Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 41 matches
- 1998
- Manuel Aparicio IV, Peter Herman, Wendy Stephens, Anuj K. Jain, Munindar P. Singh:
Agent Information Contracts within Virtual Private Networks. HASE 1998: 304-311 - Kamel Barkaoui, Jean-François Pradat-Peyre:
Verification in Concurrent Programming with Petri Nets Structural Techniques. HASE 1998: 124-133 - Mario Dal Cin:
Checking Modification Tolerance. HASE 1998: 4-12 - David Coppit, Kevin J. Sullivan:
Formal Specification in Collaborative Design of Critical Software Tools. HASE 1998: 13-20 - John M. Covan, J. Arlin Cooper:
Predictable Safety in the Control of High Consequence Systems. HASE 1998: 200-204 - Yi Deng, Jiacun Wang:
Integrated Architectural Modeling and Analysis for High-Assurance Command and Control System Design. HASE 1998: 270-278 - Diego Del Gobbo, Marcello R. Napolitano, John Callahan, Bojan Cukic:
Experience in Developing System Requirements Specification for a Sensor Failure Detection and Identification Scheme. HASE 1998: 209-213 - Swapna S. Gokhale, Kishor S. Trivedi:
Log-Logistic Software Reliability Growth Model. HASE 1998: 34-41 - Fabrizio Grandoni, Andrea Bondavalli, Silvano Chiaradonna:
A New Heuristic to Discriminate between Transient and Intermittent Faults. HASE 1998: 224-231 - Hideo Hanamura, Kinji Mori:
Assurance of Transactions in Allied Heterogeneous Systems by Autonomous Decentralized System Techniques. HASE 1998: 288-295 - Carol L. Hoover, Pradeep K. Khosla:
Analytical Partition of Software Components for Evolvable and Reliable MEMS Design Tools. HASE 1998: 188-199 - William E. Howden:
Good Enough versus High Assurance Software Testing and Evaluation Methods. HASE 1998: 166-177 - Seung H. Hwang, Gwan S. Choi:
On-Chip Cache Memory Resilience. HASE 1998: 240-247 - Ravishankar K. Iyer, Zbigniew Kalbarczyk, Keith Whisnant, Saurabh Bagchi:
A Flexible Software Architecture for High Availability Computing. HASE 1998: 42-49 - Gary Johnson, John Calvert, Kelly J. Hayhurst, John Janeri, Herbert Hecht:
System Requirements and Analysis Issues for High Assurance Systems. HASE 1998: 60- - Taghi M. Khoshgoftaar, Edward B. Allen, Archana Naik, Wendell D. Jones, John P. Hudepohl:
Using Classification Trees for Software Quality Models: Lessons Learned. HASE 1998: 82-89 - Rajiv Khosla:
Human-Centered Virtual Machine of Problem Solving Agents, Software Agents, Intelligent Agents and Objects. HASE 1998: 312- - K. H. Kim:
ROAFTS: A Middleware Architecture for Real-Time Object-Oriented Adaptive Fault Tolerance Support. HASE 1998: 50-63 - David Chenho Kung, Pei Hsia, Yasufumi Toyoshima, Cris Chen, Jerry Gao:
Object-Oriented Software Testing: Some Research and Development. HASE 1998: 158-165 - Tei-Wei Kuo, Yuan-Ting Kao, LihChyun Shu:
A Two-Version Approach for Real-Time Concurrency Control and Recovery. HASE 1998: 279- - Ronjeet Lal, Gwan S. Choi:
Error and Failure Analysis of a UNIX Server. HASE 1998: 232-239 - Yu Lei, Kuo-Chung Tai:
In-Parameter-Order: A Test Generation Strategy for Pairwise Testing. HASE 1998: 254-261 - Yashwant K. Malaiya, Jason Denton:
Estimating the Number of Residual Defects. HASE 1998: 98-107 - Ragavan Manian, Joanne Bechta Dugan, David Coppit, Kevin J. Sullivan:
Combining Various Solution Techniques for Dynamic Fault Tree Analysis of Computer Systems. HASE 1998: 21-28 - Anneliese von Mayrhauser, Andre Bai, Tom Chen, Charles Anderson, Amjad Hajjar:
Fast Antirandom (FAR) Test Generation. HASE 1998: 262-269 - Duane E. Olawsky, Charles Payne, Thomas Sundquist, David Apostal, Todd Fine:
Using Composition to Design Secure, Fault-Tolerant Systems. HASE 1998: 29-33 - Shashi Phoha, Eugene Eberbach, Eileen Peluso, Atilla P. Kiraly:
Coordination of Engineering Design Agents for High Assurance in Complex Dynamic System Design. HASE 1998: 296-303 - Michele Pizza, Lorenzo Strigini, Andrea Bondavalli, Felicita Di Giandomenico:
Optimal Discrimination between Transient and Permanent Faults. HASE 1998: 214-223 - Calton Pu, Crispin Cowan:
System Survivability through Security Bug Tolerance. HASE 1998: 108 - Donald F. Schenker, Taghi M. Khoshgoftaar:
The Application of Fuzzy Enhanced Case-Based Reasoning for Identifying Fault-Prone Modules. HASE 1998: 90-97
skipping 11 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-26 13:45 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint