The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for counter with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1965 (16) 1966-1972 (16) 1973-1977 (19) 1978-1981 (24) 1982-1984 (17) 1985-1987 (20) 1988-1989 (28) 1990-1991 (24) 1992 (25) 1993 (23) 1994 (22) 1995 (34) 1996 (30) 1997 (47) 1998 (44) 1999 (61) 2000 (87) 2001 (96) 2002 (115) 2003 (153) 2004 (176) 2005 (224) 2006 (323) 2007 (283) 2008 (314) 2009 (232) 2010 (108) 2011 (93) 2012 (99) 2013 (107) 2014 (95) 2015 (134) 2016 (125) 2017 (108) 2018 (113) 2019 (128) 2020 (151) 2021 (160) 2022 (154) 2023 (186) 2024 (44)
Publication types (Num. hits)
article(1418) book(2) incollection(49) inproceedings(2763) phdthesis(26)
Venues (Conferences, Journals, ...)
CoRR(248) IEEE Trans. Computers(41) Theor. Comput. Sci.(30) IEEE Access(28) CAV(26) Sensors(26) HICSS(25) ISCAS(25) MFCS(23) Emergent Information Technolog...(22) FSTTCS(21) ISI(21) IACR Cryptol. ePrint Arch.(20) MICRO(20) ICALP(19) DATE(18) More (+10 of total 1742)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2181 occurrences of 1516 keywords

Results
Found 4259 publication records. Showing 4258 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
90Mircea R. Stan Synchronous Up/Down Counter with Clock Period Independent of Counter Size. Search on Bibsonomy IEEE Symposium on Computer Arithmetic The full citation details ... 1997 DBLP  DOI  BibTeX  RDF up/down counters, constant time counters, prescalers
78Yi Lu 0001, Andrea Montanari, Balaji Prabhakar, Sarang Dharmapurikar, Abdul Kabbani Counter braids: a novel counter architecture for per-flow measurement. Search on Bibsonomy SIGMETRICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF statistic counters, network measurement, message passing algorithms
76Mircea R. Stan, Alexandre F. Tenca, Milos D. Ercegovac Long and Fast Up/Down Counters. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Binary counter, constant time counter, serial counter, up/down counter, prescaler, parallel counter
73Richard Mayr Undecidability of Weak Bisimulation Equivalence for 1-Counter Processes. Search on Bibsonomy ICALP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF 1-counter nets, 1-counter machines, bisimulation
69Alban Ponse, Mark van der Zwaag Risk Assessment for One-Counter Threads. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF One-counter systems, Risk assessment, Reachability, Thread algebra
66Stéphane Demri, Ranko Lazic 0001, Arnaud Sangnier Model Checking Freeze LTL over One-Counter Automata. Search on Bibsonomy FoSSaCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
66Ko-Chi Kuo, Feng-Ji Wu A 2.4-GHz/5-GHz Low Power Pulse Swallow Counter in 0.18-µm CMOS Technology. Search on Bibsonomy APCCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
63Sriram Ramabhadran, George Varghese Efficient implementation of a statistics counter architecture. Search on Bibsonomy SIGMETRICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF statistics counter, router
60Nicholas Riley, Craig B. Zilles Probabilistic counter updates for predictor hysteresis and bias. Search on Bibsonomy IEEE Comput. Archit. Lett. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Yuichi Komano, Kazuo Ohta, Hideyuki Miyake, Atsushi Shimbo Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF algorithmic tamper proof (ATP), counter unit, PIN authentication
55Antonín Kucera 0001 On Simulation-Checking with Sequential Systems. Search on Bibsonomy ASIAN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
54Arie Gurfinkel, Marsha Chechik Proof-Like Counter-Examples. Search on Bibsonomy TACAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
53Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh Hidden Markov Models and Bayesian Networks for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
53Mark Lazaroff, David Snowden Anticipatory Models for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
53Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski Applying Semantic Web Reasoning to Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
53Aaron B. Frank, Desmond Saunders-Newton Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
53Robert L. Popp, David Allen, Claudio Cioffi-Revilla Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
53Paul Rosenzweig Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
51Mazen Kharbutli, Yan Solihin Counter-Based Cache Replacement and Bypassing Algorithms. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cache Bypassing, Counter-Based Algorithms, Cache memories, Cache Replacement, Cache Misses
51Qi Zhao 0006, Jun (Jim) Xu, Zhen Liu Design of a novel statistics counter architecture with optimal space and time efficiency. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2006 DBLP  DOI  BibTeX  RDF statistics counter, data streaming, router
51Ove Scavenius, Martin Boesgaard, Thomas Pedersen, Jesper Christiansen, Vincent Rijmen Periodic Properties of Counter Assisted Stream Ciphers. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Stream cipher, diversity, period, counter, degeneracy, Rabbit
51Dante Camarena, Nick Counter, Daniil Markelov, Pietro Gagliano, Don Nguyen, Rhys Becker, Fiona Firby, Zina Rahman, Richard Rosenbaum, Liam Atticus Clarke, Maria Skibinski Little Learning Machines: Real-Time Deep Reinforcement Learning as a Casual Creativity Game. Search on Bibsonomy EXAG@AIIDE The full citation details ... 2023 DBLP  BibTeX  RDF
51Joshua Jaffe A First-Order DPA Attack Against AES in Counter Mode with Unknown Initial Counter. Search on Bibsonomy CHES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HO-DPA, AES, DPA, power analysis, SPA, counter mode
49Chenyu Yan, Daniel Englender, Milos Prvulovic, Brian Rogers, Yan Solihin Improving Cost, Performance, and Security of Memory Encryption and Authentication. Search on Bibsonomy ISCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
48Christoph Haase, Stephan Kreutzer, Joël Ouaknine, James Worrell 0001 Reachability in Succinct and Parametric One-Counter Automata. Search on Bibsonomy CONCUR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
48Antonín Kucera 0001 Efficient Verification Algorithms for One-Counter Processes. Search on Bibsonomy ICALP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
48Parosh Aziz Abdulla, Karlis Cerans Simulation Is Decidable for One-Counter Nets (Extended Abstract). Search on Bibsonomy CONCUR The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
46Fady Copty, Amitai Irron, Osnat Weissberg, Nathan P. Kropp, Gila Kamhi Efficient debugging in a formal verification environment. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Counter-example, Model checking, Counterexample
46Tatsuo Higuchi 0001, Michitaka Kameyama Static-Hazard-Free T-Gate for Ternary Memory Element and Its Application to Ternary Counters. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1977 DBLP  DOI  BibTeX  RDF Counter based on shift register, emitter coupled logic (ECL), feedback shift register (FSR), signed ternary number representation, static-hazard-free T-gate, symmetrical modulo-M counter, synchronous and asynchronous signed ternary counter, ternary memory element, up-down counting
45Mansoor Ahmed Khan, Ahmad Raza Cheema, Aamir Hasan 0001 Improved Nonce Construction Scheme for AES CCMP to Evade Initial Counter Prediction. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF AES CCMP, Initial Counter, Key Length, TMTO, Integrity, Encryption, Confidentiality, Nonce, IEEE 802.11i
45Frédéric Cuppens, Sylvain Gombault, Thierry Sans Selecting Appropriate Counter-Measures in an Intrusion Detection Framework. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IDMEF, counter-measures, anti-correlation, Intrusion detection, correlation, response
45Slawomir Pilarski, Kevin James Wiebe Counter-based compaction: An analysis for BIST. Search on Bibsonomy J. Electron. Test. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF compaction by counter, edge counting, one's counting, transition counting, built-in self-test, linear feedback shift register, signature analysis, Aliasing probability, test response compaction
43Emi Mathews, Axel Poigné An Echo State Network based pedestrian counting system using wireless sensor networks. Search on Bibsonomy WISES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Jonathan Katz, Steven A. Myers, Rafail Ostrovsky Cryptographic Counters and Applications to Electronic Voting. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Wilson W. H. Chan, Alan H. S. Chan Movement Compatibility for Two-Dimensional Lever Control and Digital Counter. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
42Nicholas Riley, Craig B. Zilles Probabilistic counter updates for predictor hysteresis and stratification. Search on Bibsonomy HPCA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Stéphane Demri, Alain Finkel, Valentin Goranko, Govert van Drimmelen Towards a Model-Checker for Counter Systems. Search on Bibsonomy ATVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Yat-Fong Yung, Amine Bermak A PWM DPS with pixel-level reconfigurable 4/8-bit counter/SRAM. Search on Bibsonomy ISCAS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
42Peter Celinski, Derek Abbott, Sorin Dan Cotofana Area efficient, high speed parallel counter circuits using charge recycling threshold logic. Search on Bibsonomy ISCAS (5) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
42Petr Jancar, Antonín Kucera 0001, Faron Moller, Zdenek Sawa Equivalence-Checking with One-Counter Automata: A Generic Method for Proving Lower Bounds. Search on Bibsonomy FoSSaCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
42Corina S. Pasareanu, Matthew B. Dwyer, Willem Visser Finding Feasible Counter-examples when Model Checking Abstracted Java Programs. Search on Bibsonomy TACAS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Richard F. Bonner, Rusins Freivalds, Maksim Kravtsev Quantum versus Probabilistic One-Way Finite Automata with Counter. Search on Bibsonomy SOFSEM The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
42Petr Jancar, Antonín Kucera 0001, Faron Moller Simulation and Bisimulation over One-Counter Processes. Search on Bibsonomy STACS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
42John Case, Samuel E. Moelius U-shaped, iterative, and iterative-with-counter learning. Search on Bibsonomy Mach. Learn. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gold-style learning, Iterative-with-counter learning, Memory limited learning, Non-U-shaped learning, Partly set-driven learning, Rearrangement independent learning, Set-driven learning, U-shape, U-shaped learning, Language learning, Inductive inference, Computational learning theory, Counter, Iterative learning
42Brian P. Kettler, Gary Edwards, Mark Hoffman Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Jennifer Golbeck, Aaron Mannes, James A. Hendler Semantic Web Technologies for Terrorist Network Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42 Legal Standards for Data Mining. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Janusz Marecki, Nathan Schurr, Milind Tambe Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran Analysis of Heterogeneous Data in Ultrahigh Dimensions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Seth Greenblatt, Thayne Coffman, Sherry Marcus Behavioral Network Analysis for Terrorist Detection. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti Information Processing at Very High Speed Data Ingestion Rates. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Kim A. Taipale Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Shuang Sun, Xiaocong Fan, John Yen Sharing Intelligence Using Information Supply Chains. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Douglas W. Oard Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Jeff Jonas, John Karat Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Clifford Behrens, Hyong Sop Shim, Devasis Bassu Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42David B. Skillicorn Social Network Analysis Via Matrix Decompositions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
42Nazli Choucri, Stuart E. Madnick, Michael D. Siegel Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
40Changwoo Pyo, Gyungho Lee Encoding Function Pointers and Memory Arrangement Checking against Buffer Overflow Attack. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF program counter, function pointer encoding, memory arrangement checking, buffer overflow attack
40John Thornley, K. Mani Chandy Monotonic Counters: A New Mechanism for Thread Synchronization. Search on Bibsonomy IPDPS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF monotonic counter, deterministic synchronization, sequential equivalence, ragged barriers, sequential ordering, single-writer multiple-reader, mutual exclusion, thread, monotonicity, multithreaded programming, determinacy, thread synchronization
39Sébastien Bardin, Alain Finkel, Jérôme Leroux FASTer Acceleration of Counter Automata in Practice. Search on Bibsonomy TACAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF counter automata, convex translation, TTP protocol, acceleration, reachability set
39Corina S. Pasareanu, Matthew B. Dwyer, Willem Visser Finding feasible abstract counter-examples. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Counter-example analysis, Model checking, Abstract interpretation, Software verification
39Olivier Finkel An Effective Extension of the Wagner Hierarchy to Blind Counter Automata. Search on Bibsonomy CSL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF blind counter automata, effective extension of the Wagner hierarchy, Wadge hierarchy, Wadge games, languages, topological properties
39Peng-Jun Wan, Yuanyuan Yang 0001 Load Balancing in Counter-Rotated SONET Rings. Search on Bibsonomy ICPP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF counter-rotated rings, routing, approximation algorithms, load balancing, SONET
39S. K. Misra, R. K. Kolagotla, Hosahalli R. Srinivas, J. C. Mo, Marc S. Diamondstein VLSI Implementation of a 300-MHz 0.35 um CMOS 32-bit Auto-Reloadable Binary Synchronous Counter with Optimal Test Overhead Delay. Search on Bibsonomy VLSI Design The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Fast counter, VLSI, Testability
36Curtis W. Keller, Diptikalyan Saha, Samik Basu 0001, Scott A. Smolka FocusCheck: A Tool for Model Checking and Debugging Sequential C Programs. Search on Bibsonomy TACAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36G. B. Fitzpatrick Synthesis of Binary Ring Counters of Given Periods. Search on Bibsonomy J. ACM The full citation details ... 1960 DBLP  DOI  BibTeX  RDF
36Stefan Göller, Richard Mayr, Anthony Widjaja To On the Computational Complexity of Verifying One-Counter Processes. Search on Bibsonomy LICS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Olivier Serre Parity Games Played on Transition Graphs of One-Counter Processes. Search on Bibsonomy FoSSaCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Jérôme Leroux, Grégoire Sutre Flat Counter Automata Almost Everywhere! Search on Bibsonomy ATVA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36David Molnar, Matt Piotrowski, David Schultz, David A. Wagner 0001 The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Per Bjesse, James H. Kukula Using Counter Example Guided Abstraction Refinement to Find Complex Bugs. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Samik Basu 0001, Diptikalyan Saha, Yow-Jian Lin, Scott A. Smolka Generation of All Counter-Examples for Push-Down Systems. Search on Bibsonomy FORTE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Tomohiro Yamasaki, Hirotada Kobayashi, Hiroshi Imai Quantum versus Deterministic Counter Automata. Search on Bibsonomy COCOON The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Xue Li, Wayne Huang 0001 Counter Inference of Intelligent Agents. Search on Bibsonomy TOOLS (36) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
36Dimitrios Kagaris, Spyros Tragoudas On the design of optimal counter-based schemes for test set embedding. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Oscar H. Ibarra, Tao Jiang 0001, Nicholas Q. Trân, Hui Wang 0008 New Decidability Results Concerning Two-way Counter Machines and Applications. Search on Bibsonomy ICALP The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
36John M. Mellor-Crummey, Thomas J. LeBlanc A Software Instruction Counter. Search on Bibsonomy ASPLOS The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
33Barbara Endicott-Popovsky, Julia Narvaez, Christian Seifert, Deborah A. Frincke, Lori Ross O'Neil, Chiraag Uday Aval Use of Deception to Improve Client Honeypot Detection of Drive-by-Download Attacks. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter-deception, honeypots, deception, drive-by-downloads, cyber-attacks
33Sumit Gulwani, Krishna K. Mehra, Trishul M. Chilimbi SPEED: precise and efficient static estimation of program computational complexity. Search on Bibsonomy POPL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF counter instrumentation, quantitative functions, symbolic complexity bounds, termination analysis
33Sourav Mukhopadhyay, Palash Sarkar 0001 Application of LFSRs for Parallel Sequence Generation in Cryptologic Algorithms. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF DES Cracker, TMTO, Counter Mode of Operation, LFSR
33Hubert Comon, Véronique Cortier Flatness Is Not a Weakness. Search on Bibsonomy CSL The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Counter automata, model-checking, verification, temporal logics, logic in computer science
