callback( { "result":{ "query":":facetid:toc:\"db/conf/prdc/prdc2018.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"64.79" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"44", "@dc":"44", "@oc":"44", "@id":"43419951", "text":":facetid:toc:db/conf/prdc/prdc2018.bht" } }, "hits":{ "@total":"44", "@computed":"44", "@sent":"44", "@first":"0", "hit":[{ "@score":"1", "@id":"2650965", "info":{"authors":{"author":[{"@pid":"06/10802","text":"Koichi Bando"},{"@pid":"96/5080-1","text":"Kenji Tanaka 0001"}]},"title":"Attempt to Apply Machine Learning to a Failure Database - A Case Study on Communications Networks.","venue":"PRDC","pages":"225-226","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/Bando018","doi":"10.1109/PRDC.2018.00040","ee":"https://doi.org/10.1109/PRDC.2018.00040","url":"https://dblp.org/rec/conf/prdc/Bando018"}, "url":"URL#2650965" }, { "@score":"1", "@id":"2650966", "info":{"authors":{"author":[{"@pid":"228/9076","text":"Nesrine Berjab"},{"@pid":"98/6329","text":"Hieu Hanh Le"},{"@pid":"91/1919","text":"Chia-Mu Yu"},{"@pid":"57/264","text":"Sy-Yen Kuo"},{"@pid":"y/HaruoYokota","text":"Haruo Yokota"}]},"title":"Hierarchical Abnormal-Node Detection Using Fuzzy Logic for ECA Rule-Based Wireless Sensor Networks.","venue":"PRDC","pages":"289-298","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/BerjabLYKY18","doi":"10.1109/PRDC.2018.00051","ee":"https://doi.org/10.1109/PRDC.2018.00051","url":"https://dblp.org/rec/conf/prdc/BerjabLYKY18"}, "url":"URL#2650966" }, { "@score":"1", "@id":"2650967", "info":{"authors":{"author":[{"@pid":"166/7057","text":"Georg von der Brüggen"},{"@pid":"233/2428","text":"Lea Schönberger"},{"@pid":"70/1961","text":"Jian-Jia Chen"}]},"title":"Do Nothing, But Carefully: Fault Tolerance with Timing Guarantees for Multiprocessor Systems Devoid of Online Adaptation.","venue":"PRDC","pages":"1-10","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/BruggenSC18","doi":"10.1109/PRDC.2018.00010","ee":"https://doi.org/10.1109/PRDC.2018.00010","url":"https://dblp.org/rec/conf/prdc/BruggenSC18"}, "url":"URL#2650967" }, { "@score":"1", "@id":"2650968", "info":{"authors":{"author":[{"@pid":"95/9265","text":"Simin Cai"},{"@pid":"34/3823","text":"Barbara Gallina"},{"@pid":"79/4936","text":"Dag Nyström"},{"@pid":"85/2148","text":"Cristina Seceleanu"}]},"title":"Specification and Formal Verification of Atomic Concurrent Real-Time Transactions.","venue":"PRDC","pages":"104-114","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/CaiGNS18","doi":"10.1109/PRDC.2018.00021","ee":"https://doi.org/10.1109/PRDC.2018.00021","url":"https://dblp.org/rec/conf/prdc/CaiGNS18"}, "url":"URL#2650968" }, { "@score":"1", "@id":"2650969", "info":{"authors":{"author":[{"@pid":"50/2179","text":"Shun-Chieh Chang"},{"@pid":"50/4276","text":"Yeali S. Sun"},{"@pid":"235/7281","text":"Wu-Long Chuang"},{"@pid":"30/2066","text":"Meng Chang Chen"},{"@pid":"35/892","text":"Bo Sun"},{"@pid":"61/4099","text":"Takeshi Takahashi 0001"}]},"title":"ANTSdroid: Using RasMMA Algorithm to Generate Malware Behavior Characteristics of Android Malware Family.","venue":"PRDC","pages":"257-262","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ChangSCCS018","doi":"10.1109/PRDC.2018.00047","ee":"https://doi.org/10.1109/PRDC.2018.00047","url":"https://dblp.org/rec/conf/prdc/ChangSCCS018"}, "url":"URL#2650969" }, { "@score":"1", "@id":"2650970", "info":{"authors":{"author":[{"@pid":"125/2938","text":"Carmen Cheh"},{"@pid":"195/5945","text":"Ahmed M. Fawaz"},{"@pid":"184/3896","text":"Mohammad A. Noureddine"},{"@pid":"38/8396-1","text":"Binbin Chen 0001"},{"@pid":"139/4328","text":"William G. Temple"},{"@pid":"s/WilliamHSanders","text":"William H. Sanders"}]},"title":"Determining Tolerable Attack Surfaces that Preserves Safety of Cyber-Physical Systems.","venue":"PRDC","pages":"125-134","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ChehFNCTS18","doi":"10.1109/PRDC.2018.00023","ee":"https://doi.org/10.1109/PRDC.2018.00023","url":"https://dblp.org/rec/conf/prdc/ChehFNCTS18"}, "url":"URL#2650970" }, { "@score":"1", "@id":"2650971", "info":{"authors":{"author":[{"@pid":"87/7313","text":"Li-Sheng Chen"},{"@pid":"35/8707","text":"Wei-Ho Chung"},{"@pid":"20/3822","text":"Ing-Yi Chen"},{"@pid":"57/264","text":"Sy-Yen Kuo"}]},"title":"Adaptive Repetition Scheme with Machine Learning for 3GPP NB-IoT.","venue":"PRDC","pages":"252-256","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ChenCCK18","doi":"10.1109/PRDC.2018.00046","ee":"https://doi.org/10.1109/PRDC.2018.00046","url":"https://dblp.org/rec/conf/prdc/ChenCCK18"}, "url":"URL#2650971" }, { "@score":"1", "@id":"2650972", "info":{"authors":{"author":[{"@pid":"235/7320","text":"Pang-Yang Chu"},{"@pid":"235/7296","text":"Wei-Huan Lu"},{"@pid":"87/5404","text":"Jun-Wei Lin"},{"@pid":"39/5416","text":"Yu-Sung Wu"}]},"title":"Enforcing Enterprise Mobile Application Security Policy with Plugin Framework.","venue":"PRDC","pages":"263-268","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ChuLLW18","doi":"10.1109/PRDC.2018.00048","ee":"https://doi.org/10.1109/PRDC.2018.00048","url":"https://dblp.org/rec/conf/prdc/ChuLLW18"}, "url":"URL#2650972" }, { "@score":"1", "@id":"2650973", "info":{"authors":{"author":[{"@pid":"159/8548","text":"Christian M. Fuchs"},{"@pid":"202/2170","text":"Nadia M. Murillo"},{"@pid":"53/5607","text":"Aske Plaat"},{"@pid":"142/7142","text":"Erik van der Kouwe"},{"@pid":"235/7424","text":"Daniel Harsono"},{"@pid":"95/4442","text":"Peng Wang"}]},"title":"Software-Defined Dependable Computing for Spacecraft.","venue":"PRDC","pages":"231-232","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/FuchsMPKHW18","doi":"10.1109/PRDC.2018.00043","ee":"https://doi.org/10.1109/PRDC.2018.00043","url":"https://dblp.org/rec/conf/prdc/FuchsMPKHW18"}, "url":"URL#2650973" }, { "@score":"1", "@id":"2650974", "info":{"authors":{"author":[{"@pid":"235/7371","text":"Shu-Wen Hsueh"},{"@pid":"168/8025","text":"Tung-Yueh Lin"},{"@pid":"235/7327","text":"Weng-Ian Lei"},{"@pid":"168/7954","text":"Chi-Leung Patrick Ngai"},{"@pid":"235/7286","text":"Yu-Hang Sheng"},{"@pid":"39/5416","text":"Yu-Sung Wu"}]},"title":"Semantic Failover in Software-Defined Networking.","venue":"PRDC","pages":"299-308","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/HsuehLLNSW18","doi":"10.1109/PRDC.2018.00052","ee":"https://doi.org/10.1109/PRDC.2018.00052","url":"https://dblp.org/rec/conf/prdc/HsuehLLNSW18"}, "url":"URL#2650974" }, { "@score":"1", "@id":"2650975", "info":{"authors":{"author":[{"@pid":"52/6490","text":"Jianhui Jiang"},{"@pid":"78/4785","text":"Guangming Lu"},{"@pid":"78/6727","text":"Zhen Wang"}]},"title":"Methods for Approximate Adders Reliability Estimation Based on PTM Model.","venue":"PRDC","pages":"221-222","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/JiangLW18","doi":"10.1109/PRDC.2018.00038","ee":"https://doi.org/10.1109/PRDC.2018.00038","url":"https://dblp.org/rec/conf/prdc/JiangLW18"}, "url":"URL#2650975" }, { "@score":"1", "@id":"2650976", "info":{"authors":{"author":[{"@pid":"06/1958","text":"Hao Jin"},{"@pid":"34/6884","text":"Tatsuhiro Tsuchiya"}]},"title":"Deriving Fault Locating Test Cases from Constrained Covering Arrays.","venue":"PRDC","pages":"233-240","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/JinT18","doi":"10.1109/PRDC.2018.00044","ee":"https://doi.org/10.1109/PRDC.2018.00044","url":"https://dblp.org/rec/conf/prdc/JinT18"}, "url":"URL#2650976" }, { "@score":"1", "@id":"2650977", "info":{"authors":{"author":[{"@pid":"13/11438","text":"Mehdi Karimibiuki"},{"@pid":"228/0649","text":"Ekta Aggarwal"},{"@pid":"91/5344","text":"Karthik Pattabiraman"},{"@pid":"i/AndreIvanov","text":"André Ivanov"}]},"title":"DynPolAC: Dynamic Policy-Based Access Control for IoT Systems.","venue":"PRDC","pages":"161-170","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/KarimibiukiAPI18","doi":"10.1109/PRDC.2018.00027","ee":"https://doi.org/10.1109/PRDC.2018.00027","url":"https://dblp.org/rec/conf/prdc/KarimibiukiAPI18"}, "url":"URL#2650977" }, { "@score":"1", "@id":"2650978", "info":{"authors":{"author":[{"@pid":"94/2966","text":"Masato Kitakami"},{"@pid":"235/7400","text":"Kazuki Matsuoka"}]},"title":"An Attack-Tolerant Agreement Algorithm for Block Chain.","venue":"PRDC","pages":"227-228","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/KitakamiM18","doi":"10.1109/PRDC.2018.00041","ee":"https://doi.org/10.1109/PRDC.2018.00041","url":"https://dblp.org/rec/conf/prdc/KitakamiM18"}, "url":"URL#2650978" }, { "@score":"1", "@id":"2650979", "info":{"authors":{"author":[{"@pid":"60/319","text":"Hyojung Lee"},{"@pid":"59/10015","text":"Kiwoon Sung"},{"@pid":"71/8711","text":"Kyusang Lee"},{"@pid":"29/8861","text":"Jaeseok Lee"},{"@pid":"235/7345","text":"Seungjai Min"}]},"title":"Economic Analysis of Blockchain Technology on Digital Platform Market.","venue":"PRDC","pages":"94-103","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/LeeSLLM18","doi":"10.1109/PRDC.2018.00020","ee":"https://doi.org/10.1109/PRDC.2018.00020","url":"https://dblp.org/rec/conf/prdc/LeeSLLM18"}, "url":"URL#2650979" }, { "@score":"1", "@id":"2650980", "info":{"authors":{"author":[{"@pid":"51/6160","text":"Pedro Marques"},{"@pid":"223/7012","text":"Zayani Dabbabi"},{"@pid":"223/7117","text":"Miruna-Mihaela Mironescu"},{"@pid":"19/511","text":"Olivier Thonnard"},{"@pid":"68/1448","text":"Alysson Bessani"},{"@pid":"56/5354","text":"Frances V. Buontempo"},{"@pid":"71/6662","text":"Ilir Gashi"}]},"title":"Detecting Malicious Web Scraping Activity: A Study with Diverse Detectors.","venue":"PRDC","pages":"269-278","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/MarquesDMTBBG18","doi":"10.1109/PRDC.2018.00049","ee":"https://doi.org/10.1109/PRDC.2018.00049","url":"https://dblp.org/rec/conf/prdc/MarquesDMTBBG18"}, "url":"URL#2650980" }, { "@score":"1", "@id":"2650981", "info":{"authors":{"author":[{"@pid":"207/4052","text":"Nadia Patricia Da Silva Medeiros"},{"@pid":"123/7759","text":"Naghmeh Ramezani Ivaki"},{"@pid":"51/5350-2","text":"Pedro Costa 0002"},{"@pid":"14/6260","text":"Marco Vieira"}]},"title":"An Approach for Trustworthiness Benchmarking Using Software Metrics.","venue":"PRDC","pages":"84-93","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/MedeirosI0V18","doi":"10.1109/PRDC.2018.00019","ee":"https://doi.org/10.1109/PRDC.2018.00019","url":"https://dblp.org/rec/conf/prdc/MedeirosI0V18"}, "url":"URL#2650981" }, { "@score":"1", "@id":"2650982", "info":{"authors":{"author":[{"@pid":"73/10055","text":"Daniel Mendes"},{"@pid":"123/7759","text":"Naghmeh Ramezani Ivaki"},{"@pid":"33/2879","text":"Henrique Madeira"}]},"title":"Effects of GPS Spoofing on Unmanned Aerial Vehicles.","venue":"PRDC","pages":"155-160","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/MendesIM18","doi":"10.1109/PRDC.2018.00026","ee":"https://doi.org/10.1109/PRDC.2018.00026","url":"https://dblp.org/rec/conf/prdc/MendesIM18"}, "url":"URL#2650982" }, { "@score":"1", "@id":"2650983", "info":{"authors":{"author":[{"@pid":"235/7443","text":"Shu Nagai"},{"@pid":"34/6884","text":"Tatsuhiro Tsuchiya"}]},"title":"Applying Metamorphic Testing to e-Commerce Product Search Engines.","venue":"PRDC","pages":"183-184","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/NagaiT18","doi":"10.1109/PRDC.2018.00030","ee":"https://doi.org/10.1109/PRDC.2018.00030","url":"https://dblp.org/rec/conf/prdc/NagaiT18"}, "url":"URL#2650983" }, { "@score":"1", "@id":"2650984", "info":{"authors":{"author":[{"@pid":"235/7265","text":"Ryota Ogasawara"},{"@pid":"72/6791","text":"Masayuki Arai"}]},"title":"A SAT-Based Approach for SDN Rule Table Distribution.","venue":"PRDC","pages":"191-192","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/OgasawaraA18","doi":"10.1109/PRDC.2018.00034","ee":"https://doi.org/10.1109/PRDC.2018.00034","url":"https://dblp.org/rec/conf/prdc/OgasawaraA18"}, "url":"URL#2650984" }, { "@score":"1", "@id":"2650985", "info":{"authors":{"author":[{"@pid":"175/6391","text":"Angelos Oikonomopoulos"},{"@pid":"127/2805","text":"Remco Vermeulen"},{"@pid":"75/8194","text":"Cristiano Giuffrida"},{"@pid":"91/800","text":"Herbert Bos"}]},"title":"On the Effectiveness of Code Normalization for Function Identification.","venue":"PRDC","pages":"241-251","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/OikonomopoulosV18","doi":"10.1109/PRDC.2018.00045","ee":"https://doi.org/10.1109/PRDC.2018.00045","url":"https://dblp.org/rec/conf/prdc/OikonomopoulosV18"}, "url":"URL#2650985" }, { "@score":"1", "@id":"2650986", "info":{"authors":{"author":[{"@pid":"235/7347","text":"Prashanth Palaniswamy"},{"@pid":"91/2733","text":"Bruce M. McMillin"}]},"title":"Cyber-Physical Security of an Electric Microgrid.","venue":"PRDC","pages":"74-83","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/PalaniswamyM18","doi":"10.1109/PRDC.2018.00018","ee":"https://doi.org/10.1109/PRDC.2018.00018","url":"https://dblp.org/rec/conf/prdc/PalaniswamyM18"}, "url":"URL#2650986" }, { "@score":"1", "@id":"2650987", "info":{"authors":{"author":[{"@pid":"235/7441","text":"Sai Sidharth Patlolla"},{"@pid":"91/2733","text":"Bruce M. McMillin"},{"@pid":"171/1020","text":"Sridhar Adepu"},{"@pid":"m/AdityaPMathur","text":"Aditya Mathur"}]},"title":"An Approach for Formal Analysis of the Security of a Water Treatment Testbed.","venue":"PRDC","pages":"115-124","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/PatlollaMAM18","doi":"10.1109/PRDC.2018.00022","ee":"https://doi.org/10.1109/PRDC.2018.00022","url":"https://dblp.org/rec/conf/prdc/PatlollaMAM18"}, "url":"URL#2650987" }, { "@score":"1", "@id":"2650988", "info":{"authors":{"author":[{"@pid":"193/4228","text":"Abu Hasnat Mohammad Rubaiyat"},{"@pid":"21/10422","text":"Yongming Qin"},{"@pid":"80/7769","text":"Homa Alemzadeh"}]},"title":"Experimental Resilience Assessment of an Open-Source Driving Agent.","venue":"PRDC","pages":"54-63","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/RubaiyatQA18","doi":"10.1109/PRDC.2018.00016","ee":"https://doi.org/10.1109/PRDC.2018.00016","url":"https://dblp.org/rec/conf/prdc/RubaiyatQA18"}, "url":"URL#2650988" }, { "@score":"1", "@id":"2650989", "info":{"authors":{"author":[{"@pid":"235/7454","text":"Amelia Samandari"},{"@pid":"60/10299","text":"Mengmeng Ge"},{"@pid":"132/5717","text":"Jin Bum Hong"},{"@pid":"k/DongSeongKim","text":"Dong Seong Kim 0001"}]},"title":"Evaluating the Security of IoT Networks with Mobile Devices.","venue":"PRDC","pages":"171-180","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/SamandariGHK18","doi":"10.1109/PRDC.2018.00028","ee":"https://doi.org/10.1109/PRDC.2018.00028","url":"https://dblp.org/rec/conf/prdc/SamandariGHK18"}, "url":"URL#2650989" }, { "@score":"1", "@id":"2650990", "info":{"authors":{"author":[{"@pid":"70/9359","text":"Oliver Schwahn"},{"@pid":"207/7180","text":"Nicolas Coppik"},{"@pid":"46/1655-1","text":"Stefan Winter 0001"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"}]},"title":"FastFI: Accelerating Software Fault Injections.","venue":"PRDC","pages":"193-202","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/SchwahnC0S18","doi":"10.1109/PRDC.2018.00035","ee":"https://doi.org/10.1109/PRDC.2018.00035","url":"https://dblp.org/rec/conf/prdc/SchwahnC0S18"}, "url":"URL#2650990" }, { "@score":"1", "@id":"2650991", "info":{"authors":{"author":[{"@pid":"217/1007","text":"Junsik Seo"},{"@pid":"162/5227","text":"Jaehyun Nam"},{"@pid":"84/3319","text":"Seungwon Shin"}]},"title":"Towards a Security-Enhanced Cloud Platform.","venue":"PRDC","pages":"229-230","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/SeoNS18","doi":"10.1109/PRDC.2018.00042","ee":"https://doi.org/10.1109/PRDC.2018.00042","url":"https://dblp.org/rec/conf/prdc/SeoNS18"}, "url":"URL#2650991" }, { "@score":"1", "@id":"2650992", "info":{"authors":{"author":[{"@pid":"67/1486","text":"Hossain Shahriar"},{"@pid":"59/2508","text":"Kai Qian"},{"@pid":"224/9733","text":"Md Arabin Islam Talukder"},{"@pid":"65/6293","text":"Dan Chia-Tien Lo"},{"@pid":"235/7314","text":"Nidhibahen Patel"}]},"title":"Mobile Software Security with Dynamic Analysis.","venue":"PRDC","pages":"223-224","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ShahriarQTLP18","doi":"10.1109/PRDC.2018.00039","ee":"https://doi.org/10.1109/PRDC.2018.00039","url":"https://dblp.org/rec/conf/prdc/ShahriarQTLP18"}, "url":"URL#2650992" }, { "@score":"1", "@id":"2650993", "info":{"authors":{"author":[{"@pid":"149/3275","text":"Bo-Chen Tai"},{"@pid":"185/5249","text":"Szu-Chuang Li"},{"@pid":"84/3147","text":"Yennun Huang"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"},{"@pid":"22/2618","text":"Pang-Chieh Wang"}]},"title":"Exploring the Relationship Between Dimensionality Reduction and Private Data Release.","venue":"PRDC","pages":"25-33","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/TaiLHSW18","doi":"10.1109/PRDC.2018.00013","ee":"https://doi.org/10.1109/PRDC.2018.00013","url":"https://dblp.org/rec/conf/prdc/TaiLHSW18"}, "url":"URL#2650993" }, { "@score":"1", "@id":"2650994", "info":{"authors":{"author":[{"@pid":"92/665","text":"Itsuo Takanami"},{"@pid":"94/4122","text":"Masaru Fukushi"}]},"title":"Degradable Restructuring of Mesh-Connected Processor Arrays with Spares on Orthogonal Sides.","venue":"PRDC","pages":"11-14","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/TakanamiF18","doi":"10.1109/PRDC.2018.00011","ee":"https://doi.org/10.1109/PRDC.2018.00011","url":"https://dblp.org/rec/conf/prdc/TakanamiF18"}, "url":"URL#2650994" }, { "@score":"1", "@id":"2650995", "info":{"authors":{"author":[{"@pid":"92/665","text":"Itsuo Takanami"},{"@pid":"94/4122","text":"Masaru Fukushi"}]},"title":"Restructuring Mesh-Connected Processor Arrays with Spares on Four Sides by Orthogonal Side Rotation.","venue":"PRDC","pages":"181-182","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/TakanamiF18a","doi":"10.1109/PRDC.2018.00029","ee":"https://doi.org/10.1109/PRDC.2018.00029","url":"https://dblp.org/rec/conf/prdc/TakanamiF18a"}, "url":"URL#2650995" }, { "@score":"1", "@id":"2650996", "info":{"authors":{"author":[{"@pid":"224/4627","text":"Venu Babu Thati"},{"@pid":"177/0872","text":"Jens Vankeirsbilck"},{"@pid":"90/7914","text":"Niels Penneman"},{"@pid":"131/7486","text":"Davy Pissoort"},{"@pid":"139/7664","text":"Jeroen Boydens"}]},"title":"An Improved Data Error Detection Technique for Dependable Embedded Software.","venue":"PRDC","pages":"213-220","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ThatiVPPB18","doi":"10.1109/PRDC.2018.00037","ee":"https://doi.org/10.1109/PRDC.2018.00037","url":"https://dblp.org/rec/conf/prdc/ThatiVPPB18"}, "url":"URL#2650996" }, { "@score":"1", "@id":"2650997", "info":{"authors":{"author":[{"@pid":"58/8733","text":"Tsvetoslava