Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Mehdi Rais, Craig W. Johnson, Eilami Kavoos |
Predictors of Medical Records Violation Punishments Filed with the Texas Medical Board (TMB) Before and After the HITECH Act. |
AMIA |
2015 |
DBLP BibTeX RDF |
|
15 | Michael Minock, Daniel Oskarsson, Björn Pelzer, Mika Cohen |
Natural Language Specification and Violation Reporting of Business Rules over ER-modeled Databases. |
EDBT |
2015 |
DBLP DOI BibTeX RDF |
|
15 | Eric Jui-Yi Kao |
Violation management for relational data. |
|
2015 |
RDF |
|
15 | Xiuquan Wang, Guohe Huang |
Violation analysis on two-step method for interval linear programming. |
Inf. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yu-Hui Fang, Chao-Min Chiu |
Exploring Online Double Deviation Effect from Psychological Contract Violation, Emotion, and Power Perspectives. |
Pac. Asia J. Assoc. Inf. Syst. |
2014 |
DBLP BibTeX RDF |
|
15 | Milan Korda, Ravi Gondhalekar, Frauke Oldewurtel, Colin N. Jones |
Stochastic MPC Framework for Controlling the Average Constraint Violation. |
IEEE Trans. Autom. Control. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Gordon J. Pace, Michael Rosner |
Explaining Violation Traces with Finite State Natural Language Generation Models. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
15 | Pierre Flener, Justin Pearson |
Propagators and Violation Functions for Geometric and Workload Constraints Arising in Airspace Sectorisation. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
15 | Xiao Liu 0004, Yun Yang 0001, Dong Yuan, Jinjun Chen |
Do we need to handle every temporal violation in scientific workflow systems? |
ACM Trans. Softw. Eng. Methodol. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Zhuping Zhou, Qizhou Hu, Wei Wang |
Modeling Pedestrian's Conformity Violation Behavior: A Complex Network Based Approach. |
Comput. Intell. Neurosci. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Nourdine Aliane, Javier Fernández, Mario Mata, Sergio Bemposta |
A System for Traffic Violation Detection. |
Sensors |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Jennifer L. Bevan, Pei-Chern Ang, James B. Fearns |
Being unfriended on Facebook: An application of Expectancy Violation Theory. |
Comput. Hum. Behav. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | A. Thilagam |
Violation of the "information-disturbance relationship" in finite-time quantum measurements. |
Quantum Inf. Process. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Víctor H. Champac, Hector Villacorta, Nestor Hernandez, Joan Figueras |
Skew violation verification in digital interconnect signals based on signal addition. |
IEICE Electron. Express |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Riad Mazloum, Marc-Olivier Buob, Jordan Augé, Bruno Baynat, Dario Rossi 0001, Timur Friedman |
Violation of Interdomain Routing Assumptions. |
PAM |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Gordon J. Pace, Michael Rosner |
Explaining Violation Traces with Finite State Natural Language Generation Models. |
CNL |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Liang-Cheng Wei, Carol Hsu 0001 |
Employee Intention to Whistleblow Information Security Policy Violation. |
PACIS |
2014 |
DBLP BibTeX RDF |
|
15 | Pratik Chaudhari, Tichakorn Wongpiromsarn, Emilio Frazzoli |
Incremental minimum-violation control synthesis for robots interacting with external agents. |
ACC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yehia Taher, Rafiqul Haque, Dinh Khoa Nguyen, Béatrice Finance |
PAEAN4CLOUD - A Framework for Monitoring and Managing the SLA Violation of Cloud Service-based Applications. |
CLOSER |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng |
Real-Time Proof of Violation for Cloud Storage. |
CloudCom |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yasin Nazzar, Jonathan Bouchard, James J. Clark |
Detection of stereo window violation in 3D movies. |
SIGGRAPH Posters |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Kiran Kate, Sumit Negi, Jayant Kalagnanam |
Monitoring Food Safety Violation Reports from Internet Forums. |
MIE |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Pei-Ci Wu, Martin D. F. Wong, Ivailo Nedelchev, Sarvesh Bhardwaj, Vidyamani Parkhe |
On Timing Closure: Buffer Insertion for Hold-Violation Removal. |
DAC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Kai Zhao 0003, Liang Huang 0001, Haitao Mi, Abraham Ittycheriah |
Hierarchical MT Training using Max-Violation Perceptron. |
ACL (2) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yuelu Duan |
Techniques for low overhead fences and sequential consistency violation recording |
|
2014 |
RDF |
|
15 | J. S. Lee, M. Carena, J. Ellis, Apostolos Pilaftsis, C. E. M. Wagner |
CPsuperH2.3: An updated tool for phenomenology in the MSSM with explicit CP violation. |
Comput. Phys. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Yan Yang 0001, Tonny Rutayisire, Chao Lin, Tianrui Li 0001, Fei Teng 0001 |
An Improved Cop-Kmeans Clustering for Solving Constraint Violation Based on MapReduce Framework. |
Fundam. Informaticae |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Kyoung-Soo Han, Yeo Reum Lee, Biao Jiang, Eul Gyu Im |
Android Permission System Violation: Case Study and Refinement. |
Int. J. E Entrepreneurship Innov. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | M. Majid Butt, Dzevdan Kapetanovic, Björn E. Ottersten |
Maximizing Minimum Throughput Guarantees: The Small Violation Probability Region. |
IEEE Wirel. Commun. Lett. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ying Chen, Shaobai Zhang |
Notice of Violation of Academy Publisher Publication Principles "Learning Tract Variables with Distal Supervised Learning Model". |
J. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Zhe Xu, Ping Zhu, Jie Mei |
Notice of Violation of Academy Publisher Publication Principles "Research on Backward Cloud Model with Uncertainty". |
J. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Abdulghani Ali Ahmed, Aman Jantan, Mohammad Rasmi |
Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse. |
J. Netw. Syst. Manag. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jana Tumova, Luis I. Reyes Castro, Sertac Karaman, Emilio Frazzoli, Daniela Rus |
Minimum-violation LTL Planning with Conflicting Specifications |
CoRR |
2013 |
DBLP BibTeX RDF |
|
15 | Luis I. Reyes Castro, Pratik Chaudhari, Jana Tumova, Sertac Karaman, Emilio Frazzoli, Daniela Rus |
Incremental Sampling-based Algorithm for Minimum-violation Motion Planning |
CoRR |
2013 |
DBLP BibTeX RDF |
|
15 | Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis |
Don't make excuses! Discouraging neutralization to reduce IT policy violation. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai |
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. |
Comput. Secur. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Azlan B. Ismail, Jun Yan 0005, Jun Shen 0001 |
Incremental service level agreements violation handling with time impact analysis. |
J. Syst. Softw. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Vasily E. Tarasov |
No violation of the Leibniz rule. No fractional derivative. |
Commun. Nonlinear Sci. Numer. Simul. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ming-Liang Hu |
Relations between entanglement, Bell-inequality violation and teleportation fidelity for the two-qubit X states. |
Quantum Inf. Process. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jana Tumova, Luis I. Reyes Castro, Sertac Karaman, Emilio Frazzoli, Daniela Rus |
Minimum-violation LTL planning with conflicting specifications. |
ACC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Leo Pruijt, Christian Köppe, Sjaak Brinkkemper |
On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting. |
ICPC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Luis I. Reyes Castro, Pratik Chaudhari, Jana Tumova, Sertac Karaman, Emilio Frazzoli, Daniela Rus |
Incremental sampling-based algorithm for minimum-violation motion planning. |
CDC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Mazheruddin H. Syed, Hatem H. Zeineldin, Mohamed Shawky El Moursi |
Grid code violation during fault triggered islanding of hybrid micro-grid. |
ISGT |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Goetz Graefe, Mark Lillibridge, Harumi A. Kuno, Joseph A. Tucek, Alistair C. Veitch |
Controlled lock violation. |
SIGMOD Conference |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Mohammed Obaid Mustafa, George Nikolakopoulos, Thomas Gustafsson |
Experimental evaluation of a broken rotor bar fault detection scheme based on Uncertainty Bounds violation. |
IECON |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Zigang Xiao, Yuelin Du, Haitong Tian, Martin D. F. Wong |
Optimally minimizing overlay violation in self-aligned double patterning decomposition for row-based standard cell layout in polynomial time. |
ICCAD |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Man Wang, Zhiyuan Li 0001 |
Global property violation detection and diagnosis for wireless sensor networks. |
CASES |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Piotr Dalka, Piotr Bratoszewski |
Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes. |
MCSS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Yuichi Asahiro, Jesper Jansson 0001, Eiji Miyano, Hirotaka Ono 0001 |
Degree-Constrained Graph Orientation: Maximum Satisfaction and Minimum Violation. |
WAOA |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Ramos Peon, Domenico Prattichizzo |
Reaction times to constraint violation in haptics: comparing vibration, visual and audio stimuli. |
World Haptics |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ahmad Fadzil M. Hani, Irving Vitra Paputungan, M. Fadzil Hassan 0001 |
Support Vector regression for Service Level Agreement violation prediction. |
IC3INA |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Shicong Meng, Arun Iyengar, Isabelle Rouvellou, Ling Liu 0001 |
Volley: Violation Likelihood Based State Monitoring for Datacenters. |
ICDCS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Heng Yu, Liang Huang 0001, Haitao Mi, Kai Zhao 0003 |
Max-Violation Perceptron and Forced Decoding for Scalable MT Training. |
EMNLP |
2013 |
DBLP BibTeX RDF |
|
15 | Anurag Ganguli, Ajay Raghavan, Vladimir Kozitsky, Aaron M. Burry |
Automated fault detection in violation enforcement cameras within Electronic Toll Collection systems. |
ITSC |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Michael Oche, Rafidah Md Noor, Alaa Saleh Al-jawfi, Andrew Thomos Bimba, Mostofa Kamal Nasir |
An automatic speed violation detection framework for VANETs. |
RFID-TA |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Hans Chalupsky, Robert DeMarco, Eduard H. Hovy, Paul B. Kantor, Alisa Matlin, Priyam Mitra, Birnur Ozbas, Fred S. Roberts, James Wojtowicz, Minge Xie |
Estimating Violation Risk for Fisheries Regulations. |
ADT |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Xuehai Qian, Josep Torrellas, Benjamín Sahelices, Depei Qian |
Volition: scalable and precise sequential consistency violation detection. |
ASPLOS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Neha Bhargava, Subhasis Chaudhuri, Guna Seetharaman |
Linear cyclic pursuit based prediction of personal space violation in surveillance video. |
AIPR |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jesse Dunietz, Lori S. Levin, Jaime G. Carbonell |
The Effects of Lexical Resource Quality on Preference Violation Detection. |
ACL (2) |
2013 |
DBLP BibTeX RDF |
|
15 | Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam |
A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. |
Int. J. Commun. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Amit Sachan, Sabu Emmanuel, Mohan S. Kankanhalli |
Aggregate licenses validation for digital rights violation detection. |
ACM Trans. Multim. Comput. Commun. Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Yu-Feng Lan, Shin-Ming Huang |
Using Mobile Learning to Improve the Reflection: A Case Study of Traffic Violation. |
J. Educ. Technol. Soc. |
2012 |
DBLP BibTeX RDF |
|
15 | Jeong-Ah Jang, Keechoo Choi, Hanbyeog Cho |
A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment. |
IEEE Trans. Intell. Transp. Syst. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Shan Lu 0001, Soyeon Park, Yuanyuan Zhou 0001 |
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing. |
IEEE Trans. Software Eng. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Caitlin McLaughlin, Jessica Vitak |
Norm evolution and violation on Facebook. |
New Media Soc. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | |
Violation of the Bell-Inequality in Supercorrelated Systems |
CoRR |
2012 |
DBLP BibTeX RDF |
|
15 | Takashi Torii |
Violation of the Third Law of Black Hole Thermodynamics inHigher Curvature Gravity. |
Entropy |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Takafumi Kanamori, Akiko Takeda |
Worst-Case Violation of Sampled Convex Programs for Optimization with Uncertainty. |
J. Optim. Theory Appl. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Pei-Ling Hsieh |
Why e-Return Services Fail: A Psychological Contract Violation Approach. |
Cyberpsychology Behav. Soc. Netw. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Abraham G. Kofman |
Optimal conditions for Bell-inequality violation in the presence of decoherence and errors. |
Quantum Inf. Process. |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Yubin Xia, Yutao Liu, Haibo Chen 0001, Binyu Zang |
CFIMon: Detecting violation of control flow integrity using performance counters. |
DSN |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Nourdine Aliane, Javier Fernández, Sergio Bemposta, Mario Mata |
Driver behavior monitoring system based on traffic violation. |
Intelligent Vehicles Symposium |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Heejun Shim, Minwook Ahn, JinSae Jung, Yenjo Han, Soojung Ryu |
Verification of CGRA Executable Code and Debugging of Memory Dependence Violation. |
MTV |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Vasileios Giotsas, Shi Zhou |
Valley-free violation in Internet routing - Analysis based on BGP Community data. |
ICC |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Reng Zeng, Zhuo Sun, Su Liu, Xudong He |
McPatom: A Predictive Analysis Tool for Atomicity Violation Using Model Checking. |
SPIN |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Michal Svirec, Irena Mlýnková |
Efficient Detection of XML Integrity Constraints Violation. |
NDT (1) |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge |
A taint marking approach to confidentiality violation detection. |
AISC |
2012 |
DBLP BibTeX RDF |
|
15 | Vincent C. Emeakaroha, Tiago C. Ferreto, Marco Aurélio Stelmar Netto, Ivona Brandic, César A. F. De Rose |
CASViD: Application Level Monitoring for SLA Violation Detection in Clouds. |
COMPSAC |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Mei Huan, Xiaobao Yang 0003, Bin Jia |
Modeling Cyclist Violation Behavior at Signalized Intersection in China. |
CSO |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Dan Wu 0004, Anne Håkansson |
Ontology Integration by Using Context and Ontology Violation Check. |
KES |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Guoyu Ou, Yang Gao, Ying Liu 0039 |
Real-Time Vehicular Traffic Violation Detection in Traffic Monitoring Stream. |
Web Intelligence/IAT Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
15 | David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia |
Reputation Diffusion Simulation for Avoiding Privacy Violation. |
TrustCom |
2012 |
DBLP DOI BibTeX RDF |
|
15 | David Hély, Maurin Augagneur, Yves Clauzel, Jeremy Dubeuf |
A physical unclonable function based on setup time violation. |
ICCD |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Cynthia K. Riemenschneider, Deborah J. Armstrong |
What Influences IT Professional Psychological Contract Violation? |
HICSS |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Lucas Bordeaux, Nina Narodytska |
On the Violation of Circuits in Decomposable Negation Normal Form. |
Australasian Conference on Artificial Intelligence |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Zhibo Cao, Shoubin Dong |
Dynamic VM Consolidation for Energy-Aware and SLA Violation Reduction in Cloud Computing. |
PDCAT |
2012 |
DBLP DOI BibTeX RDF |
|
15 | Amit Sachan |
Rights violation detection in multi-level digital rights management systems |
|
2012 |
DOI RDF |
|
15 | Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger |
Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. |
IET Inf. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Guihai Yan, Yinhe Han 0001, Xiaowei Li 0001 |
SVFD: A Versatile Online Fault Detection Scheme via Checking of Stability Violation. |
IEEE Trans. Very Large Scale Integr. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Danielle Z. Bolling, Naomi B. Pitskel, Ben Deen, Michael J. Crowley, James C. McPartland, Linda C. Mayes, Kevin A. Pelphrey |
Dissociable brain mechanisms for processing social exclusion and rule violation. |
NeuroImage |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Ruffin Evans, Olivier Pfister |
On the experimental violation of Mermin's inequality with imperfect measurements. |
Quantum Inf. Comput. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Adina D. Mosincat, Walter Binder |
Automated maintenance of service compositions with SLA violation detection and dynamic binding. |
Int. J. Softw. Tools Technol. Transf. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | |
A policy that deters violation of security policy. |
Commun. ACM |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Amit Sachan, Sabu Emmanuel |
Rights violation detection in multi-level digital rights management system. |
Comput. Secur. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Monica T. Whitty, Garry Young, Lewis Goodings |
What I won't do in pixels: Examining the limits of taboo violation in MMORPGs. |
Comput. Hum. Behav. |
2011 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: Music pseudo-bispectrum detects ECG ischaemia. |
DSP |
2011 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: A novel super-resolution music-based pseudo-bispectrum. |
DSP |
2011 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: A polycoherence-based ECG signal non-linearity detector. |
DSP |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Michael Maile, Farid Ahmed-Zaid, Sue Bai, Lorenzo Caminiti, Priyantha Mudalige, Michael Peredo, Zeljko Popovic |
Objective testing of a cooperative intersection collision avoidance system for traffic signal and stop sign violation. |
Intelligent Vehicles Symposium |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Ngene Christopher Umerah, Vladimir Ivanovich Hahanov |
A diagnostic model for detecting functional violation in HDL-code of System-on-Chip. |
EWDTS |
2011 |
DBLP DOI BibTeX RDF |
|