|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1529 occurrences of 882 keywords
|
|
|
Results
Found 3119 publication records. Showing 3119 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
16 | David A. Umphress, James H. Cross II, Jhilmil Jain, Nischita Meda, Larry A. Barowski |
Bringing J2ME industry practice into the classroom. |
SIGCSE |
2004 |
DBLP DOI BibTeX RDF |
Nokia OK, jGRASP, wireless application development, software engineering education, J2ME |
16 | Ewen Denney, Bernd Fischer 0002, Johann Schumann |
Using Automated Theorem Provers to Certify Auto-generated Aerospace Software. |
IJCAR |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Lerina Aversano, Gerardo Canfora, Giovanni Capasso, Giuseppe A. Di Lucca, Corrado Aaron Visaggio |
Introducing Quality System in Small and Medium Enterprises: An Experience Report. |
PROFES |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Songtao Xia, James Hook |
Certifying Temporal Properties for Compiled C Programs. |
VMCAI |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Ricardo Staciarini Puttini, Ludovic Mé, Rafael Timóteo de Sousa Júnior |
Preventive and Corrective Protection for Mobile Ad Hoc Network Routing Protocols. |
WONS |
2004 |
DBLP DOI BibTeX RDF |
|
16 | Jonathan S. Shapiro |
Understanding the Windows EAL4 Evaluation. |
Computer |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Sathyanarayanan Subbiah, Srikanth Nagaraj |
Issues with Object Orientation in Verifying Safety-Critical Systems. |
ISORC |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Jae-Gwi Choi, Kouichi Sakurai, Ji-Hwan Park |
Does It Need Trusted Third Party? Design of Buyer-Seller Watermarking Protocol without Trusted Third Party. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Matei Ciobanu Morogan, Sead Muftic |
Certificate Management in Ad Hoc Networks. |
SAINT Workshops |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Serge Vaudenay |
The Security of DSA and ECDSA. |
Public Key Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Seong-Eun Lee, Hong-Jong Jang, Sun-Young Han |
Implementation of Smartcard Using Multi Authentication Method. |
ICCSA (1) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | G. Ramalingam, Alex Varshavsky, John Field, Deepak Goyal, Shmuel Sagiv |
Deriving Specialized Program Analyses for Certifying Component-Client Conformance. |
PLDI |
2002 |
DBLP DOI BibTeX RDF |
model checking, static analysis, abstract interpretation, software components, predicate abstraction |
16 | Morten Tollefsen, Magne Lunde |
ECDL for Visually Impaired Persons: Learning Materials, Individual Training, and Distance Education. |
ICCHP |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Chin-Chen Chang 0001, Ju Yuan Hsiao, Chi-Lung Chiang |
An Image Copyright Protection Scheme Based on Torus Automorphism. |
CW |
2002 |
DBLP DOI BibTeX RDF |
torus automorphism, Watermark, digital signature |
16 | Amaia Lazcano, Gustavo Alonso |
Process Based E-services. |
WELCOM |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Xavier Méhaut, Pierre Morère |
Improving Software Development by Using Safe Object Oriented Development: OTCD. |
SAFECOMP |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Kieron O'Hara, Nigel Shadbolt, Jeni Tennison |
Certifying KBSs: Using CommonKADS to Provide Supporting Evidence for Fitness for Purpose of KBSs. |
EKAW |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Albert Levi, M. Ufuk Çaglayan |
An Efficient, Dynamic and Trust Preserving Public Key Infrastructure. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
Nested Certificates, Performance Evaluation, Digital Certificates, Public Key Infrastructure (PKI), Certificate Path |
16 | Liz Whiting, Mike Hill |
Safety Analysis of Hawk in Flight Monitor. |
PASTE |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Yair Frankel, Moti Yung |
Cryptosystems Robust against "Dynamic Faults" Meet Enterprise Needs for Organizational "Change Control". |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Marc Richard-Foy |
Safe Ada Executive: An Executive for Ada Safety Critical Applications. |
Ada-Europe |
1995 |
DBLP DOI BibTeX RDF |
|
16 | Alison Anderson, Dennis Longley, Lam-for Kwok |
Security Modelling for Organisations. |
CCS |
1994 |
DBLP DOI BibTeX RDF |
|
16 | R. A. Sprangler, Richard C. Linger |
The IBM Cleanroom Software Engineering Technology Transfer Program. |
CSEE |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Mihir Bellare, Moti Yung |
Certifying Cryptographic Tools: The Case of Trapdoor Permutations. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
16 | Pil Joong Lee |
Secure User Access Control for Public Networks. |
AUSCRYPT |
1990 |
DBLP DOI BibTeX RDF |
|
16 | Sowmyan Raman |
Flight Mission Scenario Generation with Knowledge-based System. |
IEA/AIE (Vol. 1) |
1988 |
DBLP DOI BibTeX RDF |
EMULA |
16 | William P. LaPlant, Raymond Demarest, Vince Guidace, David R. Skeen, Carol M. Vaughan |
The Federal Computer Professional In The 1980'S: Impact of the president's reorganization project. |
ACM Annual Conference (1) |
1978 |
DBLP DOI BibTeX RDF |
|
14 | Nicola Dragoni, Eduardo Lostal, Olga Gadyatskaya, Fabio Massacci, Federica Paci |
A Load Time Policy Checker for Open Multi-application Smart Cards. |
POLICY |
2011 |
DBLP DOI BibTeX RDF |
Smart cards security, application certification, information exchange, policy models |
14 | Brigitte Piniewski, Johan Muskens, Leonardo Estevez, Randy Carroll, Rick Cnossen |
Empowering Healthcare Patients with Smart Technology. |
Computer |
2010 |
DBLP DOI BibTeX RDF |
Continua Health Alliance, certification, eHealth, networking and communication, mobile/wireless, standards and best practices |
14 | Steven F. Barrett, Mitchell A. Thornton |
To PE or not to PE: the Sequel. |
Comput. Sci. Eng. |
2010 |
DBLP DOI BibTeX RDF |
licensure, professional engineer, certification |
14 | Byoungcheon Lee |
Unified Public Key Infrastructure Supporting Both Certificate-Based and ID-Based Cryptography. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Unified public key infrastructure, Private key issuing protocol, Key generation and certification authority, Key privacy agent, Certificate-based cryptography, Hybrid cryptography, Bilinear pairing, ID-based cryptography |
14 | Joel Mana Gonçalves |
Privacy and Information Security in Brazil? Yes, We Have It and We Do It! |
ITNG |
2010 |
DBLP DOI BibTeX RDF |
Integrity, Management, Policies, Availability, Certification, Confidentiality |
14 | Amelia Phillips, Kara L. Nance |
Computer Forensics Investigators or Private Investigators: Who Is Investigating the Drive?. |
SADFE |
2010 |
DBLP DOI BibTeX RDF |
certification, digital forensics, licensing |
14 | Jose L. Muñoz, Oscar Esparza, Jordi Forné, Esteve Pallarès |
Design and implementation of a lightweight online certificate validation service. |
Telecommun. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Certification, Public key infrastructure, Revocation, OCSP |
14 | Rolf Zon, Henk van Dijk |
A Selection of Human Factors Tools: Measuring HCI Aspects of Flight Deck Technologies. |
HCI (17) |
2009 |
DBLP DOI BibTeX RDF |
HILAS, HF tools registry, Human Factors, experiment, certification, flight simulation, flight deck, HF |
14 | Martin Glas, Sven Ziemer |
Challenges for agile development of large systems in the aviation industry. |
OOPSLA Companion |
2009 |
DBLP DOI BibTeX RDF |
development risk, open tool platform, certification, situation awareness, agile development, change notification, generative design |
14 | Peter Micheuz |
E-Maturity and School Development: When the Tail Wants to Wag the Dog. |
WCCE |
2009 |
DBLP DOI BibTeX RDF |
ICT in education, e-Maturity, e-Learning, Certification |
14 | Gail Farally-Semerad, Geroge Thompson |
The A.R.T. of content management training. |
SIGUCCS |
2009 |
DBLP DOI BibTeX RDF |
seo, writing for the web, collaboration, navigation, training, html, maintenance, certification, accuracy, relevency, web design, content management, distributed environment, web pages, classes, instruction, usability studies, skills, publishing, editing, CMS, academic, search engine optimization |
14 | Tobias Schoofs, Eric Jenn, Stéphane Leriche, Kelvin Nilsen, Ludovic Gauthier, Marc Richard-Foy |
Use of PERC Pico in the AIDA avionics platform. |
JTRES |
2009 |
DBLP DOI BibTeX RDF |
ARINC 653, DO-178C, SCJT, aeronautic certification, safety-critical real-time systems, Java, RTSJ |
14 | Sarbari Gupta |
Personal identity verification (PIV) cards as federated identities: challenges and opportunities. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
federal bridge certification authority, authentication, authorization, smart cards, PKI, assurance |
14 | Louis R. D'Alessandro, Donald T. Gantz |
Combining academic studies with it certifications: becoming a cisco regional academy. |
SIGITE Conference |
2009 |
DBLP DOI BibTeX RDF |
networking, curriculum, certification |
14 | Joe Damore |
DATC Newsletter. |
IEEE Des. Test Comput. |
2008 |
DBLP DOI BibTeX RDF |
IEEE chip design certification initiative, Electronic Design Processes subcommittee workshop, SBCCI, design automation, DATC |
14 | Heng He, Li Chen 0011, Pingpeng Yuan, Xin Xu 0007, Xiaofeng Wang |
A Security Architecture for Grid-Based Distributed Simulation Platform. |
PACIIA (1) |
2008 |
DBLP DOI BibTeX RDF |
Simulation Grid, Authentication, Access Control, Certification, High Level Architecture, Security Architecture |
14 | June Andronick, Quang Huy Nguyen 0002 |
Certifying an embedded remote method invocation protocol. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
JCRMI, security and functional certification, formal verification, embedded software, common criteria |
14 | Ed Van Sickle |
Refilling the it pipleline and using storage technologies as a specialization. |
CPR |
2008 |
DBLP DOI BibTeX RDF |
certification., emc academic alliance program, emc proven professional program, industry - education relationships, storage courses and curriculum, computer science education, storage technologies, information science education |
14 | Mary Sumner, Susan E. Yager |
An investigation of preparedness and importance of mis competencies: research in progress. |
CPR |
2008 |
DBLP DOI BibTeX RDF |
ISA certification, workforce needs, curriculum |
14 | Ewen Denney, Bernd Fischer 0002 |
Generating customized verifiers for automatically generated code. |
GPCE |
2008 |
DBLP DOI BibTeX RDF |
logical annotations, program verification, automated theorem proving, hoare logic, software certification, automated code generation |
14 | Robert B. Schnabel, Duncan A. Buell, Joanna Goode, J Strother Moore, Chris Stephenson |
An open dialogue concerning the state of education policy in computer science. |
SIGCSE |
2008 |
DBLP DOI BibTeX RDF |
K-12 curriculum, education policy, teacher certification, STEM |
14 | Kelvin Nilsen |
Simple low-level real-time threading semantics to enable portability, efficiency, analyzability, and generality. |
JTRES |
2008 |
DBLP DOI BibTeX RDF |
safety-critical certification, Java, real-time, threading, RTSJ |
14 | Herbert Hecht |
A Systems Engineering Approach to Exception Handling. |
ICONS |
2008 |
DBLP DOI BibTeX RDF |
exception handling, systems engineering, software failures, software certification |
14 | Egon Börger |
Construction and analysis of ground models and their refinements as a foundation for validating computer-based systems. |
Formal Aspects Comput. |
2007 |
DBLP DOI BibTeX RDF |
Validation and certification, ASM ground model (golden model), ASM refinement, Verified software challenge, System analysis, Abstract State Machine |
14 | Massimiliano Pala, Sean W. Smith |
AutoPKI: A PKI Resources Discovery System. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Service Discovery, PKI, Digital Certificates, Certification Authority |
14 | Robert B. K. Dewar |
The compiler as a static analysis tool. |
SIGAda |
2007 |
DBLP DOI BibTeX RDF |
ada, compilers, C++, static analysis, C, safety, certification |
14 | Kelvin Nilsen |
Improving abstraction, encapsulation, and performance within mixed-mode real-time Java applications. |
JTRES |
2007 |
DBLP DOI BibTeX RDF |
safety-critical certification, Java, RTSJ, DO-178B |
14 | Ed Van Sickle, Efrem Mallach, Brian H. Cameron, Derrek B. Dunn, Denetra Rook, Frank M. Groom, Ronnie Rollins |
Storage technologies: an education opportunity. |
SIGITE Conference |
2007 |
DBLP DOI BibTeX RDF |
EMC academic alliance program, EMC proven professional program, industry-education relationships, information infrastructure technologies, storage courses and curriculum, storage education, computer science education, certification, information storage, storage technologies, information science education |
14 | Lee Pike, Mark Shields, John Matthews |
A verifying core for a cryptographic language compiler. |
ACL2 |
2006 |
DBLP DOI BibTeX RDF |
cryptography, certification, optimizing compiler, ACL2, high-assurance, certifying compiler, verifying compiler |
14 | David Mosley |
When to migrate legacy embedded applications. |
SIGAda |
2006 |
DBLP DOI BibTeX RDF |
certification, migration, portability, lifecycle |
14 | Manuel V. Hermenegildo, Elvira Albert, Pedro López-García 0001, Germán Puebla |
Abstraction carrying code and resource-awareness. |
PPDP |
2005 |
DBLP DOI BibTeX RDF |
granularity control, mobile code certification, programming languages, abstract interpretation, program verification, distributed programming, program debugging, cost analysis, resource awareness |
14 | Franco Arcieri, Fabio Fioravanti, Roberto Giaccio, Enrico Nardelli, Maurizio Talamo |
Certifying performance of cooperative services in a digital government framework. |
SAINT |
2003 |
DBLP DOI BibTeX RDF |
digital government support, interorganizational e-service certification, actual performance monitoring, application interoperability and cooperation |
14 | Miguel Goulão, Fernando Brito e Abreu |
The Quest for Software Components Quality. |
COMPSAC |
2002 |
DBLP DOI BibTeX RDF |
Components, Certification, Components Selection |
14 | V. Santhanam |
The anatomy of an FAA-qualifiable Ada subset compiler. |
SIGAda |
2002 |
DBLP DOI BibTeX RDF |
FAA, Ada, compiler, software certification, DO-178B |
14 | David W. Chadwick, Carmen Carroll, S. Harvey, John P. New, Andrew J. Young |
Experiences of Using a Public Key Infrastructure to Access Patient Confidential Data over the Internet. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
medical telematics, security, Internet, WWW, usability, digital signatures, encryption, Public key infrastructures, user acceptance, ease of use, certification authorities, validation testing |
14 | Ivica Crnkovic, Heinz W. Schmidt, Judith A. Stafford, Kurt C. Wallnau |
5th ICSE workshop on component-based software engineering: benchmarks for predictable assembly. |
ICSE |
2002 |
DBLP DOI BibTeX RDF |
composition languages, software architecture, component, analysis, certification, trusted components |
14 | Edward L. Jones |
Integrating testing into the curriculum - arsenic in small doses. |
SIGCSE |
2001 |
DBLP DOI BibTeX RDF |
tester certification, software testing |
14 | Sudipto Ghosh |
Fault Injection Testing for Distributed Object Systems. |
TOOLS (39) |
2001 |
DBLP DOI BibTeX RDF |
component-base d systems, fault injection testing, fault tolerance, CORBA, Certification, distributed object systems, Java RMI |
14 | Michael Weber, Viren Shah, Chris Ren |
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization. |
SCAM |
2001 |
DBLP DOI BibTeX RDF |
static analysis, buffer overflow, software security, software certification |
14 | Hussein Suleman, Edward A. Fox, Marc Abrams |
Building quality into a digital library. |
ACM DL |
2000 |
DBLP DOI BibTeX RDF |
XML, XML, quality, certification, repository |
14 | Joon S. Park, Ravi S. Sandhu |
Binding Identities and Attributes using Digitally Signed Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
binding identities, digitally signed certificates, binding attributes, chained signatures, monolithic signatures, autonomic signatures, digital signature, certification, message authentication, certificate authority, attribute certificates |
14 | Kai Rannenberg, Giovanni Iachello |
Protection Profiles for Remailer Mixes -Do the New Evaluation Criteria Help? |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
protection profiles, remailer mixes, IT security evaluation criteria, privacy-related requirements, remailer mix networks, unobservable message transfer, ISO-ECITS, TCSEC, ITSEC, information technology, information technology, certification, privacy protection, electronic mail, data privacy, CC, evaluation criteria, user anonymity |
14 | Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean |
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture |
14 | Petra Wohlmacher, Peter Pharow |
Applications in Health Care using Public-Key Certificates and Attribute Certificates. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
medical administrative data processing, health professional, health professional card, jurisdiction, advertizing, trust center, HARP, European Electronic Signature Directive, European Data Protection Directive, Internet, authenticity, integrity, digital signature, smart cards, smart card, public key cryptography, certification, certificates, confidentiality, health care, auditing, auditing, authorisation, authentication protocol, data protection, permissions, applet, trusted third party, public-key certificates, x.509, access rights, attribute certificates, state of the art, nonrepudiation, security token, security infrastructures |
14 | Vishwa Prasad, Sreenivasa Potakamuri, Michael Ahern, Igor Balabine, Michah Lerner, Partha Dutta |
Scalable Policy Driven and General Purpose Public Key Infrastructure (PKI). |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
interoperable security infrastructure, AT? Labs, multiple certificate authorities, third-party CA systems, uniform enrollment procedures, Verisign, authenticated IP services, policy descriptions, certificate sources, X.509v3 certificates, CRML, PKCS, X509, XML, software architecture, authentication, public key cryptography, certification, client-server systems, public key infrastructure, revocation, intranets, message authentication, CRL, OCSP, middleware platform |
14 | Lisa Veloz |
Implementing the Microsoft Office User Specialist Program. |
SIGUCCS |
1999 |
DBLP DOI BibTeX RDF |
certification, technology training, Microsoft Office, Microsoft Office |
14 | David A. Cooper |
A Model of Certificate Revocation. |
ACSAC |
1999 |
DBLP DOI BibTeX RDF |
certificate revocation, certification authority, CRL, certificate revocation list |
14 | Jonathan D. Bright, Gregory F. Sullivan, Gerald M. Masson |
A Formally Verified Sorting Certifier. |
IEEE Trans. Computers |
1997 |
DBLP DOI BibTeX RDF |
software correctness, certification trails, program result checking, Sorting, formal program verification |
14 | Dirk Stelzer, Werner Mellis, Georg Herzwurm |
A critical look at ISO 9000 for software quality management. |
Softw. Qual. J. |
1997 |
DBLP DOI BibTeX RDF |
ISO 9004, quality systems, software process improvement, certification, CMM, SPICE, quality management, criticism, ISO 9001, software quality management, ISO 9000, ISO 9000-3 |
14 | Graeme Smith |
The Second ISEW Cleanroom Workshop. |
ICSE |
1997 |
DBLP DOI BibTeX RDF |
software reliability certification, statistical usage testing, verification, formal specification, software process improvement, technology transfer, stepwise refinement, cleanroom software engineering |
14 | Martin Gogolla, Stefan Conrad 0001, Grit Denker, Rudolf Herzig, Nikolaos Vlachantonis |
A Development Environment for an Object Specification Language. |
IEEE Trans. Knowl. Data Eng. |
1995 |
DBLP DOI BibTeX RDF |
object specification, verification, validation, certification, semantic data model, Information system design |
14 | James A. Whittaker, Jesse H. Poore |
Markow Analysis of Software Specifications. |
ACM Trans. Softw. Eng. Methodol. |
1993 |
DBLP DOI BibTeX RDF |
Cleanroom, box structure method, usage distribution, Markov chain, certification, stochastic process, software specification, statistical test |
14 | Richard C. Linger |
Cleanroom Software Engineering for Zero-Defect Software. |
ICSE |
1993 |
DBLP BibTeX RDF |
box structures, software quality certification, statistical usage testing, formal specification, incremental development, correctness verification, cleanroom software engineering |
14 | Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber |
Authentication in Distributed Systems: Theory and Practice. |
ACM Trans. Comput. Syst. |
1992 |
DBLP DOI BibTeX RDF |
loading programs, path name, principal, speaks for, group, role, delegation, key distribution, interprocess communication, certification authority, trusted computing base, secure channel |
14 | John D. Longhill |
