The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Violation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1988 (18) 1989-1993 (15) 1994-1996 (21) 1997 (15) 1998 (21) 1999 (18) 2000 (25) 2001 (26) 2002 (51) 2003 (56) 2004 (73) 2005 (112) 2006 (114) 2007 (145) 2008 (159) 2009 (111) 2010 (52) 2011 (27) 2012 (28) 2013 (34) 2014 (22) 2015 (42) 2016 (45) 2017 (42) 2018 (59) 2019 (57) 2020 (70) 2021 (96) 2022 (89) 2023 (97) 2024 (22)
Publication types (Num. hits)
article(586) incollection(3) inproceedings(1168) phdthesis(5)
Venues (Conferences, Journals, ...)
CoRR(92) Symmetry(29) IEEE Trans. Comput. Aided Des....(16) Entropy(15) HICSS(15) Quantum Inf. Process.(14) SAC(14) CogSci(13) DAC(13) IEEE Access(12) DATE(11) ISPD(10) ACC(9) COMPSAC(9) ICCAD(9) ASP-DAC(8) More (+10 of total 937)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1042 occurrences of 761 keywords

Results
Found 1762 publication records. Showing 1762 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Madeline Clyburn, Charles D. Lane Lorentz Violation at the Level of Undergraduate Classical Mechanics. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Humberto Martínez-Huerta, Rodrigo Guedes Lang, Vitor De Souza Lorentz Invariance Violation Tests in Astroparticle Physics. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Vasily R. Shaginyan, Alfred Z. Msezane, George S. Japaridze, Vladimir A. Stephanovich Violation of the Time-Reversal and Particle-Hole Symmetries in Strongly Correlated Fermi Systems: A Review. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Matthew Mewes Non-Minimal Lorentz Violation in Macroscopic Matter. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Vladimir Lasukov Violation of the Dominant Energy Condition in Geometrodynamics. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Konan-Marcelin Kouamé, Hamid Mcheick, Hicham Ajami Adaptive Mechanism Model for the Prevention of SLA Violation in the Context of COPD Patient Monitoring. Search on Bibsonomy Symmetry The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Ken-ichi Kawarabayashi, Chao Xu Minimum Violation Vertex Maps and Their Applications to Cut Problems. Search on Bibsonomy SIAM J. Discret. Math. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Manish Goyal 0002, Parasara Sridhar Duggirala Extracting counterexamples induced by safety violation in linear hybrid systems. Search on Bibsonomy Autom. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Veljko Pejovic Towards a Holistic Net Neutrality Violation Detection System: A Case Study of Slovenia. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Sajeet Pradhan, Aman Srivastava, Dharmesh K. Mishra Abusive supervision and knowledge hiding: the mediating role of psychological contract violation and supervisor directed aggression. Search on Bibsonomy J. Knowl. Manag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Jithin Cheriyan, Bastin Tony Roy Savarimuthu, Stephen Cranefield Norm violation in online communities - A study of Stack Overflow comments. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Xinwei Sun 0001, Botong Wu, Wei Chen 0034 Identifying Invariant Texture Violation for Robust Deepfake Detection. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Humphrey O. Obie, Waqar Hussain, Xin Xia 0001, John C. Grundy, Li Li 0029, Burak Turhan, Jon Whittle 0001, Mojtaba Shahin A First Look at Human Values-Violation in App Reviews. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Vaibhav Kumar, Barry Cardiff, Shankar Prakriya, Mark F. Flanagan Delay Violation Probability and Effective Rate of Downlink NOMA over α-μ Fading Channels. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Tim Brüdigam, Victor Gaßmann, Dirk Wollherr, Marion Leibold Minimization of Constraint Violation Probability in Model Predictive Control. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Zhihan Jiang, Longbiao Chen, Binbin Zhou, Jingchun Huang, Tianqi Xie, Xiaoliang Fan, Cheng Wang 0003 iTV: Inferring Traffic Violation-Prone Locations with Vehicle Trajectory and Road Environment Data. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Narjes Torabi, Nimar S. Arora, Emma Yu, Kinjal Divesh Shah, Wenshun Liu, Michael Tingley Uncertainty Estimation For Community Standards Violation In Online Social Networks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Mostafa Hadadian Nejad Yousefi, Amirmasoud Ghiassi, Boshra Sadat Hashemi, Maziar Goudarzi Workload Scheduling on heterogeneous Mobile Edge Cloud in 5G networks to Minimize SLA Violation. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Tichakorn Wongpiromsarn, Konstantin Slutsky, Emilio Frazzoli, Ufuk Topcu Minimum-Violation Planning for Autonomous Systems: Theoretical and Practical Considerations. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
15Vladimir Stanovov, Shakhnaz Akhmedova, Eugene Semenkin Combined fitness-violation epsilon constraint handling for differential evolution. Search on Bibsonomy Soft Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Ajay Kumar, Seema Bawa A comparative review of meta-heuristic approaches to optimize the SLA violation costs for dynamic execution of cloud services. Search on Bibsonomy Soft Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Massimiliano Sassoli de Bianchi Violation of CHSH inequality and marginal laws in mixed sequential measurements with order effects. Search on Bibsonomy Soft Comput. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Mónica Braga, Diego Delle Donne, Mariana S. Escalante, Javier Marenco, Maria E. Ugarte, María del Carmen Varaldo The minimum chromatic violation problem: A polyhedral approach. Search on Bibsonomy Discret. Appl. Math. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Armin Tavakoli, Marek Zukowski, Caslav Brukner Does violation of a Bell inequality always imply quantum advantage in a communication complexity problem? Search on Bibsonomy Quantum The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: Data Trading with a Monopoly Social Network: Outcomes Are Mostly Privacy Welfare Damaging. Search on Bibsonomy IEEE Netw. Lett. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Meng Liu 0007, Yun Luo, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren, Xuyun Zhang Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Chao Yuan, Jie Zhang 0062 Violation Detection of Live Video Based on Deep Learning. Search on Bibsonomy Sci. Program. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Yesin Sahraoui, Chaker Abdelaziz Kerrache, Ahmed Korichi, Boubakr Nour, Asma Adnane, Rasheed Hussain DeepDist: A Deep-Learning-Based IoV Framework for Real-Time Objects and Distance Violation Detection. Search on Bibsonomy IEEE Internet Things Mag. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Ning Yang 0007, Pinghui Li, Daoxing Guo, Linyuan Zhang, Guoru Ding Detection of Transmitted Power Violation Based on Geolocation Spectrum Database in Satellite-Terrestrial Integrated Networks. Search on Bibsonomy Sensors The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Prabhat Kumar Upadhyay, Archana Pandita, Nisheeth Joshi Fuzzy Logic Based Detection of SLA Violation in Cloud Computing - A Predictive Approach. Search on Bibsonomy Int. J. Next Gener. Comput. The full citation details ... 2020 DBLP  BibTeX  RDF
15Xiaobao Liu, Jiliang Jing, Jieci Wang, Zehua Tian Optimal estimation of parameters for scalar field in an expanding spacetime exhibiting Lorentz invariance violation. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Ming Li, Huihui Qin, Chengjie Zhang, Shuqian Shen 0001, Shao-Ming Fei, Heng Fan 0002 Characterizing multipartite entanglement by violation of CHSH inequalities. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Javid Naikoo, Subhashish Banerjee, R. Srikanth 0001 Effect of memory on the violation of Leggett-Garg inequality. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Wat Wongtanuwat, Twittie Senivongse Detection of Violation of MVVM Design Pattern in Objective-C Programs. Search on Bibsonomy ICCCM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Jonathan Heiss, Max-Robert Ulbricht, Jacob Eberhardt Put Your Money Where Your Mouth Is - Towards Blockchain-based Consent Violation Detection. Search on Bibsonomy IEEE ICBC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Gwan-Hwan Hwang, Pei-Chun Tien, Yi-Hsiang Tang Blockchain-based Automatic Indemnification Mechanism Based on Proof of Violation for Cloud Storage Services. Search on Bibsonomy ICBCT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Valentina G. Sidorenko, Maksim Kulagin A Recommender Subsystem Construction for Calculating the Probability of a Violation by a Locomotive Driver using Machine-learning Algorithms. Search on Bibsonomy EWDTS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Limei Hu, Zhengchuan Chen, Yunquan Dong, Yunjian Jia, Min Wang 0028, Liang Liang 0002, Chen Chen 0037 Optimal Status Update in IoT Systems: An Age of Information Violation Probability Perspective. Search on Bibsonomy VTC Fall The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Alla Zakurdaeva, Michael Weiss 0001, Steven Muegge Detecting architectural integrity violation patterns using machine learning. Search on Bibsonomy SAC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Noppamas Riyana, Surapon