Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Madeline Clyburn, Charles D. Lane |
Lorentz Violation at the Level of Undergraduate Classical Mechanics. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Humberto Martínez-Huerta, Rodrigo Guedes Lang, Vitor De Souza |
Lorentz Invariance Violation Tests in Astroparticle Physics. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Vasily R. Shaginyan, Alfred Z. Msezane, George S. Japaridze, Vladimir A. Stephanovich |
Violation of the Time-Reversal and Particle-Hole Symmetries in Strongly Correlated Fermi Systems: A Review. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Matthew Mewes |
Non-Minimal Lorentz Violation in Macroscopic Matter. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Vladimir Lasukov |
Violation of the Dominant Energy Condition in Geometrodynamics. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Konan-Marcelin Kouamé, Hamid Mcheick, Hicham Ajami |
Adaptive Mechanism Model for the Prevention of SLA Violation in the Context of COPD Patient Monitoring. |
Symmetry |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ken-ichi Kawarabayashi, Chao Xu |
Minimum Violation Vertex Maps and Their Applications to Cut Problems. |
SIAM J. Discret. Math. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Manish Goyal 0002, Parasara Sridhar Duggirala |
Extracting counterexamples induced by safety violation in linear hybrid systems. |
Autom. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Veljko Pejovic |
Towards a Holistic Net Neutrality Violation Detection System: A Case Study of Slovenia. |
J. Netw. Syst. Manag. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Sajeet Pradhan, Aman Srivastava, Dharmesh K. Mishra |
Abusive supervision and knowledge hiding: the mediating role of psychological contract violation and supervisor directed aggression. |
J. Knowl. Manag. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jithin Cheriyan, Bastin Tony Roy Savarimuthu, Stephen Cranefield |
Norm violation in online communities - A study of Stack Overflow comments. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Xinwei Sun 0001, Botong Wu, Wei Chen 0034 |
Identifying Invariant Texture Violation for Robust Deepfake Detection. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Humphrey O. Obie, Waqar Hussain, Xin Xia 0001, John C. Grundy, Li Li 0029, Burak Turhan, Jon Whittle 0001, Mojtaba Shahin |
A First Look at Human Values-Violation in App Reviews. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Vaibhav Kumar, Barry Cardiff, Shankar Prakriya, Mark F. Flanagan |
Delay Violation Probability and Effective Rate of Downlink NOMA over α-μ Fading Channels. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Tim Brüdigam, Victor Gaßmann, Dirk Wollherr, Marion Leibold |
Minimization of Constraint Violation Probability in Model Predictive Control. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Zhihan Jiang, Longbiao Chen, Binbin Zhou, Jingchun Huang, Tianqi Xie, Xiaoliang Fan, Cheng Wang 0003 |
iTV: Inferring Traffic Violation-Prone Locations with Vehicle Trajectory and Road Environment Data. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Narjes Torabi, Nimar S. Arora, Emma Yu, Kinjal Divesh Shah, Wenshun Liu, Michael Tingley |
Uncertainty Estimation For Community Standards Violation In Online Social Networks. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Mostafa Hadadian Nejad Yousefi, Amirmasoud Ghiassi, Boshra Sadat Hashemi, Maziar Goudarzi |
Workload Scheduling on heterogeneous Mobile Edge Cloud in 5G networks to Minimize SLA Violation. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Tichakorn Wongpiromsarn, Konstantin Slutsky, Emilio Frazzoli, Ufuk Topcu |
Minimum-Violation Planning for Autonomous Systems: Theoretical and Practical Considerations. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
15 | Vladimir Stanovov, Shakhnaz Akhmedova, Eugene Semenkin |
Combined fitness-violation epsilon constraint handling for differential evolution. |
Soft Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ajay Kumar, Seema Bawa |
A comparative review of meta-heuristic approaches to optimize the SLA violation costs for dynamic execution of cloud services. |
Soft Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Massimiliano Sassoli de Bianchi |
Violation of CHSH inequality and marginal laws in mixed sequential measurements with order effects. |
Soft Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Mónica Braga, Diego Delle Donne, Mariana S. Escalante, Javier Marenco, Maria E. Ugarte, María del Carmen Varaldo |
The minimum chromatic violation problem: A polyhedral approach. |
Discret. Appl. Math. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Armin Tavakoli, Marek Zukowski, Caslav Brukner |
Does violation of a Bell inequality always imply quantum advantage in a communication complexity problem? |
Quantum |
2020 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: Data Trading with a Monopoly Social Network: Outcomes Are Mostly Privacy Welfare Damaging. |
IEEE Netw. Lett. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Meng Liu 0007, Yun Luo, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren, Xuyun Zhang |
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control. |
Future Gener. Comput. Syst. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Chao Yuan, Jie Zhang 0062 |
Violation Detection of Live Video Based on Deep Learning. |
Sci. Program. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Boubakr Nour, Asma Adnane, Rasheed Hussain |
DeepDist: A Deep-Learning-Based IoV Framework for Real-Time Objects and Distance Violation Detection. |
IEEE Internet Things Mag. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ning Yang 0007, Pinghui Li, Daoxing Guo, Linyuan Zhang, Guoru Ding |
Detection of Transmitted Power Violation Based on Geolocation Spectrum Database in Satellite-Terrestrial Integrated Networks. |
Sensors |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Prabhat Kumar Upadhyay, Archana Pandita, Nisheeth Joshi |
Fuzzy Logic Based Detection of SLA Violation in Cloud Computing - A Predictive Approach. |
Int. J. Next Gener. Comput. |
2020 |
DBLP BibTeX RDF |
|
15 | Xiaobao Liu, Jiliang Jing, Jieci Wang, Zehua Tian |
Optimal estimation of parameters for scalar field in an expanding spacetime exhibiting Lorentz invariance violation. |
Quantum Inf. Process. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ming Li, Huihui Qin, Chengjie Zhang, Shuqian Shen 0001, Shao-Ming Fei, Heng Fan 0002 |
Characterizing multipartite entanglement by violation of CHSH inequalities. |
Quantum Inf. Process. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Javid Naikoo, Subhashish Banerjee, R. Srikanth 0001 |
Effect of memory on the violation of Leggett-Garg inequality. |
Quantum Inf. Process. |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Wat Wongtanuwat, Twittie Senivongse |
Detection of Violation of MVVM Design Pattern in Objective-C Programs. |
ICCCM |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jonathan Heiss, Max-Robert Ulbricht, Jacob Eberhardt |
Put Your Money Where Your Mouth Is - Towards Blockchain-based Consent Violation Detection. |
IEEE ICBC |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Gwan-Hwan Hwang, Pei-Chun Tien, Yi-Hsiang Tang |
Blockchain-based Automatic Indemnification Mechanism Based on Proof of Violation for Cloud Storage Services. |
ICBCT |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Valentina G. Sidorenko, Maksim Kulagin |
A Recommender Subsystem Construction for Calculating the Probability of a Violation by a Locomotive Driver using Machine-learning Algorithms. |
EWDTS |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Limei Hu, Zhengchuan Chen, Yunquan Dong, Yunjian Jia, Min Wang 0028, Liang Liang 0002, Chen Chen 0037 |
Optimal Status Update in IoT Systems: An Age of Information Violation Probability Perspective. |
VTC Fall |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Alla Zakurdaeva, Michael Weiss 0001, Steven Muegge |
Detecting architectural integrity violation patterns using machine learning. |
SAC |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Noppamas Riyana, Surapon Riyana, Srikul Nanthachumphu, Suphannika Sittisung, Dussadee Duangban |
Privacy Violation Issues in Re-publication of Modification Datasets. |
ICO |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Dirk Beyer 0001, Karlheinz Friedberger |
Violation Witnesses and Result Validation for Multi-Threaded Programs - Implementation and Evaluation with CPAchecker. |
ISoLA (1) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Shiv Kumar Sahoo, Niranjan Panigrahi, Debasis Mohapatra, Asutosh Panda, Arvind Kumar Sinha |
Temporal Modeling of On-Street Parking Data for Detection of Parking Violation in Smart Cities. |
FICTA (1) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Shaoling Hu, Wei Chen 0002 |
Minimizing the Queue-Length-Bound Violation Probability for URLLC: A Cross Layer Approach. |
GLOBECOM |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Ahmad Terra, Rafia Inam, Sandhya Baskaran, Pedro Batista 0002, Ian Burdick, Elena Fersman |
Explainability Methods for Identifying Root-Cause of SLA Violation Prediction in 5G Network. |
GLOBECOM |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Yalei Wang, Wei Chen 0002 |
Minimizing Delay Violation Probability in URLLC over Fading Channels: A Cross-Layer Approach. |
GLOBECOM |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Wei-Tse Hung, Jun-Yang Huang, Yih-Chih Chou, Cheng-Hong Tsai, Mango Chia-Tso Chao |
Transforming Global Routing Report into DRC Violation Map with Convolutional Neural Network. |
ISPD |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Victor Gomes, Yubin Huh, John C. Trueswell |
Not what you expect: The relationship between violation of expectation and negation. |
CogSci |
2020 |
DBLP BibTeX RDF |
|
15 | Hyeonjun Sung, Minsu Kim, Jemin Lee |
Impact of Finite Blocklength on AoI Violation Probability in UAV Networks. |
ICTC |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Amina Hentati, Wael Jaafar, Jean-François Frigon, Wessam Ajib |
Update Interval Violation Probability in Energy Harvesting Wireless Sensor Networks. |
CCNC |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jan Svejda, Philipp Berger 0002, Joost-Pieter Katoen |
Interpretation-Based Violation Witness Validation for C: NITWIT. |
TACAS (1) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang, Jingang Liu |
A Novel Violation Tracing Model for Cloud Service Accountability. |
TrustCom |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Dan Ma, Haidong Liu, Dawei Song 0001 |
Word Graph Network: Understanding Obscure Sentences on Social Media for Violation Comment Detection. |
NLPCC (1) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Aphinya Chairat, Matthew N. Dailey, Somphop Limsoonthrakul, Mongkol Ekpanyapong, Dharma Raj KC |
Low Cost, High Performance Automatic Motorcycle Helmet Violation Detection. |
WACV |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Aike C. Horstmann, Nicole C. Krämer |
When a Robot Violates Expectations: The Influence of Reward Valence and Expectancy Violation on People's Evaluation of a Social Robot. |
HRI (Companion) |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Martin Kölbl, Stefan Leue, Robert Schmid |
Dynamic Causes for the Violation of Timed Reachability Properties. |
FORMATS |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Mubeenah Titilola Sanni, Hemanshu Roy Pota, Huadong Mo, Daoyi Dong |
Voltage-Violation Mitigation in Power System Networks With Photo-Voltaic Penetration. |
SSCI |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Jithin Cheriyan, Bastin Tony Roy Savarimuthu, Stephen Cranefield |
Norm Violation in Online Communities - A Study of Stack Overflow Comments. |
COIN(E)@AAMAS |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Shiwen Dong, Peng Wu, Junfeng Qiao |
Research and Implementation of Violation Monitoring System for Electric Customer Service Hall. |
ICGSP |
2020 |
DBLP DOI BibTeX RDF |
|
15 | Samyeul Noh |
Decision-Making Framework for Autonomous Driving at Road Intersections: Safeguarding Against Collision, Overly Conservative Behavior, and Violation Vehicles. |
IEEE Trans. Ind. Electron. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Mia N. Stevens, Hossein Rastgoftar, Ella M. Atkins |
Geofence Boundary Violation Detection in 3D Using Triangle Weight Characterization with Adjacency. |
J. Intell. Robotic Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Almoalmi Ammar, Juan Luo, Zhuo Tang, Othman Wajdy |
Intra-Balance Virtual Machine Placement for Effective Reduction in Energy Consumption and SLA Violation. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Gwan-Hwan Hwang, Yiling Yuan |
Proof of violation for response time auditing in cloud systems. |
J. Supercomput. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Takahiro Nakayama, Masanori Hashimoto |
Stochastic Analysis on Hold Timing Violation in Ultra-Low Temperature Circuits for Functional Test at Room Temperature. |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Yotaro Takazawa, Shinji Mizuno, Tomonari Kitahara |
Approximation algorithms for the covering-type k-violation linear program. |
Optim. Lett. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | José Manuel Carmona, José Luis Cortés, José Javier Relancio, Maykoll Anthonny Reyes |
Lorentz Violation Footprints in the Spectrum of High-Energy Cosmic Neutrinos - Deformation of the Spectrum of Superluminal Neutrinos from Electron-Positron Pair Production in Vacuum. |
Symmetry |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Rui Xu |
Modifications to Plane Gravitational Waves from Minimal Lorentz Violation. |
Symmetry |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Arnaldo J. Vargas |
Overview of the Phenomenology of Lorentz and CPT Violation in Atomic Systems. |
Symmetry |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Ying Li 0023, Nan (Andy) Zhang, Mikko T. Siponen |
Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation. |
Behav. Inf. Technol. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Weiquan Wang, May D. Wang |
Effects of Sponsorship Disclosure on Perceived Integrity of Biased Recommendation Agents: Psychological Contract Violation and Knowledge-Based Trust Perspectives. |
Inf. Syst. Res. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Rahul Devassy, Giuseppe Durisi, Guido Carlo Ferrante, Osvaldo Simeone, Elif Uysal-Biyikoglu |
Reliable Transmission of Short Packets Through Queues and Noisy Channels Under Latency and Peak-Age Violation Guarantees. |
IEEE J. Sel. Areas Commun. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Brandan Kennedy, Ellen K. Kerns, Y. Chan, Barbara S. Chaparro, Sarah D. Fouquet |
Safeuristics! Do Heuristic Evaluation Violation Severity Ratings Correlate with Patient Safety Severity Ratings for a Native Electronic Health Record Mobile Application? |
Appl. Clin. Inform. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng 0001 |
Intelligent Policing Strategy for Traffic Violation Prevention. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
15 | Nikolaos Pappas 0001, Marios Kountouris |
Delay Violation Probability and Age of Information Interplay in the Two-user Multiple Access Channel. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
15 | Johan Östman, Rahul Devassy, Giuseppe Durisi, Elif Uysal-Biyikoglu |
Peak-Age Violation Guarantees for the Transmission of Short Packets over Fading Channels. |
CoRR |
2019 |
DBLP BibTeX RDF |
|
15 | Hao Chen 0055, Patrick Y. K. Chau, Wenli Li |
The effects of moral disengagement and organizational ethical climate on insiders' information security policy violation behavior. |
Inf. Technol. People |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Xue Ouyang, Changjian Wang, Jie Xu 0007 |
Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklisting. |
Future Gener. Comput. Syst. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Ian A. Campbell, Per H. Lundow |
Hyperscaling Violation in Ising Spin Glasses. |
Entropy |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Asmita Kumari, A. K. Pan |
CHSH inequalities with appropriate response function for POVM and their quantum violation. |
Quantum Inf. Process. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Pawel Caban, Kamila Trzcinska |
Noise resistance of activation of the violation of the Svetlichny inequality. |
Quantum Inf. Process. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Hui Zheng, Jing He 0004, Yanchun Zhang, Junfeng Wu, Zhenyan Ji |
A mathematical model for intimacy-based security protection in social network without violation of privacy. |
Int. J. High Perform. Comput. Netw. |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Jingye Wang, Zhihua Chen, Ping Li 0016, Bin Sheng 0001, Ruoxi Chen |
