The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for restrict with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1960-1980 (16) 1981-1987 (19) 1988-1989 (17) 1990 (29) 1991-1992 (18) 1993-1994 (30) 1995-1996 (41) 1997 (25) 1998 (24) 1999 (39) 2000 (53) 2001 (53) 2002 (65) 2003 (79) 2004 (114) 2005 (133) 2006 (137) 2007 (171) 2008 (160) 2009 (123) 2010 (21) 2011-2016 (19) 2017-2021 (16) 2022-2024 (7)
Publication types (Num. hits)
article(234) incollection(7) inproceedings(1168)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1347 occurrences of 1099 keywords

Results
Found 1409 publication records. Showing 1409 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
51Alexander Aiken, Jeffrey S. Foster, John Kodumal, Tachio Terauchi Checking and inferring local non-aliasing. Search on Bibsonomy PLDI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF effect inference, constraints, types, locking, alias analysis, Linux kernel, type qualifiers, restrict, confine, flow-sensitivity
44Hideki Tode, Zhu Tianwei, Shouhei Nishi, Koso Murakami A Route Design Algorithm for Multiple-Encoding Optical CDM Switching Network. Search on Bibsonomy LCN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF light interference, photonic switching systems, route design algorithm, multiple-encoding optical CDM switching network, photonic IP switching system, routing information, interference noise, restrict-complied routing method, Bellman-Ford algorithm, Internet, transport protocols, encoding, network topologies, telecommunication network routing, optical fibre networks, next generation Internet
40Takeshi Ando, Jun Okamoto, Masakatsu G. Fujie Intelligent corset to support rollover of cancer bone metastasis patients - Mechanism to restrict the trunk ROM. Search on Bibsonomy IROS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
33Jochen Hipp, Christoph Mangold, Ulrich Güntzer, Gholamreza Nakhaeizadeh Efficient Rule Retrieval and Postponed Restrict Operations for Association Rule Mining. Search on Bibsonomy PAKDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
31Jeffrey S. Foster, Tachio Terauchi, Alexander Aiken Flow-Sensitive Type Qualifiers. Search on Bibsonomy PLDI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF effect inference, constraints, types, locking, alias analysis, linux kernel, type qualifiers, restrict, flow-sensitivity
26Rachel Young, Melissa Tully, Leandra Parris, Marizen Ramirez, Mallory Bolenbaugh, Ashley Hernandez Barriers to mediation among U.S. parents of adolescents: A mixed-methods study of why parents do not monitor or restrict digital media use. Search on Bibsonomy Comput. Hum. Behav. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
26Henrietta Batinovic, Fabian Tingelhoff, Maik Hammerschmidt, Sofia Schöbel Come Closer, but Not Too Close: How Virtual Influencers Can Facilitate or Restrict Brand Experiences in the Metaverse. Search on Bibsonomy HICSS The full citation details ... 2024 DBLP  BibTeX  RDF
26Tatiane Nogueira Rios, Ricardo Araújo Rios, Rodrigo Fernandes de Mello eXplainable Ensemble Strategy using distinct and restrict learning biases: A case study on the Brazilian Forest. Search on Bibsonomy Appl. Soft Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26McKenna McCall, Abhishek Bichhawat, Limin Jia 0001 Tainted Secure Multi-Execution to Restrict Attacker Influence. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Yue Jiang, Jing Chen, Qi Chen, Long Liu Promote or Restrict? A Co-design Practice of a Palliative Care Information Management System in China. Search on Bibsonomy HCI (19) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
26Kine Ødegård Hanssen, Anders Malthe-Sørenssen Perineuronal nets restrict transport near the neuron surface: A coarse-grained molecular dynamics study. Search on Bibsonomy Frontiers Comput. Neurosci. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Haobin Chen, Yuer Yang, Yubing Wu Invalid Message Risks and Analysis of Laws to Restrict Cyber Crime in Social Applications. Search on Bibsonomy ICNCC The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
26Jessica A. Enright, Kitty Meeks, George B. Mertzios, Viktor Zamaraev Deleting edges to restrict the size of an epidemic in temporal networks. Search on Bibsonomy J. Comput. Syst. Sci. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Ajay Kumar Sahu, Ashish Kumar A Novel Verification Protocol to Restrict Unconstitutional Access of Information From Smart Card. Search on Bibsonomy Int. J. Digit. Crime Forensics The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Mohammad Mahdi Bejani, Mehdi Ghatee Adaptive Low-Rank Regularization with Damping Sequences to Restrict Lazy Weights in Deep Networks. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
26Ajinkya Gaikwad, Soumen Maity Edge Deletion to Restrict the Size of an Epidemic. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
26Barjinder Kaur, Sajjad Dadkhah, Pulei Xiong, Shahrear Iqbal, Suprio Ray, Ali A. Ghorbani 0001 Verification Based Scheme to Restrict IoT Attacks. Search on Bibsonomy BDCAT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
26Matthew J. Roos Utilizing a null class to restrict decision spaces and defend against neural network adversarial attacks. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
26Christian Bailly, Gérard Vergoten N-glycosylation and ubiquitinylation of PD-L1 do not restrict interaction with BMS-202: A molecular modeling study. Search on Bibsonomy Comput. Biol. Chem. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Victor Hugo Madrid-Mendoza, Maria Carmen Torres-Salazar, Areli Rizo-Aguilar, Viridiana Aydeé León-Hernández, Martha Roselia Contreras-Valenzuela Determination of Assessment Elements That Restrict REBA Implementations Within Aseptic Areas. A Study Case. Search on Bibsonomy AHFE (15) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
26Junhua Zhu, Limin Wang, Yu Gu, Xiaojun Lin Learning to Restrict Test Range for Compiler Test. Search on Bibsonomy ICST Workshops The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Jessica A. Enright, Kitty Meeks, George B. Mertzios, Viktor Zamaraev Deleting Edges to Restrict the Size of an Epidemic in Temporal Networks. Search on Bibsonomy MFCS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
26Jessica A. Enright, Kitty Meeks Deleting Edges to Restrict the Size of an Epidemic: A New Application for Treewidth. Search on Bibsonomy Algorithmica The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Jessica A. Enright, Kitty Meeks, George B. Mertzios, Viktor Zamaraev Deleting edges to restrict the size of an epidemic in temporal networks. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
26Juliao Braga, João Nuno Silva, Patricia Takako Endo, Jessica Ribas, Nizam Omar Blockchain to Improve Security and Knowledge in Inter-Agent Communication and Collaboration over Restrict Domains of the Internet Infrastructure. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
26Tomoki Yoshihisa, Tomoya Kawakami, Yuuichi Teranishi, Shinji Shimojo A System to Restrict Regions of Image Processing by Laser Range Scanners. Search on Bibsonomy GCCE The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
26Peter Mell, James M. Shook, Richard E. Harang, Serban I. Gavrila Linear Time Algorithms to Restrict Insider Access using Multi-Policy Access Control Systems. Search on Bibsonomy J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Marcelo Antonio de Carvalho, Paulo Bandiera-Paiva Evaluating ISO 14441 privacy requirements on role based access control (RBAC) restrict mode via Colored Petri Nets (CPN) modeling. Search on Bibsonomy ICCST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
26Laurent Bulteau, Guillaume Fertin, Eric Tannier Genome rearrangements with indels in intergenes restrict the scenario space. Search on Bibsonomy BMC Bioinform. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Bing Li, Shuai Chen A dynamic PUF anti-aging authentication system based on restrict race code. Search on Bibsonomy Sci. China Inf. Sci. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Jean-Baptiste Braconnier, Roland Lenain, Benoît Thuilot, Vincent Rousseau High speed path tracking application in harsh conditions: Predictive speed control to restrict the lateral deviation to some threshold. Search on Bibsonomy IROS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Emir Ugljanin, Noura Faci, Vanilson Arruda Burégio, Zakaria Maamar How to Restrict Web 2.0 Applications Use in the Workplace? Example of Google+ Hangouts. Search on Bibsonomy EDOC Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Yu Zhou 0025, Ruifeng Xu, Lin Gui 0003 A sequence level latent topic modeling method for sentiment analysis via CNN based Diversified Restrict Boltzmann Machine. Search on Bibsonomy ICMLC The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
26Jessica A. Enright, Kitty Meeks Deleting edges to restrict the size of an epidemic. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
26Jessica A. Enright, Kitty Meeks Deleting Edges to Restrict the Size of an Epidemic: A New Application for Treewidth. Search on Bibsonomy COCOA The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
26Yang Wang 0074, Man Ho Au, Willy Susilo Attribute-based optimistic fair exchange: How to restrict brokers with policies. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26John Champaign, Robin Cohen, Noel Sardana, John A. Doucette A framework to restrict viewing of peer commentary on Web objects based on trust modeling. Search on Bibsonomy Soc. Netw. Anal. Min. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Wujie Wen, Yaojun Zhang, Mengjie Mao, Yiran Chen 0001 State-Restrict MLC STT-RAM Designs for High-Reliable High-Performance Memory System. Search on Bibsonomy DAC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
26Menal Guzelsoy, George L. Nemhauser, Martin W. P. Savelsbergh Restrict-and-relax search for 0-1 mixed-integer programs. Search on Bibsonomy EURO J. Comput. Optim. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Ben Ambridge How Do Children Restrict Their Linguistic Generalizations? An (Un-)Grammaticality Judgment Study. Search on Bibsonomy Cogn. Sci. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Michael C. Calver, Maggie Lilith, Christopher R. Dickman A 'perverse incentive' from bibliometrics: could National Research Assessment Exercises (NRAEs) restrict literature availability for nature conservation? Search on Bibsonomy Scientometrics The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
26Yasuo Sakurai, Takayuki Suzuki, Kenichi Aiba, Takamasa Yoshinari, Kiyotaka Kawashima, Kazuyuki Kihara Proposal of a Mechanism to Restrict Pressure Change by Oil Temperature Change. Search on Bibsonomy Int. J. Autom. Technol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26Hoang Thi My Le, Phan Thi Bong, Huy Khanh Phan Building a Machine Translation System in a Restrict Context from Ka-Tu Language into Vietnamese. Search on Bibsonomy KSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
26ZiJie Xu, Ke Xu Ways to restrict the differential path. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2011 DBLP  BibTeX  RDF
26Anca Dinu A Mechanism to Restrict the Scope of Clause-Bounded Quantifiers in 'Continuation' Semantics. Search on Bibsonomy RANLP The full citation details ... 2011 DBLP  BibTeX  RDF
26Xiong Liu, Haiwei Xue, Yiqi Dai A Self Adaptive Jamming Strategy to Restrict Covert Timing Channel. Search on Bibsonomy IPTC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
26Woo-Hwan Kim, HyoJin Yoon, Jung Hee Cheon Metered signatures: How to restrict the signing capability. Search on Bibsonomy J. Commun. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
26Susan Windisch Brown, Travis Rood, Martha Palmer Number or Nuance: Which Factors Restrict Reliable Word Sense Annotation? Search on Bibsonomy LREC The full citation details ... 2010 DBLP  BibTeX  RDF
26Jernej Vicic, Petr Homola, Vladislav Kubon A Method to Restrict the Blow-up of Hypotheses of a Non-disambiguated. Search on Bibsonomy RANLP The full citation details ... 2009 DBLP  BibTeX  RDF
26Abdul Wahid Hakmi, Stefan Holst, Hans-Joachim Wunderlich, Jürgen Schlöffel, Friedrich Hapke, Andreas Glowatz Restrict Encoding for Mixed-Mode BIST. Search on Bibsonomy VTS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Ashwin Srinivasan 0001, Ravi Kothari A Study of Applying Dimensionality Reduction to Restrict the Size of a Hypothesis Space. Search on Bibsonomy ILP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jeffrey M. Rosenfeld Spiders and Crawlers and Bots, Oh My: The Economic Efficiency and Public Policy of Contracts that Restrict Data Collection Search on Bibsonomy CoRR The full citation details ... 2001 DBLP  BibTeX  RDF
26Austin Tate, Brian Drabble, Jeff Dalton 0002 The Use of Condition Types to Restrict Search in an AI Planner. Search on Bibsonomy AAAI The full citation details ... 1994 DBLP  BibTeX  RDF
26Ken Currie, Austin Tate Using domain knowledge to restrict search in an AI planner. Search on Bibsonomy Expert Planning Systems The full citation details ... 1990 DBLP  BibTeX  RDF
26Barbara Dunin-Keplicz How To Restrict Ambiguity Of Discourse. Search on Bibsonomy EACL The full citation details ... 1985 DBLP  BibTeX  RDF
26Charles W. Bachman Why restrict the modelling capability of CODASYL data structure sets? Search on Bibsonomy AFIPS National Computer Conference The full citation details ... 1977 DBLP  DOI  BibTeX  RDF
21Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King Alhambra: a system for creating, enforcing, and testing browser security policies. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web browser, web security, cross-site scripting
21Stephen Smaldone, Vinod Ganapathy, Liviu Iftode Working set-based access control for network file systems. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, network file system
21Youpyo Hong, Peter A. Beerel, Jerry R. Burch, Kenneth L. McMillan Safe BDD Minimization Using Don't Cares. Search on Bibsonomy DAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
21William C. Ogden The human factors of natural language query systems. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
14Fernando Rosa-Velardo, David de Frutos-Escrig Decidability Results for Restricted Models of Petri Nets with Name Creation and Replication. Search on Bibsonomy Petri Nets The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Bernd Finkbeiner, Lars Kuhtz Monitor Circuits for LTL with Bounded and Unbounded Future. Search on Bibsonomy RV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Ivona Bezáková, Nayantara Bhatnagar, Dana Randall On the Diaconis-Gangolli Markov Chain for Sampling Contingency Tables with Cell-Bounded Entries. Search on Bibsonomy COCOON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
14Stefan Piger, Christian Grimm, Ralf Groeper, Christopher Kunz A Comprehensive Approach to Self-Restricted Delegation of Rights in Grids. Search on Bibsonomy CCGRID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF restricted delegation, Grid Computing, authorization policy, proxy certificate
14Christof Fetzer, Martin Süßkraut Switchblade: enforcing dynamic personalized system call models. Search on Bibsonomy EuroSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF system call interposition, system call models, security, taint analysis
14Tao-Yuan Jen, Dominique Laurent 0001, Nicolas Spyratos Mining all frequent projection-selection queries from a relational table. Search on Bibsonomy EDBT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
14Malathi Subramanian Theory and practice of e-governance in India: a gender perspective. Search on Bibsonomy ICEGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF citizenship, gender, participation, empowerment, information society, information communication technology
14Yu-Mei Liu, Shoubao Yang, Leitao Guo A Distributed Trust-based Reputation Model in P2P System. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF R-Chord, TBRM, Trust, Transaction, Reputation, p2p networks, Resource
14Chian C. Ho, Chi-Wei Chen Oversampling Sigma-Delta Modulator Stabilized by Sub-Bit Nonlinear Feedback Loop Technique. Search on Bibsonomy ICICIC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Marc Fetscherin Economics of online music and consumer behavior. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF online music, digital rights management, consumer behavior
14Imran Khan, Ronald Schroeter, Jane Hunter 0001 Implementing a Secure Annotation Service. Search on Bibsonomy IPAW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
14Xavier Rival Abstract Dependences for Alarm Diagnosis. Search on Bibsonomy APLAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Martin Grohe, Nicole Schweikardt Lower bounds for sorting with few random accesses to external memory. Search on Bibsonomy PODS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Orna Grumberg Abstraction and Refinement in Model Checking. Search on Bibsonomy FMCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
14Jianer Chen, Xiuzhen Huang, Iyad A. Kanj, Ge Xia Linear FPT reductions and computational lower bounds. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF lower bound, complexity theory, NP-hard problems
14Lalana Kagal, Timothy W. Finin Modeling Communicative Behavior Using Permissions and Obligations. Search on Bibsonomy AC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
14Yann Loyer, Umberto Straccia Default Knowledge in Logic Programs with Uncertainty. Search on Bibsonomy ICLP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
14Keji Suzuki Effects of Punishment into Actions in Social Agents. Search on Bibsonomy JSAI Workshops The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
14Sandeepan Sanyal, Sourav Bhattacharya Marriage of Wired and Wireless Networks to Build Tomorrows Internet. Search on Bibsonomy COMPSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
14Rachid Guerraoui, André Schiper "Gamma-Accurate" Failure Detectors. Search on Bibsonomy WDAG The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
14Rolf Hennicker Context Induction: a Proof Principle for Behavioural Abstractions. Search on Bibsonomy DISCO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
14Marc Gyssens On the Complexity of Join Dependencies. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
14A. J. Kfoury Analysis of Simple Programs Over Different Sets of Primitives. Search on Bibsonomy POPL The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
7Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
7Francesc Esteva, Lluís Godo, Carles Noguera Expanding the propositional logic of a t-norm with truth-constants: completeness results for rational semantics. Search on Bibsonomy Soft Comput. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Mathematical fuzzy logic, Left-continuous t-norms, T-norm based logics, Truth-constants, Evaluated formulae, Real and rational completeness
7Sylvain Lamprier, Tassadit Amghar, Frédéric Saubion, Bernard Levrat Query-oriented clustering: a multi-objective approach. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF query-oriented clustering, information retrieval, multiobjective optimization
7Aggelos Delis, Vassilios S. Verykios, Achilleas A. Tsitsonis A data perturbation approach to sensitive classification rule hiding. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
7Stefan Monnier, David Haguenauer Singleton types here, singleton types there, singleton types everywhere. Search on Bibsonomy PLPV The full citation details ... 2010 DBLP  DOI  BibTeX  RDF dependent types, certified compilation, singleton types
7Sam Burnett, Nick Feamster, Santosh S. Vempala Circumventing censorship with collage. Search on Bibsonomy SIGCOMM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF availability, censorship
7Clemente Rafael Borges, José Antonio Macías Feasible database querying using a visual end-user approach. Search on Bibsonomy EICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF usability, data warehouse, end-user development (eud), visual interfaces, web-based interaction
7Jin Zhou, Brian Demsky Bamboo: a data-centric, object-oriented approach to many-core software. Search on Bibsonomy PLDI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF data-centric languages, many-core programming
7Seung-Kyu Lee, Byung Ro Moon A new modular genetic programming for finding attractive technical patterns in stock markets. Search on Bibsonomy GECCO The full citation details ... 2010 DBLP  DOI  BibTeX  RDF modular genetic programming, technical patterns, patterns, stocks
7Christopher Thomas Ryan, Albert Xin Jiang, Kevin Leyton-Brown Computing pure strategy nash equilibria in compact symmetric games. Search on Bibsonomy EC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF rational generating functions, symmetric games, game theory
7Matthew P. Johnson 0001, Amotz Bar-Noy Brief announcement: pan and scan. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF directional sensors, coverage, targets
7Rena Bakhshi, Jörg Endrullis, Wan J. Fokkink, Jun Pang 0001 Brief announcement: asynchronous bounded expected delay networks. Search on Bibsonomy PODC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF abd networks, probabilistic algorithms, anonymous networks
7Gösta Grahne, Adrian Onet Data correspondence, exchange and repair. Search on Bibsonomy ICDT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
7Shunsuke Yoshida, Sumio Yano, Hiroshi Ando Implementation of a tabletop 3D display based on light field reproduction. Search on Bibsonomy SIGGRAPH Posters The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
7Hidehiko Masuhara, Atsushi Igarashi, Manabu Toyama Type relaxed weaving. Search on Bibsonomy AOSD The full citation details ... 2010 DBLP  DOI  BibTeX  RDF around advice, aspect-oriented programming, type safety
7Ilija Subasic User centered story tracking. Search on Bibsonomy SIGIR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF visualization, evaluation, temporal text mining
7Lanbo Zhang, Yi Zhang 0001 Interactive retrieval based on faceted feedback. Search on Bibsonomy SIGIR The full citation details ... 2010 DBLP  DOI  BibTeX  RDF faceted feedback, metadata-based retrieval, relevance feedback, interactive retrieval
Displaying result #1 - #100 of 1409 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license