The SCEAS System
Navigation Menu

Conferences in DBLP

(depcos)
2006 (conf/depcos/2006)


  1. Preface. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:- [Conf]

  2. Program Committee. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:- [Conf]

  3. Organizing Committee. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:- [Conf]
  4. Chiara Abbaneo, Francesco Flammini, Armando Lazzaro, Pietro Marmo, Nicola Mazzocca, Angela Sanseviero
    UML Based Reverse Engineering for the Verification of Railway Control Logics. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:3-10 [Conf]
  5. D. C. Craig, Wlodzimierz M. Zuberek
    Compatibility of Software Components - Modeling and Verification. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:11-18 [Conf]
  6. Iwona Dubielewicz, Bogumila Hnatkowska, Zbigniew Huzar, Lech Tuzinkiewicz
    Feasibility Analysis of MDA-based Database Design. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:19-26 [Conf]
  7. Artur Krystosik
    Embedded Systems Modeling Language. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:27-34 [Conf]
  8. Z. Lipinski
    State Model of Service Reliability. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:35-42 [Conf]
  9. Jan Magott, Pawel Skrobanek
    Partially automatic generation of fault-trees with time dependencies. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:43-50 [Conf]
  10. Marcin Szlenk
    Formal Semantics and Reasoning about UML Class Diagram. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:51-59 [Conf]
  11. Andrzej Bialas
    Information Security Systems vs. Critical Information Infrastructure Protection Systems - Similarities and Differences. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:60-67 [Conf]
  12. Radoslaw Brendel, Henryk Krawczyk
    Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:68-75 [Conf]
  13. Janusz Sosnowski, Piotr Gawkowski, Przemyslaw Zygulski, A. Tymoczko
    Enhancing Fault Injection Testbench. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:76-83 [Conf]
  14. Grzegorz Golaszewski, Janusz Górski
    Hazard Prevention by Forced Time Constraints. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:84-91 [Conf]
  15. Marek Zagorski, Janusz Górski
    An Approach for Evaluating Trust in IT Infrastructure. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:92-99 [Conf]
  16. Wojciech Zamojski, Dariusz Caban
    Introduction to the Dependability Modeling of Computer Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:100-109 [Conf]
  17. Luísa Jorge, Teresa Gomes
    Survey of Recovery Schemes in MPLS Networks. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:110-118 [Conf]
  18. Mohannad Najjar, Firas Najjar
    d-HMAC Dynamic HMAC function. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:119-126 [Conf]
  19. Paulo S. Motta Pires, Luiz Affonso H. G. Oliveira
    Security Aspects of SCADA and Corporate Network Interconnection: An Overview. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:127-134 [Conf]
  20. Jakub Botwicz, Piotr Buciak, Piotr Sapiecha
    Building Dependable Intrusion Prevention Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:135-142 [Conf]
  21. Tomasz R. Surmacz
    Bandwidth control in redundant news server links. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:143-149 [Conf]
  22. Ewa Szlachcic
    Fault Tolerant Topological Design for Computer Networks. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:150-159 [Conf]
  23. Rafal Cegiela
    Selecting Technology for Disaster Recovery. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:160-167 [Conf]
  24. Jan-Thomas Czornack, Carsten Trinitis, Max Walter
    Transparent Checkpointing for Applications with Graphical User Interfaces and Thread Support on Linux Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:168-174 [Conf]
  25. V. P. Koutras, Agapios N. Platis
    Applying Software Rejuvenation in a Two Node Cluster System for High Availabilit. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:175-182 [Conf]
  26. H. Krawczyk, M. Wiel
    Security of Web Services. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:183-190 [Conf]
  27. Zoltán Micskei, István Majzik
    Model-based Automatic Test Generation for Event-Driven Embedded Systems using Model Checkers. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:191-198 [Conf]
  28. Fumiko Nagoya, Yuting Chen, Shaoying Liu
    An Empirical Study on a Specification-Based Program Review Approach. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:199-206 [Conf]
  29. Luai Al Shalabi, Zyad Shaaban
    Normalization as a Preprocessing Engine for Data Mining and the Approach of Preference Matrix. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:207-214 [Conf]
  30. Andrzej Zalewski, Andrzej Ratkowski
    Evaluation of Dependability of Multi-tier Internet Business Applications with Queueing Networks. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:215-222 [Conf]
  31. Dominik Zalewski
    Security Enhancement of Java Remote Method Invocation. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:223-231 [Conf]
  32. Tadashi Araragi
    Byzantine Fault Tolerance for Agent Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:232-239 [Conf]
  33. Velik Bellemin, Tadashi Araragi
    CryptoComputing Approach to Protecting Interaction Protocols of Mobile Agents from Malicious Host Attack. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:240-247 [Conf]
  34. Dalila Boughaci, Habiba Drias, Ahmed Bendib, Youcef Bouznit, Belaid Benhamou
    Distributed Intrusion Detection Framework based on Autonomous and Mobile Agents. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:248-255 [Conf]
  35. Dalila Boughaci, Habiba Drias, Brahim Oubeka, Abdelkader Aissioui, Belaid Benhamou
    A Distributed Firewall using Autonomous Agents. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:256-263 [Conf]
  36. I-Hsin Chou, Chin-Feng Fan
    A Regulatory Software Maintenance Environment Using Agent-Based Software Configuration Management. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:264-275 [Conf]
  37. Janusz Biernat
    Self-Dual Modules in Design of Dependable Digital Devices. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:276-281 [Conf]
  38. Marcin Gomulkiewicz, Maciej Nikodem, Tadeusz Tomczak
    Low-cost and Universal Secure Scan: a Design- Architecture for Crypto Chips. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:282-288 [Conf]
  39. Jerzy W. Greblicki
    CAD software for designing of Totally Self Checking Sequential Circuits. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:289-297 [Conf]
  40. Tadeusz Tomczak
    Residue Arithmetic in FPGA Matrices. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:297-305 [Conf]
  41. George J. Anders, Jaroslaw Sugier
    Risk Assessment Tool for Maintenance Selection. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:306-313 [Conf]
  42. O. V. Berestnev, E. M. Kharitonov
    Securing of Integrated Protection of Technical Information by Application of Special Engineering Decisions. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:314-318 [Conf]
  43. Samia Boucherkha, Mohamed Benmohamed
    A Multi-tier Architecture to Safely Share Digital Medical Images. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:319-326 [Conf]
  44. Hui-Wen Huang, Wei-Yi Yang, Chunkuan Shih, Swu Yih, Chang Tzeng, Cherng-Tsong Kuo, Ming-Huei Chen, Yuan-Chang Yu, Li-Hsin Wang, Hsun-Ho Wang, Chun-Yu Chen, Wan-Tsz Tu
    Digital Instrumentation and Control Failure Events Derivation and Analysis for Advanced Boiling Water Reactor. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:327-334 [Conf]
  45. Francisco Fernández de Vega
    A Fault Tolerant Optimization Algorithm based on Evolutionary Computation. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:335-342 [Conf]
  46. B. Kalinowski, G. Anders
    Efficiency of Reliability Evaluation of Large Electric Power Systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:343-350 [Conf]
  47. Henryk Maciejewski, George Anders
    Estimation of Impact of Maintenance Policies on Equipment Risk of Failure. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:351-357 [Conf]
  48. Jacek Mazurkiewicz, Tomasz Walkowiak
    Computer modeling and simulation of discrete transport system with dispatcher for reliability and economic analysis. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:358-365 [Conf]
  49. Tomasz Walkowiak, Jacek Mazurkiewicz
    Fuzzy approach to economic analysis of dispatcher driven discrete transport systems. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:366-373 [Conf]
  50. Marek Woda
    Conception of Composing Learning Content into Learning Tree to Ensure Reliability of Learning Material. [Citation Graph (0, 0)][DBLP]
    DepCoS-RELCOMEX, 2006, pp:374-381 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002