|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 9103 occurrences of 4266 keywords
|
|
|
Results
Found 30435 publication records. Showing 30435 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
49 | Oren Boiman, Michal Irani |
Detecting Irregularities in Images and in Video. |
Int. J. Comput. Vis. |
2007 |
DBLP DOI BibTeX RDF |
detecting suspicious behaviors, detecting irregularities, anomaly detection, novelty detection, saliency, action recognition, automatic visual inspection |
42 | Maung Maung Htay, S. Sitharama Iyengar, Si-Qing Zheng |
t-Error Correcting/ d-Error Detecting (d>t) and All Unidirectional Error Detecting Codes with Neural Network (Part II). |
ITCC |
2002 |
DBLP DOI BibTeX RDF |
checking bits, t-EC/d-ED/AUED, Neural networks, error-detecting, error correcting |
42 | Jean-François Boulicaut, Katharina Morik, Arno Siebes |
04161 Abstracts Collection - Detecting Local Patterns. |
Detecting Local Patterns |
2004 |
DBLP BibTeX RDF |
|
40 | Wenjin Dai, Qingsheng Lin, Yongtao Dai |
New Research on Harmonics and Reactive Currents Detecting and Its Suppression with ANN in Single-Phase Circuit. |
ISICA |
2008 |
DBLP DOI BibTeX RDF |
reactive current, SAPF, simulation, ANN, detecting, harmonic |
39 | Maung Maung Htay, S. Sitharama Iyengar, Si-Qing Zheng |
t-Error Correcting/ d-Error Detecting (d>t) and All Unidirectional Error Detecting Codes with Neural Network (Part I). |
ITCC |
2001 |
DBLP DOI BibTeX RDF |
checking bits, t-EC/d-ED/AUED, Neural networks, error-detecting, error correcting |
37 | Yongquan Yu, Ying Huang, Minghui Wang |
The Related Matter-Elements in Extension Detecting and Application. |
ICITA (1) |
2005 |
DBLP DOI BibTeX RDF |
extension detecting, extencis, matter-element transformation |
37 | Phyllis G. Frankl, Elaine J. Weyuker |
A Formal Analysis of the Fault-Detecting Ability of Testing Methods. |
IEEE Trans. Software Eng. |
1993 |
DBLP DOI BibTeX RDF |
software testing criteria, subdomains, subsumption relation, program testing, system recovery, formal analysis, multisets, fault-detecting ability, probabilistic measures |
36 | Benny Porat, Ely Porat |
Toward Real Time Internet Traffic Monitoring. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Abraham Kandel |
Fuzzy Logic, Uncertainty Management and The Black Swan. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Janusz Kacprzyk, Slawomir Zadrozny |
Some Fuzzy Logic Based Approaches to Flexible Database Querying and their Use for Discovering Security Related Information. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Daniel Hladky, Christian Ehrlich, Irina Efimenko, Vyacheslav Vorobyov |
Discover Shadow Groups from the Dark Web. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Clive Best |
Threat Early Warning through Web Mining. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Gevorg Margarov |
Investigation of Web Based Hidden Data. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | João Gama 0001, Pedro Pereira Rodrigues, Eduardo Jaques Spinosa, André Carlos Ponce de Leon Ferreira de Carvalho |
Knowledge Discovery from Data Streams. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Daniel A. Keim, Milos Krstajic, Peter Bak, Daniela Oelke, Florian Mansmann |
Methods for Interactive Exploration of Large-Scale News Streams. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | I. Burhan Türksen |
Development of Fuzzy System Models: Fuzzy Rulebases to Fuzzy Functions. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Artak Barseghyan |
Cyber Criminal Mechanisms Employed in Social Engineering and Technical Tricks. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Vladimir F. Khoroshevsky |
Ontology Driven Multilingual Information Extraction and Intelligent Analytics. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Ricardo Baeza-Yates |
