BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
consist (10)
system (10)
use (6)
qualiti (5)
design (5)

Stem ensur$ (all stems)

48 papers:

DACDAC-2015-ShererRO #functional #safety
Ensuring functional safety compliance for ISO 26262 (ADS, JR, RO), p. 3.
CBSECBSE-2014-CidHMJ
Ensuring application integrity in shared sensing environments (PJdC, DH, SM, WJ), pp. 149–158.
FMFM-2014-ArenisWDMA #consistency #industrial #standard #verification
The Wireless Fire Alarm System: Ensuring Conformance to Industrial Standards through Formal Verification (SFA, BW, DD, MM, ASA), pp. 658–672.
ICEISICEIS-v3-2014-DSouzaBHWV #assessment #framework #modelling #ontology
An Assessment Framework for Business Model Ontologies to Ensure the Viability of Business Models (AD, NRTPvB, GBH, JCW, HV), pp. 226–235.
SACSAC-2014-Mota #internet #quality #research #student
Student research abstract: mechanisms to ensure quality of service for the internet of things (RPBM), pp. 713–714.
EDOCEDOC-2013-NagelGEP #consistency #modelling #process
Ensuring Consistency among Business Goals and Business Process Models (BN, CG, GE, JP), pp. 17–26.
CBSECBSE-2012-GhafariJSH #approach #architecture #component #configuration management #consistency
An architectural approach to ensure globally consistent dynamic reconfiguration of component-based systems (MG, PJ, SS, HH), pp. 177–182.
ICPRICPR-2012-DasR #documentation #image #novel #quality
A novel scheme of orientation and scale mapped RDC (OS-RDC) to improve compression in document images ensuring quality preservation (AD, RR), pp. 641–644.
SACSAC-2012-RahmanA #authentication #named #network #protocol #robust
DRAP: a Robust Authentication protocol to ensure survivability of computational RFID networks (FR, SIA), pp. 498–503.
DATEDATE-2011-NarayananZT #correctness #pattern matching #process #using
Ensuring correctness of analog circuits in presence of noise and process variations using pattern matching (RN, MHZ, ST), pp. 1188–1191.
HCIDUXU-v2-2011-BaughD #design #experience #locality #user interface
Designing Notebook Computers to Ensure a Comfortable User Experience: Effects of Surface Temperature, Material, Locality, and Ambient Temperature (EB, RD), pp. 539–547.
HCIDUXU-v2-2011-OlsenPB #effectiveness #game studies #how #testing #usability
Serious Games Usability Testing: How to Ensure Proper Usability, Playability, and Effectiveness (TO, KP, CAB), pp. 625–634.
HCIHIMI-v1-2011-Terawaki #education #elicitation #information management #requirements
Supporting of Requirements Elicitation for Ensuring Services of Information Systems Used for Education (YT), pp. 58–65.
SEKESEKE-2011-AlencarTSDC
Maximizing the Financial Benefits Yielded by IT Projects While Ensuring their Strategic Fit (AJA, GT, EAS, AFdSD, ALC), pp. 288–295.
SEKESEKE-2011-ComanSS
Ensuring Continuous Data Accuracy in AISEMA Systems (IDC, AS, GS), pp. 640–645.
ASPLOSASPLOS-2011-HofmannDKRW #kernel #operating system
Ensuring operating system kernel integrity with OSck (OSH, AMD, SK, IR, EW), pp. 279–290.
SCAMSCAM-2010-SimpsonB #c #memory management #named #runtime #safety
MemSafe: Ensuring the Spatial and Temporal Memory Safety of C at Runtime (MSS, RB), pp. 199–208.
SACSAC-2010-CostaMB #consistency #database #distributed #mobile #protocol
A distributed protocol for ensuring replicated database consistency in mobile computing environments (AC, JMM, AB), pp. 1688–1693.
CBSECBSE-2009-KiniryF #consistency #design #documentation #implementation #specification
Ensuring Consistency between Designs, Documentation, Formal Specifications, and Implementations (JRK, FF), pp. 242–261.
WICSA-ECSAWICSA-ECSA-2009-NallurBY #architecture #in the cloud #quality #self
Self-optimizing architecture for ensuring Quality Attributes in the cloud (VN, RB, XY), pp. 281–284.
FASEFASE-2009-HermannEE #graph #inheritance #network #security
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks (FH, HE, CE), pp. 325–339.
HCIHCD-2009-NakanoR #analysis #corpus #multimodal #usability
Multimodal Corpus Analysis as a Method for Ensuring Cultural Usability of Embodied Conversational Agents (YIN, MR), pp. 521–530.
ESEC-FSEESEC-FSE-2009-DenaroPT #self
Ensuring interoperable service-oriented systems through engineered self-healing (GD, MP, DT), pp. 253–262.
ASPLOSASPLOS-2009-RajamaniRRV #named #source code
ISOLATOR: dynamically ensuring isolation in comcurrent programs (SKR, GR, VPR, KV), pp. 181–192.
WICSAWICSA-2008-RadjenovicP #architecture #consistency #dependence
The Role of Dependency Links in Ensuring Architectural View Consistency (AR, RFP), pp. 199–208.
ICPCICPC-2008-FeilkasR #api #constraints
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints (MF, DR), pp. 248–253.
CAiSECAiSE-2008-WangGV #reliability #transaction
Ensuring Transactional Reliability by E-Contracting (TW, PWPJG, JV), pp. 262–265.
ASEASE-2007-FischerM #consistency #transaction
Ensuring consistency in long running transactions (JF, RM), pp. 54–63.
FASEFASE-2007-RangerH #consistency #distributed #graph transformation
Ensuring Consistency Within Distributed Graph Transformation Systems (UR, TH), pp. 368–382.
PEPMPEPM-2007-Vidal #logic programming #partial evaluation #source code #termination
Quasi-terminating logic programs for ensuring the termination of partial evaluation (GV), pp. 51–60.
GT-VMTGT-VMT-2007-KohlerLT #constraints #graph #model transformation
Ensuring Containment Constraints in Graph-based Model Transformation Approaches (CK, HL, GT).
DACDAC-2006-GoffioulVDDC #consistency #design #object-oriented #using
Ensuring consistency during front-end design using an object-oriented interfacing tool called NETLISP (MG, GV, JVD, BD, BC), pp. 889–892.
DATEDATE-2006-Kundu #analysis #design
A design for failure analysis (DFFA) technique to ensure incorruptible signatures (SK), pp. 309–310.
SEKESEKE-2006-PauliX #case study #composition #consistency
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
HPDCHPDC-2006-FrommerH #grid #quality
Ensuring numerical quality in grid computing (AF, MH), pp. 335–336.
FASEFASE-2005-TaentzerR #constraints #graph #inheritance #modelling
Ensuring Structural Constraints in Graph-Based Models with Type Inheritance (GT, AR), pp. 64–79.
FSEFSE-2004-XuDS #c #memory management #performance #safety #source code
An efficient and backwards-compatible transformation to ensure memory safety of C programs (WX, DCD, RS), pp. 117–126.
ITiCSEITiCSE-2003-BarrosEDPS #programming #using
Using lab exams to ensure programming practice in an introductory programming course (JPB, LE, RD, RP, ES), pp. 16–20.
ICEISICEIS-2002-CheungCD #design #process #standard
Supporting Engineering Design Process with an Intelligent Compliance Agent: A Way to Ensure a Standard Complied Process (LYCC, PWHC, RD), pp. 341–349.
CBSECBSE-2001-Wile #architecture #using
Ensuring General-Purpose and Domain-Specific Properties Using Architectural Styles (DSW), p. 6.
CSCWCSCW-2000-GodefroidyHJL #approach #automation #privacy #verification
Ensuring privacy in presence awareness: an automated verification approach (PG, JDH, LJJ, DL), pp. 59–68.
UMLUML-2000-CasanovaWD #ocl #quality #uml
Ensuring Quality of Geographic Data with UML and OCL (MC, TW, MD), pp. 225–239.
LOPSTRLOPSTR-1999-DucasseR #consistency #formal method #proving
Proof Obligations of the B Formal Method: Local Proofs Ensure Global Consistency (MD, LR), pp. 10–29.
ICLPICLP-1995-MartensG #deduction #flexibility #termination
Ensuring Global Termination of Partial Deduction while Allowing Flexible Polyvariance (BM, JPG), pp. 597–611.
SIGMODSIGMOD-1994-ZhangNBB #flexibility #multi #transaction
Ensuring Relaxed Atomicity for Flexible Transactions in Multidatabase Systems (AZ, MHN, BKB, OAB), pp. 67–78.
PODSPODS-1992-MehrotraRBKS #multi #transaction
Ensuring Transaction Atomicity in Multidatabase Systems (SM, RR, YB, HFK, AS), pp. 164–175.
PPDPPLILP-1990-BoeckC #analysis #correctness #prolog #static typing
Static Type Analysis of Prolog Procedures for Ensuring Correctness (PDB, BLC), pp. 222–237.
ICSEICSE-1985-MinskyL
Ensuring Integrity by Adding Obligations to Privileges (NHM, AL), pp. 92–102.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.