|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 2162 occurrences of 1499 keywords
|
|
|
Results
Found 5237 publication records. Showing 5234 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
115 | Robert Law |
Using student blogs for documentation in software development projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 16th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2011, Darmstadt, Germany, June 27-29, 2011, pp. 366, 2011, ACM, 978-1-4503-0697-3. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
59 | Jiali Choy, Khoongming Khoo, Chuan-Wen Loe |
Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 157-173, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
time-memory-data trade-off, block cipher, meet-in-the-middle, triple DES |
59 | Zili Zhang 0001, Chengqi Zhang |
An improvement to matchmaking algorithms for middle agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings, pp. 1340-1347, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
multiagent systems, intelligent agents, matchmaking, middle agents |
57 | Chunsheng Li, Zili Zhang 0001, Chengqi Zhang |
A Platform for Dynamic Organization of Agents in Agent-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAT ![In: 2004 IEEE/WIC/ACM International Conference on Intelligent Agent Technology (IAT 2004), 20-24 September 2004, Beijing, China, pp. 454-457, 2004, IEEE Computer Society, 0-7695-2101-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
54 | Daria Loi, Sasanka Prabhala |
The rise of middle and upper middle class in emerging markets: product and service opportunities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 20th Australasian Computer-Human Interaction Conference, OZCHI 2008: Designing for Habitus and Habitat, Cairns, Australia, December 8-12, 2008, pp. 275-278, 2008, ACM, 0-9803063-4-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
playful triggers, mobile devices, ethnography, focus groups, consumer electronics, emerging markets |
53 | Fang Wang 0010 |
Self-organising communities formed by middle agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS ![In: The First International Joint Conference on Autonomous Agents & Multiagent Systems, AAMAS 2002, July 15-19, 2002, Bologna, Italy, Proceedings, pp. 1333-1339, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
communities, distributed information systems, self-organising, middle agents |
47 | Susan H. Rodger, Jenna Hayes, Gaetjens Lezin, Henry Qin, Deborah Nelson, Ruth Tucker, Mercedes Lopez, Stephen Cooper, Wanda P. Dann, Don Slater |
Engaging middle school teachers and students with alice in a diverse set of subjects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2009, Chattanooga, TN, USA, March 4-7, 2009, pp. 271-275, 2009, ACM, 978-1-60558-183-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
virtual worlds, alice, introductory computer science, middle school, k-12 education, under-represented groups |
47 | Yu Sasaki, Kazumaro Aoki |
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings, pp. 214-231, 2009, Springer, 978-3-642-02619-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
RIPEMD, double branch, preimage, meet-in-the-middle |
47 | Linda L. Werner, Jill Denner, Michelle Bliesner, Pat Rex |
Can middle-schoolers use Storytelling Alice to make games?: results of a pilot study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FDG ![In: Proceedings of the 4th International Conference on Foundations of Digital Games, FDG 2009, Orlando, Florida, USA, April 26-30, 2009, pp. 207-214, 2009, ACM, 978-1-60558-437-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Storytelling Alice, pair programming, middle-school, IT fluency |
47 | Christine Soriano, Gitesh K. Raikundalia, Jakub Szajman |
Middle-aged users' experience of short message service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUIC ![In: User Interfaces 2006, 7th Australasian User Interface Conference (AUIC 2006), Hobart, Tasmania, Australia, January 16-19 2005, pp. 109-112, 2006, Australian Computer Society, 1-920682-32-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
middle-aged users, usability, mobile phone, SMS, short message service, text messaging |
47 | Christine Soriano, Gitesh K. Raikundalia, Jakub Szajman |
A usability study of short message service on middle-aged users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OZCHI ![In: Proceedings of the 2005 Australasian Computer-Human Interaction Conference, OZCHI 2005, Canberra, Australia, November 21-25, 2005, 2005, ACM, 1-59593-222-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
middle-aged users, mobile phone, SMS, short message service, usability study, text messaging |
47 | Ulrike Meyer, Susanne Wetzel |
A man-in-the-middle attack on UMTS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Workshop on Wireless Security ![In: Proceedings of the 2004 ACM Workshop on Wireless Security, Philadelphia, PA, USA, October 1, 2004, pp. 90-97, 2004, ACM, 1-58113-925-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
authentication, UMTS, mobile communication, GSM, man-in-the-middle attack |
47 | Paul C. van Oorschot, Michael J. Wiener |
Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 229-236, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
parallel collision search, low Hamming weight exponents, cryptanalysis, DES, Meet-in-the-middle attack |
45 | Ching-Liang Su |
Original Finger Image Extraction by Morphological Technique and Finger Image Comparisons for Persons' Identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 45(1), pp. 1-14, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
finger shape extraction, finger shape identification, object curve comparison, morphology, dilating |
44 | Carola Trips, Michael Percillier |
Lemmatising Verbs in Middle English Corpora: The Benefit of Enriching the Penn-Helsinki Parsed Corpus of Middle English 2 (PPCME2), the Parsed Corpus of Middle English Poetry (PCMEP), and A Parsed Linguistic Atlas of Early Middle English (PLAEME). ![Search on Bibsonomy](Pics/bibsonomy.png) |
LREC ![In: Proceedings of The 12th Language Resources and Evaluation Conference, LREC 2020, Marseille, France, May 11-16, 2020, pp. 7170-7178, 2020, European Language Resources Association, 979-10-95546-34-4. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
43 | Chunsheng Li, Chengqi Zhang, Zili Zhang 0001 |
A Ring-Based Architectural Model for Middle Agents in Agent-Based System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning, 4th International Conference, IDEAL 2003, Hong Kong, China, March 21-23, 2003, Revised Papers, pp. 94-98, 2003, Springer, 3-540-40550-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
41 | Elton T. E. Barker, Tom Gheldof, Shai Gordin, Orly Lewis, Elisa Nury, Valeria Vitale, Rainer Simon, Katherine McDonough, Anne Chen, Miranda Williams, Adnan Almohamad, Sarah Middle, Duncan Hay, Alex Butterworth |
The Pelagios Network: Collaboration as a Community of Practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DH ![In: Annual International Conference of the Alliance of Digital Humanities Organizations, DH 2022, Graz, Austria, July 10-14, 2023, Conference Abstracts, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Sarah Middle, Alex Butterworth, Rebekah Higgitt |
From There to Posterity: Modelling Diverse Itineraries of Scientific Instruments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DH ![In: Annual International Conference of the Alliance of Digital Humanities Organizations, DH 2022, Graz, Austria, July 10-14, 2023, Conference Abstracts, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
41 | Sarah Middle, Ryan Horne, David A. McMeekin, Chiara Zuanni, Alex Butterworth |
Geographies of Place in Digital Art History. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Humanit. Arts Comput. ![In: Int. J. Humanit. Arts Comput. 16(1), pp. 94-109, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Rachael Middle, Lindsay Welch |
Experiences of digital exclusion and the impact on health in people living with severe mental illness. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Frontiers Digit. Health ![In: Frontiers Digit. Health 4, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Sarah Middle, Alex Butterworth |
Towards an Ontology of Pre-20th Century Scientific Instrument Types. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MTSR ![In: Metadata and Semantic Research - 16th Research Conference, MTSR 2022, London, UK, November 7-11, 2022, Revised Selected Papers, pp. 89-94, 2022, Springer, 978-3-031-39140-8. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
41 | Sarah Middle |
Widening access to Linked Ancient World Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DH ![In: 15th Annual International Conference of the Alliance of Digital Humanities Organizations, DH 2020, Ottawa, Canada, July 20-25, 2020, Conference Abstracts, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP BibTeX RDF |
|
41 | Janusz Wojtusiak, Reyhaneh Mogharab Nia, U. Nalla B. Durai, Beverly Middle, Robert Koester, Catherine Tompkins |
Using GPS to Locate the Missing and Track Wandering in People with Alzheimer's Disease. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2019, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 16-20, 2019, 2019, AMIA. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP BibTeX RDF |
|
40 | Paul A. Gross, Micah S. Herstand, Jordana W. Hodges, Caitlin Kelleher |
A code reuse interface for non-programmer middle school students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IUI ![In: Proceedings of the 15th International Conference on Intelligent User Interfaces, IUI 2010, Hong Kong, China, February 7-10, 2010, pp. 219-228, 2010, ACM, 978-1-60558-515-4. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
looking glass, non-programmer, storytelling alice, end user, code reuse, middle school |
40 | Ashok R. Basawapatna, Kyu Han Koh, Alexander Repenning |
Using scalable game design to teach computer science from middle school to graduate school. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 15th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2010, Bilkent, Ankara, Turkey, June 26-30, 2010, pp. 224-228, 2010, ACM, 978-1-60558-729-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
computational thinking pattern, middle school programming, scalable game design, student observation, university programming education, transfer |
40 | Joel C. Adams |
Scratching middle schoolers' creative itch. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 356-360, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
2-d animation, summer camps, games, videos, programming, music, computer science, gender, alice, scratch, middle school |
40 | Kazumaro Aoki, Yu Sasaki |
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2009, 29th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009. Proceedings, pp. 70-89, 2009, Springer, 978-3-642-03355-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
SHA-1, preimage, one-way, meet-in-the-middle, SHA-0 |
40 | Saharon Shelah |
Middle diamond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Arch. Math. Log. ![In: Arch. Math. Log. 44(5), pp. 527-560, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Normal ideals, Middle Diamond, Weak Diamond, Set theory |
40 | Jorge Luis Williams, Robert E. Hiromoto |
Sort-Middle Multi-Projector Immediate-Mode Rendering in Chromium. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Visualization ![In: 16th IEEE Visualization Conference, IEEE Vis 2005, Minneapolis, MN, USA, October 23-28, 2005, Proceedings, pp. 103-110, 2005, IEEE Computer Society, 0-7803-9462-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Sort-Middle, Multi-Projector, Immediate-Mode Rendering, Tile Displays, Cluster Rendering |
40 | Nikos A. Nikolaou, Charilaos A. Tsetsekas, Iakovos S. Venieris |
A QoS Middle-Ware for Network Adaptive Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 2 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume II, pp. 282-286, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
QoS Middle-Ware, QoS, ATM, IP, RSVP, Quality of service control |
40 | Kazuo Ohta, Kenji Koyama |
Meet-in-the-Middle Attack on Digital Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 140-154, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
Authentication, Digital signature, Hash function, One-way function, Meet-in-the-middle attack |
38 | Guoping Du, Hongguang Wang, Jie Shen |
Oppositional Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LORI ![In: Logic, Rationality, and Interaction, Second International Workshop, LORI 2009, Chongqing, China, October 8-11, 2009. Proceedings, pp. 319, 2009, Springer, 978-3-642-04892-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
oppositional logic, intuitionism, negation, paraconsistent |
38 | Achmad I. Kistijantoro, Graham Morgan, Santosh K. Shrivastava, Mark C. Little |
Enhancing an Application Server to Support Available Components. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 34(4), pp. 531-545, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
37 | Eyal Zisser |
Israel in the Middle East the Aftermath of the Arab Spring (2010-2017): An Involved Observer from the Sidelines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 7(1), pp. 19-36, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
37 | Pavel Tichý |
Fault Tolerant and Fixed Scalable Structure of Middle-Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLIMA ![In: Computational Logic in Multi-Agent Systems, 4th International Workshop, CLIMA IV, Fort Lauderdale, FL, USA, January 6-7, 2004, Revised Selected and Invited Papers, pp. 53-70, 2004, Springer, 3-540-24010-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
36 | William Aiello, Mihir Bellare, Giovanni Di Crescenzo, Ramarathnam Venkatesan |
Security Amplification by Composition: The Case of Doubly-Iterated, Ideal Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings, pp. 390-407, 1998, Springer, 3-540-64892-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
cascaded ciphers, Shannon model, Double DES, information theory, DES, Ciphers, meet in the middle attacks |
34 | Ugochi Acholonu |
Hacker's mentality: integrating games and hacking to build it fluency among middle school students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDC ![In: Interaction Design and Children, Proceedings of the 9th International Conference on Interaction Design and Children, IDC 2010, Barcelona, Spain, June 9-12, 2010, pp. 323-325, 2010, ACM, 978-1-60558-951-0. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
task-based learning, digital games, middle-school, IT fluency |
34 | Michelle Craig, Diane Horton |
Gr8 designs for Gr8 girls: a middle-school program and its evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 40th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2009, Chattanooga, TN, USA, March 4-7, 2009, pp. 221-225, 2009, ACM, 978-1-60558-183-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
activity day, middle-school girls, gender, outreach |
34 | Enric Trillas |
Non Contradiction, Excluded Middle, and Fuzzy Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WILF ![In: Fuzzy Logic and Applications, 8th International Workshop, WILF 2009, Palermo, Italy, June 9-12, 2009, Proceedings, pp. 1-11, 2009, Springer, 978-3-642-02281-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Self-contradiction, Non-contradiction, Excluded-middle, De Morgan algebras, Algebras of fuzzy sets |
34 | Yu Sasaki |