Riyana, Srikul Nanthachumphu, Suphannika Sittisung, Dussadee Duangban Privacy Violation Issues in Re-publication of Modification Datasets. Search on Bibsonomy ICO The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Dirk Beyer 0001, Karlheinz Friedberger Violation Witnesses and Result Validation for Multi-Threaded Programs - Implementation and Evaluation with CPAchecker. Search on Bibsonomy ISoLA (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Shiv Kumar Sahoo, Niranjan Panigrahi, Debasis Mohapatra, Asutosh Panda, Arvind Kumar Sinha Temporal Modeling of On-Street Parking Data for Detection of Parking Violation in Smart Cities. Search on Bibsonomy FICTA (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Shaoling Hu, Wei Chen 0002 Minimizing the Queue-Length-Bound Violation Probability for URLLC: A Cross Layer Approach. Search on Bibsonomy GLOBECOM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Ahmad Terra, Rafia Inam, Sandhya Baskaran, Pedro Batista 0002, Ian Burdick, Elena Fersman Explainability Methods for Identifying Root-Cause of SLA Violation Prediction in 5G Network. Search on Bibsonomy GLOBECOM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Yalei Wang, Wei Chen 0002 Minimizing Delay Violation Probability in URLLC over Fading Channels: A Cross-Layer Approach. Search on Bibsonomy GLOBECOM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Wei-Tse Hung, Jun-Yang Huang, Yih-Chih Chou, Cheng-Hong Tsai, Mango Chia-Tso Chao Transforming Global Routing Report into DRC Violation Map with Convolutional Neural Network. Search on Bibsonomy ISPD The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Victor Gomes, Yubin Huh, John C. Trueswell Not what you expect: The relationship between violation of expectation and negation. Search on Bibsonomy CogSci The full citation details ... 2020 DBLP  BibTeX  RDF
15Hyeonjun Sung, Minsu Kim, Jemin Lee Impact of Finite Blocklength on AoI Violation Probability in UAV Networks. Search on Bibsonomy ICTC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Amina Hentati, Wael Jaafar, Jean-François Frigon, Wessam Ajib Update Interval Violation Probability in Energy Harvesting Wireless Sensor Networks. Search on Bibsonomy CCNC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Jan Svejda, Philipp Berger 0002, Joost-Pieter Katoen Interpretation-Based Violation Witness Validation for C: NITWIT. Search on Bibsonomy TACAS (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Xiaojian Li, Bo Li, Hailan Wang, Jiajia Zhang, Haopeng Yang, Jingang Liu A Novel Violation Tracing Model for Cloud Service Accountability. Search on Bibsonomy TrustCom The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Dan Ma, Haidong Liu, Dawei Song 0001 Word Graph Network: Understanding Obscure Sentences on Social Media for Violation Comment Detection. Search on Bibsonomy NLPCC (1) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Aphinya Chairat, Matthew N. Dailey, Somphop Limsoonthrakul, Mongkol Ekpanyapong, Dharma Raj KC Low Cost, High Performance Automatic Motorcycle Helmet Violation Detection. Search on Bibsonomy WACV The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Aike C. Horstmann, Nicole C. Krämer When a Robot Violates Expectations: The Influence of Reward Valence and Expectancy Violation on People's Evaluation of a Social Robot. Search on Bibsonomy HRI (Companion) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Martin Kölbl, Stefan Leue, Robert Schmid Dynamic Causes for the Violation of Timed Reachability Properties. Search on Bibsonomy FORMATS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Mubeenah Titilola Sanni, Hemanshu Roy Pota, Huadong Mo, Daoyi Dong Voltage-Violation Mitigation in Power System Networks With Photo-Voltaic Penetration. Search on Bibsonomy SSCI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Jithin Cheriyan, Bastin Tony Roy Savarimuthu, Stephen Cranefield Norm Violation in Online Communities - A Study of Stack Overflow Comments. Search on Bibsonomy COIN(E)@AAMAS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Shiwen Dong, Peng Wu, Junfeng Qiao Research and Implementation of Violation Monitoring System for Electric Customer Service Hall. Search on Bibsonomy ICGSP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
15Samyeul Noh Decision-Making Framework for Autonomous Driving at Road Intersections: Safeguarding Against Collision, Overly Conservative Behavior, and Violation Vehicles. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Mia N. Stevens, Hossein Rastgoftar, Ella M. Atkins Geofence Boundary Violation Detection in 3D Using Triangle Weight Characterization with Adjacency. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Almoalmi Ammar, Juan Luo, Zhuo Tang, Othman Wajdy Intra-Balance Virtual Machine Placement for Effective Reduction in Energy Consumption and SLA Violation. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Gwan-Hwan Hwang, Yiling Yuan Proof of violation for response time auditing in cloud systems. Search on Bibsonomy J. Supercomput. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Takahiro Nakayama, Masanori Hashimoto Stochastic Analysis on Hold Timing Violation in Ultra-Low Temperature Circuits for Functional Test at Room Temperature. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Yotaro Takazawa, Shinji Mizuno, Tomonari Kitahara Approximation algorithms for the covering-type k-violation linear program. Search on Bibsonomy Optim. Lett. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15José Manuel Carmona, José Luis Cortés, José Javier Relancio, Maykoll Anthonny Reyes Lorentz Violation Footprints in the Spectrum of High-Energy Cosmic Neutrinos - Deformation of the Spectrum of Superluminal Neutrinos from Electron-Positron Pair Production in Vacuum. Search on Bibsonomy Symmetry The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Rui Xu Modifications to Plane Gravitational Waves from Minimal Lorentz Violation. Search on Bibsonomy Symmetry The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Arnaldo J. Vargas Overview of the Phenomenology of Lorentz and CPT Violation in Atomic Systems. Search on Bibsonomy Symmetry The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Ying Li 0023, Nan (Andy) Zhang, Mikko T. Siponen Keeping secure to the end: a long-term perspective to understand employees' consequence-delayed information security violation. Search on Bibsonomy Behav. Inf. Technol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Weiquan Wang, May D. Wang Effects of Sponsorship Disclosure on Perceived Integrity of Biased Recommendation Agents: Psychological Contract Violation and Knowledge-Based Trust Perspectives. Search on Bibsonomy Inf. Syst. Res. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Rahul Devassy, Giuseppe Durisi, Guido Carlo Ferrante, Osvaldo Simeone, Elif Uysal-Biyikoglu Reliable Transmission of Short Packets Through Queues and Noisy Channels Under Latency and Peak-Age Violation Guarantees. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Brandan Kennedy, Ellen K. Kerns, Y. Chan, Barbara S. Chaparro, Sarah D. Fouquet Safeuristics! Do Heuristic Evaluation Violation Severity Ratings Correlate with Patient Safety Severity Ratings for a Native Electronic Health Record Mobile Application? Search on Bibsonomy Appl. Clin. Inform. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Monireh Dabaghchian, Amir Alipour-Fanid, Kai Zeng 0001 Intelligent Policing Strategy for Traffic Violation Prevention. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
15Nikolaos Pappas 0001, Marios Kountouris Delay Violation Probability and Age of Information Interplay in the Two-user Multiple Access Channel. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
15Johan Östman, Rahul Devassy, Giuseppe Durisi, Elif Uysal-Biyikoglu Peak-Age Violation Guarantees for the Transmission of Short Packets over Fading Channels. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
15Hao Chen 0055, Patrick Y. K. Chau, Wenli Li The effects of moral disengagement and organizational ethical climate on insiders' information security policy violation behavior. Search on Bibsonomy Inf. Technol. People The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Xue Ouyang, Changjian Wang, Jie Xu 0007 Mitigating stragglers to avoid QoS violation for time-critical applications through dynamic server blacklisting. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Ian A. Campbell, Per H. Lundow Hyperscaling Violation in Ising Spin Glasses. Search on Bibsonomy Entropy The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Asmita Kumari, A. K. Pan CHSH inequalities with appropriate response function for POVM and their quantum violation. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Pawel Caban, Kamila Trzcinska Noise resistance of activation of the violation of the Svetlichny inequality. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Hui Zheng, Jing He 0004, Yanchun Zhang, Junfeng Wu, Zhenyan Ji A mathematical model for intimacy-based security protection in social network without violation of privacy. Search on Bibsonomy Int. J. High Perform. Comput. Netw. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jingye Wang, Zhihua Chen, Ping Li 0016, Bin Sheng 0001, Ruoxi Chen Real-Time Non-Motor Vehicle Violation Detection in Traffic Scenes. Search on Bibsonomy ICPS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Shaoran Li, Yan Huang 0025, Chengzhang Li, Brian Jalaian, Y. Thomas Hou 0001, Wenjing Lou Coping Uncertainty in Coexistence via Exploitation of Interference Threshold Violation. Search on Bibsonomy MobiHoc The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jingyi Zhang, Lei Wang 0019 Study on Evaluation of Airline Pilot's Flight Violation Behaviors and Psychological Risk. Search on Bibsonomy HCI (6) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Xusen Cheng, Ying Bao, Alex Zarifis, Jian Mou A Model of Customer Trust in Sharing Economy-Driven Ride-Sharing Platforms Involving Psychological Contract Violation and Recovery. Search on Bibsonomy AMCIS The full citation details ... 2019 DBLP  BibTeX  RDF
15Dina Mahmoud, Mirjana Stojilovic Timing Violation Induced Faults in Multi-Tenant FPGAs. Search on Bibsonomy DATE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Chengyu Wu, Wenli Li Why Do Consumers Boycott Personalization Marketing? A Perspective from Multidimensional Development Theory and Psychological Contract Violation. Search on Bibsonomy PACIS The full citation details ... 2019 DBLP  BibTeX  RDF
15Rebal Jurdi, Jeffrey G. Andrews, Robert W. Heath Jr. On the Violation of Hard Deadlines in Networked Control Systems. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Lianpeng Li, Jian Dong, Decheng Zuo, Yao Zhao Minimizing SLA Violation and Power Consumption in Cloud Data Centers Using Host State 3-Order Markov Chain Model. Search on Bibsonomy HPCC/SmartCity/DSS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Joycer Osorio, Mario A. Santillo, Julia Buckland Seeds, Mrdjan Jankovic, Hamid R. Ossareh A Reference Governor Approach Towards Recovery from Constraint Violation. Search on Bibsonomy ACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Balasubramaniam Anbu, Bharathwaj Krishnan, Sumathi Sokkanarayanan, Mithileysh Sathiyanarayanan Work-in-Progress: A Theoretical Model of loT-based Two-Wheeler Auto-Indicator System to Advance Traffic Violation. Search on Bibsonomy IC3I The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Nikolaos Pappas 0001, Marios Kountouris Delay Violation Probability and Age of Information Interplay in the Two-user Multiple Access Channel. Search on Bibsonomy SPAWC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Futian Wang, Xiao Liu 0004, Wei Zhang, Cheng Zhang 0010 A Novel Throughput Based Temporal Violation Handling Strategy for Instance-Intensive Cloud Business Workflows. Search on Bibsonomy ICDS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Nai Ching Hsiao, Jon-Fan Hu The Intervention of Affective and Cognitive Theory of Mind on Impacting Social Norm Violation Judgements. Search on Bibsonomy CogSci The full citation details ... 2019 DBLP  BibTeX  RDF
15Ardavan Salehi Nobandegani, Kevin da Silva Castanheira, Thomas R. Shultz, A. Ross Otto Decoy Effect and Violation of Betweenness in Risky Decision Making: A Resource-Rational Mechanistic Account. Search on Bibsonomy CogSci The full citation details ... 2019 DBLP  BibTeX  RDF
15Abhinav Kumar 0004, Aishwarya Gupta, Bishal Santra, K. S. Lalitha, Manasa Kolla, Mayank Gupta 0002, Rishabh Singh VPDS: An AI-Based Automated Vehicle Occupancy and Violation Detection System. Search on Bibsonomy AAAI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Guangpu Li, Shan Lu 0001, Madanlal Musuvathi, Suman Nath, Rohan Padhye Efficient scalable thread-safety-violation detection: finding thousands of concurrency bugs during testing. Search on Bibsonomy SOSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Jehn-Ruey Jiang, Wei-Sheng Chung Real-Time Proof of Violation with Adaptive Huffman Coding Hash Tree for Cloud Storage Service. Search on Bibsonomy SOCA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Takeshi Kawachi, Jun-ichi Kushida, Akira Hara, Tetsuyuki Takahama L-SHADE with an adaptive penalty method of balancing the objective value and the constraint violation. Search on Bibsonomy GECCO (Companion) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15M. Fernanda P. Costa, Ana Maria A. C. Rocha, Edite M. G. P. Fernandes Objective and Violation Upper Bounds on a DIRECT-Filter Method for Global Optimization. Search on Bibsonomy NUMTA (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
15Johan Östman, Rahul Devassy, Giuseppe Durisi, Elif Uysal Peak-Age Violation Guarantees for the Transmission of Short Packets over Fading Channels. Search on Bibsonomy INFOCOM Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 1762 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license