The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Violation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1988 (18) 1989-1993 (15) 1994-1996 (21) 1997 (15) 1998 (21) 1999 (18) 2000 (25) 2001 (26) 2002 (51) 2003 (56) 2004 (73) 2005 (112) 2006 (114) 2007 (145) 2008 (159) 2009 (111) 2010 (52) 2011 (27) 2012 (28) 2013 (34) 2014 (22) 2015 (42) 2016 (45) 2017 (42) 2018 (59) 2019 (57) 2020 (70) 2021 (96) 2022 (89) 2023 (97) 2024 (22)
Publication types (Num. hits)
article(586) incollection(3) inproceedings(1168) phdthesis(5)
Venues (Conferences, Journals, ...)
CoRR(92) Symmetry(29) IEEE Trans. Comput. Aided Des....(16) Entropy(15) HICSS(15) Quantum Inf. Process.(14) SAC(14) CogSci(13) DAC(13) IEEE Access(12) DATE(11) ISPD(10) ACC(9) COMPSAC(9) ICCAD(9) ASP-DAC(8) More (+10 of total 937)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1042 occurrences of 761 keywords

Results
Found 1762 publication records. Showing 1762 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Mehdi Rais, Craig W. Johnson, Eilami Kavoos Predictors of Medical Records Violation Punishments Filed with the Texas Medical Board (TMB) Before and After the HITECH Act. Search on Bibsonomy AMIA The full citation details ... 2015 DBLP  BibTeX  RDF
15Michael Minock, Daniel Oskarsson, Björn Pelzer, Mika Cohen Natural Language Specification and Violation Reporting of Business Rules over ER-modeled Databases. Search on Bibsonomy EDBT The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
15Eric Jui-Yi Kao Violation management for relational data. Search on Bibsonomy 2015   RDF
15Xiuquan Wang, Guohe Huang Violation analysis on two-step method for interval linear programming. Search on Bibsonomy Inf. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yu-Hui Fang, Chao-Min Chiu Exploring Online Double Deviation Effect from Psychological Contract Violation, Emotion, and Power Perspectives. Search on Bibsonomy Pac. Asia J. Assoc. Inf. Syst. The full citation details ... 2014 DBLP  BibTeX  RDF
15Milan Korda, Ravi Gondhalekar, Frauke Oldewurtel, Colin N. Jones Stochastic MPC Framework for Controlling the Average Constraint Violation. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Gordon J. Pace, Michael Rosner Explaining Violation Traces with Finite State Natural Language Generation Models. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Pierre Flener, Justin Pearson Propagators and Violation Functions for Geometric and Workload Constraints Arising in Airspace Sectorisation. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
15Xiao Liu 0004, Yun Yang 0001, Dong Yuan, Jinjun Chen Do we need to handle every temporal violation in scientific workflow systems? Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Zhuping Zhou, Qizhou Hu, Wei Wang Modeling Pedestrian's Conformity Violation Behavior: A Complex Network Based Approach. Search on Bibsonomy Comput. Intell. Neurosci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Nourdine Aliane, Javier Fernández, Mario Mata, Sergio Bemposta A System for Traffic Violation Detection. Search on Bibsonomy Sensors The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Jennifer L. Bevan, Pei-Chern Ang, James B. Fearns Being unfriended on Facebook: An application of Expectancy Violation Theory. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15A. Thilagam Violation of the "information-disturbance relationship" in finite-time quantum measurements. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Víctor H. Champac, Hector Villacorta, Nestor Hernandez, Joan Figueras Skew violation verification in digital interconnect signals based on signal addition. Search on Bibsonomy IEICE Electron. Express The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Riad Mazloum, Marc-Olivier Buob, Jordan Augé, Bruno Baynat, Dario Rossi 0001, Timur Friedman Violation of Interdomain Routing Assumptions. Search on Bibsonomy PAM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Gordon J. Pace, Michael Rosner Explaining Violation Traces with Finite State Natural Language Generation Models. Search on Bibsonomy CNL The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Liang-Cheng Wei, Carol Hsu 0001 Employee Intention to Whistleblow Information Security Policy Violation. Search on Bibsonomy PACIS The full citation details ... 2014 DBLP  BibTeX  RDF
15Pratik Chaudhari, Tichakorn Wongpiromsarn, Emilio Frazzoli Incremental minimum-violation control synthesis for robots interacting with external agents. Search on Bibsonomy ACC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yehia Taher, Rafiqul Haque, Dinh Khoa Nguyen, Béatrice Finance PAEAN4CLOUD - A Framework for Monitoring and Managing the SLA Violation of Cloud Service-based Applications. Search on Bibsonomy CLOSER The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Gwan-Hwan Hwang, Wei-Sian Huang, Jenn-Zjone Peng Real-Time Proof of Violation for Cloud Storage. Search on Bibsonomy CloudCom The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yasin Nazzar, Jonathan Bouchard, James J. Clark Detection of stereo window violation in 3D movies. Search on Bibsonomy SIGGRAPH Posters The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Kiran Kate, Sumit Negi, Jayant Kalagnanam Monitoring Food Safety Violation Reports from Internet Forums. Search on Bibsonomy MIE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Pei-Ci Wu, Martin D. F. Wong, Ivailo Nedelchev, Sarvesh Bhardwaj, Vidyamani Parkhe On Timing Closure: Buffer Insertion for Hold-Violation Removal. Search on Bibsonomy DAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Kai Zhao 0003, Liang Huang 0001, Haitao Mi, Abraham Ittycheriah Hierarchical MT Training using Max-Violation Perceptron. Search on Bibsonomy ACL (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
15Yuelu Duan Techniques for low overhead fences and sequential consistency violation recording Search on Bibsonomy 2014   RDF
15J. S. Lee, M. Carena, J. Ellis, Apostolos Pilaftsis, C. E. M. Wagner CPsuperH2.3: An updated tool for phenomenology in the MSSM with explicit CP violation. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yan Yang 0001, Tonny Rutayisire, Chao Lin, Tianrui Li 0001, Fei Teng 0001 An Improved Cop-Kmeans Clustering for Solving Constraint Violation Based on MapReduce Framework. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Kyoung-Soo Han, Yeo Reum Lee, Biao Jiang, Eul Gyu Im Android Permission System Violation: Case Study and Refinement. Search on Bibsonomy Int. J. E Entrepreneurship Innov. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15M. Majid Butt, Dzevdan Kapetanovic, Björn E. Ottersten Maximizing Minimum Throughput Guarantees: The Small Violation Probability Region. Search on Bibsonomy IEEE Wirel. Commun. Lett. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ying Chen, Shaobai Zhang Notice of Violation of Academy Publisher Publication Principles "Learning Tract Variables with Distal Supervised Learning Model". Search on Bibsonomy J. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Zhe Xu, Ping Zhu, Jie Mei Notice of Violation of Academy Publisher Publication Principles "Research on Backward Cloud Model with Uncertainty". Search on Bibsonomy J. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Abdulghani Ali Ahmed, Aman Jantan, Mohammad Rasmi Service Violation Monitoring Model for Detecting and Tracing Bandwidth Abuse. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jana Tumova, Luis I. Reyes Castro, Sertac Karaman, Emilio Frazzoli, Daniela Rus Minimum-violation LTL Planning with Conflicting Specifications Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
15Luis I. Reyes Castro, Pratik Chaudhari, Jana Tumova, Sertac Karaman, Emilio Frazzoli, Daniela Rus Incremental Sampling-based Algorithm for Minimum-violation Motion Planning Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
15Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis Don't make excuses! Discouraging neutralization to reduce IT policy violation. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Search on Bibsonomy Comput. Secur. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Azlan B. Ismail, Jun Yan 0005, Jun Shen 0001 Incremental service level agreements violation handling with time impact analysis. Search on Bibsonomy J. Syst. Softw. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Vasily E. Tarasov No violation of the Leibniz rule. No fractional derivative. Search on Bibsonomy Commun. Nonlinear Sci. Numer. Simul. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ming-Liang Hu Relations between entanglement, Bell-inequality violation and teleportation fidelity for the two-qubit X states. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jana Tumova, Luis I. Reyes Castro, Sertac Karaman, Emilio Frazzoli, Daniela Rus Minimum-violation LTL planning with conflicting specifications. Search on Bibsonomy ACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Leo Pruijt, Christian Köppe, Sjaak Brinkkemper On the accuracy of Architecture Compliance Checking support Accuracy of dependency analysis and violation reporting. Search on Bibsonomy ICPC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Luis I. Reyes Castro, Pratik Chaudhari, Jana Tumova, Sertac Karaman, Emilio Frazzoli, Daniela Rus Incremental sampling-based algorithm for minimum-violation motion planning. Search on Bibsonomy CDC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Mazheruddin H. Syed, Hatem H. Zeineldin, Mohamed Shawky El Moursi Grid code violation during fault triggered islanding of hybrid micro-grid. Search on Bibsonomy ISGT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Goetz Graefe, Mark Lillibridge, Harumi A. Kuno, Joseph A. Tucek, Alistair C. Veitch Controlled lock violation. Search on Bibsonomy SIGMOD Conference The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Mohammed Obaid Mustafa, George Nikolakopoulos, Thomas Gustafsson Experimental evaluation of a broken rotor bar fault detection scheme based on Uncertainty Bounds violation. Search on Bibsonomy IECON The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Zigang Xiao, Yuelin Du, Haitong Tian, Martin D. F. Wong Optimally minimizing overlay violation in self-aligned double patterning decomposition for row-based standard cell layout in polynomial time. Search on Bibsonomy ICCAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Man Wang, Zhiyuan Li 0001 Global property violation detection and diagnosis for wireless sensor networks. Search on Bibsonomy CASES The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Piotr Dalka, Piotr Bratoszewski Visual Detection of People Movement Rules Violation in Crowded Indoor Scenes. Search on Bibsonomy MCSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Yuichi Asahiro, Jesper Jansson 0001, Eiji Miyano, Hirotaka Ono 0001 Degree-Constrained Graph Orientation: Maximum Satisfaction and Minimum Violation. Search on Bibsonomy WAOA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Adrian Ramos Peon, Domenico Prattichizzo Reaction times to constraint violation in haptics: comparing vibration, visual and audio stimuli. Search on Bibsonomy World Haptics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Ahmad Fadzil M. Hani, Irving Vitra Paputungan, M. Fadzil Hassan 0001 Support Vector regression for Service Level Agreement violation prediction. Search on Bibsonomy IC3INA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Shicong Meng, Arun Iyengar, Isabelle Rouvellou, Ling Liu 0001 Volley: Violation Likelihood Based State Monitoring for Datacenters. Search on Bibsonomy ICDCS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Heng Yu, Liang Huang 0001, Haitao Mi, Kai Zhao 0003 Max-Violation Perceptron and Forced Decoding for Scalable MT Training. Search on Bibsonomy EMNLP The full citation details ... 2013 DBLP  BibTeX  RDF
15Anurag Ganguli, Ajay Raghavan, Vladimir Kozitsky, Aaron M. Burry Automated fault detection in violation enforcement cameras within Electronic Toll Collection systems. Search on Bibsonomy ITSC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Michael Oche, Rafidah Md Noor, Alaa Saleh Al-jawfi, Andrew Thomos Bimba, Mostofa Kamal Nasir An automatic speed violation detection framework for VANETs. Search on Bibsonomy RFID-TA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Hans Chalupsky, Robert DeMarco, Eduard H. Hovy, Paul B. Kantor, Alisa Matlin, Priyam Mitra, Birnur Ozbas, Fred S. Roberts, James Wojtowicz, Minge Xie Estimating Violation Risk for Fisheries Regulations. Search on Bibsonomy ADT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Xuehai Qian, Josep Torrellas, Benjamín Sahelices, Depei Qian Volition: scalable and precise sequential consistency violation detection. Search on Bibsonomy ASPLOS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Neha Bhargava, Subhasis Chaudhuri, Guna Seetharaman Linear cyclic pursuit based prediction of personal space violation in surveillance video. Search on Bibsonomy AIPR The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
15Jesse Dunietz, Lori S. Levin, Jaime G. Carbonell The Effects of Lexical Resource Quality on Preference Violation Detection. Search on Bibsonomy ACL (2) The full citation details ... 2013 DBLP  BibTeX  RDF
15Mina Malekzadeh, Abdul Azim Abdul Ghani, Shamala Subramaniam A new security model to prevent denial-of-service attacks and violation of availability in wireless networks. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Amit Sachan, Sabu Emmanuel, Mohan S. Kankanhalli Aggregate licenses validation for digital rights violation detection. Search on Bibsonomy ACM Trans. Multim. Comput. Commun. Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Yu-Feng Lan, Shin-Ming Huang Using Mobile Learning to Improve the Reflection: A Case Study of Traffic Violation. Search on Bibsonomy J. Educ. Technol. Soc. The full citation details ... 2012 DBLP  BibTeX  RDF
15Jeong-Ah Jang, Keechoo Choi, Hanbyeog Cho A Fixed Sensor-Based Intersection Collision Warning System in Vulnerable Line-of-Sight and/or Traffic-Violation-Prone Environment. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Shan Lu 0001, Soyeon Park, Yuanyuan Zhou 0001 Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Caitlin McLaughlin, Jessica Vitak Norm evolution and violation on Facebook. Search on Bibsonomy New Media Soc. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15 Violation of the Bell-Inequality in Supercorrelated Systems Search on Bibsonomy CoRR The full citation details ... 2012 DBLP  BibTeX  RDF
15Takashi Torii Violation of the Third Law of Black Hole Thermodynamics inHigher Curvature Gravity. Search on Bibsonomy Entropy The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Takafumi Kanamori, Akiko Takeda Worst-Case Violation of Sampled Convex Programs for Optimization with Uncertainty. Search on Bibsonomy J. Optim. Theory Appl. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Pei-Ling Hsieh Why e-Return Services Fail: A Psychological Contract Violation Approach. Search on Bibsonomy Cyberpsychology Behav. Soc. Netw. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Abraham G. Kofman Optimal conditions for Bell-inequality violation in the presence of decoherence and errors. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Yubin Xia, Yutao Liu, Haibo Chen 0001, Binyu Zang CFIMon: Detecting violation of control flow integrity using performance counters. Search on Bibsonomy DSN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Nourdine Aliane, Javier Fernández, Sergio Bemposta, Mario Mata Driver behavior monitoring system based on traffic violation. Search on Bibsonomy Intelligent Vehicles Symposium The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Heejun Shim, Minwook Ahn, JinSae Jung, Yenjo Han, Soojung Ryu Verification of CGRA Executable Code and Debugging of Memory Dependence Violation. Search on Bibsonomy MTV The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Vasileios Giotsas, Shi Zhou Valley-free violation in Internet routing - Analysis based on BGP Community data. Search on Bibsonomy ICC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Reng Zeng, Zhuo Sun, Su Liu, Xudong He McPatom: A Predictive Analysis Tool for Atomicity Violation Using Model Checking. Search on Bibsonomy SPIN The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Michal Svirec, Irena Mlýnková Efficient Detection of XML Integrity Constraints Violation. Search on Bibsonomy NDT (1) The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge A taint marking approach to confidentiality violation detection. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
