|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Francesco Palmieri 0002, Ugo Fiore |
Securing the MPLS Control Plane. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
strong authentication, label distribution, integrity, MPLS, signaling |
20 | Frédéric Gervais, Marc Frappier, Régine Laleau |
Synthesizing B Specifications from EB3 Attribute Definitions. |
IFM |
2005 |
DBLP DOI BibTeX RDF |
data integrity constraints, Information systems, pattern matching, attributes, B, recursive functions |
20 | Tom Walcott, Matt Bishop |
Traducement: A model for record security. |
ACM Trans. Inf. Syst. Secur. |
2004 |
DBLP DOI BibTeX RDF |
traducement, Integrity, security policy, recordation |
20 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
20 | Domenico Beneventano, Sonia Bergamaschi, Claudio Sartori 0001 |
Description logics for semantic query optimization in object-oriented database systems. |
ACM Trans. Database Syst. |
2003 |
DBLP DOI BibTeX RDF |
integrity constraints rules, query rewriting method, semantic expansion of a query, description logics, subsumption, Semantic query optimization |
20 | Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
Compositional Verification of Secure Streamed Data: A Case Study with EMSS. |
ICTCS |
2003 |
DBLP DOI BibTeX RDF |
Compositional Analysis and Verification, Digital Streams, Security, Integrity |
20 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
20 | David Gefen |
Reflections on the dimensions of trust and trustworthiness among online consumers. |
Data Base |
2002 |
DBLP DOI BibTeX RDF |
benevolence, trust scales, world wide web, trust, integrity, electronic commerce, trustworthiness, ability |
20 | Lei Pan 0001, Lubomir Bic, Michael B. Dillencourt, Ming Kin Lai |
Mobile Agents - The Right Vehicle for Distributed Sequential Computing. |
HiPC |
2002 |
DBLP DOI BibTeX RDF |
distributed sequential computing (DSC), computation mobility, distributed code building block (DBlock), algorithmic integrity, Crout factorization, scalability, mobile agents, paging |
20 | Prakash Ramanan |
Efficient algorithms for minimizing tree pattern queries. |
SIGMOD Conference |
2002 |
DBLP DOI BibTeX RDF |
LDAP queries, graph simulation, query minimization, tree pattern queries, XML, integrity constraints, XML queries |
20 | John Grant, Jarek Gryz, Jack Minker, Louiqa Raschid |
Logic-Based Query Optimization for Object Databases. |
IEEE Trans. Knowl. Data Eng. |
2000 |
DBLP DOI BibTeX RDF |
logic query, methods in object DBMS, object DBMS, semantic query optimization (SQO), semantic residues, Datalog, integrity constraints, OQL, ODL, ODMG |
20 | Wolfgang A. Halang, Peter Vogrin, Matjaz Colnaric |
A Safety Licensable PES for SIL 4 Applications. |
SAFECOMP |
2000 |
DBLP DOI BibTeX RDF |
Safety critical industrial automation, Safety Integrity Level 4, safety licensing, programmable electronic system, predictable real time behaviour, fail safe behaviour |
20 | Subhasish Mitra, Nirmal R. Saxena, Edward J. McCluskey |
Fault Escapes in Duplex Systems. |
VTS |
2000 |
DBLP DOI BibTeX RDF |
Duplex systems, Common-Mode Failures (CMFs), Test points, User-programmable logic, Data Integrity, Availability, Diversity |
20 | Subhasish Mitra, Edward J. McCluskey |
Word Voter: A New Voter Design for Triple Modular Redundant Systems. |
VTS |
2000 |
DBLP DOI BibTeX RDF |
Word-Voter, TMR-Simplex, data integrity, Triple Modular redundancy (TMR), Voter |
20 | Christian Labonté, Sampalli Srinivas |
Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management |
20 | David Powell, Jean Arlat, Ljerka Beus-Dukic, Andrea Bondavalli, P. Coppola, Alessandro Fantechi, Eric Jenn, Christophe Rabéjac, Andy J. Wellings |
GUARDS: A Generic Upgradable Architecture for Real-Time Dependable Systems. |
IEEE Trans. Parallel Distributed Syst. |
1999 |
DBLP DOI BibTeX RDF |
integrity levels, fault tolerance, embedded systems, real-time, Computer architecture, generic architecture |
20 | Roderick Chapman, Robert Dewar |
Re-engineering a Safety-Critical Application Using SPARK 95 and GNORT. |
Ada-Europe |
1999 |
DBLP DOI BibTeX RDF |
Ada Language and Tools, High Integrity Systems |
20 | D. V. Das |
EM simulation [ICs and MCMs]. |
VLSI Design |
1995 |
DBLP DOI BibTeX RDF |
electromagnetic field theory, transmission line matrix methods, integrated circuit packaging, EM simulation, emitted radiation, transmission line matrix method, electromagnetic simulation, TLM method, signal integrity, multichip modules, IC, MCM, electromagnetic field |
20 | Bruno Defude, Hervé Martin |
From a Passive to an Active Database Supporting Exceptions. |
DEXA |
1994 |
DBLP DOI BibTeX RDF |
Pre(post)-conditions, Inheritance, Integrity constraints, Exceptions, Object-Oriented DBMS |
20 | Oscar Díaz, Suzanne M. Embury |
Generating Active Rules from High-Level Specifications. |
BNCOD |
1992 |
DBLP DOI BibTeX RDF |
explicit knowledge representation, object-oriented databases, integrity constraints, Active databases |
20 | Marco A. Casanova, António L. Furtado 0001, Luiz Tucherman |
A Software Tool for Modular Database Design. |
ACM Trans. Database Syst. |
1991 |
DBLP DOI BibTeX RDF |
consistency preservation, logical database design, module constructors, abstract data types, integrity constraints, encapsulation, modular design |
20 | William Ward Armstrong, Claude Delobel |
Decomposition and Functional Dependencies in Relations. |
ACM Trans. Database Syst. |
1980 |
DBLP DOI BibTeX RDF |
relational database, decomposition, integrity constraint, functional dependency, multivalued dependency |
20 | Zhuo Hao, Sheng Zhong 0002, Nenghai Yu |
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. |
IEEE Trans. Knowl. Data Eng. |
2011 |
DBLP DOI BibTeX RDF |
data dynamics, privacy, Data integrity, public verifiability |
20 | Telidevara Aditya, Pallav Kumar Baruah, Ravi Mukkamala |
Space-Efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments. |
IEEE CLOUD |
2011 |
DBLP DOI BibTeX RDF |
storage efficiency, parallel processing, data integrity, outsourcing, hashing, Bloom filter |
20 | Venki Balasubramanian, Doan B. Hoang, Tanveer A. Zia |
Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks. |
ICSEng |
2011 |
DBLP DOI BibTeX RDF |
Body Area Wireless Sensor Network, ACLF, Privacy, Integrity, Healthcare, Confidentiality |
20 | Michael R. Clarkson, Fred B. Schneider |
Quantification of Integrity. |
CSF |
2010 |
DBLP DOI BibTeX RDF |
quantitative information flow, Integrity, information theory, database privacy |
20 | Fangyong Hou, Hongjun He, Nong Xiao, Fang Liu 0002, Guangjun Zhong |
Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
integrity, dynamic, MAC, storage, incremental, static |
20 | Rabindra Bista, Hye-Kyeom Yoo, Jae-Woo Chang |
A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks. |
CIT |
2010 |
DBLP DOI BibTeX RDF |
Wireless sensor network, Data integrity, Data aggregation, Data privacy, Complex number |
20 | Min Luo, Liang-Jie Zhang, Fengyun Lei |
An Insuanrance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing. |
ICWS |
2010 |
DBLP DOI BibTeX RDF |
Service Risks, Service Assessment and Valuation, Service Insurance Model, Security, Quality of Service (QoS), Privacy, Integrity, Cloud Computing, Analytics |
20 | Xianji Cui, Dantong Ouyang, Yuxin Ye |
Persistent Storage of Ontology-Based Data with Integrity Constraints. |
FCST |
2010 |
DBLP DOI BibTeX RDF |
Ontology, Relational Database, Integrity Constraints |
20 | Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya |
The System Integrity Verification for Trusted RFID Protocol. |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
RFID Protocol, Trusted RFID System, Security, Privacy, Trusted Computing, Integrity Verification |
20 | Zhi Wang 0004, Xuxian Jiang |
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. |
IEEE Symposium on Security and Privacy |
2010 |
DBLP DOI BibTeX RDF |
Control-Flow Integrity, Hypervisor, Rootkits |
20 | Tzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin |
Chaos-Based Image Integrity Authentication Code. |
IIH-MSP |
2010 |
DBLP DOI BibTeX RDF |
image authentication code, image integrity, watermarking, chaos |
20 | Wei Ren 0002, Yi Ren 0001, Hui Zhang 0086 |
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks. |
ISPA |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Data Integrity, Distributed Storage, Linear Coding, Secure Storage |
