The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for compromise with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1979 (16) 1980-1988 (17) 1989-1990 (18) 1991-1993 (24) 1994-1995 (31) 1996 (22) 1997 (30) 1998 (18) 1999 (35) 2000 (48) 2001 (69) 2002 (79) 2003 (96) 2004 (153) 2005 (195) 2006 (226) 2007 (236) 2008 (251) 2009 (170) 2010 (41) 2011 (28) 2012 (24) 2013 (32) 2014 (25) 2015 (24) 2016 (30) 2017 (29) 2018 (41) 2019 (37) 2020 (41) 2021 (47) 2022 (72) 2023 (66) 2024 (8)
Publication types (Num. hits)
article(714) book(1) data(1) incollection(13) inproceedings(1538) phdthesis(12)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1926 occurrences of 1317 keywords

Results
Found 2279 publication records. Showing 2279 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Rick Hofstede, Mattijs Jonker, Anna Sperotto, Aiko Pras Flow-Based Web Application Brute-Force Attack and Compromise Detection. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Behnam Vahdani, Meghdad Salimi, Seyed Meysam Mousavi A New Compromise Solution Model Based on Dantzig-Wolfe Decomposition for Solving Belief Multi-Objective Nonlinear Programming Problems with Block Angular Structure. Search on Bibsonomy Int. J. Inf. Technol. Decis. Mak. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Justin E. Doak, Joe B. Ingram, Sam A. Mulder, John H. Naegle, Jonathan A. Cox, James B. Aimone, Kevin R. Dixon, Conrad D. James, David R. Follett Tracking Cyber Adversaries with Adaptive Indicators of Compromise. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
16Kyong Jae Park, Sungmi Park, Joshua I. James A Case Study of the 2016 Korean Cyber Command Compromise. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
16Huan Fu, Mingming Gong, Chaohui Wang, Dacheng Tao A Compromise Principle in Deep Monocular Depth Estimation. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
16Ioannis Caragiannis, Panagiotis Kanellopoulos, Alexandros A. Voudouris Bounding the inefficiency of compromise. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
16Ying-Jun Chen, Gwo-Jiun Horng, Sheng-Tzong Cheng A Distributed Cross-Layer Compromise Detection Mechanism for Wireless Sensor Networks. Search on Bibsonomy J. Netw. Intell. The full citation details ... 2017 DBLP  BibTeX  RDF
16Anna R. Gagliardi, Ariel Ducey, Pascale Lehoux, Thomas Turgeon, Jeremy Kolbunik, Sue Ross, Patricia Trbovich, Anthony C. Easty, Chaim M. Bell, David R. Urbach Multiple constraints compromise decision-making about implantable medical devices for individual patients: qualitative interviews with physicians. Search on Bibsonomy BMC Medical Informatics Decis. Mak. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Antonio Nicolò, Rodrigo A. Velez Divide and compromise. Search on Bibsonomy Math. Soc. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Lin Boldt, Neeraj Arora Dyadic Compromise Effect. Search on Bibsonomy Mark. Sci. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Miguel Araujo, Miguel Almeida, Jaime Ferreira, Luís Moura Silva, Pedro Bizarro BreachRadar: Automatic Detection of Points-of-Compromise. Search on Bibsonomy SDM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Malek Ghanes, Jean-Pierre Barbot, Leonid M. Fridman, Arie Levant A novel differentiator: A compromise between super twisting and linear algorithms. Search on Bibsonomy CDC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Yeslam Al-Saggaf An Effective Approach for Dealing with the Pressure to Compromise Security During Systems Development. Search on Bibsonomy ATCS/SePrIoT@SecureComm The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Boudewijn F. van Dongen, Josep Carmona 0001, Thomas Chatain, Farbod Taymouri Aligning Modeled and Observed Behavior: A Compromise Between Computation Complexity and Quality. Search on Bibsonomy CAiSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Takashi Tsuzuki, Itsuki Chiba A time-series eye-fixation analysis of the similarity-compromise effect in multi-alternative choice. Search on Bibsonomy CogSci The full citation details ... 2017 DBLP  BibTeX  RDF
16Masashi Sato, Shin'ichiro Matsuo Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Elham Ahmadi, Camila F. Costa, Mario A. Nascimento Best-Compromise In-Route Nearest Neighbor Queries. Search on Bibsonomy SIGSPATIAL/GIS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16David Nuñez 0001, Isaac Agudo, Javier López 0001 The Fallout of Key Compromise in a Proxy-Mediated Key Agreement Protocol. Search on Bibsonomy DBSec The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Masashi Sato, Shin'ichiro Matsuo Long-Term Public Blockchain: Resilience against Compromise of Underlying Cryptography. Search on Bibsonomy ICCCN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Stefania Monica, Federico Bergenti Two Analytic Models of Compromise in Multi-Agent Systems. Search on Bibsonomy MATES The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Stefania Monica, Federico Bergenti An Analytic Model of the Impact of Skeptical Agents on the Dynamics of Compromise. Search on Bibsonomy WOA The full citation details ... 2017 DBLP  BibTeX  RDF
16Michael Cui, Daniel Damir Harabor, Alban Grastien Compromise-free Pathfinding on a Navigation Mesh. Search on Bibsonomy IJCAI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Ioannis Caragiannis, Panagiotis Kanellopoulos, Alexandros A. Voudouris Bounding the Inefficiency of Compromise. Search on Bibsonomy IJCAI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Joe DeBlasio, Stefan Savage, Geoffrey M. Voelker, Alex C. Snoeren Tripwire: inferring internet site compromise. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun Using hover to compromise the confidentiality of user input on Android. Search on Bibsonomy WISEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
16Shamina Hossain-McKenzie Protecting the power grid: strategies against distributed controller compromise Search on Bibsonomy 2017   RDF
16Aysha-Khatoon Kadaikar Optimization of the Rate-Distortion Compromise for Stereoscopic Image Coding using Joint Entropy-Distortion Metric. (Optimisation du compromis débit-distorsion pour le codage d'images stéréoscopiques utilisant une métrique conjointe entropie-distortion). Search on Bibsonomy 2017   RDF
16Philippe Declerck Compromise approach for predictive control of Timed Event Graphs with specifications defined by P-time Event Graphs. Search on Bibsonomy Discret. Event Dyn. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Shuang Wei, Defu Jiang, Feng Wang A new multiobjective genetic programming approach using compromise distance ranking for automated design of nonlinear system design. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Suvrajeet Sen, Yifan Liu Mitigating Uncertainty via Compromise Decisions in Two-Stage Stochastic Linear Programming: Variance Reduction. Search on Bibsonomy Oper. Res. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Ahmed Al-Riyami, Ning Zhang 0001, John Keane An Adaptive Early Node Compromise Detection Scheme for Hierarchical WSNs. Search on Bibsonomy IEEE Access The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Paula Amaral 0001, Tiago Cardal Pais Compromise ratio with weighting functions in a Tabu Search multi-criteria approach to examination timetabling. Search on Bibsonomy Comput. Oper. Res. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Julien Roland, José Rui Figueira, Yves De Smet Finding compromise solutions in project portfolio selection with multiple experts by inverse optimization. Search on Bibsonomy Comput. Oper. Res. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Caroline Anne Larlee, Alex Brandts, David Sankoff Compromise or optimize? The breakpoint anti-median. Search on Bibsonomy BMC Bioinform. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16J. Garrett Morris The Best of Both Worlds: Linear Functional Programming without Compromise. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
16Enis Ulqinaku, Luka Malisa, Julinda Stefa, Alessandro Mei, Srdjan Capkun Can't Touch This: Using Hover to Compromise the Confidentiality of User Input on Android. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
16Katriel Cohn-Gordon, Cas Cremers, Luke Garratt On Post-Compromise Security. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2016 DBLP  BibTeX  RDF
16Marie Vasek, John Wadleigh, Tyler Moore 0001 Hacking Is Not Random: A Case-Control Study of Webserver-Compromise Risk. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Markus Jakobsson Case Study: Business Email Compromise. Search on Bibsonomy Understanding Social Engineering Based Scams The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Alastair Hewitt An Epistemological Compromise Between Actor and Observer. Search on Bibsonomy Anticipation Across Disciplines The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Sue Hessey, Hazel Lacohée, Rob Collingridge Balancing Act or Compromise? A Case Study Highlighting the Challenges of Trialling IT Services with the Elderly. Search on Bibsonomy HCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Dragana Calic, Malcolm Robert Pattinson, Kathryn Parsons, Marcus A. Butavicius, Agata McCormac Naïve and Accidental Behaviours that Compromise Information Security: What the Experts Think. Search on Bibsonomy HAISA The full citation details ... 2016 DBLP  BibTeX  RDF
16Maureen Van Devender, William Bradley Glisson, Matt Campbell, Michael Finan Identifying Opportunities to Compromise Medical Devices. Search on Bibsonomy AMCIS The full citation details ... 2016 DBLP  BibTeX  RDF
16Onur Catakoglu, Marco Balduzzi, Davide Balzarotti Automatic Extraction of Indicators of Compromise for Web Applications. Search on Bibsonomy WWW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Katriel Cohn-Gordon, Cas Cremers, Luke Garratt On Post-compromise Security. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Rodrigo Morales, Aminata Sabane, Pooya Musavi, Foutse Khomh, Francisco Chicano, Giuliano Antoniol Finding the Best Compromise Between Design Quality and Testing Effort During Refactoring. Search on Bibsonomy SANER The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Khalil Laghmari, Christophe Marsala, Mohammed Ramdani Graded multi-label classification: Compromise between handling label relations and limiting error propagation. Search on Bibsonomy SITA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Alejandra Duenas, Christine Di Martinelly, G. Yazgi Tütüncü, Joaquín Aguado A Multi-objective Hospital Operating Room Planning and Scheduling Problem Using Compromise Programming. Search on Bibsonomy MICAI (1) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Subil Mathew Abraham Estimating Mean Time to Compromise Using Non-homogenous Continuous-Time Markov Models. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Yuta Takata, Mitsuaki Akiyama, Takeshi Yagi, Takeshi Yada, Shigeki Goto Website Forensic Investigation to Identify Evidence and Impact of Compromise. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16J. Garrett Morris The best of both worlds: linear functional programming without compromise. Search on Bibsonomy ICFP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Mohammad-Mahdi Bidmeshki, Gaurav Rajavendra Reddy, Liwei Zhou, Jeyavijayan Rajendran, Yiorgos Makris Hardware-based attacks to compromise the cryptographic security of an election system. Search on Bibsonomy ICCD The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Sigurd Eskeland Compromise-protection of smart meters in the smart grid using co-dependent authentication. Search on Bibsonomy ECSA Workshops The full citation details ... 2016 DBLP  BibTeX  RDF
16Daniel Conte de Leon, Venkata A. Bhandari, Ananth A. Jillepalli, Frederick T. Sheldon Using a knowledge-based security orchestration tool to reduce the risk of browser compromise. Search on Bibsonomy SSCI The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
16Jiangshan Yu Mitigating private key compromise. Search on Bibsonomy 2016   RDF
16Mobin Javed Detecting Credential Compromise in Enterprise Networks. Search on Bibsonomy 2016   RDF
16Rick Hofstede Flow-based compromise detection. Search on Bibsonomy 2016   RDF
16Mingfei Wu, Dylan Dah-Chuan Lu A Novel Stabilization Method of LC Input Filter With Constant Power Loads Without Load Performance Compromise in DC Microgrids. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Rahul Varshney, Mohammed G. M. Khan, Ummatul Fatima, M. J. Ahsan Integer compromise allocation in multivariate stratified surveys. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16L. Gharis, Joseph Roise, J. McCarter A compromise programming model for developing the cost of including carbon pools and flux into forest management. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Xudong Luo, Qiaoting Zhong, Ho-fung Leung A Spectrum of Weighted Compromise Aggregation Operators: A Generalization of Weighted Uninorm Operator. Search on Bibsonomy Int. J. Intell. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Yousaf Shad Muhammad, Javid Shabbir, Ijaz Hussain, Mitwali Abd-el. Moemen Multi-objective Compromise Allocation in Multivariate Stratified Sampling Using Extended Lexicographic Goal Programming with Gamma Cost Function. Search on Bibsonomy J. Math. Model. Algorithms Oper. Res. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Patrick Marques Ciarelli, Elias Oliveira Achieving a compromise between performance and complexity of structure: An incremental approach. Search on Bibsonomy Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Cas Cremers, Michèle Feltz Beyond eCK: perfect forward secrecy under actor compromise and ephemeral-key reveal. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Julia Staffel Disagreement and Epistemic Utility-Based Compromise. Search on Bibsonomy J. Philos. Log. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Bernhard Jenny, Bojan Savric, Tom Patterson A compromise aspect-adaptive cylindrical projection for world maps. Search on Bibsonomy Int. J. Geogr. Inf. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Jing Ma, Wenhui Zhang Enhancing the Security of Protocols against Actor Key Compromise Problems. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
16Argyris Kanellopoulos, Johanna C. Gerdessen, G. D. H. Claassen Compromise programming: Non-interactive calibration of utility-based metrics. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Anoop Kumar Sahu, Saurav Datta, Siba Sankar Mahapatra GDMP for CNC machine tool selection with a compromise ranking method using generalised fuzzy circumstances. Search on Bibsonomy Int. J. Comput. Aided Eng. Technol. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Reza Roozbahani, Sergei Yu. Schreider, Babak Abbasi Optimal water allocation through a multi-objective compromise between environmental, social, and economic preferences. Search on Bibsonomy Environ. Model. Softw. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Tehila Minkus, Kelvin Liu, Keith W. Ross Children Seen But Not Heard: When Parents Compromise Children's Online Privacy. Search on Bibsonomy WWW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Jianhui Zhu, Bipin C. Desai User Agent and Privacy Compromise. Search on Bibsonomy C3S2E The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Jan Quadflieg, Günter Rudolph, Mike Preuss How costly is a good compromise: Multi-objective TORCS controller parameter optimization. Search on Bibsonomy CIG The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Nídia Caetano, David López 0001, Jose Cabré Learning sustainability and social compromise skills: a new track is born. Search on Bibsonomy TEEM The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Jialin Han, Yaoguang Hu, Guangquan Zhang 0001, Jie Lu 0001 A Compromise-Based Particle Swarm Optimization Algorithm for Solving Bi-Level Programming Problems with Fuzzy Parameters. Search on Bibsonomy ISKE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Daniil V. Voloshin, Dmitriy Rybokonenko, Vladislav A. Karbovskii Towards a Performance-realism Compromise in the Development of the Pedestrian Navigation Model. Search on Bibsonomy ICCS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Wa-Muzemba Anselm Tshibangu Taguchi Method or Compromise Programming as Robust Design Optimization Tool: The Case of a Flexible Manufacturing System. Search on Bibsonomy ICINCO (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Fang He, Rong Qu, Robert I. John A Compromise Based Fuzzy Goal Programming Approach With Satisfaction Function For Multi-Objective Portfolio Optimisation. Search on Bibsonomy ECMS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
16Masahiro Inuiguchi, Tomoe Entani Group decision aiding by Interval AHP with compromise and refinement. Search on Bibsonomy IFSA-EUSFLAT The full citation details ... 2015 DBLP  BibTeX  RDF
16Etienne Michon Allocation dynamique sur cloud IaaS : allocation dynamique d'infrastructure de SI sur plateforme de cloud avec maîtrise du compromis coûts/performances. (Dynamic allocation on IaaS : SI Infrastructure dynamic allocation of cloud platform with control of compromise cost / performance). Search on Bibsonomy 2015   RDF
