The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Violation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1988 (18) 1989-1993 (15) 1994-1996 (21) 1997 (15) 1998 (21) 1999 (18) 2000 (25) 2001 (26) 2002 (51) 2003 (56) 2004 (73) 2005 (112) 2006 (114) 2007 (145) 2008 (159) 2009 (111) 2010 (52) 2011 (27) 2012 (28) 2013 (34) 2014 (22) 2015 (42) 2016 (45) 2017 (42) 2018 (59) 2019 (57) 2020 (70) 2021 (96) 2022 (89) 2023 (97) 2024 (22)
Publication types (Num. hits)
article(586) incollection(3) inproceedings(1168) phdthesis(5)
Venues (Conferences, Journals, ...)
CoRR(92) Symmetry(29) IEEE Trans. Comput. Aided Des....(16) Entropy(15) HICSS(15) Quantum Inf. Process.(14) SAC(14) CogSci(13) DAC(13) IEEE Access(12) DATE(11) ISPD(10) ACC(9) COMPSAC(9) ICCAD(9) ASP-DAC(8) More (+10 of total 937)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1042 occurrences of 761 keywords

Results
Found 1762 publication records. Showing 1762 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
79Jens R. Calamé, Natalia Ioustinova, Jaco van de Pol, Natalia Sidorova Bug Hunting with False Negatives. Search on Bibsonomy IFM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
70Soyeon Park, Shan Lu 0001, Yuanyuan Zhou 0001 CTrigger: exposing atomicity violation bugs from their hiding places. Search on Bibsonomy ASPLOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software testing, concurrency bug
59Lee Chew, David Lie Kivati: fast detection and prevention of atomicity violations. Search on Bibsonomy EuroSys The full citation details ... 2010 DBLP  DOI  BibTeX  RDF kivati, watchpoint, atomicity violation
50Akinori Abe, Hiromi Itoh Ozaku, Noriaki Kuwahara, Kiyoshi Kogure Scenario Violation in Nursing Activities: Nursing Risk Management from the Viewpoint of Chance Discovery. Search on Bibsonomy Soft Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Nursing risk management, Scenario violation, Scenario, Abduction, Chance Discovery
50Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix Security policy compliance with violation management. Search on Bibsonomy FMSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF labeled kripke structure, temporal logic, security policy, deontic logic, violation
47Shyam K. Gupta 0001, Sankalp Dubey, Vikram Goyal, Anand Gupta A System to test malafide intension based on privacy violation detection. Search on Bibsonomy ICDIM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42Ahmed Awad 0001, Matthias Weidlich 0001, Mathias Weske Specification, Verification and Explanation of Violation for Data Aware Compliance Rules. Search on Bibsonomy ICSOC/ServiceWave The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Business Process Querying, Violation Explanation, Temporal Logic Querying, Compliance Checking
42Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shayan Arani, A. Ege Engin, Chung-Kuan Cheng Predicting the worst-case voltage violation in a 3D power network. Search on Bibsonomy SLIP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF worst case violation prediction, integer linear programming, leakage, clock gating, power networks
42Chang-Seo Park, Koushik Sen Randomized active atomicity violation detection in concurrent programs. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF atomicity violation detection, concurrency, dynamic analysis, random testing
42Yee-Loo Foo, Hiroyuki Morikawa On the Use of Manchester Violation Test in Detecting Collision. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wireless radio, service/device discovery, concurrent transmissions, collision detection and resolution, Manchester coding and violation, capture effect
42Aloysius K. Mok, Guangtian Liu Early detection of timing constraint violation at runtime. Search on Bibsonomy RTSS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF timing constraint violation detection, timing constraint compliance, conditional guarantees, satisfiability checking algorithm, timing constraint monitoring, time terms, timing constraint specification, real-time systems, real time applications
40Guido Boella, Leendert W. N. van der Torre An Attacker Model for Normative Multi-agent Systems. Search on Bibsonomy CEEMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Gustavo Neuberger, Gilson I. Wirth, Ricardo Reis 0001 Protecting digital circuits against hold time violation due to process variability. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF flip-flop characterization, hold time violations, race immunity, clock skew, process variability
39Shahnaza Tursunova, Young-Tak Kim UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network Management. Search on Bibsonomy SERA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Mohamed Ahmed 0001, Daniele Quercia, Stephen Hailes A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations. Search on Bibsonomy WOWMOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Leendert W. N. van der Torre Violation Contexts and Deontic Independence. Search on Bibsonomy CONTEXT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
38Sangmin Park, Richard W. Vuduc, Mary Jean Harrold Falcon: fault localization in concurrent programs. Search on Bibsonomy ICSE (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF order violation, concurrency, debugging, fault localization, atomicity violation
38Salim Chowdhury, John Lillis Repeater insertion for concurrent setup and hold time violations with power-delay trade-off. Search on Bibsonomy ISPD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF early-mode timing, hold violation, late-mode timing, setup violation, timing optimization, repeater insertion
38Lai Xu 0001 A multi-party contract model. Search on Bibsonomy SIGecom Exch. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contract violation, detecting contract violation, e-contract
35Yanjun Zuo, Timothy O'Keefe Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Information privacy protection, Privacy violation detection, Privacy-enhanced operating system, Information post-release control
34Nils Ulltveit-Moe, Vladimir A. Oleshchuk Privacy Violation Classification of Snort Ruleset. Search on Bibsonomy PDP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF privacy violation, classification, IDS, rules
34Richard H. Stern West Coast Federal Appeals Court Upholds Chip Protection Act Violation Finding. Search on Bibsonomy IEEE Micro The full citation details ... 2007 DBLP  DOI  BibTeX  RDF antitrust violation, Semiconductor Chip Protection Act, chip piracy, monopoly, Altera, Clear Logic, reverse engineering, ASICs, law, bitstream
34Leonard Barolli, Akio Koyama, Takako Yamada, Shoichi Yokoyama An Intelligent Fuzzy Routing Scheme for Improving ATM Networks Performance Using Violation Tagging Function. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF intelligent fuzzy routing scheme, ATM network performance improvement, violation tagging function, traffic control design, genetic algorithms, simulations, neural networks, fuzzy logic, network management, high speed networks, telecommunication network routing, intelligent algorithms
32Lap Chi Lau, Mohit Singh Additive approximation for bounded degree survivable network design. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF approximation algorithms, steiner tree, bounded degree, iterative rounding, survivable network design
32D.-L. Pham, Shinji Sugawara, Tetsuya Miki A new scheduler for real-time applications in differentiated services networks. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32 An Intrusion Detection System for AODV. Search on Bibsonomy ICECCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Norman R. Nielsen, Brian Ruder, David H. Brandin Effective safeguards for computer system integrity. Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1976 DBLP  DOI  BibTeX  RDF
31Hector Miguel Chavez, Wuwei Shen, Shaoying Liu An approach to detection of UML-based ownership violation. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF UML, Eclipse, class diagram, ownership, model checker
31Masaru Takesue A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
31Pedro Alípio, José Neves 0001, Paulo Carvalho 0002 Automatic Detection of SLS Violation Using Knowledge Based Systems. Search on Bibsonomy KES (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Service Level Specification, Self-configuration Networks, Quality of Service, Knowledge based Systems
31Vikram Goyal, Shyam K. Gupta 0001, Shobhit Saxena Query rewriting for detection of privacy violation through inferencing. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
31Bharat Bhushan, Jane Hall, Pascal Kurtansky, Burkhard Stiller Operations Support System for End-to-End QoS Reporting and SLA Violation Monitoring in Mobile Services Environment. Search on Bibsonomy QofIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
30Zahra Rezaei Khavas, Russell Perkins, Seyed Reza Ahmadzadeh, Paul Robinette Moral-Trust Violation vs Performance-Trust Violation by a Robot: Which Hurts More? Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
30Chatchalita Asavanant, Hiroyuki Umemuro Personal Space Violation by a Robot: An Application of Expectation Violation Theory in Human-Robot Interaction. Search on Bibsonomy RO-MAN The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
30Farah Dernaika A posteriori log analysis and security rules violation detection. (Analyse à posteriori des logs et détection de violation des règles de sécurité). Search on Bibsonomy 2020   RDF
27Yang Chen 0001, Xiao Wang, Xiaoxiao Song, Eng Keong Lua, Cong Shi, Xiaohan Zhao, Beixing Deng, Xing Li 0001 Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Network Coordinate System, Dot Product, Weighted Model, P2P, Triangle Inequality Violation
27Shrirang K. Karandikar, Charles J. Alpert, Mehmet Can Yildiz, Paul Villarrubia, Stephen T. Quay, T. Mahmud Fast Electrical Correction Using Resizing and Buffering. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electrical violation eliminator, fast electrical correction, electrical state
27Chia-Cheng Hu Bandwidth-Satisfied Multicast Services in Large-Scale MANETs. Search on Bibsonomy IWSOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bandwidth violation, quality-of-service, Ad-hoc network, integer linear programming, multicast protocol
27Shan Lu 0001, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou 0001 AVIO: detecting atomicity violations via access interleaving invariants. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF concurrent program, hardware support, concurrency bug, bug detection, program invariant, atomicity violation
27Abdelhakim Hafid, Gregor von Bochmann Quality-of-Service Adaptation in Distributed Multimedia Applications. Search on Bibsonomy Multim. Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Quality of service, Adaptation, Recovery, Violation
27Nasser Kalantery Parallel discrete event processing of sequential computations. Search on Bibsonomy ICPADS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF parallel discrete event processing, discrete event methods, sequential software parallelization, optimistic execution strategy, temporal coordinate system, logical time mechanism, adaptive synchronisation, data dependent parallelism, conditional parallelism, coherency violation, coarse grain mapping, parallel discrete event simulation, program control structures, program control structure, sequential computations
27Patrick C. K. Hung, Kamalakar Karlapalem A Paradigm for Security Enforcement in CapBasED-AMS. Search on Bibsonomy CoopIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access
27Peter Wohl, John A. Waicukauski Using ATPG for clock rules checking in complex scan design. Search on Bibsonomy VTS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF clock rules checking, complex scan designs, structured DFT, automated design-rules-checking, robust set of rules, clock-rule-violation detection, fast clock verification, large microprocessor design, topological circuit analysis, zero delay, user controlled verification, capture ability, port contention, cone tracing, equivalent sources, ATPG, race conditions, computer testing, timing verification
27Shing-Chi Cheung, Jeff Kramer Checking Subsystem Safety Properties in Compositional Reachability Analysis. Search on Bibsonomy ICSE The full citation details ... 1996 DBLP  BibTeX  RDF automated method, compositional reachability analysis, evolutionary change, gas station system, globally observable actions, hierarchical subsystem composition, safety property violation, subsystem safety property checking, undefined state, software engineering, software architecture, software developers, distributed processing, program analysis, finite state machines, finite-state machines, safety, distributed program, reachability analysis, program diagnostics, interacting processes
27Kelvin K. Lee, Samuel T. Chanson Transient analysis of cell loss control mechanisms in ATM networks. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF cell loss control mechanisms, partial buffer sharing, cell loss control mechanism, threshold-based loss balancing, violation probability, ATM networks, transient analysis, transient analysis, TLB, network utilization, queue length distributions, PBS
24Andreas Gehlert, Antonio Bucchiarone, Raman Kazhamiakin, Andreas Metzger, Marco Pistore, Klaus Pohl Exploiting assumption-based verification for the adaptation of service-based applications. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF verification, monitoring, service-oriented computing
24Somsak Kittipiyakul, Petros Elia, Tara Javidi High-SNR Analysis of Outage-Limited Communications With Bursty and Delay-Limited Information. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Yang Chen 0024, Omprakash Gnawali, Maria A. Kazandjieva, Philip Alexander Levis, John Regehr Surviving sensor network software faults. Search on Bibsonomy SOSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF deputy, reboot, wireless sensor networks, reliability, kernel, tinyos, nesc
24Chaoting Xuan, John A. Copeland, Raheem A. Beyah Shepherding Loadable Kernel Modules through On-demand Emulation. Search on Bibsonomy DIMVA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor
24Fei Pu, Yan Zhang Localizing Program Errors via Slicing and Reasoning. Search on Bibsonomy HASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24 Beamforming Applied to New Cooperative Decode-and-Forward Relay Schemes. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta A Unified Audit Expression Model for Auditing SQL Queries. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Random Utility Models, Privacy, Risk Modeling, Insurance
24Bo Xiao, Danpin Yu, Lei Zhang 0038, Xin Tian 0001, Song Gao, Sanyou Zeng A Constrained Dynamic Evolutionary Algorithm with Adaptive Penalty Coefficient. Search on Bibsonomy HAIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
24Kwang-Baek Kim, Choong Shik Park, Young Woon Woo Recognition of Car License Plates Using Morphological Features, Color Information and an Enhanced FCM Algorithm. Search on Bibsonomy ISNN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Willem Jan van Hoeve, Gilles Pesant, Louis-Martin Rousseau On global warming: Flow-based soft global constraints. Search on Bibsonomy J. Heuristics The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Network flows, Global constraints, Soft constraints
24David Owen 0002, Dejan Desovski, Bojan Cukic Effectively Combining Software Verification Strategies: Understanding Different Assumptions. Search on Bibsonomy ISSRE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24Honguk Woo, Aloysius K. Mok, Chan-Gun Lee A Generic Framework for Monitoring Timing Constraints over Uncertain Events. Search on Bibsonomy RTSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
24 An Efficient Method of Eliminating Noisy Information in Web Pages for Data Mining. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Sabu Emmanuel, Mohan S. Kankanhalli A digital rights management scheme for broadcast video. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Subscriber's rights protection, Digital watermarks, Copyright protection, Digital rights management, Video watermarking, Pay TV, Digital video broadcasting
24Daniel Rothenstein, Shmuel Zamir Imperfect Inspection Games Over Time. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Dae-Woon Lim, Sung-Hoon Choi, Joon-Suk Jun Automated Detection of All Kinds of Violations at a Street Intersection Using Real Time Individual Vehicle Tracking. Search on Bibsonomy SSIAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Tracking, Traffic, Enforcement
24Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiris Skevoulis Detecting Null Pointer Violations in Java Programs. Search on Bibsonomy COMPSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Constance L. Heitmeyer, James Kirby, Bruce G. Labaw, Myla Archer, Ramesh Bharadwaj Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF simulation, model checking, verification, formal methods, specification, abstraction, Requirements, consistency checking, safety analysis, SCR
23Ahmed Awad 0001, Sergey Smirnov 0002, Mathias Weske Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF process model parsing, process model restructuring, Business process modeling, compliance checking
23Tim Murray Browne, Charles Fox Global Expectation-Violation as Fitness Function in Evolutionary Composition. Search on Bibsonomy EvoWorkshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23MingXue Wang, Kosala Yapa Bandara, Claus Pahl Constraint Integration and Violation Handling for BPEL Processes. Search on Bibsonomy ICIW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
23Lei Chen 0009, Lifeng Zhou, Hung Keng Pung Universal Approximation and QoS Violation Application of Extreme Learning Machine. Search on Bibsonomy Neural Process. Lett. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Extreme learning machine (ELM), Randomhidden neurons, QoS, Radial basis function (RBF), Feedforward neural network, Universal approximation
23Wanping Zhang, Yi Zhu 0002, Wenjian Yu, Ling Zhang, Rui Shi 0003, He Peng, Zhi Zhu, Lew Chua-Eoan, Rajeev Murgai, Toshiyuki Shibuya, Nuriyoki Ito, Chung-Kuan Cheng Finding the Worst Voltage Violation in Multi-Domain Clock Gated Power Network. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger Practical Setup Time Violation Attacks on AES. Search on Bibsonomy EDCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Stefania Costantini, Arianna Tocchio, Panagiota Tsintza Contracts Violation: Justification via Argumentation. Search on Bibsonomy CLIMA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
23Stefanos Gritzalis, Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Optimal contract, Privacy protection, IT outsourcing, Insurance
23Hoesung Ki, Seong-Jin Ahn 0001 Study on developing a security violation response checklist for the improvement of internet security management systems. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. Search on Bibsonomy AICCSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
23Guohui Wang, Bo Zhang 0073, T. S. Eugene Ng Towards network triangle inequality violation aware distributed systems. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internet delay space, distributed system, analysis, triangle inequality violations, neighbor selection
23Richard H. Stern New Jersey federal court holds Qualcomm's unFRANDly acts no antitrust violation. Search on Bibsonomy IEEE Micro The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Broadcom, Qualcomm, antitrust law
23Shyam K. Gupta 0001, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta Malafide Intension Based Detection of Privacy Violation in Information System. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Hendrik Decker, Davide Martinenghi Checking Violation Tolerance of Approaches to Database Integrity. Search on Bibsonomy ADVIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
23Qianxiang Wang, Aditya P. Mathur Interceptor Based Constraint Violation Detection. Search on Bibsonomy ECBS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
23Min Xu, Rastislav Bodík, Mark D. Hill A serializability violation detector for shared-memory server programs. Search on Bibsonomy PLDI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multithreading, serializability, race conditions
23Tayfun Elmas, Serdar Tasiran, Shaz Qadeer VYRD: verifYing concurrent programs by runtime refinement-violation detection. Search on Bibsonomy PLDI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF refinement, runtime verification, concurrent data structures
23Zhicheng Zhang, Abir Chaali Djelassi, Frédéric Vanderhaegen A comparative study on prediction of human operator violation using neural networks. Search on Bibsonomy SMC (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
23Samuel T. Redwine Jr. Dissecting Trust and the Assurance-Violation Dynamic. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
23Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsai Design for Constraint Violation Detection in Safety-Critical Systems. Search on Bibsonomy HASE The full citation details ... 1998 DBLP  DOI  BibTeX  RDF design patterns, object-oriented design, Safety-critical systems, implantable medical devices
23Bertrand Cabon, Simon de Givry, Gérard Verfaillie Anytime Lower Bounds for Constraint Violation Minimization Problems. Search on Bibsonomy CP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Hendrik Decker Basic Causes for the Inconsistency Tolerance of Query Answering and Integrity Checking. Search on Bibsonomy DEXA Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inconsistency tolerance, answers that have integrity, integrity violation, integrity checking
19Yibo Sun, Ketan Bahulkar, Daihee Kim, Dmytro Zhydkov, Kenneth Chiu Towards Realistic Networks for Simulating Large-Scale Distributed Systems. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Distributed System, Topology Generator, Network Coordinates, Triangle Inequality Violation
19Yongjun Liao, Mohamed Ali Kâafar, Bamba Gueye, François Cantin, Pierre Geurts, Guy Leduc Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning. Search on Bibsonomy Networking The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Internet Coordinate System, Decision Trees, Supervised Learning, Triangle Inequality Violation
19Chien Pang Lu, Mango Chia-Tso Chao, Chen Hsing Lo, Chih-Wei Chang A metal-only-ECO solver for input-slew and output-loading violations. Search on Bibsonomy ISPD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF input skew violation, output loading, buffer insertion, eco
19Solmaz Kolahi, Laks V. S. Lakshmanan On approximating optimum repairs for functional dependency violations. Search on Bibsonomy ICDT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF functional dependency violation, approximation algorithm, repair, inconsistent databases
19Cristian Lumezanu, Randolph Baden, Neil Spring, Bobby Bhattacharjee Triangle inequality variations in the internet. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tiv, latency, variation, triangle inequality violation
19Sriraman Tallam, Chen Tian 0002, Rajiv Gupta 0001, Xiangyu Zhang 0001 Avoiding Program Failures Through Safe Execution Perturbations. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF avoiding failures, environmental faults, logging/replay tools, bad user requests, heap overflow, atomicity violation
19Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta Precomputation of privacy policy parameters for auditing SQL queries. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy violation detection, privacy, auditing, compliance, inference control, information disclosure
19László Gál, János Botzheim, László T. Kóczy Modified bacterial memetic algorithm used for fuzzy rule base extraction. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF BMA with the modified operator execution order, Mamdani-type inference systems, bacterial memetic algorithm (BMA), knot order violation handling, modified BMA (MBMA), fuzzy systems, Levenberg-Marquardt method
19Richard H. Stern Coming down the home stretch in the Rambus standardization skullduggery saga: To levy or not to levy royalties. Search on Bibsonomy IEEE Micro The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Rambus, antitrust violation, skullduggery, Secret Squirrel, DDR SDRAM, JEDEC, standardization, law, patents, SDRAM
19Shan Lu 0001, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou 0001 AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. Search on Bibsonomy IEEE Micro The full citation details ... 2007 DBLP  DOI  BibTeX  RDF reliability, testing, debugging, concurrent program, hardware support, concurrency bug, bug detection, program invariant, atomicity violation
19Maria Ebling, Eyal de Lara New Products. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Yoggie Pico, Photo Violation Technologies, PhotoViolationMeter, head-mounted cameras, GrandCentral, me.dium
19Christina N. Outlay Resizing information systems personnel after IT outsourcing: exploring psychological contracts, violations, and employee outcomes. Search on Bibsonomy CPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF psychological contract violation, strategic information systems planning, IT outsourcing, IS personnel, resizing
19Lai Xu 0001, Manfred A. Jeusfeld, Paul W. P. J. Grefen Detection tests for identifying violators of multi-party contracts. Search on Bibsonomy SIGecom Exch. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF contract violation, detecting contract violator, E-contract
Displaying result #1 - #100 of 1762 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license