Privacy in Query Logs. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Mark Last |
Language-independent Techniques for Automated Text Summarization. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | M. Hamdi Özçelik, Ekrem Duman |
Preventing Internet Banking Fraud and Money Laundering Using Customer Trustability Index. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Dan Roth |
Making Sense of Unstructured Textual Data. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Gabriel Weimann |
Terrorist Facebook: Terrorists and Online Social Networking. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Josef Bollag |
World Financial Crisis and its Influence on Terror Financing. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Shaul Shay |
Al Qaeda and the Hybrid Jihad. |
Web Intelligence and Security - Advances in Data and Text Mining Techniques for Detecting and Preventing Terrorist Activities on the Web |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Jean-François Boulicaut, Katharina Morik, Arno Siebes (eds.) |
Detecting Local Patterns, 12.04. - 16.04.2004 |
Detecting Local Patterns |
2004 |
DBLP BibTeX RDF |
|
34 | Hong Zhu 0002 |
A Formal Analysis of the Subsume Relation Between Software Test Adequacy Criteria. |
IEEE Trans. Software Eng. |
1996 |
DBLP DOI BibTeX RDF |
subsume relation, Software testing, test adequacy criteria, testing scenarios, fault detecting ability |
32 | Steffen Tarnick |
Design of Embedded Self-Testing Checkers for t-UED and BUED Codes. |
J. Electron. Test. |
2004 |
DBLP DOI BibTeX RDF |
t-unidirectional error detecting (t-UED) codes, burst unidirectional error detecting (BUED) codes, averaging circuits, embedded checkers, self-testing checkers |
32 | Stanislaw J. Piestrak |
Design of Self-Testing Checkers for Borden Codes. |
IEEE Trans. Computers |
1996 |
DBLP DOI BibTeX RDF |
Borden code, easily-testable circuit, multioutput threshold circuit, optimal t-unidirectional error detecting code, concurrent error detection, unidirectional errors, self-testing checker, unidirectional error detecting code |
31 | Phyllis G. Frankl, Elaine J. Weyuker |
Provable Improvements on Branch Testing. |
IEEE Trans. Software Eng. |
1993 |
DBLP DOI BibTeX RDF |
software test data adequacy, independent random selection, condition-coverage techniques, software testing, program testing, programming theory, program debugging, mutation testing, test suite, data flow testing, fault-detecting ability, probabilistic measure, branch testing |
30 | Yuichi Sato, Hiroshi Takahashi, Yoshinobu Higami, Yuzo Takamatsu |
Failure Analysis of Open Faults by Using Detecting/Un-detecting Information on Tests. |
Asian Test Symposium |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Saeko Tanigawa, Hideaki Nishihara, Shigeo Kaneda, Hirohide Haga |
Detecting mastication by using microwave Doppler sensor. |
PETRA |
2008 |
DBLP DOI BibTeX RDF |
detecting mastication, ubiquitous computing |
29 | Fang Qi, Feng Bao 0001, Tieyan Li, Weijia Jia 0001, Yongdong Wu |
Preventing Web-Spoofing with Automatic Detecting Security Indicator. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
Automatic Detecting Security Indicator, SSL, Web Spoofing |
29 | Shuguang Zhao, Jun Zhao, Yuan Wang, Xinlin Fu |
Moving Object Detecting Using Gradient Information, Three-Frame-Differencing and Connectivity Testing. |
Australian Conference on Artificial Intelligence |
2006 |
DBLP DOI BibTeX RDF |
Digital image identifying, video sequence processing, three-frame-differencing, connectivity testing, moving object detecting |
29 | Ganesan Umanesan, Eiji Fujiwara |
A Class of Random Multiple Bits in a Byte Error Correcting and Single Byte Error Detecting (S_t/b EC-S_bED) Codes. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
Random multiple bits in a byte error, single t/b-error correcting—single b-bit byte error detecting (St/bEC-SbED) codes |
28 | Dimitris Nikolos |
Theory and Design of t-Error Correcting/d-Error Detecting (d>t) and All Unidirectional Error Detecting Codes. |
IEEE Trans. Computers |
1991 |
DBLP DOI BibTeX RDF |
t-error correcting/d-error, all unidirectional error detecting codes, design, error correction codes, encoding, decoding, error detection codes |
26 | Jianwei Zhang 0006, Yizheng Ye, Bin-Da Liu |
A new mismatch-dependent low power technique with shadow match-line voltage-detecting scheme for CAMs. |
ISLPED |
2006 |
DBLP DOI BibTeX RDF |
mismatch-dependent, voltage detecting, low power, high speed, CAM |
26 | Stanislaw J. Piestrak |
Design of encoders and self-testing checkers for some systematic unidirectional error detecting codes. |
DFT |
1997 |
DBLP DOI BibTeX RDF |
systematic unidirectional error detecting code, t-UED Bose-Lin code, burst UED code, multi-output threshold circuit, encoder, automatic testing, logic function, Berger code, hardware complexity, self-testing checker |
26 | Ferdinand Peper, Hideki Noda |
A Mechanism for the Development of Feature Detecting Neurons. |
ANNES |
1995 |
DBLP DOI BibTeX RDF |
Feature detecting cells in the visual cortex, Growth of neurons, Neural Networks, Principal Component Analysis |
24 | Wai Ho Mow |
Recursive Constructions of Detecting Matrices for Multiuser Coding: A Unifying Approach. |
IEEE Trans. Inf. Theory |
2009 |
DBLP DOI BibTeX RDF |
|
23 | Luca Breveglieri, Israel Koren, Paolo Maistri |
An Operation-Centered Approach to Fault Detection in Symmetric Cryptography Ciphers. |
IEEE Trans. Computers |
2007 |
DBLP DOI BibTeX RDF |
parity code, Cryptography, fault detection, error-detecting code, fault attacks, residue code, symmetric cipher |
23 | Kai Xu 0004, Yueshan Xiong, Yanzhen Wang, Ke Tan 0008, Guangyou Guo |
A simple and stable feature-preserving smoothing method for contours-based reconstructed meshes. |
GRAPHITE |
2006 |
DBLP DOI BibTeX RDF |
feature detecting, mesh smoothing, feature preserving, adaptive subdivision |
23 | Hsuan-Pu Chang, Kuen Han Jan, Timothy K. Shih, Chun-Chia Wang |
SCORM Sequencing Testing for Sequencing Control Mode. |
AINA (2) |
2006 |
DBLP DOI BibTeX RDF |
Learning Sequencing, Sequencing Control Definition, Sequencing Control Model, ADL, SCORM, Truth Table, Detecting Algorithm |
23 | Sung Kwan Kang, Young Chul Choung, Jong-An Park |
Image Corner Detection Using Hough Transform. |
IbPRIA (2) |
2005 |
DBLP DOI BibTeX RDF |
Detecting Straight Lines, curvature scale, Hough Transform, corner detection, corner points |
23 | G. Robert Redinbo, Ranjit Manomohan |
Fault Tolerance, Channel Coding and Arithmetic Source Coding Combined. |
FTCS |
1999 |
DBLP DOI BibTeX RDF |
Fault-tolerant data compression, burst-detecting convolutional codes, combined source channel coding, arithmetic coding, algorithm-based fault tolerance, hardware failures |
23 | De-Qiang Wang, Lian-Chang Zhao |
Combinatorial Analysis of Check Set Construction for Algorithm-Based Fault Tolerance Systems. |
J. Electron. Test. |
1998 |
DBLP DOI BibTeX RDF |
check set, error detecting, algorithm-based fault tolerance, combinatorial problem |
23 | D. K. Bhattacharryya, Sukumar Nandi |
An efficient class of SEC-DED-AUED codes. |
ISPAN |
1997 |
DBLP DOI BibTeX RDF |
SEC-DED-AUED codes, error correction codes, error correcting codes, encoding, codes, decoding, error detecting codes |
22 | Yang Yu 0029, Yingjie Li 0004, Jeff Heflin |
Detecting Abnormal Semantic Web Data Using Semantic Dependency. |
ICSC |
2011 |
DBLP DOI BibTeX RDF |
Detecting Abnormal Semantic Web Data, Semantic Dependency |
22 | Yang Zhang, Liqun Gao, Shufan Ye |