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings, pp. 79-94, 2009, Springer, 978-3-642-04473-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
wide pipe, pseudo-preimage, hash, preimage, truncate, meet-in-the-middle, HAVAL |
34 | Hüseyin Demirci, Ihsan Taskin, Mustafa Çoban, Adnan Baysal |
Improved Meet-in-the-Middle Attacks on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 144-156, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cryptanalysis, AES, Rijndael, meet-in-the-middle attack |
34 | Xingsen Li, Jun Li 0015, Yuejin Zhang, Yong Shi 0001 |
A Framework of Knowledge Management Platform for Middle and Small Business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Communications and Discoveries from Multidisciplinary Data ![In: Communications and Discoveries from Multidisciplinary Data, pp. 233-248, 2008, Springer, 978-3-540-78732-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Middle and Small Businesses, Knowledge Management Platform, Business-Oriented Knowledge Management, “Able Person” Problem, Knowledge Management |
34 | Maureen Doyle, Kevin G. Kirby, Gary Newell |
Engaging constructions: family-based computing experiences for immigrant middle school students. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 39th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2008, Portland, OR, USA, March 12-15, 2008, pp. 58-62, 2008, ACM, 978-1-59593-799-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hispanics in IT, middle-school computing, robotics in education, engagement |
34 | Hüseyin Demirci, Ali Aydin Selçuk |
A Meet-in-the-Middle Attack on 8-Round AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FSE ![In: Fast Software Encryption, 15th International Workshop, FSE 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers, pp. 116-126, 2008, Springer, 978-3-540-71038-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
meet-in-the-middle cryptanalysis, square attack, AES, Rijndael |
34 | Thomas Weigold, Thorsten Kramp, Reto Hermann, Frank Höring, Peter Buhler, Michael Baentsch |
The Zurich Trusted Information Channel - An Efficient Defence Against Man-in-the-Middle and Malicious Software Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TRUST ![In: Trusted Computing - Challenges and Applications, First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008, Villach, Austria, March 11-12, 2008, Proceedings, pp. 75-91, 2008, Springer, 978-3-540-68978-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secure Internet Banking, Authentication, Malicious Software, Secure Token, Man-in-the-middle |
34 | Saikat Guha 0002, Paul Francis |
An end-middle-end approach to connection establishment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCOMM ![In: Proceedings of the ACM SIGCOMM 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Kyoto, Japan, August 27-31, 2007, pp. 193-204, 2007, ACM, 978-1-59593-713-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
NUTSS, end-middle-end, off-path, on-path, signaling |
34 | Markku-Juhani Olavi Saarinen |
A Meet-in-the-Middle Collision Attack Against the New FORK-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 10-17, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
FORK-256, Hash Function Cryptanalysis, Meet-in-the-middle Attack |
34 | P. Mani Joseph, Barry M. Lunt |
IT in the middle east: an overview. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 7th Conference on Information Technology Education, SIGITE 2006, Minneapolis, Minnesota, USA, October 19-21, 2006, pp. 25-30, 2006, ACM, 1-59593-521-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
GCC region, IT programs, IT status, middle east, curriculum, information technology education, IT industry |
34 | Xia Brustoloni, José Carlos Brustoloni |
Hardening Web browsers against man-in-the-middle and eavesdropping attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 489-498, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
eavesdropping attack, just-in-time instruction, safe staging, well-in-advance instruction, certificate, HTTPS, password, Web browser, SSL, man-in-the-middle attack |
34 | Linda L. Werner, Shannon Campe, Jill Denner |
Middle school girls + games programming = information technology fluency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGITE Conference ![In: Proceedings of the 6th Conference on Information Technology Education, SIGITE 2005, Newark, NJ, USA, October 20-22, 2005, pp. 301-305, 2005, ACM, 1-59593-252-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
middle school girls, project-based program, pair programming, IT fluency |
34 | Chihab Hanachi, Christophe Sibertin-Blanc |
Protocol Moderators as Active Middle-Agents in Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Auton. Agents Multi Agent Syst. ![In: Auton. Agents Multi Agent Syst. 8(2), pp. 131-164, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multi-agent system, coordination, High Level Petri Net, protocol engineering, middle-agent |
34 | Guillaume Hanrot, Michel Quercia, Paul Zimmermann |
The Middle Product Algorithm I. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Appl. Algebra Eng. Commun. Comput. ![In: Appl. Algebra Eng. Commun. Comput. 14(6), pp. 415-438, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Middle product, Division, Square root, Inversion, Newtons method |
32 | Kwang-Baek Kim, Cheol-Ki Kim |
Performance Improvement of RBF Network Using ART2 Algorithm and Fuzzy Logic System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Conference on Artificial Intelligence ![In: AI 2004: Advances in Artificial Intelligence, 17th Australian Joint Conference on Artificial Intelligence, Cairns, Australia, December 4-6, 2004, Proceedings, pp. 853-860, 2004, Springer, 3-540-24059-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Mansoor Alicherry, Angelos D. Keromytis |
DoubleCheck: Multi-path verification against man-in-the-middle attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the 14th IEEE Symposium on Computers and Communications (ISCC 2009), July 5-8, Sousse, Tunisia, pp. 557-563, 2009, IEEE Computer Society, 978-1-4244-4672-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
30 | Khaled Ouafi, Raphael Overbeck, Serge Vaudenay |
On the Security of HB# against a Man-in-the-Middle Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings, pp. 108-124, 2008, Springer, 978-3-540-89254-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
HB, RFID, authentication protocols |
30 | Tae-Hun Kim, Seung-Hwan Choi, Jong-Hwan Kim |
Incorporation of a Software Robot anda Mobile Robot Using a Middle Layer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Syst. Man Cybern. Part C ![In: IEEE Trans. Syst. Man Cybern. Part C 37(6), pp. 1342-1348, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Nick Howgrave-Graham |
A Hybrid Lattice-Reduction and Meet-in-the-Middle Attack Against NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 150-169, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
30 | Meilan Zhang, Chris Quintana |
Facilitating middle school students' sense making process in digital libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JCDL ![In: ACM/IEEE Joint Conference on Digital Libraries, JCDL 2005, Denver, CO, USA, June 7-11, 2005, Proceedings, pp. 19-20, 2005, ACM, 1-58113-876-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
online inquiry, digital libraries, scaffolding |
30 | Paul Hsueh-Min Chang, Kuang-Tai Chen, Yu-Hung Chien, Edward Chao-Chun Kao, Von-Wun Soo |
From Reality to Mind: A Cognitive Middle Layer of Environment Concepts for Believable Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
E4MAS ![In: Environments for Multi-Agent Systems, First International Workshop, E4MAS 2004, New York, NY, USA, July 19, 2004, Revised Selected Papers, pp. 57-73, 2004, Springer, 3-540-24575-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
30 | Andrew Stutzman |
Campus planning portfolio: using the peopleSoft portal to develop a planning website for middle states accreditation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 32nd Annual ACM SIGUCCS Conference on User Services 2004, Baltimore, MD, USA, October 10-13, 2004, pp. 23-25, 2004, ACM, 1-58113-869-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
peopleSoft enterprise portal 8.8, planning portfolio, portal, accreditation |
30 | Ramazan Savas Aygün, Aidong Zhang |
Middle-tier for multimedia synchronization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Multimedia ![In: Proceedings of the 9th ACM International Conference on Multimedia 2001, Ottawa, Ontario, Canada, September 30 - October 5, 2001, pp. 471-474, 2001, ACM, 1-58113-394-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
30 | Ronald Cramer, Ivan Damgård |
Fast and Secure Immunization Against Adaptive Man-in-the-Middle Impersonation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 75-87, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
30 | Sally Webster |
Caught in the middle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 17th Annual ACM SIGUCCS Conference on User Services, Bethesda, Maryland, USA, 1989, pp. 23-25, 1989, ACM, 0-89791-330-2. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
29 | Tobias Straub, Thilo-Alexander Ginkel, Johannes Buchmann 0001 |
A Multipurpose Delegation Proxy for WWW Credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 1-21, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Credential Delegation, WWW Authentication, Usability, X.509 Certificate, Man-In-The-Middle |
29 | Yunlei Zhao, Shirley H. C. Cheung, Binyu Zang, Bin B. Zhu |
A Note on the Cramer-Damgård Identification Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WINE ![In: Internet and Network Economics, First International Workshop, WINE 2005, Hong Kong, China, December 15-17, 2005, Proceedings, pp. 385-390, 2005, Springer, 3-540-30900-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
?OR, Cryptography, identification scheme, man-in-the- middle attacks |
28 | Huamin Li, Xingsen Li, Zhengxiang Zhu |
Knowledge Mining for Intelligent Decision Making in Small and Middle Business. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IITSI ![In: Third International Symposium on Intelligent Information Technology and Security Informatics, IITSI 2010, Jinggangshan, China, April 2-4, 2010, pp. 734-739, 2010, IEEE Computer Society, 978-0-7695-4020-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
intelligent decision, small and middle Business, Extenics, knowledge mining |
28 | Youwen Ouyang, Ursula Wolz, Susan H. Rodger |
Effective delivery of computing curriculum in middle school: challenges and solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 327-328, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
computing foundations, alice, scratch, middle school |
28 | Can Liu, Hua Xi |
Research on Rural Middle School Student's Media Literacy in HuNan and HuBei Province. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MVHI ![In: 2010 International Conference on Machine Vision and Human-machine Interface, MVHI 2010, Kaifeng, China, April 24-25, 2010, pp. 780-783, 2010, IEEE Computer Soceity, 978-0-7695-4009-2. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
rural middle school students, media literacy education, media literacy |
28 | Huang Jianwu, Wu Yijin, Qin Chaoqian, Helena Ndakeva, Tian Yajing |
Research on the Human-Water Relationship in the Middle Reaches of Yangtze River. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESIAT (1) ![In: 2009 International Conference on Environmental Science and Information Application Technology, ESIAT 2009, Wuhan, China, 4-5 July 2009, 3 Volumes, pp. 15-19, 2009, IEEE Computer Society, 978-0-7695-3682-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
The middle reaches of Yangtze River, human-water relationship, water environment, evolution, humans activities |
28 | Joel C. Adams |
Alice, middle schoolers & the imaginary worlds camps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 38th SIGCSE Technical Symposium on Computer Science Education, SIGCSE 2007, Covington, Kentucky, USA, March 7-11, 2007, pp. 307-311, 2007, ACM, 1-59593-361-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
3-D animation, camp, single-sex classes, programming, computer science, objects, gender, Alice, movies, middle school |
28 | Joris van der Hoeven |
Relaxed mltiplication using the middle product. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISSAC ![In: Symbolic and Algebraic Computation, International Symposium ISSAC 2003, Drexel University, Philadelphia, Pennsylvania, USA, August 3-6, 2003, Proceedings, pp. 143-147, 2003, ACM, 1-58113-641-2. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
middle product, relaxed multiplication, power series |
26 | Edigar Myula Msangawale, Ellen Kalinga, Honest C. Kimaro, Faraja Igira |
Exploring the Challenges Facing the ICT Industry Innovation Processes in Tanzania. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 12(1), pp. 1-13, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
26 | Charles Buabeng-Andoh |
Special Education Pre-Service Teachers' Acceptance of Assistive Technology: An Approach of Structural Equation Modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 11(1), pp. 1-12, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Hussein Abubakar Bakiri, Nerey H. Mvungi, Hamisi Ndyetabura, Libe Valentine Massawe, Hellen Maziku |
Review on the State of the Art of Electricity Load Forecasting Methodologies in Developing and Newly-Industrialised Countries: An Initiative to Establish an Effective Load Forecasting Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 11(1), pp. 1-13, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Manar Altamimi, Gary B. Wills, Nawfal Al Hashimy |
Expert Review of the Land Registration Framework in the Kingdom of Saudi Arabia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 11(1), pp. 1-18, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
26 | Benjamin Ghansah, Ben-Bright Benuwa |
Impact of Technology on University Leadership Effectiveness Among Academic Staff of Some Selected Private Universities in Ghana. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(2), pp. 1-15, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Hasifah Kasujja Namatovu, Tonny J. Oyana |
ICT Uptake as a Determinant of Antenatal Care Utilization in Uganda: A Mixed Methods Study in Jinja and Kampala. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(1), pp. 11-32, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Adeola Opesade, Mercy O. Afolayan |
Internet Use and Cybercrime Exposure of Public Secondary School Students in a Nigerian State Capital. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(2), pp. 1-20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Agnes Rwashana Semwanga, Evelyn Kigozi Kahiigi |
Assessing the Quality of E-Government Websites in Uganda. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(1), pp. 42-56, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Sunday Olufemi Akintelu, Simon Awojide, Amos Olufemi Akinbola, Waliu Mulero Adegbite |
Social Demographic Factors and Information and Communication Technology (ICT) Adoption Constrains Amongst Small and Medium Scale Farmers in Nigeria. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(1), pp. 33-41, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Frank Makoza |
Expediting ICT Policy Implementation in Malawi Through Public-Private Partnership. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(2), pp. 1-20, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Damas A. Makweba, Daudi Samson Simbeye |
