorda, M.S.; Violante, A.; "Exploiting FPGA for accelerating fault injection experiments" On-Line Testing Workshop, 2001. Proceedings. Seventh International , 9-11 July 2001, Pages:9 - 13. [citation][year=2001]4. Nelson Guilherme Mendes Leme, "Um Sistema de Padrões para Injeção de Falhas por Softwareâ?,tese de mestrado, Universidade Estadual de Campinas, Brasil, 2001. [citation][year=2001]5. Kerstin Buchacker, Volkmar Sieh, "Framework for Testing the Fault-Tolerance of Systems Including OS and Network Aspectsâ?, Proceedings of the 6th IEEE International Symposium on High Assurance Systems Engineering (HASE"01), 2001. [citation][year=2000]1. B. Parrotta, M. Rebaudengo, M. Sonza Reorda, M. Violante, "Speeding-up Fault Injection Campaigns in VHDL models", 19th International Conference on Computer Safety, Reliability and Security, Safecomp 2000, Rotterdam, The Nederlands, pp. 27-36, October 2000. [citation][year=2000]2. Timothy Tsai, Navjot Singh "Reliability Testing of Applications on Windows NT" Proc. of DSN-2000 - The International Conference on Dependable Systems and Networks (FTCS-30, DCCA-8), 25-28 June 2000, New York, USA, IEEE Computer Society Press, ISBN 0-7695-0707-7, pp. 427-436. [citation][year=2000]3. Eliane Martins, Amanda C.A. Rosa"A Fault Injection Approach Based on Reflective Programming" Proc. of DSN-2000 - The International Conference on Dependable Systems and Networks (FTCS-30, DCCA-8), 25-28 June 2000, New York, USA, IEEE Computer Society Press, ISBN 0-7695-0707-7, pp. 407-416. [citation][year=2000]4. M. Lajolo, M. Rebaudengo, M. S. Reorda, M. Violante, L. Lavagn, "Evaluating System Dependability In a Co-Design Framework", Proc. of Design, Automation and Test in Europe Conference (DATE2000), pp. 586-601, March 2000. [citation][year=2000]5. David T. Stott, Benjamin Floering, Daniel Burke, Zbigniew Kalbarczyk, Ravishankar K. Iyer "NFTAPE: a framework for assessing dependability in distributed systems with lightweight fault injectors." In Proceedings of the IEEE International Computer Performance and Dependability Symposium, pp. 91-100, March 2000. [citation][year=2000]6. DT Stott "Automated Fault-Inject Based Dependability Analysis of Distributed Computer Systems" Report for the Preliminary PhD Exam, 2000, Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign [citation][year=2000]7. B. Parrotta and Maurizio Rebaudengo and Matteo Sonza Reorda and Massimo Violante "Speeding-Up Fault Injection Campaigns in {VHDL} Models", SAFECOMP 2000, pages 27-36 [citation][year=1999]1. A. Benso, P.L. Civera, M. Rebaudengo, M. Sonza Reorda "A low-cost programmable board for speeding-up Fault Injection in microprocessor-based systems" Annual Reliability and Maintainability Symposium, 1999, pp. 171-177, 1999. [citation][year=1999]2. M. Rebaudengo, M. Sonza Reorda, "Evaluating the Fault Tolerance Capabilities of Embedded Systems via BDM", VTS'99: 17 th IEEE VLSI Test Symposium, Dana Point (CA), 1999. [citation][year=1999]3. A. Benso, M. Rebaudengo, and M. Sonza Reorda. "FlexFi: A flexible fault injection environment for microprocessor-based systems". In Proc. of the 8th International Conference on Computer Safety, Reliability and Security (SAFECOMP'99), 1999. Lecture Notes in Computer Science, Springer Verlag, A. Pasquini (Ed.) [citation][year=1999]4. Timothy K. Tsai, Mei-Chen Hsueh, Hong Zhao, Zbigniew Kalbarczyk, Ravishankar K. Iyer, "DEPENDABILITY OF COMPUTING SYSTEMS: Stress-Based and Path-Based Fault Injection" IEEE TRANSACTIONS ON COMPUTERS Vol. 48, No. 11; NOVEMBER 1999, pp. 1183-1201 [citation][year=1999]5. Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza Reorda "Fault Injection for Embedded Microprocessor-based Systems", Journal of Universal Computer Science, Volume 5 / Issue 10, October 1999, Springer, pp. 693-711. [citation][year=1999]6. David Stott, Zbigniew Kalbarczyk e R. K. Iyer, "Using NFTAPE for Rapid Development of Automated Fault Injection Experimentsâ?, Fast Abstracts of the 29th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-29, 15 a 18 Junho de 1999, Madison, Wisconsin, EUA, pp. 39-40; [citation][year=1999]7. Benso A., Rebaudengo M., Reorda M. S., "FlexFi: A flexible fault injection environment for microprocessor-based systems", Computer Safety, Reliability and Security, Lecture Notes in Computer Science, 1698: pp. 323-335, 1999. [citation][year=1999]8. Alfredo Benso, Maurizio Rebaudengo, Matteo Sonza Reorda "Fault Injection for Embedded Microprocessor-based Systems", Journal of Universal Computer Science, Volume 5 / Issue 10, October 1999, Springer, pp. 693-711. [citation][year=1999]9. A. Bondavalli, A. Fantechi, D. Latella, and L. Simoncini. "Integrated validation of dependable systems". In IDPT '99 4th, Int. Conference on Integrated Design and Process Technology, Kusadasi, Turkey, June 27 - July 2 1999. [citation][year=1999]10. S Freinatis, A Hunger "Assessing the Fault Tolerance of Embedded Software through Application of Machine Instruction Mutations" Proceedings of the IASTED International Conference Modelling and Simulation, May 5-8, 1999 - Philadelphia, Pennsylvania, USA. [citation][year=1999]11. Wee Teck Ng, "Design and Implementation of Reliable Main Memoryâ?, tese de doutoramento, University of Michigan, USA, 1999. [citation][year=1998]1. Benso, A.; Rebaudengo, M.; Reorda, M.S.; Civera, P.L.; "An integrated HW and SW fault injection environment for real-time systems" Defect and Fault Tolerance in VLSI Systems, 1998. Proceedings., 1998 IEEE International Symposium on , 2-4 Nov. 1998, Pages:117 - 122. [citation][year=1998]2. Volkmar Sieh "Effiziente Erstellung und Auswertung von Rechnermodellen zur detaillierten Zuverlässigkeitsanalyse" PhD Thesis, Univ. Erlangen, Germany, 1998. [citation][year=1998]3. Christmansson, J.; Hiller, M.; Rimen, M. "An experimental comparison of fault and error injection" Software Reliability Engineering, 1998. Proceedings. The Ninth International Symposium on , 4-7 Nov. 1998, Pages:369 - 378. [citation][year=1998]4. Benso, A.; Prinetto, P.; Rebaudengo, M.; Reorda, M.S.; "A fault injection environment for microprocessor-based boards" Test Conference, 1998. Proceedings. International , 18-23 Oct. 1998, Pages:768 - 773. [citation][year=1998]5. Prinetto, P.; Rebaudengo, M.; Sonza Reorda, M.; "Exploiting the background debugging mode in a fault injection system" Computer Performance and Dependability Symposium, 1998. IPDS '98. Proceedings. IEEE International , 7-9 Sept. 199, pp. 277. [citation][year=1998]6. Bondavalli, A.; Fantechi, A.; Latella, D.; Simoncini, L.; "Towards a discipline of system engineering: validation of dependable systems" Computer Security, Dependability and Assurance: From Needs to Solutions, 1998. Proceedings , 7-9 July 1998 & 11-13 November 1998, Pages:144 - 165. [citation][year=1998]7. P. Folkesson, Sven Svensson, Johan Karlsson "A Comparison of Simulation Based and Scan Chain Implemented Fault Injection" Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp 284-293, ISBN 0-8186-8470-4. [citation][year=1998]8. A. Benso, P. Prinetto, M. Rebaudengo and M. Sonza Reorda "EXFI: a low-cost fault injection system for embedded microprocessor-based boards" ACM Transactions on Design Automation of Electronic Systems, Volume 3 , Issue 4 (1998) pp 626-634. [citation][year=1998]9. Amanda Cibele, Apolinário Rosa, Eliane Martins, "Using a Reflective Architecture to Validate Object-oriented Applications by Fault Injection" Proceedings of the Workshop on Reflective Programming in C++ and Java (Vancouver-Canada), Oct 1998 [citation][year=1998]10. Peter Sobe, "A Study of Roll-Forward Recovery from Faults Among Communicating Processes", Research Report, TUD/ FI 98/02, Technical University of Dresden, Alemanha, 1998. [citation][year=1998]11. A. Benso, P. Prinetto, M. Rebaudengo, M. Sonza Reorda "A Fault Injection Approach for Embedded Microprocessor-based Boards" Proc. Ninth European Workshop on Dependable Computing, May 14-16, 1998, Gdansk, Poland, pp. 2-6, Politechnika Gdanska, ISBN 83-907591-1-X. [citation][year=1998]12. Amanda Cibele Apolinário Rosa, Eliane Martins "Using reflective programming to inject faults into object-oriented systems" IFIP WG10.4 Group Meeting 1998, 15 to 17 January 1998, in Waterfrant, Cape Town, South Africa. [citation][year=1998]13. Jean Arlat "Early Validation of Dependable Systems by Fault Injection into VHDL Models" IFIP WG10.4 Group Meeting 1998, 15 to 17 January 1998, in Waterfrant, Cape Town, South Africa. [citation][year=1998]14. Paolo PRINETTO, Maurizio REBAUDENGO, Matteo SONZA REORDA, "Exploiting the Background Debugging Mode in a Fault Injection system?, Proceedings of the IEEE International Computer Performance and Dependability Symposium (IPDS"08), 1998 [citation][year=1997]1. Sieh, V.; Balbach, F.; Tschäche, O.: "VERIFY: Zuverlässigkeitsanalyse unter Verwendung von VHDL-Modellen mit integrierter Fehlerbeschreibung" Tagungsband 9.Workshop "Testmethoden und Zuverlässigkeit von Schaltungen und Systemen", Universität Bremen, Bremen, Deutschland, 9.