The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for viruses with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1986-1989 (30) 1990-1992 (17) 1993-1994 (15) 1995-1997 (25) 1998-2001 (31) 2002 (22) 2003 (36) 2004 (69) 2005 (77) 2006 (94) 2007 (79) 2008 (64) 2009 (50) 2010 (23) 2011 (15) 2012 (21) 2013-2014 (32) 2015-2016 (24) 2017 (21) 2018 (27) 2019 (22) 2020 (35) 2021 (40) 2022 (33) 2023 (24) 2024 (2)
Publication types (Num. hits)
article(397) book(6) incollection(11) inproceedings(503) phdthesis(11)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 637 occurrences of 418 keywords

Results
Found 928 publication records. Showing 928 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
104Lansheng Han, Hui Liu, Baffour Kojo Asiedu Analytic Model for Network Viruses. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
97Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria Characterization of virus replication. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
88Yu Zhang 0003, Tao Li, Renchao Qin Computer Virus Evolution Model Inspired by Biological DNA. Search on Bibsonomy ICIC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF computer virus evolution, biological DNA, artificial life
85Jean-Marie Borello, Ludovic Mé Code obfuscation techniques for metamorphic viruses. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
84Erol Gelenbe Keeping Viruses Under Control. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Conflicts between Agents, Network Security, Computer Viruses
78Xiaohua Hu 0001, Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, Peter Rumm Integration of Instance-Based Learning and Text Mining for Identification of Potential Virus/Bacterium as Bio-terrorism Weapons. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
75Zhi-hong Zuo, Qingxin Zhu, Ming-Tian Zhou On the time complexity of computer viruses. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
75Leonard M. Adleman An Abstract Theory of Computer Viruses. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
68Jose Andre Morales, Peter J. Clarke, Yi Deng 0001 Characterizing and Detecting Virus Replication. Search on Bibsonomy ICONS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF behavior based self reference, replication security, virus detection
68Susanna L. Lamers, Marco Salemi, Michael S. McGrath, Gary B. Fogel Prediction of R5, X4, and R5X4 HIV-1 Coreceptor Usage with Evolved Neural Networks. Search on Bibsonomy IEEE ACM Trans. Comput. Biol. Bioinform. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF phenotype prediction, tropism, dual-tropic viruses, evolutionary computation, artificial neural networks, Computational intelligence, HIV, AIDS
67Chenxi Wang, John C. Knight, Matthew C. Elder On Computer Viral Infection and the Effect of Immunization. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF anti-virus systems, virus protection schemes, computer networks, simulation study, telecommunication security, computer network security, computer viruses, computer viruses, immunization
66Jose Andre Morales Threat of renovated .NET viruses to mobile devices. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
66Matt Webster, Grant Malcolm Detection of metamorphic computer viruses using algebraic specification. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
66Cholmin Kim, Soung-uck Lee, Manpyo Hong Macroscopic Treatment to Polymorphic E-mail Based Viruses. Search on Bibsonomy ICCSA (3) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
66Akira Mori Detecting Unknown Computer Viruses - A New Approach. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
65Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion A Classification of Viruses Through Recursion Theorems. Search on Bibsonomy CiE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF iteration theorem, polymorphism, propagation, Computer viruses, recursion theorem
65InSeon Yoo Visualizing windows executable viruses using self-organizing maps. Search on Bibsonomy VizSEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF windows executable viruses, visualization, self-organizing maps
64Yibin Zheng, Peter C. Doerschuk Reconstruction of viruses from solution X-ray scattering data. Search on Bibsonomy ICIP The full citation details ... 1995 DBLP  DOI  BibTeX  RDF X-ray scattering, biological techniques, viruses reconstruction, solution X-ray scattering data, 3-dimensional structure, icosahedrally-symmetric viruses, Gerchberg-Saxton algorithm generalization, unknown n-vector, norm squared, virus particles dynamics, cowpea mosaic virus, iterative methods, iterative algorithm, molecular configurations, molecular biophysics, model-based method
58Pavel V. Zbitskiy Code mutation techniques by means of formal grammars and automatons. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58Philippe Beaucamps Extended recursion-based formalization of virus mutation. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
58InSeon Yoo, Ulrich Ultes-Nitsche Non-signature based virus detection. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
58Lucian Ilie, Liviu Tinta, Cristian Popescu, Kathleen A. Hill Viral Genome Compression. Search on Bibsonomy DNA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF viral genomes, genome compression, overlapping genes, shortest common superstring problem, lower bounds, exact algorithms, viruses, approximate solutions
56Qiusun Ye A Practical VCR Technique of Preventing Computer Viruses' Creeping in Networks. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
56Erol Gelenbe Keeping Viruses Under Control. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55John Aycock, Ken Barker 0001 Viruses 101. Search on Bibsonomy SIGCSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF anti-virus software, university course, malware, computer viruses
55Nancy P. Kutner Viruses, updates, and security: making the campus aware. Search on Bibsonomy SIGUCCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anti-virus software, security, documentation, spam, firewalls, worms, E-mail, viruses
49Sadia Noreen, Shafaq Murtaza, M. Zubair Shafiq, Muddassar Farooq Evolvable malware. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF genetic algorithm, computer virus, artificial evolution
49Yu Zhang 0003, Tao Li, Renchao Qin A Dynamic Immunity-Based Model for Computer Virus Detection. Search on Bibsonomy ISIP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF vaccine gene library, computer immune system, artificial immune system, computer virus
49Deepak Venugopal, Guoning Hu, Nicoleta Roman Intelligent virus detection on mobile devices. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF common functionality, security, mobile, virus detection, DLL
49Ram Dantu, João W. Cangussu An Architecture for Network Security Using Feedback Control. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
48Pamela A. Thuman-Commike, Wah Chiu Three-Dimensional Reconstruction of Noisy Electron Microscopy Virus Particle Images. Search on Bibsonomy ICIP (1) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF biological techniques, noisy electron microscopy virus particle images, macromolecular complexes, icosahedral viruses, noisy projection images, low contrast images, automated reconstruction, high resolution 3D reconstruction, symmetry, computed tomography
46Jaromír Hubálek, Vojtech Adam, René Kizek New Approach in Rapid Viruses Detection and Its Implementation on a Chip. Search on Bibsonomy eTELEMED The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Abhishek Karnik, Suchandra Goswami, Ratan K. Guha Detecting Obfuscated Viruses Using Cosine Similarity Analysis. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Dimitrios Frosyniotis, Yannis Anthopoulos, Spiros Kintzios, Antonis Perdikaris, Constantine P. Yialouris A Multisensor Fusion System for the Detection of Plant Viruses by Combining Artificial Neural Networks. Search on Bibsonomy ICANN (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Xiaohua Hu 0001, Illhoi Yoo, Peter Rumm, Michael E. Atwood Mining Candidate Viruses as Potential Bio-terrorism Weapons from Biomedical Literature. Search on Bibsonomy ISI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Paul-Michael Agapow Computational Brittleness and the Evolution of Computer Viruses. Search on Bibsonomy PPSN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
39Min Feng 0001, Rajiv Gupta 0001 Detecting virus mutations via dynamic matching. Search on Bibsonomy ICSM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
39Elizabeth Van Ruitenbeek, Tod Courtney, William H. Sanders, Fabrice Stevens Quantifying the Effectiveness of Mobile Phone Virus Response Mechanisms. Search on Bibsonomy DSN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
39Jerry Cheng, Starsky H. Y. Wong, Hao Yang 0004, Songwu Lu SmartSiren: virus detection and alert for smartphones. Search on Bibsonomy MobiSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, privacy, smartphone, alert, virus detection
39Guillaume Bonfante, Matthieu Kaczmarek, Jean-Yves Marion Toward an Abstract Computer Virology. Search on Bibsonomy ICTAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
39Mark Daley, Ian McQuillan Viral Gene Compression: Complexity and Verification. Search on Bibsonomy CIAA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Hyungjoon Lee, Wonil Kim, Manpyo Hong Artificial Immune System against Viral Attack. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Hyungjoon Lee, Wonil Kim, Manpyo Hong Biologically Inspired Computer Virus Detection System. Search on Bibsonomy BioADIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
39Kevin Deeb, Steven Lewis A Biological Approach to the Development of Computer Autoimmune Systems. Search on Bibsonomy ISMIS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39Hitoshi Kanoh, Tomohiro Nakamura Knowledge based genetic algorithm for dynamic route selection. Search on Bibsonomy KES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
39Takeshi Okamoto, Yoshiteru Ishida A Distributed Approach to Computer Virus Detection and Neutralization by Autonomous and Heterogeneous Agents. Search on Bibsonomy ISADS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
39Yuji Watanabe, Hideki Imai Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
38Mark W. Bailey, Clark L. Coleman, Jack W. Davidson Defense against the dark arts. Search on Bibsonomy SIGCSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anti-virus software, compilers, computer science education, computer viruses
38Mayuresh Ektare, Yanxia Yang The Balancing Act Between Computer Security and Convenience. Search on Bibsonomy HCI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF convenience, user experience, Computer security, user behavior, Spyware, Viruses
36Sriram Subramaniam Determination of Protein Structures in Situ: Electron Tomography of Intact Viruses and Cells. Search on Bibsonomy ISBI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Li-Chiou Chen, Kathleen M. Carley The impact of countermeasure propagation on the prevalence of computer viruses. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part B The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Ruiqi Hu, Aloysius K. Mok Detecting Unknown Massive Mailing Viruses Using Proactive Methods. Search on Bibsonomy RAID The full citation details ... 2004 DBLP  DOI  BibTeX  RDF malicious executable detection, intrusion detection, virus detection
36Ajay Gupta 0002, Daniel C. DuVarney Using Predators to Combat Worms and Viruses: A Simulation-Based Study. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
36Kihun Chong, Ha Yoon Song, Sam H. Noh Traffic Characterization of the Web Server Attacks of Worm Viruses. Search on Bibsonomy International Conference on Computational Science The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Jeffrey Horton, Jennifer Seberry Companion Viruses and the Macintosh: Threats and Countermeasures. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
36Lein Harn, Hung-Yu Lin, Shoubao Yang A Software Authentication System for the Prevention of Computer Viruses. Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
36Steve R. White Covert Distributed Processing with Computer Viruses. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
36Paul Schmehl Barbarians at the gateway, defeating viruses in EDU. Search on Bibsonomy SIGUCCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF malicious programs, security, strategies, blocking, viruses, anti-virus, defenses
34Rafael Ball Viruses in all Dimensions - How an Information Code Controls Viruses, Software and Microorganisms Search on Bibsonomy 2023   DOI  RDF
34Sifan Ye, Congyu Lu, Ye Qiu, Heping Zheng, Xingyi Ge, Aiping Wu, Zanxian Xia, Taijiao Jiang, Haizhen Zhu, Yousong Peng An atlas of human viruses provides new insights into diversity and tissue tropism of human viruses. Search on Bibsonomy Bioinform. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
34Tavis K. Anderson, William W. Laegreid, Francesco Cerutti, Fernando A. Osorio, Eric A. Nelson, Jane Christopher-Hennings, Tony L. Goldberg Ranking viruses: measures of positional importance within networks define core viruses for rational polyvalent vaccine development. Search on Bibsonomy Bioinform. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
34Dianhui Zhu, George E. Fox, Sugoto Chakravarty RECOVIR: An application package to automatically identify some single stranded RNA viruses using capsid protein residues that uniquely distinguish among these viruses. Search on Bibsonomy BMC Bioinform. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Harold Joseph Highland A history of computer viruses: Three special viruses. Search on Bibsonomy Comput. Secur. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
29Vladimir A. Golovko, Sergei V. Bezobrazov, Pavel Kachurka, Leanid U. Vaitsekhovich Neural Network and Artificial Immune Systems for Malware and Network Intrusion Detection. Search on Bibsonomy Advances in Machine Learning II The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
29Tao Gong, Zixing Cai Tri-tier Immune System in Anti-virus and Software Fault Diagnosis of Mobile Immune Robot Based on Normal Model. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Normal model, Immune robot, Fault diagnosis, Artificial immune system, Anti-virus
29Matt Webster, Grant Malcolm Formal affordance-based models of computer virus reproduction. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Paul Dan Cristea, Rodica Tuduce, Jan Cornelis 0001 Inserts in prokaryotegenomes. Search on Bibsonomy BIBE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Sheng-Lung Peng, Yu-Wei Tsay, Tai-Chun Wang, Chuan Yi Tang Probe Selection with Fault Tolerance. Search on Bibsonomy ICIC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Abhijit Bose, Xin Hu 0001, Kang G. Shin, Taejoon Park Behavioral detection of malware on mobile handsets. Search on Bibsonomy MobiSys The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile handsets, security, machine learning, worm detection
29Ram Dantu, João W. Cangussu, Sudeep Patwardhan Fast Worm Containment Using Feedback Control. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF general, network-level security and protection, Computer systems organization, computer systems organization, process control systems, special-purpose and application-based systems, communication/networking and information technology
29Yuji Sato, Yuta Yasuda, Ryuji Goto Analysis of noisy time-series signals with GA involving viral infection with tropism. Search on Bibsonomy GECCO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF time-series problem, tropism, virus evolution, virus infection, genetic algorithms, inverse problem, noisy optimization
29Barbara Strug, Andrzej Bielecki, Marzena Bielecka Evolutionary Viral-type Algorithm for the Inverse Problem for Iterated Function Systems. Search on Bibsonomy PPAM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Jose Andre Morales, Peter J. Clarke, Yi Deng 0001, B. M. Golam Kibria Testing and evaluating virus detectors for handheld devices. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Feng-Mao Lin, Hsien-Da Huang, Y.-C. Chang, Ann-Ping Tsou, P.-L. Chan, L.-C. Wu, Meng-Feng Tsai, Jorng-Tzong Horng Database to Dynamically Aid Probe Design for Virus Identification. Search on Bibsonomy IEEE Trans. Inf. Technol. Biomed. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Changwoo Nam, Seong-Jin Ahn 0001, Jin-Wook Chung Learning-Based Algorithm for Detecting Abnormal Traffic. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Il-Seop Song, Youngseok Lee 0002, Taeck-Geun Kwon A Multi-gigabit Virus Detection Algorithm Using Ternary CAM. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF content inspection, network security, pattern matching, Deep packet inspection, TCAM
29Dan Xu, Xiang Li 0010, Xiao Fan Wang 0001 Mechanisms for spreading of computer virus on the Internet: an overview. Search on Bibsonomy ICARCV The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Jintao Xiong ACT: attachment chain tracing scheme for email virus detection and control. Search on Bibsonomy WORM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF contact tracing, transmission chain, worm defense
29Ram Dantu, João W. Cangussu, Arun Yelimeli Dynamic Control of Worm Propagation. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Matthew M. Williamson Design, Implementation and Test of an Email Virus Throttle. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
29Dimitrios N. Serpanos, Richard J. Lipton Defense Against Man-in-the-Middle Attack in Client-Server Systems. Search on Bibsonomy ISCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
29Jieh-Sheng Lee, Jieh Hsiang, Po-Hao Tsang A Generic Virus Detection Agent on the Internet. Search on Bibsonomy HICSS (4) The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
29Mark Menor, Kyungim Baek, Mahdi Belcaid, Yannick Gingras, Guylaine Poisson Virus DNA-fragment classification using taxonomic hidden Markov model profiles. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF machine learning, annotation, viruses, metagenomics
29Joshua Hartranft, Veronica Longenecker SafetyNET -- designing and implementing a technology support program for students. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cisco clean access, security, help desk, spyware, viruses, support tools, call tracking, student support
29Abhijit Bose, Kang G. Shin Proactive security for mobile messaging networks. Search on Bibsonomy Workshop on Wireless Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF SMS/MMS, mobile viruses, worms, containment, Instant Messaging (IM), proactive security
29Neal Leavitt Mobile Phones: The Next Frontier for Hackers? Search on Bibsonomy Computer The full citation details ... 2005 DBLP  DOI  BibTeX  RDF malware, cell phones, wireless security, viruses
29Richard Ford Malcode Mysteries Revealed. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF self-replicating code, SQL.Slammer worm, worms, viruses
29Carolyn P. Meinel Cybercrime Treaty Could Chill Research. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cybercrime Treaty, Code Red, SQL Slammer worm, freedom of speech, worms, viruses
29George M. Mohay, J. Zellers Kernel and Shell-Based Applications Integrity Assurance. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel-based applications integrity assurance, shell-based applications integrity assurance, software authenticity verification, CASS project, Computer Architecture for Secure Systems, UNIX SVR4.2, Mach 3.0 microkernel, portable shell, UNIX-style platforms, security, data integrity, operating system, executables, computer viruses, integrity checking, implementation issues
29Peter D. Lauren, N. Nandhakumar Recovering the viewing parameters of random, translated and noisy projections of asymmetric objects. Search on Bibsonomy CVPR The full citation details ... 1996 DBLP  DOI  BibTeX  RDF noisy projections, translated projections, randomly acquired projections, asymmetric objects, common lines algorithm, three-dimensional Fourier space, translational displacement, in vivo images, underwater scenes, radioastronomy, geoseismic analysis, portable radiography, industrial inspection, image reconstruction, Fourier transforms, Fourier transforms, intersection, cells, random projections, viruses, three-dimensional reconstruction, molecules
27Kazuya Sata, Kouichi Hirata, Kimihito Ito, Tetsuji Kuboyama Discovering Networks for Global Propagation of Influenza A (H3N2) Viruses by Clustering. Search on Bibsonomy KES (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Junghoon Lee, Peter C. Doerschuk, John E. Johnson Exact Reduced-Complexity Maximum Likelihood Reconstruction of Multiple 3-D Objects From Unlabeled Unoriented 2-D Projections and Electron Microscopy of Viruses. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Geoffrey Canright, Kenth Engø-Monsen A 'Pumping' Model for the Spreading of Computer Viruses. (PDF / PS) Search on Bibsonomy AIMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Boyun Zhang, Jianping Yin, Jingbo Hao Intelligent Detection Computer Viruses Based on Multiple Classifiers. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Robert L. Glass Viruses Are Beginning to Get to Me! Search on Bibsonomy IEEE Softw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF software virus, spam
27Zeyun Yu, Chandrajit L. Bajaj Automatic Ultrastructure Segmentation of Reconstructed CryoEM Maps of Icosahedral Viruses. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27James Aspnes, Kevin L. Chang, Aleksandr Yampolskiy Inoculation strategies for victims of viruses and the sum-of-squares partition problem. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
27Noam Berger, Christian Borgs, Jennifer T. Chayes, Amin Saberi On the spread of viruses on the internet. Search on Bibsonomy SODA The full citation details ... 2005 DBLP  BibTeX  RDF
27Willy Valdivia Granda, Chistine D. Keating, Maricel G. Kann, Roderic Beresford, Shana O. Kelley Detection of Encephalic and Hemorrhagic Viruses: Integration of Micro and Nano-fabrication with Computational Tools. Search on Bibsonomy ICMENS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
27Alan H. Karp Enforce POLA on processes to control viruses. Search on Bibsonomy Commun. ACM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 928 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license