The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Corruption with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1980-1997 (23) 1998-1999 (25) 2000 (15) 2001 (15) 2002 (29) 2003 (22) 2004 (27) 2005 (57) 2006 (38) 2007 (78) 2008 (71) 2009 (45) 2010 (18) 2011 (21) 2012 (27) 2013 (25) 2014 (26) 2015 (29) 2016 (37) 2017 (45) 2018 (48) 2019 (69) 2020 (61) 2021 (96) 2022 (89) 2023 (93) 2024 (30)
Publication types (Num. hits)
article(452) data(1) incollection(6) inproceedings(688) phdthesis(12)
Venues (Conferences, Journals, ...)
CoRR(121) IACR Cryptol. ePrint Arch.(13) DSN(12) ICEGOV(12) IEEE Access(11) Gov. Inf. Q.(10) ICML(10) Sci. Eng. Ethics(10) CRYPTO(9) DG.O(9) CVPR(8) IEEE Trans. Image Process.(8) CCS(7) DISC(7) ICASSP(7) ICPR(7) More (+10 of total 613)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 472 occurrences of 363 keywords

Results
Found 1159 publication records. Showing 1159 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
126Marco Celentani, Juan-José Ganuza Organized vs. Competitive Corruption. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF competitive and organized corruption, institutional response
96Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Garth R. Goodson, Bianca Schroeder An analysis of data corruption in the storage stack. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2008 DBLP  DOI  BibTeX  RDF disk drive reliability, Data corruption
96Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
85Johan Huysmans, Bart Baesens, Jan Vanthienen A Data Miner's Approach to Country Corruption Analysis. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
85Feng Qin, Shan Lu 0001, Yuanyuan Zhou 0001 SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. Search on Bibsonomy HPCA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
80Vassilis Zikas, Sarah Hauser, Ueli M. Maurer Realistic Failures in Secure Multi-party Computation. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
76Ricardo Matheus, Manuella Maia Ribeiro Online anti-corruption tools in Latin America. Search on Bibsonomy ICEGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anti-corruption online tools, e-governance, e-government, Latin America
76Jun Xu 0003, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt Automatic diagnosis and response to memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack diagnosis, memory corruption attack, randomization, message filtering
75Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal 0001, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift Analyzing the effects of disk-pointer corruption. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
71Bernd Altmann, Matthias Fitzi, Ueli M. Maurer Byzantine Agreement Secure against General Adversaries in the Dual Failure Model. Search on Bibsonomy DISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF active adversary, fail-corruption, Broadcast, Byzantine agreement, unconditional security
66Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz, S. Sudarshan 0001 Detection and Recovery Techniques for Database Corruption. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Database corruption, fault tolerance, data integrity, main-memory database, database recovery
65Nicolae Costake Anti-corruption Information Systems and e-Government in Transforming Countries. A Point of View. Search on Bibsonomy EGOV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
62Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau Limiting trust in the storage stack. Search on Bibsonomy StorageSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF pointer corruption, type-aware corruption, verifiable invariants
61Hans Vandierendonck, André Seznec Speculative return address stack management revisited. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Return address prediction, back-up predictor, corruption detection
60Ji Ming Noise compensation for speech recognition with arbitrary additive noise. Search on Bibsonomy IEEE Trans. Speech Audio Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
56Volker Heydegger Just One Bit in a Million: On the Effects of Data Corruption in Files. Search on Bibsonomy ECDL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF file format robustness, data integrity, digital preservation, error resilience, bit error, file format, data corruption
55Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini Corruption-Localizing Hashing. Search on Bibsonomy ESORICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
55Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel Country Corruption Analysis with Self Organizing Maps and Support Vector Machines. Search on Bibsonomy WISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
50Martin Hirt, Ueli M. Maurer, Vassilis Zikas MPC vs. SFE : Unconditional and Computational Security. Search on Bibsonomy ASIACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Swetha Krishnan, Giridhar Ravipati, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Barton P. Miller The effects of metadata corruption on nfs. Search on Bibsonomy StorageSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF metadata corruption, retry, silent failure, fault tolerance, reliability, inconsistency, NFS
45Yan Zhang, Xindong Wu 0001 Noise Modeling with Associative Corruption Rules. Search on Bibsonomy ICDM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
45Joel Sing, Ben Soh Improving TCP Performance: Identifying Corruption Based Packet Loss. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
42Kikuo Fujimura, Pankaj Jalote On Robustness of B-Trees. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF index corruption, pointer corruption, structural error, data structure, robustness, correctability, B-trees, tree data structures, semantic information
41Kyriacos E. Pavlou, Richard T. Snodgrass Forensic analysis of database tampering. Search on Bibsonomy SIGMOD Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF append-only, corruption diagram, forensic strength, cryptographic hash function
40Ignacio Cascudo Pueyo, Hao Chen 0095, Ronald Cramer, Chaoping Xing Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
40Zheng Zeng 0001, P. R. Kumar 0001 Towards optimally exploiting physical layer information in OFDM wireless networks. Search on Bibsonomy WICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
40Ji Ming, Peter Jancovic, Francis Jack Smith Robust speech recognition using probabilistic union models. Search on Bibsonomy IEEE Trans. Speech Audio Process. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
35Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak Silent Data Corruption - Myth or reality? Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Yufei Tao 0001, Xiaokui Xiao, Jiexing Li, Donghui Zhang On Anti-Corruption Privacy Preserving Publication. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Abhisek Pan, James W. Tschanz, Sandip Kundu A Low Cost Scheme for Reducing Silent Data Corruption in Large Arithmetic Circuit. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Mohammad Ravanbakhsh, Mehdi M. Hassanzadeh, Dag Haugland Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. Search on Bibsonomy ICMCTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Eric Medvet, Alberto Bartoli On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. Search on Bibsonomy DIMVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
35Alexander Zimmermann 0001, Daniel Schaffrath, Michael Faber, Martin Wenig, Mesut Günes Improving tcp performance through explicit corruption and route failure notification (ecrfn). Search on Bibsonomy MSWiM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF loss differentiation algorithm (lda), transport control protocol (tcp), wireless mesh network (wmn)
35Wesley M. Eddy, Shawn Ostermann, Mark Allman New techniques for making transport protocols robust to corruption-based loss. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
31Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal 0001, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau IRON file systems. Search on Bibsonomy SOSP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IRON file systems, block corruption, fail-partial failure model, latent sector errors, fault tolerance, reliability, redundancy, storage, internal, disks
31Royan H. L. Ong, Michael J. Pont Empirical comparison of software-based error detection and correction techniques for embedded systems. Search on Bibsonomy CODES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NOP fill, electromagnetic interference, function token, instruction pointer corruption, software-based error detection techniques, embedded systems, EMI
31Vinicius Santos de Abreu, Tadeu Moreira de Classe EndGame for Corruption - A DPE-Based Framework to Support the Design of Serious Games for Fight Against Corruption. Search on Bibsonomy J. Interact. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
31Anupriya Khan, Satish Krishnan Moderating effects of business-systems corruption on corruption in basic national institutions and electronic government maturity: Insights from a dynamic panel data analysis. Search on Bibsonomy Int. J. Inf. Manag. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
31Farjana Sultana Mim, Naoya Inoue, Paul Reisert, Hiroki Ouchi, Kentaro Inui Corruption Is Not All Bad: Incorporating Discourse Structure Into Pre-Training via Corruption for Essay Scoring. Search on Bibsonomy IEEE ACM Trans. Audio Speech Lang. Process. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
31Stefan Gries 0001 Information Flow Monitoring in Cyber-Physical Systems: Nachvollziehen von Cascading Data Corruption in CPS (Information flow monitoring in cyber-physical systems: tracking cascading data corruption in CPS) (PDF / PS) Search on Bibsonomy 2021   DOI  RDF
31Farjana Sultana Mim, Naoya Inoue, Paul Reisert, Hiroki Ouchi, Kentaro Inui Corruption Is Not All Bad: Incorporating Discourse Structure into Pre-training via Corruption for Essay Scoring. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
31Issa Luna-Pla, José R. Nicolás-Carlock Corruption and complexity: a scientific framework for the analysis of corruption networks. Search on Bibsonomy Appl. Netw. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
31Yohan Boyer Étude et conception de méthodes de protection face aux attaques par corruption de mémoire pour systèmes embarqués dans le contexte de l'Internet des Objets. (Study and design of protection methods against memory corruption attacks for embedded systems in the context of the Internet of Things). Search on Bibsonomy 2020   RDF
31Ján Hunady The effect of the Internet on corruption awareness and corruption incidence in the EU. Search on Bibsonomy Inf. Polity The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
31Ibrahim Inuwa, Muhammadou M. O. Kah, Chidi G. Ononiwu Understanding How the Traditional and Information Technology Anti-Corruption Strategies intertwine to Curb Public Sector Corruption: A Systematic Literature Review. Search on Bibsonomy PACIS The full citation details ... 2019 DBLP  BibTeX  RDF
31Kristin Smith-Crowe, Danielle E. Warren The Emotion-Evoked Collective Corruption Model: The Role of Emotion in the Spread of Corruption Within Organizations. Search on Bibsonomy Organ. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
