Dependable Systems and Networks container_64vpoz5fx5azda553iibjuf7h4

Search inside Container


Can also search all releases.

Showing first 25 out of 1,918 results

Using likely program invariants to detect hardware errors

Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou
2008 | Dependable Systems and Networks
doi:10.1109/dsn.2008.4630072   dblp:conf/dsn/SahooLRAAZ08  

Hide & Share: Landmark-Based Similarity for Private KNN Computation

Davide Frey, Rachid Guerraoui, Anne-Marie Kermarrec, Antoine Rault, Francois Taiani, Jingjing Wang
2015 | Dependable Systems and Networks
doi:10.1109/dsn.2015.60   dblp:conf/dsn/FreyGKRTW15  

Energy Resilience Modelling for Smart Houses

Hamed Ghasemieh, Boudewijn R. Haverkort, Marijn R. Jongerden, Anne Remke
2015 | Dependable Systems and Networks
doi:10.1109/dsn.2015.31   dblp:conf/dsn/GhasemiehHJR15  

Joza: Hybrid Taint Inference for Defeating Web Application SQL Injection Attacks

Abbas Naderi-Afooshteh, Anh Nguyen-Tuong, Mandana Bagheri-Marzijarani, Jason D. Hiser, Jack W. Davidson
2015 | Dependable Systems and Networks
doi:10.1109/dsn.2015.13   dblp:conf/dsn/Naderi-Afooshteh15  
« Previous   Showing results 0 — 25 out of 1,918 results   Next »