The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for integrity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1974 (18) 1975-1976 (29) 1977-1978 (25) 1979-1980 (35) 1981-1982 (26) 1983 (23) 1984 (26) 1985 (28) 1986 (20) 1987 (30) 1988 (45) 1989 (44) 1990 (63) 1991 (54) 1992 (65) 1993 (66) 1994 (74) 1995 (90) 1996 (97) 1997 (101) 1998 (134) 1999 (151) 2000 (169) 2001 (228) 2002 (270) 2003 (300) 2004 (409) 2005 (493) 2006 (490) 2007 (565) 2008 (544) 2009 (435) 2010 (224) 2011 (355) 2012 (204) 2013 (221) 2014 (223) 2015 (219) 2016 (260) 2017 (261) 2018 (336) 2019 (339) 2020 (332) 2021 (364) 2022 (315) 2023 (354) 2024 (92)
Publication types (Num. hits)
article(2872) book(14) data(3) incollection(84) inproceedings(6137) phdthesis(123) proceedings(13)
Venues (Conferences, Journals, ...)
CoRR(282) iConference(172) IICIS(118) IEEE Access(91) NeuroImage(68) SIGMOD Conference(66) HILT(62) ACSAC(57) ACM Trans. Database Syst.(55) CCS(55) DAC(55) HICSS(53) ISQED(53) Sci. Eng. Ethics(52) Comput. Secur.(50) DATE(50) More (+10 of total 2584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5416 occurrences of 2387 keywords

Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Francesco Palmieri 0002, Ugo Fiore Securing the MPLS Control Plane. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strong authentication, label distribution, integrity, MPLS, signaling
20Frédéric Gervais, Marc Frappier, Régine Laleau Synthesizing B Specifications from EB3 Attribute Definitions. Search on Bibsonomy IFM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF data integrity constraints, Information systems, pattern matching, attributes, B, recursive functions
20Tom Walcott, Matt Bishop Traducement: A model for record security. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF traducement, Integrity, security policy, recordation
20Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
20Domenico Beneventano, Sonia Bergamaschi, Claudio Sartori 0001 Description logics for semantic query optimization in object-oriented database systems. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF integrity constraints rules, query rewriting method, semantic expansion of a query, description logics, subsumption, Semantic query optimization
20Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli Compositional Verification of Secure Streamed Data: A Case Study with EMSS. Search on Bibsonomy ICTCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Compositional Analysis and Verification, Digital Streams, Security, Integrity
20Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
20David Gefen Reflections on the dimensions of trust and trustworthiness among online consumers. Search on Bibsonomy Data Base The full citation details ... 2002 DBLP  DOI  BibTeX  RDF benevolence, trust scales, world wide web, trust, integrity, electronic commerce, trustworthiness, ability
20Lei Pan 0001, Lubomir Bic, Michael B. Dillencourt, Ming Kin Lai Mobile Agents - The Right Vehicle for Distributed Sequential Computing. Search on Bibsonomy HiPC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF distributed sequential computing (DSC), computation mobility, distributed code building block (DBlock), algorithmic integrity, Crout factorization, scalability, mobile agents, paging
20Prakash Ramanan Efficient algorithms for minimizing tree pattern queries. Search on Bibsonomy SIGMOD Conference The full citation details ... 2002 DBLP  DOI  BibTeX  RDF LDAP queries, graph simulation, query minimization, tree pattern queries, XML, integrity constraints, XML queries
20John Grant, Jarek Gryz, Jack Minker, Louiqa Raschid Logic-Based Query Optimization for Object Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF logic query, methods in object DBMS, object DBMS, semantic query optimization (SQO), semantic residues, Datalog, integrity constraints, OQL, ODL, ODMG
20Wolfgang A. Halang, Peter Vogrin, Matjaz Colnaric A Safety Licensable PES for SIL 4 Applications. Search on Bibsonomy SAFECOMP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Safety critical industrial automation, Safety Integrity Level 4, safety licensing, programmable electronic system, predictable real time behaviour, fail safe behaviour
20Subhasish Mitra, Nirmal R. Saxena, Edward J. McCluskey Fault Escapes in Duplex Systems. Search on Bibsonomy VTS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Duplex systems, Common-Mode Failures (CMFs), Test points, User-programmable logic, Data Integrity, Availability, Diversity
20Subhasish Mitra, Edward J. McCluskey Word Voter: A New Voter Design for Triple Modular Redundant Systems. Search on Bibsonomy VTS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Word-Voter, TMR-Simplex, data integrity, Triple Modular redundancy (TMR), Voter
20Christian Labonté, Sampalli Srinivas Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management
20David Powell, Jean Arlat, Ljerka Beus-Dukic, Andrea Bondavalli, P. Coppola, Alessandro Fantechi, Eric Jenn, Christophe Rabéjac, Andy J. Wellings GUARDS: A Generic Upgradable Architecture for Real-Time Dependable Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF integrity levels, fault tolerance, embedded systems, real-time, Computer architecture, generic architecture
20Roderick Chapman, Robert Dewar Re-engineering a Safety-Critical Application Using SPARK 95 and GNORT. Search on Bibsonomy Ada-Europe The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Ada Language and Tools, High Integrity Systems
20D. V. Das EM simulation [ICs and MCMs]. Search on Bibsonomy VLSI Design The full citation details ... 1995 DBLP  DOI  BibTeX  RDF electromagnetic field theory, transmission line matrix methods, integrated circuit packaging, EM simulation, emitted radiation, transmission line matrix method, electromagnetic simulation, TLM method, signal integrity, multichip modules, IC, MCM, electromagnetic field
20Bruno Defude, Hervé Martin From a Passive to an Active Database Supporting Exceptions. Search on Bibsonomy DEXA The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Pre(post)-conditions, Inheritance, Integrity constraints, Exceptions, Object-Oriented DBMS
20Oscar Díaz, Suzanne M. Embury Generating Active Rules from High-Level Specifications. Search on Bibsonomy BNCOD The full citation details ... 1992 DBLP  DOI  BibTeX  RDF explicit knowledge representation, object-oriented databases, integrity constraints, Active databases
20Marco A. Casanova, António L. Furtado 0001, Luiz Tucherman A Software Tool for Modular Database Design. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF consistency preservation, logical database design, module constructors, abstract data types, integrity constraints, encapsulation, modular design
20William Ward Armstrong, Claude Delobel Decomposition and Functional Dependencies in Relations. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF relational database, decomposition, integrity constraint, functional dependency, multivalued dependency
20Zhuo Hao, Sheng Zhong 0002, Nenghai Yu A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF data dynamics, privacy, Data integrity, public verifiability
20Telidevara Aditya, Pallav Kumar Baruah, Ravi Mukkamala Space-Efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments. Search on Bibsonomy IEEE CLOUD The full citation details ... 2011 DBLP  DOI  BibTeX  RDF storage efficiency, parallel processing, data integrity, outsourcing, hashing, Bloom filter
20Venki Balasubramanian, Doan B. Hoang, Tanveer A. Zia Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks. Search on Bibsonomy ICSEng The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Body Area Wireless Sensor Network, ACLF, Privacy, Integrity, Healthcare, Confidentiality
20Michael R. Clarkson, Fred B. Schneider Quantification of Integrity. Search on Bibsonomy CSF The full citation details ... 2010 DBLP  DOI  BibTeX  RDF quantitative information flow, Integrity, information theory, database privacy
20Fangyong Hou, Hongjun He, Nong Xiao, Fang Liu 0002, Guangjun Zhong Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF integrity, dynamic, MAC, storage, incremental, static
20Rabindra Bista, Hye-Kyeom Yoo, Jae-Woo Chang A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Wireless sensor network, Data integrity, Data aggregation, Data privacy, Complex number
20Min Luo, Liang-Jie Zhang, Fengyun Lei An Insuanrance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing. Search on Bibsonomy ICWS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Service Risks, Service Assessment and Valuation, Service Insurance Model, Security, Quality of Service (QoS), Privacy, Integrity, Cloud Computing, Analytics
20Xianji Cui, Dantong Ouyang, Yuxin Ye Persistent Storage of Ontology-Based Data with Integrity Constraints. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Ontology, Relational Database, Integrity Constraints
20Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya The System Integrity Verification for Trusted RFID Protocol. Search on Bibsonomy ITNG The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RFID Protocol, Trusted RFID System, Security, Privacy, Trusted Computing, Integrity Verification
