The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for mitigate with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1979-1995 (16) 1996-1998 (22) 1999 (19) 2000 (16) 2001 (22) 2002 (33) 2003 (62) 2004 (111) 2005 (152) 2006 (209) 2007 (289) 2008 (315) 2009 (187) 2010 (73) 2011 (46) 2012 (46) 2013 (42) 2014 (76) 2015 (82) 2016 (77) 2017 (100) 2018 (86) 2019 (117) 2020 (156) 2021 (181) 2022 (201) 2023 (219) 2024 (49)
Publication types (Num. hits)
article(1002) incollection(3) inproceedings(1980) phdthesis(19)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1576 occurrences of 1107 keywords

Results
Found 3004 publication records. Showing 3004 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
36Ken Layng Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track. Search on Bibsonomy SIGUCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF PII, non-technical, management, efficiency, encryption, project, risks, strategy, sensitive, scanning, data, team, remediation, mitigate
20Tzung-Shi Chen, Hua-Wen Tsai, Ying-Hung Lo, Yi-Shiang Chang Mitigating query hotspots for wireless sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF wireless sensor networks, routing, query, hotspot
20Min Kyung Lee, Sara B. Kiesler, Jodi Forlizzi, Siddhartha S. Srinivasa, Paul E. Rybski Gracefully mitigating breakdowns in robotic services. Search on Bibsonomy HRI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF robot breakdown, robot error, service recovery, human-robot interaction, services, social robot, error recovery
20Songping Wu, Pan Liu, Yeheskel Bar-Ness Phase Noise Estimation and Mitigation for OFDM Systems. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Charneta Samms, David Jones 0001, Kelly S. Hale, Diane Mitchell Harnessing the Power of Multiple Tools to Predict and Mitigate Mental Overload. Search on Bibsonomy HCI (17) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF IMPRINT, MIDS, integrated toolset, multimodal, command and control, overload, mental workload
20Rabia Haq, Michael L. Nelson Using timed-release cryptography to mitigate the preservation risk of embargo periods. Search on Bibsonomy JCDL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF time lock, timed release, cryptography, repositories
20Amlan Ghosh, Rahul M. Rao, Richard B. Brown A centralized supply voltage and local body bias-based compensation approach to mitigate within-die process variation. Search on Bibsonomy ISLPED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fine-grain body-biasing, process variation compensation, slewrate
20Yu Wang 0002, Xiaoming Chen 0003, Wenping Wang, Varsha Balakrishnan, Yu Cao 0001, Yuan Xie 0001, Huazhong Yang On the efficacy of input Vector Control to mitigate NBTI effects and leakage power. Search on Bibsonomy ISQED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Xuhua Ding, Wei Yu 0002, Ying Pan A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Haithem Al-Mefleh, J. Morris Chang A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Antonio Ferreira 0001, Pedro Antunes 0001 An Attentive Groupware Device to Mitigate Information Overload. Search on Bibsonomy DSV-IS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Xi Chen, Gaogang Xie, Jianhua Yang Mitigate DDoS attack using TTL buckets and host threatening index. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Meeta Sharma Gupta, Krishna K. Rangan, Michael D. Smith 0001, Gu-Yeon Wei, David M. Brooks Towards a software approach to mitigate voltage emergencies. Search on Bibsonomy ISLPED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF dynamic optimization framework, voltage emergencies, hardware-software codesign, di/dt
20Amey Shevtekar, Nirwan Ansari A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. Search on Bibsonomy ICCCN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20André Soares 0001, William Giozza, Paulo R. F. Cunha Classification Strategy to Mitigate Unfairness in All-Optical Networks. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Eric S. Fetzer Using Adaptive Circuits to Mitigate Process Variations in a Microprocessor Design. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF dual core, Itanium microprocessor, Montecito, adaptive circuits, cache safe technology, active clock deskew, process variation, power measurement
20Rajendra V. Boppana, Saman Desilva Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yung-Pin Cheng Crafting a Promela Front-End with Abstract Data Types to Mitigate the Sensitivity of (Compositional) Analysis to Implementation Choices. Search on Bibsonomy SPIN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20John D. Lee, Joshua D. Hoffman, Elizabeth Hayes Collision warning design to mitigate driver distraction. Search on Bibsonomy CHI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF collision warning systems, smart cars, trust, notification systems, user acceptance, distraction
20Kainam Thomas Wong, S. L. A. Chan, Rafael P. Torres Fast-polarization-hopping transmit-diversity to mitigate prolonged deep fades. Search on Bibsonomy ISCAS (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Thomas F. Brady Energy production and trading: using computer simulation to mitigate risk in electricity generation/consumption collaboration policies. Search on Bibsonomy WSC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Dennis Mulcare Striving for coherency to mitigate the complexity of system design. Search on Bibsonomy ECBS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF system design complexity, software system complexity, design product, functional architecture, embedded systems, systems analysis, design process, architectural design, system requirements, system specifications
14Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
14Marijn Janssen, Bram Klievink ICT-project failure in public administration: the need to include risk management in enterprise architectures. Search on Bibsonomy DG.O The full citation details ... 2010 DBLP  BibTeX  RDF Prince2, project failure, service-oriented architecture, e-government, project management, risk management, enterprise architecture, information architecture
14Nagaraj Ns, Juan C. Rey, Jamil Kawa, Robert C. Aitken, Christian Lütkemeyer, Vijay Pitchumani, Andrzej J. Strojwas, Steve Trimberger Who solves the variability problem? Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF IC variability
14Nicholas Holden, Alex Alves Freitas Hierarchical classification of protein function with ensembles of rules and particle swarm optimisation. Search on Bibsonomy Soft Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Hierarchical classification, Particle swarm optimisation, Protein function prediction
14Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. Search on Bibsonomy STC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF attestation systems, integrity monitoring, return-oriented programming
14Yvan Pointurier, Maïté Brandt-Pearce, Suresh Subramaniam 0001, Bo Xu Cross-layer adaptive routing and wavelength assignment in all-optical networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Umut Orguner, Fredrik Gustafsson Risk-Sensitive Particle Filters for Mitigating Sample Impoverishment. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Mel Gorman, Patrick Healy Supporting superpage allocation without additional hardware support. Search on Bibsonomy ISMM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF superpage, fragmentation, replacement policy, tlb
14Tae Hyun Kim 0001, Robert W. Heath Jr., Sunghyun Choi 0001 Multiuser MIMO Downlink with Limited Feedback Using Transmit-Beam Matching. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Tanya G. Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shankar Sastry 0001 Testbed Implementation of a Secure Flooding Time Synchronization Protocol. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Sanjeev Kumar, Einar Petana Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security
14Kevin Brownell, Gu-Yeon Wei, David M. Brooks Evaluation of voltage interpolation to address process variations. Search on Bibsonomy ICCAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Feng Wang 0017, Lixin Gao 0001, Oliver Spatscheck, Jia Wang STRID: Scalable Trigger-Based Route Incidence Diagnosis. Search on Bibsonomy ICCCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Fei Wang, Yijun Mo, Benxiong Huang Defending Reputation System against False Recommendation in Mobile Ad Hoc Network. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Qiyue Zou, Alireza Tarighat, Ali H. Sayed Compensation of Phase Noise in OFDM Wireless Systems. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Keqiang Wu, David J. Lilja, Haowei Bai An adaptive dual control framework for QoS design. Search on Bibsonomy Clust. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adaptive dual control, Quality of service, Distributed system
14Shanshan Li 0001, Shaoliang Peng, Xiangke Liao, Peidong Zhu, Yuxing Peng 0001 A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti Using CP-nets as a guide for countermeasure selection. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Ivan P. L. Png Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
14Ahmed Youssef, Tor Myklebust, Mohab Anis, Mohamed I. Elmasry A Low-Power Multi-Pin Maze Routing Methodology. Search on Bibsonomy ISQED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Soon-Keow Chong, Jemal H. Abawajy Feedback Credibility Issues In Trust Management Systems. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Thomas Sandholm, Kevin Lai A statistical approach to risk mitigation in computational markets. Search on Bibsonomy HPDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF QoS, resource allocation, service level management
14Yufeng Wang 0001, Yoshiaki Hori, Kouichi Sakurai On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. Search on Bibsonomy APWeb/WAIM Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Zhengyi Le, Yi Ouyang 0001, Yurong Xu, James Ford, Fillia Makedon Preventing Unofficial Information Propagation. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Jin He, Masoud Salehi Chip-Level Coordinated Interference-Aware Beamforming for MIMO-CDMA in Frequency-Selective Broadcast Channels. Search on Bibsonomy CISS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
14Luca Sterpone, Massimo Violante A New Reliability-Oriented Place and Route Algorithm for SRAM-Based FPGAs. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF transient fault injection, FPGA, reliability, place and route
14Jiyun Shen, Hiromasa Fujii, Takahiro Asai, Hitoshi Yoshino Sequential Search Method with Different Thresholds for Clipped Power for OFDM Signal. Search on Bibsonomy VTC Spring The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic Noxes: a client-side solution for mitigating cross-site scripting attacks. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Frank S. Rietta Application layer intrusion detection for SQL injection. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF anomaly detection, database security, SQL injection
14Janice Warner, Vijayalakshmi Atluri Inter-instance authorization constraints for secure workflow management. Search on Bibsonomy SACMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, work flow, authorization constraints
14Aifeng Ren, Qinye Yin 0001 Blind Multi-user Detection for Multi-carrier CDMA Systems with Uniform Linear Arrays. Search on Bibsonomy ICNC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14David Duncombe, George M. Mohay, Andrew J. Clark Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF immunological., intrusion detection, alert correlation
14Souvik Barat, Vinay Kulkarni, D. Janakiram A safety criterion for reusing a business process in the desired integrated. Search on Bibsonomy IEEE SCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Hiroshi Yamamoto, Masato Tsuru, Yuji Oie Parallel Transferable Uniform Multi-round Algorithm for Achieving Minimum Application Turnaround Times for Divisible Workload. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Master/Worker model, Divisible Workload, UMR, Parallel Data Transmission, Constraint Minimization Problem
14Srinivas Raghvendra, Philippe Hurat DFM: Linking Design and Manufacturing. Search on Bibsonomy VLSI Design The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Ed Crowley Open source centric information security lab development. Search on Bibsonomy SIGITE Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF knoppix, live CD, security, Linux
14Vir V. Phoha, Amit U. Nadgar, Asok Ray, Shashi Phoha Supervisory Control of Software Systems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Yngvar Larsen, Geert Leus, Georgios B. Giannakis Constant modulus and reduced PAPR block differential encoding for frequency-selective channels. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Tom W. Chen, Justin Gregg A Low Cost Individual-Well Adaptive Body Bias (IWABB) Scheme for Leakage Power Reduction and Performance Enhancement in the Presence of Intra-Die Variations. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Anders Edman, Christer Svensson Timing closure through a globally synchronous, timing partitioned design methodology. Search on Bibsonomy DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF wire delays, clock skew, timing closure
14Robert J. Thomas, Timothy Mount, Ray Zimmerman, William Schulze, Richard E. Schuler, L. Duane Chapman Testing the Effects of Price Responsive Demand on Pay-as-Offered and Soft-Cap Electricity Auctions. Search on Bibsonomy HICSS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
14Jonathan K. Millen, Rebecca N. Wright Reasoning about Trust and Insurance in a Public Key Infrastructure. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptography, trust, logic, certificate, public key infrastructure, insurance
14Raymond A. Paul, Ann T. Tai Building High-Assurance Systems Using COTS Components: Whether, Why, When and How? Search on Bibsonomy HASE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Enhui Chai, Li Chen, Xingxing Hao, Wei Zhou Mitigate the scale imbalance via multi-scale information interaction in small object detection. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Fei Li, Laili Wang, Min Wu, Longyang Yu A Coupled-Inductor-Based Input-Parallel Output-Parallel Quasi-Resonant Single-Stage DC-DC Converter to Mitigate Current Difference. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Sheetal Kaushik, Khushboo Tripathi, Rashmi Gupta, Prerna Mahajan Enhancing Reliability in Mobile Ad Hoc Networks (MANETs) Through the K-AOMDV Routing Protocol to Mitigate Black Hole Attacks. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Amir Reza Rahimi A tri-phenomenon perspective to mitigate MOOCs' high dropout rates: the role of technical, pedagogical, and contextual factors on language learners' L2 motivational selves, and learning approaches to MOOC. Search on Bibsonomy Smart Learn. Environ. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Hideki Kondo, Sayaka Tohyama, Ayano Ohsaki, Masayuki Yamada Time-shifting Method to Mitigate Discussion Stagnation and Promote SNS Collaboration. Search on Bibsonomy J. Inf. Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Homayoun Afshari, Zolfa Zeinalpour-Yazdi A Game-Theoretical and Spatial Approach to Mitigate Pilot Contamination in Crowded Massive MIMO Systems. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Inyoung Bang, Martin Kayondo, Junseung You, Donghyun Kwon, Yeongpil Cho, Yunheung Paek Enhancing a Lock-and-Key Scheme With MTE to Mitigate Use-After-Frees. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Le Nam Pham, Khoa Dang Pham, Quoc Dung Phan, Nho-Van Nguyen Novel Virtual Vector SVPWM Method to Mitigate Low-Frequency Common Mode Voltage for Four-Level NPC Inverters. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Boyang Zhou, Chunming Wu 0001, Qiang Yang 0004, Yaguan Qian, Yinghui Nie Resilient Sensor Data Dissemination to Mitigate Link Faults in IoT Networks With Long-Haul Optical Wires for Power Transmission Grids. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Ehsan Naderi, Arash Asrari A Remedial Action Scheme To Mitigate Market Power Caused by Cyberattacks Targeting a Smart Distribution System. Search on Bibsonomy IEEE Trans. Ind. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Xiaohui Gu, Guoan Zhang, Wei Duan 0001, Jaeho Choi, Miaowen Wen, Pin-Han Ho RIS-V2V Communications: The Way to Mitigate Doppler Shifts and Multipath Spread. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Han Qiu 0001, Yi Zeng, Qinkai Zheng, Shangwei Guo, Tianwei Zhang 0004, Hewu Li An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Jinghua Groppe, Sven Groppe, Daniel Senf, Ralf Möller 0001 There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Salman Bin Naeem, Mehreen Azam, Maged N. Kamel Boulos, Rubina Bhatti Leveraging the TOE Framework: Examining the Potential of Mobile Health (mHealth) to Mitigate Health Inequalities. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh 0001, Maen Alzubi, Khaled Alrfou DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Frank John Bolton, Dov Te'eni, Eran Toch Can Previews Mitigate the Effect of Interruptions? Findings from a Lab Experiment under Various Workloads. Search on Bibsonomy Int. J. Hum. Comput. Interact. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13F. Nisa Bostanci, Ismail Emir Yuksel, Ataberk Olgun, Konstantinos Kanellopoulos, Yahya Can Tugrul, Abdullah Giray Yaglikçi, Mohammad Sadrosadati, Onur Mutlu CoMeT: Count-Min-Sketch-based Row Tracking to Mitigate RowHammer at Low Cost. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Gautam Kishore Shahi TweetInfo: An Interactive System to Mitigate Online Harm. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Dane Brouwer, Joshua Citron, Hojung Choi, Marion Lepert, Michael A. Lin, Jeannette Bohg, Mark R. Cutkosky Tactile-Informed Action Primitives Mitigate Jamming in Dense Clutter. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Hao Hao Tan, Kin Wai Cheuk, Taemin Cho, Wei-Hsiang Liao, Yuki Mitsufuji MR-MT3: Memory Retaining Multi-Track Music Transcription to Mitigate Instrument Leakage. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Wei Chen, Yunan Li, Yuan Tian CarbonNet: How Computer Vision Plays a Role in Climate Change? Application: Learning Geomechanics from Subsurface Geometry of CCS to Mitigate Global Warming. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Matthew J. Skiles, Joshua D. Rhodes, Michael E. Webber Assessing the Potential for Building Sector Retrofits to Mitigate ERCOT Electricity Shortfalls During Winter Storm Uri. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yuu Jinnai, Tetsuro Morimura, Kaito Ariu, Kenshi Abe Regularized Best-of-N Sampling to Mitigate Reward Hacking for Language Model Alignment. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Lucas Friedrich, Jonas Maziero Quantum neural network with ensemble learning to mitigate barren plateaus and cost function concentration. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Haoqing Li, Jinfu Yang, Yifei Xu, Runshi Wang Mitigate Target-level Insensitivity of Infrared Small Target Detection via Posterior Distribution Modeling. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Doris E. M. Brown, Venkata Sriram Siddhardh Nadendla, Sajal K. Das 0001 TASR: A Novel Trust-Aware Stackelberg Routing Algorithm to Mitigate Traffic Congestion. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yuhe Ke, Rui Yang, Sui An Lie, Taylor Xin Yi Lim, Hairil Rizal Abdullah, Daniel Shu Wei Ting, Nan Liu 0003 Enhancing Diagnostic Accuracy through Multi-Agent Conversations: Using Large Language Models to Mitigate Cognitive Bias. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zhibo Zhang, Pengfei Li, Ahmed Y. Al Hammadi, Fusen Guo, Ernesto Damiani, Chan Yeob Yeun Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Junho Kim, Yeonju Kim, Yong Man Ro What if...?: Counterfactual Inception to Mitigate Hallucination Effects in Large Multimodal Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Yijiang Pang, Hoang Bao, Jiayu Zhou Cross-modality debiasing: using language to mitigate sub-population shifts in imaging. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Minchan Kim, Minyeong Kim, Junik Bae, Suhwan Choi, Sungkyung Kim, Buru Chang Exploiting Semantic Reconstruction to Mitigate Hallucinations in Vision-Language Models. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Huiyu Xiong, Lanxiao Wang, Heqian Qiu, Taijin Zhao, Benliu Qiu, Hongliang Li MCF-VC: Mitigate Catastrophic Forgetting in Class-Incremental Learning for Multimodal Video Captioning. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Md. Morshed Alam, Israt Jahan, Weichao Wang IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
13Zeliang Zhang, Mingqian Feng, Zhiheng Li, Chenliang Xu Discover and Mitigate Multiple Biased Subgroups in Image Classifiers. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3004 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license