The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for integrity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1974 (18) 1975-1976 (29) 1977-1978 (25) 1979-1980 (35) 1981-1982 (26) 1983 (23) 1984 (26) 1985 (28) 1986 (20) 1987 (30) 1988 (45) 1989 (44) 1990 (63) 1991 (54) 1992 (65) 1993 (66) 1994 (74) 1995 (90) 1996 (97) 1997 (101) 1998 (134) 1999 (151) 2000 (169) 2001 (228) 2002 (270) 2003 (300) 2004 (409) 2005 (493) 2006 (490) 2007 (565) 2008 (544) 2009 (435) 2010 (224) 2011 (355) 2012 (204) 2013 (221) 2014 (223) 2015 (219) 2016 (260) 2017 (261) 2018 (336) 2019 (339) 2020 (332) 2021 (364) 2022 (315) 2023 (354) 2024 (92)
Publication types (Num. hits)
article(2872) book(14) data(3) incollection(84) inproceedings(6137) phdthesis(123) proceedings(13)
Venues (Conferences, Journals, ...)
CoRR(282) iConference(172) IICIS(118) IEEE Access(91) NeuroImage(68) SIGMOD Conference(66) HILT(62) ACSAC(57) ACM Trans. Database Syst.(55) CCS(55) DAC(55) HICSS(53) ISQED(53) Sci. Eng. Ethics(52) Comput. Secur.(50) DATE(50) More (+10 of total 2584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5416 occurrences of 2387 keywords

Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
29Yungseon Eo, Seongkyun Shin, William R. Eisenstadt, Jongin Shim Generalized traveling-wave-based waveform approximation technique for the efficient signal integrity verification of multicoupled transmission line system. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
29Wei Li, Richard T. Snodgrass, Shiyan Deng, Vineel Kumar Gattu, Aravindan Kasthurirangan Efficient Sequenced Integrity Constraint Checking. Search on Bibsonomy ICDE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Charanjit S. Jutla Encryption Modes with Almost Free Message Integrity. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Can Türker, Gunter Saake Deriving Relationships between Integrity Constraints for Schema Comparison. Search on Bibsonomy ADBIS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
29R. M. Alzahrani, M. A. Qutaishat, Nick J. Fiddian, W. A. Gray Integrity Management in an Object-Oriented Federated Database Environment. Search on Bibsonomy BNCOD The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
29Paul W. P. J. Grefen, Jan Flokstra Parallel Handling of Integrity Constraints. Search on Bibsonomy PRISMA Workshop The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
29Norbert Südkamp, Peter Kandzia Enforcement of Integrity Constraints in a Semantic Data Model. Search on Bibsonomy CSL The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
28Hamidah Ibrahim, Ali Amer Alwan, Nur Izura Udzir Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases. Search on Bibsonomy PDCAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Krishna Srinivasan, P. Muthana, Rohan Mandrekar, Ege Engin, Jinwoo Choi, Madhavan Swaminathan Enhancement of Signal Integrity and Power Integrity with Embedded Capacitors in High-Speed Packages. Search on Bibsonomy ISQED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Stephen Flowerday, Rossouw von Solms Real-time information integrity = system integrity + data integrity + continuous assurances. Search on Bibsonomy Comput. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
28Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Bhavani Thuraisingham Grand Challenges in Data Integrity and Quality: Panel Discussion. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Naren Kodali, Csilla Farkas, Duminda Wijesekera Enforcing Integrity in Multimedia Surveillance. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Alexandre Aellig, Philippe Oechslin Tracing Attacks and Restoring Integrity with Lascar. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Herman Balsters, Bert O. de Brock Integration of Integrity Constraints in Database Federations. Search on Bibsonomy IICIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Michael Gertz 0001, George Csaba Monitoring Mission Critical Data for Integrity and Availability. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
28Geri Georg, Robert B. France, Indrakshi Ray Designing High Integrity Systems Using Aspects. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
28Detlef Kraus Integrity Mechanisms in German and International Payment Systems. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
28Stefan Böttcher Concurrent Checking of Global Cross-database Integrity Constraints. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
28Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka Protecting Java Component Integrity Against Trojan Horse Programs. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
28Madhavan K. Nayar The information integrity imperative. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
28Jim Jones Integrity and internal control in modern banking systems. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
28Cynthia E. Irvine, Timothy E. Levin A cautionary note regarding the data integrity capacity of certain secure systems. Search on Bibsonomy IICIS The full citation details ... 2001 DBLP  BibTeX  RDF
28Paul Ammann, Sushil Jajodia The Integrity Challenge. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Paloma Díaz 0001, Ignacio Aedo, Fivos Panetsos Definition of Integrity Policies For Web-based Applications. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Piet J. M. Poos Complex IT Environments: Ascertaining Information Integrity. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Wouter J. Keller, Roel G. J. Rot Integrity and Internal Control in a Statistical Environment. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Vijay V. Mandke, Madhavan K. Nayar Implementing Information Integrity Technology - A Feedback Control System Approach. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Martin Stanek, Daniel Olejár Integrity Testing in WWW Environment. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Lars Frank Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties. Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM). Search on Bibsonomy IICIS The full citation details ... 1999 DBLP  BibTeX  RDF
28Arnon Rosenthal, Edward Sciore Propagating Integrity Information among Interrelated Databases. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28Vijayalakshmi Atluri Modification of Integrity Constraints Through Knowledge Discovery. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28L. G. Gomez, Susan Darling Urban Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28Vijay V. Mandke, Madhavan K. Nayar Design Basis for Achieving Information Integrity - a Feedback Control System Approach. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28Quazi N. Ahmed, Susan V. Vrbsky Maintaining Integrity Constraints and Security in real-Time Database Systems. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28Frédéric Cuppens, Claire Saurel A Logical Formalization of Integrity Policies for Database Management Systems. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28Michael Gertz 0001 Managing Data Quality and Integrity in Federated Databases. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28Kamalasen Rajalingham, David Chadwick Integrity Control of Spreadsheets: Organisation & Tools. Search on Bibsonomy IICIS The full citation details ... 1998 DBLP  BibTeX  RDF
28Andrew E. Wade Integrity: Do you know where your Objects Are? Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28William List Detecting Data Integrity Failures. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Leon Strous Integrity: Definition, Subdivision, Challenge. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28David Chadwick, Joan Knight, Phil Clipsham Information Integrity in End-User Systems. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Robert Moeller Changing Definitions of Internal Control and Information Systems Integrity. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28William List The Effects of Time on Integrity in Information Systems. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28A. W. Neisingh Control of Information and Communication Technology: An Integrity Problem. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Amit P. Sheth Managing with Less than Absolute Integrity. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Maria Amélia Pacheco e Silva Dynamic Integrity Constraints Definition and Enforcement in Databases: A Classification Framework. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Youssef Lahlou A Model for Specifying Individual Integrity Constraints on Objects. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Kyuwoong Lee, Seog Park Optimistic Concurrency Control for Maintaining the Global Integrity Constraint in MDBSs. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28François Bry Query Answering in Information Systems with Integrity Constraints. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28William List, W. R. Melville Integrity in Information Systems. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Patrizia Asirelli View Constraints: An Interpretation of Integrity Constraints for Security. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Gerhard Knolmayer, Thomas Buchberger Maintaining Temporal Integrity of World Wide Web pages. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
28Matti Tenhunen The Integrity of Electronic Evidence. Search on Bibsonomy IICIS The full citation details ... 1997 DBLP  BibTeX  RDF
26Hamdy S. Soliman, Mohammed Omari Application of synchronous dynamic encryption system in mobile wireless domains. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover
26Wei-Je Huang, Edward J. McCluskey Transient errors and rollback recovery in LZ compression. Search on Bibsonomy PRDC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF LZ compression, Lempel-Ziv compression, compressed codewords, rollback error recovery schemes, data integrity, data integrity, fault tolerant computing, data compression, error detection, system recovery, transient faults, rollback recovery, compression ratio, lossless data compression, transient errors, data reconstruction, hardware redundancy
26Eugenio Faldella, Marco Prandini A Novel Approach to On-Line Status Authentication of Public-Key Certificates. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks
26Reiner Sailer, Matthias Kabatnik History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks
26John Patrick McGregor, Ruby B. Lee Performance Impact of Data Compression on Virtual Private Network Transactions. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s
26Nina Edelweiss, Patrícia Nogueira Hubler, Mirella Moura Moro, Giovani Demartini A Temporal Database Management System Implemented on top of a Conventional Database. Search on Bibsonomy SCCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF conventional database, state transition rules, temporal integrity, query processing, query processing, specification, relational databases, relational database, data integrity, SQL, SQL, data models, temporal databases, temporal database, data representation, temporal query language, temporal data models, data definition
26Krishna Kant 0001 Performance of internal overload controls in large switches. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF internal overload control performance, large switches, switch sizes, call capacity, voice circuits, overload performance, network integrity, peripheral scanning schemes, scheduling, performance evaluation, virtual machines, logic CAD, circuit analysis computing, simulation model, service integrity, buffer sizes, switching circuits
26Venkataraman Ramesh, Sudha Ram A methodology for interschema relationship identification in heterogeneous databases. Search on Bibsonomy HICSS (3) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF interschema relationship identification, data access techniques, federated schemas, schematic knowledge, integrity constraint knowledge, constraint-based relationships, schematic relationships, interoperability, heuristics, data integrity, distributed databases, database theory, information sharing, open systems, heterogeneous databases, schema integration
26Jason Gait Optimizing Unix Database File Operations. Search on Bibsonomy IEEE Softw. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Unix database file operations optimization, Ratfiles, Rational File System, Unix kernel, atomic write, write-order discipline, data integrity, data integrity, optimisation, database management systems, Unix
26Luqi A Graph Model for Software Evolution. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF automatic assistance, integrity, graph theory, data integrity, software tools, consistency, software evolution, automatic programming, graph model, complex software systems, evolving software system, automated support
26Bruno Ciciani, Daniel M. Dias, Balakrishna R. Iyer, Philip S. Yu A Hybrid Distributed Centralized System Structure for Transaction Processing. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF hybrid distributed centralized system structure, central system, non-local data, transaction processing applications, reservation systems, coherency control protocol, local transactions, distributed systems, concurrency, integrity, locality, data integrity, distributed processing, concurrency control, transaction processing, banking, remote accesses, insurance
25Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. Search on Bibsonomy Trans. Comput. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks
25Mazleena Salleh, Teoh Chin Yew Application of 2D Barcode in Hardcopy Document Verification System. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF hardcopy document, verification, integrity
25Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang 0023, Muhammad Waqas Anwar On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Graph head Sealing, execution integrity, security properties, Mobile Agent security, malicious hosts, active attacks
25Lingli Deng, Yeping He, Ziyao Xu Trusted Reputation Management Service for Peer-to-Peer Collaboration. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data integrity, virtual machine, P2P, trusted computing, reputation management
25Dolors Costal, Cristina Gómez 0001, Anna Queralt, Ernest Teniente Drawing Preconditions of Operation Contracts from Conceptual Schemas. Search on Bibsonomy CAiSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF operation contracts, conceptual modelling, integrity constraints
25Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi A Demonstrative Ad Hoc Attestation System. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Kiosk computing, platform integrity, smart cards, Trusted computing, attestation
25Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic
25Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia Decentralized authorization and data security in web content delivery. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web, data integrity, authorization, content delivery networks
25Alessandro Fantechi, Stefania Gnesi, Laura Semini Achieving Fault Tolerance by a Formally Validated Interaction Policy. Search on Bibsonomy RODIN Book The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Integrity policies, fault tolerance, model checking, process algebras
25Mihai Budiu, Úlfar Erlingsson, Martín Abadi Architectural support for software-based protection. Search on Bibsonomy ASID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF control-flow integrity, software fault isolation, security, control-flow graph, hardware support, memory protection, binary rewriting
25Zhongwen Li Security and Safety Assurance Architecture: Model and Implementation (Supporting Multiple Levels of Criticality). Search on Bibsonomy ICA3PP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Safety Kernel, Security and Safety Assurance Architecture, Integrity Policy for Criticality, Distributed Control System
25Ilaria Venturini Counteracting Oracle attacks. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF integrity watermarking, oracle attack, security, covert channel, semi-fragile watermarking
25Xavier C. Delannoy Understanding the Tension between Transition Rules and Confidentiality. Search on Bibsonomy BNCOD The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Discretionary Models of Confidentiality, Transition Integrity Constraints, Relational Model, Covert Channel
25Narayanan Krishnakumar, Arthur J. Bernstein Bounded Ignorance: A Technique for Increasing Concurrency in a Replicated System. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF concurrency control, replication, integrity constraints, reachability analysis, serializability
25Louis C. Guillou, Jean-Jacques Quisquater A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology
25Yi Lin 0005, Bettina Kemme, Ricardo Jiménez-Peris, Marta Patiño-Martínez, José Enrique Armendáriz-Iñigo Snapshot isolation and integrity constraints in replicated databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Replication, integrity constraints, snapshot isolation
25Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi Implementation considerations for improving data integrity in normalized relational databases. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data integrity functional independency, decomposition, normalization, functional dependency
25Vincenzo De Florio, Chris Blondia Adaptive Data Integrity through Dynamically Redundant Data Structures. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data structures, data integrity, Redundancy
25Hamidah Ibrahim, Zarina Dzolkhifli, Praveen Madiraju A Model for Checking the Integrity Constraints of Mobile Databases. Search on Bibsonomy OTM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF integrity constraints, Mobile databases, constraint checking
25Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryôichi Sasaki Using Boot Control to Preserve the Integrity of Evidence. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Evidence integrity, hysteresis signatures, boot control
25Matteo Bordin, Thanassis Tsiodras, Maxime Perrotin Experience in the Integration of Heterogeneous Models in the Model-driven Engineering of High-Integrity Systems. Search on Bibsonomy Ada-Europe The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Model-driven Integration, High-Integrity Systems, Automated Code Generation
25Keith B. Frikken, Joseph A. Dougherty IV An efficient integrity-preserving scheme for hierarchical sensor aggregation. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure aggregation, sensor networks, integrity
25Fei Wang, Wolfgang Reinhardt 0002 Extending Geographic Data Modeling by Adopting Constraint Decision Table to Specify Spatial Integrity Constraints. Search on Bibsonomy AGILE Conf. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Geographic data modeling, spatial integrity constraints, fielddata capture, data quality, Mobile GIS
25Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. Search on Bibsonomy SOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF code attestation, memory virtualization, hypervisor, code injection attacks, preventing, code integrity
25Tsukasa Kudou, Nobuhiro Kataoka, Tadanori Mizuno Integrity Maintenance System of Database Query Under Updating. Search on Bibsonomy KES (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF integrity, relational database, query, temporal database, mission-critical system
25Frederic Montagut, Refik Molva Traceability and Integrity of Execution in Distributed Workflow Management Systems. Search on Bibsonomy ESORICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Integrity of execution, Decentralized workflows, Traceability
25Alberto Bartoli, Eric Medvet Automatic Integrity Checks for Remote Web Resources. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Web site defacement, GIS, integrity
25Robert L. Glass Of Health, Trust, Money ... and Integrity. Search on Bibsonomy IEEE Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software engineering, integrity, software cost estimation
25Danny Dhillon, Jerry Zhu, John Richards, Tejinder S. Randhawa Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multipoint relay (MPR), optimized link state routing (OLSR), routing protocol integrity, security, mobile ad-hoc networks (MANET), IP, intrusion detection systems (IDS)
25Jun Chen 0008, Lei He 0001 Noise driven in-package decoupling capacitor optimization for power integrity. Search on Bibsonomy ISPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IC package, modeling, integrity, noise, power, resonance, decoupling capacitor, power distribution system
25Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi Trusted-link: web-link enhancement for integrity and trustworthiness. Search on Bibsonomy Digital Identity Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF integrity, web, signature, link, trustworthiness
25William Bereza, Yuming Tao, Shoujun Wang, Tad A. Kwasniewski, Rakesh H. Patel PELE: pre-emphasis & equalization link estimator to address the effects of signal integrity limitations. Search on Bibsonomy DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF analysis and optimization, simulation beyond the die, layout, signal integrity
25Ahsan Habib 0001, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF message digest and media streaming, Data integrity
Displaying result #201 - #300 of 9246 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license