Improvement of Energy-Efficiency in High Performance Computing (HPC): A Case Study of the HPC Facility at the Dar es Salaam Institute of Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(2), pp. 1-22, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Ernest Akpaku |
The Antecedents to the Actual Use of Digital Currencies in Ghana. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(2), pp. 1-19, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Folakemi Favour Kayode |
Seizure Prediction and Classification Using Affective Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(1), pp. 1-10, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Oluwatoyin C. Agbonifo, Samuel Ibukun Olotu, Toyosi Toriola Ademujimi |
BusTimer: A Voice-Based Automated Enquiry System for Public Transport. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 10(2), pp. 1-14, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
26 | Acheampong Owusu, Obed Kwame Adzaku Penu, Frederick Edem Broni Jr. |
Preliminary Insights Into the Applications of IT in Diverse Disciplines in Africa: A Systematic Literature Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(2), pp. 19-34, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Frank Makoza |
The Role of ICT in the Economic Recovery Plan of Malawi a Critical Discourse Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(1), pp. 91-110, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Herman E. Mandari, Daniel Ntabagi Koloseni, Julius Macha |
Continuance Usage of Mobile Banking Services Among Small and Medium Enterprises (SMEs) in Tanzania. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(1), pp. 50-66, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Agnes Rwashana Semwanga, Alice Mary Atwine |
Examining the Adoption of ICTs for Weather Monitoring and Climate Change Adaptation in Uganda. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(1), pp. 67-81, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Darrell Norman Burrell |
Teaching Graduate Technology Management Students With Innovative Learning Approaches Around Cybersecurity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(1), pp. 82-90, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Deogratius Mathew Lashayo |
Measuring E-Learning System Adoption in Universities in Tanzania: An Integration of Trust, Environmental Factors, and University Readiness Into an IS Success Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(2), pp. 1-18, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Nana Yaw Asabere, Eric Amoako |
Improving Career Decision-Making for High School Students Through a Web-Based Expert System: Field Testing in Ghana. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(1), pp. 1-23, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Neeta Baporikar, Sigried Shikokola |
Information Technology Adoption Dynamics for SMEs in the Manufacturing Sector of Namibia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(2), pp. 60-77, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Nana Yaw Asabere, Joseph Agyiri, Amevi Acakpovi, Abraham Nachanja, Priscilla Awuku |
Improving Education Delivery in a Technical University in Ghana Through Mobile Learning Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(2), pp. 35-59, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Christopher Nkiko, Edwin Iroroeavwo Achugbue, Omorodion Okuonghae |
Tackling Cybercrimes in the 5G Era: An Examination of the Readiness and Digital Skills of the Nigerian Police. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(2), pp. 78-90, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Prakash Bhagwan Dongardive |
Challenges and Opportunities in Building a Successful Digital Library in Developing Countries: Mekelle University, Ethiopia - A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 9(1), pp. 24-49, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
26 | Lubasi Kakwete Musambo, Jackson Phiri |
A Framework for Civil Registration in Developing Countries Based on Biometrics and ISO Standards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 8(2), pp. 32-74, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Betül Gür |
An Analysis of The Relation Between Foreign Direct Investment and Sociopolitical Variables in MENA Countries by Panel Regression. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 8(1), pp. 15-30, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Daniel Deogratus, Gilbert Maiga, Emmanuel Eilu |
A Framework for Enhancing the Adoption of E-Tax Services in Tanzania. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 8(2), pp. 1-17, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
26 | Tapiwanashe Miranda Sanyanga, Munyaradzi Sydney Chinzvende, Tatenda Duncan Kavu, John Batani |
Searching Objects in a Video Footage: Dropping Frames and Object Detection Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. ICT Res. Afr. Middle East ![In: Int. J. ICT Res. Afr. Middle East 8(2), pp. 18-31, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 5234 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|