|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1529 occurrences of 882 keywords
|
|
|
Results
Found 3119 publication records. Showing 3119 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | David A. Umphress, James H. Cross II, Jhilmil Jain, Nischita Meda, Larry A. Barowski |
Bringing J2ME industry practice into the classroom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 35th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2004, Norfolk, Virginia, USA, March 3-7, 2004, pp. 301-305, 2004, ACM, 1-58113-798-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Nokia OK, jGRASP, wireless application development, software engineering education, J2ME |
16 | Ewen Denney, Bernd Fischer 0002, Johann Schumann |
Using Automated Theorem Provers to Certify Auto-generated Aerospace Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCAR ![In: Automated Reasoning - Second International Joint Conference, IJCAR 2004, Cork, Ireland, July 4-8, 2004, Proceedings, pp. 198-212, 2004, Springer, 3-540-22345-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Lerina Aversano, Gerardo Canfora, Giovanni Capasso, Giuseppe A. Di Lucca, Corrado Aaron Visaggio |
Introducing Quality System in Small and Medium Enterprises: An Experience Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROFES ![In: Product Focused Software Process Improvement, 5th International Conference, PROFES 2004, Kausai Science City, Japan, April 5-8, 2004, Proceedings, pp. 131-145, 2004, Springer, 3-540-21421-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Songtao Xia, James Hook |
Certifying Temporal Properties for Compiled C Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VMCAI ![In: Verification, Model Checking, and Abstract Interpretation, 5th International Conference, VMCAI 2004, Venice, Italy, January 11-13, 2004, Proceedings, pp. 161-174, 2004, Springer, 3-540-20803-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior |
Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WONS ![In: Wireless On-Demand Network Systems, First IFIP TC6 Working Conference, WONS 2004, Madonna di Campiglio, Italy, January 21-23, 2004, Proceedings, pp. 213-226, 2004, Springer, 3-540-20790-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Jonathan S. Shapiro |
Understanding the Windows EAL4 Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 36(2), pp. 103-105, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Sathyanarayanan Subbiah, Srikanth Nagaraj |
Issues with Object Orientation in Verifying Safety-Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: 6th IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2003), 14-16 May 2003, Hakodate, Hokkaido, Japan, pp. 99-104, 2003, IEEE Computer Society, 0-7695-1928-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park |
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 265-279, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Matei Ciobanu Morogan, Sead Muftic |
Certificate Management in Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT Workshops ![In: 2003 Symposium on Applications and the Internet Workshops (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 337-341, 2003, IEEE Computer Society, 0-7695-1873-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Serge Vaudenay |
The Security of DSA and ECDSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 309-323, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Seong-Eun Lee, Hong-Jong Jang, Sun-Young Han |
Implementation of Smartcard Using Multi Authentication Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part I, pp. 348-357, 2003, Springer, 3-540-40155-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | G. Ramalingam, Alex Varshavsky, John Field, Deepak Goyal, Shmuel Sagiv |
Deriving Specialized Program Analyses for Certifying Component-Client Conformance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), Berlin, Germany, June 17-19, 2002, pp. 83-94, 2002, ACM, 1-58113-463-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
model checking, static analysis, abstract interpretation, software components, predicate abstraction |
16 | Morten Tollefsen, Magne Lunde |
ECDL for Visually Impaired Persons: Learning Materials, Individual Training, and Distance Education. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCHP ![In: Computers Helping People with Special Needs, 8th International Conference, ICCHP 2002, Linz, Austria, July 15-20, Proceedings, pp. 715-722, 2002, Springer, 3-540-43904-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Chin-Chen Chang 0001, Ju Yuan Hsiao, Chi-Lung Chiang |
An Image Copyright Protection Scheme Based on Torus Automorphism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 1st International Symposium on Cyber Worlds (CW 2002), 6-8 November 2002, Tokyo, Japan, pp. 217-224, 2002, IEEE Computer Society, 0-7695-1862-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
torus automorphism, Watermark, digital signature |
16 | Amaia Lazcano, Gustavo Alonso |
Process Based E-services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WELCOM ![In: Electronic Commerce, Second International Workshop, WELCOM 2001 Heidelberg, Germany, November 16-17, 2001, Proceedings, pp. 1-10, 2001, Springer, 3-540-42878-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Xavier Méhaut, Pierre Morère |
