Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 59 matches
- 2008
- Robert K. Abercrombie, Frederick T. Sheldon, Ali Mili:
Synopsis of Evaluating Security Controls Based on Key Performance Indicators and Stakeholder Mission Value. HASE 2008: 479-482 - Sheikh Iqbal Ahamed, Md. Endadul Hoque, Farzana Rahman, Mohammad Zulkernine:
Towards Secure Trust Bootstrapping in Pervasive Computing Environment. HASE 2008: 89-96 - Kun Bai, Peng Liu:
A Fine-Grained Damage Management Scheme in a Self-Healing PostgreSQL System. HASE 2008: 373-382 - Raul Barbosa, Johan Karlsson:
On the Integrity of Lightweight Checkpoints. HASE 2008: 125-134 - Hakim Belhaouari, Frédéric Peschanski:
Automated Generation of Test Cases from Contract-Oriented Specifications: A CSP-Based Approach. HASE 2008: 219-228 - Robin Berthier, Michel Cukier:
The Deployment of a Darknet on an Organization-Wide Network: An Empirical Analysis. HASE 2008: 59-68 - Robin Berthier, Dave Kormann, Michel Cukier, Matti A. Hiltunen, Gregg Vesonder, Daniel Sheleheda:
On the Comparison of Network Attack Datasets: An Empirical Analysis. HASE 2008: 39-48 - Debmalya Biswas, Thomas Gazagnaire, Blaise Genest:
Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination. HASE 2008: 97-106 - Patrick Henrique da S. Brito, Rogério de Lemos, Cecília M. F. Rubira:
Verification of Exception Control Flows and Handlers Based on Architectural Scenarios. HASE 2008: 177-186 - Zizhong Chen, Jack J. Dongarra:
A Scalable Checkpoint Encoding Algorithm for Diskless Checkpointing. HASE 2008: 71-79 - Danielle Chrun, Michel Cukier, Gerry Sneeringer:
On the Use of Security Metrics Based on Intrusion Prevention System Event Data: An Empirical Analysis. HASE 2008: 49-58 - Wang Chu, Depei Qian:
Architecture Centric System Design for Supporting Reconfiguration of Service Oriented Systems. HASE 2008: 414-423 - Reinaldo de Barros Correia, Luci Pirmez, Luiz F. Rust da Costa Carmo:
Evaluating Security Risks following a Compliance Perspective. HASE 2008: 27-36 - Kai Du, Huaimin Wang, Shuqiang Yang, Yingwen Chen, Yan Wen:
Reliability Design for Large Scale Storage Systems. HASE 2008: 463-466 - Jonas Elmqvist, Simin Nadjm-Tehrani:
Formal Support for Quantitative Analysis of Residual Risks in Safety-Critical Systems. HASE 2008: 154-164 - Mahdi Fazeli, Seyed Nematollah Ahmadian, Seyed Ghassem Miremadi:
A Low Energy Soft Error-Tolerant Register File Architecture for Embedded Processors. HASE 2008: 109-116 - Julien Forget, Frédéric Boniol, David Lesens, Claire Pagetti:
A Multi-Periodic Synchronous Data-Flow Language. HASE 2008: 251-260 - Jicheng Fu, Farokh B. Bastani, I-Ling Yen:
Automated Discovery of Loop Invariants for High-Assurance Programs Synthesized Using AI Planning Techniques. HASE 2008: 333-342 - Lars Grunske, Jun Han:
A Comparative Study into Architecture-Based Safety Evaluation Methodologies Using AADL's Error Annex and Failure Propagation Models. HASE 2008: 283-292 - Jifeng He:
Transaction Calculus. HASE 2008: 4 - Éric Jaeger, Thérèse Hardin:
A Few Remarks about Formal Development of Secure Systems. HASE 2008: 165-174 - Susmit Jha, Sumit Kumar Jha:
Randomization Based Probabilistic Approach to Detect Trojan Circuits. HASE 2008: 117-124 - Sumit Kumar Jha, Susmit Jha:
Random Relaxation Abstractions for Bounded Reachability Analysis of Linear Hybrid Automata: Distributed Randomized Abstractions in Model Checking. HASE 2008: 147-153 - Miao Jiang, Mohammad Ahmad Munawar, Thomas Reidemeister, Paul A. S. Ward:
Detection and Diagnosis of Recurrent Faults in Software Systems by Invariant Analysis. HASE 2008: 323-332 - Hun Jung, Miao Ju, Hao Che, Zhijun Wang:
A Fast Performance Analysis Tool for Multicore, Multithreaded Communication Processors. HASE 2008: 135-144 - Dae-Kyoo Kim:
Software Quality Improvement via Pattern-Based Model Refactoring. HASE 2008: 293-302 - Eryk Kylikowski, Riccardo Scandariato, Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474 - Qin Li, Jinpeng Huai, Jianxin Li, Tianyu Wo, Minxiong Wen:
HyperMIP: Hypervisor Controlled Mobile IP for Virtual Machine Live Migration across Networks. HASE 2008: 80-88 - Qin Li, Huibiao Zhu, Jifeng He:
Towards the Service Composition Through Buses. HASE 2008: 441-444 - Khalid Mahmood, Satoshi Niki, Xiaodong Lu, Kinji Mori:
A Novel Ripple-Based Context-Cognizant Service Discovery Method in Autonomous Decentralized Community System. HASE 2008: 405-413
skipping 29 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-09 02:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint