The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for violations with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1987 (16) 1988-1990 (19) 1991-1993 (19) 1994-1996 (26) 1997 (19) 1998 (33) 1999 (24) 2000 (35) 2001 (41) 2002 (56) 2003 (79) 2004 (94) 2005 (144) 2006 (161) 2007 (173) 2008 (154) 2009 (144) 2010 (67) 2011 (48) 2012 (45) 2013 (31) 2014 (50) 2015 (55) 2016 (62) 2017 (47) 2018 (70) 2019 (64) 2020 (60) 2021 (83) 2022 (102) 2023 (86) 2024 (21)
Publication types (Num. hits)
article(569) book(1) incollection(7) inproceedings(1535) phdthesis(16)
Venues (Conferences, Journals, ...)
CoRR(92) DAC(41) IEEE Trans. Comput. Aided Des....(28) IEEE Trans. Software Eng.(28) PLDI(21) ICSE(19) ASP-DAC(18) CogSci(18) ICCAD(18) DATE(17) ESEC/SIGSOFT FSE(16) ISPD(15) CAV(14) HICSS(14) ASE(13) IEEE Trans. Very Large Scale I...(13) More (+10 of total 994)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1559 occurrences of 1018 keywords

Results
Found 2128 publication records. Showing 2128 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Tejaswini C. Herath, Myung-Seong Yim, John D'Arcy, Kichan Nam, H. Raghav Rao Examining employee security violations: moral disengagement and its environmental influences. Search on Bibsonomy Inf. Technol. People The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Falak Nawaz, Naeem Khalid Janjua, Omar Khadeer Hussain, Farookh Khadeer Hussain, Elizabeth Chang 0001, Morteza Saberi Event-driven approach for predictive and proactive management of SLA violations in the Cloud of Things. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Alexander Clemm, Alberto Gonzalez Prieto Autonomic Networking Use Case for Distributed Detection of Service Level Agreement (SLA) Violations. Search on Bibsonomy RFC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Mahdi Eslamimehr, Mohsen Lesani, George Edwards Efficient detection and validation of atomicity violations in concurrent programs. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14François Leduc-Primeau, Frank R. Kschischang, Warren J. Gross Modeling and Energy Optimization of LDPC Decoder Circuits With Timing Violations. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Daniel B. Shank, Alyssa DeSanti Attributions of morality and mind to artificial intelligence after real-world moral violations. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Haoyu Luo, Jin Liu 0016, Xiao Liu 0004, Yun Yang 0001 Predicting temporal violations for parallel business cloud workflows. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Mathias Payer How memory safety violations enable exploitation of programs. Search on Bibsonomy The Continuing Arms Race The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Zeyu Ding 0001, Yuxin Wang, Guanhong Wang, Danfeng Zhang, Daniel Kifer Detecting Violations of Differential Privacy. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Benjamin Bichsel, Timon Gehr, Dana Drachsler-Cohen, Petar Tsankov, Martin T. Vechev DP-Finder: Finding Differential Privacy Violations by Sampling and Optimization. Search on Bibsonomy CCS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Hernan Aparicio, Pablo Ituero A 40nm Critical Path Monitor for the Detection of Setup and Hold Time Violations. Search on Bibsonomy PATMOS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Wojciech Czabanski, Magiel Bruntink, Paul Martin 0002 Actionable Measurements - Improving The Actionability of Architecture Level Software Quality Violations. Search on Bibsonomy BENEVOL The full citation details ... 2018 DBLP  BibTeX  RDF
14Nasim Talebi, Mohsen M. Jozani, Tejaswini (Teju) Herath, H. Raghav Rao Using Cognitive Dissonance Theory to Explain Information Security Policy Violations. Search on Bibsonomy AMCIS The full citation details ... 2018 DBLP  BibTeX  RDF
14Chris D. Monaco, Sean N. Brennan Ego-Motion Estimate Corruption Due to Violations of the Range Flow Constraint. Search on Bibsonomy IROS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Alper Karamanlioglu, Ferda Nur Alpaslan An Ontology-Based Expert System to Detect Service Level Agreement Violations. Search on Bibsonomy BMSD The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Xinwei Fu, Dongyoon Lee, Changhee Jung nAdroid: statically detecting ordering violations in Android applications. Search on Bibsonomy CGO The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Christian Colombo 0001, Joshua Ellul, Gordon J. Pace Contracts over Smart Contracts: Recovering from Violations Dynamically. Search on Bibsonomy ISoLA (4) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Ahmed Atteya, Michael A. Kochte, Matthias Sauer 0002, Pascal Raiola, Bernd Becker 0001, Hans-Joachim Wunderlich Online prevention of security violations in reconfigurable scan networks. Search on Bibsonomy ETS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Michael Vierhauser, Jane Cleland-Huang, Rick Rabiser, Thomas Krismayer, Paul Grünbacher Supporting Diagnosis of Requirements Violations in Systems of Systems. Search on Bibsonomy RE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Zhuo Sun, Reng Zeng, Xudong He A Method for Predicting Two-Variable Atomicity Violations. Search on Bibsonomy QRS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Harsh Desai 0001, Kevin Liu, Murat Kantarcioglu, Lalana Kagal Adjudicating Violations in Data Sharing Agreements Using Smart Contracts. Search on Bibsonomy iThings/GreenCom/CPSCom/SmartData The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Carlos André Batista de Carvalho, Rossana Maria de Castro Andrade, Nazim Agoulmine, Miguel Franklin de Castro Detection of Access Control Violations in the Secure Sharing of Cloud Storage. Search on Bibsonomy CLOSER The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14John Moriarty, Jure Vogrinc, Alessandro Zocca Frequency violations from random disturbances: an MCMC approach. Search on Bibsonomy CDC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Chunyu Yang, Yan Liu, Jia Yu 0017 Exploring Violations of Programming Styles: Insights from Open Source Projects. Search on Bibsonomy CSAI/ICIMT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Lucas de Paris, Ricardo Reis 0001 An automated methodology to fix electromigration violations on a customized design flow. Search on Bibsonomy LASCAS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Reese Cullimore, Gwendolyn Rehrig, John M. Henderson, Fernanda Ferreira When less is not more: Violations of a Gricean maxim facilitate visual search. Search on Bibsonomy CogSci The full citation details ... 2018 DBLP  BibTeX  RDF
14David Kellen, Henrik Singmann, Sharon Yanxiu Chen, Samuel Winiger Assumption Violations in Forced-Choice Recognition Judgments: Implications from the Area Theorem. Search on Bibsonomy CogSci The full citation details ... 2018 DBLP  BibTeX  RDF
14Catarina Moreira, Andreas Wichert Introducing Quantum-Like Influence Diagrams for Violations of the Sure Thing Principle. Search on Bibsonomy QI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Manoj V. Thomas, K. Chandrasekaran 0001, Gopal Mugeraya Agent-Based Approach for the Management of Dynamic QoS Violations in the Inter-Cloud Environments. Search on Bibsonomy KMO The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Mijung Kim, Shing-Chi Cheung, Sunghun Kim 0001 Which generated test failures are fault revealing? prioritizing failures based on inferred precondition violations using PAF. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Yu Qiu, Zijing Tan, Kejia Yang, Weidong Yang, Xiangdong Zhou, Naiwang Guo Repairing Data Violations with Order Dependencies. Search on Bibsonomy DASFAA (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Maurizio Naldi Non-Parametric Bootstrap Detection of Availability Service Level Objective Violations in Cloud Storage. Search on Bibsonomy TMA The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Maryam Jameela, Hammad Afzal, Khawar Khurshid, Asad Waqar Malik Crowdsourced System to Report Traffic Violations - RoadCop: Bi-Modular System. Search on Bibsonomy VEHITS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Kostas Kolomvatsos, Maria G. Koziri, Thanasis Loukopoulos An Intelligent Scheme for the Identification of QoS Violations in Virtualized Environments. Search on Bibsonomy ICTAI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Pascal Raiola, Michael A. Kochte, Ahmed Atteya, Laura Rodríguez Gómez, Hans-Joachim Wunderlich, Bernd Becker 0001, Matthias Sauer 0002 Detecting and Resolving Security Violations in Reconfigurable Scan Networks. Search on Bibsonomy IOLTS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Kartik Nagar, Suresh Jagannathan Automated Detection of Serializability Violations Under Weak Consistency. Search on Bibsonomy CONCUR The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Jassim Happa, Nick Moffat, Michael Goldsmith, Sadie Creese Run-Time Monitoring of Data-Handling Violations. Search on Bibsonomy CyberICPS/SECPRE@ESORICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Yu-Ching Li, Shih-Yao Lin 0001, Heng-Yi Lin, James Chien-Mo Li Diagnosis and repair of cells (DRC) responsible