Making Overlay Networks more Robust to Massive Failures. [Citation Graph (, )][DBLP]
Improving Data Transmission for Collaborative Work Using Forwarding Nodes in Mobile Ad Hoc Environments. [Citation Graph (, )][DBLP]
An Attack Injection Approach to Evaluate the Robustness of Ad Hoc Networks. [Citation Graph (, )][DBLP]
Trustworthy Evaluation of a Safe Driver Machine Interface through Software-Implemented Fault Injection. [Citation Graph (, )][DBLP]
A Regular Expression Matching Algorithm Using Transition Merging. [Citation Graph (, )][DBLP]
A Novel Process Migration Method for MPI Applications. [Citation Graph (, )][DBLP]
Dependability Evaluation for Internet-Based Remote Systems. [Citation Graph (, )][DBLP]
Holography: A Hardware Virtualization Tool for Malware Analysis. [Citation Graph (, )][DBLP]
Delayed Processing Technique in Critical Sections for Real-Time Linux. [Citation Graph (, )][DBLP]
A New Multiple-Round DOR Routing for 2D Network-on-Chip Meshes. [Citation Graph (, )][DBLP]
Increasing Reliability for IEEE 802.16j Mobile Multi-hop Relay Networks Planning. [Citation Graph (, )][DBLP]
Dependability Benchmarking Using Software Faults: How to Create Practical and Representative Faultloads. [Citation Graph (, )][DBLP]
Zapmem: A Framework for Testing the Effect of Memory Corruption Errors on Operating System Kernel Reliability. [Citation Graph (, )][DBLP]
Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services. [Citation Graph (, )][DBLP]