The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for violations with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1987 (16) 1988-1990 (19) 1991-1993 (19) 1994-1996 (26) 1997 (19) 1998 (33) 1999 (24) 2000 (35) 2001 (41) 2002 (56) 2003 (79) 2004 (94) 2005 (144) 2006 (161) 2007 (173) 2008 (154) 2009 (144) 2010 (67) 2011 (48) 2012 (45) 2013 (31) 2014 (50) 2015 (55) 2016 (62) 2017 (47) 2018 (70) 2019 (64) 2020 (60) 2021 (83) 2022 (102) 2023 (86) 2024 (21)
Publication types (Num. hits)
article(569) book(1) incollection(7) inproceedings(1535) phdthesis(16)
Venues (Conferences, Journals, ...)
CoRR(92) DAC(41) IEEE Trans. Comput. Aided Des....(28) IEEE Trans. Software Eng.(28) PLDI(21) ICSE(19) ASP-DAC(18) CogSci(18) ICCAD(18) DATE(17) ESEC/SIGSOFT FSE(16) ISPD(15) CAV(14) HICSS(14) ASE(13) IEEE Trans. Very Large Scale I...(13) More (+10 of total 994)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1559 occurrences of 1018 keywords

Results
Found 2128 publication records. Showing 2128 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Dongjing Miao, Xianmin Liu, Jianzhong Li 0001 On the complexity of sampling query feedback restricted database repair of functional dependency violations. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Shangru Wu, Chunbai Yang, Changjiang Jia, Wing Kwong Chan ASP: Abstraction Subspace Partitioning for Detection of Atomicity Violations with an Empirical Study. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Vladimir V. V'yugin On Stability of Probability Laws with Respect to Small Violations of Algorithmic Randomness. Search on Bibsonomy Theory Comput. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Haoyu Wen, Qi Li, Lai C. Liu Relationship between bus driver characteristics and traffic violations. Search on Bibsonomy Int. J. Serv. Stand. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Nadin Kökciyan, Pinar Yolum PriGuard: A Semantic Approach to Detect Privacy Violations in Online Social Networks. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Dolière Francis Somé, Nataliia Bielova, Tamara Rezk On the Content Security Policy Violations due to the Same-Origin Policy. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
14Rotem Dror, Roi Reichart The Structured Weighted Violations Perceptron Algorithm. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
14Hao Yu 0002, Michael J. Neely A Low Complexity Algorithm with $O(\sqrt{T})$ Regret and Finite Constraint Violations for Online Convex Optimization with Long Term Constraints. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
14Silvia Puglisi, David Rebollo-Monedero, Jordi Forné Potential mass surveillance and privacy violations in proximity-based social applications. Search on Bibsonomy CoRR The full citation details ... 2016 DBLP  BibTeX  RDF
14Allen C. Johnston, Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter Dispositional and situational factors: influences on information security policy violations. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Judee K. Burgoon, Joseph A. Bonito, Paul Benjamin Lowry, Sean L. Humpherys, Gregory D. Moody, James E. Gaskin 0001, Justin Scott Giboney Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task. Search on Bibsonomy Int. J. Hum. Comput. Stud. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Roozbeh Abdollahi, Khayrollah Hadidi, Abdollah Khoei A Simple and Reliable System to Detect and Correct Setup/Hold Time Violations in Digital Circuits. Search on Bibsonomy IEEE Trans. Circuits Syst. I Regul. Pap. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Iain Ireland, José Nelson Amaral, Raúl Silvera, Shimin Cui SafeType: detecting type violations for type-basedalias analysis of C. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Syed Hassan Ahmed, Muhammad Azfar Yaqub, Safdar Hussain Bouk, Dongkyun Kim SmartCop: Enabling Smart Traffic Violations Ticketing in Vehicular Named Data Networks. Search on Bibsonomy Mob. Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Masanori Ooi, Yoshitaka Nakamura, Hiroshi Inamura, Osamu Takahashi A method for distinction of bicycle traffic violations by detection of cyclists' behavior using multi-sensors. Search on Bibsonomy MobiQuitous The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Seyedeh Hanieh Hashemi, Reza Namazian, Zainalabedin Navabi Optimistic clock adjustment for preventing Better-than-worst-case violations. Search on Bibsonomy VLSI-SoC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Sergey Bykov, Nikolai Ryzhenko, Anton Sorokin Automated solution for preventing design rules violations at abutment stage for standard cells synthesis flow. Search on Bibsonomy EWDTS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Najwa Abu Bakar, Ali Selamat Detection of data confidentiality violations using Runtime Verification and Quality Assessment. Search on Bibsonomy ISAMSR The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Yuelu Duan, David A. Koufaty, Josep Torrellas SCsafe: Logging sequential consistency violations continuously and precisely. Search on Bibsonomy HPCA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Leo Pruijt, Wiebe Wiersema, Jan Martijn E. M. van der Werf, Sjaak Brinkkemper Rule Type Based Reasoning on Architecture Violations: A Case Study. Search on Bibsonomy QRASA@WICSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Aji Ery Burhandenny, Hirohisa Aman, Minoru Kawahara Examination of Coding Violations Focusing on Their Change Patterns over Releases. Search on Bibsonomy APSEC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14David A. Basin, Søren Debois, Thomas T. Hildebrandt In the Nick of Time: Proactive Prevention of Obligation Violations. Search on Bibsonomy CSF The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Lei Huang 0020, Dan E. Wang What a Surprise: Initial Connection with Coworkers on Facebook and Expectancy Violations. Search on Bibsonomy CSCW Companion The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Inhak Han, Daijoon Hyun, Youngsoo Shin Buffer insertion to remove hold violations at multiple process corners. Search on Bibsonomy ASP-DAC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Ons Mlouki, Foutse Khomh, Giuliano Antoniol On the Detection of Licenses Violations in the Android Ecosystem. Search on Bibsonomy SANER The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Priyanka Patel, Sherlock A. Licorish, Bastin Tony Roy Savarimuthu, Stephen G. MacDonell Studying Expectation Violations in Socio-Technical Systems: a Case Study of the Mobile App Community. Search on Bibsonomy ECIS The full citation details ... 2016 DBLP  BibTeX  RDF
14Steffen Höhenberger, Dennis M. Riehle, Patrick Delfmann From Legislation to potential Compliance Violations in Business Processes - Simplicity Matters. Search on Bibsonomy ECIS The full citation details ... 2016 DBLP  BibTeX  RDF
14Jay Patel, Yann-Hang Lee Dynamic Analysis of Multi-threaded Embedded Software to Expose Atomicity Violations. Search on Bibsonomy ICESS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Hamid Soleimani Bidgoli, Mevludin Glavic, Thierry Van Cutsem Receding-horizon control of distributed Generation to correct voltage or thermal violations and track desired schedules. Search on Bibsonomy PSCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Dezhi Wang, Lei Xu 0003, Baowen Xu, Weifeng Zhang 0001 Dynamically Detecting DOM-Related Atomicity Violations in JavaScript with Asynchronous Call. Search on Bibsonomy SATE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Bojan Bozic, Rob Brennan, Kevin Feeney, Gavin Mendel-Gleason Describing Reasoning Results with RVO, the Reasoning Violations Ontology. Search on Bibsonomy MEPDaW/LDQ@ESWC The full citation details ... 2016 DBLP  BibTeX  RDF
14Mohammad Majharul Islam, Abdullah Muzahid Detecting, Exposing, and Classifying Sequential Consistency Violations. Search on Bibsonomy ISSRE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Curtis C. R. Busby Earle, Robert B. France Discovering Potential Interaction Violations among Requirements. Search on Bibsonomy CAiSE Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Najwa Abu Bakar, Ali Selamat Runtime Verification and Quality Assessment for Privacy Violations Detection in Social Networking System. Search on Bibsonomy SoMeT The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Cordula Vesper, Laura Schmitz, Günther Knoblich Using Violations of Fitts' Law to Communicate during Joint Action. Search on Bibsonomy CogSci The full citation details ... 2016 DBLP  BibTeX  RDF
14Bob Rehder Beyond Markov: Accounting for Independence Violations in Causal Reasoning. Search on Bibsonomy CogSci The full citation details ... 2016 DBLP  BibTeX  RDF
14Waylon Huang Discovering additional violations of Java API invariants. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Demetris Paschalides, Georgia M. Kapitsaki Validate your SPDX files for open source license violations. Search on Bibsonomy SIGSOFT FSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Apostolos Ampatzoglou, Paris Avgeriou, Thom Koenders, Pascal van Alphen, Ioannis Stamelos Quality Rule Violations in SharePoint Applications: An Empirical Study in Industry. Search on Bibsonomy PROFES The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Yuri V. Makarov, Da Meng, Bharat Vyakaranam, Ruisheng Diao, Bruce Palmer, Zhenyu Huang 0001 Direct Methods to Estimate the Most Limiting Voltage Level and Thermal Violations in Coordinates of Power Transfers on Critical Transmission Paths. Search on Bibsonomy HICSS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Rotem Dror, Roi Reichart The Structured Weighted Violations Perceptron Algorithm. Search on Bibsonomy EMNLP The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Arash Jahangiri, Mohammed Elhenawy, Hesham Rakha, Thomas A. Dingus Investigating cyclist violations at signal-controlled intersections using naturalistic cycling data. Search on Bibsonomy ITSC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Timothy Rawlins, Andrew Lewis, Timoleon Kipouros Repairing blackbox constraint violations in Multi-Objective Optimisation by use of decision trees. Search on Bibsonomy IJCNN The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Ernesto Jiménez-Ruiz, Terry R. Payne, Alessandro Solimando, Valentina A. M. Tamma Limiting Logical Violations in Ontology Alignnment Through Negotiation. Search on Bibsonomy KR The full citation details ... 2016 DBLP  BibTeX  RDF
14Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu 0001 PVDetector: a detector of privacy-policy violations for Android apps. Search on Bibsonomy MOBILESoft The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Christoph Matthies, Thomas Kowark, Keven Richly, Matthias Uflacker, Hasso Plattner ScrumLint: identifying violations of agile practices using development artifacts. Search on Bibsonomy CHASE@ICSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Rocky Slavin, Xiaoyin Wang, Mitra Bokaei Hosseini, James Hester, Ram Krishnan, Jaspreet Bhatia, Travis D. Breaux, Jianwei Niu 0001 Toward a framework for detecting privacy policy violations in android application code. Search on Bibsonomy ICSE The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Karola Marky, Andreas Gutmann, Philipp Rack, Melanie Volkamer Privacy Friendly Apps - Making Developers Aware of Privacy Violations. Search on Bibsonomy IMPS@ESSoS The full citation details ... 2016 DBLP  BibTeX  RDF
14Pacome L. Ambassa, Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel Privacy Violations in Constrained Micro-Grids: Adversarial Cases. Search on Bibsonomy AINA Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Andrea Zasada, Michael Fellmann Reducing Compliance Violations through Systematic Risk Assessment during the Supplier Analysis Process. Search on Bibsonomy EDOC Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Taejoong Chung, David R. Choffnes, Alan Mislove Tunneling for Transparency: A Large-Scale Analysis of End-to-End Violations in the Internet. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2016 DBLP  BibTeX  RDF
14Nadin Kökciyan, Pinar Yolum PriGuardTool: A Tool for Monitoring Privacy Violations in Online Social Networks (Demonstration). Search on Bibsonomy AAMAS The full citation details ... 2016 DBLP  BibTeX  RDF
14Nadin Kökciyan, Pinar Yolum PriGuardTool: A Web-Based Tool to Detect Privacy Violations Semantically. Search on Bibsonomy EMAS@AAMAS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Haoyu Luo, Xiao Liu 0004, Jin Liu 0016, Futian Wang Where to Fix Temporal Violations: A Novel Handling Point Selection Strategy for Business Cloud Workflows. Search on Bibsonomy SCC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
14Jéferson Campos Nobre Decentralized detection of violations f service level agreements using peer-to-peer technology. Search on Bibsonomy 2016   RDF
14Axel Ockenfels, Dirk Sliwka, Peter Werner Bonus Payments and Reference Point Violations. Search on Bibsonomy Manag. Sci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Manoj V. Thomas, K. Chandrasekaran 0001 A Trust-Based Approach for Management of Dynamic QoS Violations in Cloud Federation Environments. Search on Bibsonomy Open J. Cloud Comput. The full citation details ... 2015 DBLP  BibTeX  RDF
14Paul Metzner, Titus von der Malsburg, Shravan Vasishth, Frank Rösler Brain Responses to World Knowledge Violations: A Comparison of Stimulus- and Fixation-triggered Event-related Potentials and Neural Oscillations. Search on Bibsonomy J. Cogn. Neurosci. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Taek Lee, Jung-Been Lee, Hoh Peter In Effect Analysis of Coding Convention Violations on Readability of Post-Delivered Code. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Xi Chang, Zhuo Zhang 0007, Yan Lei, Jianjun Zhao 0001 Biped: Bidirectional Prediction of Order Violations. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Anthony Vance, Paul Benjamin Lowry, Dennis Eggett Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations. Search on Bibsonomy MIS Q. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Diogo G. Sousa, Ricardo J. Dias, Carla Ferreira 0001, João Lourenço Preventing Atomicity Violations with Contracts. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
14François Leduc-Primeau, Frank R. Kschischang, Warren J. Gross Modeling and Energy Optimization of LDPC Decoder Circuits with Timing Violations. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
14Ricardo Terra, Marco Túlio Valente, Roberto da Silva Bigonha, Krzysztof Czarnecki 0001 DCLfix: A Recommendation System for Repairing Architectural Violations. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
14Jawwad Ahmed, Andreas Johnsson, Rerngvit Yanggratoke, John Ardelius, Christofer Flinta, Rolf Stadler Predicting SLA Violations in Real Time using Online Machine Learning. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
14Nadya Markin, Eldho K. Thomas, Frédérique E. Oggier On Group Violations of Inequalities in five Subgroups. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
14Marco Manna, Francesco Ricca, Giorgio Terracina Taming Primary Key Violations to Query Large Inconsistent Data. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
14Dimitrios Rodopoulos, Georgia Psychou, Mohamed M. Sabry, Francky Catthoor, Antonis Papanikolaou, Dimitrios Soudris, Tobias G. Noll, David Atienza Classification Framework for Analysis and Modeling of Physically Induced Reliability Violations. Search on Bibsonomy ACM Comput. Surv. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Sanghoon Lee, Daniel M. Germán, Seung-won Hwang, Sunghun Kim 0001 Crowdsourcing Identification of License Violations. Search on Bibsonomy J. Comput. Sci. Eng. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Zheng Xu 0001, Haiyan Chen The semantic analysis of knowledge map for the traffic violations from the surveillance video big data. Search on Bibsonomy Comput. Syst. Sci. Eng. The full citation details ... 2015 DBLP  BibTeX  RDF
14Hasan M. Al-Mukahal, Khaled A. Alshare An examination of factors that influence the number of information security policy violations in Qatari organizations. Search on Bibsonomy Inf. Comput. Secur. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Manel Baucells, Antonio Villasís Equal Tails: A Simple Method to Elicit Utility Under Violations of Expected Utility. Search on Bibsonomy Decis. Anal. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Michael H. Birnbaum, Ulrich Schmidt The Impact of Learning by Thought on Violations of Independence and Coalescing. Search on Bibsonomy Decis. Anal. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Pei-Lee Teh, Pervaiz K. Ahmed 0001, John D'Arcy What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory. Search on Bibsonomy J. Glob. Inf. Manag. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Xavier Oriol, Ernest Teniente, Albert Tort Computing repairs for constraint violations in UML/OCL conceptual schemas. Search on Bibsonomy Data Knowl. Eng. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Angela Lozano, Kim Mens, Andy Kellens Usage contracts: Offering immediate feedback on violations of structural source-code regularities. Search on Bibsonomy Sci. Comput. Program. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Marco Manna, Francesco Ricca, Giorgio Terracina Taming primary key violations to query large inconsistent data via ASP. Search on Bibsonomy Theory Pract. Log. Program. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Ricardo Terra, Marco Túlio Valente, Krzysztof Czarnecki 0001, Roberto da Silva Bigonha A recommendation system for repairing violations detected by static architecture conformance checking. Search on Bibsonomy Softw. Pract. Exp. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Qing Hu 0003, Robert West, Laura Smarandescu The Role of Self-Control in Information Security Violations: Insights from a Cognitive Neuroscience Perspective. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Christian Lindig Mining Patterns and Violations Using Concept Analysis. Search on Bibsonomy The Art and Science of Analyzing Software Data The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Steven Poulakos, Rafael Monroy, Tunç Ozan Aydin, Oliver Wang, Aljoscha Smolic, Markus H. Gross A computational model for perception of stereoscopic window violations. Search on Bibsonomy QoMEX The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Jesper Larsson Träff, Felix Donatus Lübbe Specification Guideline Violations by MPI_Dims_create. Search on Bibsonomy EuroMPI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Ahmed Awad 0001, Ahmed Barnawi, Amal Elgammal, Radwa El Shawi, Abduallah Almalaise, Sherif Sakr Runtime detection of business process compliance violations: an approach based on anti patterns. Search on Bibsonomy SAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Demóstenes Sena, Roberta Coelho, Uirá Kulesza An investigation on the evolutionary nature of exception handling violations in software product lines. Search on Bibsonomy SAC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14François Leduc-Primeau, Frank R. Kschischang, Warren J. Gross Energy optimization of LDPC decoder circuits with timing violations. Search on Bibsonomy ICC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Takashi Isozaki, Manabu Kuroki Learning Maximal Ancestral Graphs with Robustness for Faithfulness Violations. Search on Bibsonomy AMBN@JSAI-isAI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14N. W. A. Lidula, G. R. Kodikara Evaluation of protection coordination violations with the integration of distributed generators. Search on Bibsonomy ICIIS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Chao Wang 0055, Jacques M. B. Terken, Bin Yu 0004, Jun Hu 0001 Reducing driving violations by receiving feedback from other drivers. Search on Bibsonomy AutomotiveUI (adjunct) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Jeff Rasley, Eleni Gessiou, Tony Ohmann, Yuriy Brun, Shriram Krishnamurthi, Justin Cappos Detecting latent cross-platform API violations. Search on Bibsonomy ISSRE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Mahdi Eslamimehr, Mohsen Lesani AtomChase: Directed search towards atomicity violations. Search on Bibsonomy ISSRE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Robert J. Walls, Yuriy Brun, Marc Liberatore, Brian Neil Levine Discovering specification violations in networked software systems. Search on Bibsonomy ISSRE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Domenico Cotroneo, Luigi De Simone, Francesco Fucci, Roberto Natella MoIO: Run-time monitoring for I/O protocol violations in storage device drivers. Search on Bibsonomy ISSRE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Roberto Pepato Mellado, Gabriel de Souza Pereira Moreira, Adilson Marques da Cunha, Luiz Alberto Vieira Dias A Software Framework for Identifying the Law of Demeter Violations. Search on Bibsonomy ITNG The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Felix Bieker Can Courts Provide Effective Remedies Against Violations of Fundamental Rights by Mass Surveillance? The Case of the United Kingdom. Search on Bibsonomy Privacy and Identity Management The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Jana Samland, Michael R. Waldmann Highlighting the Causal Meaning of Causal Test Questions in Contexts of Norm Violations. Search on Bibsonomy CogSci The full citation details ... 2015 DBLP  BibTeX  RDF
14Carly Giffin, Tania Lombrozo Mental states are more important in evaluating moral than conventional violations. Search on Bibsonomy CogSci The full citation details ... 2015 DBLP  BibTeX  RDF
14Benjamin M. Rottman, Reid Hastie Do Markov Violations and Failures of Explaining Away Persist with Experience? Search on Bibsonomy CogSci The full citation details ... 2015 DBLP  BibTeX  RDF
14Malavika Samak, Murali Krishna Ramanathan Synthesizing tests for detecting atomicity violations. Search on Bibsonomy ESEC/SIGSOFT FSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Qing Chen, Zijing Tan, Chu He, Chaofeng Sha, Wei Wang 0009 Repairing Functional Dependency Violations in Distributed Data. Search on Bibsonomy DASFAA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Ignacio Santín, Carles Pedret, Ramón Vilanova Control strategies for ammonia violations removal in BSM1 for dry, rain and storm weather conditions. Search on Bibsonomy MED The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
Displaying result #801 - #900 of 2128 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license