Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 70 matches
- 2008
- Yair Amir, Brian A. Coan, Jonathan Kirsch, John Lane:
Byzantine replication under attack. DSN 2008: 197-206 - Hisashige Ando, Ryuji Kan, Yoshiharu Tosaka, Keiji Takahisa, Kichiji Hatanaka:
Validation of hardware error recovery mechanisms for the SPARC64 V microprocessor. DSN 2008: 62-69 - Zahid Anwar, Ravinder Shankesi, Roy H. Campbell:
Automatic security assessment of critical cyber-infrastructures. DSN 2008: 366-375 - Jean Arlat, Cristian Constantinescu, Ravishankar K. Iyer, Michael Nicolaidis:
Second workshop on dependable and secure nanocomputing. DSN 2008: 546-547 - Algirdas Avizienis:
On representing knowledge in the dependability domain: a panel discussion. DSN 2008: 440-441 - Lakshmi N. Bairavasundaram, Meenali Rungta, Nitin Agrawal, Andrea C. Arpaci-Dusseau, Remzi H. Arpaci-Dusseau, Michael M. Swift:
Analyzing the effects of disk-pointer corruption. DSN 2008: 502-511 - Ataul Bari, Quazi Rahman, Arunita Jaekel, Subir Bandyopadhyay:
Traffic grooming in WDM mesh networks with guaranteed survivability. DSN 2008: 307-315 - Thirumalesh Bhat, Nachiappan Nagappan:
Tempest: Towards early identification of failure-prone binaries. DSN 2008: 116-121 - Andrea Bondavalli, István Majzik, Aad P. A. van Moorsel:
International Workshop on Resilience Assessment and Dependability Benchmarking (RADB 2008). DSN 2008: 542-543 - Hichem Boudali, Pepijn Crouzen, Boudewijn R. Haverkort, Matthias Kuntz, Mariëlle Stoelinga:
Architectural dependability evaluation with Arcade. DSN 2008: 512-521 - Xu Chen, Jonathon Andersen, Zhuoqing Morley Mao, Michael D. Bailey, Jose Nazario:
Towards an understanding of anti-virtualization and anti-debugging behavior in modern malware. DSN 2008: 177-186 - Kuan-Ta Chen, Jing-Kai Lou:
Toward an understanding of the processing delay of peer-to-peer relay nodes. DSN 2008: 410-419 - Ludmila Cherkasova, Kivanc M. Ozonat, Ningfang Mi, Julie Symons, Evgenia Smirni:
Anomaly? application change? or workload change? towards automated detection of application performance anomaly and change. DSN 2008: 452-461 - Allen Clement, Harry C. Li, Jeff Napper, Jean-Philippe Martin, Lorenzo Alvisi, Michael Dahlin:
BAR primer. DSN 2008: 287-296 - Cristian Constantinescu, Ishwar Parulkar, R. Harper, Sarah Michalak:
Silent Data Corruption - Myth or reality? DSN 2008: 108-109 - Jeffrey J. Cook, Craig B. Zilles:
A characterization of instruction-level error derating and its implications for error detection. DSN 2008: 482-491 - José Fonseca, Marco Vieira:
Mapping software faults with web security vulnerabilities. DSN 2008: 257-266 - Roy Friedman, Gabriel Kliot, Chen Avin:
Probabilistic quorum systems in wireless ad hoc networks. DSN 2008: 277-286 - Xin Fu, Tao Li, José A. B. Fortes:
Combined circuit and microarchitecture techniques for effective soft error robustness in SMT processors. DSN 2008: 137-146 - Shravan Gaonkar, Eric Rozier, Anthony Tong, William H. Sanders:
Scaling file systems to support petascale clusters: A dependability analysis to support informed design choices. DSN 2008: 386-391 - Roxana Geambasu, Andrew Birrell, John MacCormick:
Experiences with formal specification of fault-tolerant file systems. DSN 2008: 96-101 - Daniel Gmach, Jerry Rolia, Ludmila Cherkasova, Guillaume Belrose, Tom Turicchi, Alfons Kemper:
An integrated approach to resource pool management: Policies, efficiency and quality metrics. DSN 2008: 326-335 - Kevin M. Greenan, Ethan L. Miller, Jay J. Wylie:
Reliability of flat XOR-based erasure codes on heterogeneous devices. DSN 2008: 147-156 - Poul E. Heegaard, Kishor S. Trivedi:
Survivability quantification of communication services. DSN 2008: 462-471 - Eric L. Hill, Mikko H. Lipasti, Kewal K. Saluja:
An accurate flip-flop selection technique for reducing logic SER. DSN 2008: 128-136 - Alex Hills:
Dependability on the last frontier. DSN 2008 - Nicholas Jalbert, Westley Weimer:
Automated duplicate detection for bug tracking systems. DSN 2008: 52-61 - Sei Kato, Takayuki Osogami:
Evaluating availability under quasi-heavy-tailed repair times. DSN 2008: 442-451 - Kimberly Keeton:
Message from the PDS program chair. DSN 2008 - Lorenzo Keller, Prasang Upadhyaya, George Candea:
ConfErr: A tool for assessing resilience to human configuration errors. DSN 2008: 157-166
skipping 40 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-03 09:32 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint