Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
51 | Alexander Aiken, Jeffrey S. Foster, John Kodumal, Tachio Terauchi |
Checking and inferring local non-aliasing. |
PLDI |
2003 |
DBLP DOI BibTeX RDF |
effect inference, constraints, types, locking, alias analysis, Linux kernel, type qualifiers, restrict, confine, flow-sensitivity |
44 | Hideki Tode, Zhu Tianwei, Shouhei Nishi, Koso Murakami |
A Route Design Algorithm for Multiple-Encoding Optical CDM Switching Network. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
light interference, photonic switching systems, route design algorithm, multiple-encoding optical CDM switching network, photonic IP switching system, routing information, interference noise, restrict-complied routing method, Bellman-Ford algorithm, Internet, transport protocols, encoding, network topologies, telecommunication network routing, optical fibre networks, next generation Internet |
40 | Takeshi Ando, Jun Okamoto, Masakatsu G. Fujie |
Intelligent corset to support rollover of cancer bone metastasis patients - Mechanism to restrict the trunk ROM. |
IROS |
2008 |
DBLP DOI BibTeX RDF |
|
33 | Jochen Hipp, Christoph Mangold, Ulrich Güntzer, Gholamreza Nakhaeizadeh |
Efficient Rule Retrieval and Postponed Restrict Operations for Association Rule Mining. |
PAKDD |
2002 |
DBLP DOI BibTeX RDF |
|
31 | Jeffrey S. Foster, Tachio Terauchi, Alexander Aiken |
Flow-Sensitive Type Qualifiers. |
PLDI |
2002 |
DBLP DOI BibTeX RDF |
effect inference, constraints, types, locking, alias analysis, linux kernel, type qualifiers, restrict, flow-sensitivity |
26 | Rachel Young, Melissa Tully, Leandra Parris, Marizen Ramirez, Mallory Bolenbaugh, Ashley Hernandez |
Barriers to mediation among U.S. parents of adolescents: A mixed-methods study of why parents do not monitor or restrict digital media use. |
Comput. Hum. Behav. |
2024 |
DBLP DOI BibTeX RDF |
|
26 | Henrietta Batinovic, Fabian Tingelhoff, Maik Hammerschmidt, Sofia Schöbel |
Come Closer, but Not Too Close: How Virtual Influencers Can Facilitate or Restrict Brand Experiences in the Metaverse. |
HICSS |
2024 |
DBLP BibTeX RDF |
|
26 | Tatiane Nogueira Rios, Ricardo Araújo Rios, Rodrigo Fernandes de Mello |
eXplainable Ensemble Strategy using distinct and restrict learning biases: A case study on the Brazilian Forest. |
Appl. Soft Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
26 | McKenna McCall, Abhishek Bichhawat, Limin Jia 0001 |
Tainted Secure Multi-Execution to Restrict Attacker Influence. |
CCS |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Yue Jiang, Jing Chen, Qi Chen, Long Liu |
Promote or Restrict? A Co-design Practice of a Palliative Care Information Management System in China. |
HCI (19) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Kine Ødegård Hanssen, Anders Malthe-Sørenssen |
Perineuronal nets restrict transport near the neuron surface: A coarse-grained molecular dynamics study. |
Frontiers Comput. Neurosci. |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Haobin Chen, Yuer Yang, Yubing Wu |
Invalid Message Risks and Analysis of Laws to Restrict Cyber Crime in Social Applications. |
ICNCC |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Jessica A. Enright, Kitty Meeks, George B. Mertzios, Viktor Zamaraev |
Deleting edges to restrict the size of an epidemic in temporal networks. |
J. Comput. Syst. Sci. |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Ajay Kumar Sahu, Ashish Kumar |
A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card. |
Int. J. Digit. Crime Forensics |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Mohammad Mahdi Bejani, Mehdi Ghatee |
Adaptive Low-Rank Regularization with Damping Sequences to Restrict Lazy Weights in Deep Networks. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
26 | Ajinkya Gaikwad, Soumen Maity |
Edge Deletion to Restrict the Size of an Epidemic. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
26 | Barjinder Kaur, Sajjad Dadkhah, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani 0001 |
Verification Based Scheme to Restrict IoT Attacks. |
BDCAT |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Matthew J. Roos |
Utilizing a null class to restrict decision spaces and defend against neural network adversarial attacks. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
26 | Christian Bailly, Gérard Vergoten |
N-glycosylation and ubiquitinylation of PD-L1 do not restrict interaction with BMS-202: A molecular modeling study. |
Comput. Biol. Chem. |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Victor Hugo Madrid-Mendoza, Maria Carmen Torres-Salazar, Areli Rizo-Aguilar, Viridiana Aydeé León-Hernández, Martha Roselia Contreras-Valenzuela |
Determination of Assessment Elements That Restrict REBA Implementations Within Aseptic Areas. A Study Case. |
AHFE (15) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Junhua Zhu, Limin Wang, Yu Gu, Xiaojun Lin |
Learning to Restrict Test Range for Compiler Test. |
ICST Workshops |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Jessica A. Enright, Kitty Meeks, George B. Mertzios, Viktor Zamaraev |
Deleting Edges to Restrict the Size of an Epidemic in Temporal Networks. |
MFCS |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Jessica A. Enright, Kitty Meeks |
Deleting Edges to Restrict the Size of an Epidemic: A New Application for Treewidth. |
Algorithmica |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Jessica A. Enright, Kitty Meeks, George B. Mertzios, Viktor Zamaraev |
Deleting edges to restrict the size of an epidemic in temporal networks. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
26 | Juliao Braga, João Nuno Silva, Patricia Takako Endo, Jessica Ribas, Nizam Omar |
Blockchain to Improve Security and Knowledge in Inter-Agent Communication and Collaboration over Restrict Domains of the Internet Infrastructure. |
CoRR |
2018 |
DBLP BibTeX RDF |
|
26 | Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo |
A System to Restrict Regions of Image Processing by Laser Range Scanners. |
GCCE |
2018 |
DBLP DOI BibTeX RDF |
|
26 | Peter Mell, James M. Shook, Richard E. Harang, Serban I. Gavrila |
Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems. |
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Marcelo Antonio de Carvalho, Paulo Bandiera-Paiva |
Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling. |
ICCST |
2017 |
DBLP DOI BibTeX RDF |
|
26 | Laurent Bulteau, Guillaume Fertin, Eric Tannier |
Genome rearrangements with indels in intergenes restrict the scenario space. |
BMC Bioinform. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Bing Li, Shuai Chen |
A dynamic PUF anti-aging authentication system based on restrict race code. |
Sci. China Inf. Sci. |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Jean-Baptiste Braconnier, Roland Lenain, Benoît Thuilot, Vincent Rousseau |
High speed path tracking application in harsh conditions: Predictive speed control to restrict the lateral deviation to some threshold. |
IROS |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Emir Ugljanin, Noura Faci, Vanilson Arruda Burégio, Zakaria Maamar |
How to Restrict Web 2.0 Applications Use in the Workplace? Example of Google+ Hangouts. |
EDOC Workshops |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Yu Zhou 0025, Ruifeng Xu, Lin Gui 0003 |
A sequence level latent topic modeling method for sentiment analysis via CNN based Diversified Restrict Boltzmann Machine. |
ICMLC |
2016 |
DBLP DOI BibTeX RDF |
|
26 | Jessica A. Enright, Kitty Meeks |
Deleting edges to restrict the size of an epidemic. |
CoRR |
2015 |
DBLP BibTeX RDF |
|
26 | Jessica A. Enright, Kitty Meeks |
Deleting Edges to Restrict the Size of an Epidemic: A New Application for Treewidth. |
COCOA |
2015 |
DBLP DOI BibTeX RDF |
|
26 | Yang Wang 0074, Man Ho Au, Willy Susilo |
Attribute-based optimistic fair exchange: How to restrict brokers with policies. |
Theor. Comput. Sci. |
2014 |
DBLP DOI BibTeX RDF |
|
26 | John Champaign, Robin Cohen, Noel Sardana, John A. Doucette |
A framework to restrict viewing of peer commentary on Web objects based on trust modeling. |
Soc. Netw. Anal. Min. |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Wujie Wen, Yaojun Zhang, Mengjie Mao, Yiran Chen 0001 |
State-Restrict MLC STT-RAM Designs for High-Reliable High-Performance Memory System. |
DAC |
2014 |
DBLP DOI BibTeX RDF |
|
26 | Menal Guzelsoy, George L. Nemhauser, Martin W. P. Savelsbergh |
Restrict-and-relax search for 0-1 mixed-integer programs. |
EURO J. Comput. Optim. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Ben Ambridge |
How Do Children Restrict Their Linguistic Generalizations? An (Un-)Grammaticality Judgment Study. |
Cogn. Sci. |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Michael C. Calver, Maggie Lilith, Christopher R. Dickman |
A 'perverse incentive' from bibliometrics: could National Research Assessment Exercises (NRAEs) restrict literature availability for nature conservation? |
Scientometrics |
2013 |
DBLP DOI BibTeX RDF |
|
26 | Yasuo Sakurai, Takayuki Suzuki, Kenichi Aiba, Takamasa Yoshinari, Kiyotaka Kawashima, Kazuyuki Kihara |
Proposal of a Mechanism to Restrict Pressure Change by Oil Temperature Change. |
Int. J. Autom. Technol. |
2012 |
DBLP DOI BibTeX RDF |
|
26 | Hoang Thi My Le, Phan Thi Bong, Huy Khanh Phan |
Building a Machine Translation System in a Restrict Context from Ka-Tu Language into Vietnamese. |
KSE |
2012 |
DBLP DOI BibTeX RDF |
|
26 | ZiJie Xu, Ke Xu |
Ways to restrict the differential path. |
IACR Cryptol. ePrint Arch. |
2011 |
DBLP BibTeX RDF |
|
26 | Anca Dinu |
A Mechanism to Restrict the Scope of Clause-Bounded Quantifiers in 'Continuation' Semantics. |
RANLP |
2011 |
DBLP BibTeX RDF |
|
26 | Xiong Liu, Haiwei Xue, Yiqi Dai |
A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel. |
IPTC |
2011 |
DBLP DOI BibTeX RDF |
|
26 | Woo-Hwan Kim, HyoJin Yoon, Jung Hee Cheon |
Metered signatures: How to restrict the signing capability. |
J. Commun. Networks |
2010 |
DBLP DOI BibTeX RDF |
|
26 | Susan Windisch Brown, Travis Rood, Martha Palmer |
Number or Nuance: Which Factors Restrict Reliable Word Sense Annotation? |
LREC |
2010 |
DBLP BibTeX RDF |
|
26 | Jernej Vicic, Petr Homola, Vladislav Kubon |
A Method to Restrict the Blow-up of Hypotheses of a Non-disambiguated. |
RANLP |
2009 |
DBLP BibTeX RDF |
|
26 | Abdul Wahid Hakmi, Stefan Holst, Hans-Joachim Wunderlich, Jürgen Schlöffel, Friedrich Hapke, Andreas Glowatz |
Restrict Encoding for Mixed-Mode BIST. |
VTS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Ashwin Srinivasan 0001, Ravi Kothari |
A Study of Applying Dimensionality Reduction to Restrict the Size of a Hypothesis Space. |
ILP |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jeffrey M. Rosenfeld |
Spiders and Crawlers and Bots, Oh My: The Economic Efficiency and Public Policy of Contracts that Restrict Data Collection |
CoRR |
2001 |
DBLP BibTeX RDF |
|
26 | Austin Tate, Brian Drabble, Jeff Dalton 0002 |
The Use of Condition Types to Restrict Search in an AI Planner. |
AAAI |
1994 |
DBLP BibTeX RDF |
|
26 | Ken Currie, Austin Tate |
Using domain knowledge to restrict search in an AI planner. |
Expert Planning Systems |
1990 |
DBLP BibTeX RDF |
|
26 | Barbara Dunin-Keplicz |
How To Restrict Ambiguity Of Discourse. |
EACL |
1985 |
DBLP BibTeX RDF |
|
26 | Charles W. Bachman |
Why restrict the modelling capability of CODASYL data structure sets? |
AFIPS National Computer Conference |
1977 |
DBLP DOI BibTeX RDF |
|
21 | Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King |
Alhambra: a system for creating, enforcing, and testing browser security policies. |
WWW |
2010 |
DBLP DOI BibTeX RDF |
web browser, web security, cross-site scripting |
21 | Stephen Smaldone, Vinod Ganapathy, Liviu Iftode |
Working set-based access control for network file systems. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
access control, network file system |
21 | Youpyo Hong, Peter A. Beerel, Jerry R. Burch, Kenneth L. McMillan |
Safe BDD Minimization Using Don't Cares. |
DAC |
1997 |
DBLP DOI BibTeX RDF |
|
21 | William C. Ogden |
The human factors of natural language query systems. |
ACM Conference on Computer Science |
1985 |
DBLP DOI BibTeX RDF |
|
14 | Fernando Rosa-Velardo, David de Frutos-Escrig |
Decidability Results for Restricted Models of Petri Nets with Name Creation and Replication. |
Petri Nets |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Bernd Finkbeiner, Lars Kuhtz |
Monitor Circuits for LTL with Bounded and Unbounded Future. |
RV |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Ivona Bezáková, Nayantara Bhatnagar, Dana Randall |
On the Diaconis-Gangolli Markov Chain for Sampling Contingency Tables with Cell-Bounded Entries. |
COCOON |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz |
A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. |
CCGRID |
2008 |
DBLP DOI BibTeX RDF |
restricted delegation, Grid Computing, authorization policy, proxy certificate |
14 | Christof Fetzer, Martin Süßkraut |
Switchblade: enforcing dynamic personalized system call models. |
EuroSys |
2008 |
DBLP DOI BibTeX RDF |
system call interposition, system call models, security, taint analysis |
14 | Tao-Yuan Jen, Dominique Laurent 0001, Nicolas Spyratos |
Mining all frequent projection-selection queries from a relational table. |
EDBT |
2008 |
DBLP DOI BibTeX RDF |
|
14 | Malathi Subramanian |
Theory and practice of e-governance in India: a gender perspective. |
ICEGOV |
2007 |
DBLP DOI BibTeX RDF |
citizenship, gender, participation, empowerment, information society, information communication technology |
14 | Yu-Mei Liu, Shoubao Yang, Leitao Guo |
A Distributed Trust-based Reputation Model in P2P System. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
R-Chord, TBRM, Trust, Transaction, Reputation, p2p networks, Resource |
14 | Chian C. Ho, Chi-Wei Chen |
Oversampling Sigma-Delta Modulator Stabilized by Sub-Bit Nonlinear Feedback Loop Technique. |
ICICIC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Marc Fetscherin |
Economics of online music and consumer behavior. |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
online music, digital rights management, consumer behavior |
14 | Imran Khan, Ronald Schroeter, Jane Hunter 0001 |
Implementing a Secure Annotation Service. |
IPAW |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Xavier Rival |
Abstract Dependences for Alarm Diagnosis. |
APLAS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Martin Grohe, Nicole Schweikardt |
Lower bounds for sorting with few random accesses to external memory. |
PODS |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Orna Grumberg |
Abstraction and Refinement in Model Checking. |
FMCO |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Jianer Chen, Xiuzhen Huang, Iyad A. Kanj, Ge Xia |
Linear FPT reductions and computational lower bounds. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
lower bound, complexity theory, NP-hard problems |
14 | Lalana Kagal, Timothy W. Finin |
Modeling Communicative Behavior Using Permissions and Obligations. |
AC |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Yann Loyer, Umberto Straccia |
Default Knowledge in Logic Programs with Uncertainty. |
ICLP |
2003 |
DBLP DOI BibTeX RDF |
|
14 | Keji Suzuki |
Effects of Punishment into Actions in Social Agents. |
JSAI Workshops |
2001 |
DBLP DOI BibTeX RDF |
|
14 | Sandeepan Sanyal, Sourav Bhattacharya |
Marriage of Wired and Wireless Networks to Build Tomorrows Internet. |
COMPSAC |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Rachid Guerraoui, André Schiper |
"Gamma-Accurate" Failure Detectors. |
WDAG |
1996 |
DBLP DOI BibTeX RDF |
|
14 | Rolf Hennicker |
Context Induction: a Proof Principle for Behavioural Abstractions. |
DISCO |
1990 |
DBLP DOI BibTeX RDF |
|
14 | Marc Gyssens |
On the Complexity of Join Dependencies. |
ACM Trans. Database Syst. |
1986 |
DBLP DOI BibTeX RDF |
|
14 | A. J. Kfoury |
Analysis of Simple Programs Over Different Sets of Primitives. |
POPL |
1980 |
DBLP DOI BibTeX RDF |
|
7 | Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta |
Security validation tool for business processes. |
SACMAT |
2011 |
DBLP DOI BibTeX RDF |
|
7 | Francesc Esteva, Lluís Godo, Carles Noguera |
Expanding the propositional logic of a t-norm with truth-constants: completeness results for rational semantics. |
Soft Comput. |
2010 |
DBLP DOI BibTeX RDF |
Mathematical fuzzy logic, Left-continuous t-norms, T-norm based logics, Truth-constants, Evaluated formulae, Real and rational completeness |
7 | Sylvain Lamprier, Tassadit Amghar, Frédéric Saubion, Bernard Levrat |
Query-oriented clustering: a multi-objective approach. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
query-oriented clustering, information retrieval, multiobjective optimization |
7 | Aggelos Delis, Vassilios S. Verykios, Achilleas A. Tsitsonis |
A data perturbation approach to sensitive classification rule hiding. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
|
7 | Stefan Monnier, David Haguenauer |
Singleton types here, singleton types there, singleton types everywhere. |
PLPV |
2010 |
DBLP DOI BibTeX RDF |
dependent types, certified compilation, singleton types |
7 | Sam Burnett, Nick Feamster, Santosh S. Vempala |
Circumventing censorship with collage. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
availability, censorship |
7 | Clemente Rafael Borges, José Antonio Macías |
Feasible database querying using a visual end-user approach. |
EICS |
2010 |
DBLP DOI BibTeX RDF |
usability, data warehouse, end-user development (eud), visual interfaces, web-based interaction |
7 | Jin Zhou, Brian Demsky |
Bamboo: a data-centric, object-oriented approach to many-core software. |
PLDI |
2010 |
DBLP DOI BibTeX RDF |
data-centric languages, many-core programming |
7 | Seung-Kyu Lee, Byung Ro Moon |
A new modular genetic programming for finding attractive technical patterns in stock markets. |
GECCO |
2010 |
DBLP DOI BibTeX RDF |
modular genetic programming, technical patterns, patterns, stocks |
7 | Christopher Thomas Ryan, Albert Xin Jiang, Kevin Leyton-Brown |
Computing pure strategy nash equilibria in compact symmetric games. |
EC |
2010 |
DBLP DOI BibTeX RDF |
rational generating functions, symmetric games, game theory |
7 | Matthew P. Johnson 0001, Amotz Bar-Noy |
Brief announcement: pan and scan. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
directional sensors, coverage, targets |
7 | Rena Bakhshi, Jörg Endrullis, Wan J. Fokkink, Jun Pang 0001 |
Brief announcement: asynchronous bounded expected delay networks. |
PODC |
2010 |
DBLP DOI BibTeX RDF |
abd networks, probabilistic algorithms, anonymous networks |
7 | Gösta Grahne, Adrian Onet |
Data correspondence, exchange and repair. |
ICDT |
2010 |
DBLP DOI BibTeX RDF |
|
7 | Shunsuke Yoshida, Sumio Yano, Hiroshi Ando |
Implementation of a tabletop 3D display based on light field reproduction. |
SIGGRAPH Posters |
2010 |
DBLP DOI BibTeX RDF |
|
7 | Hidehiko Masuhara, Atsushi Igarashi, Manabu Toyama |
Type relaxed weaving. |
AOSD |
2010 |
DBLP DOI BibTeX RDF |
around advice, aspect-oriented programming, type safety |
7 | Ilija Subasic |
User centered story tracking. |
SIGIR |
2010 |
DBLP DOI BibTeX RDF |
visualization, evaluation, temporal text mining |
7 | Lanbo Zhang, Yi Zhang 0001 |
Interactive retrieval based on faceted feedback. |
SIGIR |
2010 |
DBLP DOI BibTeX RDF |
faceted feedback, metadata-based retrieval, relevance feedback, interactive retrieval |