15Vincent C. Emeakaroha, Tiago C. Ferreto, Marco Aurélio Stelmar Netto, Ivona Brandic, César A. F. De Rose CASViD: Application Level Monitoring for SLA Violation Detection in Clouds. Search on Bibsonomy COMPSAC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Mei Huan, Xiaobao Yang 0003, Bin Jia Modeling Cyclist Violation Behavior at Signalized Intersection in China. Search on Bibsonomy CSO The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Dan Wu 0004, Anne Håkansson Ontology Integration by Using Context and Ontology Violation Check. Search on Bibsonomy KES The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Guoyu Ou, Yang Gao, Ying Liu 0039 Real-Time Vehicular Traffic Violation Detection in Traffic Monitoring Stream. Search on Bibsonomy Web Intelligence/IAT Workshops The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15David Pergament, Armen Aghasaryan, Jean-Gabriel Ganascia Reputation Diffusion Simulation for Avoiding Privacy Violation. Search on Bibsonomy TrustCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15David Hély, Maurin Augagneur, Yves Clauzel, Jeremy Dubeuf A physical unclonable function based on setup time violation. Search on Bibsonomy ICCD The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Cynthia K. Riemenschneider, Deborah J. Armstrong What Influences IT Professional Psychological Contract Violation? Search on Bibsonomy HICSS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Lucas Bordeaux, Nina Narodytska On the Violation of Circuits in Decomposable Negation Normal Form. Search on Bibsonomy Australasian Conference on Artificial Intelligence The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Zhibo Cao, Shoubin Dong Dynamic VM Consolidation for Energy-Aware and SLA Violation Reduction in Cloud Computing. Search on Bibsonomy PDCAT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
15Amit Sachan Rights violation detection in multi-level digital rights management systems Search on Bibsonomy 2012   DOI  RDF
15Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Jean-Luc Danger Security evaluation of application-specific integrated circuits and field programmable gate arrays against setup time violation attacks. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Guihai Yan, Yinhe Han 0001, Xiaowei Li 0001 SVFD: A Versatile Online Fault Detection Scheme via Checking of Stability Violation. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Danielle Z. Bolling, Naomi B. Pitskel, Ben Deen, Michael J. Crowley, James C. McPartland, Linda C. Mayes, Kevin A. Pelphrey Dissociable brain mechanisms for processing social exclusion and rule violation. Search on Bibsonomy NeuroImage The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Ruffin Evans, Olivier Pfister On the experimental violation of Mermin's inequality with imperfect measurements. Search on Bibsonomy Quantum Inf. Comput. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Adina D. Mosincat, Walter Binder Automated maintenance of service compositions with SLA violation detection and dynamic binding. Search on Bibsonomy Int. J. Softw. Tools Technol. Transf. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15 A policy that deters violation of security policy. Search on Bibsonomy Commun. ACM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Amit Sachan, Sabu Emmanuel Rights violation detection in multi-level digital rights management system. Search on Bibsonomy Comput. Secur. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Monica T. Whitty, Garry Young, Lewis Goodings What I won't do in pixels: Examining the limits of taboo violation in MMORPGs. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: Music pseudo-bispectrum detects ECG ischaemia. Search on Bibsonomy DSP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: A novel super-resolution music-based pseudo-bispectrum. Search on Bibsonomy DSP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: A polycoherence-based ECG signal non-linearity detector. Search on Bibsonomy DSP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Michael Maile, Farid Ahmed-Zaid, Sue Bai, Lorenzo Caminiti, Priyantha Mudalige, Michael Peredo, Zeljko Popovic Objective testing of a cooperative intersection collision avoidance system for traffic signal and stop sign violation. Search on Bibsonomy Intelligent Vehicles Symposium The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Ngene Christopher Umerah, Vladimir Ivanovich Hahanov A diagnostic model for detecting functional violation in HDL-code of System-on-Chip. Search on Bibsonomy EWDTS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 1762 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license