|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
25 | Maithili Narasimha, Gene Tsudik |
DSAC: integrity for outsourced databases with signature aggregation and chaining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIKM ![In: Proceedings of the 2005 ACM CIKM International Conference on Information and Knowledge Management, Bremen, Germany, October 31 - November 5, 2005, pp. 235-236, 2005, ACM, 1-59593-140-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
integrity and authenticity, signature aggregation, digital signature, schemes, data outsourcing |
25 | Ajoy Kumar Palit, Lei Wu, Kishore K. Duganapalli, Walter Anheier, Jürgen Schlöffel |
A New, Flexible and Very Accurate Crosstalk Fault Model to Analyze the Effects of Coupling Noise between the Interconnects on Signal Integrity Losses in Deep Submicron Chips. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 14th Asian Test Symposium (ATS 2005), 18-21 December 2005, Calcutta, India, pp. 22-27, 2005, IEEE Computer Society, 0-7695-2481-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
crosstalk model, aggressor-victim, ABCD-model, crosstalk-hazards, signal integrity |
25 | Mohammad Banikazemi, Dan E. Poff, Bülent Abali |
Storage-based file system integrity checker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005, pp. 57-63, 2005, ACM, 1-59593-233-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
file system integrity check, storage-based intrusion detection |
25 | Subhasish Mazumdar, Panos K. Chrysanthis |
Localization of Integrity Constraints in Mobile Databases and Specification in PRO-MOTION. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mob. Networks Appl. ![In: Mob. Networks Appl. 9(5), pp. 481-490, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
caching and replication, transaction processing, integrity constraints, mobile databases, data consistency, disconnected operations |
25 | Frances M. T. Brazier, Anja Oskamp, Corien Prins, Maurice Schellekens, Niek J. E. Wijngaards |
Law-abiding and integrity on the Internet: A case for agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Artif. Intell. Law ![In: Artif. Intell. Law 12(1-2), pp. 5-37, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
agent migration, integrity, software agents, legal aspects, agent platforms, liability |
25 | Jennifer Sampson, Clare Atkins |
Semantic Integrity in Data Warehousing: A Framework for Understanding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 225, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Data modelling, Data warehousing, Semantic integrity |
25 | Axelle Apvrille, James P. Hughes 0001, Vincent Girier |
Streamed or Detached Triple Integrity for a Time Stamped Secure Storage System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Security in Storage Workshop ![In: Proceedings of the First International IEEE Security in Storage Workshop, SISW 2002, Greenbelt, Maryland, USA, December 11, 2002, pp. 53-64, 2002, IEEE Computer Society, 0-7695-1888-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
XML, INTEGRITY, DIGITAL SIGNATURE, STORAGE, WORM, TIME STAMP |
25 | Colin D. Walter |
Data Integrity in Hardware for Modular Arithmetic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2000, Second International Workshop, Worcester, MA, USA, August 17-18, 2000, Proceedings, pp. 204-215, 2000, Springer, 3-540-41455-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
checker circuit, fault tolerance, testing, cryptography, data integrity, RSA, Computer arithmetic, correctness, error correction, soft errors, Montgomery multiplication, modular multiplication, modular exponentiation |
25 | HyungHyo Lee, BongNam Noh |
An Integrity Enforcement Application Design and Operation Framework in Role-Based Access Control Systems: A Session-Oriented Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 179-184, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
access control, integrity, RBAC, security model, separation of duty |
25 | Martin Gogolla |
Algebraization and Integrity Constraints for an Extended Entity-Relationship Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TAPSOFT, Vol.1 ![In: TAPSOFT'89: Proceedings of the International Joint Conference on Theory and Practice of Software Development, Barcelona, Spain, March 13-17, 1989, Volume 1: Advanced Seminar on Foundations of Innovative Software Development I and Colloquium on Trees in Algebra and Programming (CAAP'89), pp. 259-274, 1989, Springer, 3-540-50939-9. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
Theory of data bases, relational completeness, data model, abstract data type, formal semantics, integrity constraint, entity-relationship model, calculus, aggregate function |
24 | Kweku Kwakye Arthur, Martin S. Olivier, Hein S. Venter, Jan H. P. Eloff |
Considerations Towards a Cyber Crime Profiling System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 1388-1393, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 40th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-40 2007), 1-5 December 2007, Chicago, Illinois, USA, pp. 183-196, 2007, IEEE Computer Society, 0-7695-3047-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Philippe Thiran, Jean-Luc Hainaut, Geert-Jan Houben, Djamal Benslimane |
Wrapper-based evolution of legacy information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 15(4), pp. 329-359, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
legacy database, evolution, CASE tool, wrapper, data consistency, Schema transformation, data reverse-engineering |
24 | Kun Bai, Alex Hai Wang, Peng Liu 0005 |
Towards Database Firewalls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XIX, 19th Annual IFIP WG 11.3 Working Conference on Data and Applications Security, Storrs, CT, USA, August 7-10, 2005, Proceedings, pp. 178-192, 2005, Springer, 3-540-28138-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | K. W. Ko, I. T. Kim, Sang Bong Yoo, Ki-Chang Kim, Soo Duk Kim, J. S. Kim, Yong Surk Lee |
Compiling Rule-Based Agent for Distributed Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICS ![In: Innovative Internet Computing Systems, Second International Workshop, IICS 2002, Kühlungsborn, Germany, June 20-22, 2002, Proceedings, pp. 205-215, 2002, Springer, 3-540-43790-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Parke Godfrey, Jarek Gryz, Calisto Zuzarte |
Exploiting Constraint-Like Data Characterizations in Query Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2001 ACM SIGMOD international conference on Management of data, Santa Barbara, CA, USA, May 21-24, 2001, pp. 582-592, 2001, ACM, 1-58113-332-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Shweta Agrawal, Dan Boneh |
Homomorphic MACs: MAC-Based Integrity for Network Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009. Proceedings, pp. 292-305, 2009, 978-3-642-01956-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Gelareh Taban, Virgil D. Gligor |
Privacy-Preserving Integrity-Assured Data Aggregation in Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 168-175, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Charanjit S. Jutla |
Encryption Modes with Almost Free Message Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 21(4), pp. 547-578, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pairwise independent, Parallelizable, Authentication, Encryption, Block ciphers |
24 | Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin |
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCA ![In: 14th International Conference on High-Performance Computer Architecture (HPCA-14 2008), 16-20 February 2008, Salt Lake City, UT, USA, pp. 161-172, 2008, IEEE Computer Society, 978-1-4244-2070-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Hendrik Decker |
Extending Inconsistency-Tolerant Integrity Checking by Semantic Query Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 19th International Conference, DEXA 2008, Turin, Italy, September 1-5, 2008. Proceedings, pp. 89-96, 2008, Springer, 978-3-540-85653-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Wenbing Zhao 0001 |
Integrity-Preserving Replica Coordination for Byzantine Fault Tolerant Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 14th International Conference on Parallel and Distributed Systems, ICPADS 2008, Melbourne, Victoria, Australia, December 8-10, 2008, pp. 447-454, 2008, IEEE Computer Society, 978-0-7695-3434-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, Dan Lin 0001 |
High-Assurance Integrity Techniques for Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Sharing Data, Information and Knowledge, 25th British National Conference on Databases, BNCOD 25, Cardiff, UK, July 7-10, 2008. Proceedings, pp. 244-256, 2008, Springer, 978-3-540-70503-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Luciano Caroprese, Miroslaw Truszczynski |
Declarative Semantics for Revision Programming and Connections to Active Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JELIA ![In: Logics in Artificial Intelligence, 11th European Conference, JELIA 2008, Dresden, Germany, September 28 - October 1, 2008. Proceedings, pp. 100-112, 2008, Springer, 978-3-540-87802-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Mário de Sousa |
Restricting IEC 61131-3 programming languages for use on high integrity applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETFA ![In: Proceedings of 13th IEEE International Conference on Emerging Technologies and Factory Automation, ETFA 2008, September 15-18, 2008, Hamburg, Germany, pp. 361-368, 2008, IEEE, 1-4244-1505-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Jun Chen 0008, Lei He 0001 |
