|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 28 occurrences of 26 keywords
|
|
|
Results
Found 24 publication records. Showing 23 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
92 | Blair Nonnecke, Dorine Andrews, Jenny Preece |
Non-public and public online community participation: Needs, attitudes and behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Electron. Commer. Res. ![In: Electron. Commer. Res. 6(1), pp. 7-20, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Nonpublic participation, Survey, Online community, Bulletin board, Lurking, Posting |
59 | Carla Fredrick |
Extreme Programming: Growing a Team Horizontally. ![Search on Bibsonomy](Pics/bibsonomy.png) |
XP/Agile Universe ![In: Extreme Programming and Agile Methods - XP/Agile Universe 2003, Third XP and Second Agile Universe Conference, New Orleans, LA, USA, August 10-13, 2003, Proceedings, pp. 9-17, 2003, Springer, 3-540-40662-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
hard fast rules, horizontal, Junit tests, shunted tests, persistence requirements, customer team, requirements, refactoring, extreme programming, XP, developers, vertical, stories, velocity, lurk |
45 | Tabea Lurk, Markus Schwander, Daniel Brefin, Beate Florenz |
Grenzgang. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DECH/UHDL ![In: Digital Research and Education in Architectural Heritage, 5th Conference, DECH 2017, and First Workshop, UHDL 2017, Dresden, Germany, March 30-31, 2017, Revised Selected Papers, pp. 179-195, 2017, Springer, 978-3-319-76992-9. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
45 | Jürgen Enge, Heinz Werner Kramski, Tabea Lurk |
Von der Floppy zur Festplatte. Zur Vereinnahmung komplexer digitaler Datensammlungen. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GI-Jahrestagung ![In: 43. Jahrestagung der Gesellschaft für Informatik, Informatik angepasst an Mensch, Organisation und Umwelt, INFORMATIK 2013, Koblenz, Germany, September 16-20, 2013, pp. 520-535, 2013, GI, 978-3-88579-614-5. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
45 | Andrzej Glowacz, Michal Grega, Mikolaj Leszczuk, Zdzislaw Papir, Piotr Romaniak, Pawel Fornalski, Michal Lutwin, Jürgen Enge, Tabea Lurk, Viliam Simko |
Open internet gateways to archives of media art. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Multim. Tools Appl. ![In: Multim. Tools Appl. 59(3), pp. 897-920, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
45 | Tabea Lurk, Dragan Espenschied, Juergen Enge |
Emulation in the context of digital art and cultural heritage preservation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Prax. Inf.verarb. Kommun. ![In: Prax. Inf.verarb. Kommun. 35(4), pp. 245-254, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
34 | Jin Yang, Zili Zhang, Chuangyin Dang, Ziqiong Zhang |
Are sticky users less likely to lurk? Evidence from online reviews. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Behav. Inf. Technol. ![In: Behav. Inf. Technol. 43(5), pp. 811-830, April 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
34 | Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong |
LURK: Lambda, the Ultimate Recursive Knowledge (Experience Report). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. ACM Program. Lang. ![In: Proc. ACM Program. Lang. 7(ICFP), pp. 259-274, August 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Janina Luise Samuel, André Schmiljun |
What dangers lurk in the development of emotionally competent artificial intelligence, especially regarding the trend towards sex robots? A review of Catrin Misselhorn's most recent book. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AI Soc. ![In: AI Soc. 38(6), pp. 2717-2721, December 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
34 | Nada Amin, John Burnham, François Garillot, Rosario Gennaro, Chhi'mèd Künzang, Daniel Rogozin, Cameron Wong |
LURK: Lambda, the Ultimate Recursive Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2023, pp. 369, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
34 | Hsiu-Hua Cheng, Chi-Wei Chen |
Why people lurk in theme-oriented virtual communities: integrating achievement goal theory and cognitive dissonance theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Res. ![In: Inf. Res. 27(1), 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Hsiu-Hua Cheng, Chi-Wei Chen |
Why people lurk in theme-oriented virtual communities: integrating achievement goal theory and cognitive dissonance theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Res. ![In: Inf. Res. 27(3), September 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
34 | Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan |
LURK: Server-Controlled TLS Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2020, pp. 1366, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
34 | Ioana Boureanu, Daniel Migault, Stere Preda, Hyame Assem Alamedine, Sanjay Mishra, Frederic Fieau, Mohammad Mannan |
LURK: Server-Controlled TLS Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustCom ![In: 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021, pp. 182-193, 2020, IEEE, 978-1-6654-0392-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
34 | Ross Ortega |
Defending the Corporate Crown Jewels from the Dangers that Lurk Within - Effective Internal Network Security Focuses on Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Secur. J. A Glob. Perspect. ![In: Inf. Secur. J. A Glob. Perspect. 16(1), pp. 54-60, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Lee-Ellen Marvin |
Spoof, Spam, Lurk and Lag: the Aesthetics of Text-based Virtual Realities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Mediat. Commun. ![In: J. Comput. Mediat. Commun. 1(2), 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
23 | David Saff |
Theory-infected: or how i learned to stop worrying and love universal quantification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 22nd Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2007, October 21-25, 2007, Montreal, Quebec, Canada, pp. 846-847, 2007, ACM, 978-1-59593-865-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
testing, theories, JUnit, partial specification |
23 | Yuri Takhteyev |
Using Foreign Forums. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 79, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Vladimir Soroka, Sheizaf Rafaeli |
Invisible participants: how cultural capital relates to lurking behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 15th international conference on World Wide Web, WWW 2006, Edinburgh, Scotland, UK, May 23-26, 2006, pp. 163-172, 2006, ACM, 1-59593-323-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
cultural capital, e-learning, lurking, Web forums |
23 | Matthias Hauswirth, Trishul M. Chilimbi |
Low-overhead memory leak detection using adaptive statistical profiling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASPLOS ![In: Proceedings of the 11th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS 2004, Boston, MA, USA, October 7-13, 2004, pp. 156-164, 2004, ACM, 1-58113-804-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
low-overhead monitoring, runtime analysis, memory leaks |
23 | Yasuharu Nishi |
Quality-Adaptive Testing: A Strategy for Testing with Focusing on Where Bugs Have Been Detected. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECSQ ![In: Software Quality - ECSQ 2002, 7th International Conference, Helsinki, Finland, June 9-13, 2002, Proceedings, pp. 331-339, 2002, Springer, 3-540-43749-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Michael Steiner 0001, Peter Buhler, Thomas Eirich, Michael Waidner |
Secure password-based cipher suite for TLS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 4(2), pp. 134-157, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
transport layer security, weak secret, password, key agreement, dictionary attack, Authenticated key exchange, perfect forward secrecy, secure channel |
23 | James A. Whittaker |
What Is Software Testing? Why Is It So Hard? Practice Tutorial. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 17(1), pp. 70-79, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #23 of 23 (100 per page; Change: )
|
|