Improving Software Development by Using Safe Object Oriented Development: OTCD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings, pp. 131-140, 2000, Springer, 3-540-41186-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Kieron O'Hara, Nigel Shadbolt, Jeni Tennison |
Certifying KBSs: Using CommonKADS to Provide Supporting Evidence for Fitness for Purpose of KBSs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EKAW ![In: Knowledge Acquisition, Modeling and Management, 12th International Conference, EKAW 2000, Juan-les-Pins, France, October 2-6, 2000, Proceedings, pp. 419-434, 2000, Springer, 3-540-41119-4. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Albert Levi, M. Ufuk Çaglayan |
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2000 IEEE Symposium on Security and Privacy, Berkeley, California, USA, May 14-17, 2000, pp. 203-214, 2000, IEEE Computer Society, 0-7695-0665-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Nested Certificates, Performance Evaluation, Digital Certificates, Public Key Infrastructure (PKI), Certificate Path |
16 | Liz Whiting, Mike Hill |
Safety Analysis of Hawk in Flight Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PASTE ![In: Proceedings of the SIGPLAN/SIGSOFT Workshop on Program Analysis For Software Tools and Engineering, PASTE '99, Toulouse, France, September 6, 1999, pp. 32-38, 1999, ACM, 1-58113-137-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Yair Frankel, Moti Yung |
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 241-252, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Marc Richard-Foy |
Safe Ada Executive: An Executive for Ada Safety Critical Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Ada in Europe, Second International Eurospace - Ada-Europe Symposium, Frankfurt/Main, Germany, October 2-6, 1995, Proceedings, pp. 11-20, 1995, Springer, 3-540-60757-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
16 | Alison Anderson, Dennis Longley, Lam-for Kwok |
Security Modelling for Organisations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '94, Proceedings of the 2nd ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 2-4, 1994., pp. 241-250, 1994, ACM, 0-89791-732-4. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
16 | R. A. Sprangler, Richard C. Linger |
The IBM Cleanroom Software Engineering Technology Transfer Program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSEE ![In: Software Engineering Education, SEI Conference, 1992, Proceedings, pp. 380-394, 1992, Springer, 3-540-55963-9. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Mihir Bellare, Moti Yung |
Certifying Cryptographic Tools: The Case of Trapdoor Permutations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pp. 442-460, 1992, Springer, 3-540-57340-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Pil Joong Lee |
Secure User Access Control for Public Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 46-57, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Sowmyan Raman |
Flight Mission Scenario Generation with Knowledge-based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE (Vol. 1) ![In: Proceedings of the First International Conference on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems, IEA/AIE 1988, June 1-3, 1988, Tullahoma, TN, USA. ACM, 1988 - Volume 1, pp. 341-346, 1988, ACM, 0-89791-271-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
EMULA |
16 | William P. LaPlant, Raymond Demarest, Vince Guidace, David R. Skeen, Carol M. Vaughan |
The Federal Computer Professional In The 1980'S: Impact of the president's reorganization project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference (1) ![In: Proceedings 1978 ACM Annual Conference, Washington, DC, USA, December 4-6, 1978, Volume I, pp. 403, 1978, ACM, 978-0-89791-000-2. The full citation details ...](Pics/full.jpeg) |
1978 |
DBLP DOI BibTeX RDF |
|
14 | Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci |
A Load Time Policy Checker for Open Multi-application Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: POLICY 2011, IEEE International Symposium on Policies for Distributed Systems and Networks, Pisa, Italy, 6-8 June 2011, pp. 153-156, 2011, IEEE Computer Society, 978-1-4244-9879-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Smart cards security, application certification, information exchange, policy models |
14 | Brigitte Piniewski, Johan Muskens, Leonardo Estevez, Randy Carroll, Rick Cnossen |
Empowering Healthcare Patients with Smart Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 43(7), pp. 27-34, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Continua Health Alliance, certification, eHealth, networking and communication, mobile/wireless, standards and best practices |
14 | Steven F. Barrett, Mitchell A. Thornton |
To PE or not to PE: the Sequel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Sci. Eng. ![In: Comput. Sci. Eng. 12(4), pp. 62-65, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
licensure, professional engineer, certification |
14 | Byoungcheon Lee |
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 54-61, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography |
14 | Joel Mana Gonçalves |
Privacy and Information Security in Brazil? Yes, We Have It and We Do It! ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 702-707, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Integrity, Management, Policies, Availability, Certification, Confidentiality |
14 | Amelia Phillips, Kara L. Nance |
Computer Forensics Investigators or Private Investigators: Who Is Investigating the Drive?. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2010, Oakland, CA, USA, May 20, 2010, pp. 150-157, 2010, IEEE Computer Society, 978-0-7695-4052-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
certification, digital forensics, licensing |
14 | Jose L. Muñoz, Oscar Esparza, Jordi Forné, Esteve Pallarès |
Design and implementation of a lightweight online certificate validation service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Telecommun. Syst. ![In: Telecommun. Syst. 41(3), pp. 229-241, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Certification, Public key infrastructure, Revocation, OCSP |
14 | Rolf Zon, Henk van Dijk |
A Selection of Human Factors Tools: Measuring HCI Aspects of Flight Deck Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (17) ![In: Engineering Psychology and Cognitive Ergonomics, 8th International Conference, EPCE 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 616-624, 2009, Springer, 978-3-642-02727-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
HILAS, HF tools registry, Human Factors, experiment, certification, flight simulation, flight deck, HF |
14 | Martin Glas, Sven Ziemer |
Challenges for agile development of large systems in the aviation industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 24th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2009, October 25-29, 2009, Orlando, Florida, USA, pp. 901-908, 2009, ACM, 978-1-60558-768-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
development risk, open tool platform, certification, situation awareness, agile development, change notification, generative design |
14 | Peter Micheuz |
E-Maturity and School Development: When the Tail Wants to Wag the Dog. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCCE ![In: Education and Technology for a Better World, 9th IFIP TC 3 World Conference on Computers in Education, WCCE 2009, Bento Gonçalves, Brazil, July 27-31, 2009. Proceedings, pp. 129-137, 2009, Springer, 978-3-642-03114-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ICT in education, e-Maturity, e-Learning, Certification |
14 | Gail Farally-Semerad, Geroge Thompson |
The A.R.T. of content management training. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the ACM SIGUCCS Fall Conference on User Services 2009, St. Louis, Missouri, USA, October 11-14, 2009, pp. 7-10, 2009, ACM, 978-1-60558-477-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
seo, writing for the web, collaboration, navigation, training, html, maintenance, certification, accuracy, relevency, web design, content management, distributed environment, web pages, classes, instruction, usability studies, skills, publishing, editing, CMS, academic, search engine optimization |
14 | Tobias Schoofs, Eric Jenn, Stéphane Leriche, Kelvin Nilsen, Ludovic Gauthier, Marc Richard-Foy |
Use of PERC Pico in the AIDA avionics platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JTRES ![In: Proceedings of the 7th International Workshop on Java Technologies for Real-Time and Embedded Systems, JTRES 2009, Madrid, Spain, September 23-25, 2009, pp. 169-178, 2009, ACM, 978-1-60558-732-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ARINC 653, DO-178C, SCJT, aeronautic certification, safety-critical real-time systems, Java, RTSJ |
14 | Sarbari Gupta |
Personal identity verification (PIV) cards as federated identities: challenges and opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: IDtrust 2009, Proceedings of the 8th Symposium on Identity and Trust on the Internet, April 14-16, 2009, Gaithersburg, Maryland, USA, pp. 15-22, 2009, ACM, 978-1-60558-474-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance |
14 | Louis R. D'Alessandro, Donald T. Gantz |
Combining academic studies with it certifications: becoming a cisco regional academy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 10th Conference on Information Technology Education, SIGITE 2009, Fairfax, Virginia, USA, October 22-24, 2009, pp. 209-214, 2009, ACM, 978-1-60558-765-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
networking, curriculum, certification |
14 | Joe Damore |
DATC Newsletter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Des. Test Comput. ![In: IEEE Des. Test Comput. 25(2), pp. 187, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IEEE chip design certification initiative, Electronic Design Processes subcommittee workshop, SBCCI, design automation, DATC |
14 | Heng He, Li Chen 0011, Pingpeng Yuan, Xin Xu 0007, Xiaofeng Wang |
A Security Architecture for Grid-Based Distributed Simulation Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PACIIA (1) ![In: PACIIA 2008, Volume 1, 2008 IEEE Pacific-Asia Workshop on Computational Intelligence and Industrial Application, 19-20 December 2008, Wuhan, China, pp. 207-212, 2008, IEEE Computer Society, 978-0-7695-3490-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Simulation Grid, Authentication, Access Control, Certification, High Level Architecture, Security Architecture |
14 | June Andronick, Quang Huy Nguyen 0002 |
