|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1042 occurrences of 761 keywords
|
|
|
Results
Found 1762 publication records. Showing 1762 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Jens R. Calamé, Natalia Ioustinova, Jaco van de Pol, Natalia Sidorova |
Bug Hunting with False Negatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IFM ![In: Integrated Formal Methods, 6th International Conference, IFM 2007, Oxford, UK, July 2-5, 2007, Proceedings, pp. 98-117, 2007, Springer, 978-3-540-73209-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Soyeon Park, Shan Lu 0001, Yuanyuan Zhou 0001 |
CTrigger: exposing atomicity violation bugs from their hiding places. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2009, Washington, DC, USA, March 7-11, 2009, pp. 25-36, 2009, ACM, 978-1-60558-406-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
software testing, concurrency bug |
59 | Lee Chew, David Lie |
Kivati: fast detection and prevention of atomicity violations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: European Conference on Computer Systems, Proceedings of the 5th European conference on Computer systems, EuroSys 2010, Paris, France, April 13-16, 2010, pp. 307-320, 2010, ACM, 978-1-60558-577-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
kivati, watchpoint, atomicity violation |
50 | Akinori Abe, Hiromi Itoh Ozaku, Noriaki Kuwahara, Kiyoshi Kogure |
Scenario Violation in Nursing Activities: Nursing Risk Management from the Viewpoint of Chance Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 11(8), pp. 799-809, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Nursing risk management, Scenario violation, Scenario, Abduction, Chance Discovery |
50 | Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix |
Security policy compliance with violation management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FMSE ![In: Proceedings of the 2007 ACM workshop on Formal methods in security engineering, FMSE 2007, Fairfax, VA, USA, November 2, 2007, pp. 31-40, 2007, ACM, 978-1-59593-887-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
labeled kripke structure, temporal logic, security policy, deontic logic, violation |
47 | Shyam K. Gupta 0001, Sankalp Dubey, Vikram Goyal, Anand Gupta |
A System to test malafide intension based on privacy violation detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIM ![In: First IEEE International Conference on Digital Information Management (ICDIM), December 6-8, 2006, Christ College, Bangalore, India, Proceedings, pp. 47-54, 2006, IEEE, 1-4244-0682-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Ahmed Awad 0001, Matthias Weidlich 0001, Mathias Weske |
Specification, Verification and Explanation of Violation for Data Aware Compliance Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSOC/ServiceWave ![In: Service-Oriented Computing, 7th International Joint Conference, ICSOC-ServiceWave 2009, Stockholm, Sweden, November 24-27, 2009. Proceedings, pp. 500-515, 2009, 978-3-642-10382-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Business Process Querying, Violation Explanation, Temporal Logic Querying, Compliance Checking |
42 | Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shayan Arani, A. Ege Engin, Chung-Kuan Cheng |
Predicting the worst-case voltage violation in a 3D power network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SLIP ![In: The 11th International Workshop on System-Level Interconnect Prediction (SLIP 2009), San Francisco, CA, USA, July 26-27, 2009, Proceedings, pp. 93-98, 2009, ACM, 978-1-60558-576-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
worst case violation prediction, integer linear programming, leakage, clock gating, power networks |
42 | Chang-Seo Park, Koushik Sen |
Randomized active atomicity violation detection in concurrent programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGSOFT FSE ![In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2008, Atlanta, Georgia, USA, November 9-14, 2008, pp. 135-145, 2008, ACM, 978-1-59593-995-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
atomicity violation detection, concurrency, dynamic analysis, random testing |
42 | Yee-Loo Foo, Hiroyuki Morikawa |
On the Use of Manchester Violation Test in Detecting Collision. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking. Towards Ubiquitous Networking and Services, International Conference, ICOIN 2007, Estoril, Portugal, January 23-25, 2007. Revised Selected Papers, pp. 729-740, 2007, Springer, 978-3-540-89523-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Wireless radio, service/device discovery, concurrent transmissions, collision detection and resolution, Manchester coding and violation, capture effect |
42 | Aloysius K. Mok, Guangtian Liu |
Early detection of timing constraint violation at runtime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSS ![In: Proceedings of the 18th IEEE Real-Time Systems Symposium (RTSS '97), December 3-5, 1997, San Francisco, CA, USA, pp. 176-185, 1997, IEEE Computer Society, 0-8186-8268-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
timing constraint violation detection, timing constraint compliance, conditional guarantees, satisfiability checking algorithm, timing constraint monitoring, time terms, timing constraint specification, real-time systems, real time applications |
40 | Guido Boella, Leendert W. N. van der Torre |
An Attacker Model for Normative Multi-agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEEMAS ![In: Multi-Agent Systems and Applications V, 5th International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2007, Leipzig, Germany, September 25-27, 2007, Proceedings, pp. 42-51, 2007, Springer, 978-3-540-75253-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Gustavo Neuberger, Gilson I. Wirth, Ricardo Reis 0001 |
Protecting digital circuits against hold time violation due to process variability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SBCCI ![In: Proceedings of the 22st Annual Symposium on Integrated Circuits and Systems Design: Chip on the Dunes, SBCCI 2009, Natal, Brazil, August 31 - September 3, 2009, 2009, ACM, 978-1-60558-705-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
flip-flop characterization, hold time violations, race immunity, clock skew, process variability |
39 | Shahnaza Tursunova, Young-Tak Kim |
UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: 5th ACIS International Conference on Software Engineering Research, Management & Applications (SERA 2007), August 20-22, 2007, Haeundae Grand Hotel, Busan, Korea, pp. 61-67, 2007, IEEE Computer Society, 0-7695-2867-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Mohamed Ahmed 0001, Daniele Quercia, Stephen Hailes |
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOWMOM ![In: 2005 International Conference on a World of Wireless, Mobile and Multimedia Networks (WOWMOM 2005), 13-16 June 2005, Taormina, Italy, Proceedings, pp. 598-602, 2005, IEEE Computer Society, 0-7695-2342-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Leendert W. N. van der Torre |
Violation Contexts and Deontic Independence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CONTEXT ![In: Modeling and Using Context, Second International and Interdisciplinary Conference, CONTEXT'99, Trento, Italy, September 1999, Proceedings, pp. 361-374, 1999, Springer, 3-540-66432-7. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
38 | Sangmin Park, Richard W. Vuduc, Mary Jean Harrold |
Falcon: fault localization in concurrent programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE (1) ![In: Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering - Volume 1, ICSE 2010, Cape Town, South Africa, 1-8 May 2010, pp. 245-254, 2010, ACM, 978-1-60558-719-6. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
order violation, concurrency, debugging, fault localization, atomicity violation |
38 | Salim Chowdhury, John Lillis |
Repeater insertion for concurrent setup and hold time violations with power-delay trade-off. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPD ![In: Proceedings of the 2007 International Symposium on Physical Design, ISPD 2007, Austin, Texas, USA, March 18-21, 2007, pp. 59-66, 2007, ACM, 978-1-59593-613-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
early-mode timing, hold violation, late-mode timing, setup violation, timing optimization, repeater insertion |
38 | Lai Xu 0001 |
A multi-party contract model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGecom Exch. ![In: SIGecom Exch. 5(1), pp. 13-23, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
contract violation, detecting contract violation, e-contract |
35 | Yanjun Zuo, Timothy O'Keefe |
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 9(5), pp. 451-467, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Information privacy protection, Privacy violation detection, Privacy-enhanced operating system, Information post-release control |
34 | Nils Ulltveit-Moe, Vladimir A. Oleshchuk |
Privacy Violation Classification of Snort Ruleset. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDP ![In: Proceedings of the 18th Euromicro Conference on Parallel, Distributed and Network-based Processing, PDP 2010, Pisa, Italy, February 17-19, 2010, pp. 654-658, 2010, IEEE Computer Society, 978-0-7695-3939-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy violation, classification, IDS, rules |
34 | Richard H. Stern |
West Coast Federal Appeals Court Upholds Chip Protection Act Violation Finding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 27(1), pp. 124-126, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
antitrust violation, Semiconductor Chip Protection Act, chip piracy, monopoly, Altera, Clear Logic, reverse engineering, ASICs, law, bitstream |
34 | Leonard Barolli, Akio Koyama, Takako Yamada, Shoichi Yokoyama |
An Intelligent Fuzzy Routing Scheme for Improving ATM Networks Performance Using Violation Tagging Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 11th International Workshop on Database and Expert Systems Applications (DEXA'00), 6-8 September 2000, Greenwich, London, UK, pp. 5-9, 2000, IEEE Computer Society, 0-7695-0680-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
intelligent fuzzy routing scheme, ATM network performance improvement, violation tagging function, traffic control design, genetic algorithms, simulations, neural networks, fuzzy logic, network management, high speed networks, telecommunication network routing, intelligent algorithms |
32 | Lap Chi Lau, Mohit Singh |
Additive approximation for bounded degree survivable network design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STOC ![In: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, Victoria, British Columbia, Canada, May 17-20, 2008, pp. 759-768, 2008, ACM, 978-1-60558-047-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
approximation algorithms, steiner tree, bounded degree, iterative rounding, survivable network design |
32 | D.-L. Pham, Shinji Sugawara, Tetsuya Miki |
A new scheduler for real-time applications in differentiated services networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 2841-2846, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | |
An Intrusion Detection System for AODV. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 16-20 June 2005, Shanghai, China, pp. 358-365, 2005, IEEE Computer Society, 0-7695-2284-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Norman R. Nielsen, Brian Ruder, David H. Brandin |
Effective safeguards for computer system integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1976 National Computer Conference, 7-10 June 1976, New York, NY, USA, pp. 75-84, 1976, AFIPS Press, 978-1-4503-7917-5. The full citation details ...](Pics/full.jpeg) |
1976 |
DBLP DOI BibTeX RDF |
|
31 | Hector Miguel Chavez, Wuwei Shen, Shaoying Liu |
An approach to detection of UML-based ownership violation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 541-542, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
UML, Eclipse, class diagram, ownership, model checker |
31 | Masaru Takesue |
A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2008, August 25-31, 2008, Cap Esterel, France, pp. 133-138, 2008, IEEE Computer Society, 978-0-7695-3329-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Pedro Alípio, José Neves 0001, Paulo Carvalho 0002 |
Automatic Detection of SLS Violation Using Knowledge Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 10th International Conference, KES 2006, Bournemouth, UK, October 9-11, 2006, Proceedings, Part I, pp. 1083-1089, 2006, Springer, 3-540-46535-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Service Level Specification, Self-configuration Networks, Quality of Service, Knowledge based Systems |
31 | Vikram Goyal, Shyam K. Gupta 0001, Shobhit Saxena |
Query rewriting for detection of privacy violation through inferencing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PST ![In: Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, PST 2006, Markham, Ontario, Canada, October 30 - November 1, 2006, pp. 28, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Bharat Bhushan, Jane Hall, Pascal Kurtansky, Burkhard Stiller |
Operations Support System for End-to-End QoS Reporting and SLA Violation Monitoring in Mobile Services Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QofIS ![In: Quality of Service in the Emerging Networking Panorama: Fifth International Workshop on Quality of Future Internet Services, QofIS 2004 and First Workshop on Quality of Service Routing WQoSR 2004 and Fourth International Workshop on Internet Charging and QoS Technology, ICQT 2004, Barcelona, Catalonia, Spain, September 29 - October 1, 2004, Proceedings, pp. 378-387, 2004, Springer, 3-540-23238-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Zahra Rezaei Khavas, Russell Perkins, Seyed Reza Ahmadzadeh, Paul Robinette |
Moral-Trust Violation vs Performance-Trust Violation by a Robot: Which Hurts More? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2110.04418, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP BibTeX RDF |
|
30 | Chatchalita Asavanant, Hiroyuki Umemuro |
Personal Space Violation by a Robot: An Application of Expectation Violation Theory in Human-Robot Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RO-MAN ![In: 30th IEEE International Conference on Robot & Human Interactive Communication, RO-MAN 2021, Vancouver, BC, Canada, August 8-12, 2021, pp. 1181-1188, 2021, IEEE, 978-1-6654-0492-1. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Farah Dernaika |
A posteriori log analysis and security rules violation detection. (Analyse à posteriori des logs et détection de violation des règles de sécurité). ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
RDF |
|
27 | Yang Chen 0001, Xiao Wang, Xiaoxiao Song, Eng Keong Lua, Cong Shi, Xiaohan Zhao, Beixing Deng, Xing Li 0001 |
Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 313-325, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Network Coordinate System, Dot Product, Weighted Model, P2P, Triangle Inequality Violation |
27 | Shrirang K. Karandikar, Charles J. Alpert, Mehmet Can Yildiz, Paul Villarrubia, Stephen T. Quay, T. Mahmud |
Fast Electrical Correction Using Resizing and Buffering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASP-DAC ![In: Proceedings of the 12th Conference on Asia South Pacific Design Automation, ASP-DAC 2007, Yokohama, Japan, January 23-26, 2007, pp. 553-558, 2007, IEEE Computer Society, 1-4244-0629-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
electrical violation eliminator, fast electrical correction, electrical state |
27 | Chia-Cheng Hu |
Bandwidth-Satisfied Multicast Services in Large-Scale MANETs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSOS ![In: Self-Organizing Systems, Second International Workshop, IWSOS 2007, The Lake District, UK, September 11-13, 2007, Proceedings, pp. 176-192, 2007, Springer, 978-3-540-74916-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
bandwidth violation, quality-of-service, Ad-hoc network, integer linear programming, multicast protocol |
27 | Shan Lu 0001, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou 0001 |
AVIO: detecting atomicity violations via access interleaving invariants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 12th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2006, San Jose, CA, USA, October 21-25, 2006, pp. 37-48, 2006, ACM, 1-59593-451-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
concurrent program, hardware support, concurrency bug, bug detection, program invariant, atomicity violation |
27 | Abdelhakim Hafid, Gregor von Bochmann |
Quality-of-Service Adaptation in Distributed Multimedia Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 6(5), pp. 299-315, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Quality of service, Adaptation, Recovery, Violation |
27 | Nasser Kalantery |
Parallel discrete event processing of sequential computations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 11-13 December 1997, Seoul, Korea, Proceedings, pp. 67-72, 1997, IEEE Computer Society, 0-8186-8227-2. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
parallel discrete event processing, discrete event methods, sequential software parallelization, optimistic execution strategy, temporal coordinate system, logical time mechanism, adaptive synchronisation, data dependent parallelism, conditional parallelism, coherency violation, coarse grain mapping, parallel discrete event simulation, program control structures, program control structure, sequential computations |
27 | Patrick C. K. Hung, Kamalakar Karlapalem |
A Paradigm for Security Enforcement in CapBasED-AMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoopIS ![In: Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, Kiawah Island, South Carolina, USA, June 24-27, 1997, Sponsored by IFCIS, The Intn'l Foundation on Cooperative Information Systems, pp. 79-88, 1997, IEEE Computer Society, 0-8186-7946-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access |
27 | Peter Wohl, John A. Waicukauski |
Using ATPG for clock rules checking in complex scan design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTS ![In: 15th IEEE VLSI Test Symposium (VTS'97), April 27-May 1, 1997, Monterey, California, USA, pp. 130-136, 1997, IEEE Computer Society, 0-8186-7810-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
clock rules checking, complex scan designs, structured DFT, automated design-rules-checking, robust set of rules, clock-rule-violation detection, fast clock verification, large microprocessor design, topological circuit analysis, zero delay, user controlled verification, capture ability, port contention, cone tracing, equivalent sources, ATPG, race conditions, computer testing, timing verification |
27 | Shing-Chi Cheung, Jeff Kramer |
Checking Subsystem Safety Properties in Compositional Reachability Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 18th International Conference on Software Engineering, Berlin, Germany, March 25-29, 1996, Proceedings., pp. 144-154, 1996, IEEE Computer Society, 0-8186-7246-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
automated method, compositional reachability analysis, evolutionary change, gas station system, globally observable actions, hierarchical subsystem composition, safety property violation, subsystem safety property checking, undefined state, software engineering, software architecture, software developers, distributed processing, program analysis, finite state machines, finite-state machines, safety, distributed program, reachability analysis, program diagnostics, interacting processes |
27 | Kelvin K. Lee, Samuel T. Chanson |
Transient analysis of cell loss control mechanisms in ATM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCCN ![In: Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), September 20-23, 1995, Las Vegas, Nevada, USA, pp. 240, 1995, IEEE Computer Society, 0-8186-7180-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
cell loss control mechanisms, partial buffer sharing, cell loss control mechanism, threshold-based loss balancing, violation probability, ATM networks, transient analysis, transient analysis, TLB, network utilization, queue length distributions, PBS |
24 | Andreas Gehlert, Antonio Bucchiarone, Raman Kazhamiakin, Andreas Metzger, Marco Pistore, Klaus Pohl |
Exploiting assumption-based verification for the adaptation of service-based applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 2430-2437, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
verification, monitoring, service-oriented computing |
24 | Somsak Kittipiyakul, Petros Elia, Tara Javidi |
High-SNR Analysis of Outage-Limited Communications With Bursty and Delay-Limited Information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 55(2), pp. 746-763, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Yang Chen 0024, Omprakash Gnawali, Maria A. Kazandjieva, Philip Alexander Levis, John Regehr |
Surviving sensor network software faults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, SOSP 2009, Big Sky, Montana, USA, October 11-14, 2009, pp. 235-246, 2009, ACM, 978-1-60558-752-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
deputy, reboot, wireless sensor networks, reliability, kernel, tinyos, nesc |
24 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMVA ![In: Detection of Intrusions and Malware, and Vulnerability Assessment, 6th International Conference, DIMVA 2009, Como, Italy, July 9-10, 2009. Proceedings, pp. 48-67, 2009, Springer, 978-3-642-02917-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
24 | Fei Pu, Yan Zhang |
Localizing Program Errors via Slicing and Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 187-196, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | |
Beamforming Applied to New Cooperative Decode-and-Forward Relay Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VTC Spring ![In: Proceedings of the 67th IEEE Vehicular Technology Conference, VTC Spring 2008, 11-14 May 2008, Singapore, pp. 2421-2425, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta |
A Unified Audit Expression Model for Auditing SQL Queries. (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
DBSec ![In: Data and Applications Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Applications Security, London, UK, July 13-16, 2008, Proceedings, pp. 33-47, 2008, Springer, 978-3-540-70566-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas |
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2008, 13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings, pp. 207-222, 2008, Springer, 978-3-540-88312-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Random Utility Models, Privacy, Risk Modeling, Insurance |
24 | Bo Xiao, Danpin Yu, Lei Zhang 0038, Xin Tian 0001, Song Gao, Sanyou Zeng |
A Constrained Dynamic Evolutionary Algorithm with Adaptive Penalty Coefficient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HAIS ![In: Hybrid Artificial Intelligence Systems, Third International Workshop, HAIS 2008, Burgos, Spain, September 24-26, 2008. Proceedings, pp. 103-112, 2008, Springer, 978-3-540-87655-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Kwang-Baek Kim, Choong Shik Park, Young Woon Woo |
Recognition of Car License Plates Using Morphological Features, Color Information and an Enhanced FCM Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2007, 4th International Symposium on Neural Networks, ISNN 2007, Nanjing, China, June 3-7, 2007, Proceedings, Part II, pp. 756-764, 2007, Springer, 978-3-540-72392-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Willem Jan van Hoeve, Gilles Pesant, Louis-Martin Rousseau |
On global warming: Flow-based soft global constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Heuristics ![In: J. Heuristics 12(4-5), pp. 347-373, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network flows, Global constraints, Soft constraints |
24 | David Owen 0002, Dejan Desovski, Bojan Cukic |
Effectively Combining Software Verification Strategies: Understanding Different Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSRE ![In: 17th International Symposium on Software Reliability Engineering (ISSRE 2006), 7-10 November 2006, Raleigh, North Carolina, USA, pp. 321-330, 2006, IEEE Computer Society, 0-7695-2684-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Honguk Woo, Aloysius K. Mok, Chan-Gun Lee |
A Generic Framework for Monitoring Timing Constraints over Uncertain Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RTSS ![In: Proceedings of the 27th IEEE Real-Time Systems Symposium (RTSS 2006), 5-8 December 2006, Rio de Janeiro, Brazil, pp. 435-444, 2006, IEEE Computer Society, 0-7695-2761-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | |
An Efficient Method of Eliminating Noisy Information in Web Pages for Data Mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 2004 International Conference on Computer and Information Technology (CIT 2004), 14-16 September 2004, Wuhan, China, pp. 978-985, 2004, IEEE Computer Society, 0-7695-2216-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Sabu Emmanuel, Mohan S. Kankanhalli |
A digital rights management scheme for broadcast video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Syst. ![In: Multim. Syst. 8(6), pp. 444-458, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Subscriber's rights protection, Digital watermarks, Copyright protection, Digital rights management, Video watermarking, Pay TV, Digital video broadcasting |
24 | Daniel Rothenstein, Shmuel Zamir |
Imperfect Inspection Games Over Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 109(1-4), pp. 175-192, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Dae-Woon Lim, Sung-Hoon Choi, Joon-Suk Jun |
Automated Detection of All Kinds of Violations at a Street Intersection Using Real Time Individual Vehicle Tracking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIAI ![In: 5th IEEE Southwest Symposium on Image Analysis and Interpretation, SSIAI 2002, Santa Fe, New Mexico, USA, April 7-9, 2002, pp. 126-129, 2002, IEEE Computer Society, 0-7695-1537-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Tracking, Traffic, Enforcement |
24 | Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiris Skevoulis |
Detecting Null Pointer Violations in Java Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 23rd International Computer Software and Applications Conference (COMPSAC '99), 27-19 October 1999, Phoenix, AZ, USA, pp. 456-461, 1999, IEEE Computer Society, 0-7695-0368-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Constance L. Heitmeyer, James Kirby, Bruce G. Labaw, Myla Archer, Ramesh Bharadwaj |
Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 24(11), pp. 927-948, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
simulation, model checking, verification, formal methods, specification, abstraction, Requirements, consistency checking, safety analysis, SCR |
23 | Ahmed Awad 0001, Sergey Smirnov 0002, Mathias Weske |
Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (1) ![In: On the Move to Meaningful Internet Systems: OTM 2009, Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009, Vilamoura, Portugal, November 1-6, 2009, Proceedings, Part I, pp. 6-23, 2009, Springer, 978-3-642-05147-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
process model parsing, process model restructuring, Business process modeling, compliance checking |
23 | Tim Murray Browne, Charles Fox |
Global Expectation-Violation as Fitness Function in Evolutionary Composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EvoWorkshops ![In: Applications of Evolutionary Computing, EvoWorkshops 2009: EvoCOMNET, EvoENVIRONMENT, EvoFIN, EvoGAMES, EvoHOT, EvoIASP, EvoINTERACTION, EvoMUSART, EvoNUM, EvoSTOC, EvoTRANSLOG, Tübingen, Germany, April 15-17, 2009. Proceedings, pp. 538-546, 2009, Springer, 978-3-642-01128-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | MingXue Wang, Kosala Yapa Bandara, Claus Pahl |
Constraint Integration and Violation Handling for BPEL Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIW ![In: Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, 24-28 May 2009, Venice/Mestre, Italy, pp. 337-342, 2009, IEEE Computer Society, 978-0-7695-3613-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Lei Chen 0009, Lifeng Zhou, Hung Keng Pung |
Universal Approximation and QoS Violation Application of Extreme Learning Machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Process. Lett. ![In: Neural Process. Lett. 28(2), pp. 81-95, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Extreme learning machine (ELM), Randomhidden neurons, QoS, Radial basis function (RBF), Feedforward neural network, Universal approximation |
23 | Wanping Zhang, Yi Zhu 0002, Wenjian Yu, Ling Zhang, Rui Shi 0003, He Peng, Zhi Zhu, Lew Chua-Eoan, Rajeev Murgai, Toshiyuki Shibuya, Nuriyoki Ito, Chung-Kuan Cheng |
Finding the Worst Voltage Violation in Multi-Domain Clock Gated Power Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DATE ![In: Design, Automation and Test in Europe, DATE 2008, Munich, Germany, March 10-14, 2008, pp. 537-540, 2008, ACM, 978-3-9810801-3-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger |
Practical Setup Time Violation Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Seventh European Dependable Computing Conference, EDCC-7 2008, Kaunas, Lithuania, 7-9 May 2008, pp. 91-96, 2008, IEEE Computer Society, 978-0-7695-3138-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Stefania Costantini, Arianna Tocchio, Panagiota Tsintza |
Contracts Violation: Justification via Argumentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLIMA ![In: Computational Logic in Multi-Agent Systems, 9th International Workshop, CLIMA IX, Dresden, Germany, September 29-30, 2008. Revised Selected and Invited Papers, pp. 132-153, 2008, Springer, 978-3-642-02733-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Stefanos Gritzalis, Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas |
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 6(4), pp. 197-211, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Optimal contract, Privacy protection, IT outsourcing, Insurance |
23 | Hoesung Ki, Seong-Jin Ahn 0001 |
Study on developing a security violation response checklist for the improvement of internet security management systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 1199-1204, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga |
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 13-16 May 2007, Amman, Jordan, pp. 825-832, 2007, IEEE Computer Society, 1-4244-1030-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Guohui Wang, Bo Zhang 0073, T. S. Eugene Ng |
Towards network triangle inequality violation aware distributed systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 7th ACM SIGCOMM Internet Measurement Conference, IMC 2007, San Diego, California, USA, October 24-26, 2007, pp. 175-188, 2007, ACM, 978-1-59593-908-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
internet delay space, distributed system, analysis, triangle inequality violations, neighbor selection |
23 | Richard H. Stern |
New Jersey federal court holds Qualcomm's unFRANDly acts no antitrust violation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 26(5), pp. 9, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Broadcom, Qualcomm, antitrust law |
23 | Shyam K. Gupta 0001, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta |
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 369-372, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Malafide Intension Based Detection of Privacy Violation in Information System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 365-368, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Hendrik Decker, Davide Martinenghi |
Checking Violation Tolerance of Approaches to Database Integrity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADVIS ![In: Advances in Information Systems, 4th International Conference, ADVIS 2006, Izmir, Turkey, October 18-20, 2006, Proceedings, pp. 139-148, 2006, Springer, 3-540-46291-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Qianxiang Wang, Aditya P. Mathur |
Interceptor Based Constraint Violation Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 12th IEEE International Conference on the Engineering of Computer-Based Systems (ECBS 2005), 4-7 April 2005, Greenbelt, MD, USA, pp. 457-464, 2005, IEEE Computer Society, 0-7695-2308-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Min Xu, Rastislav Bodík, Mark D. Hill |
A serializability violation detector for shared-memory server programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, June 12-15, 2005, pp. 1-14, 2005, ACM, 1-59593-056-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multithreading, serializability, race conditions |
23 | Tayfun Elmas, Serdar Tasiran, Shaz Qadeer |
VYRD: verifYing concurrent programs by runtime refinement-violation detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLDI ![In: Proceedings of the ACM SIGPLAN 2005 Conference on Programming Language Design and Implementation, Chicago, IL, USA, June 12-15, 2005, pp. 27-37, 2005, ACM, 1-59593-056-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
refinement, runtime verification, concurrent data structures |
23 | Zhicheng Zhang, Abir Chaali Djelassi, Frédéric Vanderhaegen |
A comparative study on prediction of human operator violation using neural networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (3) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 2599-2604, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Samuel T. Redwine Jr. |
Dissecting Trust and the Assurance-Violation Dynamic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 331, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsai |
Design for Constraint Violation Detection in Safety-Critical Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 3rd IEEE International Symposium on High-Assurance Systems Engineering (HASE '98), 13-14 November 1998, Washington, D.C, USA, Proceedings, pp. 109-116, 1998, IEEE Computer Society, 0-8186-9221-9. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
design patterns, object-oriented design, Safety-critical systems, implantable medical devices |
23 | Bertrand Cabon, Simon de Givry, Gérard Verfaillie |
Anytime Lower Bounds for Constraint Violation Minimization Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CP ![In: Principles and Practice of Constraint Programming - CP98, 4th International Conference, Pisa, Italy, October 26-30, 1998, Proceedings, pp. 117-131, 1998, Springer, 3-540-65224-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker |
Basic Causes for the Inconsistency Tolerance of Query Answering and Integrity Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: Database and Expert Systems Applications, DEXA, International Workshops, Bilbao, Spain, August 30 - September 3, 2010, pp. 318-322, 2010, IEEE Computer Society, 978-0-7695-4174-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
inconsistency tolerance, answers that have integrity, integrity violation, integrity checking |
19 | Yibo Sun, Ketan Bahulkar, Daihee Kim, Dmytro Zhydkov, Kenneth Chiu |
Towards Realistic Networks for Simulating Large-Scale Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA ![In: IEEE International Symposium on Parallel and Distributed Processing with Applications, ISPA 2010, Taipei, Taiwan, 6-9 September 2010, pp. 95-102, 2010, IEEE Computer Society, 978-1-4244-8095-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Distributed System, Topology Generator, Network Coordinates, Triangle Inequality Violation |
19 | Yongjun Liao, Mohamed Ali Kâafar, Bamba Gueye, François Cantin, Pierre Geurts, Guy Leduc |
