BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
base (12)
system (10)
error (9)
risk (9)
process (9)

Stem mitig$ (all stems)

76 papers:

DACDAC-2015-GanapathyKTB #fault
Mitigating the impact of faults in unreliable memories for error-resilient applications (SG, GK, AT, AB), p. 6.
DACDAC-2015-RahimiCMGB #clustering #embedded #hardware #memory management #scheduling #variability
Task scheduling strategies to mitigate hardware variability in embedded shared memory clusters (AR, DC, AM, RKG, LB), p. 6.
DACDAC-2015-WangJZWY #energy #performance
Selective restore: an energy efficient read disturbance mitigation scheme for future STT-MRAM (RW, LJ, YZ, LW, JY), p. 6.
DACDAC-2015-WangJZWY15a #memory management
Exploit imbalanced cell writes to mitigate write disturbance in dense phase change memory (RW, LJ, YZ, LW, JY), p. 6.
DATEDATE-2015-DengFDWLTINLCW #fault #hardware #network
Retraining-based timing error mitigation for hardware neural networks (JD, YF, ZD, YW, HL, OT, PI, DN, XL, YC, CW), pp. 593–596.
MSRMSR-2015-SinhaSDPM #detection #repository #source code
Detecting and Mitigating Secret-Key Leaks in Source Code Repositories (VSS, DS, PD, RP, SM), pp. 396–400.
CHICHI-2015-IvkovicSGS #3d #game studies
Quantifying and Mitigating the Negative Effects of Local Latencies on Aiming in 3D Shooter Games (ZI, IS, CG, SWTS), pp. 135–144.
CHICHI-2015-LiaoFM #all about
It Is All About Perspective: An Exploration of Mitigating Selective Exposure with Aspect Indicators (QVL, WTF, SSM), pp. 1439–1448.
CHICHI-2015-WisniewskiJWZXR #internet #online
Resilience Mitigates the Negative Effects of Adolescent Internet Addiction and Online Risk Exposure (PJW, HJ, NW, SZ, HX, MBR, JMC), pp. 4029–4038.
REFSQREFSQ-2015-TenbergenWP #validation
Supporting the Validation of Adequacy in Requirements-Based Hazard Mitigations (BT, TW, KP), pp. 17–32.
ASPLOSASPLOS-2015-YetimMM #communication #execution #fault #named #parallel
CommGuard: Mitigating Communication Errors in Error-Prone Parallel Execution (YY, SM, MM), pp. 311–323.
DACDAC-2014-AncajasCR #named
Fort-NoCs: Mitigating the Threat of a Compromised NoC (DMA, KC, SR), p. 6.
DATEDATE-2014-SassolasSGAVBFP #architecture #design #evaluation
Early design stage thermal evaluation and mitigation: The locomotiv architectural case (TS, CS, AG, AA, PV, HB, LF, NP), pp. 1–2.
DATEDATE-2014-SilvanoPXS #architecture #manycore
Voltage island management in near threshold manycore architectures to mitigate dark silicon (CS, GP, SX, ISS), pp. 1–6.
SIGMODSIGMOD-2014-ElmeleegyOR #distributed #memory management #named #pipes and filters #using
SpongeFiles: mitigating data skew in mapreduce using distributed memory (KE, CO, BR), pp. 551–562.
SANERCSMR-WCRE-2014-KnodelN #architecture #industrial
Mitigating the Risk of software change in practice: Retrospective on more than 50 architecture evaluations in industry (Keynote paper) (JK, MN), pp. 2–17.
CSCWCSCW-2014-LiaoF
Can you hear me now?: mitigating the echo chamber effect by source position indicators (QVL, WTF), pp. 184–196.
ICPRICPR-2014-CaliskanA #using
Atmospheric Turbulence Mitigation Using Optical Flow (TC, NA), pp. 883–888.
RecSysRecSys-2014-KrishnanPFG #bias #learning #recommendation #social
A methodology for learning, analyzing, and mitigating social influence bias in recommender systems (SK, JP, MJF, KG), pp. 137–144.
SEKESEKE-2014-LeungLZ #process #scheduling
Snowball Effects on Risk Mitigation Scheduling: Process and Tool (HKNL, KML, PZ), pp. 582–585.
HPCAHPCA-2014-XiangYZ
Warp-level divergence in GPUs: Characterization, impact, and mitigation (PX, YY, HZ), pp. 284–295.
ECSAECSA-2013-GoichonSF
Swap Fairness for Thrashing Mitigation (FG, GS, SF), pp. 311–315.
DATEDATE-2013-LiuLC #algorithm
A network-flow based algorithm for power density mitigation at post-placement stage (SYSL, RGL, HMC), pp. 1707–1710.
DATEDATE-2013-PaternaR #problem #using
Mitigating dark-silicon problems using superlattice-based thermoelectric coolers (FP, SR), pp. 1391–1394.
DATEDATE-2013-RahimiBG #adaptation #approach
Hierarchically focused guardbanding: an adaptive approach to mitigate PVT variations and aging (AR, LB, RKG), pp. 1695–1700.
DATEDATE-2013-RakossyHTSNO #architecture #array #fault #functional #testing
Hot-swapping architecture with back-biased testing for mitigation of permanent faults in functional unit array (ZER, MH, HT, TS, YN, HO), pp. 535–540.
SIGMODSIGMOD-2013-ElmoreDPAAY #behaviour #multitenancy
Characterizing tenant behavior for placement and crisis mitigation in multitenant DBMSs (AJE, SD, AP, DA, AEA, XY), pp. 517–528.
HCIHCI-AS-2013-KalwarHP #concept #internet #named
SWord: A Concept Application for Mitigating Internet Terminology Anxiety (SKK, KH, JP), pp. 239–248.
KDIRKDIR-KMIS-2013-ZhouNL #case study #collaboration #problem
Mitigating Barriers to Patient-centred Knowledge Sharing — A Case-study of Knowledge Sharing Problems in the Collaboration of Traditional and Western Practitioners in Chinese Hospitals (LZ, MBN, WL), pp. 298–307.
SACSAC-2013-MouraMNS #named #network #novel
ABOI: a novel strategy to mitigate the blocking due to outdated information in OCS/OBS network (IM, FM, JMN, ACBS), pp. 640–645.
ICSEICSE-2013-Torres #modelling #specification
Mitigating the obsolescence of specification models of service-based systems (RT), pp. 1462–1464.
CASECASE-2012-ChenZD #fourier #process
Mitigation of chatter instability in milling processes by active fourier series compensation (ZC, HTZ, HD), pp. 167–171.
DATEDATE-2012-FirouziKT
NBTI mitigation by optimized NOP assignment and insertion (FF, SK, MBT), pp. 218–223.
DATEDATE-2012-KamalASP #approach #architecture #process
An architecture-level approach for mitigating the impact of process variations on extensible processors (MK, AAK, SS, MP), pp. 467–472.
DATEDATE-2012-LevequePLACSMC #embedded #feedback #modelling #multi
Holistic modeling of embedded systems with multi-discipline feedback: Application to a Precollision Mitigation Braking System (AL, FP, MML, HA, FC, SS, AM, LC), pp. 739–744.
DATEDATE-2012-SabryAC #approach #embedded #fault #hybrid
A hybrid HW-SW approach for intermittent error mitigation in streaming-based embedded systems (MMS, DA, FC), pp. 1110–1113.
DATEDATE-2012-ShoaibMGM #monitoring
A closed-loop system for artifact mitigation in ambulatory electrocardiogram monitoring (MS, GM, HG, SM), pp. 431–436.
DATEDATE-2012-VatajeluF #evaluation #parametricity #performance #reliability
Efficiency evaluation of parametric failure mitigation techniques for reliable SRAM operation (EIV, JF), pp. 1343–1348.
DATEDATE-2012-WuLMC #approach #correlation
Mitigating lifetime underestimation: A system-level approach considering temperature variations and correlations between failure mechanisms (KCW, MCL, DM, SCC), pp. 1269–1274.
SIGMODSIGMOD-2012-KwonBHR #named #pipes and filters
SkewTune: mitigating skew in mapreduce applications (YK, MB, BH, JAR), pp. 25–36.
VLDBVLDB-2012-KwonBHR #pipes and filters
SkewTune in Action: Mitigating Skew in MapReduce Applications (YK, MB, BH, JAR), pp. 1934–1937.
PLDIPLDI-2012-ZhangAM
Language-based control and mitigation of timing channels (DZ, AA, ACM), pp. 99–110.
OOPSLAOOPSLA-2012-KulkarniC #compilation #machine learning #optimisation #problem #using
Mitigating the compiler optimization phase-ordering problem using machine learning (SK, JC), pp. 147–162.
CGOCGO-2012-TangMS #compilation
Compiling for niceness: mitigating contention for QoS in warehouse scale computers (LT, JM, MLS), pp. 1–12.
HPCAHPCA-2012-ChatterjeeMBDJ #staged
Staged Reads: Mitigating the impact of DRAM writes on DRAM reads (NC, NM, RB, AD, NPJ), pp. 41–52.
HPCAHPCA-2012-MillerPTST #named #process
Booster: Reactive core acceleration for mitigating the effects of process variation and application imbalance in low-voltage chips (TNM, XP, RT, NS, RT), pp. 27–38.
ICSTICST-2012-Bandyopadhyay #correctness #fault #locality
Mitigating the Effect of Coincidental Correctness in Spectrum Based Fault Localization (AB), pp. 479–482.
DATEDATE-2011-ChanSGK #on the
On the efficacy of NBTI mitigation techniques (TBC, JS, PG, RK), pp. 932–937.
DATEDATE-2011-GielenMW #analysis #reliability
Analog circuit reliability in sub-32 nanometer CMOS: Analysis and mitigation (GGEG, EM, PHNDW), pp. 1474–1479.
DATEDATE-2011-HuangHL #fault
Cross-layer optimized placement and routing for FPGA soft error mitigation (KH, YH, XL), pp. 58–63.
DATEDATE-2011-JuanGM #3d #evaluation #multi #process #statistics
Statistical thermal evaluation and mitigation techniques for 3D Chip-Multiprocessors in the presence of process variations (DCJ, SG, DM), pp. 383–388.
DATEDATE-2011-PontarelliOSZ #feedback
Feedback based droop mitigation (SP, MO, AS, KZ), pp. 879–882.
CHICHI-2011-EgelmanOK #data access #facebook #fault
Oops, I did it again: mitigating repeated access control errors on facebook (SE, AO, SK), pp. 2295–2304.
ICEISICEIS-v3-2011-YangF
Mitigate Supply Risk in Supply Chain (XY, SF), pp. 544–549.
OOPSLAOOPSLA-2011-LiuB #automation #detection #named #precise
SHERIFF: precise detection and automatic mitigation of false sharing (TL, EDB), pp. 3–18.
SACSAC-2011-FuPT #clustering #distributed #framework #named
CluB: a cluster based framework for mitigating distributed denial of service attacks (ZF, MP, PT), pp. 520–527.
ESEC-FSEESEC-FSE-2011-BaahPH #dependence #effectiveness #fault #locality
Mitigating the confounding effects of program dependences for effective fault localization (GKB, AP, MJH), pp. 146–156.
DATEDATE-2010-LiZYZ #functional
Proactive NBTI mitigation for busy functional units in out-of-order microprocessors (LL, YZ, JY, JZ), pp. 411–416.
DATEDATE-2010-SterponeB #algorithm #multi
A new placement algorithm for the mitigation of multiple cell upsets in SRAM-based FPGAs (LS, NB), pp. 1231–1236.
ICMLICML-2010-SorgSL #bound
Internal Rewards Mitigate Agent Boundedness (JS, SPS, RLL), pp. 1007–1014.
KEODKEOD-2010-NamgoongKK #in the cloud #rdf #scalability
Mitigation of Large-scale RDF Data Loading with the Employment of a Cloud Computing Service (HN, HK, HGK), pp. 489–492.
SACSAC-2010-FuPTW #using
Mitigating denial of capability attacks using sink tree based quota allocation (ZF, MP, PT, WW), pp. 713–718.
DACDAC-2009-LinB #analysis #process
Analysis and mitigation of process variation impacts on Power-Attack Tolerance (LL, WPB), pp. 238–243.
DATEDATE-2009-GargM #3d #analysis #process #variability
System-level process variability analysis and mitigation for 3D MPSoCs (SG, DM), pp. 604–609.
DATEDATE-2009-LeeS #fault #static analysis
Static analysis to mitigate soft errors in register files (JL, AS), pp. 1367–1372.
DATEDATE-2009-NagarajK #case study #process
A study on placement of post silicon clock tuning buffers for mitigating impact of process variation (KN, SK), pp. 292–295.
DATEDATE-2009-ReordaVMR #embedded #low cost
A low-cost SEE mitigation solution for soft-processors embedded in Systems on Pogrammable Chips (MSR, MV, CM, RR), pp. 352–357.
CHICHI-2009-ParkKCS #aspect-oriented #bias #multi #named
NewsCube: delivering multiple aspects of news to mitigate media bias (SP, SK, SC, JS), pp. 443–452.
HPCAHPCA-2009-FuLF #fault #process
Soft error vulnerability aware process variation mitigation (XF, TL, JABF), pp. 93–104.
MSRMSR-2007-Masticola #development #lightweight #mining #repository #using
Lightweight Risk Mitigation for Software Development Projects Using Repository Mining (SPM), p. 13.
HPDCHPDC-2007-SandholmL #approach #statistics
A statistical approach to risk mitigation in computational markets (TS, KL), pp. 85–96.
SACSAC-2006-KirdaKVJ #named
Noxes: a client-side solution for mitigating cross-site scripting attacks (EK, CK, GV, NJ), pp. 330–337.
RERE-2005-RobinsonWW #analysis #design #probability #requirements #using
Risk Mitigation of Design Requirements Using a Probabilistic Analysis (MCR, SEW, DCW), pp. 231–239.
SIGMODSIGMOD-2004-MehrotraBKVAHLMMWEH #named
CAMAS: A Citizen Awareness System for Crisis Mitigation (SM, CTB, DVK, NV, KA, RH, HL, YM, AM, JW, RE, CH), pp. 955–956.
CHICHI-2004-LeeHH #design
Collision warning design to mitigate driver distraction (JDL, JDH, EH), pp. 65–72.
SEKESEKE-2003-Ochs #assessment #off the shelf #requirements #risk management #using
Using Software Risk Management for Deriving Method Requirements for Risk Mitigation in COTS Assessment and Selection (MO), pp. 639–646.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.