The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for violations with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1987 (16) 1988-1990 (19) 1991-1993 (19) 1994-1996 (26) 1997 (19) 1998 (33) 1999 (24) 2000 (35) 2001 (41) 2002 (56) 2003 (79) 2004 (94) 2005 (144) 2006 (161) 2007 (173) 2008 (154) 2009 (144) 2010 (67) 2011 (48) 2012 (45) 2013 (31) 2014 (50) 2015 (55) 2016 (62) 2017 (47) 2018 (70) 2019 (64) 2020 (60) 2021 (83) 2022 (102) 2023 (86) 2024 (21)
Publication types (Num. hits)
article(569) book(1) incollection(7) inproceedings(1535) phdthesis(16)
Venues (Conferences, Journals, ...)
CoRR(92) DAC(41) IEEE Trans. Comput. Aided Des....(28) IEEE Trans. Software Eng.(28) PLDI(21) ICSE(19) ASP-DAC(18) CogSci(18) ICCAD(18) DATE(17) ESEC/SIGSOFT FSE(16) ISPD(15) CAV(14) HICSS(14) ASE(13) IEEE Trans. Very Large Scale I...(13) More (+10 of total 994)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1559 occurrences of 1018 keywords

Results
Found 2128 publication records. Showing 2128 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
66Denis Besnard, David Greathead A cognitive approach to safe violations. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Large-scale systems safety, Violations, Cognitive ergonomics
65Salim Chowdhury, John Lillis Repeater insertion for concurrent setup and hold time violations with power-delay trade-off. Search on Bibsonomy ISPD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF early-mode timing, hold violation, late-mode timing, setup violation, timing optimization, repeater insertion
59Brandon Lucia, Luis Ceze, Karin Strauss ColorSafe: architectural support for debugging and dynamically avoiding multi-variable atomicity violations. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bug avoidance, concurrency errors, data coloring, multi-variable, debugging, atomicity violations
52Mohamed Ali Kâafar, Bamba Gueye, François Cantin, Guy Leduc, Laurent Mathy Towards a Two-Tier Internet Coordinate System to Mitigate the Impact of Triangle Inequality Violations. Search on Bibsonomy Networking The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Internet Coordinate Systems, Performance, Experimentation, Triangle Inequality Violations
51Ali Dasdan Provably efficient algorithms for resolving temporal and spatial difference constraint violations. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interface timing, layout compaction, scheduling, real-time systems, constraint satisfaction, timing constraints, Behavioral synthesis, multimedia synchronization, rate analysis
51Srinivasan Seetharaman, Mostafa H. Ammar Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
51Shan Lu 0001, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou 0001 AVIO: detecting atomicity violations via access interleaving invariants. Search on Bibsonomy ASPLOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF concurrent program, hardware support, concurrency bug, bug detection, program invariant, atomicity violation
51Zhenmin Li, Yuanyuan Zhou PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF automated specification generation, automated violation detection, data mining for software engineering, programming rules, pattern recognition, static analysis
43Zhifeng Lai, Shing-Chi Cheung, Wing Kwong Chan Detecting atomic-set serializability violations in multithreaded programs through active randomized testing. Search on Bibsonomy ICSE (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software testing, dynamic analysis, atomicity, serializability
43Nicholas Kidd, Peter Lammich, Tayssir Touili, Thomas W. Reps A Decision Procedure for Detecting Atomicity Violations for Communicating Processes with Locks. Search on Bibsonomy SPIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Nico Roos, Cees Witteveen Diagnosis of Plan Structure Violations. Search on Bibsonomy MATES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Coordination errors, Model-Based Diagnosis, Plan execution
43Amit Kumar 0004, Krishnendu Chakrabarty, Chunduri Rama Mohan An ECO Technique for Removing Crosstalk Violations in Clock Networks. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
43Cees Witteveen, Nico Roos, Adriaan ter Mors, Xiaoyu Mao Diagnosis of plan step errors and plan structure violations. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF planning, model-based diagnosis, plan execution
37Gustavo Neuberger, Gilson I. Wirth, Ricardo Reis 0001 Protecting digital circuits against hold time violation due to process variability. Search on Bibsonomy SBCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF flip-flop characterization, hold time violations, race immunity, clock skew, process variability
37Matthew S. Simpson, Bhuvan Middha, Rajeev Barua Segment protection for embedded systems using run-time checks. Search on Bibsonomy CASES The full citation details ... 2005 DBLP  DOI  BibTeX  RDF MMU, MPU, ewmbedded systems, safe languages, segment protection, segmentation violations, reliability, compilers, virtual memory, memory safety, run-time checks
36Oshani Seneviratne, Lalana Kagal, Tim Berners-Lee Policy-Aware Content Reuse on the Web. Search on Bibsonomy ISWC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Soner Önder, Rajiv Gupta 0001 Dynamic Memory Disambiguation in the Presence of Out-of-Order Store Issuing. Search on Bibsonomy MICRO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Azadeh Farzan, P. Madhusudan, Francesco Sorrentino 0002 Meta-analysis for Atomicity Violations under Nested Locking. Search on Bibsonomy CAV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Chien Pang Lu, Mango Chia-Tso Chao, Chen Hsing Lo, Chih-Wei Chang A metal-only-ECO solver for input-slew and output-loading violations. Search on Bibsonomy ISPD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF input skew violation, output loading, buffer insertion, eco
36Qichang Chen, Liqiang Wang, Zijiang Yang 0006, Scott D. Stoller HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis. Search on Bibsonomy FASE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Tobias Hilbrich, Matthias S. Müller, Bettina Krammer Detection of Violations to the MPI Standard in Hybrid OpenMP/MPI Applications. Search on Bibsonomy IWOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Armin Hornung, Dapeng Zhang 0002 On-Line Detection of Rule Violations in Table Soccer. Search on Bibsonomy KI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
36Norman Bobroff, Andrzej Kochut, Kirk A. Beaty Dynamic Placement of Virtual Machines for Managing SLA Violations. Search on Bibsonomy Integrated Network Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Nathan G. Freier Children distinguish conventional from moral violations in interactions with a personified agent. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2007 DBLP  DOI  BibTeX  RDF personified software agent, user-centered design, children, social computing, moral development
36A. Murali M. Rao Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Santonu Sarkar, Girish Maskeri Rama, Shubha Ramachandran A Method for Detecting and Measuring Architectural Layering Violations in Source Code. Search on Bibsonomy APSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Jimin Gao, Mats Per Erik Heimdahl, David Owen 0002, Tim Menzies On the Distribution of Property Violations in Formal Models: An Initial Study. Search on Bibsonomy COMPSAC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Urs Hengartner, Peter Steenkiste Avoiding Privacy Violations Caused by Context-Sensitive Services. Search on Bibsonomy PerCom The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Pramod Ramarao, Akhilesh Tyagi, Gyungho Lee Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
30François Cantin, Bamba Gueye, Mohamed Ali Kâafar, Guy Leduc A Self-Organized Clustering Scheme for Overlay Networks. Search on Bibsonomy IWSOS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Clustering, Performance, ICS, Triangle Inequality Violations
30Fayez Mohamood, Michael B. Healy, Sung Kyu Lim, Hsien-Hsin S. Lee Noise-Direct: A Technique for Power Supply Noise Aware Floorplanning Using Microarchitecture Profiling. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF wire-length driven floorplan, noise-direct, power supply noise aware floorplanning, microarchitecture profiling, aggressive power saving techniques, power delivery network, power consumption reduction, self weighting, correlation weighting, force-directed floorplanning algorithm, power pin affinity, current consumption, di/dt control, supply-noise margin violations, clock-gating, microprocessor designers, power constraints, inductive noise, decoupling capacitances
30Calvin Ko, Manfred Ruschitzka, Karl N. Levitt Execution Monitoring of Security-Critical Programs in Distributed Systems: A Specification-Based Approach. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security-critical program execution monitoring, specification-based approach, program vulnerabilities, security specifications, real-time intrusion detection system, Unix setuid root programs, system attack detection, security violations, distributed systems, synchronization, system monitoring, audit trails, formal framework
30John A. Davidson Asymmetric Isolation. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF asymmetric isolation, unidirectional security, risk-free multi-level security, absolute security rule enforcement, security violations, multi-level communication handshaking, multiple single-level nodes, unidirectional links, hardware-enforced security, performance, cost, security of data, legacy systems, mandatory access control, downgrading
30Alois Ferscha, Johannes Lüthi Estimating rollback overhead for optimism control in Time Warp. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF rollback overhead, adaptive optimism control mechanism, performance pitfall, Time Warp distributed discrete event simulation protocol, DDES protocol, overoptimistic progression, event execution, simulated future, premature event execution, causality violations, performance inefficiencies, observed model parallelism, local virtual time, LVT progression per unit CPU time, arriving messages, simulation engine, optimal CPU delay interval, rollback probability, synchronization behavior, iPSC/860, protocols, virtual machines, discrete event simulation, adaptive systems, optimal control, cost model, distributed memory multiprocessor, time warp simulation, logical processes
30Che-Fn Yu, Virgil D. Gligor A Specification and Verification Method for Preventing Denial of Service. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF failure absence, integrity violations, user agreements, simultaneity conditions, denial-of-service prevention, formal specification, concurrent programs, security of data, specification method, verification method
30Chii-Ren Tsai, Virgil D. Gligor, C. Sekar Chandersekaran On the Identification of Covert Storage Channels in Secure Systems. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF covert storage channels, Secure Xenix kernel, visible/alterable kernel variables, language code, sharing relationships, nondiscretionary access rules, false flow violations, kernel locations, audit code, time-delay variables, covert-channel handling, software engineering, identification, security of data, source code, operating systems (computers), secure systems, information-flow analysis, implementation languages
29Cristian Lumezanu, Randolph Baden, Neil Spring, Bobby Bhattacharjee Triangle inequality variations in the internet. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tiv, latency, variation, triangle inequality violation
29Suad Alagic, Mark Royer Genericity in Java: persistent and database systems implications. Search on Bibsonomy VLDB J. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Java, Reflection, Transactions, Object-oriented databases, Type systems, Virtual platforms, Object persistence
29Shrirang K. Karandikar, Charles J. Alpert, Mehmet Can Yildiz, Paul Villarrubia, Stephen T. Quay, T. Mahmud Fast Electrical Correction Using Resizing and Buffering. Search on Bibsonomy ASP-DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF electrical violation eliminator, fast electrical correction, electrical state
29Kendra M. L. Cooper, João W. Cangussu, W. Eric Wong An Architectural Framework for the Design and Analysis of Autonomous Adaptive Systems. Search on Bibsonomy COMPSAC (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Femke de Jonge, Nico Roos, Huib Aldewereld Using DESs for Temporal Diagnosis of Multi-agent Plan Execution. Search on Bibsonomy MATES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Hoesung Ki, Seong-Jin Ahn 0001 Study on developing a security violation response checklist for the improvement of internet security management systems. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Mini Nanua, David T. Blaauw Receiver Modeling for Static Functional Crosstalk Analysis. Search on Bibsonomy PATMOS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta Malafide Intension Based Detection of Privacy Violation in Information System. Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Robert J. Turetsky, X. Halkias Determining shot assonance/dissonance via salience maps and the match frame principle of continuity editing. Search on Bibsonomy MMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29N. V. Arvind, K. A. Rajagopal, H. S. Ajith, Das Suparna Path Based Approach for Crosstalk Delay Analysis. Search on Bibsonomy VLSI Design The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Mirjana Mazuran, Elisa Quintarelli, Rosalba Rossato, Letizia Tanca Mining Violations to Relax Relational Database Constraints. Search on Bibsonomy DaWaK The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Azadeh Farzan, P. Madhusudan The Complexity of Predicting Atomicity Violations. Search on Bibsonomy TACAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Cathal Boogerd, Leon Moonen Evaluating the relation between coding standard violations and faultswithin and across software versions. Search on Bibsonomy MSR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Lijun Yu, Robert B. France, Indrakshi Ray, Sudipto Ghosh A Rigorous Approach to Uncovering Security Policy Violations in UML Designs. Search on Bibsonomy ICECCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Chikmagalur Manjappa Prashanth, K. Chandrashekar Shet, Janees Elamkulam Verification Framework for Detecting Safety Violations in UML Statecharts. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Model Checking, Verification, UML Statecharts
29Lifeng Zhou, Lei Chen 0009, Hung Keng Pung, Lek Heng Ngoh End-to-end diagnosis of QoS violations with neural network. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Ozgur Sinanoglu, Philip Schremmer Diagnosis, modeling and tolerance of scan chain hold-time violations. Search on Bibsonomy DATE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Yuting Chen, Shaoying Liu, Fumiko Nagoya A Review Approach to Detecting Structural Consistency Violations in Programs. Search on Bibsonomy ACIS-ICIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Sachin Shrivastava, Dhanoop Varghese, Vikas Narang, N. V. Arvind Improved Approach for Noise Propagation to Identify Functional Noise Violations. Search on Bibsonomy VLSI Design The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Philippe Polet, Frédéric Vanderhaegen, Peter A. Wieringa Theory of Safety-Related Violations of System Barriers. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Barrier crossing, Hazardous conditions, Human factors, Risk analysis, Violation
29Dae-Woon Lim, Sung-Hoon Choi, Joon-Suk Jun Automated Detection of All Kinds of Violations at a Street Intersection Using Real Time Individual Vehicle Tracking. Search on Bibsonomy SSIAI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Tracking, Traffic, Enforcement
29Jean-Charles Régin, Thierry Petit, Christian Bessière, Jean-Francois Puget New Lower Bounds of Constraint Violations for Over-Constrained Problems. Search on Bibsonomy CP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Thierry Petit, Jean-Charles Régin, Christian Bessière Meta-constraints on violations for over constrained problems. Search on Bibsonomy ICTAI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF meta constraints, over constrained problems, Max-CSP, real-life problems, constraint programming, constraint handling, communicating sequential processes, real-world problems
29Gene M. Alarcon, August A. Capiola, Justin Morgan, Izz Aldin Hamdan, Michael Lee Trust Violations in Human-Human and Human-Robot Interactions: The Influence of Ability, Benevolence and Integrity Violations. Search on Bibsonomy HICSS The full citation details ... 2022 DBLP  BibTeX  RDF
29Sara H. S. Almadi Toward Investigating the Violations Roles of Pattern Grime Occurrence in Software Design Patterns: Violations Roles of Pattern Grime. Search on Bibsonomy EASE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Florian Hantke, Ben Stock HTML violations and where to find them: a longitudinal analysis of specification violations in HTML. Search on Bibsonomy IMC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
29Seto Herwandito, Pawito, Prahastiwi Utari, Sri Hastjarjo Expectancy Violations on Startup-Unicorn in Indonesia: Study about Expectancy Violations from Millennial Generation on Tokopedia E-Commerce. Search on Bibsonomy EBEE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
29Jeffrey D. Wall, Paul Benjamin Lowry, Jordan B. Barlow Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess. Search on Bibsonomy J. Assoc. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
29Mariem Graa Hybrid code analysis to detect confidentiality violations in android system. (Analyse hybride du code pour détecter les violations de la confidentialité dans le système android). Search on Bibsonomy 2014   RDF
