|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1042 occurrences of 761 keywords
|
|
|
Results
Found 1762 publication records. Showing 1762 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
79 | Jens R. Calamé, Natalia Ioustinova, Jaco van de Pol, Natalia Sidorova |
Bug Hunting with False Negatives. |
IFM |
2007 |
DBLP DOI BibTeX RDF |
|
70 | Soyeon Park, Shan Lu 0001, Yuanyuan Zhou 0001 |
CTrigger: exposing atomicity violation bugs from their hiding places. |
ASPLOS |
2009 |
DBLP DOI BibTeX RDF |
software testing, concurrency bug |
59 | Lee Chew, David Lie |
Kivati: fast detection and prevention of atomicity violations. |
EuroSys |
2010 |
DBLP DOI BibTeX RDF |
kivati, watchpoint, atomicity violation |
50 | Akinori Abe, Hiromi Itoh Ozaku, Noriaki Kuwahara, Kiyoshi Kogure |
Scenario Violation in Nursing Activities: Nursing Risk Management from the Viewpoint of Chance Discovery. |
Soft Comput. |
2007 |
DBLP DOI BibTeX RDF |
Nursing risk management, Scenario violation, Scenario, Abduction, Chance Discovery |
50 | Julien Brunel, Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Jean-Paul Bodeveix |
Security policy compliance with violation management. |
FMSE |
2007 |
DBLP DOI BibTeX RDF |
labeled kripke structure, temporal logic, security policy, deontic logic, violation |
47 | Shyam K. Gupta 0001, Sankalp Dubey, Vikram Goyal, Anand Gupta |
A System to test malafide intension based on privacy violation detection. |
ICDIM |
2006 |
DBLP DOI BibTeX RDF |
|
42 | Ahmed Awad 0001, Matthias Weidlich 0001, Mathias Weske |
Specification, Verification and Explanation of Violation for Data Aware Compliance Rules. |
ICSOC/ServiceWave |
2009 |
DBLP DOI BibTeX RDF |
Business Process Querying, Violation Explanation, Temporal Logic Querying, Compliance Checking |
42 | Wanping Zhang, Wenjian Yu, Xiang Hu, Amirali Shayan Arani, A. Ege Engin, Chung-Kuan Cheng |
Predicting the worst-case voltage violation in a 3D power network. |
SLIP |
2009 |
DBLP DOI BibTeX RDF |
worst case violation prediction, integer linear programming, leakage, clock gating, power networks |
42 | Chang-Seo Park, Koushik Sen |
Randomized active atomicity violation detection in concurrent programs. |
SIGSOFT FSE |
2008 |
DBLP DOI BibTeX RDF |
atomicity violation detection, concurrency, dynamic analysis, random testing |
42 | Yee-Loo Foo, Hiroyuki Morikawa |
On the Use of Manchester Violation Test in Detecting Collision. |
ICOIN |
2007 |
DBLP DOI BibTeX RDF |
Wireless radio, service/device discovery, concurrent transmissions, collision detection and resolution, Manchester coding and violation, capture effect |
42 | Aloysius K. Mok, Guangtian Liu |
Early detection of timing constraint violation at runtime. |
RTSS |
1997 |
DBLP DOI BibTeX RDF |
timing constraint violation detection, timing constraint compliance, conditional guarantees, satisfiability checking algorithm, timing constraint monitoring, time terms, timing constraint specification, real-time systems, real time applications |
40 | Guido Boella, Leendert W. N. van der Torre |
An Attacker Model for Normative Multi-agent Systems. |
CEEMAS |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Gustavo Neuberger, Gilson I. Wirth, Ricardo Reis 0001 |
Protecting digital circuits against hold time violation due to process variability. |
SBCCI |
2009 |
DBLP DOI BibTeX RDF |
flip-flop characterization, hold time violations, race immunity, clock skew, process variability |
39 | Shahnaza Tursunova, Young-Tak Kim |
UPnP based Service Discovery and Service Violation Handling for Distributed Fault Management in WBEM-based Network Management. |
SERA |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Mohamed Ahmed 0001, Daniele Quercia, Stephen Hailes |
A Statistical Matching Approach to Detect Privacy Violation for Trust-Based Collaborations. |
WOWMOM |
2005 |
DBLP DOI BibTeX RDF |
|
39 | Leendert W. N. van der Torre |
Violation Contexts and Deontic Independence. |
CONTEXT |
1999 |
DBLP DOI BibTeX RDF |
|
38 | Sangmin Park, Richard W. Vuduc, Mary Jean Harrold |
Falcon: fault localization in concurrent programs. |
ICSE (1) |
2010 |
DBLP DOI BibTeX RDF |
order violation, concurrency, debugging, fault localization, atomicity violation |
38 | Salim Chowdhury, John Lillis |
Repeater insertion for concurrent setup and hold time violations with power-delay trade-off. |
ISPD |
2007 |
DBLP DOI BibTeX RDF |
early-mode timing, hold violation, late-mode timing, setup violation, timing optimization, repeater insertion |
38 | Lai Xu 0001 |
A multi-party contract model. |
SIGecom Exch. |
2004 |
DBLP DOI BibTeX RDF |
contract violation, detecting contract violation, e-contract |
35 | Yanjun Zuo, Timothy O'Keefe |
Post-release information privacy protection: A framework and next-generation privacy-enhanced operating system. |
Inf. Syst. Frontiers |
2007 |
DBLP DOI BibTeX RDF |
Information privacy protection, Privacy violation detection, Privacy-enhanced operating system, Information post-release control |
34 | Nils Ulltveit-Moe, Vladimir A. Oleshchuk |
Privacy Violation Classification of Snort Ruleset. |
PDP |
2010 |
DBLP DOI BibTeX RDF |
privacy violation, classification, IDS, rules |
34 | Richard H. Stern |
West Coast Federal Appeals Court Upholds Chip Protection Act Violation Finding. |
IEEE Micro |
2007 |
DBLP DOI BibTeX RDF |
antitrust violation, Semiconductor Chip Protection Act, chip piracy, monopoly, Altera, Clear Logic, reverse engineering, ASICs, law, bitstream |
34 | Leonard Barolli, Akio Koyama, Takako Yamada, Shoichi Yokoyama |
An Intelligent Fuzzy Routing Scheme for Improving ATM Networks Performance Using Violation Tagging Function. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
intelligent fuzzy routing scheme, ATM network performance improvement, violation tagging function, traffic control design, genetic algorithms, simulations, neural networks, fuzzy logic, network management, high speed networks, telecommunication network routing, intelligent algorithms |
32 | Lap Chi Lau, Mohit Singh |
Additive approximation for bounded degree survivable network design. |
STOC |
2008 |
DBLP DOI BibTeX RDF |
approximation algorithms, steiner tree, bounded degree, iterative rounding, survivable network design |
32 | D.-L. Pham, Shinji Sugawara, Tetsuya Miki |
A new scheduler for real-time applications in differentiated services networks. |
INFOCOM |
2005 |
DBLP DOI BibTeX RDF |
|
32 | |
An Intrusion Detection System for AODV. |
ICECCS |
2005 |
DBLP DOI BibTeX RDF |
|
32 | Norman R. Nielsen, Brian Ruder, David H. Brandin |
Effective safeguards for computer system integrity. |
AFIPS National Computer Conference |
1976 |
DBLP DOI BibTeX RDF |
|
31 | Hector Miguel Chavez, Wuwei Shen, Shaoying Liu |
An approach to detection of UML-based ownership violation. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
UML, Eclipse, class diagram, ownership, model checker |
31 | Masaru Takesue |
A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
31 | Pedro Alípio, José Neves 0001, Paulo Carvalho 0002 |
Automatic Detection of SLS Violation Using Knowledge Based Systems. |
KES (1) |
2006 |
DBLP DOI BibTeX RDF |
Service Level Specification, Self-configuration Networks, Quality of Service, Knowledge based Systems |
31 | Vikram Goyal, Shyam K. Gupta 0001, Shobhit Saxena |
Query rewriting for detection of privacy violation through inferencing. |
PST |
2006 |
DBLP DOI BibTeX RDF |
|
31 | Bharat Bhushan, Jane Hall, Pascal Kurtansky, Burkhard Stiller |
Operations Support System for End-to-End QoS Reporting and SLA Violation Monitoring in Mobile Services Environment. |
QofIS |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Zahra Rezaei Khavas, Russell Perkins, Seyed Reza Ahmadzadeh, Paul Robinette |
Moral-Trust Violation vs Performance-Trust Violation by a Robot: Which Hurts More? |
CoRR |
2021 |
DBLP BibTeX RDF |
|
30 | Chatchalita Asavanant, Hiroyuki Umemuro |
Personal Space Violation by a Robot: An Application of Expectation Violation Theory in Human-Robot Interaction. |
RO-MAN |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Farah Dernaika |
A posteriori log analysis and security rules violation detection. (Analyse à posteriori des logs et détection de violation des règles de sécurité). |
|
2020 |
RDF |
|
27 | Yang Chen 0001, Xiao Wang, Xiaoxiao Song, Eng Keong Lua, Cong Shi, Xiaohan Zhao, Beixing Deng, Xing Li 0001 |
Phoenix: Towards an Accurate, Practical and Decentralized Network Coordinate System. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
Network Coordinate System, Dot Product, Weighted Model, P2P, Triangle Inequality Violation |
27 | Shrirang K. Karandikar, Charles J. Alpert, Mehmet Can Yildiz, Paul Villarrubia, Stephen T. Quay, T. Mahmud |
Fast Electrical Correction Using Resizing and Buffering. |
ASP-DAC |
2007 |
DBLP DOI BibTeX RDF |
electrical violation eliminator, fast electrical correction, electrical state |
27 | Chia-Cheng Hu |
Bandwidth-Satisfied Multicast Services in Large-Scale MANETs. |
IWSOS |
2007 |
DBLP DOI BibTeX RDF |
bandwidth violation, quality-of-service, Ad-hoc network, integer linear programming, multicast protocol |
27 | Shan Lu 0001, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou 0001 |
AVIO: detecting atomicity violations via access interleaving invariants. |
ASPLOS |
2006 |
DBLP DOI BibTeX RDF |
concurrent program, hardware support, concurrency bug, bug detection, program invariant, atomicity violation |
27 | Abdelhakim Hafid, Gregor von Bochmann |
Quality-of-Service Adaptation in Distributed Multimedia Applications. |
Multim. Syst. |
1998 |
DBLP DOI BibTeX RDF |
Quality of service, Adaptation, Recovery, Violation |
27 | Nasser Kalantery |
Parallel discrete event processing of sequential computations. |
ICPADS |
1997 |
DBLP DOI BibTeX RDF |
parallel discrete event processing, discrete event methods, sequential software parallelization, optimistic execution strategy, temporal coordinate system, logical time mechanism, adaptive synchronisation, data dependent parallelism, conditional parallelism, coherency violation, coarse grain mapping, parallel discrete event simulation, program control structures, program control structure, sequential computations |
27 | Patrick C. K. Hung, Kamalakar Karlapalem |
A Paradigm for Security Enforcement in CapBasED-AMS. |
CoopIS |
1997 |
DBLP DOI BibTeX RDF |
security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access |
27 | Peter Wohl, John A. Waicukauski |
Using ATPG for clock rules checking in complex scan design. |
VTS |
1997 |
DBLP DOI BibTeX RDF |
clock rules checking, complex scan designs, structured DFT, automated design-rules-checking, robust set of rules, clock-rule-violation detection, fast clock verification, large microprocessor design, topological circuit analysis, zero delay, user controlled verification, capture ability, port contention, cone tracing, equivalent sources, ATPG, race conditions, computer testing, timing verification |
27 | Shing-Chi Cheung, Jeff Kramer |
Checking Subsystem Safety Properties in Compositional Reachability Analysis. |
ICSE |
1996 |
DBLP BibTeX RDF |
automated method, compositional reachability analysis, evolutionary change, gas station system, globally observable actions, hierarchical subsystem composition, safety property violation, subsystem safety property checking, undefined state, software engineering, software architecture, software developers, distributed processing, program analysis, finite state machines, finite-state machines, safety, distributed program, reachability analysis, program diagnostics, interacting processes |
27 | Kelvin K. Lee, Samuel T. Chanson |
Transient analysis of cell loss control mechanisms in ATM networks. |
ICCCN |
1995 |
DBLP DOI BibTeX RDF |
cell loss control mechanisms, partial buffer sharing, cell loss control mechanism, threshold-based loss balancing, violation probability, ATM networks, transient analysis, transient analysis, TLB, network utilization, queue length distributions, PBS |
24 | Andreas Gehlert, Antonio Bucchiarone, Raman Kazhamiakin, Andreas Metzger, Marco Pistore, Klaus Pohl |
Exploiting assumption-based verification for the adaptation of service-based applications. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
verification, monitoring, service-oriented computing |
24 | Somsak Kittipiyakul, Petros Elia, Tara Javidi |
