The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Patching with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1990 (15) 1991-1998 (17) 1999-2001 (34) 2002-2003 (31) 2004 (35) 2005 (38) 2006 (35) 2007 (35) 2008 (25) 2009 (27) 2010 (25) 2011-2012 (22) 2013-2014 (23) 2015-2016 (28) 2017 (23) 2018 (32) 2019 (31) 2020 (29) 2021 (23) 2022 (36) 2023 (52) 2024 (8)
Publication types (Num. hits)
article(253) incollection(2) inproceedings(363) phdthesis(6)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 276 occurrences of 197 keywords

Results
Found 628 publication records. Showing 624 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
12Shahram Ghandeharizadeh, Andrew Goodney, Chetan Sharma, Chris Bissell, Felipe Carino, Naveen Nannapaneni, Alex Wergeles, Aber Whitcomb Taming the storage dragon: the adventures of hoTMaN. Search on Bibsonomy SIGMOD Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data availability, storage area networks
12Wan-Ping Lee, Diana Marculescu, Yao-Wen Chang Post-floorplanning power/ground ring synthesis for multiple-supply-voltage designs. Search on Bibsonomy ISPD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple-supply voltage designs, physical design, floorplanning, vlsi
12George Tzanetakis Music analysis, retrieval and synthesis of audio signals MARSYAS. Search on Bibsonomy ACM Multimedia The full citation details ... 2009 DBLP  DOI  BibTeX  RDF music information retrieval, sound analysis
12Jinsik Kim, Pai H. Chou Remote progressive firmware update for flash-based networked embedded systems. Search on Bibsonomy ISLPED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clycomatic complexity, progressive code update
12Kenji Hori, Kiyohito Yoshihara Proposal and Evaluation of Data Reduction Method for Tracing Based Pre-patch Impact Analysis. Search on Bibsonomy APNOMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Software Patch Management, Kernel-Tracing
12Shuo Chen, Ziqing Mao, Yi-Min Wang, Ming Zhang Pretty-Bad-Proxy: An Overlooked Adversary in Browsers' HTTPS Deployments. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
12Ilya Wagner, Valeria Bertacco, Todd M. Austin Using Field-Repairable Control Logic to Correct Design Errors in Microprocessors. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Inger Anne Tøndel, Martin Gilje Jaatun, Per Håkon Meland Security Requirements for the Rest of Us: A Survey. Search on Bibsonomy IEEE Softw. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12André Berger, Vincenzo Bonifaci, Fabrizio Grandoni 0001, Guido Schäfer Budgeted Matching and Budgeted Matroid Intersection Via the Gasoline Puzzle. Search on Bibsonomy IPCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Vijay Sundaresan, Mark G. Stoodley, Pramod Ramarao Removing redundancy via exception check motion. Search on Bibsonomy CGO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF java, just-in-time compilation, partial redundancy elimination
12Liang Xie 0002, Hui Song, Trent Jaeger, Sencun Zhu A systematic approach for cell-phone worm containment. Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cell phone, patch, turing test
12Elie Bursztein NetQi: A Model Checker for Anticipation Game. Search on Bibsonomy ATVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Jae Kyu Lee, Seong-Jin Ahn 0001, Jin-Wook Chung Visibility-Based Test Scene Understanding by Real Plane Search. Search on Bibsonomy ISVC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Kandha Sankarpandian, Travis Little, W. Keith Edwards Talc: using desktop graffiti to fight software vulnerability. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF usable security, internet security, software vulnerabilities, security framework, patch management, home users, graffiti
12Yunpeng Chai, Zhihui Du, Sanli Li A New Scheduling Algorithm for Distributed Streaming Media System Based on Multicast. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Bastian Braun SAVE: static analysis on versioning entities. Search on Bibsonomy SESS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF static analysis, version control system, incremental analysis, secure software development
12Lin-Wang Wang, Byounghak Lee, Hongzhang Shan, Zhengji Zhao, Juan C. Meza, Erich Strohmaier, David H. Bailey Linearly scaling 3D fragment method for large-scale electronic structure calculations. Search on Bibsonomy SC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
12Sebastian Rönnau, Christian Pauli, Uwe M. Borghoff Merging changes in XML documents using reliable context fingerprints. Search on Bibsonomy ACM Symposium on Document Engineering The full citation details ... 2008 DBLP  DOI  BibTeX  RDF XML diff, XML patch, office applications, CSCW, fingerprint, version control
12Charles Reis, John Dunagan, Helen J. Wang, Opher Dubrovsky, Saher Esmeir BrowserShield: Vulnerability-driven filtering of dynamic HTML. Search on Bibsonomy ACM Trans. Web The full citation details ... 2007 DBLP  DOI  BibTeX  RDF code rewriting, JavaScript, Web browser, vulnerability
12Jonathan P. Caulkins, Eric D. Hough, Nancy R. Mead, Hassan Osman Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ioanna Samprakou, Christos Bouras, Theodore Karoubalis Improvements on "IP - IAPP": A fast IP handoff protocol for IEEE 802.11 wireless and mobile clients. Search on Bibsonomy Wirel. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IAPP, IP connectivity, IP mobility, Fast handoff, 802.11 Wireless LANs
12Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu 0003 Memsherlock: an automated debugger for unknown memory corruption vulnerabilities. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF memory corruption, debugging, vulnerability analysis
12Anh-Quynh Nguyen, Yoshiyasu Takefuji A novel approach for a file-system integrity monitor tool of Xen virtual machine. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Xen virtual machine, intrusion detection, Linux, rootkit
12Ilya Wagner, Valeria Bertacco Engineering trust with semantic guardians. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Luke Bellamy, Damien Hutchinson, Jason Wells User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Jeffrey Mark Siskind, Barak A. Pearlmutter First-class nonstandard interpretations by opening closures. Search on Bibsonomy POPL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF lambda lifting, referential transparency
12Martin Boesgaard, Erik Zenner Protecting Online Transactions with Unique Embedded Key Generators. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Jonathan C. Rowanhill, Glenn S. Wasson, Zach Hill, Jim Basney, Yuliyan Kiryakov, John C. Knight, Anh Nguyen-Tuong, Andrew S. Grimshaw, Marty Humphrey Dynamic System-Wide Reconfiguration of Grid Deployments in Response to Intrusion Detections. Search on Bibsonomy HPCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Leandro Souza, Fernando Cores, Xiaoyuan Yang 0001, Ana Ripoll DynaPeer: A Dynamic Peer-to-Peer Based Delivery Scheme for VoD Systems. Search on Bibsonomy Euro-Par The full citation details ... 2007 DBLP  DOI  BibTeX  RDF On-Demand Media Streaming, Internet VoD, Peer-to-Peer systems
12Amitesh Kumar, Alan M. Shih, Yasushi Ito, Douglas H. Ross, Bharat K. Soni A Hole-filling Algorithm Using Non-uniform Rational B-splines. Search on Bibsonomy IMR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Geometry Repair, Watertight, CSM, Edge Swapping, Delaunay Triangulation, CFD, Mesh Generation, NURBS, Hole Filling
12Christos Efstratiou, Nigel Davies 0001, Gerd Kortuem, Joe Finney, Rob Hooper, Mark Lowton Experiences of designing and deploying intelligent sensor nodes to monitor hand-arm vibrations in the field. Search on Bibsonomy MobiSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hand-arm vibration, health and safety, ad-hoc networks, embedded systems, deployment, mobile systems
12Dor Nir, Shmuel S. Tyszberowicz, Amiram Yehudai Locating Regression Bugs. Search on Bibsonomy Haifa Verification Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Yue Chen, Barry W. Boehm, Luke Sheppard Value Driven Security Threat Modeling Based on Attack Path Analysis. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Ram Dantu, Prakash Kolan, Robert Akl, Kall Loper Classification of Attributes and Behavior in Risk Management Using Bayesian Networks. Search on Bibsonomy ISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
12Fei Xie, Kien A. Hua, Ning Jiang Achieving True Video-on-Demand Service in Multi-Hop WiMax Mesh Networks. Search on Bibsonomy LCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Simulation, Algorithm, Wireless Mesh networks, VoD, WiMax, Cross-Layer Design
12Simon P. Chung, Aloysius K. Mok The LAIDS/LIDS Framework for Systematic IPS Design. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Maziar M. Nekovee Modeling the Spread of Worm Epidemics in Vehicular Ad Hoc Networks. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Zhiqiang Lin, Bing Mao, Li Xie 0001 A Practical Framework for Dynamically Immunizing Software Security Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Kexiang Wang, Ying He 0001, Xiaohu Guo, Hong Qin 0001 Spline Thin-Shell Simulation of Manifold Surfaces. Search on Bibsonomy Computer Graphics International The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Rongrong Ni, Qiuqi Ruan Region of Interest Watermarking Based on Fractal Dimension. Search on Bibsonomy ICPR (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Keelan Cleary, Melissa E. Rycroft Putting out the fire before it starts: proactive technology support. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF client communication, remote detection, backup, prevention
12Chase Douglas, Vijay S. Pai Seekable sockets: a mechanism to reduce copy overheads in TCP-based messaging. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xiaoyuan Yang 0001, Porfidio Hernández, Fernando Cores, Leandro Souza, Ana Ripoll, Remo Suppi, Emilio Luque DVoDP2P: distributed P2P assisted multicast VoD architecture. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xiaosong Ma, Vincent W. Freeh, Tao Yang, Sudharshan Vazhkudai, Tyler A. Simon, Stephen L. Scott Coupling prefix caching and collective downloads for remote dataset access. Search on Bibsonomy ICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Muthusrinivasan Muthuprasanna, Ke Wei, Suraj Kothari Eliminating SQL Injection Attacks - A Transparent Defense Mechanism. Search on Bibsonomy WSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Pavlos Stavrou, Pavlos Mavridis, Georgios Papaioannou 0001, Georgios Passalis, Theoharis Theoharis 3D Object Repair Using 2D Algorithms. Search on Bibsonomy International Conference on Computational Science (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Andrew Ireland Towards Automatic Assertion Refinement for Separation Logic. Search on Bibsonomy ASE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Ying He 0001, Kexiang Wang, Hongyu Wang 0002, Xianfeng Gu, Hong Qin 0001 Manifold T-Spline. Search on Bibsonomy GMP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Xinwen Fu, Wei Yu 0002, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham On Recognizing Virtual Honeypots and Countermeasures. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Kyle Ingols, Richard Lippmann, Keith Piwowarski Practical Attack Graph Generation for Network Defense. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
12Mário Guimarães New challenges in teaching database security. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data mining, DBMS, data warehouse, MLS, SQL injection, DBA
12Jack Y. B. Lee Channel folding - an algorithm to improve efficiency of multicast video-on-demand systems. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Eric Rescorla Is Finding Security Holes a Good Idea? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF blackhat, whitehat, software patches, vulnerability disclosure
12Michael D. Bailey, Evan Cooke, Farnam Jahanian, David Watson 0001, Jose Nazario The Blaster Worm: Then and Now. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Blaster, Welchia, MSBlast, worm, Windows
12Minh X. Nguyen, Xiaoru Yuan, Baoquan Chen Geometry completion and detail generation by texture synthesis. Search on Bibsonomy Vis. Comput. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Geometry image and Mesh editing, Surface completion, Partial differential equation, Detail preservation
12Vladimir G. Deineko, George Steiner, Zhihui Xue Robotic-Cell Scheduling: Special Polynomially Solvable Cases of the Traveling Salesman Problem on Permuted Monge Matrices. Search on Bibsonomy J. Comb. Optim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF robotic-cell scheduling, permuted Monge matrix, traveling salesman problem, polynomial-time algorithm
12Cheng Huang, Paul Salama Error concealment for shape in MPEG-4 object-based video coding. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Eelco Dolstra Efficient Upgrading in a Purely Functional Component Deployment Model. Search on Bibsonomy CBSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Janice G. El-Bayoumi Leveraging student owned laptops on campus: I can't connect to the network. can you help me? Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, support, help desk, customer service, laptops
12Shaya Potter, Jason Nieh AutoPod: Unscheduled System Updates with Zero Data Loss. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Marcus Vinicius de Melo Rocha, Marcelo de Almeida Maia, Ítalo S. Cunha, Jussara M. Almeida, Sérgio Vale Aguiar Campos Scalable media streaming to interactive users. Search on Bibsonomy ACM Multimedia The full citation details ... 2005 DBLP  DOI  BibTeX  RDF interactivity, workload model, scalable streaming
12Masato Uchida Modeling Viral Spread by Random Scanning and Its Relationship with the Epidemiological Model. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ying He 0001, Xianfeng Gu, Hong Qin 0001 Rational Spherical Splines for Genus Zero Shape Modeling. Search on Bibsonomy SMI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Dan Wu, Dongyang Long, Changji Wang, Zhanpeng Guan Modeling and Analysis of Worm and Killer-Worm Propagation Using the Divide-and-Conquer Strategy. Search on Bibsonomy ICA3PP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ji Young Choi, Chung Gu Kang 0001, Yong-Suk Kim, Kyeong Hur Neighbor Node Discovery Algorithm for Energy-Efficient Clustering in Ubiquitious Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ram Dantu, Prakash Kolan Risk Management Using Behavior Based Bayesian Networks. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Ruo Ando, Yoshiyasu Takefuji Self Debugging Mode for Patch-Independent Nullification of Unknown Remote Process Infection. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-debugging mode, real-time nullification, debug register, improved debug exception handler, branchIP recorder
12Xianfeng Gu, Ying He 0001, Hong Qin 0001 Manifold splines. Search on Bibsonomy Symposium on Solid and Physical Modeling The full citation details ... 2005 DBLP  DOI  BibTeX  RDF affine atlas, conformal structure, manifold spline, geometric modeling, riemann surface
12Patricia Bouyer, François Laroussinie, Pierre-Alain Reynier Diagonal Constraints in Timed Automata: Forward Analysis of Timed Systems. Search on Bibsonomy FORMATS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
12Wei Shu, Min-You Wu Resource Requirements of Closed-Loop Video Delivery Services. Search on Bibsonomy IEEE Multim. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Qing Huo Liu, Candong Cheng, Hisham Z. Massoud The spectral grid method: a novel fast Schrodinger-equation solver for semiconductor nanodevice simulation. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Bing Wang 0001, Subhabrata Sen, Micah Adler, Donald F. Towsley Optimal proxy cache allocation for efficient streaming media distribution. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ashton Applewhite, Alan Davis In the News. Search on Bibsonomy IEEE Softw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Giuliano Antoniol, Massimiliano Di Penta, Gianluca Masone, Umberto Villano Compiler Hacking for Source Code Analysis. Search on Bibsonomy Softw. Qual. J. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF source code analysis tools, XML, gcc, GXL
12Soo-Chang Pei, Yi-Chong Zeng, Ching-Hua Chang Virtual restoration of ancient Chinese paintings using color contrast enhancement and lacuna texture synthesis. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Yao-Wen Huang, Fang Yu 0001, Christian Hang, Chung-Hung Tsai, D. T. Lee, Sy-Yen Kuo Verifying Web Applications Using Bounded Model Checking. Search on Bibsonomy DSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Syed A. Khayam, Hayder Radha Analyzing the spread of active worms over VANET. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2004 DBLP  DOI  BibTeX  RDF stochastic modeling, VANET, epidemiology, computer worms
12Andrew Ireland, Bill J. Ellis, Tommy Ingulfsen Invariant Patterns for Program Reasoning. Search on Bibsonomy MICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Hiroki Mano, Akihiro Minagawa, Norio Tagawa Factorization-Based Planar Mapping Method for Generating Intermediate Views. Search on Bibsonomy ICPR (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Leonardo Bidese de Pinho, Claudio Luis de Amorim A Practical Performance Analysis of Stream Reuse Techniques in Peer-to-Peer VoD Systems. Search on Bibsonomy Euro-Par The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Tiecheng Liu, Srihari Nelakuditi Disruption-tolerant content-aware video streaming. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF disruption-tolerant streaming, network disruption, video key frames, video streaming
12ShaoHua Qin, Zimu Li, Cai Qingsong, Jianping Hu Segment-Based Adaptive Caching for Streaming Media Delivery on the Internet. Search on Bibsonomy WCW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF prefix caching, streaming media delivery, multicast, Streaming media, proxy caching
12Ram Dantu, Kall Loper, Prakash Kolan Risk Management using Behavior based Attack Graphs. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Juan Segarra, Vicent Cholvi On-Line Advancement of Transmission Plans in Video-on-Demand. Search on Bibsonomy ICDCS Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Ying He 0001, Hong Qin 0001 Surface Reconstruction with Triangular B-splines. Search on Bibsonomy GMP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Benoît Chevallier-Mames, David Naccache, Pascal Paillier, David Pointcheval How to Disembed a Program? Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
12Raúl Monroy Predicate Synthesis for Correcting Faulty Conjectures: The Proof Planning Paradigm. Search on Bibsonomy Autom. Softw. Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF faulty specifications, program synthesis/transformation, abduction, proof planning
12Michael Franz Safe Code - It's Not Just for Applets Anymore. Search on Bibsonomy JMLC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Bahjat Qazzaz, Remo Suppi, Fernando Cores, Ana Ripoll, Porfidio Hernández, Emilio Luque Providing Interactive Video on Demand Services in Distributed Architecture. Search on Bibsonomy EUROMICRO The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12P. H. Chan, Jack Y. B. Lee An Efficient Disk-Array-Based Server Design for a Multicast Video Streaming System. Search on Bibsonomy ASAP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Achim G. Hoffmann, Son Bao Pham Towards topic-based summarization for interactive document viewing. Search on Bibsonomy K-CAP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF natural language processing, knowledge acquisition
12Wenzhang Zhu, Cho-Li Wang, Francis C. M. Lau 0001 Lightweight Transparent Java Thread Migration for Distributed JVM. Search on Bibsonomy ICPP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed JVM, Java thread migration, mobility, multi-threading, JIT compiler
12Celia Pearce, Robert Nideffer, Eddo Stern, Anne-Marie Schleiner, Brody Condon Game art. Search on Bibsonomy SI3D The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Kok-Why Ng, Ya-Ping Wong, Son-Ni Ho Improvement in Decimation of Triangle Meshes for Level of Detail. Search on Bibsonomy GMAG The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
12Francis Alexandre, Khaled Bsaïes, Moussa Demba Predicate Synthesis from Inductive Proof Attempt of Faulty Conjectures. Search on Bibsonomy LOPSTR The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Corrective predicate, implicative formulas, folding/unfolding rules, theorem proving, program synthesis, abduction
12Greg Hoglund, Gary McGraw Point/Counterpoint: Security Band-Aids: More Cost-Effective than "Secure" Coding / Building Secure Software: Better than Protecting Bad Software. Search on Bibsonomy IEEE Softw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Tao Ju, Frank Losasso, Scott Schaefer, Joe D. Warren Dual contouring of hermite data. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF crack prevention, polyhedral simplification, quadratic error functions, contouring, implicit functions
12Giuseppe Desoli, Nikolay Mateev, Evelyn Duesterwald, Paolo Faraboschi, Josh Fisher A New Facility for Dynamic Control of Program Execution: DELI. Search on Bibsonomy EMSOFT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
12Meng Guo 0005, Mostafa H. Ammar, Ellen W. Zegura Selecting among replicated batching video-on-demand servers. Search on Bibsonomy NOSSDAV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF video on demand, batching, server selection
12Dimitris Vyzovitis, Andrew Lippman A Multicast Transport Protocol for Cooperative Media Distribution. Search on Bibsonomy ICNP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 624 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license