Analysis of views of ACM and IEEE members concerning professionalism in the computing field. |
ACM Southeast Regional Conference |
1982 |
DBLP DOI BibTeX RDF |
CDP, certificate in DP, certification, computer profession, data processing, professionalism, professional society |
14 | Richard P. Reitman, Gregory R. Andrews |
Certifying Information Flow Properties of Programs: An Axiomatic Approach. |
POPL |
1979 |
DBLP DOI BibTeX RDF |
policy certification, concurrency, synchronization, computer security, information flow, proof rules, program validation |
12 | Jonas Primbs, Michael Menth |
OIDC²: Open Identity Certification With OpenID Connect. |
IEEE Open J. Commun. Soc. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mikel Manzanal Herrero, Aitor Rodríguez Mendez, Iraitz Carretero Caballo, Iker Muniategui-Aspiazu, Joseba Arza |
Hardware-in-the-Loop Platform for Virtual Certification of Traction Systems for Railway. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ying Pang, Feiyan Zhang, Qiong Wang, Lei Wang, Chengyuan Wang |
High- and new-technology enterprise certification, enterprise innovation ability and export product quality. |
Technol. Anal. Strateg. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Pablo Krupa, Omar Inverso, Mirco Tribastone, Alberto Bemporad |
Certification of the proximal gradient method under fixed-point arithmetic for box-constrained QP problems. |
Autom. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Pierre Fraigniaud, Pedro Montealegre 0001, Ivan Rapaport, Ioan Todinca |
A Meta-Theorem for Distributed Certification. |
Algorithmica |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Mélanie Ducoffe, Christophe Gabreau, Ileana Ober, Iulian Ober, Guillaume Vidot |
Certification of avionic software based on machine learning: the case for formal monotony analysis. |
Int. J. Softw. Tools Technol. Transf. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Hung Nguyen, George Onofrei, Ying Yang, Kevin Nguyen, Mohammadreza Akbari, Hiep Pham |
Green certification practices and process innovation alignment: diminishing point and catching up in nation's economic development. |
Bus. Process. Manag. J. |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Vincent Freiberger, Erik Buchmann |
Fairness Certification for Natural Language Processing and Large Language Models. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Isha Chaudhary, Vedaant V. Jain, Gagandeep Singh |
QuaCer-C: Quantitative Certification of Knowledge Comprehension in LLMs. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daryl Mupupuni, Anupama Guntu, Liang Hong, Kamrul Hasan, Leehyun Keel |
Science based AI model certification for untrained operational environments with application in traffic state estimation. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Amit Dhurandhar, Swagatam Haldar, Dennis Wei, Karthikeyan Natesan Ramamurthy |
Trust Regions for Explanations via Black-Box Probabilistic Certification. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Alex Wolf, Marco Edoardo Palma, Pasquale Salza, Harald C. Gall |
Trustworthy Distributed Certification of Program Execution. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Daqian Shao, Lukas Fesser, Marta Kwiatkowska |
STR-Cert: Robustness Certification for Deep Text Recognition on Deep Learning Pipelines and Vision Transformers. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Bousquet, Linda Cook, Laurent Feuilloley, Théo Pierron, Sébastien Zeitoun |
Local certification of forbidden subgraphs. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Nicolas Bousquet, Laurent Feuilloley, Sébastien Zeitoun |
Global certification via perfect hashing. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Ziquan Liu, Zhuo Zhi, Ilija Bogunovic, Carsten Gerner-Beuerle, Miguel Rodrigues |
PROSAC: Provably Safe Certification for Machine Learning Models under Adversarial Attacks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
12 | Alaa Anani, Tobias Lorenz 0002, Bernt Schiele, Mario Fritz |
Adaptive Hierarchical Certification for Segmentation using Randomized Smoothing. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 3119 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|