BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
detect (86)
base (25)
data (19)
system (17)
use (17)

Stem anomali$ (all stems)

141 papers:

CASECASE-2015-BrisimiAZCP #detection
Sensing and classifying roadway obstacles: The street bump anomaly detection and decision support system (TSB, SA, YZ, CGC, ICP), pp. 1288–1293.
DACDAC-2015-YoonSMC #behaviour #detection #embedded #heatmap #memory management #realtime #using
Memory heat map: anomaly detection in real-time embedded systems using memory behavior (MKY, LS, SM, JC), p. 6.
VLDBVLDB-2015-FanRMGW #comprehension #consistency
Understanding the Causes of Consistency Anomalies in Apache Cassandra (HF, AR, MM, WMG, BW), pp. 810–821.
VLDBVLDB-2015-YingKSS #named
TreeScope: Finding Structural Anomalies In Semi-Structured Data (SY, FK, BS, DS), pp. 1904–1915.
ICMLICML-2015-GornitzBK #detection #markov
Hidden Markov Anomaly Detection (NG, MLB, MK), pp. 1833–1842.
KDDKDD-2015-LaptevAF #automation #detection #framework #scalability
Generic and Scalable Framework for Automated Time-series Anomaly Detection (NL, SA, IF), pp. 1939–1947.
KDDKDD-2015-LiuC #challenge #detection #social #social media
Social Media Anomaly Detection: Challenges and Solutions (YL, SC), pp. 2317–2318.
SEKESEKE-2015-HughesDH #detection #streaming
Detecting Reporting Anomalies in Streaming Sensing Systems (SH, YD, JOH), pp. 427–432.
SACSAC-2015-AttiaTHKTC #detection
On-device anomaly detection for resource-limited systems (MBA, CT, AHL, BK, VT, MC), pp. 548–554.
SACSAC-2015-FernandesPCRP #detection #metaheuristic #network #statistics
Statistical, forecasting and metaheuristic techniques for network anomaly detection (GF, EHMP, LFC, JJPCR, MLPJ), pp. 701–707.
SACSAC-2015-Rekha #big data #detection #performance #using
A fast support vector data description system for anomaly detection using big data (AGR), pp. 931–932.
ESEC-FSEESEC-FSE-2015-SafiSHM #detection
Detecting event anomalies in event-based systems (GS, AS, WGJH, NM), pp. 25–37.
SANERCSMR-WCRE-2014-PerscheidFH #debugging #execution
Follow the path: Debugging state anomalies along execution histories (MP, TF, RH), pp. 124–133.
SCAMSCAM-2014-MurtazaHKC #automation #detection
Total ADS: Automated Software Anomaly Detection System (SSM, AHL, WK, MC), pp. 83–88.
VISSOFTVISSOFT-2014-KuleszSB #spreadsheet
Integrating Anomaly Diagnosis Techniques into Spreadsheet Environments (DK, JS, FB), pp. 11–19.
ICEISICEIS-v2-2014-JulianoTS #detection #metric #object-oriented #using
Detection of Software Anomalies Using Object-oriented Metrics (RCJ, BANT, MSS), pp. 241–248.
ICMLICML-c2-2014-ClemenconR #ranking
Anomaly Ranking as Supervised Bipartite Ranking (SC, SR), pp. 343–351.
ICPRICPR-2014-ChenSPS #detection #energy #statistics
Statistical Anomaly Detection in Mean and Variation of Energy Consumption (BC, MS, JP, AS), pp. 3570–3575.
ICPRICPR-2014-LuWMST #detection #modelling
Anomaly Detection through Spatio-temporal Context Modeling in Crowded Scenes (TL, LW, XM, PS, CLT), pp. 2203–2208.
ICPRICPR-2014-WangFC #detection
Traffic Camera Anomaly Detection (YKW, CTF, JFC), pp. 4642–4647.
KDDKDD-2014-BabaieCA #detection #online
Sleep analytics and online selective anomaly detection (TB, SC, RGA), pp. 362–371.
KDDKDD-2014-GunnemannGF #detection #evolution #probability #rating #robust
Detecting anomalies in dynamic rating data: a robust probabilistic model for rating evolution (SG, NG, CF), pp. 841–850.
