The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for preventing with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1985 (15) 1987-1990 (15) 1991-1993 (19) 1994-1995 (15) 1996-1997 (24) 1998 (20) 1999 (23) 2000 (32) 2001 (43) 2002 (70) 2003 (75) 2004 (114) 2005 (173) 2006 (172) 2007 (207) 2008 (226) 2009 (157) 2010 (104) 2011 (72) 2012 (78) 2013 (84) 2014 (94) 2015 (100) 2016 (109) 2017 (107) 2018 (113) 2019 (143) 2020 (126) 2021 (165) 2022 (159) 2023 (163) 2024 (34)
Publication types (Num. hits)
article(932) book(3) incollection(27) inproceedings(2056) phdthesis(32) proceedings(1)
Venues (Conferences, Journals, ...)
CoRR(179) IEEE Access(29) IACR Cryptol. ePrint Arch.(25) CCS(18) Web Intelligence and Security ...(18) Wirel. Pers. Commun.(18) ICC(17) Sensors(17) HICSS(14) SAC(14) NDSS(13) ACSAC(12) ICRA(12) IROS(12) USENIX Security Symposium(12) AAAI(11) More (+10 of total 1504)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1564 occurrences of 1117 keywords

Results
Found 3051 publication records. Showing 3051 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
55M. Hamdi Özçelik, Ekrem Duman Preventing Internet Banking Fraud and Money Laundering Using Customer Trustability Index. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
55Stephan Diehl 0001, Ulrike Stege 09142 Manifesto - Perspectives Workshop: Preventing the Brainware Crisis. Search on Bibsonomy Perspectives Workshop: Preventing the Brainware Crisis The full citation details ... 2009 DBLP  BibTeX  RDF
43Benny Porat, Ely Porat Toward Real Time Internet Traffic Monitoring. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Abraham Kandel Fuzzy Logic, Uncertainty Management and The Black Swan. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Janusz Kacprzyk, Slawomir Zadrozny Some Fuzzy Logic Based Approaches to Flexible Database Querying and their Use for Discovering Security Related Information. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Daniel Hladky, Christian Ehrlich, Irina Efimenko, Vyacheslav Vorobyov Discover Shadow Groups from the Dark Web. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Clive Best Threat Early Warning through Web Mining. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Gevorg Margarov Investigation of Web Based Hidden Data. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43João Gama 0001, Pedro Pereira Rodrigues, Eduardo Jaques Spinosa, André Carlos Ponce de Leon Ferreira de Carvalho Knowledge Discovery from Data Streams. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Daniel A. Keim, Milos Krstajic, Peter Bak, Daniela Oelke, Florian Mansmann Methods for Interactive Exploration of Large-Scale News Streams. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43I. Burhan Türksen Development of Fuzzy System Models: Fuzzy Rulebases to Fuzzy Functions. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Artak Barseghyan Cyber Criminal Mechanisms Employed in Social Engineering and Technical Tricks. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Vladimir F. Khoroshevsky Ontology Driven Multilingual Information Extraction and Intelligent Analytics. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Ricardo Baeza-Yates Privacy in Query Logs. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Mark Last Language-independent Techniques for Automated Text Summarization. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Dan Roth Making Sense of Unstructured Textual Data. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Gabriel Weimann Terrorist Facebook: Terrorists and Online Social Networking. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Josef Bollag World Financial Crisis and its Influence on Terror Financing. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Shaul Shay Al Qaeda and the Hybrid Jihad. Search on Bibsonomy Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Stephan Diehl 0001, Michael R. Fellows, Ulrike Stege (eds.) Perspectives Workshop: Preventing the Brainware Crisis, 31.03. - 03.04.2009 Search on Bibsonomy Perspectives Workshop: Preventing the Brainware Crisis The full citation details ... 2009 DBLP  BibTeX  RDF
33Pooneh R. Tabrizi, Reza Aghaeizadeh Zoroofi Drowsiness Detection Based on Brightness and Numeral Features of Eye Image. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Drowsiness Detection, Eye state analysis, preventing traffic, skin color
33Arvind Seshadri, Mark Luk, Ning Qu, Adrian Perrig SecVisor: a tiny hypervisor to provide lifetime kernel code integrity for commodity OSes. Search on Bibsonomy SOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF code attestation, memory virtualization, hypervisor, code injection attacks, preventing, code integrity
27Jayashree Padmanabhan, K. S. Easwarakumar, Gokul B., Harishankar S. Trust based traffic monitoring approach for preventing denial of service attacks. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, networks, trust, denial of service, centroid, dos
27Enkhbold Nyamsuren, Ho-Jin Choi Preventing Social Engineering in Ubiquitous Environment. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Khaled M. S. Badran, Peter I. Rockett The roles of diversity preservation and mutation in preventing population collapse in multiobjective genetic programming. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bloat control, population collapse, genetic programming, multiobjective optimization, diversity preservation
27Chandrasekhar Boyapati, Robert Lee, Martin C. Rinard Ownership types for safe programming: preventing data races and deadlocks. Search on Bibsonomy OOPSLA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF deadlocks, encapsulation, data races, ownership types
27Yingjiu Li, Lingyu Wang 0001, Sushil Jajodia Preventing Interval-Based Inference by Random Data Perturbation. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Larry J. Eshelman, J. David Schaffer Preventing Premature Convergence in Genetic Algorithms by Preventing Incest. Search on Bibsonomy ICGA The full citation details ... 1991 DBLP  BibTeX  RDF
20Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye Preventing drive-by download via inter-module communication monitoring. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download
20Qiusun Ye A Practical VCR Technique of Preventing Computer Viruses' Creeping in Networks. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Kelly E. Caine Supporting privacy by preventing misclosure. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2009 DBLP  DOI  BibTeX  RDF misclosure, privacy, ubiquitous computing, error, aging, older adult, technology acceptance, disclosure
20Imad M. Abbadi, Muntaha Alawneh Preventing Insider Information Leakage for Enterprises. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Petr Posík Preventing Premature Convergence in a Simple EDA Via Global Step Size Setting. Search on Bibsonomy PPSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20David Byers, Nahid Shahmehri A Cause-Based Approach to Preventing Software Vulnerabilities. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security modeling, Software security
20Benoît Badrignans, Reouven Elbaz, Lionel Torres Secure FPGA configuration architecture preventing system downgrade. Search on Bibsonomy FPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Muntaha Alawneh, Imad M. Abbadi Preventing information leakage between collaborating organisations. Search on Bibsonomy ICEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborating organisations, enterprise rights management, share but protect
20André Herms, Georg Lukas Preventing admission failures of bandwidth reservation in wireless mesh networks. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Roberto Capizzi, Antonio Longo, V. N. Venkatakrishnan, A. Prasad Sistla Preventing Information Leaks through Shadow Executions. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Panos Kalnis, Gabriel Ghinita, Kyriakos Mouratidis, Dimitris Papadias Preventing Location-Based Identity Inference in Anonymous Spatial Queries. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Spatial databases, Mobile Applications, Security and Privacy Protection
20Radha Poovendran, Loukas Lazos A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks. Search on Bibsonomy Wirel. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Wireless ad hoc networks, Wormhole attack, Geometric random graphs
20Ryan D. Riley, Xuxian Jiang, Dongyan Xu An Architectural Approach to Preventing Code Injection Attacks. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure Memory Architecture, Code Injection
20Xuxin Xu, Lingyu Wang 0001, Amr M. Youssef, Bo Zhu 0001 Preventing Collusion Attacks on the One-Way Function Tree (OFT) Scheme. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Hesiri Weerasinghe, Huirong Fu Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cooperative Black Hole attack, MANET, AODV
20Xin Xiao, Yuanchun Shi, Meng Zhang An Investigation and a Preventing Strategy for the Redundant Packets in P2P Networks with Push Method. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Bin Fu, Golden G. Richard III, Yixin Chen 0002 Some new approaches for preventing software tampering. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Joon S. Park, Joseph Giordano Access Control Requirements for Preventing Insider Threats. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Michael F. Ringenburg, Dan Grossman Preventing format-string attacks via automatic and efficient dynamic checking. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic checking, format-string attacks, white-lists, static analysis
20Nate Foreman, Matthew P. Evett Preventing overfitting in GP with canary functions. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF genetic programming, overfitting
20Jingling Xue, Qingguang Huang, Minyi Guo Enabling Loop Fusion and Tiling for Cache Performance by Fixing Fusion-Preventing Data Dependences. Search on Bibsonomy ICPP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Thomas E. Anderson, Timothy Roscoe, David Wetherall Preventing Internet denial-of-service with capabilities. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Célio Albuquerque 0001, Brett J. Vickers, Tatsuya Suda Network border patrol: preventing congestion collapse and promoting fairness in the internet. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF border control, congestion collapse, core-stateless mechanisms, end-to-end argument, internet, congestion control, max-min fairness
20Yusuke Katayama, Masanori Ito, Allan Kardec Barros, Yoshinori Takeuchi, Tetsuya Matsumoto, Hiroaki Kudo, Noboru Ohnishi, Toshiharu Mukai Closely Arranged Directional Microphone for Source Separation: Effectiveness in Reduction of the Number of Taps and Preventing Factors. Search on Bibsonomy ICA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Robert Lowe, Daniel Polani Preventing Bluff Agent Invasions in Honest Societies. Search on Bibsonomy ECAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Stefan Pleisch, Arnas Kupsys, André Schiper Preventing Orphan Requests in the Context of Replicated Invocation. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20James E. Gain, Neil A. Dodgson Preventing Self-Intersection under Free-Form Deformation. Search on Bibsonomy IEEE Trans. Vis. Comput. Graph. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF space homeomorphism, direct manipulation, Free-form deformation, self-intersection
20Pierre-Yvan Liardet, Nigel P. Smart Preventing SPA/DPA in ECC Systems Using the Jacobi Form. Search on Bibsonomy CHES The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Elke Franz 0001, A. Graubner, Anja Jerichow, Andreas Pfitzmann Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication for Preventing Pool-Mode Attacks. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Che-Fn Yu, Virgil D. Gligor A Specification and Verification Method for Preventing Denial of Service. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method
15Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Alexander Yip, Neha Narula, Maxwell N. Krohn, Robert Tappan Morris Privacy-preserving browser-side scripting with BFlow. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF javascript, labels, information flow control, web platforms
15Minglu Li 0001, Jiadi Yu, Jie Wu 0001 Free-Riding on BitTorrent-Like Peer-to-Peer File Sharing Systems: Modeling Analysis and Improvement. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Bandwidth Allocation Strategy, modeling, BitTorrent, Incentive Mechanism, Free-riding
15Michela Farenzena, Adrien Bartoli, Youcef Mezouar Automatically smoothing camera pose using cross validation for sequential vision-based 3D mapping. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Prithvi Bisht, V. N. Venkatakrishnan XSS-GUARD: Precise Dynamic Prevention of Cross-Site Scripting Attacks. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Attack Prevention, Security, Filtering, Cross-site scripting (XSS)
15Shafi Goldwasser Program Obfuscation and One-Time Programs. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Filippo Furfaro, Giuseppe M. Mazzeo, Domenico Saccà A Probabilistic Framework for Building Privacy-Preserving Synopses of Multi-dimensional Data. Search on Bibsonomy SSDBM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Imad M. Abbadi, Chris J. Mitchell Digital rights management using a mobile phone. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF 3GPP GAA, authorised domain management, access control, copyright protection, trusted computing, DRM
15Jiadi Yu, Minglu Li 0001, Jie Wu 0001 Modeling Analysis and Improvement for Free-Riding on BitTorrent-like File Sharing Systems. Search on Bibsonomy ICPP Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bandwidth Allocation Strategy, Freeriding, Modeling, BitTorrent, Incentive Mechanism
15Koji Chida, Osamu Shionoiri, Atsushi Kanai Secure Anonymous Communications with Practical Anonymity Revocation Scheme. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Chin-Teng Lin, Sheng-Fu Liang, Yu-Chieh Chen, Yung-Chi Hsu, Li-Wei Ko Driver's drowsiness estimation by combining EEG signal analysis and ICA-based fuzzy neural networks. Search on Bibsonomy ISCAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Sanjeev Kumar, Montasir Azad, Orifiel Gomez, R. Valdez Can Microsoft's Service Pack2 (SP2) Security Software Prevent SMURF Attacks? Search on Bibsonomy AICT/ICIW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Ajay Mahimkar, Vitaly Shmatikov Game-Based Analysis of Denial-of-Service Prevention Protocols. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Aiwu Shi, Gleb Naumovich Static Analysis for Computing Escapability and Mutability for Java Components. Search on Bibsonomy SCAM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Hyuncheol Kim, Sunghae Kim, Seong-Jin Ahn 0001, Jin-Wook Chung A Host Protection Framework Against Unauthorized Access for Ensuring Network Survivability. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Haizhi Xu, Wenliang Du, Steve J. Chapin Context Sensitive Anomaly Monitoring of Process Control Flow to Detect Mimicry Attacks and Impossible Paths. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Graham Morgan, Kier Storey, Fengyun Lu Expanding Spheres: A Collision Detection Algorithm for Interest Management in Networked Games. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Whe Dar Lin Mobile EC Service Applications by Privacy Management. Search on Bibsonomy ICWE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Yuval Elovici, Bracha Shapira, Adlai Maschiach A new privacy model for hiding group interests while accessing the Web. Search on Bibsonomy WPES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF privacy, user-profile, Web-security, user-groups
15C. Brendan S. Traw Protecting Digital Content within the Home. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Dongyao Ji, Yuming Wang Comments on "An approach to the formal verification of the two-party cryptographic protocols" by Zhang, Li and Xiao. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
12Oliver J. Hall, Stavros Shiaeles, Fudong Li 0009 A Study of Ethereum's Transition from Proof-of-Work to Proof-of-Stake in Preventing Smart Contracts Criminal Activities. Search on Bibsonomy Network The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Meng Li, Zhibin Li, Yang Zhou, Jiaming Wu A cooperative energy efficient truck platoon lane-changing model preventing platoon decoupling in a mixed traffic environment. Search on Bibsonomy J. Intell. Transp. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Emily A. Kamienski, Paolo Bonato, H. Harry Asada Time-Critical Fall Prediction Based on Lipschitz Data Analysis and Design of a Reconfigurable Walker for Preventing Fall Injuries. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Dan Tang, Zhiqing Zheng, Keqin Li 0001, Chao Yin, Wei Liang 0005, Jiliang Zhang 0002 FTOP: An Efficient Flow Table Overflow Preventing System for Switches in SDN. Search on Bibsonomy IEEE Trans. Netw. Sci. Eng. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Huafeng Liu 0004, Mengmeng Sheng, Zeren Sun, Yazhou Yao, Xian-Sheng Hua 0001, Heng Tao Shen Learning With Imbalanced Noisy Data by Preventing Bias in Sample Selection. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12José Alberto Benítez-Andrades, María Teresa García-Ordás, María Álvarez-González, Raquel Leirós-Rodríguez, Ana F. López Rodríguez Detection of the most influential variables for preventing postpartum urinary incontinence using machine learning techniques. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Jianwei Sun, Chaoyang Mei, Linlin Wei, Kaiyu Zheng, Na Liu, Ming Cui, Tianyi Li Dial-insight: Fine-tuning Large Language Models with High-Quality Domain-Specific Data Preventing Capability Collapse. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Nathan I. N. Henry, Mangor Pedersen, Matt Williams, Jamin L. B. Martin, Liesje Donkin A Hormetic Approach to the Value-Loading Problem: Preventing the Paperclip Apocalypse? Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Li Zhang, Youwei Liang, Ruiyi Zhang, Amirhosein Javadi, Pengtao Xie BLO-SAM: Bi-level Optimization Based Overfitting-Preventing Finetuning of SAM. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Huafeng Liu 0004, Mengmeng Sheng, Zeren Sun, Yazhou Yao, Xian-Sheng Hua 0001, Heng Tao Shen Learning with Imbalanced Noisy Data by Preventing Bias in Sample Selection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Cassidy Laidlaw, Shivam Singhal, Anca D. Dragan Preventing Reward Hacking with Occupancy Measure Regularization. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Anna Revazova, Igor Korkin RASP for LSASS: Preventing Mimikatz-Related Attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Shoupeng Ren, Tianyu Tu, Jian Liu, Di Wu, Kui Ren 0001 LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Gaurav Bhatt, James Ross, Leonid Sigal Preventing Catastrophic Forgetting through Memory Networks in Continuous Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Ahmed Alhammadi, Anuj Abraham, Aymen Fakhreddine, Yu Tian, Jun Du, Faouzi Bader Envisioning the Future Role of 3D Wireless Networks in Preventing and Managing Disasters and Emergency Situations. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Catalina Vajiac, Arun Frey, Joachim Baumann 0002, Abigail Smith, Kasun Amarasinghe, Alice Lai, Kit T. Rodolfa, Rayid Ghani Preventing Eviction-Caused Homelessness through ML-Informed Distribution of Rental Assistance. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Aboulfazl Dayyani, Maghsoud Abbaspour SybilPSIoT: Preventing Sybil attacks in signed social internet of things based on web of trust and smart contract. Search on Bibsonomy IET Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Rahul Chakravorty, Jay Prakash, Ashish Srivastava An efficacious neural network and DNA cryptography-based algorithm for preventing black hole attacks in MANET. Search on Bibsonomy Soft Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Elamparithi Pandian, K. Ruba Soundar, Shenbagalakshmi Gunasekaran, Shenbagarajan Anantharajan Fuzzy heuristics for detecting and preventing black hole attack. Search on Bibsonomy Int. Arab J. Inf. Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Cheng Zhang, Wei Ma, Jing Zhao 0014, Chengyuan Ma, Yuelong Su, Xiaoguang Yang Destination-Aware Coordinated Ramp Metering for Preventing Off-Ramp Queue Spillover and Mainstream Congestion. Search on Bibsonomy IEEE Intell. Transp. Syst. Mag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
12Moritz Held, Andreea Minculescu, Jochem W. Rieger, Jelmer P. Borst Preventing mind-wandering during driving: Predictions on potential interventions using a cognitive model. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 3051 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license