High-SNR Analysis of Outage-Limited Communications With Bursty and Delay-Limited Information. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Yang Chen 0024, Omprakash Gnawali, Maria A. Kazandjieva, Philip Alexander Levis, John Regehr |
Surviving sensor network software faults. |
SOSP |
2009 |
DBLP DOI BibTeX RDF |
deputy, reboot, wireless sensor networks, reliability, kernel, tinyos, nesc |
24 | Chaoting Xuan, John A. Copeland, Raheem A. Beyah |
Shepherding Loadable Kernel Modules through On-demand Emulation. |
DIMVA |
2009 |
DBLP DOI BibTeX RDF |
Rootkit Prevention, On-demand Emulation, Emulator, Virtual Machine Monitor |
24 | Fei Pu, Yan Zhang |
Localizing Program Errors via Slicing and Reasoning. |
HASE |
2008 |
DBLP DOI BibTeX RDF |
|
24 | |
Beamforming Applied to New Cooperative Decode-and-Forward Relay Schemes. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Vikram Goyal, Shyam K. Gupta 0001, Anand Gupta |
A Unified Audit Expression Model for Auditing SQL Queries. (PDF / PS) |
DBSec |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis K. Katsikas |
Modeling Privacy Insurance Contracts and Their Utilization in Risk Management for ICT Firms. |
ESORICS |
2008 |
DBLP DOI BibTeX RDF |
Random Utility Models, Privacy, Risk Modeling, Insurance |
24 | Bo Xiao, Danpin Yu, Lei Zhang 0038, Xin Tian 0001, Song Gao, Sanyou Zeng |
A Constrained Dynamic Evolutionary Algorithm with Adaptive Penalty Coefficient. |
HAIS |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Kwang-Baek Kim, Choong Shik Park, Young Woon Woo |
Recognition of Car License Plates Using Morphological Features, Color Information and an Enhanced FCM Algorithm. |
ISNN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Willem Jan van Hoeve, Gilles Pesant, Louis-Martin Rousseau |
On global warming: Flow-based soft global constraints. |
J. Heuristics |
2006 |
DBLP DOI BibTeX RDF |
Network flows, Global constraints, Soft constraints |
24 | David Owen 0002, Dejan Desovski, Bojan Cukic |
Effectively Combining Software Verification Strategies: Understanding Different Assumptions. |
ISSRE |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Honguk Woo, Aloysius K. Mok, Chan-Gun Lee |
A Generic Framework for Monitoring Timing Constraints over Uncertain Events. |
RTSS |
2006 |
DBLP DOI BibTeX RDF |
|
24 | |
An Efficient Method of Eliminating Noisy Information in Web Pages for Data Mining. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Sabu Emmanuel, Mohan S. Kankanhalli |
A digital rights management scheme for broadcast video. |
Multim. Syst. |
2003 |
DBLP DOI BibTeX RDF |
Subscriber's rights protection, Digital watermarks, Copyright protection, Digital rights management, Video watermarking, Pay TV, Digital video broadcasting |
24 | Daniel Rothenstein, Shmuel Zamir |
Imperfect Inspection Games Over Time. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
|
24 | Dae-Woon Lim, Sung-Hoon Choi, Joon-Suk Jun |
Automated Detection of All Kinds of Violations at a Street Intersection Using Real Time Individual Vehicle Tracking. |
SSIAI |
2002 |
DBLP DOI BibTeX RDF |
Tracking, Traffic, Enforcement |
24 | Xiaoping Jia, Sushant Sawant, Jiangyu Zhou, Sotiris Skevoulis |
Detecting Null Pointer Violations in Java Programs. |
COMPSAC |
1999 |
DBLP DOI BibTeX RDF |
|
24 | Constance L. Heitmeyer, James Kirby, Bruce G. Labaw, Myla Archer, Ramesh Bharadwaj |
Using Abstraction and Model Checking to Detect Safety Violations in Requirements Specifications. |
IEEE Trans. Software Eng. |
1998 |
DBLP DOI BibTeX RDF |
simulation, model checking, verification, formal methods, specification, abstraction, Requirements, consistency checking, safety analysis, SCR |
23 | Ahmed Awad 0001, Sergey Smirnov 0002, Mathias Weske |
Resolution of Compliance Violation in Business Process Models: A Planning-Based Approach. |
OTM Conferences (1) |
2009 |
DBLP DOI BibTeX RDF |
process model parsing, process model restructuring, Business process modeling, compliance checking |
23 | Tim Murray Browne, Charles Fox |
Global Expectation-Violation as Fitness Function in Evolutionary Composition. |
EvoWorkshops |
2009 |
DBLP DOI BibTeX RDF |
|
23 | MingXue Wang, Kosala Yapa Bandara, Claus Pahl |
Constraint Integration and Violation Handling for BPEL Processes. |
ICIW |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Lei Chen 0009, Lifeng Zhou, Hung Keng Pung |
Universal Approximation and QoS Violation Application of Extreme Learning Machine. |
Neural Process. Lett. |
2008 |
DBLP DOI BibTeX RDF |
Extreme learning machine (ELM), Randomhidden neurons, QoS, Radial basis function (RBF), Feedforward neural network, Universal approximation |
23 | Wanping Zhang, Yi Zhu 0002, Wenjian Yu, Ling Zhang, Rui Shi 0003, He Peng, Zhi Zhu, Lew Chua-Eoan, Rajeev Murgai, Toshiyuki Shibuya, Nuriyoki Ito, Chung-Kuan Cheng |
Finding the Worst Voltage Violation in Multi-Domain Clock Gated Power Network. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Nidhal Selmane, Sylvain Guilley, Jean-Luc Danger |
Practical Setup Time Violation Attacks on AES. |
EDCC |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Stefania Costantini, Arianna Tocchio, Panagiota Tsintza |
Contracts Violation: Justification via Argumentation. |
CLIMA |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Stefanos Gritzalis, Athanasios N. Yannacopoulos, Costas Lambrinoudakis, Petros Hatzopoulos, Sokratis K. Katsikas |
A probabilistic model for optimal insurance contracts against security risks and privacy violation in IT outsourcing environments. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Optimal contract, Privacy protection, IT outsourcing, Insurance |
23 | Hoesung Ki, Seong-Jin Ahn 0001 |
Study on developing a security violation response checklist for the improvement of internet security management systems. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Amel Meddeb-Makhlouf, Mohamed Hamdi, Noureddine Boudriga |
Structuring a Multi-violation Detectors Database for an Efficient Intrusion Detection. |
AICCSA |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Guohui Wang, Bo Zhang 0073, T. S. Eugene Ng |
Towards network triangle inequality violation aware distributed systems. |
Internet Measurement Conference |
2007 |
DBLP DOI BibTeX RDF |
internet delay space, distributed system, analysis, triangle inequality violations, neighbor selection |
23 | Richard H. Stern |
New Jersey federal court holds Qualcomm's unFRANDly acts no antitrust violation. |
IEEE Micro |
2006 |
DBLP DOI BibTeX RDF |
Broadcom, Qualcomm, antitrust law |
23 | Shyam K. Gupta 0001, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta |
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Malafide Intension Based Detection of Privacy Violation in Information System. |
ICISS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Hendrik Decker, Davide Martinenghi |
Checking Violation Tolerance of Approaches to Database Integrity. |
ADVIS |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Qianxiang Wang, Aditya P. Mathur |
Interceptor Based Constraint Violation Detection. |
ECBS |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Min Xu, Rastislav Bodík, Mark D. Hill |
A serializability violation detector for shared-memory server programs. |
PLDI |
2005 |
DBLP DOI BibTeX RDF |
multithreading, serializability, race conditions |
23 | Tayfun Elmas, Serdar Tasiran, Shaz Qadeer |
VYRD: verifYing concurrent programs by runtime refinement-violation detection. |
PLDI |
2005 |
DBLP DOI BibTeX RDF |
refinement, runtime verification, concurrent data structures |
23 | Zhicheng Zhang, Abir Chaali Djelassi, Frédéric Vanderhaegen |
A comparative study on prediction of human operator violation using neural networks. |
SMC (3) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Samuel T. Redwine Jr. |
Dissecting Trust and the Assurance-Violation Dynamic. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Satish Subramanian, Sanjai Rayadurgam, Wei-Tek Tsai |
Design for Constraint Violation Detection in Safety-Critical Systems. |
HASE |
1998 |
DBLP DOI BibTeX RDF |
design patterns, object-oriented design, Safety-critical systems, implantable medical devices |
23 | Bertrand Cabon, Simon de Givry, Gérard Verfaillie |
Anytime Lower Bounds for Constraint Violation Minimization Problems. |
CP |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Hendrik Decker |
Basic Causes for the Inconsistency Tolerance of Query Answering and Integrity Checking. |
DEXA Workshops |
2010 |
DBLP DOI BibTeX RDF |
inconsistency tolerance, answers that have integrity, integrity violation, integrity checking |
19 | Yibo Sun, Ketan Bahulkar, Daihee Kim, Dmytro Zhydkov, Kenneth Chiu |
Towards Realistic Networks for Simulating Large-Scale Distributed Systems. |
ISPA |
2010 |
DBLP DOI BibTeX RDF |
Distributed System, Topology Generator, Network Coordinates, Triangle Inequality Violation |
19 | Yongjun Liao, Mohamed Ali Kâafar, Bamba Gueye, François Cantin, Pierre Geurts, Guy Leduc |
Detecting Triangle Inequality Violations in Internet Coordinate Systems by Supervised Learning. |
Networking |
2009 |
DBLP DOI BibTeX RDF |
Internet Coordinate System, Decision Trees, Supervised Learning, Triangle Inequality Violation |
19 | Chien Pang Lu, Mango Chia-Tso Chao, Chen Hsing Lo, Chih-Wei Chang |
A metal-only-ECO solver for input-slew and output-loading violations. |
ISPD |
2009 |
DBLP DOI BibTeX RDF |
input skew violation, output loading, buffer insertion, eco |
19 | Solmaz Kolahi, Laks V. S. Lakshmanan |
On approximating optimum repairs for functional dependency violations. |
ICDT |
2009 |
DBLP DOI BibTeX RDF |
functional dependency violation, approximation algorithm, repair, inconsistent databases |
19 | Cristian Lumezanu, Randolph Baden, Neil Spring, Bobby Bhattacharjee |
Triangle inequality variations in the internet. |
Internet Measurement Conference |
2009 |
DBLP DOI BibTeX RDF |
tiv, latency, variation, triangle inequality violation |
19 | Sriraman Tallam, Chen Tian 0002, Rajiv Gupta 0001, Xiangyu Zhang 0001 |
Avoiding Program Failures Through Safe Execution Perturbations. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
avoiding failures, environmental faults, logging/replay tools, bad user requests, heap overflow, atomicity violation |
19 | Shyam K. Gupta 0001, Vikram Goyal, Anand Gupta |
Precomputation of privacy policy parameters for auditing SQL queries. |
ICUIMC |
2008 |
DBLP DOI BibTeX RDF |
privacy violation detection, privacy, auditing, compliance, inference control, information disclosure |
19 | László Gál, János Botzheim, László T. Kóczy |
Modified bacterial memetic algorithm used for fuzzy rule base extraction. |
CSTST |
2008 |
DBLP DOI BibTeX RDF |
BMA with the modified operator execution order, Mamdani-type inference systems, bacterial memetic algorithm (BMA), knot order violation handling, modified BMA (MBMA), fuzzy systems, Levenberg-Marquardt method |
19 | Richard H. Stern |
Coming down the home stretch in the Rambus standardization skullduggery saga: To levy or not to levy royalties. |
IEEE Micro |
2007 |
DBLP DOI BibTeX RDF |
Rambus, antitrust violation, skullduggery, Secret Squirrel, DDR SDRAM, JEDEC, standardization, law, patents, SDRAM |
19 | Shan Lu 0001, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou 0001 |
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. |
IEEE Micro |
2007 |
DBLP DOI BibTeX RDF |
reliability, testing, debugging, concurrent program, hardware support, concurrency bug, bug detection, program invariant, atomicity violation |
19 | Maria Ebling, Eyal de Lara |
New Products. |
IEEE Pervasive Comput. |
2007 |
DBLP DOI BibTeX RDF |
Yoggie Pico, Photo Violation Technologies, PhotoViolationMeter, head-mounted cameras, GrandCentral, me.dium |
19 | Christina N. Outlay |
Resizing information systems personnel after IT outsourcing: exploring psychological contracts, violations, and employee outcomes. |
CPR |
2007 |
DBLP DOI BibTeX RDF |
psychological contract violation, strategic information systems planning, IT outsourcing, IS personnel, resizing |
19 | Lai Xu 0001, Manfred A. Jeusfeld, Paul W. P. J. Grefen |
Detection tests for identifying violators of multi-party contracts. |
SIGecom Exch. |
2005 |
DBLP DOI BibTeX RDF |
contract violation, detecting contract violator, E-contract |
Displaying result #1 - #100 of 1762 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|