Vateva-Gurova"},{"@pid":"07/7220","text":"Salman Manzoor"},{"@pid":"84/3147","text":"Yennun Huang"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"}]},"title":"InfoLeak: Scheduling-Based Information Leakage.","venue":"PRDC","pages":"44-53","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/Vateva-GurovaMH18","doi":"10.1109/PRDC.2018.00015","ee":"https://doi.org/10.1109/PRDC.2018.00015","url":"https://dblp.org/rec/conf/prdc/Vateva-GurovaMH18"}, "url":"URL#2650997" }, { "@score":"1", "@id":"2650998", "info":{"authors":{"author":[{"@pid":"58/8733","text":"Tsvetoslava Vateva-Gurova"},{"@pid":"s/NeerajSuri","text":"Neeraj Suri"}]},"title":"On the Detection of Side-Channel Attacks.","venue":"PRDC","pages":"185-186","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/Vateva-GurovaS18","doi":"10.1109/PRDC.2018.00031","ee":"https://doi.org/10.1109/PRDC.2018.00031","url":"https://dblp.org/rec/conf/prdc/Vateva-GurovaS18"}, "url":"URL#2650998" }, { "@score":"1", "@id":"2650999", "info":{"authors":{"author":[{"@pid":"75/5925","text":"Matthew Wagner"},{"@pid":"91/2733","text":"Bruce M. McMillin"}]},"title":"Cyber-Physical Transactions: A Method for Securing VANETs with Blockchains.","venue":"PRDC","pages":"64-73","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/WagnerM18","doi":"10.1109/PRDC.2018.00017","ee":"https://doi.org/10.1109/PRDC.2018.00017","url":"https://dblp.org/rec/conf/prdc/WagnerM18"}, "url":"URL#2650999" }, { "@score":"1", "@id":"2651000", "info":{"authors":{"author":[{"@pid":"03/8378","text":"Zhengguo Yang"},{"@pid":"67/6059","text":"Toshiaki Aoki"},{"@pid":"17/5184","text":"Yasuo Tan"}]},"title":"Modeling the Required Indoor Temperature Change by Hybrid Automata for Detecting Thermal Problems.","venue":"PRDC","pages":"135-144","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/YangAT18","doi":"10.1109/PRDC.2018.00024","ee":"https://doi.org/10.1109/PRDC.2018.00024","url":"https://dblp.org/rec/conf/prdc/YangAT18"}, "url":"URL#2651000" }, { "@score":"1", "@id":"2651001", "info":{"authors":{"author":[{"@pid":"25/2216","text":"Jyh-haw Yeh"},{"@pid":"235/7458","text":"Srisarguru Sridhar"},{"@pid":"130/7969","text":"Gaby G. Dagher"},{"@pid":"42/1523","text":"Hung-Min Sun"},{"@pid":"59/3518","text":"Ning Shen"},{"@pid":"235/7366","text":"Kathleen Dakota White"}]},"title":"A Certificateless One-Way Group Key Agreement Protocol for End-to-End Email Encryption.","venue":"PRDC","pages":"34-43","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/YehSDSSW18","doi":"10.1109/PRDC.2018.00014","ee":"https://doi.org/10.1109/PRDC.2018.00014","url":"https://dblp.org/rec/conf/prdc/YehSDSSW18"}, "url":"URL#2651001" }, { "@score":"1", "@id":"2651002", "info":{"authors":{"author":[{"@pid":"235/7463","text":"Ravikiran Yeleswarapu"},{"@pid":"s/ArunKSomani","text":"Arun K. Somani"}]},"title":"SSCMSD - Single-Symbol Correction Multi-symbol Detection for DRAM Subsystem.","venue":"PRDC","pages":"15-24","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/YeleswarapuS18","doi":"10.1109/PRDC.2018.00012","ee":"https://doi.org/10.1109/PRDC.2018.00012","url":"https://dblp.org/rec/conf/prdc/YeleswarapuS18"}, "url":"URL#2651002" }, { "@score":"1", "@id":"2651003", "info":{"authors":{"author":[{"@pid":"75/3854","text":"Ilsun You"},{"@pid":"29/651","text":"Kangbin Yim"},{"@pid":"20/6234-1","text":"Vishal Sharma 0001"},{"@pid":"125/1061","text":"Gaurav Choudhary"},{"@pid":"c/IngRayChen","text":"Ing-Ray Chen"},{"@pid":"71/2230","text":"Jin-Hee Cho"}]},"title":"On IoT Misbehavior Detection in Cyber Physical Systems.","venue":"PRDC","pages":"189-190","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/YouYSCCC18","doi":"10.1109/PRDC.2018.00033","ee":"https://doi.org/10.1109/PRDC.2018.00033","url":"https://dblp.org/rec/conf/prdc/YouYSCCC18"}, "url":"URL#2651003" }, { "@score":"1", "@id":"2651004", "info":{"authors":{"author":[{"@pid":"17/322","text":"Tianyi Zhang"},{"@pid":"94/2966","text":"Masato Kitakami"}]},"title":"Research on Convolutional Codes are Used in RAID.","venue":"PRDC","pages":"187-188","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ZhangK18","doi":"10.1109/PRDC.2018.00032","ee":"https://doi.org/10.1109/PRDC.2018.00032","url":"https://dblp.org/rec/conf/prdc/ZhangK18"}, "url":"URL#2651004" }, { "@score":"1", "@id":"2651005", "info":{"authors":{"author":[{"@pid":"235/7282","text":"Yunlu Zhao"},{"@pid":"38/997","text":"Tadashi Dohi"},{"@pid":"85/3171","text":"Hiroyuki Okamura"}]},"title":"Software Test-Run Reliability Modeling with Non-homogeneous Binomial Processes.","venue":"PRDC","pages":"145-154","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ZhaoDO18","doi":"10.1109/PRDC.2018.00025","ee":"https://doi.org/10.1109/PRDC.2018.00025","url":"https://dblp.org/rec/conf/prdc/ZhaoDO18"}, "url":"URL#2651005" }, { "@score":"1", "@id":"2651006", "info":{"authors":{"author":[{"@pid":"162/8036","text":"Zhiqi Zhu"},{"@pid":"156/4590","text":"Joseph Callenes-Sloan"},{"@pid":"92/3091","text":"Benjamin Carrión Schäfer"}]},"title":"Control Flow Checking Optimization Based on Regular Patterns Analysis.","venue":"PRDC","pages":"203-212","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ZhuCS18","doi":"10.1109/PRDC.2018.00036","ee":"https://doi.org/10.1109/PRDC.2018.00036","url":"https://dblp.org/rec/conf/prdc/ZhuCS18"}, "url":"URL#2651006" }, { "@score":"1", "@id":"2651007", "info":{"authors":{"author":[{"@pid":"25/9388","text":"Tommaso Zoppi"},{"@pid":"31/1895","text":"Andrea Ceccarelli"},{"@pid":"31/4416","text":"Andrea Bondavalli"}]},"title":"On Algorithms Selection for Unsupervised Anomaly Detection.","venue":"PRDC","pages":"279-288","year":"2018","type":"Conference and Workshop Papers","access":"closed","key":"conf/prdc/ZoppiCB18","doi":"10.1109/PRDC.2018.00050","ee":"https://doi.org/10.1109/PRDC.2018.00050","url":"https://dblp.org/rec/conf/prdc/ZoppiCB18"}, "url":"URL#2651007" }, { "@score":"1", "@id":"2686203", "info":{"title":"23rd IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2018, Taipei, Taiwan, December 4-7, 2018","venue":"PRDC","publisher":"IEEE","year":"2018","type":"Editorship","key":"conf/prdc/2018","ee":"https://ieeexplore.ieee.org/xpl/conhome/8630756/proceeding","url":"https://dblp.org/rec/conf/prdc/2018"}, "url":"URL#2686203" } ] } } } )