for power-supply-noise violations. Search on Bibsonomy VLSI-DAT The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Eiji Adachi Barbosa, Alessandro Garcia 0001 Global-aware recommendations for repairing violations in exception handling. Search on Bibsonomy ICSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Kevin Moran, Boyang Li 0002, Carlos Bernal-Cárdenas, Dan Jelf, Denys Poshyvanyk Automated reporting of GUI design violations for mobile apps. Search on Bibsonomy ICSE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Hooman Zabeti, Tamon Stephen, Bonnie Berger, Leonid Chindelevitch A Duality-Based Method for Identifying Elemental Balance Violations in Metabolic Network Models. Search on Bibsonomy WABI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Pierre-Louis Aublin, Florian Kelbert, Dan O'Keeffe, Divya Muthukumaran, Christian Priebe, Joshua Lind, Robert Krahn, Christof Fetzer, David M. Eyers, Peter R. Pietzuch LibSEAL: revealing service integrity violations using trusted execution. Search on Bibsonomy EuroSys The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Aysa Fakheri Tabrizi, Nima Karimpour Darav, Shuchang Xu, Logan Rakai, Ismail Bustany, Andrew A. Kennings, Laleh Behjat A machine learning framework to identify detailed routing short violations from a placed netlist. Search on Bibsonomy DAC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Angelo Ferrando 0001, Louise A. Dennis, Davide Ancona, Michael Fisher 0001, Viviana Mascardi Recognising Assumption Violations in Autonomous Systems Verification. Search on Bibsonomy AAMAS The full citation details ... 2018 DBLP  BibTeX  RDF
14Christian Schubert, Michael Borkowski, Stefan Schulte 0002 Trustworthy Detection and Arbitration of SLA Violations in the Cloud. Search on Bibsonomy ESOCC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
14Amit Datta Fairness and Privacy Violations in Black-Box Personalization Systems: Detection and Defenses. Search on Bibsonomy 2018   DOI  RDF
14Antonio Bianchi Identifying and Mitigating Trust Violations in the Mobile Ecosystem. Search on Bibsonomy 2018   RDF
14Catello Di Martino, Santonu Sarkar, Rajeshwari Ganesan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Thilak L. Fernando, Geoffrey I. Webb SimUSF: an efficient and effective similarity measure that is invariant to violations of the interval scale assumption. Search on Bibsonomy Data Min. Knowl. Discov. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Takashi Isozaki, Manabu Kuroki Learning Causal Graphs with Latent Confounders in Weak Faithfulness Violations. Search on Bibsonomy New Gener. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Sudarat Nidsunkid, John J. Borkowski, Kamon Budsaba The effects of violations of the multivariate normality assumption in multivariate Shewhart and MEWMA control charts. Search on Bibsonomy Qual. Reliab. Eng. Int. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Adriana Alvarado Garcia, Alyson L. Young, Lynn Dombrowski On Making Data Actionable: How Activists Use Imperfect Data to Foster Social Change for Human Rights Violations in Mexico. Search on Bibsonomy Proc. ACM Hum. Comput. Interact. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Matthew Campbell, Jordan Shropshire, Antonis C. Stylianou A stitch in time saves nine: the role of moral judgement in reducing internet policy violations. Search on Bibsonomy Int. J. Bus. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Ya-Fen Chen, Yu-Jie Tan, Cheng-Gang Shao Experimental Design for Testing Local Lorentz Invariance Violations in Gravity. Search on Bibsonomy Symmetry The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14E. A. Wasserman, Aleksandr Chakroff, Rebecca Saxe, Liane Young Illuminating the conceptual structure of the space of moral violations with searchlight representational similarity analysis. Search on Bibsonomy NeuroImage The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Alessandro Solimando, Ernesto Jiménez-Ruiz, Giovanna Guerrini Minimizing conservativity violations in ontology alignments: algorithms and evaluation. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Marcos Aurélio Pinto Cunha, Omayma Matoussi, Frédéric Pétrot Detecting Software Cache Coherence Violations in MPSoC Using Traces Captured on Virtual Platforms. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Samuel Hardman Taylor, Andrew M. Ledbetter Extending media multiplexity theory to the extended family: Communication satisfaction and tie strength as moderators of violations of media use expectations. Search on Bibsonomy New Media Soc. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Grigorios Kalliatakis, Shoaib Ehsan, Klaus D. McDonald-Maier A Paradigm Shift: Detecting Human Rights Violations Through Web Images. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
14Grigorios Kalliatakis, Shoaib Ehsan, Maria Fasli, Ales Leonardis, Juergen Gall, Klaus D. McDonald-Maier Detection of Human Rights Violations in Images: Can Convolutional Neural Networks help? Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
14Kui Liu 0001, Dongsun Kim 0001, Tegawendé F. Bissyandé, Shin Yoo, Yves Le Traon Mining Fix Patterns for FindBugs Violations. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
14Kiran Sharma, Gunjan Sehgal, Bindu Gupta, Geetika Sharma, Arnab Chatterjee, Anirban Chakraborti, Gautam Shroff A complex network analysis of ethnic conflicts and human rights violations. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
14Atsushi Shibagaki, Ichiro Takeuchi Stochastic Primal Dual Coordinate Method with Non-Uniform Sampling Based on Optimality Violations. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
14Martin Ostoja-Starzewski Admitting Spontaneous Violations of the Second Law in Continuum Thermomechanics. Search on Bibsonomy Entropy The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Adil Maarouf, Bouchra El Qacimy, Abderrahim Marzouk, Abdelkrim Haqiq Defining and Evaluating A Novel Penalty Model for Managing Violations in the Cloud Computing. Search on Bibsonomy Int. J. Grid High Perform. Comput. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Jéferson Campos Nobre, Lisandro Zambenedetti Granville Decentralized detection of violations of Service Level Agreements using Peer-to-Peer technology. Search on Bibsonomy IM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Marie-Eve Joret, Marijn van Vliet, Flavio Camarrone, Marc M. Van Hulle How does the brain process mild versus strong violations in music? A pilot study using event-related potentials. Search on Bibsonomy DSP The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Stefan Schoenen, Zoltán Ádám Mann, Andreas Metzger Using Risk Patterns to Identify Violations of Data Protection Policies in Cloud Systems. Search on Bibsonomy ICSOC Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara Investigation of Coding Violations Focusing on Authorships of Source Files. Search on Bibsonomy ACIT/CSII/BCD The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Yijing Li, Ben C. F. Choi Expecting the Unexpected in Security Violations in Mobile Apps. Search on Bibsonomy PACIS The full citation details ... 2017 DBLP  BibTeX  RDF
14Dolière Francis Somé, Nataliia Bielova, Tamara Rezk On the Content Security Policy Violations due to the Same-Origin Policy. Search on Bibsonomy WWW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Ole Meyer, Florian Wessling, Christina Klüver Finding optimized configurations for variability-intensive systems without constraint violations using a Regulatory Algorithm (RGA). Search on Bibsonomy CEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Ying-Feng Wu, Yu-Lun Su, Charles H.-P. Wen TVM: Tabular VM migration for reducing hop violations of service chains in cloud datacenters. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14John Hershberger 0001, Neeraj Kumar 0004, Subhash Suri Shortest Paths in the Plane with Obstacle Violations. Search on Bibsonomy ESA The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Boyang Li 0002, Denys Poshyvanyk, Mark Grechanik Automatically detecting integrity violations in database-centric applications. Search on Bibsonomy ICPC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Piyawat Lertvittayakumjorn, Natthawut Kertkeidkachorn, Ryutaro Ichise Resolving Range Violations in DBpedia. Search on Bibsonomy JIST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Steffen Höhenberger, Hendrik Scholta Will Government Forms Ever be Consistent? Detecting Violations in Form Structures by utilizing Graph Theory. Search on Bibsonomy ECIS The full citation details ... 2017 DBLP  BibTeX  RDF
14Maria Silvia Abba Legnazzi, Cristina Rottondi, Giacomo Verticale Differentially private queries in crowdsourced databases for net neutrality violations detection. Search on Bibsonomy ICUFN The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Chathurika Wickramage, Colin J. Fidge, Tony Sahama, Roy Wong Challenges for Log Based Detection of Privacy Violations during Healthcare Emergencies. Search on Bibsonomy GLOBECOM The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14James M. Yearsley, Daier Yuan, Jennifer Trueblood Perceived similarity mediates violations of independence in probabilistic judgments. Search on Bibsonomy CogSci The full citation details ... 2017 DBLP  BibTeX  RDF
14Yan Cai 0001, Lingwei Cao, Jing Zhao 0016 Adaptively generating high quality fixes for atomicity violations. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Aviv Kuvent, Shahar Maoz, Jan Oliver Ringert A symbolic justice violations transition system for unrealizable GR(1) specifications. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Frits de Nijs, Erwin Walraven, Mathijs Michiel de Weerdt, Matthijs T. J. Spaan Bounding the Probability of Resource Constraint Violations in Multi-Agent MDPs. Search on Bibsonomy AAAI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Marco Manna, Francesco Ricca, Giorgio Terracina Decomposing and pruning primary key violations from large data sets (discussion paper). Search on Bibsonomy SEBD The full citation details ... 2017 DBLP  BibTeX  RDF
14Thiago Allison Ribeiro da Silva, Ricardo A. L. Rabêlo, Enza R. S. de Ferreira, Guilherme G. Lage An approach to determine a sequence of adjustments to eliminate voltage magnitude violations in transmission power systems. Search on Bibsonomy SMC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Carlos André Batista de Carvalho, Miguel Franklin de Castro, Rossana Maria de Castro Andrade Secure cloud storage service for detection of security violations. Search on Bibsonomy CCGrid The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Shinpei Hayashi, Fumiki Minami, Motoshi Saeki Inference-based Detection of Architectural Violations in MVC2. Search on Bibsonomy ICSOFT The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Tobias Olsson, Morgan Ericsson, Anna Wingkvist The relationship of code churn and architectural violations in the open source software JabRef. Search on Bibsonomy ECSA (Companion) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Ankit Choudhary, Shan Lu 0001, Michael Pradel Efficient detection of thread safety violations via coverage-guided generation of concurrent tests. Search on Bibsonomy ICSE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Pascal Cuoq, Loïc Runarvot, Alexander Cherepanov Detecting Strict Aliasing Violations in the Wild. Search on Bibsonomy VMCAI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Irene Tollin, Francesca Arcelli Fontana, Marco Zanoni, Riccardo Roveda Change Prediction through Coding Rules Violations. Search on Bibsonomy EASE The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Grigorios Kalliatakis, Shoaib Ehsan, Maria Fasli, Ales Leonardis, Juergen Gall, Klaus D. McDonald-Maier Detection of Human Rights Violations in Images: Can Convolutional Neural Networks Help?. Search on Bibsonomy VISIGRAPP (5: VISAPP) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Sungseob Whang, Tymani Rachford, Dimitra Papagiannopoulou, Tali Moreshet, R. Iris Bahar Evaluating critical bits in arithmetic operations due to timing violations. Search on Bibsonomy HPEC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Faiz Ul Muram, Muhammad Atif Javed, Huy Tran, Uwe Zdun Towards a Framework for Detecting Containment Violations in Service Choreography. Search on Bibsonomy SCC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
14Nadya Markin, Eldho K. Thomas, Frédérique E. Oggier On group violations of inequalities in five subgroups. Search on Bibsonomy Adv. Math. Commun. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Moritz Heene, Andrew Kyngdon, Philipp Sckopke Detecting Violations of Unidimensionality by Order-Restricted Inference Methods. Search on Bibsonomy Frontiers Appl. Math. Stat. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Mohammed Alodib QoS-Aware approach to monitor violations of SLAs in the IoT. Search on Bibsonomy J. Innov. Digit. Ecosyst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Cristiano Amaral Maffort, Marco Túlio Valente, Ricardo Terra, Mariza Andrade da Silva Bigonha, Nicolas Anquetil, André C. Hora Mining architectural violations from version history. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Hongzhe Li, Jaesang Oh, Heejo Lee Detecting Violations of Security Requirements for Vulnerability Discovery in Source Code. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Horst Herrlich, Paul E. Howard, Eleftherios Tachtsis Finiteness Classes and Small Violations of Choice. Search on Bibsonomy Notre Dame J. Formal Log. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 2128 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license