|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 472 occurrences of 363 keywords
|
|
|
Results
Found 1159 publication records. Showing 1159 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
126 | Marco Celentani, Juan-José Ganuza |
Organized vs. Competitive Corruption. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
competitive and organized corruption, institutional response |
96 | Lakshmi N. Bairavasundaram, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Garth R. Goodson, Bianca Schroeder |
An analysis of data corruption in the storage stack. |
ACM Trans. Storage |
2008 |
DBLP DOI BibTeX RDF |
disk drive reliability, Data corruption |
96 | Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 |
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
memory corruption, debugging, vulnerability analysis |
85 | Johan Huysmans, Bart Baesens, Jan Vanthienen |
A Data Miner's Approach to Country Corruption Analysis. |
Intelligence and Security Informatics |
2008 |
DBLP DOI BibTeX RDF |
|
85 | Feng Qin, Shan Lu 0001, Yuanyuan Zhou 0001 |
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. |
HPCA |
2005 |
DBLP DOI BibTeX RDF |
|
80 | Vassilis Zikas, Sarah Hauser, Ueli M. Maurer |
Realistic Failures in Secure Multi-party Computation. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
|
76 | Ricardo Matheus, Manuella Maia Ribeiro |
Online anti-corruption tools in Latin America. |
ICEGOV |
2009 |
DBLP DOI BibTeX RDF |
anti-corruption online tools, e-governance, e-government, Latin America |
76 | Jun Xu 0003, Peng Ning, Chongkyung Kil, Yan Zhai, Christopher Bookholt |
Automatic diagnosis and response to memory corruption vulnerabilities. |
CCS |
2005 |
DBLP DOI BibTeX RDF |
attack diagnosis, memory corruption attack, randomization, message filtering |
75 | Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal 0001, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift |
Analyzing the effects of disk-pointer corruption. |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
71 | Bernd Altmann, Matthias Fitzi, Ueli M. Maurer |
Byzantine Agreement Secure against General Adversaries in the Dual Failure Model. |
DISC |
1999 |
DBLP DOI BibTeX RDF |
active adversary, fail-corruption, Broadcast, Byzantine agreement, unconditional security |
66 | Philip Bohannon, Rajeev Rastogi, S. Seshadri, Abraham Silberschatz, S. Sudarshan 0001 |
Detection and Recovery Techniques for Database Corruption. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
Database corruption, fault tolerance, data integrity, main-memory database, database recovery |
65 | Nicolae Costake |
Anti-corruption Information Systems and e-Government in Transforming Countries. A Point of View. |
EGOV |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Lakshmi N. Bairavasundaram, Meenali Rungta, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
Limiting trust in the storage stack. |
StorageSS |
2006 |
DBLP DOI BibTeX RDF |
pointer corruption, type-aware corruption, verifiable invariants |
61 | Hans Vandierendonck, André Seznec |
Speculative return address stack management revisited. |
ACM Trans. Archit. Code Optim. |
2008 |
DBLP DOI BibTeX RDF |
Return address prediction, back-up predictor, corruption detection |
60 | Ji Ming |
Noise compensation for speech recognition with arbitrary additive noise. |
IEEE Trans. Speech Audio Process. |
2006 |
DBLP DOI BibTeX RDF |
|
56 | Volker Heydegger |
Just One Bit in a Million: On the Effects of Data Corruption in Files. |
ECDL |
2009 |
DBLP DOI BibTeX RDF |
file format robustness, data integrity, digital preservation, error resilience, bit error, file format, data corruption |
55 | Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini |
Corruption-Localizing Hashing. |
ESORICS |
2009 |
DBLP DOI BibTeX RDF |
|
55 | Johan Huysmans, David Martens, Bart Baesens, Jan Vanthienen, Tony Van Gestel |
Country Corruption Analysis with Self Organizing Maps and Support Vector Machines. |
WISI |
2006 |
DBLP DOI BibTeX RDF |
|
50 | Martin Hirt, Ueli M. Maurer, Vassilis Zikas |
MPC vs. SFE : Unconditional and Computational Security. |
ASIACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Swetha Krishnan, Giridhar Ravipati, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Barton P. Miller |
The effects of metadata corruption on nfs. |
StorageSS |
2007 |
DBLP DOI BibTeX RDF |
metadata corruption, retry, silent failure, fault tolerance, reliability, inconsistency, NFS |
45 | Yan Zhang, Xindong Wu 0001 |
Noise Modeling with Associative Corruption Rules. |
ICDM |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Joel Sing, Ben Soh |
Improving TCP Performance: Identifying Corruption Based Packet Loss. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
42 | Kikuo Fujimura, Pankaj Jalote |
On Robustness of B-Trees. |
IEEE Trans. Knowl. Data Eng. |
1993 |
DBLP DOI BibTeX RDF |
index corruption, pointer corruption, structural error, data structure, robustness, correctability, B-trees, tree data structures, semantic information |
41 | Kyriacos E. Pavlou, Richard T. Snodgrass |
Forensic analysis of database tampering. |
SIGMOD Conference |
2006 |
DBLP DOI BibTeX RDF |
append-only, corruption diagram, forensic strength, cryptographic hash function |
40 | Ignacio Cascudo Pueyo, Hao Chen 0095, Ronald Cramer, Chaoping Xing |
Asymptotically Good Ideal Linear Secret Sharing with Strong Multiplication over Any Fixed Finite Field. |
CRYPTO |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Zheng Zeng 0001, P. R. Kumar 0001 |
Towards optimally exploiting physical layer information in OFDM wireless networks. |
WICON |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Ji Ming, Peter Jancovic, Francis Jack Smith |
Robust speech recognition using probabilistic union models. |
IEEE Trans. Speech Audio Process. |
2002 |
DBLP DOI BibTeX RDF |
|
35 | Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak |
Silent Data Corruption - Myth or reality? |
DSN |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Yufei Tao 0001, Xiaokui Xiao, Jiexing Li, Donghui Zhang |
On Anti-Corruption Privacy Preserving Publication. |
ICDE |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Abhisek Pan, James W. Tschanz, Sandip Kundu |
A Low Cost Scheme for Reducing Silent Data Corruption in Large Arithmetic Circuit. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Mohammad Ravanbakhsh, Mehdi M. Hassanzadeh, Dag Haugland |
Wiretapping Based on Node Corruption over Secure Network Coding: Analysis and Optimization. |
ICMCTA |
2008 |
DBLP DOI BibTeX RDF |
|
35 | Eric Medvet, Alberto Bartoli |
On the Effects of Learning Set Corruption in Anomaly-Based Detection of Web Defacements. |
DIMVA |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Alexander Zimmermann 0001, Daniel Schaffrath, Michael Faber, Martin Wenig, Mesut Günes |
Improving tcp performance through explicit corruption and route failure notification (ecrfn). |
MSWiM |
2007 |
DBLP DOI BibTeX RDF |
loss differentiation algorithm (lda), transport control protocol (tcp), wireless mesh network (wmn) |
35 | Wesley M. Eddy, Shawn Ostermann, Mark Allman |
New techniques for making transport protocols robust to corruption-based loss. |
Comput. Commun. Rev. |
2004 |
DBLP DOI BibTeX RDF |
|
31 | Vijayan Prabhakaran, Lakshmi N. Bairavasundaram, Nitin Agrawal 0001, Haryadi S. Gunawi, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau |
IRON file systems. |
SOSP |
2005 |
DBLP DOI BibTeX RDF |
IRON file systems, block corruption, fail-partial failure model, latent sector errors, fault tolerance, reliability, redundancy, storage, internal, disks |
31 | Royan H. L. Ong, Michael J. Pont |
Empirical comparison of software-based error detection and correction techniques for embedded systems. |
CODES |
2001 |
DBLP DOI BibTeX RDF |
NOP fill, electromagnetic interference, function token, instruction pointer corruption, software-based error detection techniques, embedded systems, EMI |
31 | Vinicius Santos de Abreu, Tadeu Moreira de Classe |
EndGame for Corruption - A DPE-Based Framework to Support the Design of Serious Games for Fight Against Corruption. |
J. Interact. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
31 | Anupriya Khan, Satish Krishnan |
Moderating effects of business-systems corruption on corruption in basic national institutions and electronic government maturity: Insights from a dynamic panel data analysis. |
Int. J. Inf. Manag. |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Farjana Sultana Mim, Naoya Inoue, Paul Reisert, Hiroki Ouchi, Kentaro Inui |
Corruption Is Not All Bad: Incorporating Discourse Structure Into Pre-Training via Corruption for Essay Scoring. |
IEEE ACM Trans. Audio Speech Lang. Process. |
2021 |
DBLP DOI BibTeX RDF |
|
31 | Stefan Gries 0001 |
Information Flow Monitoring in Cyber-Physical Systems: Nachvollziehen von Cascading Data Corruption in CPS (Information flow monitoring in cyber-physical systems: tracking cascading data corruption in CPS) (PDF / PS) |
|
2021 |
DOI RDF |
|
31 | Farjana Sultana Mim, Naoya Inoue, Paul Reisert, Hiroki Ouchi, Kentaro Inui |
Corruption Is Not All Bad: Incorporating Discourse Structure into Pre-training via Corruption for Essay Scoring. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
31 | Issa Luna-Pla, José R. Nicolás-Carlock |
Corruption and complexity: a scientific framework for the analysis of corruption networks. |
Appl. Netw. Sci. |
2020 |
DBLP DOI BibTeX RDF |
|
31 | Yohan Boyer |
Étude et conception de méthodes de protection face aux attaques par corruption de mémoire pour systèmes embarqués dans le contexte de l'Internet des Objets. (Study and design of protection methods against memory corruption attacks for embedded systems in the context of the Internet of Things). |
|
2020 |
RDF |
|
31 | Ján Hunady |
The effect of the Internet on corruption awareness and corruption incidence in the EU. |
Inf. Polity |
2019 |
DBLP DOI BibTeX RDF |
|
31 | Ibrahim Inuwa, Muhammadou M. O. Kah, Chidi G. Ononiwu |
Understanding How the Traditional and Information Technology Anti-Corruption Strategies intertwine to Curb Public Sector Corruption: A Systematic Literature Review. |
PACIS |
2019 |
DBLP BibTeX RDF |
|
31 | Kristin Smith-Crowe, Danielle E. Warren |
The Emotion-Evoked Collective Corruption Model: The Role of Emotion in the Spread of Corruption Within Organizations. |
Organ. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
30 | John Carlo Bertot, Paul T. Jaeger, Justin M. Grimes |
Crowd-sourcing transparency: ICTs, social media, and government transparency initiatives. |
DG.O |
2010 |
DBLP BibTeX RDF |
crowd-sourcing, open government, transparency |
30 | Anders Pettersson, Daniel Sundmark, Henrik Thane, Dag Nyström |
Shared Data Analysis for Multi-Tasking Real-Time System Testing. |
SIES |
2007 |
DBLP DOI BibTeX RDF |
|
30 | William Leal, Anish Arora |
Scalable Self-Stabilization via Composition. |
ICDCS |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Matthias Fitzi, Martin Hirt, Ueli M. Maurer |
Trading Correctness for Privacy in Unconditional Multi-Party Computation (Extended Abstract). |
CRYPTO |
1998 |
DBLP DOI BibTeX RDF |
Secure multi-party computation, threshold cryptography, unconditional security, verifiable secret sharing |
25 | |
Data Corruption. |
Encyclopedia of Database Systems |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Laurent Mazaré, Bogdan Warinschi |
Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption. |
ARSPA-WITS |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Shlomi Dolev, Nir Tzachar |
Brief Announcment: Corruption Resilient Fountain Codes. |
DISC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Michael Kara-Ivaniov, Eran Iceland, Aviad Kipnis |
Attacks on Authentication and Signature Schemes Involving Corruption of Public Key (Modulus). |
FDTC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | David P. Woodruff |
Corruption and Recovery-Efficient Locally Decodable Codes. |
APPROX-RANDOM |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Meng Yu 0001, Wanyu Zang, Peng Liu 0005 |
Database Isolation and Filtering against Data Corruption Attacks. |
ACSAC |
2007 |
DBLP DOI BibTeX RDF |
|
25 | Paul Beame, Toniann Pitassi, Nathan Segerlind, Avi Wigderson |
A Strong Direct Product Theorem for Corruption and the Multiparty Communication Complexity of Disjointness. |
Comput. Complex. |
2006 |
DBLP DOI BibTeX RDF |
06D15, 68Q17, 68Q15, 06E30, Subject classification. 68Q10 |
25 | Xiaojian Tian, Duncan S. Wong |
Session Corruption Attack and Improvements on Encryption Based MT-Authenticators. |
CT-RSA |
2006 |
DBLP DOI BibTeX RDF |
MT-authenticator, BCK-model, CK-model, Verifiable Encryption |
25 | Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer |
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. |
DSN |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Paul Beame, Toniann Pitassi, Nathan Segerlind, Avi Wigderson |
A Direct Sum Theorem for Corruption and the Multiparty NOF Communication Complexity of Set Disjointness. |
CCC |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Emmanuel Briot, Franco Gasperoni, Robert Dewar, Dirk Craeynest, Philippe Waroquiers |
Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada. |
Ada-Europe |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Daniel Barbará, Rajni Goel, Sushil Jajodia |
Using Checksums to Detect Data Corruption. |
EDBT |
2000 |
DBLP DOI BibTeX RDF |
|
21 | Bianca Schroeder, Eduardo Pinheiro, Wolf-Dietrich Weber |
DRAM errors in the wild: a large-scale field study. |
SIGMETRICS/Performance |
2009 |
DBLP DOI BibTeX RDF |
dimm, dram reliability, ecc, hard error, empirical study, memory, soft error, dram, large-scale systems, data corruption |
21 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee |
Improved Non-committing Encryption with Applications to Adaptively Secure Protocols. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
adaptive corruption, non-committing encryption, public-key encryption, secure multi-party computation |
21 | G. Julián Casasbuenas, G. Alejandro Barrera, M. Olga P. Paz |
From the internet for accountability project to the territorial e-government strategy in Colombia. |
ICEGOV |
2009 |
DBLP DOI BibTeX RDF |
fight against corruption, internet for accountability, municipality internet portal, accessibility, open source software |
21 | R. Krishnan, S. Murali Krishna, Nishil Bharill |
Code quality tools: learning from our experience. |
ACM SIGSOFT Softw. Eng. Notes |
2007 |
DBLP DOI BibTeX RDF |
buffer overflow and memory corruption, memory leak, code quality |
21 | Allan Crone, Gabriel Chidolue |
Functional Verification of Low Power Designs at RTL. |
PATMOS |
2007 |
DBLP DOI BibTeX RDF |
Low power aware management, Corruption, UPF, Simulation, Retention, PCF |
21 | Sam Peng, Ying Hu |
IAnticorruption: a domain-driven design approach to more robust integration. |
OOPSLA Companion |
2007 |
DBLP DOI BibTeX RDF |
anti-corruption layer, observer pattern, integration, domain model, domain-driven design |
21 | Changsik Park, John J. Metzner |
Efficient Location of Discrepancies in Multiple Replicated Large Files. |
IEEE Trans. Parallel Distributed Syst. |
2002 |
DBLP DOI BibTeX RDF |
signature, fault location, data consistency, communication efficiency, Replicated files, file comparison, data corruption |
21 | Carsten Griwodz, Oliver Merkel, Jana Dittmann, Ralf Steinmetz |
Protecting VoD the Easier Way. |
ACM Multimedia |
1998 |
DBLP DOI BibTeX RDF |
corruption, vidio-on-demand, multimedia, copyright protection |
21 | Frank K. Hwang, Wenan Zang |
Detecting Corrupted Pages in M Replicated Large Files. |
IEEE Trans. Parallel Distributed Syst. |
1997 |
DBLP DOI BibTeX RDF |
fault detection, Reed-Solomon code, Data consistency, file comparison, data corruption |
20 | Mikhail J. Atallah, Keith B. Frikken |
Securely outsourcing linear algebra computations. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
computational outsourcing, privacy, cryptographic protocols |
20 | Benjamin G. Zorn |
Performance is dead, long live performance! |
CGO |
2010 |
DBLP DOI BibTeX RDF |
code generation |
20 | Vijay Nagarajan, Dennis Jeffrey, Rajiv Gupta 0001 |
Self-recovery in server programs. |
ISMM |
2009 |
DBLP DOI BibTeX RDF |
memory propagation, self cleansing, self recovery |
20 | Yair Amir, Paul Bunn, Rafail Ostrovsky |
Authenticated Adversarial Routing. |
TCC |
2009 |
DBLP DOI BibTeX RDF |
End-to-End Communication, Communication Complexity, Error-Correction, Network Routing, Fault Localization, Multi-Party Computation |
20 | Aviv Dagan, Eliezer Dekel |
ITRA under Partitions. |
NGITS |
2009 |
DBLP DOI BibTeX RDF |
split-brain, multi-tier environment, ITRA, web services, SOA, partitions |
20 | Yutaka Oiwa |
Implementation of the memory-safe full ANSI-C compiler. |
PLDI |
2009 |
DBLP DOI BibTeX RDF |
c language, memory safety |
20 | Asia Slowinska, Herbert Bos |
Pointless tainting?: evaluating the practicality of pointer tainting. |
EuroSys |
2009 |
DBLP DOI BibTeX RDF |
dynamic taint analysis, pointer tainting |
20 | Irene Finocchi, Giuseppe F. Italiano |
Sorting and Searching in Faulty Memories. |
Algorithmica |
2008 |
DBLP DOI BibTeX RDF |
Memory faults, Computing with unreliable information, Searching, Sorting, Memory models, Combinatorial algorithms |
20 | Nuno C. Martins, Tsachy Weissman |
Coding for Additive White Noise Channels With Feedback Corrupted by Quantization or Bounded Noise. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Sandeep Bhatkar, R. Sekar 0001 |
Data Space Randomization. |
DIMVA |
2008 |
DBLP DOI BibTeX RDF |
address space randomization, buffer overflow, memory error |
20 | Serkan Kiranyaz, Moncef Gabbouj |
Hierarchical Cellular Tree: An Efficient Indexing Scheme for Content-Based Retrieval on Multimedia Databases. |
IEEE Trans. Multim. |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Ram Kumar 0001, Eddie Kohler, Mani B. Srivastava |
Harbor: software-based memory protection for sensor nodes. |
IPSN |
2007 |
DBLP DOI BibTeX RDF |
software fault isolation, memory protection |
20 | Ivan Damgård, Jesper Buus Nielsen |
Scalable and Unconditionally Secure Multiparty Computation. |
CRYPTO |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Eric J. Balster, Yuan F. Zheng, Robert L. Ewing |
Combined spatial and temporal domain wavelet shrinkage algorithm for video denoising. |
IEEE Trans. Circuits Syst. Video Technol. |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Pei-Eng Ng, Kai-Kuang Ma |
A switching median filter with boundary discriminative noise detection for extremely corrupted images. |
IEEE Trans. Image Process. |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Fabrício Benevenuto, Cristiano P. Costa, Marisa A. Vasconcelos, Virgílio A. F. Almeida, Jussara M. Almeida, Miranda Mowbray |
Impact of peer incentives on the dissemination of polluted content. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
content pollution, peer incentive, peer-to-peer networks |
20 | Shlomi Dolev, Limor Lahiani, Nancy A. Lynch, Tina Nolte |
Self-stabilizing Mobile Node Location Management and Message Routing. |
Self-Stabilizing Systems |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Francisco Díaz Pérez, Raul Malutan, Pedro Gómez 0001, María Victoria Rodellar Biarge, Carlos García Puntonet |
Robust Processing of Microarray Data by Independent Component Analysis. |
IWANN |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Heng Xu, Arun K. Somani |
Partitioned Cache Shadowing for Deep Sub-Micron (DSM) Regime. |
PRDC |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Nikolai Joukov, Aditya Kashyap, Gopalan Sivathanu, Erez Zadok |
An electric fence for kernel buffers. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
security, file systems, buffer overflow |
20 | Jian-ming Wang, Run-tao Ding |
Iris Image Denoising Algorithm Based on Phase Preserving. |
PDCAT |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Bryan Parno, Mema Roussopoulos |
Defending a P2P Digital Preservation System. |
IEEE Trans. Dependable Secur. Comput. |
2004 |
DBLP DOI BibTeX RDF |
backup/recovery, libraries/information repositories/publishing, peer-to-peer digital preservation, Distributed applications, model development, protection mechanisms |
20 | Dave Ahmad |
The Rising Threat of Vulnerabilities Due to Integer Errors. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Yichen Xie 0001, Andy Chou, Dawson R. Engler |
ARCHER: using symbolic, path-sensitive analysis to detect memory access errors. |
ESEC / SIGSOFT FSE |
2003 |
DBLP DOI BibTeX RDF |
memory access errors, security, static analysis, error detection, buffer overflow, buffer overrun |
20 | Tahar Jarboui, Jean Arlat, Yves Crouzet, Karama Kanoun |
Experimental Analysis of the Errors Induced into Linux by Three Fault Injection Techniques. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Yu-Kuen Ho, Mei-Yi Wu, Jia-Hong Lee |
Texture classification based on statistical steganographic techniques. |
APCCAS (2) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Christophe Genolini, Sébastien Tixeuil |
A Lower Bound on Dynamic k-Stabilization in Asynchronous Systems. |
SRDS |
2002 |
DBLP DOI BibTeX RDF |
Dynamic problems, Lower bound, Self-stabilization, Asynchronous systems, Transient failures, Time adaptivity |
20 | Wee Teck Ng, Peter M. Chen |
The Systematic Improvement of Fault Tolerance in the Rio File Cache. |
FTCS |
1999 |
DBLP DOI BibTeX RDF |
write-back file cache, reliable memory, software fault injection |
20 | Neal R. Harvey, Stephen Marshall |
Application of Non-Linear Image Processing: Digital Video Archive Restoration. |
ICIP (1) |
1997 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1159 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|