Font Size: a A A
Keyword [Violations]
Result: 21 - 37 | Page: 2 of 2
21. Optimization For The Off-site Of Traffic Violations Punishment System
22. Design And Implementation Of YingKou Port Hazard Identification System
23. Research On The Evolution Of Net-Mediated Public Sentiment Of Online Financial Violations Based On Text Analysis
24. Research On Efficient Layout Planning Scheme Based On Estimated Violations
25. Effective Detection of Atomic-Set Serializability Violations in Multithreaded Programs
26. Discovering neglected conditions in software by mining program dependence graphs
27. Combining static analysis and run -time analysis for verification and testing of multi-threaded programs
28. Scalable and flexible bulk architecture
29. Dynamic Analysis of Multithreaded Embedded Software to Expose Atomicity Violations
30. Detecting digital copyright violations on the Internet
31. Identifying Unethical Personally Identifiable Information (PII) Privacy Violations Committed by IS/IT Practitioners: A Comparison to Computing Moral Exemplars
32. Physical Design Methodologies for the More-than-Moore Er
33. A methodology for mending dynamic constraint violations in cyber physical systems by generating model transformations
34. Media use patterns, expectations, and violations: Extending media multiplexity theory to extended family communication
35. Assessing code decay by detecting software architecture violations
36. A Study On The Impact Of Media Attention On The Violations Of Listed Companies
37. Research On Identification Of Illegal Business Behaviors Based On Mask R-CNN
  <<First  <Prev  Next>  Last>>  Jump to