Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 22 matches
- 2013
- João Alves, António Casimiro, Luis Marques:
Middleware Support for Adaptive Real-Time Applications in Wireless Sensor Networks. EWDC 2013: 16-23 - Pierre André, Nicolas Rivière, Hélène Waeselynck:
GraphSeq Revisited: More Efficient Search for Patterns in Mobility Traces. EWDC 2013: 88-95 - Roberto Baldoni, Silvia Bonomi, Giuseppe Antonio Di Luna, Luca Montanari, Mara Sorella:
Understanding (Mis)Information Spreading for Improving Corporate Network Trustworthiness. EWDC 2013: 165-172 - Ricardo Barbosa, Nuno Silva, João Mário Cunha:
csXception®: First Steps to Provide Fault Injection for the Development of Safe Systems in Automotive Industry. EWDC 2013: 202-205 - Rahma Bouaziz:
GRIMACE: GeneRIc MetAmodel for Domain Component modElling. EWDC 2013: 181-184 - Gabriella Carrozza, Vittorio Manetti, Antonio Marotta, Roberto Canonico, Stefano Avallone:
Exploiting SDN Approach to Tackle Cloud Computing Security Issues in the ATC Scenario. EWDC 2013: 54-60 - Andreas Dittrich, Rafael Rezende:
Model-Driven Evaluation of User-Perceived Service Availability. EWDC 2013: 39-53 - Jaime Espinosa, David de Andrés, Juan-Carlos Ruiz-Garcia, Pedro J. Gil:
The Challenge of Detection and Diagnosis of Fugacious Hardware Faults in VLSI Designs. EWDC 2013: 76-87 - Alessia Garofalo, Cesario Di Sarno, Luigi Coppolino, Salvatore D'Antonio:
A GPS Spoofing Resilient WAMS for Smart Grid. EWDC 2013: 134-147 - Alessia Garofalo, Cesario Di Sarno, Valerio Formicola:
Enhancing Intrusion Detection in Wireless Sensor Networks through Decision Trees. EWDC 2013: 1-15 - Joaquin Gracia-Moran, Juan-Carlos Ruiz-Garcia, Juan-Carlos Baraza-Calvo, David de Andrés, Pedro J. Gil:
Improving the Transfer of Safety and Security Competences to Industry: The RISKY Approach. EWDC 2013: 185-189 - Wei Hu, Dongyao Ji:
Formal Analysis of Dynamic Domain Establishment Protocol in Cloud Logging Service. EWDC 2013: 24-38 - Mafijul Md. Islam, Behrooz Sangchoolie, Fatemeh Ayatolahi, Daniel Skarin, Jonny Vinter, Fredrik Törner, Andreas Käck, Mattias Nyberg, Emília Villani, Johan Haraldsson, Patrik Isaksson, Johan Karlsson:
Towards Benchmarking of Functional Safety in the Automotive Industry. EWDC 2013: 111-125 - Gonçalo de Jesus, António Casimiro, Anabela Oliveira:
Towards Dependable Measurements in Coastal Sensors Networks. EWDC 2013: 190-193 - João Lopes, Susana Sargento, André Zúquete:
A Dependable Alternative to the Spanning Tree Protocol. EWDC 2013: 148-164 - Miquel Martínez, Jesus Friginal, David de Andrés, Juan-Carlos Ruiz-Garcia:
Open Challenges in the Resilience Evaluation of Ad Hoc Networks. EWDC 2013: 194-197 - Manuel Mendonça, Nuno Ferreira Neves:
Intercept: Profiling Windows Network Device Drivers. EWDC 2013: 61-75 - Roberto Natella, Fabio Scippacercola:
Issues and Ongoing Work on State-Driven Workload Generation for Distributed Systems. EWDC 2013: 96-110 - Ludovic Pintard, Jean-Charles Fabre, Karama Kanoun, Michel Leeman, Matthieu Roy:
Fault Injection in the Automotive Standard ISO 26262: An Initial Approach. EWDC 2013: 126-133 - Luis J. Saiz-Adalid, Pedro J. Gil, Joaquin Gracia-Moran, Juan-Carlos Baraza-Calvo:
Using Interleaving to Avoid the Effects of Multiple Adjacent Faults in On-Chip Interconnection Lines. EWDC 2013: 198-201 - João Soares, João Lourenço, Nuno M. Preguiça:
Software Component Replication for Improved Fault-Tolerance: Can Multicore Processors Make It Work? EWDC 2013: 173-180 - Marco Vieira, João Carlos Cunha:
Dependable Computing - 14th European Workshop, EWDC 2013, Coimbra, Portugal, May 15-16, 2013. Proceedings. Lecture Notes in Computer Science 7869, Springer 2013, ISBN 978-3-642-38788-3 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-21 13:42 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint