|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1403 occurrences of 958 keywords
|
|
|
Results
Found 5944 publication records. Showing 5944 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Francesca Palumbo, Danilo Pani, Alessandro Pilia, Luigi Raffo |
Impact of Half-Duplex and Full-Duplex DMA Implementations on NoC Performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOCS ![In: NOCS 2010, Fourth ACM/IEEE International Symposium on Networks-on-Chip, Grenoble, France, May 3-6, 2010, pp. 249-256, 2010, IEEE Computer Society, 978-0-7695-4053-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
full-duplex DMA, half-duplex DMA, hybrid switching NoC, DMA performance bias, deadlock prevention |
15 | Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene |
Enforcing Access Control to Web Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIT ![In: 10th IEEE International Conference on Computer and Information Technology, CIT 2010, Bradford, West Yorkshire, UK, June 29-July 1, 2010, pp. 612-619, 2010, IEEE Computer Society, 978-0-7695-4108-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Access control, intrusion prevention, application profile |
15 | Grégoire Jacob, Eric Filiol, Hervé Debar |
Formalization of Viruses and Malware Through Process Algebras. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2010, Fifth International Conference on Availability, Reliability and Security, 15-18 February 2010, Krakow, Poland, pp. 597-602, 2010, IEEE Computer Society, 978-0-7695-3965-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
process algebra, detection, malware, prevention |
15 | Karyn Moffatt, Joanna McGrenere |
Steadied-bubbles: combining techniques to address pen-based pointing errors for younger and older adults. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1125-1134, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
pointing facilitation, older adults, pen-based interaction, error prevention |
15 | Siu Fung Yeung, John C. S. Lui |
Hack-proof synchronization protocol for multi-player online games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 41(2), pp. 305-331, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Cheat prevention, Speed-hack, Multiplayer online game |
15 | Cristian Varas, Thomas Hirsch |
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SECURWARE ![In: The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece, pp. 179-184, 2009, IEEE Computer Society, 978-0-7695-3668-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Participative Measurement, Denial of Service, Autonomic Communication, Intrusion Prevention, Flash crowds |
15 | Akihisa Furukawa, Yusaku Okada |
A Proposal of Collection and Analysis System of Near Miss Incident in Nursing Duties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (9) ![In: Human Interface and the Management of Information. Information and Interaction, Symposium on Human Interface 2009, Held as part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009, Proceedings, Part II, pp. 497-502, 2009, Springer, 978-3-642-02558-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Accident prevention, Knowledge management, Human error |
15 | Akinori Ueno, Shoyo Tei, Tomohide Nonomura, Yuichi Inoue |
An Analysis of Saccadic Eye Movements and Facial Images for Assessing Vigilance Levels During Simulated Driving. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (17) ![In: Engineering Psychology and Cognitive Ergonomics, 8th International Conference, EPCE 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 451-460, 2009, Springer, 978-3-642-02727-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
doze prevention, facial sleepiness, advanced safety vehicle, saccade |
15 | Anyi Liu, Yi Yuan, Duminda Wijesekera, Angelos Stavrou |
SQLProb: a proxy-based architecture towards preventing SQL injection attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), Honolulu, Hawaii, USA, March 9-12, 2009, pp. 2054-2061, 2009, ACM, 978-1-60558-166-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
intrusion detection, information security, intrusion prevention, SQL injection attack |
15 | Sara Porat, Boaz Carmeli, Tamar Domany, Tal Drory, Ksenya Kveler, Alex Melament, Haim Nelken |
Masking Gateway for Enterprises. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Languages: From Formal to Natural ![In: Languages: From Formal to Natural, Essays Dedicated to Nissim Francez on the Occasion of His 65th Birthday, pp. 177-191, 2009, Springer, 978-3-642-01747-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Data Leakage Prevention (DLP), de-identification, Service Oriented Architecture (SOA), anonymization, Optical Character Recognition (OCR), data masking |
15 | Jacob Guidosh, Darrell R. Wallace |
The use of simulation as an objective framework to conduct life cycle assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SpringSim ![In: Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, San Diego, California, USA, March 22-27, 2009, 2009, SCS/ACM. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
industrial ecology, inventory analysis, life cycle assessment, pollution prevention, impact analysis |
15 | Ji-Liang Zou, Jia-Yi Li |
Establishment of Early Warning System for Accidental Water Pollution Incidents in China. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESIAT (2) ![In: 2009 International Conference on Environmental Science and Information Application Technology, ESIAT 2009, Wuhan, China, 4-5 July 2009, 3 Volumes, pp. 127-130, 2009, IEEE Computer Society, 978-0-7695-3682-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
accidental water pollution incident, emergency response, early warning system, prevention |
15 | Xiaosheng Liu, Lei Hao, Yuxuan Liu |
The Research on Flood Control and Rainfall Regimen Information System of Poyang Lake Areas. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESIAT (2) ![In: 2009 International Conference on Environmental Science and Information Application Technology, ESIAT 2009, Wuhan, China, 4-5 July 2009, 3 Volumes, pp. 257-260, 2009, IEEE Computer Society, 978-0-7695-3682-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Poyang Lake Areas, Flood Prevention, Rainfall Regimen, Information System |
15 | Gadi Taubenfeld |
Contention-Sensitive Data Structures and Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISC ![In: Distributed Computing, 23rd International Symposium, DISC 2009, Elche, Spain, September 23-25, 2009. Proceedings, pp. 157-171, 2009, Springer, 978-3-642-04354-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Contention-sensitive, shortcut code, disable-free, prevention-free, k-obstruction-free, synchronization, locks, wait-free, starvation, livelock |
15 | Juho Heikkilä, Andrei V. Gurtov |
Filtering SPAM in P2PSIP Communities with Web of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 110-121, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
spam prevention, p2p, social networking, trust |
15 | Richard Chow, Ian Oberst, Jessica Staddon |
Sanitization's slippery slope: the design and study of a text revision assistant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS 2009, Mountain View, California, USA, July 15-17, 2009, 2009, ACM, 978-1-60558-736-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
data loss prevention, inference detection, privacy, sanitization, redaction |
15 | Long-Sheng Li, Gwo-Chuan Lee, Jhu-Shyuan Mei, Cing-Long Chen |
The Hierarchical Path-Selection Scheme Based on Multihoming NEMO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Algorithms and Architectures for Parallel Processing, 9th International Conference, ICA3PP 2009, Taipei, Taiwan, June 8-11, 2009. Proceedings, pp. 55-66, 2009, Springer, 978-3-642-03094-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Loop prevention, Load balance, Network Mobility, Multihoming |
15 | A. Samaras, George Pangalos, Christos Ilioudis, Ioannis Pagkalos |
Using Nature and Bio-inspired Technologies for Building Innovative Proactive Security Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Panhellenic Conference on Informatics ![In: PCI 2009, 13th Panhellenic Conference on Informatics, 10-12 September 2009, Corfu, Greece, pp. 7-13, 2009, IEEE Computer Society, 978-0-7695-3788-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Prevention security mechanisms, Information security, Artificial Immune Systems |
15 | Hiroaki Yuze, Yuji Aota, Takashi Kawada |
Development of the Student Refuge Information System Using IC Card Type Student Identification Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 23rd International Conference on Advanced Information Networking and Applications, AINA 2009, Workshops Proceedings, Bradford, United Kingdom, May 26-29, 2009, pp. 868-872, 2009, IEEE Computer Society, 978-0-7695-3639-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
refuge information system, IC card, student identification card, disaster prevention |
15 | Qi Gao 0004, Wenbin Zhang 0005, Yan Tang, Feng Qin |
First-aid: surviving and preventing memory management bugs during production runs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroSys ![In: Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, pp. 159-172, 2009, ACM, 978-1-60558-482-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
memory bug diagnosis, software reliability, software failure, error prevention |
15 | Jaeyeon Jung, Anmol Sheth, Ben Greenstein, David Wetherall, Gabriel Maganis, Tadayoshi Kohno |
Privacy oracle: a system for finding application leaks with black box differential testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 279-288, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data loss prevention, differential fuzz testing, personal information leaks, sequence alignment algorithm, black-box testing |
15 | Yi Huang, Laura K. Dillon, R. E. Kurt Stirewalt |
On Mechanisms for Deadlock Avoidance in SIP Servlet Containers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPTComm ![In: Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks, Second International Conference, IPTComm 2008, Heidelberg, Germany, July 1-2, 2008. Revised Selected Papers, pp. 196-216, 2008, Springer, 978-3-540-89053-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
converged container, synchronization contract, Concurrency, negotiation, SIP, servlet, deadlock prevention |
15 | Yoseba K. Penya, Pablo García Bringas |
Experiences on Designing an Integral Intrusion Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 19th International Workshop on Database and Expert Systems Applications (DEXA 2008), 1-5 September 2008, Turin, Italy, pp. 675-679, 2008, IEEE Computer Society, 978-0-7695-3299-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Data Mining, Machine Learning, Intrusion Detection, Bayesian Networks, Anomaly Detection, Intrusion Prevention, Misuse Detection |
15 | Abhinav Srivastava, Jonathon T. Giffin |
Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 11th International Symposium, RAID 2008, Cambridge, MA, USA, September 15-17, 2008. Proceedings, pp. 39-58, 2008, Springer, 978-3-540-87402-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
virtual machine introspection, attack prevention, Firewall |
15 | Konstantinos Kazakos, Thirimachos Bourlai, Yuichi Fujiki, James Levine, Ioannis T. Pavlidis |
NEAT-o-Games: novel mobile gaming versus modern sedentary lifestyle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile HCI ![In: Proceedings of the 10th Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2008, Amsterdam, the Netherlands, September 2-5, 2008, pp. 515-518, 2008, ACM, 978-1-59593-952-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
obesity intervention, obesity prevention, human computer interaction, ubiquitous computing, serious gaming, pervasive gaming, physical activity, wearable sensors, NEAT, behavior modification |
15 | Jarek Krajewski, Rainer Wieland, Anton Batliner |
An Acoustic Framework for Detecting Fatigue in Speech Based Human-Computer-Interaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCHP ![In: Computers Helping People with Special Needs, 11th International Conference, ICCHP 2008, Linz, Austria, July 9-11, 2008. Proceedings, pp. 54-61, 2008, Springer, 978-3-540-70539-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Accident Prevention, Pattern Recognition, Assistive Technologies, Affective Computing, Fatigue, Acoustic Features |
15 | YouSik Hong, Cheonshik Kim, Geuk Lee |
Study of Optimal Traffic Information Using Agents Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, Second KES International Symposium, KES-AMSTA 2008, Incheon, Korea, March 26-28, 2008. Proceedings, pp. 868-877, 2008, Springer, 978-3-540-78581-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Optimal car speed, Prevention of traffic accident |
15 | Shouhuai Xu, Moti Yung |
K-Anonymous Multi-party Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 72-87, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems |
15 | Virginia N. L. Franqueira, Raul H. C. Lopes |
Vulnerability Assessment by Learning Attack Specifications in Graphs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 161-164, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Network Security, DoS, Intrusion Prevention |
15 | Muhammad Sher, Thomas Magedanz |
Protecting IP Multimedia Subsystem (IMS) Service Delivery Platform from Time Independent Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 171-176, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Intrusion Detection and Prevention system, IP Multimedia Subsystem, Services Delivery Platform, Security Threats |
15 | Ilya I. Mokhov, Alexey Minin |
Advanced Forecasting and Classification Technique for Condition Monitoring of Rotating Machinery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2007, 8th International Conference, Birmingham, UK, December 16-19, 2007, Proceedings, pp. 37-46, 2007, Springer, 978-3-540-77225-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
fault analysis and prevention, rotating machinery, ball bearing failures, predictive monitoring, artificial intelligence, artificial neural networks |
15 | Martin Boldt, Bengt Carlsson, Tobias Larsson, Niklas Lindén |
Preventing Privacy-Invasive Software Using Collaborative Reputation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 142-157, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
malware prevention, Information security, reputation systems |
15 | Jeffrey Wilhelm, Tzi-cker Chiueh |
A Forced Sampled Execution Approach to Kernel Rootkit Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 219-235, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection |
15 | Simon P. Chung, Aloysius K. Mok |
Advanced Allergy Attacks: Does a Corpus Really Help? ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings, pp. 236-255, 2007, Springer, 978-3-540-74319-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Automatic Signature Generation, Allergy Attacks, Intrusion Prevention Systems |
15 | Casper Harteveld, Rui Guimarães, Igor Mayer, Rafael Bidarra |
Balancing Pedagogy, Game and Reality Components Within a Unique Serious Game for Training Levee Inspection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Edutainment ![In: Technologies for E-Learning and Digital Entertainment, Second International Conference, Edutainment 2007, Hong Kong, China, June 11-13, 2007, Proceedings, pp. 128-139, 2007, Springer, 978-3-540-73010-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
emergency prevention training, levee inspection, levee patroller, design methodology, serious games, game design |
15 | P. Ramasubramanian, Arputharaj Kannan |
A genetic-algorithm based neural network short-term forecasting framework for database intrusion prediction system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Soft Comput. ![In: Soft Comput. 10(8), pp. 699-714, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Database anomaly intrusion prediction, Genetic algorithms, Artificial neural networks, Database security, Intrusion prevention |
15 | Iosif-Viorel Onut, Ali A. Ghorbani 0001 |
Toward A Feature Classification Scheme For Network Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CNSR ![In: Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 24-25 May 2006, Moncton, New Brunswick, Canada, pp. 277-284, 2006, IEEE Computer Society, 0-7695-2578-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Feature Extraction, Network Security, Intrusion Detection and Prevention, Feature Classification |
15 | Anirban Mondal, Sanjay Kumar Madria, Masaru Kitsuregawa |
CADRE: A Collaborative replica allocation and deallocation approach for Mobile-P2P networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAS ![In: Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 11-14 December 2006, Delhi, India, pp. 21-28, 2006, IEEE Computer Society, 0-7695-2577-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
dynamic replication, fair replication, thrashing prevention, Mobile peer-to-peer networks |
15 | Keelan Cleary, Melissa E. Rycroft |
Putting out the fire before it starts: proactive technology support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 65-69, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
client communication, remote detection, backup, prevention |
15 | Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino |
Privacy preserving multi-factor authentication with biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006, pp. 63-72, 2006, ACM, 1-59593-547-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
identity theft prevention, privacy, authentication, biometrics |
15 | Fereydoun Kazemian, Trudy Howles |
A software testing course for computer science majors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGCSE Bull. ![In: ACM SIGCSE Bull. 37(4), pp. 50-53, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
defect prevention, software testing, debugging, validation and verification |
15 | Monica Crubézy, Martin J. O'Connor, David L. Buckeridge, Zachary Pincus, Mark A. Musen |
Ontology-Centered Syndromic Surveillance for Bioterrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 20(5), pp. 26-35, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
bioterrorism tracking, alerting and analysis, disease prevention and detection, ontologies, data integration, knowledge-based systems, knowledge modeling, ontology mapping, problem-solving methods, syndromic surveillance |
15 | Margaret E. Morris, Stephen S. Intille |
HCI challenges in health assessment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, CHI 2005, Portland, Oregon, USA, April 2-7, 2005, pp. 2130-2131, 2005, ACM, 1-59593-002-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
ubiquitous computing, pervasive computing, user experience, assessment, health, early detection, prevention |
15 | Martin Erwig, Robin Abraham, Irene Cooperstein, Steve Kollmansberger |
Automatic generation and maintenance of correct spreadsheets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 27th International Conference on Software Engineering (ICSE 2005), 15-21 May 2005, St. Louis, Missouri, USA, pp. 136-145, 2005, ACM. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
type system, template, spreadsheet, end-user software engineering, program generation, error prevention |
15 | Jiaxin J. Gao, Dallan Quass, Yiu-Kai Ng |
Selective-Splitting and Cache-Maintenance Algorithms for Associative-Client Caches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Distributed Parallel Databases ![In: Distributed Parallel Databases 16(1), pp. 5-43, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
selective splitting, associative-client cache, cache maintenance/behaviors, invalid access prevention |
15 | Bei Di Chen, Muthucumaru Maheswaran |
A cheat controlled protocol for centralized online multiplayer games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 3rd Workshop on Network and System Support for Games, NETGAMES 2004, Portland, Oregon, USA, August 30, 2004, pp. 139-143, 2004, ACM, 1-58113-942-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cheat prevention, time cheating, multiplayer online games |
15 | Robert C. Miller, Alisa M. Marshall |
Cluster-based find and replace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 2004 Conference on Human Factors in Computing Systems, CHI 2004, Vienna, Austria, April 24 - 29, 2004, pp. 57-64, 2004, ACM, 1-58113-702-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
find & replace, clustering, text editing, error prevention |
15 | Tao Ju, Frank Losasso, Scott Schaefer, Joe D. Warren |
Dual contouring of hermite data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Graph. ![In: ACM Trans. Graph. 21(3), pp. 339-346, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
crack prevention, polyhedral simplification, quadratic error functions, contouring, implicit functions |
15 | Andrew A. Chien |
A Cost and Speed Model for k-ary n-Cube Wormhole Routers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 9(2), pp. 150-162, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Routing networks, parallel computing, wormhole routing, adaptive routing, multicomputers, gate array, deadlock prevention |
15 | Jae H. Kim, Ziqiang Liu, Andrew A. Chien |
Compressionless Routing: A Framework for Adaptive and Fault-Tolerant Routing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 8(3), pp. 229-244, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Routing networks, fault tolerance, wormhole routing, adaptive routing, deadlock prevention |
15 | Naftaly H. Minsky |
Independent On-Line Monitoring of Evolving Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE ![In: 18th International Conference on Software Engineering, Berlin, Germany, March 25-29, 1996, Proceedings., pp. 134-143, 1996, IEEE Computer Society, 0-8186-7246-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP BibTeX RDF |
fraud prevention, independent on-line monitoring, irregularity detection, law-governed architecture, software maintenance, sensors, system monitoring, systems software, evolving software systems |
15 | Jörg Liebeherr, Ian F. Akyildiz |
Deadlock properties of queueing networks with finite capacities and multiple routing chains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 20(3-4), pp. 409-431, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
blocking networks, deadlocks, Queueing networks, deadlock prevention |
15 | Varna Puvvada, S. Potla, S. Tamizh Selvam, P. R. Suresh |
A simulation study on the effectiveness of n-guardring/p-guardring on latchup in 0.8 μm CMOS technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: 8th International Conference on VLSI Design (VLSI Design 1995), 4-7 January 1995, New Delhi, India, pp. 192-, 1995, IEEE Computer Society, 0-8186-6905-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
integrated circuit technology, n-guardring, p-guardring, latchup prevention, remote transient, I/O buffer n-channel transistor, 2D device simulator, TMA-MEDICI, substrate resistance, 0.8 micron, VLSI, circuit analysis computing, CMOS integrated circuits, CMOS technology, transients, steady state simulation |
15 | Jeffrey L. Berger, Jeffrey Picciotto, John P. L. Woodward, Paul T. Cummings |
Compartmented Mode Workstation: Prototype Highlights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(6), pp. 608-618, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
data overclassification prevention, MITRE compartmented mode workstation, highly classified intelligence data, binary compatible, trusted window management system, sensitivity levels, information labels, accurate data labeling, multiple sensitivity levels, software engineering, objects, security of data, workstations, security requirements, markings, security labels |
10 | Ali Shehadeh, Odey Alshboul, Ghassan Almasabha |
Slope displacement detection in construction: An automated management algorithm for disaster prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 237(Part B), pp. 121505, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Lan Yang 0007, Zhiwu Li 0001 |
Deadline-aware misinformation prevention in social networks with time-decaying influence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Expert Syst. Appl. ![In: Expert Syst. Appl. 238(Part C), pp. 121847, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Gurtej Kaur, Meenu Khurana, Amandeep Kaur |
VANET Cluster Based Gray Hole Attack Detection and Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SN Comput. Sci. ![In: SN Comput. Sci. 5(1), pp. 186, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Azin Setayesh, Eric H. Grosse, Michael A. Greig, Christoph H. Glock, W. Patrick Neumann |
Evaluating usability, functionality, and usefulness of the warehousing error prevention tool. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Prod. Res. ![In: Int. J. Prod. Res. 62(5), pp. 1633-1647, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Luca Turchet, Simone Luiten, Tjebbe Treub, Marloes van der Burgt, Costanza Siani, Alberto Boem |
Hearing loss prevention at loud music events via real-time visuo-haptic feedback. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Multimodal User Interfaces ![In: J. Multimodal User Interfaces 18(1), pp. 43-53, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Vikash Kumar Singh, Durga Sivashankar, Kishlay Kundan, Sushmita Kumari |
An Efficient Intrusion Detection and Prevention System for DDOS Attack in WSN Using SS-LSACNN and TCSLR. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cyber Secur. Mobil. ![In: J. Cyber Secur. Mobil. 13(1), pp. 135-160, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Dilip Kumar Maity, Surajit Kumar Roy, Chandan Giri |
Built-in Self-prevention (BISP) for runtime ageing effects of TSVs in 3D ICs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integr. ![In: Integr. 94, pp. 102088, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Arman Daliri, Roghaye Sadeghi, Neda Sedighian, Abbas Karimi, Javad Mohammadzadeh |
Heptagonal Reinforcement Learning (HRL): a novel algorithm for early prevention of non-sinus cardiac arrhythmia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Ambient Intell. Humaniz. Comput. ![In: J. Ambient Intell. Humaniz. Comput. 15(4), pp. 2601-2620, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Máté Debreczeni, Attila Klenik, Imre Kocsis |
Transaction Conflict Control in Hyperledger Fabric: A Taxonomy, Gaps, and Design for Conflict Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 18987-19008, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Joseph Kipongo, Theo G. Swart, Ebenezer Esenogho |
Artificial Intelligence-Based Intrusion Detection and Prevention in Edge-Assisted SDWSN With Modified Honeycomb Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 3140-3175, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Fatima Al-Quayed, Zulfiqar Ahmad, Mamoona Humayun |
A Situation Based Predictive Approach for Cybersecurity Intrusion Detection and Prevention Using Machine Learning and Deep Learning Algorithms in Wireless Sensor Networks of Industry 4.0. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 34800-34819, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Mattia Ragnoli, Marino Pavone, Nicola Epicoco, Giordano Pola, Elena De Santis, Gianluca Barile, Vincenzo Stornelli |
A Condition and Fault Prevention Monitoring System for Industrial Computer Numerical Control Machinery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 20919-20930, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | B. Ramesh, Kuruva Lakshmanna |
A Novel Early Detection and Prevention of Coronary Heart Disease Framework Using Hybrid Deep Learning Model and Neural Fuzzy Inference System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 26683-26695, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Zhiyu Ji, Kaikai Zhao, Zhaoxiang Liu, Huan Hu, Zhongheng Sun, Shiguo Lian |
A Novel Vision-Based Truck-Lifting Accident Detection Method for Truck-Lifting Prevention System in Container Terminal. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 12, pp. 42401-42410, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Hyunbum Kim, Jalel Ben-Othman, Daeyoung Kim |
Harmonized All-Ways Security Surveillance and Disaster Prevention in Smart Eco-Cities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 11(8), pp. 14206-14215, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Ali M. Al Shahrani, Ali Rizwan, Manuel Sánchez-Chero, Lilia Lucy Campos Cornejo, Mohammad Shabaz |
Blockchain-enabled federated learning for prevention of power terminals threats in IoT environment using edge zero-trust model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Supercomput. ![In: J. Supercomput. 80(6), pp. 7849-7875, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | |
Retraction Note: Intelligent Crime Prevention and Control Big Data Analysis System Based on Imaging and Capsule Network Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Neural Process. Lett. ![In: Neural Process. Lett. 56(2), pp. 146, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Ernest Ntizikira, Lei Wang 0005, Jenhui Chen, Kiran Saleem |
Honey-block: Edge assisted ensemble learning model for intrusion detection and prevention using defense mechanism in IoT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Commun. ![In: Comput. Commun. 214, pp. 1-17, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | C. Pradeepthi, B. Uma Maheswari |
Network intrusion detection and prevention strategy with data encryption using hybrid detection classifier. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(13), pp. 40147-40178, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Aanchal Sharma, Rahul Gautam, Jaspal Singh |
Real time face mask detection on a novel dataset for COVID-19 prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 83(11), pp. 32387-32410, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Seoyeon Ham, Soe Lin Paing, Brian Byunghyun Kang, Hyunglae Lee, Wansoo Kim |
Design and Validation of Soft Sliding Structure With Adjustable Stiffness for Ankle Sprain Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Robotics Autom. Lett. ![In: IEEE Robotics Autom. Lett. 9(2), pp. 947-954, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Tianbo Zhang, Shihui Jiang, Dong Shen |
Collaborative control of a levitation module for maglev trains with physical contact prevention and user-defined convergence time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Sci. ![In: Int. J. Syst. Sci. 55(2), pp. 355-369, January 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Soumadeep Das, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark, Chintan Patel, Biplab Sikdar 0001 |
AIDPS: Adaptive Intrusion Detection and Prevention System for Underwater Acoustic Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 32(2), pp. 1080-1095, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Lucas Cassiel Jacaruso |
Insights into the nutritional prevention of macular degeneration based on a comparative topic modeling approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PeerJ Comput. Sci. ![In: PeerJ Comput. Sci. 10, pp. e1940, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Riku Funada, María Santos 0003, Ryuichi Maniwa, Junya Yamauchi, Masayuki Fujita, Mitsuji Sampei, Magnus Egerstedt |
Distributed Coverage Hole Prevention for Visual Environmental Monitoring With Quadcopters Via Nonsmooth Control Barrier Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Robotics ![In: IEEE Trans. Robotics 40, pp. 1546-1565, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Mohamed Ouhssini, Karim Afdel, Elhafed Agherrabi, Mohamed Akouhar, Abdallah Abarda |
DeepDefend: A comprehensive framework for DDoS attack detection and prevention in cloud computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. King Saud Univ. Comput. Inf. Sci. ![In: J. King Saud Univ. Comput. Inf. Sci. 36(2), pp. 101938, February 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Dimitrios Tolikas, Evangelos D. Spyrou, Vassilios Kappatos |
Passenger Routing Algorithm for COVID-19 Spread Prevention by Minimising Overcrowding. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. ![In: Comput. 13(2), pp. 47, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Karan Sotoodeh |
Case study for failure analysis and prevention in subsea axial check valves used on chemical injection lines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Syst. Assur. Eng. Manag. ![In: Int. J. Syst. Assur. Eng. Manag. 15(3), pp. 1315-1324, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Stanley Chinedu Okoro, Alexander López, Austine Unuriode |
A Synergistic Approach to Wildfire Prevention and Management Using AI, ML, and 5G Technology in the United States. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.14657, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Ersin Das, Aaron D. Ames, Joel W. Burdick |
