Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 96 matches
- 2005
- Marcos Kawazoe Aguilera, Ramaprabhu Janakiraman, Lihao Xu:
Using Erasure Codes Efficiently for Storage in a Distributed System. DSN 2005: 336-345 - Joakim Aidemark, Peter Folkesson, Johan Karlsson:
A Framework for Node-Level Fault Tolerance in Distributed Real-Time Systems. DSN 2005: 656-665 - Claudio Basile, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Neutralization of Errors and Attacks in Wireless Ad Hoc Networks. DSN 2005: 518-527 - Saïda Benlarbi:
Workshop on Assurance of Networking Systems Dependability Service Level Agreements - Workshop Abstract. DSN 2005: 830 - Paolo Bernardi, Letícia Maria Veiras Bolzani, Maurizio Rebaudengo, Matteo Sonza Reorda, Fabian Vargas, Massimo Violante:
On-Line Detection of Control-Flow Errors in SoCs by Means of an Infrastructure IP Core. DSN 2005: 50-58 - David Bernick, Bill Bruckert, Paul Del Vigna, David García, Robert Jardine, Jim Klecka, Jim Smullen:
NonStop® Advanced Architecture. DSN 2005: 12-21 - Sabine M. Böhm:
H-RAFT - Heuristic Reachability Analysis for Fault Tolerance Protocols Modelled in SDL. DSN 2005: 466-475 - Henrik C. Bohnenkamp, Johan Gorter, Jarno Guidi, Joost-Pieter Katoen:
Are You Still There? - A Lightweight Algorithm to Monitor Node Presence in Self-Configuring Networks. DSN 2005: 704-709 - P. Oscar Boykin, Vwani P. Roychowdhury:
Reversible Fault-Tolerant Logic. DSN 2005: 444-453 - George Candea, David L. Oppenheimer:
Workshop on Hot Topics in System Depend - Workshop Abstract. DSN 2005: 826-827 - Guilin Chen, Mahmut T. Kandemir, Mustafa Karaköy:
A Data-Centric Approach to Checksum Reuse for Array-Intensive Applications. DSN 2005: 316-325 - Shuo Chen, Jun Xu, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Defeating Memory Corruption Attacks via Pointer Taintedness Detection. DSN 2005: 378-387 - Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu J. Upadhyaya:
Towards a Theory of Insider Threat Assessment. DSN 2005: 108-117 - Lucia Cloth, Joost-Pieter Katoen, Maneesh Khattri, Reza Pulungan:
Model Checking Markov Reward Models with Impulse Rewards. DSN 2005: 722-731 - Rebecca L. Collins, James S. Plank:
Assessing the Performance of Erasure Codes in the Wide-Area. DSN 2005: 182-187 - Cristian Constantinescu:
Neutron SER Characterization of Microprocessors. DSN 2005: 754-759 - Cristian Constantinescu, Karama Kanoun, Henrique Madeira, Brendan Murphy, Ira Pramanick, Aaron B. Brown:
Dependability Benchmarking of Computing Systems - Panel Statement. DSN 2005: 400 - Xavier Défago, Péter Urbán, Naohiro Hayashibara, Takuya Katayama:
Definition and Specification of Accrual Failure Detectors. DSN 2005: 206-215 - Salem Derisavi, Peter Kemper, William H. Sanders:
Lumping Matrix Diagram Representations of Markov Models. DSN 2005: 742-751 - Vadim Drabkin, Roy Friedman, Marc Segal:
Efficient Byzantine Broadcast in Wireless Ad-Hoc Networks. DSN 2005: 160-169 - Partha Dutta, Rachid Guerraoui, Leslie Lamport:
How Fast Can Eventual Synchrony Lead to Consensus?. DSN 2005: 22-27 - Sherif M. ElRakabawy, Christoph Lindemann, Mary K. Vernon:
Improving TCP Performance for Multihop Wireless Networks. DSN 2005: 684-693 - Lorenzo Falai, Andrea Bondavalli:
Experimental Evaluation of the QoS of Failure Detectors on Wide Area Network. DSN 2005: 624-633 - Jing Fang, Mahesh Sivakumar, Arun K. Somani, Krishna M. Sivalingam:
On Partial Protection in Groomed Optical WDM Mesh Networks. DSN 2005: 228-237 - Eitan Farchi, Gabriel Kliot, Yoel Krasny, Alex Krits, Roman Vitenberg:
Effective Testing and Debugging Techniques for a Group Communication System. DSN 2005: 80-85 - Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford:
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. DSN 2005: 508-517 - Archana Ganapathi, David A. Patterson:
Crash Data Collection: A Windows Case Study. DSN 2005: 280-285 - Sérgio Gorender, Raimundo A. Macêdo, Michel Raynal:
A Hybrid and Adaptive Model for Fault-Tolerant Distributed Computing. DSN 2005: 412-421 - Mohamed G. Gouda, Alex X. Liu:
A Model of Stateful Firewalls and Its Properties. DSN 2005: 128-137 - Marco Gribaudo, Carla-Fabiana Chiasserini, Rossano Gaeta, Michele Garetto, Daniele Manini, Matteo Sereno:
A Spatial Fluid-Based Framework to Analyze Large-Scale Wireless Sensor Networks. DSN 2005: 694-703
skipping 66 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-30 00:03 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint