Found: 221
Select item for more details and to access through your institution.
Neutron time bomb.
- Published in:
- Electronics Systems & Software, 2006, v. 4, n. 6, p. 30, doi. 10.1049/ess:20060605
- By:
- Publication type:
- Article
Computing Economic Chaos.
- Published in:
- Computational Economics, 2004, v. 23, n. 4, p. 289, doi. 10.1023/B:CSEM.0000026787.81469.1f
- By:
- Publication type:
- Article
House of Reliability Costs: Developing Reliability Program Activities.
- Published in:
- Quality & Reliability Engineering International, 2014, v. 30, n. 3, p. 375, doi. 10.1002/qre.1575
- By:
- Publication type:
- Article
Testing for software vulnerability using environment perturbation.
- Published in:
- Quality & Reliability Engineering International, 2002, v. 18, n. 3, p. 261, doi. 10.1002/qre.480
- By:
- Publication type:
- Article
The use of not logic in fault tree analysis.
- Published in:
- Quality & Reliability Engineering International, 2001, v. 17, n. 3, p. 143, doi. 10.1002/qre.405
- By:
- Publication type:
- Article
Resolving a Replication That Failed: News on the Macy & Sato Model.
- Published in:
- Journal of Artificial Societies & Social Simulation, 2009, v. 12, n. 4, p. 13
- By:
- Publication type:
- Article
Se cayó el sistema...
- Published in:
- IEEM Revista de Negocios, 2015, p. 12
- By:
- Publication type:
- Article
A Comprehensive Review of Computational Desmogging Techniques.
- Published in:
- Archives of Computational Methods in Engineering, 2023, v. 30, n. 6, p. 3723, doi. 10.1007/s11831-023-09918-9
- By:
- Publication type:
- Article
A Comprehensive Review of Computational Dehazing Techniques.
- Published in:
- Archives of Computational Methods in Engineering, 2019, v. 26, n. 5, p. 1395, doi. 10.1007/s11831-018-9294-z
- By:
- Publication type:
- Article
VLSI Implementation of a Distributed Algorithm for Fault-Tolerant Clock Generation.
- Published in:
- Journal of Electrical & Computer Engineering, 2011, p. 1, doi. 10.1155/2011/936712
- By:
- Publication type:
- Article
A CLUSTERING-BASED STRATEGY TO IDENTIFY COINCIDENTAL CORRECTNESS IN FAULT LOCALIZATION.
- Published in:
- International Journal of Software Engineering & Knowledge Engineering, 2013, v. 23, n. 5, p. 721, doi. 10.1142/S0218194013500186
- By:
- Publication type:
- Article
online hand holding in fixing computer glitches.
- Published in:
- Teacher Librarian, 2005, v. 33, n. 2, p. 49
- By:
- Publication type:
- Article
UNA MEJORA DE PROCESO POR TÉCNICAS DE SIMULACIÓN DISCRETA: REDUCCIÓN DE "MURA" (2<sup>a</sup> PARTE).
- Published in:
- DYNA - Ingeniería e Industria, 2011, v. 86, n. 5, p. 494
- By:
- Publication type:
- Article
Distributed Search Trees: Fault Tolerance in an Asynchronous Environment.
- Published in:
- Theory of Computing Systems, 2003, v. 36, n. 6, p. 611, doi. 10.1007/s00224-003-1121-7
- By:
- Publication type:
- Article
Two Quarantine Models on the Attack of Malicious Objects in Computer Network.
- Published in:
- Mathematical Problems in Engineering, 2012, v. 2012, p. 1, doi. 10.1155/2012/407064
- By:
- Publication type:
- Article
Evaluation of Cost Estimation Metrics: Towards a Unified Terminology.
- Published in:
- Journal of Computing & Information Technology, 2013, v. 21, n. 1, p. 23, doi. 10.2498/cit.1002133
- By:
- Publication type:
- Article
Using UML/MARTE to support performance tuning and stress testing in real-time systems.
- Published in:
- Software & Systems Modeling, 2018, v. 17, n. 2, p. 479, doi. 10.1007/s10270-017-0585-x
- By:
- Publication type:
- Article
An empirical evaluation of P system testing techniques.
- Published in:
- Natural Computing, 2011, v. 10, n. 1, p. 151, doi. 10.1007/s11047-010-9188-y
- By:
- Publication type:
- Article
A MODEL FOR INTELLIGENT PROTECTION OF CRITICAL COMPUTER SYSTEMS.
- Published in:
- TASK Quarterly, 2021, v. 25, n. 3, p. 279, doi. 10.34808/tq2021/25.3/a
- By:
- Publication type:
- Article
Preserving the right of access to copyrighted works based on data regulation.
- Published in:
- Journal of World Intellectual Property, 2022, v. 25, n. 3, p. 714, doi. 10.1111/jwip.12253
- By:
- Publication type:
- Article
Document & System Security.
- Published in:
- Document News, 2012, v. 30, n. 1, p. 11
- Publication type:
- Article
LETTERS.
