Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
59 | Robert M. Lehnherr, Steven E. Strukel |
The air assault expeditionary force (AAEF) experiment: examining the impact of technology on battle command using live, virtual and constructive simulation. |
SpringSim (3) |
2007 |
DBLP BibTeX RDF |
air assault expeditionary force (AAEF), army test and evaluation command (ATEC), soldier battle laboratory (SBL), spiral C, virtual, live, constructive |
53 | Signe Uldbjerg |
The rhythms of shame in digital sexual assault: Rhythmic resistance and the repeated assault. |
First Monday |
2021 |
DBLP DOI BibTeX RDF |
|
53 | Louis Chartrand, Ulisce Desmarais-Grégoire |
Differential treatment: how testimony is discussed in assault and sexual assault cases at the Court of Appeal of Québec. |
DH |
2020 |
DBLP BibTeX RDF |
|
47 | Patrick J. Delaney |
Algorithms and analyses: simulation modeling and analysis in support of brigade assault bridging operations planning. |
WSC |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Ricky Valentin, Jeremy Cunningham, Michael D. Osterman, Abhijit Dasgupta 0002, Michael G. Pecht, Dinos Tsagos |
Weapon and communication systems: virtual life assessment of electronic hardware used in the Advanced Amphibious Assault Vehicle (AAAV). |
WSC |
2002 |
DBLP DOI BibTeX RDF |
|
33 | Diego A. Hincapié Ossa, Sergio A. Ordóñez Medina, Carlos Francisco Rodríguez, José Tiberio Hernández |
Immersive Simulator for Fluvial Combat Training. |
ISVC (1) |
2008 |
DBLP DOI BibTeX RDF |
Immersive Simulation, Fluvial, Assault, Firearm, Shooting Training, Dynamic Simulation |
27 | Marcell Szakály, Sebastian Köhler 0005, Martin Strohmeier, Ivan Martinovic |
Assault and Battery: Evaluating the Security of Power Conversion Systems Against Electromagnetic Injection Attacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Digvijay Singh, Annu Yadav, Rishabh Arora, G. Ravivarman, S. Arul Antran Vijay, Y. K. Sharma |
Deep Neural Network Deception Using A Single Pixel Assault. |
IC3I |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Elizabeth A. Schlesener, Caitlin Marie Lancaster, Catherine Barwulor, Chandni Murmu, Kelsea Schulenberg |
TitleIX: Step Up & Step In! A Mobile Augmented Reality Game Featuring Interactive Embodied Conversational Agents for Sexual Assault Bystander Intervention Training on US College Campuses. |
CHI Extended Abstracts |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Zining Kong, Xiaowei Zhang, Wentao Dong, Yucai Dong |
Failure analysis of hydraulic system of armored assault vehicle based on Apriori algorithm. |
ICMLCA |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Harry Rodger, Andrew Lensen, Marcin Betkier |
Explainable Artificial Intelligence for Assault Sentence Prediction in New Zealand. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Hyanghee Park, Jodi Forlizzi, Joonhwan Lee |
Voices of Sexual Assault Survivors: Understanding Survivors' Experiences of Interactional Breakdowns and Design Ideas for Solutions. |
Conference on Designing Interactive Systems |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Jiyong Park, Min-Seok Pang, Junetae Kim, Byungtae Lee |
The Deterrent Effect of Ride-Sharing on Sexual Assault and Investigation of Situational Contingencies. |
Inf. Syst. Res. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Chloe Drewett, Melissa Oxlad, Martha Augoustinos |
Breaking the silence on sexual harassment and assault: An analysis of #MeToo tweets. |
Comput. Hum. Behav. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Hannah Stevens, Irena Acic, Laramie D. Taylor |
Uncivil Reactions to Sexual Assault Online: Linguistic Features of News Reports Predict Discourse Incivility. |
Cyberpsychology Behav. Soc. Netw. |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Hyanghee Park, Joonhwan Lee |
Designing a Conversational Agent for Sexual Assault Survivors: Defining Burden of Self-Disclosure and Envisioning Survivor-Centered Solutions. |
CHI |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Viet Duong, Phu Pham, Ritwik Bose, Jiebo Luo |
#MeToo on Campus: Studying College Sexual Assault at Scale Using Data Reported on Social Media. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
27 | Borke Obada-Obieh, Lucrezia Spagnolo, Konstantin Beznosov |
Towards Understanding Privacy and Trust in Online Reporting of Sexual Assault. |
SOUPS @ USENIX Security Symposium |
2020 |
DBLP BibTeX RDF |
|
27 | Bhashithe Abeysinghe, Yannick Veilleux-Lepage, Mia M. Bloom, Rajshekhar Sunderraman |
A Semantic Segmentation Approach to Recognize Assault Rifles in ISIS Propaganda Images. |
ICSC |
2020 |
DBLP DOI BibTeX RDF |
|
27 | William F. Murphy |
Investigating the incidence of sexual assault in martial arts coaching using media reports. |
Digit. Investig. |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Qizhen Zhou, Chenshu Wu, Jianchun Xing, Shuo Zhao, Qiliang Yang |
Enabling Noninvasive Physical Assault Monitoring in Smart School with Commercial Wi-Fi Devices. |
Wirel. Commun. Mob. Comput. |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Saeed Ahmed 0002, Youngdoo Lee, Seung Ho Hyun, Insoo Koo |
Unsupervised Machine Learning-Based Detection of Covert Data Integrity Assault in Smart Grid Networks Utilizing Isolation Forest. |
IEEE Trans. Inf. Forensics Secur. |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Ron Artstein, Carla Gordon, Usman Sohail, Chirag Merchant, Andrew Jones 0001, Julia Campbell, Matthew Trimmer, Jeffrey Bevington, Christopher Engen, David R. Traum |
Digital survivor of sexual assault. |
IUI |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Stephen J. Flusberg, Sarah Husney, Casey Pollard, Kevin Holmes |
How victim framing shapes attitudes towards sexual assault. |
CogSci |
2019 |
DBLP BibTeX RDF |
|
27 | Rahul Deb Mohalder, Md. Anisur Rahman, Apu Saha |
An IoT Based Approach against Physical and Mental Assault in Educational Institution. |
ICCCNT |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Kelwin Fernandes, Jaime S. Cardoso 0001, Birgitte Schmidt Astrup |
A deep learning approach for the forensic evaluation of sexual assault. |
Pattern Anal. Appl. |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Julia Skinner, Melissa R. Gross |
The ISSAS Model: Understanding the Information Needs of Sexual Assault Survivors on College Campuses. |
Coll. Res. Libr. |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Zehao Sun, Shaojie Tang 0001, He Huang 0001, Zhenyu Zhu, Hansong Guo, Yu-e Sun, Liusheng Huang |
SOS: Real-time and accurate physical assault detection using smartphone. |
Peer-to-Peer Netw. Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Manisha Mohan, Misha Sra, Chris Schmandt |
Technological interventions to detect, communicate and deter sexual assault. |
ISWC |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Rosemary Pennington, Jessica Birthisel |
When new media make news: Framing technology and sexual assault in the Steubenville rape case. |
New Media Soc. |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Siou-Jhen Tang, Shu-Jin Jhan, Siou-Ji Chen, Ai-Ru Lan, Huei-Jhu You, Huei-Lan Jhang, Fang-Shan Li |
Emergency Information Systems for Performance Assessment Value Before and After the Child Abuse and Sexual Assault of Time After Medical Intervention. |
Nursing Informatics |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Jiyong Park, Junetae Kim, Byungtae Lee |
Are uber really to blame for sexual assault?: evidence from New York city. |
ICEC |
2016 |
DBLP DOI BibTeX RDF |
|
27 | David Bruce Borenstein, Peter Ringel, Marek Basler, Ned S. Wingreen |
Established Microbial Colonies Can Survive Type VI Secretion Assault. |
PLoS Comput. Biol. |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Zehao Sun, Shaojie Tang 0001, He Huang 0001, Liusheng Huang, Zhenyu Zhu, Hansong Guo, Yu-e Sun |
iProtect: Detecting Physical Assault Using Smartphone. |
WASA |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Helena Miranda, Laura Punnett, Rebecca J. Gore |
Musculoskeletal Pain and Reported Workplace Assault: A Prospective Study of Clinical Staff in Nursing Homes. |
Hum. Factors |
2014 |
DBLP DOI BibTeX RDF |
|
27 | David Matsumoto, Hyisung C. Hwang |
Differences between individuals with and without experience with assault in identifying facial signs of imminent aggression. |
ISI |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Ihsan Sabuncuoglu, Gökhan Virlan |
Modeling and analyzing army air assault operations via simulation. |
Simul. |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Clyde G. Booker |
Review of The Attack on the Liberty: The Untold Story of Israel's Deadly 1967 Assault on a U.S. Spy Ship by James Scott. |
Cryptologia |
2010 |
DBLP DOI BibTeX RDF |
|
27 | Radha-Krishna Balla, Alan Fern |
UCT for Tactical Assault Planning in Real-Time Strategy Games. |
IJCAI |
2009 |
DBLP BibTeX RDF |
|
27 | Michael A. Caloyannides |
The Assault on Logic. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Stig W. Jorgensen |
Is MT translation? Reflections on a recent assault. |
J. Exp. Theor. Artif. Intell. |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Stephen H. Unger |
The assault on IEEE ethics support [Viewpoint]. |
IEEE Technol. Soc. Mag. |
1999 |
DBLP DOI BibTeX RDF |
|
27 | Jill Gerhardt-Powals, Matthew H. Powals |
The digital millennium copyright act: an international assault on fair use? |
ITiCSE |
1999 |
DBLP DOI BibTeX RDF |
|
27 | William R. Oliver, Julian G. Rosenman, Aziz A. Boxwala, P. David Stotts, John Smith, Mitchell Soltys, James Symon, Tim J. Cullip, Glenn Wagner |
Applications of image processing and visualization in the evaluation of murder and assault. |
VBC |
1994 |
DBLP DOI BibTeX RDF |
|
27 | Dennis P. Salerno, Thomas F. Washer II |
Desert Storm: air assault communications. |
IEEE Commun. Mag. |
1992 |
DBLP DOI BibTeX RDF |
|
27 | Paul Gray |
Robbery and Assault of Bus Drivers. |
Oper. Res. |
1971 |
DBLP DOI BibTeX RDF |
|
27 | Mel Skinner |
Letters to the editor: A tactical assault on systems procurement. |
Commun. ACM |
1968 |
DBLP DOI BibTeX RDF |
|
20 | Michael S. Ryoo, Jake K. Aggarwal |
Semantic Representation and Recognition of Continued and Recursive Human Activities. |
Int. J. Comput. Vis. |
2009 |
DBLP DOI BibTeX RDF |
Semantic-level video analysis, Hierarchical action recognition, Event detection, Human activity recognition |
20 | Kenneth H. Buetow |
Enabling the Molecular Medicine Revolution Through Network-Centric Biomedicine. |
DILS |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Yi Xie 0002, Shun-Zheng Yu |
Detecting Shrew HTTP Flood Attacks for Flash Crowds. |
International Conference on Computational Science (1) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Melanie Baljko, John Kamevaar, Nell Tenhaaf |
Sound for A-Life Agents. |
ACII |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Jakob Eriksson, Michalis Faloutsos, Srikanth V. Krishnamurthy |
Routing amid Colluding Attackers. |
ICNP |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Authentication for Paranoids: Multi-party Secret Handshakes. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Michael Hilker, Christoph Schommer |
Description of bad-signatures for network intrusion detection. |
ACSW |
2006 |
DBLP BibTeX RDF |
data streams, anomaly detection, artificial immune system, network intrusion detection |
20 | Shankar Krishnamoorthy |
Insights and perspectives on physical synthesis. |
ISPD |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Simon Foley 0002 |
Technology and knowledge: the affirmation of power. |
AI Soc. |
2004 |
DBLP DOI BibTeX RDF |
Power, Technology, Knowledge, Work, Modernity |
20 | Victor A. Skormin, James Moronski, Dennis L. McGee, Douglas H. Summerville |
Biological Approach to System Information Security (BASIS): A Multi-agent Approach to Information Security. |
CEEMAS |
2003 |
DBLP DOI BibTeX RDF |
|
20 | John W. Lockwood, James Moscola, David Reddick, Matthew Kulig, Tim Brooks |
Application of Hardware Accelerated Extensible Network Nodes for Internet Worm and Virus Protection. |
IWAN |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Christos H. Papadimitriou |
The Joy of Theory. |
STOC |
2002 |
DBLP DOI BibTeX RDF |
|
20 | L. Jean Camp, Helen Nissenbaum, Cathleen McGrath |
Trust: A Collision of Paradigms. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
|
20 | Richard H. Stern |
Napster: A Walking Copyright Infringement? |
IEEE Micro |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Jill Gerhardt-Powals, Matthew H. Powals |
Distance education: law attempts to catch up with technology (battle between copyright owners and academics). |
SIGCSE |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Richard A. DeMillo |
Software development for next generation communication networks. |
SIGSOFT FSE |
2000 |
DBLP DOI BibTeX RDF |
|