73 papers:
- DAC-2015-GuoTFD #anti #obfuscation #reverse engineering
- Investigation of obfuscation-based anti-reverse engineering for printed circuit boards (ZG, MT, DF, JD), p. 6.
- DAC-2015-ShafiqueKTH #anti #energy #named #video
- EnAAM: energy-efficient anti-aging for on-chip video memories (MS, MUKK, AOT, JH), p. 6.
- SANER-2015-Morales #anti #automation #framework #towards
- Towards a framework for automatic correction of anti-patterns (RM), pp. 603–604.
- SIGIR-2015-LipaniLH #anti #bias #precise
- Splitting Water: Precision and Anti-Precision to Reduce Pool Bias (AL, ML, AH), pp. 103–112.
- SAC-2015-AwadBESAS #anti #approach #detection #process #runtime
- Runtime detection of business process compliance violations: an approach based on anti patterns (AA, AB, AE, RES, AA, SS), pp. 1203–1210.
- SAC-2015-BouaskerY #anti #constraints #correlation #mining
- Key correlation mining by simultaneous monotone and anti-monotone constraints checking (SB, SBY), pp. 851–856.
- SAC-2015-MinV #anti #design #evaluation #implementation #novel
- Design, implementation and evaluation of a novel anti-virus parasitic malware (BM, VV), pp. 2127–2133.
- RTA-2015-BaumgartnerKLV #anti
- Nominal Anti-Unification (AB, TK, JL, MV), pp. 57–73.
- QoSA-2014-WertOHF #anti #automation #component #detection #performance
- Automatic detection of performance anti-patterns in inter-component communications (AW, MO, CH, RF), pp. 3–12.
- SIGMOD-2014-OkcanR #pipes and filters
- Anti-combining for MapReduce (AO, MR), pp. 839–850.
- CSMR-WCRE-2014-UjhelyiHVCSVF #comparison #detection #query
- Anti-pattern detection with model queries: A comparison of approaches (ZU, ÁH, DV, NIC, GS, LV, RF), pp. 293–302.
- ICPC-2014-VasquezKMSPG #anti #java #matter #metric #mobile
- Domain matters: bringing further evidence of the relationships among anti-patterns, application domains, and quality-related metrics in Java mobile apps (MLV, SK, CM, AS, DP, YGG), pp. 232–243.
- ICML-c2-2014-GleichM #algorithm #approximate #case study
- Anti-differentiating approximation algorithms: A case study with min-cuts, spectral, and flow (DG, MWM), pp. 1018–1025.
- ICPR-2014-ChenLLYH #adaptation #detection #forensics
- Anti-forensics of JPEG Detectors via Adaptive Quantization Table Replacement (CC, HL, WL, RY, JH), pp. 672–677.
- ICPR-2014-GalballyM #anti #assessment #image #quality
- Face Anti-spoofing Based on General Image Quality Assessment (JG, SM), pp. 1173–1178.
- ICPR-2014-HobsonLPVW #anti #benchmark #framework #image #metric
- Classifying Anti-nuclear Antibodies HEp-2 Images: A Benchmarking Platform (PH, BCL, GP, MV, AW), pp. 3233–3238.
- ICPR-2014-LinnerS #alias #anti #distance #graph #implementation
- A Graph-Based Implementation of the Anti-aliased Euclidean Distance Transform (EL, RS), pp. 1025–1030.
- SAC-2014-MotaB #algorithm #anti #internet
- A dynamic frame slotted ALOHA anti-collision algorithm for the internet of things (RPBM, DMB), pp. 686–691.
- ICSE-2014-ChenSJHNF #anti #detection #performance #using
- Detecting performance anti-patterns for applications developed using object-relational mapping (THC, WS, ZMJ, AEH, MNN, PF), pp. 1001–1012.
- CASE-2013-IsmailH #3d #anti #higher-order #using
- Trajectory tracking and anti-sway control of three-dimensional offshore boom cranes using second-order sliding modes (RMTRI, QPH), pp. 996–1001.
- DATE-2013-Kae-NuneP #anti #process #testing
- Qualification and testing process to implement anti-counterfeiting technologies into IC packages (NKN, SP), pp. 1131–1136.
- DATE-2013-LeestT #hardware #security
- Anti-counterfeiting with hardware intrinsic security (VvdL, PT), pp. 1137–1142.
- VLDB-2013-DeBrabantPTSZ #approach #architecture #database #named
- Anti-Caching: A New Approach to Database Management System Architecture (JD, AP, ST, MS, SBZ), pp. 1942–1953.
- VLDB-2013-ShangK #anti
- Skyline Operator on Anti-correlated Distributions (HS, MK), pp. 649–660.
- CSMR-2013-ArnaoudovaPAG #anti #product line
- A New Family of Software Anti-patterns: Linguistic Anti-patterns (VA, MDP, GA, YGG), pp. 187–196.
- WCRE-2013-JaafarGHK #anti #dependence #mining
- Mining the relationship between anti-patterns dependencies and fault-proneness (FJ, YGG, SH, FK), pp. 351–360.
- HCI-AS-2013-FekryHA #monitoring #named
- Anti-Bump: A Bump/Pothole Monitoring and Broadcasting System for Driver Awareness (MF, AH, AA), pp. 561–570.
- ICEIS-v2-2013-Baina #anti #information management
- Organisation, and Information Systems between Formal and Informal — Continuum, Balance, Patterns, and Anti-patterns (KB), pp. 85–93.
- SKY-2013-ExmanK #anti #network #recommendation #social
- An Anti-Turing Test: Social Network Friends’ Recommendations (IE, AK), pp. 55–61.
- RTA-2013-BaumgartnerKLV #anti #higher-order
- A Variant of Higher-Order Anti-Unification (AB, TK, JL, MV), pp. 113–127.
- ASE-2012-MaigaABSGAA #anti #detection
- Support vector machines for anti-pattern detection (AM, NA, NB, AS, YGG, GA, EA), pp. 278–281.
- WCRE-2012-MaigaABSGA #anti #approach #detection #incremental #named
- SMURF: A SVM-based Incremental Anti-pattern Detection Approach (AM, NA, NB, AS, YGG, EA), pp. 466–475.
- IFM-2012-WoehrleBM #anti #network
- Mechanized Extraction of Topology Anti-patterns in Wireless Networks (MW, RB, MRM), pp. 158–173.
- KDD-2012-DingKBKC #anti #communication #detection #social
- Intrusion as (anti)social communication: characterization and detection (QD, NK, PB, EDK, MC), pp. 886–894.
- SAC-2012-DestefanisTCM #analysis #anti #java #scalability
- An analysis of anti-micro-patterns effects on fault-proneness in large Java systems (GD, RT, GC, MM), pp. 1251–1253.
- CASE-2011-Kanamori #anti
- Global stabilization of anti-windup PID position control for euler-lagrange systems with actuator saturation (MK), pp. 798–803.
- ICEIS-v1-2011-ChengL #anti #network
- An Anti-phishing Model for Ecommerce under a Network Environment (YC, GL), pp. 400–404.
- SAC-2011-LinXYYZGQCG #anti #hardware #named #using
- SPAD: software protection through anti-debugging using hardware virtualization (QL, MX, MY, PY, MZ, SG, ZQ, KC, HG), pp. 623–624.
- RTA-2011-KutsiaLV
- Anti-Unification for Unranked Terms and Hedges (TK, JL, MV), pp. 219–234.
- CASE-2010-Kanamori #design #using
- Anti-windup controller design using gravity compensation for Euler-Lagrange systems with actuator saturation (MK), pp. 798–803.
- SAC-2010-AlmeidaYA #anti #probability #reduction
- Probabilistic anti-spam filtering with dimensionality reduction (TAA, AY, JA), pp. 1802–1806.
- HCI-AUII-2009-UangLC #anti
- The Effects of an Anti-glare Sleeve Installed on Fluorescent Tube Lamps on Glare and Reading Comfort (STU, CLL, MC), pp. 544–553.
- CAiSE-2009-TrckaAS #anti #data flow #fault #workflow
- Data-Flow Anti-patterns: Discovering Data-Flow Errors in Workflows (NT, WMPvdA, NS), pp. 425–439.
- CASE-2008-XiaoW #anti #evaluation #simulation
- Simulation and effects evaluation of anti-galloping devices for overhead transmission lines (XX, JW), pp. 808–813.
- DATE-2008-RedaelliSS #anti #configuration management #scheduling
- Task Scheduling with Configuration Prefetching and Anti-Fragmentation techniques on Dynamically Reconfigurable Systems (FR, MDS, DS), pp. 519–522.
- LATA-2008-KirchnerKM #pattern matching
- Anti-pattern Matching Modulo (CK, RK, PEM), pp. 275–286.
- ICPR-2008-TranTJ #anti #linear #network #probability
- An adjustable combination of linear regression and modified probabilistic neural network for anti-spam filtering (TPT, PT, TJ), pp. 1–4.
- LICS-2008-Pottier #anti #higher-order
- Hiding Local State in Direct Style: A Higher-Order Anti-Frame Rule (FP), pp. 331–340.
- ESOP-2007-KirchnerKM #pattern matching
- Anti-pattern Matching (CK, RK, PEM), pp. 110–124.
- ICSM-2007-CapiluppiF #anti #open source #predict
- A model to predict anti-regressive effort in Open Source Software (AC, JFR), pp. 194–203.
- SAC-2007-HebertBC #anti #constraints #optimisation
- Optimizing hypergraph transversal computation with an anti-monotone constraint (CH, AB, BC), pp. 443–444.
- ICPR-v2-2006-BhuiyanN #classification #detection #image #using
- Anti-personnel Mine Detection and Classification Using GPR Image (AB, BN), pp. 1082–1085.
- ICEIS-v2-2005-MashechkinPR #anti #approach #enterprise #machine learning
- Enterprise Anti-Spam Solution Based on Machine Learning Approach (IM, MP, AR), pp. 188–193.
- MLDM-2005-ShimizuM #anti #sequence
- Disjunctive Sequential Patterns on Single Data Sequence and Its Anti-monotonicity (KS, TM), pp. 376–383.
- SAC-2005-StaakeTF #anti #network
- Extending the EPC network: the potential of RFID in anti-counterfeiting (TS, FT, EF), pp. 1607–1612.
- TestCom-2005-LiL #anti #diagrams #thread #uml #using
- Using Anti-Ant-like Agents to Generate Test Threads from the UML Diagrams (HL, CPL), pp. 69–80.
- ICSM-2004-FengZWW #anti #design #identification
- Software Design Improvement through Anti-Patterns Identification (TF, JZ, HW, XW), p. 524.
- WCRE-2004-LakhotiaM #anti #order
- Imposing Order on Program Statements to Assist Anti-Virus Scanners (AL, MM), pp. 161–170.
- ECIR-2004-Wilks #anti #information management #information retrieval #representation
- IR and AI: Traditions of Representation and Anti-representation in Information Processing (YW), pp. 12–26.
- ICSE-2004-Lamsweerde #anti #requirements #security
- Elaborating Security Requirements by Construction of Intentional Anti-Models (AvL), pp. 148–157.
- EDOC-2002-HearndenRS #named
- Anti-Yacc: MOF-to-Text (DH, KR, JS), pp. 200–211.
- RE-2002-CrookILN #anti #requirements #security
- Security Requirements Engineering: When Anti-Requirements Hit the Fan (RC, DCI, LL, BN), pp. 203–205.
- STOC-2001-NaorT #data type #independence #named
- Anti-presistence: history independent data structures (MN, VT), pp. 492–501.
- SIGIR-2000-AndroutsopoulosKCS #anti #comparison #email #keyword #naive bayes
- An experimental comparison of naive bayesian and keyword-based anti-spam filtering with personal e-mail messages (IA, JK, KC, CDS), pp. 160–167.
- CSL-1999-CompagnoniG #higher-order #symmetry #type system
- Anti-Symmetry of Higher-Order Subtyping (ABC, HG), pp. 420–438.
- ICPR-1996-HamamotoMIHT #anti #evaluation #network
- Evaluation of an anti-regularization technique in neural networks (YH, YM, HI, TH, ST), pp. 205–208.
- CC-1996-ErtlK #anti #dependence
- Removing Anti Dependences by Repairing (MAE, AK), pp. 33–43.
- ICML-1993-Idestam-Almquist #anti #recursion
- Generalization under Implication by Recursive Anti-unification (PIA), pp. 151–158.
- TRI-Ada-C-1992-Hermida #ada #anti #development #named
- HEmut-PoliCaza: Introducing Ada in the University Through PC Anti-Virus Software Development (AH), pp. 148–156.
- LICS-1991-Pfenning #anti #calculus #unification
- Unification and Anti-Unification in the Calculus of Constructions (FP), pp. 74–85.
- CLP-1990-DelcherK90 #anti #parallel #performance
- Efficient Parallel Term Matching and Anti-Unification (ALD, SK), pp. 355–369.
- LICS-1988-KuperMPP #algorithm #anti #parallel #performance
- Efficient Parallel Algorithms for Anti-Unification and Relative Complement (GMK, KM, KVP, KJP), pp. 112–120.
- CADE-1986-Comon #anti #term rewriting
- Sufficient Completeness, Term Rewriting Systems and “Anti-Unification” (HC), pp. 128–140.