Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Maurizio Naldi, Loretta Mastroeni |
Violation of Service Availability Targets in Service Level Agreements. |
FedCSIS |
2011 |
DBLP BibTeX RDF |
|
15 | Matteo Baldoni, Cristina Baroglio, Elisa Marengo, Viviana Patti |
Grafting regulations into business protocols: Supporting the analysis of risks of violation. |
RELAW |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Jan Sürmeli |
Towards Deciding Policy Violation During Service Discovery. |
ZEUS |
2011 |
DBLP BibTeX RDF |
|
15 | Guoliang Jin, Linhai Song, Wei Zhang 0022, Shan Lu 0001, Ben Liblit |
Automated atomicity-violation fixing. |
PLDI |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Amit Sachan, Sabu Emmanuel |
DRM violation detection using consumer logs analysis. |
ICME |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Jinhyung Kim, Hyung-Jong Kim 0002 |
The Data Modeling Considered Correlation of Information Leakage Detection and Privacy Violation. |
ACIIDS (2) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesDelayed Latching for Data Synchronization in GALS SOC. |
ICETET |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Hendrik Decker |
Causes of the Violation of Integrity Constraints for Supporting the Quality of Databases. |
ICCSA (5) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Sebastian Röglinger, Christian Facchi |
Behavior Specification of a Red-Light Violation Warning Application - An Approach for Specifying Reactive Vehicle-2-X Communication Applications. |
Nets4Cars/Nets4Trains |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Nourdine Aliane, Javier Fernández, Sergio Bemposta, Mario Mata |
Traffic violation alert and management. |
ITSC |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Dionisis Georgopoulos |
The Military Model in I.T. and Computer Studies: A Violation against Women's Rights in Work and Education. |
Panhellenic Conference on Informatics |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Xin Lai, Cong Liu 0009, Zhiying Wang 0003, Quanyou Feng |
Analytical Models for Data Dependence Violation Checking in TLS. |
CIS |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Xiaowei Li 0003, Yuan Xue 0001 |
BLOCK: a black-box approach for detection of state violation attacks towards web applications. |
ACSAC |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Charlotte Gerritsen |
The Bystander Effect: Agent-Based Simulation of People's Reaction to Norm Violation. |
ICONIP (3) |
2011 |
DBLP DOI BibTeX RDF |
|
15 | Benjamin C. Allanach, Markus A. Bernhard |
Including R-parity violation in the numerical computation of the spectrum of the minimal supersymmetric standard model: SOFTSUSY3.0. |
Comput. Phys. Commun. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesQuantitative Design of Active Anti-Islanding Controllers for Power-Converter-Based Distributed Generators. |
IEEE Trans. Ind. Electron. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Turgay Çelik 0001, Huseyin Kusetogullari |
Solar-Powered Automated Road Surveillance System for Speed Violation Detection. |
IEEE Trans. Ind. Electron. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Nahid Amani, Pedram Hajipour, Farzaneh Seyedmostafaei |
An Appropriate Violation Detection Scenario for Service Level Agreements Based on WS-Agreement Protocol. |
J. Convergence Inf. Technol. |
2010 |
DBLP BibTeX RDF |
|
15 | Yiqin Lu, Guangxue Yue, Jiajin Wang |
Detecting Intention-Violation Feature Interaction in NGN Based on Feature Re-presentation. |
J. Networks |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yunsheng Zhang, Yongfei Zhang, Shixin Sun, S. Y. Qin, Zhihai He |
Multihop Packet Delay Bound Violation Modeling for Resource Allocation in Video Streaming Over Mesh Networks. |
IEEE Trans. Multim. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Satadal Saha, Subhadip Basu, Mita Nasipuri, Dipak Kumar Basu |
Development of an automated Red Light Violation Detection System (RLVDS) for Indian vehicles |
CoRR |
2010 |
DBLP BibTeX RDF |
|
15 | Liping Gao, Tun Lu, Ning Gu |
CLAF: Solving intention violation of step-wise operations in CAD groupware. |
Adv. Eng. Informatics |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Leendert W. N. van der Torre |
Violation games: a new foundation for deontic logic. |
J. Appl. Non Class. Logics |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Amr Elmasry |
The Violation Heap: a Relaxed Fibonacci-like Heap. |
Discret. Math. Algorithms Appl. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | M. Reza Javaheri, Reza Sedaghat |
Strength violation effect on soft-error detection in sub-micron technology. |
Microelectron. Reliab. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Adam Miranowicz, Bohdan Horst, Andrzej Koper |
Paradoxes of measures of quantum entanglement and Bell's inequality violation in two-qubit systems. |
J. Comput. Methods Sci. Eng. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Shu Li 0001, Zuo-Jun Wang, Li-Lin Rao, Yan-Mei Li |
Is There a Violation of Savage's Sure-Thing Principle in the Prisoner's Dilemma Game? |
Adapt. Behav. |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Bochot, Pierre Virelizier, Hélène Waeselynck, Virginie Wiels |
Paths to Property Violation: A Structural Approach for Analyzing Counter-Examples. |
HASE |
2010 |
DBLP DOI BibTeX RDF |
Analysis of counterexamples, SCADE models, structural paths |
15 | Nam Ho, Anh-Vu Dinh-Duc |
MemMON: run-time off-chip detection for memory access violation in embedded systems. |
SoICT |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Shicong Meng, Ting Wang 0006, Ling Liu 0001 |
Monitoring continuous state violation in datacenters: Exploring the time dimension. |
ICDE |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Abdullah Muzahid, Norimasa Otsuki, Josep Torrellas |
AtomTracker: A Comprehensive Approach to Atomic Region Inference and Violation Detection. |
MICRO |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yucheng Zhou, Jiahe Xu, Yuanwei Jing, Georgi M. Dimirovski |
Notice of Violation of IEEE Publication Principles: Cholesky-based reduced-rank square-root ensemble Kalman filtering. |
ACC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Yucheng Zhou, Jiahe Xu, Yuanwei Jing, Georgi M. Dimirovski |
Notice of Violation of IEEE Publication Principles: Extended target tracking using an IMM based nonlinear Kalman filters. |
ACC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Oliver Marschollek, Roman Beck, Robert Wayne Gregory |
Psychological Contract Violation in IT Megaprojects in the Context of Public Private Partnerships: The German TollCollect Case. |
ECIS |
2010 |
DBLP BibTeX RDF |
|
15 | Chowdhury Sharif Hasan, Sheikh Iqbal Ahamed |
An Approach for Ensuring Robust Safeguard against Location Privacy Violation. |
COMPSAC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Ivona Brandic, Vincent C. Emeakaroha, Michael Maurer, Schahram Dustdar, Sandor Acs, Attila Kertész, Gabor Kecskemeti |
LAYSI: A Layered Approach for SLA-Violation Propagation in Self-Manageable Cloud Infrastructures. |
COMPSAC Workshops |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Gregor Gößler, Daniel Le Métayer, Jean-Baptiste Raclet |
Causality Analysis in Contract Violation. |
RV |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Boya Sun, Andy Podgurski, Soumya Ray |
Improving the Precision of Dependence-Based Defect Mining by Supervised Learning of Rule and Violation Graphs. |
ISSRE |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Soufiene Djahel, Farid Naït-Abdesselam |
Thwarting back-off rules violation in tactical wireless ad hoc networks. |
ISCC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Abdul-Wahid A. Saif, Haytham Sammak, Diya Matar, Omar Al-Midani |
Automatic monitoring and speed violation ticket system. |
SMC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jinhyung Kim, Hyung Jong Kim 0002 |
Design of internal information leakage detection system considering the privacy violation. |
ICTC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Jae-Hyuk Youn, Hoon-Gee Yang |
Synchronization using a violation bit in 13.56MHz PJM mode RFID. |
ICTC |
2010 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesA Performance Comparison of Routing Protocols for Security Issue in Wireless Mobile Ad Hoc Networks. |
ICETET |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Chia-Chun Tsai, Chung-Chieh Kuo, Lin-Jeng Gu, Trong-Yen Lee |
Antenna Violation Avoidance/Fixing for X-clock routing. |
ISQED |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Amr Elmasry |
The Violation Heap: A Relaxed Fibonacci-Like Heap. |
COCOON |
2010 |
DBLP DOI BibTeX RDF |
|
15 | Marisa Ferrara Boston |
The Role of Memory in Superiority Violation Gradience. |
CMCL@ACL |
2010 |
DBLP BibTeX RDF |
|
15 | J. S. Lee, M. Carena, J. Ellis, Apostolos Pilaftsis, C. E. M. Wagner |
CPsuperH2.0: An improved computational tool for Higgs phenomenology in the MSSM with explicit CP violation. |
Comput. Phys. Commun. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Tim Goles, Srinivasan V. Rao, Simon Lee, John Warren |
Trust Violation in Electronic Commerce: Customer Concerns and Reactions. |
J. Comput. Inf. Syst. |
2009 |
DBLP BibTeX RDF |
|
15 | Yongping Li, Guo H. Huang |
Fuzzy-stochastic-based violation analysis method for planning water resources management systems with uncertain information. |
Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Andrei Yu. Khrennikov |
Nonlocality as well as rejection of realism are only sufficient (but non-necessary!) conditions for violation of Bell's inequality. |
Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Andreja Bubic, D. Yves von Cramon, Thomas Jacobsen, Erich Schröger, Ricarda I. Schubotz |
Violation of Expectation: Neural Correlates Reflect Bases of Prediction. |
J. Cogn. Neurosci. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Douglas J. Davidson, Peter Indefrey |
An Event-related Potential Study on Changes of Violation and Error Responses during Morphosyntactic Learning. |
J. Cogn. Neurosci. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Hossein Movahhedian |
Violation of equalities in bipartite qutrits systems. |
Quantum Inf. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Qinyu Liao, Xin (Robert) Luo, Anil Gurung |
Rebuilding Post-Violation Trust in B2C Electronic Commerce. |
J. Organ. End User Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesOntology-based semantic recommendation system in home network environment. |
IEEE Trans. Consumer Electron. |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Hejiao Huang, Hélène Kirchner, Songyun Liu, Weili Wu 0001 |
Handling inheritance violation for secure interoperation of heterogeneous systems. |
Int. J. Secur. Networks |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Kosuke Kato, Masatoshi Sakawa, Keiichi Ishimaru, Satoshi Ushiro |
Operation Planning of District Heating and Cooling Plants Considering Contract Violation Penalties. |
J. Adv. Comput. Intell. Intell. Informatics |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Giuseppe Carlo Calafiore |
A note on the expected probability of constraint violation in sampled convex programs. |
CCA/ISIC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Carson D. Brown, David Barrera 0003, Dwight Deugo |
FiGD: An Open Source Intellectual Property Violation Detector. |
SEKE |
2009 |
DBLP BibTeX RDF |
|
15 | Guihai Yan, Yinhe Han 0001, Xiaowei Li 0001 |
A unified online Fault Detection scheme via checking of Stability Violation. |
DATE |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Hirotaka Kaji, Kokolo Ikeda, Hajime Kita |
Avoidance of constraint violation for experiment-based evolutionary multi-objective optimization. |
IEEE Congress on Evolutionary Computation |
2009 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesSystematically Identifying Genes and Pathways in Multiple Cancer Types Using HGD & PSO-SVM. |
IJCBS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesImmune Selection Algorithm-Based User Authentication System. |
FCST |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ahmed Awad 0001, Mathias Weske |
Visualization of Compliance Violation in Business Process Models. |
Business Process Management Workshops |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Ryoichi Kawahara, Eng Keong Lua, Masato Uchida, Satoshi Kamei, Hideaki Yoshino |
On the Quality of Triangle Inequality Violation Aware Routing Overlay Architecture. |
INFOCOM |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Nidhal Selmane, Shivam Bhasin, Sylvain Guilley, Tarik Graba, Jean-Luc Danger |
WDDL is Protected against Setup Time Violation Attacks. |
FDTC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Shivam Bhasin, Jean-Luc Danger, Sylvain Guilley, Nidhal Selmane |
Security Evaluation of Different AES Implementations Against Practical Setup Time Violation Attacks in FPGAs. |
HOST |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Charlotte Gerritsen, Mark Hoogendoorn |
Avoidance of Norm Violation in Multi-Agent Organizations. |
ECMS |
2009 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesA Tool for Identifying Ragas Using MIDI (Musical Instrument Devices) for CMIR (Classical Music Information Retrieval). |
DASC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | MingXue Wang, Kosala Yapa Bandara, Claus Pahl |
Integrated Constraint Violation Handling for Dynamic Service Composition. |
IEEE SCC |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Giuseppe Degrassi, Paolo Gambino, P. Slavich |
SusyBSG: a Fortran code for BR[B->Xsgamma] in the MSSM with Minimal Flavor Violation. |
Comput. Phys. Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Xinyu Wang 0001, Jianling Sun, Xiaohu Yang 0001, Chao Huang, Di Wu |
Security Violation Detection for RBAC Based Interoperation in Distributed Environment. |
IEICE Trans. Inf. Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Boris P. Bezruchko, Vladimir I. Ponomarenko, Mikhail D. Prokhorov, Ye. P. Seleznev |
Violation of the Final States Probability Symmetry for Experimental Time-Delay System and Coupled Maps with Time-Varying Parameters. |
Int. J. Bifurc. Chaos |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Na Chen 0001, Scott Jordan |
Violation Probability in Processor-Sharing Queues. |
IEEE Trans. Autom. Control. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Amr Elmasry |
Violation Heaps: A Better Substitute for Fibonacci Heaps |
CoRR |
2008 |
DBLP BibTeX RDF |
|
15 | Giancarlo La Camera, Barry J. Richmond |
Modeling the Violation of Reward Maximization and Invariance in Reinforcement Schedules. |
PLoS Comput. Biol. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesDevelopment of web spatial applications based on MapGuide open source. |
ITI |
2008 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesExploring Fault-tolerant Distributed Storage System using GE code. |
ICESS |
2008 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: Research on a novel MAS for automated negotiation method. |
ISKE |
2008 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesMeasuring the Quality of Software Modularization Using Coupling-Based Structural Metrics for an OOS System. |
ICETET |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Shyam K. Gupta 0001, Anand Gupta, Renu Damor, Vikram Goyal, Sangeeta Sabharwal |
Context Honeypot: A Framework for Anticipatory Privacy Violation. |
ICETET |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Zdenek Letko, Tomás Vojnar, Bohuslav Krena |
AtomRace: data race and atomicity violation detector and healer. |
PADTAD |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ying Zhang 0022, Zhuoqing Morley Mao, Ming Zhang 0005 |
Ascertaining the Reality of Network Neutrality Violation in Backbone ISPs. |
HotNets |
2008 |
DBLP BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesA foundation for knowledge system with application in information retrieval and knowledge acquisition. |
NLPKE |
2008 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesAdaptive Load Balancing Algorithm over Heterogeneous Workstations. |
GCC |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Han Tang, Bruce M. McMillin |
Security Property Violation in CPS through Timing. |
ICDCS Workshops |
2008 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesAsymmetric Path Optimization In Mobile Multi-homed SCTP Multimedia Transport. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
Asymmetric path, RTT measurement, SCTP, Multihoming |
15 | |
Notice of Violation of IEEE Publication PrinciplesAn Implementation of Fuzzy Clustering with Size and Shape Constraints. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Paolo Traina |
Violation of Local Realism for Ququats. |
Open Syst. Inf. Dyn. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: A low reference spurs 1-5 GHz 0.13 μm CMOS frequency synthesizer using a fully-sampled feed-forward loop filter architecture. |
IEEE J. Solid State Circuits |
2007 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: A 3.3 V 12.5 Gb/s 0.2 µm SiGe BiCMOS Laser Diode Driver Using Bias Current Modulation Cancellation. |
IEEE J. Solid State Circuits |
2007 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication Principles: A 54 dBOmega + 42 dB 10 Gb/s SiGe transimpedance-limiting amplifier using bootstrap photodiode capacitance neutralization and vertical threshold adjustment. |
IEEE J. Solid State Circuits |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Srinivasan V. Rao, Sang Jun Lee |
Responses to Trust Violation: A Theoretical Framework. |
J. Comput. Inf. Syst. |
2007 |
DBLP BibTeX RDF |
|
15 | Vicki L. Neale, Miguel A. Perez, Suzanne E. Lee, Zachary R. Doerzaph |
Investigation of Driver-Infrastructure and Driver-Vehicle Interfaces for an Intersection Violation Warning System. |
J. Intell. Transp. Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Richard H. Stern |
Federal Appeals Court Sees Potential Antitrust Violation in Standardization Skullduggery. |
IEEE Micro |
2007 |
DBLP DOI BibTeX RDF |
antitrust policy, RAND, standardization, law, patents, licensing |
15 | Carlos Marques, Sylvain Moreno, São Luís Castro, Mireille Besson |
Musicians Detect Pitch Violation in a Foreign Language Better Than Nonmusicians: Behavioral and Electrophysiological Evidence. |
J. Cogn. Neurosci. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | |
Notice of Violation of IEEE Publication PrinciplesModified Syntactic Method to Recognize Bengali Handwritten Characters. |
IEEE Trans. Instrum. Meas. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Namshin Kim, Christopher J. Lee |
Three-Dimensional Phylogeny Explorer: Distinguishing paralogs, lateral transfer, and violation of "molecular clock" assumption with 3D visualization. |
BMC Bioinform. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Bor-Yiing Su, Yao-Wen Chang, Jiang Hu |
An Exact Jumper-Insertion Algorithm for Antenna Violation Avoidance/Fixing Considering Routing Obstacles. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Narayanan Kulathuramaiyer, Hermann A. Maurer |
Fighting plagiarism and IPR violation: why is it so important? |
Learn. Publ. |
2007 |
DBLP DOI BibTeX RDF |
|