BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
system (18)
error (14)
data (11)
use (11)
deadlock (11)

Stem prevent$ (all stems)

110 papers:

CASECASE-2015-WangSH #concurrent
A three-stage deadlock prevention strategy for S3PR nets (SW, CS, LH), pp. 286–291.
VLDBVLDB-2015-VattaniCL #probability
Optimal Probabilistic Cache Stampede Prevention (AV, FC, KL), pp. 886–897.
PLDIPLDI-2015-LongfieldNMT #self #specification
Preventing glitches and short circuits in high-level self-timed chip specifications (SLJ, BN, RM, RT), pp. 270–279.
CSCWCSCW-2015-WisniewskiJXRC #behaviour #how #privacy #quote #social #social media
“Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
HCIDHM-EH-2015-LimaAIA #mobile
Mobile Application to Aid in the Prevention of Pressure Ulcers (AGL, LA, ICI, LVA), pp. 465–473.
HCIHCI-IT-2015-MijovicMMMKG #fault #human-computer #predict #towards
Towards Creation of Implicit HCI Model for Prediction and Prevention of Operators’ Error (PM, MM, MM, IM, VK, IG), pp. 341–352.
KDDKDD-2015-BabaKNKGIAKIHKS #low cost #predict
Predictive Approaches for Low-Cost Preventive Medicine Program in Developing Countries (YB, HK, YN, EK, PPG, RIM, AA, MK, SI, TH, MK, SS, KK, KT, MS, MB, NU, MK, NN), pp. 1681–1690.
KDDKDD-2015-PotashBLMRWRJMG #health #modelling #predict
Predictive Modeling for Public Health: Preventing Childhood Lead Poisoning (EP, JB, AL, SM, AR, JW, ER, EJ, RM, RG), pp. 2039–2047.
ISSTAISSTA-2015-GyoriSHM #dependence #detection #reliability #testing
Reliable testing: detecting state-polluting tests to prevent test dependency (AG, AS, FH, DM), pp. 223–233.
ISSTAISSTA-2015-MusluBM #fault #testing
Preventing data errors with continuous testing (KM, YB, AM), pp. 373–384.
QoSAQoSA-2014-MzidMBA #concurrent #design pattern #modelling #named #realtime
SRMP: a software pattern for deadlocks prevention inreal-time concurrency models (RM, CM, JPB, MA), pp. 139–144.
DACDAC-2014-WeiWNP #physics #reverse engineering #using
Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
HCIDHM-2014-GuarneriA #design
Active Prevention by Motivating and Engaging Teenagers in Adopting Healthier Lifestyles: — PEGASO Strategy in Designing Future Healthcare Pillars (RG, GA), pp. 351–360.
HCIDHM-2014-MazzolaACRADA #architecture #education #monitoring
Integrated Architecture for Next-Generation m-Health Services (Education, Monitoring and Prevention) in Teenagers (MM, PA, GC, CR, MA, CD, GA), pp. 403–414.
HCIDHM-2014-PanneseMLADB #game studies #named
Pegaso: A Serious Game to Prevent Obesity (LP, DM, PL, SA, ID, TB), pp. 427–435.
HCIHIMI-DE-2014-KimH14a #embedded #interactive
Label Embedded Treemapping: A Label Overlap Prevention Technique for Zoomable Treemaps and a User Interaction Technique (KK, JH), pp. 44–53.
HCISCSM-2014-AhnMHNHPM #analysis #network #representation #semantics #social #twitter
Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
ICEISICEIS-v2-2014-Hauer #state of the art
Data Leakage Prevention — A Position to State-of-the-Art Capabilities and Remaining Risk (BH), pp. 361–367.
SEKESEKE-2014-YangWSFC #analysis #debugging #fault
Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
RERE-2014-TsigkanosPMGN #adaptation #requirements #runtime #security
Engineering topology aware adaptive security: Preventing requirements violations at runtime (CT, LP, CM, CG, BN), pp. 203–212.
SACSAC-2014-LiSSJW #information management
Preventing the diffusion of negative information based on local influence tree (YL, YS, JS, BJ, JW), pp. 650–652.
SACSAC-2014-Majumder #realtime
A real-time smartphone- and smartshoe-based fall prevention system (AKMJAM), pp. 470–471.
FSEFSE-2014-Xiao #architecture #debugging #detection
Detecting and preventing the architectural roots of bugs (LX), pp. 811–813.
OSDIOSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing
Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
ISSTAISSTA-2014-ZhangW #concurrent #parallel #runtime #thread
Runtime prevention of concurrency related type-state violations in multithreaded applications (LZ, CW), pp. 1–12.
ASEASE-2013-Mirakhorli #architecture #implementation #visualisation
Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualization (MM), pp. 762–765.
CASECASE-2013-PanHJ #concurrent #flexibility #petri net #policy #using
One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
ICSMEICSM-2013-FrancisW #debugging #policy
Determining “Grim Reaper” Policies to Prevent Languishing Bugs (PF, LW), pp. 436–439.
HCIDHM-HB-2013-WiezerRO #game studies
Serious Gaming Used as Management Intervention to Prevent Work-Related Stress and Raise Work-Engagement among Workers (NW, MBR, EO), pp. 149–158.
HCIHCI-IMT-2013-ShibuyaKM #web
A Web Browsing Method on Handheld Touch Screen Devices for Preventing from Tapping Unintended Links (YS, HK, KM), pp. 491–496.
SACSAC-2013-MajumderRZEA #named #novel #realtime #towards
iPrevention: towards a novel real-time smartphone-based fall prevention system (AJAM, FR, IZ, WEJ, SIA), pp. 513–518.
ESEC-FSEESEC-FSE-2013-GrechanikHBW #database
Preventing database deadlocks in applications (MG, BMMH, UB, HW), pp. 356–366.
ESEC-FSEESEC-FSE-2013-HossainGBW #database #named #transaction
REDACT: preventing database deadlocks from application-based transactions (BMMH, MG, UB, HW), pp. 591–594.
CASECASE-2012-HanXZLW #concurrent #policy
Two-stage deadlock prevention policy based on resource-transition circuits (LH, KX, MZ, HL, FW), pp. 741–746.
CASECASE-2012-Kalir #maintenance #performance
Segregating preventive maintenance work for factory performance improvement (AK), pp. 646–649.
ICALPICALP-v2-2012-BhawalkarKLRS #network #problem #social
Preventing Unraveling in Social Networks: The Anchored k-Core Problem (KB, JMK, KL, TR, AS), pp. 440–451.
SEKESEKE-2012-LiuCL #concurrent #in the cloud
Singular Formulas for Compound Siphons, Complementary Siphons and Characteristic Vectors for Deadlock Prevention in Cloud Computing (GL, DYC, YNL), pp. 359–362.
SACSAC-2012-FanS #automation #collaboration #dependence #programming #realtime #semantics
Dependency-based automatic locking for semantic conflict prevention in real-time collaborative programming (HF, CS), pp. 737–742.
DACDAC-2011-BailisRGBS #injection #named
Dimetrodon: processor-level preventive thermal management via idle cycle injection (PB, VJR, SG, DMB, MIS), pp. 89–94.
HCIHCD-2011-ImJY #design #development #mobile
Guideline Development of Mobile Phone Design for Preventing Child Abuse (JI, ECJ, JY), pp. 243–252.
HCIHCD-2011-TamuraYSU #development #smarttech
Development of a Wearable Airbag for Preventing Fall Related Injuries (TT, TY, MS, MU), pp. 335–339.
HCIHCI-UA-2011-HijikataYTN #development #information management
Development of Information Filtering Systems for Disaster Prevention (YH, TY, YT, SN), pp. 318–327.
EDOCEDOC-2011-BalinskyPS #framework
System Call Interception Framework for Data Leak Prevention (HB, DSP, SJS), pp. 139–148.
KDDKDD-2011-ThanhRT #implementation #testing
k-NN as an implementation of situation testing for discrimination discovery and prevention (BLT, SR, FT), pp. 502–510.
SEKESEKE-2011-FuginiRIRC #monitoring #risk management #simulation
Simulations of Risks for Monitoring and Prevention (MGF, FR, RI, CR, OC), pp. 602–607.
ECMFAECMFA-2011-GreenyerPR #incremental #reuse
Preventing Information Loss in Incremental Model Synchronization by Reusing Elements (JG, SP, JR), pp. 144–159.
RERE-2011-WeverM #analysis #effectiveness #question #what
What are the day-to-day factors that are preventing business analysts from effective business analysis? (AW, NAMM), pp. 293–298.
SPLCSPLC-2011-SinhaDR #development #multi #performance #product line #reduction #scalability #testing
Governance and Cost Reduction through Multi-tier Preventive Performance Tests in a Large-Scale Product Line Development (SS, TD, RR), pp. 295–302.
DATEDATE-2010-DasMZC #detection #hardware #information management #memory management
Detecting/preventing information leakage on the memory bus due to malicious hardware (AD, GM, JZ, ANC), pp. 861–866.
KDDKDD-2010-KumarGM #data mining #fault #health #mining #predict
Data mining to predict and prevent errors in health insurance claims processing (MK, RG, ZSM), pp. 65–74.
GPCEGPCE-J-2007-BravenboerDV10 #injection #syntax
Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 473–495.
GPCEGPCE-J-2007-FradetH10 #aspect-oriented
Aspects of availability: Enforcing timed properties to prevent denial of service (PF, SHTH), pp. 516–542.
SACSAC-2010-ChubachiSK #persistent
Hypervisor-based prevention of persistent rootkits (YC, TS, KK), pp. 214–220.
ICSEICSE-2010-Schroter #recommendation
Failure preventing recommendations (AS), pp. 397–400.
HPDCHPDC-2010-RajannaSJLG #clustering #coordination #in the cloud #named #network
XCo: explicit coordination to prevent network fabric congestion in cloud computing cluster platforms (VSR, SS, AJ, CL, KG), pp. 252–263.
DATEDATE-2009-BonnaudS #design
Cross-coupling in 65nm fully integrated EDGE System On Chip Design and cross-coupling prevention of complex 65nm SoC (PHB, GS), pp. 1045–1050.
VLDBVLDB-2009-MoerkotteNS #bound #estimation #fault
Preventing Bad Plans by Bounding the Impact of Cardinality Estimation Errors (GM, TN, GS), pp. 982–993.
CHICHI-2009-HoffmannSB #fault #named
TypeRight: a keyboard with tactile error prevention (AH, DS, JOB), pp. 2265–2268.
SACSAC-2009-LiuYWS #architecture #injection #named #sql #towards
SQLProb: a proxy-based architecture towards preventing SQL injection attacks (AL, YY, DW, AS), pp. 2054–2061.
CASECASE-2008-KashimaI #concept #navigation
Conceptual menu navigation system to prevent lifestyle-related disease (TK, HI), pp. 633–637.
ICEISICEIS-AIDSS-2008-BringasPPS
Bayesian-Networks-Based Misuse and Anomaly Prevention System (PGB, YKP, SP, PS), pp. 62–69.
ICEISICEIS-J-2008-BringasP
Next-Generation Misuse and Anomaly Prevention System (PGB, YKP), pp. 117–129.
SIGIRSIGIR-2008-ZighelnicK #query #robust
Query-drift prevention for robust query expansion (LZ, OK), pp. 825–826.
SACSAC-2008-SaffarianM #algorithm #novel #protocol
A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm (MS, MCM), pp. 1849–1853.
ICLPICLP-2008-MileoMB #approach #logic programming #monitoring
A Logic Programming Approach to Home Monitoring for Risk Prevention in Assisted Living (AM, DM, RB), pp. 145–159.
HCIHCI-AS-2007-Furukawa #challenge #effectiveness #fault #injection #question #what
Challenge for Preventing Medication Errors -Learn from Errors- : What Is the Most Effective Label Display to Prevent Medication Error for Injectable Drug ? (HF), pp. 437–442.
HCIHCI-AS-2007-Tsuchiya #fault #metric #order
Medication Errors Caused by Order Entry System and Prevention Measures (FT), pp. 535–543.
KDDKDD-2007-ZhaoDZ #mining #network
Mining complex power networks for blackout prevention (JHZ, ZYD, PZ), pp. 986–994.
GPCEGPCE-2007-BravenboerDV #injection #syntax
Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 3–12.
SACSAC-2007-JohnsB #approximate #automation #injection #named #web
SMask: preventing injection attacks in web applications by approximating automatic data/code separation (MJ, CB), pp. 284–291.
LCTESLCTES-2007-PermandlaRB #java #type system #virtual machine
A type system for preventing data races and deadlocks in the java virtual machine language: 1 (PP, MR, CB), p. 10.
ICSTSAT-2007-Prestwich #dependence
Variable Dependency in Local Search: Prevention Is Better Than Cure (SDP), pp. 107–120.
CHICHI-2006-WuMG #question #security
Do security toolbars actually prevent phishing attacks? (MW, RCM, SLG), pp. 601–610.
QAPLQAPL-2005-BartheRW06 #branch #transaction
Preventing Timing Leaks Through Transactional Branching Instructions (GB, TR, MW), pp. 33–55.
ICSEICSE-2006-HalfondO #injection #sql #using
Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
CASECASE-2005-WeiL #concurrent #policy #programming #using
A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
DATEDATE-2005-LinkV #configuration management #runtime
Hotspot Prevention Through Runtime Reconfiguration in Network-On-Chip (GML, NV), pp. 648–649.
KDDKDD-2005-NevilleSJKPG #information management #relational #using
Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
SACSAC-2005-ChenCKM #realtime #scheduling
Real-time task scheduling anomaly: observations and prevention (YSC, LPC, TWK, AKM), pp. 897–898.
SACSAC-2005-UppuluriJR
Preventing race condition attacks on file-systems (PU, UJ, AR), pp. 346–353.
LCTESLCTES-2005-RegehrD
Preventing interrupt overload (JR, UD), pp. 50–58.
ICEISICEIS-v4-2004-SuiAM #approach #e-commerce #email
Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
OOPSLAOOPSLA-2004-WeimerN #fault #runtime
Finding and preventing run-time error handling mistakes (WW, GCN), pp. 419–431.
SACSAC-2004-BlaserSMJKL #fault #using
Potential prevention of medical errors in casualty surgery by using information technology (RB, MS, DM, PJ, KK, RL), pp. 285–290.
SACSAC-2004-ParkerC #policy #protocol
Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
ICEISICEIS-v2-2003-MontesTDBO
A Decision Support System for Preventing and Correcting Burden Slips, Drops and Hangs in a Blast Furnace (DM, JT, ED, RB, FO), pp. 197–201.
CGOCGO-2003-CollardL #optimisation
Optimizations to Prevent Cache Penalties for the Intel ® Itanium 2 Processor (JFC, DML), pp. 105–114.
SCAMSCAM-2002-BurdB #clone detection #detection #maintenance #tool support
Evaluating Clone Detection Tools for Use during Preventative Maintenance (EB, JB), pp. 36–43.
OOPSLAOOPSLA-2002-BoyapatiLR #programming
Ownership types for safe programming: preventing data races and deadlocks (CB, RL, MCR), pp. 211–230.
VLDBVLDB-2001-CasatiDGS #comprehension #exception #predict #process #quality
Improving Business Process Quality through Exception Understanding, Prediction, and Prevention (DG, FC, UD, MCS), pp. 159–168.
ICSMEICSM-2001-MohapatraM #case study #fault #predict
Defect Prevention through Defect Prediction: A Case Study at Infosys (SM, BM), pp. 260–272.
RERE-2001-Feather #detection #fault #reduction #using
Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
ICSMEICSM-2000-Chapin00a #maintenance #question #what
Do We Know What Preventive Maintenance Is? (NC), pp. 15–17.
ICSMEICSM-2000-Kajko-Mattsson #exclamation #maintenance #question #what
Preventive Maintenance! Do We Know What It Is? (MKM), pp. 12–14.
ICSMEICSM-2000-Kajko-MattssonBNSL
Prevention Is Better Than Cure (MKM, GB, IN, AS, PEL), p. 184–?.
ICSMEICSM-2000-Vehvilainen #maintenance #question #what
What Is Preventive Software Maintenance? (RV), p. 18–?.
ISSTAISSTA-2000-SiegelA #precise
Improving the precision of INCA by preventing spurious cycles (SFS, GSA), pp. 191–200.
PODSPODS-1999-DawsonVLS
Minimal Data Upgrading to Prevent Inference and Association (SD, SDCdV, PL, PS), pp. 114–125.
EDOCEDOC-1999-LauderK #component #legacy #named
EventPorts: preventing legacy componentware (AL, SK), pp. 224–232.
LOPSTRLOPSTR-1998-SmausHK #fault #logic programming #multi #source code #using
Preventing Instantiation Errors and Loops for Logic Programs with Multiple Modes Using block Declarations (JGS, PMH, AK), pp. 289–307.
HCIHCI-CC-1997-PeperHS #assessment #how
How to Use Applied Psychophysiology/Biofeedback in the Prevention and Assessment of Upper Extremity Musculoskeletal Disorders (EP, RH, DMS), pp. 551–554.
ICMLICML-1997-Ng
Preventing “Overfitting” of Cross-Validation Data (AYN), pp. 245–253.
ICSEICSE-1997-LieberherrO #java #maintenance
Preventive Program Maintenance in Demeter/Java (KJL, DO), pp. 604–605.
AdaTRI-Ada-1995-Sanden95b #concurrent #resource management
Resource Sharing Deadlock Prevention (BS), pp. 70–103.
ICDARICDAR-1993-BackmutskyZ #detection #fault
Some ergonomic improvements of text error detection and prevention in DTP-systems (VB, VZ), pp. 947–950.
HCIHCI-SHI-1993-MassonK #fault #process
Preventing Human Errors in Skilled Activities Through a Computerized Support System (MM, VDK), pp. 802–807.
SEKESEKE-1993-Berztiss #safety
Catastrophe Prevention in Safety-Critical Systems (ATB), pp. 102–108.
ESECESEC-1993-Reichardt #re-engineering
Preventative Software Engineering (JR), pp. 251–262.
HPDCHPDC-1993-NakamuraT #network #performance #protocol
Starvation-Prevented Priority-Based Total Ordering Broadcast Protocol on High-Speed Single Channel Network (AN, MT), pp. 281–288.
VLDBVLDB-1985-CellaryM #database #distributed #infinity
Locking with Prevention of Cyclic and Infinite Restarting in Distributed Database Systems (WC, TM), pp. 115–126.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.