13 papers:
- DAC-2014-GuinZFT #low cost
- Low-cost On-Chip Structures for Combating Die and IC Recycling (UG, XZ, DF, MT), p. 6.
- SIGMOD-2014-WuWLSSALYY #named #statistics
- iCheck: computationally combating “lies, d-ned lies, and statistics” (YW, BW, PL, AS, ES, PKA, CL, JY, CY), pp. 1063–1066.
- DAC-2012-KoushanfarFMBSSP #question
- Can EDA combat the rise of electronic counterfeiting? (FK, SF, CM, WB, MS, PS, MP), pp. 133–138.
- DAC-2012-LinWYSCP #configuration management
- Near-optimal, dynamic module reconfiguration in a photovoltaic system to combat partial shading effects (XL, YW, SY, DS, NC, MP), pp. 516–521.
- HIMI-v1-2011-LifOLHS #multimodal
- Multimodal Threat Cueing in Simulated Combat Vehicle with Tactile Information Switching between Threat and Waypoint Indication (PL, PAO, BL, JH, JS), pp. 454–461.
- KDD-2011-MetwallyP
- Estimating the number of users behind ip addresses for combating abusive traffic (AM, MP), pp. 249–257.
- SOSP-2009-DunaganZS #combinator #graph #named #optimisation #using
- Heat-ray: combating identity snowball attacks using machinelearning, combinatorial optimization and attack graphs (JD, AXZ, DRS), pp. 305–320.
- CHI-2007-Aoki #performance
- Back stage on the front lines: perspectives and performance in the combat information center (PMA), pp. 717–726.
- ITiCSE-2006-GuerreiroG
- Combating anonymousness in populous CS1 and CS2 courses (PG, KG), pp. 8–12.
- CASE-2005-LauS #evaluation #multi
- Evaluation of time-varying availability in multi-echelon inventory system under combat damage (HCL, HS), pp. 226–231.
- VLDB-2004-GyongyiGP #web
- Combating Web Spam with TrustRank (ZG, HGM, JOP), pp. 576–587.
- CBSE-2000-Seacord #case study
- Case Study: Global Combat Support System — Air Force (RCS), p. 2.
- ITiCSE-2000-Weber-Wulff #programming
- Combating the code warrior: a different sort of programming instruction (DWW), pp. 85–88.