The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Violation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1972-1988 (18) 1989-1993 (15) 1994-1996 (21) 1997 (15) 1998 (21) 1999 (18) 2000 (25) 2001 (26) 2002 (51) 2003 (56) 2004 (73) 2005 (112) 2006 (114) 2007 (145) 2008 (159) 2009 (111) 2010 (52) 2011 (27) 2012 (28) 2013 (34) 2014 (22) 2015 (42) 2016 (45) 2017 (42) 2018 (59) 2019 (57) 2020 (70) 2021 (96) 2022 (89) 2023 (97) 2024 (22)
Publication types (Num. hits)
article(586) incollection(3) inproceedings(1168) phdthesis(5)
Venues (Conferences, Journals, ...)
CoRR(92) Symmetry(29) IEEE Trans. Comput. Aided Des....(16) Entropy(15) HICSS(15) Quantum Inf. Process.(14) SAC(14) CogSci(13) DAC(13) IEEE Access(12) DATE(11) ISPD(10) ACC(9) COMPSAC(9) ICCAD(9) ASP-DAC(8) More (+10 of total 937)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1042 occurrences of 761 keywords

Results
Found 1762 publication records. Showing 1762 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Maurizio Naldi, Loretta Mastroeni Violation of Service Availability Targets in Service Level Agreements. Search on Bibsonomy FedCSIS The full citation details ... 2011 DBLP  BibTeX  RDF
15Matteo Baldoni, Cristina Baroglio, Elisa Marengo, Viviana Patti Grafting regulations into business protocols: Supporting the analysis of risks of violation. Search on Bibsonomy RELAW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Jan Sürmeli Towards Deciding Policy Violation During Service Discovery. Search on Bibsonomy ZEUS The full citation details ... 2011 DBLP  BibTeX  RDF
15Guoliang Jin, Linhai Song, Wei Zhang 0022, Shan Lu 0001, Ben Liblit Automated atomicity-violation fixing. Search on Bibsonomy PLDI The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Amit Sachan, Sabu Emmanuel DRM violation detection using consumer logs analysis. Search on Bibsonomy ICME The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Jinhyung Kim, Hyung-Jong Kim 0002 The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation. Search on Bibsonomy ACIIDS (2) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesDelayed Latching for Data Synchronization in GALS SOC. Search on Bibsonomy ICETET The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Hendrik Decker Causes of the Violation of Integrity Constraints for Supporting the Quality of Databases. Search on Bibsonomy ICCSA (5) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Sebastian Röglinger, Christian Facchi Behavior Specification of a Red-Light Violation Warning Application - An Approach for Specifying Reactive Vehicle-2-X Communication Applications. Search on Bibsonomy Nets4Cars/Nets4Trains The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Nourdine Aliane, Javier Fernández, Sergio Bemposta, Mario Mata Traffic violation alert and management. Search on Bibsonomy ITSC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Dionisis Georgopoulos The Military Model in I.T. and Computer Studies: A Violation against Women's Rights in Work and Education. Search on Bibsonomy Panhellenic Conference on Informatics The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Xin Lai, Cong Liu 0009, Zhiying Wang 0003, Quanyou Feng Analytical Models for Data Dependence Violation Checking in TLS. Search on Bibsonomy CIS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Xiaowei Li 0003, Yuan Xue 0001 BLOCK: a black-box approach for detection of state violation attacks towards web applications. Search on Bibsonomy ACSAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Charlotte Gerritsen The Bystander Effect: Agent-Based Simulation of People's Reaction to Norm Violation. Search on Bibsonomy ICONIP (3) The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
15Benjamin C. Allanach, Markus A. Bernhard Including R-parity violation in the numerical computation of the spectrum of the minimal supersymmetric standard model: SOFTSUSY3.0. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesQuantitative Design of Active Anti-Islanding Controllers for Power-Converter-Based Distributed Generators. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Turgay Çelik 0001, Huseyin Kusetogullari Solar-Powered Automated Road Surveillance System for Speed Violation Detection. Search on Bibsonomy IEEE Trans. Ind. Electron. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Nahid Amani, Pedram Hajipour, Farzaneh Seyedmostafaei An Appropriate Violation Detection Scenario for Service Level Agreements Based on WS-Agreement Protocol. Search on Bibsonomy J. Convergence Inf. Technol. The full citation details ... 2010 DBLP  BibTeX  RDF
15Yiqin Lu, Guangxue Yue, Jiajin Wang Detecting Intention-Violation Feature Interaction in NGN Based on Feature Re-presentation. Search on Bibsonomy J. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Yunsheng Zhang, Yongfei Zhang, Shixin Sun, S. Y. Qin, Zhihai He Multihop Packet Delay Bound Violation Modeling for Resource Allocation in Video Streaming Over Mesh Networks. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Satadal Saha, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu Development of an automated Red Light Violation Detection System (RLVDS) for Indian vehicles Search on Bibsonomy CoRR The full citation details ... 2010 DBLP  BibTeX  RDF
15Liping Gao, Tun Lu, Ning Gu CLAF: Solving intention violation of step-wise operations in CAD groupware. Search on Bibsonomy Adv. Eng. Informatics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Leendert W. N. van der Torre Violation games: a new foundation for deontic logic. Search on Bibsonomy J. Appl. Non Class. Logics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Amr Elmasry The Violation Heap: a Relaxed Fibonacci-like Heap. Search on Bibsonomy Discret. Math. Algorithms Appl. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15M. Reza Javaheri, Reza Sedaghat Strength violation effect on soft-error detection in sub-micron technology. Search on Bibsonomy Microelectron. Reliab. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Adam Miranowicz, Bohdan Horst, Andrzej Koper Paradoxes of measures of quantum entanglement and Bell's inequality violation in two-qubit systems. Search on Bibsonomy J. Comput. Methods Sci. Eng. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Shu Li 0001, Zuo-Jun Wang, Li-Lin Rao, Yan-Mei Li Is There a Violation of Savage's Sure-Thing Principle in the Prisoner's Dilemma Game? Search on Bibsonomy Adapt. Behav. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Thomas Bochot, Pierre Virelizier, Hélène Waeselynck, Virginie Wiels Paths to Property Violation: A Structural Approach for Analyzing Counter-Examples. Search on Bibsonomy HASE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Analysis of counterexamples, SCADE models, structural paths
15Nam Ho, Anh-Vu Dinh-Duc MemMON: run-time off-chip detection for memory access violation in embedded systems. Search on Bibsonomy SoICT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Shicong Meng, Ting Wang 0006, Ling Liu 0001 Monitoring continuous state violation in datacenters: Exploring the time dimension. Search on Bibsonomy ICDE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection. Search on Bibsonomy MICRO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Yucheng Zhou, Jiahe Xu, Yuanwei Jing, Georgi M. Dimirovski Notice of Violation of IEEE Publication Principles: Cholesky-based reduced-rank square-root ensemble Kalman filtering. Search on Bibsonomy ACC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Yucheng Zhou, Jiahe Xu, Yuanwei Jing, Georgi M. Dimirovski Notice of Violation of IEEE Publication Principles: Extended target tracking using an IMM based nonlinear Kalman filters. Search on Bibsonomy ACC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Oliver Marschollek, Roman Beck, Robert Wayne Gregory Psychological Contract Violation in IT Megaprojects in the Context of Public Private Partnerships: The German TollCollect Case. Search on Bibsonomy ECIS The full citation details ... 2010 DBLP  BibTeX  RDF
15Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed An Approach for Ensuring Robust Safeguard against Location Privacy Violation. Search on Bibsonomy COMPSAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Ivona Brandic, Vincent C. Emeakaroha, Michael Maurer, Schahram Dustdar, Sandor Acs, Attila Kertész, Gabor Kecskemeti LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Gregor Gößler, Daniel Le Métayer, Jean-Baptiste Raclet Causality Analysis in Contract Violation. Search on Bibsonomy RV The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Boya Sun, Andy Podgurski, Soumya Ray Improving the Precision of Dependence-Based Defect Mining by Supervised Learning of Rule and Violation Graphs. Search on Bibsonomy ISSRE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Soufiene Djahel, Farid Naït-Abdesselam Thwarting back-off rules violation in tactical wireless ad hoc networks. Search on Bibsonomy ISCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Abdul-Wahid A. Saif, Haytham Sammak, Diya Matar, Omar Al-Midani Automatic monitoring and speed violation ticket system. Search on Bibsonomy SMC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Jinhyung Kim, Hyung Jong Kim 0002 Design of internal information leakage detection system considering the privacy violation. Search on Bibsonomy ICTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Jae-Hyuk Youn, Hoon-Gee Yang Synchronization using a violation bit in 13.56MHz PJM mode RFID. Search on Bibsonomy ICTC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesA Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks. Search on Bibsonomy ICETET The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Chia-Chun Tsai, Chung-Chieh Kuo, Lin-Jeng Gu, Trong-Yen Lee Antenna Violation Avoidance/Fixing for X-clock routing. Search on Bibsonomy ISQED The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Amr Elmasry The Violation Heap: A Relaxed Fibonacci-Like Heap. Search on Bibsonomy COCOON The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Marisa Ferrara Boston The Role of Memory in Superiority Violation Gradience. Search on Bibsonomy CMCL@ACL The full citation details ... 2010 DBLP  BibTeX  RDF
15J. S. Lee, M. Carena, J. Ellis, Apostolos Pilaftsis, C. E. M. Wagner CPsuperH2.0: An improved computational tool for Higgs phenomenology in the MSSM with explicit CP violation. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Tim Goles, Srinivasan V. Rao, Simon Lee, John Warren Trust Violation in Electronic Commerce: Customer Concerns and Reactions. Search on Bibsonomy J. Comput. Inf. Syst. The full citation details ... 2009 DBLP  BibTeX  RDF
15Yongping Li, Guo H. Huang Fuzzy-stochastic-based violation analysis method for planning water resources management systems with uncertain information. Search on Bibsonomy Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Andrei Yu. Khrennikov Nonlocality as well as rejection of realism are only sufficient (but non-necessary!) conditions for violation of Bell's inequality. Search on Bibsonomy Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Andreja Bubic, D. Yves von Cramon, Thomas Jacobsen, Erich Schröger, Ricarda I. Schubotz Violation of Expectation: Neural Correlates Reflect Bases of Prediction. Search on Bibsonomy J. Cogn. Neurosci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Douglas J. Davidson, Peter Indefrey An Event-related Potential Study on Changes of Violation and Error Responses during Morphosyntactic Learning. Search on Bibsonomy J. Cogn. Neurosci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Hossein Movahhedian Violation of equalities in bipartite qutrits systems. Search on Bibsonomy Quantum Inf. Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Qinyu Liao, Xin (Robert) Luo, Anil Gurung Rebuilding Post-Violation Trust in B2C Electronic Commerce. Search on Bibsonomy J. Organ. End User Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesOntology-based semantic recommendation system in home network environment. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Hejiao Huang, Hélène Kirchner, Songyun Liu, Weili Wu 0001 Handling inheritance violation for secure interoperation of heterogeneous systems. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Kosuke Kato, Masatoshi Sakawa, Keiichi Ishimaru, Satoshi Ushiro Operation Planning of District Heating and Cooling Plants Considering Contract Violation Penalties. Search on Bibsonomy J. Adv. Comput. Intell. Intell. Informatics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Giuseppe Carlo Calafiore A note on the expected probability of constraint violation in sampled convex programs. Search on Bibsonomy CCA/ISIC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Carson D. Brown, David Barrera 0003, Dwight Deugo FiGD: An Open Source Intellectual Property Violation Detector. Search on Bibsonomy SEKE The full citation details ... 2009 DBLP  BibTeX  RDF
15Guihai Yan, Yinhe Han 0001, Xiaowei Li 0001 A unified online Fault Detection scheme via checking of Stability Violation. Search on Bibsonomy DATE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Hirotaka Kaji, Kokolo Ikeda, Hajime Kita Avoidance of constraint violation for experiment-based evolutionary multi-objective optimization. Search on Bibsonomy IEEE Congress on Evolutionary Computation The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesSystematically Identifying Genes and Pathways in Multiple Cancer Types Using HGD & PSO-SVM. Search on Bibsonomy IJCBS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesImmune Selection Algorithm-Based User Authentication System. Search on Bibsonomy FCST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Ahmed Awad 0001, Mathias Weske Visualization of Compliance Violation in Business Process Models. Search on Bibsonomy Business Process Management Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Ryoichi Kawahara, Eng Keong Lua, Masato Uchida, Satoshi Kamei, Hideaki Yoshino On the Quality of Triangle Inequality Violation Aware Routing Overlay Architecture. Search on Bibsonomy INFOCOM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Tarik Graba, Jean-Luc Danger WDDL is Protected against Setup Time Violation Attacks. Search on Bibsonomy FDTC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. Search on Bibsonomy HOST The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Charlotte Gerritsen, Mark Hoogendoorn Avoidance of Norm Violation in Multi-Agent Organizations. Search on Bibsonomy ECMS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesA Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval). Search on Bibsonomy DASC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15MingXue Wang, Kosala Yapa Bandara, Claus Pahl Integrated Constraint Violation Handling for Dynamic Service Composition. Search on Bibsonomy IEEE SCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Giuseppe Degrassi, Paolo Gambino, P. Slavich SusyBSG: a Fortran code for BR[B->Xsgamma] in the MSSM with Minimal Flavor Violation. Search on Bibsonomy Comput. Phys. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Xinyu Wang 0001, Jianling Sun, Xiaohu Yang 0001, Chao Huang, Di Wu Security Violation Detection for RBAC Based Interoperation in Distributed Environment. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Boris P. Bezruchko, Vladimir I. Ponomarenko, Mikhail D. Prokhorov, Ye. P. Seleznev Violation of the Final States Probability Symmetry for Experimental Time-Delay System and Coupled Maps with Time-Varying Parameters. Search on Bibsonomy Int. J. Bifurc. Chaos The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Na Chen 0001, Scott Jordan Violation Probability in Processor-Sharing Queues. Search on Bibsonomy IEEE Trans. Autom. Control. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Amr Elmasry Violation Heaps: A Better Substitute for Fibonacci Heaps Search on Bibsonomy CoRR The full citation details ... 2008 DBLP  BibTeX  RDF
15Giancarlo La Camera, Barry J. Richmond Modeling the Violation of Reward Maximization and Invariance in Reinforcement Schedules. Search on Bibsonomy PLoS Comput. Biol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesDevelopment of web spatial applications based on MapGuide open source. Search on Bibsonomy ITI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesExploring Fault-tolerant Distributed Storage System using GE code. Search on Bibsonomy ICESS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: Research on a novel MAS for automated negotiation method. Search on Bibsonomy ISKE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesMeasuring the Quality of Software Modularization Using Coupling-Based Structural Metrics for an OOS System. Search on Bibsonomy ICETET The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Shyam K. Gupta 0001, Anand Gupta, Renu Damor, Vikram Goyal, Sangeeta Sabharwal Context Honeypot: A Framework for Anticipatory Privacy Violation. Search on Bibsonomy ICETET The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Zdenek Letko, Tomás Vojnar, Bohuslav Krena AtomRace: data race and atomicity violation detector and healer. Search on Bibsonomy PADTAD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Ying Zhang 0022, Zhuoqing Morley Mao, Ming Zhang 0005 Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs. Search on Bibsonomy HotNets The full citation details ... 2008 DBLP  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesA foundation for knowledge system with application in information retrieval and knowledge acquisition. Search on Bibsonomy NLPKE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesAdaptive Load Balancing Algorithm over Heterogeneous Workstations. Search on Bibsonomy GCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Han Tang, Bruce M. McMillin Security Property Violation in CPS through Timing. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesAsymmetric Path Optimization In Mobile Multi-homed SCTP Multimedia Transport. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Asymmetric path, RTT measurement, SCTP, Multihoming
15 Notice of Violation of IEEE Publication PrinciplesAn Implementation of Fuzzy Clustering with Size and Shape Constraints. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Paolo Traina Violation of Local Realism for Ququats. Search on Bibsonomy Open Syst. Inf. Dyn. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: A low reference spurs 1-5 GHz 0.13 μm CMOS frequency synthesizer using a fully-sampled feed-forward loop filter architecture. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: A 3.3 V 12.5 Gb/s 0.2 µm SiGe BiCMOS Laser Diode Driver Using Bias Current Modulation Cancellation. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication Principles: A 54 dBOmega + 42 dB 10 Gb/s SiGe transimpedance-limiting amplifier using bootstrap photodiode capacitance neutralization and vertical threshold adjustment. Search on Bibsonomy IEEE J. Solid State Circuits The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Srinivasan V. Rao, Sang Jun Lee Responses to Trust Violation: A Theoretical Framework. Search on Bibsonomy J. Comput. Inf. Syst. The full citation details ... 2007 DBLP  BibTeX  RDF
15Vicki L. Neale, Miguel A. Perez, Suzanne E. Lee, Zachary R. Doerzaph Investigation of Driver-Infrastructure and Driver-Vehicle Interfaces for an Intersection Violation Warning System. Search on Bibsonomy J. Intell. Transp. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Richard H. Stern Federal Appeals Court Sees Potential Antitrust Violation in Standardization Skullduggery. Search on Bibsonomy IEEE Micro The full citation details ... 2007 DBLP  DOI  BibTeX  RDF antitrust policy, RAND, standardization, law, patents, licensing
15Carlos Marques, Sylvain Moreno, São Luís Castro, Mireille Besson Musicians Detect Pitch Violation in a Foreign Language Better Than Nonmusicians: Behavioral and Electrophysiological Evidence. Search on Bibsonomy J. Cogn. Neurosci. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15 Notice of Violation of IEEE Publication PrinciplesModified Syntactic Method to Recognize Bengali Handwritten Characters. Search on Bibsonomy IEEE Trans. Instrum. Meas. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Namshin Kim, Christopher J. Lee Three-Dimensional Phylogeny Explorer: Distinguishing paralogs, lateral transfer, and violation of "molecular clock" assumption with 3D visualization. Search on Bibsonomy BMC Bioinform. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Bor-Yiing Su, Yao-Wen Chang, Jiang Hu An Exact Jumper-Insertion Algorithm for Antenna Violation Avoidance/Fixing Considering Routing Obstacles. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Narayanan Kulathuramaiyer, Hermann A. Maurer Fighting plagiarism and IPR violation: why is it so important? Search on Bibsonomy Learn. Publ. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 1762 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license