Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Système informatique")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 20194

  • Page / 808

Export

Selection :

  • and

Agreement under faulty interfacesDASGUPTA, P.Information processing letters. 1998, Vol 65, Num 3, pp 125-129, issn 0020-0190Article

Fault-tolerant computation in the full information modelGOLDREICH, O; GOLDWASSER, S; LINIAL, N et al.SIAM journal on computing (Print). 1998, Vol 27, Num 2, pp 506-544, issn 0097-5397Article

Informatique sûre de fonctionnement : défis et solutions = Dependable computing challenges and solutionsARLAT, J.Journal européen des systèmes automatisés. 1996, Vol 30, Num 10, pp 1433-1465, issn 1269-6935Article

An optimal message routing algorithm for double-loop networksGUAN, D. J.Information processing letters. 1998, Vol 65, Num 5, pp 255-260, issn 0020-0190Article

Four-state stabilizing phase clock for unidirectional rings of odd sizeHUANG, S.-T; LIU, T.-J.Information processing letters. 1998, Vol 65, Num 6, pp 325-329, issn 0020-0190Article

Optimal availability quorum systems : Theory and practiceAMIR, Y; WOOL, A.Information processing letters. 1998, Vol 65, Num 5, pp 223-228, issn 0020-0190Article

A tradeoff between safety and liveness for randomized coordinated attackVARGHESE, G; LYNCH, N. A.Information and computation (Print). 1996, Vol 128, Num 1, pp 57-71, issn 0890-5401Article

Folding on the plane and the design of systolic arraysCHOFFRUT, G; CULIK, K. II.Information processing letters. 1983, Vol 17, Num 3, pp 149-153, issn 0020-0190Article

Applying parallel computation algorithms in the design of serial algorithmsMEGIDDO, N.Journal of the Association for Computing Machinery. 1983, Vol 30, Num 4, pp 852-865, issn 0004-5411Article

Carte à mémoire et systèmes de contrôle d'accèsLE MARCHANT, P.Acta electronica. 1983, Vol 25, Num 1, pp 93-98, issn 0001-558XArticle

On abbreviating command namesSTREETER, L. A; ACKROFF, J. M; TAYLOR, G. A et al.The Bell System technical journal. 1983, Vol 62, Num 6, pp 1807-1826, issn 0005-8580Article

Nivat's processing systems: decision problems related to protection and synchronizationISTRAIL, S; MASALAGIU, C.Theoretical computer science. 1983, Vol 26, Num 1-2, pp 83-103, issn 0304-3975Article

Path delay analysis for hierarchical building block layout systemsTAMURA, E; OGAWA, K; NAKANO, T et al.Computer-aided design. 1983, Vol 15, Num 6, pp 353-360, issn 0010-4485Article

The load, capacity, and availability of quorum systemsNAOR, M; WOOL, A.SIAM journal on computing (Print). 1998, Vol 27, Num 2, pp 423-447, issn 0097-5397Article

Reliable unicasting in faulty hypercubes using safety levelsWU, J.IEEE transactions on computers. 1997, Vol 46, Num 2, pp 241-247, issn 0018-9340Article

Dépôt de sang: apport d'un système informatique dans la sécurité immuno-hématologique = Hospital blood bank: Information system and immuno-hematologyVAQUIER, C; CALDANI, C.Transfusion clinique et biologique (Paris). 2010, Vol 17, Num 5-6, pp 345-348, issn 1246-7820, 4 p.Conference Paper

International Conference on Distributed Computing SystemsBUCKLES, Bill P; CHANSON, Samuel.IEEE transactions on computers. 1997, Vol 46, Num 6, pp 641-686, issn 0018-9340Conference Proceedings

Fully polynomial byzantine agreement for n > 3t processors in t + 1 roundsGARAY, J. A; MOSES, Y.SIAM journal on computing (Print). 1998, Vol 27, Num 1, pp 247-290, issn 0097-5397Article

A metaobject architecture for fault-tolerant distributed systems : The FRIENDS approachFABRE, J.-C; PERENNOU, T.IEEE transactions on computers. 1998, Vol 47, Num 1, pp 78-95, issn 0018-9340Article

The project automated librarianPRAGER, J. M.IBM systems journal. 1983, Vol 22, Num 3, pp 214-228, issn 0018-8670Article

Les systèmes d'informatique industrielle utilisés pour gérer les usines et les réseaux d'eau: État de l'art et évolutionsPORTERO, Bruno.Environnement & technique. 2004, Num 240, pp 21-24, issn 0986-2943, 4 p.Article

Chip level modeling and simulationARMSTRONG, J. R.Simulation (San Diego, Calif.). 1983, Vol 41, Num 4, pp 141-148, issn 0037-5497Article

The computer science research network CSNET: a history and status reportCOMER, D.Communications of the ACM. 1983, Vol 26, Num 10, pp 747-753, issn 0001-0782Article

Problèmes techniques d'implantationVINCENT, G.sd, pp 1-18Article

Shared authentication token secure against replay and weak key attacksYEN, S.-M; LIAO, K.-H.Information processing letters. 1997, Vol 62, Num 2, pp 77-80, issn 0020-0190Article

  • Page / 808