Rollover Prevention for Mobile Robots with Control Barrier Functions: Differentiator-Based Adaptation and Projection-to-State Safety. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.08916, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Henri Hansen, Juho Kanniainen |
Detachment Problem - Application in Prevention of Information Leakage in Stock Markets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.07074, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Abraham Itzhak Weinberg, Alessio Faccia |
Quantum Algorithms: A New Frontier in Financial Crime Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.18322, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Anastasia Peshkovskaya, Yu-Tao Xiang |
How Social Media Big Data Can Improve Suicide Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.07718, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Ali Saheb Pasand, Reza Moravej, Mahdi Biparva, Ali Ghodsi 0001 |
WERank: Towards Rank Degradation Prevention for Self-Supervised Learning Using Weight Regularization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.09586, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Zhiyi Tan 0002, Bingkun Bao |
Game and Reference: Policy Combination Synthesis for Epidemic Prevention and Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.10744, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | David Danks, Rada Mihalcea, Katie Siek, Mona Singh 0001, Brian Dixon, Haley Griffin |
Future of Pandemic Prevention and Response CCC Workshop Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.00096, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Guangke Chen, Yedi Zhang, Fu Song, Ting Wang, Xiaoning Du 0001, Yang Liu |
A Proactive and Dual Prevention Mechanism against Illegal Song Covers empowered by Singing Voice Conversion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.17133, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Ellie Prosser, Matthew Edwards |
Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2403.09795, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Iker Perez, Jason Wong, Piotr Skalski, Stuart Burrell, Richard Mortier, Derek McAuley, David Sutton |
Locally Differentially Private Embedding Models in Distributed Fraud Prevention Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.02450, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Emanuele Luzio, Moacir Antonelli Ponti, Christian Ramirez Arevalo, Luis Argerich |
Decoupling Decision-Making in Fraud Prevention through Classifier Calibration for Business Logic Action. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.05240, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Gautam Siddharth Kashyap, Jatin Sohlot, Ayesha Siddiqui, Ramsha Siddiqui, Karan Malik, Samar Wazir, Alexander E. I. Brownlee |
Detection of a facemask in real-time using deep learning methods: Prevention of Covid 19. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2401.15675, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Huan Sun, Haiyan Wang 0020 |
Data-driven incentive mechanism design for chronic disease prevention from the perspective of government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Oper. Res. ![In: Eur. J. Oper. Res. 313(2), pp. 652-668, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Jameel Almalki |
Intrusion Detection and Prevention Model for Blockchain Based IoMT Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Syst. Sci. Eng. ![In: Comput. Syst. Sci. Eng. 48(1), pp. 131-152, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Carolina Espina, Ariadna Feliu, Albert González Vingut, Theresa Liddle, Celia Jimenez-Garcia, Inmaculada Olaya-Caro, Luis Ángel Perula-de Torres |
Population-Based Cancer Prevention Education Intervention Through mHealth: A Randomized Controlled Trial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 48(1), pp. 9, December 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Meng Chen, Dongbao Qian, Yixuan Wang, Junyan An, Ke Meng, Shuai Xu, Sheng Liu, Meiyan Sun, Miao Li, Chunying Pang |
Systematic Review of Machine Learning Applied to the Secondary Prevention of Ischemic Stroke. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Medical Syst. ![In: J. Medical Syst. 48(1), pp. 8, December 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
10 | Alan Y.-P. Lee, Michael I.-C. Wang, Chi-Hsiang Hung, Charles H.-P. Wen |
PS-IPS: Deploying Intrusion Prevention System with machine learning on programmable switch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 152, pp. 333-342, March 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #301 - #400 of 5944 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ >>] |
|