BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
without (7)
locat (3)
no (3)
protect (3)
privaci (3)

Stem compromis$ (all stems)

17 papers:

PLDIPLDI-2015-MarrSD #metaprogramming #performance #protocol
Zero-overhead metaprogramming: reflection and metaobject protocols fast and without compromises (SM, CS, SD), pp. 545–554.
SIGIRSIGIR-2015-Hoenkamp #interactive #interface #quality
About the “Compromised Information Need” and Optimal Interaction as Quality Measure for Search Interfaces (ECH), pp. 835–838.
SOSPSOSP-2015-DragojevicNNRSB #consistency #distributed #performance #transaction
No compromises: distributed transactions with consistency, availability, and performance (AD, DN, EBN, MR, AS, AB, MC), pp. 54–70.
DACDAC-2014-AncajasCR #named
Fort-NoCs: Mitigating the Threat of a Compromised NoC (DMA, KC, SR), p. 6.
SACSAC-2014-ZangerleS #classification #quote #twitter
“Sorry, I was hacked”: a classification of compromised twitter accounts (EZ, GS), pp. 587–593.
SACSAC-2013-NunesP #scheduling #throughput #transaction
Improving transaction abort rates without compromising throughput through judicious scheduling (AN, JP), pp. 493–494.
SIGMODSIGMOD-2012-HuXCY #authentication #privacy
Authenticating location-based services without compromising location privacy (HH, JX, QC, ZY), pp. 301–312.
SACSAC-2012-WangYLQG
Hypervisor-based protection of sensitive files in a compromised system (JW, MY, BL, ZQ, HG), pp. 1765–1770.
CSLCSL-2010-BasinC #protocol #security
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
CSCWCSCW-2008-IgnatPON #collaboration #multi #privacy
Providing awareness in multi-synchronous collaboration without compromising privacy (CLI, SP, GO, MCN), pp. 659–668.
DACDAC-2006-HuaMSSMJD #3d
Exploring compromises among timing, power and temperature in three-dimensional integrated circuits (HH, CM, KS, AMS, SM, RJ, WRD), pp. 997–1002.
VLDBVLDB-2006-MokbelCA #privacy #query
The New Casper: Query Processing for Location Services without Compromising Privacy (MFM, CYC, WGA), pp. 763–774.
ICMLICML-2005-CrandallG #game studies #learning
Learning to compete, compromise, and cooperate in repeated general-sum games (JWC, MAG), pp. 161–168.
SPLCSPLC-2005-ZhangJ #experience #industrial #mobile #performance #product line #reuse
Reuse without Compromising Performance: Industrial Experience from RPG Software Product Line for Mobile Devices (WZ, SJ), pp. 57–69.
OOPSLAOOPSLA-2001-CzajkowskiD #evolution #multi #virtual machine
Multitasking without Compromise: A Virtual Machine Evolution (GC, LD), pp. 125–138.
OSDIOSDI-2000-StrunkGSSG #self
Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
VLDBVLDB-1982-Leiss #database #statistics
Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise (ELL), pp. 189–196.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.