The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for violations with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1975-1987 (16) 1988-1990 (19) 1991-1993 (19) 1994-1996 (26) 1997 (19) 1998 (33) 1999 (24) 2000 (35) 2001 (41) 2002 (56) 2003 (79) 2004 (94) 2005 (144) 2006 (161) 2007 (173) 2008 (154) 2009 (144) 2010 (67) 2011 (48) 2012 (45) 2013 (31) 2014 (50) 2015 (55) 2016 (62) 2017 (47) 2018 (70) 2019 (64) 2020 (60) 2021 (83) 2022 (102) 2023 (86) 2024 (21)
Publication types (Num. hits)
article(569) book(1) incollection(7) inproceedings(1535) phdthesis(16)
Venues (Conferences, Journals, ...)
CoRR(92) DAC(41) IEEE Trans. Comput. Aided Des....(28) IEEE Trans. Software Eng.(28) PLDI(21) ICSE(19) ASP-DAC(18) CogSci(18) ICCAD(18) DATE(17) ESEC/SIGSOFT FSE(16) ISPD(15) CAV(14) HICSS(14) ASE(13) IEEE Trans. Very Large Scale I...(13) More (+10 of total 994)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1559 occurrences of 1018 keywords

Results
Found 2128 publication records. Showing 2128 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
14Shin-Li Lu, Chen-Fang Tsai, Jen-Hsiang Chen EWMA Control Charts for Statistical Detecting QoS Violations. Search on Bibsonomy ICEBE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Ramneek, Patrick Hosein, Wonjun Choi, Woojin Seok Detecting network neutrality violations through packet loss statistics. Search on Bibsonomy APNOMS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Silvia Puglisi, David Rebollo-Monedero, Jordi Forné Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications. Search on Bibsonomy TrustCom/BigDataSE/ISPA (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Stefano Carrese, Marialisa Nigro, Sergio Maria Patella Analysis of the demand for an electronic advise of traffic code violations. Search on Bibsonomy MT-ITS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Jeremie Miserez, Pavol Bielik, Ahmed El-Hassany, Laurent Vanbever, Martin T. Vechev SDNRacer: detecting concurrency violations in software-defined networks. Search on Bibsonomy SOSR The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Arash Jahangiri, Hesham A. Rakha, Thomas A. Dingus Adopting Machine Learning Methods to Predict Red-light Running Violations. Search on Bibsonomy ITSC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Pavel Avgustinov, Arthur I. Baars, Anders Starcke Henriksen, R. Greg Lavender, Galen Menzel, Oege de Moor, Max Schäfer, Julian Tibble Tracking Static Analysis Violations over Time to Capture Developer Characteristics. Search on Bibsonomy ICSE (1) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Nikolas Martelaro, Malte F. Jung, Pamela J. Hinds Using Robots to Moderate Team Conflict: The Case of Repairing Violations. Search on Bibsonomy HRI (Extended Abstracts) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Malte F. Jung, Nikolas Martelaro, Pamela J. Hinds Using Robots to Moderate Team Conflict: The Case of Repairing Violations. Search on Bibsonomy HRI The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Hongyi Ma, Liqiang Wang, Krishanthan Krishnamoorthy Detecting Thread-Safety Violations in Hybrid OpenMP/MPI Programs. Search on Bibsonomy CLUSTER The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
14Michael Nofer, Oliver Hinz, Jan Muntermann, Heiko Roßnagel The Economic Impact of Privacy Violations and Security Breaches - A Laboratory Experiment. Search on Bibsonomy Bus. Inf. Syst. Eng. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14David Harel, Guy Katz, Assaf Marron, Gera Weiss Non-intrusive Repair of Safety and Liveness Violations in Reactive Programs. Search on Bibsonomy Trans. Comput. Collect. Intell. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Feng Qiu, Shabbir Ahmed 0001, Santanu S. Dey, Laurence A. Wolsey Covering Linear Programming with Violations. Search on Bibsonomy INFORMS J. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Carlos Müller, Marc Oriol, Xavier Franch, Jordi Marco, Manuel Resinas, Antonio Ruiz Cortés, Marc Rodríguez 0002 Comprehensive Explanation of SLA Violations at Runtime. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Hossein Morshedlou, Mohammad Reza Meybodi Decreasing Impact of SLA Violations: A Proactive Resource Allocation Approachfor Cloud Computing Environments. Search on Bibsonomy IEEE Trans. Cloud Comput. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Aneta Kielar, Jed A. Meltzer, Sylvain Moreno, Claude Alain, Ellen Bialystok Oscillatory Responses to Semantic and Syntactic Violations. Search on Bibsonomy J. Cogn. Neurosci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Leila Jasmine Bridgeman, James Richard Forbes Conic-sector-based control to circumvent passivity violations. Search on Bibsonomy Int. J. Control The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Georg Schildbach, Lorenzo Fagiano, Christoph Frei, Manfred Morari The scenario approach for Stochastic Model Predictive Control with bounds on closed-loop constraint violations. Search on Bibsonomy Autom. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Daniele Rossi 0001, Martin Omaña 0001, José Manuel Cazeaux, Cecilia Metra, T. M. Mak Clock Faults Induced Min and Max Delay Violations. Search on Bibsonomy J. Electron. Test. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Evgeny Nikulchev 0001 Robust Chaos Generation on the Basis of Symmetry Violations in Attractors. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
14Vladimir V. V'yugin On Stability Property of Probability Laws with Respect to Small Violations of Algorithmic Randomness. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
14Özgür Kafali, Akin Günay, Pinar Yolum Detecting and predicting privacy violations in online social networks. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Dragana Miljkovic, Matjaz Depolli, Tjasa Stare, Igor Mozetic, Marko Petek, Kristina Gruden, Nada Lavrac Plant defence model revisions through iterative minimisation of constraint violations. Search on Bibsonomy Int. J. Comput. Biol. Drug Des. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Mikko T. Siponen, Anthony Vance Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14James W. Boudreau, Justin A. Ehrlich, Shane Sanders, Adam Winn Social choice violations in rank sum scoring: A formalization of conditions and corrective probability computations. Search on Bibsonomy Math. Soc. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14George Beskales, Ihab F. Ilyas, Lukasz Golab, Artur Galiullin Sampling from repairs of conditional functional dependency violations. Search on Bibsonomy VLDB J. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Frank Irmler, Reiner Creutzburg Possibilities for retracing of copyright violations on current video game consoles by optical disk analysis. Search on Bibsonomy MOBMU The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Alessandro Solimando Detecting and Correcting Conservativity Principle Violations in Ontology Mappings. Search on Bibsonomy ISWC (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Alessandro Solimando, Ernesto Jiménez-Ruiz, Giovanna Guerrini Detecting and Correcting Conservativity Principle Violations in Ontology-to-Ontology Mappings. Search on Bibsonomy ISWC (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Peng Liu 0010, Omer Tripp, Xiangyu Zhang 0001 Flint: fixing linearizability violations. Search on Bibsonomy OOPSLA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Karim Al-Yafi, Nitham Mohammed Hindi, Ibrahim H. Osman Exploring User Satisfaction of the Public e-Services in the State of Qatar: Case of Traffic Violations e-Service Provided by the Ministry of Interior. Search on Bibsonomy AMCIS The full citation details ... 2014 DBLP  BibTeX  RDF
14Dustin Rhodes, Tim Disney, Cormac Flanagan Dynamic detection of object capability violations through model checking. Search on Bibsonomy DLS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Christos Tsigkanos, Liliana Pasquale, Claudio Menghi, Carlo Ghezzi, Bashar Nuseibeh Engineering topology aware adaptive security: Preventing requirements violations at runtime. Search on Bibsonomy RE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Sambuddha Bhattacharya, Subramanian Rajagopalan, Shabbir H. Batterywala Fixing Double Patterning violations with look-ahead. Search on Bibsonomy ASP-DAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Moning Zhang, Zuochang Ye Tackling close-to-band passivity violations in passive macro-modeling. Search on Bibsonomy ASP-DAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Rüdiger Ehlers, Ufuk Topcu Resilience to intermittent assumption violations in reactive synthesis. Search on Bibsonomy HSCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Michael J. Maher Complexity of Exploiting Privacy Violations in Strategic Argumentation. Search on Bibsonomy PRICAI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Catello Di Martino, Daniel Chen 0001, Geetika Goel, Rajeshwari Ganesan, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer Analysis and Diagnosis of SLA Violations in a Production SaaS Cloud. Search on Bibsonomy ISSRE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Anderson Francisco Talon, Edmundo Roberto Mauro Madeira, Maria Beatriz Felgar de Toledo Self-Adaptive Fuzzy Architecture to Predict and Decrease e-Contract Violations. Search on Bibsonomy BRACIS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Jesse Zee, Gerrit Storms, Steven Verheyen Violations of the Local Independence Assumption in Categorization. Search on Bibsonomy CogSci The full citation details ... 2014 DBLP  BibTeX  RDF
14Chu He, Zijing Tan, Qing Chen, Chaofeng Sha, Zhihui Wang 0009, Wei Wang 0009 Repair Diversification for Functional Dependency Violations. Search on Bibsonomy DASFAA (2) The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Özlem Karaca, Jérôme Kirscher, Linus Maurer, Georg Pelz Towards simulation based evaluation of safety goal violations in automotive systems. Search on Bibsonomy FDL The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Alessandro Solimando, Ernesto Jiménez-Ruiz, Giovanna Guerrini A Multi-strategy Approach for Detecting and Correcting Conservativity Principle Violations in Ontology Alignments. Search on Bibsonomy OWLED The full citation details ... 2014 DBLP  BibTeX  RDF
14Lu Zhang 0035, Chao Wang 0001 Runtime prevention of concurrency related type-state violations in multithreaded applications. Search on Bibsonomy ISSTA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Behzad Bordbar, Ahmed Al-Ajeli, Mohammed Ibrahim Alodib On Diagnosis of Violations of Constraints in Petri Net Models of Discrete Event Systems. Search on Bibsonomy ICTAI The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Qing Hu 0003, Robert West, Laura Smarandescu, Zachary Yaple Why Individuals Commit Information Security Violations: Neural Correlates of Decision Processes and Self-Control. Search on Bibsonomy HICSS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Javier Celaya, Rizos Sakellariou An Adaptive Policy to Minimize Energy and SLA Violations of Parallel Jobs on the Cloud. Search on Bibsonomy UCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Jianzhe Tai, Bo Sheng, Yi Yao, Ningfang Mi Live Data Migration for Reducing SLA Violations in Multi-tiered Storage Systems. Search on Bibsonomy IC2E The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Radhika D. Venkatasubramanyam, Shrinath Gupta An automated approach to detect violations with high confidence in incremental code using a learning system. Search on Bibsonomy ICSE Companion The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Alexander Clemm, Alberto Gonzalez Prieto On the Use of Traffic Information to Improve the Coordinated P2P Detection of SLA Violations. Search on Bibsonomy AINA The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14 Towards visual analytics for digging into human rights violations data. Search on Bibsonomy ASIST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Dongjing Miao, Xianmin Liu, Jianzhong Li 0001 Sampling Query Feedback Restricted Repairs of Functional Dependency Violations: Complexity and Algorithm. Search on Bibsonomy COCOON The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Bing Tang, Mingdong Tang Bayesian Model-Based Prediction of Service Level Agreement Violations for Cloud Services. Search on Bibsonomy TASE The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Annemarie Friedrich, Marina Valeeva, Alexis Palmer LQVSumm: A Corpus of Linguistic Quality Violations in Multi-Document Summarization. Search on Bibsonomy LREC The full citation details ... 2014 DBLP  BibTeX  RDF
14Cary Ikemoto, Tim Hoh, Idal Beer Smart infusion pump limit violations and high alert medications: the role of the Single Step Titration Error Prevention system. Search on Bibsonomy AMIA The full citation details ... 2014 DBLP  BibTeX  RDF
14Maria Christakis, Peter Müller 0001, Valentin Wüstholz Synthesizing Parameterized Unit Tests to Detect Object Invariant Violations. Search on Bibsonomy SEFM The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
14Cristiano Amaral Maffort Mining architectural violations from version history. Search on Bibsonomy 2014   RDF
14Sedat Sen Robustness of mixture IRT models to violations of latent normality. Search on Bibsonomy 2014   RDF
14Sean Whitsitt A Methodology for Mending Dynamic Constraint Violations in Cyber Physical Systems By Generating Model Transformations. Search on Bibsonomy 2014   RDF