Certifying an embedded remote method invocation protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 352-359, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
JCRMI, security and functional certification, formal verification, embedded software, common criteria |
14 | Ed Van Sickle |
Refilling the it pipleline and using storage technologies as a specialization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2008 ACM SIGMIS CPR Conference on Computer Personnel Research 2008, April 3-5, 2008, Charlottesville, VA, USA, pp. 112-118, 2008, ACM, 978-1-60558-069-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
certification., emc academic alliance program, emc proven professional program, industry - education relationships, storage courses and curriculum, computer science education, storage technologies, information science education |
14 | Mary Sumner, Susan E. Yager |
An investigation of preparedness and importance of mis competencies: research in progress. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2008 ACM SIGMIS CPR Conference on Computer Personnel Research 2008, April 3-5, 2008, Charlottesville, VA, USA, pp. 97-111, 2008, ACM, 978-1-60558-069-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ISA certification, workforce needs, curriculum |
14 | Ewen Denney, Bernd Fischer 0002 |
Generating customized verifiers for automatically generated code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GPCE ![In: Generative Programming and Component Engineering, 7th International Conference, GPCE 2008, Nashville, TN, USA, October 19-23, 2008, Proceedings, pp. 77-88, 2008, ACM, 978-1-60558-267-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
logical annotations, program verification, automated theorem proving, hoare logic, software certification, automated code generation |
14 | Robert B. Schnabel, Duncan A. Buell, Joanna Goode, J Strother Moore, Chris Stephenson |
An open dialogue concerning the state of education policy in computer science. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2008, Portland, OR, USA, March 12-15, 2008, pp. 114-115, 2008, ACM, 978-1-59593-799-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
K-12 curriculum, education policy, teacher certification, STEM |
14 | Kelvin Nilsen |
Simple low-level real-time threading semantics to enable portability, efficiency, analyzability, and generality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JTRES ![In: Proceedings of the 6th International Workshop on Java Technologies for Real-time and Embedded Systems, JTRES 2008, 24-26 September 2008, Santa Clara, California, USA, pp. 125-134, 2008, ACM, 978-1-60558-337-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
safety-critical certification, Java, real-time, threading, RTSJ |
14 | Herbert Hecht |
A Systems Engineering Approach to Exception Handling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONS ![In: The Third International Conference on Systems, ICONS 2008, April 13-18, 2008, Cancun, Mexico, pp. 190-195, 2008, IEEE Computer Society, 978-0-7695-3105-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
exception handling, systems engineering, software failures, software certification |
14 | Egon Börger |
Construction and analysis of ground models and their refinements as a foundation for validating computer-based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Formal Aspects Comput. ![In: Formal Aspects Comput. 19(2), pp. 225-241, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Validation and certification, ASM ground model (golden model), ASM refinement, Verified software challenge, System analysis, Abstract State Machine |
14 | Massimiliano Pala, Sean W. Smith |
AutoPKI: A PKI Resources Discovery System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 154-169, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Service Discovery, PKI, Digital Certificates, Certification Authority |
14 | Robert B. K. Dewar |
The compiler as a static analysis tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the 2007 Annual ACM SIGAda International Conference on Ada, Fairfax, Virginia, USA, November 4-8, 2007, pp. 83-88, 2007, ACM, 978-1-59593-876-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ada, compilers, C++, static analysis, C, safety, certification |
14 | Kelvin Nilsen |
Improving abstraction, encapsulation, and performance within mixed-mode real-time Java applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JTRES ![In: Proceedings of the 5th International Workshop on Java Technologies for Real-time and Embedded Systems, JTRES 2007, Institute of Computer Engineering, Vienna University of Technology, 26-28 September 2007, Vienna, Austria, pp. 13-22, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
safety-critical certification, Java, RTSJ, DO-178B |
14 | Ed Van Sickle, Efrem Mallach, Brian H. Cameron, Derrek B. Dunn, Denetra Rook, Frank M. Groom, Ronnie Rollins |
Storage technologies: an education opportunity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 8th Conference on Information Technology Education, SIGITE 2007, Destin, Florida, USA, October 18-20, 2007, pp. 119-126, 2007, ACM, 978-1-59593-920-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
EMC academic alliance program, EMC proven professional program, industry-education relationships, information infrastructure technologies, storage courses and curriculum, storage education, computer science education, certification, information storage, storage technologies, information science education |
14 | Lee Pike, Mark Shields, John Matthews |
A verifying core for a cryptographic language compiler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACL2 ![In: Proceedings of the Sixth International Workshop on the ACL2 Theorem Prover and its Applications, ACL2 2006, Seattle, Washington, USA, August 15-16, 2006, pp. 1-10, 2006, ACM, 0-9788493-0-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cryptography, certification, optimizing compiler, ACL2, high-assurance, certifying compiler, verifying compiler |
14 | David Mosley |
When to migrate legacy embedded applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the 2006 Annual ACM SIGAda International Conference on Ada, Albuquerque, New Mexico, USA, November 12-16, 2006, pp. 77-80, 2006, ACM, 1-59593-563-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
certification, migration, portability, lifecycle |
14 | Manuel V. Hermenegildo, Elvira Albert, Pedro López-García 0001, Germán Puebla |
Abstraction carrying code and resource-awareness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PPDP ![In: Proceedings of the 7th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, July 11-13 2005, Lisbon, Portugal, pp. 1-11, 2005, ACM, 1-59593-090-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
granularity control, mobile code certification, programming languages, abstract interpretation, program verification, distributed programming, program debugging, cost analysis, resource awareness |
14 | Franco Arcieri, Fabio Fioravanti, Roberto Giaccio, Enrico Nardelli, Maurizio Talamo |
Certifying performance of cooperative services in a digital government framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003 - Orlando, FL, USA, Proceedings, pp. 249-256, 2003, IEEE Computer Society, 0-7695-1872-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital government support, interorganizational e-service certification, actual performance monitoring, application interoperability and cooperation |
14 | Miguel Goulão, Fernando Brito e Abreu |
The Quest for Software Components Quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 313-320, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Components, Certification, Components Selection |
14 | V. Santhanam |
The anatomy of an FAA-qualifiable Ada subset compiler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the 2002 Annual ACM SIGAda International Conference on Ada: The Engineering of Correct and Reliable Software for Real-Time & Distributed Systems using Ada and Related Technologies 2002, Houston, Texas, USA, December 8-12, 2002, pp. 40-43, 2002, ACM, 1-58113-611-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
FAA, Ada, compiler, software certification, DO-178B |
14 | David W. Chadwick, Carmen Carroll, S. Harvey, John P. New, Andrew J. Young |
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 156, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
medical telematics, security, Internet, WWW, usability, digital signatures, encryption, Public key infrastructures, user acceptance, ease of use, certification authorities, validation testing |
14 | Ivica Crnkovic, Heinz W. Schmidt, Judith A. Stafford, Kurt C. Wallnau |
5th ICSE workshop on component-based software engineering: benchmarks for predictable assembly. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 24th International Conference on Software Engineering, ICSE 2002, 19-25 May 2002, Orlando, Florida, USA, pp. 655-656, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
composition languages, software architecture, component, analysis, certification, trusted components |
14 | Edward L. Jones |
Integrating testing into the curriculum - arsenic in small doses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 32rd SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2001, Charlotte, North Carolina, USA, 2001, pp. 337-341, 2001, ACM, 1-58113-329-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
tester certification, software testing |
14 | Sudipto Ghosh |
Fault Injection Testing for Distributed Object Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (39) ![In: 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems, TOOLS USA 2001, Santa Barbara, CA, USA, July 29 - August 3, 2001, pp. 276-285, 2001, IEEE Computer Society, 0-7695-1251-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
component-base d systems, fault injection testing, fault tolerance, CORBA, Certification, distributed object systems, Java RMI |
14 | Michael Weber, Viren Shah, Chris Ren |
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCAM ![In: 1st IEEE International Workshop on Source Code Analysis and Manipulation (SCAM 2001), 10 November 2001, Florence, Italy, pp. 3-13, 2001, IEEE Computer Society, 0-7695-1387-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
static analysis, buffer overflow, software security, software certification |
14 | Hussein Suleman, Edward A. Fox, Marc Abrams |
Building quality into a digital library. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM DL ![In: Proceedings of the Fifth ACM Conference on Digital Libraries, June 2-7, 2000, San Antonio, TX, USA, pp. 228-229, 2000, ACM. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
XML, XML, quality, certification, repository |
14 | Joon S. Park, Ravi S. Sandhu |
Binding Identities and Attributes using Digitally Signed Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 120-127, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
binding identities, digitally signed certificates, binding attributes, chained signatures, monolithic signatures, autonomic signatures, digital signature, certification, message authentication, certificate authority, attribute certificates |
14 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 107-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
14 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 298-307, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
14 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 128-137, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
14 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 138-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
14 | Lisa Veloz |
Implementing the Microsoft Office User Specialist Program. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 27th Annual ACM SIGUCCS Conference on User Services: Mile High Expectations 1999, Denver, Colorado, USA, pp. 195-198, 1999, ACM, 1-58113-144-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
certification, technology training, Microsoft Office, Microsoft Office |
14 | David A. Cooper |
A Model of Certificate Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 15th Annual Computer Security Applications Conference (ACSAC 1999), 6-10 December 1999, Scottsdale, AZ, USA, pp. 256-264, 1999, IEEE Computer Society, 0-7695-0346-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
certificate revocation, certification authority, CRL, certificate revocation list |
14 | Jonathan D. Bright, Gregory F. Sullivan, Gerald M. Masson |
A Formally Verified Sorting Certifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 46(12), pp. 1304-1312, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
software correctness, certification trails, program result checking, Sorting, formal program verification |
14 | Dirk Stelzer, Werner Mellis, Georg Herzwurm |
A critical look at ISO 9000 for software quality management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Softw. Qual. J. ![In: Softw. Qual. J. 6(2), pp. 65-79, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
ISO 9004, quality systems, software process improvement, certification, CMM, SPICE, quality management, criticism, ISO 9001, software quality management, ISO 9000, ISO 9000-3 |
14 | Graeme Smith |
The Second ISEW Cleanroom Workshop. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Pulling Together, Proceedings of the 19th International Conference on Software Engineering, Boston, Massachusetts, USA, May 17-23, 1997., pp. 674, 1997, ACM, 0-89791-914-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
software reliability certification, statistical usage testing, verification, formal specification, software process improvement, technology transfer, stepwise refinement, cleanroom software engineering |
14 | Martin Gogolla, Stefan Conrad 0001, Grit Denker, Rudolf Herzig, Nikolaos Vlachantonis |
A Development Environment for an Object Specification Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 7(3), pp. 505-508, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
object specification, verification, validation, certification, semantic data model, Information system design |
14 | James A. Whittaker, Jesse H. Poore |
Markow Analysis of Software Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 2(1), pp. 93-106, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
Cleanroom, box structure method, usage distribution, Markov chain, certification, stochastic process, software specification, statistical test |
14 | Richard C. Linger |
Cleanroom Software Engineering for Zero-Defect Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: Proceedings of the 15th International Conference on Software Engineering, Baltimore, Maryland, USA, May 17-21, 1993., pp. 2-13, 1993, IEEE Computer Society / ACM Press, 0-89791-588-7. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP BibTeX RDF |
box structures, software quality certification, statistical usage testing, formal specification, incremental development, correctness verification, cleanroom software engineering |
14 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber |
Authentication in Distributed Systems: Theory and Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 10(4), pp. 265-310, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
loading programs, path name, principal, speaks for, group, role, delegation, key distribution, interprocess communication, certification authority, trusted computing base, secure channel |
14 | John D. Longhill |
Analysis of views of ACM and IEEE members concerning professionalism in the computing field. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 20th Annual Southeast Regional Conference, 1982, Knoxville, Tennessee, USA, April 1-3, 1982, pp. 235-239, 1982, ACM, 0-89791-071-0. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
CDP, certificate in DP, certification, computer profession, data processing, professionalism, professional society |
14 | Richard P. Reitman, Gregory R. Andrews |
Certifying Information Flow Properties of Programs: An Axiomatic Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POPL ![In: Conference Record of the Sixth Annual ACM Symposium on Principles of Programming Languages, San Antonio, Texas, USA, January 1979, pp. 283-290, 1979, ACM Press. The full citation details ...](Pics/full.jpeg) |
1979 |
DBLP DOI BibTeX RDF |
policy certification, concurrency, synchronization, computer security, information flow, proof rules, program validation |
12 | Jonas Primbs, Michael Menth |
OIDC²: Open Identity Certification With OpenID Connect. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Open J. Commun. Soc. ![In: IEEE Open J. Commun. Soc. 5, pp. 1880-1898, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mikel Manzanal Herrero, Aitor Rodríguez Mendez, Iraitz Carretero Caballo, Iker Muniategui-Aspiazu, Joseba Arza |
Hardware-in-the-Loop Platform for Virtual Certification of Traction Systems for Railway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 52182-52194, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ying Pang, Feiyan Zhang, Qiong Wang, Lei Wang, Chengyuan Wang |
High- and new-technology enterprise certification, enterprise innovation ability and export product quality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Technol. Anal. Strateg. Manag. ![In: Technol. Anal. Strateg. Manag. 36(2), pp. 349-364, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Pablo Krupa, Omar Inverso, Mirco Tribastone, Alberto Bemporad |
Certification of the proximal gradient method under fixed-point arithmetic for box-constrained QP problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Autom. ![In: Autom. 159, pp. 111411, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Pierre Fraigniaud, Pedro Montealegre 0001, Ivan Rapaport, Ioan Todinca |
A Meta-Theorem for Distributed Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithmica ![In: Algorithmica 86(2), pp. 585-612, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mélanie Ducoffe, Christophe Gabreau, Ileana Ober, Iulian Ober, Guillaume Vidot |
Certification of avionic software based on machine learning: the case for formal monotony analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Softw. Tools Technol. Transf. ![In: Int. J. Softw. Tools Technol. Transf. 26(2), pp. 189-205, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Hung Nguyen, George Onofrei, Ying Yang, Kevin Nguyen, Mohammadreza Akbari, Hiep Pham |
Green certification practices and process innovation alignment: diminishing point and catching up in nation's economic development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bus. Process. Manag. J. ![In: Bus. Process. Manag. J. 30(2), pp. 463-484, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Vincent Freiberger, Erik Buchmann |
Fairness Certification for Natural Language Processing and Large Language Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.01262, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Isha Chaudhary, Vedaant V. Jain, Gagandeep Singh |
QuaCer-C: Quantitative Certification of Knowledge Comprehension in LLMs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.15929, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daryl Mupupuni, Anupama Guntu, Liang Hong, Kamrul Hasan, Leehyun Keel |
Science based AI model certification for untrained operational environments with application in traffic state estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.14093, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Amit Dhurandhar, Swagatam Haldar, Dennis Wei, Karthikeyan Natesan Ramamurthy |
Trust Regions for Explanations via Black-Box Probabilistic Certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.11168, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Alex Wolf, Marco Edoardo Palma, Pasquale Salza, Harald C. Gall |
Trustworthy Distributed Certification of Program Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.13792, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daqian Shao, Lukas Fesser, Marta Kwiatkowska |
STR-Cert: Robustness Certification for Deep Text Recognition on Deep Learning Pipelines and Vision Transformers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.05338, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Bousquet, Linda Cook, Laurent Feuilloley, Théo Pierron, Sébastien Zeitoun |
Local certification of forbidden subgraphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.12148, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Bousquet, Laurent Feuilloley, Sébastien Zeitoun |
Global certification via perfect hashing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.03849, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ziquan Liu, Zhuo Zhi, Ilija Bogunovic, Carsten Gerner-Beuerle, Miguel Rodrigues |
PROSAC: Provably Safe Certification for Machine Learning Models under Adversarial Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.02629, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Alaa Anani, Tobias Lorenz 0002, Bernt Schiele, Mario Fritz |
Adaptive Hierarchical Certification for Segmentation using Randomized Smoothing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.08400, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 3119 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|