Displaying works 121 - 140 of 189 in total
Sorted by most recent date added to the index first, which may not be the same as publication date order.
2009 journal article
Should software testers use mutation analysis to augment a test set?
JOURNAL OF SYSTEMS AND SOFTWARE, 82(11), 1819–1832.
2009 journal article
Incommensurate spin correlation driven by frustration in BiCu2PO6
PHYSICAL REVIEW B, 80(18).
2009 journal article
Improving Data Availability for Better Access Performance: A Study on Caching Scientific Data on Distributed Desktop Workstations
JOURNAL OF GRID COMPUTING, 7(4), 419–438.
2009 article
A Tunable Holistic Resiliency Approach for High-Performance Computing Systems
Scott, S. L., Engelmann, C., Vallee, G. R., Naughton, T., Tikotekar, A., Ostrouchov, G., … Varma, J. (2009, April). ACM SIGPLAN NOTICES, Vol. 44, pp. 305–306.
2009 article
Special issue: Selected papers from The Second International Symposium on Advanced Networks and Telecommunication Systems (ANTS 2008)
Mukherjee, B., Subramaniam, S., Jukan, A., Sivalingam, K., & Dutta, R. (2009, December). OPTICAL SWITCHING AND NETWORKING, Vol. 6, pp. 225–226.
2009 conference paper
SigLM: signature-driven load management for cloud computing infrastructures
Iwqos: 2009 ieee 17th international workshop on quality of service, 226–234.
2009 journal article
ShortPK: A Short-Term Public Key Scheme for Broadcast Authentication in Sensor Networks
ACM TRANSACTIONS ON SENSOR NETWORKS, 6(1).
2009 article
Shift Hashing for Memory-Constrained Applications
2009 IEEE 33RD INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOLS 1 AND 2, pp. 531–536.
2009 article
Lightweight Remote Image Management for Secure Code Dissemination in Wireless Sensor Networks
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 1242-+.
2009 article
Fault Localization for Firewall Policies
2009 28TH IEEE INTERNATIONAL SYMPOSIUM ON RELIABLE DISTRIBUTED SYSTEMS, PROCEEDINGS, pp. 100-+.
2009 article
DiffQ: Practical Differential Backlog Congestion Control for Wireless Networks
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5, pp. 262–270.
2009 journal article
Commitment-Based Service-Oriented Architecture
COMPUTER, 42(11), 72–79.
2009 journal article
Sequence analysis of rice rubi3 promoter gene expression cassettes for improved transgene expression
PLANT SCIENCE, 177(6), 549–556.
2009 journal article
Reasonableness meets requirements: regulating security and privacy in software
Duke Law Journal, 59(2), 309–342.
2009 conference paper
ReFormat: Automatic reverse engineering of encrypted messages
Computer security - esorics 2009, proceedings, 5789, 200–215.
2009 conference paper
RAPID: Enabling scalable ad-hoc analytics on the semantic web
Semantic web - iswc 2009, proceedings, 5823, 715–730.
2009 journal article
On Bandwidth Tiered Service
IEEE-ACM TRANSACTIONS ON NETWORKING, 17(6), 1780–1793.
Contributors: N. Baradwaj & G. Rouskas n
2009 journal article
MicroRNAs resolve an apparent conflict between annelid systematics and their fossil record
Proceedings of the Royal Society of London. Series B, 276(1677), 4315–4322.
2009 conference paper
An empirical study of security problem reports in Linux distributions
International symposium on empirical software engineering and, 482–485.
2009 article
ScalaTrace: Scalable compression and replay of communication traces for high-performance computing
Noeth, M., Ratn, P., Mueller, F., Schulz, M., & Supinski, B. R. (2009, August). JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, Vol. 69, pp. 696–710.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.