20 | Daniele Rossi 0001, Paolo Angelini, Cecilia Metra, Giovanni Campardo, Gian Pietro Vanalli |
Risks for Signal Integrity in System in Package and Possible Remedies. |
ETS |
2008 |
DBLP DOI BibTeX RDF |
Crosstalk, Error Detecting Codes, Signal Integrity, System in Package |
20 | Carlos A. Hurtado, Claudio Gutierrez 0001, Alberto O. Mendelzon |
Capturing summarizability with integrity constraints in OLAP. |
ACM Trans. Database Syst. |
2005 |
DBLP DOI BibTeX RDF |
query-optimization, OLAP, data warehousing, integrity constraints, summarizability |
20 | Maha Nizam, Farid N. Najm, Anirudh Devgan |
Power grid voltage integrity verification. |
ISLPED |
2005 |
DBLP DOI BibTeX RDF |
voltage integrity, power grid, voltage drop |
20 | Hugh C. Davis |
Hypertext link integrity. |
ACM Comput. Surv. |
1999 |
DBLP DOI BibTeX RDF |
content reference problem, dangling links, link integrity, broken links |
20 | Brian Dobbing, Alan Burns 0001 |
The Ravenscar Tasking Profile for High Integrity Real-Time Programs. |
SIGAda |
1998 |
DBLP DOI BibTeX RDF |
Ravenscar, Ada, Ada, tasking, safety-critical, high-integrity |
20 | David G. Novick, Joel Juillet |
Documentation Integrity for Safety-Critical Applications: The COHERE Project. |
SIGDOC |
1998 |
DBLP DOI BibTeX RDF |
authoring interface, documentation integrity, consistency |
20 | John P. McDermott |
Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. |
Workshop on New Security Paradigms |
1998 |
DBLP DOI BibTeX RDF |
trojan horse, security, integrity, storage |
20 | Jan Chomicki, David Toman 0001 |
Implementing Temporal Integrity Constraints Using an Active DBMS. |
IEEE Trans. Knowl. Data Eng. |
1995 |
DBLP DOI BibTeX RDF |
Temporal databases, integrity constraints, dynamic constraints, constraint checking |
20 | Fereidoon Sadri |
Integrity Constraints in the Information Source Tracking Method. |
IEEE Trans. Knowl. Data Eng. |
1995 |
DBLP DOI BibTeX RDF |
information source tracking, Database systems, integrity constraints, inconsistency, uncertainty management |
20 | Kai-Yuan Chao, D. F. Wong 0001 |
Signal integrity optimization on the pad assignment for high-speed VLSI design. |
ICCAD |
1995 |
DBLP DOI BibTeX RDF |
pad assignment, simultaneous swiching Noise, floorplanning, crosstalk, signal integrity, packaging |
20 | Ernst L. Leiss |
Data Integrity in Digital Optical Disks. |
IEEE Trans. Computers |
1984 |
DBLP DOI BibTeX RDF |
write-once memory, digital optical disks, inmutable codes, probabilistic control-key schemes, storing data under a control-key, variable-length and fixed-length codes, Data integrity |
20 | David J. Lu |
Watchdog Processors and Structural Integrity Checking. |
IEEE Trans. Computers |
1982 |
DBLP DOI BibTeX RDF |
structural integrity checking (SIC), error detection, Pascal, Control flow, structured programming, watchdog processor |
19 | Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 |
A language for information flow: dynamic tracking in multiple interdependent dimensions. |
PLAS |
2009 |
DBLP DOI BibTeX RDF |
information flow control, declassification, security type system |
19 | Foto N. Afrati, Phokion G. Kolaitis |
Repair checking in inconsistent databases: algorithms and complexity. |
ICDT |
2009 |
DBLP DOI BibTeX RDF |
coNP-complete problem, equality-generating dependencies, repair checking, tuple-generating dependencies, weakly acyclic set, polynomial time, consistent query answering, inconsistent databases, database repairs |
19 | Hridesh Rajan, Mahantesh Hosamani |
Tisa: Toward Trustworthy Services in a Service-Oriented Architecture. |
IEEE Trans. Serv. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker |
Towards a Dynamic Inconsistency-Tolerant Schema Maintenance. |
ER Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hao Yuan, Mikhail J. Atallah |
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. |
ICDCS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Min Xie 0002, Haixun Wang, Jian Yin 0002, Xiaofeng Meng 0001 |
Providing freshness guarantees for outsourced databases. |
EDBT |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Johannes Osrael, Lorenz Froihofer, Karl M. Göschka |
