The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for all

Publication years (Num. hits)
1953-1960 (28) 1961-1962 (26) 1963-1964 (27) 1965-1966 (25) 1967 (25) 1968 (23) 1969 (23) 1970-1972 (20) 1973 (28) 1974 (65) 1975 (46) 1976 (66) 1977 (49) 1978 (69) 1979 (61) 1980 (82) 1981 (62) 1982 (86) 1983 (98) 1984 (120) 1985 (190) 1986 (167) 1987 (299) 1988 (430) 1989 (457) 1990 (582) 1991 (413) 1992 (511) 1993 (563) 1994 (739) 1995 (991) 1996 (1007) 1997 (1276) 1998 (1394) 1999 (2138) 2000 (2675) 2001 (3359) 2002 (3938) 2003 (4721) 2004 (6381) 2005 (7644) 2006 (9041) 2007 (9376) 2008 (10903) 2009 (7437) 2010 (1338) 2011 (588) 2012 (575) 2013 (580) 2014 (691) 2015 (654) 2016 (395)
Publication types (Num. hits)
article(17806) book(18) incollection(2721) inproceedings(61890) phdthesis(15) proceedings(32)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 80488 occurrences of 18150 keywords

Results
Found 82491 publication records. Showing 82482 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Amir Masoud Gharehbaghi, Bijan Alizadeh, Masahiro Fujita Aggressive overclocking support using a novel timing error recovery technique on FPGAs (abstract only). Search on Bibsonomy FPGA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF overclocking, timing error detection, timing error recovery, fpga
1Jonathan M. Johnson, Michael J. Wirthlin Voter insertion algorithms for FPGA designs using triple modular redundancy. Search on Bibsonomy FPGA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF scc, tmr, voter insertion, fpga, algorithm, reliability, synchronization
1Husain Parvez, Zied Marrakchi, Habib Mehrez Heterogeneous-ASIF: an application specific inflexible FPGA using heterogeneous logic blocks (abstract only). Search on Bibsonomy FPGA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF asif, fpga, architecture, application specific, cad
1Andrés Lucero, Juha Arrasvuori PLEX Cards: a source of inspiration when designing for playfulness. Search on Bibsonomy Fun and Games The full citation details ... 2010 DBLP  DOI  BibTeX  RDF design methods, workshop, card, playfulness, inspiration
1Lisa op't Hof, Jente de Pee, Janienke Sturm, Tilde Bekker, Jos Verbeek Prolonged play with the ColorFlares: how does open-ended play behavior change over time? Search on Bibsonomy Fun and Games The full citation details ... 2010 DBLP  DOI  BibTeX  RDF design for children, interactive play objects, prolonged use, social interaction, open-ended play
1Pedro M. Martins, Julie A. McCann ajME: making game engines autonomic. Search on Bibsonomy Fun and Games The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software engineering, autonomic computing, self-adaptive, game engine, self-healing systems
1Ronald Kainda, Ivan Flechais, A. W. Roscoe Two heads are better than one: security and usability of device associations in group scenarios. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF device association, usability, security protocols, group interactions
1Sara Motiee, Kirstie Hawkey, Konstantin Beznosov Do windows users follow the principle of least privilege?: investigating user account control practices. Search on Bibsonomy SOUPS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF least privilege principle, least privilege user account, user account control, usable security
1Chengyu Song, Jianwei Zhuge, Xinhui Han, Zhiyuan Ye Preventing drive-by download via inter-module communication monitoring. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF inter-module communication, malicious script, intrusion detection, ActiveX, drive-by download
1Marco Balduzzi, Manuel Egele, Engin Kirda, Davide Balzarotti, Christopher Kruegel A solution for the automated detection of clickjacking attacks. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF ClickIDS, HTML IFRAME, browser plug-in, clickjacking, javascript, web security, CSS
1Mohammad Nauman, Sohail Khan, Xinwen Zhang Apex: extending Android permission model and enforcement with user-defined runtime constraints. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF policy framework, constraints, Android, mobile platforms
1Peter Matthews, Cliff Changchun Zou Scene tagging: image-based CAPTCHA using image composition and object relationships. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image/video recognition, multi-object composition, security, access control, CAPTCHA, HIP
1Guan Wang, Tongbo Luo, Michael T. Goodrich, Wenliang Du, Zutao Zhu Bureaucratic protocols for secure two-party sorting, selection, and permuting. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF bureaucratic protocols, oblivious algorithms, sorting, secure two-party computation
1Zutao Zhu, Wenliang Du K-anonymous association rule hiding. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF association rule hiding, k-anonymity
1Cheng-Kang Chu, Joseph K. Liu, Jianying Zhou, Feng Bao, Robert H. Deng Practical ID-based encryption for wireless sensor network. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF online/offline encryption, identity-based encryption, wireless sensor network security
1Tuan Manh Vu, Reihaneh Safavi-Naini, Carey Williamson Securing wireless sensor networks against large-scale node capture attacks. Search on Bibsonomy ASIACCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF resilience to node capture, key management, sensor network security, random key pre-distribution
1Peter M. van de Ven, Augustus J. E. M. Janssen, Johan van Leeuwaarden Optimal tradeoff between exposed and hidden nodes in large wireless networks. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF carrier-sensing range, exposed nodes, multi-access, wireless networks, throughput, markov processes, hidden nodes
1Vishal Misra, Stratis Ioannidis, Augustin Chaintreau, Laurent Massoulié Incentivizing peer-assisted services: a fluid shapley value approach. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF incentive mechanisms, cooperative game theory
1Niranjan Soundararajan, Anand Sivasubramaniam, Vijay Narayanan Characterizing the soft error vulnerability of multicores running multithreaded applications. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fit rate, multicore, soft errors
1Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Chang Optimal recovery of single disk failure in RDP code storage systems. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF RDP code, raid recovery, recovery algorithm, disk failure
Displaying result #41 - #60 of 82482 (20 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.