|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 332 occurrences of 274 keywords
|
|
|
Results
Found 3531 publication records. Showing 3530 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
62 | Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban |
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 11th International Conference, DEXA 2000, London, UK, September 4-8, 2000, Proceedings, pp. 287-301, 2000, Springer, 3-540-67978-2. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
architecture, object-orientation, capability, security and privacy, cyberspace |
59 | Metodi Hadji-Janev |
Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 149-160, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
59 | Stefano Mele |
The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 183-199, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
59 | Zlatogor Minchev |
Human Factor Dual Role in Modern Cyberspace Social Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 116-128, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
52 | Janusz Wielki |
A Framework of the Impact of Cyberspace on Contemporary Organizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 4-8 September 2006, Krakow, Poland, pp. 314-318, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Yee Fen Lim |
Law and Regulation in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 2nd International Conference on Cyberworlds (CW 2003), 3-5 December 2003, Singapore, pp. 34-39, 2003, IEEE Computer Society, 0-7695-1922-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Jeffrey M. Bradshaw, Niranjan Suri, Alberto J. Cañas, Robert Davis, Kenneth M. Ford, Robert R. Hoffman, Renia Jeffers, Thomas Reichherzer |
Terraforming Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 34(7), pp. 48-56, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
52 | Pat Jefferies |
Multimedia, Cyberspace & Ethics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: International Conference on Information Visualisation, IV 2000, London, England, UK, July 19-21, 2000, pp. 99-104, 2000, IEEE Computer Society, 0-7695-0743-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Ken Musgrave |
Building Worlds in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer Graphics International ![In: Computer Graphics International Conference, CGI 1999, Canmore, Alberta, Canada, June 7-11, 1999, pp. 164-, 1999, IEEE Computer Society, 0-7695-0185-0. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
52 | Kara L. Nance, Mahla Strohmaier |
Ethical accountability in the cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ethics in Computer Age ![In: Proceedings of the Conference on Ethics in Computer Age, Galtinburg, Tennessee, USA, November 11-13, 1994, pp. 115-118, 1994, ACM, 0-89791-644-1. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
51 | Chinese Academy of Cyberspace Studies |
China Internet Development Report 2018 - Blue Book of World Internet Conference ![Search on Bibsonomy](Pics/bibsonomy.png) |
|
2020 |
DOI RDF |
|
50 | Tara Krueger |
Mapping Cyberspace: The Image of the Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 29(1), pp. 100, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cyberspace map, Internet space place, Mapping, conceptual map |
49 | W. Yang |
Pictopia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 12th ACM International Conference on Multimedia, New York, NY, USA, October 10-16, 2004, pp. 1001-1002, 2004, ACM, 1-58113-893-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
cybertecture, mediatecture, architecture, locatability, urbanism |
49 | Mao Lin Huang, Wei Lai, Yanchun Zhang |
Mapping and Browsing the Web in a 2D Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA Workshops ![In: 10th International Workshop on Database & Expert Systems Applications, Florence, Italy, September 1-3, 1999, Proceedings., pp. 248-252, 1999, IEEE Computer Society, 0-7695-0281-4. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Information Visualization, Web Browser, Web Graph, Web Navigation |
44 | David Mair |
Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 73-85, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski |
Steganography in Support of the Global Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 15-28, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Nancy Houston |
How Human Issues Impact Confronting Cyber Terrorism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 102-115, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Nancy Houston |
Cultural Aspects of Information Sharing and Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 161-172, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Ronald S. Bearse |
Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 29-44, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Alan Brill |
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 1-14, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Stuart MacDonald |
Assessing and Responding to the Cyberterrorism Threat. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 200-209, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Alan Brill |
Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 45-56, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Elliot Zweig |
From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 86-101, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Raoul Chiesa |
Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 173-182, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Arthur L. Brocato Jr. |
Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 129-148, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Ivica Simonovski |
The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Terrorist Use of Cyberspace and Cyber Terrorism ![In: Terrorist Use of Cyberspace and Cyber Terrorism: New Challenges and Responses, pp. 57-72, 2015, IOS Press, 978-1-61499-527-2. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Bracha Shapira |
A Content-Based Model for Web-Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 63-74, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yehuda Shaffer |
Analysis of Financial Intelligence and the Detection of Terror Financing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 105-116, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Mark Last |
Using Data Mining Technology for Terrorist Detection on the Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 41-62, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yuval Elovici |
TDS - An Innovative Terrorist Detection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 75-90, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Abraham R. Wagner |
Terrorism and the Internet: Use and Abuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 1-28, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Menahem Friedman, Moti Schneider, Abraham Kandel |
Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 91-104, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Alex Markov, Mark Last |
Identification of Terrorist Web Sites with Cross-Lingual Classification Tools. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 117-, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Shaul Shay |
The Radical Islam and the Cyber Jihad. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Fighting Terror in Cyberspace ![In: Fighting Terror in Cyberspace, pp. 29-40, 2005, WorldScientific, 978-981-256-493-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Zijia Wang, Han-Teng Liao, Jiacheng Lou, Yu Liu |
Making Cyberspace Towards Sustainability A Scientometric Review for a Cyberspace that Enables Green and Digital Transformation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAT ![In: CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020, pp. 394-400, 2020, ACM, 978-1-4503-8782-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
39 | Shankar Sastry 0001 |
TRUST: in cyberspace and beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2006, Taipei, Taiwan, March 21-24, 2006, pp. 13, 2006, ACM, 1-59593-272-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
39 | David W. Valentine |
Practical computer security: a new service course based upon the national strategy to secure cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005, Newark, NJ, USA, October 20-22, 2005, pp. 185-189, 2005, ACM, 1-59593-252-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
model syllabi, security, education |
39 | Mihaela Ulieru |
Emergence in Cyberspace: Towards the Evolutionary Self-Organizing Enterprise. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Agent Technologies, Infrastructures, Tools, and Applications for E-Services ![In: Agent Technologies, Infrastructures, Tools, and Applications for E-Services, NODe 2002 Agent-Related Workshops, Erfurt, Germany, October 7-10, 2002. Revised Papers, pp. 20, 2002, Springer, 3-540-00742-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Herbert Fiedler |
Der Staat im Cyberspace - zur Diskussion gestellt. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 24(5), pp. 309-314, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Yoshitaka Sakurai, Kinshuk, Kouhei Takada, Rainer Knauf, Setsuo Tsuruta |
Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops ![In: 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, WAINA 2010, Perth, Australia, 20-13 April 2010, pp. 61-67, 2010, IEEE Computer Society, 978-0-7695-4019-1. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
enriched cyberspace, CSCW (computer-supported cooperative work), situation assessment |
38 | Andrey Leonov, Alexander Serebrov, Mikhail Anikushkin, Dmitriy Belosokhov, Alexander Bobkov, Evgeny Eremchenko, Pavel Frolov, Ilya Kazanskiy, Andrey Klimenko, Stanislav V. Klimenko, Viktoria Leonova, Andrey Rashidov, Vasil Urazmetov, Valeriy Droznin, Viktor Dvigalo, Vladimir Leonov, Sergey Samoylenko, Alexander Aleynikov, Tikhon Shpilenok |
Virtual Story in Cyberspace: Valley of Geysers, Kamchatka. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 2010 International Conference on CyberWorlds, Singapore, October 20-22, 2010, pp. 247-253, 2010, IEEE Computer Society, 978-0-7695-4215-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Heritage in cyberspace, Mixed and virtual reality, Cyberworlds and their impact on the real worlds, Neogeography, Virtual story, Valley of Geysers, Kamchatka, Situational awareness, Shared virtual worlds, Virtual collaborative spaces |
38 | Narushige Shiode, Tomoko Kanoshima |
Utilising the Spatial Features of Cyberspace for Generating a Dynamic Museum Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRML ![In: Proceedings of the Fourth Symposium on The Virtual Reality Modeling Language, VRML 1999, Paderborn, Germany, February 23-26, 1999, pp. 79-84, 1999, ACM, 1-58113-079-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
art experience, interactivity, VRML, dynamic environment, virtual museum, cyberspace |
38 | K. Andrews |
Case study: Visualising cyberspace: information visualisation in the Harmony Internet browser. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOVIS ![In: IEEE Symposium On Information Visualization 1995, InfoVis 1995, 30-31 October 1995, Atlanta, Georgia, USA, pp. 97-104, 1995, IEEE Computer Society, 0-8186-7201-3. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
cyberspace visualisation, Harmony Internet browser, Gopher spaces, WWW spaces, Hyper-G Internet information system, Harmony client, navigational facilities, location feedback, Internet, information retrieval, data structures, information systems, information systems, data models, hypermedia, data visualisation, information visualisation |
37 | Daniel L. Rubin, Pattanasak Mongkolwat, Vladimir Kleper, Kaustubh Supekar, David S. Channin |
Annotation and Image Markup: Accessing and Interoperating with the Semantic Content in Medical Imaging. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Intell. Syst. ![In: IEEE Intell. Syst. 24(1), pp. 57-65, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Frank A. Biocca |
The Space of Cognitive Technology: The Design Medium and Cognitive Properties of Virtual Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cognitive Technology ![In: Cognitive Technology: Instruments of Mind, 4th International Conference, CT 2001, Warwick, UK, August 6-9, 2001, Proceedings, pp. 55-56, 2001, Springer, 3-540-42406-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Bruce Damer, Stuart Gold, Jan de Bruin, Dirk-Jan de Bruin |
Conferences and Trade Shows in Inhabited Virtual Worlds: A Case Study of Avatars98 & 99. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Worlds ![In: Virtual Worlds, Second International Conference, VW 2000, Paris, France, July 5-7, 2000, Proceedings, pp. 1-11, 2000, Springer, 3-540-67707-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Donald P. Brutzman, Michael Zyda, Kent Watsen, Michael R. Macedonia |
Virtual Reality Transfer Protocol (VRTP) Design Rationale. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 6th Workshop on Enabling Technologies (WET-ICE '97), Infrastructure for Collaborative Enterprises, 18-20 June 1997, MIT, Cambridge, MA, USA, Proceedings, pp. 179-186, 1997, IEEE Computer Society, 0-8186-7967-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
virtual reality transfer protocol, VRTP, network support, Cyberspace Backbone, CBone, interactive internetworked 3D worlds, Internet, World Wide Web, virtual reality, testing, Virtual Reality Modeling Language, VRML, HTML, http, network monitoring, design rationale, client-server, peer-to-peer communications, hypertext transfer protocol, large-scale virtual environments |
35 | Urs E. Gattiker, Helen Kelley |
Morality and technology, or is it wrong to create and let loose a computer virus. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS (3) ![In: 28th Annual Hawaii International Conference on System Sciences (HICSS-28), January 3-6, 1995, Kihei, Maui, Hawaii, USA, pp. 563-573, 1995, IEEE Computer Society, 0-8186-6945-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
computer related actions, women end users, context specific situation, policy makers, moral conduct, electronic highway, moral judgment, cyberspace domain, privacy, human factors, researchers, social aspects of automation, computer crime, social norms, computer virus, computer viruses, morality, theoretical models, professional aspects, civil liberties |
29 | Nikola Pijovic |
The Cyberspace 'Great Game'. The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 13th International Conference on Cyber Conflict, CyCon 2021, Tallinn, Estonia, May 25-28, 2021, pp. 215-231, 2021, IEEE, 978-9916-9565-5-7. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Aleksandra Pawlicka, Michal Choras, Marek Pawlicki |
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: ARES 2020: The 15th International Conference on Availability, Reliability and Security, Virtual Event, Ireland, August 25-28, 2020, pp. 55:1-55:11, 2020, ACM, 978-1-4503-8833-7. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Chenhui Zhao, Bo Zhang |
Research on the ideology monitoring system of cyberspace legal security based on Neural Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIAT ![In: CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, Virtual Event / Guangzhou, China, December 5, 2020, pp. 208-212, 2020, ACM, 978-1-4503-8782-8. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Fenghua Li, Zifu Li, Weili Han, Ting Wu 0001, Lihua Chen, Yunchuan Guo, Jinjun Chen |
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 6(2), pp. 1471-1483, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Huansheng Ning, Xiaozhen Ye, Mohammed Amine Bouras, Dawei Wei, Mahmoud Daneshmand |
General Cyberspace: Cyberspace and Cyber-Enabled Spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Internet Things J. ![In: IEEE Internet Things J. 5(3), pp. 1843-1856, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Jinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Yuanxin Zhang |
Evaluation on Availability of Entity Information in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Third IEEE International Conference on Data Science in Cyberspace, DSC 2018, Guangzhou, China, June 18-21, 2018, pp. 811-818, 2018, IEEE, 978-1-5386-4210-8. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Jinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Lin Ye |
A Survey on Data Cleaning Methods in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017, pp. 74-81, 2017, IEEE Computer Society, 978-1-5386-1600-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Fenghua Li, Zifu Li, Weili Han, Ting Wu 0001, Lihua Chen, Yunchuan Guo |
Cyberspace-Oriented Access Control: Model and Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSC ![In: Second IEEE International Conference on Data Science in Cyberspace, DSC 2017, Shenzhen, China, June 26-29, 2017, pp. 261-266, 2017, IEEE Computer Society, 978-1-5386-1600-0. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Paul A. Walker |
Law of the horse to law of the submarine: The future of State behavior in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015, pp. 93-104, 2015, IEEE, 978-9-9499-5442-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Geoffrey S. DeWeese |
Anticipatory and preemptive self-defense in cyberspace: The challenge of imminence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015, pp. 81-92, 2015, IEEE, 978-9-9499-5442-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Alison L. Russell |
Strategic anti-access/area denial in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CyCon ![In: 7th International Conference on Cyber Conflict: Architectures in Cyberspace, CyCon 2015, Tallinn, Estonia, May 26-29, 2015, pp. 153-168, 2015, IEEE, 978-9-9499-5442-1. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Mark W. Bell |
A Review of "Ethics in Cyberspace: How Cyberspace May Influence Interpersonal Interaction". ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Soc. ![In: Inf. Soc. 27(3), pp. 206-207, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Ronald J. Deibert, Rafal Rohozinski |
Control and Subversion in Russian Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Access Controlled ![In: Access Controlled - The Shaping of Power, Rights, and Rule in Cyberspace., pp. 15-34, 2010, MIT Press, 978-0-262-51435-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
29 | Georgios I. Zekos |
State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 15(1), pp. 1-37, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Wen-Bin Chiou, Chin-Sheng Wan |
Sexual Self-Disclosure in Cyberspace among Taiwanese Adolescents: Gender Differences and the Interplay of Cyberspace and Real Life. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyberpsychology Behav. Soc. Netw. ![In: Cyberpsychology Behav. Soc. Netw. 9(1), pp. 46-53, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Michael T. Zimmer |
The tensions of securing cyberspace: The Internet, state power and The National Strategy to Secure Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
First Monday ![In: First Monday 9(3), 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Claire Coleman |
Cyberspace security: Securing cyberspace - new laws and developing strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 19(2), pp. 131-136, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Mo Fu, Christopher Yeo, Yuetong Lin, Fei-Yue Wang 0001 |
WAVES: towards real time laboratory experiments in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: `e-Systems and e-Man for Cybernetics in Cyberspace`, Tucson, Arizona, USA, 7-10 October 2001, pp. 3470-3474, 2001, IEEE, 0-7803-7087-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Todd Papaioannou |
Mobile Information Agents for Cyberspace - State of the Art and Visions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIA ![In: Cooperative Information Agents IV, The Future of Information Agents in Cyberspace, 4th International Workshop, CIA 2000, Boston, MA, USA, July 7-9, 2000, Proceedings, pp. 247-261, 2000, Springer, 3-540-67703-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
29 | David Judah |
Liability in cyberspace - I: Defamation in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 13(6), pp. 442-446, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Hiromu Miyashita, Ryo Segawa, Ken-ichi Okada |
Estimation of thinking states in cyberspace using multiple physiological parameters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRST ![In: Proceedings of the ACM Symposium on Virtual Reality Software and Technology, VRST 2009, Kyoto, Japan, November 18-20, 2009, pp. 237-238, 2009, ACM, 978-1-60558-869-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
presence, psychology, feelings |
27 | Ahmed Abbasi, Hsinchun Chen |
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 26(2), pp. 7:1-7:29, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
online text, style classification, text mining, discourse, Stylometry |
27 | Karine Barzilai-Nahon |
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), CD-ROM / Abstracts Proceedings, 4-7 January 2006, Kauai, HI, USA, 2006, IEEE Computer Society, 0-7695-2507-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Sheng Fang 0001, Min Zhang, Ling Huang, Yongshan Wei |
The Social Context Model for Research Activities in a Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAT Workshops ![In: 16th International Conference on Artificial Reality and Telexistence, ICAT 2006, Hangzhou, China, November 29 - December 1, 2006, Workshops Proceedings, pp. 270-274, 2006, IEEE Computer Society, 0-7695-2754-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Shi-Cho Cha 0001, Yuh-Jzer Joung |
On Derived Data Services in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: 2005 IEEE/IPSJ International Symposium on Applications and the Internet (SAINT 2005), 31 January - 4 February 2005, Trento, Italy, pp. 406-412, 2005, IEEE Computer Society, 0-7695-2262-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Tzong-Song Wang, Larry K. Bright |
The Challenge of Exclusions in Pervasive Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EEE ![In: 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 04), 29-31 March 2004, Taipei, Taiwan, pp. 293-298, 2004, IEEE Computer Society, 0-7695-2073-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Ko Fujimura, Naoto Tanimoto |
The EigenRumor Algorithm for Calculating Contributions in Cyberspace Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trusting Agents for Trusting Electronic Societies ![In: Trusting Agents for Trusting Electronic Societies, Theory and Applications in HCI and E-Commerce, pp. 59-74, 2004, Springer, 3-540-28012-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Naftaly H. Minsky |
Regularity-Based Trust in Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, First International Conference, iTrust 2003, Heraklion, Crete, Greece, May 28-30, 2002, Proceedings, pp. 17-32, 2003, Springer, 3-540-40224-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Alessandro Aurigi |
Urban Cyberspace as a Social Construction: Non-technological Factors in the Shaping of Digital Bristol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Cities ![In: Digital Cities III, Information Technologies for Social Capital: Cross-cultural Perspectives, Third International Digital Cities Workshop, Amsterdam, The Netherlands, September 18-19, 2003, Revised Selected Papers, pp. 97-112, 2003, Springer, 3-540-25331-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Alexander Roßnagel |
Freiheit im Cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 25(1), pp. 33-38, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Pekka Nikander |
Users and Trust in Cyberspace (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 8th International Workshop, Cambridge, UK, April 3-5, 2000, Revised Papers, pp. 36-42, 2000, Springer, 3-540-42566-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Betty Beaumont |
Decompression: a living laboratory in cyberspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia Workshops ![In: Proceedings of the ACM Multimedia 2000 Workshops, Los Angeles, CA, USA, October 30 - November 3, 2000, pp. 9-12, 2000, ACM Press, 1-58113-311-1. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
ecological art, electronic media, virtual reality, perceptual models, invisibility |
27 | Ravi S. Sandhu |
Engineering authority and trust in cyberspace: the OM-AM and RBAC way. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Workshop on Role-Based Access Control ![In: Fifth ACM Workshop on Role-Based Access Control, RBAC 2000, Berlin, Germany, July 26-27, 2000, pp. 111-119, 2000, ACM, 1-58113-259-X. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | George E. Mobus, Manuel Aparicio IV |
Foraging for information resources in cyberspace: intelligent foraging agent in a distributed network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CASCON ![In: Proceedings of the 1994 Conference of the Centre for Advanced Studies on Collaborative Research, October 31 - November 3, 1994, Toronto, Ontario, Canada, pp. 46, 1994, IBM. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP BibTeX RDF |
Internet |
25 | Jay S. Bayne |
Cyberspatial Mechanics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part B ![In: IEEE Trans. Syst. Man Cybern. Part B 38(3), pp. 629-644, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ahmad Nadzri Muhammad Nasir, Ali Selamat, Md. Hafiz Selamat |
Web Mining for Malaysia's Political Social Networks Using Artificial Immune System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PKAW ![In: Knowledge Acquisition: Approaches, Algorithms and Applications, Pacific Rim Knowledge Acquisition Workshop, PKAW 2008, Hanoi, Vietnam, December 15-16, 2008, Revised Selected Papers, pp. 137-146, 2008, Springer, 978-3-642-01714-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Political Parties, General Elections, Social Network Analysis, Artificial Immune System |
25 | Rung-Huei Liang, Yin-Huan Chen |
Planning Locative Media within Physical Space and Collaborative Workspace. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 863-868, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yoshifumi Kitamura, Rong Rong, Yoshinori Hirano, Kazuhiro Asai, Fumio Kishino |
Video agent: interactive autonomous agents generated from real-world creatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRST ![In: Proceedings of the ACM Symposium on Virtual Reality Software and Technology, VRST 2008, Bordeaux, France, October 27-29, 2008, pp. 30-38, 2008, ACM, 978-1-59593-951-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
interactive multimedia content, image processing, fuzzy logic, computer animation, video database, characters |
25 | Leonardo M. Trejos, Masaru Kamada, Tatsuhiro Yonekura, Mamun Bin Ibne Reaz |
Wildlife net-gamekeepers using sensor network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETGAMES ![In: Proceedings of the 6th Workshop on Network and System Support for Games, NETGAMES 2007, Melbourne, Australia, September 19-20, 2007, pp. 67-69, 2007, ACM, 978-0-9804460-0-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
game modification, nature conservation, pattern recognition, network monitoring |
25 | Cheng-De Qin |
Personal data protection in electronic business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 893-895, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
personal data protection, tort, privacy, legislation, electronic business |
25 | Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park |
A Study on Key Recovery Agent Protection Profile Having Composition Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part I, pp. 557-566, 2004, Springer, 3-540-22054-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Key Recovery Protection Profile, Evaluation Methodology, Common Criteria |
25 | Zheng Yan 0002, Piotr Cofta |
A Mechanism for Trust Sustainability Among Trusted Computing Platforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust and Privacy in Digital Business, First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004, Proceedings, pp. 11-19, 2004, Springer, 3-540-22919-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Matthew Allen |
Dematerialised data and human desire: the Internet and copy culture. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 2nd International Conference on Cyberworlds (CW 2003), 3-5 December 2003, Singapore, pp. 26-33, 2003, IEEE Computer Society, 0-7695-1922-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Shambhu J. Upadhyaya |
Real-Time Intrusion Detection with Emphasis on Insider Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 82-85, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Donald J. Welch, Daniel Ragsdale, Wayne Schepens |
Training for Information Assurance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(4), pp. 30-37, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Herbert Fiedler |
zur diskussion gestellt: Cyber - libertär? Nach dem 11. September. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inform. Spektrum ![In: Inform. Spektrum 25(3), pp. 215-219, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Richard O. Mason |
Intellectual Property and Open Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 247, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Proprietary Property, Closed Source, Public Property, Open Source, Intellectual Property |
23 | Yayoi Itoh, Yang Chen, Kazuhiko Iida, Mamoru Shiiki, Keiji Mitsubuchi |
Experiment of metaverse learning method using anatomical 3D object. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRCAI ![In: Proceedings of the 8th International Conference on Virtual Reality Continuum and its Applications in Industry, VRCAI 2009, Yokohama, Japan, December 14-15, 2009, pp. 289-294, 2009, ACM, 978-1-60558-912-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virtual world, Second Life, 3D object, cyberspace, metaverse, learning method |
23 | Roberto Siagri |
Pervasive computers and the GRID: the birth of a computational exoskeleton for augmented reality. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESEC/SIGSOFT FSE ![In: Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007, Dubrovnik, Croatia, September 3-7, 2007, pp. 1-4, 2007, ACM, 978-1-59593-811-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
invited talk, mest compression, java, internet, sensor networks, grid, pervasive computing, wearable computers, eclipse, cyberspace, soda, exoskeleton |
23 | Daniel Memmi |
The nature of virtual communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 20(3), pp. 288-300, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Gemeinschaft, Gesellschaft, Community, Social networks, Groupware, Virtual communities, Cyberspace, Collaborative software |
23 | Manuel Oliveira 0002 |
Virtual environment system layered object model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Advances in Computer Entertainment Technology ![In: Proceedings of the 2004 ACM SIGCHI International Conference on Advances in Computer Entertainment Technology, 2004, Singapore, June 3-5, 2004, pp. 194-202, 2004, ACM, 1-58113-882-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
virtual environments, online games, component frameworks, cyberspace |
23 | Dennis L. Chao |
Doom as an interface for process management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the CHI 2001 Conference on Human Factors in Computing Systems, Seattle, WA, USA, March 31 - April 5, 2001., pp. 152-157, 2001, ACM, 1-58113-327-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Doom, Post-Modernism, vernacular, visualization, games, operating systems, video games, metaphors, 3D user interfaces, first-person shooter, cyberspace |
Displaying result #1 - #100 of 3530 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|