The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for compromise with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1979 (16) 1980-1988 (17) 1989-1990 (18) 1991-1993 (24) 1994-1995 (31) 1996 (22) 1997 (30) 1998 (18) 1999 (35) 2000 (48) 2001 (69) 2002 (79) 2003 (96) 2004 (153) 2005 (195) 2006 (226) 2007 (236) 2008 (251) 2009 (170) 2010 (41) 2011 (28) 2012 (24) 2013 (32) 2014 (25) 2015 (24) 2016 (30) 2017 (29) 2018 (41) 2019 (37) 2020 (41) 2021 (47) 2022 (72) 2023 (66) 2024 (8)
Publication types (Num. hits)
article(714) book(1) data(1) incollection(13) inproceedings(1538) phdthesis(12)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1926 occurrences of 1317 keywords

Results
Found 2279 publication records. Showing 2279 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Dongmei Wei, Dan Meng, Yuan Rong, Yi Liu 0005, Harish Garg, Dragan Pamucar Fermatean Fuzzy Schweizer-Sklar Operators and BWM-Entropy-Based Combined Compromise Solution Approach: An Application to Green Supplier Selection. Search on Bibsonomy Entropy The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Cas Cremers, Mang Zhao Provably Post-Quantum Secure Messaging with Strong Compromise Resilience and Immediate Decryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Olivier Blazy, Ioana Boureanu, Pascal Lafourcade 0001, Cristina Onete, Léo Robert How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Cas Cremers, Charlie Jacomme, Eyal Ronen TokenWeaver: Privacy Preserving and Post-Compromise Secure Attestation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou Rotatable Zero Knowledge Sets: Post Compromise Secure Auditable Dictionaries with application to Key Transparency. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
16Atieh Mohammadkhani, Seyed Meysam Mousavi Assessment of third-party logistics providers by introducing a new stochastic two-phase compromise solution model with last aggregation. Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Nathan Bonham, Joseph R. Kasprzyk, Edith Zagona post-MORDM: Mapping policies to synthesize optimization and robustness results for decision-maker compromise. Search on Bibsonomy Environ. Model. Softw. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Engla Rencelj Ling, Mathias Ekstedt Estimating the Time-To-Compromise of Exploiting Industrial Control System Vulnerabilities. Search on Bibsonomy ICISSP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Bartosz Paradowski, Bartlomiej Kizielewicz, Andrii Shekhovtsov, Wojciech Salabun The Iterative Compromise Ranking Analysis (ICRA) - The New Approach to Make Reliable Decisions. Search on Bibsonomy ISM@FedCSIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Bartlomiej Kizielewicz, Andrii Shekhovtsov, Wojciech Salabun A novel iterative approach to determining compromise rankings. Search on Bibsonomy FedCSIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Bartosz Paradowski, Bartlomiej Kizielewicz, Jakub Wieckowski, Wojciech Salabun A Sustainable Approach for Determining Compromise Ranking Based on Intuitonistic Fuzzy Score Functions. Search on Bibsonomy ISM@FedCSIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Liang Yang 0002, Wenmiao Zhou, Weihang Peng, Bingxin Niu, Junhua Gu, Chuan Wang 0002, Xiaochun Cao, Dongxiao He Graph Neural Networks Beyond Compromise Between Attribute and Topology. Search on Bibsonomy WWW The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Antonio Furchì, Gabriele Oliva, Andrea Gasparri Distributed Finite-time Optimization for Compromise-Seeking Agents with Relative Preferences. Search on Bibsonomy ECC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Zhiqiang Ma, Jun He Outsider Key Compromise Impersonation Attack on a Multi-factor Authenticated Key Exchange Protocol. Search on Bibsonomy ACNS Workshops The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16George Arnold Sullivan, Jackson Sippe, Nadia Heninger, Eric Wustrow Open to a fault: On the passive compromise of TLS keys via transient errors. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
16Meiqi Wu, Wenbin Deng, Zheng Pei 0001 An Improved Combined Compromise Solution Method to Select the Best Means of Transport for Travelling. Search on Bibsonomy CSAE The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Brian Chen, Yevgeniy Dodis, Esha Ghosh, Eli Goldin, Balachandar Kesavan, Antonio Marcedone, Merry Ember Mou Rotatable Zero Knowledge Sets - Post Compromise Secure Auditable Dictionaries with Application to Key Transparency. Search on Bibsonomy ASIACRYPT (3) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Ren Ozeki, Haruki Yonekura, Hamada Rizk, Hirozumi Yamaguchi Sharing without caring: privacy protection of users' spatio-temporal data without compromise on utility. Search on Bibsonomy SIGSPATIAL/GIS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Ivan De Oliveira Nunes, Sashidhar Jakkamsetti, Youngil Kim, Gene Tsudik CASU: Compromise Avoidance via Secure Update for Low-End Embedded Systems. Search on Bibsonomy ICCAD The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Shaofeng Wang, Bo Lang, Nan Xiao, Yikai Chen AspIOC: Aspect-Enhanced Deep Neural Network for Actionable Indicator of Compromise Recognition. Search on Bibsonomy ISC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, Lorrie Faith Cranor Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. Search on Bibsonomy SOUPS @ USENIX Security Symposium The full citation details ... 2022 DBLP  BibTeX  RDF
16Hsin-Ju Chan, Chin-Yuan Hsu, Ching-Chang Chien, Ji-Jie Wu, He-Lin Ku FeedRef2022: A Named Entity Recognition Dataset for Extracting Indicators of Compromise. Search on Bibsonomy IEEE Big Data The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Nataliia Cherniashchuk, Serhiy Kostiuchko Detection of attacks based on compromise marks. Search on Bibsonomy DESSERT The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Alireza Furutanpey, Schahram Dustdar Adaptive and Collaborative Inference: Towards a No-compromise Framework for Distributed Intelligent Systems. Search on Bibsonomy WEBIST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Shuaishuai Zhang, Jie Huang 0016, Zeping Zhang, Chunyang Qi Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters. Search on Bibsonomy ICA3PP The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Jinming Zhao, Hao Yang, Gholamreza Haffari, Ehsan Shareghi RedApt: An Adaptor for wav2vec 2 EncodingFaster and Smaller Speech Translation without Quality Compromise. Search on Bibsonomy EMNLP (Findings) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Mingchang Liu, Vinay Sachidananda, Hongyi Peng, Rajendra Patil, Sivaanandh Muneeswaran, Mohan Gurusamy LOG-OFF: A Novel Behavior Based Authentication Compromise Detection Approach. Search on Bibsonomy PST The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Cas Cremers, Moni Naor, Shahar Paz, Eyal Ronen CHIP and CRISP: Protecting All Parties Against Compromise Through Identity-Binding PAKEs. Search on Bibsonomy CRYPTO (2) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Yohai Trabelsi, Abhijin Adiga, Sarit Kraus, S. S. Ravi Resource Allocation to Agents with Restrictions: Maximizing Likelihood with Minimum Compromise. Search on Bibsonomy EUMAS The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Yohai Trabelsi, Abhijin Adiga, Sarit Kraus, S. S. Ravi Maximizing Resource Allocation Likelihood with Minimum Compromise. (PDF / PS) Search on Bibsonomy AAMAS The full citation details ... 2022 DBLP  BibTeX  RDF
16Jianlong Zhou, Zhidong Li, Chun Xiao, Fang Chen 0001 Does a Compromise on Fairness Exist in Using AI Models? Search on Bibsonomy AI The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
16Beatrice Napolitano Compromise and elicitation in social choice : a study of egalitarianism and incomplete information in voting. (Compromis et élicitation en choix social : une étude sur l'égalitarisme et l'information incomplète dans le vote). Search on Bibsonomy 2022   RDF
16Prajit K. Dutta Compromise is key in infinitely repeated bargaining with an Evergreen Clause. Search on Bibsonomy J. Econ. Theory The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Shazia Ghufran, Srikant Gupta, Aquil Ahmed A fuzzy compromise approach for solving multi-objective stratified sampling design. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Nazanin Foroozesh, Fariborz Jolai, S. Meysam Mousavi, Behrooz Karimi A new fuzzy-stochastic compromise ratio approach for green supplier selection problem with interval-valued possibilistic statistical information. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Rahimeh Neamatian Monemi, Shahin Gelareh, Anass Nagih, Dylan Jones Bi-objective load balancing multiple allocation hub location: a compromise programming approach. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Yuxiang Yuan, Dong Cheng, Zhili Zhou A minimum adjustment consensus framework with compromise limits for social network group decision making under incomplete information. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Gilberto Rivera, Rogelio Florencia, Mario Guerrero, Raúl Porras, Julia Patricia Sánchez-Solís Online multi-criteria portfolio analysis through compromise programming models built on the underlying principles of fuzzy outranking. Search on Bibsonomy Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Davy Preuveneers, Wouter Joosen Sharing Machine Learning Models as Indicators of Compromise for Cyber Threat Intelligence. Search on Bibsonomy J. Cybersecur. Priv. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Hengzhen Huang, Xueping Chen Compromise design for combination experiment of two drugs. Search on Bibsonomy Comput. Stat. Data Anal. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Fuat Ögme, Ali Gökhan Yavuz, M. Amaç Güvensan, M. Elif Karsligil Temporal Transaction Scraping Assisted Point of Compromise Detection With Autoencoder Based Feature Engineering. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Vo Thanh Kien Nguyen, Yuan-Kang Wu, Quoc Dung Phan Adaptive Droop Control for Compromise Between DC Voltage and Frequency in Multi-Terminal HVDC. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Manoel Horta Ribeiro, Shagun Jhaver, Savvas Zannettou, Jeremy Blackburn, Gianluca Stringhini, Emiliano De Cristofaro, Robert West 0001 Do Platform Migrations Compromise Content Moderation? Evidence from r/The_Donald and r/Incels. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Cong Li, Hedong Xu, Suohai Fan Evolutionary compromise game on assortative mixing networks. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Phan Thuy Kieu, Van Thanh Nguyen, Viet Tinh Nguyen, Thanh Phong Ho A Spherical Fuzzy Analytic Hierarchy Process (SF-AHP) and Combined Compromise Solution (CoCoSo) Algorithm in Distribution Center Location Selection: A Case Study in Agricultural Supply Chain. Search on Bibsonomy Axioms The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Inam ul Haq, Jian Wang 0038, Youwen Zhu, Saad Maqbool An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Ting Chen, Xinghua Li 0001, Qingfeng Cheng An enhanced key exchange protocol exhibiting key compromise impersonation attacks resistance in mobile commerce environment. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Ngo Tung Son, Jafreezal Jaafar, Izzatdin Abdul Aziz, Bui Ngoc Anh A Compromise Programming for Multi-Objective Task Assignment Problem. Search on Bibsonomy Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Weier Wan, Rajkumar Kubendran, Clemens J. S. Schaefer, Sukru Burc Eryilmaz, Wenqiang Zhang, Dabin Wu, Stephen R. Deiss, Priyanka Raina, He Qian, Bin Gao 0006, Siddharth Joshi, Huaqiang Wu, H.-S. Philip Wong, Gert Cauwenberghs Edge AI without Compromise: Efficient, Versatile and Accurate Neurocomputing in Resistive Random-Access Memory. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
16Aaron Defazio, Samy Jelassi Adaptivity without Compromise: A Momentumized, Adaptive, Dual Averaged Gradient Method for Stochastic Optimization. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
16Mark E. O'Sullivan, Tatiana Gabruseva, Geraldine B. Boylan, M. O'Riordan, Gordon Lightbody, William P. Marnane Classification of fetal compromise during labour: signal processing and feature engineering of the cardiotocograph. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
16Francisco Valente, Simão Paredes, Jorge Henriques Improving the compromise between accuracy, interpretability and personalization of rule-based machine learning in medical problems. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
16Samuel Yousefi, Mahsa Valipour, Muhammet Gul Systems failure analysis using Z-number theory-based combined compromise solution and full consistency method. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Georg Bechler, Claudius Steinhardt, Jochen Mackert, Robert Klein Product line optimization in the presence of preferences for compromise alternatives. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Elín Björk Böðvarsdóttir, Pieter Smet, Greet Vanden Berghe, Thomas J. R. Stidsen Achieving compromise solutions in nurse rostering by using automatically estimated acceptance thresholds. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Gangan Prathap Letter to the editor: Is the h-index a mock compromise between the p-index and the z-index? Search on Bibsonomy Scientometrics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Long Meng, Liqun Chen An Enhanced Long-term Blockchain Scheme Against Compromise of Cryptography. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
16Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Fatima Bellahcene, Philippe Marthon A compromise solution method for the multiobjective minimum risk problem. Search on Bibsonomy Oper. Res. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Pedro Fonseca 0004, Leandro José Machado, Manoela Sousa, Ricardo Sebastião, Filipa Sousa, Joana Figueiredo, Cristina P. Santos 0001, João Paulo Vilas-Boas Does Gait with an Ankle Foot Orthosis Improve or Compromise Minimum Foot Clearance? Search on Bibsonomy Sensors The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Benting Wan, Juelin Huang, Xiaolu Zhang A Modified TODIM Based on Compromise Distance for MAGDM with q-Rung Orthopair Trapezoidal Fuzzy Numbers. Search on Bibsonomy Complex. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi Empirical risk assessment of attack graphs using time to compromise framework. Search on Bibsonomy Int. J. Inf. Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Ivan Vrana, Jan Tyrychtr, Martin Pelikán BeCoMe: Easy-to-implement optimized method for best-compromise group decision making: Flood-prevention and COVID-19 case studies. Search on Bibsonomy Environ. Model. Softw. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Stefano Scanzio, Mohammad Ghazi Vakili, Gianluca Cena, Claudio Giovanni Demartini, Bartolomeo Montrucchio, Adriano Valenzano, Claudio Zunino Wireless Sensor Networks Dataset (TSCH a Compromise Between Reliability, Power Consumption, and Latency). Search on Bibsonomy 2021   DOI  RDF
16Gwangbae Choi, F. Betül Durak, Serge Vaudenay Post-Compromise Security in Self-Encryption. Search on Bibsonomy ITC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Nikos Vasilakis, Cristian-Alexandru Staicu, Grigoris Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel Preventing Dynamic Library Compromise on Node.js via RWX-Based Privilege Reduction. Search on Bibsonomy CCS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Ons Chikhaoui, Ryma Abassi, Aida Ben Chehida Douss, Sihem Guemara El Fatmi Formal Validation of a Security Mechanism against the RSU Compromise Attack. Search on Bibsonomy ARES The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Ionut Cernica, Nirvana Popescu, Razvan Craciunescu Detecting indicators of compromise in web applications using access logs. Search on Bibsonomy BlackSeaCom The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Francisco Valente, Jorge Henriques, Simão Paredes, Teresa Rocha, Paulo de Carvalho 0001, João Morais Improving the compromise between accuracy, interpretability and personalization of rule-based machine learning in medical problems. Search on Bibsonomy EMBC The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Pratibha Khandait, Namrata Tiwari, Neminath Hubballi Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks. Search on Bibsonomy ICDCN (Adjunct Volume) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Son Tung Ngo 0001, Jafreezal Jaafar, Izzatdin Abdul Aziz, Giang Hoang Nguyen Introduction to A Compromise Programming Based Method for Complex Scheduling and Planning Problems. Search on Bibsonomy IMMS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Son Tung Ngo 0001, Jafreezal Jaafar, Thang Van Doan, Duong Phan Lac, Anh Ngoc Bui The Effectiveness of Reference Point Selection Methods for Compromise Programming in Multi-Criteria Learning Path Search Algorithm. Search on Bibsonomy IMMS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Oleksandr Lemeshko, Oleksandra Yeremenko, Anastasiia Shapovalova, Maryna Yevdokymenko, Artem Akulynichev, Volodymyr Porokhniak Research of Secure Routing with Load Balancing and Compromise Probability Behavior Account. Search on Bibsonomy EUROCON The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Takumi Kato Verification of the Compromise Effect's Suitability Based on Product Features of Automobiles. Search on Bibsonomy KES-IDT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Tânia Carvalho, Nuno Moniz The Compromise of Data Privacy in Predictive Performance. Search on Bibsonomy IDA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Jan Wichelmann, Sebastian Berndt 0001, Claudius Pott, Thomas Eisenbarth 0001 Help, My Signal has Bad Device! - Breaking the Signal Messenger's Post-Compromise Security Through a Malicious Device. Search on Bibsonomy DIMVA The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Alisa A. Vorobeva, Guldar Khisaeva, Danil Zakoldaev, Igor V. Kotenko Detection of Business Email Compromise Attacks with Writing Style Analysis. Search on Bibsonomy MobiSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Mark E. O'Sullivan, Tatiana Gabruseva, Geraldine B. Boylan, M. O'Riordan, Gordon Lightbody, William P. Marnane Classification of fetal compromise during labour: signal processing and feature engineering of the cardiotocograph. Search on Bibsonomy EUSIPCO The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