16Josefine Fischer Knowledge Compromise(d)? Ways and values of coproduction in academia. (PDF / PS) Search on Bibsonomy 2015   RDF
16Michael Richter 0001 Fully absorbing dynamic compromise. Search on Bibsonomy J. Econ. Theory The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16William V. Gehrlein, Florenz Plassmann A comparison of theoretical and empirical evaluations of the Borda Compromise. Search on Bibsonomy Soc. Choice Welf. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Sadoullah Ebrahimnejad, S. Meysam Mousavi, Reza Tavakkoli-Moghaddam, Mojtaba Heydar Risk ranking in mega projects by fuzzy compromise approach: A comparative analysis. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Ummatul Fatima, Rahul Varshney, Siddiqui Najmussehar, Mohammad Jameel Ahsan On Compromise Mixed Allocation in Multivariate Stratified Sampling with Random Parameters. Search on Bibsonomy J. Math. Model. Algorithms Oper. Res. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Lyes Belhoul, Lucie Galand, Daniel Vanderpooten An efficient procedure for finding best compromise solutions to the multi-objective assignment problem. Search on Bibsonomy Comput. Oper. Res. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Federico Liberatore, M. Teresa Ortuño, Gregorio Tirado, Begoña Vitoriano, Maria Paola Scaparra A hierarchical compromise model for the joint optimization of recovery operations and distribution of emergency goods in Humanitarian Logistics. Search on Bibsonomy Comput. Oper. Res. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Shazia Ghufran, Saman Khowaja, M. J. Ahsan Compromise allocation in multivariate stratified sample surveys under two stage randomized response model. Search on Bibsonomy Optim. Lett. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Rick Hofstede, Luuk Hendriks, Anna Sperotto, Aiko Pras SSH Compromise Detection using NetFlow/IPFIX. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16S. Meysam Mousavi, Behnam Vahdani, Reza Tavakkoli-Moghaddam, N. Tajik Soft computing based on a fuzzy grey group compromise solution approach with an application to the selection problem of material handling equipment. Search on Bibsonomy Int. J. Comput. Integr. Manuf. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Trine Tornøe Platz, Herbert Hamers, Marieke Quant C-complete sets for compromise stable games. Search on Bibsonomy Math. Methods Oper. Res. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Seyed Hossein Razavi Hajiagha, Hannan Amoozad Mahdiraji, Edmundas Kazimieras Zavadskas, Shide Sadat Hashemi Fuzzy Multi-Objective Linear Programming Based on Compromise VIKOR Method. Search on Bibsonomy Int. J. Inf. Technol. Decis. Mak. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Jian-Zhang Wu 0001, Qiang Zhang, Qinjun Du, Zhiliang Dong Compromise principle based methods of identifying capacities in the framework of multicriteria decision analysis. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Pierre-Emmanuel Arduin, Brice Mayag, Elsa Negre, Camille Rosenthal-Sabroux How to compromise on the best price? A group tacit knowledge-based multicriteria approach. Search on Bibsonomy J. Decis. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Yong Ho Kang, Wook-Jin Choi, Byung-Chul Kim, Joo Man Kim On tradeoff between the two compromise factors in assigning tasks on a cluster computing. Search on Bibsonomy Clust. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Hannes Holm A Large-Scale Study of the Time Required to Compromise a Computer System. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Doug Rhoades Machine actionable indicators of compromise. Search on Bibsonomy ICCST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Marie Vasek, Tyler Moore 0001 Identifying Risk Factors for Webserver Compromise. Search on Bibsonomy Financial Cryptography The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16Shang-Lin Wu, Yang-Yin Lin, Yu-Ting Liu, Chih-Yu Chen, Chin-Teng Lin A learning scheme to Fuzzy C-Means based on a compromise in updating membership degrees. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
16David A. Basin, Cas Cremers, Marko Horvat 0002 Actor Key Compromise: Consequences and Countermeasures. Search on Bibsonomy CSF The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 2279 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license