20Zhi Wang 0004, Xuxian Jiang HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Control-Flow Integrity, Hypervisor, Rootkits
20Tzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin Chaos-Based Image Integrity Authentication Code. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image authentication code, image integrity, watermarking, chaos
20Wei Ren 0002, Yi Ren 0001, Hui Zhang 0086 Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks. Search on Bibsonomy ISPA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Wireless Sensor Networks, Data Integrity, Distributed Storage, Linear Coding, Secure Storage
20Daniele Rossi 0001, Paolo Angelini, Cecilia Metra, Giovanni Campardo, Gian Pietro Vanalli Risks for Signal Integrity in System in Package and Possible Remedies. Search on Bibsonomy ETS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Crosstalk, Error Detecting Codes, Signal Integrity, System in Package
20Carlos A. Hurtado, Claudio Gutierrez 0001, Alberto O. Mendelzon Capturing summarizability with integrity constraints in OLAP. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF query-optimization, OLAP, data warehousing, integrity constraints, summarizability
20Maha Nizam, Farid N. Najm, Anirudh Devgan Power grid voltage integrity verification. Search on Bibsonomy ISLPED The full citation details ... 2005 DBLP  DOI  BibTeX  RDF voltage integrity, power grid, voltage drop
20Hugh C. Davis Hypertext link integrity. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF content reference problem, dangling links, link integrity, broken links
20Brian Dobbing, Alan Burns 0001 The Ravenscar Tasking Profile for High Integrity Real-Time Programs. Search on Bibsonomy SIGAda The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Ravenscar, Ada, Ada, tasking, safety-critical, high-integrity
20David G. Novick, Joel Juillet Documentation Integrity for Safety-Critical Applications: The COHERE Project. Search on Bibsonomy SIGDOC The full citation details ... 1998 DBLP  DOI  BibTeX  RDF authoring interface, documentation integrity, consistency
20John P. McDermott Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. Search on Bibsonomy Workshop on New Security Paradigms The full citation details ... 1998 DBLP  DOI  BibTeX  RDF trojan horse, security, integrity, storage
20Jan Chomicki, David Toman 0001 Implementing Temporal Integrity Constraints Using an Active DBMS. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Temporal databases, integrity constraints, dynamic constraints, constraint checking
20Fereidoon Sadri Integrity Constraints in the Information Source Tracking Method. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF information source tracking, Database systems, integrity constraints, inconsistency, uncertainty management
20Kai-Yuan Chao, D. F. Wong 0001 Signal integrity optimization on the pad assignment for high-speed VLSI design. Search on Bibsonomy ICCAD The full citation details ... 1995 DBLP  DOI  BibTeX  RDF pad assignment, simultaneous swiching Noise, floorplanning, crosstalk, signal integrity, packaging
20Ernst L. Leiss Data Integrity in Digital Optical Disks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1984 DBLP  DOI  BibTeX  RDF write-once memory, digital optical disks, inmutable codes, probabilistic control-key schemes, storing data under a control-key, variable-length and fixed-length codes, Data integrity
20David J. Lu Watchdog Processors and Structural Integrity Checking. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1982 DBLP  DOI  BibTeX  RDF structural integrity checking (SIC), error detection, Pascal, Control flow, structured programming, watchdog processor
19Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 A language for information flow: dynamic tracking in multiple interdependent dimensions. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information flow control, declassification, security type system
19Foto N. Afrati, Phokion G. Kolaitis Repair checking in inconsistent databases: algorithms and complexity. Search on Bibsonomy ICDT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF coNP-complete problem, equality-generating dependencies, repair checking, tuple-generating dependencies, weakly acyclic set, polynomial time, consistent query answering, inconsistent databases, database repairs
