The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for integrity with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1974 (18) 1975-1976 (29) 1977-1978 (25) 1979-1980 (35) 1981-1982 (26) 1983 (23) 1984 (26) 1985 (28) 1986 (20) 1987 (30) 1988 (45) 1989 (44) 1990 (63) 1991 (54) 1992 (65) 1993 (66) 1994 (74) 1995 (90) 1996 (97) 1997 (101) 1998 (134) 1999 (151) 2000 (169) 2001 (228) 2002 (270) 2003 (300) 2004 (409) 2005 (493) 2006 (490) 2007 (565) 2008 (544) 2009 (435) 2010 (224) 2011 (355) 2012 (204) 2013 (221) 2014 (223) 2015 (219) 2016 (260) 2017 (261) 2018 (336) 2019 (339) 2020 (332) 2021 (364) 2022 (315) 2023 (354) 2024 (92)
Publication types (Num. hits)
article(2872) book(14) data(3) incollection(84) inproceedings(6137) phdthesis(123) proceedings(13)
Venues (Conferences, Journals, ...)
CoRR(282) iConference(172) IICIS(118) IEEE Access(91) NeuroImage(68) SIGMOD Conference(66) HILT(62) ACSAC(57) ACM Trans. Database Syst.(55) CCS(55) DAC(55) HICSS(53) ISQED(53) Sci. Eng. Ethics(52) Comput. Secur.(50) DATE(50) More (+10 of total 2584)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5416 occurrences of 2387 keywords

Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Hao Cai, Andy J. Wellings Supporting Mixed Criticality Applications in a Ravenscar-Java Environment. Search on Bibsonomy OTM Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Trent Jaeger, Reiner Sailer, Xiaolan Zhang 0001 Resolving constraint conflicts. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF access control models, constraint models, policy design
14Yong-Joon Park, Gyungho Lee Repairing return address stack for buffer overflow protection. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF computer architecture, computer security, buffer overflow, intrusion tolerance
14Gianluigi Greco, Sergio Greco, Ester Zumpano A Logical Framework for Querying and Repairing Inconsistent Databases. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF consistent queries, disjunctive databases, repair and prioritized constraints, Inconsistent database, database repairs
14Andrea Calì, Diego Calvanese, Giuseppe De Giacomo, Maurizio Lenzerini, Paolo Naggar, Fabio Vernacotola IBIS: Semantic Data Integration at Work. Search on Bibsonomy CAiSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Oded Shmueli, Mukund Raghavachari, Vivek Sarkar, Rajesh Bordawekar, Michael G. Burke Integrating Database and Programming Language Constraints. Search on Bibsonomy DBPL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Erik G. Hoel, Sudhakar Menon, Scott Morehouse Building a Robust Relational Implementation of Topology. Search on Bibsonomy SSTD The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Nahmsuk Oh, Subhasish Mitra, Edward J. McCluskey ED4I: Error Detection by Diverse Data and Duplicated Instructions. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Software implemented hardware fault tolerance (SIHFT), low cost fault tolerance, data diversity, duplicated instructions, concurrent error detection
14Bruce Christianson, Jean Fiona Snook Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Leopoldo E. Bertossi, Camilla Schwind Analytic Tableaux and Database Repairs: Foundations. Search on Bibsonomy FoIKS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Jarek Gryz, K. Bernhard Schiefer, Jian Zheng, Calisto Zuzarte Discovery and Application of Check Constraints in DB2. Search on Bibsonomy ICDE The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Junhu Wang, Rodney W. Topor, Michael J. Maher Reasoning with Disjunctive Constrained Tuple-Generating Dependencies. Search on Bibsonomy DEXA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Simon Napper, Dian Yang Equivalence Checking a 256MB SDRAM. Search on Bibsonomy MTDT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Subhasish Mitra, Edward J. McCluskey Design of Redundant Systems Protected Against Common-Mode Failures. Search on Bibsonomy VTS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Suad Alagic, Philip A. Bernstein A Model Theory for Generic Schema Management. Search on Bibsonomy DBPL The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Virgil D. Gligor, Matt Blaze, John Ioannidis Denial of Service - Panel Discussion. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Csaba Simon, Attila Török ATM Security with Firewalls. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ATM security, ATM signaling, firewalls
14Marcelo Arenas, Leopoldo E. Bertossi, Michael Kifer Applications of Annotated Predicate Calculus to Querying Inconsistent Databases. Search on Bibsonomy Computational Logic The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Michael Walker 0001 On the Security of 3GPP Networks. Search on Bibsonomy EUROCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
14Maitrayi Sabaratnam, Svein-Olaf Hvasshovd, Øystein Torbjørnsen Cost of Ensuring Safety in Distributed Database Management Systems. Search on Bibsonomy PRDC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
14Gerhard Wetzel, Francesca Toni Semantic Query Optimization through Abduction and Constraint Handling. Search on Bibsonomy FQAS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