-11. März 1997, S. 39-42. [citation][year=1997]2. Mei-Chen Hsueh, Timothy K. Tsai, Ravishankar K. Iyer "Fault Injection Techniques and Tools" IEEE Computer, Vol. 30, No. 4, Abril 1997, pp. 75-82, IEEE Computer Society. [citation][year=1997]3. A. Bondavalli, F. Di Giandomenico and I. Mura "Value-Driven Resource Assignment in Object-Oriented Real-Time Dependable Systems," in Proc. WORDS 97, Third International Workshop on Object-oriented Real-time Dependable Systems, Newport Beach, California, USA, IEEE Computer Society Press, 1997, pp. 92-99. [citation][year=1997]4. V. Sieh, O. Tschäche, F. Balbach "VERIFY: Evaluation of Reliability Using VHDL-Models with Embedded Fault Descriptions" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 32-36, ISBN 0-8186-7831-3. [citation][year=1997]5. F. Salles, J. Arlat, and J. Fabre. Can we rely on COTS microkernels for building fault-tolerant systems ? In Workshop on Future Trends of Distributed Computing Systems, October 1997. [citation][year=1997]6. Jérome Boué "Test de la tolerance aux fautes par injection de fautes dans des modèles de simulation VHDL" Thèse de doctorat de L'Institut Nationale Polytechnique de Toulouse, 1997, Rapport LAAS nº 97503, LAAS-CNRS, Toulouse, França. [citation][year=1997]7. A. Bondavalli, F. Di Giandomenico and I. Mura "A Value-Based Approach to Flexible Decision Making in Real-Time Dependable Systems," in Proc. 2nd Int. Workshop on Mechatronical Computer Systems, Pisa, Italy, 1997, pp. 155-163. [citation][year=1997]8. Emmerich Fuchs "Validating the Fail-Silence Assumption of the MARS Architecture" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 225-247. [citation][year=1997]9. Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1997]10. T. Tsai, S.J. Upadhaya, H. Zhao, M.-C. Hsueh, R.K. Iyer, "Path-Based Fault Injection," Proc. 3rd ISSAT Conf. on R&Q in Design, pp. 121--125, 1997. [citation][year=1997]11. V. Sieh, O. Tschäche, F. Balbach "Comparing Different Fault Models Using VERIFY" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 63-80. [citation][year=1997]12. Uwe Wildner "Experimental Evaluation of Assigned Signature Checking With Return Address Hashing on Different Platforms" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 3-18. [citation][year=1997]13. V. Sieh, O. Tschäche e F. Balbach, "System Dependability Analysis using VHDL Models with Integrated Fault Descriptionsâ?, Proceedings of 8th European Workshop on Dependable Computing, EWDC-8, Gotemburgo, Suécia, 2 a 4 de Abril de 1997; [citation][year=1997]14. M. Dal Cin, W. Hohl e V. Sieh, "Hardware-Supported Fault Tolerance for Multiprocessorsâ?, Proceedings of the 14. ITG/GI-Fachtagung Architektur von Rechensystemen, Rostock, Alemanha, VDE-Verlag, Setembro de 1997, pp 13-22. [citation][year=1997]15. V. Sieh, O. Tschäche, F. Balbach "Comparing Different Fault Models Using VERIFY" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 63-80. [citation][year=1997]16. Uwe Wildner "Experimental Evaluation of Assigned Signature Checking With Return Address Hashing on Different Platforms" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 3-18. [citation][year=1997]17. Kumar K. Goswami, Ravishankar K. Iyer, Luke Young, "DEPEND: A Simulation-Based Environment for System Level Dependability Analysis" IEEE TRANSACTIONS ON COMPUTERS, Vol. 46, No. 1; JANUARY 1997, pp. 60-74. [citation][year=1996]1. Geert Deconninck, "User-Triggered Checkpointing And Rollback In Massively Parallel Systems", PhD. Thesis, Katholieke Universiteit Leuven, Bélgica, December 1996. [citation][year=1996]2. J.Christmansson, R. Chillarege, "Generation of an Error Set that Emulates Software Faults Based on Field Data" Proc. Twenty-Six Annual International Symposium on Fault-Tolerant Computing (FTCS-26), Junho 25-26, 1996, Sendai, Japão, IEEE Computer Society, ISBN 0-8186-7261-7, pp 304-313. [citation][year=1996]3. I. Mura, F. Di Giandomenico, A. Bondavalli "Real-Time Multiprocessor Systems: Performability Evaluation," IEI-CNR, Pisa, Italy, Internal Report (B4-07-02-96), 1996. [citation][year=1996]4. Uwe Wildner "Compiler Assisted Self-Checking of Structural Integrity Using Return Address Hashing " Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 161-177, ISBN 3-540-61772-8. [citation][year=1996]5. V. Sieh, O. Tschäche e F. Balbach, "VHDL based Fault Injection with VERIFY?, Universidade de Erlangen, Alemanha, IMMD III, Internal Report 5/96, Agosto de 1996; [citation][year=1996]6. David Powell, Michel Cukier, Jean Arlat e Yves Crouzet, "Estimation of Time-Dependent Coverage?, LAAS-CNRS, 7 avenue du Colonel Roche - 31077 TOULOUSE Cedex 4, France - Research Report 96466, 4 de Dezembro de 1996; [citation][year=1996]7. Uwe Wildner, "SWIFLER: Software Implemented Control Flow Error Injection?, Institut für Informatik, Universität Potsdam, Alemanha, Technical Report MPI-I-96-601, Janeiro de 1996; [publication]Carreira, J. and Madeira, H. and Silva, J.G. , "Assessing the Effects of Communication Faults on Parallel Applications", in 1st IEEE International Performance and Dependability Symposium (IPDS'95), 1995 [citation][year=2008]Alexander Gordeyev, Vyacheslav Kharchenko, Anton Andrashov, Boris Konorev, Vladimir Sklyar, and Artem Boyarchuk, "Case-based software reliability assessmentby fault injection unified procedures?, SEESE '08: ACM Proceedings of the 2008 international workshop on Software Engineering in east and south Europe, Leipzig, Germany, 2008 [citation][year=2005]G. Jacques-Silva, R. J. Drebes, T. S. Weber, E Martins, "Injecting Communication Faults to Experimentally Validate Java Distributed Applications?, Advanced Distributed Systems: 5th International School and symposium, ISSADS 2005, Guadalajara, Mexico, January 24-28, 2005. [citation][year=2004]Jacques-Silva, G. Jung Drebes, R. Gerchman, J. Weber, T.S., "FIONA: a fault injector for dependability evaluation of Java-based network applications?, Proceedings. Third IEEE International Symposium on Network Computing and Applications, Cambridge, MA, USA, 2004. [citation][year=2004]G. Jacques-Silva, R. Moraes, T. S. Weber, E. Martins, "Validando Sistemas Distribu´ıdos Desenvolvidos em Java Utilizando Injeção de Falhas de Comunicação por Software?, In Proc. of V Workshop de Testes e Tolerância a Falhas. Gramado, Brazil. 2004 [citation][year=2004]Charng-da Lu; Reed, D.A., "Assessing Fault Sensitivity in MPI Applications?, Proceedings of the ACM/IEEE SC2004 Supercomputing Conference, (High Performance Computing, Networking and Storage Conference) 2004 Page(s):37 " 37. [citation][year=2001]1. Thitima Srivatanakul "Mutation Testing for Concurrency" MSc Thesis, The Department of Computer Science, University of York, September 2001. [citation][year=1998]Volkmar Sieh "Effiziente Erstellung und Auswertung von Rechnermodellen zur detaillierten Zuverlässigkeitsanalyse" PhD Thesis, Univ. Erlangen, Germany, 1998 [citation][year=1998]Lin J. W., Kuo S. Y., "Efficient recovery from communication errors in distributed shared memory systems", IEICE Transactions on Information and Systems, E81D (11): pp. 1213-1223, Nov., 1998. ( [citation][year=1998]D. T. Stott, G. Ries, M-C. Hsueh, R. K. Iyer "Dependability Analysis of a High-Speed Network Using Software-Implemented Fault Injection and Simulated Fault Injection" IEEE Transactions on Computers, January 1998, Vol. 47, No. 1, pp. 108-119. [citation][year=1998]David Thomas Stott "Software-Implemented Fault Injection For Dependability Analysis Of High-Speed Computer Networks", MSc Thesis, Univ. Illinois Urbana-Champaign, 1998. [citation][year=1998]Peter Sobe, "A Study of Roll-Forward Recovery from Faults Among Communicating Processes", Research Report, TUD/ FI 98/02, Technical University of Dresden, Alemanha, 1998. [citation][year=1997]1. D. Blough, T. Torii "Fault-Injection-Based Testing of Fault-Tolerant Algorithms in Message Passing Parallel Computers" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp. 258-267, ISBN 0-8186-7831-3. [citation][year=1995]1. Jean Arlat, "Tutorial on Tools for Analytical and experimental Evaluation of Dependable Computersâ?, 1st IEEE International Computer Performance and Dependability Symposium (IPDS'95), Erlangen, Alemanha, Abril de 1995. 1994(3 publications) [publication]Madeira, H. and Mario Zenha-Rela and Moreira, F. and Silva, J.G. , "RIFLE: a general purpose pin-level fault injector", in 1st European Dependable Computing Conference (EDCC-1), vol. 852, 1994 [citation][year=2008]Peter Ming-Han Lee, Reza Sedaghat, FPGA-based switch-level fault emulation using module-based dynamic partial reconfiguration, Microelectronics Reliability, Volume 48, Issue 10, October 2008, Pages 1724-1733, ISSN 0026-2714 [citation][year=2008]Pierre Vanhauwaert, "Analyse de Surete par Injection de Fautes Dans un Environnement de Prototypage a Base de FPGA?, PhD thesis, Institut Polytechnique de Grenoble, 2008 [citation][year=2008]Nowroth, D.; Polian, I.; Becker, B., "A study of cognitive resilience in a JPEG compressor," Dependable Systems and Networks With FTCS and DCC, 2008. DSN 2008. IEEE International Conference on , vol., no., pp.32-41, 24-27 June 2008 [citation][year=2007]Silvio André Misera, "Simulation von Fehlern in digitalen Schaltungen mit SystemC?, Doktor der Ingenieurwissenschaften, Von der Fakultät für Mathematik, Naturwissenschaften und Informatik der Brandenburgischen Technischen Universität Cottbus, 05. Dezember 2007 [citation][year=2007]Damian Nowroth, "Untersuchungen von akzeptablen Fehlern in einem JPEG-Kompressor?, Diplomarbeit, Albert-Ludwigs-Universit¨at Freiburg, Institut f¨ur Informatik, 18. Oktober 2007 [citation][year=2007]David de Andrés Martínez, "Speeding-Up Model-Based Fault Injection of Deep-Submicron Cmos Fault Models Through Dynamic and Partially Reconfigurable FPGAS?, PhD Thesis, University of Valencia, 2007 [citation][year=2007]E. Touloupis, J. A. Flint, V. A. Chouliaras, and D. Ward, "Study of the Effects of SEU-Induced Faults on a Pipeline Protected Microprocessor?, IEEE Transactions on Computers, Vol. 56, issue 12, December 2007. [citation][year=2007]O. Faurax, A. Tria, L. Freund, F. Bancel, T. Muntean, "PAFI: Outil d'analyse de circuit pour l'accélération de l'injection de fautes en simulation?, Journées Nationales du Réseau Doctoral en Microélectronique, Université des Sciences et Technologies de Lille, 14, 15e 16 Maio 2007. [citation][year=2006]Roshan G. Ragel, "Architectural Support for Security and Reliability in Embedded Processors?, PhD thesis, The University of New South Wales, Austrália, 2006 [citation][year=2006]S Tixeuil, LM Silva, W Hoarau, "An Overview of Existing Tools for Fault-Injection and Dependability Benchmarking in Grids?, Second CoreGRID Workshop on Grid and Peer to Peer Systems, 2006 [citation][year=2006]William Hoarau and Sébastien Tixeuil, "Easy fault injection and stress testing with fail-fci?, Technical Report, LRI-CNRS 8623 et INRIA Grand Large, January 2006. [citation][year=2005]William Hoarau Sebastien Tixeuil Fabien Vauchelles, "Easy Fault Injection and Stress Testing with FAIL-FCI?, Technical Report nº 1421, Laboratoire de Recherche en Informatique, UMR 8623 ( CNRS-Université Paris-Sud), 2005. [citation][year=2005]William Hoarau, Sébastien Tixeuil, and Fabien Vauchelles, "Fault Injection in Distributed Java Applications", Technical Report nº 1420, Laboratoire de Recherche en Informatique, UMR 8623 ( CNRS-Université Paris-Sud), 2005 [citation][year=2005]Jonny Vinter, "On the Effects of Soft Errors in Embedded Control Systems?, PhD Thesis, Department of Computer Science and Engineering, Chalmers University of Technology, Göteborg, Sweden, 2005, ISBN 91-7291-630-3 [citation][year=2005]Cristian Constantinescu, Intel Corporation, "Dependability Benchmarking Using Environmental Test Tools?, Proceedings of IEEE Reliability and Maintainability Symposium, RAMS 2005. [citation][year=2004]1. B Bastien, "A Technique for Performing Fault Injection in System Level Simulations for Dependability Assessment", MSc Thesis, University of Virginia-USA, Jan 2004. [citation][year=2004]2. Babak Rahbaran, Andreas Steininger, Thomas Handl, "Built-in Fault Injection in Hardware - The FIDYCO Example?, Second IEEE International Workshop on Electronic Design, Test and Applications (DELTA 04), 2004. [citation][year=2004]3. G. Pintér and I. Majzik, "Impact of Statechart Implementation Techniques on the Effectiveness of Fault Detection Mechanisms?, Proceedings of the 30th IEEE EUROMICRO Conference (EUROMICRO"04), Rennes " France, 1. - 3. September 2004. [citation][year=2004]4. H. R. Zarandi, S. G. Miremadi, S. Hessabi, A. Ejlali, "A Mixed-Mode Simulation-based Environment to Test and Dependability Assessment of HDL Models?, in the Proceedings of International Conference on Embedded Systems and Applications (ESA 2004), USA, June 2004. [citation][year=2004]5. William Hoarau, "FAIL - FAult Injection Language?, Rapport de stage pour le DEA ID, Laboratoire de Recherche en Informatique, Université de Paris-Sud, 2004. [citation][year=2004]6. D. Gil, J. Garcia, and P. Gil, "Analysis of the influence of processor hidden registers on the accuracy of fault injection techniques? Ninth IEEE International High-Level Design Validation and Test Workshop. 10-12 Nov. 2004. [citation][year=2003]1. Zarandi, H.R.; Miremadi, S.G.; Ejlali, A.; "Fault injection into verilog models for dependability evaluation of digital systems" Parallel and Distributed Computing, 2003. Proceedings. Second International Symposium on , 13-14 Oct. 2003, Pages:281 - 287. [citation][year=2003]2. Jean Arlat, Yves Crouzet, Johan Karlsson, Peter Folkesson, Emmerich Fuchs, Günther Leber "Comparison of Physical and Software-Implemented Fault Injection Techniques" IEEE Transactions on Computers, Vol 52, No. 9, September 2003, pp. 1115-1133. [citation][year=2003]3. Andreas Steininger, Babak Rahbaran, Thomas Handl, "Built-In Fault Injectors - The logical Continuation of BIST?" Proc. of First Workshop on Intelligent Solutions in Embedded Systems (WISES), 2003. pp. 187-196. Reserach Report 56/2003, Real-Time Systems Research Group at the Vienna University of Technology. [citation][year=2003]4. A. Ejlali, S. G. Miremadi, H. Zarandi, G. Asadi, "A hybrid fault injection approach based on simulation and emulation co-operation", EEE/IFIP International Conference on Dependable Systems and Networks, International Performance and Dependability Symposium, DSN-IPDS 2003, San Francisco, CA, USA, pp. 479-488, June 22-25, 2003. [citation][year=2003]5. Kaufman L. M., Salinas M. H., Williams R. D., Giras T. C., "Integrate hardware/software device testing for use in a safety-critical application", Annual Reliability and Maintainability Symposium, pp. 132-137, 2003. [citation][year=2003]6. P. Fortuna, "Exploiting Hybrid Fault Injection Sessions for Maximum Diagnosis and Fault Coverage Levels", Fast Abstract at the International Conference on Dependable Systems and Networks (DSN2003), pp. A40-42, 2003 [citation][year=2003]7. A Pataricza, G Pinter, "Data Mining in Fault Injection", Proc. International IEEE Workshop on Design and Diagnostics of Electronic Circuits and Systems (DDECS), 14-16 Apr , Poznan-Poland, 2003. [citation][year=2003]8. Constantinescu C., "Experimental evaluation of error-detection mechanisms", IEEE Transactions on Reliability, 52 (1): pp. 53-57, March 2003. [citation][year=2003]9. Peter Folkesson, Joakim Aidemark, snd Jonny Vinter, "Assessment and Application of Scan-Chain Implemented Fault Injection?, Technical Report 03-21, (27 pages) Chalmers University of Technology, Department of Computer Engineering, Göteborg, Sweden, 2003. [citation][year=2003]10. Markus Jochim, "Automatische Erzeugung und Bewertung virtueller Duplexsysteme zur Erkennung von Betriebsfehlern in Mikroprozessoren?, Doktor der Naturwissenschaften, Fachbereich 6 des Standorts Essen der Universit¨at Duisburg-Essen am 27.03.2003 [citation][year=2002]1. B. Floering, B. Brothers, Z. Kalbarczyk, R. Iyer, "An adaptive architecture for monitoring and failure analysis of high-speed networks", EEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. 69-78, June 23-26, 2002. [citation][year=2002]2. M. Jochim, "Detecting processos hardware faults by means of automatically generated virtual duplex systems", EEE/IFIP International Conference on Dependable Systems and Networks, DSN-2002, Bethesda, Maryland, USA, pp. 399-407, June 23-26, 2002. [citation][year=2002]3. Yangyang Yu, Barry W. Johnson, A Perspective on the State of Research on Fault Injection Techniques, Center for Safety Critical Systems Departments of Electrical and Computer Engineer and Computer Science The University of Virginia Technical Report prepared for U.S. Nuclear Regulatory Commission, May 2002. [citation][year=2002]4. Steininger A, Scherrer C "Identifying efficient combinations of error detection mechanisms based on results of fault injection experiments" IEEE T COMPUT 51 (2): 235-239 FEB 2002 . [citation][year=2002]5. Manoel Rodríguez Moreno, "Technologie d'empaquetage pour la sureté de fonctionnement des systemes temps-réel", Thése présentée au Laboratoire d'Analyse et d'Architecture des Sys-té-mes du Centre Centre National de la Recherche Scientifique (LAAS/ CNRS), en vue d'obtenir le titre de Docteur de l'Institut National Polytechnique de Toulouse, numéro d'ordre 1898, Année 2002. [citation][year=2002]6. Yangyang Yu, Barry W. Johnson, "A Perspective on the State of Research on Fault Injection Techniques", University of Virginia, Center for Safety Critical Systems. Technical Report UVA-CSCS-FIT-001. May 2002. [citation][year=2001]1. Joakim Aidemark, Jonny Vinter, Peter Folkesson, Johan Karlsson"GOOFI: Generic Object-Oriented Fault In jection Tool" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 83-88. [citation][year=2001]2. K Buchacker, V Sieh, " Framework for testing the fault-tolerance of systems including OS and network aspects", Proceedings of the 6th IEEE International Symposium on High-Assurance Systems Engineering: Special Topic: Impact of Networking, Boca Raton, Florida-USA, ISBN:0-7695-1275-5, IEEE 2001.pp. 95-105. [citation][year=2000]1. Dan Teodosiu "End-To-End Fault Containment In Scalable Shared-Memory Multiprocessors" PhD. Thesis, Stanford University, USA, July 2000. [citation][year=2000]2. Cristian Constantinescu, "Teraflops supercomputer: Architecture and validation of the fault tolerance mechanisms?, IEEE Transactions On Computers, vol. 49, no. 9, Setembro 2000, pp. 886-894, ISSN 0018-9340. [citation][year=1999]1. Constantinescu, C.; "Using physical and simulated fault injection to evaluate error detection mechanisms" Pacific Rim International Symposium on Dependable Computing, Proceedings. 1999 , 16-17 Dec. 1999, Pages:186 - 192, IEEE Computer Society. [citation][year=1999]2. Sosnowski, J.; Gawkowski, P. "Tracing fault effects in system environment" EUROMICRO Conference, 1999. Proceedings. 25th , Volume: 1 , 8-10 Sept. 1999, Pages:481 - 486 vol.1. [citation][year=1999]3. R. J. Martínez, P. J. Gil, G. Martín, C. Pérez, J.J. Serrano. "Experimental Validation of High-Speed Fault-Tolerant Systems Using Physical Fault Injection". Dependable Computing and Fault Tolerant Systems. Volume 12.A. Avizienis, H. Kopetz, J.C. Laprie Eds. IEEE Computer Society. ISBN 0-7695-0284-9, pp. Pág 249-264, 1999. [citation][year=1999]4. Cristian Constantinescu, "Assesssing Error Detection Coverage by Simulated Fault Injection?, Third European Dependable Computing Conference, Praga, República Checa, Setembro de 1999, Lecture Notes in Computer Science 1667, Spriger-Verlag, pp. 161-170, 1999; [citation][year=1998]1. V. Sieh, "Effiziente Erstellung und Auswertung von Rechner-modellen zur detaillierten Zuverlassigkeitsanalyse", PhD Thesis, Technischen Fakultät der Friedrich-Alexander Universität Erlangen-Nürnberg, 1998. [citation][year=1998]2. Cristian Constantinescu "Validation of the Fault/Error Handling Mechanisms of the Teraflop Computer" Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp 382-389, ISBN 0-8186-8470-4. [citation][year=1998]3. P. Folkesson, Sven Svensson, Johan Karlsson "A Comparison of Simulation Based and Scan Chain Implemented Fault Injection" Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp 284-293, ISBN 0-8186-8470-4. [citation][year=1998]4. J.Karlsson, P. Folkesson, J.Arlat, Y.Crouzet, G.Leber, J.Reisinger "Application of Three Physical Fault Injection Techniques to the Experimental Assessment of the MARS architecture" Dependable Computing for Critical Applications 5, R.K.Iyer, M.Morganti, W.K.Fuchs,V.Gligor (Eds), IEEE Computer Society Press, 1998, ISBN 0-8186-7803-8 , pp. 267-287. [citation][year=1997]1. A.Steininger, C. Scherrer "On Finding an Optimal Combination of Error Detection Mechanisms Based on Results of Fault Injection Experiments" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 238-247, ISBN 0-8186-7831-3. [citation][year=1997]2. Volkmar Sieh, Oliver Tschäche, Frank Balbach, "System Dependability Analysis using VHDL Models with Integrated Fault Descriptions", Proc. 8th European Workshop on Dependable Computing, EWDC-8, Goeteborg (Sweden), 1997. [citation][year=1997]3. Jérome Boué "Test de la tolerance aux fautes par injection de fautes dans des modèles de simulation VHDL" Thèse de doctorat de L'Institut Nationale Polytechnique de Toulouse, 1997, Rapport LAAS nº 97503, LAAS-CNRS, Toulouse, França. [citation][year=1997]4. Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1997]5. V. Sieh, O. Tschäche, F. Balbach "VERIFY: Evaluation of Reliability Using VHDL-Models with Embedded Fault Descriptions" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 32-36, ISBN 0-8186-7831-3. [citation][year=1997]6. V. Sieh, O. Tschäche, F. Balbach "Comparing Different Fault Models Using VERIFY" Proc. 6th IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-6), Grainau, Alemanha, Março 5-7, 1997, IEEE Computer Socienty Press, ISBN 0-8186-8009-1, pp. 63-80. [citation][year=1997]7. M. Dal Cin, W. Hohl e V. Sieh, "Hardware-Supported Fault Tolerance for Multiprocessorsâ?, Proceedings of the 14. ITG/GI-Fachtagung Architektur von Rechensystemen, Rostock, Alemanha, VDE-Verlag, Setembro de 1997, pp 13-22; [citation][year=1996]1. V. Sieh, O. Tschäche e F. Balbach, "VHDL based Fault Injection with VERIFY?, Universidade de Erlangen, Alemanha, IMMD III, Internal Report 5/96, Agosto de 1996; [citation][year=1996]2. Peter Folkesson, "Experimental Validation of a Fault-Tolerant System Using Physical Fault Injection?, Technical Report no. 239L, Chalmers University of Technology, Gotemburgo, Suécia, 1996; [citation][year=1995]1. Randell, Littlewood, Laprie, Kopetz (ed) "Predictably Dependable Computing Systems", Springer Verlag, 1995, ISBN 3-540-59334-9 (pág. 369). [citation][year=1995]2. Jean Arlat, "Tutorial on Tools for Analytical and experimental Evaluation of dependable Computerâ?, 1st IEEE International Computer Performance and Dependability Symposium (IPDS'95), Erlangen, Alemanha, Abril 1995. [citation][year=1995]3. J. Karlsson, P. Folkesson, J. Arlat, Y. Crouzet, G. Leber, J. Reisinger, "Integration and Comparison of Three Physical Fault Injection Techniques", Predictably Dependable Computing Systems (PDCS), 1995, pp. 615-642. [citation][year=1995]4. J. Arlat, Y. Crouzet, J. Karlsson, P. Folkesson, and G. Leber, "Evaluation of the MARS Architecture by means of Three Physical Fault Injection Techniques," in 4th International Workshop on Evaluation Techniques for Dependable Systems (ETDS `95), (San Antonio, TX, USA) October 1995. [publication]Madeira, H. and Silva, J.G. , "Experimental evaluation of the fail-silent behavior in computers without error masking", in 24th Fault Tolerant Computing Symposium FTCS-24, 1994 [citation][year=2007]Khanna, G.; Mike Yu Cheng; Varadharajan, P.; Bagchi, S.; Correia, M.P.; Verissimo, P.J., "Automated Rule-Based Diagnosis Through a Distributed Monitor System," Dependable and Secure Computing, IEEE Transactions on , vol.4, no.4, pp.266-279, Oct.-Dec. 2007 [citation][year=2007]Raul Barbosa, "Multi-Layer Fault Tolerance for Distributed Real-Time Systems?, Thesis for the Degree of Licentiate of Engineering, Thesis for the Degree of Licentiate of Engineering, Göteborg, Sweden 2007 [citation][year=2006]Basile, C.; Kalbarczyk, Z.; Iyer, R.K., "Active replication of multithreaded applications," Parallel and Distributed Systems, IEEE Transactions on , vol.17, no.5, pp. 448-465, May 2006 [citation][year=2006]Roshan G. Ragel, "Architectural Support for Security and Reliability in Embedded Processors?, PhD thesis, The University of New South Wales, Austrália, 2006 [citation][year=2005]1. Barbosa, J. Vinter, P. Folkesson, J. Karlsson, "Assembly-Level Pre-Injection Analysis for Improving Fault Injection Efficiency," to appear in Proc. Fifth European Dependable Computing Conference (EDCC-5), (Budapest, Hungary) April 2005 [citation][year=2004]1. R. Barbosa, J. Vinter, P. Folkesson and J. Karlsson, "Fault Injection Optimization through Assembly-Level Pre-Injection Analysis", Tech. Report No. 04-07, Dept. of Comp. Eng., Chalmers University of Technology, Göteborg, Sweden, 2004. [citation][year=2003]1. Claudio Basile, Z. Kalbarczyk, R. Iyer, "A preemptive deterministic scheduling algorithm for multithreaded replicas", IEEE/IFIP International Conference on Dependable Systems and Networks, Dependable Computing and Communications, DSN-DCC 2003, San Francisco, CA, USA, pp. 149-158, June 22-25, 2003. [citation][year=2003]2. R. Iyer, "Design of Reliable Systems and Networks", ECE 442/CS 436, Course Papers, Spring 2003, Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W. Main Street, Urbana, IL 61801. (http://courses.ece.uiuc.edu/ece442/papers.htm) [citation][year=2003]3. Kaufman L. M., Salinas M. H., Williams R. D., Giras T. C., "Integrate hardware/software device testing for use in a safety-critical application", Annual Reliability and Maintainability Symposium, pp. 132-137 2003. [citation][year=2003]4. S. Bagchi, Z. Kalbarczyk, R. Iyer, Y. Levendel, "Design and Evaluation of Preemptive Control Signature (PECOS) Checking for Distributed Applications?, in IEEE Transactions on Computers, 2003. (Science Citation Index Expanded). [citation][year=2003]5. Claudio Basile, Long Wang, Zbigniew Kalbarczyk, Ravi Iyer, "Group Communication Protocols under Errors?, Proceedings of the 22nd IEEE International Symposium on Reliable Distributed Systems (SRDS"03), 2003. [citation][year=2002]1. Ravishankar K. Iyer, Zbigniew Kalbarczyk, "Hardware and Software Error Detection", Book Chapter (44 pages), used in classes at the Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W. Main Street, Urbana, IL 61801, 2002. [citation][year=2002]2. Steininger A, Scherrer C "Identifying efficient combinations of error detection mechanisms based on results of fault injection experiments" IEEE T COMPUT 51 (2): 235-239 FEB 2002 [citation][year=2001]1. Pascal Chevochot, Isabelle Puaut "Experimental evaluation of the fail-silent behavior of a distributed real-time run-time support built from COTS components" Proceedings of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, ISBN 0-7695-1101-5, pp. 304-313. [citation][year=2001]2. Paul L. Springer "Assessing Application Vulnerability to Radiation Induced DEUs in Memory" Supplement of the 2001 International Conference on Dependable Systems and Networks, 1-4 July 2001, Göteborg, Sweden, IEEE Computer Society, pp B-98,B-99. [citation][year=2001]3. David T. Stott, Neil A. Speirs, Zbigniew Kalbarczyk, Saurabh Bagchi, Jun Xu, Ravishankar K. Iyer "Comparing Fail-Silence Provided by Process Duplication versus Internal Error Detection for DHCP Server" in Proc. of Intl' Parallel and Distributed Processing Symp. (IPDPS), San Francisco, CA, April. 2001. [citation][year=2001]4. I-Ling Yen, Farokh B. Bastani, David J. Taylor, "Design of Multi-Invariant Data Structures for Robust Shared Accesses in Multiprocessor Systems" IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, VOL. 27, NO. 3, MARCH 2001, pp. 193-207. [citation][year=2000]1. Yutao He, Algirdas Avizienis "Assessment of the Aplicability of COTS Microprocessors in High-Confidence Computing Systems: A Case Study" Proc. of DSN-2000 - The International Conference on Dependable Systems and Networks (FTCS-30, DCCA-8), 25-28 June 2000, New York, USA, IEEE Computer Society Press, ISBN 0-7695-0707-7, pp. 81-86. [citation][year=2000]2. Pascal Chevochot, Isabelle Puaut, Gilbert Cabillic, Antoine Colin, David Decotigny, Michel Banatre "HADES: A distributed System for Dependable Hard Real-Time Applications Built from COTS Components", IRISA, RENNES, FRANCE, Tech Rep 1357, 2000, ISSN 1166-8687. [citation][year=2000]3. Subhachandra Chandra "An Evaluation of the Recovery-Related Properties of Software Faults" PhD Thesis, University of Michigan, 2000. [citation][year=2000]4. P. Chevochot and I. Puaut. Experimental evaluation of the fail-silent behavior of a distributed real-time run-time support built from COTS components. Technical Report 1370, IRISA, Oct. 2000 [citation][year=1999]1. I. L. Yen, I. Ahmed, R. Jagannath, S. Kundu, "The design and implementation of a customizable fault tolerance framework?, International Journal of Software Engineering and Knowledge Engineering, vol. 9, no. 2, Abril 1999, pp. 181-202, World Scientific Publisher, ISSN 0218-1940. [citation][year=1999]2. Lettner R, Prammer M, Scherrer C, Steininger A, "Assessment of computer fault tolerance - a fault-injection toolset and the rationale behind it?, Computer Standards & Interfaces, Elsevier Science BV, Amsterdam, vol. 21, no. 4, Setembro 1999, pp. 357-369, ISSN: 0920-5489. [citation][year=1999]3. Seungjae Han, Kang G. Shin "Experimental Evaluation of Behavior-Based Failure-Detection Schemes in Real-Time Communication Networks" IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, Vol. 10, No. 6; JUNE 1999, pp. 613-626. [citation][year=1999]4. Carlos Pérez, Germán Fabergat, R. J. Martínez e G. Martín, "Incremental Messages: Micro-Kernel Services for Flexible and Efficient Management of Replicated Data?, Proceedings of the 29th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-29, 15 a 18 de Junho de 1999, Madison, Wisconsin, EUA, IEEE Computer Society Press, pp 56-63, ISBN 0-7695-0213-X. [citation][year=1999]5. R. J. Martínez, P. J. Gil, G. Martín, C. Pérez, J.J. Serrano. "Experimental Validation of High-Speed Fault-Tolerant Systems Using Physical Fault Injection". Dependable Computing and Fault Tolerant Systems. Volume 12.A. Avizienis, H. Kopetz, J.C. Laprie Eds. IEEE Computer Society. ISBN 0-7695-0284-9, pp. Pág 249-264, 1999 [citation][year=1998]2. I-L. Yen, I. Ahmed, R. Jagannath, and S. Kundu, "Implementation of a Customizable Fault Tolerance Framework" in The First IEEE International Symposium on Object-Oriented RealTime Distributed Computing, Kyoto, Japan, April, 1998. [citation][year=1998]3. A. Benso, M. Rebaudengo, L. Impagliazzo, P. Marmo, "Fault-List Collapsing for Fault Injection Experiments", RAMS98: Annual Reliability and Maintainability Symposium, Anaheim, CA (USA), pp. 383-388, January 1998. [citation][year=1998]1. Christopher Temple "Avoiding the Babbling-Idiot Failure in a Time-Triggered Communication System" Proceedings of the 28th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-28, June 1998, Munich, Germany, IEEE Computer Society Press, pp 218-227, ISBN 0-8186-8470-4. [citation][year=1997]1. A. Bondavalli, S. Chiaradonna, F. Di Giandomenico and S. La Torre "Modelling the Effects of Input Correlation in Iterative Software," in Reliability Engineering and System Safety Journal, Elsevier Science, 1997, number 57, pp. 189-202. [citation][year=1997]2. A.Steininger, C. Scherrer "On Finding an Optimal Combination of Error Detection Mechanisms Based on Results of Fault Injection Experiments" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 238-247, ISBN 0-8186-7831-3. [citation][year=1997]3. Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1997]4. S. Han, K. G. Shin "Experimental Evaluation of Failure Detection Schemes in Real-Time Communication Networks" Proceedings of the 27th Annual International Symposium on Fault-Tolerant Computing Symposium, FTCS-27, 24-27 June 1997, Seattle, Washington, EUA, IEEE Computer Society Press, pp 122-131, ISBN 0-8186-7831-3. [citation][year=1997]5. I.-L. Yen, "An Object-Oriented Fault Tolerance Framework Based on Specialization Techniques,? Proc. Third IEEE Computer Soc. Workshop Object-Oriented Real-Time Dependable Systems, pp. 291-297, Newport Beach, Calif., Feb. 1997. [citation][year=1996]1. Lovric T., "Detecting hardware faults with systematic and design diversity: Experimental results?, Computer Systems Science and Engineering, vol. 11, no. 2, Março de 1996, pp: 83-92, ISSN: 0267-6192. [citation][year=1996]2. Emmerich Fuchs "An Evaluation of the Error Detection Mechanisms in MARS Using Software-Implemented Fault Injection" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 73-90, ISBN 3-540-61772-8. [citation][year=1996]3. Jürgen Bohne, Reny Grönberg "Adaptable Fault Tolerance for Distributed Process Control Using Exclusively Standard Components" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 21-34, ISBN 3-540-61772-8. [citation][year=1996]4. Benso A, Corno F, Prinetto P, Rebaudengo M, Reorda MS, "Role of fault injection techniques in system dependability analysis?, AEI Automazione Energia Informazione, UTET Periodici Scientifici, Milano vol. 83, no. 10, Outubro 1996, pp. 63-69, ISSN: 0013-6131. [citation][year=1995]1. Jens Guethoff, Volkmar Sieh "Combining Software-Implemented and Simulation-Based Fault-Injection into a Single Fault Injection Method" Proceedings of the 25th International Symposium on Fault-Tolerant Computing (FTCS-25), California, USA, June 1995, pp. 196-206, IEEE Computer Society. [citation][year=1995]2. Rudi Cuyvers, "User-Adaptable Fault Tolerance for Message Passing Multiprocessors", tese de doutoramento, Katholieke Universiteit Leuven (Lovaina), Bélgica, Maio de 1995. [citation][year=1995]3. Carlos Pérez Conde, "Aportaciones a los Entornos de Desarrollo de Aplicaciones Tolerantes a Fallos?, tese de doutoramento, Departamento de Informática e Electrónica, Universidade de Valência, Espanha, 1995; [publication]Silva, J.G. and Silva, L. and Madeira, H. and Jorge Bernardino , "A fault-tolerant mechanism for simple controllers", in First European Dependable Computing Conference, 1994 [citation][year=2013]1 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 An evaluation of the error detection mechanisms in MARS using software-implemented fault injection http://link.springer.com/chapter/10.1007/3-540-61772-8_31 E Fuchs Dependable Computing?EDCC-2 1996 Springer 2 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Roll-forward error recovery in embedded real-time systems http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=517589 J Xu, B Randell Parallel and Distributed Systems, 1996. … 1996 ieeexplore.ieee.org 3 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 On structuring cooperative and competitive concurrent systems http://comjnl.oxfordjournals.org/content/42/8/627.short A Romanovsky The Computer Journal 1999 Br Computer Soc 4 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Responsive Roll-Forward Recovery in Embedded Real-Time Systems http://www.cs.ncl.ac.uk/publications/trs/papers/515.pdf J Xu, B Randell Publication/NA 1995 cs.ncl.ac.uk 5 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Software diversity as a way to well-structured concurrent software http://dl.acm.org/citation.cfm?id=206848 AB Romanovsky ACM SIGOPS Operating Systems Review 1995 dl.acm.org 6 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Computing Science http://www.cs.ncl.ac.uk/publications/trs/papers/682.pdf OS Cooperative Publication/NA 1999 cs.ncl.ac.uk 7 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 An Efficient Forward Recovery Checkpointing Scheme in Dissimilar Redundancy Computer System http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=5366252 W Guodong, Z Zhengjun, H Tao… … , 2009. CiSE 2009. … 2009 ieeexplore.ieee.org 8 "A fault-tolerant mechanism for simple controllers [citation][year=2013]" 10763542558783255532 Adaptable fault tolerance for distributed process control using exclusively standard components http://link.springer.com/chapter/10.1007/3-540-61772-8_28 J Bohne, R Grönberg Dependable Computing?EDCC-2 1996 Springer [citation][year=1999]1. Romanovsky A, "On structuring cooperative and competitive concurrent systems?, Computer Journal, Oxford Univ Press, Oxford, vol. 42, no. 8, 1999, pp. 627-637, ISSN: 0010-4620 [citation][year=1998]1. Romanovsky AB, "Predictable toleration of design faults: recovery blocks in real time systems?, Computer Systems Science and Engineering, CRL Publishing Ltd, Market Harborough, vol. 13, no. 6, Novembro 1998, pp. 369-377, ISSN: 0267-6192 [citation][year=1996]1. Emmerich Fuchs "An Evaluation of the Error Detection Mechanisms in MARS Using Software-Implemented Fault Injection" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 73-90, ISBN 3-540-61772-8. [citation][year=1996]2. J. Xu and B. Randell, "Roll-Forward Error Recovery in Embedded Real-Time Systems", Proc. Int. Conf. on Parallel & Distributed Systems. Tokyo, Japan. June,1996, pages 414--421. [citation][year=1996]3. Jürgen Bohne, Reny Grönberg "Adaptable Fault Tolerance for Distributed Process Control Using Exclusively Standard Components" Proc. Second European Dependable Computing Conference, Taormina, Itália, Outubro 1996, Lecture Notes in Computer Science 1150, Springer Verlag, pp. 21-34, ISBN 3-540-61772-8. [citation][year=1995]1. J. Xu and B. Randell. "Responsive Roll--Forward Recovery in Embedded Real--Time Systems" Technical report, Dept. of Computer Science.- University of Newcastle upon Tyne, UK, 1995 1993(1 publication) [publication]Madeira, H. and Moreira, F. and Furtado, P. and Mario Zenha-Rela and Silva, J.G. , "Pin-level Fault Injection for Dependability Validation: Some Research Results at the University of Coimbra", in First IEEE International Workshop on Fault and Error Injection for Dependability Validation, 1993 [citation][year=1997]Sieh, V.; Balbach, F.; Tschäche, O.: "VERIFY: Zuverlässigkeitsanalyse unter Verwendung von VHDL-Modellen mit integrierter Fehlerbeschreibung" Tagungsband 9.Workshop "Testmethoden und Zuverlässigkeit von Schaltungen und Systemen", Universität Bremen, Bremen, Deutschland, 9.-11. März 1997, S. 39-42. [citation][year=1996]Lovric T., "Detecting hardware faults with systematic and design diversity: Experimental results?, Computer Systems Science and Engineering, vol. 11, no. 2, Março de 1996, pp: 83-92, ISSN: 0267-6192. [citation][year=1995]Rudi Cuyvers, "User-Adaptable Fault Tolerance for Message Passing Multiprocessors", PhD Thesis, Katholieke Universiteit Leuven (Lovaina), Belgium, May 1995. [citation][year=1994]Tomislav Lovric, "Systematic and Design Diversity " Software Techniques for Hardware Fault Detection", in "Dependable Computing - EDCC-1", Klaus Echtle, Dieter Hammer, David Powell (Eds.) Lecture Notes in Computer Science 852, Springer Verlag, 1994, pp. 309-326. ISBN 3-540-58426-9. 1992(1 publication) [publication]Madeira, H. and Mario Zenha-Rela and Furtado, P. and Silva, J.G. , "Time Behaviour Monitoring as an Error Detection Mechanism", in 3rd IFIP Working Conference on Dependable Computing for Critical Applications (DCCA-3), 1992 [citation][year=2005]Amir Rajabzadeh, Seyed Ghassem Miremadi, A Hardware Approach to Concurrent Error Detection Capability Enhancement in COTS Processors , PRDC 2005, Chagsha, Hunan, China, Dec. 12-14, 2005. [citation][year=2002]1. Oh N., Shirvani P. P., McCluskey E. J., "Control-flow checking by software signatures", IEEE Transactions on Reliability, 51 (1): pp. 111-122, March 2002 [citation][year=1997]1. Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1995]1. Ghassem Miremadi, Joakim Ohlsson, Marcus Rimén, and Johan Karlsson, "Use of time and Address Signatures for Control Flow Checking", Fifth IFIP Working Conference on Dependable Computing for Critical Applications, Urbana-Champaign, Illinois, EUA, 27 a 29 de Setembro 1995, pp 113-124. [citation][year=1995]2. Ghassem Miremadi, "Hardware and Software Mechanisms for Control Flow Checking", Tese de Doutoramento, Universidade de Chalmers, Gotemburgo, Suécia, Maio de 1995; [citation][year=1995]3. Ghassem Miremadi and Johan Karlsson, "Experimental Evaluation of Seven Hardware Mechanisms for Control Flow Checking", Technical Report No. 221, 1995, Department of Computer Engineering, Chalmers University, Sweden; [citation][year=1995]4. Ghassem Miremadi, Joakim Ohlsson, Marcus Rimén, and Johan Karlsson, "Use of time and Address Signatures for Control Flow Checking", Technical Report No. 224, 1995, Department of Computer Engineering, Chalmers University, Sweden 1991(1 publication) [publication]Madeira, H. and Silva, J.G. , "On-line Signature Learning and Checking: Experimental Evaluation", 1991 [citation][year=2006]Roshan G. Ragel, "Architectural Support for Security and Reliability in Embedded Processors?, PhD thesis, The University of New South Wales, Austrália, 2006 [citation][year=2006]Roshan G. Ragel, Sri Parameswaran, "Embedded security and reliability: Hardware assisted pre-emptive control flow checking for embedded processors to improve reliability?, Proceedings of the 4th international conference on Hardware/software codesign and system synthesis CODES+ISSS '06, October 2006. [citation][year=2005]Amir Rajabzadeh, Seyed Ghassem Miremadi, "A Hardware Approach to Concurrent Error Detection Capability Enhancement in COTS Processors?, in Proc. Of 11th IEEE International Symposium Pacific Rim Dependable Computing, PRDC2005, Changsha, Hunan, China, December 2005 [citation][year=2005]João Paulo Dias da Rosa, "Implementação de um pré-processador assembly para detecção de erros de fluxo de controle através da técnica CFCSS?, Tese de fim de curso, Pontifícia Universidade Católica do Rio Grande do Sul, Brasil, 2005 [citation][year=2004]A. A. Rajabzadeh, SGA Miremadi, MA Mohandespour, "Error Detection Enhancement in COTS Superscalar Processors with Performance Monitoring Features?, Journal of Electronic Testing, 2004 [citation][year=1997]C520. Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997 1984(1 publication) [publication]Madeira, H. and Gonçalves, A. and Antonio Jose Mendes and Silva, F.G. , "Bancada Modular e Evolutiva para o Ensino da Tecnologia da Informática", 1984 Book Chapters 2019(1 publication) [publication]Marilia Curado and Madeira, H. and Paulo Rupino da Cunha and Bruno Cabral and David Perez Abreu and Barata, J. and Licinio Roque and Roger Immich , "Internet of Things", in Cyber Resilience of Systems and Networks, vol. 1, pp. 381-401, 2019 2017(2 publications) [publication]Laranjeiro, N. and Pereira, G. and Soydemir, S.N. and Barbosa, R. and Jorge Bernardino and Areias, C. and Nuno Antunes and Cunha, J.C. and Marco Vieira and Madeira, H. , "Robustness and Fault Injection for the Validation of Critical Systems", in Certifications of Critical Systems – The CECRIS Experience, pp. 247-274, 2017 [publication]Ivano Irrera and Zentai, A. and Cunha, J.C. and Madeira, H. , "Validating a Safety Critical Railway Application Using Fault Injection", in Certifications of Critical Systems – The CECRIS Experience, pp. 227-246, 2017 2012(4 publications) [publication]Micskei, Z. and Majzik, I. and Madeira, H. and Marco Vieira and Nuno Antunes and Avritzer, A. , "Robustness Testing Techniques and Tools", in Resilience Assessment and Evaluation of Computing Systems, 2012 [citation][year=2014]S. Mostadi and F. Mourlin, “Training Oriented Mobile Device to Learn Software Architecture,” in eLmL 2014, The Sixth International Conference on Mobile, Hybrid, and On-line Learning, 2014, pp. 75–81. [publication]Joao Duraes and José Fonseca and Madeira, H. and Marco Vieira , "Field Studies on Resilience: Measurements and Repositories", in Resilience Assessment and Evaluation, vol. na, pp. 213-237, 2012 [publication]Barbosa, R. and Karlsson, J. and Marco Vieira and Madeira, H. , "Fault Injection", in Resilience Assessment and Evaluation, vol. 1, pp. 263-282, 2012 [publication]Marco Vieira and Madeira, H. and Sachs, K. and Kounev, S. , "Resilience Benchmarking", in Resilience Assessment and Evaluation of Computing Systems, 2012 [citation][year=2012]Anja Bog, "Benchmarking Composite Transaction and Analytical Processing Systems", University of Potsdam/Hasso-Plattner-Institut, Potsdam, Germany, June 2012. 2011(1 publication) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Building Web Services with Time Requirements", in Performance and Dependability in Service Computing: Concepts, Techniques and Research Directions, 2011 2009(1 publication) [publication]Laranjeiro, N. and Marco Vieira and Madeira, H. , "Robustness Validation in Service Oriented Architectures", in Architecting Dependable Systems VI, vol. 6, 2009 [citation][year=2013]Antonio Bovenzi, Aniello Napolitano, Christian Esposito, and Gabriella Carrozza, “JFIT: an Automatic Tool for Assessing Robustness of DDS-Compliant Middleware,” Innovative Technologies for Dependable OTS-Based Critical Systems, ed by. Domenico Cotroneo, 69–81, Springer Milan, ISBN: 978-88-470-2771-8, 978-88-470-2772-5. http://link.springer.com/chapter/10.1007/978-88-470-2772-5_6, 1 January 2013. [citation][year=2012]1. Dimitris Gritzalis, Panagiotis Katsaros, Stylianos Basagiannis, and Yannis Soupionis, “Formal analysis for robust anti-SPIT protection using model checking,” International Journal of Information Security, doi:10.1007/s10207-012-0159-4, February 2012. [citation][year=2011]1. A. Napolitano, G. Carrozza, A. Bovenzi, C. Esposito, "Automatic Robustness Assessment of DDS-Compliant Middleware", 2011 IEEE 17th Pacific Rim International Symposium on Dependable Computing (PRDC), Pasadena, CA, USA, December 2011. 2008(3 publications) [publication]Joao Duraes and Marco Vieira and Madeira, H. , "Dependability Benchmarking of Web-Servers", in Dependability Benchmarking for Computer Systems (ISBN: 978-0-470-23055-8), 2008 [publication]Marco Vieira and Joao Duraes and Madeira, H. , "Dependability Benchmarks for OLTP Systems", in Dependability Benchmarking for Computer Systems (ISBN: 978-0-470-23055-8), 2008 [citation][year=2010]1. Anakreon Mentis, Panagiotis Katsaros, Lefteris Angelis, George Kakarontzas, “Quantification of interacting runtime qualities in software architectures: insights from transaction processing in client-server architectures”, Information and Software Technology, Volume 52, Issue 12, December 2010. [publication]Olga Craveiro and Macedo, J. and Madeira, H. , "PorTexTO: sistema de anotação/extracção de expressões temporais", in Desafios na avaliação conjunta do reconhecimento de entidades mencionadas: O Segundo HAREM, pp. 159-170, 2008 2007(1 publication) [publication]Madeira, H. and Martins, E. and Moraes, R. , "Component-Based Software Certification Based on Experimental Risk Assessment", in Lecture Notes in Computer Science Volume, vol. 4746, pp. 179-197, 2007 2005(1 publication) [publication]Silva, J.G. and Madeira, H. , "Experimental Dependability Evaluation", in Dependable Computing Systems: Paradigms, Performance Issues, and Applications, 2005 2003(1 publication) [publication]Costa, D. and Madeira, H. and Carreira, J. and Silva, J.G. , "Xception?: a Software Implemented Fault Injection Tool", in Fault Injection Techniques and Tools for Embedded Systems Reliability Evaluation, 2003 2002(1 publication) [publication]Jorge Bernardino and Madeira, H. , "Data Warehouse Striping: Improved Query Response Time", in Enterprise Information Sysytems III, 2002 1992(1 publication) [publication]Madeira, H. and Silva, J.G. , "On-line Signature Learning and Checking", in Dependable Computing for Critical Applications 2, 1992 [citation][year=2006]Yasser Sedaghat, Seyed Ghassem Miremadi, Mahdi Fazeli, "A Software-Based Error Detection Technique Using Encoded Signatures," dft, pp. 389-400, 21st IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT'06), 2006. [citation][year=2004]1. B. Nicolescu, Y. Savaria, and R. Velazco, "Software Detection Mechanisms Providing Full Coverage Against Single Bit-Flip Faults?, IEEE TRANSACTIONS ON NUCLEAR SCIENCE, VOL. 51, NO. 6, DECEMBER 2004. [citation][year=2003]1. S. Bagchi, Z. Kalbarczyk, R. Iyer, Y. Levendel, "Design and Evaluation of Preemptive Control Signature (PECOS) Checking for Distributed Applications?, in IEEE Transactions on Computers, 2003. [citation][year=2003]2. B. Nicolescu, Y. Savaria, and R. Velazco, "SIED: Software implemented error detection,? in Proc. 18th IEEE Int. Symp. Defect Fault Tolerant VLSI Systems, Nov. 3"5, 2003, pp. 589"596. [citation][year=2002]1. Nahmsuk Oh, Philip P. Shirvani, and Edward J. McCluskey, "Control-Flow Checking by Software Signatures?, IEEE TRANSACTIONS ON RELIABILITY, VOL. 51, NO. 2, MARCH 2002. [citation][year=2002]2. Nahmsuk Oh, Philip P. Shirvani, and Edward J. McCluskey, "Error Detection by Duplicated Instructions in Super-Scalar Processors?, I IEEE TRANSACTIONS ON RELIABILITY, VOL. 51, NO. 1, MARCH 2002. [citation][year=2002]3. Ravishankar K. Iyer, Zbigniew Kalbarczyk, "Hardware and Software Error Detection", Book Chapter (44 pages), used in classes at the Center for Reliable and High-Performance Computing, Coordinated Science Laboratory, University of Illinois at Urbana-Champaign, 1308 W. Main Street, Urbana, IL 61801, 2002. [citation][year=2001]1. A. Benso, S. Di Carlo, G. Di Natale, P. Prinetto, L. Tagliaferri, "Control-Flow Checking Via Regular?, Expressions, IEEE Asian Test Symposium (ATS 2001), Kyoto (J), November 2001. [citation][year=2001]2. S. Bagchi, Y. Liu, K. Whisnant, Z. Kalbarczyk, R. K Iyer , "A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Contr.oller?, IEEE/IFIP Int. Conference on Dependable Systems and Networks, DSN-2001, Chalmers University of Technology, Gotemburgo, Suécia, 1 a 4 de Julho de 2001. [citation][year=2001]3. A. Benso, S Di Carlo, G. Di Natale, L. Tagliaferri, P. Prinetto, "Validation of a software dependability tool via fault injection experiments?, Proceedings of 7th IEEE Int. On-line Testing Workshop, 2001, [citation][year=2000]1. A. Benso, S. Chiusano, P.Prinetto, L. Tagliaferri "A C/C++ Source-to-Source Compiler for Dependable Applications" Proc. of DSN-2000 - The International Conference on Dependable Systems and Networks (FTCS-30, DCCA-8), New York, USA, IEEE Computer Society Press, ISBN 0-7695-0707-7, pp. 71-78., 25-28 June 2000. [citation][year=2000]2. S. Bagchi, B. Srinivasan, K. Whisnant, Z. Kalbarczyk, and R. Iyer, "Hierarchical Error Detection in a SIFT Environment,? IEEE Transactions on Knowledge and Data Engineering 12, No. 2, 203"224, March/April 2000. [citation][year=1998]1. Bernd Bieker, Erik Maehle "User Transparent Checkpointing and Restart for Parallel Computers" in "Fault Tolerant Parallel and Distributed Systems", D.R.Avresky, D.R. Kaeli (Ed.), Kluwer Academic Publishers, 1998, ISBN 0-7923-8069-X, pp.385-389. [citation][year=1998]2. B. Ramamurthy, S.J.Upadhyaya "Hardware Assisted Fast Recovery in Distributed Systems" Dependable Computing for Critical Applications 5, R.K.Iyer, M.Morganti, W.K.Fuchs,V.Gligor (Eds), IEEE Computer Society Press, 1998, ISBN 0-8186-7803-8 , pp. 224-241. [citation][year=1998]3. K. Whisnant, S. Bagchi, B. Srinivasan, Z. Kalbarczyk, R.K. Iyer, "Incorporating Reconfigurability, Error Detection and Recovery into the Chameleon ARMOR Architecture?, University of Illinois, Coordinated Science Laboratory, Thechical Report UILU-ENG-98-2227, Dezembro 1998. [citation][year=1997]1. Uwe Wildner "CASC - Compiler Assisted Self-Checking of Structural Integrity" Tese de doutoramento, Institut für Informatik, Universität Potsdam, Rep. Federal da Alemanha, Outubro 1997. [citation][year=1995]1. Miremadi G, Torin J, "Evaluating Processor-Behavior and 3 Error-Detection Mechanisms Using Physical Fault-Injection?, IEEE Transactions on Reliability vol. 44, no. 3, Setembro 1995, pp. 441-454. [citation][year=1995]2. Joakim Ohlsson, Marcus Rimen "Implicit Signature Checking" Proceedings of the 25th International Symposium on Fault-Tolerant Computing (FTCS-25), California, USA, June 1995, pp. 218-226, IEEE Computer Society. [citation][year=1995]3. Ghassem Miremadi, "Hardware and Software Mechanisms for Control Flow Checking", Tese de Doutoramento, Universidade de Chalmers, Gotemburgo, Suécia, Maio de 1995; [citation][year=1995]4. Carlos Pérez Conde, "Aportaciones a los Entornos de Desarrollo de Aplicaciones Tolerantes a Fallos?, tese de doutoramento, Departamento de Informática e Electrónica, Universidade de Valência, Espanha, 1995. [citation][year=1993]1. Ghassem Miremadi and Jan Torin, "Effects of Physical Injection of Transient Faults on Processor Behaviour and Evaluation of Three Error Detection Mechanisms: An Extended Study", Technical Report No. 173, 1993, Department of Computer Engineering, Chalmers University, Sweden; [citation][year=1992]1. Nasser A. Kanawati, Ghani A. Kanawati, and Jacob A. Abraham "Control Flow Checking in Object-Based Distributed Systems", Preprints da 3nd IFIP Working Conference on Dependable Computing for Critical Applications, DCCA-3, Mondello, Palermo, Sicilia, Itália, 14 a 16 de Setembro de 1992, pp. 111-120; [citation][year=1992]2. Pedro-Joaquín G. Vicente, "Sistema Tolerante a Fallos con Procesador de Guardia: Validación mediante Inyección Física de Fallos", Tese de Doutoramento, Universidad Politécnica de Valencia, Valencia, Setembro de 1992. [citation][year=1992]3. Sam K. Oh e Glenn H. MacEwen, "Toward Fault-Tolerant Adaptive Real-Time Distributed Systemsâ?, Department of Computing and Information Science - Queen's University - Kingston, Ontario K7L 3N6, ISSN-0836-022792 -325, Janeiro de 1992. Tech Report 2003(1 publication) [publication]Marco Vieira and Madeira, H. , "DBench ' OLTP: A Dependability Benchmark for OLTP Application Environments", 2003 [citation][year=2008]1. Joyce Coleman, Tony Lau, Bhushan Lokhande, Peter Shum, Robert Wisniewski, Mary Peterson Yost, “The Autonomic Computing Benchmark”, Dependability Benchmarking for Computer Systems, Lisa Spainhower & Karama Kanoun Eds., August 2008. [citation][year=2006]1. Bhushan Lokhande, “Quantifying System Resiliency – Autonomic Computing Benchmark”, 4th Proactive Problem Prediction, Avoidance and Diagnosis Conference, IBM T.J. Watson Research Center, Yorktown Heights, New York, USA, April 25-26, 2006. [citation][year=2005]1. A.B. Brown and P. Shum, “Measuring Resiliency of IT Systems,” presentation to the Workshop on Dependability Benchmarking organized by the Special Interest Group on Dependability Benchmarking (SIGDeB), Chicago, November 2005, http://www.laas. fr/~kanoun/Ws_SIGDeB/5-IBM.pdf. [citation][year=2005]2. Ricardo Gimenes, “Avaliação da Confiabilidade da Informação Utilizada em Sistemas de Informação e em Sistemas Críticos”, MSc Thesis, University of São Paulo, Brazil, 2005. [citation][year=2004]1. Oliver Tschache, “Deriving Dependability Measures of Measurements Recorded in a Matrix”, Organic and Pervasive Computing - International Conference on Architecture of Computing Systems, ARCS 2004, Augsburg, Germany, March 26, 2004.