Conferences in DBLP
(dasc) 2006 (conf/dasc/2006)
Organizing Committees. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:- [Conf ] Message from the General Co-Chairs. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:- [Conf ] Referees. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:- [Conf ] Yuan-Shun Dai , Michael G. Hinchey , Manish Madhusoodan , James L. Rash , Xukai Zou A Prototype Model for Self-Healing and Self-Reproduction In Swarm Robotics System. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:3-10 [Conf ] Ian A. Troxel , Alan D. George Adaptable and Autonomic Mission Manager for Dependable Aerospace Computing. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:11-18 [Conf ] Joaquín Peña , Michael G. Hinchey , Roy Sterritt , Antonio Ruiz Cortés , Manuel Resinas A Model-Driven Architecture Approach for Modeling, Specifying and Deploying Policies in Autonomous and Autonomic Systems. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:19-30 [Conf ] Li Bai A Reliable (k, n) Image Secret Sharing Scheme. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:31-36 [Conf ] Jong Youl Choi , Philippe Golle , Markus Jakobsson Tamper-Evident Digital Signature Protecting Certification Authorities Against Malware. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:37-44 [Conf ] Na Guo , Laurence Tianruo Yang , Man Lin , John P. Quinn A Parallel GNFS Integrated with the Block Wiedemann's Algorithm for Integer Factorization. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:45-50 [Conf ] Sining Liu , Brian King , Wei Wang A CRT-RSA Algorithm Secure against Hardware Fault Attacks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:51-60 [Conf ] Karin Sallhammar , Bjarne E. Helvik , Svein J. Knapskog A Game-Theoretic Approach to Stochastic Security and Dependability Evaluation. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:61-68 [Conf ] Tetsuya Masuishi , Koichi Shibata , Yasuyuki Oki , Kinji Mori Autonomous Decentralized Load Tracking Techniques and Evaluation. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:69-76 [Conf ] Tadashi Dohi , Tatsuya Ozaki , Naoto Kaio Optimal Checkpoint Placement with Equality Constraints. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:77-84 [Conf ] Ruiping Ma , Liudong Xing , Howard E. Michel Fault-Intrusion Tolerant Techniques in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:85-94 [Conf ] Anil Bazaz , James D. Arthur , Joseph G. Tront Modeling Security Vulnerabilities: A Constraints and Assumptions Perspective. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:95-102 [Conf ] Sung-Whan Woo , Omar H. Alhazmi , Yashwant K. Malaiya Assessing Vulnerabilities in Apache and IIS HTTP Servers. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:103-110 [Conf ] Takao Ando , Hiroyuki Okamura , Tadashi Dohi Estimating Markov Modulated Software Reliability Models via EM Algorithm. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:111-118 [Conf ] Gustavo A. Chaparro-Baquero , Nayda G. Santiago , Wilson Rivera , Fernando Vega-Riveros Measuring Quantitative Dependability Attributes in Digital Publishing Using Petri Net Workflow Modeling. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:119-128 [Conf ] Xuejun Yang , Xiangli Qu , Chunmei Gui Towards Reliable Rating Filtering in Grid Reputation Systems: A Pre-Evaluating Set Based Bias-Tuned Approach1. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:129-136 [Conf ] Zhaoyu Liu , Dichao Peng A Security-Supportive Middleware Architecture for Pervasive Computing. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:137-144 [Conf ] Songqiao Han , Shensheng Zhang , Yong Zhang Self-Adaptive Pervasive Computing Application Based on Code Mobility. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:145-154 [Conf ] T. Paul Parker , Shouhuai Xu Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:155-162 [Conf ] Zhaoyu Liu , Roopesh Uppala A Dynamic Countermeasure Method for Large-Scale Network Attacks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:163-170 [Conf ] Ahmad Patooghy , Seyed Ghassem Miremadi , A. Javadtalab , Mahdi Fazeli , N. Farazmand A Solution to Single Point of Failure Using Voter Replication and Disagreement Detection. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:171-176 [Conf ] Zijiang Yang , Shiyong Lu , Ping Yang Runtime Security Verification for Itinerary-Driven Mobile Agents. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:177-186 [Conf ] Thanikesavan Sivanthi , Ulrich Killat A Satisficing MOMIP Framework for Reliable Real-time Application Scheduling. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:187-194 [Conf ] Qinghui Tang , Sandeep K. S. Gupta , Daniel Stanzione , Phil Cayton Thermal-Aware Task Scheduling to Minimize Energy Usage of Blade Server Based Datacenters. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:195-202 [Conf ] Guoqing Yang , Hong Li , Zhaohui Wu SmartC: A Component-Based Hierarchical Modeling Language for Automotive Electronics. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:203-210 [Conf ] Xinwen Fu , Wei Yu , Dan Cheng , Xuejun Tan , Kevin Streff , Steve Graham On Recognizing Virtual Honeypots and Countermeasures. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:211-218 [Conf ] Naixue Xiong , Yanxiang He , Yan Yang , Laurence Tianruo Yang , Chao Peng A Self-Tuning Multicast Flow Control Scheme Based on Autonomic Technology. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:219-226 [Conf ] Yuan-Shun Dai , Michael G. Hinchey , Mingrui Qi , Xukai Zou Autonomic Security and Self-Protection based on Feature-Recognition with Virtual Neurons. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:227-234 [Conf ] Emmanuel Hooper Intelligent Autonomic Strategy to Attacks in Network Infrastructure Protection: Feedback Methods to IDS, Using Policies, Alert Filters and Firewall Packet Filters for Multiple Protocols. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:235-244 [Conf ] M. Masadeh Bani Yassein , Mohamed Ould-Khaoua , Lewis M. Mackenzie , Stylianos Papanastasiou Performance Evaluation of Adjusted Probabilistic Broadcasting in MANETs. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:245-249 [Conf ] Akhilesh Shrestha , Liudong Xing , Hong Liu Infrastructure Communication Reliability of Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:250-257 [Conf ] Hui Kang , Xiaolin Li , Patrick J. Moran Autonomic Sensor Networks: A New Paradigm for Collaborative Information Processing. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:258-268 [Conf ] Xuehai Peng , Chuang Lin Architecture of Trustworthy Networks. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:269-276 [Conf ] Avinash Srinivasan , Joshua Teitelbaum , Jie Wu DRBTS: Distributed Reputation-based Beacon Trust System. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:277-283 [Conf ] Will Tao , Robert Steele Trusted Mobile Interaction via Extended Digital Certificates. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:284-292 [Conf ] Andrew Prunicki , Tzilla Elrad Aclamate: An AOSD Security Framework for Access Control. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:293-300 [Conf ] Omkar J. Tilak , Rajeev R. Raje , Xukai Zou Composing Access Control Policies of Distributed Components. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:301-307 [Conf ] Junda Liu , Lin Ning , Yibo Xue , Dongsheng Wang PIFF: An Intelligent File Filtering Mechanism for Peer-to-Peer Network. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:308-314 [Conf ] Weiwei Jing , Liusheng Huang , Yonglong Luo , Weijiang Xu , Yifei Yao An Algorithm for Privacy-Preserving Quantitative Association Rules Mining. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:315-324 [Conf ] Mehmet A. Orgun , Ji Ma , Chuchang Liu , Guido Governatori Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:325-332 [Conf ] Natalia Stakhanova , Samik Basu , Robyn R. Lutz , Johnny Wong Automated Caching of Behavioral Patterns for Efficient Run-Time Monitoring. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:333-340 [Conf ] Philip K. McKinley , Farshad A. Samimi , Jonathan K. Shapiro , Chiping Tang Service Clouds: A Distributed Infrastructure for Constructing Autonomic Communication Services. [Citation Graph (0, 0)][DBLP ] DASC, 2006, pp:341-348 [Conf ]