The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Assault with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-2003 (17) 2004-2013 (15) 2014-2019 (16) 2020-2023 (15)
Publication types (Num. hits)
article(27) inproceedings(36)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 15 occurrences of 15 keywords

Results
Found 63 publication records. Showing 63 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
59Robert M. Lehnherr, Steven E. Strukel The air assault expeditionary force (AAEF) experiment: examining the impact of technology on battle command using live, virtual and constructive simulation. Search on Bibsonomy SpringSim (3) The full citation details ... 2007 DBLP  BibTeX  RDF air assault expeditionary force (AAEF), army test and evaluation command (ATEC), soldier battle laboratory (SBL), spiral C, virtual, live, constructive
53Signe Uldbjerg The rhythms of shame in digital sexual assault: Rhythmic resistance and the repeated assault. Search on Bibsonomy First Monday The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
53Louis Chartrand, Ulisce Desmarais-Grégoire Differential treatment: how testimony is discussed in assault and sexual assault cases at the Court of Appeal of Québec. Search on Bibsonomy DH The full citation details ... 2020 DBLP  BibTeX  RDF
47Patrick J. Delaney Algorithms and analyses: simulation modeling and analysis in support of brigade assault bridging operations planning. Search on Bibsonomy WSC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
47Ricky Valentin, Jeremy Cunningham, Michael D. Osterman, Abhijit Dasgupta 0002, Michael G. Pecht, Dinos Tsagos Weapon and communication systems: virtual life assessment of electronic hardware used in the Advanced Amphibious Assault Vehicle (AAAV). Search on Bibsonomy WSC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
33Diego A. Hincapié Ossa, Sergio A. Ordóñez Medina, Carlos Francisco Rodríguez, José Tiberio Hernández Immersive Simulator for Fluvial Combat Training. Search on Bibsonomy ISVC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Immersive Simulation, Fluvial, Assault, Firearm, Shooting Training, Dynamic Simulation
27Marcell Szakály, Sebastian Köhler 0005, Martin Strohmeier, Ivan Martinovic Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Digvijay Singh, Annu Yadav, Rishabh Arora, G. Ravivarman, S. Arul Antran Vijay, Y. K. Sharma Deep Neural Network Deception Using A Single Pixel Assault. Search on Bibsonomy IC3I The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Elizabeth A. Schlesener, Caitlin Marie Lancaster, Catherine Barwulor, Chandni Murmu, Kelsea Schulenberg TitleIX: Step Up & Step In! A Mobile Augmented Reality Game Featuring Interactive Embodied Conversational Agents for Sexual Assault Bystander Intervention Training on US College Campuses. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Zining Kong, Xiaowei Zhang, Wentao Dong, Yucai Dong Failure analysis of hydraulic system of armored assault vehicle based on Apriori algorithm. Search on Bibsonomy ICMLCA The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Harry Rodger, Andrew Lensen, Marcin Betkier Explainable Artificial Intelligence for Assault Sentence Prediction in New Zealand. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Hyanghee Park, Jodi Forlizzi, Joonhwan Lee Voices of Sexual Assault Survivors: Understanding Survivors' Experiences of Interactional Breakdowns and Design Ideas for Solutions. Search on Bibsonomy Conference on Designing Interactive Systems The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Jiyong Park, Min-Seok Pang, Junetae Kim, Byungtae Lee The Deterrent Effect of Ride-Sharing on Sexual Assault and Investigation of Situational Contingencies. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Chloe Drewett, Melissa Oxlad, Martha Augoustinos Breaking the silence on sexual harassment and assault: An analysis of #MeToo tweets. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Hannah Stevens, Irena Acic, Laramie D. Taylor Uncivil Reactions to Sexual Assault Online: Linguistic Features of News Reports Predict Discourse Incivility. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Hyanghee Park, Joonhwan Lee Designing a Conversational Agent for Sexual Assault Survivors: Defining Burden of Self-Disclosure and Envisioning Survivor-Centered Solutions. Search on Bibsonomy CHI The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Viet Duong, Phu Pham, Ritwik Bose, Jiebo Luo #MeToo on Campus: Studying College Sexual Assault at Scale Using Data Reported on Social Media. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
27Borke Obada-Obieh, Lucrezia Spagnolo, Konstantin Beznosov Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault. Search on Bibsonomy SOUPS @ USENIX Security Symposium The full citation details ... 2020 DBLP  BibTeX  RDF
27Bhashithe Abeysinghe, Yannick Veilleux-Lepage, Mia M. Bloom, Rajshekhar Sunderraman A Semantic Segmentation Approach to Recognize Assault Rifles in ISIS Propaganda Images. Search on Bibsonomy ICSC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27William F. Murphy Investigating the incidence of sexual assault in martial arts coaching using media reports. Search on Bibsonomy Digit. Investig. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Qizhen Zhou, Chenshu Wu, Jianchun Xing, Shuo Zhao, Qiliang Yang Enabling Noninvasive Physical Assault Monitoring in Smart School with Commercial Wi-Fi Devices. Search on Bibsonomy Wirel. Commun. Mob. Comput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Saeed Ahmed 0002, Youngdoo Lee, Seung Ho Hyun, Insoo Koo Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest. Search on Bibsonomy IEEE Trans. Inf. Forensics Secur. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Ron Artstein, Carla Gordon, Usman Sohail, Chirag Merchant, Andrew Jones 0001, Julia Campbell, Matthew Trimmer, Jeffrey Bevington, Christopher Engen, David R. Traum Digital survivor of sexual assault. Search on Bibsonomy IUI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Stephen J. Flusberg, Sarah Husney, Casey Pollard, Kevin Holmes How victim framing shapes attitudes towards sexual assault. Search on Bibsonomy CogSci The full citation details ... 2019 DBLP  BibTeX  RDF
27Rahul Deb Mohalder, Md. Anisur Rahman, Apu Saha An IoT Based Approach against Physical and Mental Assault in Educational Institution. Search on Bibsonomy ICCCNT The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Kelwin Fernandes, Jaime S. Cardoso 0001, Birgitte Schmidt Astrup A deep learning approach for the forensic evaluation of sexual assault. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27Julia Skinner, Melissa R. Gross The ISSAS Model: Understanding the Information Needs of Sexual Assault Survivors on College Campuses. Search on Bibsonomy Coll. Res. Libr. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Zehao Sun, Shaojie Tang 0001, He Huang 0001, Zhenyu Zhu, Hansong Guo, Yu-e Sun, Liusheng Huang SOS: Real-time and accurate physical assault detection using smartphone. Search on Bibsonomy Peer-to-Peer Netw. Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Manisha Mohan, Misha Sra, Chris Schmandt Technological interventions to detect, communicate and deter sexual assault. Search on Bibsonomy ISWC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Rosemary Pennington, Jessica Birthisel When new media make news: Framing technology and sexual assault in the Steubenville rape case. Search on Bibsonomy New Media Soc. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Siou-Jhen Tang, Shu-Jin Jhan, Siou-Ji Chen, Ai-Ru Lan, Huei-Jhu You, Huei-Lan Jhang, Fang-Shan Li Emergency Information Systems for Performance Assessment Value Before and After the Child Abuse and Sexual Assault of Time After Medical Intervention. Search on Bibsonomy Nursing Informatics The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27Jiyong Park, Junetae Kim, Byungtae Lee Are uber really to blame for sexual assault?: evidence from New York city. Search on Bibsonomy ICEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
27David Bruce Borenstein, Peter Ringel, Marek Basler, Ned S. Wingreen Established Microbial Colonies Can Survive Type VI Secretion Assault. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Zehao Sun, Shaojie Tang 0001, He Huang 0001, Liusheng Huang, Zhenyu Zhu, Hansong Guo, Yu-e Sun iProtect: Detecting Physical Assault Using Smartphone. Search on Bibsonomy WASA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
27Helena Miranda, Laura Punnett, Rebecca J. Gore Musculoskeletal Pain and Reported Workplace Assault: A Prospective Study of Clinical Staff in Nursing Homes. Search on Bibsonomy Hum. Factors The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
27David Matsumoto, Hyisung C. Hwang Differences between individuals with and without experience with assault in identifying facial signs of imminent aggression. Search on Bibsonomy ISI The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
27Ihsan Sabuncuoglu, Gökhan Virlan Modeling and analyzing army air assault operations via simulation. Search on Bibsonomy Simul. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
27Clyde G. Booker Review of The Attack on the Liberty: The Untold Story of Israel's Deadly 1967 Assault on a U.S. Spy Ship by James Scott. Search on Bibsonomy Cryptologia The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
27Radha-Krishna Balla, Alan Fern UCT for Tactical Assault Planning in Real-Time Strategy Games. Search on Bibsonomy IJCAI The full citation details ... 2009 DBLP  BibTeX  RDF
27Michael A. Caloyannides The Assault on Logic. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
27Stig W. Jorgensen Is MT translation? Reflections on a recent assault. Search on Bibsonomy J. Exp. Theor. Artif. Intell. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Stephen H. Unger The assault on IEEE ethics support [Viewpoint]. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27Jill Gerhardt-Powals, Matthew H. Powals The digital millennium copyright act: an international assault on fair use? Search on Bibsonomy ITiCSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
27William R. Oliver, Julian G. Rosenman, Aziz A. Boxwala, P. David Stotts, John Smith, Mitchell Soltys, James Symon, Tim J. Cullip, Glenn Wagner Applications of image processing and visualization in the evaluation of murder and assault. Search on Bibsonomy VBC The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
27Dennis P. Salerno, Thomas F. Washer II Desert Storm: air assault communications. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
27Paul Gray Robbery and Assault of Bus Drivers. Search on Bibsonomy Oper. Res. The full citation details ... 1971 DBLP  DOI  BibTeX  RDF
27Mel Skinner Letters to the editor: A tactical assault on systems procurement. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF
20Michael S. Ryoo, Jake K. Aggarwal Semantic Representation and Recognition of Continued and Recursive Human Activities. Search on Bibsonomy Int. J. Comput. Vis. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Semantic-level video analysis, Hierarchical action recognition, Event detection, Human activity recognition
20Kenneth H. Buetow Enabling the Molecular Medicine Revolution Through Network-Centric Biomedicine. Search on Bibsonomy DILS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Yi Xie 0002, Shun-Zheng Yu Detecting Shrew HTTP Flood Attacks for Flash Crowds. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Melanie Baljko, John Kamevaar, Nell Tenhaaf Sound for A-Life Agents. Search on Bibsonomy ACII The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy Routing amid Colluding Attackers. Search on Bibsonomy ICNP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Stanislaw Jarecki, Jihye Kim, Gene Tsudik Authentication for Paranoids: Multi-party Secret Handshakes. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Michael Hilker, Christoph Schommer Description of bad-signatures for network intrusion detection. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF data streams, anomaly detection, artificial immune system, network intrusion detection
20Shankar Krishnamoorthy Insights and perspectives on physical synthesis. Search on Bibsonomy ISPD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Simon Foley 0002 Technology and knowledge: the affirmation of power. Search on Bibsonomy AI Soc. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Power, Technology, Knowledge, Work, Modernity
20Victor A. Skormin, James Moronski, Dennis L. McGee, Douglas H. Summerville Biological Approach to System Information Security (BASIS): A Multi-agent Approach to Information Security. Search on Bibsonomy CEEMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. Search on Bibsonomy IWAN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Christos H. Papadimitriou The Joy of Theory. Search on Bibsonomy STOC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20L. Jean Camp, Helen Nissenbaum, Cathleen McGrath Trust: A Collision of Paradigms. Search on Bibsonomy Financial Cryptography The full citation details ... 2001 DBLP  BibTeX  RDF
20Richard H. Stern Napster: A Walking Copyright Infringement? Search on Bibsonomy IEEE Micro The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Jill Gerhardt-Powals, Matthew H. Powals Distance education: law attempts to catch up with technology (battle between copyright owners and academics). Search on Bibsonomy SIGCSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Richard A. DeMillo Software development for next generation communication networks. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #63 of 63 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license