30John Carlo Bertot, Paul T. Jaeger, Justin M. Grimes Crowd-sourcing transparency: ICTs, social media, and government transparency initiatives. Search on Bibsonomy DG.O The full citation details ... 2010 DBLP  BibTeX  RDF crowd-sourcing, open government, transparency
30Anders Pettersson, Daniel Sundmark, Henrik Thane, Dag Nyström Shared Data Analysis for Multi-Tasking Real-Time System Testing. Search on Bibsonomy SIES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30William Leal, Anish Arora Scalable Self-Stabilization via Composition. Search on Bibsonomy ICDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Matthias Fitzi, Martin Hirt, Ueli M. Maurer Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing
25 Data Corruption. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Laurent Mazaré, Bogdan Warinschi Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. Search on Bibsonomy ARSPA-WITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Shlomi Dolev, Nir Tzachar Brief Announcment: Corruption Resilient Fountain Codes. Search on Bibsonomy DISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Michael Kara-Ivaniov, Eran Iceland, Aviad Kipnis Attacks on Authentication and Signature Schemes Involving Corruption of Public Key (Modulus). Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25David P. Woodruff Corruption and Recovery-Efficient Locally Decodable Codes. Search on Bibsonomy APPROX-RANDOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Meng Yu 0001, Wanyu Zang, Peng Liu 0005 Database Isolation and Filtering against Data Corruption Attacks. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Paul Beame, Toniann Pitassi, Nathan Segerlind, Avi Wigderson A Strong Direct Product Theorem for Corruption and the Multiparty Communication Complexity of Disjointness. Search on Bibsonomy Comput. Complex. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 06D15, 68Q17, 68Q15, 06E30, Subject classification. 68Q10
25Xiaojian Tian, Duncan S. Wong Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. Search on Bibsonomy CT-RSA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF MT-authenticator, BCK-model, CK-model, Verifiable Encryption
25Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer Defeating Memory Corruption Attacks via Pointer Taintedness Detection. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Paul Beame, Toniann Pitassi, Nathan Segerlind, Avi Wigderson A Direct Sum Theorem for Corruption and the Multiparty NOF Communication Complexity of Set Disjointness. Search on Bibsonomy CCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Emmanuel Briot, Franco Gasperoni, Robert Dewar, Dirk Craeynest, Philippe Waroquiers Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada. Search on Bibsonomy Ada-Europe The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Daniel Barbará, Rajni Goel, Sushil Jajodia Using Checksums to Detect Data Corruption. Search on Bibsonomy EDBT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
21Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber DRAM errors in the wild: a large-scale field study. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dimm, dram reliability, ecc, hard error, empirical study, memory, soft error, dram, large-scale systems, data corruption
21Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation
21G. Julián Casasbuenas, G. Alejandro Barrera, M. Olga P. Paz From the internet for accountability project to the territorial e-government strategy in Colombia. Search on Bibsonomy ICEGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fight against corruption, internet for accountability, municipality internet portal, accessibility, open source software
21R. Krishnan, S. Murali Krishna, Nishil Bharill Code quality tools: learning from our experience. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2007 DBLP  DOI  BibTeX  RDF buffer overflow and memory corruption, memory leak, code quality
21Allan Crone, Gabriel Chidolue Functional Verification of Low Power Designs at RTL. Search on Bibsonomy PATMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Low power aware management, Corruption, UPF, Simulation, Retention, PCF
21Sam Peng, Ying Hu IAnticorruption: a domain-driven design approach to more robust integration. Search on Bibsonomy OOPSLA Companion The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anti-corruption layer, observer pattern, integration, domain model, domain-driven design
21Changsik Park, John J. Metzner Efficient Location of Discrepancies in Multiple Replicated Large Files. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF signature, fault location, data consistency, communication efficiency, Replicated files, file comparison, data corruption
21Carsten Griwodz, Oliver Merkel, Jana Dittmann, Ralf Steinmetz Protecting VoD the Easier Way. Search on Bibsonomy ACM Multimedia The full citation details ... 1998 DBLP  DOI  BibTeX  RDF corruption, vidio-on-demand, multimedia, copyright protection
21Frank K. Hwang, Wenan Zang Detecting Corrupted Pages in M Replicated Large Files. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF fault detection, Reed-Solomon code, Data consistency, file comparison, data corruption
20Mikhail J. Atallah, Keith B. Frikken Securely outsourcing linear algebra computations. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF computational outsourcing, privacy, cryptographic protocols
20Benjamin G. Zorn Performance is dead, long live performance! Search on Bibsonomy CGO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF code generation
20Vijay Nagarajan, Dennis Jeffrey, Rajiv Gupta 0001 Self-recovery in server programs. Search on Bibsonomy ISMM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF memory propagation, self cleansing, self recovery
20Yair Amir, Paul Bunn, Rafail Ostrovsky Authenticated Adversarial Routing. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF End-to-End Communication, Communication Complexity, Error-Correction, Network Routing, Fault Localization, Multi-Party Computation
20Aviv Dagan, Eliezer Dekel ITRA under Partitions. Search on Bibsonomy NGITS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF split-brain, multi-tier environment, ITRA, web services, SOA, partitions
20Yutaka Oiwa Implementation of the memory-safe full ANSI-C compiler. Search on Bibsonomy PLDI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF c language, memory safety
20Asia Slowinska, Herbert Bos Pointless tainting?: evaluating the practicality of pointer tainting. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF dynamic taint analysis, pointer tainting
20Irene Finocchi, Giuseppe F. Italiano Sorting and Searching in Faulty Memories. Search on Bibsonomy Algorithmica The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Memory faults, Computing with unreliable information, Searching, Sorting, Memory models, Combinatorial algorithms
20Nuno C. Martins, Tsachy Weissman Coding for Additive White Noise Channels With Feedback Corrupted by Quantization or Bounded Noise. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Sandeep Bhatkar, R. Sekar 0001 Data Space Randomization. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF address space randomization, buffer overflow, memory error
20Serkan Kiranyaz, Moncef Gabbouj Hierarchical Cellular Tree: An Efficient Indexing Scheme for Content-Based Retrieval on Multimedia Databases. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Ram Kumar 0001, Eddie Kohler, Mani B. Srivastava Harbor: software-based memory protection for sensor nodes. Search on Bibsonomy IPSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software fault isolation, memory protection
20Ivan Damgård, Jesper Buus Nielsen Scalable and Unconditionally Secure Multiparty Computation. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Eric J. Balster, Yuan F. Zheng, Robert L. Ewing Combined spatial and temporal domain wavelet shrinkage algorithm for video denoising. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Pei-Eng Ng, Kai-Kuang Ma A switching median filter with boundary discriminative noise detection for extremely corrupted images. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Fabrício Benevenuto, Cristiano P. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, Jussara M. Almeida, Miranda Mowbray Impact of peer incentives on the dissemination of polluted content. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF content pollution, peer incentive, peer-to-peer networks
20Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina Nolte Self-stabilizing Mobile Node Location Management and Message Routing. Search on Bibsonomy Self-Stabilizing Systems The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Francisco Díaz Pérez, Raul Malutan, Pedro Gómez 0001, María Victoria Rodellar Biarge, Carlos García Puntonet Robust Processing of Microarray Data by Independent Component Analysis. Search on Bibsonomy IWANN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Heng Xu, Arun K. Somani Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime. Search on Bibsonomy PRDC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok An electric fence for kernel buffers. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, file systems, buffer overflow
20Jian-ming Wang, Run-tao Ding Iris Image Denoising Algorithm Based on Phase Preserving. Search on Bibsonomy PDCAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Bryan Parno, Mema Roussopoulos Defending a P2P Digital Preservation System. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF backup/recovery, libraries/information repositories/publishing, peer-to-peer digital preservation, Distributed applications, model development, protection mechanisms
20Dave Ahmad The Rising Threat of Vulnerabilities Due to Integer Errors. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Yichen Xie 0001, Andy Chou, Dawson R. Engler ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. Search on Bibsonomy ESEC / SIGSOFT FSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF memory access errors, security, static analysis, error detection, buffer overflow, buffer overrun
20Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun Experimental Analysis of the Errors Induced into Linux by Three Fault Injection Techniques. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Yu-Kuen Ho, Mei-Yi Wu, Jia-Hong Lee Texture classification based on statistical steganographic techniques. Search on Bibsonomy APCCAS (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Christophe Genolini, Sébastien Tixeuil A Lower Bound on Dynamic k-Stabilization in Asynchronous Systems. Search on Bibsonomy SRDS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Dynamic problems, Lower bound, Self-stabilization, Asynchronous systems, Transient failures, Time adaptivity
20Wee Teck Ng, Peter M. Chen The Systematic Improvement of Fault Tolerance in the Rio File Cache. Search on Bibsonomy FTCS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF write-back file cache, reliable memory, software fault injection
20Neal R. Harvey, Stephen Marshall Application of Non-Linear Image Processing: Digital Video Archive Restoration. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 1159 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license