BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
use (3)
peer (2)
against (2)
tool (2)
spam (2)

Stem fight$ (all stems)

18 papers:

ICSEICSE-v2-2015-GomezMMR #debugging
When App Stores Listen to the Crowd to Fight Bugs in the Wild (MG, MM, MM, RR), pp. 567–570.
DACDAC-2014-SullivanBZZJ #functional #hardware #identification #named
FIGHT-Metric: Functional Identification of Gate-Level Hardware Trustworthiness (DS, JB, GZ, SZ, YJ), p. 4.
CHICHI-2014-AhmedJAFRRAM #framework #named
Protibadi: a platform for fighting sexual harassment in urban bangladesh (SIA, SJJ, NA, HSF, MRR, ASMR, SA, RSM), pp. 2695–2704.
HCIHCI-AS-2014-WenDHDB #capacity #navigation #tool support
Fighting Technology Dumb Down: Our Cognitive Capacity for Effortful AR Navigation Tools (JW, AD, WSH, AD, MB), pp. 525–536.
CHICHI-2013-WulfAKASRYR #social #social media
Fighting against the wall: social media use by political activists in a Palestinian village (VW, KA, IAK, MA, KS, MR, GPY, DR), pp. 1979–1988.
KDDKDD-2013-Gesher #adaptation
Adaptive adversaries: building systems to fight fraud and cyber intruders (AG), p. 1136.
SIGIRSIGIR-2013-ShokouhiWBR #ranking
Fighting search engine amnesia: reranking repeated results (MS, RWW, PNB, FR), pp. 273–282.
CHICHI-2012-WisniewskiLW #bound
Fighting for my space: coping mechanisms for sns boundary regulation (PJW, HRL, DW), pp. 609–618.
SIGIRSIGIR-2012-WeiLZMRZ #novel #web
Fighting against web spam: a novel propagation method based on click-through data (CW, YL, MZ, SM, LR, KZ), pp. 395–404.
SACSAC-2010-DewaldHF #javascript #named
ADSandbox: sandboxing JavaScript to fight malicious websites (AD, TH, FCF), pp. 1859–1864.
CHICHI-2009-MarshallFHRHRYD #interactive #physics #using
Fighting for control: children’s embodied interactions when using physical and digital representations (PM, RF, AH, JR, EH, YR, NY, NSD), pp. 2149–2152.
HCIDHM-2009-BoschHHD
Intelligent Agents for Training On-Board Fire Fighting (KvdB, MH, AH, WAvD), pp. 463–472.
CAVCAV-2009-Benini #manycore #performance #predict #question
Predictability vs. Efficiency in the Multicore Era: Fight of Titans or Happy Ever after? (LB), p. 50.
CHICHI-2008-SankarpandianLE #named #using
Talc: using desktop graffiti to fight software vulnerability (KS, TL, WKE), pp. 1055–1064.
ECIRECIR-2007-GengWLZ #ranking
Fighting Link Spam with a Two-Stage Ranking Strategy (GG, CW, QL, YZ), pp. 699–702.
SACSAC-2007-CostaSAA #network #peer-to-peer
Fighting pollution dissemination in peer-to-peer networks (CPC, VS, JMA, VA), pp. 1586–1590.
ITiCSEITiCSE-2005-Pohlhaus
Ethical engagement with data collection efforts related to fighting terrorists and terrorism in the context of recent events (WP), p. 401.
TACASTACAS-1999-DongDRRRSSSW #case study #comparative #concurrent #tool support #verification
Fighting Livelock in the i-Protocol: A Comparative Study of Verification Tools (YD, XD, YSR, CRR, IVR, SAS, OS, EWS, DSW), pp. 74–88.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.