12 papers:
- ICFP-2013-Dolan #algebra #functional #linear
- Fun with semirings: a functional pearl on the abuse of linear algebra (SD), pp. 101–110.
- ECIR-2013-PanchenkoBNF #categorisation #detection #towards
- Towards Detection of Child Sexual Abuse Media: Categorization of the Associated Filenames (AP, RB, HN, CF), pp. 776–779.
- HCD-2011-ImJY #design #development #mobile
- Guideline Development of Mobile Phone Design for Preventing Child Abuse (JI, ECJ, JY), pp. 243–252.
- KDD-2011-MetwallyP
- Estimating the number of users behind ip addresses for combating abusive traffic (AM, MP), pp. 249–257.
- ITiCSE-2006-Godejord #education #social #using
- Exploring teacher methodology: using the example of sexual abuse of children as a way of teaching social informatics (PAG), p. 340.
- ICALP-v2-2006-KahlerKW #protocol
- A Dolev-Yao-Based Definition of Abuse-Free Protocols (DK, RK, TW), pp. 95–106.
- MoDELS-2006-Henderson-SellersG #uml
- Uses and Abuses of the Stereotype Mechanism in UML 1.x and 2.0 (BHS, CGP), pp. 16–26.
- MoDELS-2006-Henderson-SellersG #uml
- Uses and Abuses of the Stereotype Mechanism in UML 1.x and 2.0 (BHS, CGP), pp. 16–26.
- RE-2004-LinNIJ #bound #problem #security #using
- Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
- RE-2003-LinNIJM #requirements #security
- Introducing Abuse Frames for Analysing Security Requirements (LL, BN, DCI, MJ, JDM), pp. 371–372.
- ICALP-2000-Baum-WaidnerW #contract #multi
- Round-Optimal and Abuse Free Optimistic Multi-party Contract Signing (BBW, MW), pp. 524–535.
- AdaEurope-1993-Schwille #exception #guidelines
- Use and Abuse of Exceptions — 12 Guidelines for Proper Exception Handling (JS), pp. 141–152.