16Nestor Demeure Compromise between precision and performance in high performance computing. (Compromis entre précision et performance dans le calcul haute performance). Search on Bibsonomy 2021   RDF
16Sebastián Lozano 0001, Narges Soltani, Akram Dehnokhalaji A compromise programming approach for target setting in DEA. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Alberto Giacomo Orellana, Cristiano De Michele Algorithm 1010: Boosting Efficiency in Solving Quartic Equations with No Compromise in Accuracy. Search on Bibsonomy ACM Trans. Math. Softw. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Huchang Liao, Rui Qin, Di Wu, Morteza Yazdani, Edmundas Kazimieras Zavadskas Pythagorean fuzzy combined compromise solution method integrating the cumulative prospect theory and combined weights for cold chain logistics distribution center selection. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Reshef Meir, Kobi Gal, Maor Tal Strategic voting in the lab: compromise and leader bias behavior. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Stefano Scanzio, Mohammad Ghazi Vakili, Gianluca Cena, Claudio Demartini, Bartolomeo Montrucchio, Adriano Valenzano, Claudio Zunino Wireless Sensor Networks and TSCH: A Compromise Between Reliability, Power Consumption, and Latency. Search on Bibsonomy IEEE Access The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Chandra Ade Irawan, Arif Imran, Martino Luis Solving the bi-objective capacitated p-median problem with multilevel capacities using compromise programming and VNS. Search on Bibsonomy Int. Trans. Oper. Res. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Fuhe Ma, Fucheng Guo 0001, Le Yang 0001 Low-complexity TDOA and FDOA localization: A compromise between two-step and DPD methods. Search on Bibsonomy Digit. Signal Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Miguel Araujo, Miguel Almeida, Jaime Ferreira, Luís Moura Silva, Pedro Bizarro BreachRadar: Automatic Detection of Points-of-Compromise. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
16Alessandro Ecclesie Agazzi Business Email Compromise (BEC) and Cyberpsychology. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
16Manoel Horta Ribeiro, Shagun Jhaver, Savvas Zannettou, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Robert West 0001 Does Platform Migration Compromise Content Moderation? Evidence from r/The_Donald and r/Incels. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
16Nikos Vasilakis, Cristian-Alexandru Staicu, Greg Ntousakis, Konstantinos Kallas, Ben Karel, André DeHon, Michael Pradel Mir: Automated Quantifiable Privilege Reduction Against Dynamic Library Compromise in JavaScript. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
16Kamran Javid, Will Handley, Mike Hobson, Anthony N. Lasenby Compromise-free Bayesian neural networks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
16Shadrack Awah Buo An application of cyberpsychology in business email compromise. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
16Aron Wussler Mitigating TLS compromise with ECDHE and SRP. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
16Oliver Kisalay Burmeister A Post Publication Review of 'Understanding the effects of compromise and misuse of personal details on older people'. Search on Bibsonomy Australas. J. Inf. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Khuong Ho-Van, Thiem Do-Dac Eavesdropping-decoding compromise in spectrum sharing paradigm with ES-capable AF relay. Search on Bibsonomy Wirel. Networks The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Moni Naor, Shahar Paz, Eyal Ronen CRISP: Compromise Resilient Identity-based Symmetric PAKE. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
16Joseph Jaeger, Nirvan Tyagi Handling Adaptive Compromise for Practical Encryption Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
16Benjamin Dowling, Britta Hale There Can Be No Compromise: The Necessity of Ratcheted Authentication in Secure Messaging. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
16Ciro Gioia, Daniele Borio NeQuick-G and Android Devices: A Compromise between Computational Burden and Accuracy. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
16Zeljko Stevic, Dragan Pamucar, Adis Puska, Prasenjit Chatterjee Sustainable supplier selection in healthcare industries using a new MCDM method: Measurement of alternatives and ranking according to COmpromise solution (MARCOS). Search on Bibsonomy Comput. Ind. Eng. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 2279 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license