|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 937 occurrences of 669 keywords
|
|
|
Results
Found 1012 publication records. Showing 1012 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
83 | Radu Marinescu 0001 |
Detecting Design Flaws via Metrics in Object-Oriented Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TOOLS (39) ![In: 39th International Conference and Exhibition on Technology of Object-Oriented Languages and Systems, TOOLS USA 2001, Santa Barbara, CA, USA, July 29 - August 3, 2001, pp. 173-182, 2001, IEEE Computer Society, 0-7695-1251-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
metrics, Reengineering, design flaws, problem detection |
78 | Laura Falk, Atul Prakash 0001, Kevin Borders |
Analyzing websites for user-visible security design flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 4th Symposium on Usable Privacy and Security, SOUPS 2008, Pittsburgh, Pennsylvania, USA, July 23-25, 2008, pp. 117-126, 2008, ACM, 978-1-60558-276-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
69 | Mazeiar Salehie, Shimin Li, Ladan Tahvildari |
A Metric-Based Heuristic Framework to Detect Object-Oriented Design Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPC ![In: 14th International Conference on Program Comprehension (ICPC 2006), 14-16 June 2006, Athens, Greece, pp. 159-168, 2006, IEEE Computer Society, 0-7695-2601-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Mary Lou Soffa |
Path Sensitive Analysis for Security Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HASE ![In: 11th IEEE High Assurance Systems Engineering Symposium, HASE 2008, Nanjing, China, December 3 - 5, 2008, pp. 3, 2008, IEEE Computer Society, 978-0-7695-3482-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Miguel Carrasco, Domingo Mery |
Automatic Multiple Visual Inspection on Non-calibrated Image Sequence with Intermediate Classifier Block. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, Second Pacific Rim Symposium, PSIVT 2007, Santiago, Chile, December 17-19, 2007, Proceedings, pp. 371-384, 2007, Springer, 978-3-540-77128-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computer vision, industrial applications, defect detection, multiple view geometry, automated visual inspection |
58 | Petru Florin Mihancea, Radu Marinescu 0001 |
Towards the Optimization of Automatic Detection of Design Flaws in Object-Oriented Software Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 9th European Conference on Software Maintenance and Reengineering (CSMR 2005), 21-23 March 2005, Manchester, UK, Proceedings, pp. 92-101, 2005, IEEE Computer Society, 0-7695-2304-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
metrics, object-oriented design, threshold, design flaws |
58 | Raphael Chung-Wei Phan, Huo-Chong Ling |
Flaws in Generic Watermarking Protocols Based on Zero-Knowledge Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDW ![In: Digital Watermarking, Third InternationalWorkshop, IWDW 2004, Seoul, SouthKorea, October 30 - November 1, 2004, Revised Selected Papers, pp. 184-191, 2004, Springer, 3-540-24839-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Watermark detection protocol, flaws, generic, identification, zero knowledge proof |
53 | Dennis K. Nilsson, Phillip A. Porras, Erland Jonsson |
How to Secure Bluetooth-Based Pico Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007., pp. 209-223, 2007, Springer, 978-3-540-75100-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pico networks, security controls, implementation flaws, Bluetooth, design flaws |
52 | José Meseguer 0001, Ralf Sasse, Helen J. Wang, Yi-Min Wang |
A Systematic Approach to Uncover Security Flaws in GUI Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 71-85, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
49 | Radu Marinescu 0001 |
Detection Strategies: Metrics-Based Rules for Detecting Design Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 20th International Conference on Software Maintenance (ICSM 2004), 11-17 September 2004, Chicago, IL, USA, pp. 350-359, 2004, IEEE Computer Society, 0-7695-2213-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
metrics, object-oriented design, quality assurance, design heuristics, design flaws |
49 | Mourad Debbabi, Mohamed Mejri, Nadia Tawbi, I. Yahmadi |
From Protocol Specifications to Flaws and Attack Scenarios: An Automatic and Formal Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 256-262, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
authentication protocol specifications, flaws, automatic formal algorithm, protocol roles, intruder communication abilities, intruder computational abilities, protocol instrumentations, formal verification, encryption, message authentication, decryption, attack scenarios, deductive system |
48 | Kyung-suk Lhee, Steve J. Chapin |
Detection of file-based race conditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 4(1-2), pp. 105-119, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Time-of-check-to-time-of-use (TOCTTOU) flaws, Security, Race condition |
48 | Sam Weber, Paul A. Karger, Amit M. Paradkar |
A software flaw taxonomy: aiming tools at security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
argument validation, asynchronous attacks, security taxonomies, testing, static analysis, buffer overflows, security flaws |
44 | Jörg P. Müller, Bernhard Bauer |
Agent-Oriented Software Technologies: Flaws and Remedies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AOSE ![In: Agent-Oriented Software Engineering III, Third International Workshop, AOSE 2002, Bologna, Italy, July 15, 2002, Revised Papers and Invited Contributions, pp. 210-227, 2002, Springer, 3-540-00713-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
41 | Howard A. Sholl, Kevin Morris, James Norris |
A Multimicroprocessor System for Real-Time Classification of Railroad Track Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 31(10), pp. 1009-1017, 1982. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
pipeline system, railroad track flaws, pattern recognition, real-time system, Multiple processor |
40 | Wenliang Du, Aditya P. Mathur |
Testing for Software Vulnerability Using Environment Perturbation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSN ![In: 2000 International Conference on Dependable Systems and Networks (DSN 2000) (formerly FTCS-30 and DCCA-8), 25-28 June 2000, New York, NY, USA, pp. 603-612, 2000, IEEE Computer Society, 0-7695-0707-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
environment perturbation, fault injection, Security testing, security flaws |
36 | François Plumerault, Baptiste David |
Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 16(2), pp. 173-183, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
36 | Katja Tuma, Riccardo Scandariato, Musard Balliu |
Flaws in Flows: Unveiling Design Flaws via Information Flow Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSA ![In: IEEE International Conference on Software Architecture, ICSA 2019, Hamburg, Germany, March 25-29, 2019, pp. 191-200, 2019, IEEE, 978-1-7281-0528-4. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
35 | Marco Pistoia, Stephen J. Fink, Robert J. Flynn, Eran Yahav |
When Role Models Have Flaws: Static Validation of Enterprise Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 29th International Conference on Software Engineering (ICSE 2007), Minneapolis, MN, USA, May 20-26, 2007, pp. 478-488, 2007, IEEE Computer Society, 0-7695-2828-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
35 | Giuseppe Acciani, Gioacchino Brunetti, Ernesto Chiarantoni, Girolamo Fornarelli |
Automatic Evaluation of Flaws in Pipes by means of Ultrasonic Waveforms and Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNN ![In: Proceedings of the International Joint Conference on Neural Networks, IJCNN 2006, part of the IEEE World Congress on Computational Intelligence, WCCI 2006, Vancouver, BC, Canada, 16-21 July 2006, pp. 892-898, 2006, IEEE, 0-7803-9490-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
35 | Guilin Wang, Sihan Qing |
Security Flaws in Several Group Signatures Proposed by Popescu. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 711-718, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
digital signature, information security, group signature |
35 | Thierry Miceli, Houari A. Sahraoui, Robert Godin |
A Metric Based Technique for Design Flaws Detection and Correction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASE ![In: The 14th IEEE International Conference on Automated Software Engineering, ASE 1999, Cocoa Beach, Florida, USA, 12-15 October 1999, pp. 307-310, 1999, IEEE Computer Society, 0-7695-0415-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
OO Metric, OO Reengineering, Quality estimation models |
35 | Keishi Tajima |
Static Detection of Security Flaws in Object-Oriented Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Conference ![In: Proceedings of the 1996 ACM SIGMOD International Conference on Management of Data, Montreal, Quebec, Canada, June 4-6, 1996., pp. 341-352, 1996, ACM Press, 978-0-89791-794-0. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
34 | Matt Bishop |
About Penetration Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 5(6), pp. 84-87, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Ching-Liang Su |
Robotic Intelligence for Industrial Automation: Object Flaw Auto Detection and Pattern Recognition by Object Location Searching, Object Alignment, and Geometry Comparison. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 33(4), pp. 437-451, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
image inspection, image movement, image subtraction, geometry matching |
34 | Richard E. Smith |
Cost profile of a highly assured, secure operating system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(1), pp. 72-101, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
LOCK (Logical Coprocessing Kernel), security kernels |
31 | Herbert H. Thompson |
Application Penetration Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 3(1), pp. 66-69, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
software testing, QA, security vulnerabilities, security flaws |
31 | Richard E. Smith |
Mandatory Protection for Internet Server Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 12th Annual Computer Security Applications Conference (ACSAC 1996), 9-13 December 1996, San Diego, CA, USA, pp. 178-184, 1996, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
multilevel security applications, Internet server software, server overrun, attack code, server host, mandatory protection mechanisms, commercial systems, Unix chroot isolation, type enforcement, server protection, Internet, MLS, security flaws |
27 | Guoqiang Shu, Yating Hsu, David Lee 0001 |
Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FORTE ![In: Formal Techniques for Networked and Distributed Systems - FORTE 2008, 28th IFIP WG 6.1 International Conference, Tokyo, Japan, June 10-13, 2008, Proceedings, pp. 299-304, 2008, Springer, 978-3-540-68854-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Fuzz testing, Security Testing, Protocol Synthesis |
27 | Angela Lozano |
A methodology to assess the impact of source code flaws in changeability, and its application to clones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSM ![In: 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28 - October 4, 2008, Beijing, China, pp. 424-427, 2008, IEEE Computer Society, 978-1-4244-2613-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Toshinori Araki, Satoshi Obana |
Flaws in Some Secret Sharing Schemes Against Cheating. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 122-132, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Rafael Bailón-Moreno, Encarnación Jurado-Alameda, Rosario Ruiz-Baños, Jean Pierre Courtial |
Bibliometric laws: Empirical flaws of fit. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 63(2), pp. 209-229, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Michael C. Martin, V. Benjamin Livshits, Monica S. Lam |
Finding application errors and security flaws using PQL: a program query language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA ![In: Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2005, October 16-20, 2005, San Diego, CA, USA, pp. 365-383, 2005, ACM, 1-59593-031-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
resource leaks, web applications, pattern matching, SQL injection, bug finding, program traces |
27 | Patrick Baudisch, Desney S. Tan, Drew Steedly, Eric Rudolph, Matthew Uyttendaele, Chris Pal, Richard Szeliski |
Panoramic viewfinder: providing a real-time preview to help users avoid flaws in panoramic pictures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2005 Australasian Computer-Human Interaction Conference, OZCHI 2005, Canberra, Australia, November 21-25, 2005, 2005, ACM, 1-59593-222-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
user interface, real-time, interactive, panorama, stitching, preview |
27 | Greg Goth |
IE Security Flaws Spike Interest in Alternative Browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Comput. ![In: IEEE Internet Comput. 8(6), pp. 8-11, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Opera, alternative browsers, IE, Firefox, browser security |
27 | Soon Tee Teoh, Kwan-Liu Ma, Shyhtsun Felix Wu, T. J. Jankun-Kelly |
Detecting Flaws and Intruders with Visual Data Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Computer Graphics and Applications ![In: IEEE Computer Graphics and Applications 24(5), pp. 27-35, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Phong Q. Nguyen |
Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 555-570, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
GnuPG, GPG, Cryptanalysis, Implementation, RSA, Public-key cryptography, ElGamal, OpenPGP |
27 | Heikki Verta, Titos Saridakis |
Detection of Heap Management Flaws in Component-Based Software. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 30th EUROMICRO Conference 2004, 31 August - 3 September 2004, Rennes, France, pp. 583-590, 2004, IEEE Computer Society, 0-7695-2199-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Nick L. Petroni Jr., William A. Arbaugh |
The Dangers of Mitigating Security Design Flaws: A Wireless Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(1), pp. 28-36, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Wireless Network Security |
27 | Masayuki Abe, Hideki Imai |
Flaws in Some Robust Optimistic Mix-Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 39-50, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Tetsuo Asano, Hiro Ito, Souichi Kimura, Shigeaki Shimazu |
Repairing Flaws in a Picture Based on a Geometric Representation of a Digital Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 9th International Symposium, ISAAC '98, Taejon, Korea, December 14-16, 1998, Proceedings, pp. 149-158, 1998, Springer, 3-540-65385-6. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Siliang Li, Gang Tan |
Finding bugs in exceptional situations of JNI programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pp. 442-452, 2009, ACM, 978-1-60558-894-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
static analysis, taint analysis, java native interface |
26 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 43-60, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signature, Digital Signature, Fair Exchange |
26 | Bin Zhang 0003, Dengguo Feng |
Security analysis of a new stream cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(3), pp. 286-301, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
divide-and-conquer attack, non-linear feedback shift registers (NLFSR), stream cipher, chaotic sequence |
26 | Sen Xu, Manton M. Matthews, Chin-Tser Huang |
Security issues in privacy and key management protocols of IEEE 802.16. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 44st Annual Southeast Regional Conference, 2006, Melbourne, Florida, USA, March 10-12, 2006, pp. 113-118, 2006, ACM, 1-59593-315-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
authentication, key management, IEEE 802.16, roaming |
26 | Adrian Trifu, Olaf Seng, Thomas Genssler |
Automated Design Flaw Correction in Object-Oriented Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSMR ![In: 8th European Conference on Software Maintenance and Reengineering (CSMR 2004), 24-26 March 2004, Tampere, Finland, Proceedings, pp. 174-183, 2004, IEEE Computer Society, 0-7695-2107-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Hiroaki Chujo, Yuji Shono, Yoshitomo Ikkai, Norihisa Komoda |
A rapid scheduling method with resource selection by flaw analysis for a rectangular cutting stock problem against flawed and connectable resources. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (2) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 1458-1463, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Matthew R. McLaughlin, Jonathan L. Herlocker |
A collaborative filtering algorithm and evaluation metric that accurately model the user experience. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2004: Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Sheffield, UK, July 25-29, 2004, pp. 329-336, 2004, ACM, 1-58113-881-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
mean absolute error, machine learning, evaluation, algorithms, recommender systems, collaborative filtering, nearest neighbor, precision |
26 | Olivier Pereira, Jean-Jacques Quisquater |
A Security Analysis of the Cliques Protocols Suites. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 14th IEEE Computer Security Foundations Workshop (CSFW-14 2001), 11-13 June 2001, Cape Breton, Nova Scotia, Canada, pp. 73-81, 2001, IEEE Computer Society, 0-7695-1146-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Nikita Borisov, Ian Goldberg, David A. Wagner 0001 |
Intercepting mobile communications: the insecurity of 802.11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiCom ![In: MOBICOM 2001, Proceedings of the seventh annual international conference on Mobile computing and networking, Rome, Italy, July 16-21, 2001., pp. 180-189, 2001, ACM, 1-58113-422-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Wenli Wang, Zoltán Hidvégi, Andrew D. Bailey Jr., Andrew B. Whinston |
E-Process Design and Assurance Using Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 33(10), pp. 48-53, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | George J. Mamic, Mohammed Bennamoun |
Automatic Flaw Detection in Textiles Using a Neyman-Pearson Detector. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPR ![In: 15th International Conference on Pattern Recognition, ICPR'00, Barcelona, Spain, September 3-8, 2000., pp. 4767-4770, 2000, IEEE Computer Society, 0-7695-0750-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
22 | Reiner Dojen, Anca Jurcut, Tom Coffey, Cornelia Györödi |
On Establishing and Fixing a Parallel Session Attack in a Security Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDC ![In: Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing - IDC 2008, Catania, Italy, 2008, pp. 239-244, 2008, Springer, 978-3-540-85256-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
protocol flaws, parallel session attack, Security protocols |
22 | Angela Lozano, Michel Wermelinger, Bashar Nuseibeh |
Assessing the impact of bad smells using historical information. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWPSE ![In: 9th International Workshop on Principles of Software Evolution (IWPSE 2007), in conjunction with the 6th ESEC/FSE joint meeting, Dubrovnik, Croatia, September 3-4, 2007, pp. 31-34, 2007, ACM, 978-1-59593-722-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
bad smells, source cede, empirical study, software maintenance, software quality, software evolution, design defects, design flaws |
22 | Richard Wettel, Radu Marinescu 0001 |
Archeology of Code Duplication: Recovering Duplication Chains from Small Duplication Fragments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SYNASC ![In: Seventh International Symposium on Symbolic and Numeric Algorithms for Scientific Computing (SYNASC 2005), 25-29 September 2005, Timisoara, Romania, pp. 63-70, 2005, IEEE Computer Society, 0-7695-2453-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
quality assurance, code duplication, design flaws |
22 | V. Benjamin Livshits, Monica S. Lam |
Tracking pointers with path and context sensitivity for bug detection in C programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC / SIGSOFT FSE ![In: Proceedings of the 11th ACM SIGSOFT Symposium on Foundations of Software Engineering 2003 held jointly with 9th European Software Engineering Conference, ESEC/FSE 2003, Helsinki, Finland, September 1-5, 2003, pp. 317-326, 2003, ACM, 978-1-58113-743-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
SSA representation, program analysis, error detection, software security, pointer analysis, program representation, context-sensitive analysis, buffer overruns, path-sensitive analysis, security flaws |
22 | Adriana Bodnarova, Mohammed Bennamoun, Kurt Kubik |
Suitability Analysis of Techniques for Flaw Detection in Textiles using Texture Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pattern Anal. Appl. ![In: Pattern Anal. Appl. 3(3), pp. 254-266, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Flaw detection techniques, Textile quality control, Weaving flaws, Texture analysis, Case study, Visual inspection |
22 | Takeshi Nakajo, Hitoshi Kume |
A Case History Analysis of Software Error Cause-Effect Relationships. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 17(8), pp. 830-838, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
cause-effect relationships, case-based error analysis, program faults, process flaws, structured analysis and structured design, Software development, human errors, Fault Tree Analysis |
18 | Nerla Jean-Louis, Yunqi Li 0002, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller 0001 |
SGXonerate:Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2024(1), pp. 617-634, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Zhaoyang Yin, Mingjun Chen, Linjie Zhao, Jian Cheng, Chao Tan, Xiaotao Li, Zhiyu Lin, Yankang Chen |
A novel automatic classification approach for micro-flaws on the large-aperture optics surface based on multi-light source fusion and integrated deep learning architecture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Manuf. ![In: J. Intell. Manuf. 35(1), pp. 413-428, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Qiao Jin 0001, Fangyuan Chen, Yiliang Zhou, Ziyang Xu, Justin M. Cheung, Robert Chen, Ronald M. Summers, Justin F. Rousseau, Peiyun Ni, Marc J. Landsman, Sally L. Baxter, Subhi J. Al'Aref, Yijia Li, Michael F. Chiang, Yifan Peng, Zhiyong Lu |
Hidden Flaws Behind Expert-Level Accuracy of GPT-4 Vision in Medicine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.08396, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Jakob Svennevik Notland, Jingyue Li, Mariusz Nowostawski, Peter Halland Haro |
SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.00405, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Lucas Castillo, Pablo León-Villagrá, Nick Chater, Adam Sanborn |
Explaining the flaws in human random generation as local sampling with momentum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PLoS Comput. Biol. ![In: PLoS Comput. Biol. 20(1), January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
18 | Andreas Park |
The Conceptual Flaws of Decentralized Automated Market Making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Manag. Sci. ![In: Manag. Sci. 69(11), pp. 6731-6751, November 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Zhiliang Liu, Liyuan Ren |
Shaking Noise Exploration and Elimination for Detecting Local Flaws of Steel Wire Ropes Based on Magnetic Flux Leakages. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Ind. Electron. ![In: IEEE Trans. Ind. Electron. 70(4), pp. 4206-4216, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | João Pedro Costa Barnabé, Lenin Patricio Jiménez Jiménez, Gustavo Fraidenraich, Eduardo Rodrigues de Lima, Harrison Franca Dos Santos |
Quantification of Damages and Classification of Flaws in Mono-Crystalline Photovoltaic Cells Through the Application of Vision Transformers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 11, pp. 112334-112347, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Prashanth Baskaran, Artur Lopes Ribeiro, Helena Maria Geirinhas Ramos |
Theoretical Predictions of Perturbed Magnetic Flux Density Components Due to Narrow Flaws in ECT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Instrum. Meas. ![In: IEEE Trans. Instrum. Meas. 72, pp. 1-7, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hal Berghel |
Fatal Flaws in ChatAI as a Content Generator. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 56(9), pp. 78-82, September 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Louis Mahon, Lei Shah, Thomas Lukasiewicz |
Correcting Flaws in Common Disentanglement Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2304.02335, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Anya Belz, Craig Thomson, Ehud Reiter, Gavin Abercrombie, Jose Maria Alonso-Moral, Mohammad Arvan, Jackie Chi Kit Cheung, Mark Cieliebak, Elizabeth Clark, Kees van Deemter, Tanvi Dinkar, Ondrej Dusek, Steffen Eger, Qixiang Fang, Albert Gatt, Dimitra Gkatzia, Javier González-Corbelle, Dirk Hovy, Manuela Hürlimann, Takumi Ito, John D. Kelleher, Filip Klubicka, Huiyuan Lai, Chris van der Lee, Emiel van Miltenburg, Yiru Li, Saad Mahamood, Margot Mieskes, Malvina Nissim, Natalie Parde, Ondrej Plátek, Verena Rieser, Pablo Mosteiro Romero, Joel R. Tetreault, Antonio Toral, Xiaojun Wan 0001, Leo Wanner, Lewis Watson, Diyi Yang |
Missing Information, Unresponsive Authors, Experimental Flaws: The Impossibility of Assessing the Reproducibility of Previous Human Evaluations in NLP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2305.01633, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Balázs Hidasi, Ádám Tibor Czapp |
Widespread Flaws in Offline Evaluation of Recommender Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2307.14951, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Minghui Hu 0001, Jianbin Zheng, Chuanxia Zheng, Chaoyue Wang, Dacheng Tao, Tat-Jen Cham |
One More Step: A Versatile Plug-and-Play Module for Rectifying Diffusion Schedule Flaws and Enhancing Low-Frequency Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2311.15744, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | George Stein, Jesse C. Cresswell, Rasa Hosseinzadeh, Yi Sui, Brendan Leigh Ross, Valentin Villecroze, Zhaoyan Liu, Anthony L. Caterini, J. Eric T. Taylor, Gabriel Loaiza-Ganem |
Exposing flaws of generative model evaluation metrics and their unfair treatment of diffusion models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2306.04675, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Mustafa Shukor, Alexandre Ramé, Corentin Dancette, Matthieu Cord |
Beyond Task Performance: Evaluating and Reducing the Flaws of Large Multimodal Models with In-Context Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2310.00647, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Alireza Sadeghi-Nasab, Vahid Rafe |
A comprehensive review of the security flaws of hashing algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Virol. Hacking Tech. ![In: J. Comput. Virol. Hacking Tech. 19(2), pp. 287-302, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | David Fifield |
Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 1362, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Nerla Jean-Louis, Yunqi Li 0002, Yan Ji, Harjasleen Malvai, Thomas Yurek, Sylvain Bellemare, Andrew Miller 0001 |
SGXonerated: Finding (and Partially Fixing) Privacy Flaws in TEE-based Smart Contract Platforms Without Breaking the TEE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 378, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Issam Hammad, Matthew Poloni, Andrew Isherwood, Ryan Simpson |
Auto Sizing of CANDU Nuclear Reactor Fuel Channel Flaws from UT Scans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sensors ![In: Sensors 23(8), pp. 3907, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian |
Using word embedding and convolution neural network for bug triaging by considering design flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. Comput. Program. ![In: Sci. Comput. Program. 228, pp. 102945, June 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Oskar Sjögren, Gustav Grund Pihlgren, Fredrik Sandin, Marcus Liwicki |
Identifying and Mitigating Flaws of Deep Perceptual Similarity Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NLDL ![In: Proceedings of the 2023 Northern Lights Deep Learning Workshop, NLDL 2023, Tromsø, Norway, January 10-12, 2023, 2023, Septentrio Academic Publishing. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Meinhard Kissich, Marcel Baunach |
Formal Property Verification for Early Discovery of Functional Flaws in Digital Designs: A Designer's Guide. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSD ![In: 26th Euromicro Conference on Digital System Design, DSD 2023, Golem, Albania, September 6-8, 2023, pp. 734-741, 2023, IEEE, 979-8-3503-4419-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda |
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECRYPT ![In: Proceedings of the 20th International Conference on Security and Cryptography, SECRYPT 2023, Rome, Italy, July 10-12, 2023., pp. 813-821, 2023, SCITEPRESS, 978-989-758-666-8. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | João Inácio, Ibéria Medeiros |
CorCA: An Automatic Program Repair Tool for Checking and Removing Effectively C Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICST ![In: IEEE Conference on Software Testing, Verification and Validation, ICST 2023, Dublin, Ireland, April 16-20, 2023, pp. 71-82, 2023, IEEE, 978-1-6654-5666-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Balázs Hidasi, Ádám Tibor Czapp |
Widespread Flaws in Offline Evaluation of Recommender Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RecSys ![In: Proceedings of the 17th ACM Conference on Recommender Systems, RecSys 2023, Singapore, Singapore, September 18-22, 2023, pp. 848-855, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Steven Moore, Ellen Fang, Huy Anh Nguyen, John C. Stamper |
Crowdsourcing the Evaluation of Multiple-Choice Questions Using Item-Writing Flaws and Bloom's Taxonomy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
L@S ![In: Proceedings of the Tenth ACM Conference on Learning @ Scale, Copenhagen, Denmark, July 20-22, 2023, pp. 25-34, 2023, ACM. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | George Stein, Jesse C. Cresswell, Rasa Hosseinzadeh, Yi Sui, Brendan Leigh Ross, Valentin Villecroze, Zhaoyan Liu, Anthony L. Caterini, J. Eric T. Taylor, Gabriel Loaiza-Ganem |
Exposing flaws of generative model evaluation metrics and their unfair treatment of diffusion models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NeurIPS ![In: Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023., 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
18 | Koji Noshiro, Koji Hasebe |
Flaws of Termination and Optimality in ADOPT-based Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCAI ![In: Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, IJCAI 2023, 19th-25th August 2023, Macao, SAR, China, pp. 1996-2003, 2023, ijcai.org. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Hongjian Cao, Lin Huang, Shuwei Hu, Shangcheng Shi, Yujia Liu |
Owfuzz: Discovering Wi-Fi Flaws in Modern Devices through Over-The-Air Fuzzing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2023, Guildford, United Kingdom, 29 May 2023 - 1 June 2023, pp. 263-273, 2023, ACM, 978-1-4503-9859-6. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
18 | Annika Reinke |
Eliminating flaws in biomedical image analysis validation (PDF / PS) ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2023 |
RDF |
|
18 | Saher Ghayyad, Shengzhi Du, Anish Mathew Kurien |
The flaws of Internet of Things (IoT) intrusion detection and prevention schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Sens. Networks ![In: Int. J. Sens. Networks 38(1), pp. 25-36, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Carlos Nkuba Kayembe, Seulbae Kim, Sven Dietrich, Heejo Lee |
Riding the IoT Wave With VFuzz: Discovering Security Flaws in Smart Homes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 10, pp. 1775-1789, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Sijun Niu, Vikas Srivastava |
Ultrasound classification of interacting flaws using finite element simulations and convolutional neural network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eng. Comput. ![In: Eng. Comput. 38(5), pp. 4653-4662, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Christian Hugo Hoffmann |
Technological Brave New World? Eschatological Narratives on Digitalization and their Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Artif. Intell. Conscious. ![In: J. Artif. Intell. Conscious. 9(3), pp. 331-347, December 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Oskar Sjögren, Gustav Grund Pihlgren, Fredrik Sandin, Marcus Liwicki |
Identifying and Mitigating Flaws of Deep Perceptual Similarity Metrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2207.02512, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Hadas Orgad, Yonatan Belinkov |
Choose Your Lenses: Flaws in Gender Bias Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.11471, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Royi Rassin, Shauli Ravfogel, Yoav Goldberg |
DALLE-2 is Seeing Double: Flaws in Word-to-Concept Mapping in Text2Image Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2210.10606, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Reza Sepahvand, Reza Akbari, Behnaz Jamasb, Sattar Hashemi, Omid Boushehrian |
Using Word Embedding and Convolution Neural Network for Bug Triaging by Considering Design Flaws. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2209.09553, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Joakim Misund, Bob Briscoe |
Disentangling Flaws in Linux DCTCP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2211.07581, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Chinedu I. Ossai, Nilmini Wickramasinghe |
Crowdsourcing Operational and Design Flaws of Diabetes Mobile Apps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 46(12), pp. 101, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
18 | Ben Green 0002 |
The flaws of policies requiring human oversight of government algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 45, pp. 105681, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 1012 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|