The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for DSN with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1981-2000 (74) 2001 (57) 2002 (100) 2003 (86) 2004 (116) 2005 (103) 2006 (95) 2007 (99) 2008 (77) 2009 (80) 2010 (104) 2011 (120) 2012 (91) 2013 (113) 2014 (84) 2015 (83) 2016 (123) 2017 (99) 2018 (137) 2019 (99) 2020 (112) 2021 (113) 2022 (104) 2023 (154) 2024 (2)
Publication types (Num. hits)
article(23) inproceedings(2356) proceedings(46)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 388 occurrences of 286 keywords

Results
Found 2425 publication records. Showing 2425 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
37Robert E. Strom, Chitra Dorai Providing transactional quality of service in event stream processing middleware. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Filipe Freitas, Edgar Marques, Rodrigo Rodrigues 0001, Carlos Ribeiro, Paulo Ferreira 0001, Luís E. T. Rodrigues Verme: Worm containment in overlay networks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Ossama Hamouda, Mohamed Kaâniche, Karama Kanoun Safety modeling and evaluation of Automated Highway Systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Naga Durga Prasad Avirneni, Viswanathan Subramanian, Arun K. Somani Low overhead Soft Error Mitigation techniques for high-performance and aggressive systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Miroslaw Malek, Felix Salfner, Kishor S. Trivedi Workshop on proactive failure avoidance, recovery and maintenance (PFARM). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Ardalan Kangarlou, Patrick Eugster, Dongyan Xu VNsnap: Taking snapshots of virtual networked environments with minimal downtime. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Chengmo Yang, Alex Orailoglu Processor reliability enhancement through compiler-directed register file peak temperature reduction. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Avik Sinha, Amit M. Paradkar, Palani Kumanan, Branimir Boguraev A linguistic analysis engine for natural language use case description and its application to dependability analysis in industrial use cases. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Saurabh Bagchi, Miguel Correia 0001, Partha P. Pal 3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Maohua Lu, Tzi-cker Chiueh Fast memory state synchronization for virtualization-based fault tolerance. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Fedor V. Yarochkin, Ofir Arkin, Meder Kydyraliev, Shih-Yao Dai, Yennun Huang, Sy-Yen Kuo Xprobe2++: Low volume remote network information gathering tool. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Marco Vieira Student Forum. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Eli Courtwright, Chuan Yue, Haining Wang Efficient resource management on template-based web servers. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Christian Cachin, Idit Keidar, Alexander Shraer Fail-Aware Untrusted Storage. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Chongkyung Kil, Emre Can Sezer, Ahmed M. Azab, Peng Ning, Xiaolan Zhang 0001 Remote attestation to dynamic system properties: Towards providing complete system integrity evidence. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jon G. Elerath A simple equation for estimating reliability of an N+1 redundant array of independent disks (RAID). Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Justin Ray, Philip Koopman Data management mechanisms for embedded system gateways. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Ying Zhang 0022, Zheng Zhang 0009, Zhuoqing Morley Mao, Y. Charlie Hu HC-BGP: A light-weight and flexible scheme for securing prefix ownership. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Nicolas Geoffray, Gaël Thomas 0001, Gilles Muller, Pierre Parrend, Stéphane Frénot, Bertil Folliot I-JVM: a Java Virtual Machine for component isolation in OSGi. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Giovanna Dondossola, Fabrizio Garrone, Judit Szanto, Geert Deconinck, T. Loix, Hakem Beitollahi ICT resilience of power control systems: experimental results from the CRUTIAL testbeds. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Yongning Tang, Ehab Al-Shaer Sharing end-user negative symptoms for improving overlay network dependability. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Jing Jin, Xinyuan Wang On the effectiveness of low latency anonymous network in the presence of timing attack. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Mahdi Fazeli, Alireza Namazi, Seyed Ghassem Miremadi An energy efficient circuit level technique to protect register file from MBUs and SETs in embedded processors. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Eric Rozier, Wendy Belluomini, Veera Deenadhayalan, Jim Hafner, K. K. Rao, Pin Zhou Evaluating the impact of Undetected Disk Errors in RAID systems. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Roberto Perdisci, Manos Antonakakis, Xiapu Luo, Wenke Lee WSEC DNS: Protecting recursive DNS resolvers from poisoning attacks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Hemant Sengar Overloading vulnerability of VoIP networks. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Nikhil Pandit, Zbigniew Kalbarczyk, Ravishankar K. Iyer Effectiveness of machine checks for error diagnostics. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Xiang Yin 0001, John C. Knight, Westley Weimer Exploiting refactoring in formal verification. Search on Bibsonomy DSN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37 The 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2008, June 24-27, 2008, Anchorage, Alaska, USA, Proceedings Search on Bibsonomy DSN The full citation details ... 2008 DBLP  BibTeX  RDF