33Alessandro Cevrero, Panagiotis Athanasopoulos, Hadi Parandeh-Afshar, Ajay Kumar Verma, Philip Brisk, Frank K. Gürkaynak, Yusuf Leblebici, Paolo Ienne Architectural improvements for field programmable counter arrays: enabling efficient synthesis of fast compressor trees on FPGAs. Search on Bibsonomy FPGA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF field programmable counter array (FPCA), FPGA
33Kwan Ting Ng, Chen Shoushun, Farid Boussaïd, Amine Bermak Compact Gray-Code Counter/Memory Circuits for Spiking Pixels. Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Counter/memory, spiking pixel, CMOS image sensor
33Abdelhak Chatty, Ilhem Kallel, Adel M. Alimi Counter-ant algorithm for evolving multirobot collaboration. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF counter-ant algorithm, multirobot collaboration collaborative cleaning, stagnation recovery, pheromone
33Ilhem Kallel, Abdelhak Chatty, Adel M. Alimi Self-Organizing Multirobot Exploration through Counter-Ant Algorithm. Search on Bibsonomy IWSOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Counter-Ant algorithm, self-organizing multirobot, cooperative exploration, stagnation recovery, Lego robots, Madkit, pheromone
33Kai Shen, Ming Zhong 0006, Sandhya Dwarkadas, Chuanpeng Li, Christopher Stewart, Xiao Zhang Hardware counter driven on-the-fly request signatures. Search on Bibsonomy ASPLOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF operating system adaptation, request classification, server system, anomaly detection, hardware counter
33Nan Hua, Bill Lin 0001, Jun (Jim) Xu, Haiquan (Chuck) Zhao BRICK: a novel exact active statistics counter architecture. Search on Bibsonomy ANCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF statistics counter, router
33Yi-hong Dong, Chao Sun, Xiaoying Tai An Adaptive Counter Propagation Network. Search on Bibsonomy SNPD (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Counter propagation network, Neural Network, Adaptive
33JinKyu Lee 0003, H. Raghav Rao Exploring the causes and effects of inter-agency information sharing systems adoption in the anti/counter-terrorism and disaster management domains. Search on Bibsonomy DG.O The full citation details ... 2007 DBLP  BibTeX  RDF anti/counter-terrorism, information sharing, disaster management, inter-organizational systems
33Stijn Eyerman, Lieven Eeckhout, Tejas Karkhanis, James E. Smith 0001 A performance counter architecture for computing accurate CPI components. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware performance counter architecture, superscalar processor performance modeling
33Rong Lin, Kevin E. Kerr, André S. Botha A Novel Approach for CMOS Parallel Counter Design. Search on Bibsonomy EUROMICRO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF parallel counter and compressor, low power high speed CMOS circuit design, VLSI design, Arithmetic circuit, partial product reduction
33Hadas Shachnai, Micha Hofri The List Update Problem: Improved Bounds for the Counter Scheme. Search on Bibsonomy Algorithmica The full citation details ... 1998 DBLP  DOI  BibTeX  RDF List update problem, Counter scheme, Self-organizing data structures, Average case analysis
33Dimitrios Kagaris, Spyros Tragoudas A multiseed counter TPG with performance guarantee. Search on Bibsonomy ICCD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF built-in test pattern generators, multiseed counter test pattern generator, low hardware overhead, fast CAD tool, ISCAS'85 benchmarks, hardware/time overhead, built-in self test, performance guarantee, test set generation
30Chengcui Zhang, Wei-bang Chen An Effective and Robust Method for Automatic Bacterial Colony Enumeration. Search on Bibsonomy ICSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
30Yasuaki Ito, Koji Nakano, Youhei Yamagishi Efficient hardware algorithms for n choose k counters. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Jirí Srba Visibly Pushdown Automata: From Language Equivalence to Simulation and Bisimulation. Search on Bibsonomy CSL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
30Eu-Jin Goh, Philippe Golle Event Driven Private Counters. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 4258 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license