14Nam Huyn Efficient Complete Local Tests for Conjunctive Query Constraints with Negation. Search on Bibsonomy ICDT The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Hee Beng Kuan Tan, Tok Wang Ling Recovery of Functional Dependencies from Data-Intensive Business Programs. Search on Bibsonomy HICSS (5) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
14Terry Gaasterland, Jorge Lobo 0001 Using Semantic Information for Processing Negation and Disjunction in Logic Programs. Search on Bibsonomy ISMIS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
14Norbert Kehrer, Gustaf Neumann Treating Enhanced Entity Relationship Models in a Declarative Style. Search on Bibsonomy RCLP The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
14François Bry, Hendrik Decker, Rainer Manthey A Uniform Approach to Constraint Satisfaction and Constraint Satisfiability in Deductive Databases. Search on Bibsonomy EDBT The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
14 Minimal-change Integrity Maintenance. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14 Data Integrity Services. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14 Dynamic Integrity Constraints. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14 Relational Integrity Constraints. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14 Message Integrity Codes. Search on Bibsonomy Encyclopedia of Database Systems The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Qiang Xu 0001, Yubin Zhang, Krishnendu Chakrabarty SOC test-architecture optimization for the testing of embedded cores and signal-integrity faults on core-external interconnects. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Core-based system-on-chip, test scheduling, test-access mechanism (TAM), interconnect testing
14Kevin D. Bowers, Ari Juels, Alina Oprea HAIL: a high-availability and integrity layer for cloud storage. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF proofs of retrievability, erasure codes, data availability, distributed storage systems, cloud storage
14Colin Atkinson 0001, Philipp Bostan, Gergana Deneva, Marcus Schumacher Towards High Integrity UDDI Systems. Search on Bibsonomy BIS (Workshops) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Service Discovery, UDDI, Web Services Quality
14Christian Cachin, Martin Geisler 0001 Integrity Protection for Revision Control. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hash trees, memory checking, fork linearizability, storage security, applied cryptography
14Wenjuan Xu, Xinwen Zhang, Gail-Joon Ahn Towards System Integrity Protection with Graph-Based Policy Analysis. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Heather Richter Lipford, Gordon Hull, Celine Latulipe, Andrew Besmer, Jason Watson Visible Flows: Contextual Integrity and the Design of Privacy Mechanisms on Social Network Sites. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Andrea Calì, Georg Gottlob, Thomas Lukasiewicz Datalog±: a unified approach to ontologies and integrity constraints. Search on Bibsonomy ICDT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ontologies, semantic web, complexity, databases, constraints, dependencies, datalog, conjunctive queries, query evaluation, tractability, chase
14Md. Sumon Shahriar, Jixue Liu Checking Satisfactions of XML Referential Integrity Constraints. Search on Bibsonomy AMT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Hsin-Hua Pan, Hung-Ming Chen, Chia-Yi Chang Buffer/flip-flop block planning for power-integrity-driven floorplanning. Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Alessandro Zovi, Tullio Vardanega Requirements on the Target Programming Language for High-Integrity MDE. Search on Bibsonomy Ada-Europe The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Saurabh Ganeriwal, Laura Balzano, Mani B. Srivastava Reputation-based framework for high integrity sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bayesian formulation, Beta reputation system, Sensor networks, reputation
14Jorge Semião, Marcial Jesús Rodríguez-Irago, Juan J. Rodríguez-Andina, Leonardo Bisch Piccoli, Fabian Vargas 0001, Marcelino Bicho Dos Santos, Isabel Maria Cacho Teixeira, João Paulo Teixeira 0001 Signal Integrity Enhancement in Digital Circuits. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Raul Barbosa, Johan Karlsson On the Integrity of Lightweight Checkpoints. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Sufyan Ababneh, Rashid Ansari, Ashfaq A. Khokhar Scalable multimedia-content integrity verification with robust hashing. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Richard F. Paige, Ramon Charalambous, Xiaocheng Ge, Phillip J. Brooke Towards Agile Engineering of High-Integrity Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Andrew Cirillo, Radha Jagadeesan, Corin Pitcher, James Riely Tapido: Trust and Authorization Via Provenance and Integrity in Distributed Objects (Extended Abstract). Search on Bibsonomy ESOP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Guojun Peng, Xuanchen Pan, Huanguo Zhang, Jianming Fu Dynamic Trustiness Authentication Framework Based on Software's Behavior Integrity. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Rathanakar Acharya, K. Asha Data integrity and intrusion detection in Wireless Sensor Networks. Search on Bibsonomy ICON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Ee-Chien Chang, Jia Xu 0006 Remote Integrity Check with Dishonest Storage Server. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Pierre-Frédéric Villard, Wesley Bourne, Fernando Bello Modelling Organ Deformation Using Mass-Springs and Tensional Integrity. Search on Bibsonomy ISBMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mass-spring, Deformation model, tensegrity, interventional radiology
14Josef Börcsök, Peter Holub Different approaches for probability of common cause failure on demand calculations for safety integrity systems. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Noor-ul-Qayyum, Farooq Ahmad Integrity assurance of mobile agents through public-key encryption and watermarking. Search on Bibsonomy ICDIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Andrew B. Kahng, Bao Liu 0001, Xu Xu 0001 Statistical Timing Analysis in the Presence of Signal-Integrity Effects. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Hung-Yu Chien SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Authentication, Access controls, Security and Privacy Protection, Cryptographic controls
14Michael Paulitsch, Brendan Hall Insights into the Sensitivity of the BRAIN (Braided Ring Availability Integrity Network) - On Platform Robustness in Extended Operation. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Anh-Quynh Nguyen, Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, intrusion detection, Linux, rootkit
14Stefano Chessa, Roberto Di Pietro, Erina Ferro, Gaetano Giunta, Gabriele Oligeri Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques. Search on Bibsonomy VTC Spring The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Wen-Hui Chiang, Ling-Jyh Chen, Cheng-Fu Chou Integrity-Aware Bandwidth Guarding Approach in P2P Networks. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF freeriding, peer-to-peer, available bandwidth
14Marcus J. Huber Agent Autonomy: Social Integrity and Social Independence. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Partha Pratim Pande, Amlan Ganguly, Brett Feero, Cristian Grecu Applicability of Energy Efficient Coding Methodology to Address Signal Integrity in 3D NoC Fabrics. Search on Bibsonomy IOLTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Daniele Rossi 0001, Paolo Angelini, Cecilia Metra Configurable Error Control Scheme for NoC Signal Integrity. Search on Bibsonomy IOLTS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Andrew B. T. Hopkins, Klaus D. McDonald-Maier, Evangelos Papoutsis, W. Gareth J. Howells Ensuring data integrity via ICmetrics based security infrastructure. Search on Bibsonomy AHS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Khaue Rezende Rodrigues, Ronaldo dos Santos Mello DIInCX: An Approach to Discovery of Implicit Integrity Constraints from XML Data. Search on Bibsonomy IRI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Binoy Ravindran, Edward Curley, Jonathan Stephen Anderson, E. Douglas Jensen Assured-Timeliness Integrity Protocols for Distributable Real-Time Threads with in Dynamic Distributed Systems. Search on Bibsonomy EUC Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Hyunsik Kim, Yungseon Eo High-Frequency-Measurement-Based Frequency-Variant Transmission Line Characterization and Circuit Modeling for Accurate Signal Integrity Verification. Search on Bibsonomy ISQED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Vidya Bharrgavi Balasubramanyn, Geethapriya Thamilarasu, Ramalingam Sridhar Security Solution For Data Integrity InWireless BioSensor Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Lifu Wang, Partha Dasgupta Kernel and Application Integrity Assurance: Ensuring Freedom from Rootkits and Malware in a Computer System. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Makoto Nagata On-Chip Measurements Complementary to Design Flow for Integrity in SoCs. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Krishna Bharath, Ege Engin, Madhavan Swaminathan, Kazuhide Uriu, Toru Yamada Computationally Efficient Power Integrity Simulation for System-on-Package Applications. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Qiang Xu 0001, Yubin Zhang, Krishnendu Chakrabarty SOC Test Architecture Optimization for Signal Integrity Faults on Core-External Interconnects. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Bechir Zalila, Irfan Hamid, Jérôme Hugues, Laurent Pautet Generating Distributed High Integrity Applications from Their Architectural Description. Search on Bibsonomy Ada-Europe The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Matteo Bordin, Tullio Vardanega Correctness by Construction for High-Integrity Real-Time Systems: A Metamodel-Driven Approach. Search on Bibsonomy Ada-Europe The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Model-Driven Architecture, Metamodelling, Correctness by construction, Ravenscar Profile
14Frederic Montagut, Refik Molva Enforcing Integrity of Execution in Distributed Workflow Management Systems. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Alek Radjenovic, Richard F. Paige Architecture Description Languages for High-Integrity Real-Time Systems. Search on Bibsonomy IEEE Softw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software architecture, architecture description languages, safety-critical systems, modeling methodologies, model development
14Yu Yuan, Kenneth E. Barner Color Image Segmentation Using Watersheds and Joint Homogeneity-Edge Integrity Region Merging Criteria. Search on Bibsonomy ICIP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Alberto Belussi, Mauro Negri, Giuseppe Pelagatti An ISO TC 211 Conformant Approach to Model Spatial Integrity Constraints in the Conceptual Design of Geographical Databases. Search on Bibsonomy ER (Workshops) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Santiago Urueña, Juan Zamorano, Daniel Berjón, José Antonio Pulido, Juan Antonio de la Puente Schedulability analysis of AR-TP, a Ravenscar compliant communication protocol for high-integrity distributed systems. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Tom R. Wielicki Integrity of Online Testing in E-Learning: Empirical Study. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Nodira Khoussainova, Magdalena Balazinska, Dan Suciu Towards correcting input data errors probabilistically using integrity constraints. Search on Bibsonomy MobiDE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF entropy maximization, stream processing, data cleaning, probabilistic databases
14Hamidah Ibrahim Checking Integrity Constraints - How it Differs in Centralized, Distributed and Parallel Databases. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Eric Pardede, J. Wenny Rahayu, David Taniar Towards a High Integrity XML Link Update in Object-Relational Database. Search on Bibsonomy ICCSA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Chi-Hung Chi, Lin Liu 0001, Xiaoyin Yu Data Integrity Related Markup Language and HTTP Protocol Support for Web Intermediaries. Search on Bibsonomy EUC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Taeyong Je, Yungseon Eo Efficient Signal Integrity Verification Method of Multi-Coupled RLC Interconnect Lines with Asynchronous Circuit Switching. Search on Bibsonomy ISQED The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Daniele Braga, Alessandro Campi, Davide Martinenghi Efficient Integrity Checking over XML Documents. Search on Bibsonomy EDBT Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Joon S. Park, Gautam Jayaprakash, Joseph Giordano Component Integrity Check and Recovery Against Malicious Codes. Search on Bibsonomy AINA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Anh-Quynh Nguyen, Yoshiyasu Takefuji A Real-time Integrity Monitor for Xen Virtual Machine. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Santiago Urueña, Juan Zamorano, Daniel Berjón, José Antonio Pulido, Juan Antonio de la Puente The Arbitrated Real-Time Protocol (AR-TP): A Ravenscar Compliant Communication Protocol for High-Integrity Distributed Systems. Search on Bibsonomy Ada-Europe The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Ángel Martín del Rey A Protocol to Provide Assurance of Images Integrity Using Memory Cellular Automata. Search on Bibsonomy ACRI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Hemant Sengar, Duminda Wijesekera, Sushil Jajodia Authentication and Integrity in Telecommunication Signaling Network. Search on Bibsonomy ECBS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Dariusz Król 0001, Boguslaw Szlachetko Migration Integrity Rules in Open Systems. Search on Bibsonomy AWIC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Samuel Cheng 0001, Qiang Wu 0007, Kenneth R. Castleman Non-ubiquitous digital watermarking for record indexing and integrity protection of medical images. Search on Bibsonomy ICIP (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Martín Abadi, Mihai Budiu, Úlfar Erlingsson, Jay Ligatti Control-flow integrity. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF vulnerabilities, control-flow graph, binary rewriting, inlined reference monitors
14Samuel Leung, Karen Fill, David DiBiase, Andy Nelson Sharing Academic Integrity Guidance: Working Towards a Digital Library Infrastructure. Search on Bibsonomy ECDL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Marco Ottavi, Luca Schiano, Fabrizio Lombardi, Salvatore Pontarelli, Gian Carlo Cardarilli Evaluating the Data Integrity of Memory Systems by Configurable Markov Models. Search on Bibsonomy ISVLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Anna Ciampolini, Paola Mello, Marco Montali, Sergio Storari Using Social Integrity Constraints for On-the-Fly Compliance Verification of Medical Protocols. Search on Bibsonomy CBMS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jin-Ho Kim, Byung Suk Lee, Yang-Sae Moon, Sooho Ok, Wookey Lee Parallel Consistency Maintenance of Materialized Views Using Referential Integrity Constraints in Data Warehouses. Search on Bibsonomy DaWaK The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Seokhee Lee 0002, Hyunsang Kim, Sangjin Lee 0002, Jongin Lim 0001 Digital evidence collection process in integrity and memory information gathering. Search on Bibsonomy SADFE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Roverli Pereira Ziwich, Elias Procópio Duarte Jr., Luiz Carlos Pessoa Albini Distributed Integrity Checking for Systems with Replicated Data. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Tetsu Iwata, Kaoru Kurosawa How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. Search on Bibsonomy FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 9246 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license