Interaction Faults Caused by Third-Party External Systems - A Case Study and Challenges
暂无分享,去创建一个
[1] Cláudia Antunes,et al. Temporal Data Mining: an overview , 2001 .
[2] Guido M. Schuster,et al. Real-time voice over packet-switched networks , 1998, IEEE Netw..
[3] E. Mark Gold,et al. Language Identification in the Limit , 1967, Inf. Control..
[4] Kensuke Akiyama,et al. Fabrication of iron silicides photonic crystals , 2006 .
[5] Jean Arlat,et al. Analysis of the effects of real and injected software faults: Linux as a case study , 2002, 2002 Pacific Rim International Symposium on Dependable Computing, 2002. Proceedings..
[6] Mark Weiser,et al. The world is not a desktop , 1994, INTR.
[7] P. Cosman,et al. MAP DECODING OF ARITHMETIC CODES WITH A FORBIDDEN SYMBOL , 2002 .
[8] Daniel P. Siewiorek,et al. Reliable Computer Systems: Design and Evaluation, Third Edition , 1998 .
[9] Richard Lai,et al. A survey of communication protocol testing , 2002, J. Syst. Softw..
[10] Henrique Madeira,et al. Emulation of Software Faults: A Field Data Study and a Practical Approach , 2006, IEEE Transactions on Software Engineering.
[11] John Case,et al. A Polynomial Time Learner for a Subclass of Regular Patterns , 2004, Electron. Colloquium Comput. Complex..
[12] Robert S. Swarz,et al. Reliable Computer Systems: Design and Evaluation , 1992 .
[13] Carl E. Landwehr,et al. Basic concepts and taxonomy of dependable and secure computing , 2004, IEEE Transactions on Dependable and Secure Computing.
[14] A. Akhmetova. Discovery of Frequent Episodes in Event Sequences , 2006 .
[15] Mário J. Silva,et al. Spelling Correction for Search Engine Queries , 2004, EsTAL.
[16] Takashi Nanya,et al. Tolerating Interaction Faults Originated From External Systems , 2006 .
[17] Li Gong. A note on redundancy in encrypted messages , 1990, CCRV.
[18] Michael Sipser,et al. Introduction to the Theory of Computation , 1996, SIGA.
[19] Andrew K. C. Wong,et al. Synthesis and Recognition of Sequences , 1991, IEEE Trans. Pattern Anal. Mach. Intell..