The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for protection with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1961-1968 (18) 1969-1973 (23) 1974-1975 (29) 1976 (30) 1977 (21) 1978 (25) 1979 (21) 1980 (15) 1981 (17) 1982 (23) 1983 (18) 1984 (27) 1985 (23) 1986 (23) 1987 (27) 1988 (33) 1989 (44) 1990 (36) 1991 (91) 1992 (55) 1993 (68) 1994 (59) 1995 (65) 1996 (96) 1997 (118) 1998 (131) 1999 (168) 2000 (232) 2001 (339) 2002 (361) 2003 (639) 2004 (843) 2005 (1008) 2006 (1107) 2007 (1175) 2008 (1164) 2009 (987) 2010 (662) 2011 (701) 2012 (807) 2013 (856) 2014 (912) 2015 (802) 2016 (966) 2017 (881) 2018 (1037) 2019 (1164) 2020 (1157) 2021 (1209) 2022 (1166) 2023 (1181) 2024 (253)
Publication types (Num. hits)
article(7850) book(33) data(8) incollection(362) inproceedings(14243) phdthesis(341) proceedings(76)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7090 occurrences of 2819 keywords

Results
Found 22916 publication records. Showing 22913 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26A. M. Frolov A Hybrid Approach to Enhancing the Reliability of Software. Search on Bibsonomy Program. Comput. Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Bin Zhou, Hussein T. Mouftah Spare capacity planning using survivable alternate routing for long-haul WDM networks. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Roger M. Needham The CAP Project - An Interim Evaluation. Search on Bibsonomy SOSP The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
26Muhammad Awais Shibli, Imran Yousaf, Sead Muftic MagicNET: Security System for Protection of Mobile Agents. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Mobile Agent's Code Protection, Agent's Baggage Protection
26Jibin Cheng, Wenzhe Zhang, Jiwen Yang Local Optimum Algorithms for Self-Protection in Wireless Sensor Networks. Search on Bibsonomy MSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple protection sets, local information, Self protection, active nodes
26Xuebing Zhou, Stephen D. Wolthusen, Christoph Busch 0001, Arjan Kuijper Feature Correlation Attack on Biometric Privacy Protection Schemes. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF feature correlation attack, correlation of biometric features, privacy protection, template protection
26Hyun Jun Jang, Dae Won Hwang, Eul-Gyu Im Data Protection in Memory Using Byte Reordering. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Information Security, Data Protection, Memory protection
26J. Tang, James Langston, Michael Sloderbeck, Dean Ouellette, P. G. McLaren In system emulation (ISE) of a current differential back-up protection relay. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF differential protection, wide-area back-up protection, emulation, relay
26Lawrence Snyder Formal Models of Capability-Based Protection Systems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1981 DBLP  DOI  BibTeX  RDF theoretical models of protection, grammatical protection systems, right-passing, Take/Grant Models, security, safety, Capabilities
25Giray Birkan, Jeffery L. Kennington Design procedures for backbone transport networks with shared protection: optimization-based models, exact and heuristic algorithms, and unavailability computations. Search on Bibsonomy Telecommun. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Integer programming applications, DWDM network design, Polarization mode dispersion, Shared protection, Availability, Network provisioning
25Kyong-jin Kim, Eugene Kim, Seng-Phil Hong Privacy information protection in portable device. Search on Bibsonomy ICHIT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy information protection, portable device
25Jeffrey B. Lotspiech Broadcast encryption versus public key cryptography in content protection systems. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tracing traitors, drm, broadcast encryption, content protection
25Supachai Tangwongsan, Sathaporn Kassuvan A highly effective model for security protection against eavesdropping exploits. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security protection, voice eavesdropping, voice encryption, security model, key exchange
25Janice C. Sipior, Burke T. Ward Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Legal protection, Privacy, Trust, Spyware
25Dimitris K. Tsolis, Theodore S. Papatheodorou Web services for digital rights management and copyright protection in digital media. Search on Bibsonomy DIMEA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital rights management system, web services, metadata, watermarking, copyright protection
25Fanny Coudert, Jos Dumortier Intelligent Video Surveillance Networks: Data Protection Challenges. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF image recognition software, interconnection of video surveillance networks, video analytics, video surveillance, data protection, behaviour analysis
25Rajat Subhra Chakraborty, Swarup Bhunia Hardware protection and authentication through netlist level obfuscation. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IP piracy, design for security, hardware authentication, hardware obfuscation, hardware protection
25Richard H. Stern West Coast Federal Appeals Court Upholds Chip Protection Act Violation Finding. Search on Bibsonomy IEEE Micro The full citation details ... 2007 DBLP  DOI  BibTeX  RDF antitrust violation, Semiconductor Chip Protection Act, chip piracy, monopoly, Altera, Clear Logic, reverse engineering, ASICs, law, bitstream
25Mesut E. Baran, Nikhil Mahajan, Sercan Teleke Simulation-based design of protection schemes for shipboard power systems. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF electromagnetic transient analysis, power electronic systems, power system protection, power system simulation
25Changjin Lee, Bong Gyou Lee, Youngil Kong Privacy Protection for a Secure u-City Life. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ubiquitous Computing, Privacy Protection, Personal Information, u-City
25Hui-Kai Su, Cheng-Shong Wu Local Link Protection Scheme in IP Networks. Search on Bibsonomy International Conference on Computational Science (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP network survivability, fast reroute, link protection
25Hongxia Jin, Ginger Myles A technique for self-certifying tamper resistant software. Search on Bibsonomy QoP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software tamper resistance, content protection, attack tree, security measurement
25Zili Shao, Chun Xue, Qingfeng Zhuge, Mei Kang Qiu, Bin Xiao 0001, Edwin Hsing-Mean Sha Security Protection and Checking for Embedded System Integration against Buffer Overflow Attacks via Hardware/Software. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF hardware/software, Security, embedded system, protection, buffer overflow attack
25Jordi Perelló, Eduard Escalona, Salvatore Spadaro, Fernando Agraz, Jaume Comellas, Gabriel Junyent Control Plane Protection Using Link Management Protocol (LMP) in the ASON/GMPLS CARISMA Network. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF LMP, protection, GMPLS, ASON
25Lei Guo 0005, Lemin Li, Jin Cao, Hongfang Yu, Xuetao Wei Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks. Search on Bibsonomy ICDCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF differentiated reliability, Correlated Link Failure Probability (CLFP), double-link failures, path shared protection, WDM networks
25Kyoungwoo Lee, Aviral Shrivastava, Ilya Issenin, Nikil D. Dutt, Nalini Venkatasubramanian Mitigating soft error failures for multimedia applications by selective data protection. Search on Bibsonomy CASES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF horizontally partitioned caches, multimedia embedded systems, selective data protection, soft errors
25Hongxia Jin Privacy, traceability, and anonymity for content protection. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anonymous trust, security, privacy, tracing, content protection
25Shenghong Li 0001, Lili Cui, Jong-Uk Choi, Xuenan Cui An Audio Copyright Protection Schemes Based on SMM in Cepstrum Domain. Search on Bibsonomy SSPR/SPR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF statistical mean manipulation, cepstrum domain, watermark, information hiding, copyright protection
25Weidong Shi, Hsien-Hsin S. Lee, Chenghuai Lu, Mrinmoy Ghosh Towards the issues in architectural support for protection of software execution. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, encryption, attack, tamper resistance, copy protection
25Jianfei Cai 0001, Xiangjun Li, Chang Wen Chen Layered unequal loss protection with pre-interleaving for fast progressive image transmission over packet-loss channels. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF unequal loss protection, forward error correction, packet loss, joint source-channel coding, Progressive image transmission
25Roy Sterritt, Michael G. Hinchey Engineering Ultimate Self-Protection in Autonomic Agents for Space Exploration Missions. Search on Bibsonomy ECBS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Self-Destruction, Pulse Monitoring, Autonomic Computing, Autonomic Agents, Exploration, Self-Protection, Apoptosis
25Miklós Molnár, Alexandre Guitton, Bernard Cousin, Raymond A. Marie Efficient Protection of Many-to-One Communications. Search on Bibsonomy EDCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF many-to-one, cold protection, multi-tree algorithm, network, fault-tolerant routing
25Valery Pryamikov Call Tree Transformation for Program Obfuscation and Copy Protection. Search on Bibsonomy DRMTICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Software Copy Protection, Software Watermarking, Software Obfuscation
25Vinh Trong Le, Son-Hong Ngo, Xiaohong Jiang 0001, Susumu Horiguchi, Yasushi Inoguchi A Hybrid Algorithm for Dynamic Lightpath Protection in Survivable WDM Optical Networks. Search on Bibsonomy ISPAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF survivable routing, lightpath protection, genetic algorithms, mobile agents, Wavelength-division-multiplexing
