EDCC 2008 START Conference Manager    

7th European Dependable Computing Conference

EDCC 2008

Submission Page

To revise a previous submission, please type in its passcode below, and press the ENTER button.


If you lost the passcode for your submission, please click HERE.

To make a new submission, please fill in the form below, and then press the submit button at the bottom.

Title of Submission:  

List of Authors:

Please enter the complete list of authors for your submission, in the order in which they will appear on the abstract. You can add as many author slots as you want, to accommodate the total number of authors for your submission.

First name(s) Last name Email Institution

More Authors      Fewer Authors

Contact Information:

First name*
Last name*
       Affiliation Dept/Lab 
Mail Code 
Street Address 
Zip/Postal Code*

Submission Category:

Please enter the category under which the submission should be reviewed.

Type of Submission:  


Type (or cut-and-paste) a short ASCII summary for your submission. It should not include the author/title information, which was already entered above. You must enter plain ASCII text only, and you may not exceed 150 words.


Submit Paper:

Your submission must be in one of the following document formats:

  • Adobe PDF (pdf)
  • Postscript (ps)

The file's name should have the proper MIME extent associated with its document type. For example, a pdf file could have a name such as "mypaper.pdf". If desired, the file may also be compressed in any standard format, with MIME extent corresponding to the compression type (eg., pdf.gz for a gzipped pdf file, etc.).

Find the file containing your submission: 


Please use the list of topics below to characterize your submission. Check all categories that seem appropriate.

Architectures for dependable systems
Fault tolerance in databases and transactional systems
Architecture and protocols for security
Fault tolerance in real-time systems
Critical infrastructure protection
Fault tolerance in multimedia systems
Dependability for mobile systems
Hardware and software testing, verification, and validation.
Dependability in high-bandwidth and system area networks.
Human factors.
Dependability measurement, modeling, and evaluation.
Formal methods for dependability.
Dependability in SOA and middleware
Information assurance, survivability, and intrusion tolerance
Dependability in wireless sensor and ad hoc networks
Internet dependability and quality of service
Dependability in high performance and grid systems
Safety-critical systems
Dependability in business and e-commerce applications
Software reliability engineering
Dependability in data streaming
Dependability benchmarking
Software engineering for dependability
Fault tolerant distributed systems
Other topic in dependability

START Conference Manager (V2.61.0)