Real-Time Non-Motor Vehicle Violation Detection in Traffic Scenes. |
ICPS |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Shaoran Li, Yan Huang 0025, Chengzhang Li, Brian Jalaian, Y. Thomas Hou 0001, Wenjing Lou |
Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation. |
MobiHoc |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Jingyi Zhang, Lei Wang 0019 |
Study on Evaluation of Airline Pilot's Flight Violation Behaviors and Psychological Risk. |
HCI (6) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Xusen Cheng, Ying Bao, Alex Zarifis, Jian Mou |
A Model of Customer Trust in Sharing Economy-Driven Ride-Sharing Platforms Involving Psychological Contract Violation and Recovery. |
AMCIS |
2019 |
DBLP BibTeX RDF |
|
15 | Dina Mahmoud, Mirjana Stojilovic |
Timing Violation Induced Faults in Multi-Tenant FPGAs. |
DATE |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Chengyu Wu, Wenli Li |
Why Do Consumers Boycott Personalization Marketing? A Perspective from Multidimensional Development Theory and Psychological Contract Violation. |
PACIS |
2019 |
DBLP BibTeX RDF |
|
15 | Rebal Jurdi, Jeffrey G. Andrews, Robert W. Heath Jr. |
On the Violation of Hard Deadlines in Networked Control Systems. |
ICC |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Lianpeng Li, Jian Dong, Decheng Zuo, Yao Zhao |
Minimizing SLA Violation and Power Consumption in Cloud Data Centers Using Host State 3-Order Markov Chain Model. |
HPCC/SmartCity/DSS |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Joycer Osorio, Mario A. Santillo, Julia Buckland Seeds, Mrdjan Jankovic, Hamid R. Ossareh |
A Reference Governor Approach Towards Recovery from Constraint Violation. |
ACC |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Balasubramaniam Anbu, Bharathwaj Krishnan, Sumathi Sokkanarayanan, Mithileysh Sathiyanarayanan |
Work-in-Progress: A Theoretical Model of loT-based Two-Wheeler Auto-Indicator System to Advance Traffic Violation. |
IC3I |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Nikolaos Pappas 0001, Marios Kountouris |
Delay Violation Probability and Age of Information Interplay in the Two-user Multiple Access Channel. |
SPAWC |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Futian Wang, Xiao Liu 0004, Wei Zhang, Cheng Zhang 0010 |
A Novel Throughput Based Temporal Violation Handling Strategy for Instance-Intensive Cloud Business Workflows. |
ICDS |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Nai Ching Hsiao, Jon-Fan Hu |
The Intervention of Affective and Cognitive Theory of Mind on Impacting Social Norm Violation Judgements. |
CogSci |
2019 |
DBLP BibTeX RDF |
|
15 | Ardavan Salehi Nobandegani, Kevin da Silva Castanheira, Thomas R. Shultz, A. Ross Otto |
Decoy Effect and Violation of Betweenness in Risky Decision Making: A Resource-Rational Mechanistic Account. |
CogSci |
2019 |
DBLP BibTeX RDF |
|
15 | Abhinav Kumar 0004, Aishwarya Gupta, Bishal Santra, K. S. Lalitha, Manasa Kolla, Mayank Gupta 0002, Rishabh Singh |
VPDS: An AI-Based Automated Vehicle Occupancy and Violation Detection System. |
AAAI |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Guangpu Li, Shan Lu 0001, Madanlal Musuvathi, Suman Nath, Rohan Padhye |
Efficient scalable thread-safety-violation detection: finding thousands of concurrency bugs during testing. |
SOSP |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Jehn-Ruey Jiang, Wei-Sheng Chung |
Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service. |
SOCA |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Takeshi Kawachi, Jun-ichi Kushida, Akira Hara, Tetsuyuki Takahama |
L-SHADE with an adaptive penalty method of balancing the objective value and the constraint violation. |
GECCO (Companion) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | M. Fernanda P. Costa, Ana Maria A. C. Rocha, Edite M. G. P. Fernandes |
Objective and Violation Upper Bounds on a DIRECT-Filter Method for Global Optimization. |
NUMTA (2) |
2019 |
DBLP DOI BibTeX RDF |
|
15 | Johan Östman, Rahul Devassy, Giuseppe Durisi, Elif Uysal |
Peak-Age Violation Guarantees for the Transmission of Short Packets over Fading Channels. |
INFOCOM Workshops |
2019 |
DBLP DOI BibTeX RDF |
|