29Koen Buyens Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen) ; Analyzing Software Architectures for Least Privilege Violations. Search on Bibsonomy 2012   RDF
23Guohui Wang, Bo Zhang 0073, T. S. Eugene Ng Towards network triangle inequality violation aware distributed systems. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF internet delay space, distributed system, analysis, triangle inequality violations, neighbor selection
23Hamdy S. Soliman, Mohammed Omari Application of synchronous dynamic encryption system in mobile wireless domains. Search on Bibsonomy Q2SWinet The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic encryption, flexible integrity, integrity violations, mobile network security, permutation vectors, seamless handover
23Dzintars Avots, Michael Dalton, V. Benjamin Livshits, Monica S. Lam Improving software security with a C pointer analysis. Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF format string violations, security aws, program analysis, programming languages, error detection, dynamic analysis, vulnerabilities, buffer overflows, software security, pointer analysis, context-sensitive, type safety, software errors
23Horst F. Wedde, Mario Lischka Modular authorization. Search on Bibsonomy SACMAT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF modularity, authorization, role-based access control, conflicts, composability, violations
23Susan Darling Urban, Lois M. L. Delcambre Constraint Analysis: A Design Process for Specifying Operations on Objects. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF object-oriented database design environment, object-oriented database schema, flexible specification, propagation actions, constraint violations, explicit schema constraints, automatic identification, formal specification, semantics, object-oriented programming, object-oriented databases, design process, design process, formal logic, object manipulation, design alternatives, constraint analysis, Horn logic, formal representation, database constraints
22Gareth Beddoe, Sanja Petrovic, Jingpeng Li 0001 A hybrid metaheuristic case-based reasoning system for nurse rostering. Search on Bibsonomy J. Sched. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nurse rostering, Learning from failure, Case-based reasoning, Memetic algorithm, Personnel scheduling
22Travis D. Breaux, Jonathan D. Lewis, Paul N. Otto, Annie I. Antón Identifying vulnerabilities and critical requirements using criminal court proceedings. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
22Ahmed Awad 0001, Sergey Smirnov 0002, Mathias Weske Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF process model parsing, process model restructuring, Business process modeling, compliance checking
22Sampson Pun, Ken Barker 0001 Privacy FP-Tree. Search on Bibsonomy DASFAA Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Anonymized privacy, Privacy, Database, FP-Tree, Personalized privacy
22Loreto Bravo, Wenfei Fan, Floris Geerts, Shuai Ma 0001 Increasing the Expressivity of Conditional Functional Dependencies without Extra Complexity. Search on Bibsonomy ICDE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Bogdan D. Czejdo, Tadeusz Morzy Knowledge, Knowledge Security, and Meta-knowledge. Search on Bibsonomy WSKS (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Knowledge Security, Meta-Knowledge, Knowledge Representation
22Chang-Seo Park, Koushik Sen Randomized active atomicity violation detection in concurrent programs. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF atomicity violation detection, concurrency, dynamic analysis, random testing
22Thorsten van Ellen, Wilhelm Hasselbring Extended exceptions for contingencies and their implications for the engineering process. Search on Bibsonomy Workshop on Exception Handling The full citation details ... 2008 DBLP  DOI  BibTeX  RDF forward recovery, resumption, reliability, exception, contingency
22Eric Bodden, Patrick Lam 0001, Laurie J. Hendren Finding programming errors earlier by evaluating runtime monitors ahead-of-time. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine learning, static analysis, runtime verification, points-to analysis, static verification
22K. V. M. Naidu, Debmalya Panigrahi, Rajeev Rastogi Detecting Anomalies Using End-to-End Path Measurements. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Gustavo Neuberger, Fernanda Gusmão de Lima Kastensmidt, Ricardo Reis 0001, Gilson I. Wirth, Ralf Brederlow, Christian Pacha Statistical analysis of systematic and random variability of flip-flop race immunity in 130nm and 90nm CMOS technologies. Search on Bibsonomy VLSI-SoC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Howard Foster, Wolfgang Emmerich, Jeff Kramer, Jeff Magee, David S. Rosenblum, Sebastián Uchitel Model checking service compositions under resource constraints. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF web services, validation, BPEL4WS, resource modelling
22Antonia Bertolino, Guglielmo De Angelis, Antonino Sabetta, Sebastian G. Elbaum Scaling up SLA monitoring in pervasive environments. Search on Bibsonomy ESSPE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Murali Krishna Ramanathan, Ananth Grama, Suresh Jagannathan Path-Sensitive Inference of Function Precedence Protocols. Search on Bibsonomy ICSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Qi Gao 0004, Feng Qin, Dhabaleswar K. Panda 0001 DMTracker: finding bugs in large-scale parallel programs by detecting anomaly in data movements. Search on Bibsonomy SC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF parallel programs, anomaly detection, data movements, bug detection
22Liqiang Wang, Scott D. Stoller Runtime Analysis of Atomicity for Multithreaded Programs. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Java, Concurrent programming, atomicity, data race, testing and debugging
22Shyam K. Gupta 0001, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). Search on Bibsonomy ICISS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Koushik Sen, Abhay Vardhan, Gul Agha, Grigore Rosu Decentralized runtime analysis of multithreaded applications. Search on Bibsonomy IPDPS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Westley Weimer Patches as better bug reports. Search on Bibsonomy GPCE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF localization, error, explanation, patch, bug, counterexample, bug report
22Cecilia Metra, Martin Omaña 0001, Daniele Rossi 0001, José Manuel Cazeaux, T. M. Mak Path (Min) Delay Faults and Their Impact on Self-Checking Circuits' Operation. Search on Bibsonomy IOLTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Dawn J. Lawrie, Henry Feild, David W. Binkley Syntactic Identifier Conciseness and Consistency. Search on Bibsonomy SCAM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Identifier Quality, Part-of-speech
22Andrew Le Gear, Jim Buckley Exercising control over the design of evolving software systems using an inverse application of reflexion modeling. Search on Bibsonomy CASCON The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Rahul Agarwal, Amit Sasturkar, Liqiang Wang, Scott D. Stoller Optimized run-time race detection and atomicity checking using partial discovered types. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF performance, type system, atomicity, data races
22Raymond R.-F. Liao, Andrew T. Campbell Dynamic core provisioning for quantitative differentiated services. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF capacity dimension, point-to-multipoint congestion, virtual queue, service differentiation
22Alexey Glebov, Sergey Gavrilov, R. Soloviev, Vladimir Zolotov, Murat R. Becer, Chanhee Oh, Rajendran Panda Delay noise pessimism reduction by logic correlations. Search on Bibsonomy ICCAD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
22Malú Castellanos, Fabio Casati, Umeshwar Dayal, Ming-Chien Shan Intelligent Management of SLAs for Composite Web Services. Search on Bibsonomy DNIS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Jlifi Boutheina, Khaled Ghédira On the Enhancement of the Informed Backtracking Algorithm. Search on Bibsonomy CP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Shuo Chen 0001, Jun Xu 0003, Ravishankar K. Iyer, Keith Whisnant Evaluating the Security Threat of Firewall Data Corruption Caused by Transient Errors. Search on Bibsonomy DSN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
22Sethavidh Gertphol, Yang Yu 0009, Shriram B. Gundala, Viktor K. Prasanna, Shoukat Ali, Jong-Kook Kim, Anthony A. Maciejewski, Howard Jay Siegel A Metric and Mixed-Integer-Programming-Based Approach for Resource Allocation in Dynamic Real-Time Systems. Search on Bibsonomy IPDPS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2128 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license