37Paolo Romano 0002, Francesco Quaglia Integration and evaluation of Multi-Instance-Precommit schemes within postgreSQL. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Hisashige Ando, Ryuji Kan, Yoshiharu Tosaka, Keiji Takahisa, Kichiji Hatanaka Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Kimberly Keeton Message from the PDS program chair. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane Byzantine replication under attack. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ataul Bari, Quazi Rahman, Arunita Jaekel, Subir Bandyopadhyay Traffic grooming in WDM mesh networks with guaranteed survivability. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37José Fonseca 0002, Marco Vieira Mapping software faults with web security vulnerabilities. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal 0001, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift Analyzing the effects of disk-pointer corruption. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Elisabeth A. Nguyen, William S. Greenwell, Myron Hecht Using an assurance case to support independent assessment of the transition to a new GPS ground control system. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Zhiqiang Lin, Xiangyu Zhang 0001, Dongyan Xu Convicting exploitable software vulnerabilities: An efficient input provenance based approach. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ningfang Mi, Giuliano Casale, Evgenia Smirni Scheduling for performance and availability in systems with temporal dependent workloads. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Vimal K. Reddy, Eric Rotenberg Coverage of a microarchitecture-level fault check regimen in a superscalar processor. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja An accurate flip-flop selection technique for reducing logic SER. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Hichem Boudali, Pepijn Crouzen, Boudewijn R. Haverkort, Matthias Kuntz, Mariëlle Stoelinga Architectural dependability evaluation with Arcade. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Jonathan A. Winter, David H. Albonesi Scheduling algorithms for unpredictably heterogeneous CMP architectures. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Kivanc M. Ozonat An information-theoretic approach to detecting performance anomalies and changes for large-scale distributed web services. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Zhuowei Li 0001, XiaoFeng Wang 0001, Zhenkai Liang, Michael K. Reiter AGIS: Towards automatic generation of infection signatures. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ningfang Mi, Alma Riska, Evgenia Smirni, Erik Riedel Enhancing data availability in disk drives through background activities. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Guillaume Belrose, Tom Turicchi, Alfons Kemper An integrated approach to resource pool management: Policies, efficiency and quality metrics. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Pradeep Ramachandran, Prabhakar Kudva, Jeffrey W. Kellington, John Schumann, Pia N. Sanda Statistical Fault Injection. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Tudor Marian, Mahesh Balakrishnan 0001, Ken Birman, Robbert van Renesse Tempest: Soft state replication in the service tier. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Allen Clement, Harry C. Li, Jeff Napper, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin BAR primer. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ann T. Tai, Kam S. Tso, William H. Sanders A recurrence-relation-based reward model for performability evaluation of embedded systems. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Xin Fu, Tao Li, José A. B. Fortes Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Huaiyu Liu, Christian Maciocco, Vijay Kesavan, Andy Lock Yen Low A smart triggering scheme to reduce service interruption during heterogeneous handovers. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Zibin Zheng, Michael R. Lyu WS-DREAM: A distributed reliability assessment Mechanism for Web Services. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Damian Nowroth, Ilia Polian, Bernd Becker 0001 A study of cognitive resilience in a JPEG compressor. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Manish Marwah, Shivakant Mishra, Christof Fetzer Enhanced server fault-tolerance for improved user experience. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie Reliability of flat XOR-based erasure codes on heterogeneous devices. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Roy Friedman, Gabriel Kliot, Chen Avin Probabilistic quorum systems in wireless ad hoc networks. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Roxana Geambasu, Andrew Birrell, John MacCormick Experiences with formal specification of fault-tolerant file systems. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Zahid Anwar, Ravinder Shankesi, Roy H. Campbell Automatic security assessment of critical cyber-infrastructures. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Kapil Singh, Abhinav Srivastava, Jonathon T. Giffin, Wenke Lee Evaluating email's feasibility for botnet command and control. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Thomas Repantis, Vana Kalogeraki Hot-spot prediction and alleviation in distributed stream processing applications. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Wei Yu 0002, Nan Zhang 0004, Xinwen Fu, Riccardo Bettati, Wei Zhao 0001 On localization attacks to Internet Threat Monitors: An information-theoretic framework. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou Using likely program invariants to detect hardware errors. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Sei Kato, Takayuki Osogami Evaluating availability under quasi-heavy-tailed repair times. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Jeffrey J. Cook, Craig B. Zilles A characterization of instruction-level error derating and its implications for error detection. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Algirdas Avizienis On representing knowledge in the dependability domain: a panel discussion. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Yoshitomo Murata, Tsutomu Inaba, Hiroyuki Takizawa, Hiroaki Kobayashi Implementation and evaluation of a distributed and cooperative load-balancing mechanism for dependable volunteer computing. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Tim Moors, Patrick Chu End-system tools for enhancing email reliability. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Niranjan Soundararajan, Aditya Yanamandra, Chrysostomos Nicopoulos, Narayanan Vijaykrishnan, Anand Sivasubramaniam, Mary Jane Irwin Analysis and solutions to issue queue process variation. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak Silent Data Corruption - Myth or reality? Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Poul E. Heegaard, Kishor S. Trivedi Survivability quantification of communication services. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang TCP covert timing channels: Design and detection. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Karthik Pattabiraman, Shuo Chen 0001, Zbigniew Kalbarczyk Workshop on compiler and architectural techniques for application reliability and security (CATARS). Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Albert Meixner, Daniel J. Sorin Detouring: Translating software to circumvent hard faults in simple cores. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Yawei Li, Zhiling Lan A fast restart mechanism for checkpoint/recovery protocols in networked environments. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Alex Hills Dependability on the last frontier. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Ricardo Fernández Pascual, José M. García 0001, Manuel E. Acacio, José Duato A fault-tolerant directory-based cache coherence protocol for CMP architectures. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Thomas Seder Automotive Enhanced Vision Systems - Issues arising from placing users in the loop. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Thirumalesh Bhat, Nachiappan Nagappan Tempest: Towards early identification of failure-prone binaries. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Anh Nguyen-Tuong, David Evans 0001, John C. Knight, Benjamin Cox, Jack W. Davidson Security through redundant data diversity. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Neeraj Suri Message from the DCCS program chair. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Kuan-Ta Chen, Jing-Kai Lou Toward an understanding of the processing delay of peer-to-peer relay nodes. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Philip Koopman, Henrique Madeira Message from the conference general chair and coordinator. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou Trace-based microarchitecture-level diagnosis of permanent hardware faults. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Chinghway Lim, Navjot Singh 0001, Shalini Yajnik A log mining approach to failure analysis of enterprise telephony systems. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Lorenzo Keller, Prasang Upadhyaya, George Candea ConfErr: A tool for assessing resilience to human configuration errors. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Nicolas Schiper, Sam Toueg A robust and lightweight stable leader election service for dynamic systems. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Afonso Araújo Neto, Marco Vieira Towards assessing the security of DBMS configurations. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Sihyung Lee, Tina Wong, Hyong S. Kim Improving dependability of network configuration through policy classification. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Nicholas Jalbert, Westley Weimer Automated duplicate detection for bug tracking systems. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37Karthik Pattabiraman, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer SymPLFIED: Symbolic program-level fault injection and error detection framework. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
37 The 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25-28 June 2007, Edinburgh, UK, Proceedings Search on Bibsonomy DSN The full citation details ... 2007 DBLP  BibTeX  RDF
37Hichem Boudali, Pepijn Crouzen, Mariëlle Stoelinga Dynamic Fault Tree Analysis Using Input/Output Interactive Markov Chains. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF compositional aggregation, Markov chain, modularity, Fault tree, Interactive process
37Andrea Bondavalli, Andrea Ceccarelli, Lorenzo Falai, Michele Vadursi Foundations of Measurement Theory Applied to the Evaluation of Dependability Attributes. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Wenjing Rao, Alex Orailoglu, Ramesh Karri Fault Tolerant Approaches to Nanoelectronic Programmable Logic Arrays. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Dimitrios Koutsonikolas, Y. Charlie Hu The Case for FEC-Based Reliable Multicast in Wireless Mesh Networks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 2425 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license