Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ssiri/sere2012.bht:"
@inproceedings{DBLP:conf/ssiri/AlomariM12, author = {Firas B. Alomari and Daniel A. Menasc{\'{e}}}, title = {An Autonomic Framework for Integrating Security and Quality of Service Support in Databases}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {51--60}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.15}, doi = {10.1109/SERE.2012.15}, timestamp = {Wed, 16 Oct 2019 14:14:57 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/AlomariM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/BarbhuiyaGBN12, author = {Ferdous A. Barbhuiya and Vaibhav Gupta and Santosh Biswas and Sukumar Nandi}, title = {Detection and Mitigation of Induced Low Rate TCP-Targeted Denial of Service Attack}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {291--300}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.27}, doi = {10.1109/SERE.2012.27}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/BarbhuiyaGBN12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/BuchlerOP12, author = {Matthias B{\"{u}}chler and Johan Oudinet and Alexander Pretschner}, title = {Semi-Automatic Security Testing of Web Applications from a Secure Model}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {253--262}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.38}, doi = {10.1109/SERE.2012.38}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/BuchlerOP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChengLS12, author = {Yun{-}Min Cheng and Bing{-}Han Li and Shiuhpyng Winston Shieh}, title = {Accelerating Taint-Based Concolic Testing by Pruning Pointer Overtaint}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {187--196}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.31}, doi = {10.1109/SERE.2012.31}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChengLS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ChoiJB12, author = {Jinho Choi and Eunkyoung Jee and Doo{-}Hwan Bae}, title = {Toward Systematic Construction of Timing Diagrams from {UML/MARTE} Behavioral Models for Time-Triggered Embedded Software}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {118--127}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.24}, doi = {10.1109/SERE.2012.24}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ChoiJB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/DelahayeBGP12, author = {Micka{\"{e}}l Delahaye and Lionel C. Briand and Arnaud Gotlieb and Matthieu Petit}, title = {{\(\mathrm{\mu}\)}TIL: Mutation-based Statistical Test Inputs Generation for Automatic Fault Localization}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {197--206}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.32}, doi = {10.1109/SERE.2012.32}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/DelahayeBGP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/FethP12, author = {Denis Feth and Alexander Pretschner}, title = {Flexible Data-Driven Security for Android}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {41--50}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.14}, doi = {10.1109/SERE.2012.14}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/FethP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/HuangCSL12, author = {Yu{-}Lun Huang and Borting Chen and Ming{-}Wei Shih and Chien{-}Yu Lai}, title = {Security Impacts of Virtualization on a Network Testbed}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {71--77}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.17}, doi = {10.1109/SERE.2012.17}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/HuangCSL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/HuangHHLLL12, author = {Shih{-}Kun Huang and Min{-}Hsiang Huang and Po{-}Yen Huang and Chung{-}Wei Lai and Han{-}Lin Lu and Wai{-}Meng Leong}, title = {{CRAX:} Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {78--87}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.20}, doi = {10.1109/SERE.2012.20}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/HuangHHLLL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/Hussein12, author = {Sari Haj Hussein}, title = {A Precise Information Flow Measure from Imprecise Probabilities}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {128--137}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.25}, doi = {10.1109/SERE.2012.25}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/Hussein12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/JiangDZY12, author = {Jianchun Jiang and Liping Ding and Ennan Zhai and Ting Yu}, title = {VRank: {A} Context-Aware Approach to Vulnerability Scoring and Ranking in {SOA}}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {61--70}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.16}, doi = {10.1109/SERE.2012.16}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/JiangDZY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/KuoHL12, author = {Chih{-}Song Kuo and Chin{-}Yu Huang and Shao{-}Pu Luan}, title = {A Study of Using Two-Parameter Generalized Pareto Model to Analyze the Fault Distribution of Open Source Software}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {88--97}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.21}, doi = {10.1109/SERE.2012.21}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/KuoHL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LaranjeiraR12, author = {Luiz A. Laranjeira and Gena{\'{\i}}na Nunes Rodrigues}, title = {Extending the Reliability of Wireless Sensor Networks through Informed Periodic Redeployment}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {167--176}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.29}, doi = {10.1109/SERE.2012.29}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/LaranjeiraR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LeT12, author = {Michael Le and Yuval Tamir}, title = {Applying Microreboot to System Software}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {11--20}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.11}, doi = {10.1109/SERE.2012.11}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LeT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LemosM12, author = {Gizelle Sandrini Lemos and Eliane Martins}, title = {Specification-guided Golden Run for Analysis of Robustness Testing Results}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {157--166}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.28}, doi = {10.1109/SERE.2012.28}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LemosM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LinCLY12, author = {Chien{-}Cheng Lin and Chin{-}Chun Chang and Deron Liang and Ching{-}Han Yang}, title = {A New Non-Intrusive Authentication Method Based on the Orientation Sensor for Smartphone Users}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {245--252}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.37}, doi = {10.1109/SERE.2012.37}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LinCLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LinKT12, author = {Hsiao{-}Ying Lin and John Kubiatowicz and Wen{-}Guey Tzeng}, title = {A Secure Fine-Grained Access Control Mechanism for Networked Storage Systems}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {225--234}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.35}, doi = {10.1109/SERE.2012.35}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LinKT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/LuD12, author = {Gen Lu and Saumya K. Debray}, title = {Automatic Simplification of Obfuscated JavaScript Code: {A} Semantics-Based Approach}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {31--40}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.13}, doi = {10.1109/SERE.2012.13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/LuD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/MohamedZ12, author = {Atef Mohamed and Mohammad Zulkernine}, title = {A Control Flow Representation for Component-Based Software Reliability Analysis}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {1--10}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.33}, doi = {10.1109/SERE.2012.33}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/MohamedZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/MohosinaZ12, author = {Amatul Mohosina and Mohammad Zulkernine}, title = {{DESERVE:} {A} Framework for Detecting Program Security Vulnerability Exploitations}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {98--107}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.22}, doi = {10.1109/SERE.2012.22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/MohosinaZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/MurmuriaMSV12, author = {Rahul Murmuria and Jeffrey Medsger and Angelos Stavrou and Jeffrey M. Voas}, title = {Mobile Application and Device Power Usage Measurements}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {147--156}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.19}, doi = {10.1109/SERE.2012.19}, timestamp = {Thu, 15 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/MurmuriaMSV12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ParkKSB12, author = {Jinhee Park and Hyeon{-}Jeong Kim and Ju{-}Hwan Shin and Jongmoon Baik}, title = {An Embedded Software Reliability Model with Consideration of Hardware Related Software Failures}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {207--214}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.10}, doi = {10.1109/SERE.2012.10}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ParkKSB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/RawatM12, author = {Sanjay Rawat and Laurent Mounier}, title = {Finding Buffer Overflow Inducing Loops in Binary Executables}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {177--186}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.30}, doi = {10.1109/SERE.2012.30}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/RawatM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/SibaiM12, author = {Faisal M. Sibai and Daniel A. Menasc{\'{e}}}, title = {Countering Network-Centric Insider Threats through Self-Protective Autonomic Rule Generation}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {273--282}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.40}, doi = {10.1109/SERE.2012.40}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/SibaiM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/SmithW12, author = {Ben H. Smith and Laurie A. Williams}, title = {On the Effective Use of Security Test Patterns}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {108--117}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.23}, doi = {10.1109/SERE.2012.23}, timestamp = {Mon, 07 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/SmithW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/WangCFLY12, author = {Yabin Wang and Zhenyu Chen and Yang Feng and Bin Luo and Yijie Yang}, title = {Using Weighted Attributes to Improve Cluster Test Selection}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {138--146}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.18}, doi = {10.1109/SERE.2012.18}, timestamp = {Thu, 28 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ssiri/WangCFLY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/WongDLG12, author = {W. Eric Wong and Vidroha Debroy and Yihao Li and Ruizhi Gao}, title = {Software Fault Localization Using DStar (D*)}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {21--30}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.12}, doi = {10.1109/SERE.2012.12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/WongDLG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/XiaoD12, author = {Xiao Xiao and Tadashi Dohi}, title = {Robust Wavelet Shrinkage Estimation without Data Transform for Software Reliability Assessment}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {215--224}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.34}, doi = {10.1109/SERE.2012.34}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/XiaoD12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/XuXBW12, author = {Dianxiang Xu and Weifeng Xu and Bharath K. Bavikati and W. Eric Wong}, title = {Mining Executable Specifications of Web Applications from Selenium {IDE} Tests}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {263--272}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.39}, doi = {10.1109/SERE.2012.39}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/XuXBW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/YaseenP12, author = {Qussai Yaseen and Brajendra Panda}, title = {Mitigating Insider Threat without Limiting the Availability in Concurrent Undeclared Tasks}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {235--244}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.36}, doi = {10.1109/SERE.2012.36}, timestamp = {Sat, 16 Sep 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/YaseenP12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ssiri/ZhangJJSHG12, author = {Hehua Zhang and Yu Jiang and Xun Jiao and Xiaoyu Song and William N. N. Hung and Ming Gu}, title = {Reliability Analysis of {PLC} Systems by Bayesian Network}, booktitle = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, pages = {283--290}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/SERE.2012.26}, doi = {10.1109/SERE.2012.26}, timestamp = {Mon, 16 Apr 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/ZhangJJSHG12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ssiri/2012, title = {Sixth International Conference on Software Security and Reliability, {SERE} 2012, Gaithersburg, Maryland, USA, 20-22 June 2012}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/xpl/conhome/6257299/proceeding}, isbn = {978-0-7695-4742-8}, timestamp = {Wed, 16 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ssiri/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.