The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DSN with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1981-2000 (74) 2001 (57) 2002 (100) 2003 (86) 2004 (116) 2005 (103) 2006 (95) 2007 (99) 2008 (77) 2009 (80) 2010 (104) 2011 (120) 2012 (91) 2013 (113) 2014 (84) 2015 (83) 2016 (123) 2017 (99) 2018 (137) 2019 (99) 2020 (112) 2021 (113) 2022 (104) 2023 (154) 2024 (2)
Publication types (Num. hits)
article(23) inproceedings(2356) proceedings(46)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 388 occurrences of 286 keywords

Results
Found 2425 publication records. Showing 2425 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
37Soo Bum Lee, Virgil D. Gligor, Adrian Perrig Dependable connection setup for network capabilities. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Marcello Cinque, Domenico Cotroneo, Roberto Natella, Antonio Pecchia Assessing and improving the effectiveness of logs for the analysis of software faults. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Olivier Rütti, Zarko Milosevic 0001, André Schiper Generic construction of consensus algorithms for benign and Byzantine faults. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Basel Alomair, Andrew Clark 0001, Jorge Cuéllar, Radha Poovendran Scalable RFID systems: a privacy-preserving protocol with constant-time identification. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Patrick E. Lanigan, Priya Narasimhan, Thomas E. Fuhrman Experiences with a CANoe-based fault injection framework for AUTOSAR. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Daniel Skarin, Raul Barbosa, Johan Karlsson GOOFI-2: A tool for experimental dependability assessment. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37James Hendricks, Shafeeq Sinnamohideen, Gregory R. Ganger, Michael K. Reiter Zzyzx: Scalable fault tolerance through Byzantine locking. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach Transient fault models and AVF estimation revisited. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Joaquin Gracia-Moran, Daniel Gil-Tomas, Luis J. Saiz-Adalid, Juan Carlos Baraza, Pedro J. Gil-Vicente Experimental validation of a fault tolerant microcomputer system against intermittent faults. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Keun Soo Yim, Zbigniew Kalbarczyk, Ravishankar K. Iyer Measurement-based analysis of fault and error sensitivities of dynamic memory. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Nishant J. George, Carl R. Elks, Barry W. Johnson, John C. Lach Bit-slice logic interleaving for spatial multi-bit soft-error tolerance. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken Using correlated surprise to infer shared influence. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Gueyoung Jung, Kaustubh R. Joshi, Matti A. Hiltunen, Richard D. Schlichting, Calton Pu Performance and availability aware regeneration for cloud based multitier applications. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Carl R. Elks, Michael Reynolds, Nishant J. George, Marko Miklo, Scott Bingham, Ronald D. Williams, Barry W. Johnson, Michael Waterman, Jeanne Dion Application of a fault injection based dependability assessment process to a commercial safety critical nuclear reactor protection system. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Xiang Song, Haibo Chen 0001, Binyu Zang Why software hangs and what can be done with it. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Greg Bronevetsky, Ignacio Laguna, Saurabh Bagchi, Bronis R. de Supinski, Dong H. Ahn, Martin Schulz 0001 AutomaDeD: Automata-based debugging for dissimilar parallel tasks. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Ann T. Tai, Kam S. Tso, William H. Sanders Diversity-inspired clustering for self-healing MANETs: Motivation, protocol, and performability evaluation. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Shantanu Gupta, Amin Ansari, Shuguang Feng, Scott A. Mahlke StageWeb: Interweaving pipeline stages into a wearout and variation tolerant CMP fabric. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Dazhi Zhang, Donggang Liu DataGuard: Dynamic data attestation in wireless sensor networks. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Pirkko Kuusela, Ilkka Norros On/off process modeling of IP network failures. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Jingfei Kong, Huiyang Zhou Improving privacy and lifetime of PCM-based main memory. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Mahdi Fazeli, Seyed Ghassem Miremadi, Hossein Asadi 0001, Seyed Nematollah Ahmadian A fast and accurate multi-cycle soft error rate estimation approach to resilient embedded systems design. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Shenggang Wan, Qiang Cao 0001, Changsheng Xie, Benjamin Eckart, Xubin He Code-M: A non-MDS erasure code scheme to support fast recovery from up to two-disk failures in storage systems. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Joseph Sloan, David Kesler, Rakesh Kumar 0002, Ali Rahimi A numerical optimization-based methodology for application robustification: Transforming applications for error tolerance. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Zhou Li 0001, Kehuan Zhang, XiaoFeng Wang 0001 Mash-IF: Practical information-flow control within client-side mashups. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Javier Alonso 0001, Jordi Torres, Josep Lluis Berral, Ricard Gavaldà Adaptive on-line software aging prediction based on machine learning. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Samuel K. Klock, Peter Kemper An automated technique to support the verification and validation of simulation models. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis Fourth workshop on dependable and secure nanocomputing. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37John T. Daly, Nathan DeBardeleben 1st workshop on fault-tolerance for HPC at extreme scale FTXS 2010. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Peng Xie, Jason H. Li, Xinming Ou, Peng Liu 0005, Renato Levy Using Bayesian networks for cyber security analysis. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Miguel Correia 0001, Partha P. Pal 4th workshop on recent advances in intrusion-tolerant systems WRAITS 2010. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu Reuse-oriented camouflaging trojan: Vulnerability detection and attack construction. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Eric Anderson 0003, Xiaozhou Li, Arif Merchant, Mehul A. Shah, Kevin Smathers, Joseph A. Tucek, Mustafa Uysal, Jay J. Wylie Efficient eventual consistency in Pahoehoe, an erasure-coded key-blob archive. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Henrique Moniz, Nuno Ferreira Neves, Miguel Correia 0001 Turquois: Byzantine consensus in wireless ad hoc networks. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Roberto Natella, Domenico Cotroneo, João Durães, Henrique Madeira Representativeness analysis of injected software faults in complex software. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Yuanyuan Zeng, Xin Hu 0001, Kang G. Shin Detection of botnets using combined host- and network-level information. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Jianqiang Luo, Cheng Huang 0002, Lihao Xu Decoding STAR code for tolerating simultaneous disk failure and silent errors. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Michael Grottke, Allen P. Nikora, Kishor S. Trivedi An empirical investigation of fault types in space mission system software. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Diogo Mónica, João Leitão 0001, Luís E. T. Rodrigues, Carlos Ribeiro Observable non-Sybil quorums construction in one-hop wireless ad hoc networks. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Pedro Fonseca 0001, Cheng Li 0001, Vishal Singhal, Rodrigo Rodrigues 0001 A study of the internal and external effects of concurrency bugs. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Utpal Paul, Samir R. Das, Ritesh Maheshwari Detecting selfish carrier-sense behavior in WiFi networks by passive monitoring. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Boudewijn R. Haverkort, Matthias Kuntz, Anne Remke, S. Roolvink, Mariëlle Stoelinga Evaluating repair strategies for a water-treatment facility using Arcade. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Zhen Wang 0001, Mark G. Karpovsky, Ajay Joshi Reliable MLC NAND flash memories based on nonlinear t-error-correcting codes. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Yimin Song, Chao Yang 0022, Guofei Gu Who is peeping at your passwords at Starbucks? - To catch an evil twin access point. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Xin Fu, Tao Li, José A. B. Fortes Architecting reliable multi-core network-on-chip for small scale processing technology. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Manoj K. Agarwal, Venkateswara Reddy Madduri Correlating failures with asynchronous changes for root cause analysis in enterprise environments. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Weichao Wang, Di Pu, Alexander M. Wyglinski Detecting Sybil nodes in wireless networks with physical layer network coding. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Eric Bisolfati, Paul Dan Marinescu, George Candea Studying application-library interaction and behavior with LibTrac. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Roy A. Maxion, Kevin S. Killourhy Keystroke biometrics with number-pad input. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Elias P. Duarte Jr., Thiago Garrett, Luis C. E. Bona, Renato Carmo, Alexandre Prusch Züge Finding stable cliques of PlanetLab nodes. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37Sergey Legtchenko, Sébastien Monnet, Gaël Thomas 0001 Blue Banana: resilience to avatar mobility in distributed MMOGs. Search on Bibsonomy DSN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
37 Proceedings of the 2009 IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2009, Estoril, Lisbon, Portugal, June 29 - July 2, 2009 Search on Bibsonomy DSN The full citation details ... 2009 DBLP  BibTeX  RDF
37Karthik Pattabiraman, Zbigniew Kalbarczyk Second workshop on Compiler and Architectural Techniques for Application Reliability and Security (CATARS). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Maxime Monod, Vivien Quéma Stretching gossip with live streaming. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Yao Zhao 0003, Sagar Vemuri, Jiazhen Chen, Yan Chen 0004, Hai Zhou 0001, Zhi Fu Exception triggered DoS attacks on wireless networks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Kevin S. Killourhy, Roy A. Maxion Comparing anomaly-detection algorithms for keystroke dynamics. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Zibin Zheng, Michael R. Lyu A QoS-aware fault tolerant middleware for dependable service composition. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Luc Malrait, Sara Bouchenak, Nicolas Marchand Fluid modeling and control for server system performance and availability. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Derek Graham, Per Strid, Scott Roy, Fernando Rodriguez A low-tech solution to avoid the severe impact of transient errors on the IP interconnect. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Ziming Zheng, Zhiling Lan, Byung-Hoon Park, Al Geist System log pre-processing to improve failure prediction. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Gonçalo Quadros Dependability - How does the market value it? Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Christopher Szilagyi, Philip Koopman Flexible multicast authentication for time-triggered embedded control network applications. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Xiangyu Tang, Seongmoon Wang A self-diagnosis technique using Reed-Solomon codes for self-repairing chips. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Marijn R. Jongerden, Boudewijn R. Haverkort, Henrik C. Bohnenkamp, Joost-Pieter Katoen Maximizing system lifetime by battery scheduling. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37José Fonseca 0002, Marco Vieira, Henrique Madeira Vulnerability & attack injection for web applications. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Matthias Sand, Stefan Potyra, Volkmar Sieh Deterministic high-speed simulation of complex systems including fault-injection. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Giuliano Casale, Evgenia Smirni MAP-AMVA: Approximate mean value analysis of bursty systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Julia L. Lawall, Julien Brunel, Nicolas Palix, René Rydhof Hansen, Henrik Stuart, Gilles Muller WYSIWIB: A declarative approach to finding API protocols and bugs in Linux code. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Zhen Wang 0001, Mark G. Karpovsky, Konrad J. Kulikowski Replacing linear Hamming codes by robust nonlinear codes results in a reliability improvement of memories. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jennifer Black, Philip Koopman System safety as an emergent property in composite systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Zhihong Zhang, Jianfeng Zhan, Yong Li 0007, Lei Wang 0004, Dan Meng, Bo Sang Precise request tracing and performance debugging for multi-tier services of black boxes. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37António Casimiro, Rogério de Lemos, Cristina Gacek Workshop on Architecting Dependable Systems (WADS 2009). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Marco Vieira, Nuno Antunes, Henrique Madeira Using web security scanners to detect vulnerabilities in web services. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Johan Karlsson, Michael Nicolaidis Third workshop on dependable and secure nanocomputing. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Galen Lyle, Shelley Cheny, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer An end-to-end approach for the automatic derivation of application-aware error detectors. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Guanhua Yan, Leticia Cuellar, Stephan J. Eidenbenz, Nicolas W. Hengartner Blue-Watchdog: Detecting Bluetooth worm propagation in public areas. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Christof Fetzer, Rodrigo Rodrigues 0001 Fifth Workshop on Hot Topics in System Dependability (HotDep 2009). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jianqiang Luo, Lihao Xu, James S. Plank An efficient XOR-scheduling algorithm for erasure codes encoding. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Luis Marques, António Casimiro, Mario Calha Design and development of a proof-of-concept platooning application using the HIDENETS architecture. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Nicholas Weaver, John H. Kelm, Matthew I. Frank Emµcode: Masking hard faults in complex functional units. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Gabriela Jacques-Silva, Bugra Gedik, Henrique Andrade, Kun-Lung Wu Language level checkpointing support for stream processing applications. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Hari Kannan, Michael Dalton, Christos Kozyrakis Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Luiz Eduardo Buzato, Gustavo M. D. Vieira, Willy Zwaenepoel Dynamic content web applications: Crash, failover, and recovery analysis. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Luigi Romano Fast Abstracts. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Yu-Sung Wu, Saurabh Bagchi, Navjot Singh 0001, Ratsameetip Wita Spam detection in voice-over-IP calls through semi-supervised clustering. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Miao Jiang 0002, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward Automatic fault detection and diagnosis in complex software systems by information-theoretic monitoring. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Saman A. Zonouz, Himanshu Khurana, William H. Sanders, Timothy M. Yardley RRE: A game-theoretic intrusion Response and Recovery Engine. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Henrique Madeira, István Majzik From assessment to standardised benchmarking: Will it happen? What could we do about it? Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Homburg, Andrew S. Tanenbaum Fault isolation for device drivers. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Paulo Sousa 0001, Alysson Neves Bessani, Wagner Saback Dantas, Fabio Souto, Miguel Correia 0001, Nuno Ferreira Neves Intrusion-tolerant self-healing devices for critical infrastructure protection. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Tao Xie 0001, Nikolai Tillmann, Jonathan de Halleux, Wolfram Schulte Fitness-guided path exploration in dynamic symbolic execution. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Kaustubh R. Joshi, Guy Bunker, Farnam Jahanian, Aad P. A. van Moorsel, Joseph Weinman Dependability in the cloud: Challenges and opportunities. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Marco Beccuti, Giuliana Franceschinis, Daniele Codetta Raiteri, Serge Haddad Parametric NdRFT for the derivation of optimal repair strategies. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jacques Bus Future prospects of research on security and dependability. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Paul Dan Marinescu, George Candea LFI: A practical and general library-level fault injector. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Peter Tummeltshammer, Andreas Steininger Power supply induced common cause faults-experimental assessment of potential countermeasures. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Tod Courtney, Shravan Gaonkar, Ken Keefe, Eric Rozier, William H. Sanders Möbius 2.3: An extensible tool for dependability, security, and performance evaluation of large and complex system models. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Duc T. Ha, Guanhua Yan, Stephan J. Eidenbenz, Hung Q. Ngo 0001 On the effectiveness of structural detection and defense against P2P-based botnets. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Robin Berthier, Jorge Arjona, Michel Cukier Analyzing the process of installing rogue software. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Peter Kemper Report generation for simulation traces with Traviando. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 2425 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license