|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 13 occurrences of 13 keywords
|
|
|
Results
Found 49 publication records. Showing 49 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
55 | Brett Eterovic-Soric, Kim-Kwang Raymond Choo, Helen Ashman, Sameera Mubarak |
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Secur. ![In: Comput. Secur. 70, pp. 278-289, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
46 | Sudhir Aggarwal, Mike Burmester, Peter Henry, Leo Kermes, Judie Mulholland |
Anti-Cyberstalking: The Predator and Prey Alert (PAPA) System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 195-205, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Sudhir Aggarwal, Peter Henry, Leo Kermes, Judie Mulholland |
Evidence Handling in Proactive Cyberstalking Investigations: The PAPA Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 165-176, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
36 | Susan W. Brenner |
U.S. Cybercrime Law: Defining Offenses. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 6(2), pp. 115-132, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
stalking, child pornography, cybercrime, hacking, fraud, terrorism |
27 | Murad Hasan, Shahriar Iqbal, Md. Billal Hossain Faisal, Md. Musnad Hossin Neloy, Md. Tonmoy Kabir, Md. Tanzim Reza, Md. Golam Rabiul Alam, Md. Zia Uddin |
A Computer Vision Based Approach for Stalking Detection Using a CNN-LSTM-MLP Hybrid Fusion Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.03417, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Travis Mayberry, Erik-Oliver Blass, Ellis Fenske |
Blind My - An Improved Cryptographic Protocol to Prevent Stalking in Apple's Find My Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Proc. Priv. Enhancing Technol. ![In: Proc. Priv. Enhancing Technol. 2023(1), pp. 85-97, January 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Kieron Ivy Turk, Alice Hutchings |
Stop Following Me! Evaluating the Effectiveness of Anti-Stalking Features of Personal Item Tracking Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2312.07157, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Chengcheng Wang, Yulong Wang, Qing-Long Han, Yunkai Wu |
MUTS-Based Cooperative Target Stalking for A Multi-USV System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE CAA J. Autom. Sinica ![In: IEEE CAA J. Autom. Sinica 10(7), pp. 1582-1592, 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Kieron Ivy Turk, Alice Hutchings, Alastair R. Beresford |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 78-88, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Kieron Ivy Turk |
Can't Keep Them Away: The Failures of Anti-stalking Protocols in Personal Item Tracking Devices (Transcript of Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols XXVIII - 28th International Workshop, Cambridge, UK, March 27-28, 2023, Revised Selected Papers, pp. 89-96, 2023, Springer, 978-3-031-43032-9. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Afaq Ashraf, Afaq Taha, Nida ul Habib Bajwa, Cornelius J. König, Mobin Javed, Maryam Mustafa |
"Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Nineteenth Symposium on Usable Privacy and Security, SOUPS 2023, Anaheim, CA, USA, August 5-7, 2023, pp. 37-56, 2023, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP BibTeX RDF |
|
27 | Katharina O. E. Müller, Louis Bienz, Bruno Rodrigues 0001, Chao Feng, Burkhard Stiller |
HomeScout: Anti-Stalking Mobile App for Bluetooth Low Energy Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 48th IEEE Conference on Local Computer Networks, LCN 2023, Daytona Beach, FL, USA, October 1-5, 2023, pp. 1-9, 2023, IEEE, 979-8-3503-0074-1. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Alexander Heinrich, Niklas Bittner, Matthias Hollick |
AirGuard - Protecting Android Users From Stalking Attacks By Apple Find My Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2202.11813, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
27 | Shweta Pandey, Anita Gehlot, Anil Kumar Dixit, Rajat Balyan, Rajesh Singh 0001, Samta Kathuria |
Innovation Intervention: Cyber Stalking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IC3I ![In: 5th International Conference on Contemporary Computing and Informatics, IC3I 2022, Uttar Pradesh, India, December 14-16, 2022, pp. 1638-1641, 2022, IEEE, 979-8-3503-9826-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Andrea Gallardo, Hanseul Kim, Tianying Li, Lujo Bauer, Lorrie Faith Cranor |
Detecting iPhone Security Compromise in Simulated Stalking Scenarios: Strategies and Obstacles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS @ USENIX Security Symposium ![In: Eighteenth Symposium on Usable Privacy and Security, SOUPS 2022, Boston, MA, USA, August 7-9, 2022., pp. 291-312, 2022, USENIX Association. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP BibTeX RDF |
|
27 | Alexander Heinrich, Niklas Bittner, Matthias Hollick |
AirGuard - Protecting Android Users from Stalking Attacks by Apple Find My Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISEC ![In: WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16 - 19, 2022, pp. 26-38, 2022, ACM, 978-1-4503-9216-7. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Bede Ravindra Amarasekara, Anuradha Mathrani, Chris Scogings |
Online Tracking: When Does it Become Stalking? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Vietnam. J. Comput. Sci. ![In: Vietnam. J. Comput. Sci. 8(4), pp. 585-605, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Francesca Stevens, Jason R. C. Nurse, Budi Arief |
Cyber Stalking, Cyber Harassment, and Adult Mental Health: A Systematic Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyberpsychology Behav. Soc. Netw. ![In: Cyberpsychology Behav. Soc. Netw. 24(6), pp. 367-376, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Bede Amarasekara, Anuradha Mathrani, Chris Scogings |
Stuffing, Sniffing, Squatting, and Stalking: Sham Activities in Affiliate Marketing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Libr. Trends ![In: Libr. Trends 68(4), pp. 659-678, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Maturi Sreerama Murty, Nallamothu Nagamalleswara Rao |
Stalking the Resources for Security in Linked Data Applications Using Resource Description Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ingénierie des Systèmes d Inf. ![In: Ingénierie des Systèmes d Inf. 25(6), pp. 793-801, 2020. The full citation details ...](Pics/full.jpeg) |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Waleed Mugahed Al-Rahmi, Noraffandy Yahaya, Mahdi M. Alamri, Nada Ali Aljarboa, Yusri Bin Kamin, Muhammad Sukri Bin Saud |
How Cyber Stalking and Cyber Bullying Affect Students' Open Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Access ![In: IEEE Access 7, pp. 20199-20210, 2019. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Alessio Antonini, Gustavo Gomez Mejia, Lucia Lupi |
All We Do is "Stalking": Studying New Forms of Reading in Social Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HT ![In: Proceedings of the 30th ACM Conference on Hypertext and Social Media, HT 2019, Hof, Germany, September 17-20, 2019., pp. 111-115, 2019, ACM, 978-1-4503-6885-8. The full citation details ...](Pics/full.jpeg) |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Julia R. Lippman |
I Did It Because I Never Stopped Loving You: The Effects of Media Portrayals of Persistent Pursuit on Beliefs About Stalking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. Res. ![In: Commun. Res. 45(3), pp. 394-421, 2018. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
27 | Tomoya Sumioka, Junichi Takeno |
Discussion of Stalking Behavior Using a Conscious System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BICA ![In: 8th Annual International Conference on Biologically Inspired Cognitive Architectures, BICA 2017, August 1-6, 2017, Moscow, Russia, pp. 467-472, 2017, Elsevier. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Jose J. Gonzalez, Magnus Bång, Colin Eden, Raquel Gimenez, Josune Hernantes, Susan Howick, Patricia Maraña, Igor Pyrko, Jaziar Radianti, Amy Rankin, Jose Mari Sarriegi |
Stalking Resilience - Cities as Vertebrae in Society's Resilience Backbone. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITDRR ![In: Information Technology in Disaster Risk Reduction - First IFIP TC 5 DCITDRR International Conference, ITDRR 2016, Sofia, Bulgaria, November 16-18, 2016, Revised Selected Papers, pp. 31-45, 2016, Springer, 978-3-319-68485-7. The full citation details ...](Pics/full.jpeg) |
2016 |
DBLP DOI BibTeX RDF |
|
27 | Diane Gan, Lily R. Jenkins |
Social Networking Privacy - Who's Stalking You? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Internet ![In: Future Internet 7(1), pp. 67-93, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Yuan Ding 0003, Sai Teja Peddinti, Keith W. Ross |
Stalking Beijing from Timbuktu: A Generic Measurement Approach for Exploiting Location-Based Social Discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPSM@CCS ![In: Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014, pp. 75-80, 2014, ACM, 978-1-4503-3155-5. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Georgios Exarchakos, Nick Antonopoulos |
Cooperative stalking of transient nomadic resources on overlay networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Gener. Comput. Syst. ![In: Future Gener. Comput. Syst. 29(6), pp. 1473-1484, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
27 | Subhajit Basu |
Stalking the Stranger in Web 2.0: A Contemporary Regulatory Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Law Technol. ![In: Eur. J. Law Technol. 3(2), 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP BibTeX RDF |
|
27 | Yuhao Yang 0007, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu 0005 |
Stalking online: on user privacy in social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CODASPY ![In: Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012, pp. 37-48, 2012, ACM, 978-1-4503-1091-8. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Amy Lyndon, Jennifer Bonds-Raacke, Alyssa D. Cratty |
College Students' Facebook Stalking of Ex-Partners. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cyberpsychology Behav. Soc. Netw. ![In: Cyberpsychology Behav. Soc. Netw. 14(12), pp. 711-716, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
27 | Jeffrey Nunemacher |
Prime Obsession by John Derbyshire; Stalking the Riemann Hypothesis by Dan Rockmore. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Am. Math. Mon. ![In: Am. Math. Mon. 113(5), pp. 469-473, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
27 | Gautham V. Pallapa, S. Balasundaram |
Agent Based Suspect Stalking in Ad Hoc Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IICAI ![In: Proceedings of the 1st Indian International Conference on Artificial Intelligence, IICAI 2003, Hyderabad, India, December 18-20, 2003, pp. 379-392, 2003, IICAI, 0-9727412-0-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
27 | Robert Kendall |
Stalking the wild Hypertext: the electronic literature directory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGWEB Newsl. ![In: SIGWEB Newsl. 9(1), pp. 9-11, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Donald Owen Case |
Stalking, Monitoring and Profiling: A Typology and Case Studies of Harmful Uses of Caller ID. ![Search on Bibsonomy](Pics/bibsonomy.png) |
New Media Soc. ![In: New Media Soc. 2(1), pp. 67-84, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Colleen M. Meyer, MaryEllen C. Sievert |
Stalking the Medical Informatics Literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 1999, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 6-10, 1999, 1999, AMIA. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
27 | Peggy Aldrich Kidwell |
Stalking the Elusive Computer Bug. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Ann. Hist. Comput. ![In: IEEE Ann. Hist. Comput. 20(4), pp. 5-9, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
27 | Francisco J. Ricardo |
Stalking the Paratext: Speculations on Hypertext Links as a Second Order Text. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hypertext ![In: HYPERTEXT '98. Proceedings of the Ninth ACM Conference on Hypertext and Hypermedia: Links, Objects, Time and Space - Structure in Hypermedia Systems, June 20-24, 1998, Pittsburgh, PA, USA, pp. 142-151, 1998, ACM. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
27 | Kevin R. Payne |
Stalking the Service Level Agreement: Aim High, Keep Low. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. CMG Conference ![In: 18th International Computer Measurement Group Conference, December 7-11, 1992, Reno, Nevada, USA, Proceedings, pp. 788-796, 1992, Computer Measurement Group. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
27 | John M. Carroll 0001, Mary Beth Rosson |
Deliberated Evolution: Stalking the View Matcher in Design Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Hum. Comput. Interact. ![In: Hum. Comput. Interact. 6(3-4), pp. 281-318, 1991. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
27 | Clifford Stoll |
Stalking the Wily Hacker. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 31(5), pp. 484-497, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
27 | Brigitte Grau |
Stalking "Coherence" in the Topical Jungle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FGCS ![In: Proceedings of the International Conference on Fifth Generation Computer Systems, FGCS 1984, Tokyo, Japan, November 6-9, 1984., pp. 652-659, 1984, OHMSHA Ltd. Tokyo and North-Holland, 4-274-07221-5. The full citation details ...](Pics/full.jpeg) |
1984 |
DBLP BibTeX RDF |
|
23 | Hyunjo Lee, Seung-Tae Hong, Min Yoon, Jung-Ho Um, Jae-Woo Chang |
A new cloaking algorithm using Hilbert curves for privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPRINGL ![In: Proceedings of the 3rd ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS, SPRINGL 2010, November 2, 2010, San Jose, California, USA, Proceedings, pp. 42-46, 2010, ACM. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
23 | Da-Yu Kao, Shiuh-Jeng Wang, Kush Mathur, Saransh Jain, Frank Fu-Yuan Huang |
Privacy Concealments: Detective Strategies Unveiling Cyberstalking on Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, APSCC 2008, Yilan, Taiwan, 9-12 December 2008, pp. 1364-1368, 2008, IEEE Computer Society, 978-0-7695-3473-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Mark V. Springett, Richard N. Griffiths |
Innovation for inclusive design: an approach to exploring the iDTV design space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UXTV ![In: Proceeding of the 1st International Conference on Designing Interactive User Experiences for TV and Video, UXTV 2008, Silicon Valley, California, USA, October 22-24, 2008, pp. 49-58, 2008, 978-1-60558-100-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
evaluation, prototypes, creativity, task models, design-space |
23 | Ieng-Fat Lam, Kuan-Ta Chen, Ling-Jyh Chen |
Involuntary Information Leakage in Social Network Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings, pp. 167-183, 2008, Springer, 978-3-540-89597-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
23 | Tao Jiang 0004, Helen J. Wang, Yih-Chun Hu |
Preserving location privacy in wireless lans. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSys ![In: Proceedings of the 5th International Conference on Mobile Systems, Applications, and Services (MobiSys 2007), San Juan, Puerto Rico, June 11-13, 2007, pp. 246-257, 2007, ACM, 978-1-59593-614-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy, localization, 802.11 |
23 | Mary Beth Rosson, John M. Carroll 0001, Christine Sweeney |
A view matcher for reusing Smalltalk classes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Conference on Human Factors in Computing Systems, CHI 1991, New Orleans, LA, USA, April 27 - May 2, 1991, Proceedings, pp. 277-283, 1991, ACM, 0-89791-383-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
Smalltalk |
23 | John L. Gustafson |
Reevaluating Amdahl's Law. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 31(5), pp. 532-533, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #49 of 49 (100 per page; Change: )
|
|