Efficient In-Package Decoupling Capacitor Optimization for I/O Power Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 26(4), pp. 734-738, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Yunsi Fei, Zhijie Jerry Shi |
Microarchitectural support for program code integrity monitoring in application-specific instruction set processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2007 Design, Automation and Test in Europe Conference and Exposition, DATE 2007, Nice, France, April 16-20, 2007, pp. 815-820, 2007, EDA Consortium, San Jose, CA, USA, 978-3-9810801-2-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Mehrdad Salehi, Yvan Bédard, Mir Abolfazl Mostafavi, Jean Brodeur |
On Languages for the Specification of Integrity Constraints in Spatial Conceptual Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER Workshops ![In: Advances in Conceptual Modeling - Foundations and Applications, ER 2007 Workshops CMLSA, FP-UML, ONISW, QoIS, RIGiM,SeCoGIS, Auckland, New Zealand, November 5-9, 2007, Proceedings, pp. 388-397, 2007, Springer, 978-3-540-76291-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Zoe Lin Jiang, Lucas Chi Kwong Hui, Kam-Pui Chow, Siu-Ming Yiu, Pierre K. Y. Lai |
Improving Disk Sector Integrity Using 3-dimension Hashing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCN (2) ![In: Future Generation Communication and Networking, FGCN 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings, pp. 141-145, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Austin Rogers, Milena Milenkovic, Aleksandar Milenkovic |
A low overhead hardware technique for software integrity and confidentiality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 25th International Conference on Computer Design, ICCD 2007, 7-10 October 2007, Lake Tahoe, CA, USA, Proceedings, pp. 113-120, 2007, IEEE, 1-4244-1258-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ege Engin, Krishna Bharath, Madhavan Swaminathan |
Analysis for Signal and Power Integrity Using the Multilayered Finite Difference Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCAS ![In: International Symposium on Circuits and Systems (ISCAS 2007), 27-20 May 2007, New Orleans, Louisiana, USA, pp. 1493-1496, 2007, IEEE, 1-4244-0920-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Ninghui Li, Ziqing Mao, Hong Chen |
Usable Mandatory Integrity Protection for Operating Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 164-178, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Somesh Jha, Stefan Katzenbeisser 0001, Christian Schallhart, Helmut Veith, Stephen Chenney |
Enforcing Semantic Integrity on Untrusted Clients in Networked Virtual Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 179-186, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Rob Peters, Pim Jorg, Marco Meesters, Marcel Hoogwout, Edwin Stuart |
Maintaining data-integrity in the back office registries of cities; a survey on organizational barriers and ways to address. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 1017-1024, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hendrik Decker |
An Integrity Semantics for Open World Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 4-8 September 2006, Krakow, Poland, pp. 532-536, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Hao Yu 0001, Joanna Ho, Lei He 0001 |
Simultaneous power and thermal integrity driven via stapling in 3D ICs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: 2006 International Conference on Computer-Aided Design, ICCAD 2006, San Jose, CA, USA, November 5-9, 2006, pp. 802-808, 2006, ACM, 1-59593-389-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
structured and parameterized model order reduction, thermal modeling and management |
24 | Ho-Jun Na, Deok-Hyun Yoon, Chang Soo Kim, Hyun-Suk Hwang |
Vulnerability Evaluation Tools of Matching Algorithm and Integrity Verification in Fingerprint Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part II, pp. 993-999, 2005, Springer, 3-540-28895-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Davide Martinenghi, Henning Christiansen 0001 |
Efficient Integrity Checking for Databases with Recursive Views. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS ![In: Advances in Databases and Information Systems, 9th East European Conference, ADBIS 2005, Tallinn, Estonia, September 12-15, 2005, Proceedings, pp. 109-124, 2005, Springer, 3-540-28585-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Kil-Sang Yoo, Mi-Ae Kim, Won-Hyung Lee |
Invertible Watermarking Scheme for Authentication and Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (2) ![In: Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II, pp. 371-381, 2005, Springer, 3-540-30040-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Rodrigo Almeida dos Santos, Mario Fiallos Aguilar, Paulo Benicio Melo de Sousa, Joao C. Sousa, Rossana M. C. Andrade |
Anti-Doping: An Approach for Grid Integrity Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICT/SAPIR/ELETE ![In: Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 17-22 July 2005, Lisbon, Portugal, pp. 2-7, 2005, IEEE Computer Society, 0-7695-2388-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad H. Tehranipour, Nisar Ahmed, Mehrdad Nourani |
Testing SoC interconnects for signal integrity using extended JTAG architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 23(5), pp. 800-811, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jordi Cabot, Ernest Teniente |
Determining the Structural Events That May Violate an Integrity Constraint. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UML ![In: «UML» 2004 - The Unified Modelling Language: Modelling Languages and Applications. 7th International Conference, Lisbon, Portugal, October 11-15, 2004. Proceedings, pp. 320-334, 2004, Springer, 3-540-23307-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Jinjun Xiong, Lei He 0001 |
Full-Chip Multilevel Routing for Power and Signal Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2004 Design, Automation and Test in Europe Conference and Exposition (DATE 2004), 16-20 February 2004, Paris, France, pp. 1116-1123, 2004, IEEE Computer Society, 0-7695-2085-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Atsushi Kurokawa, Nobuto Ono, Tetsuro Kage, Hiroo Masuda |
DEPOGIT: dense power-ground interconnect architecture for physical design integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 2004 Conference on Asia South Pacific Design Automation: Electronic Design and Solution Fair 2004, Yokohama, Japan, January 27-30, 2004, pp. 517-522, 2004, IEEE Computer Society, 0-7803-8175-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Johan Muskens, Michel R. V. Chaudron |
Integrity Management in Component Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 30th EUROMICRO Conference 2004, 31 August - 3 September 2004, Rennes, France, pp. 611-619, 2004, IEEE Computer Society, 0-7695-2199-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Tiehan Lv, Jörg Henkel, Haris Lekatsas, Wayne H. Wolf |
Enhancing Signal Integrity through a Low-Overhead Encoding Scheme on Address Buses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: 2003 Design, Automation and Test in Europe Conference and Exposition (DATE 2003), 3-7 March 2003, Munich, Germany, pp. 10542-10549, 2003, IEEE Computer Society, 0-7695-1870-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Bistarelli, Simon N. Foley |
A Constraint Framework for the Qualitative Analysis of Dependability Goals: Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 22nd International Conference, SAFECOMP 2003, Edinburgh, UK, September 23-26, 2003, Proceedings, pp. 130-143, 2003, Springer, 3-540-20126-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Pete Sterrantino, David Hacker, Ralph Fravel |
An Embedded Computer-Based Intraoperative Spinal Nerve Integrity Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 16th IEEE Symposium on Computer-Based Medical Systems (CBMS 2003), 26-27 June 2003, New York, NY, USA, pp. 367-, 2003, IEEE Computer Society, 0-7695-1901-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Ming Yao, Ernest Foo, Kun Peng, Ed Dawson |
An Improved Forward Integrity Protocol for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 272-285, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Mohammad H. Tehranipour, Nisar Ahmed, Mehrdad Nourani |
Multiple Transition Model and Enhanced Boundary Scan Architecture to Test Interconnects for Signal Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 21st International Conference on Computer Design (ICCD 2003),VLSI in Computers and Processors, 13-15 October 2003, San Jose, CA, USA, Proceedings, pp. 554-, 2003, IEEE Computer Society, 0-7695-2025-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Bistarelli, Simon N. Foley |
Analysis of Integrity Policies using Soft Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 77-80, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Moti Yung |
Crypto-integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 567-573, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Steffen Jurk, Mira Balaban |
Improving Integrity Constraint Enforcement by Extended Rules and Dependency Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 12th International Conference, DEXA 2001 Munich, Germany, September 3-5, 2001, Proceedings, pp. 501-516, 2001, Springer, 3-540-42527-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Andreas Meissner, Lars C. Wolf, Ralf Steinmetz |
A Novel Group Integrity Concept for Multimedia Multicasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDMS ![In: Interactive Distributed Multimedia Systems, 8th International Workshop,IDMS 2001, Lancaster, UK, September 4-7, 2001, Proceedings, pp. 233-244, 2001, Springer, 3-540-42530-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Jeevani Samantha Goonetillake, T. W. Carnduff, W. A. Gray |
Integrity Validation for Object Versions in a Co-operative Design Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2001, July 12-14, 2001, London, Ontario, Canada, pp. 89-94, 2001, IEEE, 0660184931. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Soroush Sedaghat, Josef Pieprzyk, Ehsan Vossough |
A Dynamic Web Agent for Verifying the Security and Integrity of a Web Site's Contents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the Sixth International Conference on Computer Supported Cooperative Work in Design, CSCWD 2001, July 12-14, 2001, London, Ontario, Canada, pp. 330-337, 2001, IEEE, 0660184931. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Andreas Meissner, Lars C. Wolf, Wolfgang Schönfeld, Ralf Steinmetz |
A Framework for Group Integrity Management in Multimedia Multicasting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 27th EUROMICRO Conference 2001: A Net Odyssey, 4-6 September 2001, Warsaw, Poland, pp. 346-353, 2001, IEEE Computer Society, 0-7695-1236-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | N. V. Arvind, P. R. Suresh, V. Sivakumar, Chandrani Pal, Debaprasad Das |
Integrated Crosstalk And Oxide Integrity Analysis In Dsm Designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 14th International Conference on VLSI Design (VLSI Design 2001), 3-7 January 2001, Bangalore, India, pp. 518-523, 2001, IEEE Computer Society, 0-7695-0831-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
24 | Enric Mayol, Ernest Teniente |
Addressing Efficiency Issues During the Process of Integrity Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 10th International Conference, DEXA '99, Florence, Italy, August 30 - September 3, 1999, Proceedings, pp. 270-281, 1999, Springer, 3-540-66448-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Seongwoo Kim, Arun K. Somani |
Area Efficient Architectures for Information Integrity in Cache Memories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCA ![In: Proceedings of the 26th Annual International Symposium on Computer Architecture, ISCA 1999, Atlanta, Georgia, USA, May 2-4, 1999, pp. 246-255, 1999, IEEE Computer Society, 0-7695-0170-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Susan Stepney |
Incremental Development of a High Integrity Compiler: Experience from an Industrial Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 13-14 November 1998, Washington, D.C, USA, Proceedings, pp. 142-149, 1998, IEEE Computer Society, 0-8186-9221-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Véronique Benzaken, Xavier Schaefer |
Static Management of Integrity in Object-Oriented Databases: Design and Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT'98, 6th International Conference on Extending Database Technology, Valencia, Spain, March 23-27, 1998, Proceedings, pp. 311-325, 1998, Springer, 3-540-64264-1. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
24 | Anne Doucet, Sophie Monties |
Versions of Integrity Constraints in Multiversion Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 8th International Conference, DEXA '97, Toulouse, France, September 1-5, 1997, Proceedings, pp. 252-261, 1997, Springer, 3-540-63478-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Véronique Benzaken, Xavier Schaefer |
Static Integrity Constraint Management in Object-Oriented Database Programming Languages via Predicate Transformers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP'97 - Object-Oriented Programming, 11th European Conference, Jyväskylä, Finland, June 9-13, 1997, Proceedings, pp. 60-84, 1997, Springer, 3-540-63089-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Stefan Conrad 0001, Michael Höding, Gunter Saake, Ingo Schmitt, Can Türker |
Schema Integration with Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 15th British National Conferenc on Databases, BNCOD 15, London, United Kingdom, July 7-9, 1997, Proceedings, pp. 200-214, 1997, Springer, 3-540-63263-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
24 | Hamidah Ibrahim, W. A. Gray, Nick J. Fiddian |
The Development of a Semantic Integrity Constraint Subsystem for a Distributed Database. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advances in Databases, 14th British National Conferenc on Databases, BNCOD 14, Edinburgh, UK, July 3-5, 1996, Proceedings, pp. 74-91, 1996, Springer, 3-540-61442-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Dimitris Plexousakis, John Mylopoulos |
Accomodating Integrity Constraints During Database Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: Advances in Database Technology - EDBT'96, 5th International Conference on Extending Database Technology, Avignon, France, March 25-29, 1996, Proceedings, pp. 497-513, 1996, Springer, 3-540-61057-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
24 | Stefano Ceri, Piero Fraternali, Stefano Paraboschi, Letizia Tanca |
Automatic Generation of Production Rules for Integrity Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 19(3), pp. 367-422, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
automatic generation of production rules |
24 | Naci Ishakbeyoglu, Z. Meral Özsoyoglu |
On the Maintenance of Implication Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 4th International Conference, DEXA'93, Prague, Czech Republic, September 6-8, 1993, Proceedings, pp. 221-232, 1993, Springer, 3-540-57234-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
24 | Claudia Bauzer Medeiros, Patrick Pfeffer |
Object Integrity Using Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECOOP ![In: ECOOP'91 European Conference on Object-Oriented Programming, Geneva, Switzerland, July 15-19, 1991, Proceedings, pp. 219-230, 1991, Springer, 3-540-54262-0. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
24 | Sami Harari |
Non-Linear Non-Commutative Functions for Data Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology: Proceedings of EUROCRYPT 84, A Workshop on the Theory and Application of of Cryptographic Techniques, Paris, France, April 9-11, 1984, Proceedings, pp. 25-32, 1984, Springer, 3-540-16076-0. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
|
24 | William H. Paxton |
A Client-Based Transaction System to Maintain Data Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the Seventh Symposium on Operating System Principles, SOSP 1979, Asilomar Conference Grounds, Pacific Grove, California, USA, 10-12, December 1979, pp. 18-23, 1979, ACM, 0-89791-009-5. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
|
24 | Eduardo B. Fernández, Rita C. Summers |
Integrity aspects of a shared data base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1976 National Computer Conference, 7-10 June 1976, New York, NY, USA, pp. 819-827, 1976, AFIPS Press, 978-1-4503-7917-5. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
|
24 | Michael Stonebraker |
Implementation of Integrity Constraints and Views by Query Modification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1975 ACM SIGMOD International Conference on Management of Data, San Jose, California, USA, May 14-16, 1975., pp. 65-78, 1975, ACM, 978-1-4503-7328-9. The full citation details ...](Pics/full.jpeg) |
1975 |
DBLP DOI BibTeX RDF |
|
21 | Cole Schlesinger, Karthik Pattabiraman, Nikhil Swamy, David Walker 0001, Benjamin G. Zorn |
Modular Protections against Non-control Data Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011, pp. 131-145, 2011, IEEE Computer Society, 978-1-61284-644-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
non-control data attack, control-flow integrity, frame rule, data isolation, data integrity, Hoare logic, language-based security |
21 | Fan Zhang, Guoqing Wu, Min Jiang, Xiaoli Liu |
Concerning about Trust of Platform Hardware. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (2) ![In: PACIIA 2008, Volume 2, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 852-856, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Hardware Integrity, Trusted Computing, TCG, Integrity Measurement |
21 | Ahmad Alsaadi |
A performance analysis approach based on the UML class diagram. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSP ![In: Proceedings of the Fourth International Workshop on Software and Performance, WOSP 2004, Redwood Shores, California, USA, January 14-16, 2004, pp. 254-260, 2004, ACM. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
QN performance model, data integrity constraints, data integrity model, performance values, UML class diagram |
21 | Andrew C. Jones, Iain Sutherland, Suzanne M. Embury, W. A. Gray, Richard J. White, John S. Robinson, Frank A. Bisby, Sue M. Brandt |
Techniques for Effective Integration, Maintenance and Evolution of Species Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSDBM ![In: Proceedings of the 12th International Conference on Scientific and Statistical Database Management, Berlin, Germany, July 26-28, 2000, pp. 3-13, 2000, IEEE Computer Society, 0-7695-0686-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Taxonomic database, Species database, Integrity repair, Integrity constraints, Database integration, Biodiversity informatics |
21 | Amihai Motro |
Intensional Answers to Database Queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 6(3), pp. 444-454, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
intensional information, data classes, extensional information, database answers, intensional statements, research directions, classifications, user interfaces, user interfaces, query processing, data integrity, database management systems, database systems, integrity constraints, inference rules, database queries, class hierarchies |
21 | Xiaolei Qian, Gio Wiederhold |
Incremental Recomputation of Active Relational Expressions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 3(3), pp. 337-341, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
active relational expressions, active queries, incremental recomputation, finite differencing techniques, relational databases, data integrity, monitors, query languages, views, integrity constraints, materialized views, update propagation, database updates, derived data |
21 | Chitta Baral, Sarit Kraus, Jack Minker |
Combining Multiple Knowledge Bases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 3(2), pp. 208-220, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
multiple knowledge base systems, single knowledge base, function symbols, maximal theory, data integrity, knowledge based system, knowledge based systems, database theory, deductive database, deductive databases, integrity constraints, maximality, view update problem |
21 | Clement T. Yu, Wei Sun 0002 |
Automatic Knowledge Acquisition and Maintenance for Semantic Query Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 1(3), pp. 362-375, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
database states, statistic integrity constraints, dynamic integrity constraints, join predicates, constraints, knowledge based systems, knowledge acquisition, knowledge acquisition, database management systems, maintenance, semantic query optimization, interactive tool, automatic tool |
20 | Amel Mammar |
A systematic approach to generate B preconditions: application to the database domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Syst. Model. ![In: Softw. Syst. Model. 8(3), pp. 385-401, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
B operations, Formal specification, Invariant, Integrity constraints, Precondition |
20 | Xiaotao Guo, Tian-Ge Zhuang |
A Region-Based Lossless Watermarking Scheme for Enhancing Security of Medical Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 22(1), pp. 53-64, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security, integrity, Watermarking, confidentiality, telemedicine, PACS, ROI, image authentication |
20 | Ioannis G. Baltopoulos, Andrew D. Gordon 0001 |
Secure compilation of a multi-tier web language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TLDI ![In: Proceedings of TLDI'09: 2009 ACM SIGPLAN International Workshop on Types in Languages Design and Implementation, Savannah, GA, USA, January 24, 2009, pp. 27-38, 2009, ACM, 978-1-60558-420-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptography, compilers, integrity, type systems, web programming, web application security |
20 | Stefan Berger, Ramón Cáceres, Dimitrios E. Pendarakis, Reiner Sailer, Enriquillo Valdez, Ronald Perez, Wayne Schildhauer, Deepa Srinivasan |
TVDc: managing security in the trusted virtual datacenter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 42(1), pp. 40-47, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual trusted platform module, security, integrity, virtualization, isolation, mandatory access control |
20 | Michael Paulitsch, Brendan Hall |
Starting and Resolving a Partitioned BRAIN. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 11th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2008), 5-7 May 2008, Orlando, Florida, USA, pp. 415-421, 2008, IEEE Computer Society, 978-0-7695-3132-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
braided ring, TTP/C, IMA, communication platform, x-by-wire, synchronization, integrity, availability, BRAIN, time-triggered, FlexRay, start-up |
20 | Ming-Fang Lai, Hung-Ming Chen |
An Implementation of Performance-Driven Block and I/O Placement for Chip-Package Codesign. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 9th International Symposium on Quality of Electronic Design (ISQED 2008), 17-19 March 2008, San Jose, CA, USA, pp. 604-607, 2008, IEEE Computer Society, 978-0-7695-3117-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Chip-Package Codesign, I/O Placement, Power Integrity |
20 | Tuan Phan, Danfeng (Daphne) Yao |
SelectAudit: A Secure and Efficient Audit Framework for Networked Virtual Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CollaborateCom ![In: Collaborative Computing: Networking, Applications and Worksharing, 4th International Conference, CollaborateCom 2008, Orlando, FL, USA, November 13-16, 2008, Revised Selected Papers, pp. 207-216, 2008, Springer / ICST, 978-3-642-03353-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
algorithm, integrity, audit, networked virtual environments |
20 | Givon Zirkind |
AFIS data compression: an example of how domain specific compression algorithms can produce very high compression ratios. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 32(6), 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
AFIS, automated fingerprint identification systems, double compression, limits of compression, retrofitting, serial compression, software engineering, data integrity, compression, data compression, image compression, fingerprinting, graphics, portability, image quality, compatibility, data encryption |
20 | Nick L. Petroni Jr., Michael W. Hicks |
Automated detection of persistent kernel control-flow attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 103-115, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
CFI, integrity, virtualization, kernel, rootkit |
20 | Aleksej Jerman Blazic |
Long Term Trusted Archive Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: First International Conference on the Digital Society (ICDS 2007), 2-6 January 2007, Guadeloupe, French Caribbean, pp. 29, 2007, IEEE Computer Society, 978-0-7695-2760-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Electronic archive, authenticity, trust, protocol, integrity, validity, authority, document, evidence, record, long-term |
20 | Ying Guo, Xiushan Lu |
An Efficient New Method on Accurately Estimating Galileo VPL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCTA ![In: Computer And Computing Technologies In Agriculture, Volume I, First IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture (CCTA 2007), Wuyishan, China, August 18-20, 2007, pp. 231-238, 2007, Springer, 978-0-387-77250-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
integrity theory, SISE, VPL, Galileo |
20 | Matthias Jacob, Mariusz H. Jakubowski, Ramarathnam Venkatesan |
Towards integral binary execution: implementing oblivious hashing using overlapped instruction encodings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MM&Sec ![In: Proceedings of the 9th workshop on Multimedia & Security, MM&Sec 2007, Dallas, Texas, USA, September 20-21, 2007, pp. 129-140, 2007, ACM, 978-1-59593-857-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anti-disassembly, oblivious hashing, overlapped code, obfuscation, tamper-resistance, integrity checking |
20 | Grace C.-W. Ting, Bok-Min Goi, Swee-Huay Heng |
A Fragile Watermarking Scheme Protecting Originator's Rights for Multimedia Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part I, pp. 644-654, 2007, Springer, 978-3-540-74468-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
integrity protection, originator’s rights, security, protocol, fragile watermarking, ubiquitous environment, Multimedia service |
20 | Reouven Elbaz, David Champagne, Ruby B. Lee, Lionel Torres, Gilles Sassatelli, Pierre Guillemin |
TEC-Tree: A Low-Cost, Parallelizable Tree for Efficient Defense Against Memory Replay Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHES ![In: Cryptographic Hardware and Embedded Systems - CHES 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings, pp. 289-302, 2007, Springer, 978-3-540-74734-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Memory Integrity, Physical Attacks, Tamper Evidence, Parallelizability, Confidentiality, Replay Attacks, Merkle Trees |
20 | John Grant, Anthony Hunter |
Measuring inconsistency in knowledgebases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Inf. Syst. ![In: J. Intell. Inf. Syst. 27(2), pp. 159-184, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Conflict resolution, Integrity constraints, Inconsistency, Paraconsistent logic |
20 | Ajoy Kumar Palit, Kishore K. Duganapalli, Walter Anheier |
Modeling of Crosstalk Fault in Defective Interconnects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PATMOS ![In: Integrated Circuit and System Design. Power and Timing Modeling, Optimization and Simulation, 16th International Workshop, PATMOS 2006, Montpellier, France, September 13-15, 2006, Proceedings, pp. 340-349, 2006, Springer, 3-540-39094-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
defect-based-crosstalk fault model, signal integrity losses, aggres-sor-victim, ABCD-model, crosstalk-hazards |
20 | Kenneth G. Paterson, Arnold K. L. Yau |
Cryptography in Theory and Practice: The Case of Encryption in IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings, pp. 12-29, 2006, Springer, 3-540-34546-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
integrity, encryption, IPsec, ESP |
20 | Qiang Huang, David Jao, Helen J. Wang |
Applications of secure electronic voting to automated privacy-preserving troubleshooting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005, pp. 68-80, 2005, ACM, 1-59593-226-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
automatic troubleshooting, privacy, integrity, homomorphic encryption, zero knowledge proof |
Displaying result #301 - #400 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|