25Radu Sion, Mikhail J. Atallah, Sunil Prabhakar Rights Protection for Relational Data. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Rights protection, watermarking, information hiding, relational data
25Sastry Duri, Jeffrey Elliott, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang Data Protection and Data Sharing in Telematics. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF data protection architecture, automotive telematics, privacy policies
25Philip W. L. Fong Pluggable verification modules: an extensible protection mechanism for the JVM. Search on Bibsonomy OOPSLA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Aegis VM, extensible protection mechanism, pluggable verification modules, proof linking, Java virtual machine, bytecode verification, extensible systems, mobile code security
25Vicenç Torra, Sadaaki Miyamoto Evaluating Fuzzy Clustering Algorithms for Microdata Protection. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Fuzzy clustering, Privacy preserving data mining, Statistical Disclosure Control, Inference Control, Microaggregation, Microdata Protection
25Josep Maria Mateo-Sanz, Francesc Sebé, Josep Domingo-Ferrer Outlier Protection in Continuous Microdata Masking. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Masking methods, Outliers, Statistical disclosure control, Statistical database protection
25Hui Zang, Canhui Ou, Biswanath Mukherjee Path-protection routing and wavelength assignment (RWA) in WDM mesh networks under duct-layer constraints. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF optical network, protection, wavelength-division multiplexing (WDM), lightpath, wavelength routing, integer linear program (ILP), shared risk link group
25Sanghoon Lee 0001, Christine Podilchuk, Vidhya Krishnan, Alan C. Bovik Foveation-Based Error Resilience and Unequal Error Protection over Mobile Networks. Search on Bibsonomy J. VLSI Signal Process. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF foveated video, internet video, error resilience, wireless video, unequal error protection
25Hao-Hua Chu, Lintian Qiao, Klara Nahrstedt, Hua Wang, Ritesh Jain A secure multicast protocol with copyright protection. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF watermark, copyright protection, key distribution, multicast security
25Shing-Chi Cheung, Hanif Curreem Rights Protection for Digital Contents Redistribution Over the Internet. Search on Bibsonomy COMPSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF copy deterrence, watermarking protocols, E-commerce, digital watermarking, copyright protection, digital rights management, digital certificate
25Miroslav Begovic, Borka Milosevic, Damir Novosel A Novel Method for Voltage Instability Protection. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Power system protection, voltage stability
25Sabu Emmanuel, Mohan S. Kankanhalli Copyright Protection For Mpeg-2 Compressed Broadcast Video. Search on Bibsonomy ICME The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Video Security, Multicasting, Video on Demand, Digital Watermarks, Copyright Protection, MPEG-2, Video Watermarking, Pay TV, Digital Video Broadcasting
25Feng Bao 0001 Multimedia content protection by cryptography and watermarking in tamper-resistant hardware. Search on Bibsonomy ACM Multimedia Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF multimedia content protection, tamper-resistant hardware, watermarking technology, public key cryptography
25E. Strother Denial of Service Protection - The Nozzle. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF denial of service protection, nozzle, domain name server, network pumps, untrusted user, trusted traffic, packet placement, protocols, protocol, intrusion detection, computer networks, Web server, firewalls, cost, authorisation, telecommunication security, network resource
25Ton Kalker System Issues in Digital Image and Video Watermarking for Copy Protection. Search on Bibsonomy ICMCS, Vol. 1 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Watermarking, Copy Protection, DVD
25João Carlos Cunha, João Gabriel Silva DELFIM: Error Detection by Thin Memory Protection. Search on Bibsonomy EUROMICRO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF thin memory protection, VME standard board, detection capability, DELFIM, error detection, error detection, concurrent error detection, error recovery, fault tolerant system
25Kari Kuutti, Jaakko Virkkunen Organisational memory and learning network organisation: the case of Finnish labour protection inspectors. Search on Bibsonomy HICSS (4) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF learning network organisation, Finnish labour protection inspectors, work orientation, work organization, management, learning systems, organisational memory, computer tool
24Osameh M. Al-Kofahi, Ahmed E. Kamal 0001 Network coding-based protection of many-to-one wireless flows. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Toby Xu, Ying Cai Feeling-based location privacy protection for location-based services. Search on Bibsonomy CCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF feeling-based privacy model, k-anonymity model, trajectory cloaking, location-based services, location privacy
24Yang Zhan 0002, Haibo Tian, Qingqi Pei, Yueyu Zhang, Yumin Wang, Weidong Zhang A Deep Copy Protection Framework for Electronic Devices within Home. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Yonghong Sheng, Dongsheng Wang 0002, Jinyang He, Dapeng Ju TH-CDP: An Efficient Block Level Continuous Data Protection System. Search on Bibsonomy NAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Hans Löhr, Ahmad-Reza Sadeghi, Christian Stüble, Marion Weber, Marcel Winandy Modeling Trusted Computing Support in a Protection Profile for High Assurance Security Kernels. Search on Bibsonomy TRUST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Hassan Mansour, Panos Nasiopoulos, Vikram Krishnamurthy Real-time joint rate and protection allocation for multi-user scalable video streaming. Search on Bibsonomy PIMRC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Nelly Fazio, Dulce B. Ponceleon Tutorial on content protection. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF 4c, aacs, blu-ray disc, broadcast encryption, traitor tracing
24Ruiqin Xiong, David S. Taubman Optimal LR-PET protection for scalable video streams over lossy channels with random delay. Search on Bibsonomy MMSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Caroline Rocha, Brigitte Jaumard Revisiting p-Cycles / FIPP p-Cycles vs. Shared Link / Path Protection. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Piotr Cofta Confidence-Compensating Privacy Protection. Search on Bibsonomy PST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Changcheng Huang, Minzhe Li, Anand Srinivasan A Scalable Path Protection Mechanism for Guaranteed Network Reliability Under Multiple Failures. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Hongbin Luo, Lemin Li, Hongfang Yu, Sheng Wang 0006 Achieving Shared Protection for Dynamic Multicast Sessions in Survivable Mesh WDM Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24John Doucette 0001, Wayne D. Grover, Peter A. Giese Physical-Layer p-Cycles Adapted for Router-Level Node Protection: A Multi-Layer Design and Operation Strategy. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Anna Urra, Eusebi Calle, José-Luis Marzo, Pere Vilà Incorporating Protection Mechanisms in the Dynamic Multi-layer Routing Schemes. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Xu Shao, Luying Zhou, Weiguo Zheng, Yixin Wang Providing Differentiated Quality-of-Protection for Surviving Double-Link Failures in WDM Mesh Networks. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Hirokazu Ozaki, Atsushi Kara Computing the Availability and MTTF of Shared Protection Systems. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Balachander Krishnamurthy, Delfina Malandrino, Craig E. Wills Measuring privacy loss and the impact of privacy protection in web browsing. Search on Bibsonomy SOUPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, web
24Nicholas Paul Sheppard On implementing mpeg-21 intellectual property management and protection. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MPEG REL, MPEG-21 IPMP, implementation, digital rights management
24Xiaosong Lou, Kai Hwang 0001, Runfang Zhou Integrated Copyright Protection in Peer-to-Peer Networks. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Internet content delivery systems, peer collusion, content poisoning, reputation systems and digital right management, Peer-to-Peer systems
24Shahram Shah-Heydari, Oliver W. W. Yang Performance study of self-repairing unicast hierarchical protection trees in mesh networks. Search on Bibsonomy BROADNETS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Rance J. DeLong, Thuy D. Nguyen, Cynthia E. Irvine, Timothy E. Levin Toward a Medium-Robustness Separation Kernel Protection Profile. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Ram Kumar 0001, Akhilesh Singhania, Andrew Castner, Eddie Kohler, Mani B. Srivastava A System For Coarse Grained Memory Protection In Tiny Embedded Processors. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Wen-Nung Lie, Guo-Shiang Lin, Sheng-Lung Cheng Dual protection of JPEG images based on informed embedding and two-stage watermark extraction techniques. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Yu Lin, Haitham S. Hamza, Jitender S. Deogun Designing Fast and Bandwidth Efficient Protection Scheme for WDM Optical Networks. Search on Bibsonomy Networking The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Soo-Cheol Kim, Sang-Soo Yeo, Sung Kwon Kim MARP: Mobile Agent for RFID Privacy Protection. Search on Bibsonomy CARDIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Ronghui Tu, Feiyuan Wang, Jiying Zhao, Abdulmotaleb El-Saddik Copyright Protection ofWeb Applications throughWatermarking. Search on Bibsonomy ICICIC (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Lin Yuan, Gang Qu 0001, Lahouari Ghouti, Ahmed Bouridane VLSI Design IP Protection: Solutions, New Challenges, and Opportunities. Search on Bibsonomy AHS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Syed Muhammad Atif Saleem, Adel M. Sharaf Ultra High Speed Protection of Series Compensated Transmission Lines using Wavelet Transforms. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Saurav Das, Jaedon Kim, David Gutierrez, Leonid G. Kazovsky, Richard Rabbat, Ching-Fong Su, Takeo Hamada Protection and Spatial Reuse in Optical Burst Transport (OBT) Networks. Search on Bibsonomy BROADNETS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Kemal Altinkemer, Junwei Guan, Aysegül Sahin Online software distribution without enforcing copy protection as a strategic weapon. Search on Bibsonomy Inf. Syst. E Bus. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24David S. Taubman, Johnson Thie Optimal erasure protection for scalably compressed video streams with limited retransmission. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Tong Gan, Kai-Kuang Ma Weighted unequal error protection for transmitting scalable object-oriented images over packet-erasure networks. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Wei Hu Using Logical Data Protection and Recovery to Improve Data Availability. Search on Bibsonomy ISAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Claus G. Gruber A Comparison on Bandwidth Requirements of Path Protection Mechanisms. Search on Bibsonomy ICN (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Wojciech Molisz, Jacek Rak Region Protection/Restoration Scheme in Survivable Networks. Search on Bibsonomy MMM-ACNS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Pin-Han Ho, János Tapolcai, Hussein T. Mouftah On achieving optimal survivable routing for shared protection in survivable next-generation Internet. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Hassan Naser, Hussein T. Mouftah A multilayer differentiated protection services architecture. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Xuxian Jiang, Dongyan Xu, Rudolf Eigenmann Protection mechanisms for application service hosting platforms. Search on Bibsonomy CCGRID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Lin Yuan, Pushkin R. Pari, Gang Qu 0001 Soft IP Protection: Watermarking HDL Codes. Search on Bibsonomy Information Hiding The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Sung-Hyun Yun, Hyung-Woo Lee The Undeniable Multi-signature Scheme Suitable for Joint Copyright Protection on Digital Contents. Search on Bibsonomy PCM (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Luisa Franconi, Julian Stander Spatial and non-spatial model-based protection procedures for the release of business microdata. Search on Bibsonomy Stat. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Community Innovation Survey, conditional autoregressive scheme, performance assessment for disclosure limitation methods, confidentiality, Gibbs sampler
24Fabio Ricciato, Marco Listanti, Angelo Belmonte, Daniele Perla Performance Evaluation of a Distributed Scheme for Protection against Single and Double Faults for MPLS. Search on Bibsonomy QoS-IP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Haigang Feng, Rouying Zhan, Qiong Wu 0013, Guang Chen, Xiaokang Guan, Haolu Xie, Albert Z. Wang Mixed-mode ESD protection circuit simulation-design methodology. Search on Bibsonomy ISCAS (4) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Mladen Kezunovic Data Integration and Information Exchange for Enhanced Control and Protection of Power Systems. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Michael K. Reiter, Asad Samar, Chenxi Wang The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Ramesh A. Dandekar, Michael Cohen, Nancy Kirkendall Sensitive Micro Data Protection Using Latin Hypercube Sampling Technique. Search on Bibsonomy Inference Control in Statistical Databases The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Heun Kim, Dae-Joon Hwang A Study on the System Call for the Protection of Intellectual Property Rights on Linux Base. Search on Bibsonomy PRDC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF IPR, systemcall, hooking, RPLA, kernel
24Michael Golm, Jürgen Kleinöder, Frank Bellosa Beyond Address Spaces - Flexibility, Performance, Protection, and Resource Management in the Type-Safe JX Operating System. Search on Bibsonomy HotOS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Christopher Metz 0001 On the Wire: IP Protection and Restoration. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Giovanni Iachello, Kai Rannenberg Protection Profiles for Remailer Mixes. Search on Bibsonomy Workshop on Design Issues in Anonymity and Unobservability The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 22913 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license