Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 28 matches
- 2017
- Ambrose Andongabo, Ilir Gashi:
vepRisk - A Web Based Analysis Tool for Public Security Data. EDCC 2017: 135-138 - Leonardo Aniello, Roberto Baldoni, Edoardo Gaetani, Federico Lombardi, Andrea Margheri, Vladimiro Sassone:
A Prototype Evaluation of a Tamper-Resistant High Performance Blockchain-Based Transaction Log for a Distributed Database. EDCC 2017: 151-154 - Manuel Barbosa, Sonia Ben Mokhtar, Pascal Felber, Francisco Maia, Miguel Matos, Rui Oliveira, Etienne Rivière, Valerio Schiavoni, Spyros Voulgaris:
SAFETHINGS: Data Security by Design in the IoT. EDCC 2017: 117-120 - Kevin Bock, Sydnee Shannon, Yazdan Movahedi, Michel Cukier:
Application of Routine Activity Theory to Cyber Intrusion Location and Time. EDCC 2017: 139-146 - Christian Cachin:
Blockchains and Consensus Protocols: Snake Oil Warning. EDCC 2017: 1-2 - Frederico Cerveira, Raul Barbosa, Marta Mercier, Henrique Madeira:
On the Emulation of Vulnerabilities through Software Fault Injection. EDCC 2017: 73-78 - Andreas Eckel:
It is a Disruptive World with Exponential Development: Expected Trends in Embedded Systems, with a Special Focus on the Automotive Industry and Its Likely Effects on Industry and Society. EDCC 2017: 3-4 - Michael Eischer, Tobias Distler:
Scalable Byzantine Fault Tolerance on Heterogeneous Servers. EDCC 2017: 34-41 - Ivano Alessandro Elia, Nuno Antunes, Nuno Laranjeiro, Marco Vieira:
An Analysis of OpenStack Vulnerabilities. EDCC 2017: 129-134 - William Excoffon, Jean-Charles Fabre, Michaël Lauer:
Analysis of Adaptive Fault Tolerance for Resilient Computing. EDCC 2017: 50-57 - Omar Tawffeeq Saleem Jaradat, Iain Bate:
Using Safety Contracts to Guide the Maintenance of Systems and Safety Cases. EDCC 2017: 95-102 - Omar Jaradat, Irfan Sljivo, Ibrahim Habli, Richard Hawkins:
Challenges of Safety Assurance for Industry 4.0. EDCC 2017: 103-106 - Georg Macher, Markus Bachinger, Michael Stolz:
Embedded Multi-core System for Design of Next Generation Powertrain Control Units. EDCC 2017: 66-72 - Francisco Maia:
Data Management and Privacy in a World of Data Wealth. EDCC 2017: 6-7 - Luke J. W. Martin, Alexander B. Romanovsky:
An Approach for Designing Knowledge-Based Systems for High-Integrity Applications. EDCC 2017: 107-110 - Yazdan Movahedi, Michel Cukier, Ambrose Andongabo, Ilir Gashi:
Cluster-Based Vulnerability Assessment Applied to Operating Systems. EDCC 2017: 18-25 - Lars Nagel, Tim Süß:
Computing the Probability for Data Loss in Two-Dimensional Parity RAIDs. EDCC 2017: 58-65 - Roberto Natella:
Advancing Fault Injection and Dependability Evaluation in the Software-Driven Telecom Industry. EDCC 2017: 5 - Paulo Jorge Costa Nunes, Iberia Medeiros, José Fonseca, Nuno Ferreira Neves, Miguel Correia, Marco Vieira:
On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study. EDCC 2017: 121-128 - Jonathan Roux, Eric Alata, Guillaume Auriol, Vincent Nicomette, Mohamed Kaâniche:
Toward an Intrusion Detection Approach for IoT Based on Radio Communications Profiling. EDCC 2017: 147-150 - Hans-Peter Schwefel, Walter Schaffer, Robert Damboeck:
ICT and Data-Management for Dependability of Electricity Distribution Grids: Opportunities and Barriers. EDCC 2017: 8-9 - Kazuto Shigihara, Shinya Honda, Hiroaki Takada:
Test Program Generator for AUTOSAR OS. EDCC 2017: 79-86 - Hebert de Oliveira Silva, Tânia Basso, Regina Lúcia de Oliveira Moraes:
Privacy and Data Mining: Evaluating the Impact of Data Anonymization on Classification Algorithms. EDCC 2017: 111-116 - Ryan Slechta, Laura Monroe, Nathan DeBardeleben, Qiang Guan, Joanne Wendelberger, Sarah Michalak:
Resilience Analysis of Top K Selection Algorithms. EDCC 2017: 42-49 - Ilya Tuzov, Juan Carlos Ruiz, David de Andrés:
Accurately Simulating the Effects of Faults in VHDL Models Described at the Implementation-Level. EDCC 2017: 10-17 - Vidhya Tekken Valapil, Sandeep S. Kulkarni:
Preserving Stabilization While Practically Bounding State Space. EDCC 2017: 26-33 - Ghazal Zamani, Olivia Das:
Impact of a Fault Management Architecture on the Performance of a Component-Based System. EDCC 2017: 87-94 - 13th European Dependable Computing Conference, EDCC 2017, Geneva, Switzerland, September 4-8, 2017. IEEE Computer Society 2017, ISBN 978-1-5386-0602-5 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-04-24 01:50 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint