
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 53 matches
- 2020
- Marc Eisenstadt, Manoharan Ramachandran, Niaz Chowdhury, Allan Third, John Domingue:
COVID-19 Antibody Test Certification: There's an app for that. CoRR abs/2004.07376 (2020) - 2019
- Haider Al-kanan
, Xianzhen Yang, Fu Li:
Saleh Model and Digital Predistortion for Power Amplifiers in Wireless Communications Using the Third-Order Intercept Point. J. Electron. Test. 35(3): 359-365 (2019) - 2017
- Chenguo Zhang:
Introducing the Open Clause to improve copyright flexibility in cyberspace? Analysis and commentary on the proposed "two-step test" in the Third Amendment to the Copyright Law of the PRC, in comparison with the EU and the US. Comput. Law Secur. Rev. 33(1): 73-86 (2017) - Yoshihide Kakizawa:
Third-order average local powers of Bartlett-type adjusted tests: Ordinary versus adjusted profile likelihood. J. Multivar. Anal. 153: 98-120 (2017) - Peter Z. Stockburger:
Control and capabilities test: Toward a new lex specialis governing state responsibility for third party cyber incidents. CyCon 2017: 1-14 - Lars Wienbrandt, Jan Christian Kässens
, Matthias Hübenthal
, David Ellinghaus:
Fast Genome-Wide Third-order SNP Interaction Tests with Information Gain on a Low-cost Heterogeneous Parallel FPGA-GPU Computing Architecture. ICCS 2017: 596-605 - 2016
- Jinfu Chen, Jiamei Chen, Rubing Huang
, Yuchi Guo, Yongzhao Zhan:
An approach of security testing for third-party component based on state mutation. Secur. Commun. Networks 9(15): 2827-2842 (2016) - Frank Kettler, Silvia Poschen, Radi Serafimov:
Design of Double Talk Sequences in Different Languages to Harmonize Third Party Listening Test Results. ITG Symposium on Speech Communication 2016: 1-5 - W. Scott Sanders, Gopi Chand Nutakki, Olfa Nasraoui:
Testing the Application of Warranting Theory to Online Third Party Marketplaces: The Effects of Information Uniqueness and Product Type. SMSociety 2016: 16:1-16:7 - 2015
- Yoshihide Kakizawa:
Third-order local power properties of tests for a composite hypothesis, II. J. Multivar. Anal. 140: 99-112 (2015) - Stephen M. Plaza, Igor L. Markov:
Solving the Third-Shift Problem in IC Piracy With Test-Aware Logic Locking. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 34(6): 961-971 (2015) - Annibale Panichella, Fitsum Meshesha Kifetew
, Paolo Tonella:
Results for EvoSuite - MOSA at the Third Unit Testing Tool Competition. SBST@ICSE 2015: 28-31 - I. S. W. B. Prasetya:
T3: Benchmarking at Third Unit Testing Tool Contest. SBST@ICSE 2015: 44-47 - Abdelilah Sakti, Gilles Pesant, Yann-Gaël Guéhéneuc:
JTExpert at the Third Unit Testing Tool Competition. SBST@ICSE 2015: 52-55 - Fredrik Seehusen, Michael Felderer, Jürgen Großmann, Marc-Florian Wendland:
Risk Assessment and Risk-Driven Testing - Third International Workshop, RISK 2015, Berlin, Germany, June 15, 2015. Revised Selected Papers. Lecture Notes in Computer Science 9488, Springer 2015, ISBN 978-3-319-26415-8 [contents] - 2014
- Andrew Cenkner, Vadim Bulitko, Marcia Spetch, Eric Legge
, Craig G. Anderson, Matthew R. Brown:
Passing a Hide-and-Seek Third-Person Turing Test. IEEE Trans. Comput. Intell. AI Games 6(1): 18-30 (2014) - Macario Polo:
Using Aspect-Oriented Programming for mutation testing of third-party components. CIbSE 2014: 247-261 - Arti D. Yardi, Animesh Kumar, Saravanan Vijayakumaran
:
Channel-code detection by a third-party receiver via the likelihood ratio test. ISIT 2014: 1051-1055 - Ravi Bhoraskar, Seungyeop Han, Jinseong Jeon, Tanzirul Azim, Shuo Chen, Jaeyeon Jung, Suman Nath, Rui Wang, David Wetherall:
Brahmastra: Driving Apps to Test the Security of Third-Party Components. USENIX Security Symposium 2014: 1021-1036 - 2013
- Adam Waksman, Simha Sethumadhavan, Julianna Eum:
Practical, Lightweight Secure Inclusion of Third-Party Intellectual Property. IEEE Des. Test 30(2): 8-16 (2013) - Yoshihide Kakizawa:
Third-order local power properties of tests for a composite hypothesis. J. Multivar. Anal. 114: 303-317 (2013) - 2012
- Jiaping Zuo, Pei Ren, Hao Kong:
A Measurement Model for Trustworthiness of Information System Based on Third-Party Testing Data. ISCTCS 2012: 45-51 - 2011
- Hwan Il Kang, Min Woo Kwon, Hwan Gil Bae:
Development of Third Order Particle Swarm Optimization and Verification of its Performance with Various Test Functions. CSE 2011: 207-211 - Maximillian Gonzalez, Xinheng Huang, David S. Hermina Martinez, Chung H. Hsieh, Yuan Rick Huang, Benjamin Irvine, Martin B. Short, Andrea L. Bertozzi:
A Third Generation Micro-vehicle Testbed for Cooperative Control and Sensing Strategies. ICINCO (2) 2011: 14-20 - 2010
- Jianshu Weng
, Zhiqi Shen, Chunyan Miao
, Angela Eck Soong Goh, Cyril Leung:
Credibility: How Agents Can Handle Unfair Third-Party Testimonies in Computational Trust Models. IEEE Trans. Knowl. Data Eng. 22(9): 1286-1298 (2010) - Hwan Il Kang, Min Woo Kwon, Hwan Gil Bae:
A new third order particle swarm optimization and applications to test various functions. HIS 2010: 171-174 - Third International Conference on Software Testing, Verification and Validation, ICST 2010, Paris, France, April 7-9, 2010. IEEE Computer Society 2010, ISBN 978-0-7695-3990-4 [contents]
- Third International Conference on Software Testing, Verification and Validation, ICST 2010, Paris, France, April 7-9, 2010, Workshops Proceedings. IEEE Computer Society 2010, ISBN 978-0-7695-4050-4 [contents]
- Shivnath Babu, G. N. Paulley:
Proceedings of the Third International Workshop on Testing Database Systems, DBTest 2010, Indianapolis, Indiana, USA, June 7, 2010. ACM 2010, ISBN 978-1-4503-0190-9 [contents] - 2009
- Hong Zhu, Fevzi Belli:
Advancing test automation technology to meet the challenges of model-based software testing - Guest editors' introduction to the special section of the Third IEEE International Workshop on Automation of Software Test (AST 2008). Inf. Softw. Technol. 51(11): 1485-1486 (2009)
skipping 23 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-01-21 07:43 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint