|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
29 | Yungseon Eo, Seongkyun Shin, William R. Eisenstadt, Jongin Shim |
Generalized traveling-wave-based waveform approximation technique for the efficient signal integrity verification of multicoupled transmission line system. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2002 |
DBLP DOI BibTeX RDF |
|
29 | Wei Li, Richard T. Snodgrass, Shiyan Deng, Vineel Kumar Gattu, Aravindan Kasthurirangan |
Efficient Sequenced Integrity Constraint Checking. |
ICDE |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Charanjit S. Jutla |
Encryption Modes with Almost Free Message Integrity. |
EUROCRYPT |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Can Türker, Gunter Saake |
Deriving Relationships between Integrity Constraints for Schema Comparison. |
ADBIS |
1998 |
DBLP DOI BibTeX RDF |
|
29 | R. M. Alzahrani, M. A. Qutaishat, Nick J. Fiddian, W. A. Gray |
Integrity Management in an Object-Oriented Federated Database Environment. |
BNCOD |
1995 |
DBLP DOI BibTeX RDF |
|
29 | Paul W. P. J. Grefen, Jan Flokstra |
Parallel Handling of Integrity Constraints. |
PRISMA Workshop |
1990 |
DBLP DOI BibTeX RDF |
|
29 | Norbert Südkamp, Peter Kandzia |
Enforcement of Integrity Constraints in a Semantic Data Model. |
CSL |
1988 |
DBLP DOI BibTeX RDF |
|
28 | Hamidah Ibrahim, Ali Amer Alwan, Nur Izura Udzir |
Checking Integrity Constraints with Various Types of Integrity Tests for Distributed Databases. |
PDCAT |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Krishna Srinivasan, P. Muthana, Rohan Mandrekar, Ege Engin, Jinwoo Choi, Madhavan Swaminathan |
Enhancement of Signal Integrity and Power Integrity with Embedded Capacitors in High-Speed Packages. |
ISQED |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Stephen Flowerday, Rossouw von Solms |
Real-time information integrity = system integrity + data integrity + continuous assurances. |
Comput. Secur. |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Yves Deswarte, Jean-Jacques Quisquater, Ayda Saïdane |
Remote Integrity Checking - How to Trust Files Stored on Untrusted Servers. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Bhavani Thuraisingham |
Grand Challenges in Data Integrity and Quality: Panel Discussion. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Naren Kodali, Csilla Farkas, Duminda Wijesekera |
Enforcing Integrity in Multimedia Surveillance. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Alexandre Aellig, Philippe Oechslin |
Tracing Attacks and Restoring Integrity with Lascar. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Belal Zaqaibeh, Hamidah Ibrahim, Ali Mamat, Md Nasir Sulaiman |
An Efficient OODB Model for Ensuring the Integrity of User-Defined Constraints. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Herman Balsters, Bert O. de Brock |
Integration of Integrity Constraints in Database Federations. |
IICIS |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Michael Gertz 0001, George Csaba |
Monitoring Mission Critical Data for Integrity and Availability. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
28 | Geri Georg, Robert B. France, Indrakshi Ray |
Designing High Integrity Systems Using Aspects. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
28 | Detlef Kraus |
Integrity Mechanisms in German and International Payment Systems. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
28 | Stefan Böttcher |
Concurrent Checking of Global Cross-database Integrity Constraints. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
28 | Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka |
Protecting Java Component Integrity Against Trojan Horse Programs. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
28 | Madhavan K. Nayar |
The information integrity imperative. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
28 | Jim Jones |
Integrity and internal control in modern banking systems. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
28 | Cynthia E. Irvine, Timothy E. Levin |
A cautionary note regarding the data integrity capacity of certain secure systems. |
IICIS |
2001 |
DBLP BibTeX RDF |
|
28 | Paul Ammann, Sushil Jajodia |
The Integrity Challenge. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Paloma Díaz 0001, Ignacio Aedo, Fivos Panetsos |
Definition of Integrity Policies For Web-based Applications. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Piet J. M. Poos |
Complex IT Environments: Ascertaining Information Integrity. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Wouter J. Keller, Roel G. J. Rot |
Integrity and Internal Control in a Statistical Environment. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Vijay V. Mandke, Madhavan K. Nayar |
Implementing Information Integrity Technology - A Feedback Control System Approach. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Martin Stanek, Daniel Olejár |
Integrity Testing in WWW Environment. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Lars Frank |
Integrity Problems in Distributed Accounting Systems with Semantic ACID Properties. |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Kamalasen Rajalingham, David Chadwick, Brian Knight, Dilwyn Edwards |
Efficient Methods for Checking Integrity: An Integrated Spreadsheet Engineering Methodology (ISEM). |
IICIS |
1999 |
DBLP BibTeX RDF |
|
28 | Arnon Rosenthal, Edward Sciore |
Propagating Integrity Information among Interrelated Databases. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | Vijayalakshmi Atluri |
Modification of Integrity Constraints Through Knowledge Discovery. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | L. G. Gomez, Susan Darling Urban |
Integrity Constraint Enforcement in a Multidatabase Using Distributed Active Rules. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | Vijay V. Mandke, Madhavan K. Nayar |
Design Basis for Achieving Information Integrity - a Feedback Control System Approach. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | Quazi N. Ahmed, Susan V. Vrbsky |
Maintaining Integrity Constraints and Security in real-Time Database Systems. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | Frédéric Cuppens, Claire Saurel |
A Logical Formalization of Integrity Policies for Database Management Systems. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | Michael Gertz 0001 |
Managing Data Quality and Integrity in Federated Databases. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | Kamalasen Rajalingham, David Chadwick |
Integrity Control of Spreadsheets: Organisation & Tools. |
IICIS |
1998 |
DBLP BibTeX RDF |
|
28 | Andrew E. Wade |
Integrity: Do you know where your Objects Are? |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | William List |
Detecting Data Integrity Failures. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Leon Strous |
Integrity: Definition, Subdivision, Challenge. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | David Chadwick, Joan Knight, Phil Clipsham |
Information Integrity in End-User Systems. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Robert Moeller |
Changing Definitions of Internal Control and Information Systems Integrity. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | William List |
The Effects of Time on Integrity in Information Systems. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | A. W. Neisingh |
Control of Information and Communication Technology: An Integrity Problem. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Amit P. Sheth |
Managing with Less than Absolute Integrity. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Maria Amélia Pacheco e Silva |
Dynamic Integrity Constraints Definition and Enforcement in Databases: A Classification Framework. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Youssef Lahlou |
A Model for Specifying Individual Integrity Constraints on Objects. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Kyuwoong Lee, Seog Park |
Optimistic Concurrency Control for Maintaining the Global Integrity Constraint in MDBSs. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | François Bry |
Query Answering in Information Systems with Integrity Constraints. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | William List, W. R. Melville |
Integrity in Information Systems. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Patrizia Asirelli |
View Constraints: An Interpretation of Integrity Constraints for Security. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Gerhard Knolmayer, Thomas Buchberger |
Maintaining Temporal Integrity of World Wide Web pages. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
28 | Matti Tenhunen |
The Integrity of Electronic Evidence. |
IICIS |
1997 |
DBLP BibTeX RDF |
|
26 | Hamdy S. Soliman, Mohammed Omari |
Application of synchronous dynamic encryption system in mobile wireless domains. |
Q2SWinet |
2005 |
DBLP DOI BibTeX RDF |
dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover |
26 | Wei-Je Huang, Edward J. McCluskey |
Transient errors and rollback recovery in LZ compression. |
PRDC |
2000 |
DBLP DOI BibTeX RDF |
LZ compression, Lempel-Ziv compression, compressed codewords, rollback error recovery schemes, data integrity, data integrity, fault tolerant computing, data compression, error detection, system recovery, transient faults, rollback recovery, compression ratio, lossless data compression, transient errors, data reconstruction, hardware redundancy |
26 | Eugenio Faldella, Marco Prandini |
A Novel Approach to On-Line Status Authentication of Public-Key Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
online status authentication, sensitive data exchange, security constraints, revoked certificates, certificate status handling scheme, one-way accumulator, Owa-based Revocation Scheme, Online Certificate Status Protocol, Internet, scalability, authentication, cryptography, protocols, data integrity, data integrity, computer networks, public key cryptography, public key infrastructure, message authentication, telecommunication security, certification authority, public-key certificates, computational load, public networks |
26 | Reiner Sailer, Matthias Kabatnik |
History-based Distributed Filtering - A Tagging Approach to Network-Level Access Control. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
history-based distributed filtering, network-level access control, nondiscretionary access control model, data packet exchange, subversive channels, secrecy requirements, trustworthiness validation, data integrity, data integrity, tagging, packet switching, data communication, authorisation, electronic data interchange, telecommunication security, data transmission, context information, telecommunication network management, security levels, state information, security labels, subnetworks |
26 | John Patrick McGregor, Ruby B. Lee |
Performance Impact of Data Compression on Virtual Private Network Transactions. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
virtual private network transactions, secure public network communications, host authentication, IP Security Protocol, IPsec transactions, network types, 1 Gbit/s, 10 Mbit/s, Internet, performance, authentication, cryptography, data integrity, data integrity, data compression, data compression, encryption, transport protocols, packet switching, cryptographic protocols, confidentiality, system model, IPsec, message authentication, data types, VPN, telecommunication networks, telecommunication security, business communication, compression algorithms, security services, cryptographic algorithms, packet sizes, 100 Mbit/s |
26 | Nina Edelweiss, Patrícia Nogueira Hubler, Mirella Moura Moro, Giovani Demartini |
A Temporal Database Management System Implemented on top of a Conventional Database. |
SCCC |
2000 |
DBLP DOI BibTeX RDF |
conventional database, state transition rules, temporal integrity, query processing, query processing, specification, relational databases, relational database, data integrity, SQL, SQL, data models, temporal databases, temporal database, data representation, temporal query language, temporal data models, data definition |
26 | Krishna Kant 0001 |
Performance of internal overload controls in large switches. |
Annual Simulation Symposium |
1995 |
DBLP DOI BibTeX RDF |
internal overload control performance, large switches, switch sizes, call capacity, voice circuits, overload performance, network integrity, peripheral scanning schemes, scheduling, performance evaluation, virtual machines, logic CAD, circuit analysis computing, simulation model, service integrity, buffer sizes, switching circuits |
26 | Venkataraman Ramesh, Sudha Ram |
A methodology for interschema relationship identification in heterogeneous databases. |
HICSS (3) |
1995 |
DBLP DOI BibTeX RDF |
interschema relationship identification, data access techniques, federated schemas, schematic knowledge, integrity constraint knowledge, constraint-based relationships, schematic relationships, interoperability, heuristics, data integrity, distributed databases, database theory, information sharing, open systems, heterogeneous databases, schema integration |
26 | Jason Gait |
Optimizing Unix Database File Operations. |
IEEE Softw. |
1994 |
DBLP DOI BibTeX RDF |
Unix database file operations optimization, Ratfiles, Rational File System, Unix kernel, atomic write, write-order discipline, data integrity, data integrity, optimisation, database management systems, Unix |
26 | Luqi |
A Graph Model for Software Evolution. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
automatic assistance, integrity, graph theory, data integrity, software tools, consistency, software evolution, automatic programming, graph model, complex software systems, evolving software system, automated support |
26 | Bruno Ciciani, Daniel M. Dias, Balakrishna R. Iyer, Philip S. Yu |
A Hybrid Distributed Centralized System Structure for Transaction Processing. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
hybrid distributed centralized system structure, central system, non-local data, transaction processing applications, reservation systems, coherency control protocol, local transactions, distributed systems, concurrency, integrity, locality, data integrity, distributed processing, concurrency control, transaction processing, banking, remote accesses, insurance |
25 | Reouven Elbaz, David Champagne, Catherine H. Gebotys, Ruby B. Lee, Nachiketh R. Potlapally, Lionel Torres |
Hardware Mechanisms for Memory Authentication: A Survey of Existing Techniques and Engines. |
Trans. Comput. Sci. |
2009 |
DBLP DOI BibTeX RDF |
Memory Authentication, Integrity Trees, Board level attacks, Security, Trusted Computing, Active attacks |
25 | Mazleena Salleh, Teoh Chin Yew |
Application of 2D Barcode in Hardcopy Document Verification System. |
ISA |
2009 |
DBLP DOI BibTeX RDF |
hardcopy document, verification, integrity |
25 | Abid Khan, Qasim Arshad, Xiamu Niu, Yong Zhang 0023, Muhammad Waqas Anwar |
On the Security Properties and Attacks against Mobile Agent Graph Head Sealing (MAGHS). |
ISA |
2009 |
DBLP DOI BibTeX RDF |
Graph head Sealing, execution integrity, security properties, Mobile Agent security, malicious hosts, active attacks |
25 | Lingli Deng, Yeping He, Ziyao Xu |
Trusted Reputation Management Service for Peer-to-Peer Collaboration. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
data integrity, virtual machine, P2P, trusted computing, reputation management |
25 | Dolors Costal, Cristina Gómez 0001, Anna Queralt, Ernest Teniente |
Drawing Preconditions of Operation Contracts from Conceptual Schemas. |
CAiSE |
2008 |
DBLP DOI BibTeX RDF |
operation contracts, conceptual modelling, integrity constraints |
25 | Endre Bangerter, Maksim Djackov, Ahmad-Reza Sadeghi |
A Demonstrative Ad Hoc Attestation System. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
Kiosk computing, platform integrity, smart cards, Trusted computing, attestation |
25 | Wen-Chao Yang, Che-Yen Wen, Chung-Hao Chen |
Applying Public-Key Watermarking Techniques in Forensic Imaging to Preserve the Authenticity of the Evidence. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Integrity, Public-key Cryptography, Digital Image, Credibility, Digital Image Forensic |
25 | Danfeng Yao, Yunhua Koglin, Elisa Bertino, Roberto Tamassia |
Decentralized authorization and data security in web content delivery. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
web, data integrity, authorization, content delivery networks |
25 | Alessandro Fantechi, Stefania Gnesi, Laura Semini |
Achieving Fault Tolerance by a Formally Validated Interaction Policy. |
RODIN Book |
2006 |
DBLP DOI BibTeX RDF |
Integrity policies, fault tolerance, model checking, process algebras |
25 | Mihai Budiu, Úlfar Erlingsson, Martín Abadi |
Architectural support for software-based protection. |
ASID |
2006 |
DBLP DOI BibTeX RDF |
control-flow integrity, software fault isolation, security, control-flow graph, hardware support, memory protection, binary rewriting |
25 | Zhongwen Li |
Security and Safety Assurance Architecture: Model and Implementation (Supporting Multiple Levels of Criticality). |
ICA3PP |
2005 |
DBLP DOI BibTeX RDF |
Safety Kernel, Security and Safety Assurance Architecture, Integrity Policy for Criticality, Distributed Control System |
25 | Ilaria Venturini |
Counteracting Oracle attacks. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
integrity watermarking, oracle attack, security, covert channel, semi-fragile watermarking |
25 | Xavier C. Delannoy |
Understanding the Tension between Transition Rules and Confidentiality. |
BNCOD |
1996 |
DBLP DOI BibTeX RDF |
Discretionary Models of Confidentiality, Transition Integrity Constraints, Relational Model, Covert Channel |
25 | Narayanan Krishnakumar, Arthur J. Bernstein |
Bounded Ignorance: A Technique for Increasing Concurrency in a Replicated System. |
ACM Trans. Database Syst. |
1994 |
DBLP DOI BibTeX RDF |
concurrency control, replication, integrity constraints, reachability analysis, serializability |
25 | Louis C. Guillou, Jean-Jacques Quisquater |
A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
zero-knowledge interactive proofs, identity-based system, public key system, complexity, authentication, integrity, digital signature, randomization, identification, factoring, cryptology |
25 | Yi Lin 0005, Bettina Kemme, Ricardo Jiménez-Peris, Marta Patiño-Martínez, José Enrique Armendáriz-Iñigo |
Snapshot isolation and integrity constraints in replicated databases. |
ACM Trans. Database Syst. |
2009 |
DBLP DOI BibTeX RDF |
Replication, integrity constraints, snapshot isolation |
25 | Tennyson X. Chen, Martin D. Meyer, Nanthini Ganapathi |
Implementation considerations for improving data integrity in normalized relational databases. |
ACM Southeast Regional Conference |
2009 |
DBLP DOI BibTeX RDF |
data integrity functional independency, decomposition, normalization, functional dependency |
25 | Vincenzo De Florio, Chris Blondia |
Adaptive Data Integrity through Dynamically Redundant Data Structures. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
data structures, data integrity, Redundancy |
25 | Hamidah Ibrahim, Zarina Dzolkhifli, Praveen Madiraju |
A Model for Checking the Integrity Constraints of Mobile Databases. |
OTM Workshops |
2008 |
DBLP DOI BibTeX RDF |
integrity constraints, Mobile databases, constraint checking |
25 | Keisuke Fujita, Yuki Ashino, Tetsutaro Uehara, Ryôichi Sasaki |
Using Boot Control to Preserve the Integrity of Evidence. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
Evidence integrity, hysteresis signatures, boot control |
25 | Matteo Bordin, Thanassis Tsiodras, Maxime Perrotin |
Experience in the Integration of Heterogeneous Models in the Model-driven Engineering of High-Integrity Systems. |
Ada-Europe |
2008 |
DBLP DOI BibTeX RDF |
Model-driven Integration, High-Integrity Systems, Automated Code Generation |
25 | Keith B. Frikken, Joseph A. Dougherty IV |
An efficient integrity-preserving scheme for hierarchical sensor aggregation. |
WISEC |
2008 |
DBLP DOI BibTeX RDF |
secure aggregation, sensor networks, integrity |
25 | Fei Wang, Wolfgang Reinhardt 0002 |
Extending Geographic Data Modeling by Adopting Constraint Decision Table to Specify Spatial Integrity Constraints. |
AGILE Conf. |
2007 |
DBLP DOI BibTeX RDF |
Geographic data modeling, spatial integrity constraints, fielddata capture, data quality, Mobile GIS |
25 | Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig |
SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. |
SOSP |
2007 |
DBLP DOI BibTeX RDF |
code attestation, memory virtualization, hypervisor, code injection attacks, preventing, code integrity |
25 | Tsukasa Kudou, Nobuhiro Kataoka, Tadanori Mizuno |
Integrity Maintenance System of Database Query Under Updating. |
KES (3) |
2007 |
DBLP DOI BibTeX RDF |
integrity, relational database, query, temporal database, mission-critical system |
25 | Frederic Montagut, Refik Molva |
Traceability and Integrity of Execution in Distributed Workflow Management Systems. |
ESORICS |
2007 |
DBLP DOI BibTeX RDF |
Integrity of execution, Decentralized workflows, Traceability |
25 | Alberto Bartoli, Eric Medvet |
Automatic Integrity Checks for Remote Web Resources. |
IEEE Internet Comput. |
2006 |
DBLP DOI BibTeX RDF |
Web site defacement, GIS, integrity |
25 | Robert L. Glass |
Of Health, Trust, Money ... and Integrity. |
IEEE Softw. |
2006 |
DBLP DOI BibTeX RDF |
software engineering, integrity, software cost estimation |
25 | Danny Dhillon, Jerry Zhu, John Richards, Tejinder S. Randhawa |
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
multipoint relay (MPR), optimized link state routing (OLSR), routing protocol integrity, security, mobile ad-hoc networks (MANET), IP, intrusion detection systems (IDS) |
25 | Jun Chen 0008, Lei He 0001 |
Noise driven in-package decoupling capacitor optimization for power integrity. |
ISPD |
2006 |
DBLP DOI BibTeX RDF |
IC package, modeling, integrity, noise, power, resonance, decoupling capacitor, power distribution system |
25 | Shingo Orihara, Yukio Tsuruoka, Kenji Takahashi |
Trusted-link: web-link enhancement for integrity and trustworthiness. |
Digital Identity Management |
2006 |
DBLP DOI BibTeX RDF |
integrity, web, signature, link, trustworthiness |
25 | William Bereza, Yuming Tao, Shoujun Wang, Tad A. Kwasniewski, Rakesh H. Patel |
PELE: pre-emphasis & equalization link estimator to address the effects of signal integrity limitations. |
DAC |
2006 |
DBLP DOI BibTeX RDF |
analysis and optimization, simulation beyond the die, layout, signal integrity |
25 | Ahsan Habib 0001, Dongyan Xu, Mikhail J. Atallah, Bharat K. Bhargava, John Chuang |
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
message digest and media streaming, Data integrity |
Displaying result #201 - #300 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ >>] |
|