A New Method for Tracing by Using Corner Detecting and k-Nearest Neighbor. |
IITSI |
2010 |
DBLP DOI BibTeX RDF |
object tracing, feature extraction, K-Nearest Neighbor, corner detecting |
22 | Qiuxia Yang, Liangrui Tang, Wenting Dong, Yi Sun 0007 |
Image Edge Detecting Based on Gap Statistic Model and Relative Entropy. |
FSKD (5) |
2009 |
DBLP DOI BibTeX RDF |
criterion function, de-noising, edge detecting, Gap, relative entropy |
22 | Liyong Ma, Yude Sun, Naizhang Feng, Zheng Liu |
Image Fast Template Matching Algorithm Based on Projection and Sequential Similarity Detecting. |
IIH-MSP |
2009 |
DBLP DOI BibTeX RDF |
image template matching, sequential similarity detecting, projection |
22 | Yi Zhang, Wenxing Chen |
A Scheme of Detecting Cheaters Wholly in Threshold Secret Sharing for Mobile Ad Hoc Networks. |
NPC Workshops |
2008 |
DBLP DOI BibTeX RDF |
Detecting in whole, Mobile Ad hoc networks, Cheating, Threshold secret sharing |
22 | Xiang-he Yang, Huaping Hu, Xin Chen |
SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
secure data forwarding, malicious routers detecting, communication security |
22 | Zhi Wei 0002, Huisen Wang, Ying Qiu |
Model-Based Neural Network and Wavelet Packets Decomposition on Damage Detecting of Composites. |
ICIC (3) |
2008 |
DBLP DOI BibTeX RDF |
MBNN, delamination, composites, detecting, wavelet packets |
22 | Dmitri Roussinov, SzeWang Fong, David B. Skillicorn |
Detecting word substitutions: PMI vs. HMM. |
SIGIR |
2007 |
DBLP DOI BibTeX RDF |
detecting substitutions, security informatics, text oddity, text mining |
22 | Sihai Xiao, Xiaofa Shih, Guilang Feng, T. R. N. Rao |
A Generalization of the Single b-Bit Byte Error Correcting and Double Bit Error Detecting Codes for High-Speed Memory Systems. |
IEEE Trans. Computers |
1996 |
DBLP DOI BibTeX RDF |
High-speed memories, byte error-correcting/detecting codes, companion matrix, subfields/cosets, primitive polynomials |
22 | Dwijendra K. Ray-Chaudhuri, Navin M. Singhi, S. Sanyal, P. S. Subramanian |
Theory and Design of t-Unidirectional Error-Correcting and d-Unidirectional Error-Detecting Code. |
IEEE Trans. Computers |
1994 |
DBLP DOI BibTeX RDF |
t-unidirectional error-correcting codes, d-unidirectional error-detecting code, error correction codes, encoding, decoding, error detection codes, bounds |
22 | Sulaiman Al-Bassam, Bella Bose |
Asymmetric/Unidirectional Error Correcting and Detecting Codes. |
IEEE Trans. Computers |
1994 |
DBLP DOI BibTeX RDF |
unidirectional error correcting codes, asymmetric channels, digital transmission, metallic cable, optical disks, line codes, fiber optical communication, complexity, error correction codes, error detection codes, error detecting codes, error control codes, unidirectional errors, optical fiber, asymmetric errors |
22 | Mao Chao Lin |
Constant Weight Codes for Correcting Symmetric Errors and Detecting Unidirectional Errors. |
IEEE Trans. Computers |
1993 |
DBLP DOI BibTeX RDF |
quasi-systematic form, systematic form, t-EC/AUED codes, error correction codes, detecting, correcting, errors, error detection codes, error-control coding, unidirectional errors, constant weight codes, parity check, symmetric errors, codewords |
22 | T. Aaron Gulliver, Vijay K. Bhargava |
A Systematic (16, 8) Code for Correcting Double Errors and Detecting Triple-Adjacent Errors. |
IEEE Trans. Computers |
1993 |
DBLP DOI BibTeX RDF |
systematic (16,8) code, correcting double errors, detecting triple-adjacent errors, computer memory, systematic (24,16) QC code, triple-adjacent, quadruple-adjacent errors, systematic (32,16) QC code, syndrome generation, error correction codes, error detection codes, table lookup, table lookup, majority logic |
22 | Bella Bose, Sulaiman Al-Bassam |
Byte Unidirectional Error Correcting and Detecting Codes. |
IEEE Trans. Computers |
1992 |
DBLP DOI BibTeX RDF |
byte unidirectional error detecting codes, byte unidirectional error correcting codes, check bits, asymmetric error correction, double byte unidirectional errors, lower bound, error correction codes, error detection codes, decoding algorithms, encoding algorithms |
22 | Bruce L. Montgomery, B. V. K. Vijaya Kumar |
Systematic Random Error Correcting and All Undirectional Error Detecting Codes. |
IEEE Trans. Computers |
1990 |
DBLP DOI BibTeX RDF |
systematic random error correction codes, t-EC/AUED, t-EC linear code, error correction codes, error detection codes, unidirectional error detecting codes, linear block code |
22 | Jay W. Schwartz, Jack K. Wolf |
A Systematic (12, 8) Code for Correcting Single Errors and Detecting Adjacent Errors. |
IEEE Trans. Computers |
1990 |
DBLP DOI BibTeX RDF |
systematic (12,8) code, correcting single errors, detecting adjacent errors, parity check matrix, 4-b nibbles, systematic parity check code, error correction codes, error detection codes |
22 | Mario Blaum, Henk C. A. van Tilborg |
On t-Error Correcting/All Unidirectional Error Detecting Codes. |
IEEE Trans. Computers |
1989 |
DBLP DOI BibTeX RDF |
information symbols, systematic t-EC/AUED, redundant symbols, t-error correcting, binary systematics codes, information symbols, error-correcting code, error correction codes, encoding, encoding, error detection codes, decoding algorithms, unidirectional error detecting codes, random errors, codeword |
22 | Mario Blaum |
Systematic Unidirectional Burst Detecting Codes. |
IEEE Trans. Computers |
1988 |
DBLP DOI BibTeX RDF |
systematic unidirectional burst-detecting codes, encoding, encoding, decoding, decoding, error detection codes |
22 | Shigeo Kaneda, Eiji Fujiwara |
Single Byte Error Correcting - Double Byte Error Detecting Codes for Memory Systems. |
IEEE Trans. Computers |
1982 |
DBLP DOI BibTeX RDF |
single byte error correcting? double byte error detecting codes, Byte-organized memory chips, LSI implementation, reliability, error correcting codes |
22 | René David, Pascale Thévenod-Fosse |
Minimal Detecting Transition Sequences: Application to Random Testing. |
IEEE Trans. Computers |
1980 |
DBLP DOI BibTeX RDF |
transition sequence, Detection set, minimal detecting transition sequence(MDTS), sequential circuit, random testing |
20 | Steven Gianvecchio, Haining Wang |
Detecting covert timing channels: an entropy-based approach. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
detection, covert timing channels |
20 | Nawar Malhis, Kelvin Xi Zhang, B. F. Francis Ouellette |
Detecting Protein-Domains DNA-Motifs Association in Saccharomyces cerevisiae Regulatory Networks. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
genetic regulation, regulatory motifs, association roles, Gene Ontology, GO, protein domain |
20 | Paul C. van Oorschot, Jean-Marc Robert 0001, Miguel Vargas Martin |
A monitoring system for detecting repeated packets with applications to computer worms. |
Int. J. Inf. Sec. |
2006 |
DBLP DOI BibTeX RDF |
Intrusion detection, Network security, Anomaly detection, Traffic monitoring, Computer worms |
20 | Xuefeng Zhu, Zhi Jin |
Detecting of Requirements Inconsistency : An Ontology-Based Approach. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Bryan Reimer, Bruce Mehler, Joseph F. Coughlin, Kathryn M. Godfrey, Chuanzhong Tan |
An on-road assessment of the impact of cognitive workload on physiological arousal in young adult drivers. |
AutomotiveUI |
2009 |
DBLP DOI BibTeX RDF |
detecting driver state, physiology, driving performance, driver distraction, cognitive workload |
20 | Umar Manzoor, Samia Nefti, Haris Hasan, Majid Mehmood, Bassam Aslam, Osama Shaukat |
A Multi-Agent Model for Mine Detection - MAMMD. |
WSKS (1) |
2008 |
DBLP DOI BibTeX RDF |
Mine Detection, Collaborative Agent System, MAMMD Architecture, Detecting Mines Using Agents, Multi-Agent System |
20 | Chungwon Lee, Bong Gyou Lee, Kisu Kim, Hye Sun Lee |
A VDS Based Traffic Accident Prediction Analysis and Future Application. |
KES-AMSTA |
2007 |
DBLP DOI BibTeX RDF |
accident risk rate, VDS (Vehicle Detecting System), ITS (Intelligent Transport System), traffic accident, prediction analysis |
20 | Lai Xu 0001, Manfred A. Jeusfeld, Paul W. P. J. Grefen |
Detection tests for identifying violators of multi-party contracts. |
SIGecom Exch. |
2005 |
DBLP DOI BibTeX RDF |
contract violation, detecting contract violator, E-contract |
20 | Lai Xu 0001 |
A multi-party contract model. |
SIGecom Exch. |
2004 |
DBLP DOI BibTeX RDF |
contract violation, detecting contract violation, e-contract |
20 | Luca G. Tallini, Bella Bose |
Transmission Time Analysis for the Parallel Asynchronous Communication Scheme. |
IEEE Trans. Computers |
2003 |
DBLP DOI BibTeX RDF |
delay-insensitive codes, proximity detecting codes, low weight codes, Asynchronous communication, constant weight codes, unordered codes |
20 | Sulaiman Al-Bassam |
Another Method for Constructing t-EC/AUED Codes. |
IEEE Trans. Computers |
2000 |
DBLP DOI BibTeX RDF |
tail sequences, error correcting codes, error detecting codes, Unidirectional errors, symmetric errors |
20 | Luca G. Tallini, Bella Bose |
Some Transmission Time Analysis for the Parallel Asynchronous Communication Scheme. |
FTCS |
1999 |
DBLP DOI BibTeX RDF |
delay-insensitive codes, proximity detecting codes, low weight codes, Asynchronous communication, constant weight codes, unordered codes |
20 | Dali L. Tao, Carlos R. P. Hartmann, Yunghsing S. (Sam) Han |
New Encoding/Decoding Methods for Designing Fault-Tolerant Matrix Operations. |
IEEE Trans. Parallel Distributed Syst. |
1996 |
DBLP DOI BibTeX RDF |
concurrent error detection/correction, error detecting/correcting codes, fault tolerance, multiprocessor systems, Array processors |
20 | Steven S. Gorshe, Bella Bose |
A self-checking ALU design with efficient codes. |
VTS |
1996 |
DBLP DOI BibTeX RDF |
self-checking ALU design, self-testing ALU, VLSI, logic testing, built-in self test, integrated circuit testing, logic design, error detection codes, error detecting codes, integrated logic circuits, unidirectional errors |
20 | Aki Watanabe, Ken Sakamura |
A Specification-Based Adaptive Test Case Generation Strategy for Open Operating System Standards. |
ICSE |
1996 |
DBLP BibTeX RDF |
ITRON2 real time multi task operating system specification, SBATCG method, abstract state transitions, commercially available ITRON2 implementations, fault exposure abilities, open operating system standards, specification based adaptive test case generation strategy, real-time systems, formal specification, specification languages, program testing, open systems, templates, Z, operating systems (computers), multiprogramming, integration testing, mutation analysis, Z notation, software standards, formal specification languages, model based specification, fault detecting ability, internal structure |
20 | C. A. Burton, L. J. Johnston, Elizabeth A. Sonenberg |
Case study: an empirical investigation of thumbnail image recognition. |
INFOVIS |
1995 |
DBLP DOI BibTeX RDF |
thumbnail image recognition, image selection, parent image treatment, image reduction, edge-detecting smoothing, static codebook compression, thumbnail creation, user interfaces, user interface, searching, edge detection, data compression, image coding, image databases, data visualisation, visual databases, lossy image compression |
20 | Tsong Yueh Chen, Yuen-Tak Yu |
On the Relationship Between Partition and Random Testing. |
IEEE Trans. Software Eng. |
1994 |
DBLP DOI BibTeX RDF |
subdomain size, performance, software testing, program testing, random testing, software performance evaluation, test cases, random processes, partition testing, worst case, fault-detecting ability |
18 | Yi Du, Gerald M. Masson |
Enhancing Accuracy of Probe Packet-based Congestion Detection in High Speed Networks. |
ICCCN |
1998 |
DBLP DOI BibTeX RDF |
Network congestion detection, probe packets, performance analysis, feedback control, high speed networks |
17 | Andreas Behrend, Rainer Manthey, Gereon Schüller, Monika Wieneke |
Detecting Moving Objects in Noisy Radar Data Using a Relational Database. |
ADBIS |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Xavier Naturel, Patrick Gros |
Detecting repeats for video structuring. |
Multim. Tools Appl. |
2008 |
DBLP DOI BibTeX RDF |
Television, Repetitions, Commercial, Video structuring |
17 | Christopher Mears, Maria J. García de la Banda, Mark Wallace 0001, Bart Demoen |
A Novel Approach For Detecting Symmetries in CSP Models. |
CPAIOR |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Wei Lu 0018, Mahbod Tavallaee, Ali A. Ghorbani 0001 |
Detecting Network Anomalies Using Different Wavelet Basis Functions. |
CNSR |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Peng Li 0019, Shugen Ma, Bin Li 0001, Yuechao Wang |
Design of a mobile mechanism possessing driving ability and detecting function for in-pipe inspection. |
ICRA |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Aniket Murarka, Mohan Sridharan, Benjamin Kuipers |
Detecting obstacles and drop-offs using stereo and motion cues for safe local motion. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Parbati K. Manna, Sanjay Ranka, Shigang Chen |
DAWN: A Novel Strategy for Detecting ASCII Worms in Networks. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Lei Dai, Weijun Li, Xu Chen, Xiaoxian Jin, Yanfeng Qu |
Research of Face Detection System Applied for Detecting Faces with Complex Background and Illumination. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Min Chen, Niaoqing Hu, Guojun Qin, Y. M. Yang |
A Study on Additional-signal-enhanced Stochastic Resonance in Detecting Weak Signals. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Jian-hua Qiao, Lin-sheng Li, Jinggang Zhang |
Design of Rail Surface Crack-detecting System Based on Linear CCD Sensor. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
17 | Datong Chen, Jie Yang 0001, Robert G. Malkin, Howard D. Wactlar |
Detecting social interactions of the elderly in a nursing home environment. |
ACM Trans. Multim. Comput. Commun. Appl. |
2007 |
DBLP DOI BibTeX RDF |
social interaction, stochastic modeling, health care, Multimedia processing, human activity |
17 | Ajay D. Kshemkalyani, Bin Wu 0014 |
Detecting Arbitrary Stable Properties Using Efficient Snapshots. |
IEEE Trans. Software Eng. |
2007 |
DBLP DOI BibTeX RDF |
stable predicate, stable property, distributed snapshot, Distributed system, global state |
17 | Travis Schluessler, Stephen D. Goglin, Erik Johnson |
Is a bot at the controls?: Detecting input data attacks. |
NETGAMES |
2007 |
DBLP DOI BibTeX RDF |
security, online games, cheating, cheat detection |
17 | Kaustav Das, Jeff G. Schneider |
Detecting anomalous records in categorical datasets. |
KDD |
2007 |
DBLP DOI BibTeX RDF |
machine learning, anomaly detection |
17 | Erwin Leonardi, Sourav S. Bhowmick |
XANADUE: a system for detecting changes to XML data in tree-unaware relational databases. |
SIGMOD Conference |
2007 |
DBLP DOI BibTeX RDF |
XML, relational databases, change detection |
Displaying result #1 - #100 of 30435 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|