


default search action
ATC 2011: Banff, Canada
- José M. Alcaraz Calero, Laurence Tianruo Yang, Félix Gómez Mármol

, Luis Javier García-Villalba, Xiaolin Andy Li, Yan Wang:
Autonomic and Trusted Computing - 8th International Conference, ATC 2011, Banff, Canada, September 2-4, 2011. Proceedings. Lecture Notes in Computer Science 6906, Springer 2011, ISBN 978-3-642-23495-8
Keynote Speech
- Félix Gómez Mármol, Marcus Quintino Kuhnen, Gregorio Martínez Pérez

:
Enhancing OpenID through a Reputation Framework. 1-18
Autonomic Architectures, Models and Systems
- Julia Schmitt, Michael Roth, Rolf Kiefhaber, Florian Kluge, Theo Ungerer:

Concept of a Reflex Manager to Enhance the Planner Component of an Autonomic / Organic System. 19-30 - Tariq M. King, Andrew A. Allen

, Rodolfo Cruz, Peter J. Clarke
:
Safe Runtime Validation of Behavioral Adaptations in Autonomic Software. 31-46 - Yuying Wang, Xingshe Zhou, Yunwei Dong, Sha Liu

:
A Configurable Environment Simulation Tool for Embedded Software. 47-59 - Jian Wan, Laurence Tianruo Yang, Yunfa Li

, Xianghua Xu, Naixue Xiong:
An Adaptive Management Mechanism for Resource Scheduling in Multiple Virtual Machine System. 60-74 - Robson de Oliveira Albuquerque

, Luis Javier García-Villalba
, Osmar Ribeiro Torres, Flavio Elias Gomes de Deus
:
Virtualization with Automated Services Catalog for Providing Integrated Information Technology Infrastructure. 75-91 - Yu Zhang, Yunwei Dong, Fan Zhang, Yunfeng Zhang:

Research on Modeling and Analysis of CPS. 92-105
Autonomic Communications
- Wanqi Li, Guanglei He:

Towards a Protocol for Autonomic Covert Communication. 106-117 - Md. Emdadul Haque, Fan Wei, Takehiro Gouda, Xiaodong Lu, Kinji Mori:

Autonomous Online Expansion Technology for Wireless Sensor Network Based Manufacturing System. 118-131 - Tobias Ziermann, Zoran Salcic

, Jürgen Teich:
Self-organized Message Scheduling for Asynchronous Distributed Embedded Systems. 132-148
Trusted and Secure Computing
- Fajiang Yu, Tong Li, Yang Lin, Huanguo Zhang:

Hierarchical-CPK-Based Trusted Computing Cryptography Scheme. 149-163 - Antonio Muñoz, Antonio Maña

:
Facilitating the Use of TPM Technologies Using the Serenity Framework. 164-174 - M. McCord, M. Chuah:

Spam Detection on Twitter Using Traditional Classifiers. 175-186 - Matt Smart, Eike Ritter:

True Trustworthy Elections: Remote Electronic Voting Using Trusted Computing. 187-202
Reliable, Secure and Trust Applications
- Stefan Spitz, York Tüchelmann:

A Survey of Security Issues in Trust and Reputation Systems for E-Commerce. 203-214 - Chun-Hsin Wang, Chuang-Yang Chiu:

Copyright Protection in P2P Networks by False Pieces Pollution. 215-227 - Gregory Fedynyshyn, Mooi Choo Chuah, Gang Tan

:
Detection and Classification of Different Botnet C&C Channels. 228-242 - Yue Li, Yian Zhu

, Chunyan Ma, Meng Xu:
A Method for Constructing Fault Trees from AADL Models. 243-258

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














