The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for violations with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1987 (16) 1988-1990 (19) 1991-1993 (19) 1994-1996 (26) 1997 (19) 1998 (33) 1999 (24) 2000 (35) 2001 (41) 2002 (56) 2003 (79) 2004 (94) 2005 (144) 2006 (161) 2007 (173) 2008 (154) 2009 (144) 2010 (67) 2011 (48) 2012 (45) 2013 (31) 2014 (50) 2015 (55) 2016 (62) 2017 (47) 2018 (70) 2019 (64) 2020 (60) 2021 (83) 2022 (102) 2023 (86) 2024 (21)
Publication types (Num. hits)
article(569) book(1) incollection(7) inproceedings(1535) phdthesis(16)
Venues (Conferences, Journals, ...)
CoRR(92) DAC(41) IEEE Trans. Comput. Aided Des....(28) IEEE Trans. Software Eng.(28) PLDI(21) ICSE(19) ASP-DAC(18) CogSci(18) ICCAD(18) DATE(17) ESEC/SIGSOFT FSE(16) ISPD(15) CAV(14) HICSS(14) ASE(13) IEEE Trans. Very Large Scale I...(13) More (+10 of total 994)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1559 occurrences of 1018 keywords

Results
Found 2128 publication records. Showing 2128 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Isma Wamiati Rahman, Zahir Zainuddin, Syafruddin Syarif, Andani Achmad Recognition of The Rearview Image Pattern of a Motorcycle for a System to Detect Current Violations on a One-Way Street. Search on Bibsonomy ICT The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Prasanna Umar, Anna Cinzia Squicciarini, Sarah Michele Rajtmajer A Study of Self-Privacy Violations in Online Public Discourse. Search on Bibsonomy IEEE BigData The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Andreea Floricu, Razvan Buzatu, Catalin Negru, Florin Pop, Aniello Castiglione Implementing a solution for monitoring SLA violations in Cloud. Search on Bibsonomy DependSys The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Annika Boos, Anna Feldhütter, Johannes Schwiebacher, Klaus Bengler Mode Errors and Intentional Violations in Visual Monitoring of Level 2 Driving Automation. Search on Bibsonomy ITSC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Yaoquan Yu, Yuefeng Guo, Zhiyuan Zhang, Mengshi Li, Tianyao Ji, Wenhu Tang, Qinghua Wu 0003 Intelligent Classification and Automatic Annotation of Violations based on Neural Network Language Model. Search on Bibsonomy IJCNN The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Hiroaki Yoshida, Rohan Bavishi, Keisuke Hotta, Yusuke Nemoto, Mukul R. Prasad, Shinji Kikuchi Phoenix: a tool for automated data-driven synthesis of repairs for static analysis violations. Search on Bibsonomy ICSE (Companion Volume) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Owen Xuereb, Frankie Inguanez, Thomas Gatt Detecting Highway Code Violations using Artificial Intelligence. Search on Bibsonomy ICCP The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Hengli Wang, Yuxuan Liu 0008, Huaiyang Huang, Yuheng Pan, Wenbin Yu, Jialin Jiang, Dianbin Lyu, Mohammud Junaid Bocus, Ming Liu 0001, Ioannis Pitas, Rui Fan 0001 ATG-PVD: Ticketing Parking Violations on a Drone. Search on Bibsonomy ECCV Workshops (4) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Houston Claure, Negar Khojasteh, Hamish Tennent, Malte F. Jung Using Expectancy Violations Theory to Understand Robot Touch Interpretation. Search on Bibsonomy HRI (Companion) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Yaroslav Golubev, Maria Eliseeva, Nikita Povarov, Timofey Bryksin A Study of Potential Code Borrowing and License Violations in Java Projects on GitHub. Search on Bibsonomy MSR The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Felix Dobslaw, Morgan Vallin, Robin Sundström Free the Bugs: Disclosing Blocking Violations in Reactive Programming. Search on Bibsonomy SCAM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14DongGyun Han, Chaiyong Ragkhitwetsagul, Jens Krinke, Matheus Paixão, Giovanni Rosa Does code review really remove coding convention violations? Search on Bibsonomy SCAM The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Pingchuan Ma 0004, Shuai Wang 0011, Jin Liu Metamorphic Testing and Certified Mitigation of Fairness Violations in NLP Models. Search on Bibsonomy IJCAI The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
14Beom Heyn Kim Detecting Consistency Violations in Distributed Storage Systems. Search on Bibsonomy 2020   RDF
14Stefania Fantinelli, Michela Cortini Social Network Services Management and Risk of Doocing. Comment on Kim, S.; Park, H.; Choi, M.J. "Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations. Future Internet 2019, 11, 137". Search on Bibsonomy Future Internet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Loretta Mastroeni, Alessandro Mazzoccoli, Maurizio Naldi Service Level Agreement Violations in Cloud Storage: Insurance and Compensation Sustainability. Search on Bibsonomy Future Internet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Sanghyun Kim, Hyunsun Park, Moon Jong Choi Negative Impact of Social Network Services Based on Stressor-Stress-Outcome: The Role of Experience of Privacy Violations. Search on Bibsonomy Future Internet The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Pengfei Wang 0010, Jens Krinke, Xu Zhou, Kai Lu AVPredictor: Comprehensive prediction and detection of atomicity violations. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Aimee E. Stahl, Lisa Feigenson Violations of Core Knowledge Shape Early Learning. Search on Bibsonomy Top. Cogn. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Hiroki Tanaka, Hiroki Watanabe, Hayato Maki, Sakriani Sakti, Satoshi Nakamura 0001 Electroencephalogram-Based Single-Trial Detection of Language Expectation Violations in Listening to Speech. Search on Bibsonomy Frontiers Comput. Neurosci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Grigorios Kalliatakis, Shoaib Ehsan, Ales Leonardis, Maria Fasli, Klaus D. McDonald-Maier Exploring Object-Centric and Scene-Centric CNN Features and Their Complementarity for Human Rights Violations Recognition in Images. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Fozia Mehboob, Muhammad Abbas, Abdul Rauf Mathematical model based traffic violations identification. Search on Bibsonomy Comput. Math. Organ. Theory The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Jona Sassenhagen, Christian J. Fiebach Finding the P3 in the P600: Decoding shared neural mechanisms of responses to syntactic violations and oddball targets. Search on Bibsonomy NeuroImage The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Jonathan F. Kominsky, Jonathan Phillips Immoral Professors and Malfunctioning Tools: Counterfactual Relevance Accounts Explain the Effect of Norm Violations on Causal Selection. Search on Bibsonomy Cogn. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Pan Bian, Bin Liang 0002, Yan Zhang, Chaoqun Yang, Wenchang Shi, Yan Cai 0001 Detecting Bugs by Discovering Expectations and Their Violations. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Maria Silvia Abba Legnazzi, Cristina Rottondi, Giacomo Verticale Secure and Differentially Private Detection of Net Neutrality Violations by Means of Crowdsourced Measurements. Search on Bibsonomy Wirel. Pers. Commun. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Darion Cassel, Yan Huang 0001, Limin Jia 0001 Uncovering Information Flow Policy Violations in C Programs. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
14Sawood Alam, Plinio Vargas, Michele C. Weigle, Michael L. Nelson Impact of HTTP Cookie Violations in Web Archives. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
14Valentina Lenarduzzi, Francesco Lomio, Davide Taibi 0001, Heikki Huttunen On the Fault Proneness of SonarQube Technical Debt Violations: A comparison of eight Machine Learning Techniques. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
14Tamer Abdelaziz, Aya Sedky, Bruno Rossi 0001, Mostafa-Sami M. Mostafa Identification and Assessment of Software Design Pattern Violations. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
14Shashank Srikanth, Aanshul Sadaria, Himanshu Bhatia, Kanay Gupta, Pratik Jain, Ponnurangam Kumaraguru Don't cross that stop line: Characterizing Traffic Violations in Metropolitan Cities. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
14Shiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, David Wolfe Evaluating Model Testing and Model Checking for Finding Requirements Violations in Simulink Models. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
14Ehud Karavani, Peter Bak, Yishai Shimoni A discriminative approach for finding and characterizing positivity violations using decision trees. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
14Yanyu Wang, Pin-Chao Liao, Cheng Zhang 0006, Yi Ren, Xinlu Sun, Pingbo Tang Crowdsourced reliable labeling of safety-rule violations on images of complex construction scenes for advanced vision-based workplace safety. Search on Bibsonomy Adv. Eng. Informatics The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Jinlin Wang, Haining Yu, Xing Wang, Hongli Zhang 0001, Binxing Fang, Yuchen Yang, Xiaozhou Zhu DRAV: Detection and repair of data availability violations in Internet of Things. Search on Bibsonomy Int. J. Distributed Sens. Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Jasmine Peled, Bendert Zevenbergen, Nick Feamster The Man in the Middlebox: Violations of End-to-End Encryption. Search on Bibsonomy login Usenix Mag. The full citation details ... 2019 DBLP  BibTeX  RDF
14Falak Nawaz, Omar Hussain 0002, Farookh Khadeer Hussain, Naeem Khalid Janjua, Morteza Saberi, Elizabeth Chang 0001 Proactive management of SLA violations by capturing relevant external events in a Cloud of Things environment. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Ivan Pisa, Ignacio Santín, José López Vicario, Antoni Morell, Ramón Vilanova ANN-Based Soft Sensor to Predict Effluent Violations in Wastewater Treatment Plants. Search on Bibsonomy Sensors The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Daniel Feitosa, Apostolos Ampatzoglou, Paris Avgeriou, Alexander Chatzigeorgiou, Elisa Yumi Nakagawa What can violations of good practices tell about the relationship between GoF patterns and run-time quality attributes? Search on Bibsonomy Inf. Softw. Technol. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Manoranjan Swain, Amit Rai, Bikash K. Behera, Prasanta K. Panigrahi Experimental demonstration of the violations of Mermin's and Svetlichny's inequalities for W and GHZ states. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Michael Meinig, Peter Tröger, Christoph Meinel Finding Classification Zone Violations with Anonymized Message Flow Analysis. Search on Bibsonomy ICISSP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Alok Ranjan 0002, Prasant Misra, Arunchandar Vasan 0001, Sunil Krishnakumar, Anand Sivasubramaniam City Scale Monitoring of On-Street Parking Violations with StreetHAWK. Search on Bibsonomy BuildSys@SenSys The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Riadul Islam, Md Asif Shahjalal Soft Voting-Based Ensemble Approach to Predict Early Stage DRC Violations. Search on Bibsonomy MWSCAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Andrés Valdepeña Delgado, Muhammad Kamran Latif, Said Ahmed-Zaid Mitigation of Distribution Voltage Violations Using Single-Phase Residential Static VAr Compensators. Search on Bibsonomy MWSCAS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Sawood Alam, Michele C. Weigle, Michael L. Nelson Impact of HTTP Cookie Violations in Web Archives. Search on Bibsonomy WADL The full citation details ... 2019 DBLP  BibTeX  RDF
14Xavier Oriol, Giuseppe De Giacomo, Montserrat Estañol, Ernest Teniente Automatic Business Process Model Extension to Repair Constraint Violations. Search on Bibsonomy ICSOC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Tianjie Deng, Hyung Koo Lee, Sumantra Sarkar Reporting Information Security Policy Violations - An Exploratory Study. Search on Bibsonomy AMCIS The full citation details ... 2019 DBLP  BibTeX  RDF
14Ramon Ruiz-Dolz, José Alemany, Stella Heras, Ana García-Fornes Automatic Generation of Explanations to Prevent Privacy Violations. Search on Bibsonomy XAILA@JURIX The full citation details ... 2019 DBLP  BibTeX  RDF
14Maria M. Hedblom, Oliver Kutz Hidden Meaning: Using Image Schema Violations to Expose Hidden Semantical Structures in Metaphors. Search on Bibsonomy JOWO The full citation details ... 2019 DBLP  BibTeX  RDF
14Dimitra Papagiannopoulou, Sungseob Whang, Tali Moreshet, R. Iris Bahar IgnoreTM: Opportunistically Ignoring Timing Violations for Energy Savings using HTM. Search on Bibsonomy DATE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Lloyd Rutledge, Erik Bouwer, Stef Joosten Rule Style: Patterns of and Extensions to Data System User Interface Specification for Business Rule Violations. Search on Bibsonomy BMSD The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Kaiwen Liu, Nan Li 0015, Denise Rizzo, Emanuele Garone, Ilya V. Kolmanovsky, Anouck Girard Model-free Learning to Avoid Constraint Violations: An Explicit Reference Governor Approach. Search on Bibsonomy ACC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Kui Liu 0001, Anil Koyuncu, Dongsun Kim 0001, Tegawendé F. Bissyandé AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. Search on Bibsonomy SANER The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao 0011, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, Wei Huo Open-Source License Violations of Binary Software at Large Scale. Search on Bibsonomy SANER The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Diego Marcilio, Rodrigo Bonifácio, Eduardo Monteiro, Edna Dias Canedo, Welder Pinheiro Luz, Gustavo Pinto 0001 Are static analysis violations really fixed?: a closer look at realistic usage of SonarQube. Search on Bibsonomy ICPC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Diyu Wu, Jie Liu 0020, Yulei Sui, Shiping Chen 0001, Jingling Xue Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android. Search on Bibsonomy ICST The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Aranee Balachandran, G. W. K. Prabhath, Wele Gedara Chaminda Bandara, G. M. R. I. Godaliyadda, M. P. B. Ekanayake, Janaka B. Ekanayake Reactive Power Compensation for Voltage Violations in Distribution Network. Search on Bibsonomy ICIIS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Shunnosuke Motomura, Hiroki Tanaka, Satoshi Nakamura 0001 Detecting Syntactic Violations from Single-trial EEG using Recurrent Neural Networks. Search on Bibsonomy ICMI (Adjunct) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Shakil M. Khan 0001, Mikhail Soutchanski Towards Causal Analysis of Protocol Violations. Search on Bibsonomy Canadian AI The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Joshua Heneage Dawes, Giles Reger Explaining Violations of Properties in Control-Flow Temporal Logic. Search on Bibsonomy RV The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Rohan Bavishi, Hiroaki Yoshida, Mukul R. Prasad Phoenix: automated data-driven synthesis of repairs for static analysis violations. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Shiva Nejati, Khouloud Gaaloul, Claudio Menghi, Lionel C. Briand, Stephen Foster, David Wolfe Evaluating model testing and model checking for finding requirements violations in Simulink models. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Indren Govender, Bruce Watson Theorising Information Security Policy Violations. Search on Bibsonomy ISSA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Ragini Kihlman, Maria Fasli Augmenting Co-Training With Recommendations to Classify Human Rights Violations. Search on Bibsonomy IEEE BigData The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Antonio Franco, Björn Landfeldt, Ulf Körner Analysis of Age of Information Threshold Violations. Search on Bibsonomy MSWiM The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Binayak Dutta, Sasanka Roy Approximate Shortest Paths in Polygons with Violations. Search on Bibsonomy COCOA The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Darion Cassel, Yan Huang 0001, Limin Jia 0001 Uncovering Information Flow Policy Violations in C Programs (Extended Abstract). Search on Bibsonomy ESORICS (2) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Xiaoning Chang, Wensheng Dou, Yu Gao 0002, Jie Wang 0035, Jun Wei 0001, Tao Huang 0001 Detecting atomicity violations for event-driven Node.js applications. Search on Bibsonomy ICSE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14George Valentin Iordache, Florin Pop Predicting Service Level Agreement Violations in Cloud using Machine Learning techniques. Search on Bibsonomy ICCP The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Stewart Sentanoe, Benjamin Taubmann, Hans P. Reiser VMIGuard: Detecting and Preventing Service Integrity Violations by Malicious Insiders Using Virtual Machine Introspection. Search on Bibsonomy NordSec The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Renieri Correia, Eiji Adachi Barbosa Detecting Design Violations in Django-based Web Applications. Search on Bibsonomy SBCARS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Cauã Roca Antunes, Alexandre Rademaker, Mara Abel A Category-theoretic Approach for the Detection of Conservativity Violations in Ontology Alignments. Search on Bibsonomy ONTOBRAS The full citation details ... 2019 DBLP  BibTeX  RDF
14Uriel Campos, Guilherme Smethurst, João Pedro Moraes, Rodrigo Bonifácio, Gustavo Pinto 0001 Mining rule violations in JavaScript code snippets. Search on Bibsonomy MSR The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Johannes Lahann, Martin Scheid, Peter Fettke Utilizing Machine Learning Techniques to Reveal VAT Compliance Violations in Accounting Data. Search on Bibsonomy CBI (1) The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Riadul Islam, Md Asif Shahjalal Predicting DRC Violations Using Ensemble Random Forest Algorithm. Search on Bibsonomy DAC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Toshinori Sato, Tomoaki Ukezono Tolerating Aging-Induced Timing Violations Via Configurable Approximations. Search on Bibsonomy GCCE The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
14Grigorios Kalliatakis Visual recognition of human rights violations. Search on Bibsonomy 2019   RDF
14Hsi-Min Chen, Wei-Han Chen, Chi-Chen Lee An Automated Assessment System for Analysis of Coding Convention Violations in Java Programming Assignments. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2018 DBLP  BibTeX  RDF
14Hua Fan 0002, Wojciech M. Golab Analyzing linearizability violations in the presence of read-modify-write operations. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Alessandro Kraemer, Carlos Maziero, Olivier Richard, Denis Trystram Reducing the number of response time service level objective violations by a cloud-HPC convergence scheduler. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Jawwad A. Shamsi, Muhammad Ali Khojaye Understanding Privacy Violations in Big Data Systems. Search on Bibsonomy IT Prof. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Wei Shao 0006, Flora D. Salim, Tao Gu, Ngoc-Thanh Dinh, Jeffrey Chan Traveling Officer Problem: Managing Car Parking Violations Efficiently Using Sensor Data. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Eshwar Chandrasekharan, Mattia Samory, Shagun Jhaver, Hunter Charvat, Amy S. Bruckman, Cliff Lampe, Jacob Eisenstein, Eric Gilbert The Internet's Hidden Rules: An Empirical Study of Reddit Norm Violations at Micro, Meso, and Macro Scales. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Kun Chen, Gang Kou, Chenhua Li A linear programming model to reduce rank violations while eliciting preference from pairwise comparison matrix. Search on Bibsonomy J. Oper. Res. Soc. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Shinpei Hayashi, Fumiki Minami, Motoshi Saeki Detecting Architectural Violations Using Responsibility and Dependency Constraints of Components. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Yubao Cui, Xuehe Zhang, Xiaobao Peng, Jianxun Chu How to use apology and compensation to repair competence-versus integrity-based trust violations in e-commerce. Search on Bibsonomy Electron. Commer. Res. Appl. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Qi Li 0002, Yanyu Chen, Patrick P. C. Lee, Mingwei Xu, Kui Ren 0001 Security Policy Violations in SDN Data Plane. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Anil Maheshwari, Subhas C. Nandy, Drimit Pattanayak, Sasanka Roy, Michiel H. M. Smid Geometric Path Problems with Violations. Search on Bibsonomy Algorithmica The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Matteo Salani, Maria Battarra The opportunity cost of time window violations. Search on Bibsonomy EURO J. Transp. Logist. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Derong Liu 0002, Bei Yu 0001, Salim Chowdhury, David Z. Pan TILA-S: Timing-Driven Incremental Layer Assignment Avoiding Slew Violations. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Mark Keil 0001, Eun Hee Park 0001, Balasubramaniam Ramesh Violations of health information privacy: The role of attributions and anticipated regret in shaping whistle-blowing intentions. Search on Bibsonomy Inf. Syst. J. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Eiji Adachi Barbosa, Alessandro Garcia 0001 Global-Aware Recommendations for Repairing Violations in Exception Handling. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Kartik Nagar, Suresh Jagannathan Automated Detection of Serializability Violations under Weak Consistency. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
14Ding Ding, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer Toward Detecting Violations of Differential Privacy. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
14Kui Liu 0001, Anil Koyuncu, Dongsun Kim 0001, Tegawendé F. Bissyandé AVATAR : Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
14John Moriarty, Jure Vogrinc, Alessandro Zocca Frequency violations from random disturbances: an MCMC approach. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
14Grigorios Kalliatakis, Shoaib Ehsan, Ales Leonardis, Klaus D. McDonald-Maier Exploring object-centric and scene-centric CNN features and their complementarity for human rights violations recognition in images. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
14Christoph Matthies, Thomas Kowark, Keven Richly, Matthias Uflacker, Hasso Plattner ScrumLint: Identifying Violations of Agile Practices Using Development Artifacts. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
14Kevin Moran, Boyang Li 0002, Carlos Bernal-Cárdenas, Dan Jelf, Denys Poshyvanyk Automated Reporting of GUI Design Violations for Mobile Apps. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
14Catarina Moreira, Andreas Wichert Introducing Quantum-Like Influence Diagrams for Violations of the Sure Thing Principle. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
Displaying result #601 - #700 of 2128 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license