110 papers:
- CASE-2015-WangSH #concurrent
- A three-stage deadlock prevention strategy for S3PR nets (SW, CS, LH), pp. 286–291.
- VLDB-2015-VattaniCL #probability
- Optimal Probabilistic Cache Stampede Prevention (AV, FC, KL), pp. 886–897.
- PLDI-2015-LongfieldNMT #self #specification
- Preventing glitches and short circuits in high-level self-timed chip specifications (SLJ, BN, RM, RT), pp. 270–279.
- CSCW-2015-WisniewskiJXRC #behaviour #how #privacy #quote #social #social media
- “Preventative” vs. “Reactive”: How Parental Mediation Influences Teens’ Social Media Privacy Behaviors (PJW, HJ, HX, MBR, JMC), pp. 302–316.
- DHM-EH-2015-LimaAIA #mobile
- Mobile Application to Aid in the Prevention of Pressure Ulcers (AGL, LA, ICI, LVA), pp. 465–473.
- HCI-IT-2015-MijovicMMMKG #fault #human-computer #predict #towards
- Towards Creation of Implicit HCI Model for Prediction and Prevention of Operators’ Error (PM, MM, MM, IM, VK, IG), pp. 341–352.
- KDD-2015-BabaKNKGIAKIHKS #low cost #predict
- Predictive Approaches for Low-Cost Preventive Medicine Program in Developing Countries (YB, HK, YN, EK, PPG, RIM, AA, MK, SI, TH, MK, SS, KK, KT, MS, MB, NU, MK, NN), pp. 1681–1690.
- KDD-2015-PotashBLMRWRJMG #health #modelling #predict
- Predictive Modeling for Public Health: Preventing Childhood Lead Poisoning (EP, JB, AL, SM, AR, JW, ER, EJ, RM, RG), pp. 2039–2047.
- ISSTA-2015-GyoriSHM #dependence #detection #reliability #testing
- Reliable testing: detecting state-polluting tests to prevent test dependency (AG, AS, FH, DM), pp. 223–233.
- ISSTA-2015-MusluBM #fault #testing
- Preventing data errors with continuous testing (KM, YB, AM), pp. 373–384.
- QoSA-2014-MzidMBA #concurrent #design pattern #modelling #named #realtime
- SRMP: a software pattern for deadlocks prevention inreal-time concurrency models (RM, CM, JPB, MA), pp. 139–144.
- DAC-2014-WeiWNP #physics #reverse engineering #using
- Reverse Engineering and Prevention Techniques for Physical Unclonable Functions Using Side Channels (SW, JBW, AN, MP), p. 6.
- DHM-2014-GuarneriA #design
- Active Prevention by Motivating and Engaging Teenagers in Adopting Healthier Lifestyles: — PEGASO Strategy in Designing Future Healthcare Pillars (RG, GA), pp. 351–360.
- DHM-2014-MazzolaACRADA #architecture #education #monitoring
- Integrated Architecture for Next-Generation m-Health Services (Education, Monitoring and Prevention) in Teenagers (MM, PA, GC, CR, MA, CD, GA), pp. 403–414.
- DHM-2014-PanneseMLADB #game studies #named
- Pegaso: A Serious Game to Prevent Obesity (LP, DM, PL, SA, ID, TB), pp. 427–435.
- HIMI-DE-2014-KimH14a #embedded #interactive
- Label Embedded Treemapping: A Label Overlap Prevention Technique for Zoomable Treemaps and a User Interaction Technique (KK, JH), pp. 44–53.
- SCSM-2014-AhnMHNHPM #analysis #network #representation #semantics #social #twitter
- Social Network Representation and Dissemination of Pre-Exposure Prophylaxis (PrEP): A Semantic Network Analysis of HIV Prevention Drug on Twitter (ZA, MM, JH, YN, CWH, MP, JM), pp. 160–169.
- ICEIS-v2-2014-Hauer #state of the art
- Data Leakage Prevention — A Position to State-of-the-Art Capabilities and Remaining Risk (BH), pp. 361–367.
- SEKE-2014-YangWSFC #analysis #debugging #fault
- Bug Inducing Analysis to Prevent Fault Prone Bug Fixes (HY, CW, QS, YF, ZC), pp. 620–625.
- RE-2014-TsigkanosPMGN #adaptation #requirements #runtime #security
- Engineering topology aware adaptive security: Preventing requirements violations at runtime (CT, LP, CM, CG, BN), pp. 203–212.
- SAC-2014-LiSSJW #information management
- Preventing the diffusion of negative information based on local influence tree (YL, YS, JS, BJ, JW), pp. 650–652.
- SAC-2014-Majumder #realtime
- A real-time smartphone- and smartshoe-based fall prevention system (AKMJAM), pp. 470–471.
- FSE-2014-Xiao #architecture #debugging #detection
- Detecting and preventing the architectural roots of bugs (LX), pp. 811–813.
- OSDI-2014-YuanLZRZZJS #analysis #data-driven #distributed #testing
- Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-Intensive Systems (DY, YL, XZ, GRR, XZ, YZ, PJ, MS), pp. 249–265.
- ISSTA-2014-ZhangW #concurrent #parallel #runtime #thread
- Runtime prevention of concurrency related type-state violations in multithreaded applications (LZ, CW), pp. 1–12.
- ASE-2013-Mirakhorli #architecture #implementation #visualisation
- Preventing erosion of architectural tactics through their strategic implementation, preservation, and visualization (MM), pp. 762–765.
- CASE-2013-PanHJ #concurrent #flexibility #petri net #policy #using
- One computationally improved deadlock prevention policy for flexible manufacturing systems using Petri nets (YLP, HH, MJ), pp. 924–929.
- ICSM-2013-FrancisW #debugging #policy
- Determining “Grim Reaper” Policies to Prevent Languishing Bugs (PF, LW), pp. 436–439.
- DHM-HB-2013-WiezerRO #game studies
- Serious Gaming Used as Management Intervention to Prevent Work-Related Stress and Raise Work-Engagement among Workers (NW, MBR, EO), pp. 149–158.
- HCI-IMT-2013-ShibuyaKM #web
- A Web Browsing Method on Handheld Touch Screen Devices for Preventing from Tapping Unintended Links (YS, HK, KM), pp. 491–496.
- SAC-2013-MajumderRZEA #named #novel #realtime #towards
- iPrevention: towards a novel real-time smartphone-based fall prevention system (AJAM, FR, IZ, WEJ, SIA), pp. 513–518.
- ESEC-FSE-2013-GrechanikHBW #database
- Preventing database deadlocks in applications (MG, BMMH, UB, HW), pp. 356–366.
- ESEC-FSE-2013-HossainGBW #database #named #transaction
- REDACT: preventing database deadlocks from application-based transactions (BMMH, MG, UB, HW), pp. 591–594.
- CASE-2012-HanXZLW #concurrent #policy
- Two-stage deadlock prevention policy based on resource-transition circuits (LH, KX, MZ, HL, FW), pp. 741–746.
- CASE-2012-Kalir #maintenance #performance
- Segregating preventive maintenance work for factory performance improvement (AK), pp. 646–649.
- ICALP-v2-2012-BhawalkarKLRS #network #problem #social
- Preventing Unraveling in Social Networks: The Anchored k-Core Problem (KB, JMK, KL, TR, AS), pp. 440–451.
- SEKE-2012-LiuCL #concurrent #in the cloud
- Singular Formulas for Compound Siphons, Complementary Siphons and Characteristic Vectors for Deadlock Prevention in Cloud Computing (GL, DYC, YNL), pp. 359–362.
- SAC-2012-FanS #automation #collaboration #dependence #programming #realtime #semantics
- Dependency-based automatic locking for semantic conflict prevention in real-time collaborative programming (HF, CS), pp. 737–742.
- DAC-2011-BailisRGBS #injection #named
- Dimetrodon: processor-level preventive thermal management via idle cycle injection (PB, VJR, SG, DMB, MIS), pp. 89–94.
- HCD-2011-ImJY #design #development #mobile
- Guideline Development of Mobile Phone Design for Preventing Child Abuse (JI, ECJ, JY), pp. 243–252.
- HCD-2011-TamuraYSU #development #smarttech
- Development of a Wearable Airbag for Preventing Fall Related Injuries (TT, TY, MS, MU), pp. 335–339.
- HCI-UA-2011-HijikataYTN #development #information management
- Development of Information Filtering Systems for Disaster Prevention (YH, TY, YT, SN), pp. 318–327.
- EDOC-2011-BalinskyPS #framework
- System Call Interception Framework for Data Leak Prevention (HB, DSP, SJS), pp. 139–148.
- KDD-2011-ThanhRT #implementation #testing
- k-NN as an implementation of situation testing for discrimination discovery and prevention (BLT, SR, FT), pp. 502–510.
- SEKE-2011-FuginiRIRC #monitoring #risk management #simulation
- Simulations of Risks for Monitoring and Prevention (MGF, FR, RI, CR, OC), pp. 602–607.
- ECMFA-2011-GreenyerPR #incremental #reuse
- Preventing Information Loss in Incremental Model Synchronization by Reusing Elements (JG, SP, JR), pp. 144–159.
- RE-2011-WeverM #analysis #effectiveness #question #what
- What are the day-to-day factors that are preventing business analysts from effective business analysis? (AW, NAMM), pp. 293–298.
- SPLC-2011-SinhaDR #development #multi #performance #product line #reduction #scalability #testing
- Governance and Cost Reduction through Multi-tier Preventive Performance Tests in a Large-Scale Product Line Development (SS, TD, RR), pp. 295–302.
- DATE-2010-DasMZC #detection #hardware #information management #memory management
- Detecting/preventing information leakage on the memory bus due to malicious hardware (AD, GM, JZ, ANC), pp. 861–866.
- KDD-2010-KumarGM #data mining #fault #health #mining #predict
- Data mining to predict and prevent errors in health insurance claims processing (MK, RG, ZSM), pp. 65–74.
- GPCE-J-2007-BravenboerDV10 #injection #syntax
- Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 473–495.
- GPCE-J-2007-FradetH10 #aspect-oriented
- Aspects of availability: Enforcing timed properties to prevent denial of service (PF, SHTH), pp. 516–542.
- SAC-2010-ChubachiSK #persistent
- Hypervisor-based prevention of persistent rootkits (YC, TS, KK), pp. 214–220.
- ICSE-2010-Schroter #recommendation
- Failure preventing recommendations (AS), pp. 397–400.
- HPDC-2010-RajannaSJLG #clustering #coordination #in the cloud #named #network
- XCo: explicit coordination to prevent network fabric congestion in cloud computing cluster platforms (VSR, SS, AJ, CL, KG), pp. 252–263.
- DATE-2009-BonnaudS #design
- Cross-coupling in 65nm fully integrated EDGE System On Chip Design and cross-coupling prevention of complex 65nm SoC (PHB, GS), pp. 1045–1050.
- VLDB-2009-MoerkotteNS #bound #estimation #fault
- Preventing Bad Plans by Bounding the Impact of Cardinality Estimation Errors (GM, TN, GS), pp. 982–993.
- CHI-2009-HoffmannSB #fault #named
- TypeRight: a keyboard with tactile error prevention (AH, DS, JOB), pp. 2265–2268.
- SAC-2009-LiuYWS #architecture #injection #named #sql #towards
- SQLProb: a proxy-based architecture towards preventing SQL injection attacks (AL, YY, DW, AS), pp. 2054–2061.
- CASE-2008-KashimaI #concept #navigation
- Conceptual menu navigation system to prevent lifestyle-related disease (TK, HI), pp. 633–637.
- ICEIS-AIDSS-2008-BringasPPS
- Bayesian-Networks-Based Misuse and Anomaly Prevention System (PGB, YKP, SP, PS), pp. 62–69.
- ICEIS-J-2008-BringasP
- Next-Generation Misuse and Anomaly Prevention System (PGB, YKP), pp. 117–129.
- SIGIR-2008-ZighelnicK #query #robust
- Query-drift prevention for robust query expansion (LZ, OK), pp. 825–826.
- SAC-2008-SaffarianM #algorithm #novel #protocol
- A novel protocol to prevent malicious nodes from misdirecting forward ants in AntNet algorithm (MS, MCM), pp. 1849–1853.
- ICLP-2008-MileoMB #approach #logic programming #monitoring
- A Logic Programming Approach to Home Monitoring for Risk Prevention in Assisted Living (AM, DM, RB), pp. 145–159.
- HCI-AS-2007-Furukawa #challenge #effectiveness #fault #injection #question #what
- Challenge for Preventing Medication Errors -Learn from Errors- : What Is the Most Effective Label Display to Prevent Medication Error for Injectable Drug ? (HF), pp. 437–442.
- HCI-AS-2007-Tsuchiya #fault #metric #order
- Medication Errors Caused by Order Entry System and Prevention Measures (FT), pp. 535–543.
- KDD-2007-ZhaoDZ #mining #network
- Mining complex power networks for blackout prevention (JHZ, ZYD, PZ), pp. 986–994.
- GPCE-2007-BravenboerDV #injection #syntax
- Preventing injection attacks with syntax embeddings (MB, ED, EV), pp. 3–12.
- SAC-2007-JohnsB #approximate #automation #injection #named #web
- SMask: preventing injection attacks in web applications by approximating automatic data/code separation (MJ, CB), pp. 284–291.
- LCTES-2007-PermandlaRB #java #type system #virtual machine
- A type system for preventing data races and deadlocks in the java virtual machine language: 1 (PP, MR, CB), p. 10.
- SAT-2007-Prestwich #dependence
- Variable Dependency in Local Search: Prevention Is Better Than Cure (SDP), pp. 107–120.
- CHI-2006-WuMG #question #security
- Do security toolbars actually prevent phishing attacks? (MW, RCM, SLG), pp. 601–610.
- QAPL-2005-BartheRW06 #branch #transaction
- Preventing Timing Leaks Through Transactional Branching Instructions (GB, TR, MW), pp. 33–55.
- ICSE-2006-HalfondO #injection #sql #using
- Preventing SQL injection attacks using AMNESIA (WGJH, AO), pp. 795–798.
- CASE-2005-WeiL #concurrent #policy #programming #using
- A deadlock prevention policy for FMS using mathematical programming (NW, ZL), pp. 399–403.
- DATE-2005-LinkV #configuration management #runtime
- Hotspot Prevention Through Runtime Reconfiguration in Network-On-Chip (GML, NV), pp. 648–649.
- KDD-2005-NevilleSJKPG #information management #relational #using
- Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
- SAC-2005-ChenCKM #realtime #scheduling
- Real-time task scheduling anomaly: observations and prevention (YSC, LPC, TWK, AKM), pp. 897–898.
- SAC-2005-UppuluriJR
- Preventing race condition attacks on file-systems (PU, UJ, AR), pp. 346–353.
- LCTES-2005-RegehrD
- Preventing interrupt overload (JR, UD), pp. 50–58.
- ICEIS-v4-2004-SuiAM #approach #e-commerce #email
- Trusted Email: A Proposed Approach to Prevent Credit Card Fraud in Softproducts E-Commerce (NTS, SIA, DM), pp. 106–113.
- OOPSLA-2004-WeimerN #fault #runtime
- Finding and preventing run-time error handling mistakes (WW, GCN), pp. 419–431.
- SAC-2004-BlaserSMJKL #fault #using
- Potential prevention of medical errors in casualty surgery by using information technology (RB, MS, DM, PJ, KK, RL), pp. 285–290.
- SAC-2004-ParkerC #policy #protocol
- Extending invalid-access prevention policy protocols for mobile-client data caching (SP, ZC), pp. 1171–1176.
- ICEIS-v2-2003-MontesTDBO
- A Decision Support System for Preventing and Correcting Burden Slips, Drops and Hangs in a Blast Furnace (DM, JT, ED, RB, FO), pp. 197–201.
- CGO-2003-CollardL #optimisation
- Optimizations to Prevent Cache Penalties for the Intel ® Itanium 2 Processor (JFC, DML), pp. 105–114.
- SCAM-2002-BurdB #clone detection #detection #maintenance #tool support
- Evaluating Clone Detection Tools for Use during Preventative Maintenance (EB, JB), pp. 36–43.
- OOPSLA-2002-BoyapatiLR #programming
- Ownership types for safe programming: preventing data races and deadlocks (CB, RL, MCR), pp. 211–230.
- VLDB-2001-CasatiDGS #comprehension #exception #predict #process #quality
- Improving Business Process Quality through Exception Understanding, Prediction, and Prevention (DG, FC, UD, MCS), pp. 159–168.
- ICSM-2001-MohapatraM #case study #fault #predict
- Defect Prevention through Defect Prediction: A Case Study at Infosys (SM, BM), pp. 260–272.
- RE-2001-Feather #detection #fault #reduction #using
- Risk Reduction Using DDP (Defect Detection and Prevention): Software Support and Software Applications (MSF), p. 288.
- ICSM-2000-Chapin00a #maintenance #question #what
- Do We Know What Preventive Maintenance Is? (NC), pp. 15–17.
- ICSM-2000-Kajko-Mattsson #exclamation #maintenance #question #what
- Preventive Maintenance! Do We Know What It Is? (MKM), pp. 12–14.
- ICSM-2000-Kajko-MattssonBNSL
- Prevention Is Better Than Cure (MKM, GB, IN, AS, PEL), p. 184–?.
- ICSM-2000-Vehvilainen #maintenance #question #what
- What Is Preventive Software Maintenance? (RV), p. 18–?.
- ISSTA-2000-SiegelA #precise
- Improving the precision of INCA by preventing spurious cycles (SFS, GSA), pp. 191–200.
- PODS-1999-DawsonVLS
- Minimal Data Upgrading to Prevent Inference and Association (SD, SDCdV, PL, PS), pp. 114–125.
- EDOC-1999-LauderK #component #legacy #named
- EventPorts: preventing legacy componentware (AL, SK), pp. 224–232.
- LOPSTR-1998-SmausHK #fault #logic programming #multi #source code #using
- Preventing Instantiation Errors and Loops for Logic Programs with Multiple Modes Using block Declarations (JGS, PMH, AK), pp. 289–307.
- HCI-CC-1997-PeperHS #assessment #how
- How to Use Applied Psychophysiology/Biofeedback in the Prevention and Assessment of Upper Extremity Musculoskeletal Disorders (EP, RH, DMS), pp. 551–554.
- ICML-1997-Ng
- Preventing “Overfitting” of Cross-Validation Data (AYN), pp. 245–253.
- ICSE-1997-LieberherrO #java #maintenance
- Preventive Program Maintenance in Demeter/Java (KJL, DO), pp. 604–605.
- TRI-Ada-1995-Sanden95b #concurrent #resource management
- Resource Sharing Deadlock Prevention (BS), pp. 70–103.
- ICDAR-1993-BackmutskyZ #detection #fault
- Some ergonomic improvements of text error detection and prevention in DTP-systems (VB, VZ), pp. 947–950.
- HCI-SHI-1993-MassonK #fault #process
- Preventing Human Errors in Skilled Activities Through a Computerized Support System (MM, VDK), pp. 802–807.
- SEKE-1993-Berztiss #safety
- Catastrophe Prevention in Safety-Critical Systems (ATB), pp. 102–108.
- ESEC-1993-Reichardt #re-engineering
- Preventative Software Engineering (JR), pp. 251–262.
- HPDC-1993-NakamuraT #network #performance #protocol
- Starvation-Prevented Priority-Based Total Ordering Broadcast Protocol on High-Speed Single Channel Network (AN, MT), pp. 281–288.
- VLDB-1985-CellaryM #database #distributed #infinity
- Locking with Prevention of Cyclic and Infinite Restarting in Distributed Database Systems (WC, TM), pp. 115–126.