|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 535 occurrences of 453 keywords
|
|
|
Results
Found 1040 publication records. Showing 1040 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
61 | Daniel M. Berry, Erik Kamsties |
The Dangerous 'All' in Specifications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSSD ![In: Proceedings of the 10th International Workshop on Software Specification and Design, Shelter Island, San Diego, California, USA, November 5-7, 2000, pp. 191-194, 2000, IEEE Computer Society, 0-7695-0884-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP BibTeX RDF |
universal quantifier, indicative sentence, optative sentence, dangerous, true, false |
52 | Hideaki Kanai, Goushi Tsuruma, Toyohisa Nakada, Susumu Kunifuji |
Notification of dangerous situation for elderly people using visual cues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: Proceedings of the 13th International Conference on Intelligent User Interfaces, IUI 2008, Gran Canaria, Canary Islands, Spain, January 13-16, 2008, pp. 345-348, 2008, ACM, 978-1-59593-987-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dangerous situation awareness, elderly person, visual cues |
52 | Marco Santi, Katrin Meinken, Harald Widlroither, Evangelos Bekiaris |
GOOD ROUTE HMI for Actors Involved in Dangerous Goods Transportation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (6) ![In: Universal Access in Human-Computer Interaction. Ambient Interaction, 4th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2007 Held as Part of HCI International 2007 Beijing, China, July 22-27, 2007 Proceedings, Part II, pp. 546-555, 2007, Springer, 978-3-540-73280-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Dangerous Goods, communication and interaction, information and warning strategies, requirements analyses, user centred design, user needs |
45 | Katsuhiro Takata, Yusuke Shina, Hiraku Komuro, Masataka Tanaka, Masanobu Ide, Jianhua Ma 0002 |
Designing a Context-Aware System to Detect Dangerous Situations in School Routes for Kids Outdoor Safety Care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC ![In: Embedded and Ubiquitous Computing - EUC 2005, International Conference EUC 2005, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 1016-1025, 2005, Springer, 3-540-30807-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
43 | Shuichi Fukuda |
Detecting Emotions and Dangerous Actions for Better Human-System Team Working. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SSIRI ![In: Second International Conference on Secure System Integration and Reliability Improvement, SSIRI 2008, July 14-17, 2008, Yokohama, Japan, pp. 205-206, 2008, IEEE Computer Society, 978-0-7695-3266-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Dangerous Action, Human-System Team Working, Emotion, Detection |
43 | Paola Flocchini, David Ilcinkas, Nicola Santoro |
Ping Pong in Dangerous Graphs: Optimal Black Hole Search with Pure Tokens. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 22nd International Symposium, DISC 2008, Arcachon, France, September 22-24, 2008. Proceedings, pp. 227-241, 2008, Springer, 978-3-540-87778-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
dangerous graphs, distributed computing, mobile agents, autonomous robots, graph exploration |
38 | Paul Ammann, Wei Ding 0003, Daling Xu |
Using a Model Checker to Test Safety Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICECCS ![In: 7th International Conference on Engineering of Complex Computer Systems (ICECCS 2001), 11-13 June 2001, Skövde, Sweden, pp. 212-221, 2001, IEEE Computer Society, 0-7695-1159-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Model checking, Software testing, Safety, Mutation analysis |
36 | Jan Capek, Jitka Komarkova |
Trustworthy regional spatial information through web-services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 543-547, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
dangerous failure state, information sources system, safe failure state, trustworthy information, web services |
36 | Mohd A. Bashar, Ganesh Krishnan, Markus G. Kuhn, Eugene H. Spafford, Samuel S. Wagstaff Jr. |
Low-threat security patches and tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 1997 International Conference on Software Maintenance (ICSM '97), 1-3 October 1997, Bari, Italy, Proceedings, pp. 306-313, 1997, IEEE Computer Society, 0-8186-8013-X. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
low-threat security patches, dangerous information, vulnerability information, software vendor, binary program patch, differential application times, cryptoprocessors, enciphered operating systems, synchronization, reverse engineering, customization, security of data, security tools |
35 | Nicola Santoro |
Close Encounters with a Black Hole or Explorations and Gatherings in Dangerous Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FUN ![In: Fun with Algorithms, 4th International Conference, FUN 2007, Castiglioncello, Italy, June 3-5, 2007, Proceedings, pp. 14, 2007, Springer, 978-3-540-72913-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Harmful Host, Anonymous Agents, Robots, Mobile Agents, Asynchronous, Exploration, Tokens, Rendezvous, Anonymous Networks, Whiteboards, Gathering |
35 | Evelina Lamma, Paola Mello, Anna Nanetti, Fabrizio Riguzzi, Sergio Storari, Gianfranco Valastro |
Artificial Intelligence Techniques for Monitoring Dangerous Infections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Technol. Biomed. ![In: IEEE Trans. Inf. Technol. Biomed. 10(1), pp. 143-155, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Yongwu Miao, Heinz Ulrich Hoppe, Niels Pinkwart |
Naughty Agents Can Be Helpful: Training Drivers to Handle Dangerous Situations in Virtual Reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, ICALT 2006, Kerkrade, The Netherlands, July 5-7, 2006, pp. 735-739, 2006, IEEE Computer Society, 0-7695-2632-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Stefan Dobrev, Paola Flocchini, Nicola Santoro |
Cycling Through a Dangerous Network: A Simple Efficient Strategy for Black Hole Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 4-7 July 2006, Lisboa, Portugal, pp. 57, 2006, IEEE Computer Society, 0-7695-2540-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Undetectable Failure, Black Hole Search, Mobile Agents, Malicious Host |
35 | Katsuhiro Takata, Jianhua Ma 0002, Bernady O. Apduhan |
A Dangerous Location Aware System for Assisting Kids Safety Care. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 657-662, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | M. Spirito, Carlo S. Regazzoni, Lucio Marcenaro |
Automatic detection of dangerous events for underground surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Advanced Video and Signal Based Surveillance, 2005 IEEE International Conference on Video and Signal Based Surveillance (AVSS'05), 15-16 September 2005, Como, Italy., pp. 195-200, 2005, IEEE Computer Society, 0-7803-9385-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
35 | Toshihiro Yukawa, Hideharu Okano |
Development of a Robot for the Detection of Plastic Dangerous Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: Proceedings of the 2004 IEEE International Conference on Robotics and Automation, ICRA 2004, April 26 - May 1, 2004, New Orleans, LA, USA, pp. 4869-4874, 2004, IEEE. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
33 | Gianluca Bonifazi, Silvia Cecchini, Enrico Corradini, Lorenzo Giuliani, Domenico Ursino, Luca Virgili |
Correction to: Extracting time patterns from the lifespans of TikTok challenges to characterize non‑dangerous and dangerous ones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soc. Netw. Anal. Min. ![In: Soc. Netw. Anal. Min. 12(1), pp. 142, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Gianluca Bonifazi, Silvia Cecchini, Enrico Corradini, Lorenzo Giuliani, Domenico Ursino, Luca Virgili |
Extracting time patterns from the lifespans of TikTok challenges to characterize non-dangerous and dangerous ones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soc. Netw. Anal. Min. ![In: Soc. Netw. Anal. Min. 12(1), pp. 62, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
33 | Qianying Hou, Lei Wang |
Recognition for Dangerous Goods Vehicles in Road Based on Dangerous Goods Mark Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSIA (2) ![In: Cyber Security Intelligence and Analytics - Proceedings of the 2020 International Conference on Cyber Security Intelligence and Analytics, CSIA 2020, Haikou, China, 28-29 February 2020, Volume 2, pp. 96-101, 2020, Springer, 978-3-030-43308-6. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
33 | Peter Holub |
Beitrag zur Betrachtung des Einflusses der Anforderungen auf die Hazard-Rate unter besonderer Berücksichtigung des Zusammenhangs zwischen Anforderungsrate, Ausfallrate, Probability of Dangerous Failure on Demand, Probability of Dangerous Failure per Hour und Hazard-Rate ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2015 |
DOI RDF |
|
28 | Brian R. Murphy, Vijay Menon 0002, Florian T. Schneider, Tatiana Shpeisman, Ali-Reza Adl-Tabatabai |
Fault-safe code motion for type-safe languages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CGO ![In: Sixth International Symposium on Code Generation and Optimization (CGO 2008), April 5-9, 2008, Boston, MA, USA, pp. 144-154, 2008, ACM, 978-1-59593-978-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
safe code motion, safety dependences, speculative code motion, scheduling, code motion, partial redundancy elimination, intermediate representations |
28 | Jérémie Chalopin, Shantanu Das 0001, Nicola Santoro |
Rendezvous of Mobile Agents in Unknown Graphs with Faulty Links. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 21st International Symposium, DISC 2007, Lemesos, Cyprus, September 24-26, 2007, Proceedings, pp. 108-122, 2007, Springer, 978-3-540-75141-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Nabil R. Adam, Vijayalakshmi Atluri, Vandana Pursnani Janeja, Aabhas V. Paliwal, Mahmoud Youssef, Soon Ae Chun, Jim Cooper, John Paczkowski, Christof Bornhövd, Ike Nassi, Joachim Schaper |
Semantics-based threat structure mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DG.O ![In: Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, California, USA, May 21-24, 2006, pp. 367-368, 2006, Digital Government Research Center. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jens Braband, Rüdiger vom Hövel, Hendrik Schäbe |
Probability of Failure on Demand - The Why and the How. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings, pp. 46-54, 2009, Springer, 978-3-642-04467-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Probability of failure on demand, rate of dangerous failures, safety integrity level |
26 | Paola Flocchini, Matthew Kellett, Peter C. Mason, Nicola Santoro |
Map construction and exploration by mobile agents scattered in a dangerous network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 23rd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2009, Rome, Italy, May 23-29, 2009, pp. 1-10, 2009, IEEE. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Mahmoud Shahrokhi, Alain Bernard |
A fuzzy approach for definition of dangerous zone in industrial systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (7) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 6318-6324, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Gian Luca Foresti, Bruno Pani |
Monitoring Motorway Infrastructures for Detection of Dangerous Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIAP ![In: 1oth International Conference on Image Analysis and Processing (ICIAP 1999), 27-29 September 1999, Venice, Italy, pp. 1144-1147, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
19 | William Enck, Machigar Ongtang, Patrick D. McDaniel |
On lightweight mobile phone application certification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 235-245, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
mobile phone security, malware, android |
19 | Sami Haddadin, Alin Albu-Schäffer, Mirko Frommberger, Gerd Hirzinger |
The role of the robot mass and velocity in physical human-robot interaction - Part II: Constrained blunt impacts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICRA ![In: 2008 IEEE International Conference on Robotics and Automation, ICRA 2008, May 19-23, 2008, Pasadena, California, USA, pp. 1339-1345, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Sungmoon Jeong, Sang-Woo Ban, Minho Lee 0001 |
Autonomous Detector Using Saliency Map Model and Modified Mean-Shift Tracking for a Blind Spot Monitor in a Car. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMLA ![In: Seventh International Conference on Machine Learning and Applications, ICMLA 2008, San Diego, California, USA, 11-13 December 2008, pp. 253-258, 2008, IEEE Computer Society, 978-0-7695-3495-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | A. Sadeqi, Hadi Moradi, Majid Nili Ahmadabadi |
A human-inspired pole climbing robot. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2008 IEEE/RSJ International Conference on Intelligent Robots and Systems, September 22-26, 2008, Acropolis Convention Center, Nice, France, pp. 4199, 2008, IEEE, 978-1-4244-2057-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Vasilios Almaliotis, Alexandros Loizidis, Panagiotis Katsaros, Panagiotis Louridas, Diomidis Spinellis |
Static Program Analysis for Java Card Applets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008. Proceedings, pp. 17-31, 2008, Springer, 978-3-540-85892-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
temporal safety, Java Card, static program analysis |
19 | Bruno Defude, Thierry Delot, José-Luis Zechinelli-Martini, Nicolas Cenerario, Sergio Ilarri |
Extraction de connaissances dans les réseaux ad hoc inter-véhicules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UbiMob ![In: Actes des quatrièmes journées francophones Mobilité et Ubiquité 2008, UBIMOB'08, 28-30 Mai 2008, Institut Universitaire de Technologie Saint Malo, France, pp. 17-20, 2008, ACM, 978-1-59593-980-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
stockage et agrégation des données, VANETs |
19 | Andrew W. Hill, Robert P. Guralnick |
Distributed Systems and Automated Biodiversity Informatics: Genomic Analysis and Geographic Visualization of Disease Evolution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Sharing Data, Information and Knowledge, 25th British National Conference on Databases, BNCOD 25, Cardiff, UK, July 7-10, 2008. Proceedings, pp. 270-279, 2008, Springer, 978-3-540-70503-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Geophylogenies, H5N1 Avian Influenza, Human health, HyPhy, Viral evolution, Google Earth, Infectious Diseases, Biodiversity Informatics |
19 | Junyao Gao, Xueshan Gao, Wei Zhu 0013, Jianguo Zhu 0002, Boyu Wei |
Coal Mine Detect and Rescue Robot Design and Research. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 780-785, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Luciano Baresi, Daniele Braga, Marco Comuzzi, Filippo Pacifici, Pierluigi Plebani |
A service-based infrastructure for advanced logistics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IW-SOSWE ![In: Proceedings of the 2nd International Workshop on Service Oriented Software Engineering: in conjunction with the 6th ESEC/FSE joint meeting, IW-SOSWE 2007, Dubrovnik, Croatia, September 3, 2007, pp. 47-53, 2007, ACM, 978-1-59593-723-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Salvatore Vitabile, Salvatore Bono, Filippo Sorbello |
An Embedded Real-Time Automatic Lane-Keeping System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part I, pp. 647-654, 2007, Springer, 978-3-540-74817-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Andrew Hogue, Michael R. M. Jenkin |
Development of an Underwater Vision Sensor for 3D Reef Mapping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, IROS 2006, October 9-15, 2006, Beijing, China, pp. 5351-5356, 2006, IEEE, 1-4244-0258-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Yanjing Sun, Jiansheng Qian, Shiyin Li, Jinling Song |
Intelligent Prediction System of Coal-Gas Outburst Based on Evolutionary Neural Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 2650-2655, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Jaekyoung Moon, Jiyoung Yeo, Sungmoon Jeong, PalJoo Yoon, Minho Lee 0001 |
An Automotive Detector Using Biologically Motivated Selective Attention Model for a Blind Spot Monitor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (2) ![In: Neural Information Processing, 13th International Conference, ICONIP 2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part II, pp. 466-473, 2006, Springer, 3-540-46481-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Blind Spot Monitor, An Automotive Detector, Biologically Motivated Selective Attention Model |
19 | Anjum Iqbal, Mohd Aizaini Maarof |
Polymorphism and Danger Susceptibility of System Call DASTONs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICARIS ![In: Artificial Immune Systems: 4th International Conference, ICARIS 2005, Banff, Alberta, Canada, August 14-17, 2005, Proceedings, pp. 366-374, 2005, Springer, 3-540-28175-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Stelios Sidiroglou, John Ioannidis, Angelos D. Keromytis, Salvatore J. Stolfo |
An Email Worm Vaccine Architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 97-108, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Hiroyuki Mikuri, Naoto Mukai, Toyohide Watanabe |
R-Tree Representations of Disaster Areas Based on Probabilistic Estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Innovations in Applied Artificial Intelligence, 18th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2005, Bari, Italy, June 22-24, 2005, Proceedings, pp. 236-238, 2005, Springer, 3-540-26551-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Dawson R. Engler, Ken Ashcraft |
RacerX: effective, static detection of race conditions and deadlocks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOSP ![In: Proceedings of the 19th ACM Symposium on Operating Systems Principles 2003, SOSP 2003, Bolton Landing, NY, USA, October 19-22, 2003, pp. 237-252, 2003, ACM, 1-58113-757-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
deadlock detection, race detection, program checking |
19 | Maurizio Pighin, Vili Podgorelec, Peter Kokol |
Program Risk Definition via Linear Programming Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 8th IEEE International Software Metrics Symposium (METRICS 2002), 4-7 June 2002, Ottawa, Canada, pp. 197-196, 2002, IEEE Computer Society, 0-7695-1339-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Bart Demoen, Phuong-Lan Nguyen, Ruben Vandeginste |
Copying Garbage Collection for the WAM: To Mark or Not to Mark? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICLP ![In: Logic Programming, 18th International Conference, ICLP 2002, Copenhagen, Denmark, July 29 - August 1, 2002, Proceedings, pp. 194-208, 2002, Springer, 3-540-43930-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Vili Podgorelec, Marjan Hericko, Matjaz B. Juric, Ivan Rozman |
Testing Reliability of Medical Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CBMS ![In: 15th IEEE Symposium on Computer-Based Medical Systems (CBMS 2002), 4-7 June 2002, Maribor, Slovenia, pp. 185-, 2002, IEEE Computer Society, 0-7695-1614-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Jerzy W. Grzymala-Busse, Zdzislaw S. Hippe |
Postprocessing of Rule Sets Induced from a Melanoma Data Set. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 26th International Computer Software and Applications Conference (COMPSAC 2002), Prolonging Software Life: Development and Redevelopment, 26-29 August 2002, Oxford, England, Proceedings, pp. 1146-1151, 2002, IEEE Computer Society, 0-7695-1727-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Dan S. Wallach, Andrew W. Appel, Edward W. Felten |
SAFKASI: a security mechanism for language-based systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Softw. Eng. Methodol. ![In: ACM Trans. Softw. Eng. Methodol. 9(4), pp. 341-378, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
security-passing style, Java, Internet, WWW, access control, applets, stack inspection |
19 | Elena Stringa, Carlo S. Regazzoni |
Real-time video-shot detection for scene surveillance applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Image Process. ![In: IEEE Trans. Image Process. 9(1), pp. 69-79, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
16 | Trisha Tucker |
Dangerous reading: How socially constructed narratives of childhood shape perspectives on book banning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Libr. Q. ![In: Public Libr. Q. 43(2), pp. 135-149, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Ryan Mcconkey, Oluwafemi Olukoya |
Runtime and Design Time Completeness Checking of Dangerous Android App Permissions Against GDPR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 1-22, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Hassan Kanj, Yehia Kotb, Mouhammad Alakkoumi, Sawsan Kanj |
Dynamic Decision Making Process for Dangerous Good Transportation Using a Combination of TOPSIS and AHP Methods With Fuzzy Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 40450-40479, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Haoran Qin, Yining Tan, Yuxian Chen, Wei Ren 0002, Kim-Kwang Raymond Choo |
TriBoDeS: A Tri-Blockchain-Based Detection and Sharing Scheme for Dangerous Road Condition Information in Internet of Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(2), pp. 3563-3577, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Munish Saini, Eshan Sengupta, Harnoor Singh |
Artificial intelligence inspired IoT-fog based framework for generating early alerts while train passengers traveling in dangerous states using surveillance videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(5), pp. 13613-13635, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Dawei Zhang |
Laboratory Dangerous Operation Behavior Detection System Based on Deep Learning Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Crime Forensics ![In: Int. J. Digit. Crime Forensics 16, pp. 1-16, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Mary Phuong, Matthew Aitchison, Elliot Catt, Sarah Cogan, Alexandre Kaskasoli, Victoria Krakovna, David Lindner, Matthew Rahtz, Yannis Assael, Sarah Hodkinson, Heidi Howard, Tom Lieberum, Ramana Kumar, Maria Abi Raad, Albert Webson, Lewis Ho, Sharon Lin, Sebastian Farquhar, Marcus Hutter, Grégoire Delétang, Anian Ruoss, Seliem El-Sayed, Sasha Brown, Anca D. Dragan, Rohin Shah, Allan Dafoe, Toby Shevlane |
Evaluating Frontier Models for Dangerous Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.13793, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Norbert Ludant, Marinos Vomvas, Guevara Noubir |
Unprotected 4G/5G Control Procedures at Low Layers Considered Dangerous. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.06717, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Noé José Zapata, Gerardo Pérez, Lucas Bonilla, Pedro Núñez, Pilar Bachiller, Pablo Bustos |
Guessing human intentions to avoid dangerous situations in caregiving robots. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.16291, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Larysa Kriuchkova, Ivan Tsmokanych, Maksym Vovk, Nataliia Mazur, Oleksandr Bohdanov |
Influence of Protective Signals on Dangerous Signals of High-Frequency Imposition (short paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPITS ![In: Proceedings of the Workshop Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2024), Kyiv, Ukraine, February 28, 2024 (online)., pp. 419-425, 2024, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP BibTeX RDF |
|
16 | Teng-Fang Hsiao, Bo-Lun Huang, Zi-Xiang Ni, Yan-Ting Lin, Hong-Han Shuai, Yung-Hui Li, Wen-Huang Cheng |
Natural Light Can Also be Dangerous: Traffic Sign Misinterpretation Under Adversarial Natural Light Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WACV ![In: IEEE/CVF Winter Conference on Applications of Computer Vision, WACV 2024, Waikoloa, HI, USA, January 3-8, 2024, pp. 3903-3912, 2024, IEEE, 979-8-3503-1892-0. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Hibiki Tanaka, Kazuki Shimomura, Naoki Tanaka, Makoto Ikeda, Leonard Barolli |
An AI-Driven System for Identifying Dangerous Driving Vehicles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (6) ![In: Advanced Information Networking and Applications - Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Kitakyushu, Japan, 17-19 April, 2024, Volume 6, pp. 395-400, 2024, Springer, 978-3-031-57941-7. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
16 | Jia Liu, Wei Huang, Hao Li, Shenggong Ji, Yajun Du, Tianrui Li 0001 |
SLAFusion: Attention fusion based on SAX and LSTM for dangerous driving behavior detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Sci. ![In: Inf. Sci. 640, pp. 119063, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Gursimran Singh Kahlon, Harnoor Singh, Munish Saini, Sandeep Kaur |
An intelligent framework to detect and generate alert while cattle lying on road in dangerous states using surveillance videos. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 82(22), pp. 34589-34607, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Xing Wei, Shang Yao, Chong Zhao, Di Hu, Hui Luo, Yang Lu 0015 |
Lightweight multimodal feature graph convolutional network for dangerous driving behavior detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Real Time Image Process. ![In: J. Real Time Image Process. 20(1), pp. 15, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wei Song, Guangde Zhang, Yicheng Long |
Identification of dangerous driving state based on lightweight deep learning model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Electr. Eng. ![In: Comput. Electr. Eng. 105, pp. 108509, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Zitao Chen, Karthik Pattabiraman |
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.01610, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Argha Sen, Avijit Mandal, Prasenjit Karmakar, Anirban Das, Sandip Chakraborty |
mmDrive: mmWave Sensing for Live Monitoring and On-Device Inference of Dangerous Driving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2301.08188, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yixin Wan, Jieyu Zhao, Aman Chadha, Nanyun Peng, Kai-Wei Chang |
Are Personalized Stochastic Parrots More Dangerous? Evaluating Persona Biases in Dialogue Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.05280, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Albin Zehe, Julian Schröter 0002, Andreas Hotho |
Towards a Computational Analysis of Suspense: Detecting Dangerous Situations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.06818, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Filip Klubicka, Vasudevan Nedumpozhimana, John D. Kelleher |
Idioms, Probing and Dangerous Things: Towards Structural Probing for Idiomaticity in Vector Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.14333, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wencheng Huang 0001, Luohao Sun, Zhenlong Yang, Yanhui Yin |
Using Radial Basis Function and Back Propagation to predicate fault in a railway dangerous goods transportation system considering the Markov Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Soft Comput. ![In: Appl. Soft Comput. 145, pp. 110593, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Kenneth Church 0001, Annika Marie Schoene, John E. Ortega, Raman Chandrasekar, Valia Kordoni |
Emerging trends: Unfair, biased, addictive, dangerous, deadly, and insanely profitable. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Nat. Lang. Eng. ![In: Nat. Lang. Eng. 29(2), pp. 483-508, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Reza Samizadeh, Morteza Khavanin Zadeh, Mahsa Jadidi, Mohammad Rezapour, Sahar Vatankhah |
Discovery of dangerous self-medication methods with patients, by using social network mining. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Bus. Intell. Data Min. ![In: Int. J. Bus. Intell. Data Min. 23(3), pp. 277-287, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yufeng Li 0002, Fengyu Yang, Qi Liu, Jiangtao Li 0003, Chenhong Cao |
Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 132, pp. 103345, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Julius Schöning, Jan Kettler, Milena I. Jäger, Artur Gunia |
Grand Theft Auto-Based Cycling Simulator for Cognitive Enhancement Technologies in Dangerous Traffic Situations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(7), pp. 3672, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Souhir Sghaier, Moez Krichen, Imed Ben Dhaou, Hela Elmannai, Reem Alkanhel |
Identification, 3D-Reconstruction, and Classification of Dangerous Road Cracks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(7), pp. 3578, April 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | David Eugene Johnson, Debora Jane Shaw |
The dangerous use of genetic information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Commun. Ethics Soc. ![In: J. Inf. Commun. Ethics Soc. 21(4), pp. 533-549, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Stefan Dobrev, Paola Flocchini, Giuseppe Prencipe, Nicola Santoro |
Asynchronous Gathering in a Dangerous Ring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algorithms ![In: Algorithms 16(5), pp. 222, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Wenfeng Song, Xingliang Jin, Yang Ding, Yang Gao 0032, Xia Hou |
Dual Temporal Transformers for Fine-Grained Dangerous Action Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIP ![In: IEEE International Conference on Image Processing, ICIP 2023, Kuala Lumpur, Malaysia, October 8-11, 2023, pp. 415-419, 2023, IEEE, 978-1-7281-9835-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Weina Qu, Xiaohui Luo, Jiqing Hou, Yan Ge |
Impact of Locus of Control on Dangerous Driving Behavior and Positive Driving Behavior in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (47) ![In: HCI International 2023 Posters - 25th International Conference on Human-Computer Interaction, HCII 2023, Copenhagen, Denmark, July 23-28, 2023, Proceedings, Part V, pp. 82-90, 2023, Springer, 978-3-031-36003-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Qian Chen, Haichao Zhao, Chi Wan, Tianrun Yang |
Dangerous Art Paintings: Artistic Adversarial Attacks on Salient Object Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCEIC ![In: 4th International Conference on Computer Engineering and Intelligent Control, ICCEIC 2023, Guangzhou, China, October 20-22, 2023, pp. 198-204, 2023, IEEE, 979-8-3503-0887-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Hyeonjun Jo, Sungwoong Yeom, Haoyu Chen, Kyungbaek Kim |
Data Pipeline Design for Dangerous Driving Behavior Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIIC ![In: International Conference on Artificial Intelligence in Information and Communication, ICAIIC 2023, Bali, Indonesia, February 20-23, 2023, pp. 533-538, 2023, IEEE, 978-1-6654-5645-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Arvid Alexander Eichner, Nicholas Valentin Lingnau, Patrick Felka, Vanessa Kohn, Roland Holten, Oliver Hinz |
Dangerous Habit or Useful Routine? Developing Theory-based Measures for the Intended and Unintended Consequences of State-tracking habits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECIS ![In: 31st European Conference on Information Systems - Co-creating Sustainable Digital Futures, ECIS 2023, Kristiansan, Norway, June 11-16, 2023, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
16 | Willy R. Vasquez, Stephen Checkoway, Hovav Shacham |
The Most Dangerous Codec in the World: Finding and Exploiting Vulnerabilities in H.264 Decoders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
USENIX Security Symposium ![In: 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023, pp. 6647-6664, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
16 | Yue Wu, Linhao Ye, Xianzhe Zheng, Hanfei Zhu, Wei Xiang |
Dangerous Slime: A Game for Improving Situation Awareness in Automated Driving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AutomotiveUI ![In: Proceedings of the 15th International Conference on Automotive User Interfaces and Interactive Vehicular Applications, AutomotiveUI 2023, Ingolstadt, Germany, September 18-22, 2023, pp. 136-144, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Jiajun Ding |
Research and Development of Dangerous Driving Warning and Rescue Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCSIC ![In: 7th International Symposium on Computer Science and Intelligent Control, ISCSIC 2023, Nanjing, China, October 27-29, 2023, pp. 297-301, 2023, IEEE, 979-8-3503-4298-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Argha Sen, Avijit Mandal, Prasenjit Karmakar, Anirban Das, Sandip Chakraborty |
mmDrive: mmWave Sensing for Live Monitoring and On-Device Inference of Dangerous Driving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PERCOM ![In: IEEE International Conference on Pervasive Computing and Communications, PerCom 2023, Atlanta, GA, USA, March 13-17, 2023, pp. 2-11, 2023, IEEE, 978-1-6654-5378-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Siqi Wang, Dongmei Zhou, Yongjian Cheng, Meiqi Jiang |
Classification algorithm for liquid dangerous goods based on WT-AE and Attention-GRU network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDIP ![In: Proceedings of the 15th International Conference on Digital Image Processing, ICDIP 2023, Nanjing, China, May 19-22, 2023, pp. 10:1-10:7, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ross B. Niswanger, Kewei Sha, Dorothea C. Lerman |
Poster: Design of Mixed Reality Dangerous Situations for Autistic Children: Road Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHASE ![In: IEEE/ACM Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2023, Orlando, FL, USA, June 21-23, 2023, pp. 205-206, 2023, IEEE, 979-8-4007-0102-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Luigi D'Alfonso, Giuseppe Fedele, Francisco Ulloa Herrera |
A Stubborn Based Strategy for Vehicles Recovery During Dangerous Events. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICT-DM ![In: International Conference on Information and Communication Technologies for Disaster Management, ICT-DM 2023, Cosenza, Italy, September 13-15, 2023, pp. 1-6, 2023, IEEE, 979-8-3503-1951-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Filip Klubicka, Vasudevan Nedumpozhimana, John D. Kelleher |
Idioms, Probing and Dangerous Things: Towards Structural Probing for Idiomaticity in Vector Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MWE@EACL ![In: Proceedings of the 19th Workshop on Multiword Expressions, MWE@EACL 2023, Dubrovnik, Croatia, May 6, 2023, pp. 45-57, 2023, Association for Computational Linguistics, 978-1-959429-59-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Ivan Azarov, Sergiy Gnatyuk, Marek Aleksander, Ilya Azarov, Assel Mukasheva |
Real-time ML algorithms for the detection of dangerous objects in critical infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IntelITSIS ![In: Proceedings of the 4th International Workshop on Intelligent Information Technologies & Systems of Information Security, Khmelnytskyi, Ukraine, March 22-24, 2023., pp. 217-226, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
16 | Jakub Szymkowiak, Marek Bazan, Krzysztof Halawa, Tomasz Janiczek |
Detection of Objects Dangerous for the Operation of Mining Machines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCS (4) ![In: Computational Science - ICCS 2023 - 23rd International Conference, Prague, Czech Republic, July 3-5, 2023, Proceedings, Part IV, pp. 128-139, 2023, Springer, 978-3-031-36026-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Chaabane Abdelali, Yachba Khadidja, Ladjel Bellatreche |
Optimization of Dangerous Goods Stowage: A Hybrid Approach between Faster R-CNN and Coronavirus Metaheuristic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Big Data ![In: IEEE International Conference on Big Data, BigData 2023, Sorrento, Italy, December 15-18, 2023, pp. 2561-2569, 2023, IEEE, 979-8-3503-2445-7. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | John T. Murray, Jack Murray, Anastasia Salter |
Playing with AI Chat: Positioning "Dangerous" Language Model Futures through Interactive Fiction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 41st ACM International Conference on Design of Communication, SIGDOC 2023, Orlando, FL, USA, October 26-28, 2023, pp. 82-88, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Shinji Inoue, Shigeru Yamada |
Economic Periodic Maintenance Intervals for Dangerous Undetected Fault of Safety-related Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEM ![In: IEEE International Conference on Industrial Engineering and Engineering Management, IEEM 2023, Singapore, December 18-21, 2023, pp. 1316-1320, 2023, IEEE, 979-8-3503-2315-3. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Yixin Wan, Jieyu Zhao, Aman Chadha, Nanyun Peng, Kai-Wei Chang |
Are Personalized Stochastic Parrots More Dangerous? Evaluating Persona Biases in Dialogue Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EMNLP (Findings) ![In: Findings of the Association for Computational Linguistics: EMNLP 2023, Singapore, December 6-10, 2023., pp. 9677-9705, 2023, Association for Computational Linguistics, 979-8-89176-061-5. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
16 | Maksym Zaliskyi, Serhii Migel, Alina Osipchuk, Denys Bakhtiiarov |
Correlation Method of Dangerous Objects Detection for Aviation Security Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CPITS ![In: Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems, CPITS 2023, co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), Kyiv, Ukraine, February 28, 2023 (online)., pp. 1-11, 2023, CEUR-WS.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
16 | Sibei Li, Yang Weng, Xianglong Wang, Xin Li |
Exploring the Causal Relationship Between Forgiveness and Sentencing Outcomes in Dangerous Driving Cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSE (1) ![In: Computer Science and Education. Computer Science and Technology - 18th International Conference, ICCSE 2023, Sepang, Malaysia, December 1-7, 2023, Proceedings, Part I, pp. 400-414, 2023, Springer, 978-981-97-0729-4. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1040 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|