KDDKDD-2014-YuH0 #analysis #detection #named #social #social media
GLAD: group anomaly detection in social media analysis (QRY, XH, YL), pp. 372–381.
SEKESEKE-2014-LiuTA #database #detection
Detecting Anomaly in the Usage of Database Attribute (KL, HBKT, YA), pp. 705–710.
SACSAC-2014-FerreiraBBAG #architecture #case study #detection #effectiveness
Detecting architecturally-relevant code anomalies: a case study of effectiveness and effort (MF, EAB, IMB, RA, AG), pp. 1158–1163.
SACSAC-2014-MazelFF #comparison #detection #diagrams #network #visual notation
Visual comparison of network anomaly detectors with chord diagrams (JM, RF, KF), pp. 473–480.
CASECASE-2013-LinG #detection #framework #network #optimisation #synthesis
Synthesis and optimization of a Bayesian belief network based observation platform for anomaly detection under partial and unreliable observations (WCL, HEG), pp. 51–58.
DATEDATE-2013-DeOrioLBB #debugging #detection #machine learning
Machine learning-based anomaly detection for post-silicon bug diagnosis (AD, QL, MB, VB), pp. 491–496.
ICDARICDAR-2013-GebhardtGSD #authentication #detection #documentation #using
Document Authentication Using Printing Technique Features and Unsupervised Anomaly Detection (JG, MG, FS, AD), pp. 479–483.
CSMRCSMR-2013-BertranGCS #architecture #detection
Enhancing the Detection of Code Anomalies with Architecture-Sensitive Strategies (IMB, AG, CC, AvS), pp. 177–186.
CSMRCSMR-2013-GhaithWPM #analysis #detection #independence #performance #testing
Profile-Based, Load-Independent Anomaly Detection and Analysis in Performance Regression Testing of Software Systems (SG, MW, PP, JM), pp. 379–383.
MSRMSR-2013-NadiDTHL #how #linux #question #variability #what
Linux variability anomalies: what causes them and how do they get fixed? (SN, CD, RT, RCH, DL), pp. 111–120.
HCIHIMI-HSM-2013-SaitohI #detection #learning #using #visualisation
Visualization of Anomaly Data Using Peculiarity Detection on Learning Vector Quantization (FS, SI), pp. 181–188.
ICSEICSE-2013-Jonsson #machine learning #performance #scalability #using
Increasing anomaly handling efficiency in large organizations using applied machine learning (LJ), pp. 1361–1364.
ICSTICST-2013-Mercaldo #database #identification #process
Identification of Anomalies in Processes of Database Alteration (FM), pp. 513–514.
SIGMODSIGMOD-2012-ZellagK #consistency #detection #named #realtime
ConsAD: a real-time consistency anomalies detector (KZ, BK), pp. 641–644.
CSMRCSMR-2012-BertranAGCS #architecture #identification #on the
On the Relevance of Code Anomalies for Identifying Architecture Degradation Symptoms (IMB, RA, AG, CC, AvS), pp. 277–286.
CSMRCSMR-2012-DohringH #adaptation #taxonomy #workflow
Anomalies in Rule-Adapted Workflows — A Taxonomy and Solutions for vBPMN (MD, SH), pp. 117–126.
CSMRCSMR-2012-MurtazaSHC #comparison #identification #kernel #on the
On the Comparison of User Space and Kernel Space Traces in Identification of Software Anomalies (SSM, AS, AHL, MC), pp. 127–136.
CSMRCSMR-2012-NadiH #detection #linux #mining #variability
Mining Kbuild to Detect Variability Anomalies in Linux (SN, RCH), pp. 107–116.
ICSMEICSM-2012-BertranACGS #architecture #identification
Supporting the identification of architecturally-relevant code anomalies (IMB, RA, EC, AG, AvS), pp. 662–665.
CIKMCIKM-2012-AkogluTVF #category theory #detection #performance #reliability
Fast and reliable anomaly detection in categorical data (LA, HT, JV, CF), pp. 415–424.
CIKMCIKM-2012-DaiZLP #mining #web
Mining coherent anomaly collections on web data (HD, FZ, EPL, HP), pp. 1557–1561.
CIKMCIKM-2012-HuangQYY #algorithm #detection #robust
Local anomaly descriptor: a robust unsupervised algorithm for anomaly detection based on diffusion space (HH, HQ, SY, DY), pp. 405–414.
ICPRICPR-2012-ChauhanL #distance
Manhattan-Pyramid Distance: A solution to an anomaly in pyramid matching by minimization (AC, LSL), pp. 2668–2672.
ICPRICPR-2012-MaLXS #detection #image #using
Anomaly detection with spatio-temporal context using depth images (XM, TL, FX, FS), pp. 2590–2593.
SEKESEKE-2012-GallegosG #detection #tool support
Tool Support for Anomaly Detection in Scientific Sensor Data (IG, AQG), pp. 678–683.
SEKESEKE-2012-WangZWZZ #component #detection #online
Online Anomaly Detection for Components in OSGi-based Software (TW, WZ, JW, JZ, HZ), pp. 188–193.
ICSEICSE-2012-LuciaLJB #refinement
Active refinement of clone anomaly reports (L, DL, LJ, AB), pp. 397–407.
OSDIOSDI-2012-AttariyanCF #automation #named #performance
X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software (MA, MC, JF), pp. 307–320.
ICSTICST-2012-JonssonBSE #automation #scalability #towards #using
Towards Automated Anomaly Report Assignment in Large Complex Systems Using Stacked Generalization (LJ, DB, KS, SE), pp. 437–446.
CASECASE-2011-BroderickAT #detection #formal method #industrial
Anomaly detection without a pre-existing formal model: Application to an industrial manufacturing system (JAB, LVA, DMT), pp. 169–174.
ICPCICPC-2011-HuangW #detection #monitoring #process
Anomaly Detection by Monitoring Filesystem Activities (LH, KW), pp. 221–222.
WCREWCRE-2011-NadiH #linux #mining
Make it or Break it: Mining Anomalies from Linux Kbuild (SN, RCH), pp. 315–324.
CIKMCIKM-2011-DavisLMR #detection #graph
Detecting anomalies in graphs with numeric labels (MD, WL, PCM, GR), pp. 1197–1202.
KDDKDD-2011-JiangFH #data type #graph #locality #network
Anomaly localization for network data streams with graph joint sparse PCA (RJ, HF, JH), pp. 886–894.
MLDMMLDM-2011-WuW #category theory #detection
Parameter-Free Anomaly Detection for Categorical Data (SW, SW), pp. 112–126.
SACSAC-2011-FontugneF #adaptation #detection
A Hough-transform-based anomaly detector with an adaptive time interval (RF, KF), pp. 471–477.
SACSAC-2011-MagalhaesS #analysis #performance
Root-cause analysis of performance anomalies in web-based applications (JPM, LMS), pp. 209–216.
SACSAC-2011-TariqBGMTAZ #correlation #identification
Identifying the provenance of correlated anomalies (DT, BB, AG, SM, RT, AA, FZ), pp. 224–229.
ICTSSICTSS-2011-ShinboH #communication #detection #empirical #mobile
An Empirical Study on Applying Anomaly Detection Technique to Detecting Software and Communication Failures in Mobile Data Communication Services (HS, TH), pp. 195–208.
ISSTAISSTA-2011-HuangZ #concurrent #persuasion #predict
Persuasive prediction of concurrency access anomalies (JH, CZ), pp. 144–154.
ISSTAISSTA-2011-PradelG #detection #order
Detecting anomalies in the order of equally-typed method arguments (MP, TRG), pp. 232–242.
SOFTVISSOFTVIS-2010-LinTOB #comprehension #profiling #towards #using
Towards anomaly comprehension: using structural compression to navigate profiling call-trees (SL, FT, TCO, LJB), pp. 103–112.
ICPRICPR-2010-FengZH #detection #learning #online #self
Online Learning with Self-Organizing Maps for Anomaly Detection in Crowd Scenes (JF, CZ, PH), pp. 3599–3602.
ICPRICPR-2010-KhanWCKC #video
Lattice-Based Anomaly Rectification for Sport Video Annotation (AK, DW, TdC, JK, WJC), pp. 4372–4375.
ICPRICPR-2010-MehmoodN #detection #kernel #using
Anomaly Detection for Longwave FLIR Imagery Using Kernel Wavelet-RX (AM, NMN), pp. 1385–1388.
KDDKDD-2010-DasMSO #algorithm #case study #detection #kernel #learning #multi #safety
Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study (SD, BLM, ANS, NCO), pp. 47–56.
SACSAC-2010-TeixeiraM #data type #detection
Data stream anomaly detection through principal subspace tracking (PHdST, RLM), pp. 1609–1616.
HPCAHPCA-2010-BiswasRMACJPPS #metric #using
Explaining cache SER anomaly using DUE AVF measurement (AB, CR, SSM, VA, LC, AJ, AEP, MP, NS), pp. 1–12.
ISSTAISSTA-2010-GruskaWZ #detection #learning #lightweight
Learning from 6, 000 projects: lightweight cross-project anomaly detection (NG, AW, AZ), pp. 119–130.
ASEASE-2009-DallmeierZM #behaviour #generative
Generating Fixes from Object Behavior Anomalies (VD, AZ, BM), pp. 550–554.
VLDBVLDB-2009-FeketeGA
Quantifying Isolation Anomalies (AF, SG, JPA), pp. 467–478.
CSMRCSMR-2009-MarwedeRHH #automation #behaviour #correlation #distributed #scalability
Automatic Failure Diagnosis Support in Distributed Large-Scale Software Systems Based on Timing Behavior Anomaly Correlation (NM, MR, AvH, WH), pp. 47–58.
KDDKDD-2009-BuCFL #monitoring #performance
Efficient anomaly monitoring over moving object trajectory streams (YB, LC, AWCF, DL), pp. 159–168.
KDDKDD-2009-HiroseYNF #detection #equation #network
Network anomaly detection based on Eigen equation compression (SH, KY, TN, RF), pp. 1185–1194.
KDDKDD-2009-PrakashVAFF #internet #named
BGP-lens: patterns and anomalies in internet routing updates (BAP, NV, DA, MF, CF), pp. 1315–1324.
KDDKDD-2009-WuSJRG #detection #framework #performance
A LRT framework for fast spatial anomaly detection (MW, XS, CJ, SR, JG), pp. 887–896.
MLDMMLDM-2009-XiongBS #detection
A Wavelet-Based Method for Detecting Seismic Anomalies in Remote Sensing Satellite Data (PX, YB, XS), pp. 569–581.
ASPLOSASPLOS-2009-DimitrovZ #approach #automation #debugging #predict #validation
Anomaly-based bug prediction, isolation, and validation: an automated approach for software debugging (MD, HZ), pp. 61–72.
ISSTAISSTA-2009-BabenkoMP #automation #detection #named
AVA: automated interpretation of dynamically detected anomalies (AB, LM, FP), pp. 237–248.
CSMRCSMR-2008-DhambriSP #design #detection #visual notation
Visual Detection of Design Anomalies (KD, HAS, PP), pp. 279–283.
ICEISICEIS-AIDSS-2008-BezerraW #algorithm #detection #process
Anomaly Detection Algorithms in Business Process Logs (FdLB, JW), pp. 11–18.
ICEISICEIS-AIDSS-2008-BringasPPS
Bayesian-Networks-Based Misuse and Anomaly Prevention System (PGB, YKP, SP, PS), pp. 62–69.
ICEISICEIS-J-2008-BringasP
Next-Generation Misuse and Anomaly Prevention System (PGB, YKP), pp. 117–129.
CIKMCIKM-2008-MihailaSL #incremental
Anomaly-free incremental output in stream processing (GAM, IS, CAL), pp. 359–368.
KDDKDD-2008-DasSN #category theory #dataset #detection
Anomaly pattern detection in categorical datasets (KD, JGS, DBN), pp. 169–176.
SACSAC-2008-AbbesBR #detection
An inference system for detecting firewall filtering rules anomalies (TA, AB, MR), pp. 2122–2128.
SACSAC-2008-BezerraW #algorithm #detection #process
Anomaly detection algorithms in logs of process aware systems (FdLB, JW), pp. 951–952.
SACSAC-2008-KuangZ #algorithm #detection #using
An anomaly intrusion detection method using the CSI-KNN algorithm (LK, MZ), pp. 921–926.
SACSAC-2008-LiG #detection #network #optimisation #using
TCM-KNN scheme for network anomaly detection using feature-based optimizations (YL, LG), pp. 2103–2109.
DATEDATE-2007-NarayanasamyCC #fault #predict
Transient fault prediction based on anomalies in processor events (SN, AKC, BC), pp. 1140–1145.
VLDBVLDB-2007-JorwekarFRS #automation #detection
Automating the Detection of Snapshot Isolation Anomalies (SJ, AF, KR, SS), pp. 1263–1274.
VLDBVLDB-2007-LiH #approximate #mining #multi
Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data (XL, JH), pp. 447–458.
KDDKDD-2007-TandonC #detection #network #validation
Weighting versus pruning in rule validation for detecting network and host anomalies (GT, PKC), pp. 697–706.
MLDMMLDM-2007-MicarelliS #approach #detection
A Case-Based Approach to Anomaly Intrusion Detection (AM, GS), pp. 434–448.
SEKESEKE-2007-GokhaleL #detection #multi
Multi-level Anomaly Detection with Application-Level Data (SSG, JL), p. 718–?.
ESEC-FSEESEC-FSE-2007-WasylkowskiZL #detection
Detecting object usage anomalies (AW, AZ, CL), pp. 35–44.
PLDIPLDI-2006-FeiM #execution #monitoring #named #runtime
Artemis: practical runtime monitoring of applications for execution anomalies (LF, SPM), pp. 84–95.
AdaEuropeAdaEurope-2006-BurgstallerBM #ada #detection #static analysis
Static Detection of Access Anomalies in Ada95 (BB, JB, RM), pp. 40–55.
ICPRICPR-v4-2006-AuSC #detection #video
Anomaly Detection for Video Surveillance Applications (CEA, SS, JJC), pp. 888–891.
SEKESEKE-2006-ShinX #component #detection #self
Enhanced Anomaly Detection in Self-Healing Components (MES, YX), pp. 485–488.
SACSAC-2006-ValeurVKK #web
An anomaly-driven reverse proxy for web applications (FV, GV, CK, EK), pp. 361–368.
ASPLOSASPLOS-2006-ChilimbiG #debugging #detection #identification #named #using
HeapMD: identifying heap-based bugs using anomaly detection (TMC, VG), pp. 219–228.
CSMRCSMR-2005-RiccaT #bibliography #case study #detection #web
Anomaly Detection in Web Applications: A Review of Already Conducted Case Studies (FR, PT), pp. 385–394.
KDDKDD-2005-FujimakiYM #approach #detection #kernel #problem #using
An approach to spacecraft anomaly detection problem using kernel feature space (RF, TY, KM), pp. 401–410.
SACSAC-2005-ChenCKM #realtime #scheduling
Real-time task scheduling anomaly: observations and prevention (YSC, LPC, TWK, AKM), pp. 897–898.
FATESFATES-2005-Huima #black box #testing
A Note on an Anomaly in Black-Box Testing (AH), pp. 47–61.
IWPCIWPC-2004-WuH #modelling
Resolving Linkage Anomalies in Extracted Software System Models (JW, RCH), pp. 241–245.
KDDKDD-2004-IdeK #detection
Eigenspace-based anomaly detection in computer systems (TI, HK), pp. 440–449.
SACSAC-2004-AdamJA #dataset #detection
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets (NRA, VPJ, VA), pp. 576–583.
SACSAC-2004-MiliciaS #inheritance #years after
The inheritance anomaly: ten years after (GM, VS), pp. 1267–1274.
ICMLICML-2003-WongMCW #detection #network
Bayesian Network Anomaly Pattern Detection for Disease Outbreaks (WKW, AWM, GFC, MMW), pp. 808–815.
KDDKDD-2003-NobleC #detection #graph
Graph-based anomaly detection (CCN, DJC), pp. 631–636.
SACSAC-2003-Mahoney #detection #network
Network Traffic Anomaly Detection Based on Packet Bytes (MVM), pp. 346–350.
KDDKDD-2002-SequeiraZ #data mining #mining #named
ADMIT: anomaly-based data mining for intrusions (KS, MJZ), pp. 386–395.
SACSAC-2002-KrugelTK #detection #network
Service specific anomaly detection for network intrusion detection (CK, TT, EK), pp. 201–208.
SACSAC-2002-SeleznyovM #detection #learning
Learning temporal patterns for anomaly intrusion detection (AS, OM), pp. 209–213.
ICSEICSE-2002-HangalL #automation #debugging #detection #using
Tracking down software bugs using automatic anomaly detection (SH, MSL), pp. 291–301.
ICSEICSE-2002-RazKS #data flow #detection #online #semantics
Semantic anomaly detection in online data sources (OR, PK, MS), pp. 302–312.
ICMLICML-2000-Eskin #detection #probability #semistructured data #using
Anomaly Detection over Noisy Data using Learned Probability Distributions (EE), pp. 255–262.
ICMLICML-2000-Towell #detection
Local Expert Autoassociators for Anomaly Detection (GGT), pp. 1023–1030.
SACSAC-2000-RiveroDL #detection #network #static analysis #strict
Static Detection of Sources of Dynamic Anomalies in a Network of Referential Integrity Restrictions (LCR, JHD, DL), pp. 333–339.
HCIHCI-CCAD-1999-TakanoSS #behaviour #simulation
Intellectual simulation of operating team behavior in coping with anomalies occurring at commercial nuclear power plants (KT, WS, KS), pp. 1201–1205.
SIGIRSIGIR-1999-Eastman #internet #precise
30, 000 Hits may be Better than 300: Precision Anomalies in Internet Searches (poster abstract) (CME), pp. 313–314.
AdaEuropeAdaEurope-1998-SchumacherN #ada #how #inheritance
How to Avoid the Inheritance Anomaly in Ada (GS, WN), pp. 53–64.
ECOOPECOOP-1996-LechnerLNW #concurrent #inheritance #reuse
(Objects + Concurrency) & Reusability — A Proposal to Circumvent the Inheritance Anomaly (UL, CL, FN, MW), pp. 232–247.
ECOOPECOOP-1994-AksitBSB #inheritance #realtime #specification
Real-Time Specification Inheritance Anomalies and Real-Time Filters (MA, JB, WvdS, LB), pp. 386–407.
AdaEuropeAdaEurope-1993-Wild #inheritance
Avoiding Anomalies in Inheritance Schemes (FHWI), pp. 108–113.
ECOOPECOOP-1993-Meseguer #concurrent #inheritance #object-oriented #programming
Solving the Inheritance Anomaly in Concurrent Object-Oriented Programming (JM), pp. 220–246.
ESECESEC-1993-CheungK #analysis #detection #distributed #source code
Tractable Flow Analysis for Anomaly Detection in Distributed Programs (SCC, JK), pp. 283–300.
ASPLOSASPLOS-1991-MinC #detection #performance
An Efficient Cache-Based Access Anomaly Detection Scheme (SLM, JDC), pp. 235–244.
PPoPPPPoPP-1990-DinningS #algorithm #comparison #detection #empirical #monitoring
An Empirical Comparison of Monitoring Algorithms for Access Anomaly Detection (AD, ES), pp. 1–10.
PLDIPLDI-1989-Schonberg #detection #on the fly
On-The-Fly Detection of Access Anomalies (ES), pp. 285–297.
PLDIBest-of-PLDI-1989-Schonberg89a #detection #on the fly
On-the-fly detection of access anomalies (with retrospective) (ES), pp. 313–327.
VLDBVLDB-1987-MartinNA #database
Dealing with Temporal Schema Anomalies in History Databases (NGM, SBN, RA), pp. 177–184.
POPLPOPL-1986-JohnsonW #approach #incremental #type inference
A Maximum-Flow Approach to Anomaly Isolation in Unification-Based Incremental Type Inference (GFJ, JAW), pp. 44–57.
ICSEICSE-1984-Forman #algebra #data flow #detection
An Algebra for Data Flow Anomaly Detection (IRF), pp. 278–287.
PODSPODS-1983-BeeriK #database
Elimination of Intersection Anomalies from Database Schemes (CB, MK), pp. 340–351.
ICSEICSE-1979-RiddleBDE #concurrent #detection #source code
Anomaly Detection in Concurrent Programs (WER, GB, CD, BE), pp. 265–273.
STOCSTOC-1978-CaseS #induction
Anomaly Hierarchies of Mechanized Inductive Inference (JC, CS), pp. 314–319.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.