Availability/Consistency Balancing Replication Model. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Combining robust declassification and intransitive noninterference. |
IMSCCS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Miloud Bagaa, Noureddine Lasla, Abdelraouf Ouadjaout, Yacine Challal |
SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks. |
LCN |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Adam J. Rocke, Ronald F. DeMara |
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions. |
Auton. Agents Multi Agent Syst. |
2006 |
DBLP DOI BibTeX RDF |
Distributed Agent Control and Dispatch, Agent Handshaking Protocols, Intrusion Detection System Taxonomy, Network Security |
19 | Gaurav Gupta 0002, Josef Pieprzyk |
A Low-Cost Attack on Branch-Based Software Watermarking Schemes. |
IWDW |
2006 |
DBLP DOI BibTeX RDF |
unconditional branch, watermark, software, breakpoint |
19 | Kun Bai, Peng Liu 0005 |
Towards Database Firewall: Mining the Damage Spreading Patterns. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Ellard, James Megquier |
DISP: Practical, efficient, secure and fault-tolerant distributed data storage. |
ACM Trans. Storage |
2005 |
DBLP DOI BibTeX RDF |
Distributed data storage |
19 | Gerome Miklau, Dan Suciu |
Implementing a Tamper-Evident Database System. |
ASIAN |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Sergio Greco, Cristina Sirangelo, Irina Trubitsyna, Ester Zumpano |
Feasibility Conditions and Preference Criteria in Querying and Repairing Inconsistent Databases. |
DEXA |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Jong-Weon Kim, Youngbae Byun, Jong-Uk Choi |
Image Forensics Technology for Digital Camera. |
PCM (3) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Charanjit S. Jutla |
Lower Bound on Linear Authenticated Encryption. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Siddhartha R. Dalal, Yu-Yun Ho, Ashish Jain, Allen A. McIntosh |
Application Performance using End-to-End User Level Monitoring. |
DSN |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker |
Soundcheck for SQL. |
PADL |
2001 |
DBLP DOI BibTeX RDF |
|
19 | M. D. Bennett, Neil C. Audsley |
Predictable and Efficient Virtual Addressing for Safety-Critical Real-Time Systems. |
ECRTS |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Ravi S. Sandhu, Fang Chen |
The Multilevel Relational (MLR) Data Model. |
ACM Trans. Inf. Syst. Secur. |
1998 |
DBLP DOI BibTeX RDF |
conidentiality, polyinstantiation, access control, multilevel security |
19 | Tim Sheard, David W. Stemple |
Automatic Verification of Database Transaction Safety. |
ACM Trans. Database Syst. |
1989 |
DBLP DOI BibTeX RDF |
|
19 | David W. Stemple, Subhasish Mazumdar, Tim Sheard |
On the Modes and Meaning of Feedback to Transaction Designers. |
SIGMOD Conference |
1987 |
DBLP DOI BibTeX RDF |
|
19 | Yi-Lin Chuang, Sangmin Kim, Youngsoo Shin, Yao-Wen Chang |
Pulsed-latch aware placement for timing-integrity optimization. |
DAC |
2010 |
DBLP DOI BibTeX RDF |
pulsed latch, placement, physical design |
19 | Ragib Hasan, Marianne Winslett |
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. |
EDBT |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Kar Way Tan, Robert H. Deng |
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Bhavani Thuraisingham |
Data security and integrity: developments and directions. |
KDD Workshop on CyberSecurity and Intelligence Informatics |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Henning Klein, Jörg Keller 0001 |
Storage architecture with integrity, redundancy and encryption. |
IPDPS |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Ruilin Liu, Wendy Hui Wang |
Integrity Verification of Outsourced XML Databases. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Andrew Camilleri, Geoffrey Coulson, Lynne Blair |
CIF: A Framework for Managing Integrity in Aspect-Oriented Composition. |
TOOLS (47) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Guillaume Duc, Ronan Keryell |
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. |
J. Comput. Virol. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Sallak, Christophe Simon, Jean-François Aubry |
A Fuzzy Probabilistic Approach for Determining Safety Integrity Level. |
IEEE Trans. Fuzzy Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Wei Li 0021, Lingyu Wang 0001, Bo Zhu 0001, Lei Zhang 0004 |
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Kikelomo Maria Apampa, Gary B. Wills, David Argles, Emil Marais |
Electronic Integrity Issues in E-Assessment Security. |
ICALT |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Diego F. de Carvalho, Rafael Chies, André Pimenta Freire, Luciana Andréia Fondazzi Martimiano, Rudinei Goularte |
Video steganography for confidential documents: integrity, privacy and version control. |
SIGDOC |
2008 |
DBLP DOI BibTeX RDF |
document version control, multimedia, steganography, MPEG-4, collaborative systems |
19 | Anongporn Salaiwarakul, Mark Dermot Ryan |
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Santiago Urueña, Juan Zamorano, José Antonio Pulido, Juan Antonio de la Puente |
Communication Paradigms for High-Integrity Distributed Systems with Hard Real-Time Requirements. |
DIPES |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Zahi S. Abuhamdeh |
A Case Study of ATPG Delay Path Performance Based on Measured Power Rail Integrity. |
DFT |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Lijun Liao, Jörg Schwenk |
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. |
ICICS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Yiu-ming Cheung, Hao-Tian Wu |
A Sequential Quantization Strategy for Data Embedding and Integrity Verification. |
IEEE Trans. Circuits Syst. Video Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Shige Wang |
Model Transformation for High-Integrity Software Development in Derivative Vehicle Control System Design. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jeong-Oog Lee, Dae Hee Won, Sangkyung Sung, Taesam Kang, Young Jae Lee |
High Assurance GPS Integrity Monitoring System Using Particle Filtering Approach. |
HASE |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jérôme Hugues, Bechir Zalila, Laurent Pautet |
Combining Model Processing and Middleware Configuration for Building Distributed High-Integrity Systems. |
ISORC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Carlos Ordonez 0001, Javier García-García 0001, Zhibo Chen 0002 |
Measuring referential integrity in distributed databases. |
CIMS |
2007 |
DBLP DOI BibTeX RDF |
database, metric, consistency, completeness |
19 | Amlan Ganguly, Partha Pratim Pande, Benjamin Belzer, Cristian Grecu |
Addressing Signal Integrity in Networks on Chip Interconnects through Crosstalk-Aware Double Error Correction Coding. |
ISVLSI |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Aiwu Shi, Gleb Naumovich |
Improving Data Integrity with a Java Mutability Analysis. |
APSEC |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Huanmei Guan, Huanguo Zhang, Ping Chen, Yajie Zhou |
Mobile Agents Integrity Research. |
I3E (1) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Luciano Caroprese, Sergio Greco, Cristian Molinaro |
Prioritized Active Integrity Constraints for Database Maintenance. |
DASFAA |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker, Davide Martinenghi |
Getting Rid of Straitjackets for Flexible Integrity Checking. |
DEXA Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Hai Lin 0004, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi |
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors. |
ICCD |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jorge Semião, Judit Freijedo, Juan J. Rodríguez-Andina, Fabian Vargas 0001, Marcelino B. Santos, Isabel C. Teixeira, João Paulo Teixeira 0001 |
On-line Dynamic Delay Insertion to Improve Signal Integrity in Synchronous Circuits. |
IOLTS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Joon S. Park, Ganesh Devarajan |
Fine-Grained and Scalable Approaches for Message Integrity. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Taeyong Je, Yungseon Eo |
Efficient Signal Integrity Verification of Multi-Coupled Transmission Lines with Asynchronously Switching Non-Linear Drivers. |
ISQED |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan |
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. |
Information Hiding |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|