Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijccbs/ijccbs7.bht:"
@article{DBLP:journals/ijccbs/AbidMKK17, author = {Khadija Abid and Leila Hayet Mouss and Okba Kazar and La{\"{\i}}d Kahloul}, title = {Formal approach based on petri nets using agent paradigm for m-maintenance}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {1}, pages = {91--117}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.084066}, doi = {10.1504/IJCCBS.2017.084066}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/AbidMKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/AmanC17, author = {Bogdan Aman and Gabriel Ciobanu}, title = {Verification of distributed systems involving bounded-time migration}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {3}, pages = {279--301}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10009410}, doi = {10.1504/IJCCBS.2017.10009410}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/AmanC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/AtmaniAA17, author = {Mouloud Atmani and Djamil A{\"{\i}}ssani and Yassine Hadjadj Aoul}, title = {Modelling and analysis data fragmentation in {IEEE} 802.15.4 slotted {CSMA/CA} protocol without {ACK} mode}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {1}, pages = {4--21}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.084061}, doi = {10.1504/IJCCBS.2017.084061}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/AtmaniAA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/BenabdelhafidBB17, author = {Maya Souilah Benabdelhafid and B{\'{e}}atrice B{\'{e}}rard and Mahmoud Boufa{\"{\i}}da}, title = {Analysing timed compatibility of web service choreography}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {3}, pages = {253--278}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10009398}, doi = {10.1504/IJCCBS.2017.10009398}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/BenabdelhafidBB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/BikiengaCG17, author = {Moustapha Bikienga and Annie Choquet{-}Geniet and Dominique Geniet}, title = {Validation of the actual behaviour of a real-time application}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {2}, pages = {190--208}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10005917}, doi = {10.1504/IJCCBS.2017.10005917}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/BikiengaCG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/CS17, author = {Pramod T. C and N. R. Sunitha}, title = {Key management infrastructure design and novel techniques to establish secure communications in critical infrastructures}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {2}, pages = {171--189}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10005916}, doi = {10.1504/IJCCBS.2017.10005916}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/CS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/Chaitou17, author = {Mohamad Chaitou}, title = {Performance evaluation of a novel redundancy method for videoconferencing traffic in {MPLS} networks}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {3}, pages = {225--252}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10009396}, doi = {10.1504/IJCCBS.2017.10009396}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/Chaitou17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/EscheikhB17, author = {Mohamed Escheikh and Kamel Barkaoui}, title = {On the dependability evaluation of a virtual multiple input multiple output link}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {1}, pages = {43--58}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.084063}, doi = {10.1504/IJCCBS.2017.084063}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/EscheikhB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/GoubermanRS17, author = {Alexander Gouberman and Martin Riedl and Markus Siegle}, title = {Analysing reward measures of {LARES} performability models by discontinuous Markov chains}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {1}, pages = {22--42}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.084062}, doi = {10.1504/IJCCBS.2017.084062}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/GoubermanRS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/LatrecheB17, author = {Fateh Latreche and Faiza Belala}, title = {A layered Petri net model to formally analyse time critical web service composition}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {2}, pages = {119--137}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10005898}, doi = {10.1504/IJCCBS.2017.10005898}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/LatrecheB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/LounasML17, author = {Razika Lounas and Mohamed Mezghiche and Jean{-}Louis Lanet}, title = {A formal verification of dynamic updating in a Java-based embedded system}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {4}, pages = {303--340}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10011024}, doi = {10.1504/IJCCBS.2017.10011024}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/LounasML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/MendozaC17, author = {Luis Eduardo Mendoza and Manuel I. Capel}, title = {A methodological approach for checking safety-critical systems software}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {4}, pages = {341--368}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10011028}, doi = {10.1504/IJCCBS.2017.10011028}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/MendozaC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/NaharS17, author = {Nadia Nahar and Kazi Sakib}, title = {Software semantics and syntax as a tool for automated test generation}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {4}, pages = {369--396}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10011030}, doi = {10.1504/IJCCBS.2017.10011030}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/NaharS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/PriscoliGEFFMP17, author = {Francesco Delli Priscoli and Alessandro Di Giorgio and Mariana Esposito and Andrea Fiaschetti and Francesco Flammini and Silvano Mignanti and Concetta Pragliola}, title = {Ensuring cyber-security in smart railway surveillance with {SHIELD}}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {2}, pages = {138--170}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10005914}, doi = {10.1504/IJCCBS.2017.10005914}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/PriscoliGEFFMP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/RebouhANB17, author = {Nadjette Rebouh and Ifeticene Ryma Asma and Aidoun Naoual and Louiza Bouallouche{-}Medjkoune}, title = {Failure detector-Ring Paxos-based atomic broadcast algorithm}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {1}, pages = {78--90}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.084065}, doi = {10.1504/IJCCBS.2017.084065}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/RebouhANB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/SanjeeviV17, author = {P. Sanjeevi and P. Viswanathan}, title = {Smart homes IoT techniques for dynamic provision of cloud benefactors}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {3}, pages = {209--224}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.10009395}, doi = {10.1504/IJCCBS.2017.10009395}, timestamp = {Mon, 04 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/SanjeeviV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijccbs/YazidBA17, author = {Mohand Yazid and Louiza Bouallouche{-}Medjkoune and Djamil A{\"{\i}}ssani}, title = {Modelling and performance analysis of video and voice streams in the {IEEE} 802.11e-EDCA WLANs with {TXOP} bursting under fading channel}, journal = {Int. J. Crit. Comput. Based Syst.}, volume = {7}, number = {1}, pages = {59--77}, year = {2017}, url = {https://doi.org/10.1504/IJCCBS.2017.084064}, doi = {10.1504/IJCCBS.2017.084064}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijccbs/YazidBA17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.