The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for false with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1957-1978 (17) 1979-1983 (16) 1984-1987 (17) 1988 (17) 1989-1990 (33) 1991-1992 (35) 1993 (20) 1994 (38) 1995 (55) 1996 (48) 1997 (67) 1998 (54) 1999 (98) 2000 (141) 2001 (176) 2002 (184) 2003 (258) 2004 (397) 2005 (594) 2006 (695) 2007 (763) 2008 (810) 2009 (501) 2010 (179) 2011 (128) 2012 (97) 2013 (133) 2014 (141) 2015 (158) 2016 (165) 2017 (188) 2018 (223) 2019 (261) 2020 (299) 2021 (329) 2022 (373) 2023 (399) 2024 (125)
Publication types (Num. hits)
article(2825) book(2) data(2) incollection(31) inproceedings(5351) phdthesis(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5009 occurrences of 2572 keywords

Results
Found 8232 publication records. Showing 8232 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
83Benoit Donnet, Bruno Baynat, Timur Friedman Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives. Search on Bibsonomy CoNEXT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bit clearing, measurement, bloom filters, false positives, traceroute, false negatives
68Tyne Liang, Suh-Yin Lee, Wei-Pang Yang False hits of tri-syllabic queries in a Chinese signature file. Search on Bibsonomy ICDAR The full citation details ... 1995 DBLP  DOI  BibTeX  RDF trisyllabic query false hits, Chinese signature file, superimposed coding method, character-based Chinese text retrieval, multisyllabic query, multicharacter query, random false hit, irrelevant characters, document signature, adjacency false hit, character sequence information, proper nouns, Chinese names, character hashing method, bigram, optimal weight assignment, query processing, optical character recognition, database theory, document image processing, visual databases
68Eugene Goldberg, Alexander Saldanha Timing Analysis with Implicitly Specified False Paths. Search on Bibsonomy VLSI Design The full citation details ... 2000 DBLP  DOI  BibTeX  RDF known false paths, implicit false path representation, timing analysis, breadth-first search
68Ronald Joe Stanley, Sanjeev Agarwal, Satish Somanchi The impact of false alarm mitigation on surface landmine detection in MWIR imagery. Search on Bibsonomy Pattern Anal. Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Airborne, Circular harmonics, False alarm mitigation, Landmine, RX, Image Processing, Transform
68Alan Su 0002, Yu-Chin Hsu, Ta-Yung Liu, Mike Tien-Chien Lee Eliminating false loops caused by sharing in control path. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF control path, false loop
68Alan Su 0002, Ta-Yung Liu, Yu-Chin Hsu, Mike Tien-Chien Lee Eliminating False Loops Caused by Sharing in Control Path. Search on Bibsonomy ISSS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF false loops, control path sharing, timing validation, design sign-off phase, data path sharing, control logic sharing, removal algorithm, computation complexity, high level synthesis, high level synthesis, filter, resource sharing, logic minimization
64Olivier Coudert An efficient algorithm to verify generalized false paths. Search on Bibsonomy DAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF co-sensitization, generalized false path, timing exception, formal verification, correctness, SAT, sensitization, false path, SDC
63David Hung-Chang Du, S. H. Yen, Subbarao Ghanta On the General False Path Problem in Timing Analysis. Search on Bibsonomy DAC The full citation details ... 1989 DBLP  DOI  BibTeX  RDF Graph Theory, Timing Analysis, Logic Simulation, VLSI circuit, Timing Verification, False path
59Longfei Shi, XueSong Wang 0003, Shunping Xiao Polarization discrimination between repeater false-target and radar target. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF repeater false-target, discrimination, polarization
55Shih Tsung Liang, Ming-Yi Weng Protecting IEEE 802.11 Wireless LANs against the FCS False Blocking Attack. Search on Bibsonomy ICPADS (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF false blocking attack, FCS false blocking detection and recovery, WLAN, IEEE 802.11, WEP
55S. Mathieu-Marni, Shyam Kuttikkad, Rama Chellappa Context-Aided False Alarm Reduction for SAR Automatic Target Recognition. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF target pixels, context-aided false alarm reduction, high-resolution airborne SAR, constant false alarm rate, CFAR detection, 2D site model, multipass imagery, clutter discrimination, intensity features, target recognition algorithms, image registration, shape, synthetic aperture radar, synthetic aperture radar, size, automatic target recognition, radar image
55Rajesh Elara Mohan, Wijerupage Sardha Wijesoma, Carlos Antonio Acosta Calderon, Changjiu Zhou Experimenting False Alarm Demand for Human Robot Interactions in Humanoid Soccer Robots. Search on Bibsonomy Int. J. Soc. Robotics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Human robot teams, Robot performance, False alarm demand, Humanoid soccer robots, Autonomy modes
55Taiki Todo, Atsushi Iwasaki, Makoto Yokoo, Yuko Sakurai Characterizing false-name-proof allocation rules in combinatorial auctions. Search on Bibsonomy AAMAS (1) The full citation details ... 2009 DBLP  BibTeX  RDF false-name-proof, mechanism design, combinatorial auctions
55Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanujam, Prithviraj Banerjee Reducing False Sharing and Improving Spatial Locality in a Unified Compilation Framework. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF loop and memory layout transformations, shared-memory multiprocessors, Data reuse, cache locality, false sharing
55Mahmut T. Kandemir, Alok N. Choudhary, J. Ramanujam, Prithviraj Banerjee On Reducing False Sharing while Improving Locality on Shared Memory Multiprocessors. Search on Bibsonomy IEEE PACT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF loop and memory layout transformations, shared-memory multiprocessors, data reuse, cache locality, false sharing
50Kenji Terada, Makoto Yokoo False-name-proof multi-unit auction protocol utilizing greedy allocation based on approximate evaluation values. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF false-name-proof, multi-unit auction, mechanism design
50Marwan A. Gharaybeh, Vishwani D. Agrawal, Michael L. Bushnell, Carlos G. Parodi False-Path Removal Using Delay Fault Simulation. Search on Bibsonomy J. Electron. Test. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF design for testability, fault simulation, Delay testing, path delay faults, synthesis for testability, redundancy removal
50David T. Blaauw, Rajendran Panda, Abhijit Das Removing user specified false paths from timing graphs. Search on Bibsonomy DAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
50Yuji Kukimoto, Robert K. Brayton Timing-safe false path removal for combinational modules. Search on Bibsonomy ICCAD The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
49Hae Young Lee, Tae Ho Cho A General Framework for Adaptive Filtering in Wireless Sensor Networks Based on Fuzzy Logic. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF false data injection attacks, false data filtering, security, Wireless sensor networks, fuzzy logic
48Melissa Tjiong, Johan Lukkien On the False-Positive and False-Negative Behavior of a Soft-State Signaling Protocol. Search on Bibsonomy AINA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF consistency, false-positive, false-negative, soft-state
46Sheng Li, Mingxi Wan, Supin Wang The Effects of the False Vocal Fold Gaps in a Model of the Larynx on Pressures Distributions and Flows. Search on Bibsonomy HCI (12) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF false vocal folds, pressure distributions, model, Speech production
46Kuang-Chih Liu, Chung-Ta King On the effectiveness of sectored caches in reducing false sharing misses. Search on Bibsonomy ICPADS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF sectored caches, false sharing misses, bus-based multiprocessors, coherence unit, MESI protocol, LU, SORBYR, SORBYC, benchmarks, FFT, performance metric, cache storage, Radix
45Ruslan Mitkov, Viktor Pekar 0001, Dimitar Blagoev, Andrea Mulloni Methods for extracting and classifying pairs of cognates and false friends. Search on Bibsonomy Mach. Transl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Cognates, Faux amis, Orthographic similarity, Distributonal similarity, Translational equivalence, Semantic similarity
45Hae Young Lee, Tae Ho Cho Key Inheritance-Based False Data Filtering Scheme in Wireless Sensor Networks. Search on Bibsonomy ICDCIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
45Zhihong Chong, Jeffrey Xu Yu, Hongjun Lu, Zhengjie Zhang, Aoying Zhou False-Negative Frequent Items Mining from Data Streams with Bursting. Search on Bibsonomy DASFAA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
45R. Iris Bahar, Hyunwoo Cho, Gary D. Hachtel, Enrico Macii, Fabio Somenzi Symbolic timing analysis and resynthesis for low power of combinational circuits containing false paths. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
44Sang Jin Lee, Hae Young Lee, Tae Ho Cho Adaptive threshold determination method for the dynamic filtering in wireless sensor networks using fuzzy logic. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF false data filtering, false data injection attacks, security, wireless sensor networks, fuzzy system
44Nan Tang 0001, Jeffrey Xu Yu, Kam-Fai Wong, Haifeng Jiang Fast Structural Join with a Location Function. Search on Bibsonomy DASFAA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
41Shan-Hung Wu, Keng-Pei Lin, Chung-Min Chen, Ming-Syan Chen Asymmetric support vector machines: low false-positive learning under the user tolerance. Search on Bibsonomy KDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF low false-positive learning, support vectormachine (svm), classification
41Sencun Zhu, Sanjeev Setia, Sushil Jajodia, Peng Ning Interleaved hop-by-hop authentication against false data injection attacks in sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF filtering false data, interleaved hop-by-hop, sensor networks, Authentication
41Riyad Alshammari, Sumalee Sonamthiang, Mohsen Teimouri, Denis Riordan Using Neuro-Fuzzy Approach to Reduce False Positive Alerts. Search on Bibsonomy CNSR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Classification, Intrusion Detection, False Positive, Neuro- Fuzzy
41Jongwoo Lee, Young-Ho Park 0002, Yongik Yoon 0001 SCSTallocator: Sized and Call-Site Tracing-Based Shared Memory Allocator for False Sharing Reduction in Page-Based DSM Systems. Search on Bibsonomy IDEAL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sized Allocation, Call Site Tracing, Distributed Shared Memory, Dynamic Memory Allocation, False Sharing
41Yuichi Sei, Shinichi Honiden Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF false event, security, wireless sensor network, node compromise, en-route filtering
41Jongwoo Lee, Sung Dong Kim, Jae Won Lee, Jangmin O CSTallocator: Call-Site Tracing Based Shared Memory Allocator for False Sharing Reduction in Page-Based DSM Systems. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Call Site Tracing, Distributed Shared Memory, Dynamic Memory Allocation, False Sharing
41Jyh-Herng Chow, Vivek Sarkar False Sharing Elimination by Selection of Runtime Scheduling Parameters. Search on Bibsonomy ICPP The full citation details ... 1997 DBLP  DOI  BibTeX  RDF runtime scheduling, compilers, shared-memory multiprocessors, parallel loops, false sharing
41Murali Kadiyala, Laxmi N. Bhuyan A dynamic cache sub-block design to reduce false sharing. Search on Bibsonomy ICCD The full citation details ... 1995 DBLP  DOI  BibTeX  RDF dynamic cache sub-block design, bus traffic, dynamic sub-block coherence protocol, simulation results, memory architecture, cache storage, false sharing, memory protocols
41Yungbum Jung, Jaehwang Kim, Jaeho Shin 0001, Kwangkeun Yi Taming False Alarms from a Domain-Unaware C Analyzer by a Bayesian Statistical Post Analysis. Search on Bibsonomy SAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
41Sandeep Mane, Jaideep Srivastava, San-Yih Hwang, Jamshid A. Vayghan Estimation of False Negatives in Classification. Search on Bibsonomy ICDM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Jamie Sherrah False Alarm Rate: a Critical Performance Measure for Face Recognition. Search on Bibsonomy FGR The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
41Aditya Akella, Srinivasan Seshan, Hari Balakrishnan The Impact of False Sharing on Shared Congestion Management. Search on Bibsonomy ICNP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
41Aditya Akella, Srinivasan Seshan The impact of false sharing on shared congestion management. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Hongjie He, Jiashu Zhang, Fan Chen 0003 A self-recovery fragile watermarking scheme for image authentication with superior localization. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tamper recovery, probability of false rejection, probability of false acceptance, digital watermarking
40John Daugman High Confidence Visual Recognition of Persons by a Test of Statistical Independence. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF personal identity recognition, statistical independence test, rapid visual recognition, phenotypic feature, multiscale quadrature 2-D Gabor wavelet coefficients, iris code, statistical decision theory, false accept error rates, false reject error rates, decision confidence levels, feature extraction, face recognition, face recognition, probability, statistical analysis, image coding, decision theory, image texture, exclusive-OR
40Amit Adam, Ehud Rivlin, Ilan Shimshoni ROR: Rejection of Outliers by Rotations. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF false matches, outliers, robust estimation, feature matching, Correspondence problem, outlier rejection
38Liu Zhen, Zhou Ming-Tian Spam Filtering Issue: FPD Research between False Positive and False Negative. Search on Bibsonomy FSKD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
37Guoren Wang, Ge Yu 0001, Junchang Xin, Yuhai Zhao, Ende Zhang Fast filtering false active subspaces for efficient high dimensional similarity processing. Search on Bibsonomy Sci. China Ser. F Inf. Sci. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF refining processing, false active subspace, high dimensional index
37Ulrich Reffle, Annette Gotscharek, Christoph Ringlstetter, Klaus U. Schulz Successfully detecting and correcting false friends using channel profiles. Search on Bibsonomy AND The full citation details ... 2008 DBLP  DOI  BibTeX  RDF error dictionaries, false friends, error correction
37Murthy Palla, Jens Bargfrede, Klaus Koch, Walter Anheier, Rolf Drechsler Adaptive Branch and Bound Using SAT to Estimate False Crosstalk. Search on Bibsonomy ISQED The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Crosstalk Analysis, False Noise, STA, SAT Solver
37Chan-Yun Yang, Wei-Wen Tseng, Jr-Syu Yang Reducing False Alarm of Video-Based Smoke Detection by Support Vector Machine. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Video-based Smoke detection, Pattern recognition, Support vector machines, False alarm, Margin
37Gina C. Tjhai, Maria Papadaki, Steven Furnell, Nathan L. Clarke The Problem of False Alarms: Evaluation with Snort and DARPA 1999 Dataset. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF True positive, DARPA dataset, Intrusion Detection System, False positive, Snort
37Gil-Han Kim, Hyung-Woo Lee SVM Based False Alarm Minimization Scheme on Intrusion Prevention System. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion Detection/Prevention, Network Security.1, False Alarm, Multi-class SVM
37Shlomo Hershkop, Salvatore J. Stolfo Combining email models for false positive reduction. Search on Bibsonomy KDD The full citation details ... 2005 DBLP  DOI  BibTeX  RDF email mining, false positive reduction, data mining, aggregators, spam, multiple classifiers, model combination
37Stefanie Scheid, Rainer Spang A Stochastic Downhill Search Algorithm for Estimating the Local False Discovery Rate. Search on Bibsonomy IEEE ACM Trans. Comput. Biol. Bioinform. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Local false discovery rates, stochastic search algorithms, biology and genetics, microarray analysis
37Zheng Rong Yang, Weiping Lu, Dejin Yu, Robert G. Harrison Detecting False Benign in Breast Cancer Diagnosis. Search on Bibsonomy IJCNN (3) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF false benign, Wisconsin database, neural networks, breast cancer diagnosis
37Hsiu-ching Hsieh, Chih-Chieh Hsiao, Hui-Chin Yang, Chung-Ping Chung, Jean Jyh-Jiun Shann Methods for Precise False-Overlap Detection in Tile-Based Rendering. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
37Moon Sun Shin, Eun Hee Kim, Keun Ho Ryu False Alarm Classification Model for Network-Based Intrusion Detection System. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
37Yuko Sakurai, Makoto Yokoo A false-name-proof double auction protocol for arbitrary evaluation values. Search on Bibsonomy AAMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF electronic commerce, mechanism design, double auction
37Kenji Terada, Makoto Yokoo False-Name-Proof Multi-unit Auction Protocol Utilizing Greedy Allocation Based on Approximate Evaluation Values. Search on Bibsonomy PRIMA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
36Yang Liu, Li Li Money Policy in Dynamic Stochastic General Equilibrium Models. Search on Bibsonomy CAR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Money Policy, Dynamic Stochastic General Equilibrium Model, MIU Citation: Yang Liu, Li Li, Money Policy in Dynamic Stochastic General Equilibrium Models, pp.406-409, 2009 International Asia Conference on Informatics in Control, Automation and Robotics, 2009 Peer Review Notice, Give Us Feedback Usage of this product signifies your acceptance of the Terms of Use. var addtoMethod=1, var AddURL = escape(http://doi.ieeecomputersociety.org/), var AddTitle = escape(Money Policy in Dynamic Stochastic General Equilibrium Models), var savedIndex = 0, function openLinks(pPackageTitle,title,pProductTitle, index) { var productId = escape(1564), var pubYear = escape(2009), var volume = escape(0), var issueNo = escape(0), var packageTitle = escape(2009 International Asia Conference on Informatics in Control, Automation and Robotics), var productTitle = escape(Informatics in Control, Automation and Robotics, International Asia Conference on), var acronymTemp = escape(CAR), var bcPageName = escape(C), var pubType = escape(p), var linkToYear=escape(/plugins/dl/years/1564), var linkToIssue=escape(/plugins/dl/years/1564?year=2009&vol=0), var linkToTOC=escape(/plugins/dl/toc/6544), var linkToAbstract = escape(/plugins/dl/doi/10.1109/CAR.2009.103), var journalPage = escape(cc), var abbrevTitle = escape(car), var yearTitle = escape(2009), var issueTitle = 'Issue No. ' + issueNo + ' - ' + packageTitle, var absTitle = escape(Money Policy in Dynamic Stochastic General Equilibrium Models), if(pubType == m) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/magazines/' + journalPage), } else if (pubType == t) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/transactions/' + journalPage), } else if (pubType == l) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/letters/' + journalPage), } else { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/proceedings/' + journalPage), } if (pubYear == 5555) { if(issueNo == 1) { if(abbrevTitle != cal) { breadcrumbs.add('PrePrints', linkToTOC, 1), } } else if(issueNo == 2) { breadcrumbs.add('RapidPosts', linkToTOC, 1), } else { }, } else if(pubType == p) { breadcrumbs.add(pProductTitle, linkToYear, 1), breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 2), breadcrumbs.add(pPackageTitle,linkToTOC, 3), breadcrumbs.add(title , linkToAbstract, 4), } else { breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 1), breadcrumbs.add(issueTitle,linkToTOC, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 3), } if(pubType == m) { //document.location = /portal/web/csdl/magazines/ + journalPage, var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/magazines/' + journalPage, } else if (pubType == t) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/transactions/' + journalPage, //document.location = /portal/web/csdl/transactions/ + journalPage, } else if (pubType == l) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/letters/' + journalPage, //document.location = /portal/web/csdl/letters/ + journalPage, } else { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/proceedings/' + journalPage, //document.location = /portal/web/csdl/proceedings/ + journalPage, } } Open Download Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 1, isStatic: 'end', namespacedId: 'p_p_id_digitallibraryabstract_WAR_plugins_INSTANCE_uxob_', portletId: 'digitallibraryabstract_WAR_plugins_INSTANCE_uxob' }), //, Math.floor(Math.random()*1E16), document.write('')&rrc=60" title="Search for publications containing 'tile=3,sz=300x250,336x280,ord=' + ord + '?></script>')'">tile=3,sz=300x250,336x280,ord=' + ord + '?>'), //]]> Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 2, isStatic: 'end', namespacedId: 'p_p_id_56_INSTANCE_T3mf_', portletId: '56_INSTANCE_T3mf' }), car, setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2)
36Feifei Feng, Yongjun Wu, Chu Zhang, Yiming Wu Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer. Search on Bibsonomy ICNC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF tumor marker, bronchofibroscope, lung cancer Citation: Feifei Feng, Yongjun Wu, Chu Zhang, Yiming Wu, Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer, icnc, vol. 2, pp.118-125, 2009 Fifth International Conference on Natural Computation, 2009 Peer Review Notice, Give Us Feedback Usage of this product signifies your acceptance of the Terms of Use. var addtoMethod=1, var AddURL = escape(http://doi.ieeecomputersociety.org/), var AddTitle = escape(Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer), var savedIndex = 0, function openLinks(pPackageTitle,title,pProductTitle, index) { var productId = escape(916), var pubYear = escape(2009), var volume = escape(2), var issueNo = escape(2), var packageTitle = escape(2009 Fifth International Conference on Natural Computation), var productTitle = escape(International Conference on Natural Computation), var acronymTemp = escape(ICNC), var bcPageName = escape(I), var pubType = escape(p), var linkToYear=escape(/plugins/dl/years/916), var linkToIssue=escape(/plugins/dl/years/916?year=2009&vol=2), var linkToTOC=escape(/plugins/dl/toc/7230), var linkToAbstract = escape(/plugins/dl/doi/10.1109/ICNC.2009.635), var journalPage = escape(i), var abbrevTitle = escape(icnc), var yearTitle = escape(2009), var issueTitle = 'Issue No. ' + issueNo + ' - ' + packageTitle, var absTitle = escape(Application of Artificial Neural Network Model Established by Tumor Markers and Bronchofibroscopic Data in Auxiliary Diagnosis of Lung Cancer), if(pubType == m) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/magazines/' + journalPage), } else if (pubType == t) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/transactions/' + journalPage), } else if (pubType == l) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/letters/' + journalPage), } else { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/proceedings/' + journalPage), } if (pubYear == 5555) { if(issueNo == 1) { if(abbrevTitle != cal) { breadcrumbs.add('PrePrints', linkToTOC, 1), } } else if(issueNo == 2) { breadcrumbs.add('RapidPosts', linkToTOC, 1), } else { }, } else if(pubType == p) { breadcrumbs.add(pProductTitle, linkToYear, 1), breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 2), breadcrumbs.add(pPackageTitle,linkToTOC, 3), breadcrumbs.add(title , linkToAbstract, 4), } else { breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 1), breadcrumbs.add(issueTitle,linkToTOC, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 3), } if(pubType == m) { //document.location = /portal/web/csdl/magazines/ + journalPage, var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/magazines/' + journalPage, } else if (pubType == t) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/transactions/' + journalPage, //document.location = /portal/web/csdl/transactions/ + journalPage, } else if (pubType == l) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/letters/' + journalPage, //document.location = /portal/web/csdl/letters/ + journalPage, } else { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/proceedings/' + journalPage, //document.location = /portal/web/csdl/proceedings/ + journalPage, } } Open Download Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 1, isStatic: 'end', namespacedId: 'p_p_id_digitallibraryabstract_WAR_plugins_INSTANCE_uxob_', portletId: 'digitallibraryabstract_WAR_plugins_INSTANCE_uxob' }), //, Math.floor(Math.random()*1E16), document.write('')&rrc=61" title="Search for publications containing 'tile=3,sz=300x250,336x280,ord=' + ord + '?></script>')'">tile=3,sz=300x250,336x280,ord=' + ord + '?>'), //]]> Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 2, isStatic: 'end', namespacedId: 'p_p_id_56_INSTANCE_T3mf_', portletId: '56_INSTANCE_T3mf' }), Artificial neural networks, setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2)
36Sushama P. Patil, Amol C. Goje The Effect of Developments in Student Attributes on Success in Programming of Management Students. Search on Bibsonomy ICETC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF mathematical aptitude, performance consistence in mathematics etc Citation: Sushama P. Patil, Amol C. Goje, The Effect of Developments in Student Attributes on Success in Programming of Management Students, icetc, pp.191-193, 2009 International Conference on Education Technology and Computer, 2009 Peer Review Notice, Give Us Feedback Usage of this product signifies your acceptance of the Terms of Use. var addtoMethod=1, var AddURL = escape(http://doi.ieeecomputersociety.org/), var AddTitle = escape(The Effect of Developments in Student Attributes on Success in Programming of Management Students), var savedIndex = 0, function openLinks(pPackageTitle,title,pProductTitle, index) { var productId = escape(1629), var pubYear = escape(2009), var volume = escape(0), var issueNo = escape(0), var packageTitle = escape(2009 International Conference on Education Technology and Computer), var productTitle = escape(Education Technology and Computer, International Conference on), var acronymTemp = escape(ICETC), var bcPageName = escape(I), var pubType = escape(p), var linkToYear=escape(/plugins/dl/years/1629), var linkToIssue=escape(/plugins/dl/years/1629?year=2009&vol=0), var linkToTOC=escape(/plugins/dl/toc/6836), var linkToAbstract = escape(/plugins/dl/doi/10.1109/ICETC.2009.35), var journalPage = escape(i), var abbrevTitle = escape(icetc), var yearTitle = escape(2009), var issueTitle = 'Issue No. ' + issueNo + ' - ' + packageTitle, var absTitle = escape(The Effect of Developments in Student Attributes on Success in Programming of Management Students), if(pubType == m) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/magazines/' + journalPage), } else if (pubType == t) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/transactions/' + journalPage), } else if (pubType == l) { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/letters/' + journalPage), } else { var breadcrumbs = new BreadCrumbs('/portal/web/csdl/proceedings/' + journalPage), } if (pubYear == 5555) { if(issueNo == 1) { if(abbrevTitle != cal) { breadcrumbs.add('PrePrints', linkToTOC, 1), } } else if(issueNo == 2) { breadcrumbs.add('RapidPosts', linkToTOC, 1), } else { }, } else if(pubType == p) { breadcrumbs.add(pProductTitle, linkToYear, 1), breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 2), breadcrumbs.add(pPackageTitle,linkToTOC, 3), breadcrumbs.add(title , linkToAbstract, 4), } else { breadcrumbs.add(yearTitle, linkToYear + '?year=' + pubYear + '&vol=' + volume, 1), breadcrumbs.add(issueTitle,linkToTOC, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 3), } if(pubType == m) { //document.location = /portal/web/csdl/magazines/ + journalPage, var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/magazines/' + journalPage, } else if (pubType == t) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/transactions/' + journalPage, //document.location = /portal/web/csdl/transactions/ + journalPage, } else if (pubType == l) { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/letters/' + journalPage, //document.location = /portal/web/csdl/letters/ + journalPage, } else { var urlLocation = location.protocol + '//' + location.host + '/portal/web/csdl/proceedings/' + journalPage, //document.location = /portal/web/csdl/proceedings/ + journalPage, } } Open Download Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 1, isStatic: 'end', namespacedId: 'p_p_id_digitallibraryabstract_WAR_plugins_INSTANCE_uxob_', portletId: 'digitallibraryabstract_WAR_plugins_INSTANCE_uxob' }), //, Math.floor(Math.random()*1E16), document.write('')&rrc=62" title="Search for publications containing 'tile=3,sz=300x250,336x280,ord=' + ord + '?></script>')'">tile=3,sz=300x250,336x280,ord=' + ord + '?>'), //]]> Liferay.Portlet.onLoad({ canEditTitle: false, columnPos: 2, isStatic: 'end', namespacedId: 'p_p_id_56_INSTANCE_T3mf_', portletId: '56_INSTANCE_T3mf' }), spatial ability, setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), setTimeout(window.location.href = ' + urlLocation + ', 0), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), breadcrumbs.setLastIndex(index-1), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), //breadcrumbs.select(index), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2), breadcrumbs.add('Abstract - '+ title , linkToAbstract, 2)
36Edson J. R. Justino, Abdenaim El Yacoubi, Flávio Bortolozzi, Robert Sabourin An Off-Line Signature Verification System using Hidden Markov Model and Cross-Validation. Search on Bibsonomy SIBGRAPI The full citation details ... 2000 DBLP  DOI  BibTeX  RDF off-line signature verification system, pre-processing process, segmentation process, feature extraction process, random falsifications, false acceptance concept, false rejection concept, intrapersonal variation, interpersonal variation, automatic decision threshold derivation, hidden Markov model, handwriting recognition, cross-validation, learning process
36W. Eric L. Grimson, Daniel P. Huttenlocher On the Sensitivity of the Hough Transform for Object Recognition. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF false peak likelihood bound, tessellation effects, pattern recognition, pattern recognition, object recognition, picture processing, picture processing, transforms, noise, occlusion, Hough transform, sensitivity, sensitivity, false positives, coordinate transformations, sensory data
35Hyeon Myeong Choi, Tae Ho Cho Energy Efficient MAC Length Determination Method for Statistical En-Route Filtering Using Fuzzy Logic. Search on Bibsonomy ICIC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SEF, Injected false report attack, Filtering scheme, Wireless sensor networks, Fuzzy
35Meng Su, Chih-Fang Wang, Wen-Chi Hou An approach of composing near optimal invalidation reports. Search on Bibsonomy Mobile Data Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF false invalidation, reconnection pattern, mobile databases, invalidation report
33Nuel Belnap Truth Values, Neither-true-nor-false, and Supervaluations. Search on Bibsonomy Stud Logica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF neither-true-nor-false, non-denoting terms, future tense, vagueness, paradoxes, truth values
33Gildas Avoine, Aslan Tchamkerten An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF false-acceptance rate, proximity check, mafia fraud, Authentication, RFID, memory, relay attack
33Shihheng Tsai, Chung-Yang Huang A false-path aware formal static timing analyzer considering simultaneous input transitions. Search on Bibsonomy DAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF critical path selection, multiple input transitioning, formal method, static timing analysis, false path
33Haris Aziz 0001, Mike Paterson False name manipulations in weighted voting games: splitting, merging and annexation. Search on Bibsonomy AAMAS (1) The full citation details ... 2009 DBLP  BibTeX  RDF Banzhaf index, Shapley-Shubik index, false-name manipulation, computational complexity, weighted voting games
33Mahmoud Jazzar, Aman Bin Jantan Using Fuzzy Cognitive Maps to Reduce False Alerts in SOM-Based Intrusion Detection Sensors. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF False alerts, Security, Intrusion detection, Self organizing maps, Fuzzy cognitive maps
33Gwanggil Jeon, Marco Anisetti, Kyoungjoon Park, Valerio Bellandi, Jechang Jeong Improvement of Moving Image Quality on AC-PDP by Rough Set Based Dynamic False Contour Reduction. Search on Bibsonomy RSFDGrC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Plasma display panel (PDP), motion picture distortion, dynamic false contour (DFC), temporal artifact, gray scale, rough set theory
33Shuo Zhou, Bo Yao, Hongyu Chen, Yi Zhu 0002, Chung-Kuan Cheng, Michael D. Hutton Efficient static timing analysis using a unified framework for false paths and multi-cycle paths. Search on Bibsonomy ASP-DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF biclique covering, false subgraphs, multi-cycle subgraphs, static timing analysis, time shifting
33Takayuki Suyama, Makoto Yokoo Strategy/False-name Proof Protocols for Combinatorial Multi-Attribute Procurement Auction. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strategy/false-name proof, mechanism design, combinatorial auction, multi-attribute
33Felipe S. Marques 0001, Renato P. Ribas, Sachin S. Sapatnekar, André Inácio Reis A new approach to the use of satisfiability in false path detection. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF unateness, satisfiability, false paths
33Daniel P. Huttenlocher, Eric W. Jaquith Computing Visual Correspondence: Incorporating the Probability of a False Match. Search on Bibsonomy ICCV The full citation details ... 1995 DBLP  DOI  BibTeX  RDF visual correspondence, false match, depth boundaries, uniform texture, poor quality, image segmentation, motion estimation, probability, probability, image sequences, similarity measure, optical flow, image matching, stereo image processing, stereo image processing, image texture, stereo disparity, motion boundaries
32Oliver Hinz False Information in Internet Auction Communities. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Kai Yang, Kwang-Ting Cheng Efficient identification of multi-cycle false path. Search on Bibsonomy ASP-DAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Makoto Shimamura, Kenji Kono Using Attack Information to Reduce False Positives in Network IDS. Search on Bibsonomy ISCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32A. A. Abimbola, Jose Munoz, William J. Buchanan Investigating False Positive Reduction in HTTP via Procedure Analysis. Search on Bibsonomy ICNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Wonseok Ahn, Jae-Seung Kim Flat-Region Detection and False Contour Removal in the Digital TV Display. Search on Bibsonomy ICME The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Atsushi Iwasaki, Makoto Yokoo, Kenji Terada A robust open ascending-price multi-unit auction protocol against false-name bids. Search on Bibsonomy EC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
32K. V. Manjunath, R. Govindarajan Hidden Costs in Avoiding False Sharing in Software DSMs. Search on Bibsonomy HiPC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
32Tor E. Jeremiassen, Susan J. Eggers Reducing False Sharing on Shared Memory Multiprocessors through Compile Time Data Transformations. Search on Bibsonomy PPoPP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
31Miad Faezipour, Mehrdad Nourani, Rina Panigrahy A hardware platform for efficient worm outbreak detection. Search on Bibsonomy ACM Trans. Design Autom. Electr. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF shared counters, worm outbreak, hashing, false positive, Network Intrusion Detection System, false negative, polymorphic worm
31Soo Young Moon, Tae Ho Cho Energy efficient filtering method in sensor networks. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SEF, false report injection, wireless sensor networks, security attacks
31Pars Mutaf, Claude Castelluccia Hash-Based Paging and Location Update Using Bloom Filters. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF concurrent paging, false location update, bloom filters, MIPv6, IP paging
31Stefan Axelsson The base-rate fallacy and the difficulty of intrusion detection. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF base-rate fallacy, intrusion detection, false alarm rate, detection rate
31Leonardo W. Estevez, Nasser Kehtarnavaz Computer Assisted Enhancement of Mammograms for Detection of Microcalcifications. Search on Bibsonomy CBMS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF computer-assisted mammogram enhancement, microcalcification detection, visual identification, false positive samples, general-purpose clustering algorithm, Issac, Interactive Selective and Adaptive Clustering, selective clustering, interactive adaptation, sensitive sample domains, clinical evaluation, routine reading session, generalization, interactive systems, object detection, medical image processing, sensitivity, breast cancer, generalisation (artificial intelligence), radiology, radiology
31Janne J. Lehtomäki, Johanna Vartiainen, Markku J. Juntti, Harri Saarnisaari CFAR Outlier Detection With Forward Methods. Search on Bibsonomy IEEE Trans. Signal Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Tossapon Boongoen, Qiang Shen 0001 Intelligent hybrid approach to false identity detection. Search on Bibsonomy ICAIL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF false identity detection, terrorist data, link analysis, hybrid algorithm
28Xiaoxiao Liu, Guangsheng Ma, Qiang Sun An Advanced Timing Characterization Method Considering Global False Path. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF functional (mode) dependency, timing analysis, false path, Circuit delay
28Jing-Jia Liou, Angela Krstic, Li-C. Wang, Kwang-Ting Cheng False-path-aware statistical timing analysis and efficient path selection for delay testing and timing validation. Search on Bibsonomy DAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF critical path selection, statistical timing analysis, false path
28Bong-Su Kang, Sung-Il Chien, Kil-Taek Lim, Jin-Ho Kim Large Scale Pattern Recognition System using Hierarchical Neural Network and False-Alarming Nodes. Search on Bibsonomy ICTAI The full citation details ... 1997 DBLP  DOI  BibTeX  RDF False-alarming node and Error-prone negative examples, Hierarchical neural network, Topology-preserving mapping
28J. Mike McHugh, Janusz Konrad, Venkatesh Saligrama, Pierre-Marc Jodoin, David A. Castañón Motion detection with false discovery rate control. Search on Bibsonomy ICIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Andrew Foss, Osmar R. Zaïane Estimating True and False Positive Rates in Higher Dimensional Problems and Its Data Mining Applications. Search on Bibsonomy ICDM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Martin Dolejsi, Jan Kybic, Stanislav Tuma, Michal Polovincak Reducing false positive responses in lung nodule detector system by asymmetric adaboost. Search on Bibsonomy ISBI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Yuko Sakurai, Yasumasa Saito, Atsushi Iwasaki, Makoto Yokoo Beyond Quasi-linear Utility: Strategy/False-Name-Proof Multi-unit Auction Protocols. Search on Bibsonomy IAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Rafal Pokrywka Reducing False Alarm Rate in Anomaly Detection with Layered Filtering. Search on Bibsonomy ICCS (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Haruna Matsushita, Yoshifumi Nishio Batch-Learning Self-Organizing Map with false-neighbor degree between neurons. Search on Bibsonomy IJCNN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 8232 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license