![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 46 matches
- 2006
- Takao Ando, Hiroyuki Okamura
, Tadashi Dohi
:
Estimating Markov Modulated Software Reliability Models via EM Algorithm. DASC 2006: 111-118 - Li Bai:
A Reliable (k, n) Image Secret Sharing Scheme. DASC 2006: 31-36 - Anil Bazaz, James D. Arthur, Joseph G. Tront:
Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. DASC 2006: 95-102 - Gustavo A. Chaparro-Baquero
, Nayda G. Santiago, Wilson Rivera
, J. Fernando Vega-Riveros:
Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling. DASC 2006: 119-128 - Jong Youl Choi, Philippe Golle, Markus Jakobsson:
Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. DASC 2006: 37-44 - Yuan-Shun Dai, Michael G. Hinchey
, Manish Madhusoodan, James L. Rash, Xukai Zou:
A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. DASC 2006: 3-10 - Yuan-Shun Dai, Michael G. Hinchey, Mingrui Qi, Xukai Zou:
Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. DASC 2006: 227-234 - Tadashi Dohi
, Tatsuya Ozaki, Naoto Kaio
:
Optimal Checkpoint Placement with Equality Constraints. DASC 2006: 77-84 - Xinwen Fu, Wei Yu
, Dan Cheng, Xuejun Tan, Kevin Streff, Steve Graham:
On Recognizing Virtual Honeypots and Countermeasures. DASC 2006: 211-218 - Na Guo, Laurence Tianruo Yang, Man Lin, John P. Quinn:
A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization. DASC 2006: 45-50 - Songqiao Han, Shensheng Zhang, Yong Zhang:
Self-Adaptive Pervasive Computing Application Based on Code Mobility. DASC 2006: 145-154 - Emmanuel Hooper:
Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. DASC 2006: 235-244 - Weiwei Jing, Liusheng Huang, Yonglong Luo, Weijiang Xu, Yifei Yao:
An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. DASC 2006: 315-324 - Hui Kang, Xiaolin Li, Patrick J. Moran:
Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing. DASC 2006: 258-268 - Sining Liu, Brian King, Wei Wang:
A CRT-RSA Algorithm Secure against Hardware Fault Attacks. DASC 2006: 51-60 - Junda Liu, Lin Ning, Yibo Xue, Dongsheng Wang:
PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. DASC 2006: 308-314 - Zhaoyu Liu, Dichao Peng:
A Security-Supportive Middleware Architecture for Pervasive Computing. DASC 2006: 137-144 - Zhaoyu Liu, Roopesh Uppala:
A Dynamic Countermeasure Method for Large-Scale Network Attacks. DASC 2006: 163-170 - Ruiping Ma, Liudong Xing
, Howard E. Michel:
Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. DASC 2006: 85-94 - Tetsuya Masuishi, Koichi Shibata, Yasuyuki Oki, Kinji Mori:
Autonomous Decentralized Load Tracking Techniques and Evaluation. DASC 2006: 69-76 - Philip K. McKinley, Farshad A. Samimi, Jonathan K. Shapiro, Chiping Tang:
Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. DASC 2006: 341-348 - Mehmet A. Orgun
, Ji Ma, Chuchang Liu, Guido Governatori
:
Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. DASC 2006: 325-332 - T. Paul Parker, Shouhuai Xu:
Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. DASC 2006: 155-162 - Ahmad Patooghy
, Seyed Ghassem Miremadi, A. Javadtalab, Mahdi Fazeli
, Navid Farazmand:
A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection. DASC 2006: 171-176 - Joaquín Peña
, Michael G. Hinchey, Roy Sterritt, Antonio Ruiz Cortés, Manuel Resinas:
A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems. DASC 2006: 19-30 - Xuehai Peng, Chuang Lin:
Architecture of Trustworthy Networks. DASC 2006: 269-276 - Andrew Prunicki, Tzilla Elrad:
Aclamate: An AOSD Security Framework for Access Control. DASC 2006: 293-300 - Karin Sallhammar, Bjarne E. Helvik
, Svein J. Knapskog:
A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. DASC 2006: 61-68 - Akhilesh Shrestha, Liudong Xing
, Hong Liu:
Infrastructure Communication Reliability of Wireless Sensor Networks. DASC 2006: 250-257 - Thanikesavan Sivanthi, Ulrich Killat:
A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling. DASC 2006: 187-194
skipping 16 more matches
loading more results
failed to load more results, please try again later
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-23 21:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint