-
PRPL: A Database Workload Specification Language, v1.3.
https://dblp.l3s.de/d2r/resource/publications/ms/Brown92
-
Regelbasierte Extraktion und asymmetrische Fusion bibliographischer Informationen.
https://dblp.l3s.de/d2r/resource/publications/ms/Hoffmann2008
-
Who's Who in the World Wide Web: Approaches to Name Disambiguation
https://dblp.l3s.de/d2r/resource/publications/ms/Klaas2007
-
Der Einfluss kleiner naturnaher Retentionsma√ünahmen in der Fl√§che auf den Hochwasserabfluss - Kleinr√ľckhaltebecken -.
https://dblp.l3s.de/d2r/resource/publications/ms/Ley2006
-
Portierung des DBLP-Systems auf ein relationales Datenbanksystem und Evaluation der Performance.
https://dblp.l3s.de/d2r/resource/publications/ms/Vollmer2006
-
Efficient View Maintenance at Data Warehouses.
https://dblp.l3s.de/d2r/resource/publications/ms/Yurek97
-
Analysis of projected hydrological behavior of catchments based on signature indices
https://dblp.l3s.de/d2r/resource/publications/persons/CasperGGGHLR12
-
Derivability, Redundancy and Consistency of Relations Stored in Large Data Banks.
https://dblp.l3s.de/d2r/resource/publications/persons/Codd69
-
Data Base Sublanguage Founded on the Relational Calculus.
https://dblp.l3s.de/d2r/resource/publications/persons/Codd71
-
Further Normalization of the Data Base Relational Model.
https://dblp.l3s.de/d2r/resource/publications/persons/Codd71a
-
Normalized Data Base Structure: A Brief Tutorial.
https://dblp.l3s.de/d2r/resource/publications/persons/Codd71b
-
Relational Completeness of Data Base Sublanguages.
https://dblp.l3s.de/d2r/resource/publications/persons/Codd72
-
Seven Steps to Rendezvous with the Casual User. (IBM Research Report RJ 1333, San Jose, California)
https://dblp.l3s.de/d2r/resource/publications/persons/Codd74
-
The Capabilities of Relational Database Management Systems.
https://dblp.l3s.de/d2r/resource/publications/persons/Codd81
-
Interactive Support for Non-Programmers: The Relational and Network Approaches.
https://dblp.l3s.de/d2r/resource/publications/persons/CoddD74
-
Common Subexpression Identification in General Algebraic Systems.
https://dblp.l3s.de/d2r/resource/publications/persons/Hall74
-
ACM SIGMOD Contribution Award 2003 Acceptance Speech
https://dblp.l3s.de/d2r/resource/publications/persons/Ley2003
-
DBLP.uni-trier.de: Computer Science Bibliography
https://dblp.l3s.de/d2r/resource/publications/persons/Ley93
-
DB&LP: A WWW Bibliography on Databases and Logic Programming
https://dblp.l3s.de/d2r/resource/publications/persons/Ley95
-
Catchment classification by runoff behaviour with self-organizing maps (SOM)
https://dblp.l3s.de/d2r/resource/publications/persons/LeyCHM11
-
Lions' Commentary on UNIX 6th Edition, with Source Code
https://dblp.l3s.de/d2r/resource/publications/persons/Lions1996
-
Principles of Distributed Object Database Languages.
https://dblp.l3s.de/d2r/resource/publications/persons/Tresch96
-
Encyclopedia of Artificial Intelligence (3 Volumes)
https://dblp.l3s.de/d2r/resource/publications/reference/ai/2009
-
Protein Structure Prediction by Fusion, Bayesian Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/AkkaladeviKL09
-
Privacy-Preserving Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Al-AhmadiS09
-
Artificial Intelligence in Computer-Aided A Diagnosis.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Ambrosio09
-
Rough Set-Based Neuro-Fuzzy System.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/AngQ09
-
Support Vector Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/AnguloA09
-
Configuration.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/AnselmaM09
-
Synthetic Neuron Implementations.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Aunet09
-
Statistical Simulations on Perceptron-Based Adders.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/AunetB09
-
Evolutionary Approaches for ANNs Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/AzziniT09
-
Planning Agent for Geriatric Residences.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BajoTRC09
-
Constraint Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Bartak09
-
Evolutionary Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BecerraD09
-
Bio-Inspired Dynamical Tools for Analyzing Cognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BediaCC09
-
Device-Level Majority von Neumann Multiplexing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BeiuIL09
-
Stationary Density of Stochastic Search Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BerronesPS09
-
Fuzzy Graphs and Fuzzy Hypergraphs.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BershteinB09
-
The Dempster-Shafer Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Beynon09
-
Fuzzy Decision Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Beynon09a
-
Algorithms for Association Rule Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BhatnagarGK09
-
Association Rule Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BhatnagarK09
-
Ensemble of SVM Classifiers for Spam Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BlancoM09
-
Neural Networks on Handwritten Signature Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BonillaF09
-
NLP Techniques in Intelligent Tutoring Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BoonthumLMMM09
-
Kohonen Maps and TS Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Boyer-XambeuDGG09
-
Differential Evolution with Self-Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Brest09
-
Intelligent Traffic Sign Classifiers.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BuenoGGRG09
-
Intelligent Radar Detectors.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/BuenoRAGM09
-
Different Approaches for Cooperation with Metaheuristics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CadenasGMCPV09
-
Particle Swarm Optimization and Image Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CagnoniM09
-
HOPS.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CagnoniMMA09
-
Hybrid Dual Camera Vision Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CagnoniMMA09a
-
Dependency Parsing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Cakici09
-
Knowledge Management Tools and Their Desirable Characteristics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CasalGSS09
-
MREM, Discrete Recurrent Network for Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CasermeiroLO09
-
Behaviour-Based Clustering of Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Castro-BledaBZ09
-
Learning-Based Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CelorrioT09
-
Fuzzy Control Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ChenJ09
-
Interactive Systems and Sources of Uncertainties.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ChenW09
-
Managing Uncertainties in Interactive Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ChenW09a
-
Teaching Machines to Find Names.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Chiong09
-
Morphological Filtering Principles.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Crespo09
-
Multi-Objective Training of Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/CuellarDJ09
-
Neural Networks and Equilibria, Synchronization, and Time Lags.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DanciuR09
-
Decision Making in Intelligent Agents.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DanielsonE09
-
Nelder-Mead Evolutionary Hybrid Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Das09
-
Multi-Objective Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DasP09
-
Emerging Applications in Immersive Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DavisC09
-
Growing Self-Organizing Maps for Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DelgadoGMA09
-
Genetic Algorithm Applications to Optimization Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Deng09
-
A Study of the Performance Effect of Genetic Operators.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Deng09a
-
Component Analysis in Artificial Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Deniz-SuarezG09
-
Hierarchical Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DiukL09
-
AI Methods for Analyzing Microarray Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DjebbariCAQ09
-
Facial Expression Recognition for HCI Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/DornaikaR09
-
Symbolic Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Edelkamp09
-
Disk-Based Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/EdelkampJ09
-
Commonsense Knowledge Representation I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Ein-Dor09
-
Commonsense Knowledge Representation II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Ein-Dor09a
-
Conditional Hazard Estimating Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/EleuteriTDDC09
-
Web-Based Assessment System Applying Many-Valued Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/EnchevaT09
-
Natural Language Processing and Biological Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/EnguixJ09
-
Information Theoretic Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Erdogmusr09
-
Adaptive Neuro-Fuzzy Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/EsmahiWB09
-
Improving the Na√Įve Bayes Classifier.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FanP09
-
Biometric Security Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Faundez-Zanuy09
-
Computer Morphogenesis in Self-Organizing Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Fernandez-BlancoC09
-
Gene Regulation Network Use for Information Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Fernandez-BlancoS09
-
Advanced Cellular Neural Networks Image A Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Fernandez09
-
Basic Cellular Neural Networks Image Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Fernandez09a
-
Bio-Inspired Algorithms in Bioinformatics I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FernandezR09
-
Bio-Inspired Algorithms in Bioinformatics II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FernandezR09a
-
Blind Source Separation by ICA.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FerrerS09
-
Workflow Management Based on Mobile Agent Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Flores-BadilloL09
-
A Roadmap on Updates.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FloresFCM09
-
Signed Formulae as a New Update Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FloresFCM09a
-
Functional Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Fontenla-RomeroGP09
-
GTM User Modeling for aIGA Weight Tuning in TTS Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FormigaA09
-
AVI of Surface Flaws on Manufactures I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FornarelliG09
-
AVI of Surface Flaws on Manufactures II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/FornarelliG09a
-
Neural Control System for Autonomous Vehicles.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Garcia-CordovaGM09
-
A Hybrid System for Automatic Infant Cry Recognition II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GarciaBTR09
-
Energy Minimizing Active Models in Artificial Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GarciaMGT09
-
A Hybrid System for Automatic Infant Cry Recognition I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GarciaZBR09
-
Knowledge Management Systems Procedural Development.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GardaYSS09
-
Learning Nash Equilibria in Non-Cooperative Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Garro09
-
Adaptive Algorithms for Intelligent Geometric A Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Gavrilova09
-
Harmony Search for Multiple Dam Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Geem09
-
Handling Fuzzy Similarity for Data Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GelbardM09
-
Evolutionary Approaches to Variable Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GestalA09
-
Finding Multiple Solutions with GA in Multimodal Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GestalG09
-
Microarray Information and Data Integration Using SAMIDI.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GomezPMG09
-
Fuzzy Approximation of DES State.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Gonzalez-CastoloL09
-
Non-Cooperative Facial Biometric Identification Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GonzalezM09
-
State of the Art in Writer's Off-Line Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GonzalezR09
-
Automated Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GrosekZ09
-
Automated Cryptanalysis of Classical Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GrosekZ09a
-
Multilogistic Regression by Product Units.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/GutierrezHMC09
-
Mobile Robots Navigation, Mapping, and Localization Part I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/HeeA09
-
Mobile Robots Navigation, Mapping, and Localization Part II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/HeeA09a
-
Chaotic Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Hernandez09
-
Nonlinear Techniques for Signals Characterization.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/HernandezR09
-
Speech-Based Clinical Diagnostic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/HernandezR09a
-
A New Self-Organizing Map for Dissimilarity Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Ho-PhuocG09
-
Solar Radiation Forecasting Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/HocaogluGK09
-
Continuous ACO in a SVR Traffic Forecasting Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Hong09
-
Knowledge-Based Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Hopgood09
-
Ranking Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Huber09
-
Genetic Fuzzy Systems Applied to Ports and Coasts Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/IbanezC09
-
Computer Vision for Wave Flume Experiments.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/IbanezD09
-
AI and Ideas by Statistical Mechanics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Ingber09
-
Evolved Synthesis of Digital Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/IonescuMSS09
-
CNS Tumor Prediction Using Gene Expression Data Part I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/IslamIGR09
-
CNS Tumor Prediction Using Gene Expression Data Part II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/IslamIGR09a
-
High Level Design Approach for FPGA Implementation of ANNs.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/IzeboudjenFBBC09
-
Intelligent Software Agents with Applications in Focus.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Jankovic-RomanoSK09
-
Active Learning with SVM.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/JiangI09
-
Fuzzy Systems Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/JooC09
-
Neural/Fuzzy Computing Based on Lattice Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Kaburlasos09
-
Functional Dimension Reduction for Chemometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/KarnaL09
-
Voltage Instability Detection Using Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/KhashmanBJ09
-
Genetic Algorithms for Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Kleinschmidt09
-
Fuzzy Rule Interpolation.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Kovacs09
-
Multi-Layered Semantic Data Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/KovacsS09
-
Full-Text Search Engines for Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/KovacsT09
-
Complex Systems Modeling by Cellular Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/KrocS09
-
Ontologies for Education and Learning Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LamaS09
-
EA Multi-Model Selection for SVM.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LebrunLCC09
-
Decision Tree Applications for Data Modelling.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LeeCCL09
-
Distributed Representation of Compositional Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Levy09
-
Stochastic Approximation Monte Carlo for MLP Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Liang09
-
Cluster Analysis of Gene Expression Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LiewLY09
-
Ensemble of ANN for Traffic Sign Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LorenteASEM09
-
Symbol Grounding Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LoulaQ09
-
RBF Networks for Power System Topology Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LukomskiW09
-
Developmental Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LungarellaG09
-
Intelligent Software Agents Analysis in E-Commerce I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LuoA09
-
Intelligent Software Agents Analysis in E-Commerce II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/LuoA09a
-
Hybrid Meta-Heuristics Based System for Dynamic Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Madureira09
-
Artificial Intelligence for Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Mandl09
-
Grammar-Guided Genetic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ManriqueRR09
-
Intelligent MAS in System Engineering and Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/MarichalG09
-
An AI Walk from Pharmacokinetics to A Marketing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Martin-GuerreroSLS09
-
A Comparison of Cooling Schedules for Simulated Annealing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/MartinS09
-
Stream Processing of a Neural Classifier I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Martinez-ZarzuelaPOHA09
-
Stream Processing of a Neural Classifier II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Martinez-ZarzuelaPOHA09a
-
Fuzzy Logic Applied to Biomedical Image Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/MartinezV09
-
A 2D Positioning Application in PET Using ANNs.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/MateoAMMG09
-
Statistical Modelling of Highly Inflective Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/MaucecK09
-
2D-PAGE Analysis Using Evolutionary Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/MesejoFMB09
-
Adaptive Business Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Michalewicz09
-
Designing Unsupervised Hierarchical Fuzzy Logic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Mohammadian09
-
Supervised Learning of Fuzzy Logic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Mohammadian09a
-
Feed-Forward Artificial Neural Network Basics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Munoz09
-
Learning in Feed-Forward Artificial Neural Networks I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Munoz09a
-
Learning in Feed-Forward Artificial Neural Networks II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Munoz09b
-
Adaptive Neural Algorithms for PCA and ICA.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Mutihac09
-
Bayesian Neural Networks for Image Restoration.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Mutihac09a
-
Mathematical Modeling of Artificial Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Mutihac09b
-
Evolutionary Computing Approach for Ad-Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/NarulaMD09
-
Swarm Intelligence Approach for Ad-Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/NarulaMD09a
-
Adaptive Technology and Its Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Neto09
-
Complex-Valued Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Nitta09
-
Angiographic Images Segmentation Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/NovoaCLM09
-
Fuzzy Logic Estimator for Variant SNR Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PagesSC09
-
A Survey on Neural Networks in Automated Negotiations.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PapaioannouRA09
-
Artificial NeuroGlial Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PazosGP09
-
E-Learning in New Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PedreiraSC09
-
Sequence Processing with Recurrent Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PengM09
-
EC Techniques in the Structural Concrete Field.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PerezGA09
-
ANN Application in the Field of Structural Concrete.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PerezMH09
-
Class Prediction in Test Sets with Shifted Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PerezS09
-
A Robot Model of Dynamic Appraisal and Response.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PerezZM09
-
Neural Network-Based Process Analysis in Sport.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Perl09
-
Granular Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Peters09
-
Computational Methods in Biomedical Imaging.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Piana09
-
Many-Objective Evolutionary Optimisation.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PierroKS09
-
Rule Engines and Agent-Based Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PoggiT09
-
Wave Reflection at Submerged Breakwaters.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/PonteIPC09
-
Ambient Intelligence Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Ramos09
-
A Comparative Study on E-Note-Taking.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RashidR09
-
Ontologies and Processing Patterns for Microarrays.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RicoFC09
-
Evolving Graphs for ANN Development and Simplification.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RiveroP09
-
ANN Development with EC Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RiveroR09
-
Evolutionary Grammatical Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RodriguesL09
-
Representing Non-Rigid Objects with Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RodriguezFC09
-
Artificial Intelligence and Rubble-Mound Breakwater Stability.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RodriguezPSR09
-
Incorporating Fuzzy Logic in Data Mining Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Rokach09
-
Optimization of the Acoustic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Romero-GarciaFSRBHS09
-
Neural Network-Based Visual Data Mining for Cancer Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RomeroVB09
-
Ontology Alignment Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RomeroVLE09
-
Neural Networks and HOS for Power Quality Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RosaPM09
-
Shortening Automated Negotiation Threads via Neural Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RoussakiPA09
-
A Longitudinal Analysis of Labour Market Data with SOM.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RoussetG09
-
Analytics for Noisy Unstructured Text Data I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RoyS09
-
Natural Language Understanding and Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/RusMMG09
-
Robust Learning Algorithm with LTS Error Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Rusiecki09
-
Ambient Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SadriS09
-
Automatic Classification of Impact-Echo Spectra I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SalazarS09
-
Automatic Classification of Impact-Echo Spectra II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SalazarS09a
-
Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Sanchez-MaronoA09
-
Artificial Intelligence and Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SanchezL09
-
Emulating Subjective Criteria in Corpus Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SanzPASM09
-
Prototype Based Classification in Bioinformatics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SchleifVH09
-
IA Algorithm Acceleration Using GPUs.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SeoaneJ09
-
Personalized Decision Support Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Shambaugh09
-
Artificial Neural Networks and Cognitive A Modelling.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Sharkey09
-
Swarm Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Sharkey09a
-
Modal Logics for Reasoning about Multiagent Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ShilovG09
-
Distributed Constraint Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SilaghiY09
-
Multilayer Optimization Approach for Fuzzy Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SilvaF09
-
Clustering Algorithm for Arbitrary Data Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SongM09
-
Discovering Mappings Between Ontologies.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SorathiaM09
-
Analytics for Noisy Unstructured Text A Data II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SubramaniamR09
-
Evolutionary Algorithms in Discredibility Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/SulcK09
-
Navigation by Image-Based Visual Homing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Szenher09
-
Agent-Based Intelligent System Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/TangHB09
-
Modularity in Artificial Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/TellezA09
-
Intelligent Query Answering Mechanism in Multi Agent Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/TurgayY09
-
Visualizing Cancer Databases Using Hybrid Spaces.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ValdesB09
-
Intelligent Classifier for Atrial Fibrillation (ECG).
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ValenzuelaRRGHRC09
-
Ontology Alignment Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Vazquez-NayaRLS09
-
Bioinspired Associative Memories.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/VazquezS09
-
Hierarchical Neuro-Fuzzy Systems Part I.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/VellascoPFS09
-
Hierarchical Neuro-Fuzzy Systems Part II.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/VellascoPFS09a
-
Intuitionistic Fuzzy Image Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/VlachosS09
-
ANN-Based Defects' Diagnosis of Industrial A Optical Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/VoiryABM09
-
Data Mining Fundamental Concepts and Critical Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/WangCY09
-
Thermal Design of Gas-Fired Cooktop Burners Through ANN.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/WongL09
-
Independent Subspaces.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Xu09
-
Combining Classifiers and Learning Mixture-of-Experts.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/XuA09
-
Randomized Hough Transform.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/XuO09
-
State-of-the-Art on Video-Based Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/YanZ09
-
Data Warehousing Development and Design Methodologies.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/YaoW09
-
Robots in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Yousuf09
-
"Narrative" Information and the NKRL Solution.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Zarri09
-
"Narrative" Information Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/Zarri09a
-
Mapping Ontologies by Utilising Their Semantic Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/ai/ZhaoH09
-
Handbook of Ambient Assisted Living - Technology for Healthcare, Rehabilitation and Well-being
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/2012
-
Medical Information Management with ECG Biometrics: A Secure and Effective Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/AgrafiotiBH12
-
Smart Homes as a Vehicle for AAL.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Augusto12
-
Introduction to Section on Future Developments and Visions for the AAL Area.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/AugustoM12
-
SmartSenior - Intelligent Services for Senior Citizens.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/BalaschSCJHPEKKHWHSGJSMLBZMBFSKWBKM12
-
The Role of Assistive Technology in Supporting Formal Carers.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/BhachuHW12
-
Growing Older Together: When a Robot Becomes the Best Ally for Ageing Well.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/CavallaroMGRRG12
-
Home-Based Computer Vision Access Technologies for Individuals with Severe Motor Impairments.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/ChauMLTHWLP12
-
Sensor Selection to Support Practical Use of Health-Monitoring Smart Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/CookH12
-
ICT Infrastructures for Telerehabilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/DeitersKKM12
-
Happy Healthy Home.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/DoJ12
-
Utilization of Cloud Infrastructures for Pervasive Healthcare Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/DoukasPM12
-
LiKeIT - RFID-Based KeepInTouch Lifestyle Monitoring.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/DrobicsDGS12
-
Biometric Monitoring of Behaviour.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/DrosouT12
-
AAL Technologies in Rehabilitation - Lessons Learned from a COPD Case Study.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/FarshchianHMR12
-
Monitoring Patterns of Inactivity in the Home with Domotics Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/FloeckLS12
-
Face Recognition in Ambient Intelligence Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/FrancoMM12
-
Smart Home Technologies for People with Cognitive Impairment: An Affordable, Rehabilitative Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Gentry12
-
Gait Profile - A Biometric that Defines Our Mobility.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Hodgins12
-
Preparation and Start-Up Phase of the European AAL Joint Programme.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Huch12
-
Innovative Rehabilitation Technologies for Home Environments - An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/JohnKS12
-
Tracking Natural Human Movements Identifies Differences in Cognition and Health.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/KearnsF12
-
Telehealthcare Development & Effectiveness in Taiwan.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/LaiT12
-
Study on Future Trend of the Elderly Care from the Aspect of Assistive Technology Rental System in Japan.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/LeeH12
-
Beyond System Integration: Who, What, How, and When.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/LhotskaDCHBH12
-
The National Health Service in England - Moving to Mainstream Use of Ambient Assisted Living Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/MacGinnis12
-
Managing Chronic Conditions Using Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Marin-PerianuGBMH12
-
Delivering Technology Enriched Health and Social Care: Policy Context for User Focused Research.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/MartinM12
-
Devices and Infrastructure to Facilitate AAL.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/McCullagh12
-
New Ambient Assistive Technologies: The Users' Perspectives.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Mestheneos12
-
AAL Markets - Knowing Them, Reaching Them. Evidence from European Research.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/MeyerMK12
-
Ambient Assisted Living Technology to Support Older Adults with Dementia with Activities of Daily Living: Key Concepts and the State of the Art.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/MihailidisBCJH12
-
Biometrics in Healthcare - A Research Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Modi12
-
AAL in Cardiac Rehabilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/MullerLEHBWH12
-
Designing Ambient and Personalised Displays to Encourage Healthier Lifestyles.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/NakajimaK12
-
Electronic-Early Warning Scorecard: An Intelligent Context Aware Decision Making Approach for Patient Monitoring.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/OKaneOGACC12
-
R&D Projects Related to AAL in TECNALIA's Health Technologies Unit.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/ObachBLMAIMRP12
-
Supporting Wellbeing Through Improving Interactions and Understanding in Self-Monitoring Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/PavelCD12
-
Connecting Communities: The Role of Design Ethnography in Developing Social Care Technologies for Isolated Older Adults.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/PrendergastSW12
-
AAL in the Health Space - A Reflection.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Roberts12
-
Social Spaces for Reseach and Innovation (SSRI): Users Leading Research and Innovation in Ambient Assisted Living.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/RoblesGBOM12
-
Smart Living Environment: Ubiquitous Computing Approach Based on TRON Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Sakamura12
-
Gerontological Perspectives on Ambient Assisted Living.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Sixsmith12
-
Adaptive Neck Support for Wellbeing During Air Travel.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/TanCR12
-
The universAAL Reference Model for AAL.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/TazariFFHHKMWW12
-
Assisted Ambient Living Applied to Remote Motor Rehabilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/WadeP12
-
Introduction to Section on AAL for Rehabilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Wichert12
-
In-Home Monitoring Technologies: Perspectives and Priorities of Older Adults.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/WildB12
-
Housing, Gerontology and AAL: New Services Development.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/YanguasU12
-
Using Human Factors to Guide the Design and Implementation of Consumer Health Informatics Interventions.
https://dblp.l3s.de/d2r/resource/publications/reference/assisted/Zayas-CabanM12
-
Springer Handbook of Automation
https://dblp.l3s.de/d2r/resource/publications/reference/auto/2009
-
Collaborative Analytics for Astrophysics Explorations.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Aragon09
-
Automating Information and Technology Services.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Balasubramanian09
-
Virtual Reality and Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Banerjee09
-
Teleoperation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/BasanezS09
-
Computer-Aided Design, Computer-Aided Engineering, and Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/BertolineHA09
-
A History of Automatic Control.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Bissell09
-
Automation in Food Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/CaldwellDMG09
-
Flexible and Precision Assembly.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Carlisle09
-
Construction Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Castro-Lacouture09
-
Economic Rationalization of Automation Projects.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Ceroni09
-
Design Automation for Microelectronics.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Chen09
-
Automating Errors and Conflicts Prognostics and Prevention.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/ChenN09
-
Material Handling Automation in Production and Warehouse Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/ChungT09
-
Collaborative Human-Automation Decision Making.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/CummingsB09
-
Real-Time Autonomic Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Dannegger09
-
Machining Lines Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/DelormeDELP09
-
Impacts of Automation on Precision.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/DonmezS09
-
Automation in Agriculture.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/EdanHK09
-
Process Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/EdgarH09
-
Cleaning Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/ElkmannHF09
-
Quality of Service (QoS) of Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Erbe09
-
Large-Scale Complex Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/FilipL09
-
Evolutionary Techniques for Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/GenL09
-
Service Robots and Automation for the Disabled/Limited.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/GrafS09
-
Advances in Robotics and Automation: Historical Perspectives.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Hasegawa09
-
Automation Under Service-Oriented Grids.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/HeC09
-
e-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/HolsappleS09
-
Securing Electrical Power System Operation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Horacek09
-
Medical Informatics.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Huang09
-
Industrial Intelligent Robots.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/InabaS09
-
Nanoelectronic-Based Detection for Biology and Medicine.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/IqbalB09
-
Mechatronic Systems - A Short Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Isermann09
-
Automation in Education/Learning Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/IshiiT09
-
Control Theory for Automation: Fundamentals.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Isidori09
-
Control System for Automated Feed Plant.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Ivanescu09
-
Sensors and Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Jeong09
-
Automation and Robotics in Mining and Mineral Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/JounelaB09
-
Library Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Kaplan09
-
Product Lifecycle Management and Embedded Information Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Kiritsis09
-
Automation in Sports and Entertainment.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Kopacek09
-
Communication in Automation, Including Networking and Wireless.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/KottenstetteA09
-
Flight Deck Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Landry09
-
Semiconductor Manufacturing Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Lee09
-
Digital Manufacturing and RFID-Based Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/LeeCK09
-
Human Factors in Automation Design.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/LeeS09
-
Safety Warnings for Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/LehtoLH09
-
Control of Uncertain Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/LianZ09
-
Automation in Home Appliances.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Lui09
-
Practical Automation Specification.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Mann09
-
Distributed Agent Software for Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/MaturanaCH09
-
Automatic Control in Systems Biology.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/MirskySGBTKSD09
-
Air Transportation System Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/MohlejiLM09
-
Reliability, Maintainability, and Safety.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/MorelPJ09
-
Vehicle and Road Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Nakanishi09
-
Artificial Intelligence and Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Nau09
-
Automation: What It Means to Us Around the World.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Nof09
-
Automation of Mobility and Navigation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/OlleroC09
-
Cybernetics and Learning Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/OommenM09
-
Production, Supply, Logistics and Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/PalmaB09
-
Automation and Control in Biomedical Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Parker09
-
Modeling and Software for Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/PasettiS09
-
Welding Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Pashkevich09
-
Education and Qualification for Control and Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Pasik-DuncanV09
-
Software Management.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/PattonJ09
-
What Can Be Automated? What Cannot Be Automated?.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/PattonP09
-
Industrial Communication Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/PereiraN09
-
Product Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Pinnekamp09
-
Service Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Pinnekamp09a
-
Decision Support Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/PowerS09
-
Automation and Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/RamaswamyJ09
-
Economic Aspects of Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/RavazziV09
-
The Human Role in Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/ReppergerP09
-
Automation in Financial Services.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Richmond09
-
e-Government.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/RombachS09
-
The Smart Building.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Salsbury09
-
Aircraft Manufacturing and Assembly.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/SarhBMB09
-
Automation in Hospitals and Healthcare.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Savage09
-
Machine Tool Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/ShiraseF09
-
Rotary Heart Assist Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Simaan09
-
Integrated Human and Automation Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/SpathBB09
-
Trends in Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/TerwieschG09
-
Computer and Robot-Assisted Medical Intervention.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Troccaz09
-
Space and Exploration Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Tunstel09
-
Control Theory for Automation - Advanced Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/VajkHB09
-
Social, Organizational, and Individual Impacts of Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Vamos09
-
Automating Serious Games.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/VastagY09
-
Automation Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/VelasquezCYK09
-
Collaborative e-Work, e-Business, and e-Service.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/VelasquezN09
-
Enterprise Integration and Interoperability.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Vernadat09
-
Automation in the Wood and Paper Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Vogel-Heuser09
-
Business Process Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/WatsonH09
-
Advances in Industrial Automation: Historical Perspectives.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/Williams09
-
Medical Automation and Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/WolfS09
-
Nanomanufacturing Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/auto/XiLC09
-
Database Consistency Models.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/0001S19
-
Big Data Warehouses for Smart Industries.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/0002AS19
-
Graph Partitioning: Formulations and Applications to Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/0003S19
-
Scalable Architectures for Big Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/0006W19
-
Encyclopedia of Big Data Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/2019
-
Data Profiling.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Abedjan19
-
Federated RDF Query Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/AcostaHS19
-
Languages for Big Data analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/AldinucciDMT19
-
Scala.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Alexandrov19
-
Graph Benchmarking.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Ammar19
-
Graph Query Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/AnglesRV19
-
Cheap Data Analytics on Cold Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Appuswamy19
-
Graph Path Navigation.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ArenasBL19
-
Process Model Repair.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Armas-Cervantes19
-
Spatial Data Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BalasubramaniC19
-
Exploring Scope of Computational Intelligence in IoT Security Paradigm.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BanerjeeBM19
-
Wildfire: HTAP for Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BarberRSTT19
-
Scalable Big Data Privacy with MapReduce.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BazaiJZ19
-
Workflow Systems for Big Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BelcastroM19
-
Online Machine Learning Algorithms over Data Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BenczurKP19
-
Online Machine Learning in Big Data Streams: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BenczurKP19a
-
Recommender Systems Over Data Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BenczurKP19b
-
Reinforcement Learning, Unsupervised Methods, and Concept Drift in Stream Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BenczurKP19c
-
Truth Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Berti-Equille19
-
End-to-End Benchmark.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Bhandarkar19
-
Incremental Sliding Window Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BhatotiaAJR19
-
Visual Graph Querying.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BhowmickC19
-
Big Data Visualization Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Bikakis19
-
In-Memory Transactions.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Blanas19
-
Parallel Join Algorithms in MapReduce.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Blanas19a
-
Ontologies for Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Blomqvist19
-
Apache SystemML.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Boehm19
-
Graph Invariants.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Boldi19
-
(Web/Social) Graph Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BoldiV19
-
Graph Data Integration and Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BonifatiI19
-
Graph Generation and Benchmarks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/BonifatiP19
-
Streaming Process Discovery and Conformance Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Burattin19
-
Big Data Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Calheiros19
-
Big Data Analysis in Bioinformatics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Cannataro19
-
Stream Window Aggregation Semantics and Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/CarboneKH19
-
Decomposed Process Discovery and Conformance Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Carmona19
-
Big Data Analysis for Smart City Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Cesario19
-
Optimizing Geo-Distributed Streaming Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ChandraHS19
-
Mobile Big Data: Foundations, State of the Art, and Future Directions.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ChangHSM19
-
Emerging Hardware Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ChengLH19
-
Security and Privacy in Big Data Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ChentharaWA19
-
Data Cleaning.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Chu19
-
Energy Efficiency in Big Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Comito19
-
Hierarchical Process Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Conforti19
-
Spatio-Textual Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/CongJ19
-
Degrees of Separation and Diameter in Large Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/CrescenziM19
-
Metrics for Big Data Benchmarks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Crolotte19
-
TARDiS: A Branch-and-Merge Approach to Weak Consistency.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Crooks19
-
SciDB.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Cudre-Mauroux19
-
Semantic Search.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Cudre-Mauroux19a
-
Databases as a Service.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Cunha19
-
Semantic Interlinking.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Demartini19
-
Data-Driven Process Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/DepaireM19
-
Big Semantic Data Processing in the Life Sciences Domain.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Deus19
-
Graph Processing Frameworks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Diaz-PerezGC19
-
RDF Dataset Profiling.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/DietzeDT19
-
Big Data in Computer Network Monitoring.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/DragoMD19
-
Storage Hierarchies for Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Dullmann19
-
Business Process Event Logs and Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/DumasM19
-
Business Process Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/DumasW19
-
Management of Time.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Dunning19
-
Rendezvous Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/DunningF19
-
Streaming Microservices.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/DunningF19a
-
Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Eldawy19
-
Big Data Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Eltabakh19
-
Artifact-Centric Process Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Fahland19
-
RDF Serialization and Archival.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/FernandezM19
-
Big Data in Mobile Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/FiadinoT19
-
Indexing for Graph Query Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/FletcherT19
-
Columnar Storage Formats.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Floratou19
-
Deep Learning on Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/FolinoGH19
-
Business Process Deviance Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/FolinoP19
-
Predictive Business Process Monitoring.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Francescomarino19
-
CRUD Benchmarks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/FriedrichR19
-
YCSB.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/FriedrichR19a
-
Compressed Indexes for Repetitive Textual Datasets.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GagieN19
-
Uncertain Schema Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Gal19
-
Uncertainty in Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GalR19
-
Data Fusion.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GarciaMBP19
-
Orchestration Tools for Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GargWR19
-
Hive.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Gates19
-
Adaptive Windowing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Gavalda19
-
Hybrid OLTP and OLAP.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GicevaS19
-
Big Data Analysis for Social Good.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Goerge19
-
Types of Stream Processing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Golab19
-
Hadoop.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Granha19
-
Record Linkage.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Gruenheid19
-
Elasticity.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GulisanoPP19
-
Apache Apex.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GundabattulaW19
-
Blockchain Transaction Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GuptaS19
-
Graph Data Models.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/GutierrezHW19
-
Big Data Analysis Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Hahmann19
-
Flood Detection Using Social Media Big Data Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HanifTRS19
-
Linked Data Management.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HartigHS19
-
Knowledge Graphs in the Libraries and Digital Humanities Domain.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HaslhoferIS19
-
Data Wrangling.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HeerHK19
-
Continuous Queries.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Hirzel19
-
Stream Processing Languages and Abstractions.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HirzelB19
-
Stream Query Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HirzelSG019
-
Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Hoel19
-
Big Data Deep Learning Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HordriYSA19
-
Privacy Cube.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HotaPS19
-
Distributed File Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Hu19
-
Graph Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HuN19
-
Apache Flink.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/HueskeW19
-
Analytics Benchmarks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/IvanovZ19
-
Virtual Distributed File System: Alluxio.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/JiaL19
-
Keyword Attacks and Privacy Preserving in Public-Key-Based Searchable Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/JiangGSH19
-
Structures for Large Data Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Jin19
-
Robust Data Partitioning.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/JindalSL19
-
Advancements in YARN Resource Manager.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/KaranasosSD19
-
Stream Benchmarks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Karimov19
-
Probabilistic Data Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Keulen19
-
Tools and Libraries for Big Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Khalifa19
-
Big Data in Smart Cities.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/KhanP19
-
BSP Programming Model.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Khayyat19
-
Historical Graph Management.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/KhuranaD19
-
Security and Privacy Aspects of Semantic Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Kirrane19
-
Apache Samza.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Kleppmann19
-
Impala.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/KornackerB19
-
Linked Geospatial Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/KoubarakisBNS19
-
Privacy-Aware Identity Management.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/KutylowskiB19
-
Influence Analytics in Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/LakshmananTY19
-
Big Semantic Data Processing in the Materials Design Domain.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/LambrixAD019
-
Energy Benchmarking.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/LangeK19
-
Component Benchmark.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/LangeS19
-
Dimension Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Larsen19
-
Big Data in Network Anomaly Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/LeZ19
-
Automated Process Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Leemans19
-
Decision Discovery in Business Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/LeoniM19
-
Business Process Model Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Leopold19
-
Hardware Reliability Requirements.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Li19
-
Spark SQL.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/LiLM19
-
Visualizing Semantic Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Luggen19
-
TPCx-HS.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Magdon-Ismail19
-
Virtualized Big Data Benchmarks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Magdon-Ismail19a
-
Query Processing: Computational Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Magdy19
-
Declarative Process Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Maggi19
-
Streaming Big Spatial Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MahmoodA19
-
Big Data and Privacy Issues for Connected Vehicles in Intelligent Transportation Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MahmoodZH19
-
Query Processing: Joins.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Mamoulis19
-
Grammar-Based Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Maneth19
-
Pattern Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Margara19
-
Definition of Data Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MargaraR19
-
Cloud Computing for Big Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MarozzoB19
-
StreamMine3G: Elastic and Fault Tolerant Large Scale Stream Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MartinBF19
-
RDF Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Martinez-PrietoFHG19
-
The R Language: A Powerful Tool for Taming Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MatloffFY19
-
Big Data Enables Labor Market Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MezzanzanicaM19
-
Benchmark Harness.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Michael19
-
Secure Big Data Computing in Cloud: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MishraSS19
-
Big Data Application in Manufacturing Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MitraM19
-
Clojure.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Modrzyk19
-
Computing the Cost of Compressed Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MoffatP19
-
Achieving Low Latency Transactions for Geo-replicated Storage with Blotter.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Moniz0DGPR19
-
Big Data in Cultural Heritage.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Moscato19
-
Graph Exploration and Search.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/MottinW19
-
SnappyData.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Mozafari19
-
Big Data in Automotive Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Mughal19
-
Conformance Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Munoz-Gama19
-
Apache Mahout.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Musselman19
-
Integration-Oriented Ontology.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/NadalA19
-
Python.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Nagar19
-
Geo-Replication Models.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/NajafzadehJ19
-
Coordination Avoidance.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Nawab19
-
Geo-Scale Transaction Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Nawab19a
-
Weaker Consistency Models/Eventual Consistency.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Nawab19b
-
HopsFS: Scaling Hierarchical File System Metadata Using NewSQL Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/NiaziIHD19
-
Distributed Incremental View Maintenance.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Nikolic19
-
Storage Technologies for Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/NiuH19
-
Similarity Sketching.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Pagh19
-
Automated Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PanD19
-
Caching for SQL-on-Hadoop.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PangL19
-
Schema Mapping.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Papotti19
-
Data Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PapottiS19
-
Graph Data Management Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ParadiesPR19
-
Graph Representations and Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ParadiesV19
-
Computer Architecture for Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Parhami19
-
Data Longevity and Compatibility.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Parhami19a
-
Data Replication and Encoding.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Parhami19b
-
Energy Implications of Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Parhami19c
-
Parallel Processing with Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Parhami19d
-
Tabular Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Parhami19e
-
GPU-Based Hardware Platforms.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PaulHL19
-
Search and Query Accelerators.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PaulHL19a
-
Visualization Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Paula19
-
Big Data for Health.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Persico19
-
Hardware-Assisted Transaction Processing: NVM.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Petrov0VHR19
-
Active Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PetrovV0OHR19
-
Data Provenance for Big Data Security and Accountability.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PhuaK19
-
Semantic Stream Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PhuocH19
-
Inverted Index Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PibiriV19
-
Big Data in Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Picariello19
-
SparkBench.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PoelmanC19
-
TPC-DS.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Poess19
-
TPC-H.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Poess19a
-
TPC.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PoessN19
-
Microbenchmark.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Poggi19
-
Business Process Querying.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Polyvyanyy19
-
Conflict-Free Replicated Data Types CRDTs.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PreguicaB019
-
Big Data Stream Security Classification for IoT Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/PuthalRC19
-
Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/QiZ19
-
Query Processing - kNN.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/QiZ19a
-
Big Data Analysis and IoT.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/QinS19
-
Data Lake.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/QuixH19
-
Privacy-Preserving Data Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/QuocBBCFS19
-
Approximate Computing for Stream Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/QuocCBFHS19
-
Incremental Approximate Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/QuocKBFR19
-
Auditing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Raab19
-
System Under Test.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Raab19a
-
Using Big Spatial Data for Planning User Mobility.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RahamanHS19
-
Holistic Schema Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RahmP19
-
Large Scale Entity Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RahmP19a
-
Large-Scale Schema Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RahmP19b
-
Feature Learning from Social Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RakeshT019
-
Network Big Data Security Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RayAS19
-
Multidimensional Process Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Rinderle-Ma19
-
Introduction to Stream Processing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Rivetti19
-
Network-Level Support for Big Data Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RossiR19
-
Knowledge Graph Embeddings.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/RossoYC19
-
Co-resident Attack in Cloud Computing: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/SahooMST19
-
NoSQL Database Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Sakr19
-
Graph Query Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/SalihogluY19
-
Spatio-Social Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/SarwatS19
-
Apache Kafka.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Sax19
-
Hardware-Assisted Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/SayoodB19
-
Queue Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Senderovich19
-
Spatial Graph Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ShekharG19
-
Big Data and Fog Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Simmhan19
-
Distant Supervision from Knowledge Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/SmirnovaAC19
-
Query Optimization Challenges for SQL-on-Hadoop.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Soliman19
-
Event Log Cleaning for Business Process Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Solti19
-
Big Data and Recommendation.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Sperli19
-
Delta Compression Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Suel19
-
Sliding-Window Aggregation Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/TangwongsanH019
-
ETL.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Thomsen19
-
Hybrid Systems Based on Traditional Database Extensions.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Tian19
-
Hardware-Assisted Transaction Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Tozun19
-
Reasoning at Scale.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Urbani19
-
Graph OLAP.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/VaismanZ19
-
Privacy-Preserving Record Linkage.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/VatsalanKV19
-
Performance Evaluation of Big Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/VeigaET19
-
Apache Spark.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/VeithA19
-
Julia.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Voulgaris19
-
Applications of Big Spatial Data: Health.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Waller19
-
Spatial Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/WangS19
-
Trace Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Weerdt19
-
Big Data Technologies for DNA Sequencing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/WieseSG19
-
Graph Pattern Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/WuK19
-
Big Data for Cybersecurity.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/WurzenbergerSS19
-
Framework-Based Scale-Out RDF Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/WylotS19
-
Native Distributed RDF Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/WylotS19a
-
Parallel Graph Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/YanL19
-
Data Quality and Data Cleansing of Semantic Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ZaveriR19
-
Transactions in Massively Multiplayer Online Games.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Zhang19
-
Link Analytics in Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Zhao19
-
Spatiotemporal Data: Trajectories.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Zhou019
-
Big Data and Exascale Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ZhouH19
-
Genomic Data Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ZhuNS19
-
Big Data in the Cloud.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/ZobaedS19
-
Cloud-based SQL Solutions for Big Data.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/Zukowski19
-
Business Process Performance Measurement.
https://dblp.l3s.de/d2r/resource/publications/reference/bdt/del-Rio-OrtegaRR19
-
Handbook of Discrete and Computational Geometry, Second Edition.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/2004
-
Range Searching.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Agarwal04
-
Geometric Discrepancy Theory Anduniform Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/AlexanderBC04
-
Splines and geometric modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Bajaj04
-
Lattice Points and Lattice Polytopes.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Barvinok04
-
Triangulations and Mesh Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Bern04
-
Face Numbers of Polytopes and Complexes.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/BilleraB04
-
The discrepancy method in computational geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Chazelle04
-
Randomization and derandomization.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/CheongMR04
-
Geometry and Topology of Polygonal Linkages.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/ConnellyD04
-
Curve and Surface Reconstruction.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Dey04
-
Computer graphics.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/DobkinT04
-
Linear programming.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/DyerMW04
-
Biological applications of computational topology.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Edelsbrunner04
-
Voronoi Diagrams and Delaunay Triangulations.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Fortune04
-
Polyominoes.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/GolombK04
-
Pseudoline Arrangements.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Goodman04
-
Parallel algorithms in geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Goodrich04
-
Euclidean Ramsey Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Graham04
-
Computational Convexity.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/GritzmannK04
-
Modeling motion.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Guibas04
-
Arrangements.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Halperin04
-
Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/HalperinKL04
-
Basic Properties of Convex Polytopes.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/HenkRZ04
-
Solid modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Hoffmann04
-
Nearest Neighbors in High-Dimensional Spaces.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Indyk04
-
Low-Distortion Embeddings of Finite Metric Spaces.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/IndykM04
-
Manufacturing processes.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/JanardanW04
-
Software.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Joswig04
-
Sphere packing and coding theory.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/KabatianskyR04
-
Polytope Skeletons and Paths.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Kalai04
-
Two computational geometry libraries: LEDA and CGAL.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/KettnerN04
-
Geographic information systems.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Kreveld04
-
Subdivisions and Triangulationsof Polytopes.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Lee04
-
Collision and Proximity Queries.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/ManochaL04
-
Computational Real Algebraic Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Mishra04
-
Shortest Paths and Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Mitchell04
-
Geometric Intersection.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Mount04
-
Visibility.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/ORourke04
-
Polygons.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/ORourkeS04
-
Pattern recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/ORourkeT04
-
Finite Point Configurations.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Pach04
-
Geometric Graph Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Pach04a
-
Ray Shooting and Lines in Space.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Pellegrini04
-
Oriented Matroids.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Richter-GebertZ04
-
Surface simplification and 3D geometry compression.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Rossignac04
-
Computation of robust statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/RousseeuwS04
-
Parametric search.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Salowe04
-
Tilings.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/SchattschneiderS04
-
Discrete Aspects of Stochastic Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Schneider04
-
Symmetry of Polytopes and Polyhedra.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Schulte04
-
Polyhedral Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/SchulteB04
-
Convex Hull Computations.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Seidel04
-
Crystals and quasicrystals.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Senechal04
-
Algorithmic motion planning.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Sharir04
-
Geometric Reconstruction Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Skiena04
-
Point Location.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Snoeyink04
-
Graph drawing.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/TamassiaL04
-
Mathematical programming.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Todd04
-
Packing and Covering.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Toth04
-
Computational Topology.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Vegter04
-
Helly-Type Theorems and Geometric Transversals.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Wenger04
-
Geometric applications of the grassmann-cayley algebra.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/White04
-
Rigidity and scene analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Whiteley04
-
Robust geometric computation.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Yap04
-
Topological Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cg/Zivaljevic04
-
Encyclopedia of Computational Neuroscience
https://dblp.l3s.de/d2r/resource/publications/reference/cn/2014
-
Neuromuscular Control Systems, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Abbas14
-
Imaging, Specimen Preparation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Abbott14
-
Peripheral Nerve Interface Applications, EMG/ENG.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/AbdelghaniAJ14
-
Spatial Temporal Spike Pattern Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Abeles14
-
Peripheral Nerve Stimulation Technique: Nerve Block.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/AckermannB14
-
Noninvasive Brain-Computer Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/AllisonK14
-
Olfactory Cortical Associative Memory Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Almeida14
-
Information Geometry as Applied to Neural Spike Data.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Amari14
-
Application of Declarative Programming in Neurobiology.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Anastasio14
-
Modeling Cerebellar Learning: Input Minimization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Anastasio14a
-
Local Field Potential, Ephaptic Interactions.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Anastassiou14
-
Vestibular, Canal Testing: The Head Impulse Test.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Aw14
-
Prosthetic Vision, Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Ayton14
-
Neural Decoding.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BadreldinO14
-
Dendritic Spines: Continuum Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Baer14
-
Stochastic Resonance: Balance Control and Cochlear Implants.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bahar14
-
Dynamic Diseases of the Brain.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BaierM14
-
Forward and Inverse Problems of MEG/EEG.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Baillet14
-
Spatiotemporal Energy Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bair14
-
Collations of Connectivity Data on the Macaque Brain (CoCoMac).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BakkerD14
-
Cortical Motor Prosthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BalasubramanianH14
-
Bifurcation Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BarnettC14
-
Directed Spectral Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BarrettS14
-
MCell.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BartolDF14
-
Multistability in Seizure Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BazhenovK14
-
Olfactory Computation in Antennal Lobe and Mushroom Bodies.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BazhenovS14
-
Local Field Potential Interaction with the Extracellular Medium.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BedardD14
-
Topographica.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bednar14
-
Visual Aftereffects, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bednar14a
-
Hodgkin-Huxley Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Beeman14
-
Bayesian Approaches in Computational Neuroscience: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Beierholm14
-
Perception, Bayesian Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Beierholm14a
-
Resistivity, Axial.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bekkers14
-
Spike-Frequency Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BendaT14
-
Somatosensory Prosthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bensmaia14
-
Somatosensory System: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bensmaia14a
-
Tripartite Synapse (Neuron-Astrocyte Interactions), Conductance Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Berger14
-
Control of Locomotion and Scratching in Turtles.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Berkowitz14
-
Endocrine Cell Function and Dysfunction.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bertram14
-
Efficient Population Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bethge14
-
Parkinson's Disease: Deep Brain Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Beuter14
-
Peripheral Nerve Interface Applications: Neuropathic Pain.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bhadra14
-
Drosophila Connectome.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BhariokeSCM14
-
Brainstem Motoneurons, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Binder14
-
Biochemical Signaling Pathways and Diffusion: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Blackwell14
-
Calcium Pumps, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Blackwell14a
-
Modeling of Enzyme Kinetics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Blackwell14b
-
Particle-Based Stochastic Simulators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Blackwell14c
-
Protein Kinase C, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Blackwell14d
-
Striatal Models, Cellular Detail.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BlackwellDE14
-
Protein Kinase A, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BlackwellJ14
-
Receptive Field Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Blais14
-
Basal Ganglia: Beta Oscillations.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bogacz14
-
Speed-Accuracy Trade-Off.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bogacz14a
-
Gamma Rhythm, Neural Population Models of the.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bojak14
-
Neural Population Models and Cortical Field Theory: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bojak14a
-
Neuroimaging, Neural Population Models for.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BojakB14
-
Neuronal Model Hand-Tuning.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Booth14
-
Dynamical Systems: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Borisyuk14
-
Morris-Lecar Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Borisyuk14a
-
Visual Motion Detection in Drosophila.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Borst14
-
Bifurcations Dynamics of Single Neurons and Small Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bose14
-
Multistability Arising from Synaptic Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BoseN14
-
Brain Architecture Management System (BAMS).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bota14
-
BrainInfo.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bowden14
-
GENESIS, The GEneral NEural SImulation System.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BowerCB14
-
Sound Localization in Mammals, Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Braasch14
-
Micro-Wires.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Branner14
-
Spectral Methods in Neural Data Analysis: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bressler14
-
Stochastic Neural Field Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Bressloff14
-
CellML.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Britten14
-
FieldML.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BrittenHNMBC14
-
Associations and Rewards in Auditory Cortex.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Brosch14
-
Fokker-Planck Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BrunelH14
-
Population Density Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/BrunelH14a
-
Coexistence of Bursting Regimes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Butera14
-
Brainstem Processing: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ButeraM14
-
Phase Response Curve, Topology of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ButeraN14
-
Spontaneous Activity, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/CabralD14
-
Human Balancing Tasks: Power Laws, Intermittency, and Lévy Flights.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/CabreraP14
-
Phase Response Curves: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Canavier14
-
Pulse-Coupled Oscillators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Canavier14a
-
PSICS: The Parallel Stochastic Ion Channel Simulator.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cannon14
-
Optogenetics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cardin14
-
Basal Ganglia System as an Engine for Exploration.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ChakravarthyB14
-
Neuromechanics of Joint Coordination.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Chang14
-
BioModels Database: a public repository for sharing models of biological processes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ChelliahJLHN14
-
Generalized Linear Models for Point Process Analyses of Neural Spiking Activity.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ChenB14
-
State-Space Models for the Analysis of Neural Spike Train and Behavioral Data.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ChenB14a
-
Neuromorphic Sensors, Olfaction.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ChiccaSN14
-
Anti-Hebbian Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Choe14
-
Brain Atlases.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Choe14a
-
Computational Neuroanatomy: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Choe14b
-
Connectome, General.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Choe14c
-
Hebbian Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Choe14d
-
Physical Sectioning Microscopy.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Choe14e
-
Connectome, Mouse.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ChoeKMA14
-
Olfactory Computation in Glomerular Microcircuits.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cleland14
-
Long-Term Plasticity, Biophysical Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Clopath14
-
Deep Cerebellar Nuclei.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cohen14
-
Slow Oscillations: Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Compte14
-
Low-Frequency Oscillations (Anesthesia and Sleep): Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Contreras14
-
Visual Hallucinations and Migraine Auras.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cowan14
-
Model Reproducibility: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Crook14
-
NeuroML.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/CrookGCVS14
-
Models of Fly Lobula Plate Tangential Cells (LPTCs).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cuntz14
-
The TREES Toolbox - Code for Neuronal Branching.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cuntz14a
-
Vestibular Otoliths, Response to Vibration and Sound.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Curthoys14
-
Vestibular Eye Movement Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/CurthoysM14
-
Bradykinesia Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cutsuridis14
-
Multistability in Neurodynamics: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Cymbalyuk14
-
Prosthetic Vision, Perceptual Effects.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DagnelieS14
-
Migraines and Cortical Spreading Depression.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Dahlem14
-
Vestibular Prosthesis, Interface.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DaiS14
-
Finite Element Models of Transcutaneous Spinal Cord Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DannerHM14
-
NineML.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Davison14
-
PyNN: A Python API for Neural Network Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Davison14a
-
Visual Prosthesis, Optogenetic Approaches.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DegenaarB14
-
Bayesian Inference with Spiking Neurons.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Deneve14
-
Auditory Sensing Systems: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Denham14
-
Auditory Perceptual Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DenhamW14
-
Corticothalamic Feedback: Large-Scale Synchrony.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Destexhe14
-
Kinetic Models of Postsynaptic Currents.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Destexhe14a
-
Slow Oscillations and Epilepsy: Network Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Destexhe14b
-
Spindle Oscillations: Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Destexhe14c
-
Thermodynamic Models of Ion Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Destexhe14d
-
Local Field Potentials (LFP).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DestexheB14
-
LFP Analysis: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DestexheG14
-
Local Field Potential and Movement Disorders.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DevergnasW14
-
Voltage-Sensitive Dye Imaging, Intrinsic Optical Signals.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DevonshireZB14
-
Spectral Interdependency Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Dhamala14
-
Information Theory: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Dimitrov14
-
Parametric Spectral Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DingR14
-
Postinhibitory Rebound and Facilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Dodla14
-
Computational Models of Neural Retina.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Dokos14
-
Neuropharmacological Modelling: Alterations in Ionic Homeostasis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DoyonCK14
-
Calcium-Dependent Potassium Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DrionPSS14
-
Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Druckmann14
-
MOOSE, the Multiscale Object-Oriented Simulation Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DudaniBR14
-
Calcium Release, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Dupont14
-
Peripheral Nerve Interface Applications, Sleep Apnea.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Durand14
-
Tactile Sensing in Insects.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/DurrK14
-
Modeling of Bimolecular Reactions.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Edelstein14
-
Visual Processing in Free Flight.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Egelhaaf14
-
Correlation Analysis of Parallel Spike Trains.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Eggermont14
-
Retinotopic Development, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Eglen14
-
Extracellular Potentials, Forward Modeling of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Einevoll14
-
Lateral Geniculate Nucleus (LGN) Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/EinevollH14
-
Human Connectome Project.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ElamE14
-
Morphologically Detailed Motoneuron Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Elbasiouny14
-
Low-Voltage-Activated Calcium Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Engbers14
-
Sodium Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Engel14
-
Phase Models, Noisy.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Ermentrout14
-
Flicker-Induced Phosphenes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ErmentroutB14
-
Center-Surround Processing, Computational Role of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Ernst14
-
Auditory Evoked Brainstem Responses.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/EsceraAG14
-
Hippocampal Theta, Gamma, and Theta/Gamma Network Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FergusonS14
-
Hippocampus, Model Excitatory Cells.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FergusonS14a
-
Visual Prosthesis, Cortical Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Fernandez14
-
Functional Network Observations of Diseased Brain States.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FiddymentSK14
-
Peripheral Nerve Interface, Epineural Electrode.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Fisher14
-
Peripheral Nerve Interface Applications, Sensory Restoration.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FisherW14
-
Integrate and Fire Models, Deterministic.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Fourcaud-Trocme14
-
Bursting in Neurons and Small Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FoxRN14
-
Computation with Population Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FradyK14
-
Inward Rectifier Potassium Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Franc14
-
Peripheral Nerve Interface, Intraneural Electrode.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Frankel14
-
Local Field Potential, Synchrony of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FrederickBC14
-
Wireless Microstimulators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FreedmanST14
-
Auditory Prosthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/FrijnsB14
-
Spatial Spectral Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Fuchs14
-
Spinal Stimulation for Parkinson Treatment.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Fuentes14
-
Invertebrate Sensory Systems: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gabbiani14
-
Olivocerebellar Pathway.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Garwicz14
-
Action Potential Backpropagation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GaspariniM14
-
Directed Information Flow and Causality in Neural Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gastpar14
-
Information Measures of Redundancy and Synergy in Neural Activity.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gastpar14a
-
Hybrid Parameter Optimization Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Geit14
-
Neurofitter.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Geit14a
-
Epidural Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GerasimenkoE14
-
Databases and Data Repositories in Computational Neuroscience: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GerkinTCK14
-
Behavioural Analysis, Bayesian.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gershman14
-
Computation with Dopaminergic Modulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gershman14a
-
Gravity Analysis of Parallel Spike Trains.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gerstein14
-
Joint Peri Stimulus Time Histogram (JPSTH).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gerstein14a
-
Spiking Network Models and Theory: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gewaltig14
-
Metabotropic Receptors Dynamics, Conductance Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gibson14
-
Gillespie Algorithm for Biochemical Reaction Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gillespie14
-
Epilepsy: Computational Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GilsD14
-
Basal Ganglia: Control of Saccades.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Girard14
-
Braided Electrodes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GiszterKB14
-
Software Tools for Modelling in Computational Neuroscience: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gleeson14
-
Synthetic Neuronal Circuits/Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gleeson14a
-
neuroConstruct.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gleeson14b
-
Open Source Brain.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GleesonSC14
-
Neuronal Parameter Non-uniqueness.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Goaillard14
-
Failure of Averaging.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Goldman14
-
Stability and Homeostasis in Small Network Central Pattern Generators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Golowasch14
-
Capacitance, Membrane.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GolowaschN14
-
Cortical Maps, Intrinsic Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Goodhill14
-
Brian Spiking Neural Network Simulator.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GoodmanB14
-
Perceptual-Motor Dissociation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gorea14
-
Algorithmic Reconstruction of Motoneuron Morphology.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Graham14
-
Modeling the Axon.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Graham14a
-
Spike Timing-Dependent Plasticity (STDP), Biophysical Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GriffithMT14
-
Spike Train Analysis: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Grun14
-
Surrogate Data for Evaluation of Spike Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Grun14a
-
Unitary Event Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Grun14b
-
Biophysics of Adaptation in a Computational Model of the Leech T Neuron.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GuantesAP14
-
Calcium Dynamics in Neuronal Microdomains: Modeling, Stochastic Simulations, and Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GuerrierKH14
-
Physiology and Function of Cochlear Efferents.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Guinan14
-
Neuronal Model Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gunay14
-
Insect Olfaction: A Model System for Neural Circuit Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GuptaS14
-
Tempotron Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/GutigS14
-
Theta-Neuron Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Gutkin14
-
Locomotor Pattern Generation in the Rodent Spinal Cord.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Harris-Warrick14
-
Significance Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Harrison14
-
Cx3D: Cortex Simulation in 3D.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hauri14
-
Perceptual Decision Making.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HauserS14
-
Electrocorticogram (ECoG).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/He14
-
Computational Models of Motor Pools.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Heckman14
-
Auditory Nerve Response, Afferent Signals.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Heil14
-
Polarization Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Heinze14
-
Ionotropic Receptors Dynamics, Conductance Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hennig14
-
Retinal Waves, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hennig14a
-
Auditory Processing in Insects.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HennigR14
-
STEPS: STochastic Engine for Pathway Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hepburn14
-
Computational Models of Modulation of Oscillatory Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Herman14
-
Connectivity Analysis in Normal and Pathological Brains.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hilgetag14
-
Cortical Columns, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hill14
-
Peripheral Nerve Interface Applications: Respiratory Pacing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HillenJ14
-
NEURON Simulation Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HinesC14
-
Numerical Integration Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HinesC14a
-
Time-Frequency Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hipp14
-
Paraspinal Magnetic and Transcutaneous Electrical Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HofstoetterDM14
-
Cable Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14
-
Cable Theory: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14a
-
Dendritic Spines.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14b
-
Electrotonic Length, Formulas and Estimates.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14c
-
Equivalent Cylinder Model (Rall).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14d
-
Morphoelectrotonic Transform.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14e
-
Space (Length) Constant, Lambda, in Neuronal Signaling.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14f
-
Time Constant, ŌĄ, in Neuronal Signaling.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Holmes14g
-
Neuromorphic Sensors, Head Direction.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HoriuchiM14
-
Metric Space Analysis of Neural Information Flow.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Houghton14
-
Computational Models to Optimize the Electrodes and Waveforms for Deep Brain Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HowellG14
-
Brain Extracellular Space: A Compartment for Intercellular Communication and Drug Delivery.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HrabetovaH14
-
Systems Biology Markup Language (SBML).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hucka14
-
Multistability in Perception Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HuguetR14
-
Accumulation of Evidence in Decision Making.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HukKY14
-
Basal Ganglia: Mechanisms for Action Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Humphries14
-
Neural Field Model, Continuum.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hutt14
-
Pattern Formation in Neural Population Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hutt14a
-
Computational Psychiatry.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Huys14
-
Reward-Based Learning, Model-Based and Model-Free.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/HuysCS14
-
Independent Component Analysis of Images.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hyvarinen14
-
Topographic Independent Component Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Hyvarinen14a
-
Control of Aquatic and Terrestrial Gaits in Salamander.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/IjspeertC14
-
Auditory Thalamocortical Transformations.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Imaizumi14
-
Summary of Information Theoretic Quantities.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/IncePS14
-
Estimating Information-Theoretic Quantities.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/InceSP14
-
Neuromorphic Cognition.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/IndiveriD14
-
Spike-Triggered Average.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Ito14
-
Recurrent Brain-Computer Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Jackson14
-
Theta, Gamma, and Cross-Frequency Coupling in the Hippocampus.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Jackson14a
-
Globus Pallidus Cellular Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Jaeger14
-
Calcium Waves.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/JafriU14
-
Propagator, Axonal.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Jirsa14
-
Synaptic Connectivity in Neural Population Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Jirsa14a
-
Gamma-Aminobutyric Acid Type-A (GABA-A) Receptors, Kinetic Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Jones14
-
Local Field Potential, Relationship to Electroencephalography (EEG) and Magnetoencephalography (MEG).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Jones14a
-
Finite Element Modeling of Electrical Stimulation Using Microelectrodes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/JouclaY14
-
Phototransduction Biophysics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/JuusolaSH14
-
Neuropathologies and Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kaiser14
-
Wiring Principles, Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/KaiserH14
-
Spike Train.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kass14
-
Brain Machine Interface and Neuroimaging.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kawato14
-
Local Field Potential in Olfaction.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kay14
-
Neural Coding of Speech Sounds.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kilgard14
-
Wilson-Cowan Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kilpatrick14
-
Mechanotransduction, Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kim14
-
Visual Illusions, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kingdom14
-
Metabotropic Receptors (G Protein-Coupled Receptors).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kinzer-Ursem14
-
Epilepsy: Abnormal Ion Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Klassen14
-
Neuropharmacological Modeling, Pharmacogenomics and Ion Channel Modulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/KlassenC14
-
Bifurcations, Neural Population Models and.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Knosche14
-
Chaos, Neural Population Models and.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Knosche14a
-
Jansen-Rit Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Knosche14b
-
Basal Ganglia: Habit Formation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Knowlton14
-
Stochastic Simulators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/KohB14
-
Music Processing in the Brain.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kolsch14
-
Signaling Pathways, Modeling of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kotaleski14
-
Electrophysiological Indices of Speech Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kotz14
-
Neural Mass Action.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kozma14
-
Neuropercolation and Neural Population Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Kozma14a
-
Optic Flow Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Krapp14
-
Dopaminergic Cell Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/KuznetsovG14
-
NDVis-Neuro.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Langton14
-
Rhythm Perception: Pulse and Meter.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Large14
-
Basal Ganglia: Songbird Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LebloisD14
-
Recurrent Network Models, Reservoir Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Legenstein14
-
Spinal Interfaces: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Lemay14
-
Intraspinal Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LemayG14
-
Methodologies for the Treatment of Pain.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LempkaM14
-
Resistivity/Conductivity of Extracellular Medium.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LempkaM14a
-
Computation with Serotonergic Modulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Lewis14
-
Leech Local Bend: Neural Coding of Touch Location.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Lewis14a
-
Weak Coupling Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LewisS14
-
Biophysical Models of Olfactory Mitral and Granule Cells.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Li14
-
Auditory Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LiC14
-
Wavelet Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Liang14
-
Cutaneous Mechanoreceptive Afferents: Neural Coding of Texture.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Lieber14
-
Down Under Neural Population Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Liley14
-
Mesoscopic Anatomy and Neural Population Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Liley14a
-
Neural Population Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Liley14b
-
Central Vestibular Signal Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LimWB14
-
Neuromorphic Sensors, Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Linares-BarrancoS14
-
Markov Models of Ion Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LinaroG14
-
Computational Olfaction.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Linster14
-
Neuromodulation: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Linster14a
-
Olfaction: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Linster14b
-
Computational Modeling of Olfactory Behavior.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LinsterC14
-
Neuromorphic Sensors, Cochlea.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LiuS14
-
Spinal Cord, Integrated (Non CPG) Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Loeb14
-
Local Field Potential, Relationship to BOLD Signal.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LogothetisP14
-
Cochlear Inner Hair Cell, Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Lopez-Poveda14
-
Retinal/Visual Interfaces (Models, Theory, Techniques): Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Lovell14
-
Modeling of Disease: Molecular Level, Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Lytton14
-
Deterministic Reaction-Diffusion Simulators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/LyttonM14
-
Electrophysiology Analysis, Bayesian.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Macke14
-
Nernst-Planck Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Maex14
-
Neuronal Population Vector.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MahanG14
-
Anatomy and Physiology of the Mammalian Auditory System.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Malmierca14
-
Delayed Rectifier and A-Type Potassium Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Manis14
-
Reduced Morphology Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MarascoM14
-
Retinal Disease and Remodeling.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Marc14
-
Short-Term Synaptic Plasticity in Central Pattern Generators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MartinezMN14
-
Cell Centered Database.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Martone14
-
Neuroscience Information Framework (NIF).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MartoneB14
-
Categorical Decisions.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MassetK14
-
Calcium-Dependent Exocytosis, Biophysical Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Matveev14
-
Facilitation, Biophysical Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Matveev14a
-
Reconstruction, Techniques, and Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MayerichCK14
-
ModelDB.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/McDougalWMMMCHS14
-
Methodologies for the Restoration of Bladder and Bowel Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/McGeeG14
-
Target Selection vs. Response Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/McPeek14
-
Mammalian Motor Nerve Fibers, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MedinaG14
-
Digital Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MeijS14
-
Stimulus Reconstruction from Cortical Responses.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Mesgarani14
-
Peripheral Vestibular Signal Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Migliaccio14
-
Vestibular System: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Migliaccio14a
-
Olfactory Computation in Mitral-Granule Cell Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MiglioreM14
-
Stimulus-Specific Adaptation, Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Mill14
-
Decision Making, Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Miller14
-
Decision Making, Threshold.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Miller14a
-
Dynamics of Disease States: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Milton14
-
Modeling Ion Concentrations.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MohapatraDSJ14
-
Transfer Function, Electrocortical.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Molaee-ArdekaniW14
-
Baroreflex Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Molkov14
-
Coupled Oscillations in Neural Control of Breathing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Molkov14a
-
Working Memory, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Mongillo14
-
PhysioNet.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Moody14
-
Dynamic Causal Modeling with Neural Population Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Moran14
-
Cardiac Excitable Tissue Pathology (Ion Channels).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MorenoC14
-
Retinal Neurophysiology.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/MorleyC14
-
Oculomotor Control, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Moschovakis14
-
Hippocampus, Model Network Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Muldoon14
-
General Overview of Spinal Anatomy and Physiology Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Murray14
-
Invertebrate Pattern Generation: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Nadim14
-
Multiscale Brain Connectivity.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/NakagawaD14
-
Neuronal Model Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Naud14
-
Context-Dependent Processing in Auditory Cortex.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Nelken14
-
Brain-Scale Networks: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Netoff14
-
Phase Response Curve, Measurement, and Shape of General.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Netoff14a
-
Spike Time Response Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Netoff14b
-
Models of Extracellular Signal-Regulated Kinases.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Neves14
-
Brain Ischemia and Stroke.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/NeymotinTML14
-
Hyperpolarization-Activated Cyclic Nucleotide-Gated Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Nolan14
-
Gap Junctions in Small Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/NowotnyB14
-
Voltage-Clamp Technique.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/NowotnyL14
-
Patch Clamp Technique.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/NowotnyM14
-
Dynamic Clamp Technique.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/NowotnyV14
-
Vestibular Function After Cochlear Implantation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/OLeary14
-
Polypeptide and Protein Modeling for Drug Design.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/OMaraD14
-
Nitric Oxide Neuromodulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/OSheaHP14
-
Learning Rules: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Obermayer14
-
Cercal System.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/OgawaM14
-
Neuronal Parameter Sensitivity.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Olifer14
-
Collision Avoidance Models, Visually Guided.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Oliva14
-
Multistability of Coupled Neuronal Oscillators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Oprisan14
-
Functional Neuroscience: Cortical Control of Limb Prosthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/OrsbornC14
-
Multistability: Stopping Events with Single Pulses.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Osorio14
-
Brain-Machine Interface: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Oweiss14
-
Masking and Masking Release.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Oxenham14
-
Statistical Analysis of Neuroimaging Data.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Ozaki14
-
Retinal Prostheses for Restoration of Sight.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Palanker14
-
Phase-Locking Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Palva14
-
Network Theory in Neuroscience.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/PapoBB14
-
NeuroMorpho.org.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ParekhA14
-
Color Vision, Computational Methods for.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Parraga14
-
Pulse-Resonance Sounds.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Patterson14
-
Master Stability Function for Globally Synchronized Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/PecoraC14
-
Somatosensory Cortex: Neural Coding of Motion.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Pei14
-
Imaging Analysis, Bayesian.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Penny14
-
Sleep, Neural Population Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Phillips14
-
NEST: The Neural Simulation Tool.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/PlesserDGM14
-
Dendritic Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Poirazi14
-
Software for Neuroimaging Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/PolineK14
-
Computational Model-Based Development of Novel Stimulation Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/PopovychT14
-
Amari Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Potthast14
-
Inverse Problems in Neural Population Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Potthast14a
-
Compartmental Models of Spinal Motoneurons.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Powers14
-
Chloride Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Prescott14
-
Excitability: Types I, II, and III.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Prescott14a
-
Pain Processing Pathway Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Prescott14b
-
Pathological Changes in Peripheral Nerve Excitability.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Prescott14c
-
Acoustic Timbre Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/PressnitzerAS14
-
Neuronal Model Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Prinz14
-
Proprioceptor Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Prochazka14
-
Coordinate Transformations, Role of Spinal Cord in.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Prut14
-
Transcriptional Control Dysfunction, Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Queisser14
-
Local Field Potential in the Visual System.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rainer14
-
Finite Element Modeling for Extracellular Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/RattayDHM14
-
Meta-analysis in Neuroimaging.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/RayL14
-
Stereo Vision, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Read14
-
Quasi-active Approximation of Nonlinear Dendritic Cables.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Remme14
-
Visual Prosthesis, Optic Nerve Approaches.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Ren14
-
Neuromorphic Engineering: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Renaud14
-
Neural Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Richmond14
-
Olfactory Computation and Adult Neurogenesis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Riecke14
-
BrainMap.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/RiedelRFUEFL14
-
Biophysical Models: Neurovascular Coupling, Cortical Microcircuits, and Metabolism.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Riera14
-
Brain Imaging: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Riera14a
-
N -Methyl- d -Aspartate (NMDA) Receptors, Conductance Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Roberts14
-
AMPA Glutamate Receptor (AMPA Receptor), Conductance Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Roberts14a
-
Rhythm Generation in Young Xenopus Tadpoles.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Roberts14b
-
Synaptic Dynamics: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Roberts14c
-
Cardiac Excitable Tissue Pathology (Ischemia).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/RobertsC14
-
Peripheral Nerve Interface, Regenerative.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Romero-Ortega14
-
Peripheral Nerves, Anatomy and Physiology of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Romero-Ortega14a
-
Local Field Potential and Deep Brain Stimulation (DBS).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/RosaMBP14
-
Short Term Plasticity, Biophysical Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rosenbaum14
-
Peripheral Nerve Interface Applications, Obesity.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/RoslinB14
-
Modeling Synapses.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rothman14
-
Mixed-Mode Oscillations in Single Neurons.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rotstein14
-
Subthreshold Amplitude and Phase Resonance in Single Cells.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rotstein14a
-
Basal Ganglia: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rubin14
-
Comparative Analysis of Half-Center Central Pattern Generators (CPGs).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rubin14a
-
Computational Models of Deep Brain Stimulation (DBS).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/RubinM14
-
Vertebrate Pattern Generation: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Rybak14
-
Somatosensory Neurons: Spike Timing.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Saal14
-
Neuromorphic Technologies, Memristors.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Saighi14
-
Decision Making: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Salinas14
-
Cognition, Bayesian Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sanborn14
-
Slow Oscillations: Physiology.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sanchez-Vives14
-
Cerebellum: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Santamaria14
-
Diffusion Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SantamariaM14
-
Multi-scale Modeling of Purkinje Cells.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SantamariaM14a
-
Tinnitus, Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schaette14
-
Determining Network Structure from Data: Nonlinear Modeling Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SchelterT14
-
Neuromorphic Hardware, Large Scale.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schemmel14
-
Peripheral Nerve Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schiefer14
-
Calcium Buffering: Models of Ca 2+ Dynamics and Steady-State Approximations.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schmidt14
-
Neuronal Parameter Space Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schmuker14
-
Pitch Perception, Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schnupp14
-
Modeling the Emergence of Orientation Selectivity in the Cerebral Cortex.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SchollP14
-
Embodied Cognition, Dynamic Field Theory of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schoner14
-
Coordination Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SchonerN14
-
Vestibular, Rehabilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schubert14
-
Applications of Information Theory to Analysis of Neural Data.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SchultzIP14
-
Neuronal Parameter Co-regulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schulz14
-
Balanced State.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schwabe14
-
Center-Surround Processing, Network Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schwabe14a
-
Cortex: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Schwabe14b
-
Attentional Top-Down Modulation, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SchwedhelmT14
-
Reinforcement Learning in Cortical Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SennP14
-
Spike-Timing-Dependent Plasticity, Learning Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SennP14a
-
Hierarchical Models of the Visual System.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Serre14
-
Spectro-Temporal Receptive Fields.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Shamma14
-
Peripheral Nerve Interface Applications, Cochlear Implants.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Shannon14
-
Local Field Potential, Methods of Recording.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sharott14
-
SenseLab: Integration of Multidisciplinary Neuroscience Data.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ShepherdMMCCMMHM14
-
Computational Analysis of Rodent Spinal CPG.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sherwood14
-
FitzHugh-Nagumo Model.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sherwood14a
-
Neuronal Avalanches.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Shew14
-
Kinetic Models for PET/SPECT Imaging.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ShidaharaWK14
-
Auditory Precedence Effect.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Shinn-Cunningham14
-
Estimation of Neuronal Firing Rate.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Shinomoto14
-
Gamma and Theta Oscillations, Hippocampus: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Skinner14
-
Hippocampus, Model Inhibitory Cells.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SkinnerF14
-
Computational Models of Mammalian Respiratory CPG.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Smith14
-
Automated Parameter Search in Small Network Central Pattern Generators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Smolinski14
-
Multi-objective Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Smolinski14a
-
High-Voltage-Activated Calcium Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SolinasMS14
-
Hippocampal Memory Prosthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SongB14
-
Neuronal Parameter Space Exploration.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Soofi14
-
Predictive Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Spratling14
-
Decision Making, Motor Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Stanford14
-
Sensory Input to Central Pattern Generators.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Stein14
-
Gating Current.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sterratt14
-
Goldman-Hodgkin-Katz Equations.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sterratt14a
-
Nernst Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sterratt14b
-
Nomenclature of Ion Channels (IUPHAR Scheme).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sterratt14c
-
Q10: The Effect of Temperature on Ion Channel Kinetics.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Sterratt14d
-
Anesthesia, Neural Population Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Steyn-RossSS14
-
Gap Junctions, Neural Population Models and.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Steyn-RossSS14a
-
Phase Transitions, Neural Population Models and.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Steyn-RossSS14b
-
Phase Resetting, Measurement of Infinitessimal.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Stiefel14
-
Visual Prosthesis, Suprachoroidal, and Trans-retinal Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Suaning14
-
Sound Localization and Experience-Dependent Plasticity.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/SumnerM14
-
Cortical Maps: Activity-Dependent Development.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Swindale14
-
Self-Organizing Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Swindale14a
-
Rhythm Generation in Embryonic Chick Spinal Cord.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TabakWO14
-
Proprioception.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Tabot14
-
Somatosensory Cortex: Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Tabot14a
-
Long Term Depression in the Granule Cell-Purkinje Cell Synapse.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Tanaka-Yamamoto14
-
Deep Brain Stimulation (Models, Theory, Techniques): Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TassH14
-
Local Field Potential, Relationship to Membrane Synaptic Potentials.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TaubLO14
-
Local Field Potential, Relationship to Unit Activity.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TelenczukD14
-
Subthalamopallidal Loop and Oscillations.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Terman14
-
Control of Breathing, Integration of Adaptive Reflexes.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TinP14
-
Neuromechanics of Postural Control.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TingA14
-
Pre-Botzinger Complex Rhythm Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Toporikova14
-
Synthetic Neuronal Morphology.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Torben-Nielsen14
-
Boltzmann Machine.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Torres14
-
Hopfield Network.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Torres14a
-
Perceptron Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Torres14b
-
Delta Rhythms: Models and Physiology.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TraubW14
-
Spinal and Neuromechanical Integration: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TreschJ14
-
Cortical Function, Normative Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Triesch14
-
NeuroElectro Project.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TripathyG14
-
Population Encoding/Decoding.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Truccolo14
-
Physiology and Computational Principles of Muscle Force Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/TsianosL14
-
Radiopharmaceuticals in Molecular Imaging.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Vallabhajosula14
-
Conductance-Based Models of Nonlinear Dynamics in Vertebrate Motoneurons.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Venugopal14
-
Connectionist Models of CPG Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Venugopal14a
-
Motoneurons and Neuromuscular Systems: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Venugopal14b
-
Spike Train Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Victor14
-
Hippocampal Oscillations, Mechanisms (PING, ING, Sparse).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WalT14
-
Simulation Experiment Description Markup Language (SED-ML).
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WaltemathN14
-
Peripheral Nerve Interface Applications: Vagal Nerve Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Ward14
-
Calmodulin, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WaxhamC14
-
Sensory Coding, Efficiency.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WeberM14
-
Peripheral Nerve Interfaces: Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WeberW014
-
Stimulus-Specific Information.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Wehr14
-
Basal Ganglia: Decision-Making.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WeiW14
-
Vision Prosthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Weiland14
-
Visual Prosthesis, Epiretinal Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Weiland14a
-
Vestibular Adaptation and Compensation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WellingsBL14
-
Epilepsy, Neural Population Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WendlingM14
-
Neuronal Model Output Fitness Function.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WhiteH14
-
Neuromodulation in Small Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WilliamsHM14
-
Large-Scale Neural Networks: Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Wilson14
-
Subthalamic Nucleus Cellular Models.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WilsonF14
-
Adaptation in Sensory Cortices, Models of.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Wimmer14
-
Choice Behavior.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WingerdenK14
-
Decision Making, Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WingerdenK14a
-
Biomechanical Model of Low Back Pain.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WinkelsteinJ14
-
Auditory Event-related Potentials.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WinklerDE14
-
Slow Feature Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Wiskott14
-
Peripheral Nerve Signal Processing, Source Localization.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Wodlinger14
-
Current Source Density (CSD) Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Wojcik14
-
Decoding Field Potentials.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WongP14
-
Time-Delayed Neural Networks: Stability and Oscillations.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/WuCB14
-
Reconstruction, Electron Microscopy.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Yang14
-
Somatosensory Cortex: Neural Coding of Shape.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Yau14
-
Peripheral Nerve Signal Processing, Multipole Cuff Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Yoo14
-
Peripheral Nerve Signal Processing, Denoising.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Yoshida14
-
Computational Models Supporting Parameter Finding for Deep Brain Stimulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Yousif14
-
Computational Models of Neuromodulation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Yu14
-
Decision-Making Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Yu14a
-
Physiome Repository.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/YuBNHN14
-
Action Potential Initiation.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/ZecevicP14
-
Visual Prosthesis, Subretinal Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/cn/Zrenner14
-
Localized Broadcasting in Mobile Ad Hoc Networks Using Neighbor Designation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/0001L04
-
Handbook of Discrete and Combinatorial Mathematics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/1999drm
-
Handbook of Data Structures and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2004dsa
-
The Practical Handbook of Internet Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2004ic
-
Mobile Computing Handbook.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2004mc
-
Handbook of Scheduling - Algorithms, Models, and Performance Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2004sch
-
Handbook of Algorithms for Wireless Networking and Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2005awnmc
-
Handbook of Bioinspired Algorithms and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2005bioi
-
Handbook of Elliptic and Hyperelliptic Curve Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2005ehcc
-
Embedded Systems Handbook.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2005es
-
The Handbook of Mobile Middleware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2006momi
-
Handbook of Approximation Algorithms and Metaheuristics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2007aam
-
Handbook of Dynamic System Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2007dsm
-
Information security management handbook, Sixth Edition.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2007ismh
-
Handbook of Parallel Computing - Models, Algorithms and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2007pc
-
Handbook of Real-Time and Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2007rtes
-
Handbook of Algorithms for Physical Design Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2008apda
-
The Universal Access Handbook.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2009ua
-
Handbook of Financial Cryptography and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2010fcs
-
Handbook of Finite State Based Models and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2012fsbma
-
Handbook of Energy-Aware and Green Computing - Two Volume Set.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2012green
-
Handbook on Soft Computing for Video Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2012vs
-
Handbook on Graph Drawing and Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2013gd
-
Handbook of Mixed Membership Models and Their Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2014mmm
-
Handbook of Virtual Environments - Design, Implementation, and Applications, Second Edition.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/2014vr
-
Distributed Signal Processing in Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AarabiJ05
-
GreenGPS-Assisted Vehicular Navigation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Abdelzaher12
-
Real-Time Communication for Embedded Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AbdelzaherC07
-
Adaptive Algorithmic Power Optimization for Multimedia Workload in Mobile Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AcquavivaB04
-
User Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Adams09
-
Congestion-Driven Physical Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AdyaY08
-
Data Synchronization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Agarwal06
-
A Composite Very-Large-Scale Neighborhood Search Algorithm for the Vehicle Routing Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AgarwalAL04
-
Worldwide Computing Middleware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AghaV04
-
Legalization and Detailed Placement.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AgnihotriM08
-
Integrated Profiling of Users, Terminals, and Provisioning Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AgostiniBR06
-
Multimedia Messaging Service.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ahson04
-
Introduction to Mixed Membership Models and Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AiroldiBEF14
-
Scheduling of Flexible Resources in Professional Service Firms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AkcayBX04
-
Cyber-Crime.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Akin07
-
Minimizing the Number of Tardy Jobs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AkkerH04
-
Evolving Computational Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Akl07
-
QoS Support in Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Al-kahtaniM05
-
Online Computation in Large Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Albers07
-
Optimization Techniquesin Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Albrecht08
-
Finite Automata Minimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AlmeidaMR12
-
Placement-Driven Synthesis Design Closure Tool.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AlpertHMPRRT08
-
Introduction to Physical Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AlpertMS08
-
Quadtrees and Octrees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Aluru04
-
Suffix Trees and Suffix Arrays.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Aluru04a
-
Spatial Domain Decomposition Methods in Parallel Scientific Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AluruS07
-
Hierarchical Performance Modeling and Analysis of Distributed Software Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ammar07
-
Power Management in Mobile and Pervasive Computing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AnastasiCP05
-
Fair Scheduling of Real-Time Tasks on Multiprocessors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AndersonHS04
-
Searching and Priority Queues in o(log n) Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Andersson04
-
Balanced Binary Search Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AnderssonFL04
-
Interface Agents.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AndreR09
-
Web Application Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Andress07
-
User Requirements Elicitation for Universal Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AntonaNAS09
-
Information Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Appleyard07
-
Cache-Oblivious Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ArgeBF04
-
System Modeling with UML State Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ArissX12
-
Semantic Aspects of Web Services.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ArroyoLGBDF04
-
Computational Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AryaM04
-
Screen Readers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AsakawaL09
-
Dimensions of User Diversity.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AshokJ09
-
Digital Rights Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AtallahFBOB04
-
Intelligent Energy-Aware Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AudzevichMRSTCAHWWPWDEE12
-
ISAM, Joining Context-Awareness and Mobility to Building Pervasive Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AugustinYBSRFCG04
-
Reductions That Preserve Approximability.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AusielloP07
-
Differential Ratio Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AusielloP07a
-
Data and Services for Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Avancha0PJ04
-
Generic Algorithms for Computing Discrete Logarithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Avanzi05
-
Compositeness and Primality Testing Factoring.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AvanziC05
-
Introduction to Public-Key Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AvanziL05
-
Index Calculus.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AvanziT05
-
Index Calculus for Hyperelliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AvanziT05a
-
Periodic Reward-Based Scheduling and Its Application to Power-Aware Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AydinMM04
-
Processor Optimization for Energy Efficiency.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/AziziL12
-
Biological Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BachmaierBS13
-
Openness and Interoperability in Mobile Middleware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaconY06
-
Ontology-Based Simulation in Agriculture and Natural Resources.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BadalJB07
-
Vision and Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BadcockPM14
-
Integrating Mobile Wireless Devices into the Computational Grid.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BagrodiaHRP04
-
A Survey on Mobile Transaction Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BalakrishnanHDL04
-
Block-LDA: Jointly Modeling Entity-Annotated Text and Entity-Entity Links.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BalasubramanyanC14
-
Finite State Transducers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaliosianW12
-
Approximation Algorithms for the Primer Selection, Planted Motif Search, and Related Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BallaDR07
-
Algorithmic Game Theory and Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BampisAP07
-
Evolution of Application Models for Pervasive Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Banavar06
-
Distributed Channel Access Scheduling for Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaoG05
-
Scheduling Equal Processing Time Jobs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaptisteB04
-
Applications of Virtual Environments in Experiential, STEM, and Health Science Education.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BarmpoutisDO14
-
Digital Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Barni010
-
Discrete Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BarrTJKL99
-
Modeling Formalisms for Embedded System Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BarrosCG05
-
Modeling and Simulation for Cultural Training: Past, Present, and Future Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BartlettNNK14
-
Finite Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaruaG12
-
Schedulability Analysis of Multiprocessor Sporadic Task Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaruahB07
-
Scheduling Real-Time Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaruahG04
-
Energy Efficiency of Voice-over-IP Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BasetS12
-
Randomized Graph Data-Structures for Approximate Shortest Paths.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BaswanaS04
-
GDToolkit.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BattistaD13
-
Computer Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BattistaR13
-
Digital Reputation for Virtual Communities.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BattitiG07
-
FPGA Technology Mapping, Placement, and Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bazargan08
-
Physical Design for Three-Dimensional Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BazarganS08
-
Simulation Models and Tool for Mobile Location-Dependent Information Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BeckerTSK04
-
Graph Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BeinekeMSMWSDBG99
-
Intelligent Mobility and Transportation for All.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BekiarisPGMR09
-
E-Cash.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Belenkiy10
-
Mobile Agent Middlewares for Context-Aware Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BellavistaVMBC04
-
Network-on-Chip Design for Gigascale Systems-on-Chip.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BeniniBM05
-
A Multiprocessor SoC Platform and Tools for Communications Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BensoudaneNPLPL05
-
Computational Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BergS04
-
Information Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BertinoF04
-
Real-Time Embedded Operating Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bertolotti05
-
Scheduling Data Broadcasts on Wireless Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BertossiPR07
-
State-of-the-Art SoC Communication Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BertozziBLA05
-
Programming and Virtualization of Distributed Multitasking Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BestavrosO07
-
Power-Efficient Strategies for Storage Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BhadkamkarS12
-
Reducing Delays Associated with Disk Energy Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BhattacharjeeBWG12
-
Predicting User Behavior for Energy Saving.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BiCG12
-
Code Mobility and Mobile Agents.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BieszczadW06
-
Agents.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BigusB04
-
An Introduction to Secure Remote Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bird07
-
Robust Estimation of Topic Summaries Leveraging Word Frequency and Exclusivity.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BischofA14
-
Virtual Environments Standards and Terminology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BladeP14
-
Virtual Environments: History and Profession.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BladePBL14a
-
Secured Connections to External Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Blanding07
-
Network Router Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Blanding07a
-
Simultaneous Embedding of Planar Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BlasiusKR13
-
Scheduling with Discrete Resource Constraints.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BlazewiczBF04
-
On Solving the Maximum Disjoint Paths Problem with Ant Colony Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BlesaB07
-
Human Performance Measurement in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BlissPC14
-
Software Development for Large-Scale Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BlumenthalGHH05
-
Stability of Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BockenhauerSH07
-
Security and Privacy for Data Warehouses.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BonewallGV07
-
Collision Avoidance, Contention Control, and Power Saving in IEEE 802.11 Wireless LANs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BononiD05
-
Challenges in Wireless Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Borisov04
-
Self-Policing Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BoudecB04
-
Fundamental Algorithms and Protocols for Wireless Networking and Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Boukerche05
-
Distributed Channel Allocation Protocols for Wireless and Mobile Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BoukercheHJ05
-
Biological Inspired Based Intrusion Detection Models for Mobile Telecommunication Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BoukercheJNS05
-
Wireless Communication and Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BoukercheLMNR05
-
Reconfigurable Computing with Optical Buses.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bourgeois07
-
Impact of Mobility on Resource Management in Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BoutabaG06
-
Background Subtraction for Visual Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bouwmans12
-
Physical Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bowers07
-
Physical Security for Mission-Critical Facilities and Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bowman07
-
Care and Feeding of Topic Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Boyd-GraberMN14
-
Graph Markup Language (GraphML).
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrandesELP13
-
Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrandesFW13
-
Auctions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Brandt10
-
Ant Colony Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrankeG05
-
A Unified View on Metaheuristics and Their Hybridization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrankeSS05
-
Linear Algebra.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrawleyTPNB99
-
Maintaining Information Security during Downsizing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bray07
-
Adapting the GATES Architecture to Scheduling Faculty.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrazileS04
-
Spam Wars.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bredenberg07
-
Port-Based Modeling of Engineering Systems in Terms of Bond Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Breedveld07
-
Environmentally Opportunistic Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrennerTBG12
-
Analytical Methods in Placement.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrennerV08
-
Graph Drawing in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bridgeman13
-
Partially Ordered Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrightwellW99
-
Finger Search Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Brodal04
-
DeeDS NG.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrohedeAGM07
-
Measuring the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Brownleec04
-
Modular Hierarchies of Models for Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Broy07
-
Embedded Systems and Software Technology in the Automotive Domain.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Broy07a
-
Reactive Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BrunatoB07
-
Mobile Middleware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BruneoPS06
-
VoIP Security Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Bruno07
-
Computing FacilityPhysical Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Brusewitz07
-
Crossings and Planarization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BuchheimCGJM13
-
Management of Design for All.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Buhler09
-
Novel Metaheuristic Approaches to Nurse Rostering Problems in Belgian Hospitals.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BurkeCB04
-
Optimization via Gene Expression Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Burkowski05
-
Roles and Responsibilities of the Information Systems Security Officer.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Burney07
-
Real-Time Java.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BurnsW07
-
Programming Execution-Time Servers and Supporting EDF Scheduling in Ada 2005.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/BurnsW07a
-
Security Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Buszta07
-
Real-Time Operating Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Buttazzo05
-
Real-Time Scheduling and Resource Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Buttazzo07
-
Practical Attacks on Smart Cards.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ByramjeeCF05
-
Smart Cards.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ByramjeeW05
-
Uncoupling Coordination.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CabriFLMZ06
-
Stochastic Scheduling with Earliness and Tardiness Penalties.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CaiZ04
-
Toward Energy-Efficient Web Server Clusters.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CaiZ12
-
Social Impact of Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Calvert14
-
Location Information Services in Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Camp05
-
Power-Aware Cache Management in Mobile Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Cao04
-
A Development and Deployment Framework for Distributed Branch and Bound.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CappelloC07
-
Minimum Energy Communication in Ad Hoc Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CaragiannisKK07
-
Online Call Admission Control in Wireless Cellular Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CaragiannisPK07
-
Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CarbonePS99
-
Contributions of "Ambient" Multimodality to Universal Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Carbonell09
-
Energy-Efficient Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CardeiD04
-
Elimination Rules for Job-Shop Scheduling Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CarlierPPR04
-
A Categorization of Real-Time Multiprocessor Scheduling Problems and Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CarpenterFHSAB04
-
Visual Perceptual Skills Training in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CarrollJH14
-
Synchronous Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CaspiTR07
-
Queueing System Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Cassandras07
-
Vocal Interfaces in Supporting and Enhancing Accessibility in Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CatarciKDG09
-
Security Event Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Cater07
-
Modular Testing and Built-In Self-Test of Embedded Cores in System-on-Chip Integrated Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chakrabarty05
-
An Unsupervised Video Shot Boundary Detection Technique Using Fuzzy Entropy Estimation of Video Content.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChakrabortyBD12
-
Conducting Training Transfer Studies in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChampneyCSC14
-
New Emerging Information Security Technologies and Solutions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chand07
-
Content Adaptation and Transcoding.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chandra04
-
Developments in Queueing Networks with Tractable Solutions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chao04
-
Introduction to Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChatterjeaHD05
-
Cuttings.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chazelle04
-
Approximation Algorithms for Minimizing AverageWeighted Completion Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChekuriK04
-
Parallel Scheduling for Early Completion.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chen04
-
Packing Floorplan Representations.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenC08
-
Infrastructure Versus Ad HocWireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenDGN06
-
Low-Power Design of Emerging Memory Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenL0N12
-
Resource Allocation and Call Admission Control in Mobile Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenLF05
-
Exploiting Heterogeneous Computing Systems for Energy Efficiency.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenLZ12
-
Naming and Discovery in Mobile Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenMK06
-
Sensor Network Component-Based Simulator.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenS07
-
Power Measuring and Profiling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenS12
-
Sphere Packing and Medical Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChenX07
-
Planar Straight Line Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Cheng04
-
Embedded Software-Based Self-Testing for SoC Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Cheng05
-
Beyond Presence: How Holistic Experience Drives Training and Education.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChertoffS14
-
Wireless Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chiani06
-
Power Aware Mapping of Real-Time Tasks to Multiprocessors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChildersMZM07
-
The Open Graph Drawing Framework (OGDF).
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChimaniGJKKM13
-
Approximation Algorithms for Some Optimal 2D and 3D Triangulations.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChinFW07
-
High-Performance Techniques for Parallel I/O.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChingCLCL07
-
Manufacturability-Aware Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChoMP08
-
Mixed Membership Blockmodels for Dynamic Networks with Feedback.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChoSG14
-
Energy-Saving Techniques for Disk Storage Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChouKR12
-
Clustering for Multi-Perspective Video Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChoudharyCB12
-
Ordinary Differential Equations.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChristianE07
-
Algorithmic Aspects of Energy-Efficient Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chrobak12
-
Clock Network Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChuP08
-
Practical Issues in Clock Network Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ChuP08a
-
Change That Attitude.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chun07
-
The Five W's and Designing a Secure, Identity-Based, Self-Defending Network (5W Network).
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chun07a
-
Network and Telecommunications Media.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chun07b
-
Covert Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chuvakin07
-
Honeypot Essentials.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Chuvakin07a
-
An Introduction to Role-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Clark07
-
Design and Development of 3D Interactive Environments for Special Educational Needs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CobbHMW14
-
Performance Guarantees for One-Dimensional Bin Packing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CoffmanC07
-
Variants of Classical One-Dimensional Bin Packing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CoffmanLC07
-
Variable-Sized Bin Packing and Bin Covering.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CoffmanLC07a
-
Combinatorial Designs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ColbournD99
-
Efficient Parallel Graph Algorithms for Multicore and Multiprocessors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CongB07
-
Enhancing Placement with Multilevel Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CongS08
-
Internet Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Conorich07
-
Peer-to-Peer Computing in Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ContiDT06
-
Considerations for Outsourcing Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Corby07
-
The Case for Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Corby07a
-
Operational Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Corby07b
-
Using FG to Reduce the Effect of Latency in Parallel Programs Running on Clusters.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CormenD07
-
Modeling the Energy Consumption of Distributed Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CostaHHP12
-
Committee of Sponsoring Organizations (COSO).
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Cote07
-
Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CottaA05
-
Memetic Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CottaM07
-
Impact of the Semantic Web on Modeling and Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CoutoMH07
-
Human Factors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Coventry10
-
Information Security Risk Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Cruz07
-
Content-Based Publish-Subscribe in a Mobile Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CugolaMP06
-
Selfish Routing on the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Czumaj04
-
Approximation Schemes for Minimum-Cost k-Connectivity Problems in Geometric Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/CzumajL07
-
Incremental Construction of Finite-State Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Daciuk12
-
Anonymous Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DanezisDS10
-
Spatial Orientation, Wayfinding, and Representation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DarkenP14
-
Adaptive Mobility Management in Wireless Cellular Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Das05
-
Solving Optimization Problems in Wireless Networks Using Genetic Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Das05a
-
Fair Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DashtiM10
-
Belts and Suspenders.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Davis07
-
Overview of an IT Corporate Security Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Davis07a
-
Common Models for.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Decker07
-
Security and the Physical Network Layer.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Decker07a
-
Intelligent Sensors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Dekneuvel05
-
Online Reputation Mechanisms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Dellarocas04
-
Dynamic Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DemetrescuFI04
-
Dynamic Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DemetrescuFI04a
-
Security in Wireless Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DengA05
-
Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Deo04
-
Insight into Intrusion Prevention Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Deograt-LumyN07
-
Collaborative Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Dewan04
-
Approximation Algorithms for Scheduling Time-Critical Jobs on Multiprocessor Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Dhall04
-
Data-Intensive Services for Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DiPippoRS07
-
Proprioceptive Adaptation and Aftereffects.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DiZioLC14
-
Decentralized Cellular Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DiazTGA05
-
Dynamic Haptic Interaction with Video.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DindarTB14
-
Cross-Layer Algorithms for Video Transmission over Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DingBW05
-
Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Doche05
-
Integer Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Doche05a
-
Finite Field Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Doche05b
-
Algebraic Background.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DocheL05
-
Arithmetic of Elliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DocheL05a
-
Arithmetic of Special Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DocheL05b
-
Restoration Component of Business Continuity Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DorfJ07
-
Ant Colony Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DorigoS07
-
Building Maintenance Processes for Business Continuity Plans.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Doughty07
-
Selecting the Right Business Continuity Strategy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Doughty07a
-
Methods and Tools for the Development of Unified Web-Based User Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DoulgerakiPMS09
-
Sequences.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DowlingGYMB99
-
Team Training in Virtual Environments: A Dual Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DriskellSV14
-
Scheduling Parallel Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Drozdowski04
-
Cache Management in Wireless and Mobile Computing Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuG04
-
Managing Spatio-Temporal Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuaI04
-
Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuanT12
-
Three-Dimensional Drawings.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Dujmovic13
-
Approximate Geometric Query Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuncanG04
-
Planar Orthogonal and Polyline Drawing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuncanG13
-
Location-Dependent Query Processing in Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DunhamS04
-
Background on Pairings.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuquesneF05
-
Implementation of Pairings.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuquesneF05a
-
Arithmetic of Hyperelliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuquesneL05
-
Pairing-Based Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuquesneL05a
-
Scheduling Parallel Tasks Approximation Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DutotMT04
-
Supporting Continuous Services to Roaming Clients.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/DuttaSW06
-
Basic Elements of Mathematical Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Dym07
-
Drawing Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EadesH04
-
Symmetric Graph Drawing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EadesH13
-
Structured Development of Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EastgateWD14
-
Sports Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EastonNT04
-
Steganography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Edmead07
-
Languages for Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Edwards05
-
Dynamic and Fractional Programming-Based Approximation Algorithms for Sequence Alignment with Constraints.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EgeciogluA07
-
Name Resolution and Service Discovery on the Internet and in Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EgelandE06
-
String Searching.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EhrenfeuchtM04
-
Graph Drawing for Data Analytics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Eick13
-
Swarm Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/El-SayedBAG05
-
Public Key Infrastructure.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ellison10
-
Biomimetic Models for Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EltoweissyJOWWL05
-
Perspectives on Accessibility.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Emiliani09
-
Proxy-Based Adaptation for Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EndlerRRS06
-
Measuring ROI on Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Endorf07
-
eAccessibility Standardization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Engelen09
-
Foundations.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EppRD99
-
Multidimensional Packing Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EpsteinS07
-
Very Large-Scale Neighborhood Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ErgunPOA07
-
Execution Time Analysis for Embedded Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ErmedahlE07
-
Estimating Diagnostic Error without a Gold Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EroshevaJ14
-
Power-Aware Parallel Job Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EtinskiCL12
-
Evaluating Performance, Power and Cooling in High-Performance Computing (HPC) Data Centers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/EvansGKMV12
-
Recursive Greedy Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Even07
-
Virtual Mouse and Keyboards for Text Entry.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Evreinov09
-
A Transparent Distributed Runtime for Java.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FactorSS07
-
TCP over Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FahmyYPA05
-
Biometrics and Universal Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fairhurst09
-
Ad Hoc Routing Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FanLS05
-
Location Privacy Protection in Mobile Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FanWH06
-
BeeHive.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FarooqW05
-
Security for Mobile Agents.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FedericiBMTC04
-
Speech Input to Support Universal Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FengS09
-
Embodied Autonomous Agents.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FengSLM14
-
Floorplan Representation in VLSI.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FengYC04
-
Organizing for Success.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FentonW07
-
Maximum Planar Subgraph.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FernandesC07
-
The Role of Soft Computing in Image Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FeronePP12
-
Implicit Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ferscha09
-
Self-Organization Algorithms for Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FigueiredoNL05
-
Security, Trust, and Privacy in Mobile Computing Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FininCPJK04
-
Operations Security and Controls.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fisher07
-
Semantic Enterprise Content Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FisherS04
-
The Languages of Dynamic System Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fishwick07
-
Information Security Governance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fitzgerald07
-
Building Management Commitment through Security Councils, or Security Council Critical Success Factors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fitzgerald07a
-
Ten Steps to Effective Web-Based Security Policy Development and Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fitzgerald07b
-
Software Support for Application Development in Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fok06
-
Swarming Agents for Decentralized Clustering in Spatial Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FolinoSF05
-
System Dynamics Modeling of Environmental Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ford07
-
Mixed Membership Models for Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FoxJ14
-
Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FoxSMC04
-
Approximation Algorithms and Heuristics for Classical Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FrankJ07
-
Toward a Multimodel Hierarchy to Support Multiscale Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FrantzDaleSS07
-
PIGALE.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FraysseixM13
-
Binomial, Fibonacci, and Pairing Heaps.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fredman04
-
The Dynamics of the Computational Modeling of Analogy-Making.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/French07
-
Background on Curves and Jacobians.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FreyL05
-
Varieties over Special Fields.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FreyL05a
-
Background on Weil Descent.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FreyL05b
-
Complex Multiplication.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FreyL05c
-
Transfer of Discrete Logarithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FreyL05d
-
Algebraic Realizations of DL Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/FreyL05e
-
Establishing an E-Mail Retention Policy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fried07
-
When Trust Goes Beyond the Border.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fried07a
-
Enhancing Security through Biometric Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fried07b
-
Penetration Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fried07c
-
Application Service Provider Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fried07d
-
Phishing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fried07e
-
Network Security Utilizing an Adaptable Protocol Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fussell07
-
Maintaining Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Fussell07a
-
Usability Engineering of Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gabbard14
-
Temporal Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Galton07
-
Interpreting Mixed Membership.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Galyardt14
-
QoS Control and Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gao06
-
Theoretical Computer Science.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GasarchSCHM99
-
Tree Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gauwin12
-
Batch Production Scheduling in the Process Industries.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gentner0ST04
-
Location-Dependent Service Accounting.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GeorgiadesPAT06
-
Partial Membership and Factor Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GhahramaniMH14
-
Partitioning Finite d-Dimensional Integer Grids with Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GhilezanZP07
-
Middleware for Mobile Entertainment Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GhiniPR06
-
Spine and Radial Drawings.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GiacomoDL13
-
Middleware Design and Implementation for Networked Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GillS05
-
Transmitter Power Control in Wireless Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GitzenisB04
-
Brain-Body Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GnanayuthamG09
-
Managing Security by the Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Goins07
-
Enterprise Assurance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Goins07a
-
Identifying Critical Business Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Goins07b
-
Sarbanes-Oxley Compliance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Goins07c
-
Network Security Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GoinsP07
-
Information Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GoldbergCPFK99
-
PKI Registration.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Golod07
-
Online Dictionary Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gonzalez04
-
Flexible Hybrid Flowshops.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gonzalez04a
-
Introduction, Overview, and Notation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gonzalez07
-
Basic Methodologies and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gonzalez07a
-
Restriction Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gonzalez07b
-
Message Dissemination Using Modern Communication Primitives.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gonzalez07c
-
Distributed Peer-to-Peer Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GoodrichN07
-
Data Structures in JDSL.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GoodrichTV04
-
Low-Energy Instruction Cache Optimization Techniques for Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gordon-RossR12
-
Scheduling with Due Date Assignment.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GordonPS04
-
Location Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GorlachHTM05
-
Mixed Membership Models for Rank Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GormleyM14
-
Approximation in Multiobjective Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GourvesBA07
-
Fundamentals of Cryptography and Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gove07
-
Preserving Public Key Hierarchy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Grabow07
-
Reflective Middleware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GraceB06
-
Scalability of Parallel Programs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GramaK07
-
Electronic Educational Books for Blind Students.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GrammenosSGBS09
-
Designing Universally Accessible Games.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GrammenosSS09
-
Number Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GranthamPGS99
-
Domain-Specific Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GrayNTG0S07
-
The Geographical Diffusion of the Internet in the United States.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GreensteinP04
-
Entertainment Applications of Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Greenwood-EricksenKS14
-
Technology Management and User Acceptance of Virtual Environment Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gross14
-
Computer-Supported Cooperative Work.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GrossF09
-
A Mixed Membership Approach to Political Ideology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GrossM14
-
A Tale of Two (Types Of) Memberships.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GruhlE14
-
Dilation and Detours in Geometric Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GudmundssonK07
-
Histograms, Wavelets, Streams, and Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Guha07
-
Kinetic Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Guibas04
-
QoS Scheduling in Network and Storage Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GulatiV07
-
Multi-Dimensional Packet Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Gupta04
-
Verification Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GuptaBM05
-
Computational Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GuptaJS04
-
Yield Analysis and Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GuptaP08
-
BlueTool.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/GuptaVHPM12
-
Session Maintenance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Haase06
-
Experience with Autonomic Energy Management Policies for JavaEE Clusters.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HagimontBGP12
-
Augmented Cognition for Virtual Environment Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HaleSSS14
-
Wireless LAN Security Challenge.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HalimD07
-
Energy-Efficient Medium Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HalkesL05
-
Blind Detection of Steganographic Content in Digital Images Using Cellular Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hamidi07
-
Security Considerations in Distributed Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hamidi07a
-
Data Structures for Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hammer004
-
Parallel Algorithms for Maximal Independent Set and Maximal Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Han07
-
Making Security Awareness Happen.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hansche07
-
Accessing the Web.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HansonRHT09
-
Application-Tailored Databases for Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HanssonT07
-
Cookies and Web Bugs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HardingRG07
-
It Is All about Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07
-
Policy Development.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07a
-
Controlling FTP.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07b
-
The Reality of Virtual Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07c
-
Putting Security in the Transport.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07d
-
Understanding SSL.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07e
-
Security and Network Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07f
-
What's Not So Simple about SNMP?
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07g
-
Voice Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07h
-
Auditing the Electronic Commerce Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07i
-
Potential Cyber Terrorist Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hare07j
-
Mobile Ad Hoc Communication Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HarroudBK06
-
Introduction to UML and the Modeling of Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HaugenWM05
-
Peer-to-Peer Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HauswirthA04
-
Hierarchical Drawing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HealyN13
-
Nonparametric Mixed Membership Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Heinz14
-
Power Awareness and Management Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HelalA04
-
Pervasive Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HelalL04
-
Stack-Based Buffer Overflows.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Held07
-
Understanding Service Level Agreements.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Held07a
-
Security Architecture and Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HendersonC07
-
Design and Programming of Embedded Multiprocessors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HenrikssonEWKK05
-
The Human Side of Information Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07
-
Risk Management and Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07a
-
Melding Physical Security and Traditional Information Systems Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07b
-
Business Resumption Planning and Disaster Recovery.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07c
-
Business Continuity Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07d
-
An Examination of Firewall Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07e
-
Secure Development Life Cycle.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07f
-
Operations.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henry07g
-
Data Structures in Web Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Henzinger04
-
Building an Effective Privacy Program.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Herold07
-
Training Your Employees to Identify Potential Fraud and How to Encourage Them to Come Forward.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Herold07a
-
Privacy Breach Incident Response.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Herold07b
-
The Common Criteria for IT Security Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Herrmann07
-
Illusory Self-Motion in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HettingerSJK14
-
Subthreshold Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HicksK12
-
Prospectus for a Dense Linear Algebra Software Library.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HidaDLKGBTLLMVLRDKPB07
-
Ecological Modeling and Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HillC07
-
Dual Criteria Optimization Problems for Imprecise Computation Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ho04
-
Analyzing Time-Evolving Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HoX14
-
Modeling Dynamic Systems with Cellular Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HoekstraS07
-
HTTP Digest Authentication for Embedded Web Servers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HoffC05
-
Why Today.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hofmeyr07
-
Finite Elements.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HoitC07
-
Empirical Analysis of Randomized Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HoosS07
-
Stochastic Local Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HoosS07a
-
A Guide to Evaluating Tokens.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hootman07
-
Trust Governance in a Web Services World.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Houser07
-
Blended Threat Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Houser07a
-
Methods of Attacking and Defending Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Houwen07
-
The Security Policy Life Cycle.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Howard07
-
Generalized Buffer Insertion.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HrkicL08
-
PQ Trees, PC Trees, and Planar Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HsuM04
-
Comparative Study of Runtime Systems for Energy-Aware High-Performance Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HsuP12
-
Buffer Insertion Basics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Hu0H08
-
Timing-Driven Interconnect Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HuRS08
-
Buffering in the Layout Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HuS08
-
Approximate Economic Equilibrium Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HuangD07
-
QoS-Aware Resource Discovery in Mobile Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HuangMHV06
-
Wireless Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HudsonC07
-
Sign Language in the Interface.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HuenerfauthH09
-
Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HughesSSH09
-
Security Architectures in Wireless LANs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HuntW05
-
Architectures for Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/HurinkHCHD05
-
Generalized Assignment Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/IbarakiY07
-
Code Development of High-Performance Applications for Power-Efficient Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ibrahim12
-
An Introduction to Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ikbal07
-
ISPs and Accountability.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Imrey07
-
Distributed Trust.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/IoannidisK04
-
Middleware Support for Autonomous Cellphones.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/IslamRZ06
-
Inductance Effects in Global Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ismail08
-
Energy-Aware Web Caching over Hybrid Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/IssarnyS04
-
Systems and Utilities.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ivory04
-
Image Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/IyengarVG04
-
Parallel Algorithms for Volumetric Surface Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JaJaSV07
-
Developing Realistic Continuity Planning Process Metrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jackson07
-
Reengineering the Business Continuity Planning Process.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jackson07a
-
The Role of Continuity Planning in the Enterprise Risk Management Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jackson07b
-
The Business Impact Assessment Process and the Importance of Using Business Process Mapping.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jackson07c
-
The Business Impact Assessment Process.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jackson07d
-
Legal Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jackson10
-
The Role of Information Security in the Enterprise Risk Management Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JacksonC07
-
Hacking Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jahchan07
-
Phishing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JakobssonSS10
-
Context-Aware Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JanaC04
-
Mobile Middleware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JanaC06
-
Haptic Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JanssonR09
-
Models of Embedded Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jantsch05
-
Population Learning Algorithm and Its Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jedrzejowicz05
-
Rate-Based Resource Allocation Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jeffay07
-
Hardware/Software Interface Design for SoC.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JerrayaCW05
-
Overview of Data Centers Energy Efficiency Evolution.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Johnsson12
-
Natural Language and Dialogue Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jokinen09
-
Olfactory Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JonesDOLWP14
-
Branch-and-Bound Algorithms for TotalWeighted Tardiness.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/JougletBC04
-
Scheduling with Resource Constraints.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Jozefowska04
-
CMP Fill Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KahngS08
-
Handheld Devices and Mobile Phones.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KaikkonenKK09
-
Labeling Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KakoulisT13
-
Medium Access Control Mechanisms in Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KalubandiYKL04
-
Quality of Service Routing in Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KamalA04
-
Due Date Quotation Models and Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KaminskyH04
-
Constraint Programming for Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KanetAG04
-
Energy-Adaptive Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kant12
-
Context Middleware for Adaptive Mobile Services.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KanterJJKLLM06
-
Persistent Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kaplan04
-
A Matter of Trust.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kaplan07
-
Vehicle Scheduling Problems in Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KarunoN07
-
Information Modeling on the Web.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kashyap04
-
Biographies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Katz99
-
Motor Impairments and Universal Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Keates09
-
Techniques for Dynamic Adaptation of Mobile Services.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KeeneyCH06
-
Minimizing the Maximum Lateness.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kellerer04
-
Policy and Legislation as a Framework of Accessibility.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KemppainenKY09
-
Virtual Environments and Product Liability.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KennedyKKWB14
-
Force-Directed and Other Continuous Placement Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KenningsV08
-
Visually Induced Motion Sickness: Causes, Characteristics, and Countermeasures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KeshavarzHL14
-
Virtual Environment Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kessler14
-
Mediators for Querying Heterogeneous Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KhalafCNTMD04
-
Game Theoretical Solutions for Data Replication in Distributed Computing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KhanA07
-
Basic Algorithmic Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KhandelwalS08
-
The Foundations of Autonomic Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KharghariaHLP05
-
Virtual Environment-Assisted Teleoperation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KheddarCC14
-
Location-Based Service Differentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KhoslaP06
-
Greedy Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KhullerRY07
-
Broadcasting on Networks of Workstations.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KhullerWK07
-
A Scheme for Nomadic Hosts Location Management Using DNS.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KhuranaME04
-
Electronic Voting.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kiayias10
-
DEVS Formalism for Modeling of Discrete-Event Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kim07
-
Power Saving by Task-Level Dynamic Voltage Scaling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kim12
-
Dynamic Thermal Management for High-Performance Storage Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KimGS12
-
Reference Middleware Architecture for Real-Time and Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KimH07
-
Scheduling in Bluetooth Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KimL04
-
Power-Aware Resource Management Techniques for Low-Power Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KimR07
-
Multi-Robot and Multi-Camera Patrolling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KingVGMRIMNMN12
-
Sensory Impairments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KinzelJ09
-
Sensor and Data Fusion.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KleinMF12
-
Top Management Support Essential for Effective Information Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KnappM07
-
Force-Directed Drawing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kobourov13
-
Application Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kobus07
-
Global Interconnect Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KohYC08
-
Edge-Disjoint Paths and Unsplittable Flow.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kolliopoulos07
-
Atomic Selfish Routing in Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KontogiannisS07
-
Scheduling Overloaded Real-Time Systems with Competitive/Worst Case Guarantees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KorenS04
-
An Evolutionary Approach to Problems in Electrical Engineering Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Korousic-SeljakSP05
-
Simulated Annealing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KorstAM07
-
Approximating Minimum-Cost Connectivity Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KortsarzN07
-
Seamless Connectivity in Infrastructure-Based Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KounavisC06
-
Universal Access in Public Terminals.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kouroupetroglou09
-
It's All About Power.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KovacichJL07
-
Implementing Kerberos in Distributed Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KovaraK07
-
Computing with Mobile Agents in Distributed Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KranakisKR07
-
Routing and Traversal via Location Awareness in Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KranakisS05
-
Bits to Bytes to Boardroom.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Krause07
-
Ethics and the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Krause07a
-
Corporate Governance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Krehnke07
-
IT Governance Institute (ITGI) Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Krehnke07a
-
Configuration Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Krehnke07b
-
Sensitive or Critical Data Access Controls.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Krehnke07c
-
Formulating an Enterprise Information Security Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KrehnkeK07
-
Certification and Accreditation Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KrehnkeK07a
-
Spatio-Temporal Connectionist Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kremer07
-
LP Rounding and Extensions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KrishnamurtiG07
-
Probabilistic Greedy Heuristics for Satisfiability Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KrishnamurtiK07
-
Fair Sequences.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kubiak04
-
Partitioning and Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kucar08
-
What Happened?
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kuchta07
-
Internet-Based Solutions for Manufacturing Enterprise Systems Interoperability - A Standards Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KulvatunyouJI04
-
Efficient Data Caching and Consistency Maintenance in Wireless Mobile Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KumarD06
-
Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KumarTS04
-
QoS Support and an Analytic Study for USB 1.x/2.0 Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KuoHLP07
-
Applying Timed Automata to Model Checking of Security Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KurkowskiP12
-
Age-Related Differences in the Interface Design Process.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kurniawan09
-
Computational Biology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/KurtzL04
-
Bus and Train Driver Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Kwan04
-
Evolving Human-Robot Communication through VE-Based Research and Development.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LackeyBROF14
-
Elliptic Curve Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lambert07
-
Mathematical Countermeasures against Side-Channel Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lange05
-
Random Numbers Generation and Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LangeLW05
-
Combinatorial and Algorithmic Issues for Microarray Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LangstonCM07
-
Overlapping Clustering Methods for Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LatoucheBA14
-
Code-on-Demand and Code Adaptation for Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LauBKSWW06
-
Design of Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LavagnoP05
-
Quasi-Static Scheduling of Concurrent Specifications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LavagnoPKW05
-
Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LavagnoZ05
-
Internet Directory Services Using the Lightweight Directory Access Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LavenderW04
-
Motion Sickness Symptomatology and Origins.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lawson14
-
Motion Sickness Scaling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lawson14a
-
Perception of Body Motion.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LawsonR14
-
Analysis of Development of Dementia through the Extended TGoM Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lecci14
-
Interval, Segment, Range, and Priority Search Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lee04
-
Machine Scheduling with Availability Constraints.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lee04a
-
An Overview of Intrusion Detection Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lee04b
-
Temporal Control in Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeeF07
-
Multimodeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeeFP07
-
Introduction and Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeeLS07
-
Models for Advancing PRAM and Other Algorithms into Parallel Programs for a PRAM-On-Chip Platform.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeeVC07
-
Multicast Congestion in Ring Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeeYH07
-
Scheduling in Grid Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeeZ07
-
Evolutionary Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeguizamonAB07
-
What a Computer Security Professional Needs to Know about E-Discovery and Digital Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leibrock07
-
Drawing Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leipert04
-
Single Sign-On for the Enterprise.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leo07
-
Point Counting on Elliptic and Hyperelliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LercierLV05
-
System Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LetichevskyKWV05
-
Introduction and Notation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leung04
-
A Tutorial on Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leung04a
-
Some Basic Scheduling Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leung04b
-
Minimizing TotalWeighted Error for Imprecise Computation Tasks and Related Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leung04c
-
Approximation Algorithms for Imprecise Computation Tasks with 0/1 Constraint.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leung07
-
Imprecise Computation Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leung07a
-
Imprecise Computation Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Leung07b
-
R-trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LeuteneggerL04
-
Cognitive Disabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lewis09
-
Fast and Scalable Parallel Matrix Multiplication and Its Applications on Distributed Memory Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Li07
-
Algorithms and Analysis of Energy-Efficient Scheduling of Parallel Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Li12
-
Online Job Scheduling Algorithms under Energy Constraints.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Li12a
-
Broadcasting and Topology Control in Wireless Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LiS05
-
Approximation Algorithms and Algorithm Mechanism Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LiW07
-
Mobile Middleware for Automotive Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lilli06
-
System Development Security Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LimB07
-
System Development Security Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LimB07a
-
Collision Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LinM04
-
Virtual Environments as a Tool for Conceptual Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LindgrenMH14
-
Proximity Drawings.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Liotta13
-
Voice over WLAN.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lipiczky07
-
Modeling Distributed Applications for Mobile Ad Hoc Networks Using Attributed Task Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LittleBK04
-
Closed-Circuit Television and Video Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Litzau07
-
Parallel Data Mining Algorithms for Association Rules and Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LiuLCL07
-
Web Crawling and Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LiuM04
-
Metrics Used in Physical Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LiuS08
-
Adaptive Power Management for Energy Harvesting Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LuLWQ12
-
Statecharts.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LuY12
-
Background on p-adic Numbers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Lubicz05
-
Cohomological Background on Point Counting.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LubiczV05
-
Optimization Techniques for Circuit Design Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Luo08
-
Ad Hoc Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/LuoY0YKLZ04
-
Perspectives on Robust Resource Allocation for Heterogeneous Parallel and Distributed Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MaciejewskiAS07
-
Mixed Membership Matrix Factorization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MackeyWJ14
-
Design of Multithreaded Algorithms for Combinatorial Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MadduriFCB07
-
IT-Based Open Service Delivery Platforms for Mobile Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MagedanzS06
-
The Web as a Dynamic Graph.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Maheshwari04
-
Eye Tracking.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MajarantaBD09
-
End Node Security and Network Access Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Majstor07
-
WLAN Security Update.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Majstor07a
-
Storage Area Networks Security Protocols and Mechanisms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Majstor07b
-
Multicommodity Flow Algorithms for Buffered Global Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MandoiuKAZ07
-
Practical Approximations of Steiner Trees in Uniform Orientation Metrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MandoiuKZ07
-
QoS Multimedia Multicast Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MandoiuOZ07
-
Finite State Models for XML Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mani12
-
Mixed Membership Trajectory Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Manrique-Vallier14
-
Prize-Collecting Traveling Salesman and Related Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Marchetti-SpaccamelaBLA07
-
Visible Language for Global Mobile Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Marcus09
-
International and Intercultural User Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MarcusR09
-
Modeling Cellular Networks for Mobile Telephony Services.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MarsanM05
-
Principles of Tabu Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MartiLG07
-
System-on-Chip and Network-on-Chip Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Martin05
-
Online QoS Adaptation with the Flexible Time-Triggered (FTT) Communication Paradigm.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MartinsMFFACSP07
-
Physical Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Matthews07
-
Medical Imaging and Diagnosis Using Genetic Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MaulikBD05
-
Use of Virtual Worlds in the Military Services as Part of a Blended Learning Strategy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MaxwellGF14
-
Security and Privacy for Universal Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Maybury09
-
Enterprise Security Management Program.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McBride07
-
ISO/OSI and TCP/IP Network Model Characteristics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McBride07a
-
Building and Assessing Security in the Software Development Lifecycle.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McBride07b
-
XML and Information Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McClintock07
-
Perimeter Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McCoy07
-
Security as a Value Enhancer in Application Systems Development.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McCulley07
-
Patch Management 101.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McGhie07
-
Building an Effective and Winning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McGhie07a
-
Identity Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McGhie07b
-
Secure Web Services.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McGhie07c
-
Health Insurance Portability and Accountability Act Security Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McGhie07d
-
Principles for Designing Effective 3D Interaction Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McMahanKB14
-
Computer Graphics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McMullinR04
-
How to Work with a Managed Security Service Provider.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/McQuillan07
-
Internet Computing Support for Digital Government.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MedjahedRBO04
-
Power-Aware Modeling and Autonomic Management Framework for Distributed Computing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MehrotraDAT12
-
Basic Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mehta04
-
Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mehta04a
-
Layout Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mehta04b
-
Recent Advancesin Floorplanning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MehtaF08
-
Basic Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MehtaZ08
-
A Programming Model and Architectural Extensions for Fine-Grain Parallelism.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MendelsonSGS07
-
Coding Theory And Cryptology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MenezesO99
-
Best Practice in Design for All.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Miesenberger09
-
Tool Environments to Measure Power Consumption and Computational Performance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MinartzMKK0012
-
Stochastic Analysis of Priority-Driven Periodic Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MirabellaLDBKGML07
-
Green TCAM-Based Internet Routers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MishraS12
-
Intra-Piconet Polling Algorithms in Bluetooth.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MisicM05
-
Validating Your Business Partners.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Misrahi07
-
Testing Business Continuity and Disaster Recovery Plans.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mitts07
-
Web Usage Mining and Personalization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mobasher04
-
Issues in Scalable Clustered Network Architecture for Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MohYL04
-
Power-Aware Middleware for Mobile Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MohapatraRV12
-
Concurrent Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MoirS04
-
The Pinwheel.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MokC04
-
Dynamic Simulation with Energy Systems Language.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Montague07
-
Setting Parameter Values for Parallel Genetic Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Moore05
-
Solving the Partitioning Problem in Distributed Virtual Environment Systems Using Evolutive Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MorilloFO05
-
Hash Tables.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Morin04
-
Enabling Safer Deployment of Internet Mobile Code Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Moritz07
-
Liability for Lax Computer Security in DDoS Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Morrow07
-
Understanding and Exploiting User Behavior for Energy Saving.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Moshnyaga12
-
Mobile Middleware and Context for Service Composition.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MostefaouiMN06
-
Hybrid Dynamic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mosterman07
-
Conversational Agents.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MottLB04
-
Esterel and the Semantics of Causality.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Mousavi12
-
Succinct Representation of Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Munro004
-
Cognitive Aspects of Virtual Environment Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/MunroPBC14
-
Mobile Middleware for Rescue and Emergency Scenarios.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Munthe-KaasDGPPSS06
-
Ownership and Custody of Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07
-
Principles and Applications of Cryptographic Key Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07a
-
Common System Design Flaws and Security Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07b
-
Security of Communication Protocols and Services.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07c
-
Instant Messaging Security Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07d
-
Security for XML and Other Metadata Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07e
-
Reflections on Database Integrity.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07f
-
Enterprise Security Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Murray07g
-
LEDA, a Platform for Combinatorial and Geometric Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Naher04
-
Improving Website Performance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NahumITS04
-
Web Caching, Consistency, and Content Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NahumITS04a
-
Location-Dependent Database Access.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NajjarKD06
-
Information Fusion Algorithms for Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NakamuraFL05
-
Fundamental Algorithms on the Reconfigurable Mesh.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Nakano07
-
Placement.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NamV08
-
Toward Sustainable Portable Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NamboodiriJ12
-
Ultralow-Power Implantable Electronics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NarasimhanB12
-
Middleware for Wearable Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Narayanaswami06
-
ISPs and Denial-of-Service Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Narayanaswamy07
-
Multichannel MAC Protocols for Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NasipuriD05
-
Minimization of SADMs in Unidirectional SONET/WDM Rings Using Genetic Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Naskar0BMB05
-
Radio Resource Management Algorithms in Wireless Cellular Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NasserH05
-
Fault-Tolerant Services for Safe In-Car Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NavetS05
-
Binary Space Partitioning Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Naylor04
-
Advanced Evolutionary Algorithms for Training Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NebroLLAC05
-
Optimal Adaptive Pattern-Matching Using Finite State Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NedjahM12
-
Auditory Interfaces and Sonification.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NeesW09
-
Adaptive Hypermedia and Adaptive Web.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NejdlB04
-
Software Engineering Institute Capability Maturity Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Nelson07
-
Bio-Inspired Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NevesSSC05
-
Salvaging Resources by Discarding Irreconcilably Conflicting Transactions in Firm Real-Time database Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NgHL07
-
Synthesis of Multiple-Valued Circuits by Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NgomS05
-
On the Computing Capacity of Multiple-Valued Multiple-Threshold Perceptrons.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NgomZS05
-
Managing Unmanaged Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NguyenS07
-
Fast Arithmetic in Hardware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NguyenW05
-
Security Patch Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Nicastro07
-
People, Processes, and Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Nicastro07a
-
Distributed Algorithms for Some Fundamental Problems in Ad Hoc Mobile Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NikoletseasS05
-
Rectangular Drawing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Nishizeki013
-
A Novel Methodology for the Design of Application-Specific Instruction-Set Processors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NohlBH05
-
Real-Time in Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NolinHN05
-
Discrete Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NovickHCSEMB99
-
Automatic Hierarchical Scanning for Windows Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/NtoaSS09
-
Discrete-Event Simulation of Continuous Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Nutaro07
-
Computer Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/OhrimenkoPP13
-
Functional Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Okasaki04
-
Transitional Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Olariu07
-
Mesh-Based Parallel Algorithms for Ultra Fast Computer Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Olariu07a
-
Approximation Algorithm for Clustering in Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/OlariuW07
-
Energy-Efficient Data Transfers in Large-Scale Distributed Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/OrgerieL12
-
Networks And Flows.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/OrlinASCGK99
-
Independent Viewpoint Silhouette-Based Human Action Modeling and Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/OrriteMHRV12
-
Layout Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Otten08
-
Multidomain Modeling with Modelica.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/OtterME07
-
Global Routing Formulation and Maze Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/OzdalW08
-
Theory and Practice for Simulation Interconnection.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Page07
-
Bayesian Nonnegative Matrix Factorization with Stochastic Variational Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PaisleyBJ14
-
Video Summarization and Significance of Content.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PalGP12
-
Real-Time Scheduling Algorithms for Multiprocessor Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Palis07
-
Timing-Driven Placement.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PanHR08
-
Distributed Approximation Algorithms via LP-Duality and Randomization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PanconesiGD07
-
Coupling Noise.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PandaZB08
-
Energy-Efficient Network-on-Chip Architectures for Multi-Core Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PandeGDC12
-
Hypergraph Partitioning and Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PapaM07
-
Securing Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PapadimitratosH04
-
TCP Developments in Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PapanastasiouOM05
-
Stochastic Local Search Algorithms for Multiobjective Combinatorial Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PaqueteS07
-
Micropayment Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Parhonyi10
-
Trust in Pervasive Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ParkerPPJF06
-
Hash Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pasley07
-
Application Layer.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pasley07a
-
VPN Deployment and Evaluation Strategy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pasley07b
-
Interface Specification and Converter Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Passerone05
-
Design Issues for Networked Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PatelGSG05
-
Issues and Solutions in Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PatelMG05
-
Markup Languages in Human-Computer Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PaternoS09
-
Planarity Testing and Embedding.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Patrignani13
-
A QoS Framewor kfor Multimedia Communication for Wireless Mobile Ad Hoc Defense Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PaulSSG06
-
Membrane Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PaunI07
-
Memetic Algorithms for Energy-Aware Computation and Communications Optimization in Computing Clusters.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PeceroDGB12
-
Broadcast and Content Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pehlivanoglu10
-
Wireless Sensor Network Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PerilloH05
-
Model Execution.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Perumalla07
-
Universal Access to Multimedia Documents.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Petrie0V09
-
The Evaluation of Accessibility, Usability, and User Experience.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PetrieB09
-
Neural Networks in Video Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Petrosino12
-
University Timetabling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PetrovicB04
-
Theories and Methods for Studying Online Communities for People with Disabilities and Older People.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PfeilZ09
-
Process-Algebraic Analysis of Timing and Schedulability Properties.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PhilippouS07
-
A Network of Audio and Video Sensors for Monitoring Large Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PiciarelliCMF12
-
Dynamic Modeling in Management Science.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pidd07
-
Wireless Penetration Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pilewski07
-
Computer Crime.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pilewski07a
-
Creating a Secure Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PilewskiG07
-
Offline Deterministic Scheduling, Stochastic Scheduling, and Online Deterministic Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Pinedo04
-
Seamless Consistency.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PitouraST06
-
Information Visualization in Virtual Environments: Trade-Offs and Guidelines.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Polys14
-
Mathematics and Accessibility.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PontelliKG09
-
Information Security Governance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Poore07
-
Cryptographic Transitions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Poore07a
-
Cryptographic Key Management Concepts.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Poore07b
-
Jurisdictional Issues in Global Transmissions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Poore07c
-
Mobile Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Popescu-ZeletinASR06
-
Multimodal Interaction Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PopescuTB14
-
Elimination Structures in Scientific Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PothenT04
-
A Hierarchical Performance Model for Reconfigurable Computers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PrasannaS07
-
Approximation Algorithms for Multilevel Graph Partitioning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PreisMS07
-
Digital Signatures in Relational Database Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Prevost07
-
Developing and Conducting a Security Test and Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Price07
-
Avoiding Buffer Overflow Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Price07a
-
Online Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PruhsST04
-
Decomposable BSP.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/PucciPB07
-
Scheduling Problems in the Airline Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/QiYY04
-
Dynamic Updating DNA Computing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/QiuL05
-
Quantum Finite Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/QiuLMG12
-
Linear Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rabani07
-
Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RaghavanGWG04
-
Evolution of Energy Awareness Using an Open Carbon Footprint Calculation Platform.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RahmanAOZ012
-
Deterministic and Randomized Sorting Algorithms for Parallel Disk Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rajasekaran07
-
Randomized Packet Routing, Selection, and Sorting on the POPS Network.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RajasekaranD07
-
Volcano - Enabling Correctness by Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rajnak05
-
Power Aware Embedded Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RamachandranJ05
-
Real-Time Data Services for Automotive Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RamamrithamRS07
-
Temporal Consistency Maintenance for Real-Time Update Transactions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RamamrithamX07
-
Data Structures for Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Raman04
-
Deep Packet Inspection Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Ramos07
-
Skew Heaps.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rangan04
-
Randomized Dictionary Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rangan04a
-
Multiple Access Protocols and Scheduling Algorithms for Multiple Channel Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RangnekarWS005
-
Introduction to Video Surveillance Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Raty12
-
Topology Control Problems for Wireless Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RaviL07
-
Safe and Structured Use of Interrupts in Real-Time and Embedded Software.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Regehr07
-
Mobile Middleware for Integration with Enterprise Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Reich06
-
Distributed Localization Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ReijersL05
-
Energy-Aware SIMD Algorithm Design on GPU and Multicore Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RenS12
-
Cybertherapy, Cyberpsychology, and the Use of Virtual Reality in Mental Health.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RenaudBCB09
-
Methods of Auditing Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RiceB07
-
Overlay Networks for Peer-to-Peer Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RichaS07
-
Workplace Violence.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Richards07
-
Mediators for Querying Heterogeneous Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Risch04
-
Messaging in Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RittleZAS07
-
QoS Provisioning in Multi-Class Multimedia Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RizviO05
-
Clinical Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RizzoLK14
-
Minimum Steiner Tree Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RobinsZ08
-
Modeling Human Interaction in Organizational Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Robinson07
-
Energy-Efficient Online Provisioning for HPC Workloads.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RoderoPQGP12
-
Packet Sniffers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rodgers07
-
Social Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rogers07
-
DCSA.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rogers07a
-
Agent-Oriented Modeling in Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RohlU07
-
Developing Mobile Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RomanMP04
-
Process Algebra.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RoodaBB07
-
Modeling and Analysis of Manufacturing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RoodaL07
-
Approximation Algorithms for Facility Dispersion.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RosenkrantzRT07
-
A Look at RFID Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rothke07
-
An Overview of Quantum Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rothke07a
-
A Look at the Advanced Encryption Standard (AES).
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rothke07b
-
A Look at Java Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rothke07c
-
Wire Sizing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RoyC08
-
Partitioning-Based Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RoyM08
-
Effectively Managing Data on a Grid.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/RubyM07
-
Tree Drawing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rusu13
-
The Internet Policy and Governance Ecosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rutkowski04
-
Trees with Minimum Weighted Path Length.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rytter04
-
Parallel Algorithms on Strings.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Rytter07
-
Trusted Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SadeghiW10
-
Digital Rights Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Safavi-NainiS10
-
Systems Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sage07
-
Business Process.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SahaiC04
-
Analysis of Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sahni04
-
Leftist Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sahni04a
-
Double-Ended Priority Queues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sahni04b
-
Tries.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sahni04c
-
Rounding, Interval Partitioning, and Separation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sahni07
-
IP Router Tables.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SahniKL04
-
The Master-Slave Scheduling Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SahniV04
-
Rip-Up and Reroute.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Salowe08
-
Locating Mobile Objects.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SamarasPK04
-
Multidimensional Spatial Data Structures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Samet04
-
Routing and Mobility Management in Wireless Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sankar04
-
Distributed Computing in the Presence of Mobile Faults.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SantoroW07
-
Toward a Software Infrastructure for Ubiquitous Disappearing Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Saracco06
-
Geyser.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SasakiAUKNN12
-
Abstract Interaction Objects in User Interface Programming Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Savidis09
-
Training through Entertainment for Learning Difficulties.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SavidisGS09
-
Unified Design for User Interface Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SavidisS09
-
Software Requirements for Inclusive User Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SavidisS09a
-
A Unified Software Architecture for User Interface Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SavidisS09b
-
A Decision-Making Specification Language for User Interface Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SavidisS09c
-
Developing Inclusive e-Training.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SavidisS09d
-
Splay Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Saxena04
-
Routing in Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SaxenaMG05
-
Hoarding in Mobile Computing Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Saygin04
-
Sensor Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Schaefer05
-
Dynamic QoS Management in Distributed Real-Time Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SchantzL07
-
Industrial Floorplanning and Prototyping.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Scheffer08
-
Modeling and Computational Lithography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Schellenberg08
-
Information Security for Mergers and Acquisitions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Schiller07
-
Counter-Economic Espionage.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Schiller07a
-
Modeling Causality with Event Relationship Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Schruben07
-
Internet Telephony.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Schulzrinne04
-
Intellectual Property, Liability, and Contract.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Schwerzmann04
-
Geographic Services for Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SeadaH05
-
Difference Equations as Discrete Dynamical Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sedaghat07
-
Geographic Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SeegerW04
-
The Evolution of Real-Time Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SenguptaK07
-
Design Issues in Secure Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SerpanosVF05
-
Convex Quadratic Relaxations in Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sethuraman04
-
Platform-Based Design for Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SgroiSBPC05
-
Real-Time Synchronization Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShaC04
-
Polynomial-Time Approximation Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShachnaiT07
-
Discriminative Mixed Membership Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShanB14
-
Battery Power Management in Portable Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SharmaC04
-
Technology Convergence and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Shaurette07
-
Make Security Part of Your Company's DNA.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Shaurette07a
-
Contingency at a Glance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShauretteS07
-
Estimation of Routing Congestion.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShelarS08
-
Cluster-Based and Power-Aware Routing in Wireless Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SheltamiM05
-
Finding Most Vital Edges in a Graph.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Shen07
-
On Simulation of Simulink¬ģ Models for Model-Based Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShenoyMM07
-
The Business Case for Information Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sherizen07
-
Immersive Visualization for the Geological Sciences.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShermanKBWSWLCSC14
-
Thermal and Power-Aware Task Scheduling and Data Placement for Storage Centric Datacenters.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShiS12
-
Embedding Mobility in Multimedia Systems and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Shin07
-
Compositional Real-Time Schedulability Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShinL07
-
Large-Scale Global Placement.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShinnerlC07
-
Information Security Policies from the Ground Up.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Shorten07
-
Population Stratification with Mixed Membership Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ShringarpureX14
-
Cyber-Risk Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SiegelSS07
-
Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SiegelmannDL07
-
Wearable Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Siewiorek04
-
Power Management for Mobile Computers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SiewiorekWSM04
-
Ant Colonies and the Mesh-Partitioning Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SilcKR05
-
Insecurity by Proxy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Silverman07
-
The Synchronous Hypothesis and Synchronous Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SimoneTP05
-
Technological Considerations in the Design of Multisensory Virtual Environments: How Real Does It Need to Be?
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SimpsonCGW14
-
Interpretability of Mixed Membership Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SingerC14
-
Introduction to Web Semantics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Singh04
-
Concepts and Practice of Personalization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SinghA04
-
Distributed Collaborative Computation in Wireless Sensor Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SinghP05
-
Regulatory Compliance.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SionW10
-
The Ethical and Legal Concerns of Spyware.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SipiorWR07
-
Circular Drawing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SixT13
-
Secure Voice Communications (VoI).
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Skerpac07
-
Hacker Tools and Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Skoudis07
-
A New Breed of Hacker Tools and Defenses.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Skoudis07a
-
Hacker Attacks and Defenses.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Skoudis07b
-
Open Source versus Closed Source.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Skoudis07c
-
The Evolution of the Sploit.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Skoudis07d
-
The Nebulous Zero Day.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Slade07
-
The Well-Separated Pair Decomposition and Its Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Smid07
-
Military Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Smith07
-
Hardware Security Modules.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Smith10
-
Local Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Solis-Oba07
-
Design and Validation Process of In-Vehicle Embedded Electronic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SongS05
-
Pervasive Application Development.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SorokerCB04
-
Simulating the Strategic Adaptation of Organizations Using OrgSwarm.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SousaBSOC05
-
A Generic Primal-Dual Approximation Algorithm for an Interval Packing and Stabbing Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SpieksmaK07
-
Randomized Approximation Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SpirakisN07
-
Parallel Algorithms via the Probabilistic Method.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SrivastavK07
-
Contingency Planning Best Practices and Program Maturity.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stacey07
-
Centralized Authentication Services (Radius, Tacacs, Diameter).
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stackpole07
-
Application-Layer Security Protocols for Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stackpole07a
-
An Introduction to IPSec.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stackpole07b
-
Beyond Information Security Awareness Training.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stahl07
-
An Emerging Information Security Minimum Standard of Due Care.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StahlB07
-
Auditing Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stanek07
-
Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stankovic07
-
Virtual Environments in the Twenty-First Century.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StanneyHZ14
-
Virtual Environment Usage Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StanneyKH14
-
Model-Based Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stary09
-
Data Structure Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stasko04
-
Physical Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Steinke07
-
Universal Access and Design for All in the Evolving Information Society.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stephanidis09
-
Emerging Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stephanidis09a
-
Multiagent Systems for Internet Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StephensH04
-
Cost-Efficient Multicast Routing in Ad Hoc and Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StojmenovicR07
-
Applications of Virtual Environments: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StoneH14
-
Discrete And Computational Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StreinuBPDCKAF99
-
Ambient Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StreitzP09
-
How To Begin A Non-Liturgical Forensic Examination.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Stucki07
-
Stochastic Local Search Algorithms for the Graph Coloring Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/StutzleDC07
-
Overview of Time Synchronization Issues in Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Su05
-
Power Grid Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SuN08
-
Network and Service Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Subramanian04
-
Location Management Techniques for Mobile Computing Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SubrataZ04
-
Location Management Algorithms Based on Biologically Inspired Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SubrataZ05
-
Timed Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SunLD12
-
Energy-Aware Mobile Multimedia Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SunWZWC12
-
Metacomputing and Grid Frameworks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sunderam04
-
Floorplanning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Sur-Kolay08
-
Placement Using Simulated Annealing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Swartz08
-
Hierarchical Mixed Membership Stochastic Blockmodels.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SweetTJ14
-
Scheduling and Rescheduling with Use of Cellular Automata.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SwiecickaZS05
-
Medium Access Control (MAC) Protocols for Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Syrotiuk05
-
Hardness of Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Szegedy07
-
Metamodeling Languages and Metaprogrammable Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/SztipanovitsNE07
-
Portfolio Trading.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Szydlo10
-
Embedded Web Servers in Distributed Control Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Szymanski05
-
An Overview of Neural Networks Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TaheriZ05
-
A Hybrid Evolutionary Algorithm for Knowledge Discovery in Microarray Experiments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TalbiJKD05
-
Frameworks for the Design of Reusable Parallel and Distributed Metaheuristics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TalbiMC05
-
Parallel Hybrid Multiobjective Metaheuristics on P2P Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TalbiMMW05
-
A Cooperative Parallel Metaheuristic Applied to the Graph Coloring Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TalbiW05
-
Parallel Cellular Algorithms and Programs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Talia05
-
Energy Efficient Selective Cache Invalidation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Tan04
-
Optimum Communication Spanning Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TangCW07
-
Distributed Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Taylor07
-
X Architecture Place and Route.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TeigHGFF08
-
Avatar Control in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TemplemanPD14
-
Scheduling in Secondary Storage Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Thomasian04
-
Regular Path Queries on Graph-Structured Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Thomo012
-
Comparing Firewall Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Thorsheim07
-
Node Activity Scheduling Algorithms in Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TianG05
-
Multicast Topology Inference and Its Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TianS07
-
Smart Cards.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Tiller07
-
Message Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Tiller07a
-
IPSec Virtual Private Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Tiller07b
-
Packet Sniffers and Network Monitors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TillerF07
-
Cycle Shop Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Timkovsky04
-
Reducibility among Scheduling Classes.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Timkovsky04a
-
Computer Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Tippett07
-
Types of Information Security Controls.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Tipton07
-
Maintaining Management's Commitment.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Tompkins07
-
Overlay Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Touch04
-
Dynamic Reconfiguration on the R-Mesh.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/TrahanV07
-
Wired and Wireless Physical Layer Security Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Trulove07
-
Security for Broadband Internet Access Users.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Trulove07a
-
Gesture Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Turk14
-
Flexible Hybrid Flowshops.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vairaktarakis04
-
Accessible and Usable Design of Information and Communication Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vanderheiden09
-
Standards and Guidelines.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vanderheiden09a
-
Managing the Response to a Computer Security Incident.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vangelos07
-
Dependable Message Delivery to Mobile Units.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/VargheseRM04
-
Technical Solutions for Mobile Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Varshney05
-
Parallel Genetic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vega05
-
Seamless Service Access via Resource Replication.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/VeigaF06
-
An Overview of the Location Management Problem for Mobile Computing Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/VeigaTZ06
-
Sensitivity Analysis in Combinatorial Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/VenkatachalamF07
-
Arithmetic of p-adic Numbers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vercauteren05
-
Internet-Based Enterprise Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vernadat04
-
State Space Abstractions for Time Petri Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/VernadatB07
-
Optimizing Computing and Energy Performances in Heterogeneous Clusters of CPUs and GPUs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/VialleCJ12
-
Direct Effects of Virtual Environments on Users.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ViirrePC14
-
Planar Straight-Line Drawing Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vismara13
-
Geometric and Spatial Data Structures in External Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Vitter04
-
Virtual Auditory Displays.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/VorlanderS14
-
What Is Architecture?
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WaclawskyC04
-
Interpersonal Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Waller09
-
Tools for Inclusive Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WallerC09
-
Internet Messaging.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WamsS04
-
Performance Analysis of Distributed Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WandelerT05
-
Petri Nets for Dynamic Event-Driven System Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wang07
-
Geometrical Spanner for Wireless Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WangL07
-
Energy-Aware Scheduling and Dynamic Reconfiguration in Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WangQM12
-
Optical Transpose Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WangS07
-
QoS-Enabled Component Middleware for Distributed Real-Time and Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WangSDG07
-
Slicing Floorplans.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WangW08
-
Eye Tracking in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WangW14
-
Measurement of Visual Aftereffects following Virtual Environment Exposure: Implications for Minimally Invasive Surgery.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WannWWCLM14
-
Data Structures in C++.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Weiss04
-
Computer Crime Investigation and Computer Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Welch07
-
Adapting to Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WelchM14
-
Online Marketplaces.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wellman04
-
Speed Scaling.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WiermanAL12
-
XML Core Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wilde04
-
Advanced XML Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wilde04a
-
Determining Bounds on Execution Times.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wilhelm05
-
Software Engineering for Internet Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Williams04
-
Physical Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Williams07
-
Identity Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wilton10
-
Field-Programmable Gate Array Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WiltonCCP08
-
Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Witten04
-
E-Learning Technology for Improving Business Performance and Lifelong Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Woelk04
-
Hardware/Software Codesign.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wolf07
-
Real-Time Data Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WolfeDF07
-
Graph Drawing and Cartography.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wolff13
-
A Survey of Scatternet Formation Algorithms for Bluetooth Wireless Personal Area Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WongZL05
-
Mixed Membership Classification for Documents with Hierarchically Structured Labels.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WoodP14
-
Analytic Mobility Models of PCS Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wu04
-
NTP VoIP Test Bed.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WuCPLC05
-
Mobility Control and Its Applications in Mobile Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WuD05
-
Approximations for Steiner Minimum Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WuD07
-
Bluetooth Voice Access Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/WuT05
-
Toward Enforcing Security Policy.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Wylder07
-
References.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X05
-
Contributors.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X07
-
Glossary.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X07a
-
Petri Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X12
-
Index.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X12a
-
Index.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X12b
-
Index.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X12c
-
Color Insert.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/X12d
-
Color Quantization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Xiang07
-
QoS Enhancements of the Distributed IEEE 802.11 Medium Access Control Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/XuHT05
-
Practical Algorithms for Two-Dimensional Packing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YagiuraNI07
-
Biology-Derived Algorithms in Engineering Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Yang05
-
Large-Scale Regular Expression Matching on FPGA.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YangP12
-
PBX Firewalls.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Yarberry07
-
Auditing the Telephony System.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Yarberry07a
-
Mobile Middleware for Situation-Aware Service Discovery and Coordination.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YauH06
-
Human Implications of Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YeeC04
-
Counting Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YellenPRATBS99
-
Distributed Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YianilosS04
-
Systemic Matters.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Yolum04
-
Routing Real-Time Messages on Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Young04
-
Internet-Based Games.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Young04a
-
New Trends in Information Risk Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Young07
-
Floorplan Representations.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Young08
-
Cellular Automata, PDEs, and Pattern Formation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YoungY05
-
Providing a Green Framework for Cloud Data Centers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YoungeLWF12
-
Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Yu04
-
Cross-Layer Optimization for Energy-Efficient Information Processing and Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YuP05
-
Cache Invalidation Schemes in Mobile Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/YuenLC04
-
Vision-Based Hand Gesture Recognition for Human-Computer Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZabulisBA09
-
Field-Based Motion Coordination in Pervasive Computing Scenarios.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZambonelliM05
-
B Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Zhang04
-
Approximation Algorithms for the Selection of Robust Tag SNPs.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhangCHC07
-
Energy Minimization for Multiprocessor Systems Executing Real-Time Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhangHC12
-
Scheduling Malleable Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhangJ07
-
Optimal Parallel Scheduling Algorithms in WDM Packet Interconnects.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhangY07
-
On Analyzing Semidefinite Programming Relaxations of Complex Quadratic Optimization Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhangYS07
-
Greedy Algorithms for Metric Facility Location Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhangYS07a
-
Finite State Automata in Compilers.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Zhao12
-
Minimum-Edge Length Rectangular Partitions.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhengG07
-
Non-Repudiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/Zhou10
-
Reliability-Aware Power Management for Real-Time Embedded Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhuA12
-
Asymptotic Polynomial-Time Approximation Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhuMO07
-
Discriminative Training of Mixed Membership Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZhuX14
-
Genetic Algorithms for Scheduling in Grid Computing Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZomayaC05
-
An Overview of Mobile Computing Algorithmics.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/ZomayaO07
-
Semistructured Data in Relational Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/crc/hawathe04
-
Encyclopedia of Cryptography and Security
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/2005
-
Encyclopedia of Cryptography and Security, 2nd Ed.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/2011
-
Three-Factor Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Abu-Nimeh11
-
Statistical Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/AdamLVS11
-
Attributes management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05
-
Authorization architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05a
-
Authorization Policy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05b
-
Authorizations management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05c
-
Certificate.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05d
-
Certificate Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05e
-
Certificate Revocation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05f
-
Certification Authority.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05g
-
Dictionary Attack (II).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05h
-
Entitlements Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05i
-
Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05j
-
Impersonation Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05k
-
Kerberos Authentication Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05l
-
Master Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05m
-
One-Time Password.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05n
-
Personal Identification Number (PIN).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05o
-
Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05p
-
Privilege Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05q
-
Replay Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05r
-
Response.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05s
-
Rights Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05t
-
Salt.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05u
-
Trusted Third Party.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05v
-
User Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams05w
-
Certificate.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11
-
Certificate Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11a
-
Certificate Revocation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11b
-
Dictionary Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11c
-
Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11d
-
Impersonation Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11e
-
Kerberos Authentication Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11f
-
Master Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11g
-
One Time Password, from a Key Management Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11h
-
Personal Identification Number (PIN).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11i
-
Replay Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11j
-
Response.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11k
-
Salt.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11l
-
Trusted Third Party.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11m
-
User Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Adams11n
-
Certification Authority.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/AdamsHT11
-
Data Mining (Privacy in).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Aggarwal11
-
Firewalls.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Al-Shaer11
-
HRU.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Alturi11
-
Role-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/AlturiF11
-
Multiple Independent Levels of Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Alves-Foss11
-
Location Information (Privacy of).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ardagna11
-
Privacy-Aware Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ardagna11a
-
XML-Based Access Control Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ardagna11b
-
Script Language Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ArdagnaD11
-
Hyperelliptic Curve Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/AvanziT11
-
Hyperelliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/AvanziT11a
-
Hyperelliptic Curves Performance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/AvanziT11b
-
RFID Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Avoine11
-
Search over Encrypted Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BagherzandiHM11
-
Wireless Device Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BanerjeeB11
-
Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BargK05
-
Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BargK11
-
Whirlpool.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BarretoR11
-
Alberti encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05
-
Alphabet.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05a
-
Beaufort Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05b
-
CCIT2-code.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05c
-
Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05d
-
Crypto Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05e
-
Cryptology.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05f
-
Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05g
-
Cæsar cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05h
-
Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05i
-
Information Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05j
-
Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05k
-
Maxims.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05l
-
Playfair Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05m
-
Polybios Square Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05n
-
Porta Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05o
-
Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05p
-
Substitutions and permutations.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05q
-
Vernam Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05r
-
Vigenére Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer05s
-
Alberti Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11
-
Alphabet.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11a
-
Beaufort Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11b
-
CCIT2-Code.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11c
-
Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11d
-
Crypto Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11e
-
Cryptology.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11f
-
Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11g
-
Cæsar Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11h
-
Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11i
-
Information Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11j
-
Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11k
-
Maxims.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11l
-
Playfair Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11m
-
Polybios Square Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11n
-
Porta Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11o
-
Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11p
-
Substitutions and Permutations.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11q
-
Vernam Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11r
-
Vigenère Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bauer11s
-
Speaker Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Beigi11
-
Bell-La Padula Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bell11
-
IP Traceback.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bellovin11
-
Fault Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Benoit05
-
Fault Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Benoit11
-
Factorization Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bernstein11
-
Post-Quantum Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bernstein11a
-
Temporal Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bettini11
-
Ear Shape for Biometric Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bhanu11
-
Web Single Sign On and SAML.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biennier11
-
Differential Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biham05
-
Differential Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biham11
-
Adaptive Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05
-
Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05a
-
Adaptive Chosen Plaintext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05b
-
Boomerang Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05c
-
Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05d
-
Chosen Plaintext and Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05e
-
Chosen Plaintext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05f
-
Ciphertext-Only Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05g
-
Codebook Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05h
-
DES-X (or DESX).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05i
-
Dictionary Attack (I).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05j
-
Differential-Linear Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05k
-
Feistel Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05l
-
IDEA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05m
-
Impossible Differential Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05n
-
IPES.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05o
-
Known plaintext attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05p
-
Meet-in-the-Middle Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05q
-
Miss-in-the-Middle Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05r
-
Multiple Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05s
-
Multiset Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05t
-
Product Cipher, Superencryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05u
-
Related Key Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05v
-
Resynchronization Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05w
-
Skipjack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05x
-
Substitution-Permutation (SP) Network.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05xa
-
Truncated Differentials.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05xb
-
Weak keys.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05xc
-
Slide Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05y
-
Structural Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov05z
-
Adaptive Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11
-
Adaptive Chosen Plaintext and Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11a
-
Substitution-Permutation (SP) Network.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11aa
-
Truncated Differentials.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11ab
-
Weak Keys.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11ac
-
Adaptive Chosen Plaintext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11b
-
Boomerang Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11c
-
Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11d
-
Chosen Plaintext and Chosen Ciphertext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11e
-
Chosen Plaintext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11f
-
Ciphertext-Only Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11g
-
Codebook Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11h
-
DES-X (or DESX).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11i
-
Dictionary Attack (I).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11j
-
Differential-Linear Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11k
-
Feistel Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11l
-
IDEA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11m
-
Impossible Differential Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11n
-
IPES.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11o
-
Known Plaintext Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11p
-
Meet-in-the-Middle Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11q
-
Miss-in-the-Middle Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11r
-
Multiple Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11s
-
Multiset Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11t
-
Product Cipher, Superencryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11u
-
Related Key Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11v
-
Resynchronization Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11w
-
Skipjack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11x
-
Slide Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11y
-
Structural Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biryukov11z
-
Data encryption standard (DES).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BiryukovC05
-
Linear Cryptanalysis for Block Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BiryukovC05a
-
Data Encryption Standard (DES).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BiryukovC11
-
Linear Cryptanalysis for Block Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BiryukovC11a
-
Inference Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Biskup11
-
Face Recognition from Still Images and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BiswasC11
-
Authenticated encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Black05
-
Authenticated Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Black11
-
Secret Sharing Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK05
-
Shamir's Threshold Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK05a
-
Share.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK05b
-
Visual Secret Sharing Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK05c
-
Secret Sharing Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK11
-
Shamir's Threshold Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK11a
-
Share.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK11b
-
Visual Secret Sharing Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BlakleyK11c
-
Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05
-
Blind Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05a
-
Blinding Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05b
-
Chaffing and Winnowing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05c
-
Chaum Blind Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05d
-
Communication Channel Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05e
-
Copy Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05f
-
Credentials.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05g
-
DC Network.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05h
-
Designated Confirmer Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05i
-
Electronic Cash.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05j
-
Electronic payment.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05k
-
Electronic Postage.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05l
-
Electronic Wallet.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05m
-
Existential Forgery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05n
-
Fail-Stop Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05o
-
Forgery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05p
-
GMR Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05q
-
Group Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05r
-
Nonsecret Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05s
-
Overspender Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05t
-
Overspending Prevention.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05u
-
Pseudonyms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05v
-
Public Key Proxy Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05w
-
Public Key Proxy Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05x
-
Selective Forgery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05xa
-
Sender Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05xb
-
Threshold Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05xc
-
Undeniable Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05xd
-
Unlinkability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05xe
-
Untraceability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05xf
-
Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05xg
-
Random Oracle Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05y
-
Recipient Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer05z
-
Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11
-
Blind Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11a
-
Selective Forgery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11aa
-
Sender Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11ab
-
Threshold Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11ac
-
Undeniable Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11ad
-
Unlinkability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11ae
-
Untraceability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11af
-
Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11ag
-
Blinding Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11b
-
Chaffing and Winnowing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11c
-
Chaum Blind Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11d
-
Communication Channel Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11e
-
Copy Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11f
-
Credentials.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11g
-
DC Network.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11h
-
Designated Confirmer Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11i
-
Electronic Cash.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11j
-
Electronic Payment.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11k
-
Electronic Postage.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11l
-
Electronic Wallet.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11m
-
Existential Forgery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11n
-
Fail-Stop Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11o
-
Forgery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11p
-
GMR Signature.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11q
-
Group Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11r
-
Nonsecret Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11s
-
Overspender Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11t
-
Overspending Prevention.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11u
-
Pseudonyms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11v
-
Public Key Proxy Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11w
-
Public Key Proxy Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11x
-
Random Oracle Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11y
-
Recipient Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bleumer11z
-
Private Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Blundo11
-
Trust Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boeyen05
-
Logic-Based Authorization Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bonatti11
-
BLS Short Digital Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05
-
Blum-Blum-Shub Pseudorandom Bit Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05a
-
Blum-Goldwasser Public Key Encryption System.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05b
-
Cramer-Shoup Public Key System.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05c
-
Digital Signature Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05d
-
Elgamal Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05e
-
Rabin Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05f
-
Schnorr Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05g
-
Secure signatures from the "strong RSA" assumption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05h
-
Strong RSA Assumption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh05i
-
Aggregate Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11
-
BLS Short Digital Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11a
-
Blum-Blum-Shub Pseudorandom Bit Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11b
-
Blum-Goldwasser Public Key Encryption System.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11c
-
Cramer-Shoup Public-Key System.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11d
-
Digital Signature Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11e
-
ElGamal Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11f
-
Rabin Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11g
-
Schnorr Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11h
-
Secure Signatures from the "Strong RSA" Assumption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11i
-
Strong RSA Assumption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Boneh11j
-
Md4-Md5.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bosselaers05
-
RIPEMD Family.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bosselaers05a
-
RIPEMD Family.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bosselaers11
-
Database Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BouganimG11
-
Quantum Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BrassardC05
-
Quantum Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/BrassardC11
-
Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Brose05
-
Password.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Brose05a
-
Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Brose11
-
Password.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Brose11a
-
Rainbow Tables.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Brose11b
-
Static Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Brumley11
-
Random Bit Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bucci05
-
Random Bit Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bucci11
-
Group Key Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Burmester05
-
Group Key Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Burmester11
-
Secondary Use Regulations.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Bussard11
-
Digital Steganography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cachin05
-
Digital Steganography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cachin11
-
Common Criteria.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05
-
Differential Power Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05a
-
FIPS 140-2.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05b
-
Penetration Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05c
-
Side-Channel Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05d
-
Tamper Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05e
-
Tamper Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05f
-
Tamper Response.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy05g
-
Common Criteria.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11
-
Differential Power Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11a
-
FIPS 140-2.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11b
-
Penetration Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11c
-
Random Number Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11d
-
Security Evaluation Criteria.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11e
-
Side-Channel Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11f
-
Tamper Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11g
-
Tamper Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11h
-
Tamper Response.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Caddy11i
-
Security Evaluation Criteria.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CaddyB05
-
Practical E-Cash.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CallasNO11
-
Roles in SQL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Campi11
-
Administrative Policies in SQL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CampiP11
-
Handwriting Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CampisiMMVN11
-
Signature Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CampisiMN11
-
Keystroke Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CampisiN11
-
Decisional Diffie-Hellman Assumption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canetti05
-
Decisional Diffie-Hellman Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CanettiV11
-
Access Control from an OS Security Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cankaya11
-
Access Control Lists.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cankaya11a
-
Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cankaya11b
-
Bell-LaPadula Confidentiality Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cankaya11c
-
Chinese Wall Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cankaya11d
-
Blowfish.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05
-
Camellia.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05a
-
CAST.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05b
-
FEAL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05c
-
GOST.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05d
-
Interpolation Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05e
-
Kasumi/Misty1.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05f
-
Mars.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05g
-
Serpent.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05h
-
Triple-DES.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05i
-
Twofish.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere05j
-
Blowfish.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11
-
Camellia.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11a
-
Cast.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11b
-
FEAL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11c
-
GOST.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11d
-
Interpolation Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11e
-
Kasumi/Misty1.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11f
-
MARS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11g
-
SERPENT.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11h
-
Triple DES.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11i
-
TWOFISH.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canniere11j
-
A5/1.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05
-
Berlekamp-Massey algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05a
-
Combination generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05b
-
Correlation Attack for Stream Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05c
-
Fast Correlation Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05d
-
Filter Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05e
-
Inversion attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05f
-
Linear Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05g
-
Linear Consistency Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05h
-
Linear Cryptanalysis for Stream Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05i
-
Linear Feedback Shift Register.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05j
-
Linear Syndrome Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05k
-
Minimal Polynomial.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05l
-
Running-key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05m
-
Stream Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut05n
-
A5/1.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11
-
Berlekamp-Massey Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11a
-
Combination Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11b
-
Correlation Attack for Stream Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11c
-
Fast Correlation Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11d
-
Filter Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11e
-
Inversion Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11f
-
Linear Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11g
-
Linear Consistency Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11h
-
Linear Cryptanalysis for Stream Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11i
-
Linear Feedback Shift Register.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11j
-
Linear Syndrome Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11k
-
Minimal Polynomial.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11l
-
Running-Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11m
-
Stream Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Canteaut11n
-
Worms in Cellular Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CaoZ11
-
Jamming Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Capkun11
-
Security of Distance Bounding Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Capkun11a
-
Uncoordinated Direct Sequence Spread Spectrum.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Capkun11b
-
Uncoordinated Frequency Hopping Spread Spectrum.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Capkun11c
-
Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet05
-
Correlation Immune and Resilient Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet05a
-
Nonlinearity of Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet05b
-
Propagation Characteristics of Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet05c
-
Algebraic Immunity of Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet11
-
Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet11a
-
Correlation Immune and Resilient Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet11b
-
Nonlinearity of Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet11c
-
Propagation Characteristics of Boolean Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Carlet11d
-
Root of Trust.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CasperP11
-
Trusted Boot.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CasperP11a
-
Biometric Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CavoukianS11
-
Hash Agility.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Challener11
-
TPM.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Challener11a
-
TSS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Challener11b
-
Cyclic Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Charpin05
-
Reed-Muller Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Charpin05a
-
Cyclic Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Charpin11
-
Reed-Muller Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Charpin11a
-
Iris.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Chen11
-
Multi-Threaded Implementation for Cryptography and Cryptanalysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cheng11
-
Dynamic Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ChristodorescuG11
-
HTTP Session Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Clark11
-
X.509.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cock11
-
Greatest Common Divisor.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini05
-
Least Common Multiple.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini05a
-
Modular Root.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini05b
-
Modulus.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini05c
-
Number Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini05d
-
Greatest Common Divisor.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini11
-
Least Common Multiple.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini11a
-
Modular Root.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini11b
-
Modulus.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini11c
-
Number Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Contini11d
-
Modular Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ContiniKW05
-
Modular Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ContiniKW11
-
Protocol Cookies.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cook11
-
Traffic Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Coull11
-
Platform for Privacy Preferences (P3P).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cranor11
-
Commitment.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Crepeau05
-
Cut-and-choose protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Crepeau05a
-
Commitment.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Crepeau11
-
Cut-and-Choose Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Crepeau11a
-
Availability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cronin05
-
Denial of Service.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cronin05a
-
Availability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Cronin11
-
Algorithmic DoS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CrosbyW11
-
Social Perspectives on Information Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Culnan11
-
Cover Story.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CuppensC11
-
Multilevel Security Policies.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CuppensC11a
-
Security of Wireless Mesh Networks (General Overview).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/CurtmolaDN11
-
HTTP Digest Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Dacosta11
-
Rijndael/AES.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/DaemenR05
-
Rijndael.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/DaemenR11
-
Web Service Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Damiani11
-
Certificateless Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Dent11
-
Access structure.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05
-
Covert Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05a
-
Deniable encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05b
-
ElGamal Public Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05c
-
Fiat-Shamir Identification Protocol And The Fiat-Shamir Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05d
-
Knapsack cryptographic schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05e
-
Man-in-the-Middle Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05f
-
Relay Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05g
-
Station-to-Station Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05h
-
Threshold Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05i
-
Trojan Horses, Computer Viruses and Worms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt05j
-
Access Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11
-
Covert Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11a
-
Deniable Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11b
-
ElGamal Public Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11c
-
Fiat-Shamir Identification Protocol and the Feige-Fiat-Shamir Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11d
-
Knapsack Cryptographic Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11e
-
Man-in-the-Middle Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11f
-
Relay Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11g
-
Station-to-Station Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11h
-
Threshold Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11i
-
Trojan Horses, Computer Viruses, and Worms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Desmedt11j
-
Broadcast Authentication from an Information Theoretic Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/DesmedtJ11
-
Stream and Multicast Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/DesmedtJ11a
-
Perfectly Secure Message Transmission.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/DesmedtY11
-
Signcryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Dodis05
-
Signcryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Dodis11
-
Microdata Masking Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Domingo-Ferrer11
-
Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Durfee05
-
Wiener, Boneh-Durfee, and May Attacks on the RSA Public Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Durfee11
-
Nonmalleability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Dwork05
-
Differential Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Dwork11
-
Non-Malleability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Dwork11a
-
SYN Cookie Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Eddy11
-
SYN Flood Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Eddy11a
-
Keeloq.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/EisenbarthKPI11
-
SPKI/SDSI.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ellison05
-
Entropy Sources.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ellison11
-
SPKI.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ellison11a
-
Android's Security Framework-Understanding the Security of Mobile Phone Platforms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Enck11
-
ARP Spoofing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Enck11a
-
Sealed Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/England11
-
Access Control Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Estes11
-
Biba Integrity Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Estes11a
-
Keylogging.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Estes11b
-
Biometrics for Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Evison11
-
Intrusion Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/FarleyJ05
-
Header-Based Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fenet11
-
Digital Signature Scheme Based on McEliece.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/FiniaszS11
-
Clock-Controlled Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05
-
E0 (Bluetooth).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05a
-
Linear Congruential Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05b
-
Nonlinear Feedback Shift Register.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05c
-
RC4.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05d
-
SEAL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05e
-
Self-Shrinking Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05f
-
Self-Synchronizing Stream Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05g
-
Shrinking Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05h
-
Summation generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05i
-
Synchronous Stream Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine05j
-
Clock-Controlled Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11
-
E0.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11a
-
Linear Congruential Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11b
-
Nonlinear Feedback Shift Register.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11c
-
RC4.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11d
-
SEAL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11e
-
Self-Shrinking Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11f
-
Self-Synchronizing Stream Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11g
-
Shrinking Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11h
-
Summation Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11i
-
Synchronous Stream Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Fontaine11j
-
Macrodata Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Foresti11
-
Microdata Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Foresti11a
-
Web Security Auditing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Forte11
-
Mix Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Franklin05
-
Mix Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Franklin11
-
Secure Multiparty Computation (SMC).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Frikken11
-
Rank Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gabidulin11
-
Schemes Based on Rank Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gabidulin11a
-
Web Access Control Strategies.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gabillon11
-
Digital Signature Schemes from Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/GaboritS11
-
Identity-Based Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gagne05
-
Identity-Based Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gagne11
-
Point Counting.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gaudry11
-
E-Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/GehrkeM11
-
Discrete Logarithm Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gordon05
-
Discrete Logarithm Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gordon11
-
Generic Attacks Against DLP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gordon11a
-
Torus-Based Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gorla11
-
Multivariate Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/GoubinPY11
-
Hippocratic Database.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/GrandisonL11
-
Location Privacy in Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gruteser11
-
Botnet Detection in Enterprise Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gu11
-
Intrusion Detection in Ad Hoc Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gu11a
-
Packet-Dropping Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gu11b
-
Secure Routing Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Gu11c
-
Itoh-Tsujii Inversion Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Guajardo05
-
Itoh-Tsujii Inversion Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Guajardo11
-
Physical Unclonable Functions (PUFs).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Guajardo11a
-
FPGAs in Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Guneysu11
-
Time-stamping.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HaberM05
-
Time-Stamping.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HaberM11
-
Privacy of Outsourced Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HacigumusHM11
-
RC5.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Handschuh05
-
RC6.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Handschuh05a
-
SHA Family (Secure Hash Algorithm).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Handschuh05b
-
RC5.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Handschuh11
-
RC6.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Handschuh11a
-
SHA-0, SHA-1, SHA-2 (Secure Hash Algorithm).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Handschuh11b
-
ECC Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05
-
Elliptic Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05a
-
Elliptic Curve Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05b
-
Elliptic Curve Discrete Logarithm Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05c
-
Elliptic Curve Key Agreement Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05d
-
Elliptic Curve Keys.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05e
-
Elliptic Curve Point Multiplication Using Halving.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05f
-
Elliptic Curve Public-Key Encryption Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05g
-
Elliptic Curve Signature Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM05h
-
ECC Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11
-
Elliptic Curve Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11a
-
Elliptic Curve Discrete Logarithm Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11b
-
Elliptic Curve Key Agreement Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11c
-
Elliptic Curve Keys.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11d
-
Elliptic Curve Point Multiplication Using Halving.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11e
-
Elliptic Curve Public-Key Encryption Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11f
-
Elliptic Curve Signature Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11g
-
Elliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11h
-
Koblitz Elliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11i
-
NIST Elliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11j
-
NSA Suite B.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11k
-
Pairings.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HankersonM11l
-
Pretty Good Privacy (PGP).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Heinrich05
-
Secure Socket Layer (SSL).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Heinrich05a
-
Transport layer security (TLS).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Heinrich05b
-
Pretty Good Privacy (PGP).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Heinrich11
-
Secure Socket Layer (SSL).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Heinrich11a
-
Transport Layer Security (TLS).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Heinrich11b
-
Autocorrelation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05
-
Cross-Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05a
-
DeBruijn sequence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05b
-
Gap.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05c
-
Golomb'S Randomness Postulates.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05d
-
Maximal-Length Linear Sequence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05e
-
Pseudo-Noise Sequence (PN-Sequence).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05f
-
Run.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05g
-
Sequences.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth05h
-
Autocorrelation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11
-
Cross-Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11a
-
De Bruijn Sequence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11b
-
Gap.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11c
-
Golomb's Randomness Postulates.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11d
-
Maximal-Length Sequences.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11e
-
Pseudo-Noise Sequences (PN-Sequences).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11f
-
Run.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11g
-
Sequences.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Helleseth11h
-
Cold-Boot Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Heninger11
-
Hash Chain.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Horne11
-
Permissions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Horne11a
-
Security Standards Activities.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Housley05
-
Security Standards Activities.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Housley11
-
Cookie.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Hunter11
-
Formal Methods and Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Huth11
-
Secure Code Dissemination in Wireless Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/HyunN11
-
Cryptrec.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ImaiY05
-
CRYPTREC (Japanese Cryptographic Algorithm Evaluation Project).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ImaiY11
-
ARIA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Indesteege11
-
Tiger.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Indesteege11a
-
DoS Pushback.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ioannidis11
-
IPsec.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ioannidis11a
-
Web 2.0 Security and Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Jackson11
-
Reference Monitor.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Jaeger11
-
Session Hijacking Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Johns11
-
Number Field Sieve for the DLP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/JouxL11
-
Side-Channel Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/JoyeO05
-
Side-Channel Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/JoyeO11
-
Challenge-Response Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just05
-
Diffie-Hellman Key Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just05a
-
Key agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just05b
-
Needham-Schroeder Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just05c
-
Schnorr Indentification Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just05d
-
Challenge-Response Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11
-
Diffie-Hellman Key Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11a
-
Identity Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11b
-
Key Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11c
-
Key Escrow.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11d
-
Needham-Schroeder Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11e
-
Nonrepudiation of Digital Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11f
-
PKI Trust Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11g
-
Schnorr Identification Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Just11h
-
Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KabatianskyS05
-
Authentication, From an Information Theoretic Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KabatianskyS11
-
Asymmetric Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05
-
Berlekamp Q-matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05a
-
Binomial Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05b
-
Blum Integer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05c
-
Claw-Free.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05d
-
Decryption Exponent.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05e
-
Encryption Exponent.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05f
-
Euler's Totient Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05g
-
Exponential Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05h
-
Extension Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05i
-
Factor Base.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05j
-
Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05k
-
Field Polynomial.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05l
-
Finite Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05m
-
Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05n
-
Group.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05o
-
Hard-Core Bit.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05p
-
Homomorphism.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05q
-
Irreducible Polynomial.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05r
-
Jacobi Symbol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05s
-
Legendre Symbol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05t
-
MIPS-Year.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05u
-
Moore's Law.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05v
-
Number Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05w
-
O-Notation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05x
-
Primitive Element.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xa
-
Pseudorandom Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xb
-
Quadratic Residue.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xc
-
Quadratic Residuosity Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xd
-
Relatively Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xe
-
Ring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xf
-
RSA Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xg
-
RSA factoring challenge.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xh
-
Sieving.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xi
-
Subexponential Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xj
-
Subgroup.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xk
-
Symmetric Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05xl
-
Order.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05y
-
Polynomial Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski05z
-
Asymmetric Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11
-
Berlekamp Q-matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11a
-
Pseudorandom Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11aa
-
Quadratic Residue.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ab
-
Quadratic Residuosity Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ac
-
Relatively Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ad
-
Ring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ae
-
RSA Digital Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11af
-
RSA Factoring Challenge.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ag
-
Sieving.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ah
-
Subexponential Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ai
-
Subgroup.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11aj
-
Symmetric Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11ak
-
Binomial Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11b
-
Blum Integer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11c
-
Claw-Free.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11d
-
Decryption Exponent.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11e
-
Encryption Exponent.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11f
-
Euler's Totient Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11g
-
Exponential Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11h
-
Extension Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11i
-
Factor Base.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11j
-
Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11k
-
Finite Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11l
-
Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11m
-
Group.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11n
-
Hard-Core Bit.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11o
-
Homomorphism.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11p
-
Irreducible Polynomial.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11q
-
Jacobi Symbol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11r
-
Legendre Symbol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11s
-
MIPS-Year.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11t
-
Moore's Law.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11u
-
Number Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11v
-
O-Notation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11w
-
Order.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11x
-
Polynomial Time.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11y
-
Primitive Element.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kaliski11z
-
DNS-Based Botnet Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kang11
-
Dynamic Malware Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KangS11
-
Spam Detection Using Network-Level Characteristics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KangS11a
-
Unpacking Malware.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KangS11b
-
Malware Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KatzenbeisserKV11
-
Buffer Overflow Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Keromytis11
-
Network Bandwidth Denial of Service (DoS).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Keromytis11a
-
Denial-of-Service Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kesidis11
-
Key Generation Using Physical Properties of Wireless Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KiayiasY11
-
Cross Site Scripting Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kirda11
-
Malware Behavior Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kirda11a
-
Web Cache Poisoning Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Klein11
-
Block ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Knudsen05
-
Luby-Rackoff Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Knudsen05a
-
Block Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Knudsen11
-
CLEFIA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Knudsen11a
-
Luby-Rackoff Ciphers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Knudsen11b
-
C2 - Block Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KnudsenL11
-
PRESENT - Block Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KnudsenL11a
-
Montgomery Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Koc11
-
Montgomery Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KocW05
-
Pseudo-random number generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Koeune05
-
Timing attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Koeune05a
-
Pseudorandom Number Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Koeune11
-
Timing Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Koeune11a
-
Anonymous Web Browsing and Publishing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kopsell11
-
Perfect Forward Secrecy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Krawczyk05
-
Perfect Forward Secrecy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Krawczyk11
-
Number Field Sieve for Factoring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KruppaL11
-
Biometric Sample Quality.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/KryszczukR11
-
compromising emanations.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn05
-
Data Remanence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn05a
-
Smartcard tamper resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn05b
-
Tempest.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn05c
-
Compromising Emanations.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn11
-
Data Remanence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn11a
-
Smartcard Tamper Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn11b
-
Tempest.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kuhn11c
-
Biometric Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kumar11
-
Hybrid Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Kurosawa11
-
Fingerprint.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LabatiS11
-
ABA digital signature guidelines.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05
-
Acquirer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05a
-
Attribute certificate.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05b
-
Bolero.net.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05c
-
CEPS Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05d
-
Clip Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05e
-
Control Vectors.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05f
-
Derived key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05g
-
Electronic Cheque.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05h
-
Electronic Negotiable Instruments.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05i
-
Issuer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05j
-
Key Encryption Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05k
-
Mondex.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05l
-
Payment card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05m
-
PKCS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05n
-
Proton.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05o
-
Public Key Infrastructure.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05p
-
Registration Authority.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05q
-
S/MIME.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05r
-
Security Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05s
-
SET.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05t
-
SSH.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05u
-
Token.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05v
-
Two-Factor Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05w
-
X.509.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Landrock05x
-
PKCS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LandrockC11
-
Bytecode Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lanet11
-
Edwards Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lange11
-
Hash-Based Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lange11a
-
Pairing-Based Key Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lange11b
-
Vector Space.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lange11c
-
Adversarial/External Knowledge (Privacy in the Presence of).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LeFevreC11
-
Credential-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lee11
-
Biometrics for Identity Management and Fields of Application.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Leeuw11
-
Physical Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LemkeP05
-
Birthday Paradox.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra05
-
Factoring Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra05a
-
Integer Factoring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra05b
-
L-Notation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra05c
-
Smoothness Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra05d
-
Subgroup Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra05e
-
Birthday Paradox.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra11
-
Integer Factoring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra11a
-
L Notation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lenstra11b
-
Number Field Sieve.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Leyland05
-
Biometrics in Video Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Li11
-
Discretionary Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Li11a
-
Trust Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Li11b
-
Secure Device Pairing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LiLR11
-
Identity-Based Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LibertQ05
-
Identity-Based Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LibertQ11
-
Fermat Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov05
-
Fermat's Little Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov05a
-
Maurer's Method.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov05b
-
Miller-Rabin Probabilistic Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov05c
-
Fermat Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov11
-
Fermat's Little Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov11a
-
Maurer's Method.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov11b
-
Miller-Rabin Probabilistic Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liskov11c
-
Broadcast Authentication from a Conditional Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liu11
-
Node Clone Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liu11a
-
Probabilistic Key Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liu11b
-
Secure Localization.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Liu11c
-
Key management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Lloyd05
-
Key Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/LloydA11
-
CPU Denial of Service.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Locasto11
-
Information Flow and Noninterference.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Mantel11
-
Access Pattern.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Martinenghi11
-
IPsec.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/McDaniel05
-
Policy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/McDaniel05a
-
Chroot Jail.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/McFearin11
-
Galois Counter Mode.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/McGrew11
-
Applications of Formal Methods to Intrusion Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Meadows11
-
Formal Analysis of Cryptographic Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Meadows11a
-
Formal Methods in Certification and Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Meadows11b
-
Program Verification and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Meadows11c
-
Theorem Proving and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Meadows11d
-
Type Checking and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Meadows11e
-
Closest Vector Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Micciancio05
-
Lattice Based Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Micciancio05a
-
Shortest Vector Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Micciancio05b
-
Closest Vector Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Micciancio11
-
Lattice-Based Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Micciancio11a
-
Shortest Vector Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Micciancio11b
-
Biometrics: Terms and Definitions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Micheli-TzanakouP11
-
Biba Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Millen11
-
Formal Methods for the Orange Book.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Millen11a
-
Collaborative DoS Defenses.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Mirkovic11
-
Binary exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller05
-
Right-to-Left Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller05a
-
Signed Digit Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller05b
-
Simultaneous Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller05c
-
Sliding Window Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller05d
-
2k-Ary Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller05e
-
Binary Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller11
-
Right-to-Left Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller11a
-
Signed Digit Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller11b
-
Simultaneous Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller11c
-
Sliding Window Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller11d
-
2k-AryExponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Moller11e
-
Elliptic Curves for Primality Proving.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Morain05
-
Elliptic Curves for Primality Proving.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Morain11
-
Trusted Platform Module.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Morris11
-
MD4-MD5.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Mouha11
-
Autotomic Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11
-
Barrett's Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11a
-
Blackmailing Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11b
-
Chemical Combinatorial Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11c
-
Cryptophthora.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11d
-
Generic Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11e
-
Gröbner Basis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11f
-
Monotone Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11g
-
Multiplicative Knapsack Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11h
-
Naccache-Stern Higher Residues Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11i
-
Phenotyping.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11j
-
Reverse Public Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11k
-
Standard Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11l
-
Temperature Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11m
-
Twin Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11n
-
von Neumann Correction.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naccache11o
-
Rootkits.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nair11
-
Broadcast Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naor05
-
Broadcast Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Naor11
-
Proof-Carrying Code.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Necula11
-
Index Calculus.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen05
-
Lattice.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen05a
-
Lattice Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen05b
-
Smoothness.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen05c
-
Index Calculus Method.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen11
-
Lattice.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen11a
-
Lattice Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen11b
-
Smoothness.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nguyen11c
-
Secure Network Coding for Wireless Mesh Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nita-RotaruC11
-
Security of Group Communication in Wireless Mesh Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nita-RotaruCD11
-
Secure Routing in Wireless Mesh Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Nita-RotaruDC11
-
Security Implication in Virtualization.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/OhLCR11
-
Web Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Opyrchal05
-
Enigma.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Orlowski11
-
SQL Injection Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Orso11
-
Exponentiation Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paar05
-
Inversion in Finite Fields and Rings.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paar05a
-
Optimal Extension Fields (OEFs).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paar05b
-
Exponentiation Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paar11
-
Inversion in Finite Fields and Rings.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paar11a
-
Optimal Extension Fields (OEFs).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paar11b
-
Special-Purpose Cryptanalytical Hardware.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paar11c
-
Paillier Encryption and Signature Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paillier05
-
Paillier Encryption and Signature Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paillier11
-
Levels of Trust.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/PapaC11
-
Trusted Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/PapaC11a
-
Secure Vehicular Communication Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/PapadimitratosH11
-
Security of Cognitive Radios.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ParkB11
-
Identity Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pato05
-
Sieving in Function Fields.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Paulus05
-
Virtual Machine Introspection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Payne11
-
CPS, Certificate Practice Statement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen05
-
HTTPS, Secure HTTPS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen05a
-
PEM, Privacy Enhanced Mail.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen05b
-
PKIX - Public Key Infrastructure (X.509).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen05c
-
CPS, Certificate Practice Statement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen11
-
HTTPS, HTTP over TLS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen11a
-
Key Encryption Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen11b
-
PEM, Privacy-Enhanced Mail.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen11c
-
PKIX, Public Key Infrastructure (X.509).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pedersen11d
-
Secure Audit Logs.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pelosi11
-
Secure Index.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pelosi11a
-
Conceptual Design of Secure Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/PernulR11
-
Decoding Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Peters11
-
Cayley Hash Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/PetitQ11
-
Kerckhoffs' Principle.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Petitcolas11
-
Traitor Tracing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pinkas05
-
Traitor Tracing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pinkas11
-
ISMS: A Management Framework for Information Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Plate11
-
Biometric Technologies and Security - International Biometric Standards Development Activities.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Podio11
-
OAEP: Optimal Asymmetric Encryption Padding.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pointcheval05
-
Rabin Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pointcheval05a
-
RSA Public-Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pointcheval05b
-
OAEP: Optimal Asymmetric Encryption Padding.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pointcheval11
-
Rabin Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pointcheval11a
-
RSA Public-Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Pointcheval11b
-
Reverse Engineering of Malware Emulators.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Polychronakis11
-
CBC-MAC and Variants.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05
-
Collision Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05a
-
Collision resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05b
-
Correcting-block attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05c
-
Davies-Meyer Hash Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05d
-
Hash functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05e
-
HMAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05f
-
Maa.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05g
-
MAC Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05h
-
Mash Hash Functions (Modular Arithmetic Secure Hash).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05i
-
MDC-2 and MDC-4.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05j
-
Modes of Operation of a Block Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05k
-
NESSIE Project.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05l
-
PMAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05m
-
Preimage Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05n
-
Second preimage resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05o
-
Universal One-Way Hash Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel05p
-
AHS Competition/SHA-3.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11
-
CBC-MAC and Variants.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11a
-
CMAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11b
-
Collision Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11c
-
Collision Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11d
-
Correcting-Block Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11e
-
Davies-Meyer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11f
-
GMAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11g
-
Hash Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11h
-
HMAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11i
-
MAA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11j
-
MAC Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11k
-
MASH Hash Functions (Modular Arithmetic Secure Hash).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11l
-
MDC-2 and MDC-4.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11m
-
Modes of Operation of a Block Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11n
-
NESSIE Project.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11o
-
PMAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11p
-
Preimage Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11q
-
Second Preimage Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11r
-
Universal One-Way Hash Functions (UOWHF).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Preneel11s
-
Firewall.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Provos05
-
Firewall.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Provos11
-
Eavesdropper.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Quisquater05
-
Passport Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/QuisquaterA11
-
Electromagnetic Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/QuisquaterS05
-
Radio Frequency Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/QuisquaterS05a
-
Time-memory tradeoffs.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/QuisquaterS05b
-
Electromagnetic Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/QuisquaterS11
-
Radio Frequency Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/QuisquaterS11a
-
Kerberos.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Racic11
-
One-Time Password.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Rayes11
-
Protected Mode.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Rayes11a
-
Biometric Systems Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/RichiardiK11
-
RSA Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/RivestK05
-
RSA Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/RivestK11
-
One-Way Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Robshaw05
-
Trapdoor One-Way Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Robshaw05a
-
One-Way Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Robshaw11
-
Trapdoor One-Way Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Robshaw11a
-
Content-Based and View-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/RosenthalS11
-
Multibiometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Ross11
-
Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/RossJ05
-
Trusted Computing Group.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Rotondo11
-
Trusted Computing Platform Alliance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Rotondo11a
-
Nonrepudiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sabett05
-
digital signature schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05
-
Electronic Voting Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05a
-
Goldwasser-Micali Encryption Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05b
-
Nyberg-Rueppel Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05c
-
Probabilistic Public-Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05d
-
Public Key Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05e
-
Semantic Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05f
-
Verifiable Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako05g
-
Digital Signature Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11
-
Electronic Voting Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11a
-
Goldwasser-Micali Encryption Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11b
-
Nyberg-Rueppel Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11c
-
Probabilistic Public-Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11d
-
Public Key Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11e
-
Semantic Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11f
-
Verifiable Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sako11g
-
Common Criteria, From a Security Policies Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Salvaneschi11
-
Metrics of Software Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/SalvaneschiS11
-
Administrative Policies.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Samarati11
-
Flexible Authorization Framework (FAF).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Samarati11a
-
k-Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Samarati11b
-
Recursive Revoke.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Samarati11c
-
Multilevel Database.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/SamaratiL11
-
Gait Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/SarkarL11
-
Solitaire.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schneier05
-
Solitaire.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schneier11
-
Interactive Argument.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05
-
Interactive Proof.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05a
-
Multiparty Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05b
-
Noninteractive Proof.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05c
-
Oblivious Transfer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05d
-
Proof of Knowledge vs. Proof of Membership.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05e
-
Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05f
-
Verifiable Secret Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05g
-
Witness Hiding.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05h
-
Zero-knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers05i
-
Designated-Verifier Proofs.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11
-
Homomorphic Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11a
-
Interactive Argument.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11b
-
Interactive Proof.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11c
-
Multiparty Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11d
-
Noninteractive Proof.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11e
-
Oblivious Transfer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11f
-
Proof of Knowledge Versus Proof of Membership.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11g
-
Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11h
-
Threshold Homomorphic Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11i
-
Verifiable Secret Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11j
-
Witness Hiding.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11k
-
Zero-Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schoenmakers11l
-
Certified Mail.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schunter05
-
Contract Signing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schunter05a
-
Fair Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schunter05b
-
Certified Mail.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schunter11
-
Contract Signing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schunter11a
-
Fair Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schunter11b
-
HTTP Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Schwenk11
-
Biometric Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ScottiCS11
-
McEliece Public Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sendrier05
-
Niederreiter Encryption Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sendrier05a
-
Code-Based Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sendrier11
-
McEliece Public Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sendrier11a
-
Niederreiter Encryption Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sendrier11b
-
TWIRL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ShamirT05
-
TWIRL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ShamirT11
-
Eavesdropping.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sherr11
-
Diffie-Hellman Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Shparlinski05
-
Computational Diffie-Hellman Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Shparlinski11
-
Quadratic Sieve.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Silverman05
-
Quadratic Sieve.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Silverman11
-
Secure Data Outsourcing: A Brief Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sion11
-
Key escrow.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smid05
-
Attestation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smith11
-
Biometric Social Responsibility.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smith11a
-
Dynamic Root of Trust.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smith11b
-
Logic Bomb.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smith11c
-
Secure Coprocessor.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smith11d
-
Tamper Evidence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smith11e
-
Zeroization.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Smith11f
-
Acquirer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11
-
Attribute Certificate.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11a
-
Control Vector.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11b
-
Derived Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11c
-
Electronic Cheque.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11d
-
Issuer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11e
-
Mobile Payments.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11f
-
Mobile Wallet.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11g
-
Payment Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11h
-
PKI.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11i
-
Security Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11j
-
SEPA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11k
-
SIM/UICC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11l
-
Smart Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11m
-
SSH.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11n
-
Token.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11o
-
Two-Factor Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11p
-
User Verification Method.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Soete11q
-
EMV.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/SoeteW05
-
Generalized Mersenne Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Solinas05
-
Mersenne Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Solinas05a
-
Pseudo-Mersenne Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Solinas05b
-
Generalized Mersenne Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Solinas11
-
Mersenne Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Solinas11a
-
Pseudo-Mersenne Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Solinas11b
-
Application-Level Denial of Service.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/SrivatsaI11
-
Web-Based Security Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stallings11
-
Physical Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/StandaertQ11
-
Time-Memory Trade-offs.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/StandaertQ11a
-
Overlay-Based DoS Defenses.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stavrou11
-
TCP Modulation Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stavrou11a
-
Formal Analysis of Security APIs.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Steel11
-
Sandbox.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stephens11
-
Certificate of Primality.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05
-
Primality Proving Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05a
-
Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05b
-
Prime Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05c
-
Prime number.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05d
-
Probabilistic Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05e
-
Pseudoprime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05f
-
Safe Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05g
-
Strong Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic05h
-
Certificate of Primality.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11
-
Primality Proving Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11a
-
Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11b
-
Prime Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11c
-
Prime Number.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11d
-
Probabilistic Primality Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11e
-
Pseudoprime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11f
-
Strong Prime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stiglic11g
-
Insider Threat Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/StolfoBS11
-
Trust Management in Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Stoller11
-
Biometric Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Subramanian11
-
Spyware.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Subramanian11a
-
Secure Time Synchronization.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/SunN11
-
Binary Euclidean Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar05
-
Euclidean Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar05a
-
Multiprecision Multiplication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar05b
-
Multiprecision Squaring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar05c
-
Binary Euclidean Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar11
-
Euclidean Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar11a
-
Multiprecision Multiplication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar11b
-
Multiprecision Squaring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sunar11c
-
Hardware Security Module.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sustek05
-
Hardware Security Module.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Sustek11
-
Pairing-Friendly Elliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Teske11
-
Biometric Sensors.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ThomasG11
-
Function Field Sieve.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Thome11
-
Sieving in Function Fields.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Thome11a
-
Keyboard Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Thornton11
-
ISO-9796 Signature Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Tibouchi11
-
Security Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Tibouchi11a
-
Chinese Remainder Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Tilborg05
-
Shannon's Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Tilborg05a
-
Chinese Remainder Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Tilborg11
-
Shannon's Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Tilborg11a
-
Vascular Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/TohT11
-
Invasive Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/TriaC05
-
Invasive Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/TriaC11
-
Mandatory Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Upadhyaya11
-
Computational Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vadhan05
-
Computational Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vadhan11
-
Contactless Cards.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vauclair11
-
NFC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vauclair11a
-
Proximity Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vauclair11b
-
Secure Element.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vauclair11c
-
SWP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vauclair11d
-
Vicinity Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vauclair11e
-
Applications of Formal Methods to Web Application Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Venkatakrishnan11
-
Web Browser Security and Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Venkatakrishnan11a
-
Virus Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Verma05
-
Cube Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Videau11
-
Distinguishing Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Videau11a
-
eSTREAM.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Videau11b
-
Access Control Policies, Models, and Mechanisms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vimercati11
-
Access Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vimercati11a
-
Authorizations.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vimercati11b
-
Discretionary Access Control Policies (DAC).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vimercati11c
-
Least Privilege.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vimercati11d
-
Policy Composition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vimercati11e
-
Privacy-Aware Access Control Policies.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Vimercati11f
-
Quasi-Identifier.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiF11
-
Grant Option.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiL11
-
Privileges in SQL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiL11a
-
SQL Access Control Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiL11b
-
Chinese Wall.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiS11
-
Clark and Wilson Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiS11a
-
Mandatory Access Control Policy (MAC).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiS11b
-
Polyinstantiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/VimercatiS11c
-
Computational Puzzles.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Wang11
-
Memory and State Exhaustion Denial of Service.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Wang11a
-
EMV.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/WardO11
-
TCP Reset Injection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Weaver11
-
Fixed-Base Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Weimerskirch05
-
Fixed-Exponent Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Weimerskirch05a
-
Karatsuba algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Weimerskirch05b
-
Fixed-Base Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Weimerskirch11
-
Fixed-Exponent Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Weimerskirch11a
-
Karatsuba Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Weimerskirch11b
-
Ntru.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Whyte05
-
NTRU.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/WhyteH11
-
Exhaustive Key Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Wiener05
-
Exhaustive Key Search.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Wiener11
-
Protection Rings.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Wiley11
-
Data Linkage.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Winkler11
-
Trust Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/WongchaowartL11
-
White-Box Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Wyseur11
-
Access Control Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11
-
Access Limitation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11a
-
Bank Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11aa
-
Barter.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ab
-
Base.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ac
-
Biba Mandatory Integrity Policy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ad
-
Big Number Multiplication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ae
-
Big Number Squaring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11af
-
Bilinear Pairings.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ag
-
Binary Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ah
-
Binary GCD Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ai
-
Binding Pattern.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11aj
-
Biometric Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ak
-
Biometric Fusion.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11al
-
Biometric Identification in Video Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11am
-
Biometric Information Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11an
-
Biometric Key Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ao
-
Biometric Keys.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ap
-
Biometric Passport Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11aq
-
Biometric Performance Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ar
-
Biometric Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11as
-
Biometric Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11at
-
BIOS Basic Input Output System.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11au
-
Black Box Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11av
-
BLP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11aw
-
BLP Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ax
-
Broadcast Stream Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ay
-
Browser Cookie.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11az
-
Access Lists.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11b
-
BSP Board Support Package.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ba
-
Buffer Overrun.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bb
-
Cascade Revoke.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bc
-
CDH.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bd
-
Cellular Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11be
-
Certificate-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bf
-
Challenge-Response Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bg
-
Challenge-Response Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bh
-
Chip Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bi
-
Chosen Prefix Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bj
-
Chromosome.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bk
-
Chroot Prison.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bl
-
Classical Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bm
-
Client Puzzles.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bn
-
Cloud Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bo
-
CMVP - Cryptographic Module Validation Program.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bp
-
Code Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bq
-
Commercial Off-the-Shelf.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11br
-
Commercial Security Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bs
-
Complexity Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bt
-
Compositeness Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bu
-
Computationally Sound Proof System.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bv
-
Conceptual Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bw
-
Conference Key Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bx
-
Conference Keying.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11by
-
Confidentiality Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11bz
-
Access Rights.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11c
-
Confirmer Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ca
-
Consistency Verification of Security Policy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cb
-
Conventional Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cc
-
Coprime.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cd
-
CPU Consumption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ce
-
CPU Starvation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cf
-
Credential Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cg
-
CRT.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ch
-
Cryptographic Algorithm Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ci
-
Cryptographic Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cj
-
Cryptographic Protocol Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ck
-
Cryptographic Puzzles.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cl
-
Cryptography on Reconfigurable Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cm
-
DAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cn
-
DDH Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11co
-
De-Skewing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cp
-
Decentralized Trust Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cq
-
Denial of Service (DoS).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cr
-
Deobfuscating Malware.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cs
-
DH Key Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ct
-
DHP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cu
-
Diffie-Hellman Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cv
-
Diffie-Hellman Key Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cw
-
Digest Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cx
-
Digital Certificate.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cy
-
DLP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11cz
-
ACM.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11d
-
DPA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11da
-
Dynamic Program Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11db
-
Dynamic Separation of Duties.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dc
-
e-Government.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dd
-
ECC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11de
-
ECM.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11df
-
ECPP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dg
-
ECRYPT Stream Cipher Project.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dh
-
Edwards Coordinates.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11di
-
Efficiency of Hyperelliptic Curve Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dj
-
Electro-Magnetic Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dk
-
Electronic Check.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dl
-
Electronic Purse.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dm
-
ElGamal Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dn
-
Elliptic Curve Trace Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11do
-
Entity Authentication Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dp
-
Entity Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dq
-
Environmental Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dr
-
ePassport Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ds
-
Error-Correcting Cyclic Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dt
-
Error-Correction Decoding.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11du
-
Escrow Service.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dv
-
Euclidean Lattice.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dw
-
Euclid's Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dx
-
Everywhere Second Preimage Resistant Hash Function (esec).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dy
-
Exponential Key Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11dz
-
Advanced Encryption Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11e
-
Extended Euclidean Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ea
-
False Data Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11eb
-
Feige-Fiat-Shamir Signature Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ec
-
Fermat Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ed
-
File System Permissions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ee
-
Fingerprint Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ef
-
Firewall Policy Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11eg
-
Fixed Window Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11eh
-
Flow Blocking.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ei
-
Forged Resets.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ej
-
Formal Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ek
-
Forward Secrecy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11el
-
FPGA Field Programmable Gate Array.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11em
-
Galois Message Authentication Code.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11en
-
GCD.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11eo
-
GCM.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ep
-
Gene.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11eq
-
Genetic Code.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11er
-
Geometry of Numbers.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11es
-
Greatest Common Factor.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11et
-
Group Key Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11eu
-
Group Key Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ev
-
Hand Geometry Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ew
-
Hash-Based Message Authentication Code.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ex
-
Header Injections.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ey
-
HEC Acronym is Often Used for Hyper Elliptic Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ez
-
Advanced Hash Competition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11f
-
Heredity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fa
-
High Assurance Evaluation Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fb
-
Higher Order Derivative Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fc
-
History-Based Separation of Duties.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fd
-
HTTP Basic Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fe
-
HTTP Cookie.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ff
-
HTTP Digest Access Authentication Scheme.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fg
-
Human Ear Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fh
-
Human Ear Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fi
-
Human Ear Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fj
-
Human Ear Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fk
-
Hyperelliptic Curve Discrete Logarithm Problem (HECDLP).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fl
-
IBE.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fm
-
IC Integrated Circuit.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fn
-
IC-Integrated Circuit.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fo
-
Iceman Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fp
-
ID-Based Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fq
-
Identity Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fr
-
Identity Proof.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fs
-
Implicit Key Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ft
-
Indistinguishability of Encryptions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fu
-
Information Assurance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fv
-
Information Flow Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fw
-
Information Integrity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fx
-
Information Security Management System.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fy
-
Information Theoretic Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11fz
-
Adware.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11g
-
Integrated Circuit.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ga
-
Integrated Circuit Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gb
-
Integrity Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gc
-
Intellectual Property.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gd
-
Interactive Proof Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ge
-
Interactive Theorem Proving and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gf
-
Interception.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gg
-
Inversion in Galois Fields.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gh
-
IPSec Policy Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gi
-
ISO 15408 CC - Common Criteria.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gj
-
ISO 19790 2006 Security Requirements for Cryptographic Modules.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gk
-
ISO/IEC 15408.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gl
-
ISO/IEC 27001.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gm
-
Kerckhoffs' Law.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gn
-
Key Life Cycle Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11go
-
Key Recovery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gp
-
Key Variation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gq
-
Keystream.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gr
-
Keystroke Logging.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gs
-
Keyword-Based Retrieval over Encrypted Data.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gt
-
Lamport One-Time Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gu
-
Late Launch.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gv
-
Lattice Basis Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gw
-
LCM.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gx
-
LFSR.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gy
-
List Decoding.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11gz
-
AES.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11h
-
Location Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ha
-
Longhand.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hb
-
m-Sequence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hc
-
Machine Readable Travel Document Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hd
-
Macrodata Disclosure Limitation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11he
-
Macrodata Disclosure Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hf
-
Maliciously Modified Set of Administrative Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hg
-
Malware.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hh
-
Maurer's Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hi
-
MD4 Hash Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hj
-
MD5 Hash Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hk
-
Measurement Models of Software Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hl
-
Memory and State Exhaustion DoS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hm
-
Memory Overflow.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hn
-
Merkle-Hash-Trees Signatures.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ho
-
Message Authentication Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hp
-
Microdata Anonymization Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hq
-
Microdata Disclosure Limitation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hr
-
Microdata Disclosure Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hs
-
Microdata Statistical Disclosure Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ht
-
Miller-Rabin Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hu
-
MILS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hv
-
Minimal Privilege.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hw
-
ML-Sequence.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hx
-
Monitoring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hy
-
MPKC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11hz
-
Algebraic Number Field.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11i
-
MQ or Multivariate Quadratic Public-Key Cryptosystem (MQPKC).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ia
-
Multi-Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ib
-
Multicast Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ic
-
Multicast Stream Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11id
-
Multidimensional Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ie
-
Multifactor Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11if
-
Multiparty Computation (MPC).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ig
-
Near Field Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ih
-
Nearest Vector Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ii
-
Network DoS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ij
-
Network Flooding Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ik
-
NFS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11il
-
Node Replication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11im
-
Nonrepudiable Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11in
-
Nonrepudiation Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11io
-
NSS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ip
-
NTRUEncrypt.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11iq
-
NTRUSign.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ir
-
Nucleic Acid.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11is
-
Number Field Sieve.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11it
-
Nym.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11iu
-
One-Way Chain.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11iv
-
One-way property.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11iw
-
Online Analytical Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ix
-
Operational Separation of Duties.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11iy
-
Outbound Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11iz
-
Algorithmic Complexity Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11j
-
Packet Flooding Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ja
-
Palmprint Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jb
-
Parallelizable Message Authentication Code.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jc
-
Pattern of Blood Vessels.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jd
-
Penmanship.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11je
-
PGP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jf
-
Phi Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jg
-
Physical Obfuscated Key.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jh
-
Physical Random Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ji
-
PKI Trust Relationships.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jj
-
POK.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jk
-
Prime Certificate.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jl
-
Privacy Protection in Biometric Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jm
-
Privacy-Aware Database.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jn
-
Privacy-Enabled Database.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jo
-
Privacy-Enhanced Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jp
-
Private Exponent.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jq
-
Private Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jr
-
PRNG.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11js
-
Program Integrity Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jt
-
Project Athena.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ju
-
Proof of Work.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jv
-
Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jw
-
Public Exponent.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jx
-
Public Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jy
-
Public Key Infrastructure.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11jz
-
Anomalous Binary Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11k
-
Public-Key Authenticated Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ka
-
Public-Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kb
-
Public-Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kc
-
PUF.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kd
-
QRP.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ke
-
Radio Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kf
-
Radio Interference Attack Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kg
-
Radio-Frequency (RF) Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kh
-
Radiometric Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ki
-
Radiometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kj
-
Random Key Predistribution.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kk
-
Rank-Matric Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kl
-
RBAC.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11km
-
Record Linkage.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kn
-
Relationship Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ko
-
Remote Attestation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kp
-
Residue Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kq
-
Resistance to the Standard Algebraic Attack.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kr
-
Rivest Cipher 5.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ks
-
Rivest Cipher 6.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kt
-
Ron's Code 5.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ku
-
Ron's Code 6.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kv
-
Routing Anonymity.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kw
-
Rule-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kx
-
Run-Time Malware Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ky
-
Runtime Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11kz
-
Anonymity in Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11l
-
Secret Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11la
-
Secure Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lb
-
Secure Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lc
-
Secure Computer System Model.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ld
-
Secure Email.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11le
-
Secure Function Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lf
-
Secure Hash Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lg
-
Secure Location Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lh
-
Secure Logging.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11li
-
Secure Multiparty Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lj
-
Secure Networks Design.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lk
-
Secure Remote Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ll
-
Secure Shell.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lm
-
Secure Wireless Mesh Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ln
-
Secure Wireless Multicast.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lo
-
Security of Web Browser Scripting Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lp
-
Security Token.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lq
-
Security Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lr
-
Segregation of Duties.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ls
-
Sensor Key Establishment and Maintenance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lt
-
SHA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lu
-
Shamir's Trick.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lv
-
Shannon's Maxim.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lw
-
Side-Channel Leakage.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lx
-
Signed Window Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ly
-
Simultaneous Transactions.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11lz
-
Anonymous Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11m
-
Single Euro Payments Area.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ma
-
Single Wire Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mb
-
Smart/Algorithmic Denial of Service.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mc
-
Software-Based Attestation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11md
-
Software-Optimized Encryption Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11me
-
Space-Time Trade-Off.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mf
-
Speaker Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mg
-
Speaker Identification and Verification (SIV).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mh
-
Specific Emitter Identification (SEI).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mi
-
Specific Emitter Verification (SEV).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mj
-
Square-and-Multiply Exponentiation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mk
-
SSL.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ml
-
SSS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mm
-
Stack (Buffer) Overflow.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mn
-
Stack (Buffer) Overrun.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mo
-
Stack/Heap Smashing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mp
-
Standard Basis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mq
-
Static Code Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mr
-
Static Program Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ms
-
Static Separation of Duties.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mt
-
Stein's Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mu
-
Strong Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mv
-
Strong Collision Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mw
-
Strong Exclusion.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mx
-
Subgroup Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11my
-
Subscriber Identity Module.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11mz
-
Anthropometric Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11n
-
Talker Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11na
-
Target Collision Resistant Hash Function.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nb
-
TCG Trusted Computing Group.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nc
-
TCP SYN Cookies.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nd
-
TCP SYN Flooding.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ne
-
Temporal Authorization Models.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nf
-
Time-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ng
-
TLS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nh
-
TPM Trusted Platform Module.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ni
-
Tracing Traitors.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nj
-
Tracking Cookie.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nk
-
Transport-Level Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nl
-
Tripartite Key Exchange.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nm
-
Trojan.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nn
-
Trust Anchor.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11no
-
Two-Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11np
-
Typing Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nq
-
Typing Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nr
-
UMTS IC Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ns
-
Universal Integrated Circuit Card.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nt
-
Virtualization Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nu
-
Virtualized Packer.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nv
-
Virus Scanner.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nw
-
VM Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nx
-
Voice Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ny
-
Voice Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11nz
-
Anthropometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11o
-
Voiceprint Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oa
-
VSSS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ob
-
Weak Collision Resistance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oc
-
Weak Exclusion.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11od
-
Web Application Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oe
-
Web Client Security and Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11of
-
Web Initial Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11og
-
Web Initial Sign on.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oh
-
Web Penetration Test.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oi
-
Web Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oj
-
Web Session Security.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ok
-
Web SSO and Security Assertion Markup Language.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11ol
-
Web Vulnerability Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11om
-
Wireless Locational Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11on
-
Wiretapping.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oo
-
XSS.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11op
-
Zeta Function Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11oq
-
Anthropometry.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11p
-
Anti-DoS Cookies.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11q
-
Anti-Jamming Strategy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11r
-
Antispam Based on Sender Reputation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11s
-
Antivirus.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11t
-
Applications of Rank-Metric Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11u
-
ARP Poison Routing (APR).
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11v
-
ARP Poisoning.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11w
-
Asynchronous Stream Cipher.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11x
-
Attack by Summation Over an Hypercube.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11y
-
Authorization.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/X11z
-
M-Invariance.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Xiao11
-
Jamming Attack Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Xu11
-
Network Capabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Yang11
-
Anonymous Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/YangZ11
-
Sensor Code Attestation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/YangZ11a
-
Sensor Key Management.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/YangZ11b
-
DNA.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/YanushkevichP11
-
Security for Mashups.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Yoshihama11
-
Privacy-Preserving Authentication in Wireless Access Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/YuLR11
-
False Data Injection Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zhang11
-
Secure Data Aggregation.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zhang11a
-
Source Location Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zhang11b
-
Hand Geometry Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ZhangK11
-
Palmprint Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ZhangYZ11
-
Elliptic Curve Method.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zimmermann05
-
Elliptic Curve Method for Factoring.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zimmermann11
-
Authentication token.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato05
-
Entity Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato05a
-
Identity Verification Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato05b
-
Key Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato05c
-
Authentication Token.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato11
-
Entity Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato11a
-
Identity Verification Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato11b
-
Key Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/Zuccherato11c
-
Separation of Duties.
https://dblp.l3s.de/d2r/resource/publications/reference/crypt/ZurkoS11
-
Handbook of Research on Digital Libraries: Design, Development, and Impact
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/2009
-
New Roles of Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/AhmadSD09
-
Digital Library Service System; Digital Library System; Document Model; Grid Computing; Grid Infrastructure; Institutional Repository; Service Oriented Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Al-SuqriF09
-
Development of Digital Libraries in Pakistan.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/AmeenR09
-
Towards Multimedia Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/BaptistaS09
-
Semantic Association Analysis in Ontology-Based Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/BarnaghiWK09
-
Digital Libraries as a Foundation of Spatial Data Infrastructures.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/BejarNLMZ09
-
Software Process Asset Libraries Using Knowledge Repositories.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Bermon-AngaritaSSG09
-
OpenDLib.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/CandelaCP09
-
DL and GIS.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/CasbasNZ09
-
The Future of Learning with Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/ChangH09
-
Metadata Interoperability.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/ChudamaniN09
-
An Empirical Analysis of the Utilization of University Digital Library Resources.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Deng09
-
Reference Services in Digital Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/DollahS09
-
From Digital Archives to Virtual Exhibitions.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/FooTGN09
-
Standardization of Terms Applying Finite-State Transducers (FST).
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Galvez09
-
On the Effectiveness of Social Tagging for Resource Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/GohRCLF09
-
Digital Libraries Overview and Globalization.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Grace09
-
A Classification Scheme for Innovative Types in Scholarly Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/HagenhoffOS09
-
Usability Evaluation of Digital Library.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Jeng09
-
The Strategic Plan of Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Kettunen09
-
Speechfind.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/KimH09
-
Digital Library Requirements.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/KimaniPCA09
-
Duplicate Journal Title Detection in References.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/KovacevicD09
-
Personal Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/LavariegaGSG09
-
Music Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/LidyR09
-
USGS Digital Libraries for Coastal and Marine Science.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/LightsomA09
-
Guidelines for Developing Digital Cultural Collections.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/LourdiN09
-
A Review of Progress in Digital Library Education.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/MaCO09
-
User-Adapted Information Services.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Mandl09
-
Word Segmentation in Indo-China Languages for Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/NaTGTF09
-
Map-Based User Interfaces for Music Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/NeumayerR09
-
Semantic Annotation and Retrieval of Images in Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/OsmanTS09
-
Automatic Text Summarization in Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/OuKG09
-
Digital Libraries as Centres of Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Pang09
-
Improving Multimedia Digital Libraries Usability Applying NLP Sentence Similarity to Multimodal Sentences.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/PaolozziFG09
-
Digital Libraries Beyond Cultural Heritage Information.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/PicazoSV09
-
Comparing Open Source Digital Library Software.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/PyrounakisN09
-
The CGIAR Virtual Library Bridging the Gap Between Agricultural Research and Worldwide Users.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/RamosAFS09
-
The European Approach Towards Digital Library Education.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Ratzek09
-
BIVALDI the Digital Library of the Valencian Bibliographic Inheritance.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/RomeroMCA09
-
Digital Libraries and Ontology.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/SantosCV09
-
Access and Control; Digital Libraries; Information Ethics; Privacy; Security.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Saravani09
-
Patent and Trade Secret in Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Sasaki09
-
Effective and Efficient Browsing of Large Image Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Schaefer09
-
Visual Pattern Based Compressed Domain Image Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Schaefer09a
-
Visualisation of Large Image Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/SchaeferR09
-
User Profiles for Personalizing Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/SemeraroBGL09
-
Metadata and Metaphors in Visual Interfaces to Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Shiri09
-
Using Topic-Specific Ranks to Personalize Web Search.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Stamou09
-
Digital Preservation.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/StrodlBR09
-
Design and Development of a Taxonomy Generator.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/ThengLNFG09
-
Computational Sense for Digital Librarians.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/TwidaleN09
-
Handhelds for Digital Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/VeronikisTP09
-
Extracting the Essence.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/WangY09
-
The Greenstone Digital Library Software.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/WittenB09
-
Core Topics in Digital Library Education.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/YangWPO09
-
Extensible Digital Library Service Platform.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/YehSC09
-
The Role and Integration of Digital Libraries in E-Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/dlhandbook/Yen09
-
Data Mining and Knowledge Discovery Handbook, 2nd ed.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/2010
-
Fractal Mining - Self Similarity-based Clustering and its Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/BarbaraC10
-
Text Mining and Information Extraction.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Ben-DovF10
-
Outlier Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Ben-Gal10
-
Statistical Methods for Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/BenjaminiL10
-
Data Mining within a Regression Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Berk10
-
Constraint-based Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/BoulicautJ10
-
Data Mining Query Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/BoulicautM10
-
Geometric Methods for Feature Extraction and Dimensional Reduction - A Guided Tour.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Burges10
-
Data Mining for Imbalanced Datasets: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Chawla10
-
Dimension Reduction and Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/ChiziM10
-
Parallel and Grid-Based Data Mining - Algorithms, Models and Systems for High-Performance KDD.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/CongiustaTT10
-
Pattern Clustering Using a Swarm Intelligence Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/DasA10
-
Link Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Donoho10
-
Relational Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Dzeroski10
-
Weka-A Machine Learning Workbench for Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/FrankHHKPWT10
-
A Review of Evolutionary Algorithms for Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Freitas10
-
Web Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Furnkranz10
-
Data Stream Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/GaberZK10
-
Bias vs Variance Decomposition for Regression and Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Geurts10
-
Data Mining Model Comparison.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Giudici10
-
Frequent Set Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Goethals10
-
Rule Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Grzymala-Busse10
-
Handling Missing Attribute Values.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Grzymala-BusseG10
-
Logics for Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Hajek10
-
Quality Assessment Approaches in Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/HalkidiV10
-
Association Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Hoppner10
-
Spatio-temporal clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/KisilevichMNR10
-
Data Mining for Financial Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/KovalerchukV10
-
Data Mining in Medicine.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/LavracZ10
-
Data Mining for Target Marketing.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/LevinZ10
-
Wavelet Methods in Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/LiMO10
-
Granular Computing and Rough Sets - An Incremental Development.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/LinL10
-
NHECD - Nano Health and Environmental Commented Database.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/MaimonB10
-
A Review of Reinforcement Learning Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/MaimonC10
-
Introduction to Knowledge Discovery and Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/MaimonR10
-
Data Cleansing: A Prelude to Knowledge Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/MaleticM10
-
Collaborative Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Moyle10
-
Organizational Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/NematiB10
-
A Review of Web Document Clustering Approaches.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/OikonomakouV10
-
Mining Time Series Data.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/RatanamahatanaLGKVD10
-
Visual Analysis of Sequences Using Fractal Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/RiminiM10
-
A survey of Clustering Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Rokach10
-
Using Fuzzy Logic in Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Rokach10a
-
Ensemble Methods in Supervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Rokach10b
-
Supervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/RokachM10
-
Classification Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/RokachM10a
-
Data Mining using Decomposition Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/RokachM10b
-
Interestingness Measures - On Determining What Is Interesting.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Sahar10
-
Bayesian Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/SebastianiAR10
-
Spatial Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/ShekharZH10
-
Support Vector Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Shmilovici10
-
Learning Information Patterns in Biological Databases - Stochastic Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Singh10
-
Data Mining for Intrusion Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/SinghalJ10
-
Data Mining for CRM.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Thearling10
-
Privacy in Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Torra10
-
Information Fusion - Methods and Aggregation Operators.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Torra10a
-
Mining Multi-label Data.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/TsoumakasKV10
-
Meta-Learning - Concepts and Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/VilaltaGB10
-
Mining High-Dimensional Data.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/WangY10
-
Mining Concept-Drifting Data Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/WangYH10
-
Mining with Rare Cases.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Weiss10
-
Discretization Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/YangWW10
-
Causal Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/YaoBH10
-
Neural Networks For Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/Zhang10
-
Commercial Data Mining Software.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/ZhangS10
-
Multimedia Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/dmkdh/ZhangZ10
-
Handbook of Document Image Processing and Recognition
https://dblp.l3s.de/d2r/resource/publications/reference/docip/2014
-
A Brief History of Documents and Writing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Baird14
-
The Evolution of Document Image Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/BairdT14
-
Middle Eastern Character Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/BelaidR14
-
Processing Mathematical Notation.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/BlosteinZ14
-
Machine-Printed Character Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Cao14
-
Recognition of Tables and Forms.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/CouasnonL14
-
Analysis of the Logical Layout of Documents.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/DengelS14
-
Analysis and Recognition of Music Scores.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/FornesS14
-
Continuous Handwritten Script Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/FrinkenB14
-
Imaging Techniques in Document Analysis Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Gatos14
-
Document Analysis in Postal Applications and Check Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Gilloux14
-
Analysis of Documents Born Digital.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/HuL14
-
Logo and Trademark Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/KesidisK14
-
Online Handwriting Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/KimS14
-
Page Segmentation Techniques in Document Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Kise14
-
Analysis and Interpretation of Graphical Documents.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/LamiroyO14
-
Graphics Recognition Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/LladosR14
-
Sketching Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/LuL14
-
Tools and Metrics for Document Analysis Systems Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/MargnerA14
-
Page Similarity and Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Marinai14
-
Text Segmentation for Document Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/NobileS14
-
Language, Script, and Font Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Pal14
-
Online Signature Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/PlamondonPI14
-
Asian Character Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/SetlurS14
-
Document Creation, Image Acquisition and Document Quality.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Smith14
-
An Overview of Symbol Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/TabboneT14
-
Image Based Retrieval and Keyword Spotting in Documents.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/TanZL14
-
Handprinted Character and Word Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/TulyakovG14
-
Text Localization and Recognition in Images and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Uchida14
-
Datasets and Annotations for Document Analysis and Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/docip/Valveny14
-
Mobile Cloud Gaming.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/0001KHLC19
-
Encyclopedia of Computer Graphics and Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/2019
-
Griefing in MMORPGs.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AchterboschV19
-
Virtual Reality Therapy.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Adjorlu19
-
Skull and Roses Card Game.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AguazaBS19
-
3D Room Layout System Using IEC (Interactive Evaluational Computation).
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AkaseO19
-
Design of Alienation in Video Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AkayS19
-
Challenges Facing the Arab Animation Cinema.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Alrimawi19
-
Biosensing in Interactive Art: A User-Centered Taxonomy.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AlyPB19
-
Games and Active Aging.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AmaralF19
-
Timed Automata for Video Games and Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AriasMD19
-
Comic Arts in Games, Asset Production, and Rendering.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AricaT19
-
Game-Based Interventions in Public Health: Exploiting the Engaging Factor of Gameplay.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Arnab19
-
Query-by-Gaming.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/AygunB19
-
Game Writer's Dilemma: Context vs. Story.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Berger19
-
Video Game Storytelling Fundamentals: Setting, Power Status, Tone, Escalation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Berger19a
-
Video Game Trolls and Dopamine Withdrawal.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Berger19b
-
Eye Tracking in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Berkman19
-
History of Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Berkman19a
-
Presence and Immersion in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/BerkmanA19
-
Dynamic Music Generation, Audio Analysis-Synthesis Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/BernardesC19
-
Interacting with a Fully Simulated Self-Balancing Bipedal Character in Augmented and Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/BorerGSG19
-
Abstraction and Stylized Design in 3D Animated Films: Extrapolation of 2D Animation Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Boulos19
-
Information Presentation Methods in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Bozgeyikli19
-
Locomotion in Virtual Reality Video Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Bozgeyikli19a
-
Immersive Virtual Reality Serious Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/BozgeyikliB19
-
Computer Graphics, Video Games, and Gamification Impacting (Re)Habilitation, Healthcare, and Inclusive Well-Being.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Brooks19
-
Games and the Magic Circle.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Brown19
-
Virtual Reality Exercise and Rehabilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Bruun-Pedersen19
-
3D-Rendered Images and Their Application in the Interior Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Budakov19
-
Animation and Neurocinematics: Visible Language of E-motion-S and Its Magical Science.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Carpe19
-
Shape Deformation Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Chaudhuri19
-
StarCraft Bots and Competitions.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/ChurchillPRSUOC19
-
Augmented Reality in Image-Guided Surgery.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Cutolo19
-
Cloud for Gaming.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/DAngeloFM19
-
Movie-Making of Spatiotemporal Dynamics in Complex Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/DavisK19
-
Stress Reduction, Relaxation, and Meditative States Using Psychophysiological Measurements Based on Biofeedback Systems via HRV and EEG.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/DavisKS19
-
The New Age of Procedural Texturing.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Deguy19
-
Game Design and Emotions: Analysis Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Dillon19
-
Bounding Volume Hierarchies for Rigid Bodies.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Dinas19
-
Collision Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Dinas19a
-
Multi-user Virtual Environments for Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/DoganCT19
-
Gamification of Modern Society: Digital Media's Influence on Current Social Practices.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/DombrowskiL19
-
Exploring Innovative Technology: 2D Image Based Animation with the iPad.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Dowling19
-
Social Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/DzardanovaKG19
-
Game Player Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/FarooqK19
-
Client/Server Gaming Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/FerrettiD19
-
Online Gaming Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/FerrettiD19a
-
Online Gaming Scalability.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/FerrettiD19b
-
Audiogame.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Fiadotau19
-
Digital Games for Animals.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Fiadotau19a
-
Incremental Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Fiadotau19b
-
Indie Game.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Fiadotau19c
-
Everyday Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/GarnerPP19
-
Theory of Minkowski-Lorentz Spaces.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/GarnierBDFM19
-
Gamification and Serious Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/George19
-
Immersive Auralization Using Headphones.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Geronazzo19
-
Sound Spatialization.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Geronazzo19a
-
User Acoustics with Head-Related Transfer Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Geronazzo19b
-
Challenge-Based Learning in a Serious Global Game.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/GibsonIS19
-
Sketch-Based Posing for 3D Animation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/GouvatsosX19
-
Cognitive Processing of Information Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/GuoWC19
-
Scalable Techniques to Visualize Spatiotemporal Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/GuoWC19a
-
Social-, Mobile- and Multi-Player-Games and their Impact on Today's Online Entertainment Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HebgenH19
-
Computer Games and Artificial Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Hildmann19
-
Computer Games and the Evolution of Digital Rights.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HildmannH19
-
Computer Games in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HildmannH19a
-
Origin of Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HildmannH19b
-
Overview of Artificial Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HildmannH19c
-
Game Loop and Typical Implementation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HitchcockS19
-
Game Physics Engine, Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HitchcockS19a
-
Interactive Computer Graphics and Model-View-Controller Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HitchcockS19b
-
Cognitive Psychology Applied to User Experience in Video Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Hodent19
-
Spatial Perception in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Hodgson19
-
Modeling and Mesh Processing for Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Huang19
-
Children Privacy Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HungFR19
-
Smart Toys.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HungIY19
-
Toy Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HungRF19
-
Gamification Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/HyrynsalmiKS19
-
Puyo Puyo.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Ikeda19
-
Distributed Simulation and Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Ikonen19
-
Holography as an Architectural Decoration.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Ishii19
-
3D Visualization Interface for Temporal Analysis of Social Media.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Itoh19
-
Augmented Reality Entertainment: Taking Gaming Out of the Box.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/ItzsteinBST19
-
Virtual Reality as New Media.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Johnston19
-
Cellular Automata Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Judice19
-
Lattice Boltzmann Method for Diffusion-Reaction Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Judice19a
-
Lattice Boltzmann Method for Fluid Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Judice19b
-
Lattice Gas Cellular Automata for Fluid Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Judice19c
-
Rendering Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/JudiceGK19
-
Educational Virtual Reality Game Design for Film and Animation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KalS19
-
Emotion-Based 3D CG Character Behaviors.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KanekoO19
-
Tactile Visualization and 3D Printing for Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KaplanP19
-
Immersive Technologies for Medical Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KapralosUD19
-
3D Modelling Through Photogrammetry in Cultural Heritage.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KasapakisGD19
-
Mixed Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KasapakisGD19a
-
Genetic Algorithm (GA)-Based NPC Making.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KhanO19
-
Detecting and Preventing Online Game Bots in MMORPGs.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KimW19
-
Gamification.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Knutas19
-
Narrative in Video Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Koenitz19
-
Mindfulness, Virtual Reality, and Video Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/KosaU19
-
Multivariate Visualization Using Scatterplots.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/LambertiMS19
-
Redirected Walking in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/LangbehnS19
-
Game Bot Detection on Massive Multiplayer Online Role-Playing Games (MMORPGs) Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Lanzi19
-
Virtual Reality Game Engines.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Lau19
-
Virtual Reality Stereo Post-Conversion After Effects Workflow.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Lau19a
-
STEM Learning Through Video Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Lederman19
-
Interaction with Mobile Augmented Reality Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/LeeY19
-
Children's Games, from Turtle to Squirtle.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Madej19
-
Potential of Augmented Reality for Intelligent Transportation Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/MahmoodBJ19
-
Key Early Verticals, Challenges and Limitations in Implementation of Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/MahmoodBZJ19
-
Motion Planning in Computer Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Mali19
-
Public Health Education Via Computer Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Mali19a
-
Augmented Reality for Human-Robot Interaction in Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/ManuriPS19
-
Online Players: Engagement, Immersion, and Absorption Across Secondary Worlds.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Mariani19
-
Tensor Field Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/McGraw19
-
Virtual Reality System Fidelity.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/McMahan19
-
Overview of Virtual Ambisonic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Mcloughlin19
-
Transformational Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/MorrillC19
-
Character Animation Scripting Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/MousasA19
-
Decoupling Game Tool GUIs from Core Editing Operations.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Nedelcu19
-
Plug-in-Based Asset Compiler Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Nedelcu19a
-
Cybersickness.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/NesbittN19
-
Pervasive Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Nevelsteen19
-
Physical, Virtual, and Game World Persistence.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Nevelsteen19a
-
Virtual World, a Definition Incorporating Distributed Computing and Instances.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Nevelsteen19b
-
Hypermedia Narrative as a Tool for Serious Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/NewballLS19
-
Natural Walking in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Nilsson19
-
Perceptual Illusions and Distortions in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Nilsson19a
-
Postproduction in Game Cinematics.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/North19
-
Foundations of Interaction in the Virtual Reality Medium.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/OlsonSZH19
-
RTS AI Problems and Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/OntanonSURCP19
-
Collaborative Engineering and Virtual Prototyping Within Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/OzkanT19
-
Game Prosumption.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Ozturkcan19
-
Virtual Reality Retailing.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Ozturkcan19a
-
Mixed Reality, Gamified Presence, and Storytelling for Virtual Museums.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PapagiannakisGPLTSLGDGPMDVCSM19
-
Augmented Reality for Maintenance.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Paravati19
-
3D Printing, History of.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PeedL19
-
History of Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PeedL19a
-
Open Source 3D Printing, History of.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PeedL19b
-
Origin of Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PeedL19c
-
Conceptual Model of Mobile Augmented Reality for Cultural Heritage.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PenditZB19
-
MEEGA+, Systematic Model to Evaluate Educational Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PetriWB19
-
Raycasting in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Pietroszek19
-
Virtual Hand Metaphor in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Pietroszek19a
-
Virtual Pointing Metaphor in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Pietroszek19b
-
Gamification in Crowdsourcing Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/PrandiSM19
-
Accessibility of Virtual Reality for Persons with Disabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Quarles19
-
Rehabilitation Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/RavyseTBSS19
-
Teaching Computer Graphics by Application.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Redfield19
-
Area of Interest Management in Massively Multiplayer Online Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/RicciC19
-
Vector Graphics.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/RickMR19
-
Player-Avatar Link: Interdisciplinary Embodiment Perspectives.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/RosaHVW19
-
Augmented Learning Experience for School Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/RoySD19
-
Facial Recognition and Emotion Detection in Environmental Installation and Social Media Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/RussellML19
-
Fluid Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/SchmidtS19
-
Secure Gaming: Cheat-Resistant Protocols and Game History Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Schober19
-
Constructing Game Agents Through Simulated Evolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/SchrumM19
-
Videogame Engagement: Psychological Frameworks.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Sengun19
-
Sonic Interactions in Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Serafin19
-
Analog Prototyping for Digital Game Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Sezen19
-
Political Game Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Sezen19a
-
Mixed Reality and Immersive Data Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Silva19
-
Game Thinking X Game Design Thinking.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/SilvaB19
-
Game Interface: Influence of Diegese Theory on the User Experience.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/SilvaF19
-
Substitutional Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Simeone19
-
Uncanny Valley in Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Stein19
-
Games in Science.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/SteinL19
-
Face Beautification in Antiage.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/SunM19
-
Contemporary Computer Shogi.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/TakizawaIHH19
-
Virtual Reality Applications in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/TepeKT19
-
Crowd Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Thalmann19
-
Post-Digital Graphics in Computer Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Thibault19
-
Semiotics of Computer Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Thibault19a
-
Interactive Virtual Reality Navigation Using Cave Automatic Virtual Environment Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/TorresP19
-
User-Centered Design and Evaluation Methodology for Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/TrompLN19
-
Narrative Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/TryggSS19
-
Position Based Dynamics.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Tsai19
-
Redesigning Games for New Interfaces and Platforms.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Tuker19
-
Training Spatial Skills with Virtual Reality and Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Tuker19a
-
Psychological Game Design.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/UysalK19
-
Player Personas and Game Choice.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/VahloK19
-
Pipeline of 2D Vector Animation in Television Series.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Valdunciel19
-
Technologies for the Design Review Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/VishkaieL19
-
UV Map Generation on Triangular Mesh.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/WangM19
-
Emotional Congruence in Video Game Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/WilliamsCM19
-
Monte-Carlo Tree Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Winands19
-
Crowd Evacuation Using Simulation Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Wong19
-
Artistic Data Visualization in the Making.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Xu19
-
Integrating Virtual Reality and Augmented Reality into Advertising Campaigns: History, Technology, and Future Trends.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/YangK19
-
2-Simplex Prism as a Cognitive Graphics Tool for Decision-Making.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Yankovskaya19
-
Shadow Shooter: All-Around Game with e-Yumi 3D.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Yasumoto19
-
Procedural Audio in Video Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Yee-KingD19
-
Virtual Reality-Based Daily Scrum Meetings.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Yilmaz19
-
Image Quality Evaluation of a Computer-Generated Phase Hologram.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Yoshikawa19
-
Computer Go.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Yoshizoe019
-
Game Development Leadership Tips.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/Zaffari19
-
Interactive Augmented Reality to Support Education.
https://dblp.l3s.de/d2r/resource/publications/reference/ecgg/ZhangZ19
-
Encyclopedia of Information Ethics and Security
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/2007
-
Information Ethics from an Islamic Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Abdallah07
-
Measuring Ethical Reasoning of IT Professionals and Students.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Abdolmohammadi07
-
Personal Information Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Al-Fedaghi07
-
Taxonomy of Computer and Information Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Al-Fedaghi07a
-
Universal Internet Access under an Ethical Lens.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Arbore07
-
Formulating a Code of Cyberethics for a Municipality.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Averweg07
-
Mitigation of Identity Theft in the Information Age.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/BeckerSJ07
-
Cyber-Terrorism in Australia.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Beggs07
-
Internet Research Ethics Questions and Considerations.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Buchanan07
-
Conflicting Value of Digital Music Piracy.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Butler07
-
Ethical Dilemmas in Data Mining and Warehousing.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/CazierL07
-
Federal Information Security Law.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Chapple07
-
Ethical Behaviour in Technology-Mediated Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Chatterjee07
-
Content Filtering Methods for Internet Pornography.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Chen07
-
Digital Divide Implications and Trends.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/ChenK07
-
E-Health and Ensuring Quality.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Chhanabhai07
-
Computer Worms, Detection, and Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Cole07
-
Digital Rights Management Metadata and Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/CoteP07
-
Meta View of Information Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Crowell07
-
Internet and Suicide.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Currier07
-
Pedagogical Framework for EthicalDevelopment.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/DarkEMCY07
-
Information Security and the "Privacy Broker".
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/DoumaG07
-
Objective Ethics for Managing InformationTechnology.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Drake07
-
Barriers Facing African American Women in Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Du07
-
Interviews with Young People using Online Chat.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/DunkelsE07
-
Managing the Environmental Impact of Information Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Dyson07
-
Ethical Usability Testing with Children.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Ellis07
-
The Ethical Debate Surrounding RFID.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/EtterPM07
-
Information Security Policy Research Agenda.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/FulfordD07
-
Engineering Multi-Agent Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Gasmelseid07
-
Educational Technology Practitioner-Research Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Gray07
-
B-POS Secure Mobile Payment System.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Grillo07
-
Protection of Mobile Agent Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Guan07
-
Secure Agent Roaming under M-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Guan07a
-
Pharming Attack Designs.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Gupta07
-
Privacy and Online Data Collection.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Gurau07
-
Parental Rights to Monitor Internet Usage.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Halpert07
-
Secure Automated Clearing House Transactions.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Hanson07
-
Moral Rights in the Australian Public Sector.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Hocking07
-
Ethical Concerns in Computer Science Projects.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/IronsB07
-
Sustainable Information Society.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Isenmann07
-
Security Model for Educational Satellite Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Jasola07
-
Classifying Articles in Information Ethics and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Jourdan07
-
Ethics in Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Kamthan07
-
Computer Ethics and Intelligent Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Kats07
-
Port Scans.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Kawash07
-
DRM Practices in the E-Publication Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Kiau07
-
Intrusion Detection and Information Security Audits.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/KiddH07
-
Ethics of AI.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Korb07
-
Information Security Policies for Networkable Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/KotlarskyOH07
-
Privacy in Data Mining Textbooks.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Lawler07
-
Ethics and Access to Technology for Persons with Disabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Lazarus07
-
Ethics Education for the Online Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Leonard07
-
3D Avatars and Collaborative Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/LiS07
-
Dilemmas of Online Identity Theft.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Mahmood07
-
Individual and Institutional Responses to Staff Plagiarism.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/McNaught07
-
Investigation Strategy for the Small Pedophiles World.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Me07
-
Homo Electricus and the Continued Speciation of Humans.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Michael07
-
Ethics in the Security of Organizational Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Mishra07
-
IT Security Culture Transition Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Ngo07
-
Ethical Approach to Gathering Survey Data Online.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Nichol07
-
Argumentation and Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Nissan07
-
Argumentation with Wigmore Charts and Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Nissan07a
-
Artificial Intelligence Tools for Handling Legal Evidence.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Nissan07b
-
Tools for Representing and Processing Narratives.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Nissan07c
-
Identity Verification using Resting State Brain Signals.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/PalaniappanP07
-
Advertising in the Networked Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/PapagiannidisB07
-
Security of Communication and Quantum Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Paperin07
-
Traditional Knowledge and Intellectual Property.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Popova-Gosart07
-
Ethics and Perceptions in Online Learning Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Ramim07
-
Data Security and Chase.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/RasI07
-
Multimodal Biometric System.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Rattani07
-
Security Dilemmas for Canada's New Government.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Roy07
-
Computational Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Ruvinsky07
-
Access Control for Healthcare.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Shen07
-
Modelling Context-Aware Security for Electronic Health Records.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/ShettyL07
-
Rule-Based Policies for Secured Defense Meetings.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/ShettyL07a
-
Managed Services and Changing Workplace Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Sixsmithm07
-
Electronic Signatures and Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Srivastava07
-
Spyware.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Stafford07
-
Information Ethics as Ideology.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Stahl07
-
Internet Piracy and Copyright Debates.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Sugden07
-
ICT Leapfrogging Policy and Development in the Third World.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Third07
-
Ethics and Security under the Sarbanes-Oxley Act.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/TribunellaT07
-
Fair Use.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Tyrvaskyla07
-
Document Security in the Ancient World.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Walker07
-
Ethical Erosion at Enron.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Wang07
-
Hackers and Cyber Terrorists.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Warren07
-
Security Protection for Critical Infrastructure.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Warren07a
-
Privacy and Access to Electronic Health Records.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Whiddett07
-
Patient Centric Healthcare InformationSystems in the U.S.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Wickramasinghe07
-
Defending against Distributed Denial of Service.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/XiangZ07
-
Mobile Agents and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Xue07
-
Anonymous Peer-to-Peer Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Zhao07
-
Building Secure and Dependable Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ethics/Zhao07a
-
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/2010
-
Forensic Implications of Virtualization Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/Anglano10
-
Testing Digital Forensic Software Tools Used in Expert Testimony.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/BattenP10
-
A Novel Multilevel DCT Based Reversible Data Hiding.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/CaiA10
-
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/CaldelliAPRU10
-
Privacy Enhancing Technologies in Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/CampisiMN10
-
Trends in Information Security Regulation.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/CanningW10
-
Identity Theft through the Web.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/Chen10
-
Deception Detection on the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/ChenPDCS10
-
Network Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/Cohen10
-
Legal Issues for Research and Practice in Computational Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/ElmaghrabyKL10
-
Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/FrantzeskouMS10
-
Forensic Investigation of Peer-to-Peer Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/IeongLCKL10
-
Challenges and Solutions in Multimedia Document Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/KatzenbeisserLS10
-
A Fingerprint Forensic Tool for Criminal Investigations.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/MarcialisRCD10
-
Massively Threaded Digital Forensics Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/MarzialeMRRS10
-
Biometrical Processing of Faces in Security and Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/Puslecki10
-
Principles and Methods for Face Recognition and Face Modelling.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/RawlinsonBW10
-
Embedded Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/SavoldiG10
-
Digital Camera Photographic Provenance.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/Sorell10
-
Conceptual Tools for Dealing with 'Narrative' Terrorism Information.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/Zarri10
-
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/ZhaoH10
-
A Novel Intrusion Detection System for Smart Space.
https://dblp.l3s.de/d2r/resource/publications/reference/forensics/ZhouSM10
-
Handbook of Genetic Programming Applications
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/2015
-
Application of Genetic Programming for Uniaxial and Multiaxial Modeling of Concrete.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/Babanajad15
-
Design of Real-Time Computer-Based Systems Using Developmental Genetic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/DeniziakCP15
-
Use of Genetic Programming Based Surrogate Models to Simulate Complex Geochemical Transport Processes in Contaminated Mine Sites.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/EsfahaniD15
-
Application of Genetic Programming in Hydrology.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/Fallah-MehdipourH15
-
Application of Genetic Programming for Electrical Engineering Predictive Modeling: A Review.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/HosseiniN15
-
A New Evolutionary Approach to Geotechnical and Geo-Environmental Modelling.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/HussainACJ15
-
Trading Volatility Using Highly Accurate Symbolic Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/Korns15
-
Genetically Improved Software.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/Langdon15
-
Mate Choice in Evolutionary Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/LeitaoM15
-
Genetic Programming for Mining Association Rules in Relational Database Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/LunaCV15
-
Graph-Based Evolutionary Art.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/MachadoCA15
-
Potential of Genetic Programming in Hydroclimatic Prediction of Droughts: An Indian Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/MaityC15
-
On the Application of Genetic Programming for New Generation of Ground Motion Prediction Equations.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/MousaviARF15
-
Evaluation of Liquefaction Potential of Soil Based on Shear Wave Velocity Using Multi-Gene Genetic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/MuduliD15
-
eCrash: a Genetic Programming-Based Testing Tool for Object-Oriented Software.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/RibeiroNVZ15
-
Application of GFA-MLR and G/PLS Techniques in QSAR/QSPR Studies with Application in Medicinal Chemistry and Predictive Toxicology.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/RoyRR15
-
Image Classification with Genetic Programming: Building a Stage 1 Computer Aided Detector for Breast Cancer.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/RyanFKM15
-
Site Characterization Using GP, MARS and GPR.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/SamuiDJ15
-
GPTIPS 2: An Open-Source Software Platform for Symbolic Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/Searson15
-
Genetic Programming for Modelling of Geotechnical Engineering Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/Shahin15
-
Evolving GP Classifiers for Streaming Data Tasks with Concept Change and Label Budgets: A Benchmarking Study.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/VahdatMMHZ15
-
Genetic Programming Applications in Chemical Sciences and Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/VyasGT15
-
Application of Gene-Expression Programming in Hydraulic Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/genetic/ZahiriDA15
-
Encyclopedia of Knowledge Management, Second Edition
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/2011
-
Epistemology and Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Aarons11
-
Knowledge Management Practices in Temporal Knowledge-Intensive Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Abril11
-
The Quality Attribution in Data, Information and Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Abril11a
-
Learning in Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/AliWP11
-
External and Internal Knowledge in Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/AndreuS11
-
Metaphor Use in Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Andriessen11
-
Intellectual Capital and Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Ariely11
-
Operational Knowledge Management in the Military.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Ariely11a
-
Biological and Information Systems Approaches.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/AtkinsonB11
-
Knowledge Management and Intelligence Work.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Badia11
-
The Role of Information and Communication Technologies in Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Becerra-FernandezS11
-
Knowledge Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/BerendsBW11
-
Capability Maturity.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Berztiss11
-
Workflow Systems and Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Berztiss11a
-
Organizational Learning Facilitation with Intranet (2.0).
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/BoersmaK11
-
Knowledge Codification and ICT Use in Business Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/BolisaniS11
-
Knowledge Management in Safety-Critical Systems Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/BoyB11
-
MNE Knowledge Management Across Borders and ICT.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/BrockZ11
-
Ontology.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Buchholz11
-
Task-Based Knowledge Management Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/BursteinL11
-
Anti-Foundational Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Butler11
-
Work and Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ButlerM11
-
Knowledge Integration through Strategic Alliances and Virtual Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CamisonFF11
-
Competitive Advantage of Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Carrion11
-
Knowledge Management Software.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CarvalhoF11
-
An Introduction to Communities of Practice.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CoakesC11
-
Description Logic-Based Resource Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ColucciNSDM11
-
Organisational Storytelling.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Connell11
-
Document Search Practices.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CorralLL11
-
Conceptual Model for Corporate Universities.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CostaOS11
-
Domain Ontologies.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CristaniC11
-
Virtue-Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CroasdellW11
-
Distributed Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/CuelBB11
-
Knowledge Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/DavenportH11
-
Social Capital Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/DavenportH11a
-
Social Network Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/DekkerH11
-
Mobile Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/DerballaP11
-
Mobile Technology for Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/DerballaP11a
-
Corporate Semantic Webs.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Dieng-Kuntz11
-
Postmortem Reviews.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Dingsoyr11
-
Object-Process Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Dori11
-
Organizational Needs Analysis and Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Douglas11
-
Taxonomies of Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Ein-Dor11
-
Incentive Structures in Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/EkbiaH11
-
Knowledge Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Eppler11
-
Knowledge Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/EpplerB11
-
Exploring Paths Towards Knowledge Cities Developments.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ErgazakisME11
-
Protecting Knowledge Assets.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/EricksonR11
-
Mathematical Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Farmer11
-
Sketching in Knowledge Creation and Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/FerriG11
-
Knowledge Management in Professional Service Firms.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/FinkD11
-
Multidisciplinary Project Teams.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Fong11
-
Organizational Semantic Webs.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/FortierK11
-
Extracting Knowledge from Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/FullerW11
-
Theory and Management of Data Semantics.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/GillmanF11
-
Knowledge Calibration and Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/GoldsmithP11
-
Logic and Knowledge Bases.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/GrantM11
-
Knowledge Management in Charities.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/GreenawayV11
-
Integrated Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/HadrichM11
-
Inquiring Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/HallC11
-
Formal and Emergent Standards in KM.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Hasan11
-
Mentoring Knowledge Workers.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/HeavinN11
-
Organizational Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Hendriks11
-
Motivation in Collaborative Knowledge Creation.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/HendriksS11
-
Knowledge Transfer between Academia and Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Hofer11
-
Knowledge Management Ontology.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/HolsappleJ11
-
Knowledge Management Strategy Formation.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/HolsappleJ11a
-
Intellectual Capital.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Hsu11
-
Frequent Itemset Mining and Association Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ImbermanT11
-
Knowledge Sharing Between Individuals.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Jacobson11
-
Understanding Organizational Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/JasimuddinCK11
-
Knowledge Management Success Models.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Jennex11
-
Knowledge Management System Success Factors.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Jennex11a
-
A Knowledge Management Model for Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/KamthanF11
-
Knowledge Representation in Pattern Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/KamthanP11
-
Knowledge Producers and Consumers.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/KankanhalliTW11
-
Creating Knowledge for Business Decision Making.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/KhanGG11
-
Knowledge Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/King11
-
Knowledge Transfer.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/King11a
-
External Knowledge Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/KraaijenbrinkW11
-
Measuring Knowledge Management Capabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/KulkarniF11
-
Introducing Knowledge Management as Both Desirable and Undesirable Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/LandAN11
-
Knowledge Management Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/LandAN11a
-
A Re-Distributed Knowledge Management Framework in Help Desk.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Leung11
-
Barriers to Knowledge Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Lindsey11
-
Engineering Design Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Ma11
-
Knowledge Management Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/MaierH11
-
Knowledge Management and the Non-Profit Sector.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Manville11
-
Knowledge Management in the Chinese Business Context.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/MartinsonsD11
-
Military Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Maule11
-
Healthcare Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Metaxiotis11
-
Practice-Based Knowledge Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Munkvold11
-
Knowledge Patterns in Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/NatarajanS11
-
A Social Network Perspective on Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/NelsonH11
-
Understanding Innovation Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Newell11
-
Knowledge Management Research through Computational Experimentation.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/NissenL11
-
Knowledge Reuse.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Oshri11
-
Musical Metadata and Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Pachet11
-
Applying Knowledge Management in the Environmental and Climate Change Sciences.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Paquette11
-
Customer Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Paquette11a
-
Managing Government Agency Collaboration through Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Parise11
-
Competitive Intelligence Gathering.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Parkeri11
-
Knowledge in Innovation Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/PaukertNH11
-
A Hierarchical Model for Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Prat11
-
Measuring Organizational Learning as a Multidimensional Construct.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/RealLR11
-
Knowledge Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/RechFR11
-
Human Capital in Knowledge Creation, Management, and Utilization.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ReychavW11
-
Knowledge Flow.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/RibiereR11
-
Knowledge Management and Risk Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/RodriguezE11
-
Knowledge and Intellectual Property Rights.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/RyanS11
-
Dynamic Taxonomies.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Sacco11
-
Knowledge Sharing in Legal Practice.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Saunders11
-
Knowledge Intermediation.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ScarsoB11
-
An Aristotelian View of Knowledge for Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Schwartz11
-
Contexts for Tacit Knowledge Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ShariqV11
-
Mapping Group Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Shaw11
-
Evidence-Based Best Practices Collections.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/ShullFSL11
-
E-Learning for Knowledge Dissemination.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Sivakumar11
-
Narrative.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Snowden11
-
Knowledge Management in Small and Medium Sized Enterprises.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Sparrow11
-
Applying Agents within Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Sterling11
-
Business Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/SuC11
-
The Role of Emotional Capital in Organisational KM.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Tanner11
-
Integrating Knowledge Management with the Systems Analysis Process.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/TauberS11
-
Knowledge for Communicating Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Teeni11
-
A Cross-National Comparison of Knowledge Management Practices.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/TovstigaKDM11
-
Learning Networks and Service-Oriented Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/TsekourasR11
-
Secure Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/UpadhyayaRP11
-
Appreciative Sharing for Organizational Knowledge Work.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Vat11
-
Knowledge Synthesis Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Vat11a
-
Knowledge Creation.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Wickramasinghe11
-
Operational Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Wijnhoven11
-
A Knowledge Process Cycle.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Williams11
-
Managing Complex Adaptive Social Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Williams11a
-
Knowledge Structure and Data Mining Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/WilsonRA11
-
Secure Knowledge Discovery in Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/WilsonRA11a
-
Knowledge Dissemination in Portals.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/WoodsPKQ11
-
Integration of Knowledge Management and E-Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/XuW11
-
Organizational Attention.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/YanivS11
-
Knowledge Representation.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Zarri11
-
RDF and OWL for Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Zarri11a
-
Representation Languages for Unstructured 'Narrative' Documents.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Zarri11b
-
Managing Legal and Negotiation Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Zeleznikow11
-
Managing Customer Knowledge with Social Software.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Zhang11
-
Governance of Knowledge Management.
https://dblp.l3s.de/d2r/resource/publications/reference/knowledge/Zyngier11
-
Verification of Hybrid Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/0001FPP18
-
Handbook of Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/2018
-
Model Checking Parameterized Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/AbdullaST18
-
Model Checking Procedural Programs.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/AlurBE18
-
Model Checking Probabilistic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BaierAFK18
-
Satisfiability Modulo Theories.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BarrettT18
-
Model Checking Security Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BasinCM18
-
Combining Model Checking and Data-Flow Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BeyerGS18
-
SAT-Based Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BiereK18
-
Graph Games and Reactive Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BloemCJ18
-
Model Checking Real-Time Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BouyerFLMO018
-
The mu-calculus and Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/BradfieldW18
-
Binary Decision Diagrams.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Bryant18
-
BDD-Based Symbolic Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/ChakiG18
-
Introduction to Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/ClarkeHV18
-
Process Algebra and Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/CleavelandRS18
-
Abstraction and Abstraction Refinement.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/DamsG18
-
Functional Specification of Hardware via Temporal Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/EisnerF18
-
Compositional Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/GiannakopoulouNP18
-
Combining Model Checking and Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/GodefroidS18
-
Model Checking Concurrent Programs.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/GuptaKQT18
-
Explicit-State Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Holzmann18
-
Predicate Abstraction for Program Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/JhalaPR18
-
Automata Theory and Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Kupferman18
-
Transfer of Model Checking to Industrial Practice.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Kurshan18
-
Symbolic Model Checking in Non-Boolean Domains.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/MajumdarR18
-
Propositional SAT Solving.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Marques-SilvaM18
-
Interpolation and Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/McMillan18
-
Symbolic Trajectory Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Melham18
-
Partial-Order Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Peled18
-
Temporal Logic and Fair Discrete Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/PitermanP18
-
Modeling for Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/SeshiaST18
-
Combining Model Checking and Deduction.
https://dblp.l3s.de/d2r/resource/publications/reference/mc/Shankar18
-
Handbook of Research on Computer Mediated Communication (2 Volumes)
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/2008
-
The Untapped Learning Potential of CMC in Higher Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/AmundsenS08
-
Shifting Trends in Evaluating the Credibility of CMC.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/ApostelF08
-
Multitasking CMC to Study Connected Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Biddix08
-
Sense of Virtual Community.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Blanchard08
-
Teaching Credibility of Sources in an Age of CMC.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/BowerB08
-
Publishing an Internet E-Zine.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/BurnsL08
-
Communicating Electronically When Too Far Away to Visit.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Cemalcilar08
-
Podcastia.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Cohn08
-
Moderating Discussion Groups Using Computer Mediated Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/CollinsB08
-
E-Mail Distribution Lists in Adult Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/CollinsB08a
-
Millennium Leadership Inc.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Connaughton08
-
The Use of CMC Technologies in Academic Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/CrummettP08
-
CMC Research in Latin America and Spain.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Cruz08
-
Blogs.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/DarisipudiS08
-
Locating Presence and Positions in Online Focus Group Text with Stance-Shift Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/DavisM08
-
Composing Identity in Online Instructional Contexts.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/DePew08
-
Corporate Blogging.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Doraiswamy08
-
Affective Collaborative Instruction with Librarians.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Farmer08
-
Seek and Ye Shall Find.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Fragoso08
-
Global Culture and Computer Mediated Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/FussellZS08
-
Deceptive Communication in E-Collaboration.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/GeorgeM08
-
Computer Mediated Negotiations and Deception.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/GiordanoSBG08
-
WebCom.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/GodskP08
-
Innovations and Motivations in Online Chat.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/GongO08
-
CMC and the Nature of Human/ Machine Interface.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Greenberg08
-
Virtual Collaboration in Immersive and Non-Immersive Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/GuadagnoA08
-
Turn Taking in E-Mail Discussions.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Harrison08
-
Persuasive Design.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/HasleC08
-
P2P File Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/HughesW08
-
Preparing Participants for Computer Mediated Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Jordan08
-
Knowledge Communication with Shared Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/KimmerleC08
-
Innovation and Utility in the Optical Transport Network.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Koslowsky08
-
Building Identity through Online Collaboration.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Krueger08
-
Terminological Obfuscation in Online Research.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Lange08
-
Instant Messaging as a Hypermedium in the Making.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Leetaru08
-
Higher Order Thinking in Online Courses.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Leung08
-
Learning and Teaching with CMC in the U.S. Higher Education Arena.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/LevelH08
-
Discourse and Network Analyses of Learning Conversations.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/LimS08
-
Reviewer Motivations, Bias, and Credibility in Online Reviews.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Mackiewicz08
-
IM's Growth, Benefits, and Impact on Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Marcus08
-
Podcasting and Really Simple Syndication (RSS).
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/McFadden08
-
Digital Photography.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Meyer08
-
Computer Mediated Speech Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/MullennixS08
-
The Impact of Personality on Virtual Team Creativity and Quality.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Ocker08
-
Social Influence and Computer Mediated Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/OkdieG08
-
Human Computer Interaction and the Best Mix of Face-to-Face and E-Interactions in Educational Settings.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Olaniran08
-
Divergent News Media in Computer Mediated News Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Opgenhaffen08
-
Information Commons and Web 2.0 Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/PanklR08
-
Solidarity and Rapport in Social Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Park08
-
Higher Education's Use of Course Management Software.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Price08
-
Computer Mediated Collaboration.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Price08a
-
Towards a Communication-Based Approach to Cyber-Bullying.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/RamirezEC08
-
The Psychology of Personal Web Sites.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/RennerS08
-
E-Mentoring.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Risquez08
-
Accessible Design for Communication on the Web.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Robins08
-
Computer Mediated Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Ruth08
-
Emergent Networks in Computer-Supported Groups.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Stefanone08
-
CMC and E-Mentoring in Midwifery.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Stewart08
-
Chat Rooms for Language Teaching and Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/SuG08
-
An Analysis of a Decade of Research Published in the "Journal of Computer Mediated Communication".
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Switzer08
-
Linguistic Forms and Functions of SMS Text Messages in Nigeria.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Taiwo08
-
Linguistics of Computer-Mediated Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Tarsiero08
-
The Use of Story in Building Online Group Relationships.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Thorpe08
-
Stay Tuned for Podcast U and the Data on M-Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Vess08
-
Human-Robot Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Weber08
-
Form and Function of Metacommunication in CMC.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Weder08
-
Computer Mediated Communication and Multimodal Instruction in Higher Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/WilliamsC08
-
Digital Storytelling from Artificial Intelligence to YouTube.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/Woletz08
-
Computer Mediated Communication for the Enhancement of Psychotherapy.
https://dblp.l3s.de/d2r/resource/publications/reference/mediated/WolfB08
-
Policy Gradient Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/0001B17
-
Robot Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/0001TRM17
-
Sentiment Analysis and Opinion Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/0016017
-
Encyclopedia of Machine Learning and Data Mining
https://dblp.l3s.de/d2r/resource/publications/reference/ml/2017
-
Inverse Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/AbbeelN10
-
Inverse Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/AbbeelN17
-
Data Preparation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/AbdallahDW17
-
Graph Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Aggarwal10
-
Graph Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Aggarwal17
-
Evolutionary Computation in Economics.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Alexandrova-KabadjovaGM17
-
Categorical Data Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/AndritsosT10
-
Categorical Data Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/AndritsosT17
-
Online Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Auer17
-
Structured Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Bain10
-
Structured Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Bain17
-
Model-Based Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BanerjeeS10
-
Model-Based Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BanerjeeS17
-
Adaptive Real-Time Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Barto10
-
Adaptive Real-Time Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Barto17
-
Minimum Message Length.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Baxter10
-
Mixture Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Baxter10a
-
Minimum Message Length.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Baxter17
-
Mixture Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Baxter17a
-
Text Mining for News and Blogs Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Berendt10
-
Text Mining for News and Blogs Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Berendt17
-
Entity Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BhattacharyaG10
-
Entity Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BhattacharyaG17
-
Bias Specification Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel10
-
Hypothesis Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel10a
-
Hypothesis Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel10b
-
Observation Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel10c
-
Bias Specification Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel17
-
Hypothesis Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel17a
-
Hypothesis Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel17b
-
Observation Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Blockeel17c
-
Hidden Markov Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Bosch10
-
Feature Construction in Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BrankMG10
-
Feature Construction in Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BrankMG17
-
Artificial Societies.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Branke10
-
Artificial Societies.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Branke17
-
Metalearning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BrazdilVGS10
-
Metalearning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/BrazdilVGS17
-
Ensemble Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Brown10
-
Ensemble Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Brown17
-
Missing Attribute Values.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Bruha17
-
Radial Basis Function Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Buhmann10
-
Radial Basis Function Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Buhmann17
-
Bayesian Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Buntine10
-
Bayesian Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Buntine17
-
Cross-Lingual Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CanceddaR10
-
Cross-Lingual Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CanceddaR17
-
Adaptive Resonance Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CarpenterG10
-
Adaptive Resonance Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CarpenterG17
-
Connections Between Inductive Inference and Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CaseJ10
-
Connections Between Inductive Inference and Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CaseJ17
-
Graph Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Chakrabarti10
-
Graph Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Chakrabarti17
-
Machine Learning for IT Security.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Chan10
-
Machine Learning for IT Security.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Chan17
-
Active Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ChandolaBK17
-
Topic Models for NLP Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Chen017
-
Record Linkage.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ChristenW17
-
Text Mining for Advertising.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ciaramita10
-
Text Mining for Advertising.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ciaramita17
-
Autonomous Helicopter Flight Using Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CoatesAN10
-
Autonomous Helicopter Flight Using Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CoatesAN17
-
Active Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Cohn10
-
Active Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Cohn17
-
Evolutionary Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CorneHK10
-
Evolutionary Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CorneHK17
-
Case-Based Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Craw10
-
Dynamic Memory Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Craw10a
-
Manhattan Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Craw10b
-
Case-Based Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Craw17
-
Manhattan Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Craw17a
-
Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Cussens10
-
Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Cussens17
-
Sublinear Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CzumajS10
-
Sublinear Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/CzumajS17
-
POS Tagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Daelemans17
-
Active Learning Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Dasgupta10
-
Active Learning Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Dasgupta17
-
Explanation-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/DeJongL10
-
Explanation-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/DeJongL17
-
Ant Colony Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/DorigoB10
-
Ant Colony Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/DorigoB17
-
Metaheuristic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/DorigoBS10
-
Metaheuristic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/DorigoBS17
-
Relational Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Driessens10
-
Relational Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Driessens17
-
Class.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Drummond10a
-
Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Drummond10b
-
Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Drummond17
-
Class.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Drummond17a
-
Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Drummond17b
-
Gaussian Process Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Engel10
-
Gaussian Process Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Engel17
-
Speedup Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Fern10
-
Speedup Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Fern17
-
First-Order Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Flach10
-
ROC Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Flach10a
-
Classifier Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Flach17
-
First-Order Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Flach17a
-
ROC Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Flach17b
-
Inductive Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FlenerS10
-
Programming by Demonstration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FlenerS10a
-
Trace-Based Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FlenerS10b
-
Inductive Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FlenerS17
-
Programming by Demonstration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FlenerS17a
-
Trace-Based Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FlenerS17b
-
Decision List.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz10
-
Decision Lists and Decision Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz10a
-
Decision Tree.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz10b
-
Machine Learning and Game Playing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz10c
-
Pruning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz10d
-
Rule Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz10e
-
Class Binarization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17
-
Classification Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17a
-
Covering Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17b
-
Decision List.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17c
-
Decision Lists and Decision Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17d
-
Decision Stump.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17e
-
Decision Tree.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17f
-
Divide-and-Conquer Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17g
-
Machine Learning and Game Playing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17h
-
Pruning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17i
-
Rule Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17j
-
Rule Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Furnkranz17k
-
Preference Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FurnkranzH10
-
Preference Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FurnkranzH17
-
Rank Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/FurnkranzH17a
-
Clustering from Data Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Gama10
-
Clustering from Data Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Gama17
-
Evolutionary Computational Techniques in Marketing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Garcia-AlmanzaAM10
-
Evolutionary Computational Techniques in Marketing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Garcia-AlmanzaAM17
-
Formal Concept Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Garriga10
-
Formal Concept Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Garriga17
-
Graph Kernels.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/GartnerHW10
-
Graph Kernels.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/GartnerHW17
-
Biological Learning: Synaptic Plasticity, Hebb Rule and Spike TimingDependent Plasticity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Gerstner10
-
Biological Learning: Synaptic Plasticity, Hebb Rule and Spike Timing Dependent Plasticity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Gerstner17
-
Link Mining and Link Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Getoor10
-
Link Mining and Link Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Getoor17
-
Text Mining for the Semantic Web.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/GrobelnikMW10
-
Text Mining for the Semantic Web.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/GrobelnikMW17
-
Complexity in Adaptive Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/He10
-
Complexity in Adaptive Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/He17
-
Hierarchical Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hengst10
-
Hierarchical Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hengst17
-
Expectation Propagation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Heskes10
-
Expectation Propagation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Heskes17
-
Boltzmann Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hinton10
-
Deep Belief Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hinton10a
-
Boltzmann Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hinton17
-
Deep Belief Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hinton17a
-
Table Extraction from Text Documents.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hodson17
-
Greedy Search Approach of Graph Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Holder10
-
Greedy Search Approach of Graph Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Holder17
-
Learning from Structured Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/HorvathW10
-
Learning from Structured Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/HorvathW17
-
Evolutionary Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Husbands10
-
Evolutionary Robotics.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Husbands17
-
Universal Learning Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hutter10
-
Universal Learning Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Hutter17
-
Evolutionary Kernel Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Igel10
-
Evolutionary Kernel Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Igel17
-
Complexity of Inductive Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Jain017
-
Computational Complexity of Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Jain017a
-
Inductive Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Jain017b
-
Query-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Jain017c
-
Complexity of Inductive Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JainS10
-
Computational Complexity of Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JainS10a
-
Inductive Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JainS10b
-
Query-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JainS10c
-
Uplift Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Jaroszewicz17
-
Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Jensen10
-
Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Jensen17
-
Expectation Maximization Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10
-
K-Means Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10a
-
K-Medoids Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10b
-
K-Way Spectral Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10c
-
Locality Sensitive Hashing Based Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10d
-
Mean Shift.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10e
-
Partitional Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10f
-
Quality Threshold Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH10g
-
Expectation Maximization Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH17
-
K-Means Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH17a
-
K-Way Spectral Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH17c
-
Locality Sensitive Hashing Based Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH17d
-
Mean Shift.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH17e
-
Quality Threshold Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/JinH17g
-
Abduction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kakas10
-
Abduction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kakas17
-
Explanation-Based Learning for Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/KambhampatiY17
-
Self-Organizing Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kaski10
-
Self-Organizing Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kaski17
-
Evolutionary Fuzzy Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kavka10
-
Evolutionary Fuzzy Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kavka17
-
Particle Swarm Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kennedy10
-
Particle Swarm Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kennedy17
-
Instance-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Keogh10
-
Nearest Neighbor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Keogh10a
-
Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Keogh10b
-
Instance-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Keogh17
-
Nearest Neighbor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Keogh17a
-
Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Keogh17b
-
Curse of Dimensionality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/KeoghM10
-
Curse of Dimensionality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/KeoghM17
-
Online Controlled Experiments and A/B Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/KohaviL17
-
Text Mining for Spam Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kolcz10
-
Text Mining for Spam Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kolcz17
-
Learning Graphical Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Korb17
-
Inductive Database Approach to Graphmining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kramer10
-
Inductive Database Approach to Graphmining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Kramer17
-
Evolutionary Feature Selection and Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Krawiec10
-
Evolutionary Feature Selection and Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Krawiec17
-
Propositionalization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lachiche10
-
Propositionalization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lachiche17
-
Least-Squares Reinforcement Learning Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lagoudakis10
-
Value Function Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lagoudakis10a
-
Least-Squares Reinforcement Learning Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lagoudakis17
-
Value Function Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lagoudakis17a
-
Efficient Exploration in Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Langford17
-
Classifier Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lanzi10
-
Classifier Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lanzi17
-
Event Extraction from Media Texts.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/LebanFG17
-
Learning to Rank.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Li17
-
Class Imbalance Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/LingS10
-
Cost-Sensitive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/LingS10a
-
Class Imbalance Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/LingS17
-
Cost-Sensitive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/LingS17a
-
Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Liu10
-
Generative and Discriminative Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/LiuW10
-
Generative and Discriminative Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/LiuW17
-
Higher-Order Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lloyd10
-
Higher-Order Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Lloyd17
-
k-Armed Bandit.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Mannor10
-
k-Armed Bandit.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Mannor17
-
Search Engines: Applications of ML.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Martin10
-
Evolutionary Computation in Finance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Martinez-JaramilloCA17
-
Evolutionary Computation in Finance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Martinez-JaramilloGAC10
-
Privacy-Related Aspects and Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Matwin10
-
Privacy-Related Aspects and Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Matwin17
-
Graphical Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/McAuleyCB10
-
Graphical Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/McAuleyCB17
-
Recommender Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/MelvilleS10
-
Recommender Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/MelvilleS17
-
Cumulative Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/MichelucciO10
-
Cumulative Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/MichelucciO17
-
Word Sense Disambiguation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Mihalcea17
-
Hopfield Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen10
-
Neuroevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen10a
-
Neuron.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen10b
-
Reservoir Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen10c
-
Simple Recurrent Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen10d
-
Topology of a Neural Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen10e
-
Weight.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen10f
-
Hopfield Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen17
-
Neuroevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen17a
-
Neuron.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen17b
-
Reservoir Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen17c
-
Simple Recurrent Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen17d
-
Topology of a Neural Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen17e
-
Weight.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Miikkulainen17f
-
Feature Selection in Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Mladenic10
-
Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Mladenic10a
-
Feature Selection in Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Mladenic17
-
Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Mladenic17a
-
Document Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/MladenicBG10
-
Document Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/MladenicBG17
-
Medicine: Applications of Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Morik10
-
Medicine: Applications of Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Morik17
-
Backpropagation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Munro10
-
Backpropagation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Munro17
-
Semi-Supervised Text Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Muslea10
-
Semi-supervised Text Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Muslea17
-
Link Prediction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/NamataG10
-
Collective Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/NamataSBG17
-
Constraint-Based Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Nijssen10
-
Tree Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Nijssen10a
-
Constraint-Based Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Nijssen17
-
Tree Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Nijssen17a
-
Learning Models of Biological Sequences.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/NobleL10
-
Supervised Descriptive Rule Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/NovakLW10
-
Bayesian Nonparametric Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/OrbanzT10
-
Bayesian Nonparametric Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/OrbanzT17
-
Statistical Machine Translation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Osborne17
-
Semantic Annotation of Text Using Open Semantic Resources.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/PacificoSBBG17
-
Biomedical Informatics.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/PageN10
-
Biomedical Informatics.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/PageN17
-
Learning Curves in Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Perlich10
-
Policy Gradient Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/PetersB10
-
Robot Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/PetersTRM10
-
Conjunctive Normal Form.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Pfahringer10
-
Conjunctive Normal Form.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Pfahringer17
-
Disjunctive Normal Form.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Pfahringer17a
-
Bayesian Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Poupart10
-
Partially Observable Markov Decision Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Poupart10a
-
Bayesian Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Poupart17
-
Partially Observable Markov Decision Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Poupart17a
-
Projective Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Procopiuc10
-
Projective Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Procopiuc17
-
Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/PutermanP10
-
Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/PutermanP17
-
Linear Discriminant.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoB10
-
Linear Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoB10a
-
Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoB10b
-
Linear Discriminant.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoB17
-
Linear Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoB17a
-
Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoB17b
-
Gaussian Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoKX10
-
Gaussian Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/QuadriantoKX17
-
Inductive Logic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Raedt10
-
Logic of Generality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Raedt10a
-
Multi-Relational Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Raedt10b
-
Inductive Logic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Raedt17
-
Logic of Generality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Raedt17a
-
Multi-relational Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Raedt17b
-
Statistical Relational Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RaedtK10
-
Statistical Relational Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RaedtK17
-
Bias-Variance Trade-offs: Novel Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RajnarayanW10
-
Bias-Variance Trade-Offs: Novel Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RajnarayanW17
-
Maximum Entropy Models for Natural Language Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ratnaparkhi10
-
Maximum Entropy Models for Natural Language Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ratnaparkhi17
-
Multi-Instance Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RaySB10
-
Multi-Instance Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RaySB17
-
Model-Based Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RayT10
-
Model-Based Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RayT17
-
Generalization Bounds.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Reid17
-
Text Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RischBPKQW17
-
Text Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/RischBPKQa10
-
Minimum Description Length Principle.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Rissanen10
-
Minimum Description Length Principle.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Roos17
-
Grammatical Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SaittaS10
-
Phase Transitions in Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SaittaS10a
-
Grammatical Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SaittaS17
-
Phase Transitions in Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SaittaS17a
-
Probabilistic Context-Free Grammars.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sakakibara17
-
Beam Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10
-
Behavioral Cloning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10a
-
Concept Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10b
-
Credit Assignment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10c
-
Density Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10d
-
Generalization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10e
-
Genetic and Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10f
-
Learning as Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10h
-
Markov Chain Monte Carlo.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10i
-
Subsumption.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10j
-
Version Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut10k
-
Beam Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17
-
Concept Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17b
-
Credit Assignment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17c
-
Density Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17d
-
Generalization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17e
-
Genetic and Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17f
-
Greedy Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17g
-
Markov Chain Monte Carlo.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17i
-
Version Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sammut17k
-
Concept Drift.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SammutH10
-
Density-Based Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sander10
-
Symbolic Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SannerK10
-
Symbolic Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SannerK17
-
Predictive Techniques in Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sayyad-Shirabad17
-
Deep Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Schmidhuber17
-
Quantum Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SchuldP17
-
Nonstandard Criteria in Evolutionary Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sebag10
-
Nonstandard Criteria in Evolutionary Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sebag17
-
Collective Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SenNBG10
-
Group Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShararaG10
-
Group Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShararaG17
-
Multi-Agent Learning I: Problem Definition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShohamP10
-
Multi-Agent Learning II: Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShohamP10a
-
Multi-agent Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShohamP17
-
Multi-agent Learning Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShohamP17a
-
Cascade-Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShultzF10
-
Cascade Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ShultzF17
-
Causality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Silva10
-
Causality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Silva17
-
Evolutionary Games.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sipper10
-
Genetic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sipper10a
-
Genetic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Sipper17a
-
Instance-Based Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Smart10
-
Instance-Based Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Smart17
-
Opinion Stream Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/SpiliopoulouNZ17
-
Stream Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/StefanowskiB17
-
Q-Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Stone10
-
Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Stone10a
-
Q-Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Stone17
-
Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Stone17a
-
Associative Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Strehl10
-
Associative Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Strehl17
-
Relational Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/StruyfB10
-
Relational Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/StruyfB17
-
Average-Reward Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Tadepalli10
-
Dirichlet Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Teh17
-
Artificial Immune Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Timmis10
-
Artificial Immune Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Timmis17
-
Confusion Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting10
-
Error Rate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting10a
-
Precision.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting10b
-
Sensitivity and Specificity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting10d
-
Confusion Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting17
-
Precision.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting17b
-
Precision and Recall.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting17c
-
Sensitivity and Specificity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Ting17d
-
Locally Weighted Regression for Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/TingMVS17
-
Locally Weighted Regression for Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/TingVS10
-
Equation Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Todorovski10
-
Inductive Process Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Todorovski10a
-
Equation Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Todorovski17
-
Inductive Process Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Todorovski17a
-
Apriori Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen10
-
Association Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen10a
-
Basket Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen10b
-
Frequent Itemset.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen10c
-
Frequent Pattern.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen10d
-
Apriori Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen17
-
Association Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen17a
-
Basket Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen17b
-
Frequent Itemset.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen17c
-
Frequent Pattern.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Toivonen17d
-
Model Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Torgo10
-
Regression Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Torgo10a
-
Model Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Torgo17
-
Regression Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Torgo17a
-
Incremental Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Utgoff10
-
Incremental Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Utgoff17
-
Markov Decision Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Uther10
-
Temporal Difference Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Uther10a
-
Markov Decision Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Uther17
-
Temporal Difference Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Uther17a
-
Inductive Transfer.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/VilaltaGBS17
-
Dimensionality Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Vlachos10
-
Similarity Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Vlachos10a
-
Dimensionality Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Vlachos17
-
Similarity Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Vlachos17a
-
Constrained Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wagstaff10
-
Constrained Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wagstaff17
-
Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/WangTL17
-
Algorithm Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10
-
Bayes Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10a
-
Data Preparation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10b
-
Lazy Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10c
-
Model Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10d
-
MultiBoosting.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10e
-
Na√Įve Bayes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10f
-
Occam's Razor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10g
-
Posterior Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10i
-
Prior Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb10j
-
Algorithm Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17
-
Bayes' Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17a
-
Evaluation of Learning Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17b
-
Lazy Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17c
-
Model Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17d
-
MultiBoosting.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17e
-
Na√Įve Bayes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17f
-
Occam's Razor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17g
-
Overfitting.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17h
-
Posterior Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Webb17i
-
Coevolutionary Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wiegand10
-
Coevolutionary Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wiegand17
-
Reward Shaping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wiewiora10
-
Reward Shaping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wiewiora17
-
Correlation Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wirth10
-
Correlation Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Wirth17
-
1-Norm Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10
-
Absolute Error Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10a
-
Assertion.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10aa
-
Associative Bandit Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ab
-
Attribute Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ac
-
Attribute-Value Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ad
-
AUC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ae
-
Average-Cost Neuro-Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10af
-
Average-Cost Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ag
-
Average-Payoff Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ah
-
Backprop.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ai
-
Bagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10aj
-
Bake-Off.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ak
-
Bandit Problem with Side Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10al
-
Bandit Problem with Side Observations.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10am
-
Basic Lemma.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10an
-
Batch Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ao
-
Baum-Welch Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ap
-
Bayes Adaptive Markov Decision Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10aq
-
Bayes Net.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ar
-
Bayesian Model Averaging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10as
-
Bayesian Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10at
-
Belief State Markov Decision Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10au
-
Bellman Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10av
-
Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10aw
-
Bias Variance Decomposition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ax
-
Bias-Variance Trade-offs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ay
-
Bias-Variance-Covariance Decomposition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10az
-
Accuracy.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10b
-
Bilingual Lexicon Extraction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ba
-
Binning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bb
-
Blog Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bc
-
Boosting.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bd
-
Bootstrap Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10be
-
Bottom Clause.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bf
-
Bounded Differences Inequality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bg
-
BP.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bh
-
Breakeven Point.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bi
-
C4.5.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bj
-
Candidate-Elimination Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bk
-
Cannot-Link Constraint.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bl
-
CART.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bm
-
Cascor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bn
-
Case.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bo
-
Case-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bp
-
Categorical Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bq
-
Categorization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10br
-
Category.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bs
-
Causal Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bt
-
CC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bv
-
Certainty Equivalence Principle.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bw
-
Characteristic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bx
-
City Block Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10by
-
Classification Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10bz
-
ACO.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10c
-
Classification Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ca
-
Clause.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cc
-
Clause Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cd
-
Click-Through Rate (CTR).
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ce
-
Closest Point.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cg
-
Cluster Editing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ch
-
Cluster Ensembles.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ci
-
Cluster Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cj
-
Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ck
-
Clustering Aggregation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cl
-
Clustering Ensembles.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cm
-
Clustering of Nonnumerical Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cn
-
Clustering with Advice.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10co
-
Clustering with Constraints.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cp
-
Clustering with Qualitative Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cq
-
Clustering with Side Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cr
-
CN2.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cs
-
Co-Reference Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ct
-
Co-Training.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cu
-
Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cv
-
Collaborative Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cx
-
Collection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cy
-
Commercial Email Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10cz
-
Actions.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10d
-
Committee Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10da
-
Community Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10db
-
Comparable Corpus.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dc
-
Competitive Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dd
-
Competitive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10de
-
Complex Adaptive System.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10df
-
Compositional Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dg
-
Computational Discovery of Quantitative Laws.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dh
-
Conditional Random Field.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10di
-
Confirmation Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dj
-
Connection Strength.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dk
-
Connectivity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dl
-
Consensus Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dm
-
Constructive Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dn
-
Content-Based Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dp
-
Context-Sensitive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dr
-
Contextual Advertising.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ds
-
Continual Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dt
-
Continuous Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10du
-
Contrast Set Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dv
-
Correlation-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dx
-
Cost.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dy
-
Cost Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10dz
-
Adaboost.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10e
-
Cost-to-Go Function Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10eb
-
Covering Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ec
-
Cross-Language Document Categorization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ed
-
Cross-Language Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ee
-
Cross-Language Question Answering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ef
-
Cross-Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10eg
-
Data Mining On Text.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10eh
-
Data Preprocessing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ei
-
Data Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ej
-
DBN.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ek
-
Decision Epoch.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10el
-
Decision Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10em
-
Decision Stump.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10en
-
Decision Threshold.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10eo
-
Decision Trees For Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ep
-
Deductive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10eq
-
Deduplication.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10er
-
Deep Belief Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10es
-
Dependency Directed Backtracking.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10et
-
Detail.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10eu
-
Digraphs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ew
-
Dimensionality Reduction on Text via Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ex
-
Directed Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ey
-
Discrete Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ez
-
Adaptive Control Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10f
-
Discriminative Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fa
-
Disjunctive Normal Form.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fb
-
Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fc
-
Distance Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fd
-
Distance Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fe
-
Distance Metrics.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ff
-
Divide-and-Conquer Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fh
-
Dual Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fi
-
Duplicate Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fj
-
Dynamic Bayesian Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fk
-
Dynamic Decision Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fl
-
Dynamic Programming For Relational Domains.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fm
-
Echo State Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fp
-
ECOC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fq
-
Edge Prediction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fr
-
EFSC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fs
-
Elman Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ft
-
EM Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fv
-
Embodied Evolutionary Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fw
-
Emerging Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fx
-
Entailment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fy
-
EP.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10fz
-
Adaptive System.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10g
-
Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ga
-
Error Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gc
-
Error Squared.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gd
-
Estimation of Density Level Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ge
-
Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gf
-
Evaluation Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gh
-
Evolution of Agent Behaviors.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gi
-
Evolution of Robot Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gj
-
Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gk
-
Evolutionary Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gl
-
Evolutionary Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gm
-
Evolutionary Constructive Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gn
-
Evolutionary Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10go
-
Evolutionary Feature Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gp
-
Evolutionary Grouping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gq
-
Evolving Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gr
-
Example.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gs
-
Example-Based Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gt
-
Expectation Maximization Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gu
-
Expectation-Maximization Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gv
-
Experience-Based Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gx
-
Explanation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gy
-
Explanation-Based Generalization for Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10gz
-
Agent.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10h
-
F1-Measure.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ha
-
F-Measure.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hb
-
False Negative.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hc
-
False Positive.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hd
-
Feature.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10he
-
Feature Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hf
-
Feature Extraction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hg
-
Feature Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hh
-
Feature Subset Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hi
-
Feedforward Recurrent Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hj
-
Finite Mixture Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hk
-
First-Order Predicate Calculus.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hl
-
First-Order Predicate Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hm
-
First-Order Regression Tree.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hn
-
Foil.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ho
-
Frequent Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hp
-
Functional Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hq
-
Fuzzy Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hr
-
General-to-Specific Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ht
-
Generality And Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hu
-
Generalization Performance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hv
-
Generalized Delta Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hw
-
Genetic Attribute Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hy
-
Genetic Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10hz
-
Agent-Based Computational Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10i
-
Genetic Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ia
-
Genetic Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ic
-
Genetics-Based Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10id
-
Gibbs Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ie
-
Gram Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ig
-
Grammar Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ih
-
Grammatical Tagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ii
-
Grouping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ij
-
Growing Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ik
-
Growth Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10il
-
Hebb Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10im
-
Hebbian Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10in
-
Heuristic Rewards.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10io
-
High-Dimensional Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ip
-
Hold-One-Out Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ir
-
Holdout Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10is
-
Holdout Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10it
-
Holdout Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10iu
-
Hypothesis Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10iv
-
ID3.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10iw
-
Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ix
-
Identity Uncertainty.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10iy
-
Idiot's Bayes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10iz
-
Agent-Based Modeling and Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10j
-
Immune Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ja
-
Immune Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jb
-
Immune-Inspired Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jc
-
Immunocomputing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jd
-
Implication.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jf
-
Improvement Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jg
-
In-Sample Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jh
-
Indirect Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ji
-
Induction as Inverted Deduction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jj
-
Inductive Inference Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jm
-
Inductive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jn
-
Inductive Program Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jo
-
Inductive Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jp
-
Inequalities.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jq
-
Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jr
-
Information Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10js
-
Instance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jt
-
Instance Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ju
-
Instance Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jv
-
Intelligent Backtracking.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jw
-
Intent Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jx
-
Internal Model Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jy
-
Interval Scale.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10jz
-
Agent-Based Simulation Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10k
-
Inverse Entailment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ka
-
Inverse Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kc
-
Is More General Than.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kd
-
Is More Specific Than.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ke
-
Item.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kf
-
Iterative Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kg
-
Junk Email Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kh
-
Kernel Density Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ki
-
Kernel Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kj
-
Kernel Shaping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kk
-
Kernel-Based Reinforcement\break Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kl
-
Kernels.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10km
-
Kind.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kn
-
Knowledge Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ko
-
Kohonen Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kp
-
L1-Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kq
-
Label.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kr
-
Labeled Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ks
-
Language Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kt
-
Laplace Estimate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ku
-
Latent Factor Models and Matrix Factorizations.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kw
-
Learning Bayesian Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kx
-
Learning Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ky
-
Learning By Demonstration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10kz
-
AIS.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10l
-
Learning Classifier Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lb
-
Learning Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lc
-
Learning Control Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ld
-
Learning from Complex Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10le
-
Learning from Labeled and Unlabeled Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lf
-
Learning from Labeled and Unlabeled Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lg
-
Learning from Nonpropositional Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lh
-
Learning in Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lk
-
Learning in Worlds with Objects.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ll
-
Learning Vector Quantization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lm
-
Learning with Different Classification Costs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ln
-
Learning with Hidden Context.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lo
-
Learning Word Senses.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lp
-
Leave-One-Out Cross-Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lq
-
Lessons-Learned Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ls
-
Life-Long Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lt
-
Lifelong Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lu
-
Lift.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lv
-
Linear Regression Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lw
-
Linear Separability.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lx
-
Link Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ly
-
Link-Based Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10lz
-
Analogical Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10m
-
Liquid State Machine.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ma
-
Local Distance Metric Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mb
-
Local Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mc
-
Locally Weighted Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10md
-
Log-Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10me
-
Logic Program.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mf
-
Logical Consequence.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mg
-
Logical Regression Tree.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mh
-
Logistic Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mi
-
Logit Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mj
-
Long-Term Potentiation of Synapses.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mk
-
LOO Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ml
-
Loopy Belief Propagation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mm
-
Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mn
-
Loss Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mo
-
LWPR.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mp
-
LWR.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mq
-
m-Estimate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mr
-
Margin.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ms
-
Market Basket Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mt
-
Markov Chain.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mv
-
Markov Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mw
-
Markov Net.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mx
-
Markov Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10my
-
Markov Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10mz
-
Analysis of Text.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10n
-
Markov Random Field.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10na
-
Maxent Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nc
-
McDiarmid's Inequality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nd
-
MCMC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ne
-
MDL.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nf
-
Mean Absolute Deviation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ng
-
Mean Absolute Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nh
-
Mean Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ni
-
Mean Squared Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nj
-
Memory-Based.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nl
-
Memory-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nm
-
Message.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10no
-
Meta-Combiner.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10np
-
Minimum Cuts.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nq
-
Minimum Encoding Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nr
-
Missing Values.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ns
-
Mistake-Bounded Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nt
-
Mixture Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nu
-
Mixture Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nv
-
Mode Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nw
-
Model Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nx
-
Model Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ny
-
Model-Based Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10nz
-
Analytical Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10o
-
MOO.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ob
-
Morphosyntactic Disambiguation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oc
-
Most General Hypothesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10od
-
Most Similar Point.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oe
-
Most Specific Hypothesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10of
-
Multi-Armed Bandit.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10og
-
Multi-Armed Bandit Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oh
-
Multi-Objective Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oj
-
Multiple Classifier Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ok
-
Multiple-Instance Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ol
-
Multistrategy Ensemble Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10om
-
Must-Link Constraint.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10on
-
NC-Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oo
-
NCL.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10op
-
Nearest Neighbor Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oq
-
Negative Correlation Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10or
-
Negative Predictive Value.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10os
-
Network Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ot
-
Network Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ou
-
Networks with Kernel Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ov
-
Neural Network Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ow
-
Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ox
-
Neuro-Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oy
-
No-Free-Lunch Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10oz
-
Anytime Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10p
-
Node.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pa
-
Noise.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pc
-
Nominal Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pd
-
Non-Parametric Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pe
-
Nonparametric Bayesian.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pf
-
Nonparametric Cluster Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pg
-
Nonstationary Kernels.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ph
-
Nonstationary Kernels Supersmoothing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pi
-
Normal Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pj
-
Numeric Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pl
-
Object.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pm
-
Object Consolidation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pn
-
Object Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10po
-
Ockham's Razor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pp
-
One-Step Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pr
-
Ontology Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ps
-
Opinion Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pt
-
Optimal Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pu
-
OPUS.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pv
-
Ordered Rule Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pw
-
Ordinal Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10px
-
Out-of-Sample Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10py
-
Out-of-Sample Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10pz
-
Overall and Class-Sensitive Frequencies.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qa
-
Overtraining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qb
-
PAC Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qc
-
PAC-MDP Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qd
-
Part of Speech Tagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qf
-
Passive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qg
-
PCFG.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qi
-
Perceptron.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qj
-
Piecewise Constant Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qk
-
Piecewise Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ql
-
Plan Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qm
-
Policy Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qn
-
POMDPs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qo
-
Positive Predictive Value.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qq
-
Positive Semidefinite.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qr
-
Post-Pruning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qs
-
Posterior.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qt
-
Postsynaptic Neuron.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qu
-
Pre-Pruning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qv
-
Predicate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qw
-
Predicate Calculus.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qx
-
Predicate Invention.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qy
-
Predicate Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10qz
-
Apprenticeship Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10r
-
Prediction with Expert Advice.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ra
-
Presynaptic Neuron.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rc
-
Principal Component Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rd
-
Prior.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10re
-
Prior Probabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rf
-
Privacy-Preserving Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rg
-
Process-Based Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ri
-
Program Synthesis From Examples.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rj
-
Programming from Traces.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rl
-
Prolog.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rm
-
Property.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rn
-
Propositional Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ro
-
Pruning Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rp
-
Quadratic Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rq
-
Qualitative Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rr
-
Quantitative Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rs
-
Rademacher Average.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rt
-
Rademacher Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ru
-
Radial Basis Function Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rv
-
Radial Basis Function Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rw
-
Random Decision Forests.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10rx
-
Approximate Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10s
-
Random Subspaces.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sa
-
Randomized Decision Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sb
-
Rank Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sc
-
Ratio Scale.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sd
-
Real-Time Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10se
-
Recall.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sf
-
Receiver Operating Characteristic Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sg
-
Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sh
-
Recurrent Associative Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sj
-
Reference Reconciliation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sl
-
Regularization Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sm
-
Reinforcement Learning in Structured Domains.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sn
-
Relational.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10so
-
Relational Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sp
-
Relational Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sq
-
Relational Regression Tree.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sr
-
Relational Value Iteration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ss
-
Relevance Feedback.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10su
-
Representation Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sv
-
Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sw
-
Resubstitution Estimate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sx
-
Reward.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sy
-
Reward Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10sz
-
AQ.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10t
-
RIPPER.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ta
-
ROC Convex Hull.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tb
-
ROC Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tc
-
RSM.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10te
-
Sample Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tf
-
Samuel's Checkers Player.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tg
-
Saturation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10th
-
SDP.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ti
-
Search Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tj
-
Self-Organizing Feature Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tk
-
Semantic Mapping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tl
-
Sensitivity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tm
-
Sequential Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10to
-
Sequential Inductive Transfer.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tp
-
Sequential Prediction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tq
-
Shannon's Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ts
-
Shattering Coefficient.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tt
-
SMT.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tv
-
Solution Concept.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tw
-
Solving Semantic Ambiguity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tx
-
SOM.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ty
-
SORT.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10tz
-
Area Under Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10u
-
Spam Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ua
-
Specialization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ub
-
Specificity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uc
-
Spectral Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ud
-
Speedup Learning For Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ue
-
Spike-Timing-Dependent Plasticity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uf
-
Sponsored Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ug
-
Squared Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uh
-
Squared Error Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ui
-
Stacked Generalization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uj
-
Stacking.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uk
-
Starting Clause.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ul
-
State.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10um
-
Statistical Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10un
-
Statistical Physics Of Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10up
-
Stratified Cross Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uq
-
Stream Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ur
-
String kernel.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10us
-
String Matching Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ut
-
Structural Credit Assignment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uu
-
Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uv
-
Structured Data Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uw
-
Subgroup Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ux
-
Subspace Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uy
-
Supersmoothing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10uz
-
ARL.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10v
-
Supervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10va
-
Swarm Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vb
-
Symbolic Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vc
-
Symmetrization Lemma.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vd
-
Synaptic E.Cacy.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ve
-
Tagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vf
-
TAN.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vg
-
Taxicab Norm Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vh
-
TD-Gammon.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vi
-
TDIDT Strategy.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vj
-
Temporal Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vl
-
Test Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vm
-
Test Instances.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vn
-
Test Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vo
-
Test Time.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vp
-
Test-Based Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vq
-
Text Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vr
-
Text Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vs
-
Text Spatialization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vt
-
TF-IDF.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vu
-
Threshold Phenomena in Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vv
-
Time Sequence.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vw
-
Topic Mapping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vx
-
Training Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vy
-
Training Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10vz
-
ART.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10w
-
Training Examples.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wa
-
Training Instances.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wb
-
Training Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wc
-
Training Time.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wd
-
Trait.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10we
-
Transductive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wg
-
Transfer of Knowledge Across Domains.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wh
-
Transition Probabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wi
-
Tree-Based Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wj
-
True Negative.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wk
-
True Negative Rate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wl
-
True Positive.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wm
-
True Positive Rate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wn
-
Type.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wo
-
Underlying Objective.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wq
-
Unit.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wr
-
Unknown Attribute Values.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ws
-
Unknown Values.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wt
-
Unlabeled Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wu
-
Unstable Learner.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10ww
-
Unsupervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wx
-
Unsupervised Learning on Document Datasets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wy
-
Utility Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10wz
-
Variable Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xa
-
Variable Subset Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xb
-
Variance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xc
-
Variance Hint.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xd
-
Vector Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xe
-
Viterbi Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xf
-
Web Advertising.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xg
-
Within-Sample Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xh
-
Word Sense Discrimination.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xi
-
Zero-One Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10xj
-
Artificial Life.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X10y
-
A/B Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17
-
Absolute Error Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17a
-
Artificial Life.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17aa
-
Artificial Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ab
-
Assertion.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ac
-
Associative Bandit Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ae
-
Attribute Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17af
-
Attribute-Value Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ag
-
AUC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ah
-
Authority Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ai
-
Average-Cost Neuro-Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17aj
-
Average-Cost Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ak
-
Average-Payoff Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17al
-
Backprop.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17am
-
Bandit Problem with Side Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ap
-
Bandit Problem with Side Observations.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17aq
-
Basic Lemma.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ar
-
Batch Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17as
-
Baum-Welch Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17at
-
Bayes Net.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17av
-
Bayes' Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17aw
-
Bayesian Model Averaging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ax
-
Bayesian Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ay
-
Belief State Markov Decision Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17az
-
Accuracy.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17b
-
Bellman Equation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ba
-
Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bb
-
Bias Variance Decomposition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bc
-
Bias-Variance-Covariance Decomposition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bd
-
Bilingual Lexicon Extraction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17be
-
Binning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bf
-
Blog Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bg
-
Boosting.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bh
-
Bootstrap Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bi
-
Bottom Clause.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bj
-
Bounded Differences Inequality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bk
-
BP.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bl
-
Candidate-Elimination Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bn
-
Cannot-Link Constraint.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bo
-
Cascor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bp
-
Case.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bq
-
Case-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17br
-
Categorical Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bs
-
Categorization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bt
-
Category.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bu
-
Causal Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bv
-
CC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bw
-
Certainty Equivalence Principle.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bx
-
Characteristic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17by
-
Citation or Reference Matching (When Applied to Bibliographic Data).
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17bz
-
ACO.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17c
-
City Block Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ca
-
Classification Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cb
-
Classification Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cc
-
Classification Tree.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cd
-
Clause.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ce
-
Clause Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cf
-
Click-Through Rate (CTR).
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cg
-
Closest Point.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ci
-
Cluster Editing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cj
-
Cluster Initialization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cl
-
Cluster Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cm
-
Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cn
-
Clustering Aggregation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17co
-
Clustering Ensembles.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cp
-
Clustering of Nonnumerical Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cq
-
Clustering with Advice.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cr
-
Clustering with Constraints.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cs
-
Clustering with Qualitative Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ct
-
Clustering with Side Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cu
-
Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cv
-
Coevolutionary Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cw
-
Collaborative Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cx
-
Collection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cy
-
Commercial Email Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17cz
-
Committee Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17da
-
Community Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17db
-
Comparable Corpus.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dc
-
Comparison Training.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dd
-
Competitive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17df
-
Compositional Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dh
-
Computational Discovery of Quantitative Laws.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17di
-
Conditional Random Field.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dj
-
Confirmation Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dk
-
Connection Strength.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dl
-
Connectivity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dm
-
Consensus Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dn
-
Constraint Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17do
-
Constructive Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dp
-
Content Match.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dq
-
Content-Based Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dr
-
Content-Based Recommending.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ds
-
Context-Sensitive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dt
-
Contextual Advertising.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17du
-
Continual Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dv
-
Continuous Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dw
-
Contrast Set Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dx
-
Cooperative Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dy
-
Co-reference Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17dz
-
Adaboost.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17e
-
Correlation-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ea
-
Cost.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17eb
-
Cost Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ec
-
Cost-Sensitive Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ed
-
Cost-to-Go Function Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ee
-
Co-training.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ef
-
Cross-Language Document Categorization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17eg
-
Cross-Language Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17eh
-
Cross-Language Question Answering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ei
-
Cross-Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ej
-
Data Augmentation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ek
-
Data Cleaning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17el
-
Data Cleansing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17em
-
Data Enrichment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17en
-
Data Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17eo
-
Data Linkage.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ep
-
Data Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17eq
-
Data mining on Text.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17er
-
Data Preprocessing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17es
-
Data Scrubbing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17et
-
Data Reconciliation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17eu
-
Data Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ev
-
Data Wrangling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ew
-
DBN.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ex
-
Decision Epoch.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ey
-
Decision Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ez
-
Decision Threshold.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fa
-
Deductive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fc
-
Deduplication.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fd
-
Deduplication or Duplicate Detection (When Applied to One Database Only).
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fe
-
Deep Belief Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ff
-
Dependency Directed Backtracking.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fg
-
Detail.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fh
-
Diagonal Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fi
-
Differential Prediction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fj
-
Digraphs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fk
-
Dimensionality Reduction on Text via Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fl
-
Directed Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fm
-
Discrete Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fn
-
Discriminative Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fo
-
Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fp
-
Distance Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fq
-
Distance Metrics.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fs
-
Document Categorization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fu
-
Domain Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fv
-
Dual Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fw
-
Duplicate Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fx
-
Dynamic Bayesian Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fy
-
Dynamic Decision Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17fz
-
Dynamic Programming for Relational Domains.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ga
-
Dynamic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gc
-
Echo State Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ge
-
ECOC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gf
-
Edge Prediction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gg
-
EFSC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gh
-
Eigenvector.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gi
-
Elman Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gj
-
Embodied Evolutionary Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gk
-
Emerging Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gl
-
EP.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gn
-
Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17go
-
Error Correcting Output Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gp
-
Error Squared.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gr
-
Error-Correcting Output Codes (ECOC).
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gs
-
Estimation of Density Level Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gt
-
Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gu
-
Evaluation Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gv
-
Evaluation of Model Performance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gw
-
Evaluation Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gx
-
Evolution of Agent Behaviors.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gy
-
Evolution of Robot Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17gz
-
Adaptive System.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17h
-
Evolutionary Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ha
-
Evolutionary Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hb
-
Evolutionary Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hc
-
Evolutionary Constructive Induction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hd
-
Evolutionary Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17he
-
Evolutionary Feature Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hf
-
Evolutionary Grouping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hg
-
Evolving Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hh
-
Example.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hi
-
Example Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hj
-
Example-Based Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hk
-
Experience Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hl
-
Experience-Based Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hm
-
Explanation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hn
-
Explanation-Based Generalization for Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ho
-
F1-Measure.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hp
-
False Negative.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hq
-
False Positive.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hr
-
Feature.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hs
-
Feature Generation in Text Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ht
-
Feature Subset Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hv
-
Feature Weighting.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hw
-
Field Scrubbing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hy
-
Finite Mixture Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17hz
-
First-Order Predicate Calculus.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ia
-
First-Order Predicate Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ib
-
Frequent Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17id
-
Functional Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ie
-
Fuzzy Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17if
-
Fuzzy Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ig
-
Gaussian Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ih
-
Generality and Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ii
-
Generalization Performance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ij
-
General-to-Specific Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17il
-
Generative Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17im
-
Genetic Attribute Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17in
-
Genetic Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17io
-
Genetic Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ip
-
Genetic Grouping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17iq
-
Genetic Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ir
-
Genetics-Based Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17is
-
Gibbs Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17it
-
Gram Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17iv
-
Grammar Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17iw
-
Grammatical Tagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ix
-
Grouping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17iy
-
Growing Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17iz
-
Agent-Based Computational Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17j
-
Growth Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ja
-
Hebb Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jb
-
Hebbian Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jc
-
Hold-One-Out Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17je
-
Holdout Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jf
-
Holdout Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jg
-
Holdout Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jh
-
Hyperparameter Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ji
-
Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jj
-
Identity Uncertainty.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jk
-
Immune Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jm
-
Immune Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jn
-
Immune-Inspired Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jo
-
Immunocomputing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jp
-
Immunological Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jq
-
Implication.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jr
-
Improvement Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17js
-
Indirect Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jt
-
Induction as Inverted Deduction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ju
-
Inductive Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jv
-
Inductive Inference Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jw
-
Inductive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jx
-
Inductive Program Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jy
-
Inductive Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17jz
-
Agent-Based Modeling and Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17k
-
Inequalities.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ka
-
In-Sample Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kc
-
Instance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kd
-
Instance Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ke
-
Instance Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kf
-
Intelligent Backtracking.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kg
-
Internal Model Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ki
-
Interval Scale.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kj
-
Inverse Entailment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kk
-
Inverse Optimal Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kl
-
Inverse Resolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17km
-
Is More General Than.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kn
-
Is More Specific Than.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ko
-
Isotonic Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kp
-
Item.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kq
-
Item Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kr
-
Iterative Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ks
-
Iterative Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kt
-
Iterative Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ku
-
Junk Email Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kv
-
Kernel Density Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kw
-
Kernel Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kx
-
Kernel Shaping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ky
-
Kernel-Based Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17kz
-
Agent-Based Simulation Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17l
-
Kernels.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17la
-
Kind.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lb
-
Kohonen Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lc
-
L1-Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ld
-
Label.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17le
-
Labeled Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lf
-
Language Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lg
-
Laplace Estimate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lh
-
Laplacian Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17li
-
Latent Class Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lj
-
Latent Factor Models and Matrix Factorizations.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lk
-
Learning Algorithm Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ll
-
Learning Bayesian Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lm
-
Learning Bias.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ln
-
Learning by Demonstration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lo
-
Learning by Imitation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lp
-
Learning Classifier Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lq
-
Learning Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lr
-
Learning Control Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ls
-
Learning from Complex Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lt
-
Learning from Labeled and Unlabeled Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lu
-
Learning from Non-Propositional Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lv
-
Learning from Nonvectorial Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lw
-
Learning in Worlds with Objects.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17lz
-
AIS.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17m
-
Learning to Learn.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ma
-
Learning Vector Quantization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mb
-
Learning with Different Classification Costs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mc
-
Learning with Hidden Context.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17md
-
Learning Word Senses.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17me
-
Leave-One-Out Cross-Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mf
-
Leave-One-Out Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mg
-
Lessons-Learned Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mh
-
Life-Long Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mj
-
Lift.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mk
-
Linear Regression Trees.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ml
-
Linear Separability.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mm
-
Link Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mn
-
Link-Based Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mo
-
Liquid State Machine.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mp
-
List Washing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mq
-
Local Distance Metric Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mr
-
Local Feature Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ms
-
Locally Weighted Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mt
-
Logic Program.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mu
-
Logistic Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mx
-
Logistic Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17my
-
Logit Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17mz
-
Analogical Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17n
-
Log-Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17na
-
Long-Term Potentiation of Synapses.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nb
-
LOO Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nc
-
Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ne
-
Loss Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nf
-
Lossy Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ng
-
LVQ.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nh
-
LWPR.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ni
-
LWR.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nj
-
Margin.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nk
-
Market Basket Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nl
-
Markov Chain.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nm
-
Markov Model.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nn
-
Markov Net.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17no
-
Markov Network.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17np
-
Markov Process.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nq
-
Markov Random Field.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nr
-
Markovian Decision Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ns
-
Maxent Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nt
-
Maximally Specific Hypothesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nv
-
McDiarmid's Inequality.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nw
-
MCMC.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nx
-
Mean Absolute Deviation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ny
-
Mean Absolute Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17nz
-
Mean Squared Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ob
-
Memory-Based.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oc
-
Memory-Based Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17od
-
Merge-Purge.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oe
-
Message.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17of
-
Meta-combiner.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17og
-
Minimum Cuts.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oh
-
Mining a Stream of Opinionated Documents.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oi
-
Missing Values.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oj
-
Mixture Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ol
-
Mixture Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17om
-
Mode Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17on
-
Model Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oo
-
Model Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17op
-
Model Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oq
-
Model-Based Control.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17or
-
Modularity Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17os
-
MOO.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ot
-
Morphosyntactic Disambiguation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ou
-
Most General Hypothesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ov
-
Most Similar Point.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ow
-
Most Specific Hypothesis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ox
-
Multi-armed Bandit.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oy
-
Multi-armed Bandit Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17oz
-
Analytical Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17p
-
Multi-criteria Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pa
-
Multi-objective Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pb
-
Multiple Classifier Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pc
-
Multistrategy Ensemble Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pd
-
Multitask Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pe
-
Must-Link Constraint.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pf
-
NCL.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pg
-
NC-Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ph
-
Nearest Neighbor Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pi
-
Negative Correlation Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pj
-
Negative Predictive Value.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pk
-
Net Lift Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pl
-
Network Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pm
-
Network Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pn
-
Networks with Kernel Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17po
-
Neuro-Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pq
-
Node.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pr
-
No-Free-Lunch Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ps
-
Nogood Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pt
-
Noise.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pu
-
Nominal Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pv
-
Nonparametric Bayesian.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pw
-
Nonparametric Cluster Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17px
-
Non-Parametric Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17py
-
Nonstationary Kernels.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17pz
-
Anytime Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17q
-
NP-Completeness.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qb
-
Numeric Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qc
-
Object.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qd
-
Object Consolidation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qe
-
Object Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qf
-
Object Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qg
-
Object Space.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qh
-
Objective Function.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qi
-
Ockham's Razor.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qj
-
Offline Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qk
-
One-Against-All Training.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ql
-
One-Against-One Training.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qm
-
One-Step Reinforcement Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qo
-
Ontology Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qp
-
Opinion Extraction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qq
-
Opinion Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qr
-
Optimal Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qs
-
Ordered Rule Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qt
-
Ordinal Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qu
-
Out-of-Sample Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qw
-
Overall and Class-Sensitive Frequencies.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qx
-
Overtraining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qy
-
PAC Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17qz
-
AODE.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17r
-
PAC-MDP Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ra
-
Pairwise Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rb
-
Parallel Corpus.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rc
-
Part of Speech Tagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rd
-
Passive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17re
-
PCA.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rf
-
PCFG.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rg
-
Piecewise Constant Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rh
-
Plan Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rj
-
Polarity Learning on a Stream.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rk
-
Policy Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rl
-
POMDPs.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rm
-
Positive Predictive Value.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ro
-
Positive Semidefinite.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rp
-
Posterior.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rq
-
Post-pruning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rr
-
Postsynaptic Neuron.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rs
-
Predicate Calculus.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ru
-
Predicate Invention.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rv
-
Predicate Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rw
-
Prediction with Expert Advice.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rx
-
Predictive Software Models.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ry
-
Pre-pruning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17rz
-
Apprenticeship Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17s
-
Presynaptic Neuron.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sa
-
Principal Component Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sb
-
Prior.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sc
-
Privacy-Preserving Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sd
-
Probability Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17se
-
Process-Based Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sg
-
Program Synthesis from Examples.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sh
-
Programming by Example (PBE).
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17si
-
Programming by Examples.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sj
-
Programming from Traces.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sk
-
Prolog.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sl
-
Property.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sm
-
Propositional Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sn
-
Prospective Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17so
-
Pruning Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sp
-
Quadratic Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sq
-
Qualitative Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sr
-
Quality Threshold.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ss
-
Quantitative Attribute.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17st
-
Quasi-Interpolation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17su
-
Radial Basis Function Approximation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sv
-
Radial Basis Function Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sw
-
Random Decision Forests.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sx
-
Random Forests.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sy
-
Random Subspace Method.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17sz
-
Approximate Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17t
-
Random Subspaces.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ta
-
Randomized Decision Rule.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tb
-
Randomized Experiments.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tc
-
Ratio Scale.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17td
-
Real-Time Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17te
-
Recall.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tf
-
Receiver Operating Characteristic Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tg
-
Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17th
-
Recurrent Associative Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ti
-
Recursive Partitioning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tj
-
Reference Reconciliation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tk
-
Regularization Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tl
-
Reinforcement Learning in Structured Domains.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tm
-
Relational Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tn
-
Relational Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17to
-
Relational Regression Tree.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tp
-
Relational Value Iteration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tq
-
Relationship Extraction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tr
-
Relevance Feedback.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ts
-
Representation Language.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tt
-
Resubstitution Estimate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tu
-
Reward.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tv
-
Reward Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tw
-
ROC Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ty
-
Rotation Forests.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17tz
-
AQ.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17u
-
RSM.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ua
-
Sample Complexity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ub
-
Samuel's Checkers Player.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uc
-
Saturation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ud
-
SDP.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ue
-
SDRI.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uf
-
Selection of Algorithms, Ranking Learning Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ug
-
Self-Adaptive Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uh
-
Self-Organizing Feature Maps.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ui
-
Semantic Mapping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uj
-
Sensitivity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uk
-
Sentiment Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ul
-
Sentiment Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17um
-
Separate-and-Conquer Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17un
-
Sequence Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uo
-
Sequential Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17up
-
Sequential Inductive Transfer.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uq
-
Sequential Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ur
-
Shannon's Information.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ut
-
Shattering Coefficient.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uu
-
Sigmoid Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uv
-
SMT.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ux
-
Solution Concept.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uy
-
Solving Semantic Ambiguity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17uz
-
Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17v
-
SOM.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17va
-
Sort.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vb
-
Spam Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vc
-
Specialization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vd
-
Specificity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ve
-
Spectral Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vf
-
Speedup Learning for Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vg
-
Spike-Timing-Dependent Plasticity.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vh
-
Split Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vi
-
Sponsored Search.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vj
-
Squared Error.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vk
-
Squared Error Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vl
-
Stacked Generalization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vm
-
Stacking.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vn
-
Starting Clause.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vo
-
State.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vp
-
Statistical Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vq
-
Statistical Natural Language Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vr
-
Stopping Criteria.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vt
-
Stratified Cross Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vu
-
String Matching Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vx
-
Structural Credit Assignment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vy
-
Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17vz
-
Area Under Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17w
-
Structured Data Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wa
-
Subgroup Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wb
-
Subspace Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wc
-
Supervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17we
-
Supervised Learning on Text Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wf
-
Swarm Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wg
-
Symbolic Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wh
-
Symmetrization Lemma.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wi
-
Table Extraction.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wk
-
Table Parsing.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wl
-
Table Understanding.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wm
-
Tagging.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wn
-
TAN.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wo
-
Taxicab Norm Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wp
-
TD-Gammon.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wq
-
TDIDT Strategy.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wr
-
Temporal Credit Assignment.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ws
-
Temporal Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wt
-
Test Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wu
-
Test Instances.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wv
-
Test Set.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ww
-
Test Time.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wx
-
Test-Based Coevolution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wy
-
Text Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17wz
-
ARL.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17x
-
Text Spatialization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xa
-
TF-IDF.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xb
-
Time Sequence.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xd
-
Topic Mapping.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xe
-
Topic Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xf
-
Topology.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xg
-
Training Instances.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xk
-
Training Time.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xm
-
Trait.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xn
-
Trajectory Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xo
-
Transductive Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xp
-
Transfer Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xq
-
Transfer of Knowledge Across Domains.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xr
-
Transition Probabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xs
-
Tree-Based Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xt
-
True Lift Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xu
-
True Negative.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xv
-
True Negative Rate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xw
-
True Positive.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xx
-
True Positive Rate.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xy
-
Type.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17xz
-
ART.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17y
-
Typical Complexity of Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ya
-
Underlying Objective.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yb
-
Unit.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yc
-
Unknown Values.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ye
-
Unlabeled Data.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yf
-
Unsolicited Commercial Email Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yg
-
Unstable Learner.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yh
-
Unsupervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yi
-
Utility Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yj
-
Variance Hint.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yk
-
Vector Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yl
-
Viterbi Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17ym
-
Web Advertising.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yn
-
Within-Sample Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yo
-
Word Sense Discrimination.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yp
-
Zero-One Loss.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17yq
-
ARTDP.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/X17z
-
Discretization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Yang10
-
Measurement Scales.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Yang10a
-
Discretization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Yang17
-
Measurement Scales.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Yang17a
-
Epsilon Covers.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann10
-
Epsilon Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann10a
-
Stochastic Finite Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann10c
-
VC Dimension.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann10d
-
Epsilon Cover.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann17
-
Epsilon Nets.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann17a
-
PAC Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann17b
-
Stochastic Finite Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann17c
-
VC Dimension.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zeugmann17d
-
Covariance Matrix.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang10
-
Empirical Risk Minimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang10a
-
Gaussian Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang10b
-
Kernel Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang10c
-
Regularization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang10d
-
Structural Risk Minimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang10e
-
Support Vector Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang10f
-
Empirical Risk Minimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang17a
-
Gaussian Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang17b
-
Kernel Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang17c
-
Regularization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang17d
-
Structural Risk Minimization.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang17e
-
Support Vector Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhang17f
-
Document Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ZhaoK10
-
Averaged One-Dependence Estimators.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ZhengW10
-
Semi-Naive Bayesian Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ZhengW10a
-
Tree Augmented Naive Bayes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ZhengW10b
-
Averaged One-Dependence Estimators.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ZhengW17
-
Semi-naive Bayesian Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ZhengW17a
-
Tree Augmented Naive Bayes.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/ZhengW17b
-
Semi-Supervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhu10
-
Semi-supervised Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ml/Zhu17
-
Encyclopedia of Multimedia
https://dblp.l3s.de/d2r/resource/publications/reference/mm/2006
-
Encyclopedia of Multimedia, 2nd Ed.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/2008
-
Content-Based Photo Album Management Using Faces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Abdel-MottalebC06
-
Content-Based Photo Album Management Using Faces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Abdel-MottalebC08
-
MPEG-7: Multimedia Content Description Interface.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Agius08
-
Real-World Multimedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/AgiusCM06
-
Real-World Multimedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/AgiusCM08
-
Networking for Massively Multiuser Online Gaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/AhmedS08
-
Video Summarization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/AlbaneseCFPS06
-
Video Summarization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/AlbaneseCFPS08
-
Multimedia Content Modeling and Personalization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Angelides06
-
Multimedia Content Modeling and Personalization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Angelides08
-
Multimedia in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Asthana06
-
Multimedia in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Asthana08
-
Multimedia Servers.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/AsthanaK06
-
Multimedia Servers.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/AsthanaK08
-
Sports Video Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BabaguchiN08
-
Multimedia Metadata Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BailerBDGKKLS08
-
Color-Mapped Imaging.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BattiatoL08
-
Video Stabilization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BattiatoL08a
-
Indexing 3D scenes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BilascoGMV06
-
Indexing Three Dimensional Scenes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BilascoGMV08
-
Video Automatic Annotation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BimboB06
-
Video Automatic Annotation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/BimboB08
-
Automatic Generation of Video Documentaries.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Bocconi08
-
Multimedia Entertainment Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/CacciaguerraRS06
-
Multimedia Entertainment Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/CacciaguerraRS08
-
Streaming Multimedia Information Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Candan08
-
Privacy and Video Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/CarrilloK08
-
Video Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/CesaranoFPS06
-
Video Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/CesaranoFPS08
-
Structural Similarity Index Based Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ChannappayyaB08
-
Multiple Source Alignment for Video Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/DimitrovaT06
-
Multiple Source Alignment for Video Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/DimitrovaT08
-
Semantic Web.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/DustdarF06
-
Semantic Web.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/DustdarF08
-
IP Telephony.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/El-Saddik06
-
Quality of Service in Multimedia Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/El-Saddik06a
-
IP Telephony.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/El-Saddik08
-
Quality of Service in Multimedia Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/El-Saddik08a
-
Multimedia Content Repurposing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/El-SaddikH06
-
Multimedia Content Repurposing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/El-SaddikH08
-
Protection of Multimedia Data in Distribution and Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Eskicioglu06
-
Protection of Multimedia Data in Distribution and Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Eskicioglu08
-
Online Multimedia E-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FalchukJ06
-
Online Multimedia E-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FalchukJ08
-
Motion Compensation for Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FengL06
-
Motion Compensation for Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FengL08
-
Large-Scale Video-on-Demand Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FengPL06
-
Large-Scale Video-on-Demand Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FengPL08
-
Data Mining for Video Coding and Transcoding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Fernandez-Escribano08
-
Online Gaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FerrettiRS06
-
Online Gaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FerrettiRS08
-
Personalized Educational Hypermedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FokI06
-
Personalized Educational Hypermedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FokI08
-
Automated Lecture Recording.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/FriedlandHK08
-
Three-Dimensional Video Visualization and Navigation System.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Furht08
-
Data Management Techniques for Continuous Media in Ad-Hoc Networks of Wireless Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/GhandeharizadehHKBR06
-
Data Management Techniques for Continuous Media in Ad-Hoc Networks of Wireless Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/GhandeharizadehHKBR08
-
Multimedia Content Adaption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Gibbon06
-
Multimedia Content Adaption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Gibbon08
-
Digital Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Golshani06
-
Digital Biometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Golshani08
-
Video Content Analysis Using Machine Learning Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Gong06
-
Video Content Analysis Using Machine Learning Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Gong08
-
Image Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Grosky06
-
Image Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Grosky08
-
Frequency Domain Representations for Three Dimentional Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/GuptaMB08
-
Wireless Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/HeC06
-
Wireless Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/HeC08
-
Multimedia Streaming on the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/HoLF06
-
Large Scale Multimedia Streaming in Heterogeneous Network Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/HoLF08
-
Multimedia Streaming on the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/HoLF08a
-
MPEG-21 Based Video Adaptation with Encryption and Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/IqbalS08
-
Knowledge-Based Multimedia Adaptation Decision-Taking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/JannachTH08
-
Scalable Video Coding Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/JillaniK08
-
Three Dimensional Television Services.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KalvaCMMF08
-
Hypercube-Based Multi-view Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KalvaF08
-
Person Detection in Images and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KapsalasA08
-
Facial Animation and Affective Human-Computer Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KarpouzisK06
-
Facial Animation and Affective Human-Computer Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KarpouzisK08
-
Multimedia Storage Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Kim06
-
Scheduling in Multimedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Kim06a
-
Multimedia Storage Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Kim08
-
Scheduling in Multimedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Kim08a
-
Context-Aware Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KlasK06
-
Context-Aware Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KlasK08
-
Optimization-Based Multimedia Adaptation Decision-Taking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KoflerTH08
-
Object Recognition and Pose Estimation from 2.5D Scenes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KordelasMDS08
-
Multimedia Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KundurL06
-
Multimedia Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/KundurL08
-
Multimodal Analysis of Human Behavior.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LablackMD08
-
Face Detection, Tracking, and Recognition for Broadcast Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LeWS08
-
Video Coding Techniques and Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LeeK06
-
Video Coding Techniques and Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LeeK08
-
Image Search Engine.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LiM06
-
Image Search Engine.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LiM08
-
Middleware for Streaming 3D Meshes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LiP06
-
Middleware for Streaming Three Dimentional Meshes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LiP08
-
Semantic Image Representation and Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Lim06a
-
Semantic Image Representation and Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Lim08
-
Multimedia Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LuhK06
-
Multimedia Fingerprinting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LuhK08
-
Digital Camera Image Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LukacP06
-
Digital Camera Image Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LukacP08
-
Color Image Filtering and Enhancement.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LukacPV06
-
Color Image Filtering and Enhancement.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LukacPV08
-
Image Secret Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LukacPY06
-
Image Secret Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/LukacPY08
-
Three Dimensional Content-Based Search and Retrieval of CAD Objects.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MademlisDTS08
-
Three Dimensional Object Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MademlisDTS08a
-
Interactive Virtual Humans in Mobile Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Magnenat-ThalmannPC08
-
Multimedia Web Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MakrisS06
-
Multimedia Web Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MakrisS08
-
Range Image Quality Assessment by Structural Similarity.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MalpicaB08
-
JPEG 2000 Image Coding Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ManDK06
-
JPEG 2000 Image Coding Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ManDK08
-
Content Extraction and Metadata.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Marques06
-
Image Compression and Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Marques06a
-
Image Data Representations.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Marques06b
-
Content Extraction and Metadata.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Marques08
-
Image Compression and Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Marques08a
-
Image Data Representations.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Marques08b
-
Gaze Tracking Applied to Image Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MartinetLID08
-
Distributed Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MartinezF08
-
Segmentation of Images and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MezarisKS06
-
Segmentation of Images and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MezarisKS08
-
Video Usage Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MongyBD06
-
Video Usage Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MongyBD08
-
Face and Facial Expression Recognition using Three Dimensional Data.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MpiperisMS08
-
Three Dimensional Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MpiperisMS08a
-
Scalable Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MrakI06
-
Scalable Video Coding Fundamentals.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MrakI08
-
Multimedia Personalization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/MylonasA08
-
Multimedia Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/NeuholdN06
-
Multimedia Libraries.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/NeuholdN08
-
Audio Compression and Coding Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Oliveira06
-
Motion Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Oliveira06a
-
Audio Compression and Coding Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Oliveira08
-
Motion Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Oliveira08a
-
Multimedia System-on-a-Chip.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/PaverK06
-
Multimedia System-on-a-Chip.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/PaverK08
-
Utility Model-Based Adaptation of Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/PranglHS08
-
Mobile Broadcast Multicast Services.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/PraveenkumarKF08
-
Video Error Resilience Techniques for MBMS.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/PraveenkumarKF08a
-
High Definition Live Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/QinZ06
-
High Definition Live Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/QinZ08
-
Adaptive Joint Source-Channel Coding for Scalable Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/RamzanI08
-
Infrastructure and Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Robbins06
-
Multimedia Synchronization - Area Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Robbins06a
-
Multimedia Synchronization - Infrastructure and Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Robbins06b
-
Infrastructure and Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Robbins08
-
Multimedia Synchronization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Robbins08a
-
Multimedia Synchronization - Infrastructure and Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Robbins08b
-
Collaborative Computing - Area Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/RobbinsD06
-
Collaborative Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/RobbinsD08
-
Data Modeling, Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini06
-
Multimedia File Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini06a
-
Multimedia Semiotics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini06b
-
Video Search.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini06c
-
Data Modeling, Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini08
-
Multimedia File Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini08a
-
Multimedia Semiotics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini08b
-
Video Search.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Santini08c
-
Multimedia Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SapinoC08
-
Analyzing Person Information in News Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Satoh06
-
Analyzing Person Information in News Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Satoh08
-
Video Near-duplicate Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Satoh08a
-
Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SchranzD06
-
Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SchranzD08
-
Image and Video Quality Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SeshadrinathanB06
-
Advances in Image and Video Quality Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SeshadrinathanB08
-
Image and Video Quality Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SeshadrinathanB08a
-
Digital Rights Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Shah06
-
Digital Rights Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Shah08
-
Multimedia Authoring.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Sharda06
-
Multimedia Authoring.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Sharda08
-
Motion Saliency.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SharifMD08
-
Object Tracking in Video Using Covariance Matrices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SharifMD08a
-
Tele-Haptics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShenS06
-
Telepresence.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShenS06a
-
Virtual and Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShenS06b
-
Tele-Haptics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShenS08
-
Telepresence.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShenS08a
-
Virtual and Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShenS08b
-
Digital Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShihCCCH06
-
Digital Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShihCCCH08
-
Audio Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShirmohammadiO06
-
Teleconferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShirmohammadiO06a
-
Audio Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShirmohammadiO08
-
Teleconferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ShirmohammadiO08a
-
Multimedia Content Personalisation on Mobile Devices using MPEG-7 and MPEG-21.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SofokleousA08
-
Video Quality Assessment for Wireless Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SoundararajanSB08
-
Detection of High-Level Concepts in Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SpyrouA08
-
Multimedia Semantics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/StamouK06
-
Multimedia Semantics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/StamouK08
-
Digital Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SteinebachDN06
-
Digital Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SteinebachDN08
-
Experiential Media Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SundaramR06
-
Experiential Media Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/SundaramR08
-
MPEG-21 Multimedia Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/TimmererH08
-
Generic Multimedia Content Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/TimmererRH08
-
MPEG-21 Digital Item Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/TimmererVH08
-
Coding of Stereoscopic and 3D Images and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/TriantafyllidisGS06
-
Coding of Stereoscopic and Three Dimensional Images and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/TriantafyllidisGS08
-
Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/TsalakanidouMS06
-
Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/TsalakanidouMS08
-
Optimization of Video Content Descriptions for Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/UrrutyBDBGBLA06
-
Optimization of Video Content Descriptions for Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/UrrutyBDGBLA08
-
Distributed Multimedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Veeravalli06
-
Distributed Multimedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Veeravalli08
-
Large-Scale Object-Based Multimedia Storage Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/VeeravalliZ08
-
Content Based 3D Shape Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/VeltkampT06
-
Content Based Three Dimensional Shape Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/VeltkampT08
-
Content Based Music Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/VeltkampWT06
-
Content Based Music Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/VeltkampWT08
-
Biometrics for User Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/VillagerD06
-
Biometrics for User Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/VillagerD08
-
Multimedia Archives and Mediators.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/WallaceAK06
-
Multimedia Archives and Mediators.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/WallaceAK08
-
Image and Video Super Resolution Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/WangG08
-
Real Time Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/WenjunL08
-
Human Computer Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/WongI06
-
Human Computer Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/WongI08
-
Active Buffer Management for Provision of VCR Functionalities.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06
-
Adaptive Educational Hypermedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06a
-
Context-Aware Modeling of Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06aa
-
Context-Aware Musical Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ab
-
Context-Aware Video Production.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ac
-
Creating Adaptive Course Texts with AHA!
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ad
-
Data Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ae
-
Data Discovery, Routing and Traffic Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06af
-
Data Encryption Standard (DES) and Advanced Encryption Standard (AES).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ag
-
Dead Reckoning.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ah
-
Demosaicked Image Postprocessing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ai
-
Demosaicking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06aj
-
Desktop Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ak
-
Device-Driven Presentation of Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06al
-
Diamond Search for Block Motion Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06am
-
Digital Cinema.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06an
-
Discrete Cosine Transform (DCT).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ao
-
Discrete Wavelet Transform (DWT).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ap
-
Distance and Similarity Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06aq
-
Document Standards in Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ar
-
Edge Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06as
-
Edge-Sensing Mechanism.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06at
-
Elements of Multimedia in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06au
-
Embedding Multiple Watermarks in a Transform Domain.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06av
-
Emergent Semantics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06aw
-
Emotion and Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ax
-
Encryption in RTP.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ay
-
Extensible Stylesheet Language.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06az
-
Applications of Face Recognition and Novel Trends.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06b
-
Face Recognition Evaluation and Pilots.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ba
-
Face Recognition, 3D.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bb
-
Fairness in Online Games.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bc
-
Fuzzy Techniques For Context Representation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bd
-
Game Accessibility.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06be
-
Game Event Synchronization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bf
-
Geographic Video Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bg
-
H.263 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bh
-
Halftoning Based Visual Secret Sharing (Vss).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bi
-
Haptic Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bj
-
Haptic Feedback in User Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bk
-
Haptics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bl
-
Harminic Broadcasting Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bm
-
Hierarchical Vod System.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bn
-
Huffman Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bo
-
Image and Video Capture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bp
-
Image Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bq
-
Image watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06br
-
Image Watermarking Using Visual Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bs
-
Immersive Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bt
-
In Home, in Car, in Flight Entertainment.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bu
-
Infrared Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bv
-
Inpainting in Virtual Restoration of Artworks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bw
-
Integration of Collaborative Computing With Modelling and Simulation Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bx
-
Intel¬ģ XScale¬ģ Micro-Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06by
-
Interactive Story Telling.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06bz
-
Architecture of Commercial News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06c
-
Interleaved Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ca
-
JFIF (JPEG File Interchange Format).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cb
-
JPEG.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cc
-
JPEG-LS.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cd
-
Key Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ce
-
Knowledge-Assisted Image and Video Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cf
-
LCD Display Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cg
-
Legacy and Current Practice - The Reality of Contemporary Collaborative Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ch
-
Long Duration Continuous Media Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ci
-
Medical Image Segmentation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cj
-
Mesh, 3D.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ck
-
Message Digest (MD5) Algorithm and Secure Hash Algorithm (SHA).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cl
-
Mime Types.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cm
-
Motion Estimation with Half-Pixel Accuracy.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cn
-
Motion Picture Inpainting on Aged Films.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06co
-
MPEG-1 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cp
-
MPEG-2 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cq
-
MPEG-4 Advanced Video Compression (MPEG-4 AVC)/H.264.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cr
-
MPEG-4 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cs
-
Multi-Resolution Image Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ct
-
Multi-View Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cu
-
Multicast True VoD Service.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cv
-
Multichannel Data Ordering Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cw
-
Multimedia Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cx
-
Multimedia Content Adaptation in MPEG-21.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cy
-
Multimedia Content Modeling in COSMOS-7.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06cz
-
Audio and Video Information in Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06d
-
Multimedia Design.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06da
-
Multimedia News Systems Infrastructure.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06db
-
Multimedia Production.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dc
-
Multimedia Project Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dd
-
Multimedia Proxy Caching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06de
-
Multimodal Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06df
-
Networking Protocols for Audio Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dg
-
Object Based Stereoscopic Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dh
-
Occlusions.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06di
-
Online Multimedia and Television.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dj
-
Open Systems for Online Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dk
-
Overlapped Block Motion Compensation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dl
-
Peer-to-Peer Multicast Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dm
-
Peer-to-Peer Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dn
-
Peer-to-Peer Systems and Digital Rights Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06do
-
Photo Defect Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dp
-
Placement of Continuous Media in Ad-Hoc Networks of Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dq
-
Portable Network Graphics (Png).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dr
-
Portals.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ds
-
Power-Rate Distortion Analysis for Wireless Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dt
-
Private-Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06du
-
Progressive Forest Split.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dv
-
Public Key vs. Secret Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dw
-
QOS Assessment of Video Over IP.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dx
-
Quantization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dy
-
Real Time Transport Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06dz
-
Audio Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06e
-
Recording Teleconferencing Sessions.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ea
-
Role of Semantics in Multimedia Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06eb
-
The RSA Public-Key Encryption Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ec
-
Scalar Edge Detectors.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ed
-
Security Issues in Wireless Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ee
-
Segmentation and Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ef
-
Segmentation Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06eg
-
Semantic Agents on the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06eh
-
Semantic Class-Based Image Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ei
-
Semantic Consumer Image Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ej
-
Semantic Medical Image Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ek
-
Semantic Visual Query and Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06el
-
Semantic Web Services.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06em
-
Semantics Standards and Recommendations.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06en
-
Semantics Web Tools and Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06eo
-
Semiotics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ep
-
Sharable Content Object Reference Model (SCORM).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06eq
-
SIMD (Single Instruction Multiple Data) Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06er
-
Spectral Model.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06es
-
Stereoscopic and Multi-View Video Coding Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06et
-
Streaming Multimedia and its Applications in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06eu
-
Tele-Operation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ev
-
Threshold Schemes with Minimum Pixel Expansion.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ew
-
Trends in Multimedia E-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ex
-
Universal Multimedia Access.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ey
-
User Modeling in MPEG-7.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ez
-
Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06f
-
Valence-Driven Conquest.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fa
-
VC-1 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fb
-
Vector Edge Detectors.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fc
-
Video Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fd
-
Video Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fe
-
Video Transcoding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06ff
-
Video Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fg
-
Video-Based Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fh
-
Virtual Presence.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fi
-
Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fj
-
Vision-Based Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fk
-
Visual Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fl
-
Watermarking, Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fm
-
Watermarking, Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fn
-
Wireless Video Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fo
-
WMV-9 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fp
-
Workflow Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06fq
-
Authoring and Specification.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06g
-
Behavioral Facilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06h
-
Block Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06i
-
Broadcast Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06j
-
Cascading Style Sheets.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06k
-
Cell Phones and E-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06l
-
CFA Image Zooming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06m
-
Client-Server Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06n
-
Client-Server Multimedia Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06o
-
Collaborative Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06p
-
Color Image Noise.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06q
-
Color Image Zooming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06r
-
Combining Intra-Image and Inter-Class Semantics for Image Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06s
-
Compressed Progressive Meshes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06t
-
Compressed Video Spatio-Temporal Segmentation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06u
-
Compression in Image Secret Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06v
-
Content Distribution Network.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06w
-
Content Management in Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06x
-
Content Protection Solutions for Digital home Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06y
-
Context and Current Metadata Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X06z
-
Active Buffer Management for Provision of VCR Functionalities.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08
-
Adaptation Decision Taking Engine.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08a
-
Cell Phones and E-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08aa
-
CFA Image Zooming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ab
-
Client-Server Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ac
-
Client-Server Multimedia Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ad
-
Coding Format Agnostic Multimedia Content Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ae
-
Coding Format Independent Multimedia Content Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08af
-
Collaborative Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ag
-
Color Image Noise.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ah
-
Color Image Zooming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ai
-
Color Palette Imaging.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08aj
-
Color Palette Reordering.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ak
-
Color Palette-Based Lossless Image Compression Format.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08al
-
Color Quantization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08am
-
Combining Intra-Image and Inter-Class Semantics for Image Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08an
-
Compressed Progressive Meshes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ao
-
Compressed Video Spatio-Temporal Segmentation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ap
-
Compression Chain.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08aq
-
Compression in Image Secret Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ar
-
Content Adaptation During Distribution over the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08as
-
Content Adaptation Using MPEG Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08at
-
Content Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08au
-
Content Distribution Network.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08av
-
Content Management in Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08aw
-
Content Production.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ax
-
Content Protection Solutions for Digital Home Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ay
-
Content-User Gap in MPEG-7.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08az
-
Adaptive Educational Hypermedia Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08b
-
Context and Current Metadata Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ba
-
Context-Aware Modeling of Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bb
-
Context-Aware Musical Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bc
-
Context-Aware Video Production.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bd
-
Creating Adaptive Course Texts with AHA!
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08be
-
Cross-Modal Utility Models.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bf
-
Data Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bg
-
Data Discovery in Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bh
-
Data Discovery, Routing and Traffic Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bi
-
Data Encryption Standard (DES) and Advanced Encryption Standard (AES).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bj
-
Dead Reckoning.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bk
-
Demosaicked Image Postprocessing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bl
-
Demosaicking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bm
-
Depth Image Quality Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bn
-
Design of Object-Based Storage Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bo
-
Desktop Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bp
-
Detecting the Gaze of People.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bq
-
Device-Driven Presentation of Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08br
-
Diamond Search for Block Motion Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bs
-
Digital Cinema.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bt
-
Directional Blurring.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bu
-
Discrete Cosine Transform (DCT).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bv
-
Discrete Wavelet Transform (DWT).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bw
-
Distance and Similarity Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bx
-
Distributed Encoding, Joint Decoding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08by
-
Dithering.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08bz
-
Ambient Media Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08c
-
Document Standards in Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ca
-
Edge Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cb
-
Edge-Sensing Mechanism.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cc
-
Elements of Multimedia in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cd
-
Embedding Multiple Watermarks in a Transform Domain.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ce
-
Emergent Semantics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cf
-
Emotion and Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cg
-
Encryption and Authentication of H.264 Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ch
-
Encryption in RTP.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ci
-
Error Resilience in Wireless Video Transmission.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cj
-
Exposure Values.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ck
-
Extensible Stylesheet Language.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cl
-
Face Grouping.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cm
-
Face Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cn
-
Face Localization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08co
-
Face Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cp
-
Face Recognition Evaluation and Pilots.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cq
-
Face Recognition, Three Dimentional.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cr
-
Facial Gesture Determination.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cs
-
Fairness in Online Games.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ct
-
Finding Parameters for Multimedia Content Adaptation Engines.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cu
-
Finding Parameters for Multimedia Content Adaptation Utilizing Optimization Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cv
-
Frame Dropping.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cw
-
Fuzzy Techniques for Context Representation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cx
-
Game Accessibility.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cy
-
Game Event Synchronization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08cz
-
Application of Computational Intelligence in Content Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08d
-
Gaze Tracking Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08da
-
Gaze Tracking Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08db
-
gBSD-based Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dc
-
Geographic Video Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dd
-
GIF Format.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08de
-
H.263 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08df
-
Halftoning.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dg
-
Halftoning Based Visual Secret Sharing (Vss).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dh
-
Haptic Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08di
-
Haptic Feedback in User Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dj
-
Haptics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dk
-
Harmonic Broadcasting Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dl
-
Hierarchical VoD Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dm
-
Hierarchical VoD System.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dn
-
High Quality Video Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08do
-
High-Level Concept Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dp
-
Huffman Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dq
-
Human Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dr
-
Hybrid P2P VoD Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ds
-
Hybrid Transmission Approaches for Video-on-Demand System.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dt
-
Identification of Objects and Retrieval of their Pose.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08du
-
Image and Video Capture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dv
-
Image Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dw
-
Image Device Movements.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dx
-
Image Fidelity Measurement.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dy
-
Image Fidelity Optimization using SSIM.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08dz
-
Applications of Face Recognition and Novel Trends.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08e
-
Image Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ea
-
Image Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08eb
-
Image Watermarking using Visual Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ec
-
Immersive Telepresence.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ed
-
Immersive Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ee
-
In Home, in Car, in Flight Entertainment.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ef
-
Industrial Virtual Trainer.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08eg
-
Infrared Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08eh
-
Inpainting in Virtual Restoration of Artworks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ei
-
Integral Images for Fast Covariance Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ej
-
Integrated QoS Architecture of LOMSS.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ek
-
Integration of Collaborative Computing With Modeling and Simulation Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08el
-
Intel¬ģ XScale¬ģ Micro-Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08em
-
Interactive Story Telling.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08en
-
Interactivity in Multimedia Documents and Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08eo
-
Interleaved Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ep
-
Interoperable Description Formats Facilitating the Adaptation of Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08eq
-
ISO Standard Enabling Device and Coding Format.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08er
-
ISO/IEC 21000.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08es
-
ISO/IEC 21000-7: 2007.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08et
-
JFIF (JPEG File Interchange Format).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08eu
-
Joint Source-Channel Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ev
-
JPEG.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ew
-
JPEG-LS.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ex
-
Key Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ey
-
Key Technologies of LOMSS.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ez
-
Architecture of Commercial News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08f
-
Knowledge Discovery in Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fa
-
Knowledge-Assisted Image and Video Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fb
-
Large Scale Network Virtual Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fc
-
Layered Access Control for Mpeg-4 Fine Granularity Scalable Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fd
-
LCD Display Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fe
-
Legacy and Current Practice - The Reality of Contemporary Collaborative Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ff
-
Long Duration Continuous Media Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fg
-
Massively Multiuser Online Game.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fh
-
Median Cut Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fi
-
Medical Image Segmentation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fj
-
Mesh, Three Dimentional.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fk
-
Message Digest (MD5) Algorithm and Secure Hash Algorithm (SHA).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fl
-
Metadata Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fm
-
Metadata Model.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fn
-
Metadata Production.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fo
-
Metadata Semantics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fp
-
Metadata Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fq
-
Metadata Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fr
-
MIME Types.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fs
-
Mixed Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ft
-
Motion Blurring.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fu
-
Motion Estimation with Half-Pixel Accuracy.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fv
-
Motion Picture Inpainting on Aged Films.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fw
-
MPEG-1 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fx
-
MPEG-2 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fy
-
MPEG-4 Advanced Video Compression (MPEG-4 AVC)/H.264.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08fz
-
Architecture of Object-based Multimedia Storage Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08g
-
MPEG-4 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ga
-
MPEG-7 Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gb
-
MPEG-7 Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gc
-
MPEG-7 User Interaction Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gd
-
Multicast Broadcast Mode Network.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ge
-
Multicast True VoD Service.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gf
-
Multichannel Data Ordering Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gg
-
Multimedia Adaptation Decision-Taking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gh
-
Multimedia Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gi
-
Multimedia Content Adaptation in MPEG-21.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gj
-
Multimedia Content Description and Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gk
-
Multimedia Content Modeling in COSMOS-7.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gl
-
Multimedia Content Modeling Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gm
-
Mutimedia Data Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gn
-
Multimedia Design.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08go
-
Multimedia File Stripping.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gp
-
Multimedia Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gq
-
Multimedia Information System Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gr
-
Multimedia Metadata Profiles.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gs
-
Multimedia Metadata Standard.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gt
-
Multimedia News Systems Infrastructure.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gu
-
Multimedia Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gv
-
Multimedia Production.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gw
-
Multimedia Project Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gx
-
Multimedia Proxy Caching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gy
-
Multimedia Semantics Representation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08gz
-
Area of Interest Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08h
-
Multimedia Services on 3G Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ha
-
Multimedia Workflow Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hb
-
Multimodal Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hc
-
Multi-person Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hd
-
Multi-person Tracking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08he
-
Multi-Resolution Image Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hf
-
Multi-View Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hg
-
Navigation of Video Data.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hh
-
Network and Terminal Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hi
-
Networking Protocols for Audio Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hj
-
Neural Networks in Multimedia Content Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hk
-
Object-Based Stereoscopic Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hl
-
Object Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hm
-
Occlusions.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hn
-
Online Multimedia and Television.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ho
-
Open Systems for Online Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hp
-
Optimized Palette Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hq
-
Overlapped Block Motion Compensation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hr
-
Part 7 of the MPEG-21 Multimedia Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hs
-
Partial Video Bit Streams.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ht
-
Peer-to-Peer Multicast Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hu
-
Peer-to-Peer Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hv
-
Peer-to-Peer Systems and Digital Rights Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hw
-
Peer-to-Peer VoD Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hx
-
Perceptural Image Optimization using SSIM.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hy
-
Person Information Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08hz
-
Artificial Intelligence (AI)-based Techniques for Finding a Sequence of Adaptation Operations.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08i
-
Person Localization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ia
-
Photo Defect Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ib
-
Placement of Continuous Media in Ad-Hoc Networks of Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ic
-
Portable Network Graphics (Png).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08id
-
Portals.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ie
-
Power-Rate Distortion Analysis for Wireless Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08if
-
Practical Video Processing Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ig
-
Presentation Recording.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ih
-
Privacy Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ii
-
Private-Key Cryptosystem.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ij
-
Profiling MPEG-7.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ik
-
Progressive Forest Split.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08il
-
Proxy-Caching for Video Streaming Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08im
-
Pseudo-Color Image Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08in
-
Public Key Versus Secret Key Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08io
-
QOS Assessment of Video Over IP.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ip
-
Quality of Service for Wireless Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08iq
-
Quantization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ir
-
Range Image Fidelity Measurement.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08is
-
Real Time Transport Protocol.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08it
-
Recording Teleconferencing Sessions.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08iu
-
Reindexing Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08iv
-
Rhetorical Documentaries.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08iw
-
Role of Semantics in Multimedia Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ix
-
RSA Public-Key Encryption Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08iy
-
R-SSIM.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08iz
-
Audio and Video Information in Multimedia News Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08j
-
Scalar Edge Detectors.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ja
-
Search for Adaptation Decisions.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jb
-
Searching for a Sequence of Adaptation Operations Utilizing AI-based Planning Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jc
-
Secure JPEG2000 (JPSEC).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jd
-
Security Issues in Wireless Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08je
-
Segmentation and Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jf
-
Segmentation Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jg
-
Selective Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jh
-
Semantic Agents on the Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ji
-
Semantic Class-Based Image Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jj
-
Semantic Concept Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jk
-
Semantic Consumer Image Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jl
-
Semantic Medical Image Indexing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jm
-
Semantic Sports Video Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jn
-
Semantic Visual Query and Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jo
-
Semantic Web Services.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jp
-
Semantics Standards and Recommendations.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jq
-
Semantics Web Tools and Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jr
-
Semiotics.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08js
-
Sensor's Exposure Characterization.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jt
-
Sharable Content Object Reference Model (SCORM).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ju
-
SIMD (Single Instruction Multiple Data Processing).
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jv
-
Spectral Model.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jw
-
Sports Video Content Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jx
-
Steganography.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jy
-
Stereoscopic and Multi-View Video Coding Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08jz
-
Audio Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08k
-
Streaming Multimedia and its Applications in Education.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ka
-
Striping Strategies for Large Size Multimedia Files in LOMSS.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kb
-
Tele-Operation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kc
-
Three Dimensional Copyright Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kd
-
Three Dimensional Face Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ke
-
Three Dimensional Face Identification-authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kf
-
Three Dimensional Face Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kg
-
Three Dimensional Motion Picture.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kh
-
Three Dimensional Object Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ki
-
Three Dimensional Search Engine.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kj
-
Three Dimensional TV.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kk
-
Three Dimensional Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kl
-
Three Dimensional Videos.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08km
-
Three GPP.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kn
-
Threshold Schemes with Minimum Pixel Expansion.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ko
-
Trends in Multimedia E-Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kp
-
Two-level Meta Data Management.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kq
-
Universal Multimedia Access.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kr
-
Usage Environment Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ks
-
Usage Histories.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kt
-
User Input.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ku
-
User Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kv
-
User Modeling in MPEG-7.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kw
-
User Preferences.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kx
-
Valence-Driven Conquest.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ky
-
VC-1 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08kz
-
Augmented Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08l
-
Vector Edge Detectors.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08la
-
Video Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lb
-
Video Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lc
-
Video Coding for Video Streaming Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ld
-
Video Conferencing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08le
-
Video Copy Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lf
-
Video Fidelity Measurement.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lg
-
Video Inpainting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lh
-
Video Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08li
-
Video Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lj
-
Video Transcoding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lk
-
Video Transmission Strategies for Large-Scale Video-on-Demand System.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ll
-
Video Watermarking.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lm
-
Video-Based Face Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ln
-
Virtual Humans.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lo
-
Virtual Presence.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lp
-
Virtual Reality.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lq
-
Vision-Based Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lr
-
Visual Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ls
-
Watermarking, Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lt
-
Watermarking, Video.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lu
-
Wireless Video Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lv
-
WMV-9 Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lw
-
Workflow Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lx
-
XML Metadata-Based Adaptation of Multimedia Content.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08ly
-
XML-Based Multimedia Metadata.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08lz
-
Authoring and Specification.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08m
-
Automated Lecture Capturing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08n
-
Automatic Video Editing.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08o
-
Availability and Scalability of LOMSS.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08p
-
Behavior Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08q
-
Behavioral Facilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08r
-
Block Matching.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08s
-
Broadcast Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08t
-
CAD Objects; Similarity.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08u
-
Camera Motions.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08v
-
Camera Shake Compensation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08w
-
Cascading Style Sheets.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08x
-
Categorical Documentaries.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08y
-
Categories of Video Service in Video Video-on-Demand System.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/X08z
-
Multimedia Technologies in Broadcasting.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Yagi08
-
Multimedia Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Yu06
-
Multimedia Encryption.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Yu08
-
End-to-End Security for Multimedia Adaptation.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZengD08
-
Real Time Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZengL06
-
Context-Based Arithmetic Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZgaljicI08
-
Video Delivery Over Wireless Multi-Hop Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Zhang06
-
Video Delivery over Wireless Multi-Hop Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Zhang08
-
Visual Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZhangI08
-
Multimedia Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZhaoE08
-
Multimedia Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZhaoS06
-
Networked Collaboration Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/Zimmermann08
-
Peer-to-Peer Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZimmermannL06
-
Peer-to-Peer Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZimmermannL08
-
Video Over IP.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZivianiA06
-
Video over IP.
https://dblp.l3s.de/d2r/resource/publications/reference/mm/ZivianiA08
-
Encyclopedia of Software Engineering
https://dblp.l3s.de/d2r/resource/publications/reference/se/2010
-
Software Measurement Body of Knowledge.
https://dblp.l3s.de/d2r/resource/publications/reference/se/AbranAB10
-
Communication Software: Design and Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/AlvarezMPPS10
-
Agile Software Development.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Ambler10
-
Architecture: Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/se/BassNO10
-
Requirements: Understanding.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Bernstein10
-
Program Representation.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Berzal10
-
User-Centered Design.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Beyer10
-
Development: Information Retrieval Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/se/BinkleyL10
-
Maintenance and Evolution: Information Retrieval Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/se/BinkleyL10a
-
Triptych Process Model.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Bjorner10
-
Automated Software Testing (AST).
https://dblp.l3s.de/d2r/resource/publications/reference/se/BorchDG10
-
Formal Requirements Specification.
https://dblp.l3s.de/d2r/resource/publications/reference/se/BowenHV10
-
Logic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Carro10
-
Virtual Teams.
https://dblp.l3s.de/d2r/resource/publications/reference/se/CaseyR10
-
Defect Prevention Processes (DPP).
https://dblp.l3s.de/d2r/resource/publications/reference/se/Chang10
-
Agile Software Development: Teams.
https://dblp.l3s.de/d2r/resource/publications/reference/se/CuellarA10
-
Maintenance: Risk.
https://dblp.l3s.de/d2r/resource/publications/reference/se/DiasP10
-
Requirements Engineering: Principles and Practice.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Dick10
-
Project Management: Success Factors.
https://dblp.l3s.de/d2r/resource/publications/reference/se/DonaldsonS10
-
Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Duggan10
-
Project Life Cycle: Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Duggan10a
-
Product Portfolios: Management.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Dumke10
-
Requirements Engineering: Technique Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/se/EberleinJ10
-
Process: Assessment and Improvement.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Ebert10
-
Projects and Processes: Measurement.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Ebert10a
-
Requirements Engineering: Management.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Ebert10b
-
Test-Driven Development.
https://dblp.l3s.de/d2r/resource/publications/reference/se/ErdogmusMJ10
-
Project Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Fairley10
-
Project Management: Planning and Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Fairley10a
-
Maintenance: Process.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Fernandez-Ramil10
-
Hard Real-Time Systems: Construction.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Fowler10
-
Outsourcing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Gold10
-
Architecture and Design Recovery.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Golm10
-
Software Engineering: History.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Grier10
-
Design: Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Gueheneuc10
-
Design: Proof-Based Certification.
https://dblp.l3s.de/d2r/resource/publications/reference/se/HackenS10
-
Subdomain (Partition) Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Hamlet10
-
Project Control: Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Hansen10
-
Metamodeling.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Hay10
-
Mutation Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/HieronsMN10
-
Formal Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/se/HincheyBV10
-
Human-Centered Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/HoffmanBS10
-
Architecture: Design.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Hofmeister10
-
Policy-Based Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/HwangMXH10
-
Fault Injection.
https://dblp.l3s.de/d2r/resource/publications/reference/se/IyerNGK10
-
Unified Modeling Language (UML): Visual Development.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Jepsen10
-
Management: Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Jones10
-
Agent-Oriented Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/se/JordanHC10
-
Software Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Jorgensen10
-
Smart Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Kallinikos10
-
Use Case Specifications: State-Based Elicitation.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Kanyaru10
-
Regression Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Kapfhammer10
-
Business Domain Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Kilov10
-
Maintenance: Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Kontogiannis10
-
Maintenance.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Koskinen10
-
Software Failure.
https://dblp.l3s.de/d2r/resource/publications/reference/se/KrishnamurthyS10
-
Audits and Management Reviews.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Laitenberger10
-
Bioinformatics: Processes and Workflows.
https://dblp.l3s.de/d2r/resource/publications/reference/se/LamprechtMS10
-
Requirements Engineer.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Laplante10
-
Test Case Generation: Specification-Based.
https://dblp.l3s.de/d2r/resource/publications/reference/se/LauYP10
-
Requirements: Tracing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/LeeGP10
-
Human Factors Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Lewis10
-
Software Testing: Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/se/LiMW10
-
Code Quality.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Louridas10
-
Medical Device Industry: Software Process Improvement.
https://dblp.l3s.de/d2r/resource/publications/reference/se/McCafferyBCD10
-
IEEE Computer Society.
https://dblp.l3s.de/d2r/resource/publications/reference/se/McCall10
-
Risk Management.
https://dblp.l3s.de/d2r/resource/publications/reference/se/McManus10
-
Unit Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Miller10
-
Acquisitions Management.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Morrison10
-
Reverse Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/se/MullerK10
-
Fault-Based Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Murrill10
-
Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Oz10
-
Programming Phase: Formal Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/se/PaigeWBC10
-
Prototyping Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Parry10
-
Functional Programming in ML.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Paulson10
-
Semantic Web.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Putnam10
-
Program Comprehension.
https://dblp.l3s.de/d2r/resource/publications/reference/se/RajlichW10
-
Ethnography.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Ronkko10
-
Unified Modeling Language (UML).
https://dblp.l3s.de/d2r/resource/publications/reference/se/Rumbaugh10
-
Earned Value Management.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Rusk10
-
Architecture: Description Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Ryoo10
-
Viewpoints.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SabetzadehFG10
-
Object-Oriented Analysis and Design.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Sangwan10
-
Open Source Software.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Scacchi10
-
Model-Based Testing: Trends.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SchieferdeckerGW10
-
Model-Based Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SchieferdeckerH10
-
Model-Based Testing: Approaches and Notations.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SchieferdeckerRV10
-
Reliability Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Schneidewind10
-
Configuration Auditing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Shafer10
-
Process.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Shafer10a
-
User Stories.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Shafer10b
-
Requirements Interaction Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/se/ShehataE10
-
Operational Profile Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SmidtsMRL10
-
Round-Trip Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SteffenMW10
-
Autonomic Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SterrittB10
-
Self-Managing Software.
https://dblp.l3s.de/d2r/resource/publications/reference/se/SterrittHV10
-
Security Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/se/StevenC10
-
Economics.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Tockey10
-
Process: Definition and Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Tsui10
-
Use Cases.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Vassev10
-
Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Vercellone-SmithS10
-
Software Configuration Management (SCM) Process.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Westfechtel10
-
Grid Environments: Service Level Agreements (SLAs).
https://dblp.l3s.de/d2r/resource/publications/reference/se/WiederY10
-
Pair Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/se/Williams10
-
Software Fault Localization.
https://dblp.l3s.de/d2r/resource/publications/reference/se/WongD10
-
Reconfigurable Computing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/se/YlvisakerH10
-
Software Evolution.
https://dblp.l3s.de/d2r/resource/publications/reference/se/ZaidmanPD10
-
Handbook of Social Network Technologies and Applications
https://dblp.l3s.de/d2r/resource/publications/reference/social/2010
-
Structure and Dynamics of Social Networks Revealed by Data Analysis of Actual Communication Services.
https://dblp.l3s.de/d2r/resource/publications/reference/social/AidaK10
-
Online Advertising in Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/BagherjeiranBPC10
-
Managing Trust in Online Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/BhuiyanJX10
-
Visualization of Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/ChenY10
-
Analyzing the Dynamics of Communication in Online Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/ChoudhurySJS10
-
Security and Privacy in Online Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/CutilloMS10
-
Decentralized Online Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/DattaBVSR10
-
Security Requirements for Social Networks in Web 2.0.
https://dblp.l3s.de/d2r/resource/publications/reference/social/FernandezML10
-
Collaborative Filtering Based on Choosing a Different Number of Neighbors for Each User.
https://dblp.l3s.de/d2r/resource/publications/reference/social/HernandoBS10
-
Investigation of Key-Player Problem in Terrorist Networks Using Bayes Conditional Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/social/Hussain10
-
Discovering Mobile Social Networks by Semantic Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/social/JungCP10
-
Churn in Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/KarnstedtHCBHS10
-
Concept Discovery in Youtube.com Using Factorization Method.
https://dblp.l3s.de/d2r/resource/publications/reference/social/LeungL10
-
Multi-Relational Characterization of Dynamic Social Network Communities.
https://dblp.l3s.de/d2r/resource/publications/reference/social/LinSK10
-
Online Identities and Social Networking.
https://dblp.l3s.de/d2r/resource/publications/reference/social/MaheswaranAOL10
-
Qualitative Analysis of Commercial Social Network Profiles.
https://dblp.l3s.de/d2r/resource/publications/reference/social/MelendezWAR10
-
Modeling Temporal Variation in Social Network: An Evolutionary Web Graph Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/social/MitraB10
-
Detecting Communities in Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/Murata10
-
Optimizing Targeting of Intrusion Detection Systems in Social Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/social/PuzisTE10
-
Novel Visualizations and Interactions for Social Networks Exploration.
https://dblp.l3s.de/d2r/resource/publications/reference/social/RicheF10
-
Accessibility Testing of Social Websites.
https://dblp.l3s.de/d2r/resource/publications/reference/social/Sik-Lanyi10
-
Understanding and Predicting Human Behavior for Social Communities.
https://dblp.l3s.de/d2r/resource/publications/reference/social/SimoesM10
-
Perspectives on Social Network Analysis for Observational Scientific Data.
https://dblp.l3s.de/d2r/resource/publications/reference/social/SinghBM10
-
Analysis of Social Networks by Tensor Decomposition.
https://dblp.l3s.de/d2r/resource/publications/reference/social/SizovSF10
-
Analysis of Social Networks Extracted from Log Files.
https://dblp.l3s.de/d2r/resource/publications/reference/social/SlaninovaMDOS10
-
Applications of Social Network Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/social/Thilagam10
-
Associating Human-Centered Concepts with Social Networks Using Fuzzy Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/social/Yager10
-
Mining Regional Representative Photos from Consumer-Generated Geotagged Photos.
https://dblp.l3s.de/d2r/resource/publications/reference/social/YanaiQ10
-
Discovering Communities from Social Networks: Methodologies and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/social/YangLL10
-
Social Network Analysis: History, Concepts, and Research.
https://dblp.l3s.de/d2r/resource/publications/reference/social/Zhang10
-
Social Bookmarking on a Company's Intranet: A Study of Technology Adoption and Diffusion.
https://dblp.l3s.de/d2r/resource/publications/reference/social/ZivW10
-
Handbook of Spatial Logics
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/2007
-
What is Spatial Logic?
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/AielloPB07
-
Logic of Space-Time and Relativity Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/AndrekaMN07
-
Logical Theories for Fragments of Elementary Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/BalbianiGKV07
-
Axioms, Algebras and Topology.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/BennettD07
-
Modal Logics of Space.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/BenthemB07
-
Mathematical Morphology.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/BlochHR07
-
Real Algebraic Geometry and Constraint Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/GeertsK07
-
Spatial Logic + Temporal Logic = ?.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/KontchakovKWZ07
-
Dynamic Topological Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/KremerM07
-
Topology and Epistemic Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/ParikhMS07
-
First-Order Mereotopology.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/Pratt-Hartmann07
-
Qualitative Spatial Reasoning Using Constraint Calculi.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/RenzN07
-
Discrete Spatial Models.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/SmythW07
-
Spatial Reasoning and Ontology: Parts, Wholes, and Locations.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/Varzi07
-
Locales and Toposes as Spaces.
https://dblp.l3s.de/d2r/resource/publications/reference/spatial/Vickers07
-
DSP Systems Using Three-Dimensional Integration Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/0002PL13
-
Handbook of Signal Processing Systems
https://dblp.l3s.de/d2r/resource/publications/reference/sps/2013
-
Methods and Tools for Mapping Process Networks onto Multi-Processor Systems-On-Chip.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/BacivarovHHT13
-
Architectures for Stereo Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/BanzBP13
-
Dynamic Dataflow Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/BhattacharyyaDT13
-
Signal Processing for Stereoscopic and Multi-View 3D Displays.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/BoevBG13
-
DSP Instruction Set Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/BrandnerHK13
-
Multicore Systems on Chip.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/CarroR13
-
Video Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/ChenC13
-
Inertial Sensors and Their Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/CollinDKL13
-
Finding It Now: Construction and Configuration of Networked Classifiers in Real-Time Stream Mining Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/DucasseS13
-
Integrated Modeling Using Finite State Machines and Dataflow Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/FalkHZT13
-
C Compilers and Code Optimization for DSPs.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Franke13
-
Kahn Process Networks and a Reactive Extension.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/GeilenB13
-
High-Energy Physics.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/GregersonSC13
-
Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/GustafssonW13
-
Decidable Dataflow Models for Signal Processing: Synchronous Dataflow and Its Extensions.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/HaO13
-
Architectures for Particle Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/HongO13
-
Systolic Arrays.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/HuK13
-
Signal Processing for Wireless Transceivers.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/JunttiRV13
-
Multidimensional Dataflow Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/KeinertD13
-
Compiling for VLIW DSPs.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Kessler13
-
Signal Processing for Cryptography and Security Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/KnezevicBMFGLMV13
-
Digital Signal Processing in Home Entertainment.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Konstantinides13
-
Software Compilation Techniques for MPSoCs.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/LeupersSC13
-
Signal Processing for Control.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Levine13
-
Application Specific Instruction Set DSP Processors.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/LiuW13
-
MPEG Reconfigurable Video Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/MattavelliRJ13
-
FPGA-Based DSP.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/McAllister13
-
Embedded C for Digital Signal Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Olivier13
-
Signal Flow Graphs and Data Flow Graphs.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/ParhiC13
-
Signal Processing for High-Speed Links.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/ShanbhagSB13
-
Medical Image Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/ShekharWP13
-
Low-Power Wireless Sensor Network Platforms.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/SuhonenKKHH13
-
Application-Specific Accelerators for Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/SunABC13
-
Optimization of Number Representations.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Sung13
-
Coarse-Grained Reconfigurable Array Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/SutterRL13
-
General-Purpose DSP Processors.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Takala13
-
Mixed Signal Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Vainio13
-
Signal Processing Tools for Radio Astronomy.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/VeenW13
-
Polyhedral Process Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Verdoolaege13
-
Distributed Smart Cameras and Distributed Computer Vision.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/WolfS13
-
Mapping Decidable Signal Processing Graphs into FPGA Implementations.
https://dblp.l3s.de/d2r/resource/publications/reference/sps/Woods13
-
International Encyclopedia of Statistical Science
https://dblp.l3s.de/d2r/resource/publications/reference/stat/2011
-
Lévy Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abdel-Hameed11
-
Learning Statistics in a Foreign Language.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abdelbasit11
-
Nonparametric Estimation Based on Incomplete Observations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abdushukurov11
-
Approximations for Densities of Sufficient Estimators.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abril11
-
Approximations to Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abril11a
-
Asymptotic, Higher Order.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abril11b
-
Saddlepoint Approximations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abril11c
-
Structural Time Series Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Abril11d
-
Preprocessing in Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Acuna11
-
Categorical Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/AgrestiK11
-
Optimal Shrinkage Preliminary Test Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/AhmedCF11
-
Optimal Shrinkage Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/AhmedQN11
-
Absolute Penalty Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/AhmedRH11
-
Record Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/AhsanullahN11
-
Akaike's Information Criterion.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Akaike11
-
Nonparametric Models for ANOVA and ANCOVA Designs.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Akritas11
-
Analysis of Multivariate Agricultural Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ali11
-
Chebyshev's Inequality.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Alsmeyer11
-
Extreme Value Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/AlvesN11
-
Models for Z + -Valued Time Series Based on Thinning.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Aly11
-
Hazard Ratio Estimator.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Andersen11
-
Hazard Regression Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Andersen11a
-
Anderson-Darling Tests of Goodness-of-Fit.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Anderson11
-
Census.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Anderson11a
-
Probability on Compact Lie Groups.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Applebaum11
-
Bartlett's Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ArshamL11
-
Optimum Experimental Design.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Atkinson11
-
Foundations of Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/AugustinC11
-
Statistical View of Information Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Awad11
-
Non-probability Sampling Survey Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ayhan11
-
Skew-Normal Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Azzalini11
-
Skew-Symmetric Families of Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Azzalini11a
-
Discriminant Analysis: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/BabinW11
-
Multicollinearity.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bahovec11
-
Edgeworth Expansion.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bai11
-
Cross-Covariance Operators.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Baker11
-
Autocorrelation in Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Baltagi11
-
Permanents in Probability Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bapat11
-
Explaining Paradoxes in Nonparametric Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/BargagliottiS11
-
Factor Analysis and Latent Variable Modelling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bartholomew11
-
Local Asymptotic Mixed Normal Family.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Basawa11
-
Distance Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Basic11
-
Fisher-Tippett Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Basrak11
-
Variance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/BenerL11
-
Bootstrap Asymptotics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Beran11
-
Moment Generating Function.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/BeranG11
-
Business Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Berenson11
-
Bayesian Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bernardo11
-
Nonresponse in Surveys.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bethlehem11
-
Queueing Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bhat11
-
Continuity Correction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bhattacharya11
-
Random Walk.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bhattacharya11a
-
Total Survey Error.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Biemer11
-
Internet Survey Methodology: Recent Trends and Developments.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Biffignandi11
-
Life Expectancy.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Biljan-August11
-
Loss Function.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bischoff11
-
Factorial Experiments.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Blagoeva11
-
Correspondence Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Blasius11
-
Event History Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Blossfeld11
-
Box-Jenkins Time Series Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Boland11
-
Pareto Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bondesson11
-
Multidimensional Scaling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Borg11
-
Limit Theorems of Probability Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Borovkov11
-
Smoothing Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bowman11
-
Gamma Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/BowmanS11
-
Omnibus Test for Departures from Normality.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/BowmanS11a
-
Graphical Analysis of Variance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Box11
-
Sensometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Brockhoff11
-
Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Brockwell11
-
Environmental Monitoring, Statistics Role in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Brown11
-
Heteroscedasticity.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bucevska11
-
Stem-and-Leaf Plot.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Bucevska11a
-
Strong Approximations in Probability and Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Burke11
-
Psychological Testing Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Busko11
-
F Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cabana11
-
Nonparametric Density Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cao11
-
Axioms of Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Capasso11
-
Brownian Motion and Diffusions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Capasso11a
-
Akaike's Information Criterion: Background, Derivation, Properties, and Refinements.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/CavanaughN11
-
Borel-Cantelli Lemma and Its Generalizations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ChandraK11
-
Residuals.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chatterjee11
-
Bootstrap Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ChernickGCB11
-
Chernoff Bound.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chernoff11
-
Chernoff Faces.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chernoff11a
-
Chernoff-Savage Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chernoff11b
-
Aggregation Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chhetry11
-
Markov Chain Monte Carlo.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ChibHC11
-
Gauss-Markov Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chipman11
-
Recursive Partitioning.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chipman11a
-
Biopharmaceutical Research, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Chuang-Stein11
-
Five-Number Summaries.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cizmesija11
-
Sport, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ClarkeN11
-
Analysis of Covariance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cochran11
-
Role of Statistics in Advancing Quantitative Education.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cochran11a
-
Rao-Blackwell Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cohen11
-
Sample Size Determination.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cohen11a
-
Stratified Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cohen11b
-
Behrens-Fisher Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/CohenK11
-
Large Deviations and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Comets11
-
Rank Transformations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Conover11
-
Cook's Distance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cook11
-
Nonparametric Predictive Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Coolen11
-
Imprecise Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/CoolenTA11
-
Imprecise Reliability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/CoolenU11
-
Bartlett and Bartlett-Type Corrections.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cordeiro11
-
Bias Correction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cordeiro11a
-
Weighted Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Costa11
-
Design of Experiments: A Pattern of Progress.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cox11
-
Survival Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cox11a
-
Regression Models with Symmetrical Errors.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Cysneiros11
-
Box-Cox Transformation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Daimon11
-
Canonical Analysis and Measures of Association.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/DauxoisN11
-
Order Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/David11
-
Nonlinear Mixed Effects Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Davidian11
-
Statistics of Extremes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Davison11
-
Almost Sure Convergence of Random Variables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Dehling11
-
Dickey-Fuller Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Dickey11
-
Spatial Point Pattern.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Diggle11
-
Pattern Recognition, Aspects of.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/DomijanB11
-
Misuse and Misunderstandings of Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Dorvlo11
-
Insurance, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Drekic11
-
Representative Samples.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Dumicic11
-
Complier-Average Causal Effect (CACE) Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Dunn11
-
Method Comparison Studies.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Dunn11a
-
Psychiatry, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Dunn11b
-
Design for Six Sigma.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Edgeman11
-
SIPOC and COPIS: Business Flow - Business Optimization Connection in a Six Sigma Context.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Edgeman11a
-
Randomization Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Edgington11
-
Degrees of Freedom in Statistical Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Eisenhauer11
-
Statistical Modeling of Financial Markets.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/El-Aroui11
-
Testing Variance Components in Mixed Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/El-Bassiouni11
-
Detecting Outliers in Time Series Using Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/El-Habil11
-
Quantitative Risk Management.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Embrechts11
-
Dummy Variables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Erjavec11
-
Tests for Homogeneity of Variance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Erjavec11a
-
Mixed Membership Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/EroshevaF11
-
Convergence of Random Variables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Esquerdo11
-
Medical Research, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Everitt11
-
Bayesian Semiparametric Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fahrmeir11
-
Uniform Experimental Design.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fang11
-
Least Absolute Residuals Procedure.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Farebrother11
-
Medical Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FarewellF11
-
Astrostatistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Feigelson11
-
Bayesian Approach of the Unit Root Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FellagA11
-
Lorenz Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fellman11
-
Sex Ratio at Birth.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fellman11a
-
Multicriteria Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ferligoj11
-
Functional Derivatives in Statistics: Asymptotics and Robustness.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fernholz11
-
Target Estimation: A New Approach to Parametric Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fernholz11a
-
Randomization.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ferraz11
-
Data Privacy and Confidentiality.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FienbergS11
-
Network Models in Probability and Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FienbergT11
-
Statistical Methods in Epidemiology.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FilardoAN11
-
Financial Return Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fischer11
-
Generalized Hyperbolic Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fischer11a
-
Hyperbolic Secant Distributions and Generalizations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fischer11b
-
Statistical Ecology.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fletcher11
-
Density Ratio Model.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fokianos11
-
Promoting, Fostering and Development of Statistics in Developing Countries.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FontonH11
-
Network Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Frank11
-
Probabilistic Network Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Frank11a
-
Bayesian Analysis or Evidence Based Statistics?
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fraser11
-
National Account Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Fraumeni11
-
Exponential and Holt-Winters Smoothing.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FriedG11
-
Median Filters and Extensions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FriedG11a
-
Markov Chains.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FrigessiH11
-
Detection of Turning Points in Business Cycles.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Frisen11
-
Surveillance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Frisen11a
-
Forensic DNA: Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/FungC11
-
Statistical Literacy, Reasoning, and Thinking.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Garfield11
-
Properties of Estimators.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Garthwaite11
-
Presentation of Statistical Testimony.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gastwirth11
-
Industrial Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GatherKM11
-
Estimation: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Geer11
-
Simpson's Paradox.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Geng11
-
Numerical Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gentle11
-
R Language.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GentlemanHC11
-
Bayesian P-Values.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GhoshD11
-
Posterior Consistency in Bayesian Nonparametrics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GhoshR11
-
Nonparametric Statistical Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GibbonsC11
-
Kaplan-Meier Estimator.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gijbels11
-
Monty Hall Problem : Solution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gill11
-
Empirical Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gine11
-
Cross Classified and Multiple Membership Multilevel Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Goldstein11
-
Acceptance Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gomes11
-
Statistical Quality Control.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gomes11a
-
Components of Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Granger11
-
Statistics and the Law.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gray11
-
Forecasting Principles.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GreenGA11
-
Risk Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenberg11
-
Bias Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenland11
-
Causation and Causal Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenland11a
-
Collapsibility.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenland11b
-
Confounding and Confounder Control.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenland11c
-
Effect Modification and Biological Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenland11d
-
Identifiability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenland11e
-
Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Greenland11f
-
Exchangeability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GreenlandD11
-
Causal Diagrams.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GreenlandP11
-
Kalman Filtering.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Grewal11
-
Student's t -Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Grigelionis11
-
Normal Scores.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Guenni11
-
Poisson Distribution and Its Application in Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Guenni11a
-
Data Quality (Poor Quality Data: The Fly in the Data Analytics Ointment).
https://dblp.l3s.de/d2r/resource/publications/reference/stat/GuessR11
-
Bayesian Reliability Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Guo11
-
Beta Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gupta11
-
Mean, Median, Mode: An Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Gupta11a
-
Comparability of Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hackl11
-
Expert Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hadi11
-
Ridge and Surrogate Ridge Regressions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hadi11a
-
Multivariate Data Analysis: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hair11
-
Regression Models with Increasing Numbers of Unknown Parameters.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hajiyev11
-
Clinical Trials, History of.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hamasaki11
-
Robust Regression Estimation in Generalized Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/HamzahN11
-
Statistics: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hand11
-
Fiducial Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/HannigIL11
-
Decision Theory: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hansson11
-
Information Theory and Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Haroutunian11
-
Equivalence Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hauschke11
-
Testing Exponentiality of Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/HaywoodK11
-
Methods of Moments Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hazelton11
-
First-Hitting-Time Based Threshold Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/HeL11
-
Principles Underlying Econometric Estimators for Identifying CausalEffects.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Heckman11
-
Statistical Inference for Quantum Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Helevo11
-
Philosophical Foundations of Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Helland11
-
Handling with Missing Observations in Simple Random Sampling and RankedSet Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/HerreraMF11
-
Hodges-Lehmann Estimators.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hershberger11
-
Structural Equation Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hershberger11a
-
Nonparametric Rank Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hettmansperger11
-
James-Stein Estimator.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Heumann11
-
Multiple Imputation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Heumann11a
-
Generalized Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hilbe11
-
Logistic Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hilbe11a
-
Modeling Count Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hilbe11b
-
Logistic Normal Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hinde11
-
Logistic Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hinde11a
-
Experimental Design: An Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hinkelmann11
-
Skewness.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hippel11
-
Demography.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hoem11
-
Life Table.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hoem11a
-
Statistical Significance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hoem11b
-
Maximum Entropy Method for Estimation of Missing Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hooda11
-
Simulation Based Bayes Procedures for Model Structures with Non-Elliptical Posteriors.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/HoogerheideD11
-
Questionnaire.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Horvat11
-
Chi-Square Test: Analysis of Contingency Tables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Howell11
-
Statistical Natural Language Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hristea11
-
Pharmaceutical Statistics: Bioequivalence.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hsuan11
-
Influential Observations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Huang11
-
Multiple Statistical Decision Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Huang11a
-
P-Values.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hubbard11
-
Robust Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Huber11
-
Multivariate Techniques: Robustness.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/HubertR11
-
Discriminant Analysis: Issues and Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Huberty11
-
Optimal Designs for Estimating Slopes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Huda11
-
Characteristic Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Huzak11
-
Chi-Square Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Huzak11a
-
Seasonal Integration and Cointegration in Economic Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hylleberg11
-
Business Forecasting Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hyndman11
-
Forecasting: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hyndman11a
-
Moving Averages.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Hyndman11b
-
Measurement of Economic Progress.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/IbragimovI11
-
Summarizing Data with Boxplots.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Iglewicz11
-
Analysis of Variance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Iversen11
-
Sociology, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Iversen11a
-
Multivariate Reduced-Rank Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Izenman11
-
Cramér-Rao Inequality.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/JansenC11
-
Nonparametric Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/JansenC11a
-
Frailty Model.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/JanssenD11
-
Jarque-Bera Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jarque11
-
Multivariate Statistical Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jensen11
-
Careers in Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/JeskeM11
-
Uniform Distribution in Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jevremovic11
-
Hypergeometric Distribution and Its Application in Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Joarder11
-
Multivariate Statistical Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Johnson11
-
Statistical Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Johnson11a
-
Intraclass Correlation Coefficient.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/JohnsonK11
-
Statistical Aspects of Hurricane Modeling and Forecasting.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/JohnsonW11
-
Principal Component Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jolliffe11
-
Statistical Analysis of Drug Release Data Within the Pharmaceutical Sciences.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jones11
-
Dispersion Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jorgensen11
-
Kullback-Leibler Divergence.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Joyce11
-
St. Petersburg Paradox.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Joyce11a
-
Adaptive Linear Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jureckova11
-
Nonparametric Regression Based on Ranks.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Jureckova11a
-
Bayes' Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kadane11
-
Multivariate Normal Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/KalpicH11
-
Student's t-Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/KalpicHL11
-
Model-Based Geostatistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/KaziankaP11
-
Geometric and Negative Binomial Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kemp11
-
Univariate Discrete Distributions: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kemp11a
-
Econometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kennedy11
-
Data, Mining Time Series Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Keogh11
-
Rise of Statistics in the Twenty First Century.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kettenring11
-
Optimality and Robustness in Statistical Forecasting.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kharin11
-
Divisible Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Khmaladze11
-
Sequential Ranks.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Khmaladze11a
-
Designs for Generalized Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Khuri11
-
Response Surface Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Khuri11a
-
Martingales.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kiesel11
-
Simple Random Sample.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kirk11
-
Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kitsos11
-
Nonlinear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kitsos11a
-
Numerical Methods for Stochastic Differential Equations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kloeden11
-
Stochastic Differential Equations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kloeden11a
-
Econometrics: A Failed Science?
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kmenta11
-
Asymptotic Normality.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kolassa11
-
Stochastic Models of Transport Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kolesnik11
-
Harmonic Mean.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Komic11
-
Conditional Expectation and Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Konstantopoulos11
-
Radon-Nikod√Ĺm Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/KonstantopoulosZS11
-
Khmaladze Transformation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/KoulS11
-
Durbin-Watson Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kramer11
-
Statistical Fallacies.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kramer11a
-
Statistical Distributions: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Krishnamoorthy11
-
Stochastic Processes: Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Krishnan11
-
Economic Growth and Well-Being: Statistical Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kudabaev11
-
Measurement Error Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kukush11
-
Meta-Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/KulinskayaMS11
-
Significance Testing: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/KulinskayaMS11a
-
Copulas: Distribution Functions and Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kumar11
-
Statistical Signal Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kundu11
-
Seasonality.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kunst11
-
Statistics and Climate Change.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kurji11
-
Association Measures for Nominal Categorical Variables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kvalseth11
-
Diversity.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kvalseth11a
-
Entropy.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kvalseth11b
-
Kappa Coefficient of Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kvalseth11c
-
Variation for Categorical Variables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Kvalseth11d
-
Non-uniform Random Variate Generations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LEcuyer11
-
Uniform Random Number Generators.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LEcuyer11a
-
Stochastic Modeling Analysis and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LaddeL11
-
Generalized Weibull Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lai11
-
Ergodic Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lalley11
-
Online Statistics Education.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lane11
-
Heavy-Tailed Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LePage11
-
Linear Regression Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LePage11a
-
Poisson Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Leadbetter11
-
Significance Tests: A Critique.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lecoutre11
-
Bayesian Nonparametric Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lee11
-
Gaussian Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lee11a
-
Relationships Among Univariate Statistical Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Leemis11
-
Statistical Software: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Leeuw11
-
Statistical Evidence.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LeleT11
-
Statistical Inference in Ecology.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LeleT11a
-
Telephone Sampling: Frames and Selection Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lepkowski11
-
Eigenvalue, Eigenvector and Eigenspace.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Leung11
-
Six Sigma.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Levine11
-
Outliers.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lewis11
-
Imputation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Little11
-
Regression Diagnostics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/LiuW11
-
Random Coefficient Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Longford11
-
Kolmogorov-Smirnov Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lopes11
-
Advantages of Bayesian Structuring: Estimating Ranks and Histograms.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Louis11
-
Accelerated Lifetime Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Louzada-Neto11
-
Control Charts.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Luceno11
-
Relationship Between Statistical and Engineering Process Control.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Luceno11a
-
Vector Autoregressive Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lutkepohl11
-
Sample Survey Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Lynn11
-
Standard Deviation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/M11
-
Step-Stress Accelerated Life Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Madi11
-
Jackknife.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Maesono11
-
Partial Least Squares Regression Versus Other Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mahdi11
-
Horvitz-Thompson Estimator.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Maiti11
-
Statistics Targeted Clinical Trials Stratified and Personalized Medicines.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Maitournam11
-
Population Projections.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Malacic11
-
Cp Statistic.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mallows11
-
Optimal Regression Design.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mandal11
-
Nonresponse in Web Surveys.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ManfredaBV11
-
Two-Stage Least Squares.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mariano11
-
Portfolio Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Markowitz11
-
Robust Statistical Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Maronna11
-
Distance Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/MarquesBBRT11
-
Geostatistics and Kriging Predictors.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mase11
-
Hotelling's T 2 Statistic.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/MasonY11
-
Multivariate Statistical Process Control.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/MasonY11a
-
Intervention Analysis in Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Matarise11
-
Random Permutations and Partition Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/McCullagh11
-
Adaptive Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Melhaoui11
-
Modeling Survival Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Melnick11
-
Multi-Party Inference and Uncongeniality.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Meng11
-
Measure Theory in Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Merkle11
-
Weak Convergence of Probability Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Merkle11a
-
Moderating and Mediating Variables in Psychological Research.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/MilinH11
-
Stochastic Processes: Applications in Finance and Insurance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Minkova11
-
Renewal Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/MitovZ11
-
Data Depth.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Modarres11
-
Measures of Dependence.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Modarres11a
-
Estimation Problems for Random Fields.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Moklyachuk11
-
Random Field.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Moklyachuk11a
-
Incomplete Data in Clinical and Epidemiological Studies.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Molenberghs11
-
Linear Mixed Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Molenberghs11a
-
Repeated Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Molenberghs11b
-
Sampling From Finite Populations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/MontaquilaK11
-
Multiple Comparison.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/MorikawaY11
-
Correlation Coefficient.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mukhopadhyay11
-
Sequential Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mukhopadhyay11a
-
Sufficient Statistical Information.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mukhopadhyay11b
-
Sufficient Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Mukhopadhyay11c
-
Functional Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Muller11
-
Power Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Murphy11
-
Instrumental Variables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Murray11
-
Hierarchical Clustering.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Murtagh11
-
Spectral Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Naeve11
-
Measurement of Uncertainty.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nair11
-
Demographic Analysis: A Stochastic Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Namboodiri11
-
Fuzzy Logic in Statistical Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nasibov11
-
Superpopulation Models in Survey Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nathan11
-
Multiple Comparisons Testing from a Bayesian Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/NeathC11
-
Statistical Pattern Recognition Principles.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/NechvalNP11
-
Statistical Estimation of Actuarial Risk Measures for Heavy-Tailed Claim Amounts.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Necir11
-
Statistics: Nelder's View.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nelder11
-
Permutation Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Neuhauser11
-
Wilcoxon-Mann-Whitney Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Neuhauser11a
-
Inversion of Bayes' Formula for Events.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ng11
-
Incomplete Block Designs.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/NguyenB11
-
Null-Hypothesis Significance Testing: Misconceptons.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nickerson11
-
Asymptotic Relative Efficiency in Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nikitin11
-
Degradation Models in Reliability and Survival Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nikulin11
-
Unbiased Estimators and Their Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/NikulinV11
-
Farmer Participatory Research Designs.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Nokoe11
-
Statistics: Controversies in Practice.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Notz11
-
African Population Censuses.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ntozi11
-
Exact Goodness-of-Fit Tests Based on Sufficiency.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/OReillyG11
-
Mood Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/OdiaseO11
-
Significance Tests, History and Logic of.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/OlssonG11
-
Contagious Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/OngN11
-
Nonparametric Regression Using Kernel and Spline Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/OpsomerB11
-
Weibull Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Padgett11
-
Ranking and Selection Procedures and Related Inference Problems.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Panchapakesan11
-
Simple Linear Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Park11
-
Inverse Gaussian Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Parna11
-
Nonlinear Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pazman11
-
Full Bayesian Significant Test (FBST).
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pereira11
-
Tests for Discriminating Separate or Non-Nested Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pereira11a
-
Marginal Probability: Its Use in Bayesian Statistics as Model Evidence.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pericchi11
-
P-Values, Combining of.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pestana11
-
Decision Theory: An Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Peterson11
-
Philosophy of Probability.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Peterson11a
-
Algebraic Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/PetrovicS11
-
Small Area Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pfeffermann11
-
Binomial Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/PhilippouA11
-
Distributions of Order k.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/PhilippouA11a
-
Sequential Probability Ratio Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/PiegorschP11
-
Spatial Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pilz11
-
Statistical Design of Experiments (DOE).
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pilz11a
-
Weighted U -Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pinheiro11
-
Markov Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pop-Stojanovic11
-
Heteroscedastic Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Popovic11
-
Martingale Central Limit Theorem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Posedel11
-
Probit Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Postelnicu11
-
Integrated Statistical Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Pradhan11
-
Trend Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Proietti11
-
Kendall's Tau.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Puka11
-
Best Linear Unbiased Estimation in Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/PuntanenS11
-
Fuzzy Sets: An Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Puri11
-
Jump Regression Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Qiu11
-
Eurostat.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Radermacher11
-
Panel Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rahiala11
-
Statistical Inference for Stochastic Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rajarshi11
-
Erlang's Formulas.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ramalhoto11
-
Empirical Likelihood Approach to Inference from Sample Survey Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rao11
-
Entropy and Cross Entropy as Diversity and Distance Measures.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rao11a
-
Ordered Statistical Data: Recent Developments.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Raqab11
-
Generalized Rayleigh Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/RaqabM11
-
Normal Distribution, Univariate.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rathie11
-
Canonical Correlation Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Raykov11
-
Stochastic Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rebolledo11
-
Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Reid11
-
Likelihood.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Reid11a
-
Statistical Approaches to Protecting Confidentiality in Public Use Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Reiter11
-
Tests of Independence.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Remillard11
-
Wilcoxon-Signed-Rank Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ReyN11
-
Location-Scale Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rinne11
-
Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rizzi11
-
Monte Carlo Methods in Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Robert11
-
Stochastic Difference Equations and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/RodkinaK11
-
Multivariate Outliers.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/RodriguesB11
-
Semi-Variance in Finance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rohatgi11
-
Cluster Analysis: An Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Romesburg11
-
Robust Inference.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ronchetti11
-
Laws of Large Numbers.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rosalsky11
-
Bivariate Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rose11
-
Computational Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rose11a
-
Agriculture, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ross11
-
Psychology, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rossi11
-
Composite Indicators.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rovan11
-
It√ī Integral.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rozovskii11
-
Prior Bayes: Rubin's View of Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rubin11
-
Rubin Causal Model.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/RubinJ11
-
Probability Theory: An Outline.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Rudas11
-
Analysis of Variance Model, Effects of Departures from Assumptions Underlying.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SahaiAK11
-
Role of Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SahaiL11
-
Sensitivity Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SaltelliA11
-
Bayesian vs. Classical Point Estimation: A Comparative Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Samaniego11
-
Index Numbers.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sanga11
-
Role of Statistics: Developing Country Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sanga11a
-
ROC Curves.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sant11
-
Simes' Test in Multiple Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sarkar11
-
Multivariable Fractional Polynomial Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SauerbreiR11
-
Frequentist Hypothesis Testing: A Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sawilowsky11
-
Statistical Fallacies: Misconceptions, and Myths.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sawilowsky11a
-
Effect Size.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SawilowskySG11
-
Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Scarpa11
-
Statistics Education.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Scheaffer11
-
Statistics on Ranked Lists.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Schimek11
-
Sturges' and Scott's Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Scott11
-
Case-Control Studies.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ScottW11
-
Multinomial Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Seber11
-
Proportions, Inferences, and Comparisons.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Seber11a
-
Adaptive Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SeberM11
-
Mixture Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Seidel11
-
Kurtosis: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Seier11
-
Normality Tests: Power Comparison.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Seier11a
-
Copulas.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sempi11
-
Multivariate Rank Procedures: Perspectives and Prospectives.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sen11
-
Asymptotic Relative Efficiency in Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Serfling11
-
Moderate Deviations.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SethuramanO11
-
Time Series Models to Determine the Death Rate of a Given Disease.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Shangodoyin11
-
Glivenko-Cantelli Theorems.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sharipov11
-
Spurious Correlation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sheather11
-
Parametric Versus Nonparametric Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sheskin11
-
Statistics, History of.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SheyninL11
-
Optimal Stopping Rules.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Shiryaev11
-
Statistics and Gambling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Siegrist11
-
Random Matrix Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Silverstein11
-
Actuarial Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Simchera11
-
Fraud in Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Simchera11a
-
Social Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Simchera11b
-
Statistical Publications, History of.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Simchera11c
-
Central Limit Theorems.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Singer11
-
Modeling Randomness Using System Dynamics Concepts.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SinghGYL11
-
Chaotic Modelling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Skiadas11
-
Stochastic Modeling, Recent Advances in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Skiadas11a
-
First Exit Time Problem.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SkiadasS11
-
Exploratory Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Smith-Miles11
-
Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Smith11
-
Tourism Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Smith11a
-
Confidence Interval.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Smithson11
-
Pyramid Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Smythe11
-
Multilevel Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Snijders11
-
Social Network Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Snijders11a
-
Business Surveys.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SnijkersB11
-
Banking, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Solano11
-
Business Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Soldic-AleksicS11
-
Variables.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Somun-Kapetanovic11
-
Exact Inference for Categorical Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sooriyarachchi11
-
Statistical Inference: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Spanos11
-
Federal Statistics in the United States, Some Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Spar11
-
Analysis of Areal and Spatial Interaction Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SpockP11
-
Fisher Exact Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sprent11
-
Sign Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sprent11a
-
Clinical Trials: Some Aspects of Public Interest.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Srivastava11
-
Extremes of Gaussian Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stamatovic11
-
Spreadsheets in Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/StankicS11
-
Multistage Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Steel11
-
Mean Residual Life.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/SteeleGYE11
-
Marine Research, Statistics in.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stefansson11
-
Cramér-Von Mises Statistics for Discrete Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stephens11
-
Tests of Fit Based on The Empirical Distribution Function.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stephens11a
-
Coefficient of Variation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11
-
Expected Value.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11a
-
Least Squares.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11b
-
Mean, Median and Mode.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11c
-
Minimum Variance Unbiased.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11d
-
Most Powerful Test.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11e
-
Neyman-Pearson Lemma.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11f
-
Random Variable.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stepniak11g
-
Geometric Mean.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stevic11
-
Multicriteria Decision Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stewart11
-
Sampling Distribution.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Stockburger11
-
False Discovery Rate.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Storey11
-
Confidence Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Strawderman11
-
Chemometrics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sundberg11
-
Exponential Family Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sundberg11a
-
Statistical Consulting.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sundberg11b
-
Generalized Quasi-Likelihood (GQL) Inferences.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sutradhar11
-
Measures of Agreement.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Svensson11
-
Ranks.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Svensson11a
-
Rating Scales.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Svensson11b
-
Validity of Scales.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Svensson11c
-
Inference Under Informative Probability Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Sverchkov11
-
Interactive and Dynamic Statistical Graphics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Symanzik11
-
Multivariate Analysis of Variance (MANOVA).
https://dblp.l3s.de/d2r/resource/publications/reference/stat/TabachnickF11
-
Decision Trees for the Teaching of Statistical Estimation.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Taborga11
-
Inverse Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/TangN11
-
Optimal Statistical Inference in Financial Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Taniguchi11
-
Margin of Error.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tanur11
-
Nonsampling Errors in Surveys.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tanur11a
-
Normality Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Thode11
-
Balanced Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tille11
-
Sampling Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tille11a
-
Statistical Analysis of Longitudinal and Correlated Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Todem11
-
Research Designs.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/TomaG11
-
Nonlinear Time Series Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tong11
-
Censoring Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tony11
-
Generalized Extreme Value Family of Probability Distributions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tsokos11
-
Mathematical and Statistical Modeling of Global Warming.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tsokos11a
-
Parametric and Nonparametric Reliability Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tsokos11b
-
Statistical Quality Control: Recent Advances.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/TsungSN11
-
Poisson Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Tutz11
-
Sampling Problems for Stochastic Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/UchidaY11
-
Clinical Trials: An Overview.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Uesaka11
-
Cornish-Fisher Expansions.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Ulyanov11
-
Copulas in Finance.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Umberto11
-
Bayesian Versus Frequentist Statistical Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Vallverdu11
-
Probability, History of.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Vallverdu11a
-
Point Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Vere-Jones11
-
Statistical Methods for Non-Precise Data.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Viertl11
-
Chi-Square Goodness-of-Fit Tests: Drawbacks and Improvements.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/VoinovN11
-
Smoothing Splines.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wahba11
-
Misuse of Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wang11
-
U -Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Weber11
-
Forecasting with ARIMA Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wei11
-
Time Series Regression.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wei11a
-
Graphical Markov Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wermuth11
-
Multivariate Statistical Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wermuth11a
-
Bioinformatics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wilson11
-
Biostatistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wilson11a
-
Statistical Genetics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wilson11b
-
Public Opinion Polls.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wlezien11
-
Ranked Set Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wolfe11
-
General Linear Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wu11
-
Chi-Square Tests.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wuensch11
-
Scales of Measurement.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wuensch11a
-
Cluster Sampling.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Wywial11
-
Semiparametric Regression Models.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Xia11
-
Economic Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Yoshizoe11
-
Degrees of Freedom.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Yu11
-
Fuzzy Set Theory and Probability Theory: What is the Relationship?
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Zadeh11
-
Selection of Appropriate Statistical Methods in Developing Countries.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Zepp11
-
Singular Spectrum Analysis for Time Series.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Zhigljavsky11
-
Statistical Modelling in Market Research.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Zhigljavsky11a
-
Stochastic Global Optimization.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Zhigljavsky11b
-
Scales of Measurement and Choice of Statistical Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Zimmerman11
-
Multidimensional Scaling: An Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/Zivadinovic11
-
Model Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/stat/ZucchiniCN11
-
Encyclopedia of Wireless and Mobile Communications
https://dblp.l3s.de/d2r/resource/publications/reference/tf/2008ewmc
-
Encyclopedia of Information Assurance
https://dblp.l3s.de/d2r/resource/publications/reference/tf/2011eia
-
Wireless Communications: Signal Processing Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Abed-MeraimBBL08
-
MANET: Network Mobility as a Control Primitive.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AcharyaRSV08
-
Gsm.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Aggelou08
-
Mobile Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AgrawalBGJMS08
-
Wireless Sensor Networks (WSNs): Characteristics and Types of Sensors.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AgrawalBGJMS08a
-
Wireless Sensor Networks (WSNs): Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AgrawalBGJMS08b
-
IEEE 802.16 Wireless Metropolitan Area Networks (WMANs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AgrawalC08
-
Video Streaming: Reliable Wireless Streaming with Digital Fountain Codes.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AhmadAH08
-
MANET: Multicasting.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AhmedS08
-
Mobile P2P: Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AhmedS08a
-
Edge.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ahson08
-
Gprs.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ahson08a
-
Umts.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ahson08b
-
Smart Phones.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AhsonI08
-
Smart Phones: Operating Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AhsonI08a
-
Cybercrime: Response, Investigation, and Prosecution.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Akin11
-
IEEE 802.15.4: Signature-Based Intrusion Detection in Wireless Sensor Networks (WSNs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AminiKM08
-
Web Applications: Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Andress11
-
Mobile Devices: Quality of Service (QoS) Adaptation Using MPEG-21.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AngelidesS08
-
Information Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Appleyard11
-
Ad Hoc Networks: Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ArgyroudisO08
-
Adaptation Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Arslan08
-
Mobile Security: Game Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/AssiBDMO08
-
Data Centers: Site Selection and Facility Design.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bacik11
-
Tape Backups: Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bacik11a
-
MANET: Selfish Behavior on Packet Forwarding.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BadacheD08
-
Wireless Sensor Networks (WSNs): Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BadacheK08
-
Wireless Sensor Networks (WSNs): Optimization of the OSI Network Stack for Energy Efficiency.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BadiM08
-
Coordinated Multi-Device Presentations: Ambient-Audio Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BalujaC008
-
Wireless Networks: Transmitter Power Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BambosG08
-
Mobile Health: Wireless Body Sensor Network Integration.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BaoHZ08
-
Wireless Asynchronous Transfer Mode (ATM): Internetworking.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BartonCC08
-
Wireless Networks: VoIP Service.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BasuD08
-
DoD Information Assurance Certification and Accreditation Process (DIACAP).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Batie11
-
Information Systems Security Engineering Professional (ISSEP).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Batie11a
-
IEEE 802.15.4: MAC Layer Attacks in Sensor Clusters.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BegumM08
-
Domain Name Service (DNS) Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bell11
-
Pod-Slurping: Other Vulnerabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Belva11
-
Optical Broadband Services Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjaminG08
-
Mobile Communications: Locating Position of Mobile Stations.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Benjapolakul08
-
Soft Handoff.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulH08
-
Ultra-Wideband: Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulK08
-
Telemetering: GSM Systems and Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulL08
-
Wireless Sensor Networks (WSNs): Central Node and Mobile Node Design and Development.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulL08a
-
Mobile Communications: Power Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulP08
-
MANET: Routing Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulT08
-
Mobile Communications: Call Admission Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulV08
-
Mobile IP.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BenjapolakulY08
-
Applets: Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Berg11
-
Security Controls: Dial-Up.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BermanO11
-
IP Multimedia Subsystems (IMS).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BesterKSTV08
-
Wireless Networks: TCP.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BhandarkarR08
-
Wireless Channels: Link Adaptation Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bhushan08
-
Penetration Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bianco11
-
Remote Access: Secure.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bird11
-
Asynchronous Transfer Mode (ATM): Integrity and Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Blanding11
-
External Networks: Secured Connections.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Blanding11a
-
LAN/WAN Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Blanding11b
-
Network Layer Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Blanding11c
-
Network Router Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Blanding11d
-
Data Warehouses: Security and Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BonewellGV11
-
High-Tech Trade Secrets.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Boni11
-
Privacy: Healthcare Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Borten11
-
Image and Video Communication: Joint Source Channel Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BovikHS08
-
Image and Video Communication: Power Optimized.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BovikHS08a
-
Image and Video Communication: Source-Channel Distortion Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BovikHS08b
-
Physical Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bowers11
-
Physical Security: Mission-Critical Facilities and Data Centers.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bowman11
-
Due Care: Minimum Security Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BraunS11
-
Downsizing: Maintaining Information Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bray11
-
E-Mail: Spam.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bredenberg11
-
Voice Communications: Voice-over-IP (VoIP) Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bruno11
-
Physical Security: Facilities.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Brusewitz11
-
Video Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BudagaviT08
-
P2P: Overlay Multicast.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/BufordY08
-
Security Risk: Goals Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Buglewicz11
-
Software Piracy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Burkey11
-
Information Systems Security Officer: Roles and Responsibilities.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Burney11
-
Accountability.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Bushmiller11
-
Directory Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Buszta11
-
Security Management Team Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Buszta11a
-
Wireless Ad Hoc Networks: Power Assignment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/CalinescuFW08
-
Object-Oriented Databases: Security Models.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Cannady11
-
Wireless Sensor Networks (WSNs): Key Management Schemes.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/CardeiIIM08
-
Wireless Networks: Routing with Intermittent Connectivity.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/CardeiL008
-
Wireless Sensor Networks (WSNs): Heterogeneous Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/CardeiY08
-
Information Security Management Systems (ISMSs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Carlson11
-
Identity Management Systems: Components.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Castellow11
-
Event Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Cater11
-
Service Oriented Architecture (SOA).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Cater11a
-
IP Networks: Personal Mobility Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChanLST08
-
IP Networks: Terminal Mobility Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChanLST08a
-
IP Networks: User Mobility.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChanLST08b
-
Compact Dual-Band Direct Conversion CMOS Transceiver.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChangCX08
-
MANET: Multicast Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chen008
-
Wireless Multimedia Systems: Cross Layer Considerations.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChenFLZ08
-
Wireless Networks: Error Resilient Video Transmission.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChenFLZ08a
-
Authentication and Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChenN08
-
Mobile Wireless Systems: Location Prediction Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChengJB08
-
Wireless Sensor Networks (WSNs): Time Synchronization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChengY08
-
OFDM-Based Systems: Modem Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chien08
-
RF Systems Design.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chien08a
-
RF Transceiver Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chien08b
-
Multihop Cellular Network Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChongGL08
-
MANET: Clustering Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChongY08
-
Content-Enriched Communication: Social Uses of Interactive TV.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chorianopoulos08
-
Awareness and Training: Motivational and Psychological Factors.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chun11
-
Identity-Based Self-Defending Network: 5W Network.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chun11a
-
Network and Telecommunications: Media.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chun11b
-
Data at Rest.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ChunK11
-
Covert Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chuvakin11
-
Honeypots and Honeynets.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Chuvakin11a
-
Role-Based Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Clark11
-
Internet Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Conorich11
-
Ad Hoc Networks: Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Conti08
-
Manet.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Conti08a
-
Forensics: Operational.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Corby11
-
Outsourcing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Corby11a
-
Privacy: Policy Formation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Corby11b
-
Committee of Sponsoring Organizations (COSO).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Cote11
-
Business Continuity Planning: Distributed Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Craig11
-
TDMA/TDD Wireless Networks: Quality of Service (QoS) Mechanisms.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/CuencaDDO08
-
IEEE 802.11 Wireless LANs (WLANs): Quality of Service (QoS) Support.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/CuencaMOV08
-
Mobile Streaming: Performance Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Curcio08
-
Mobile Streaming: Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Curcio08a
-
Multimedia Streaming: Mobile Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Curcio08b
-
Broadcasting Multimedia Transport: 3G and Future Mobile Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/CurcioV08
-
Server Security Policies.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/David11
-
Certification Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Davidson11
-
Corporate Security: IT Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Davis11
-
Defense in Depth: Network, Systems, and Applications Controls.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Davis11a
-
Tokens: Role and Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Davis11b
-
Public Key Infrastructure (PKI).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/DeMaio11
-
Wireless Applications: Middleware Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/DebbabiLMT08
-
Enterprise Security Capability: Common Models.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Decker11
-
Physical Layer Security: Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Decker11a
-
Intrusion Prevention Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Deograt-LumyH11
-
Handoff Prioritization: Early Blocking.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/DiederichZ08
-
Business Continuity Planning: Restoration Component.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/DorfJ11
-
Mobile Computing: Context-Aware.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/DornDS08
-
Mobile Internet Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/DornDS08a
-
Wireless Internet: Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/DornDS08b
-
Business Continuity Management: Maintenance Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Doughty11
-
Business Continuity Planning: Strategy Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Doughty11a
-
Steganography.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Edmead11
-
Content Repurposing: Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/El-SaddikH08
-
Multimedia Streaming.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/El-SaddikH08a
-
Nomadic Users: Context-Aware Information Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/El-SaddikH08b
-
Mobile P2P: Data Retrieval and Caching.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/El-SaddikR08
-
IEEE 802.11 Wireless LANs (WLANs): Clustering and Roaming Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Elhakeem08
-
Wireless LANs (WLANs): Ad Hoc Routing Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Elhakeem08a
-
Return on Investment (ROI).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Endorf11
-
ISO Standards and Certification.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Erkonen11
-
Systems Integrity Engineering: Distributed Processing Concepts and Corresponding Security-Relevant Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Evans11
-
Systems Integrity Engineering: Interoperable Risk Accountability Concepts.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Evans11a
-
Systems Integrity Engineering: Methodology and Motivational Business Values and Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Evans11b
-
Cognitive Radio Implementation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/EvansNW08
-
Location-Based Services.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/FalchukFL08
-
Media Streaming: Transmission Strategies in P2P Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/FengHL08
-
Human Resources: Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/FentonW11
-
Ad-Coop Positioning System: Embedded Kalman Filter Data Fusion.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/FigueirasF08
-
Artificial Intelligence (AI): Intrusion Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fish11
-
Operations Security: Controls.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fisher11
-
Compliance Assurance.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fitzgerald11
-
Health Insurance Portability and Accountability Act (HIPAA): Requirements.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fitzgerald11a
-
Information Security Governance: Corporate Organization, Frameworks, and Reporting.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fitzgerald11b
-
Insider Threats.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fitzgerald11c
-
Management Commitment: Security Councils.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fitzgerald11d
-
Phishing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fitzgerald11e
-
Security Policy Development and Distribution: Web-Based.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fitzgerald11f
-
Network Security: Trapping Intruders.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Flynn11
-
IEEE 802.15.4: Low Rate Wireless Personal Area Networks (PANs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/FonoageC08
-
Bally v. Faber.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Freeman11
-
Personnel: Practices.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Freeman11a
-
Privacy: Legal Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Freeman11b
-
State of Washington v. Heckel.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Freeman11c
-
Application Service Providers: Secure Relationships.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fried11
-
E-Mail Retention Policy: Legal Requirements.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fried11a
-
Object-Oriented Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fried11b
-
Offshore Development.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fried11c
-
Penetration Testing: Policies.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fried11d
-
Technology Convergence: Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fried11e
-
Wireless Internet: Fundamentals.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/FurhtI08
-
Multimedia Broadcast Multicast Service (MBMS).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/FurhtKS08
-
Mobile Music.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Furini08
-
Adaptable Protocol Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fussell11
-
Intelligent Agents: Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fussell11a
-
Next-Generation Security Application Development.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fussell11b
-
Quantum Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Fussell11c
-
Cybercrime: Council of Europe.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Gabrys11
-
IEEE 802.11 Wireless LANs (WLANs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Garcia-MaciasT08
-
Cryptographic Hash Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GauravaramK11
-
Health Insurance Portability and Accountability Act (HIPAA): Security Requirements.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Geffert11
-
Optical Communication Networks: Trends.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GencataMS08
-
Mobile Multimedia Transmission: Codecs.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GeorgievskiS08
-
Mobile Systems: Quality of Service (QoS).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GeorgievskiS08a
-
Cellular Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Godara08
-
Cellular Systems: 1G.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Godara08a
-
Cellular Systems: 2G.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Godara08b
-
Cellular Systems: 3G.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Godara08c
-
Access Controls: PKI-Based.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Golod11
-
Public Key Infrastructure (PKI): Registration.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Golod11a
-
Cellular Base Stations: Open Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GorsheL08
-
Cryptography: Encryption and.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Gove11
-
Public Key Hierarchy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Grabow11
-
CDMA Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GrayO08
-
IEEE 802.11 Wireless LANs (WLANs): Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GritzalisL08
-
Wireless Sensor Networks (WSNs): Self-Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/GuptaKS08
-
Opportunistic Scheduling.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Gyasi-Agyei08
-
Wireless Networks: Cross Layer MAC Design.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Gyasi-AgyeiZ08
-
Wireless Local Area Networks (WLANs): Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HalimD11
-
Information Security Management Systems (ISMSs): Risk Diagnosis and Treatment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Halvorson11
-
Packet Access: High-Speed Downlink.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HamalainenKPTW08
-
Optical Networks: Resource Management and Allocation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HamdiD08
-
Distributed Computing: Grid Environment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hamidi11
-
Security Information Management: Myths and Facts.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hamidi11a
-
Steganography: Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hamidi11b
-
Awareness and Training.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hansche11
-
Awareness and Training: Appendices.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hansche11a
-
Cordless Telephone Standard CT-2.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hanzo08
-
Wireless Transceivers: Near-Instantaneously Adaptive.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HanzoY08
-
Vehicular Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HaqueMMBR08
-
Cookies and Web Bugs.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HardingRG11
-
Architecture: Firewalls.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11
-
Controls: CISSP and Common Body of Knowledge (CBK).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11a
-
Customer Relationship Management (CRM).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11b
-
Electronic Commerce: Auditing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11c
-
FTP: Secured Data Transfers.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11d
-
Halon Fire Suppression Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11e
-
Network Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11f
-
Policy Development: Needs.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11g
-
RADIUS: Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11h
-
Secure Socket Layer (SSL).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11i
-
Simple Network Management Protocol (SNMP).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11j
-
Transport Layer Security (TLS).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11k
-
Virtual Network Computing (VNC) Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11l
-
Voice Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hare11m
-
Laws and Regulations: e-Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Heikkila11
-
Buffer Overflows: Stack-Based.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Held11
-
Cross-Site Scripting (XSS).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Held11a
-
Data Sanitization: SQL Injection.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Held11b
-
IPv6: Expanding Internet Support.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Held11c
-
Service Level Agreements.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Held11d
-
Spoofing and Denial of Service Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Held11e
-
Wireless Local Area Networks (WLANs): Vulnerabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Held11f
-
Architecture: Models.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HendersonC11
-
Business Continuity Management: Priorities.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11
-
Business Continuity Planning: Case Study.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11a
-
Business Continuity Planning: Collaborative Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11b
-
Firewall Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11c
-
Firewall Architectures: Other Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11d
-
Firewall Architectures: Platforms.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11e
-
Firewall Architectures: Viruses and Worms.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11f
-
Malicious Code: Fast-Scanning Worms.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11g
-
Operations Security: Support and Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11h
-
Personnel: Security Roles.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11i
-
Physical Security: Melding with Information Systems Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11j
-
Risk Management and Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11k
-
Security Development Lifecycle.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11l
-
Tokens: Authentication.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Henry11m
-
Awareness and Training: Effective Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Herold11
-
Fraud: Employee Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Herold11a
-
Incident Response: Privacy Breaches.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Herold11b
-
Information Protection.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Herold11c
-
Privacy Breaches: Policies, Procedures, and Notification.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Herold11d
-
Privacy Governance: Effective Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Herold11e
-
Common Criteria: IT Security Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Herrmann11
-
Redundant Arrays of Independent Disks (RAID).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Heyn11
-
Malicious Code.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HoefelmeyerP11
-
Green Mobile Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HollandFA08
-
Spectrum Sharing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HollandSA08
-
Tokens: Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hootman11
-
Mobile Terminals: Recommendation Services.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HoshinoT08
-
Passwords and Policy Threat Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Houser11
-
Cryptography: Cryptosystems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Houwen11
-
Security Policy Lifecycle: Functions and Responsibilities.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Howard11
-
MANET: Location-Aware Routing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/HsuT08
-
Awareness and Training: Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Hudson11
-
Diversity Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/IbnkahlaR08
-
Mobile Communications: Coding Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/IbnkahlaR08a
-
Mobile Wireless Systems: Channel Characterization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/IbnkahlaR08b
-
Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ikbal11
-
Internet Service Providers (ISPs): Accountability.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Imrey11
-
Systems Development: Object-Oriented Security Model.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/InmorEB11
-
Mobile Commerce.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/IshaqM08
-
Channel Assignment: Fixed and Dynamic.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jabbari08
-
Business Continuity Management: Metrics.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jackson11
-
Business Continuity Management: Testing, Maintenance, Training, and Awareness.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jackson11a
-
Business Continuity Planning: Enterprise Risk Management Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jackson11b
-
Business Continuity Planning: Evolution in Response to Major News Events.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jackson11c
-
Business Continuity Planning: Process Reengineering.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jackson11d
-
Business Impact Analysis: Business Process Mapping.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jackson11e
-
Business Impact Analysis: Process.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jackson11f
-
Risk Management: Enterprise.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/JacksonC11
-
Network Content Filtering and Leak Prevention.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jahchan11
-
Web Applications: Firewalls.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jahchan11a
-
Long Term Evolution (LTE) of Mobile Radio Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/JakusT08
-
Auditing: Self-Hacking.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/James11
-
Wireless Communications: Spatial Diversity.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Janaswamy08
-
MIMO: Wireless Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/JavornikKPT08
-
OFDM: Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Jiang08
-
Wireless LANs (WLANs): Real-Time Services with Quality of Service (QoS) Support.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/JiangWZ08
-
Configuration Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Johnson11
-
Security Incident Response.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Johnson11a
-
Integrated Wireless LANs (WLANs) and Cellular Networks: Managing Handovers.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KaloxylosLMP08
-
Land Mobile Communication Systems: Phased-Array Antennas.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KanazawaMOTT08
-
Wireless Ad Hoc Networks: Performance Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Karnik008
-
Smart Inter-Processor Communicator Protocol Stack.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Khawand08
-
Ad Hoc Networks: GPS-Based Routing Algorithm.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KimKS08
-
Extranet Access Control.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/King11
-
Intranets: Risk.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Kliem11
-
Architecture: Biological Cells.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KnappM11
-
Management Support of IT: Survey.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KnappM11a
-
Application Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Kobus11
-
Enclaves: Enterprise as Extranet.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Koch11
-
Unlicensed Mobile Access: Architecture and Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KoukoulidisS08
-
Wireless Mesh Networks: Architecture, Protocols, and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KoukoulidisS08a
-
Information Warfare.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Kovacich11
-
Information Warfare: Tactics.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KovacichJL11
-
Kerberos‚ĄĘ.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KovaraK11
-
Kerberos‚ĄĘ: Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KovaraK11a
-
Kerberos‚ĄĘ: Ongoing Development.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KovaraK11b
-
Kerberos‚ĄĘ: Services and Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KovaraK11c
-
Career Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Krause11
-
Ethics: Internet.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Krause11a
-
Healthcare Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Krause11b
-
Corporate Governance.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Krehnke11
-
Crime Prevention: Environmental Design.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Krehnke11a
-
IT Governance Institute (ITGI).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Krehnke11b
-
Data Warehouses: Datamarts and.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KrehnkeB11
-
Certification and Accreditation: Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KrehnkeK11
-
Configuration Management: Process Stages.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KrehnkeK11a
-
Data Access Controls: Sensitive or Critical.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KrehnkeK11b
-
Enterprise Information Security: Architectural Design and Deployment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KrehnkeK11c
-
Wireless LANs (WLANs): Security and Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/KrishnanVW08
-
Forensics.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Kuchta11
-
Access Controls: Implementation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Kurzban11
-
Object-Based Applications: Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Kuver11
-
Spectral Efficiency: Wireless Multicarrier Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/LabeauW08
-
Cryptography: Elliptic Curve.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Lambert11
-
Wireless Internet Security: Portable Internet Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Lee11
-
Digital Forensics and E-Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Leibrock11
-
Single Sign-On: Enterprise.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Leo11
-
Mobile Services.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Leu08
-
Wireless Data.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/LevesqueP08
-
System Development Security: Methodology.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/LimB11
-
Ad Hoc Networks: Power-Conservative Designs.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/LinT08
-
Voice over WLAN.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Lipiczky11
-
Surveillance: Closed-Circuit Television and Video.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Litzau11
-
Application Service Providers: Information Assurance Considerations.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Llana11
-
E-Mail: Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Lobree11
-
International Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/LosavioEK11
-
Host-Based Firewalls: Case Study.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Lowder11
-
UNIX Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Lowder11a
-
High-Speed Wireless Internet Access: Multiantenna Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Lozano08
-
Health Insurance Portability and Accountability Act (HIPAA): Security Readiness.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MacLeodGD11
-
Mobile Games: Multiplayer.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MahgoubM08
-
Portable Computing Environments.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Maier11
-
End Node Security and Network Access Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Majstor11
-
Storage Area Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Majstor11a
-
Wireless Local Area Networks (WLANs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Majstor11b
-
Wireless Local Area Networks (WLANs): Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Majstor11c
-
Encryption Key Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MajstorV11
-
Physical Security: Controlled Access and Layered Defense.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Matthews11
-
Integrated Threat Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McBride11
-
Mobile Data Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McBride11a
-
Software Development Lifecycles: Security Assessments.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McBride11b
-
Voice Communications: Voice-over-IP (VoIP) Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McBride11c
-
Xml.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McClintock11
-
Perimeter Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McCoy11
-
Physical Security: Mantraps and Turnstiles.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McCoy11a
-
Transformation: Department-Level.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McCoy11b
-
Application Systems Development.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McCulley11
-
Health Insurance Portability and Accountability Act (HIPAA).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McGhie11
-
Identity Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McGhie11a
-
Patch Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McGhie11b
-
Security Teams: Effective Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McGhie11c
-
Web Services.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McGhie11d
-
World Wide Web.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McGhieM11
-
Information Technology Infrastructure Library (ITIL¬ģ).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/McPhee11
-
IEEE 802.16 Wireless Metropolitan Area Networks (WMANs): Resource Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MehrjooS08
-
TDMA Cellular Systems: Speech and Channel Coding.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Mermelstein08
-
Public Key Infrastructure (PKI): E-Business.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MerrillF11
-
Spread Spectrum Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MilsteinS08
-
Mobile Communications: 4G.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MilutinovicSST08
-
Multicarrier Transceivers: Peak-to-Average Power Radio Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/MindenRW08
-
Business Partnerships: Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Misrahi11
-
Business Continuity Management: Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Mitts11
-
Internet Mobile Code.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Moritz11
-
Communication Protocols and Services.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Murray11
-
Cryptography: Key Management: Functions and Principles.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Murray11a
-
Database Integrity.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Murray11b
-
Instant Messaging.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Murray11c
-
Ownership and Custody of Data.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Murray11d
-
System Design Flaws.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Murray11e
-
XML and Other Metadata Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Murray11f
-
Biometrics: New Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Myerson11
-
Denial-of-Service Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Narayanaswamy11
-
Capability Maturity Model.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Nelson11
-
Patch Management: Process.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Nicastro11
-
Technology Convergence: People, Process and Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Nicastro11a
-
Enterprise Security Information.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/NyanchamaW11
-
Open Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/OBerry11
-
Risk Analysis and Assessment: Risk Assessment Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ozier11
-
Risk Analysis and Assessment: Risk Management Tasks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ozier11a
-
Risk Analysis and Assessment: Terms and Definitions.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ozier11b
-
Wireless Home Entertainment Center: Protocol Communications and Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PalazziPRF08
-
Dynamic Wireless Sensor Networks (WSNs): Architecture and Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PapavassiliouZ08
-
Access Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Paris08
-
Computer Abuse.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Parker11
-
Application Layer Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pasley11
-
Hash Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pasley11a
-
Virtual Private Networks (VPNs): Deployment and Evaluation Strategy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pasley11b
-
Virtual Private Networks (VPNs): Perspectives.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pasley11c
-
Bluesnarfing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Paul11
-
Format String Vulnerabilities.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Paul11a
-
Mashups and Composite Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Paul11b
-
Multimedia Applications in Ad Hoc Networks: Quality of Service (QoS) Support Cross-Layered Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PavlouS08
-
Body Area Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PeiW08
-
Awareness and Training: Program Elements.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Peltier11
-
Malicious Code: Organized Crime.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pike11
-
Operations Security: Abuses.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pike11a
-
Computer Crime.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pilewski11
-
Critical Business Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pilewski11a
-
Enterprise Information Assurance: Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pilewski11b
-
Sarbanes-Oxley Act of 2002 (SOX): Compliance.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pilewski11c
-
Standards.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pilewski11d
-
Wireless Penetration Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Pilewski11e
-
Architecture: Secure.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PilewskiP11
-
NERC Corporation: Compliance.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PilewskiP11a
-
Network Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PilewskiP11b
-
Content Repurposing: Ontology-Based Approach for Mobile Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PonnadaS08
-
Mobile Systems: Migrating from 3G to 4G.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/PonnadaS08a
-
Covert Channels: Analysis and Recommendations.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Poore11
-
Cryptography: Key Management: History and Myths.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Poore11a
-
Cryptography: Transitions.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Poore11b
-
Global Transmissions: Jurisdictional Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Poore11c
-
Information Security Governance: Basic Corporate Organization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Poore11d
-
Message Digests.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Poore11e
-
Buffer Overflows: Attacks.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Price11
-
Information Flow.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Price11a
-
Information Flow: Emerging and Potential Techniques and Covert Channels.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Price11b
-
Information Flow: Selecting Countermeasures.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Price11c
-
Insider Threats: System and Application Weaknesses.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Price11d
-
Neural Networks and Information Assurance Uses.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Price11e
-
Security Test and Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Price11f
-
PeopleSoft Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Purewal11
-
Video Streaming: Wireless.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/QinZ08
-
Ultra-Wideband: Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Racherla08
-
Wireless Sensor Networks (WSNs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Racherla08a
-
Cellular Data Networks: Handoff and Rerouting.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/RacherlaR08
-
Rerouting Schemes: Performance Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/RacherlaR08a
-
Optical Networks: Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Raja08
-
Wireless Asynchronous Transfer Mode (ATM): Mobility Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/RajagopalanR08
-
Wireless Asynchronous Transfer Mode (ATM): Quality of Service (QoS).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/RajagopalanR08a
-
Inspection Technologies: Deep Packets.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Ramos11
-
Applications: Auditing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/RiceB11
-
Biometrics: Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Richards11
-
Workplace Violence.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Richards11a
-
Packet Sniffers.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rodgers11
-
Digital Crime Scene Analysis (DCSA).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rogers11
-
Incident Response: Evidence Handling.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rogers11a
-
Social Engineering: Mitigation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rogers11b
-
Virtualization and Digital Investigations.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/RogersL11
-
Advanced Encryption Standard (AES).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11
-
Common Criteria.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11a
-
Cryptography: Quantum.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11b
-
Fax Machines.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11c
-
Firewalls: Checkpoint Security Review.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11d
-
Java.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11e
-
Personnel: Security Screening.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11f
-
Pod Slurping: Concepts.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11g
-
Radio Frequency Identification (RFID).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Rothke11h
-
Relational Database Access Controls: SQL.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Sandhu11
-
Relational Database Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SandhuJ11
-
Organization Culture.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Saracco11
-
Application Security: World Wide Web.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Scanlon11
-
Security Management Program: Prioritization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schatz11
-
Espionage: Counter-Economic.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schiller11
-
Malicious Code: Quasi-Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schiller11a
-
Mergers and Acquisitions.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schiller11b
-
Authentication Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schuett11
-
Reduced Sign-On.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schuett11a
-
Firewalls: Internet Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schultz11
-
Malicious Code: Rootkits.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schultz11a
-
Security Information and Event Management (SIEM).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Schultz11b
-
Intrusion Detection Systems (IDSs): Implementation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SchultzS11
-
Service Delivery Platforms.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SeckinSS08
-
Enterprise Information Assurance: Key Components.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Sharp11
-
Information Security Basics: Effective Practices.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Shaurette11
-
Intrusion Detection Systems (IDSs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Shaurette11a
-
Risk Management Model: Technology Convergence.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Shaurette11b
-
Sarbanes-Oxley Act of 2002 (SOX).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Shaurette11c
-
Business Continuity Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ShauretteS11
-
Incident Response: Exercises.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ShauretteS11a
-
Spyware.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/ShauretteS11b
-
Artificial Neural Network Models for Intrusion Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Sheikhan11
-
Chaotic-Based Communication Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Sheikhan11a
-
Fuzzy Models for Intrusion Detection.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Sheikhan11b
-
Management Compliance: Confidential Information.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Sherizen11
-
Information Security Policies.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Shorten11
-
Cyber-Risk Management: Enterprise-Level Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SiegelSS11
-
Proxy Servers.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Silverman11
-
Wireless LANs (WLANs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Singh08
-
Spyware: Ethical and Legal Concerns.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SipiorWR11
-
Voice Communications: Voice-over-Internet (VoI).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Skerpac11
-
Hackers: Attacks and Defenses.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Skoudis11
-
Hackers: Hiring Ex-Criminal.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Skoudis11a
-
Hackers: Tools and Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Skoudis11b
-
Open Source.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Skoudis11c
-
Sploits.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Skoudis11d
-
Uniform Resource Locators (URLs): Obscuring.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Skoudis11e
-
Generic Context Management Framework: Contextual Reasoning.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SnoeckKWZ08
-
Auditory Interfaces for Mobile Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SodnikDT08
-
Resource Allocation Using Game Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/SofokleousA08
-
Wireless Sensor Networks (WSNs): Secure Localization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Srinivasan008
-
Awareness and Training: Briefing for the End User.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stacey11
-
Business Continuity Planning: Best Practices and Program Maturity.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stacey11a
-
Application Layer Security: Network Protocols.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stackpole11
-
Centralized Authentication Services.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stackpole11a
-
IP Security Protocol Working Group (IPSec).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stackpole11b
-
Systems Management: Third-Party Applications and Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/StackpoleN11
-
Bluetooth Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stallings08
-
E-Mail: Pretty Good Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stallings11
-
User Data Synchronization.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/StancinT08
-
Cryptography: Auditing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stanek11
-
CDMA Networks: Microcells.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Steele08
-
Microcells.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Steele08a
-
Physical Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Steinke11
-
Incident Response: Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Sterneckert11
-
Modulation Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stuber08
-
Forensics: Non-Liturgical Examinations.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Stucki11
-
Multiple Access Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/StularTU08
-
IEEE 802.16d: Worldwide Interoperability for Microwave Access (WiMax).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Subramanian08
-
Planning for the Future: Challenges.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Thomas11
-
Risk Assessment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Thomas11a
-
Firewall Technologies: Comparison.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Thorsheim11
-
Identity Theft.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tiller11
-
Managed Security Service Providers (MSSPs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tiller11a
-
Security Breaches: Reporting.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tiller11b
-
Smartcards.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tiller11c
-
Virtual Private Networks (VPNs).
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tiller11d
-
Virtual Private Networks (VPNs): Leverage.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tiller11e
-
Ethics.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tippett11
-
Information Security Controls: Types.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tipton11
-
Information Security Management: Purpose.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tipton11a
-
Spectral Efficiency.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tomazic08
-
Management Commitment.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Tompkins11
-
Broadband Internet Access.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Trulove11
-
Physical Layer Security: Wired and Wireless Connections.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Trulove11a
-
Data Centers: Security.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Vacca11
-
Virtual Private Networks (VPNs): Remote Access.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Vacca11a
-
Incident Response: Managing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Vangelos11
-
Wi-Fi Walkman.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/VriesR008
-
Smart Antenna Systems: Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Vu08
-
Computer Crime: Investigations.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Wade11
-
Forensics and Legal Proceedings.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Welch11
-
Forensics: Computer Crime Investigation.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Welch11a
-
Forensics: Rules of Evidence.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Welch11b
-
Physical Security: Threat after September 11th, 2001.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Williams11
-
Mobile and Wireless Technologies: Spatial Presence.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Willis08
-
Risk Management.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Woerner11
-
E-Mail and Data Communications: Dial-In Hazards.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Wrobel11
-
Personal Accountability: Corporate Information Security Policy.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Wylder11
-
Glossary.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/X11
-
PBX Firewalls.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Yarberry11
-
Telephony Systems: Auditing.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Yarberry11a
-
Risk Management: Trends.
https://dblp.l3s.de/d2r/resource/publications/reference/tf/Young11
-
Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/2008
-
Event-Based and Publish/Subscribe Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Aitenbichler08
-
A Focus on Location Context.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Aitenbichler08a
-
PROMISE.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/AnkeWHDNK08
-
Service Discovery.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Austaller08
-
Ubiquitous Services and Business Processes.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Barros08
-
Business Grids.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Gerteis08
-
Real-Time Location Tracking Mashup for Enterprise.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/HamdiGR08
-
Multimodal Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Hartl08
-
Context Models and Context Awareness.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/HartmannA08
-
Opportunistic Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Heinemann08
-
Multimodal and Federated Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/JamesG08
-
Adapting to the User.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Jost08
-
Peer-to-Peer Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Kangasharju08
-
Bionics.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Limberger08
-
Towards Adaptive Security for Ubiquitous Computing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/LotzCW08
-
Ambient Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Lyardet08
-
Intelligent User Interfaces for Ubiquitous Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Malaka08
-
Introduction to Ubiquitous Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/MuhlhauserG08
-
Smart Items in Real Time Enterprises.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Nochta08
-
Ontologies for Scalable Services-Based Ubiquitous Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/OberleBA08
-
Multimodal Warehouse Project.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/RaiyaniW08
-
Trust and Accountability.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Ries08
-
Wireless and Mobile Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Schiller08
-
Mobile Speech Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Schnelle08
-
Mouth and Ear Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/Schnelle08a
-
CoBIs.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/SpiessM08
-
Accounting and Charging.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/StillerHGRMW08
-
Security for Ubiquitous Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/StraubH08
-
Advanced Hands and Eyes Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/ubiqhandbook/WeberH08
-
The VLSI Handbook.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/1999
-
Performance Modeling and Analysis in VHDL.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/AylorK99
-
Design Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/BartonB99
-
Switched-Capacitor Filters.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Baschirotto99
-
Synthesis at the Register Transfer Level and the Behavioral Level.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Bhasker99
-
Multichip Module Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/BoyadzhyanC99
-
Design of MESFET and HEMT Logic Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/ChangVL99
-
Dynamic Random Access Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Cheng99
-
Bipolar Junction Transistor (BJT) Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/ComerC99
-
Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/ConnorsH99
-
Design Automation Technology Roadmap.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Cottrell99
-
SiGe Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Cressler99
-
Silicon on Insulator Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Cristoloveanu99
-
Internet Based Micro-Electronic Design Automation (IMEDA) Framework.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/DeweyCK99
-
Compound Semiconductor Devices for Digital Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Estreich99
-
Oversampled Analog-to-Digital and Digital-to-Analog Converters.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/FattarusoW99
-
Bipolar Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/GrahnO99
-
ASIC Design.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/GuptaG99
-
Micromachining.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Hesketh99
-
ROM/PROM/EPROM.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Hwang99
-
Microprocessor Design Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/IyengarR99
-
ATPG and BIST.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Kagaris99
-
Timing and Signal Integrity Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/KangDBG99
-
Testability Concepts and DFT.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Kanopoulos99
-
Microprocessor Layout Method.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Karnik99
-
CMOS/BiCMOS Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/KatsumataOIMYKNMMYII99
-
Microelectronics Packaging.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/KhandelwalS99
-
Continuous-Time Filters.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Khoury99
-
Channel Hot Electron Degradation-Delay in MOS Transistors Due to Deuterium Anneal.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/KizilyalliHL99
-
System Timing.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/KourtevF99
-
RF Passive IC Components.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/LeeHMSY99
-
CMOS Amplifier Design.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/LiBT99
-
Logic Synthesis for Field Programmable Gate Array (FPGA) Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Lockwood99
-
Materials.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Long99
-
Logic Design Principles and Examples.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Long99a
-
Passive Components.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Lotfi99
-
Low-Power Memory Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Margala99
-
Noise in VLSI Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/MartinGN99
-
Binary Decision Diagrams.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/MinatoM99
-
Expressions of Logic Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99
-
Basic Theory of Logic Functions.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99a
-
Simplification of Logic Expressions.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99b
-
Logic Synthesis with AND and OR Gates in Two Levels.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99c
-
Sequential Networks with AND and OR Gates.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99d
-
Logic Properties of Transistor Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99e
-
Logic Synthesis with NAND (or NOR) Gates in Multi-levels.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99f
-
Logic Synthesis with a Minimum Number of Negative Gates.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99g
-
Logic Synthesizer by the Transduction Method.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99h
-
Emitter-Coupled Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99i
-
CMOS.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99j
-
Full-Custom and Semi-Custom Design.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99k
-
Programmable Logic Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99l
-
Mask-Programmable Gate Arrays.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99m
-
Field-Programmable Gate Arrays.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99n
-
Cell-Library Design Approach.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99o
-
Field-Programmable Gate Arrays.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Muroga99p
-
Power IC Technologies.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Nakagawa99
-
Logic Synthesis with AND and OR Gates in Multi-levels.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/NakamuraM99
-
Interconnect Modeling and Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/NakhlaA99
-
Hardware Description in Verilog.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Navabi99
-
SiC Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Neudeck99
-
System-Level Design.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/ParkerTW99
-
Power Simulation and Estimation in VLSI Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Pedram99
-
Analog Circuit Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Rollins99
-
Flash Memories.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/ShenLCYH99
-
VLSI Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/ShenaiM99
-
Nyquist-Rate ADC and DAC.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Song99
-
RF Communication Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/SteyaertBJM99
-
Multipliers.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/TakagiBM99
-
Dividers.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/TakagiM99
-
Adders.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/TakagiTBM99
-
High-Frequency Amplifiers.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/ToumazouP99
-
CAD Tools for BIST/DFT and Delay Faults.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Tragoudas99
-
SRAM.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Tseng99
-
Bipolar Amplifier Design.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Veirman99
-
Operational Transconductance Amplifiers.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/WassenaarIL99
-
Embedded Computing Systems and Hardware/Software Co-Design.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Wolf99
-
Embedded Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/Wu99
-
Pass Transistors.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/YanoM99
-
Algorithms and Architectures for Multimedia and Beamforming Communications.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/YaoLY99
-
Logic Synthesizer with Optimizations in Two Phases.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/YoshikawaM99
-
PLL Circuits.
https://dblp.l3s.de/d2r/resource/publications/reference/vlsi/YuanW99
-
Wiley Encyclopedia of Computer Science and Engineering
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/2008
-
Process-Aware Information Systems: Design, Enactment, and Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Aalst08
-
Spreadsheet Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/AbrahamBE08
-
Electronic Data Interchange.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Aggarwal08
-
Bioinformatics.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Akutsu08
-
Parallel Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Alaghband08
-
Program Interpreters.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Alfonseca08
-
Computational Complexity Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Allender08
-
Fiber-Optic Communication Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/AnandCSXQ08
-
Cybernetics.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Andrew08
-
Data Compression.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/AnsariCR08
-
Gradient-Based Optimization Techniques for Discrete Event Systems Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Arsham08
-
Speculation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/AugustV08
-
Education and Training in Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Bagert08
-
Operating Systems: A Business Perspective.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Bajgoric08
-
Proofs of Correctness in Mathematics and Industry.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Barendregt08
-
Behavioral Sciences and Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BarnhartL08
-
Logic Synthesis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BarriosJV08
-
Finite Element Method.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Bathe08
-
Automatic Test Generation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Belfore08
-
Computing Pre-University: Primary Computing Education.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BellB08
-
Robot Motion Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Belta08
-
Data Privacy.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BeresfordS08
-
Markov Chain Monte Carlo Simulations.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BergB08
-
Object-Oriented Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BertinoG08
-
Microprogramming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Bomar08
-
Aspect-Oriented Software Development: an Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BrichauCRD08
-
Program Assemblers.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/BurgstallerS08
-
Electronic Calculators.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Byrne08
-
Fault-Tolerant Software.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cai08
-
Software Cybernetics.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/CangussuCMM08
-
Component-Based Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/CaoGB08
-
Ray Tracing Acceleration Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/CatedraGAGL08
-
Optimizing Compilers.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ChapmanL08
-
Financial Applications: Stock Markets.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Chen08
-
Remote Sensing Information Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Chen08a
-
Volume Graphics and Volume Visualization.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Chen08b
-
Embedded Operating Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cheng08
-
Rounding Errors.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ChesneauxGJ08
-
Distributed File Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ChingCNLC08
-
Functional Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Chitil08
-
Cooperative Database Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Chu08
-
CoXML: Cooperative XML Query Answering?
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ChuL08
-
Posets and Lattices.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/CiucciC08
-
Computational Materials Physics.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Colombo08
-
Capability Maturity Models (CMM).
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Combelles08
-
Computability.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cooper08
-
Object-Oriented Analysis and Design.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cooper08a
-
Human - Computer Interaction.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cooperstock08
-
Algorithmic Music.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cope08
-
Computer Music Composition/Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cope08a
-
Abstract Data Types.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/CowanA08
-
Algebraic Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cox08
-
Visual Programming Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cox08a
-
Approximation Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Cuyt08
-
Logic Design.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Damaj08
-
Programmable Logic Arrays.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Damaj08a
-
Biology Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DasGuptaW08
-
Dimensionality Reduction.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DashL08
-
Storage Area Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DeCusatis08
-
Spellchecker.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DembitzGR08
-
Choice Uncertainty Principle.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08
-
Great Principles of Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08a
-
Kernel.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08b
-
Locality Principle.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08c
-
Overhead.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08d
-
Queueing Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08e
-
Swapping.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08f
-
The Computing Field: Structure.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08g
-
Thrashing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08h
-
Throughput.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08i
-
Virtual Memory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08j
-
Working Set.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Denning08k
-
Monitor.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DenningT08
-
Lambda-Calculus.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Dezani-CiancagliniH08
-
Data Handling in Intelligent Transportation Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DillenburgN08
-
Digital Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DinechinEMR08
-
Statistical Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Domingo-Ferrer08
-
Class and Object.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/DongH08
-
Home Automation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Douligeris08
-
Evolutionary Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Dracopoulos08
-
Operating Systems for Wireless Embedded Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Dunkels08
-
Information Age.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Eisner08
-
Geometric Modeling in Computer Vision: An Introduction to Projective Geometry.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Elias08
-
Network Flow and Congestion Control.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Eryilmaz08
-
Parallel Programming Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Evans08
-
Autonomous Surveillance Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Everett08
-
Answer Set Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/FaberLR08
-
Multiagent Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Fan08
-
Hopfield Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Fausett08
-
Video Conferencing and IP Telephony.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Feng08
-
Vienna Development Method.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/FitzgeraldLV08
-
Computer Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Flynn08
-
Spatial Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GandhiKS08
-
Neural Controllers.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GargK08
-
Time and State in Asynchronous Distributed Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GargM08
-
Software Architecture.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Garlan08
-
Very Large Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GarofalakisP08
-
Genetic Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GenL08
-
Hardware Based Rapid Prototyping.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GlesnerMH08
-
Software Reliability.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Gokhale08
-
Instruction Sets.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GokhaleS08
-
Concurrent Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Gomaa08
-
Network Security Fundamentals.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GrahamFL08
-
Deductive Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GrantM08
-
Quantum Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Gruska08
-
Wide Area Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Gu08
-
Peer-to-Peer Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GuoZ08
-
Coordination and Synchronization: Designing Practical Detectors for Large-Scale Distributed Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Gupta08
-
Women in Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/GurerLBDHCCGMPWSSCTG08
-
Computing Pre-University: Challenges in K-12 Computing Education.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Haberman08
-
Radiometric Camera Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Hamey08
-
Image Segmentation by Region Based and Watershed Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Hanbury08
-
Computer Engineering Education.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Harmada08
-
Formal Program Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HartonSK08
-
Algebraic Coding Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HellesethK08
-
Bioinformatic Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HerbertSWPWBHW08
-
Software Engineering for Telecommunications Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HerzbergR08
-
Decision Support Systems: Foundations and Variations.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Holsapple08
-
Cerebellar Model Arithmetic Computer.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Horvath08
-
Robot Path Planning.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Hsu08
-
Content-Based Multimedia Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HuaR08
-
Parallel Database Management Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HuaT08
-
Solid Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Hui08
-
Surface Deformation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Hui08a
-
Surface Modeling.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Hui08b
-
Kernel-Based Topographic Maps: Theory and Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Hulle08
-
Dataflow Computers: Their History and Future.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HursonK08
-
Virtual Memory and Buffer Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/HwangKK08
-
Electronic Warfare.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Inkol08
-
Geometric Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/JeffersonS08
-
Markov Chains.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Johansen08
-
Probability and Statistics.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Johnson08
-
Fault-Tolerant Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/JoshiPS08
-
Data Classification.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Juhola08
-
Interconnection Networks for Parallel Computers.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/JurczykSS08
-
Graph Theory and Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KagarisT08
-
Fuzzy Logic Control Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KamalasadanA08
-
Knowledge Acquisition.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Kamel08
-
Geometric Camera Calibration.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KannalaHB08
-
Data Compression Codes, Lossy.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Kari08
-
Expert Decision System for Robot Selection.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Karsak08
-
Medical Image Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KassimY08
-
Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Katz08
-
Real-Time Systems: An Introduction and the State-of-the-Art.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KaviAH08
-
Software Instrumentation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KempfKG08
-
Software Module Risk Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KhoshgoftaarS08
-
Computer-Supported Asynchronous Learning: The Relevance of Communication and Facilitation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Kienle08
-
Software Reusability.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Kim08
-
Assembly Language.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/King08
-
Information Algebra.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KohlasPS08
-
Computer Animation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Komura08
-
Software Safety.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Kornecki08
-
Information Systems and Computer Science and Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Korukonda08
-
Software Performance Evaluation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Kounev08
-
Lighting.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KrivanekP08
-
Design Patterns.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Ku08
-
Formal Specification.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KulczyckiSRY08
-
Ad Hoc and Sensor Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KumarW08
-
Software Verification and Validation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/KungZ08
-
Input Devices.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LaViola08
-
Discrete Event Systems: Untimed Models and their Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Lafortune08
-
Machine Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LaiDW08
-
Relational Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Laurent08
-
Knowledge-Based Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LeakeR08
-
Queueing Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LeeK08
-
Biologically Inspired Neural Computation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LeondopulosM08
-
Computer Games.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Li08
-
Parametric Surface Rendering.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Li08a
-
Video Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LiWN08
-
Software Effort Prediction.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LimG08
-
Transaction Processing in Mobile, Heterogeneous Database Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LimHJ08
-
Collaborative Virtual Environment: Applications.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LinZ08
-
Collaborative Virtual Environment: System Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LinZ08a
-
Collaborative Virtual Environment: Web-Based Issues.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LinZ08b
-
Scale-Space.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Lindeberg08
-
Real Time Database Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Lindstrom08
-
Entity-Relationship Model.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LingL08
-
Embedded Software.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Linn08
-
3-D Point Correspondence and Registration.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Liu08
-
Autonomy-Oriented Computing (AOC).
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LiuJT08
-
System Monitoring.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LiuT08
-
Distributed Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LiuZ08
-
Computerized Dictionaries: Integrating Portable Devices, Translation Software, and Web Dictionaries to Maximize Learning.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Loucky08
-
Ethics and Professional Responsibility in Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LouiM08
-
Carry Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LuR08
-
Rapid Prototyping.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Luqi08
-
Backtracking.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/LynceMM08
-
Knowledge Management Application.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Maier08
-
Reason Maintenance Systems: Tools for Foundations-Based Belief Revision.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Malheiro08
-
Document Image Analysis and Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Manmatha08
-
Computer-Aided Instruction.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Mann08
-
Statistical Methods for Target Tracking.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Maskell08
-
Metropolitan Area Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Maxemchuk08
-
Quality in Computer Science and Computer Engineering Education.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/McGettrick08
-
Optical Disk Data Storage, Distribution and Retrieval.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/McLeod08
-
Network Reliability and Fault-Tolerance.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Medhi08
-
Fuzzy Modeling Fundamentals.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/MelinC08
-
Fractals.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Mendivil08
-
Data Search Engine.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/MengH08
-
Agent Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Meyer08
-
Multigrid Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/MijalkovicM08
-
Addressing: Direct and Indirect.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Milenkovic08
-
Digital Sound Synthesis for Multimedia Audio.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Miranda08
-
Autonomous Decentralized Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Mori08
-
Service-Oriented Architecture and Web Services.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/MoserM08
-
Software Testing: Testing New Software Paradigms and New Artifacts.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Muccini08
-
Home Computing Services.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/MundorfK08
-
Bayesian Belief Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/NeufeldH08
-
Software Configuration Management.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Nguyen08
-
Expert Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/OLeary08
-
Robotic Tactile Sensors.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Ohka08
-
Dynamic Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/OkaW08
-
Reduced Instruction Set Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Oklobdzija08
-
Data Structures and Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/OliveiraPP08
-
Large-Scale Group Collaboration Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/OpyrchalP08
-
Formal Logic.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Palomino08
-
Edge Detection in Grayscale, Color, and Range Images.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ParkM08
-
Computational Number Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Patterson08
-
Chomsky Hierarchy.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Paun08
-
Rough Set Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/PawlakPS08
-
Neural Network Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Pedrycz08
-
Model Checking.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/PeledPS08
-
Agent-Oriented Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Perini08
-
Computational Intelligence.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/PetersP08
-
Parallel and Vector Programming Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Pingali08
-
Data Storage on Magnetic Disks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Piramanayagam08
-
Multicast Protocols and Algorithms.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/PolyzosX08
-
Distributed Project Management.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/PrikladnickiA08
-
Clusters and Grids.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Prodan08
-
Distance Education in Computer Science.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/PullenM08
-
Floating-Point Computer Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/QuinnellJ08
-
Computing Pre-University: Secondary Level Computing Curricula.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Ragonis08
-
Communication Processors for Wireless Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/RajagopalC08
-
Color: Color Models.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/RamanathD08
-
Color Perception.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/RamanathD08a
-
Geographic Information Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Ramirez08
-
CD-ROMs and Computer Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/RankyRR08
-
Authentication, Access Control, and Information Flow.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Ray08
-
Rendering.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ReinhardKA08
-
Programming Models: Client - Server, Process Groups, and Peer-to-Peer.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Renesse08
-
Failure Detectors for Asynchronous Distributed Systems: An Introduction.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Rennes08
-
Data Warehouse.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Rizzi08
-
Software Dependability.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Roshandel08
-
Side Effects.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Sabry08
-
Information Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SageR08
-
Theory and Algorithms of Perceptual Grouping.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Salgian08
-
Wireless Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SamakaK08
-
Aircraft Computers.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Satterthwaite08
-
Pattern Recognition.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Schalkoff08
-
Middleware for Distributed Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SchantzS08
-
Active Database Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ScheuermannT08
-
Unified Modeling Language (UML).
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Selic08
-
Software Quality Modeling as a Reliability Tool.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SeliyaK08
-
Distributed and Collaborative Development.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ShimPL08
-
Software Quality Classification Models.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ShinG08
-
Methods for Acceleration of Convergence (Extrapolation) of Vector Sequences.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Sidi08
-
Software Metrics.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SinhaY08
-
Program Compilers.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Sloane08
-
Nuclear Reactor Instrumentation and Control Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SmidtsA08
-
Robust Resource Allocation in Heterogeneous Parallel and Distributed Computing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SmithSM08
-
LCD Design Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SmorfaOM08
-
Fluency with Information Technology.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Snyder08
-
Time-Sharing Systems.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Sodan08
-
Linear and Nonlinear Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Solow08
-
Analytical Customer Relationship Management.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SrivastavaVLHW08
-
Microcomputers.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Stachniak08
-
Graphical User Interfaces.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/StadlerL08
-
FPGA PAL Design Tools.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Sterpone08
-
Requirements Specification and Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Subramanian08
-
Asynchronous Transfer Mode Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Suda08
-
Cognitive Systems and Cognitive Architectures.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/SunB08
-
Fixed-Point Computer Arithmetic.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Swartzlander08
-
Transport Layer.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/TangACL08
-
Shape from Shading.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/TankusSY08
-
Temporal Databases.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Tansel08
-
Crowd Simulation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Thalmann08
-
Perspectives on Software Engineering Professionalism.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Thompson08
-
Managing and Mining Multimedia Data, Animations and Annotations.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ThuraisinghamPKW08
-
Software Aging and Rejuvenation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/TrivediV08
-
Communication-Induced Checkpointing Protocols and Rollback-Dependency Trackability: A Survey.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/TsaiW08
-
Knowledge Verification.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/TsaiZSJ08
-
WiMAX Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/TsaoL08
-
Introduction to Game Theory.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/TuylsN08
-
Intelligent Power System.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Vale08
-
Data Security.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/VimercatiSJ08
-
Software Product Certification.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Voas08
-
Virtual Clothing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/VolinoLM08
-
Artifical Intelligence Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Vranes08
-
Analog-to-Digital Conversion in the Early Twenty-First Century.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Walden08
-
Optical Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Wang08
-
Specification Formalisms and Models.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Wang08a
-
Fingerprint Identification.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WangB08
-
Artificial Neural Networks.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WangF08
-
Logic Testing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WangSC08
-
Database Languages.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WangSKY08
-
Disk Storage.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WangWDH08
-
Regression Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Weisberg08
-
Parameter Passing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Weiss08
-
Agile Software Development.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WilliamsV08
-
Program Transformation: What, How, and Why.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Winter08
-
Mixed Integer Programming.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Wolsey08
-
Data Analysis.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WuC08
-
Data Mining.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/WuZZ08
-
Software Security.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Xu08
-
Radiosity.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/XuP08
-
Warping and Morphing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Yamazaki08
-
Visual Database.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/YangK08
-
Granular Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/YaoZ08
-
OS for Graphics and Multimedia.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Yau08
-
Mobile and Ubiquitous Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/YauHGY08
-
Computing Accreditation: Evolution and Trends Associated with U.S. Accrediting Agencies.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/YaverbaumR08
-
Active Contours: Snakes.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Yilmaz08
-
Level Set Methods.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Yilmaz08a
-
Data Communication.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Yu08
-
High-Quality Texture Mapping and Rendering of Point Models.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/YuanNC08
-
File Organizations.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZezulaDB08
-
Software Component Repositories.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Zhang08
-
VLSI Circuit Layout.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Zhang08a
-
Robot Kinematics.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhangBG08
-
Transaction Processing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhangJL08
-
Visual Software Engineering.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhangKC08
-
Algorithm-Based Fault-Tolerant Cryptography.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhangL08
-
Mesh Deformation.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhangLB08
-
Shared Memory Multiprocessors.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhangP08
-
Intelligent Agent.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhangZ08
-
Face Recognition Techniques.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Zhao08
-
Web Intelligence (WI).
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/ZhongLY08
-
Environmental Science Computing.
https://dblp.l3s.de/d2r/resource/publications/reference/wiley/Zlatev08
-
50 Jahre Studiengang Informatik an der RWTH
https://dblp.l3s.de/d2r/resource/publications/tr/ac/50
-
Computer Science Curricula 2013
https://dblp.l3s.de/d2r/resource/publications/tr/acm/CS2013
-
The 1995 SQL Reunion: People, Project, and Politics, May 29, 1995.
https://dblp.l3s.de/d2r/resource/publications/tr/dec/SRC1997-018
-
Distributed Object Management Technology.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TM-0014-06-88-165
-
Object Model Capabilities For Distributed Object Management.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TM-0149-06-89-165
-
Object Data Model Facilities for Multimedia Data Types.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TM-0332-11-90-165
-
Towards a Transaction Management System for DOM.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0146-06-91-165
-
Object Data Language Facilities for Multimedia Data Types.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0169-12-91-165
-
Integrating Heterogeneous, Autonomous, Distributed Applications Using the DOM Prototype.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0174-12-91-165
-
DARWIN: On the Incremental Migration of Legacy Information Systems
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0222-10-92-165
-
A 'RISC' Object Model for Object System Interoperation: Concepts and Applications.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0231-08-93-165
-
Experiments with Dispatching in a Distributed Object System.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0236-09-93-165
-
MetaObject Protocol Concepts for a RISC Object Model.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0244-12-93-165
-
An Evaluation of Object-Oriented DBMS Developments: 1994 Edition.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0263-08-94-165
-
Integrating Object-Oriented Applications and Middleware with Relational Databases.
https://dblp.l3s.de/d2r/resource/publications/tr/gte/TR-0310-11-95-165
-
XRM - An Extended (N-ary) Relational Memory.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/G320-2096
-
SQL/Data System for VSE: A Relational Data System for Application Development.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/G320-6590
-
SQL/Data System, General Information Manual.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/GH24-5012
-
SQL/Data System, Conpects and Facilities.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/GH24-5013
-
A Brief Overlook of LILOG-DB
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS102
-
The Design and Implementation of TLPROLOG (V. 2.0) - Intermediate Report
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS103
-
Compilation of Complex DATALOG with Stratified Negation
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS104
-
Rule Rewriting Techniken zur globalen Optimierung von FLL-Programmen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS105
-
KL-ONE: Eine Einf√ľhrung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS106
-
Der LILOG-DB Fact Manager: Ein Datenbankkern zur Speicherung variabel strukturierter komplexer Objekte
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS107
-
Tableau Calculus for Order Sorted Logic
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS108
-
OSKAR - A PROLOG Programm for Modelling Dimensional Designation and Positional Variation of Objects in Space
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS109
-
Strategien zur Pronominalisierung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS110
-
A Logical Operational Semantics of Full Prolog
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS111
-
Wissensbasierte Systeme in der Medizin: GMDS/GI, Abstracts des 1. gemeinsamen Workshops der AG Expertensysteme der GMDS und der FG Diagnostik und Klassifikation im GI-Fachausschuß 1.5, 29.-30. März 1990, Heidelberg
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS112
-
An Order-Sorted Logic for Knowledge Representation Systems
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS113
-
Das Projekt EXCEPT: Expert-System for Computer-Aided Environmental Planning Tasks
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS114
-
A Logical Operational Semantics of Full Prolog Part II: Built-in Predicates for Database Manipulations
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS115
-
A Logical Operational Semantics of Full Prolog Part III: Built-in Predicates for Files, Terms, Arithmetic and Input-Output
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS117
-
Development and Programming of Deductive Databases with PROTOS-L
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS118
-
Lokale Verben und Präpositionen: Semantische und konzeptuelle Verarbeitung in LEU II
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS119
-
Mathematische Grundlagen der formalen Linguistik - Ein Kompendium
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS121
-
Interaktion von propositionalen und bildhaften Repräsentationen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS122
-
Das Problem der VP-Ellipsen im Rahmen einer Theorie der Sachverhaltsanaphern
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS123
-
Disjunctive Unification
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS124
-
Erster EXCEPT-Workshop: Computerunterst√ľtzte Umweltvertr√§glichkeitspr√ľfung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS125
-
The Institute for Knowledge Based Systems in the IBM Germany Scientific Center
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS126
-
Wortbedeutungen und lexikalische Repräsentationen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS127
-
A Tool Kit for Knowledge Based Production Planning Systems
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS128
-
Rekonstruktion von Hintergrundwissen f√ľr ein wissensbasiertes textverstehendes System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS129
-
Die Konzeption des EXCEPT-Systems: Ein √úberblick
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS130
-
Syntactic Processing of Unknown Words
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS131
-
An Inference Engine for Function Free Logic Programs
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS132
-
A Persistent Store for Large Shared Knowledge Bases
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS133
-
Improving the Concurrency of Integrity Checks and Write Operations
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS134
-
Fully Persistent B+-trees
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS135
-
Spezifikation eines Theorembeweisers f√ľr dreiwertige First-Order Logik.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS136
-
Natural Language Understanding in LILOG: An Intermediate Overview
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS137
-
Position und Bewegung: Zur Semantik lokaler Verben
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS138
-
Ein modularer Ansatz f√ľr prinzipienbasiertes Parsing
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS139
-
Stepwise Software Development with Algebraic Specifications
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS140
-
Integrating a Deductive Database System with a Warren Abstract Machine
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS141
-
Complexity of Logical Decision Problems: An Introduction
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS143
-
A Formal Operational Semantics for PROLOG III: Using Dynamic Algebras
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS144
-
Projekt "Elektronische W√∂rterb√ľcher/Lexika": Abschlu√übericht der Definitionsphase
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS145
-
Der Lambek-Kalk√ľl. Eine Logik f√ľr lexikalische Grammatiken
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS146
-
Modelling Spatial Knowledge on a Linguistic Basis
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS147
-
√úber die W's der Textgenerierung: Was, wof√ľr, wo und wie: Wissensbasierte Generierung von informierenden Texten in einem Auskunftssystem
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS148
-
Modeling Structured Open Worlds in a Database System: The FLL-Approach
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS149
-
EFTA: A Database Retrieval Algebra for Feature Terms
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS150
-
Datenbankkonzepte f√ľr wissensbasierte Systeme
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS151
-
Incremental Vocabulary Extensions in Text Understanding Systems
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS152
-
Sorted Feature Terms and Relational Dependencies
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS153
-
Sort Processing in a Deductive Database System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS154
-
The LILOG Knowledge Representation System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS156
-
Processing Spatial Knowledge in LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS157
-
Die Behandlung von mehrdeutigen Verben in der Maschinellen √úbersetzung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS158
-
On the Problem of Masking Special Errors by Serial Signature Analysis
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS159
-
Variable Subkategorisierung: Eine Theorie unpersönlicher Einbettungen im Deutschen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS161
-
Temporales Schlie√üen in einem nat√ľrlichsprachlichen System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS162
-
An Overview on Planning Applications in PROTOS-L
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS163
-
Untersuchungen zum Grundwortschatz
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS164
-
Knowledge in Operation
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS165
-
Ein praktischer Algorithmus f√ľr die E-Unifikation
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS166
-
An Environment for Experimentation with Parsing Strategies
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS167
-
The Stuttgart Type Unification Formalism - User Manual
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS168
-
Lexical Representation of Idioms
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS169
-
Ein Beispiel zur wissensbasierten Produktionsplanung mit PROTOS-L.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS170
-
Die Ontologie und Axiomatik der Wissensbasis von LEU/2 - Erfahrungen, Probleme, Ausblicke
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS171
-
An Anaphora Resolution Procedure for Machine Translation
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS172
-
Modularizing Knowledge in LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS173
-
Mathematische Grundlagen der formalen Linguistik - Ein Kompendium
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS174
-
Draft Report of the Logic Programming Language PROTOS-L
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS175
-
Integration eines deduktiven Datenbanksystems in eine Logikprogrammiersprache
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS176
-
LMT - Machine Translation Demonstration
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS177
-
Domain Restriction and Other Kinds of Reference Set Operations in Sentence and Discourse Semantics.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS178
-
Persistence and Justified Causation: Some Remarks on Nonmonotonic Temporal Reasoning
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS179
-
Prozedurale Semantik. Repräsentation der Sprechergegenwart.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS180
-
Extending the Warren Abstract Machine to Polymorphic Order-Sorted Resolution
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS181
-
A Model Elimination Calculus for Generalized Clauses
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS182
-
A Polynomial Method for Finding Irregularities in Large Example Sets
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS183
-
International Workshop on Terminological Logics - Proceedings
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS184
-
Presupposition, Anaphora, and Lexical Content.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS185
-
ICL - An Integrity Control Language: Konzeption und Implementierung einer formalen Sprache zur Integritätskontrolle von Wissensbasen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS186
-
Anaphora Resolution for Machine Translation: A Study
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS187
-
Möglichkeiten des Einsatzes eines dreiwertigen Theorembeweisers
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS188
-
Quantitative Analysen zu W√∂rterb√ľchern
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS189
-
Aspekte der Generierung von Wegbeschreibungen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS190
-
Die Repräsentation räumlichen Wissens und die Behandlung von Einbettungsproblemen mit Quadtreedepiktionen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS191
-
Ereignisse: Ihre Logik und Ontologie aus textsemantischer Sicht
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS192
-
ILFA Interface Concept
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS193
-
Modals and the Scope of Negation, On the Treatment of Optionality in HPSG, Some Properties of Negation in German.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS194
-
Umweltbewertung mit EXCEPT: Darstellung aus ökologischer Sicht
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS195
-
Ein neuer Ansatz zur Integration unterschiedlicher lexikalischer Resourcen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS196
-
Leistungsanalyse des Datenbanksystems LILOG-DB
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS198
-
Parenthetische Konstruktionen des Deutschen.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS199
-
A WAM Extension for Type-Constraint Logic Programming: Specification and Correctness Proof
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS200
-
Differential Closure Computation for General Horn-Clause Queries
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS201
-
The Term Retrieval Abstract Machine
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS202
-
Transitive Closure: New Aspects of an Old Theme
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS203
-
Results on Non-Monotonic Logics.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS204
-
Correctness Proof for the WAM
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS205
-
Expressing Linguistic Knowledge in STUF '91
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS206
-
Ein Lernverfahren f√ľr den automatischen Erwerb von Kontrollwissen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS207
-
Konzeption und Implementierung von Gleichheit f√ľr einen tableau-basierten Theorem-Beweiser
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS208
-
Prolog and Natural Language Processing
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS209
-
Richtungsangabe oder Wegkonnektor? R√§mliches "Zur√ľck" und seine Semantik
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS210
-
Zur Verarbeitung von Lokalisierungsausdr√ľcken in einem hybriden System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS211
-
Syntaktische Informationseinheiten zu deutschen Adjektiven
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS212
-
"Der Film √∂ded das Publikum" - Zum Aufbau eines maschinenlesbaren W√∂rterbuchs f√ľr deutsche Verben
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS213
-
Syntaktische Merkmale deutsche Substantive
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS214
-
Untersuchung zur verteilten Produktionsplanung mit Methoden der logischen Programmierung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS215
-
Zur Systematik morphologischer Paradigmen: Die deutschen Verben in der Computermorphologie
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS217
-
Konzeptuelles Design einer mehrsprachigen lexikalischen Datenbank f√ľr die maschinelle √úbersetzung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS218
-
Persistente Datenspeicherung in einer logischen Programmiersprache mit relationalen und deduktiven Datenbanken
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS219
-
"Dictionary Dialog" - Entwurf des Funktionsumfangs f√ľr eine Benutzerschnittstelle eines integrierten maschinellen/maschinenunterst√ľtzten √úbersetzungssystems und prototypische Erstellung der Bildschirmfolge f√ľr die Funktion "Semantische Relation"
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS220
-
On the Treatment of Compounds in Machine Translation. A Study
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS221
-
Using Knowledge-Based Methods to Administrate an Access Control System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS222
-
Mengenkonzepte in Unifikationsgrammatiken
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS223
-
Syntaktische Analysevorschl√§ge zur Behandlung von lokalen Pr√§fixverben in einem System f√ľr die Generierung von Wegbeschreibungen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS224
-
A Combined Symbolic-Empirical Apprach for the Automatic Translation of Compounds
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS225
-
THOR - A System for Computing in Equational Theories
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS226
-
The Many-Valued Theorem Prover 3TAP.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS227
-
How could a good system of practical NLP look like?
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS228
-
Graph Based Extension of the LILOG Inference Engine
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS229
-
Semantische Repräsentation von Plural-Phänomenen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS230
-
A Reusable Lexical Database Tool for Machine Translation
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS231
-
Multiword Lexemes: A Monolingual and Contrastive Typology for NLP and MT
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS232
-
Statistische Untersuchungen an einsprachigen Zeitungstexten
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS233
-
On the Role of Reasoning about Change in the Projection of Presuppositions
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS234
-
Derivationsmorphologie in einem √úbersetzungssystem
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS235
-
DInG - ein Dom√§nen-orientierter Inkrementeller und Integrierter Generator f√ľr koh√§rente Texte
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS237
-
Symmetric Coordination: An Alternative Theory of Phrase Structure
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS241
-
Verarbeitung nat√ľrlicher Sprache
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS66
-
Quantifikation, Plural, Ereignisse und ihre Argumente in einer mehrsortigen Sprache der Prädikatenlogik erster Stufe
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS67
-
Attributive Concept Descriptions with Unions and Complements
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS68
-
A Knowledge Level Analysis of Belief Revision
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS69
-
Zur Syntax pränominaler Elemente in einer kategorialen Unifikationsgrammatik des Deutschen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS70
-
Database Support for the PROTOS-L System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS71
-
Reasoning for Text Understanding - Knowledge Processing in the 1st LILOG-Prototype
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS72
-
Pluralbehandlung in nat√ľrlichsprachlichen Wissensverabeitungssystemen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS73
-
Koordination von nichtverbalen Satzkonstituenten
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS74
-
How to Fit the Lambek Calculus into the Chomsky Hierarchy
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS80
-
Representation and Reasoning with Attributive Descriptions
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS81
-
Terminological Reasoning is Inherently Intractable
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS82
-
Subsumtion f√ľr eine erweiterte attributive Sortenbeschreibungssprache
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS83
-
Lernverfahren zur Vervollständigung von Hornklauselmengen durch inverse Resolution
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS84
-
Integration von Constraints in die LLILOG Sortenbeschreibungssprache
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS85
-
An Order Sorted Predicate Logic with Closely Coupled Taxonomic Information
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS86
-
Attribute Inheritance Implemented on Top of a Relational Database System
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS87
-
Types, Modules and Databases in the Logic Programming Language PROTOS-L
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS88
-
PROTOS-L: Towards a Knowledge Base Programming Language
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS89
-
Knowledge Representation in LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS90
-
Zur intelligenten Organisation von Wissensbest√§nden in k√ľnstlichen Systemen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS91
-
Erweiterung der Wissensrepräsentationssprache L-LILOG um Konstrukte zur Spezifikation von Kontrollinformation
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS92
-
Feature Constraint Logics for Unification Grammars
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS93
-
The Algebra of Feature Graph Specifications
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS94
-
A Calculus for Order-Sorted Predicate Logic with Sort Literals
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS95
-
√úber Vergleichskonstruktionen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS96
-
On Subsumption and Semiunifaction in Feature Algebras
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS97
-
EFTA Query Processing in LILOG-DB
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS98
-
Sort-Lattice Management in LILOG-DB
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/IWBS99
-
Datenbankunterst√ľtzung f√ľr wissensbasierte Systeme
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG10
-
Der modale Infinitiv: Syntaktische oder lexikalische Beschreibung?
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG11
-
On Structuring Domain-Specific Knowledge
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG12
-
Word Order and Focus Projection
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG13
-
Eine Prolog-Theorie f√ľr zeitliche Beziehungen zwischen Ereignissen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG14
-
Wissensrepräsentation und Maschinelles Lernen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG15
-
Prozedurale Aspekte der Wegplanung und Wegbeschreibung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG17
-
Gebietskonstituierende Prozesse
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG18
-
Vor√ľberlegungen zur depiktionalen Repr√§sentation r√§umlichen Wissens
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG19
-
LILOG - Linguistische und logische Methoden f√ľr das maschinelle Verstehen des Deutschen - Projektbeschreibung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG1a
-
A Conceptual Model for Time
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG2
-
Mentale Bilder und Wegbedeutungen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG20
-
Chart-Parsing of Unification-Based Grammars with ID/LP-Rules
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG22
-
At Ease with "AT"
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG23
-
Representation and Accessibility of Discourse Referents
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG24
-
Textunderstanding in LILOG - Sorts and Reference Objects
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG25
-
Computational aspects of three-valued logic
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG26
-
Eine dreiwertige Logik zur Verarbeitung partieller Information
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG27
-
Weiterentwicklung des Earley-Algorithmus f√ľr kontextfreie und ID/LP-Grammatiken
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG28
-
Die Struktur des Lexikons f√ľr LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG29
-
Implementation Aspects of a Natural Language Understanding System in a Prolog/DB Environment
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG3
-
Wissensbasisverwaltung f√ľr LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG30
-
A Model for Discourse Particles
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG31
-
Die Sloppy/Referenzielle Ambiguität: Bildungssyntax oder Diskursrepräsentationstheorie?
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG32
-
A Feature Logic with Subsorts
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG33
-
Über Ansätze zur Darstellung von Konzepten und Prototypen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG34
-
Zum Begriff "Argumentstruktur" im Rahmen generativer worbildungstheoretischer Ansätze
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG35
-
Integrating Model Theoretic and Proof Theoretic Interpretation of Logic Programs
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG36
-
On the Interpretation of Equality, Sorts, and Logic Programming
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG37
-
Semantics of Logic Programs with Equational Abstract Data Type Specifications
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG38
-
Feature Graphs and Abstract Data Types: A Unifying Approach
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG39
-
An Algebraic Characterization of STUF
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG40
-
The Knowledge Representation Language LLILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG41
-
Qualitätssicherung durch Programmverifikation und algebraische Methoden in der Softwareentwicklung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG42
-
Ereignisse und Repräsentationen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG43
-
An Effective Representation of Complex Clauses in a Relational Database
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG44
-
Cognitive Linguistics: The Processing of Spatial Concepts
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG45
-
Operationen in erweiterten Typunifikationsformalismen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG46
-
Vertr√§glichkeitspr√ľfungen f√ľr die Verarbeitung r√§umlichen Wissens
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG47
-
Simulation Sprachlichen Verstehens: Generelle Probleme bei der semantischen Interpretation der nat√ľrlichen Sprache
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG5
-
Logisches Clustering von PROTOS-L Prozeduren
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG50
-
Resolution with Feature Unification
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG51
-
Definite Resolution over Constraint Languages
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG53
-
LILOG-DB: Database Support for Knowledge-Based Systems
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG56
-
FLL: A First-Order Language for Deductive Retrieval of Feature Terms
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG57
-
EFTA: An Algebra for Deductive Retrieval of Feature Terms
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG58
-
Algebraical Optimization of FTA-Expressions
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG59
-
Mathematical Logic and Artificial Intelligence
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG6
-
Ein Fact Manager zur persistenten Speicherung variabel strukturierter komplexer Objekte
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG60
-
Mengenorientierte Auswertung von Anfragen in der Logikprogrammiersprache PROLOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG61
-
The Semantics of Asserting and Retracting Clauses to Logic Programs
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG7
-
An Approach to Manage Large Inheritance Networks
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG8
-
Zeit und Aspekt bei der Verarbeitung nat√ľrlicher Sprachen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOG9
-
Standards f√ľr das Programmieren in Prolog f√ľr LILOG, Version 1.0
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM1
-
LILOG Prototype I Grammar Documentation: Semantics
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM10
-
WebS - ein System zur Generierung von Wegbeschreibungen
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM11
-
Verarbeitung von Vagheits- und Unsicherheitsbewertungen: Tools f√ľr das Testen von Ans√§tzen f√ľr die Unifikation und die Logikbehandlung von mit Unsicherheit und Vagheit bewerteten Graphen im L-LILOG-STUF-Graphenkonzept
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM12
-
Standards f√ľr das Programmieren in Prolog f√ľr LILOG, Version 3.3
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM14
-
Zur Systemarchitektur von LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM2
-
Ein Transaktionskonzept f√ľr LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM3
-
Zur Behandlung komplexer Objekte in LILOG
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM4
-
Standards f√ľr das Programmieren in Prolog f√ľr LILOG, Version 2.0
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM5
-
Parsingstrategien f√ľr Unifikationsgrammatiken mit ID/LP-Regeln
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM6
-
Elsa√ü-Wanderung f√ľr Linguisten: Exemplarische Analyse und Repr√§sentation eines Satzes aus einer Reisebeschreibung
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM8
-
Dokumentation der Syntax der LILOG-Grammatik
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/LILOGM9
-
The Gamma-0 n-ary Relational Data Base Interface Specifications of Objects and Operations.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ1200
-
Using a Structured English Query Language as a Data Definition Facility.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ1318
-
A Shared Segment and Interprocess Communication Facility for VM/370
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ1579
-
RENDEZVOUS Version 1: An Experimental English Language Query Formulation System for Casual Users of Relational Data Bases.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ2144
-
Slide Search.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ2274
-
Transactions and Consistency in Distributed Database Systems.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ2555
-
The Compilation of a High Level Data Language.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ2598
-
Index Path Length Evaluation for the Research Storage System of System R.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ2736
-
Database Snapshots.
https://dblp.l3s.de/d2r/resource/publications/tr/ibm/RJ2772
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2012
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2012
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2013
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2013
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2014
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2014
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2015
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2015
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2016
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2016
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2017
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2017
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2018
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2018
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2019
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2019
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2020
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2020
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2021
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2021
-
Schloss Dagstuhl - Jahresbericht / Annual Report 2022
https://dblp.l3s.de/d2r/resource/publications/tr/lzi/DagAnnRep2022
-
Meltdown
https://dblp.l3s.de/d2r/resource/publications/tr/meltdown/m18
-
Spectre Attacks: Exploiting Speculative Execution.
https://dblp.l3s.de/d2r/resource/publications/tr/meltdown/s18
-
Modification of User Defined Types
https://dblp.l3s.de/d2r/resource/publications/tr/sql/X3H2-90-292
-
Object Oriented DBMS as a Generalization of Relational DBMS
https://dblp.l3s.de/d2r/resource/publications/tr/sql/X3H2-90-412
-
Object ADTs (with improvements for Value ADTs)
https://dblp.l3s.de/d2r/resource/publications/tr/sql/X3H2-91-083rev1
-
Inheritance for ADTs (revised)
https://dblp.l3s.de/d2r/resource/publications/tr/sql/X3H2-91-133rev1
-
Unification of Value and Object ADTs
https://dblp.l3s.de/d2r/resource/publications/tr/sql/X3H2-92-062
-
Trust Region Methods for Solving the Optimal Output Feedback Design Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-01
-
A Lagrangian Method for Solving the Optimal Output Feedback Design Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-02
-
Optimal Static Output Feedback Design By Using a Trust Region Interior Point Method
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-03
-
Zur Berechnung optimaler Steuerungen √ľber Momentenungleichungen
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-04
-
Numerical Solution of Control Problems under Uncertainty and Perturbation of Input Data with Applications in Finance
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-05
-
The Inhomogeneous BMAP/G/infinity Queue
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-06
-
On Markov-Additive Jump Processes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-07
-
Reduction of Some Optimal Control Problems with Variational Inequalities to Ill-Posed Optimal Control Problems with Linear State Equations
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-08
-
Parameter Estimation for BMAPs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-09
-
An Indefinite Preconditioner for KKT Systems Arising in Optimal Control Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-10
-
Operator-Geometric Solutions for the M/G/k Queue and its Variants
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-11
-
Nonapproximability Results for Partially Observable Markov Decision Processes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-12
-
Lower Bounds for Randomized Branching Programs with a Big OBDD Part
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI00-13
-
Non-quadratic Proximal Regularization with Application to Variational Inequalities in Hilbert Spaces
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-01
-
Stochastic Models for Communication Networks with Moving Customers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-02
-
Customer Motion in Queueing Models: The Use of Tangent Vector Fields
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-03
-
A Heuristic for (+)-OBDD Minimization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-06
-
Improving XOR-Node Placement for (+)-OBDDs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-07
-
Reduction of Generalized Semi-Infinite Programming Problems to Semi-Infinite or Piece-Wise Smooth Programming Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-08
-
WWW.BDD-PORTAL.ORG: An Experimentation Platform for Binary Decision Diagram Algorithms
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-09
-
On the GI/G/k Queue with Lebesgue-Dominated Inter-Arrival Time Distribution
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-10
-
A Product Theorem for Markov Chains with Application to PF-Queueing Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-11
-
Succinct Solvers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-12
-
On Graph Models for Communicating Mobiles in Access Areas
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-13
-
An EM Algorithm for Batch Markovian Arrival Processes and its Comparison to a Simpler Estimation Procedure
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-14
-
IDDS: An Interactive Decentallzed Documentation System
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-15
-
Modular Partitioning for Improvement of Image Computation
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-16
-
On Regularisation of Nonconvex Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-17
-
Two short notes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-18
-
On Product Connection Theorems for Markov Chains
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-19
-
Interior Proximal Method for Variational Inequalities: Case of Non-paramonotone Operators
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-20
-
VisBDD - A Webbased Visualization Framework for OBDD Algorithms
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI01-21
-
From Markov Jump Processes to Inhomogeneous BMAPs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-01
-
On the Distribution of càdlàg Processes without Explosions
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-02
-
Quantization for Probability Measures in the Prohorov Metric
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-03
-
Quantization for Probability Measures with Respect to the Geometric Mean Error
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-04
-
Functional Quantization and Small Ball Probabilities for Gaussian Processes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-05
-
A Piecewise-Deterministic Model for Brownian Motion
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-06
-
An EM Algorithm for Platoon Arrival Processes in Discrete Time
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-07
-
Precise Interprocedural Dependence Analysis of Parallel Programs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-08
-
Polynomial Constants are Decidable
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-09
-
Interprocedural Invariants
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-10
-
An Optimization Algorithm for the MAP/PH/K Queue with Heterogeneous Servers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-11
-
Numerical Parameter Identification in Non-isothermal Multiphase Multicomponent Flow through Porous Media
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-12
-
Forward and Inverse Problems in Modeling of Multiphase Flow and Transport Through Heterogeneos Porous Media
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-13
-
Method for Global Optimization of Class of Nonlinear Bilevel Programming Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-14
-
Optimal Allocation of Jobs between Heterogeneous Servers in the Retrial MAP/PH/K Queue
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-15
-
No-Waiting Stations with Special Arrival Processes and Customer Motion
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-16
-
On the Expressiveness of Tree Set Operators
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-17
-
Vom M/G/1- zum BMAP/G/1-Modell
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-18
-
Approximating Semi-Markov Processes by MAPs, with an Application on Queueing Theory
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-19
-
Ordered Binary Decision Diagrams in Electronic Design Automation
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-20
-
tele-TASK - Teleteaching Anywhere Solution Kit
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-21
-
Weak Error Tolerance Criterion in Generalized Proximal Methods
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-22
-
Simultaneous Pseudo-Timestepping for PDE-model Based Optimization Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI02-23
-
Räumliche Markov-additive Prozesse und Bedienstationen ohne Warteraum
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI03-01
-
A New Proof of the Beckenbach Inequalities
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI03-02
-
Implement Role-Based Access Control with Attribute Certificates
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI03-03
-
tele-TASK - Teleteaching praxistauglich f√ľr den Universit√§tsalltag
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI03-04
-
Lock-Keeper Technology - A New Network Security Solution
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI03-05
-
Design and Implementation of a PHP-based Web Server for the Tele-Lab IT Security
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI03-06
-
A Generic Background Dissemination Service for Mobile Ad-Hoc Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI04-01
-
Medizinische Bildverarbeitung - eine √úbersicht
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI04-03
-
TI-jPACS - eine frei verf√ľgbare leistungsf√§hige Plattform zur medizinischen Bildverarbeitung und -visualisierung
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI04-04
-
10 Jahre ECCC - Eine Digitale Bibliothek in weltweiter Benutzung
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI04-05
-
Simultaneous Pseudo-Timestepping for Aerodynamic Shape Optimization Problems with State Constraints
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI04-06
-
An Efficient Method for Aerodynamic Shape Optimization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI04-07
-
Personal Name Matching: New Test Collections and a Social Network based Approach.
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI06-01
-
Distributed Script - A Mobile Application for Multi-hop Ad-hoc Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI06-02
-
Exact XML Type Checking in Polynomial Time.
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI06-04
-
Separating Counting Communication Complexity Classes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-01
-
The Structure Theorem for Linear Transfer Systems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-02
-
Successive Determination and Verification of Polytopes by their X-Rays
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-03
-
Upper and Lower Bounds for Certain Graph-Accessability-Problems on Bounded Alternating (omega)-Branching Programs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-04
-
A Note on Möbius Functions and the Communication Complexity of the Graph-Accessability-Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-05
-
Minkowski Addition of Polytopes: Computational Complexity and Applications to Gröbner Bases
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-06
-
Analysis and Manipulation of Boolean Functions in Terms of Decision Graphs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-07
-
Generalized Coloring for Tree-like Graphs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-08
-
Scheduling with Incompatible Jobs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-09
-
Efficient Analysis and Manipulation of OBDDs can be Extended to Read-once-only Branching Programs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-10
-
Scheduling with Constrained Processor Allocation for Interval Orders
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-11
-
On the Complexity of One Branching Graphs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-12
-
Product Form Solutions for Closed Synchronized Systems of Stochastic Sequential Processes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-13
-
One Strike Against the Min-Max Degree Triangulation Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-14
-
On the Complexity of a Licence Constrained Job Assignment Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-15
-
On the Solution of a Two Ball Trust Region Subproblem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-16
-
18. Workshop √ľber Komplexit√§tstheorie, effiziente Algorithmen und Datenstrukturen, Universit√§t Trier, 20. Oktober 1992 (Abstracts)
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-17
-
On the Use of Product Structure in Secant Methods for Nonlinear Least Squares Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-18
-
On a Fast Algorithm for Constrained Nonlinear Least Squares Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-19
-
Structured Quasi-Newton Methods for Optimization Problems in Hilbert Space
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-20
-
Performance Analysis of SDN Specific Error Procedures: Comparison of Step-by-Step and End-to-End Schemes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-21
-
On Multiplicative Structure in Quasi-Newton Methods for Nonlinear Equations
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-22
-
The Disjoint Cliques Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-23
-
Numerical Solution of a Semilinear Parabolic Control Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-24
-
The Complexity of Detecting Crossingfree Configurations in the Plane
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-25
-
Polytope Containment and Determination by Linear Probes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-26
-
On the Queue-Length-Distributions of the Ek/MX/1 Queue and of the Ek/GE/1 Queue under Repetitive-Service Blocking
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-27
-
On the Power of Polynomial Bit-Reductions
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI92-28
-
Scheduling of Conditional Executed Jobs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-01
-
Exact Analysis of Closed Synchronized Systems of Stochastic Sequential Processes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-02
-
A Rainbow about T-Colorings for Complete Graphs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-03
-
Scheduling of Conditional Executed Jobs on Unrelated Processors
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-04
-
Symmetric Functions in AC0[2]
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-05
-
Computational Complexity of Inner and Outer j-RADII of Polytopes in Finite-Dimensional Normed Spaces
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-06
-
How Much ExOR Improves on OR?
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-07
-
Combinational Logic Verification with FBDDs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-08
-
Efficient Manipulation of FBDDs by Means of a Modified OBDD-Package
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-09
-
On the G/GE/1 Queue
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-10
-
A Branch-and-Bound Decomposition Approach for Solving Quasiconvex-Concave Programs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-11
-
Efficient Boolean Manipulation with OBDD's can be Extended to FBDD's
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-12
-
A Pre-Dual for the Convolution Algebra D'(Gamma+)
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-13
-
External Tangents and Closedness of Cone + Subspace
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-14
-
Constraint Decomposition Algorithms in Global Optimization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-15
-
Complexity Classes with Finite Acceptance Types
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-16
-
Cross-Positive Matrices Revisited
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-17
-
On the Complexity of some Basic Problems in Computational Convexity: 1. Containment Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-18
-
On the Joint Distribution Functions of Order Statistics with Reference to Step-up Multiple Test Procedures
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-19
-
Boolean Manipulation with Free BDD's - First Experimental Results
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-20
-
Mod-2-OBDD's: A Generalization of OBDD's and EXOR-Sum-of-Products
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-21
-
A new Algorithm for Solving the General Quadratic Programming Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-22
-
A Decomposition Approach for the Global Minimization of Biconcave Functions over Polytopes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-23
-
Scheduling and Related Graph Theoretical Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI93-24
-
Largest j-Simplices in n-Polytopes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-01
-
On Continuous Deformations of Semi-Infinite Optimization Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-02
-
Some Heuristics for Generating Tree-like FBDD Types
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-03
-
The Möbius Function, Variations Ranks, and Theta(n)-Bounds on the Modular Communication Complexity of the Undirected Graph Connectivity Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-04
-
On the Complexity of Constructing Optimal OBDD's
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-05
-
Finite Limits and Lower Bounds for Circuits Size
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-06
-
On the Complexity of some Basic Problems in Computational Convexity: II. Volume and mixed volumes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-07
-
A New LP-Bound in Multivariate Lipschitz Optimization: Application to Unconstrained and Linearly Constrained Problems and to Systems of Inequalities
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-08
-
Global Optimization Techniques for Solving the General Quadratic Integer Programming Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-09
-
A Decomposition Method in Nonconvex Mixed-Integer Programming
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-10
-
A Fast and Robust Algorithm for a Class of Generalized Fractional Programs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-11
-
Inductive Counting below LOGSPACE
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-12
-
An Integer Concave Minimization Approach for the Minimum Concave Cost Capacitated Flow Problem on Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-13
-
Approximate Analysis of Multi-Queue Stations with 1-Limited Service
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-14
-
Cascade: A Simple and Efficient Algorithm for Priority Queues
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-15
-
Efficient OBDD-Based Boolean Manipulation in CAD Beyond Current Limits
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-16
-
A Unifying Theoretical Background for Some BDD-based Data Structures
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-17
-
Integrating Scalable Parallel Libraries and Automatically Parallelizing Compilers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI94-18
-
Expressing Uniformity via Oracles
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-01
-
Monotonous Oracle Machines
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-02
-
Global Rebuilding of OBDD's - Tunneling Memory Requirement Maxima
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-03
-
Zur strukturellen Stabilit√§t von Kommunikationssystemen - Eine kurze Einf√ľhrung in die Grundlagen
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-04
-
Integrating Synchronous and Asynchronous Paradigms: The Fork95 Parallel Programming Language
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-05
-
On Generic One-Parametric Semi-Infinite Optimization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-06
-
Local Convergence of the Symmetric Rank-One Iteration
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-07
-
A Modal ¬Ķ-Calculus for Durational Transition Systems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-08
-
On Multiparity Games for Pointer Jumping
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-09
-
The Graph of Integer Multiplication is Hard for Read-k-Times Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-10
-
On Communication Games with More than Two Players
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-11
-
Computational Design of Optimal Output Feedback Controllers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-12
-
Discrete Tomography: Determination of Finite Sets by X-Rays
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-13
-
Polytope Projection and Projection Polytopes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-14
-
On the Algorithmic Complexity of Minkowski's Reconstruction Theorem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-15
-
Logarithmic Barrier Methods for Solving the Optimal Output Feedback Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-16
-
Some Bounds on Multiparty Communication Complexity of Pointer Jumping
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-17
-
Proximal Methods in View of Interior-Point-Strategies
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-18
-
Convergence Rate of the Augmented Lagrangian SQP Method
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-19
-
Global Convergence of Inexact Reduced SQP Methods
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-20
-
Die Entwicklung der Informatik braucht Theorie und Praxis: Ein Fallbeispiel aus dem CAD-Schaltkreisentwurf
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-21
-
On Approximate Solution Methods for Multi-Queue Systems with 1-Limited Deterministic Service
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-22
-
Language Support for Synchronous Parallel Critical Sections
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-23
-
Generalized Semi-Infinite Optimization: A First Order Optimality Condition and Examples
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI95-24
-
Linearly Constrained Global Minimization of Functions with Concave Minorants
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-01
-
An Adequate Reducibility Concept for Problems Defined in Terms of Ordered Binary Decision Diagrams
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-02
-
Utility Function Programs and Optimization over the Efficient Set in Multiple Objective Decision Making
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-03
-
State Encodings and OBDD-Sizes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-04
-
Fast and Simple Nested Fixpoints
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-05
-
On Generalized Bisection of N-Simplices
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-06
-
On the Acceptance Power of Groups and Semigroups
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-07
-
Polytopes in Combinatorial Optimization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-08
-
Inexact SQP Interior Point Methods and Large Scale Optimal Control Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-09
-
BMAP/G/1-Queues: Properties of the Fundamental-Period-Matrix G
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-10
-
An Even Faster Solver for General Systems of Equations
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-11
-
Scheduling Expression DAGs for Minimal Register Need
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-12
-
Approximation Algorithms for Register Allocation
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-13
-
On Smoothing of Generalized max-Functions via epsilon-Regularization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-14
-
Newton's Method for a Class of Optimal Shape Design Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-15
-
A Modified Mesh Independence Principle of Newton's Method
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-16
-
Structured PSB-Update for Optimal Shape Design Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-17
-
Log-concavity and Inequalities for Chi-square, F and Beta Distributions with Applications in Multiple Comparisons
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-18
-
Scheduling of Virtual Connections in Fast Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-19
-
Proximal Point Methods in Examples
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-20
-
Ein Newtonverfahren zur zeitoptimalen Vibrationsdämpfung
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-21
-
Convolution Algorithms for BMAP/G/1-Queues
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-22
-
Local Encoding Transformations for Optimizing OBDD-Representations of Finite State Machines
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-23
-
On the Reconstruction of Binary Images from Their Discrete Radon Transforms
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-24
-
Computational Convexity
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-25
-
Fast Generation of Random Permutations via Networks Simulation
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-26
-
Proximal Interior Point Approach in Convex Programming
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-27
-
On Helly's Theorem: Algorithms and Extensions
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-28
-
Condensing Tensor Product Modules
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-29
-
Determination of Socle Series using the Condensation Method
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-30
-
Structural Gröbner Basis Detection
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-31
-
A Parametric View to the Mangasarian-Fromovitz Constraint Qualification
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-32
-
A Comparison of Numerical Methods for Optimal Shape Design Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-33
-
A Branch and Bound Approach for Solving a Class of Generalized Semi-Infinite Programming Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-34
-
On Local Convex Majorizing Approximations of Generalized Semi-Infinite Programming Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-35
-
Ein Faltungskalk√ľl f√ľr Matrizenfolgen und verallgemeinerte Poisson-Gruppenprozesse
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-36
-
Approximation Results for Wavelength Routing in Directed Binary Trees
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-37
-
Lagrange-Duality and Partitioning Techniques in Nonconvex Global Optimization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-38
-
Convergent Outer Approximation Algorithms for Solving Unary Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-39
-
Speeding up Variable Reordering of OBDDs.
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-40
-
Complexity Results for the Optimum Cost Chromatic Partition Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-41
-
Linear Sifting of Decision Diagrams
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-42
-
Representation of Feedback Operators for Hyperbolic Partial Differential Equation Control Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-43
-
Utility Function Program with or without Explicit Form of Utility Function
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-45
-
Parallel versus Sequential Task-Processing: A New Performance Model in Discrete Time
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI96-46
-
Approximation Results for the Optimum Cost Chromatic Partition Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-01
-
Separation by Hyperplanes in Finite-Dimensional Vector Spaces Over Archimedean Ordered Fields
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-02
-
An Optimal Greedy Algorithm for Wavelength Allocation in Directed Tree Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-03
-
A Decomposition Algorithm for Optimization over Efficient Sets
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-04
-
Unambiguity of SMGL Content Models - Pushdown Automata Revisited
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-05
-
Interprocedural Analysis Based on PDAs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-06
-
Stable Methods for Variational Inequalities with Set Valued Monotone Operators
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-07
-
Complete Families of Invariant Distributions
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-08
-
Nonuniform Grids for Reduced Basis Design of Low Order Feedback Controllers for Nonlinear Continuous Systems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-09
-
Regularized Penalty Method for Parabolic Optimal Control Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-10
-
On Optimization Properties of Functions with a Concave Minorant
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-11
-
Practical PRAM Programming with Fork95 - A Tutorial
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-12
-
Propagating Differences: An Efficient New Fixpoint Algorithm for Distributive Constraint Systems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-13
-
Function Decomposition and Synthesis Using Linear Sifting
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-14
-
Case Study: Manipulating xor-OBDDs by Means of Signatures
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-15
-
The Electronic Colloquium on Computational Complexity (ECCC): A Digital Library in Use
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-16
-
Stochastic Constraint Aggregation Method for Convex Semi-Infinite Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-17
-
Model-Checking for L2
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-18
-
On a Weak Norm Based Prox-Regularization Method
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-20
-
A Note on Spectral Lower Bound Arguments for Decision Trees
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-21
-
The BMAP/G/1 Queue with Level Dependent Arrivals and its Stationary Distribution
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-22
-
Two Program Comprehension Tools for Automatic Parallelization: A Comparative Study
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-23
-
A Decomposition Method Using Duality Bounds for Nonconvex Optimization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-24
-
The Theory of Optimal Sampling in Continuous Time
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-25
-
Primal-Dual Contraint Aggregation Method in Multistage Stochastic Programming
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-26
-
Block-Restricted Reordering - Extended Experiments
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-27
-
OBDD-based Verification of Communication Protocols - Methods for the Verification of Data Link Protocols
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI97-28
-
Ordered Binary Decision Diagrams and Their Significance in Computer-Aided Design of VLSI Circuits
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-01
-
Regularisierte Strafmethoden f√ľr inkorrekt gestellte Kontrollprobleme mit linearen Zustandsgleichungen
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-02
-
Zum Gleichgewichtsverhalten von Markov-Prozessen
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-03
-
On the Numerical Simulation of Bingham Fluid Flows Using Prox-Regularization
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-05
-
On Boolean vs. Modular Arithmetic for Circuits and Communication Protocols
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-06
-
On Markovian Spatial Arrival Processes for the Performance Analysis of Mobile Communication Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-07
-
Locating Matches of Tree Patterns in Forests
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-08
-
Proximal Interior Point Approach for Solving Convex Semi-infinite Programming Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-09
-
Neue Ergebnisse f√ľr BMAPs und r√§umliche Warteschlangen
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-10
-
Spatial Generalization of BMAP's with Finite State Space
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-11
-
A QQP-Minimization Method for Semidefinite and Smooth Nonconvex Programs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-12
-
ForkLight: A Control-Synchronous Parallel Programming Language
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-13
-
Stability Analysis of Wireless Networks
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-14
-
A Phase Space Model for Spatial BMAPs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-15
-
Stochastic Modeling of Server Capacity Utilization by Geometric Sums
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-16
-
Stability Conditions for the BMAP/G/1 Queue with Level Dependent Arrivals
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-18
-
Optimal Control of Thermally Coupled Navier-Stokes Equations in Food Industry
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-19
-
On Alternating vs. Parity Communication Complexity
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-20
-
Circuit and Decision Tree Complexity of Some Number Theoretic Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-21
-
Binary Decision Diagrams and the Multiple Variable Order Problem
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-22
-
Increasing Efficiency of Symbolic Model Checking by Accelerating Dynamic Variable Reordering
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-23
-
Application Driven Variable Reordering and an Example in Reachability Analysis
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-24
-
Accelerating OBDD-Minimization by Means of Structural and Semantical Properties
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-25
-
Convergence Results on Proximal Method of Multipliers in Nonconvex Programming
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-26
-
The WWW meets EDA: Usability evaluation of OBDD-heuristics via the Internet
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-27
-
Xor-OBDDs - a BDD Structure for Probabilistic Verification
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-28
-
Do We Really Need Common Variable Orders for Synthesizing OBDDs?
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-29
-
Proximal Methods: Decomposition and Selection
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-30
-
The Infinite Server Queue with Markov Additive Arrivals in Space
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-31
-
Convergence Results on Proximal Method of Multipliers in Nonconvex Programming
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI98-32
-
Computational Design of Stabilizing Static Output Feedback Controllers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-01
-
A LMI-Based Algorithm for Designing Suboptimal Static H2/Hinfinity Output Feedback Controllers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-02
-
Static Output Feedback Design by Using a Newton-SQP Interior Point Method
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-03
-
Spatial Queues with Infinitely Many Servers
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-04
-
Convergence of Generalized Supermartingales with Continous Parameter
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-05
-
Stochastic Simulation of Markov Modulated Finite-Source Queues
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-06
-
A Tool for Simulation of Markov Modulated Finite-Source Queueing Systems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-07
-
Convergence of Disturbed Martingales and a Stochastic Model for Annuity Funds
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-08
-
On the Rareness of Disturbed Martingales in the Class of all Uniformly L1-bounded Stochastic Processes
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-09
-
The SPARAMAT Approach to Automatic Comprehension of Sparse Matrix Computations
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-10
-
Convergence of Time-Continous Disturbed Martingales and Financial Market Modelling
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-11
-
Approximation of the Newton Step by a Defect Correction Process
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-12
-
Computation of PODs for Fluid Flows with Lanczos Methods
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-13
-
Auxiliary Problem Principle and Proximal Point Methods
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-14
-
Phasentyp-Verteilungen und Matrix-analytische Methoden
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-15
-
One Step Further: Integrating Electronic Submission and the Reviewing Process
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-16
-
MMB '99, Messung, Modellierung und Bewertung von Rechen- und Kommunikationssystemen, 10. GI/NTG-Fachtagung, 22.-24. September 1999, Trier, Kurzbeiträge und Toolbeschreibungen
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-17
-
On MAPA/G/K/K Stations
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-18
-
Algorithmic Considerations for +-OBDD Reordering.
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-19
-
On the Complexity of Tensor Formulae
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-20
-
Propositional Proofs and Their Complexity
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-21
-
The complexity of optimal small policies
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-22
-
Probabilistic Verification of Multiple-Valued Functions
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-23
-
Dual Characterization of Super-Hedging Prices in a Currency Market with Proportional Transaction Costs
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-24
-
Complexity of Finite-Horizon Markov Decision process Problems.
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-25
-
Finding Scientific Papers with HPSearch and MOPS
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-26
-
Mod-p Decision Diagrams: A Data Structure for Multiple-Valued Functions.
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-27
-
Speeding Up Symbolic Model Checking by Accelerating Dynamic Variable Reordering
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-28
-
Applying Formal Verification with Protocol Compiler
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-29
-
Two Logarithmic Barrier Methods for Convex Semi-Infinite Programming Problems
https://dblp.l3s.de/d2r/resource/publications/tr/trier/MI99-30
-
Learning heuristics for a theorem prover using back propagation
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-100-89
-
An approach to parallel unification using transputers
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-101-89
-
Leistungsfähigkeit von Parallelrechnern
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-102-89
-
Strukturierte Darstellung juristischen Wissens
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-105-89
-
Default connections in a model planning framework
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-108-89
-
A knowledge-based aproach for design and analysis in mechanical engineering
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-109-89
-
Equations, order-sortedness and inheritance in logic programming
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-110-89
-
Linear paramodulation modulo equality
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-111-89
-
Flexible classfication in ProObj
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-112-89
-
Backpropagation with temperature parameter and random pattern presentation
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-114-89
-
Automatic acquisition of search guiding heuristics
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-115-89
-
Classical negation in logic programming
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-123-89
-
A local learning algorithm for dynamic feedforward and recurrent networks
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-124-90
-
Networks adjusting networks
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-125-90
-
Making the world differentiable: on using self supervised fully recurrent neural networks for dynamic reinforcement learning and planning in non-stationary environments
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-126-90
-
Artificial neural learning
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-127-90
-
Learning to generate focus trajectories for attentive vision
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-128-90
-
Towards compositional learning with dynamic neural networks
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-129-90
-
Consistency checking of legal contracts using a temporal model
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-130-90
-
Combining Horn Clause logic with rewrite rules
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-131-90
-
Combining neural and evolutionary learning : aspects and approaches
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-132-90
-
Software specification methods from the viewpoint of reusability
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-133-90
-
Entwicklung einer bildorientierten Benutzeroberfl√§che f√ľr wissensbasierte Dialogsysteme
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-134-90
-
Relative representation of spatial knowledge: the 2-D case
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-135-90
-
Qualitative spatial reasoning
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-136-90
-
Mapping a generator for neural network simulators to a transputer system
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-137-90
-
Probleme regelbasierter Repräsentation von Wissen in juristischen Expertensystemen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-139-90
-
Beyond Hebb synapses: biological building blocks for unsupervised learning in artificial neural networks
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-140-90
-
Implementing exception in inheritance by concept transforming actions.
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-141-90
-
Proof schemata in propositional calculi
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-144-90
-
Modelling software reuse with predicate logic
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-145-90
-
Conceptual neighborhood and its role in temporal and spatial reasoning
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-146-91
-
Learning to control fast-weight memories: an alternative to dynamic recurrent networks
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-147-91
-
Neural sequence chunkers
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-148-91
-
Adaptive confidence and adaptive curiosity
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-149-91
-
Towards a lattice of knowledge representation systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-150-91
-
An O(n3) learning algorithm for fully recurrent networks
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-151-91
-
Artificial life: Eine Einf√ľhrung
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-152-91
-
Temporal reasoning based on semi-intervals
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-153-91
-
Ein System zur Erforschung qualitativer Objektrepräsentationen: SEqO
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-154-91
-
Incorporating prior knowledge in parsimonious networks of locally tuned units
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-155-91
-
The action oriented bucket brigade
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-156-91
-
StoL - a literate programming in SCHEME
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-157-91
-
Action oriented learning in classifier systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-158-91
-
Software-Retrieval-Systeme - √ľbersicht und Kriterien zur Bewertung
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-159-91
-
A knowledge and deduction based software retrieval tool
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-160-91
-
Die Generierung einer stabilen Raumdarstellung
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-161-91
-
Performance analysis of competitive OR-parallel theorem proving
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-162-91
-
Composition of spatial relations
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-163-91
-
Diagrammtical aspects of qualitative representations of space
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-164-92
-
Standardannahmen bei der qualitativen Repräsentation räumlichen Wissens
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-165-92
-
Collective learning and action coordination
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-166-92
-
Classification of non-linear separable real world problems using őĒ-rule [delta rule], perceptrons, and topologically distributed encoding
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-167-92
-
Classification of trajectories - extracting invariants with a neural network
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-168-92
-
Connection tableaux and their relation with linear resolution
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-169-92
-
Action selection and learning in multi-agent environments
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-170-92
-
Concept of an integrated trajectory generation system
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-171-92
-
On the polynomial transparency of resolution
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-172-92
-
A graphical user interface for SETHEO: proposal
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-173-92
-
Anwendung des Theorembeweisers SETHEO auf die Theorie der Halbgruppen und Gruppen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-174-93
-
Default reasoning and the qualitative representation of spatial knowledge
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-175-93
-
s: exploiting the structure of space
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-176-93
-
Maintaining qualitative spatial knowledge
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-177-93
-
Feature selection with exception handling using adaptive distance measures: an example from phonetics
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-178-93
-
36 problems for semantic interpretation
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-179-93
-
A neural trajectory storage
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-182-93
-
Theoretical issues concerning the representation of continuous valued input and output data in neural networks
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-183-93
-
The TPTP problem library
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-184-93
-
Cognitive science - eine Standortbestimmung
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-84-88
-
Intrinsische vs. extrinsische Repraesentation zum Aufgabenloesen oder die Verwandlung von Wasser in Wein
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-85-88
-
FHCL - functions in Horn Clause logic
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-86-88
-
Transformation systems for program synthesis: Knuth-Bendix completion and fold/unfold
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-87-88
-
Modul fault localization in a software toolbus based system
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-88-88
-
Sorts are nothing but functions: an equational approach to sorts for logic programming
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-89-88
-
Logic oriented program synthesis
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-90-88
-
Wissensrepr√§sentation in k√ľnstlichen symbolverarbeitenden Systemen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-91-88
-
Utterance generation without choice
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-92-88
-
Loop program synthesis using array traversing modules
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-93-88
-
Der Netzeditor: eine komfortable Umgebung zum Erstellen und Testen von konnektionistischen Netzen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-94-88
-
Expressing first order logic within Horn Clause logic
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-96-88
-
Zur Portierbarkeit taxonomischer Wissensbasen zwischen heterogenen Systemen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-96-89
-
Logic and reasoning with neural models
https://dblp.l3s.de/d2r/resource/publications/tr/tum/FKI-99-89
-
Concurrent temporal logic
https://dblp.l3s.de/d2r/resource/publications/tr/tum/SFB-342
-
Asynchronous communication of Petri nets and the refinements of transitions
https://dblp.l3s.de/d2r/resource/publications/tr/tum/SFB-917
-
A simulator for VLIW architectures
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-A-9016
-
Systematische Entwicklung einer Rechenstruktur f√ľr Listenverarbeitung
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-7815
-
A simple calculus for program transformations
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-8409
-
Parallel programming with modules
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-8516
-
Formal program construction by transformations computer aided, intuition guided programming
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-8807
-
Distributed Systems: A Comprehensive Survey
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-8909
-
Die Logiksprache LOLA und ihre interne Darstellung durch Relationen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-8910
-
Task level programming of manipulators: A case study
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9001
-
Failures semantics of Petri nets and the refinement of places and transitions
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9003
-
Quality criteria for partial order semantics of place/transitions nets
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9004
-
Die Rolle der Lastverteilung bei der numerischen Parallelprogrammierung
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9005
-
Two results on unambiguous circuits
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9006
-
Zur Lösung von Finite-Differenzen- und Finite-Element-Gleichungen mittels der Hierarchischen-Transformations-Mehrgitter-Methode
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9007
-
PARTHEO: a high performance parallel theorem prover
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9009
-
Using connectionist networks for guiding the search of a theorem prover
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9011
-
Iteration theories of synchronization trees
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9014
-
Auf der Suche nach Parallelität: ein Sprachvergleich ParMod-PM
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9016
-
Recognizing edge replacement graph languages in cubic time
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9017
-
A generalization of trace theory
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9018
-
Bisimulation and action refinement
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9020
-
Reachability in reversible free-choice systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9023
-
Equivalences and refinement
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9024
-
Leistungsanalyse von verteilten Beobachtungs- und Bewertungswerkzeugen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9026
-
The owner concept for PRAMs
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9028
-
Simulationsmodelle f√ľr den Verkehr in Rechensystemen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9029
-
Schnellere Berechnung klassischer Matrix-Multiplikationen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9032
-
On local refinement higher order methods for elliptic partial differential equations
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9034
-
Modular functional modelling of Petri nets with individual tokems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9035
-
Two contributions to the theory of Marzukiewicz traces
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9036
-
Sparse grids
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9037
-
A combination technique for the solution of sparse grid problems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9038
-
A parallelizable and vectorizable multi-level-algorithm on sparse grids
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9039
-
System and environmen: The philosophers revisited
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9040
-
On confluent semi-commutations: decidability and complexity results
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9041
-
Functional modelling of operating sytem [system] structures by timed higher order stream processing functions
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9042
-
LOLA: a logic language for deductive databases and its implementation
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9043
-
A deadlock-sensitive congruence for action refinement
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9044
-
On the design and verification of a simple distributed spanning tree algorithm
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9046
-
R-Lisp: eine erweiterte relationale Algebra in Lisp
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9049
-
Random competition: a simple, but efficient method for parallelizing inference systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9050
-
Modular specification of process algebras
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9051
-
Branching time and abstraction in bisimulation semantics
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9052
-
Parallel multigrid methods on sparse grids
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9053
-
Unambiguous simulations of auxiliary pushdown automata and circuits
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9054
-
Uniform circuits and exclusive read PRAMs
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9055
-
A survey of virtually shared memory schemes
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9056
-
Is partial order semantics necessary for action refinement?
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9101
-
Characterizing the behavior of reactive systems by trace sets
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9102
-
Non-deterministic computing, transactions, and recursive atomicity
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9105
-
Dataflow semantics for Petri nets
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9107
-
Transformation und Komposition von P/T-Netzen unter Erhaltung wesentlicher Eigenschaften
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9108
-
Database support for problematic knowledge
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9109
-
Generalized OM-bisimulation
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9113
-
Fouriertransformation auf d√ľnnen Gittern mit hierarchischen Basen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9114
-
Towards parallelism in a rational database system
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9115
-
Implementierung von Algorithmen zut Kompaktifizierung von Programmen f√ľr VLIW-Architekturen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9116
-
Implementierung von Algorithmen zur Optimierung von Schleifen mit Hilfe von Software-Pipelining-Techniken
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9117
-
Eine Parallele zwischen Differentialgleichungen und diskreter Simulation: nebst Anwendung auf das Problem der verteilten Simulationsausf√ľhrung
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9118
-
Stabilitätsuntersuchung von Differenzenverfahren mit Hilfe der Resultantenalgebra unter Verwendung des REDUCE-Systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9120
-
The combination techniques for the sparse grid solution of PDE's on multiprocessor machines
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9121
-
Towards an optimal design of distributed file systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9122
-
Parallelism algebras: a link between process algebras and abstract relation algebras?
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9123
-
Answers for disjunctive logic programs
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9125
-
Splitting as a source of parallelism in disjunctive logic programs
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9126
-
Adaptive parallele Multilevel-Methoden zur Lösung elliptischer Randwertprobleme
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9127
-
Weakening the weak conditions for self-timed circuits
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9128
-
Modelling and performance analysis of a parallel theorem prover
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9129
-
An adaptive poisson solver using hierarchical bases and sparse grids
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9130
-
Local and global causes
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9132
-
Parallelization of inference systems by using an abstract machine
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9133
-
Speedup analysis by hierarchical load decomposition
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9134
-
Extrapolation and related techniques for solving elliptic equations
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9135
-
A toolbox for multigrid methods
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9136
-
A relation algebraic approach to modal correspondences
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9137
-
A simple toy example of a distributed system : on the design of a connecting switch
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9138
-
Introduction to the parallel and distributed programming language ParMod-C
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9139
-
Funktionale Modellierung eines Postsystems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9142
-
Multilevel algorithms considered as iterative methods on indefinite systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9143
-
On constructive specifications of abstract data types using temporal logic
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9146
-
Development and implementation of a communication protocol: an exercise in FOCUS
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9205
-
The action graph model as a link between abstract relation algebras and process algebraic specifications
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9207
-
Parallel program development for a recursive numerical algorithm: a case study
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9208
-
Parallel algorithms for slicing based final placement
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9209
-
Functional modeling of clocked hardware circuits
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9211
-
On distributed logic simulation using time warp
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9212
-
Extrapolation, combination, and sparse grid techniques for elliptic boundary value problems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9213
-
On the V-cycle of the fully adaptive multigrid method
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9215
-
On the multilevel adaptive iterative method
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9216
-
Data structures for multilevel adaptive methods and iterative solvers
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9217
-
Optimal parallel algorithms for computing recursively defined functions
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9218
-
On the treatment of singularities in the finite element method
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9220
-
Implementing high level identification specifications
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9222
-
Identification as programming language principle
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9223
-
Grid- and point-oriented multilevel algorithms
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9224
-
Improved multilevel algorithms for full and sparse grid problems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9225
-
Parallel cache management of a RDBMS
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9226
-
PART: a parallel relational toolbox as basis for the optimization and interpretation of parallel queries
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9229
-
Spezifikation des UNIX-Datei- und Variablensystems : eine SPECTRUM-Fallstudie
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9230
-
The synthesis problem of Petri nets
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9231
-
The d-dimensional Helmholtz equationon sparse grids
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9232
-
Neuronale Netzwerk-Paradigmen zum Erlernen von Heuristiken
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9233
-
Elements of a temporal logic coping with concurrency
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9234
-
Invariants, compositionality and substitution
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9236
-
Fixpoint evaluation with subsumption for probabilistic uncertainty
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9237
-
Performance analysis and optimization of numerically intensive programs
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9238
-
The efficient solution of fluid dynamics problems by the combination technique
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9301
-
Assumption, commitment rules for networks of asynchronously communicating agents
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9303
-
Extrapolation techniques for constructing higher order finite element methods
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9304
-
Adding resynchronisation to optimistic distributed simulation
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9305
-
The MAX system: a tutorial introduction
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9307
-
A definition of efficiency of parallel programs in multi tasking environments
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9308
-
Faster sorting and routing on grids with diagonals
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9313
-
Remarks on the abstract theory of additive and multiplicative Schwarz algorithms
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9314
-
Corolla partitioning for distributed logic simulation of VLSI circuits
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9316
-
Reducing rollback overhead in time warp based distributed simulation with optimized incremental state saving
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9317
-
The visibility problem for single valued surface (z = f(x,y)): the analysis and the parallelization of algorithms
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9318
-
Multilevel, extrapolation and sparse grid methods
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9319
-
Layout optimization with algebraic multigrid methods
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9320
-
A new efficient algorithm for embedding an arbitrary binary tree into its optimal hypercube
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9321
-
Divide and conquer algorithms on the hypercube
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9322
-
Synergy between formal and pragmatic software engineering methods
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9323
-
The distributed C development environment
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9324
-
Modal checking for the modal mu-calculus using Gauss elimination
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9325
-
Möglicher Einsatz von Votierungsverfahren zur Nebenläufigkeitskontrolle in synchronen Groupware-Systemen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9326
-
Gauss' adaptive relaxation for the multilevel solution of partial differential equations on sparse grids
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9327
-
Convergence of the combination technique for the finite element solution of Poisson's equation
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9328
-
Optimal parallelization of Las Vegas algorithms
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9329
-
ATLAS: a typed language for algebraic specification
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9330
-
Topological methods for algebraic specification
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9331
-
Zur formalen Beschreibung der funktionalen Anforderungen an ein Informationssystem
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9332
-
Zur √ľbersetzung von E-R-Schemata nach SPECTRUM
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9333
-
Ablaufspezifikation durch Datenflussmodellierung und stromverarbeitende Funktionen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9334
-
Development of a distributed min max component
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9338
-
Recovery and transaction management in write optimized database systems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9340
-
Deriving efficient parallel programs by systemating coarsing specification parallelism
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-I-9341
-
Ein Semi-Kollokationsverfahren zur numerischen Lösung von Nierenmodellen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-8501
-
Irreduzible induzierte Darstellungen von ICC-Gruppen
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9005
-
Introduction to differential algebraic equations in vehicle system dynamics
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9006
-
Lokal endliche Quasikörper
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9007
-
Verallgemeinerte kinematische Räume
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9009
-
Envelopes of holomorphy and analytic structure on the spectrum
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9011
-
Numerical simulation of two-dimensional flows by the free Lagrangian method
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9105
-
Heuristic coloring of weighted graphs and the maximum weight clique problem
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9107
-
Numerical integration of multibody systems by a projection technique
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9201
-
Ein merkw√ľrdiger graphischer Punkt im Dreieck
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9202
-
Numerical standard form for asymptotic two-point boundary value problems
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9205
-
Element oriented and edge oriented local error estimators for nonconforming finite element methods
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9206
-
Zentralisator und Normalisator quadratischer Polynome
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M-9207
-
Finding maximum cliques in arbitrary and in special graphs
https://dblp.l3s.de/d2r/resource/publications/tr/tum/TUM-M9008
-
Muffin: A Distributed Database Machine
https://dblp.l3s.de/d2r/resource/publications/tr/ucb/erl-m79-28
-
Differences in productivity and impact across the different computer science subareas.
https://dblp.l3s.de/d2r/resource/publications/tr/unicamp/IC-12-08
-
Klaus Tschira Stiftung gemeinn√ľtzige GmbH, KTS
https://dblp.l3s.de/d2r/resource/publications/www/de/kts
-
E. W. Dijkstra Archive: The manuscripts of Edsger W. Dijkstra 1930-2002
https://dblp.l3s.de/d2r/resource/publications/www/edu/ewd
-
WfMC Standards: The Workflow Reference Model, Version 1.1.
https://dblp.l3s.de/d2r/resource/publications/www/org/aiim-wfmc
-
The Future of Classic Data Administration: Objects + Databases + CASE
https://dblp.l3s.de/d2r/resource/publications/www/org/mitre/future
-
The SGML/XML Web Page
https://dblp.l3s.de/d2r/resource/publications/www/org/oasis-open-cover-xml
-
XML-QL: A Query Language for XML
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/TR/NOTE-xml-ql
-
W3C: Extensible Markup Language (XML) 1.0 - first edition.
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/TR/REC-xml
-
The XML Query Algebra
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/TR/query-algebra
-
XML Query Data Model
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/TR/query-datamodel
-
XML Query Requirements
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/TR/xmlquery-req
-
XML Query Use Cases
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/TR/xmlquery-use-cases
-
XQuery: A Query Language for XML
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/TR/xquery
-
W3C: Document Oject Model (DOM)
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/dom
-
Internet Draft: Hypertext Transfer Protocol - HTTP/1.1
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/http1-1
-
W3C: The w3c Query Language Workshop, December 1998, Boston, MA, USA
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/ql98
-
W3C: Extensible Stylesheet Language (XSL)
https://dblp.l3s.de/d2r/resource/publications/www/org/w3/style-xsl