![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 57 matches
- 2009
- David de Andrés, Jesus Friginal
, Juan-Carlos Ruiz-Garcia
, Pedro J. Gil:
An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks. PRDC 2009: 228-233 - Antonio Fernández Anta
, Miguel A. Mosteiro, Christopher Thraves
:
An Early-Stopping Protocol for Computing Aggregate Functions in Sensor Networks. PRDC 2009: 357-364 - Nuno Antunes
, Marco Vieira
:
Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. PRDC 2009: 301-306 - Hakem Beitollahi, Geert Deconinck
:
Making Overlay Networks more Robust to Massive Failures. PRDC 2009: 214-221 - Lizhi Cai, Weiqin Tong, Zhenyu Liu, Juan Zhang:
Test Case Reuse Based on Ontology. PRDC 2009: 103-108 - Andrea Ceccarelli
, Andrea Bondavalli
, Danilo Iovino:
Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection. PRDC 2009: 234-241 - Chi-Yuan Chen, Yu-Shan Liang, Chia-Mu Yu, Chih-Hsiang Ho, Sy-Yen Kuo:
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. PRDC 2009: 282- - Pedro Costa
, João Gabriel Silva
, Henrique Madeira
:
Dependability Benchmarking Using Software Faults: How to Create Practical and Representative Faultloads. PRDC 2009: 289-294 - Maria Couceiro, Paolo Romano
, Nuno Carvalho, Luís E. T. Rodrigues:
D2STM: Dependable Distributed Software Transactional Memory. PRDC 2009: 307-313 - Shih-Yao Dai, Fyodor Yarochkin, Jain-Shing Wu, Chih-Hung Lin, Yennun Huang
, Sy-Yen Kuo
:
Holography: A Hardware Virtualization Tool for Malware Analysis. PRDC 2009: 263-268 - Maobing Dai, Yutaka Ishikawa:
Delayed Processing Technique in Critical Sections for Real-Time Linux. PRDC 2009: 269-275 - Wanfu Ding, Ruifeng Guo:
Enhancing the Success Rate of Primary Version While Guaranteeing Fault-Tolerant Capability for Real-Time Systems. PRDC 2009: 351-356 - Jianbo Dong, Lei Zhang, Yinhe Han, Guihai Yan, Xiaowei Li:
Variation-Aware Scheduling for Chip Multiprocessors with Thread Level Redundancy. PRDC 2009: 17-22 - Roberto Jung Drebes, Takashi Nanya:
Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel Reliability. PRDC 2009: 295-300 - Binzhang Fu, Yinhe Han, Huawei Li, Xiaowei Li:
A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes. PRDC 2009: 276-281 - Jianhua Gao, Yuefeng Hu:
A Novel Generation Algorithm of Pair-Wise Testing Cases. PRDC 2009: 43-48 - Jianhua Gao, Jie Zhu:
Prioritized Test Generation Strategy for Pair-Wise Testing. PRDC 2009: 99-102 - Brian T. Gold, Babak Falsafi, James C. Hoe:
Chip-Level Redundancy in Distributed Shared-Memory Multiprocessors. PRDC 2009: 195-201 - Tobias Goldschmidt, Andreas Dittrich, Miroslaw Malek:
Quantifying Criticality of Dependability-Related IT Organization Processes in CobiT. PRDC 2009: 336-341 - Dai Hong, Haibo Li:
A Lightweight Network Intrusion Detection Model Based on Feature Selection. PRDC 2009: 165-168 - Xiaoying Hu, Shiyi Xu:
A Synthesis Software Reliability Model. PRDC 2009: 31-36 - Ang Jin, Jianhui Jiang:
Fault Injection Scheme for Embedded Systems at Machine Code Level and Verification. PRDC 2009: 55-62 - Masaya Kadono, Tatsuhiro Tsuchiya
, Tohru Kikuno:
Using the NuSMV Model Checker for Test Generation from Statecharts. PRDC 2009: 37-42 - Dong Seong Kim
, Fumio Machida, Kishor S. Trivedi:
Availability Modeling and Analysis of a Virtualized System. PRDC 2009: 365-371 - Masato Kitakami, Akihiro Katada, Kazuteru Namba, Hideo Ito:
Dependability Evaluation for Internet-Based Remote Systems. PRDC 2009: 256-259 - Mikel Larrea, Cristian Martín:
Quiescent Leader Election in Crash-Recovery Systems. PRDC 2009: 325-330 - Sang Min Lee, Dong Seong Kim
, YoungHyun Yoon, Jong Sou Park:
Quantitative Intrusion Intensity Assessment Using Important Feature Selection and Proximity Metrics. PRDC 2009: 127-134 - Matthew Leeke, Arshad Jhumka:
Evaluating the Use of Reference Run Models in Fault Injection Analysis. PRDC 2009: 121-124 - Yong-mei Lei, Yu Yan, Shao-jun Chen:
Parallel Training Strategy Based on Support Vector Regression Machine. PRDC 2009: 159-164 - Kunbo Li, Ryota Shioya, Masahiro Goshima, Shuichi Sakai
:
String-Wise Information Flow Tracking against Script Injection Attacks. PRDC 2009: 169-176
skipping 27 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-15 17:34 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint