The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for mitigation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1974-1997 (18) 1998-1999 (23) 2000 (18) 2001 (22) 2002 (37) 2003 (55) 2004 (73) 2005 (112) 2006 (157) 2007 (220) 2008 (239) 2009 (221) 2010 (184) 2011 (269) 2012 (282) 2013 (307) 2014 (353) 2015 (426) 2016 (457) 2017 (476) 2018 (551) 2019 (644) 2020 (648) 2021 (715) 2022 (778) 2023 (909) 2024 (194)
Publication types (Num. hits)
article(3883) book(1) data(6) incollection(17) inproceedings(4331) phdthesis(149) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 574 occurrences of 458 keywords

Results
Found 8388 publication records. Showing 8388 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
74Ronald Joe Stanley, Sanjeev Agarwal, Satish Somanchi The impact of false alarm mitigation on surface landmine detection in MWIR imagery. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Airborne, Circular harmonics, False alarm mitigation, Landmine, RX, Image Processing, Transform
74Dimitrios Georgakopoulos 0001, Hans Schuster, Donald Baker, Andrzej Cichocki Managing Escalation of Collaboration Processes in Crisis Mitigation Situations. Search on Bibsonomy ICDE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Collaboration Management, Workflow, Awareness, Dynamic Change
65Hemant Joshi, Remzi Seker, Coskun Bayrak, Srini Ramaswamy, Jeffrey B. Connelly Ontology for disaster mitigation and planning. Search on Bibsonomy SCSC The full citation details ... 2007 DBLP  BibTeX  RDF disaster mitigation, disaster planning, disaster simulation, ontology-based simulation
64Young Min Ki, Jeong Woo Kim, Sang Rok Kim, Dong Ku Kim Modified RWGH and Positive Noise Mitigation Schemes for TOA Geolocation in Indoor Multi-hop Wireless Networks. (PDF / PS) Search on Bibsonomy PWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
64Richard Tabors, Judith B. Cardell Ex Ante and Ex Post Designs for Electric Market Mitigation: Past and Present Experience and Lessons from California. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
57Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
57Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst 10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
57Sarah Smith Heckman, Laurie A. Williams On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques. Search on Bibsonomy ESEM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF alert classification, alert prioritization, automated static analysis, benchmark creation, false positive mitigation
57Hans Schuster, Donald Baker, Andrzej Cichocki, Dimitrios Georgakopoulos 0001, Marek Rusinkiewicz The Collaboration Management Infrastructure. Search on Bibsonomy ICDE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Process Templates, Dynamic Process Change, Crisis Mitigation, Collaboration, Workflow Management
56Abhishek Dubey, Steven Nordstrom, Turker Keskinpala, Sandeep Neema, Ted Bapty, Gabor Karsai Towards a verifiable real-time, autonomic, fault mitigation framework for large scale real-time systems. Search on Bibsonomy Innov. Syst. Softw. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Fault mitigation, Healing, Fault tolerance, Real time systems, Model checking, Autonomic computing, Timed automaton, Reflex
55Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis Requirements on Worm Mitigation Technologies in MANETS. Search on Bibsonomy PADS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
49Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 Search on Bibsonomy Insider Threats: Strategies for Prevention, Mitigation, and Response The full citation details ... 2010 DBLP  BibTeX  RDF
47Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli Assessing the Risk of an Information Infrastructure Through Security Dependencies. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mitigation plan, ranking, risk assessment, vulnerability, countermeasure
46Gao Peng, Meng Dexiang, Zhang Dongchen, Song Zhiyuan Inter-cell interference mitigation based on resource joint time-frequency planning and scheduling in OFDMA system. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cell-edge throughput, inter-cell interference mitigation, orthogonal frequency division multiple access
46Michael Nicolaidis A Low-Cost Single-Event Latchup Mitigation Sscheme. Search on Bibsonomy IOLTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Latchup, Single-event effects, singleevent lathcup, SEL, mitigation of single-event effects
46Arjen K. Lenstra, Tim Voss Information Security Risk Assessment, Aggregation, and Mitigation. Search on Bibsonomy ACISP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF risk aggregation, risk mitigation, Basel 2, multiple-choice knapsack problem, Risk management, risk assessment
46Sanghun Kim, Seungsoo Yoo, Seokho Yoon, Sun Yong Kim A Novel Unambiguous Multipath Mitigation Scheme for BOC(kn, n) Tracking in GNSS. Search on Bibsonomy SAINT Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, Marco Salvato Model-Based Mitigation of Availability Risks. Search on Bibsonomy BDIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Tsuyoshi Hatori, Kakuya Matsushima, Kiyoshi Kobayashi Providing disaster information and motivation for mitigation. Search on Bibsonomy SMC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
38Kay M. Stanney, Kelly S. Hale, David Jones 0001 Augmented Cognition Design Approaches for Treating Mild Traumatic Brain Injuries. Search on Bibsonomy HCI (16) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mild traumatic brain injury, mitigation strategies, Augmented cognition
38Dianxiang Xu, Vivek Goel, Kendall E. Nygard An Aspect-Oriented Approach to Security Requirements Analysis. Search on Bibsonomy COMPSAC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF use case, aspect-oriented software development, Security requirements, threats, mitigation
37Alberto Avritzer, Robert G. Cole, Elaine J. Weyuker Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs. Search on Bibsonomy WOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile ad hoc networks (MANETS), software monitoring, computer worms, mitigation
37Keiji Nagatani, Kazuya Yoshida, Kiyoshi Kiyokawa, Yasushi Yagi, Tadashi Adachi, Hiroaki Saitoh, Toshiya Suzuki, Osamu Takizawa Development of a Networked Robotic System for Disaster Mitigation. Search on Bibsonomy FSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Disaster mitigation, Surveillance robots, Laser range sensor, Ad-hoc network, Augmented reality, Teleoperation, Omnidirectional camera
37Kohl Witmer, Rhoda Baggs Koss, Tamas Kasza A method for risk mitigation during the requirements phase for multimedia software systems. Search on Bibsonomy SIGDOC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multimedia requirements, risk mitigation
37Kazuya Yoshida, Keiji Nagatani, Kiyoshi Kiyokawa, Yasushi Yagi, Tadashi Adachi, Hiroaki Saito, Hiroyuki Tanaka, Hiroyuki Ohno Development of a Networked Robotic System for Disaster Mitigation - Test Bed Experiments for Remote Operation over Rough Terrain and High Resolution 3D Geometry Acquisition. Search on Bibsonomy FSR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Disaster Mitigation, Surveillance Robots, Wireless and Satellite-Based IP Communication, Telepresence and Teleoperation, Ad-hoc Networking, Mixed Reality, Omnidirectional Camera, Laser Range Scanner
37Ali Alaghehbandian, Ping Zhu, Masato Abé, Junji Kiyono Developing an Internet Oriented Platform for Earthquake Engineering Application and Web-based Simulation System for Seismic Hazards: Towards Disaster Mitigation in Metropolises. Search on Bibsonomy IV The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Disaster mitigation, Internet, XML, Virtual Reality, Information system, VRML, Risk communication
36Xiaohua Li, Fan Ng, Taewoo Han Carrier Frequency Offset Mitigation in Asynchronous Cooperative OFDM Transmissions. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Swaroop Venkatesh, R. Michael Buehrer A linear programming approach to NLOS error mitigation in sensor networks. Search on Bibsonomy IPSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF NLOS environment, time-of-arrival estimation, wireless sensor networks, location estimation, line-of-sight
36Judith B. Cardell Defining a Market: Market Mitigation by Theory versus Convenience. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Benjamin A. Carreras, Vickie E. Lynch, David E. Newman, Ian Dobson Blackout Mitigation Assessment in Power Transmission Systems. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Khalid Saeed 0003, Atsushi Fukuda Testing Design of a Social Innovation The Environmental Mitigation Banking System. Search on Bibsonomy HICSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Kyung Hoon Won, Jung-Su Han, Hyung-Jin Choi, BonYoung Koo Noise insensitive sampling frequency offset estimation methods for DVB-T/H systems. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF DVB-T/H, iterative interpolation, noise mitigation, sampling frequency offset, OFDM
29David John Zage, Cristina Nita-Rotaru On the accuracy of decentralized virtual coordinate systems in adversarial networks. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF attack mitigation, virtual coordinate systems, security, reliability, network coordinates
29Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. Search on Bibsonomy IMACC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion
29Geoffrey G. Roy, Terence L. Woodings A framework for risk analysis in software engineering. Search on Bibsonomy APSEC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF project management process quality, risk mitigation strategies, ProRisk, risk management tool, software engineering, software development, project management, risk management, software development management, risk analysis, project plan
28Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel Server-Side Prediction of Source IP Addresses Using Density Estimation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jeremy Goecks, W. Keith Edwards, Elizabeth D. Mynatt Challenges in supporting end-user privacy and security management with social navigation. Search on Bibsonomy SOUPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF acumen, bonfire, end-user privacy and security, herding, decision making, social navigation, informational cascades
28Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang Unified Defense Against DDoS Attacks. Search on Bibsonomy Networking The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Haruhiko Kaneko, Eiji Fujiwara Reconstruction of Erasure Correcting Codes for Dependable Distributed Storage System without Spare Disks. Search on Bibsonomy DFT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Varadraj Prabhu Gurupur, Urcun John Tanik Software cultivation using the artificial intelligence design framework. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Melanie Berg Fault Tolerance Implementation within SRAM Based FPGA Design Based upon the Increased Level of Single Event Upset Susceptibility. Search on Bibsonomy IOLTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Joshua J. Pauli, Dianxiang Xu Integrating Functional and Security Requirements with Use Case Decomposition. Search on Bibsonomy ICECCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Louis C. Rose Risk Management of COTS Based Systems Development. Search on Bibsonomy Component-Based Software Quality The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
28Kiyoshi Nagata On Clustering of Risk Mitigation Controls. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF mitigation control, Information security, fuzzy clustering
28Sinem Güven, Catalin-Mihai Barbu A Real-Time Risk Assessment and Mitigation Engine Based on Dynamic Context. Search on Bibsonomy IEEE SCC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Risk Mitigation, Risk Assesment, Dynamic Context, Risk Management, Change Management
28Lei Zhong, Yusheng Ji, Min Gong, Fuqiang Liu 0001 Interference mitigation for distributed MIMO cellular systems using cooperative beamforming. Search on Bibsonomy IWCMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cooperative beamforming, distributed MIMO, interference mitigation
28Basit Shahzad, Abdullah S. Al-Mudimigh Risk Identification, Mitigation and Avoidance Model for Handling Software Risk. Search on Bibsonomy CICSyN The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software risk handling, risk mitigation, Software risk management
28Khalid Elbadawi, Ehab Al-Shaer TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF traffic replay, virtual machine, recovery, replay, intrusion, mitigation
28Brunil Dalila Romero Marino, Hisham M. Haddad Security Vulnerabilities and Mitigation Strategies for Application Development. Search on Bibsonomy ITNG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF software threat mitigation, software quality, software security, software vulnerability
28Laura Frigerio, Matteo Alan Radaelli, Fabio Salice Convolutional Coding for SEU mitigation. Search on Bibsonomy ETS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF SEU mitigation, convolutional coding
28Markus Goldstein, Christoph H. Lampert, Matthias Reif, Armin Stahl, Thomas M. Breuel Bayes Optimal DDoS Mitigation by Adaptive History-Based IP Filtering. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF History-Based IP Filtering, DDoS, Bayes, Mitigation
27Murad Abusubaih, Berthold Rathke, Adam Wolisz A framework for interference mitigation in multi-BSS 802.11 wireless LANs. Search on Bibsonomy WOWMOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Sobeeh Almukhaizim, Yiorgos Makris Soft Error Mitigation Through Selective Addition of Functionally Redundant Wires. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Guanhua Yan, Stephan J. Eidenbenz DDoS Mitigation in Non-cooperative Environments. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Rab Nawaz, Sumei Sun Bluetooth Interference Mitigation in 802.11g. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Itsuki Noda Integrated Simulation and Information Sharing System for Disaster Mitigation. Search on Bibsonomy ACRI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27Reiko Ann Miura-Ko, Nicholas Bambos Dynamic Risk Mitigation in Computing Infrastructures. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Sheetal Kalyani, Vimal Raj, Krishnamurthy Giridhar Narrowband Interference Mitigation in Turbo-Coded OFDM Systems. Search on Bibsonomy ICC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Hamid R. Zarandi, Seyed Ghassem Miremadi, Dhiraj K. Pradhan, Jimson Mathew SEU-Mitigation Placement and Routing Algorithms and Their Impact in SRAM-Based FPGAs. Search on Bibsonomy ISQED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Jang-Wook Moon, John M. Shea, Tan F. Wong Collaborative mitigation of partial-time jamming on nonfading channels. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Lei Zhang 0015, Shaoqian Li, Hongming Zheng, May Wu A Selective Co-Channel Interference Mitigation Method for Alamouti Code. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Patrick Picher, Leonard Bolduc, Bruno Girard, Van Nhi Nguyen Mitigation of Ferroresonance Induced by Single-Phase Opening of a Three-Phase Transformer Feeder. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Panneerselvam Kolandaivel, Rajat Aggarwal A Novel Earthquake Mitigation Information expert System: EMIS. Search on Bibsonomy CCECE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Yasamin Mostofi, Donald C. Cox ICI mitigation for pilot-aided OFDM mobile systems. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Ikuo Takeuchi A Massively Multi-agent Simulation System for Disaster Mitigation. Search on Bibsonomy MMAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
27Kamal E. Alameh, Abdesselam Bouzerdoum, Selam T. Ahderom, Mehrdad Raisi, Kamran Eshraghian, X. Zhao, Rong Zheng 0002, Zhenglin Wang Integrated MicroPhotonic Wideband RF Interference Mitigation Filter. Search on Bibsonomy DELTA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Zhe Feng 0002, Naifeng Jing, GengSheng Chen, Yu Hu 0002, Lei He 0001 IPF: In-Place X-Filling to Mitigate Soft Errors in SRAM-Based FPGAs. Search on Bibsonomy FPL The full citation details ... 2011 DBLP  DOI  BibTeX  RDF in-place, soft error, don't care, mitigation, SRAM-based FPGA
19Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF jamming detection and mitigation, wireless multiple access, security, wireless sensor network, optimization, Jamming
19Cameron D. Patterson, Steven W. Ellingson, Brian S. Martin, K. Deshpande, John H. Simonetti, Michael Kavic, Sean E. Cutchin Searching for Transient Pulses with the ETA Radio Telescope. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Direct sampling radio telescope array, FPGA cluster computing, RFI mitigation, signal dedispersion
19Ayman Elezabi, Mohamed Kashef, Mohamed M. Abdallah 0001, Mohamed M. Khairy Cognitive interference-minimizing code assignment for underlay CDMA networks in asynchronous multipath fading channels. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF blind epoch acquisition, interference mitigation, underlay CDMA networks, cognitive radio
19Robert Strauss, Ali Abedi 0001 Game theoretic power allocation in sparsely distributed clusters of wireless sensors (GPAS). Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interference mitigation, sparse distributions, wireless sensor networks, game theory, power minimization
19Yves Louët, Jacques Palicot A classification of methods for efficient power amplification of signals. Search on Bibsonomy Ann. des Télécommunications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF PAPR mitigation, Classification, Methods, Linearization
19Christian G. Zoellin, Hans-Joachim Wunderlich, Ilia Polian, Bernd Becker 0001 Selective Hardening in Early Design Steps. Search on Bibsonomy ETS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Soft error mitigation, reliability
19Juan C. Dueñas, Hugo A. Parada G., Félix Cuadrado, Manuel Santillán, José L. Ruiz 0001 Apache and Eclipse: Comparing Open Source Project Incubators. Search on Bibsonomy IEEE Softw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Free and open source software, open source processes, incubation processes, project risk mitigation, open source software, open source communities
19Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF robust hardware, back-end design automation, power-constant architectures, DFY, side-channel attacks, DFM, mitigation
19Julian Seidenberg, Alan L. Rector A methodology for asynchronous multi-user editing of semantic web ontologies. Search on Bibsonomy K-CAP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF error mitigation, multi-user editing, ontology, semantic web, concurrency, knowledge representation, methodology
19Haizhi Xu, Steve J. Chapin Improving address space randomization with a dynamic offset randomization technique. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF address space randomization, code islands, derandomization attacks, intrusion mitigation, randomization, denial-of-service attacks
19Alyson K. Fletcher, Sundeep Rangan, Vivek K. Goyal Estimation from lossy sensor data: jump linear modeling and Kalman filtering. Search on Bibsonomy IPSN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF loss mitigation, minimum mean-squared error estimation, signal recovery, tracking, state-space modeling
19Jeffrey M. Voas A World Without Risks: Let Me Out! Search on Bibsonomy HASE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF avoidance, software, risk, mitigation
19Steven Gringeri, Roman V. Egorov, Khaled Shuaib, Arianne Lewis, Bert Basch Robust compression and transmission of MPEG-4 video. Search on Bibsonomy ACM Multimedia (1) The full citation details ... 1999 DBLP  DOI  BibTeX  RDF error mitigation, robust video, MPEG-4, error resilience
19Gianmarco Baldini, Janie Baños, Xiaochen Chen Test bed design for detect and avoid of ultra wideband devices. Search on Bibsonomy CoRoNet@MobiCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF testing, UWB, DAA
19Mikhail M. Lavrentiev Jr., Alexey Romanenko, Vasily Titov, Alexander Vazhenin High-Performance Tsunami Wave Propagation Modeling. Search on Bibsonomy PaCT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Tsunami Wave Propagation Modeling, Method of Splitting Tsunami, Fine-grain Parallel Algorithms, OpenMP Paradigm, Cell BE Architecture
19Martijn Zoet, Richard J. Welke, Johan Versendaal, Pascal Ravesteyn Aligning Risk Management and Compliance Considerations with Business Process Development. Search on Bibsonomy EC-Web The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Business Processes, Risk Management, Governance, Business Rules, Regulatory Compliance
19John W. Stamey, Ryan A. Rossi Automatically identifying relations in privacy policies. Search on Bibsonomy SIGDOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF latent relations, ambiguities, privacy policies
19Weihua Chen, Xia Lei, Shaoqian Li OFDM Channel Estimation and Signal Detection on Nonintegral-Delay and Fast Time-Varying Channels. Search on Bibsonomy RSKT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fast time-varying channel, nonintegral-delay, channel estimation, signal detection, ESPRIT
19Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. Search on Bibsonomy Infoscale The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Trust, DDoS Attacks, Lightweight, Application layer
19Zhongjun Wang, Yan Xin 0001, Masayuki Tomisawa Phase Error Suppression for Multi-Band OFDM-Based UWB Systems. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Che-Sheng Chiu, Chia-Chi Huang Combined Partial Reuse and Soft Handover in OFDMA Downlink Transmission. Search on Bibsonomy VTC Spring The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Taehoon Kwon, Hyungjoon Song, Jemin Lee, Youngju Kim, Jonghyuk Lee, Daesik Hong A Power Division Reuse Partitioning Scheme with Half Frequency Reuse Factor for OFDMA Downlink Systems. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Eric Koomen, Willem Loonen, Maarten Hilferink Climate-Change Adaptations in Land-Use Planning; A Scenario-Based Approach. Search on Bibsonomy AGILE Conf. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF land use modelling, climate change, spatial patterns, spatial planning
19Tim Lant, Megan Jehn, Cody Christensen, Ozgur Merih Araz, John W. Fowler Simulating pandemic influenza preparedness plans for a public university: A hierarchical system dynamics approach. Search on Bibsonomy WSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Joshua J. Pauli, Patrick Henry Engebretson Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Refinement, Hierarchy, Attack Trees, Attack Patterns
19Jing Wang, Zhanli Liu, Yan Wang 0027, Xiaohu You 0001 Segmented Equalization for OFDM Systems with Phase Noise. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Stefan Geirhofer, Ozgur Oyman Client-centric fractional frequency reuse based on user cooperation in OFDMA networks. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Ruiliang Chen, Jung-Min Park 0001, Randolph Marchany A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Network-level security and protection
19Jonathan P. Caulkins, Eric D. Hough, Nancy R. Mead, Hassan Osman Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Md. Mahbubur Rahman, Md. Delowar Hossain, A. B. M. Shawkat Ali Performance Analysis of OFDM Systems with Phase Noise. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF CPE, OFDM, BER, Phase Noise, AWGN, ICI
19Enzo Baccarelli, Mauro Biagi, Cristian Pelizzoni, Nicola Cordeschi Multi-antenna cognitive radio for broadband access in 4G-WLANs. Search on Bibsonomy MOBIWAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF competitive optimality, game theory, active networks, power allocation, MAI, multiple antennas, SDMA
Displaying result #1 - #100 of 8388 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license