19Hridesh Rajan, Mahantesh Hosamani Tisa: Toward Trustworthy Services in a Service-Oriented Architecture. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Hendrik Decker Towards a Dynamic Inconsistency-Tolerant Schema Maintenance. Search on Bibsonomy ER Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Hao Yuan, Mikhail J. Atallah Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Min Xie 0002, Haixun Wang, Jian Yin 0002, Xiaofeng Meng 0001 Providing freshness guarantees for outsourced databases. Search on Bibsonomy EDBT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Johannes Osrael, Lorenz Froihofer, Karl M. Göschka Availability/Consistency Balancing Replication Model. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Li Jiang, Lingdi Ping, Xuezeng Pan Combining robust declassification and intransitive noninterference. Search on Bibsonomy IMSCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Miloud Bagaa, Noureddine Lasla, Abdelraouf Ouadjaout, Yacine Challal SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Adam J. Rocke, Ronald F. DeMara CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Distributed Agent Control and Dispatch, Agent Handshaking Protocols, Intrusion Detection System Taxonomy, Network Security
19Gaurav Gupta 0002, Josef Pieprzyk A Low-Cost Attack on Branch-Based Software Watermarking Schemes. Search on Bibsonomy IWDW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unconditional branch, watermark, software, breakpoint
19Kun Bai, Peng Liu 0005 Towards Database Firewall: Mining the Damage Spreading Patterns. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
19Daniel Ellard, James Megquier DISP: Practical, efficient, secure and fault-tolerant distributed data storage. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Distributed data storage
19Gerome Miklau, Dan Suciu Implementing a Tamper-Evident Database System. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Sergio Greco, Cristina Sirangelo, Irina Trubitsyna, Ester Zumpano Feasibility Conditions and Preference Criteria in Querying and Repairing Inconsistent Databases. Search on Bibsonomy DEXA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Jong-Weon Kim, Youngbae Byun, Jong-Uk Choi Image Forensics Technology for Digital Camera. Search on Bibsonomy PCM (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Charanjit S. Jutla Lower Bound on Linear Authenticated Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Siddhartha R. Dalal, Yu-Yun Ho, Ashish Jain, Allen A. McIntosh Application Performance using End-to-End User Level Monitoring. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Hendrik Decker Soundcheck for SQL. Search on Bibsonomy PADL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19M. D. Bennett, Neil C. Audsley Predictable and Efficient Virtual Addressing for Safety-Critical Real-Time Systems. Search on Bibsonomy ECRTS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Ravi S. Sandhu, Fang Chen The Multilevel Relational (MLR) Data Model. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF conidentiality, polyinstantiation, access control, multilevel security
19Tim Sheard, David W. Stemple Automatic Verification of Database Transaction Safety. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
19David W. Stemple, Subhasish Mazumdar, Tim Sheard On the Modes and Meaning of Feedback to Transaction Designers. Search on Bibsonomy SIGMOD Conference The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
19Yi-Lin Chuang, Sangmin Kim, Youngsoo Shin, Yao-Wen Chang Pulsed-latch aware placement for timing-integrity optimization. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF pulsed latch, placement, physical design
19Ragib Hasan, Marianne Winslett Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. Search on Bibsonomy EDBT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Kar Way Tan, Robert H. Deng Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Bhavani Thuraisingham Data security and integrity: developments and directions. Search on Bibsonomy KDD Workshop on CyberSecurity and Intelligence Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Henning Klein, Jörg Keller 0001 Storage architecture with integrity, redundancy and encryption. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Ruilin Liu, Wendy Hui Wang Integrity Verification of Outsourced XML Databases. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Andrew Camilleri, Geoffrey Coulson, Lynne Blair CIF: A Framework for Managing Integrity in Aspect-Oriented Composition. Search on Bibsonomy TOOLS (47) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Guillaume Duc, Ronan Keryell Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Mohamed Sallak, Christophe Simon, Jean-François Aubry A Fuzzy Probabilistic Approach for Determining Safety Integrity Level. Search on Bibsonomy IEEE Trans. Fuzzy Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Wei Li 0021, Lingyu Wang 0001, Bo Zhu 0001, Lei Zhang 0004 An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Kikelomo Maria Apampa, Gary B. Wills, David Argles, Emil Marais Electronic Integrity Issues in E-Assessment Security. Search on Bibsonomy ICALT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Diego F. de Carvalho, Rafael Chies, André Pimenta Freire, Luciana Andréia Fondazzi Martimiano, Rudinei Goularte Video steganography for confidential documents: integrity, privacy and version control. Search on Bibsonomy SIGDOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF document version control, multimedia, steganography, MPEG-4, collaborative systems
19Anongporn Salaiwarakul, Mark Dermot Ryan Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Santiago Urueña, Juan Zamorano, José Antonio Pulido, Juan Antonio de la Puente Communication Paradigms for High-Integrity Distributed Systems with Hard Real-Time Requirements. Search on Bibsonomy DIPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Zahi S. Abuhamdeh A Case Study of ATPG Delay Path Performance Based on Measured Power Rail Integrity. Search on Bibsonomy DFT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Lijun Liao, Jörg Schwenk A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Yiu-ming Cheung, Hao-Tian Wu A Sequential Quantization Strategy for Data Embedding and Integrity Verification. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Shige Wang Model Transformation for High-Integrity Software Development in Derivative Vehicle Control System Design. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jeong-Oog Lee, Dae Hee Won, Sangkyung Sung, Taesam Kang, Young Jae Lee High Assurance GPS Integrity Monitoring System Using Particle Filtering Approach. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jérôme Hugues, Bechir Zalila, Laurent Pautet Combining Model Processing and Middleware Configuration for Building Distributed High-Integrity Systems. Search on Bibsonomy ISORC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Carlos Ordonez 0001, Javier García-García 0001, Zhibo Chen 0002 Measuring referential integrity in distributed databases. Search on Bibsonomy CIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF database, metric, consistency, completeness
19Amlan Ganguly, Partha Pratim Pande, Benjamin Belzer, Cristian Grecu Addressing Signal Integrity in Networks on Chip Interconnects through Crosstalk-Aware Double Error Correction Coding. Search on Bibsonomy ISVLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Aiwu Shi, Gleb Naumovich Improving Data Integrity with a Java Mutability Analysis. Search on Bibsonomy APSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Huanmei Guan, Huanguo Zhang, Ping Chen, Yajie Zhou Mobile Agents Integrity Research. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Luciano Caroprese, Sergio Greco, Cristian Molinaro Prioritized Active Integrity Constraints for Database Maintenance. Search on Bibsonomy DASFAA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Hendrik Decker, Davide Martinenghi Getting Rid of Straitjackets for Flexible Integrity Checking. Search on Bibsonomy DEXA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Hai Lin 0004, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors. Search on Bibsonomy ICCD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Jorge Semião, Judit Freijedo, Juan J. Rodríguez-Andina, Fabian Vargas 0001, Marcelino B. Santos, Isabel C. Teixeira, João Paulo Teixeira 0001 On-line Dynamic Delay Insertion to Improve Signal Integrity in Synchronous Circuits. Search on Bibsonomy IOLTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Joon S. Park, Ganesh Devarajan Fine-Grained and Scalable Approaches for Message Integrity. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Taeyong Je, Yungseon Eo Efficient Signal Integrity Verification of Multi-Coupled Transmission Lines with Asynchronously Switching Non-Linear Drivers. Search on Bibsonomy ISQED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. Search on Bibsonomy Information Hiding The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 9246 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license