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Networking ![In: NETWORKING 2009, 8th International IFIP-TC 6 Networking Conference, Aachen, Germany, May 11-15, 2009. Proceedings, pp. 352-363, 2009, Springer, 978-3-642-01398-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Internet Coordinate System, Decision Trees, Supervised Learning, Triangle Inequality Violation |
19 | Chien Pang Lu, Mango Chia-Tso Chao, Chen Hsing Lo, Chih-Wei Chang |
A metal-only-ECO solver for input-slew and output-loading violations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPD ![In: Proceedings of the 2009 International Symposium on Physical Design, ISPD 2009, San Diego, California, USA, March 29 - April 1, 2009, pp. 191-198, 2009, ACM, 978-1-60558-449-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
input skew violation, output loading, buffer insertion, eco |
19 | Solmaz Kolahi, Laks V. S. Lakshmanan |
On approximating optimum repairs for functional dependency violations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDT ![In: Database Theory - ICDT 2009, 12th International Conference, St. Petersburg, Russia, March 23-25, 2009, Proceedings, pp. 53-62, 2009, ACM, 978-1-60558-423-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
functional dependency violation, approximation algorithm, repair, inconsistent databases |
19 | Cristian Lumezanu, Randolph Baden, Neil Spring, Bobby Bhattacharjee |
Triangle inequality variations in the internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Internet Measurement Conference ![In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, IMC 2009, Chicago, Illinois, USA, November 4-6, 2009, pp. 177-183, 2009, ACM, 978-1-60558-771-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
tiv, latency, variation, triangle inequality violation |
19 | Sriraman Tallam, Chen Tian 0002, Rajiv Gupta 0001, Xiangyu Zhang 0001 |
Avoiding Program Failures Through Safe Execution Perturbations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 152-159, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
avoiding failures, environmental faults, logging/replay tools, bad user requests, heap overflow, atomicity violation |
19 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Precomputation of privacy policy parameters for auditing SQL queries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICUIMC ![In: Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, ICUIMC 2008, Suwon, Korea, January 31 - February 01, 2008, pp. 87-93, 2008, ACM, 978-1-59593-993-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy violation detection, privacy, auditing, compliance, inference control, information disclosure |
19 | László Gál, János Botzheim, László T. Kóczy |
Modified bacterial memetic algorithm used for fuzzy rule base extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSTST ![In: CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008, pp. 425-431, 2008, ACM, 978-1-60558-046-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
BMA with the modified operator execution order, Mamdani-type inference systems, bacterial memetic algorithm (BMA), knot order violation handling, modified BMA (MBMA), fuzzy systems, Levenberg-Marquardt method |
19 | Richard H. Stern |
Coming down the home stretch in the Rambus standardization skullduggery saga: To levy or not to levy royalties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 27(2), pp. 80-82, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Rambus, antitrust violation, skullduggery, Secret Squirrel, DDR SDRAM, JEDEC, standardization, law, patents, SDRAM |
19 | Shan Lu 0001, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou 0001 |
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 27(1), pp. 26-35, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
reliability, testing, debugging, concurrent program, hardware support, concurrency bug, bug detection, program invariant, atomicity violation |
19 | Maria Ebling, Eyal de Lara |
New Products. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pervasive Comput. ![In: IEEE Pervasive Comput. 6(4), pp. 6-7, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Yoggie Pico, Photo Violation Technologies, PhotoViolationMeter, head-mounted cameras, GrandCentral, me.dium |
19 | Christina N. Outlay |
Resizing information systems personnel after IT outsourcing: exploring psychological contracts, violations, and employee outcomes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPR ![In: Proceedings of the 2007 ACM SIGMIS CPR Conference on Computer Personnel Research 2007, April 19-21, 2007, St. Louis, Missouri, USA, pp. 224-227, 2007, ACM, 978-1-59593-641-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
psychological contract violation, strategic information systems planning, IT outsourcing, IS personnel, resizing |
19 | Lai Xu 0001, Manfred A. Jeusfeld, Paul W. P. J. Grefen |
Detection tests for identifying violators of multi-party contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGecom Exch. ![In: SIGecom Exch. 5(3), pp. 19-28, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
contract violation, detecting contract violator, E-contract |
Displaying result #1 - #100 of 1762 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|