14Henrik Leopold, Rami-Habib Eid-Sabbagh, Jan Mendling, Leonardo Guerreiro Azevedo, Fernanda Araújo Baião Detection of naming convention violations in process models for different languages. Search on Bibsonomy Decis. Support Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Thoshitha T. Gamage, Thomas P. Roth, Bruce M. McMillin, Mariesa L. Crow Mitigating Event Confidentiality Violations in Smart Grids: An Information Flow Security-Based Approach. Search on Bibsonomy IEEE Trans. Smart Grid The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14James Richard Forbes, Christopher J. Damaren Synthesis of Optimal Finite-Frequency Controllers Able to Accommodate Passivity Violations. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Henrik Leopold, Rami-Habib Eid-Sabbagh, Jan Mendling, Leonardo Guerreiro Azevedo, Fernanda Araújo Baião Detection of Naming Convention Violations in Process Models for Different Languages (Extended Abstract). Search on Bibsonomy EMISA Forum The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Martin Monperrus, Mira Mezini Detecting Missing Method Calls as Violations of the Majority Rule. Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
14Philipp Leitner 0001, Johannes Ferner, Waldemar Hummer, Schahram Dustdar Data-driven and automated prediction of service level agreement violations in service compositions. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Bernard Fortz, Martine Labbé, François V. Louveaux, Michael Poss Stochastic binary problems with simple penalties for capacity constraints violations. Search on Bibsonomy Math. Program. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Martin Monperrus, Mira Mezini Detecting missing method calls as violations of the majority rule. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Cipriano Galindo, Alessandro Saffiotti Inferring robot goals from violations of semantic knowledge. Search on Bibsonomy Robotics Auton. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Anthony Vance, Paul Benjamin Lowry, Dennis Eggett Using Accountability to Reduce Access Policy Violations in Information Systems. Search on Bibsonomy J. Manag. Inf. Syst. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Krzysztof Piontek Comparison of Some Chosen Tests of Independence of Value-at-Risk Violations. Search on Bibsonomy Algorithms from and for Nature and Life The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Tri Astoto Kurniawan, Aditya K. Ghose, Lam-Son Lê Resolving Violations in Inter-process Relationships in Business Process Ecosystems. Search on Bibsonomy ICSOC Workshops The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Xu Chu, Ihab F. Ilyas, Paolo Papotti Holistic data cleaning: Putting violations into context. Search on Bibsonomy ICDE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Jéferson Campos Nobre, Lisandro Zambenedetti Granville, Alexander Clemm, Alberto Gonzalez Prieto Coordination in P2P management overlays to improve decentralized detection of SLA violations. Search on Bibsonomy ICC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Leila Jasmine Bridgeman, James Richard Forbes Conic-Sector-based control to circumvent passivity violations. Search on Bibsonomy ACC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Cristiano Amaral Maffort, Marco Túlio Valente, Mariza Andrade da Silva Bigonha, Nicolas Anquetil, André C. Hora Heuristics for discovering architectural violations. Search on Bibsonomy WCRE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Nadia Ranaldo, Eugenio Zimeo Exploiting Capacity Planning of Cloud Providers to Limit SLA Violations. Search on Bibsonomy CLOSER The full citation details ... 2013 DBLP  BibTeX  RDF
14István Haller, Asia Slowinska, Matthias Neugschwandtner, Herbert Bos Dowsing for Overflows: A Guided Fuzzer to Find Buffer Boundary Violations. Search on Bibsonomy USENIX Security Symposium The full citation details ... 2013 DBLP  BibTeX  RDF
14Arpan Roy, Rajeshwari Ganesan, Santonu Sarkar Keep it moving: Proactive workload management for reducing SLA violations in large scale SaaS clouds. Search on Bibsonomy ISSRE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Lionel Eyraud-Dubois, Hubert Larchevêque Optimizing Resource allocation while handling SLA violations in Cloud Computing platforms. Search on Bibsonomy IPDPS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Sara Bögels, Dale Barr, Simon Garrod, Klaus Kessler "Are we still talking about the same thing?" MEG reveals perspective-taking in response to pragmatic violations, but not in anticipation. Search on Bibsonomy CogSci The full citation details ... 2013 DBLP  BibTeX  RDF
14Lingyi Liu, Xuanyu Zhong, Xiaotao Chen, Shobha Vasudevan Diagnosing root causes of system level performance violations. Search on Bibsonomy ICCAD The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Ali Jannesari, Nico Koprowski, Jochen Schimmel, Felix Wolf 0001, Walter F. Tichy Detecting Correlation Violations and Data Races by Inferring Non-deterministic Reads. Search on Bibsonomy ICPADS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Ben Miller, Ayush Shrestha, Jason Derby, Jennifer Olive, Karthikeyan Umapathy, Fuxin Li, Yanjun Zhao Digging into human rights violations: Data modelling and collective memory. Search on Bibsonomy IEEE BigData The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Jin-Tai Yan, Zhi-Wei Chen Post-layout redundant wire insertion for fixing min-delay violations. Search on Bibsonomy ISCAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Mohammad Majharul Islam, Abdullah Muzahid Characterizing Real World Bugs Causing Sequential Consistency Violations. Search on Bibsonomy HotPar The full citation details ... 2013 DBLP  BibTeX  RDF
14Koushik Chakraborty, Brennan Cozzens, Sanghamitra Roy, Dean Michael Ancajas Efficiently tolerating timing violations in pipelined microprocessors. Search on Bibsonomy DAC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Nils Bulling, Mehdi Dastani, Max Knobbout Monitoring norm violations in multi-agent systems. Search on Bibsonomy AAMAS The full citation details ... 2013 DBLP  BibTeX  RDF
14Martin Aher Deontic Conflicts and Multiple Violations. Search on Bibsonomy TbiLLC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Ben Miller, Fuxin Li, Ayush Shrestha, Karthikeyan Umapathy Digging into Human Rights Violations: phrase mining and trigram visualization. Search on Bibsonomy DH The full citation details ... 2013 DBLP  BibTeX  RDF
14W. M. Guo, Q. Wei, G. J. Liu, Y. Wang, X. K. Zhang Transmission switching to relieve voltage violations in low load period. Search on Bibsonomy ISGT Europe The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
14Amal Elgammal, Oktay Türetken, Willem-Jan van den Heuvel Using Patterns for the Analysis and Resolution of Compliance Violations. Search on Bibsonomy Int. J. Cooperative Inf. Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Ben Cassidy, Christopher J. Long, Caroline D. Rae, Victor Solo Identifying fMRI Model Violations With Lagrange Multiplier Tests. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Jerry C. Chiang, James Jiunn-Yih Jiang, Chechen Liao, Gary Klein 0001 Consequences of Psychological Contract Violations for is Personnel. Search on Bibsonomy J. Comput. Inf. Syst. The full citation details ... 2012 DBLP  BibTeX  RDF
14Harry Buhrman, Oded Regev 0001, Giannicola Scarpa, Ronald de Wolf Near-Optimal and Explicit Bell Inequality Violations. Search on Bibsonomy Theory Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Ray-Yaung Chang, Andy Podgurski Discovering programming rules and violations by mining interprocedural dependences. Search on Bibsonomy J. Softw. Maintenance Res. Pract. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Funmilade Faniyi, Rami Bahsoon, Georgios Theodoropoulos 0001 A Dynamic Data-Driven Simulation Approach for Preventing Service Level Agreement Violations in Cloud Federation. Search on Bibsonomy ICCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Oded Regev 0001 Bell violations through independent bases games. Search on Bibsonomy Quantum Inf. Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Anthony Vance, Mikko T. Siponen IS Security Policy Violations: A Rational Choice Perspective. Search on Bibsonomy J. Organ. End User Comput. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14James Richard Forbes, Christopher J. Damaren Single-Link Flexible Manipulator Control Accommodating Passivity Violations: Theory and Experiments. Search on Bibsonomy IEEE Trans. Control. Syst. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
14Anshul Gandhi, Yuan Chen 0001, Daniel Gmach, Martin F. Arlitt, Manish Marwah Hybrid resource provisioning for minimizing data center SLA violations and power consumption. Search on Bibsonomy Sustain. Comput. Informatics Syst. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
Displaying result #901 - #1000 of 2128 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license