|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5416 occurrences of 2387 keywords
|
|
|
Results
Found 9246 publication records. Showing 9246 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Francesco Palmieri 0002, Ugo Fiore |
Securing the MPLS Control Plane. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, First International Conference, HPCC 2005, Sorrento, Italy, September 21-23, 2005, Proceedings, pp. 511-523, 2005, Springer, 3-540-29031-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
strong authentication, label distribution, integrity, MPLS, signaling |
20 | Frédéric Gervais, Marc Frappier, Régine Laleau |
Synthesizing B Specifications from EB3 Attribute Definitions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFM ![In: Integrated Formal Methods, 5th International Conference, IFM 2005, Eindhoven, The Netherlands, November 29 - December 2, 2005, Proceedings, pp. 207-226, 2005, Springer, 3-540-30492-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data integrity constraints, Information systems, pattern matching, attributes, B, recursive functions |
20 | Tom Walcott, Matt Bishop |
Traducement: A model for record security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 7(4), pp. 576-590, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
traducement, Integrity, security policy, recordation |
20 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 14(9), pp. 818-828, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
20 | Domenico Beneventano, Sonia Bergamaschi, Claudio Sartori 0001 |
Description logics for semantic query optimization in object-oriented database systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 28, pp. 1-50, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
integrity constraints rules, query rewriting method, semantic expansion of a query, description logics, subsumption, Semantic query optimization |
20 | Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli |
Compositional Verification of Secure Streamed Data: A Case Study with EMSS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTCS ![In: Theoretical Computer Science, 8th Italian Conference, ICTCS 2003, Bertinoro, Italy, October 13-15, 2003, Proceedings, pp. 383-396, 2003, Springer, 3-540-20216-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Compositional Analysis and Verification, Digital Streams, Security, Integrity |
20 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 23rd International Conference on Distributed Computing Systems (ICDCS 2003), 19-22 May 2003, Providence, RI, USA, pp. 146-154, 2003, IEEE Computer Society, 0-7695-1920-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
20 | David Gefen |
Reflections on the dimensions of trust and trustworthiness among online consumers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Data Base ![In: Data Base 33(3), pp. 38-53, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
benevolence, trust scales, world wide web, trust, integrity, electronic commerce, trustworthiness, ability |
20 | Lei Pan 0001, Lubomir Bic, Michael B. Dillencourt, Ming Kin Lai |
Mobile Agents - The Right Vehicle for Distributed Sequential Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPC ![In: High Performance Computing - HiPC 2002, 9th International Conference, Bangalore, India, December 18-21, 2002, Proceedings, pp. 575-586, 2002, Springer, 3-540-00303-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
distributed sequential computing (DSC), computation mobility, distributed code building block (DBlock), algorithmic integrity, Crout factorization, scalability, mobile agents, paging |
20 | Prakash Ramanan |
Efficient algorithms for minimizing tree pattern queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, Madison, Wisconsin, USA, June 3-6, 2002, pp. 299-309, 2002, ACM, 1-58113-497-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
LDAP queries, graph simulation, query minimization, tree pattern queries, XML, integrity constraints, XML queries |
20 | John Grant, Jarek Gryz, Jack Minker, Louiqa Raschid |
Logic-Based Query Optimization for Object Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 12(4), pp. 529-547, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
logic query, methods in object DBMS, object DBMS, semantic query optimization (SQO), semantic residues, Datalog, integrity constraints, OQL, ODL, ODMG |
20 | Wolfgang A. Halang, Peter Vogrin, Matjaz Colnaric |
A Safety Licensable PES for SIL 4 Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability and Security, 19th International Conference, SAFECOMP 2000, Rotterdam, The Netherlands, October 24-27, 2000, Proceedings, pp. 141-150, 2000, Springer, 3-540-41186-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Safety critical industrial automation, Safety Integrity Level 4, safety licensing, programmable electronic system, predictable real time behaviour, fail safe behaviour |
20 | Subhasish Mitra, Nirmal R. Saxena, Edward J. McCluskey |
Fault Escapes in Duplex Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 18th IEEE VLSI Test Symposium (VTS 2000), 30 April - 4 May 2000, Montreal, Canada, pp. 453-458, 2000, IEEE Computer Society, 0-7695-0613-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Duplex systems, Common-Mode Failures (CMFs), Test points, User-programmable logic, Data Integrity, Availability, Diversity |
20 | Subhasish Mitra, Edward J. McCluskey |
Word Voter: A New Voter Design for Triple Modular Redundant Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 18th IEEE VLSI Test Symposium (VTS 2000), 30 April - 4 May 2000, Montreal, Canada, pp. 465-470, 2000, IEEE Computer Society, 0-7695-0613-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Word-Voter, TMR-Simplex, data integrity, Triple Modular redundancy (TMR), Voter |
20 | Christian Labonté, Sampalli Srinivas |
Group Management Strategies for Secure Multicasting on Active Virtual Private Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: Proceedings 27th Conference on Local Computer Networks, Tampa, Florida, USA, 8-10 November, 2000, pp. 213-222, 2000, IEEE Computer Society, 0-7695-0912-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
multicast group management, active virtual private networks, message integrity, message privacy, Secure Active VPN Environment, SAVE project, Dalhousie University, authentication, cryptography, cryptography, multicasting, transport protocols, network architecture, multicast communication, message authentication, IP multicast, telecommunication networks, telecommunication security, secure multicasting, business communication, telecommunication network management |
20 | David Powell, Jean Arlat, Ljerka Beus-Dukic, Andrea Bondavalli, P. Coppola, Alessandro Fantechi, Eric Jenn, Christophe Rabéjac, Andy J. Wellings |
GUARDS: A Generic Upgradable Architecture for Real-Time Dependable Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 10(6), pp. 580-599, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
integrity levels, fault tolerance, embedded systems, real-time, Computer architecture, generic architecture |
20 | Roderick Chapman, Robert Dewar |
Re-engineering a Safety-Critical Application Using SPARK 95 and GNORT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ada-Europe ![In: Reliable Software Technologies - Ada-Europe '99, 1999 Ada-Europe International Conference on Reliable Software Technologies, Santander, Spain, June 7-11, 1999, Proceedings, pp. 39-51, 1999, Springer, 3-540-66093-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Ada Language and Tools, High Integrity Systems |
20 | D. V. Das |
EM simulation [ICs and MCMs]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 8th International Conference on VLSI Design (VLSI Design 1995), 4-7 January 1995, New Delhi, India, pp. 264-267, 1995, IEEE Computer Society, 0-8186-6905-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
electromagnetic field theory, transmission line matrix methods, integrated circuit packaging, EM simulation, emitted radiation, transmission line matrix method, electromagnetic simulation, TLM method, signal integrity, multichip modules, IC, MCM, electromagnetic field |
20 | Bruno Defude, Hervé Martin |
From a Passive to an Active Database Supporting Exceptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 5th International Conference, DEXA '94, Athens, Greece, September 7 - 9, 1994, Proceedings, pp. 360-369, 1994, Springer, 3-540-58435-8. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
Pre(post)-conditions, Inheritance, Integrity constraints, Exceptions, Object-Oriented DBMS |
20 | Oscar Díaz, Suzanne M. Embury |
Generating Active Rules from High-Level Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Advanced Database Systems, 10th British National Conference on Databases, BNCOD 10, Aberdeen, Scotland, UK, July 6-8, 1992, Proceedings, pp. 227-243, 1992, Springer, 3-540-55693-1. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
explicit knowledge representation, object-oriented databases, integrity constraints, Active databases |
20 | Marco A. Casanova, António L. Furtado 0001, Luiz Tucherman |
A Software Tool for Modular Database Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 16(2), pp. 209-234, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
consistency preservation, logical database design, module constructors, abstract data types, integrity constraints, encapsulation, modular design |
20 | William Ward Armstrong, Claude Delobel |
Decomposition and Functional Dependencies in Relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 5(4), pp. 404-430, 1980. The full citation details ...](Pics/full.jpeg) |
1980 |
DBLP DOI BibTeX RDF |
relational database, decomposition, integrity constraint, functional dependency, multivalued dependency |
20 | Zhuo Hao, Sheng Zhong 0002, Nenghai Yu |
A Privacy-Preserving Remote Data Integrity Checking Protocol with Data Dynamics and Public Verifiability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 23(9), pp. 1432-1437, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
data dynamics, privacy, Data integrity, public verifiability |
20 | Telidevara Aditya, Pallav Kumar Baruah, Ravi Mukkamala |
Space-Efficient Bloom Filters for Enforcing Integrity of Outsourced Data in Cloud Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CLOUD ![In: IEEE International Conference on Cloud Computing, CLOUD 2011, Washington, DC, USA, 4-9 July, 2011, pp. 292-299, 2011, IEEE Computer Society, 978-1-4577-0836-7. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
storage efficiency, parallel processing, data integrity, outsourcing, hashing, Bloom filter |
20 | Venki Balasubramanian, Doan B. Hoang, Tanveer A. Zia |
Addressing the Confidentiality and Integrity of Assistive Care Loop Framework Using Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSEng ![In: 21st International Conference on Systems Engineering (ICSEng 2011), Las Vegas, NV, USA, Aug. 16-18, 2011, pp. 416-421, 2011, IEEE, 978-1-4577-1078-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
Body Area Wireless Sensor Network, ACLF, Privacy, Integrity, Healthcare, Confidentiality |
20 | Michael R. Clarkson, Fred B. Schneider |
Quantification of Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: Proceedings of the 23rd IEEE Computer Security Foundations Symposium, CSF 2010, Edinburgh, United Kingdom, July 17-19, 2010, pp. 28-43, 2010, IEEE Computer Society, 978-0-7695-4082-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
quantitative information flow, Integrity, information theory, database privacy |
20 | Fangyong Hou, Hongjun He, Nong Xiao, Fang Liu 0002, Guangjun Zhong |
Static, Dynamic and Incremental MAC Combined Approach for Storage Integrity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 1616-1621, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
integrity, dynamic, MAC, storage, incremental, static |
20 | Rabindra Bista, Hye-Kyeom Yoo, Jae-Woo Chang |
A New Sensitive Data Aggregation Scheme for Protecting Integrity in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 2463-2470, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Wireless sensor network, Data integrity, Data aggregation, Data privacy, Complex number |
20 | Min Luo, Liang-Jie Zhang, Fengyun Lei |
An Insuanrance Model for Guranteeing Service Assurance, Integrity and QoS in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2010, Miami, Florida, USA, July 5-10, 2010, pp. 584-591, 2010, IEEE Computer Society, 978-0-7695-4128-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Service Risks, Service Assessment and Valuation, Service Insurance Model, Security, Quality of Service (QoS), Privacy, Integrity, Cloud Computing, Analytics |
20 | Xianji Cui, Dantong Ouyang, Yuxin Ye |
Persistent Storage of Ontology-Based Data with Integrity Constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCST ![In: Fifth International Conference on Frontier of Computer Science and Technology, FCST 2010, Changchun, Jilin Province, China, August 18-22, 2010, pp. 260-265, 2010, IEEE Computer Society, 978-0-7695-4139-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Ontology, Relational Database, Integrity Constraints |
20 | Mohd Faizal Mubarak, Jamalul-lail Ab Manan, Saadiah Yahya |
The System Integrity Verification for Trusted RFID Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Seventh International Conference on Information Technology: New Generations, ITNG 2010, Las Vegas, Nevada, USA, 12-14 April 2010, pp. 743-747, 2010, IEEE Computer Society, 978-0-7695-3984-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
RFID Protocol, Trusted RFID System, Security, Privacy, Trusted Computing, Integrity Verification |
20 | Zhi Wang 0004, Xuxian Jiang |
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Symposium on Security and Privacy ![In: 31st IEEE Symposium on Security and Privacy, SP 2010, 16-19 May 2010, Berleley/Oakland, California, USA, pp. 380-395, 2010, IEEE Computer Society, 978-0-7695-4035-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Control-Flow Integrity, Hypervisor, Rootkits |
20 | Tzung-Her Chen, Wei-Lun Huang, Chih-Yang Lin |
Chaos-Based Image Integrity Authentication Code. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IIH-MSP ![In: Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), Darmstadt, Germany, 15-17 October, 2010, Proceedings, pp. 13-16, 2010, IEEE Computer Society, 978-1-4244-8378-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
image authentication code, image integrity, watermarking, chaos |
20 | Wei Ren 0002, Yi Ren 0001, Hui Zhang 0086 |
Efficient and Lightweight Data Integrity Check in In-Networking Storage Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2009, Chengdu, Sichuan, China, 10-12 August 2009, pp. 340-347, 2009, IEEE Computer Society, 978-0-7695-3747-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Wireless Sensor Networks, Data Integrity, Distributed Storage, Linear Coding, Secure Storage |
20 | Daniele Rossi 0001, Paolo Angelini, Cecilia Metra, Giovanni Campardo, Gian Pietro Vanalli |
Risks for Signal Integrity in System in Package and Possible Remedies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETS ![In: 13th European Test Symposium, ETS 2008, Verbania, Italy, May 25-29, 2008, pp. 165-170, 2008, IEEE Computer Society, 978-0-7695-3150-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Crosstalk, Error Detecting Codes, Signal Integrity, System in Package |
20 | Carlos A. Hurtado, Claudio Gutierrez 0001, Alberto O. Mendelzon |
Capturing summarizability with integrity constraints in OLAP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 30(3), pp. 854-886, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
query-optimization, OLAP, data warehousing, integrity constraints, summarizability |
20 | Maha Nizam, Farid N. Najm, Anirudh Devgan |
Power grid voltage integrity verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISLPED ![In: Proceedings of the 2005 International Symposium on Low Power Electronics and Design, 2005, San Diego, California, USA, August 8-10, 2005, pp. 239-244, 2005, ACM, 1-59593-137-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
voltage integrity, power grid, voltage drop |
20 | Hugh C. Davis |
Hypertext link integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Comput. Surv. ![In: ACM Comput. Surv. 31(4es), pp. 28, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
content reference problem, dangling links, link integrity, broken links |
20 | Brian Dobbing, Alan Burns 0001 |
The Ravenscar Tasking Profile for High Integrity Real-Time Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGAda ![In: Proceedings of the ACM SIGAda Annual International Conference on Ada Technology, SIGAda 1998, Washington, DC, USA, November 8-12, 1998, pp. 1-6, 1998, ACM, 1-58113-033-3. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Ravenscar, Ada, Ada, tasking, safety-critical, high-integrity |
20 | David G. Novick, Joel Juillet |
Documentation Integrity for Safety-Critical Applications: The COHERE Project. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: The Sixteenth Annual International Conference of Computer Documentation, Scaling The Heights: The Future of Information Technology, September 23-26, 1998, Quebec City, Canada, Proceedings, pp. 51-57, 1998, ACM, 1-58113-004-X. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
authoring interface, documentation integrity, consistency |
20 | John P. McDermott |
Position Paper: Prolepsis on the Problem of Trojan-horse Based Integrity Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on New Security Paradigms ![In: Proceedings of the 1998 Workshop on New Security Paradigms, Charlottsville, VA, USA, September 22-25, 1998, pp. 48-51, 1998, ACM, 1-58113-168-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
trojan horse, security, integrity, storage |
20 | Jan Chomicki, David Toman 0001 |
Implementing Temporal Integrity Constraints Using an Active DBMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 7(4), pp. 566-582, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
Temporal databases, integrity constraints, dynamic constraints, constraint checking |
20 | Fereidoon Sadri |
Integrity Constraints in the Information Source Tracking Method. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 7(1), pp. 106-119, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
information source tracking, Database systems, integrity constraints, inconsistency, uncertainty management |
20 | Kai-Yuan Chao, D. F. Wong 0001 |
Signal integrity optimization on the pad assignment for high-speed VLSI design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 1995 IEEE/ACM International Conference on Computer-Aided Design, ICCAD 1995, San Jose, California, USA, November 5-9, 1995, pp. 720-725, 1995, IEEE Computer Society / ACM, 0-8186-7213-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
pad assignment, simultaneous swiching Noise, floorplanning, crosstalk, signal integrity, packaging |
20 | Ernst L. Leiss |
Data Integrity in Digital Optical Disks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 33(9), pp. 818-827, 1984. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP DOI BibTeX RDF |
write-once memory, digital optical disks, inmutable codes, probabilistic control-key schemes, storing data under a control-key, variable-length and fixed-length codes, Data integrity |
20 | David J. Lu |
Watchdog Processors and Structural Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 31(7), pp. 681-685, 1982. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
structural integrity checking (SIC), error detection, Pascal, Control flow, structured programming, watchdog processor |
19 | Avraham Shinnar, Marco Pistoia, Anindya Banerjee 0001 |
A language for information flow: dynamic tracking in multiple interdependent dimensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLAS ![In: Proceedings of the 2009 Workshop on Programming Languages and Analysis for Security, PLAS 2009, Dublin, Ireland, 15-21 June, 2009, pp. 125-131, 2009, ACM, 978-1-60558-645-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
information flow control, declassification, security type system |
19 | Foto N. Afrati, Phokion G. Kolaitis |
Repair checking in inconsistent databases: algorithms and complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: Database Theory - ICDT 2009, 12th International Conference, St. Petersburg, Russia, March 23-25, 2009, Proceedings, pp. 31-41, 2009, ACM, 978-1-60558-423-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
coNP-complete problem, equality-generating dependencies, repair checking, tuple-generating dependencies, weakly acyclic set, polynomial time, consistent query answering, inconsistent databases, database repairs |
19 | Hridesh Rajan, Mahantesh Hosamani |
Tisa: Toward Trustworthy Services in a Service-Oriented Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Serv. Comput. ![In: IEEE Trans. Serv. Comput. 1(4), pp. 201-213, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker |
Towards a Dynamic Inconsistency-Tolerant Schema Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ER Workshops ![In: Advances in Conceptual Modeling - Challenges and Opportunities, ER 2008 Workshops CMLSA, ECDM, FP-UML, M2AS, RIGiM, SeCoGIS, WISM, Barcelona Spain, October 20-23, 2008. Proceedings, pp. 89-98, 2008, Springer, 978-3-540-87990-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Hao Yuan, Mikhail J. Atallah |
Efficient Distributed Third-Party Data Authentication for Tree Hierarchies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 17-20 June 2008, Beijing, China, pp. 184-193, 2008, IEEE Computer Society, 978-0-7695-3172-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Min Xie 0002, Haixun Wang, Jian Yin 0002, Xiaofeng Meng 0001 |
Providing freshness guarantees for outsourced databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2008, 11th International Conference on Extending Database Technology, Nantes, France, March 25-29, 2008, Proceedings, pp. 323-332, 2008, ACM, 978-1-59593-926-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Johannes Osrael, Lorenz Froihofer, Karl M. Göschka |
Availability/Consistency Balancing Replication Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), Proceedings, 26-30 March 2007, Long Beach, California, USA, pp. 1-8, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Li Jiang, Lingdi Ping, Xuezeng Pan |
Combining robust declassification and intransitive noninterference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS ![In: Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), August 13-15, 2007, The University of Iowa, Iowa City, Iowa, USA, pp. 465-471, 2007, IEEE Computer Society, 0-7695-3039-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Miloud Bagaa, Noureddine Lasla, Abdelraouf Ouadjaout, Yacine Challal |
SEDAN: Secure and Efficient protocol for Data Aggregation in wireless sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 15-18 October 2007, Clontarf Castle, Dublin, Ireland, Proceedings, pp. 1053-1060, 2007, IEEE Computer Society, 0-7695-3000-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Adam J. Rocke, Ronald F. DeMara |
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 12(1), pp. 93-114, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Distributed Agent Control and Dispatch, Agent Handshaking Protocols, Intrusion Detection System Taxonomy, Network Security |
19 | Gaurav Gupta 0002, Josef Pieprzyk |
A Low-Cost Attack on Branch-Based Software Watermarking Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, 5th International Workshop, IWDW 2006, Jeju Island, Korea, November 8-10, 2006, Proceedings, pp. 282-293, 2006, Springer, 3-540-48825-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
unconditional branch, watermark, software, breakpoint |
19 | Kun Bai, Peng Liu 0005 |
Towards Database Firewall: Mining the Damage Spreading Patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), 11-15 December 2006, Miami Beach, Florida, USA, pp. 449-462, 2006, IEEE Computer Society, 0-7695-2716-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Daniel Ellard, James Megquier |
DISP: Practical, efficient, secure and fault-tolerant distributed data storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Storage ![In: ACM Trans. Storage 1(1), pp. 71-94, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Distributed data storage |
19 | Gerome Miklau, Dan Suciu |
Implementing a Tamper-Evident Database System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIAN ![In: Advances in Computer Science - ASIAN 2005, Data Management on the Web, 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings, pp. 28-48, 2005, Springer, 3-540-30767-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Sergio Greco, Cristina Sirangelo, Irina Trubitsyna, Ester Zumpano |
Feasibility Conditions and Preference Criteria in Querying and Repairing Inconsistent Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 15th International Conference, DEXA 2004 Zaragoza, Spain, August 30-September 3, 2004, Proceedings, pp. 44-55, 2004, Springer, 3-540-22936-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Jong-Weon Kim, Youngbae Byun, Jong-Uk Choi |
Image Forensics Technology for Digital Camera. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (3) ![In: Advances in Multimedia Information Processing - PCM 2004, 5th Pacific Rim Conference on Multimedia, Tokyo, Japan, November 30 - December 3, 2004, Proceedings, Part III, pp. 331-339, 2004, Springer, 3-540-23985-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Charanjit S. Jutla |
Lower Bound on Linear Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 10th Annual International Workshop, SAC 2003, Ottawa, Canada, August 14-15, 2003, Revised Papers, pp. 348-360, 2003, Springer, 3-540-21370-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Siddhartha R. Dalal, Yu-Yun Ho, Ashish Jain, Allen A. McIntosh |
Application Performance using End-to-End User Level Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2002 International Conference on Dependable Systems and Networks (DSN 2002), 23-26 June 2002, Bethesda, MD, USA, Proceedings, pp. 694-706, 2002, IEEE Computer Society, 0-7695-1597-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker |
Soundcheck for SQL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PADL ![In: Practical Aspects of Declarative Languages, Third International Symposium, PADL 2001, Las Vegas, Nevada, USA, March 11-12, 2001, Proceedings, pp. 214-228, 2001, Springer, 3-540-41768-0. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | M. D. Bennett, Neil C. Audsley |
Predictable and Efficient Virtual Addressing for Safety-Critical Real-Time Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECRTS ![In: 13th Euromicro Conference on Real-Time Systems (ECRTS 2001), 13-15 June 2001, Delft, The Netherlands, Proceedings, pp. 183-190, 2001, IEEE Computer Society, 0-7695-1221-6. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Ravi S. Sandhu, Fang Chen |
The Multilevel Relational (MLR) Data Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 1(1), pp. 93-132, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
conidentiality, polyinstantiation, access control, multilevel security |
19 | Tim Sheard, David W. Stemple |
Automatic Verification of Database Transaction Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 14(3), pp. 322-368, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
19 | David W. Stemple, Subhasish Mazumdar, Tim Sheard |
On the Modes and Meaning of Feedback to Transaction Designers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the Association for Computing Machinery Special Interest Group on Management of Data 1987 Annual Conference, San Francisco, CA, USA, May 27-29, 1987, pp. 374-386, 1987, ACM Press, 978-0-89791-236-5. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
19 | Yi-Lin Chuang, Sangmin Kim, Youngsoo Shin, Yao-Wen Chang |
Pulsed-latch aware placement for timing-integrity optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DAC ![In: Proceedings of the 47th Design Automation Conference, DAC 2010, Anaheim, California, USA, July 13-18, 2010, pp. 280-285, 2010, ACM, 978-1-4503-0002-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
pulsed latch, placement, physical design |
19 | Ragib Hasan, Marianne Winslett |
Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDBT ![In: EDBT 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings, pp. 621-632, 2010, ACM, 978-1-60558-945-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Kar Way Tan, Robert H. Deng |
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWS ![In: IEEE International Conference on Web Services, ICWS 2009, Los Angeles, CA, USA, 6-10 July 2009, pp. 67-74, 2009, IEEE Computer Society, 978-0-7695-3709-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Bhavani Thuraisingham |
Data security and integrity: developments and directions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD Workshop on CyberSecurity and Intelligence Informatics ![In: Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics, Paris, France, June 28, 2009, pp. 43, 2009, ACM, 978-1-60558-669-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Henning Klein, Jörg Keller 0001 |
Storage architecture with integrity, redundancy and encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-6, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Ruilin Liu, Wendy Hui Wang |
Integrity Verification of Outsourced XML Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 207-212, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Andrew Camilleri, Geoffrey Coulson, Lynne Blair |
CIF: A Framework for Managing Integrity in Aspect-Oriented Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (47) ![In: Objects, Components, Models and Patterns, 47th International Conference, TOOLS EUROPE 2009, Zurich, Switzerland, June 29-July 3, 2009. Proceedings, pp. 18-36, 2009, Springer, 978-3-642-02570-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
19 | Guillaume Duc, Ronan Keryell |
Improving virus protection with an efficient secure architecture with memory encryption, integrity and information leakage protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. ![In: J. Comput. Virol. 4(2), pp. 101-113, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Mohamed Sallak, Christophe Simon, Jean-François Aubry |
A Fuzzy Probabilistic Approach for Determining Safety Integrity Level. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Fuzzy Syst. ![In: IEEE Trans. Fuzzy Syst. 16(1), pp. 239-248, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Wei Li 0021, Lingyu Wang 0001, Bo Zhu 0001, Lei Zhang 0004 |
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 189-203, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Kikelomo Maria Apampa, Gary B. Wills, David Argles, Emil Marais |
Electronic Integrity Issues in E-Assessment Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: The 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, Cantabria, Spain, July 1-5, 2008, pp. 394-395, 2008, IEEE Computer Society, 978-0-7695-3167-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Diego F. de Carvalho, Rafael Chies, André Pimenta Freire, Luciana Andréia Fondazzi Martimiano, Rudinei Goularte |
Video steganography for confidential documents: integrity, privacy and version control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 26th Annual International Conference on Design of Communication, SIGDOC 2008, Lisbon, Portugal, September 22-24, 2008, pp. 199-206, 2008, ACM, 978-1-60558-083-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
document version control, multimedia, steganography, MPEG-4, collaborative systems |
19 | Anongporn Salaiwarakul, Mark Dermot Ryan |
Verification of Integrity and Secrecy Properties of a Biometric Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 1-13, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Santiago Urueña, Juan Zamorano, José Antonio Pulido, Juan Antonio de la Puente |
Communication Paradigms for High-Integrity Distributed Systems with Hard Real-Time Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIPES ![In: Distributed Embedded Systems: Design, Middleware and Resources, IFIP 20th World Computer Congress, TC10 Working Conference on Distributed and Parallel Embedded Systems (DIPES 2008), September 7-10, 2008, Milano, Italy, pp. 151-160, 2008, Springer, 978-0-387-09660-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Zahi S. Abuhamdeh |
A Case Study of ATPG Delay Path Performance Based on Measured Power Rail Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DFT ![In: 23rd IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2008), 1-3 October 2008, Boston, MA, USA, pp. 381-381, 2008, IEEE Computer Society, 978-0-7695-3365-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Lijun Liao, Jörg Schwenk |
A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 19-32, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Yiu-ming Cheung, Hao-Tian Wu |
A Sequential Quantization Strategy for Data Embedding and Integrity Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Circuits Syst. Video Technol. ![In: IEEE Trans. Circuits Syst. Video Technol. 17(8), pp. 1007-1016, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Shige Wang |
Model Transformation for High-Integrity Software Development in Derivative Vehicle Control System Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 227-234, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jeong-Oog Lee, Dae Hee Won, Sangkyung Sung, Taesam Kang, Young Jae Lee |
High Assurance GPS Integrity Monitoring System Using Particle Filtering Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), November 14-16, 2007, Dallas, Texas, USA, pp. 437-438, 2007, IEEE Computer Society, 0-7695-3043-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jérôme Hugues, Bechir Zalila, Laurent Pautet |