- Published in:
- 1997
- By:
- Publication type:
- Letter
PERSONAL COMPUTERS IN HEALTHCARE AND THE YEAR 2000.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 229, doi. 10.1177/146045829700300328
- By:
- Publication type:
- Article
SURVIVING THE YEAR 2000.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 224, doi. 10.1177/146045829700300326
- By:
- Publication type:
- Article
A RISK/REWARD APPROACH TO ASSESSING YEAR 2000 PROBLEMS.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 217, doi. 10.1177/146045829700300323
- By:
- Publication type:
- Article
YEAR 2000 PROBLEMS IN HEALTHCARE APPLICATIONS: A QUICK GUIDE.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 214, doi. 10.1177/146045829700300322
- By:
- Publication type:
- Article
PRUDENT PARANOIA.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 211
- By:
- Publication type:
- Article
Year 2000 problems, dates and healthcare computing.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 200, doi. 10.1177/146045829700300319
- By:
- Publication type:
- Article
Medical devices and the year 2000.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 173, doi. 10.1177/146045829700300311
- Publication type:
- Article
Vulnerability of hospital computer systems to Year 2000 problems.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 183, doi. 10.1177/146045829700300314
- By:
- Publication type:
- Article
General practice computer systems and the year 2000.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 180, doi. 10.1177/146045829700300313
- By:
- Publication type:
- Article
The millennium: bug and healthcare: a prescription for action.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 166, doi. 10.1177/146045829700300310
- By:
- Publication type:
- Article
The Year 2000 issue: a healthcare perspective.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 125, doi. 10.1177/146045829700300304
- By:
- Publication type:
- Article
THE MILLENNIUM BOMB.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 122
- By:
- Publication type:
- Article
THE YEAR 2000 AND HEALTH-CARE COMPUTING.
- Published in:
- Health Informatics Journal, 1997, v. 3, n. 3/4, p. 121, doi. 10.1177/146045829700300302
- By:
- Publication type:
- Article
YEAR 2000 PROTECTION AND HEALTHCARE COMPUTING.
- Published in:
- 1997
- By:
- Publication type:
- Editorial
THE YEAR 2000 IS COMING TO HEALTHCARE SYSTEMS, TOO.
- Published in:
- 1997
- Publication type:
- Editorial
The information society: permanent crisis through the (dis)ordering of networks.
- Published in:
- Global Networks, 2013, v. 13, n. 3, p. 290, doi. 10.1111/glob.12023
- By:
- Publication type:
- Article
A survey and review of the current state of rollback-recovery for cluster systems.
- Published in:
- Concurrency & Computation: Practice & Experience, 2009, v. 21, n. 12, p. 1632, doi. 10.1002/cpe.1413
- By:
- Publication type:
- Article
The Neutralizer: a self-configurable failure detector for minimizing distributed storage maintenance cost.
- Published in:
- Concurrency & Computation: Practice & Experience, 2009, v. 21, n. 2, p. 185, doi. 10.1002/cpe.1338
- By:
- Publication type:
- Article
A replication framework for program-to-program interaction across unreliable networks and its implementation in a servlet container.
- Published in:
- Concurrency & Computation: Practice & Experience, 2006, v. 18, n. 7, p. 701, doi. 10.1002/cpe.957
- By:
- Publication type:
- Article
MEAD: support for Real-Time Fault-Tolerant CORBA.
- Published in:
- Concurrency & Computation: Practice & Experience, 2005, v. 17, n. 12, p. 1527, doi. 10.1002/cpe.882
- By:
- Publication type:
- Article
A PEM Fuel Cell Diagnostic System Using the Extension Theory.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/539250
- By:
- Publication type:
- Article
Distributed Fault-Tolerant Event Region Detection of Wireless Sensor Networks.
- Published in:
- International Journal of Distributed Sensor Networks, 2013, p. 1, doi. 10.1155/2013/160523
- By:
- Publication type:
- Article
The Effect of Data Breaches on Shareholder Wealth.
- Published in:
- Risk Management & Insurance Review, 2010, v. 13, n. 1, p. 61, doi. 10.1111/j.1540-6296.2010.01178.x
- By:
- Publication type:
- Article
Y2K, CONVERGENCE, AND ARIA.
- Published in:
- Risk Management & Insurance Review, 2000, v. 3, n. 1, p. 1, doi. 10.1111/j.1540-6296.2000.tb00012.x
- By:
- Publication type:
- Article
Restoring Service after an Uplanned IT Outage.
- Published in:
- IT Professional, 2008, v. 10, n. 3, p. 40, doi. 10.1109/MITP.2008.56
- By:
- Publication type:
- Article
A study of the viability of exploiting memory content similarity to improve resilience to memory errors.
- Published in:
- International Journal of High Performance Computing Applications, 2015, v. 29, n. 1, p. 5, doi. 10.1177/1094342014560354
- By:
- Publication type:
- Article
Addressing failures in exascale computing.
- Published in:
- International Journal of High Performance Computing Applications, 2014, v. 28, n. 2, p. 129, doi. 10.1177/1094342014522573
- By:
- Publication type:
- Article
Using group replication for resilience on exascale systems.
- Published in:
- International Journal of High Performance Computing Applications, 2014, v. 28, n. 2, p. 210, doi. 10.1177/1094342013505348
- By:
- Publication type:
- Article