|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 1576 occurrences of 1107 keywords
|
|
|
Results
Found 3004 publication records. Showing 3004 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Ken Layng |
Non-technical keys to keeping your personally identifiable information PII risk mitigation project on track. |
SIGUCCS |
2009 |
DBLP DOI BibTeX RDF |
PII, non-technical, management, efficiency, encryption, project, risks, strategy, sensitive, scanning, data, team, remediation, mitigate |
20 | Tzung-Shi Chen, Hua-Wen Tsai, Ying-Hung Lo, Yi-Shiang Chang |
Mitigating query hotspots for wireless sensor networks. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor networks, routing, query, hotspot |
20 | Min Kyung Lee, Sara B. Kiesler, Jodi Forlizzi, Siddhartha S. Srinivasa, Paul E. Rybski |
Gracefully mitigating breakdowns in robotic services. |
HRI |
2010 |
DBLP DOI BibTeX RDF |
robot breakdown, robot error, service recovery, human-robot interaction, services, social robot, error recovery |
20 | Songping Wu, Pan Liu, Yeheskel Bar-Ness |
Phase Noise Estimation and Mitigation for OFDM Systems. |
IEEE Trans. Wirel. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Charneta Samms, David Jones 0001, Kelly S. Hale, Diane Mitchell |
Harnessing the Power of Multiple Tools to Predict and Mitigate Mental Overload. |
HCI (17) |
2009 |
DBLP DOI BibTeX RDF |
IMPRINT, MIDS, integrated toolset, multimodal, command and control, overload, mental workload |
20 | Rabia Haq, Michael L. Nelson |
Using timed-release cryptography to mitigate the preservation risk of embargo periods. |
JCDL |
2009 |
DBLP DOI BibTeX RDF |
time lock, timed release, cryptography, repositories |
20 | Amlan Ghosh, Rahul M. Rao, Richard B. Brown |
A centralized supply voltage and local body bias-based compensation approach to mitigate within-die process variation. |
ISLPED |
2009 |
DBLP DOI BibTeX RDF |
fine-grain body-biasing, process variation compensation, slewrate |
20 | Yu Wang 0002, Xiaoming Chen 0003, Wenping Wang, Varsha Balakrishnan, Yu Cao 0001, Yuan Xie 0001, Huazhong Yang |
On the efficacy of input Vector Control to mitigate NBTI effects and leakage power. |
ISQED |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Xuhua Ding, Wei Yu 0002, Ying Pan |
A Dynamic Trust Management Scheme to Mitigate Malware Proliferation in P2P Networks. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Haithem Al-Mefleh, J. Morris Chang |
A New ACK Policy To Mitigate the Effects of Coexisting IEEE 802.11/802.11e Devices. |
INFOCOM |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Antonio Ferreira 0001, Pedro Antunes 0001 |
An Attentive Groupware Device to Mitigate Information Overload. |
DSV-IS |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Xi Chen, Gaogang Xie, Jianhua Yang |
Mitigate DDoS attack using TTL buckets and host threatening index. |
LCN |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Meeta Sharma Gupta, Krishna K. Rangan, Michael D. Smith 0001, Gu-Yeon Wei, David M. Brooks |
Towards a software approach to mitigate voltage emergencies. |
ISLPED |
2007 |
DBLP DOI BibTeX RDF |
dynamic optimization framework, voltage emergencies, hardware-software codesign, di/dt |
20 | Amey Shevtekar, Nirwan Ansari |
A Proactive Test Based Differentiation Technique to Mitigate Low Rate DoS Attacks. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
20 | André Soares 0001, William Giozza, Paulo R. F. Cunha |
Classification Strategy to Mitigate Unfairness in All-Optical Networks. |
ICON |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Eric S. Fetzer |
Using Adaptive Circuits to Mitigate Process Variations in a Microprocessor Design. |
IEEE Des. Test Comput. |
2006 |
DBLP DOI BibTeX RDF |
dual core, Itanium microprocessor, Montecito, adaptive circuits, cache safe technology, active clock deskew, process variation, power measurement |
20 | Rajendra V. Boppana, Saman Desilva |
Evaluation of a Stastical Technique to Mitigate Malicious Control Packets in Ad Hoc Networks. |
WOWMOM |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Yung-Pin Cheng |
Crafting a Promela Front-End with Abstract Data Types to Mitigate the Sensitivity of (Compositional) Analysis to Implementation Choices. |
SPIN |
2005 |
DBLP DOI BibTeX RDF |
|
20 | John D. Lee, Joshua D. Hoffman, Elizabeth Hayes |
Collision warning design to mitigate driver distraction. |
CHI |
2004 |
DBLP DOI BibTeX RDF |
collision warning systems, smart cars, trust, notification systems, user acceptance, distraction |
20 | Kainam Thomas Wong, S. L. A. Chan, Rafael P. Torres |
Fast-polarization-hopping transmit-diversity to mitigate prolonged deep fades. |
ISCAS (2) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Thomas F. Brady |
Energy production and trading: using computer simulation to mitigate risk in electricity generation/consumption collaboration policies. |
WSC |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Dennis Mulcare |
Striving for coherency to mitigate the complexity of system design. |
ECBS |
1997 |
DBLP DOI BibTeX RDF |
system design complexity, software system complexity, design product, functional architecture, embedded systems, systems analysis, design process, architectural design, system requirements, system specifications |
14 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
14 | Marijn Janssen, Bram Klievink |
ICT-project failure in public administration: the need to include risk management in enterprise architectures. |
DG.O |
2010 |
DBLP BibTeX RDF |
Prince2, project failure, service-oriented architecture, e-government, project management, risk management, enterprise architecture, information architecture |
14 | Nagaraj Ns, Juan C. Rey, Jamil Kawa, Robert C. Aitken, Christian Lütkemeyer, Vijay Pitchumani, Andrzej J. Strojwas, Steve Trimberger |
Who solves the variability problem? |
DAC |
2010 |
DBLP DOI BibTeX RDF |
IC variability |
14 | Nicholas Holden, Alex Alves Freitas |
Hierarchical classification of protein function with ensembles of rules and particle swarm optimisation. |
Soft Comput. |
2009 |
DBLP DOI BibTeX RDF |
Hierarchical classification, Particle swarm optimisation, Protein function prediction |
14 | Lucas Davi, Ahmad-Reza Sadeghi, Marcel Winandy |
Dynamic integrity measurement and attestation: towards defense against return-oriented programming attacks. |
STC |
2009 |
DBLP DOI BibTeX RDF |
attestation systems, integrity monitoring, return-oriented programming |
14 | Yvan Pointurier, Maïté Brandt-Pearce, Suresh Subramaniam 0001, Bo Xu |
Cross-layer adaptive routing and wavelength assignment in all-optical networks. |
IEEE J. Sel. Areas Commun. |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Umut Orguner, Fredrik Gustafsson |
Risk-Sensitive Particle Filters for Mitigating Sample Impoverishment. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Mel Gorman, Patrick Healy |
Supporting superpage allocation without additional hardware support. |
ISMM |
2008 |
DBLP DOI BibTeX RDF |
superpage, fragmentation, replacement policy, tlb |
14 | Tae Hyun Kim 0001, Robert W. Heath Jr., Sunghyun Choi 0001 |
Multiuser MIMO Downlink with Limited Feedback Using Transmit-Beam Matching. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Tanya G. Roosta, Wei-Chieh Liao, Wei-Chung Teng, Shankar Sastry 0001 |
Testbed Implementation of a Secure Flooding Time Synchronization Protocol. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Sanjeev Kumar, Einar Petana |
Mitigation of TCP-SYN Attacks with Microsoft's Windows XP Service Pack2 (SP2) Software. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Denial of Service (DoS) attacks, TCP SYN attack, Windows XP Service Pack2 operating system, Internet Security |
14 | Kevin Brownell, Gu-Yeon Wei, David M. Brooks |
Evaluation of voltage interpolation to address process variations. |
ICCAD |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Feng Wang 0017, Lixin Gao 0001, Oliver Spatscheck, Jia Wang |
STRID: Scalable Trigger-Based Route Incidence Diagnosis. |
ICCCN |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Fei Wang, Yijun Mo, Benxiong Huang |
Defending Reputation System against False Recommendation in Mobile Ad Hoc Network. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Qiyue Zou, Alireza Tarighat, Ali H. Sayed |
Compensation of Phase Noise in OFDM Wireless Systems. |
IEEE Trans. Signal Process. |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Keqiang Wu, David J. Lilja, Haowei Bai |
An adaptive dual control framework for QoS design. |
Clust. Comput. |
2007 |
DBLP DOI BibTeX RDF |
Adaptive dual control, Quality of service, Distributed system |
14 | Shanshan Li 0001, Shaoliang Peng, Xiangke Liao, Peidong Zhu, Yuxing Peng 0001 |
A Framework for Congestion Control for Reliable Data Delivery in Wireless Sensor Networks. |
Integrated Network Management |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Stefano Bistarelli, Fabio Fioravanti, Pamela Peretti |
Using CP-nets as a guide for countermeasure selection. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Il-Horn Hann, Kai Lung Hui, Sang-Yong Tom Lee, Ivan P. L. Png |
Analyzing Online Information Privacy Concerns: An Information Processing Theory Approach. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
14 | Ahmed Youssef, Tor Myklebust, Mohab Anis, Mohamed I. Elmasry |
A Low-Power Multi-Pin Maze Routing Methodology. |
ISQED |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Soon-Keow Chong, Jemal H. Abawajy |
Feedback Credibility Issues In Trust Management Systems. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Thomas Sandholm, Kevin Lai |
A statistical approach to risk mitigation in computational markets. |
HPDC |
2007 |
DBLP DOI BibTeX RDF |
QoS, resource allocation, service level management |
14 | Yufeng Wang 0001, Yoshiaki Hori, Kouichi Sakurai |
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments. |
APWeb/WAIM Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Zhengyi Le, Yi Ouyang 0001, Yurong Xu, James Ford, Fillia Makedon |
Preventing Unofficial Information Propagation. |
ICICS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Jin He, Masoud Salehi |
Chip-Level Coordinated Interference-Aware Beamforming for MIMO-CDMA in Frequency-Selective Broadcast Channels. |
CISS |
2007 |
DBLP DOI BibTeX RDF |
|
14 | Luca Sterpone, Massimo Violante |
A New Reliability-Oriented Place and Route Algorithm for SRAM-Based FPGAs. |
IEEE Trans. Computers |
2006 |
DBLP DOI BibTeX RDF |
transient fault injection, FPGA, reliability, place and route |
14 | Jiyun Shen, Hiromasa Fujii, Takahiro Asai, Hitoshi Yoshino |
Sequential Search Method with Different Thresholds for Clipped Power for OFDM Signal. |
VTC Spring |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Engin Kirda, Christopher Krügel, Giovanni Vigna, Nenad Jovanovic |
Noxes: a client-side solution for mitigating cross-site scripting attacks. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Frank S. Rietta |
Application layer intrusion detection for SQL injection. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
anomaly detection, database security, SQL injection |
14 | Janice Warner, Vijayalakshmi Atluri |
Inter-instance authorization constraints for secure workflow management. |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
security, work flow, authorization constraints |
14 | Aifeng Ren, Qinye Yin 0001 |
Blind Multi-user Detection for Multi-carrier CDMA Systems with Uniform Linear Arrays. |
ICNC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | David Duncombe, George M. Mohay, Andrew J. Clark |
Synapse: auto-correlation and dynamic attack redirection in an immunologically-inspired IDS. |
ACSW |
2006 |
DBLP BibTeX RDF |
immunological., intrusion detection, alert correlation |
14 | Souvik Barat, Vinay Kulkarni, D. Janakiram |
A safety criterion for reusing a business process in the desired integrated. |
IEEE SCC |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Hiroshi Yamamoto, Masato Tsuru, Yuji Oie |
Parallel Transferable Uniform Multi-round Algorithm for Achieving Minimum Application Turnaround Times for Divisible Workload. |
HPCC |
2005 |
DBLP DOI BibTeX RDF |
Master/Worker model, Divisible Workload, UMR, Parallel Data Transmission, Constraint Minimization Problem |
14 | Srinivas Raghvendra, Philippe Hurat |
DFM: Linking Design and Manufacturing. |
VLSI Design |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Ed Crowley |
Open source centric information security lab development. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
knoppix, live CD, security, Linux |
14 | Vir V. Phoha, Amit U. Nadgar, Asok Ray, Shashi Phoha |
Supervisory Control of Software Systems. |
IEEE Trans. Computers |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Yngvar Larsen, Geert Leus, Georgios B. Giannakis |
Constant modulus and reduced PAPR block differential encoding for frequency-selective channels. |
IEEE Trans. Commun. |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Tom W. Chen, Justin Gregg |
A Low Cost Individual-Well Adaptive Body Bias (IWABB) Scheme for Leakage Power Reduction and Performance Enhancement in the Presence of Intra-Die Variations. |
DATE |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Anders Edman, Christer Svensson |
Timing closure through a globally synchronous, timing partitioned design methodology. |
DAC |
2004 |
DBLP DOI BibTeX RDF |
wire delays, clock skew, timing closure |
14 | Robert J. Thomas, Timothy Mount, Ray Zimmerman, William Schulze, Richard E. Schuler, L. Duane Chapman |
Testing the Effects of Price Responsive Demand on Pay-as-Offered and Soft-Cap Electricity Auctions. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
|
14 | Jonathan K. Millen, Rebecca N. Wright |
Reasoning about Trust and Insurance in a Public Key Infrastructure. |
CSFW |
2000 |
DBLP DOI BibTeX RDF |
cryptography, trust, logic, certificate, public key infrastructure, insurance |
14 | Raymond A. Paul, Ann T. Tai |
Building High-Assurance Systems Using COTS Components: Whether, Why, When and How? |
HASE |
1999 |
DBLP DOI BibTeX RDF |
|
13 | Enhui Chai, Li Chen, Xingxing Hao, Wei Zhou |
Mitigate the scale imbalance via multi-scale information interaction in small object detection. |
Neural Comput. Appl. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Fei Li, Laili Wang, Min Wu, Longyang Yu |
A Coupled-Inductor-Based Input-Parallel Output-Parallel Quasi-Resonant Single-Stage DC-DC Converter to Mitigate Current Difference. |
IEEE Trans. Ind. Electron. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Sheetal Kaushik, Khushboo Tripathi, Rashmi Gupta, Prerna Mahajan |
Enhancing Reliability in Mobile Ad Hoc Networks (MANETs) Through the K-AOMDV Routing Protocol to Mitigate Black Hole Attacks. |
SN Comput. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Amir Reza Rahimi |
A tri-phenomenon perspective to mitigate MOOCs' high dropout rates: the role of technical, pedagogical, and contextual factors on language learners' L2 motivational selves, and learning approaches to MOOC. |
Smart Learn. Environ. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hideki Kondo, Sayaka Tohyama, Ayano Ohsaki, Masayuki Yamada |
Time-shifting Method to Mitigate Discussion Stagnation and Promote SNS Collaboration. |
J. Inf. Process. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Homayoun Afshari, Zolfa Zeinalpour-Yazdi |
A Game-Theoretical and Spatial Approach to Mitigate Pilot Contamination in Crowded Massive MIMO Systems. |
IEEE Trans. Wirel. Commun. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Inyoung Bang, Martin Kayondo, Junseung You, Donghyun Kwon, Yeongpil Cho, Yunheung Paek |
Enhancing a Lock-and-Key Scheme With MTE to Mitigate Use-After-Frees. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Le Nam Pham, Khoa Dang Pham, Quoc Dung Phan, Nho-Van Nguyen |
Novel Virtual Vector SVPWM Method to Mitigate Low-Frequency Common Mode Voltage for Four-Level NPC Inverters. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Boyang Zhou, Chunming Wu 0001, Qiang Yang 0004, Yaguan Qian, Yinghui Nie |
Resilient Sensor Data Dissemination to Mitigate Link Faults in IoT Networks With Long-Haul Optical Wires for Power Transmission Grids. |
IEEE Internet Things J. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Ehsan Naderi, Arash Asrari |
A Remedial Action Scheme To Mitigate Market Power Caused by Cyberattacks Targeting a Smart Distribution System. |
IEEE Trans. Ind. Informatics |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Xiaohui Gu, Guoan Zhang, Wei Duan 0001, Jaeho Choi, Miaowen Wen, Pin-Han Ho |
RIS-V2V Communications: The Way to Mitigate Doppler Shifts and Multipath Spread. |
IEEE Wirel. Commun. Lett. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Han Qiu 0001, Yi Zeng, Qinkai Zheng, Shangwei Guo, Tianwei Zhang 0004, Hewu Li |
An Efficient Preprocessing-Based Approach to Mitigate Advanced Adversarial Attacks. |
IEEE Trans. Computers |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Jinghua Groppe, Sven Groppe, Daniel Senf, Ralf Möller 0001 |
There Are Infinite Ways to Formulate Code: How to Mitigate the Resulting Problems for Better Software Vulnerability Detection. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Salman Bin Naeem, Mehreen Azam, Maged N. Kamel Boulos, Rubina Bhatti |
Leveraging the TOE Framework: Examining the Potential of Mobile Health (mHealth) to Mitigate Health Inequalities. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh 0001, Maen Alzubi, Khaled Alrfou |
DT-ARO: Decision Tree-Based Artificial Rabbits Optimization to Mitigate IoT Botnet Exploitation. |
J. Netw. Syst. Manag. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Frank John Bolton, Dov Te'eni, Eran Toch |
Can Previews Mitigate the Effect of Interruptions? Findings from a Lab Experiment under Various Workloads. |
Int. J. Hum. Comput. Interact. |
2024 |
DBLP DOI BibTeX RDF |
|
13 | F. Nisa Bostanci, Ismail Emir Yuksel, Ataberk Olgun, Konstantinos Kanellopoulos, Yahya Can Tugrul, Abdullah Giray Yaglikçi, Mohammad Sadrosadati, Onur Mutlu |
CoMeT: Count-Min-Sketch-based Row Tracking to Mitigate RowHammer at Low Cost. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Gautam Kishore Shahi |
TweetInfo: An Interactive System to Mitigate Online Harm. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Dane Brouwer, Joshua Citron, Hojung Choi, Marion Lepert, Michael A. Lin, Jeannette Bohg, Mark R. Cutkosky |
Tactile-Informed Action Primitives Mitigate Jamming in Dense Clutter. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Hao Hao Tan, Kin Wai Cheuk, Taemin Cho, Wei-Hsiang Liao, Yuki Mitsufuji |
MR-MT3: Memory Retaining Multi-Track Music Transcription to Mitigate Instrument Leakage. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Wei Chen, Yunan Li, Yuan Tian |
CarbonNet: How Computer Vision Plays a Role in Climate Change? Application: Learning Geomechanics from Subsurface Geometry of CCS to Mitigate Global Warming. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Matthew J. Skiles, Joshua D. Rhodes, Michael E. Webber |
Assessing the Potential for Building Sector Retrofits to Mitigate ERCOT Electricity Shortfalls During Winter Storm Uri. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yuu Jinnai, Tetsuro Morimura, Kaito Ariu, Kenshi Abe |
Regularized Best-of-N Sampling to Mitigate Reward Hacking for Language Model Alignment. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Lucas Friedrich, Jonas Maziero |
Quantum neural network with ensemble learning to mitigate barren plateaus and cost function concentration. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Haoqing Li, Jinfu Yang, Yifei Xu, Runshi Wang |
Mitigate Target-level Insensitivity of Infrared Small Target Detection via Posterior Distribution Modeling. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Doris E. M. Brown, Venkata Sriram Siddhardh Nadendla, Sajal K. Das 0001 |
TASR: A Novel Trust-Aware Stackelberg Routing Algorithm to Mitigate Traffic Congestion. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yuhe Ke, Rui Yang, Sui An Lie, Taylor Xin Yi Lim, Hairil Rizal Abdullah, Daniel Shu Wei Ting, Nan Liu 0003 |
Enhancing Diagnostic Accuracy through Multi-Agent Conversations: Using Large Language Models to Mitigate Cognitive Bias. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zhibo Zhang, Pengfei Li, Ahmed Y. Al Hammadi, Fusen Guo, Ernesto Damiani, Chan Yeob Yeun |
Reputation-Based Federated Learning Defense to Mitigate Threats in EEG Signal Classification. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Junho Kim, Yeonju Kim, Yong Man Ro |
What if...?: Counterfactual Inception to Mitigate Hallucination Effects in Large Multimodal Models. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Yijiang Pang, Hoang Bao, Jiayu Zhou |
Cross-modality debiasing: using language to mitigate sub-population shifts in imaging. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Minchan Kim, Minyeong Kim, Junik Bae, Suhwan Choi, Sungkyung Kim, Buru Chang |
Exploiting Semantic Reconstruction to Mitigate Hallucinations in Vision-Language Models. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Huiyu Xiong, Lanxiao Wang, Heqian Qiu, Taijin Zhao, Benliu Qiu, Hongliang Li |
MCF-VC: Mitigate Catastrophic Forgetting in Class-Incremental Learning for Multimodal Video Captioning. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Md. Morshed Alam, Israt Jahan, Weichao Wang |
IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
13 | Zeliang Zhang, Mingqian Feng, Zhiheng Li, Chenliang Xu |
Discover and Mitigate Multiple Biased Subgroups in Image Classifiers. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 3004 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|