Combining Model Processing and Middleware Configuration for Building Distributed High-Integrity Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISORC ![In: Tenth IEEE International Symposium on Object-Oriented Real-Time Distributed Computing (ISORC 2007), 7-9 May 2007, Santorini Island, Greece, pp. 307-312, 2007, IEEE Computer Society, 0-7695-2765-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Carlos Ordonez 0001, Javier García-García 0001, Zhibo Chen 0002 |
Measuring referential integrity in distributed databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIMS ![In: Proceedings of the First Workshop on CyberInfrastructure: Information Management in eScience, CIMS 2007, Sixteenth ACM Conference on Information and Knowledge Management, CIKM 2007, Lisbon, Portugal, November 9, 2007, pp. 61-66, 2007, ACM. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
database, metric, consistency, completeness |
19 | Amlan Ganguly, Partha Pratim Pande, Benjamin Belzer, Cristian Grecu |
Addressing Signal Integrity in Networks on Chip Interconnects through Crosstalk-Aware Double Error Correction Coding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISVLSI ![In: 2007 IEEE Computer Society Annual Symposium on VLSI (ISVLSI 2007), May 9-11, 2007, Porto Alegre, Brazil, pp. 317-324, 2007, IEEE Computer Society, 0-7695-2896-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Aiwu Shi, Gleb Naumovich |
Improving Data Integrity with a Java Mutability Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSEC ![In: 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 5-7 December 2007, Nagoya, Japan, pp. 135-142, 2007, IEEE Computer Society, 0-7695-3057-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Huanmei Guan, Huanguo Zhang, Ping Chen, Yajie Zhou |
Mobile Agents Integrity Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
I3E (1) ![In: Integration and Innovation Orient to E-Society, Volume 1, Seventh IFIP International Conference on e-Business, e-Services, and e-Society (I3E2007), October 10-12, Wuhan, China, pp. 194-201, 2007, Springer, 978-0-387-75465-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Luciano Caroprese, Sergio Greco, Cristian Molinaro |
Prioritized Active Integrity Constraints for Database Maintenance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASFAA ![In: Advances in Databases: Concepts, Systems and Applications, 12th International Conference on Database Systems for Advanced Applications, DASFAA 2007, Bangkok, Thailand, April 9-12, 2007, Proceedings, pp. 459-471, 2007, Springer, 978-3-540-71702-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker, Davide Martinenghi |
Getting Rid of Straitjackets for Flexible Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 3-7 September 2007, Regensburg, Germany, pp. 360-364, 2007, IEEE Computer Society, 0-7695-2932-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Hai Lin 0004, Xuan Guan, Yunsi Fei, Zhijie Jerry Shi |
Compiler-assisted architectural support for program code integrity monitoring in application-specific instruction set processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCD ![In: 25th International Conference on Computer Design, ICCD 2007, 7-10 October 2007, Lake Tahoe, CA, USA, Proceedings, pp. 187-193, 2007, IEEE, 1-4244-1258-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Jorge Semião, Judit Freijedo, Juan J. Rodríguez-Andina, Fabian Vargas 0001, Marcelino B. Santos, Isabel C. Teixeira, João Paulo Teixeira 0001 |
On-line Dynamic Delay Insertion to Improve Signal Integrity in Synchronous Circuits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IOLTS ![In: 13th IEEE International On-Line Testing Symposium (IOLTS 2007), 8-11 July 2007, Heraklion, Crete, Greece, pp. 167-172, 2007, IEEE Computer Society, 0-7695-2918-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Joon S. Park, Ganesh Devarajan |
Fine-Grained and Scalable Approaches for Message Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 280, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Taeyong Je, Yungseon Eo |
Efficient Signal Integrity Verification of Multi-Coupled Transmission Lines with Asynchronously Switching Non-Linear Drivers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISQED ![In: 8th International Symposium on Quality of Electronic Design (ISQED 2007), 26-28 March 2007, San Jose, CA, USA, pp. 245-250, 2007, IEEE Computer Society, 978-0-7695-2795-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mariusz H. Jakubowski, Prasad Naldurg, Vijay Patankar, Ramarathnam Venkatesan |
Software Integrity Checking Expressions (ICEs) for Robust Tamper Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Information Hiding ![In: Information Hiding, 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers, pp. 96-111, 2007, Springer, 978-3-540-77369-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
Displaying result #401 - #500 of 9246 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ >>] |
|