The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for counter with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1965 (16) 1966-1972 (16) 1973-1977 (19) 1978-1981 (24) 1982-1984 (17) 1985-1987 (20) 1988-1989 (28) 1990-1991 (24) 1992 (25) 1993 (23) 1994 (22) 1995 (34) 1996 (30) 1997 (47) 1998 (44) 1999 (61) 2000 (87) 2001 (96) 2002 (115) 2003 (153) 2004 (176) 2005 (224) 2006 (323) 2007 (283) 2008 (314) 2009 (232) 2010 (108) 2011 (93) 2012 (99) 2013 (107) 2014 (95) 2015 (134) 2016 (125) 2017 (108) 2018 (113) 2019 (128) 2020 (151) 2021 (160) 2022 (154) 2023 (186) 2024 (44)
Publication types (Num. hits)
article(1418) book(2) incollection(49) inproceedings(2763) phdthesis(26)
Venues (Conferences, Journals, ...)
CoRR(248) IEEE Trans. Computers(41) Theor. Comput. Sci.(30) IEEE Access(28) CAV(26) Sensors(26) HICSS(25) ISCAS(25) MFCS(23) Emergent Information Technolog...(22) FSTTCS(21) ISI(21) IACR Cryptol. ePrint Arch.(20) MICRO(20) ICALP(19) DATE(18) More (+10 of total 1742)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 2181 occurrences of 1516 keywords

Results
Found 4259 publication records. Showing 4258 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly Impact of denial of service attacks on ad hoc networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF black hole attacks, ad hoc networks, DoS attacks
12Daniel Große, Ulrich Kühne, Rolf Drechsler Analyzing Functional Coverage in Bounded Model Checking. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Hua Wang, Yao Guo 0001, Xiangqun Chen DPAC: A Reuse-Oriented Password Authentication Framework for Improving Password Security. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Prabal Dutta, David E. Culler, Scott Shenker Asynchronous Neighbor Discovery: Finding Needles of Connectivity in Haystacks of Time. Search on Bibsonomy IPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF birthday protocol, synchronization, neighbor discovery
12Devu Manikantan Shila, Tricha Anjali Defending selective forwarding attacks in WMNs. Search on Bibsonomy EIT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Prabal Dutta, David E. Culler Practical asynchronous neighbor discovery and rendezvous for mobile sensing applications. Search on Bibsonomy SenSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF protocol, wireless, rendezvous, neighbor discovery
12Ryan Pries, Wei Yu 0002, Xinwen Fu, Wei Zhao 0001 A New Replay Attack Against Anonymous Communication Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Chengcui Zhang, Wei-bang Chen, Wen-Lin Liu, Chi-Bang Chen An Automated Bacterial Colony Counting System. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Biomedical image mining, colony counting
12Alexandre Rademaker, Edward Hermann Haeusler Toward Short and Structural -Reasoning Explanations: A Sequent Calculus Approach. Search on Bibsonomy SBIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF description logics, proof theory, sequent calculus
12Suman Deb Roy, Sneha Aman Singh, Subhrabrata Choudhury, Narayan C. Debnath Countering sinkhole and black hole attacks on sensor networks using Dynamic Trust Management. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger, Nidhal Selmane, Renaud Pacalet Silicon-level Solutions to Counteract Passive and Active Attacks. Search on Bibsonomy FDTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Parosh Aziz Abdulla, Pavel Krcál, Wang Yi 0001 R-Automata. Search on Bibsonomy CONCUR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Klaus Dräger, Bernd Finkbeiner Subsequence Invariants. Search on Bibsonomy CONCUR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Pascal Delaunay, Antoine Joux Yet Another Attack on Vest. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF VEST, Stream Ciphers, Side Channel Attacks, Fourier Transform
12Paul Bell, Igor Potapov Periodic and Infinite Traces in Matrix Semigroups. Search on Bibsonomy SOFSEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Li Li, Ming Gu 0001, Xiaoyu Song, Jianmin Wang 0001 Effective Predicate Abstraction for Program Verification. Search on Bibsonomy TASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF program verification, predicate abstraction
12Guosong Tian, Yu-Chu Tian, Colin J. Fidge High-Precision Relative Clock Synchronization Using Time Stamp Counters. Search on Bibsonomy ICECCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Imam Al-wazedi, Ahmed K. Elhakeem CDMA/MPLS platforms for WIMAX mesh networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12John Derrick, Heike Wehrheim On using data abstractions for model checking refinements. Search on Bibsonomy Acta Informatica The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Anthony Brew, Marco Grimaldi, Padraig Cunningham An evaluation of one-class classification techniques for speaker verification. Search on Bibsonomy Artif. Intell. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF One-class classifiers, Gaussian mixture models, Speaker verification
12Fred A. Bower, Daniel J. Sorin, Sule Ozev Online diagnosis of hard faults in microprocessors. Search on Bibsonomy ACM Trans. Archit. Code Optim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Hard fault tolerance, fine-grained diagnosis, processor microarchitecture
12Siddhartha Bhattacharyya, Paramartha Dutta, Ujjwal Maulik Binary object extraction using bi-directional self-organizing neural network (BDSONN) architecture with fuzzy context sensitive thresholding. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Binary object extraction, Bi-directional self-organizing neural network, Fuzzy context sensitive thresholding, System transfer index
12Baruch Awerbuch, Shay Kutten, Yishay Mansour, Boaz Patt-Shamir, George Varghese A Time-Optimal Self-Stabilizing Synchronizer Using A Phase Clock. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Reliability, Graph Theory, Theory, Distributed networks, DISCRETE MATHEMATICS, Computer Systems Organization, Mathematics of Computing, COMPUTER-COMMUNICATION NETWORKS
12Jianhua Yao 0001, Ronald M. Summers Detection and Segmentation of Colonic Polyps on Haustral Folds. Search on Bibsonomy ISBI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Daniel Große, Ulrich Kühne, Rolf Drechsler Estimating functional coverage in bounded model checking. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Brian Rogers, Siddhartha Chhabra, Milos Prvulovic, Yan Solihin Using Address Independent Seed Encryption and Bonsai Merkle Trees to Make Secure Processors OS- and Performance-Friendly. Search on Bibsonomy MICRO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Pierre-Marc Bureau, José M. Fernandez 0001 Optimising Networks Against Malware. Search on Bibsonomy IPCCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Peter Habermehl, Radu Iosif, Adam Rogalewicz, Tomás Vojnar Proving Termination of Tree Manipulating Programs. Search on Bibsonomy ATVA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Chwan-Hwa John Wu, Chun-Ching Andy Huang, J. David Irwin Using Identity-Based Privacy-Protected Access Control Filter (IPACF) to against denial of service attacks and protect user privacy. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF privacy, network security, DDoS, wireless security
12Mohamed Abdelhafez, George F. Riley, Robert G. Cole, Nam Phamdo Modeling and Simulations of TCP MANET Worms. Search on Bibsonomy PADS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ohad Inbar Graphical representation of statistical information in situations of judgment and decision-making. Search on Bibsonomy ECCE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF graphical representation of statistical information, probability representation, decision-making, uncertainty visualization, risk communication
12Hae Young Lee, Tae Ho Cho Fuzzy-Based Reliable Data Delivery for Countering Selective Forwarding in Sensor Networks. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Yan Zhou, Zach Jorgensen, W. Meador Inge Combating Good Word Attacks on Statistical Spam Filters with Multiple Instance Learning. Search on Bibsonomy ICTAI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Balaji Jayaraman, Navakanta Bhat High Precision 16-bit Readout Gas Sensor Interface in 0.13µm CMOS. Search on Bibsonomy ISCAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Gem Stapleton, Aidan J. Delaney Towards Overcoming Deficiencies in Constraint Diagrams. Search on Bibsonomy VL/HCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Antonio L. Cricenti, Philip Branch, Grenville J. Armitage Time-series Modelling of Server to Client IP Packet Length in First Person Shooter Games. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Stéphane Demri, Régis Gascon The Effects of Bounding Syntactic Resources on Presburger LTL. Search on Bibsonomy TIME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Hsinchun Chen Exploring Extremism and Terrorism on the Web: The Dark Web Project. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF terrorism informatics, dark web, intelligence and security informatics
12Yuechao Niu, Majid Baghaei Nejad, Hannu Tenhunen, Li-Rong Zheng 0001 Design of a Digital Baseband Processor for UWB Transceiver on RFID Tag. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution
12Ahmed Youssef, Mohab Anis, Mohamed I. Elmasry Dynamic Standby Prediction for Leakage Tolerant Microprocessor Functional Units. Search on Bibsonomy MICRO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12James R. Lee, Assaf Naor Lp metrics on the Heisenberg group and the Goemans-Linial conjecture. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Harald Fecher, Michael Huth 0001 Ranked Predicate Abstraction for Branching Time: Complete, Incremental, and Precise. Search on Bibsonomy ATVA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Alke Martens Time in the Adaptive Tutoring Process Model. Search on Bibsonomy Intelligent Tutoring Systems The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Michael F. Spear, Virendra J. Marathe, William N. Scherer III, Michael L. Scott Conflict Detection and Validation Strategies for Software Transactional Memory. Search on Bibsonomy DISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Wenhui Zhang SAT-Based Verification of LTL Formulas. Search on Bibsonomy FMICS/PDMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Celso de Melo, Rui Prada, Guilherme Raimundo, Joana Paulo Pardal, Helena Sofia Pinto, Ana Paiva 0001 Mainstream Games in the Multi-agent Classroom. Search on Bibsonomy IAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Teaching Multi-Agent Systems, Mainstream Games, Multi-Agent Platforms
12Vince Bárány, Christof Löding, Olivier Serre Regularity Problems for Visibly Pushdown Languages. Search on Bibsonomy STACS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yannick Monnet, Marc Renaudin, Régis Leveugle, Christophe Clavier, Pascal Moitrel Case Study of a Fault Attack on Asynchronous DES Crypto-Processors. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Yoon Jung Chung, In-Jung Kim, Chulsoo Lee, Eul-Gyu Im, Dongho Won Design of an On-Line Intrusion Forecast System with a Weather Forecasting Model. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Damage Propagation, Information Security control system (ISMS), Forecast, Intrusion, Weather Forecasting
12Wei Lin 0010, Bin Liu 0001, Yi Tang 0002 Traffic Distribution over Equal-Cost-Multi-Paths using LRU-based Caching with Counting Scheme. Search on Bibsonomy AINA (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Koushik De, Santiram Kal A Low Power 6-Bit A/D Converter Achieving 10-Bit Resolution for MEMS Sensor Interface Using Time-Interleaved Delta Modulation. Search on Bibsonomy VLSI Design The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Vithal Kuchibatla, Héctor Muñoz-Avila An Analysis on Transformational Analogy: General Framework and Complexity. Search on Bibsonomy ECCBR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xiaopeng Yu, Manh Anh Do, Lin Jia, Jianguo Ma, Kiat Seng Yeo Design of a low power wide-band high resolution programmable frequency divider. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ken Newman Albert in Africa: online role-playing and lessons from improvisational theatre. Search on Bibsonomy Comput. Entertain. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF online communication, fun, role-playing games
12Matthias Enzmann, Markus Schneider 0002 Improving Customer Retention in E-Commerce through a Secure and Privacy-Enhanced Loyalty System. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF customer retention, loyalty systems, privacy, e-commerce
12Fred A. Bower, Daniel J. Sorin, Sule Ozev A Mechanism for Online Diagnosis of Hard Faults in Microprocessors. Search on Bibsonomy MICRO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Giuseppe Persiano, Ivan Visconti Single-Prover Concurrent Zero Knowledge in Almost Constant Rounds. Search on Bibsonomy ICALP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Hagit Attiya, Danny Hendler Time and Space Lower Bounds for Implementations Using k-CAS. Search on Bibsonomy DISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Sourav Mukhopadhyay, Palash Sarkar 0001 Application of LFSRs in Time/Memory Trade-Off Cryptanalysis. Search on Bibsonomy WISA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Time/memory trade-off, LFSR, rainbow table
12Pao-Lung Chen, Ching-Che Chung, Chen-Yi Lee An all-digital PLL with cascaded dynamic phase average loop for wide multiplication range applications. Search on Bibsonomy ISCAS (5) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Bin Cao, Chip-Hong Chang, Thambipillai Srikanthan A new formulation of fast diminished-one multioperand modulo 2n/+1 adder. Search on Bibsonomy ISCAS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Xinwen Fu, Ye Zhu 0001, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Flow Marking Attacks in Wireless Anonymous Communication Networks. Search on Bibsonomy ICDCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Bailing Wang, Binxing Fang, Xiao-chun Yun A Worm Behavioral Approach to Susceptible Host Detection. Search on Bibsonomy GCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Oscar H. Ibarra, Sara Woodworth On Symport/Antiport P Systems with One or Two Symbols. Search on Bibsonomy SYNASC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Songtao Xia, Ben Di Vito, César A. Muñoz Automated test generation for engineering applications. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF model-checking, test case generation, predicate abstraction
12David Davis, Allison Frendak-Blume, Jennifer Wheeler, Alexander E. R. Woodcock, Clarence Worrell III A Conceptual Model of Counterterrorist Operations. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Jérôme Feret The Arithmetic-Geometric Progression Abstract Domain. Search on Bibsonomy VMCAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF numerical domains, static analysis, Abstract Interpretation
12Lawrence Teo, Yu-An Sun, Gail-Joon Ahn Defeating Internet Attacks Using Risk Awareness and Active Honeypots. Search on Bibsonomy IWIA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Japonica, Risk Awareness, Honeypots, Colored Petri Nets
12Görschwin Fey, Rolf Drechsler Improving simulation-based verification by means of formal methods. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Imad Aad, Jean-Pierre Hubaux, Edward W. Knightly Denial of service resilience in ad hoc networks. Search on Bibsonomy MobiCom The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ad hoc networks, TCP, UDP, DoS attacks
12Ko-Kang Chu, Maiga Chang, Yen-Teh Hsia A hybrid training mechanism for applying neural networks to Web-based applications. Search on Bibsonomy SMC (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Haque Mohammad Munirul, Michitaka Kameyama Ultra-Fine-Grain Field-Programmable VLSI Using Multiple-Valued Source-Coupled Logic. Search on Bibsonomy ISMVL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Matthias Enzmann, Markus Schneider 0002 A Privacy-Friendly Loyalty System for Electronic Marketplaces. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ye Zhu 0001, Xinwen Fu, Bryan Graham, Riccardo Bettati, Wei Zhao 0001 On Flow Correlation Attacks and Countermeasures in Mix Networks. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Noah Wardrip-Fruin What hypertext is. Search on Bibsonomy Hypertext The full citation details ... 2004 DBLP  DOI  BibTeX  RDF hyperfilm, hypergram, stretchtext, hypermedia, hypertext
12Bharat Adsul, Milind A. Sohoni Asynchronous Automata-Theoretic Characterization of Aperiodic Trace Languages. Search on Bibsonomy FSTTCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Colin D. Walter Longer Keys May Facilitate Side Channel Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Key Length, Side Channel Attacks, DPA, Power Analysis, Timing Attack, RSA Cryptosystem
12Christian Güttler, Troels Degn Johansson Spatial principles of level-design in multi-player first-person shooters. Search on Bibsonomy NETGAMES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF level design, multiplay, teamplay, emergence, game-play, game architecture
12Timo Steffens Feature-Based Declarative Opponent-Modelling. Search on Bibsonomy RoboCup The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Shing-Chi Cheung, Patrick C. K. Hung, Dickson K. W. Chiu On the e-Negotiation of Unmatched Logrolling Views. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Therani Madhusudan On a Text-Processing Approach to Facilitating Autonomous Deception Detection. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Shun-Ren Yang, Yi-Bing Lin A Mobility Management Strategy for UMTS. Search on Bibsonomy ICOIN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Jonathan Billington, Guy Edward Gallasch How Stop and Wait Protocols Can Fail over the Internet. Search on Bibsonomy FORTE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Stop and Wait Protocols, Protocol Analysis and Verification, TCP, Coloured Petri Nets, State space methods
12Andrew Skabar Single-Class Classification Augmented with Unlabeled Data: A Symbolic Approach. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Simon Bouisset, Serge Le Bozec, Christian Ribreau Postural dynamics in maximal isometric ramp efforts. Search on Bibsonomy Biol. Cybern. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Steven Gordon, Lars Michael Kristensen, Jonathan Billington Verification of a Revised WAP Wireless Transaction Protocol. Search on Bibsonomy ICATPN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Dirk Grunwald, Soraya Ghiasi Microarchitectural denial of service: insuring microarchitectural fairness. Search on Bibsonomy MICRO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Marc Rennhard, Bernhard Plattner Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection. Search on Bibsonomy WPES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF collusion detection, anonymity, peer-to-peer systems, mix networks
12Raphael Yahalom Protocols with Certified-Transfer Servers. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Oscar H. Ibarra, Zhe Dang, Zhi-Wei Sun Safety Verification for Two-Way Finite Automata with Monotonic Counters. Search on Bibsonomy Developments in Language Theory The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Prasad Jayanti f-arrays: implementation and applications. Search on Bibsonomy PODC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Dragan Bosnacki A Nested Depth First Search Algorithm for Model Checking with Symmetry Reduction. Search on Bibsonomy FORTE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF state space reduction techniques, nested depth first search algorithm, multiple representatives, Model checking, symmetry reduction
12Bruce Edmonds How Formal Logic Can Fail to Be Useful for Modelling or Designing MAS. Search on Bibsonomy RASTA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Luc Moreau 0001, Jean Duprat A construction of distributed reference counting. Search on Bibsonomy Acta Informatica The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Vincent D. Blondel, Julien Cassaigne, Codrin M. Nichitiu On a Conjecture of Kurka. A Turing Machine with No Periodic Configurations. Search on Bibsonomy MCU The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Ahmed Bouajjani, Peter Habermehl, Richard Mayr Automatic Verification of Recursive Procedures with One Integer Parameter. Search on Bibsonomy MFCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Anne Bergeron, Sylvie Hamel Cascade Decompositions are Bit-Vector Algorithms. Search on Bibsonomy CIAA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Oliver Jung, Sven Kuhn, Christoph Ruland, Kai Wollenweber Enhanced Modes of Operation for the Encryption in High-Speed Networks and Their Impact on QoS. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Nektarios Kranitis, Mihalis Psarakis, Dimitris Gizopoulos, Antonis M. Paschalis, Yervant Zorian An Effective Deterministic BIST Scheme for Shifter/Accumulator Pairs in Datapaths. Search on Bibsonomy ISQED The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 4258 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license