The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for ESTEREL with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1994 (16) 1995-1998 (18) 1999 (16) 2000-2001 (27) 2002-2003 (22) 2004 (17) 2005-2006 (24) 2007 (178) 2008 (71) 2009-2010 (17) 2011-2021 (13)
Publication types (Num. hits)
article(41) book(1) incollection(2) inproceedings(368) phdthesis(4) proceedings(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 245 occurrences of 172 keywords

Results
Found 419 publication records. Showing 419 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
22Ilkka Norros, Pirkko Kuusela, Pekka Savola A Dependability Case Approach to the Assessment of IP Networks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ioannis G. Askoxylakis, Damien Sauveron, Constantinos Markantonakis, Theodore Tryfonas, Apostolos Traganitis A Body-Centered Cubic Method for Key Agreement in Dynamic Mobile Ad Hoc Networks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Maite Avelino, Francisco de la Torre Advanced Rule-Based Techniques in Mission Critical Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jesús J. Martinez Molina, Miguel A. Hernández Ruíz, Manuel Gil Pérez, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Event-Driven Architecture for Intrusion Detection Systems Based on Patterns. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Antonio San Martino, Xavier Perramon Defending E-Banking Services: Antiphishing Approach. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Masaru Takesue A Protection Scheme against the Attacks Deployed by Hiding the Violation of the Same Origin Policy. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Aleksandar Kircanski, Amr M. Youssef A Related-Key Attack on TREYFER. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Cynthia Y. Lester, Frank Jamerson Designing an Undergraduate Software Security Course. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Cynthia Y. Lester, Hira N. Narang, Chung-Han Chen Infusing Information Assurance into an Undergraduate CS Curriculum. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Vasile Florian Pais, Viorica Stancalie Providing Secure Access to Unsecure Web Services. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Oluwafemi O. Ajayi, Richard O. Sinnott, Anthony Stell Towards Decentralised Security Policies for e-Health Collaborations. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22André Cotton, Maurice Israël, Julien Borgel Molecular Approach Paves the Way towards High Resilience for Large Mission-Critical Information Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Roland Schmitz Public Key Cryptography: A Dynamical Systems Perspective. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Fatiha Benali, Stéphane Ubéda, Véronique Legrand Collaborative Approach to Automatic Classification of Heterogeneous Information Security. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ian Castle, Eimear Buckley The Automatic Discovery, Identification and Measurement of Botnets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Imre Kocsis, György Csertán, Péter László Pásztor, András Pataricza Dependability and Security Metrics in Controlling Infrastructure. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Giacomo Verticale On the Portability of Trained Machine Learning Classifiers for Early Application Identification. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca Fast Algorithms for Local Inconsistency Detection in Firewall ACL Updates. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Rafael Bosse Brinhosa, Carlos Becker Westphall, Carla Merkle Westphall A Security Framework for Input Validation. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Przemyslaw Rodwald, Janusz Stoklosa Family of Parameterized Hash Algorithms. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Sarosh Hashmi, John Brooke Authentication Mechanisms for Mobile Ad-Hoc Networks and Resistance to Sybil Attack. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Shu-Lin Chen, Stanley Chow, Christophe Gustave, Dmitri Vinokurov Prototyping a New Identity Authentication Framework for IP Telephony. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Yannick Carlinet, Ludovic Mé, Hervé Debar, Yvon Gourhant Analysis of Computer Infection Risk Factors Based on Customer Network Usage. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22HwanJin Lee, InKyung Jeun, Kilsoo Chun, Junghwan Song A New Anti-phishing Method in OpenID. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Pedro R. M. Inácio, Mário M. Freire, Manuela Pereira, Paulo P. Monteiro Analysis of the Impact of Intensive Attacks on the Self-Similarity Degree of the Network Traffic. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Khaled Gaaloul, Andreas Schaad, Ulrich Flegel, François Charoy A Secure Task Delegation Model for Workflows. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube Security Patterns for Capturing Encryption-Based Access Control to Sensor Data. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Eric Y. Chen, Mitsutaka Itoh Scalable Detection of SIP Fuzzing Attacks. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Marco Domenico Aime, Paolo Carlo Pomi, Marco Vallini Policy-Driven System Configuration for Dependability. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Nikolaos Chatzis, Enric Pujol Email Worm Mitigation by Controlling the Name Server Response Rate. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Frederic Stumpf, Claudia Eckert 0001 Enhancing Trusted Platform Modules with Hardware-Based Virtualization Techniques. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Martin Floeck, Lothar Litz Activity- and Inactivity-BasedApproaches to Analyze an Assisted Living Environment. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Imad M. Abbadi, Muntaha Alawneh Preventing Insider Information Leakage for Enterprises. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Fuwen Liu, Hartmut König Security Policy Management for Peer Group Meetings. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Artur Hecker On System Security Metrics and the Definition Approaches. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Marco Domenico Aime, Andrea S. Atzeni Generation of Diagnostic Plans for Large ICT Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Xiaoming Lu, Matt Spear, Karl N. Levitt, Norman S. Matloff, Shyhtsun Felix Wu A Synchronization Attack and Defense in Energy-Efficient Listen-Sleep Slotted MAC Protocols. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ayesha Altaf, Rabia Sirhindi, Attiq Ahmed A Novel Approach against DoS Attacks in WiMAX Authentication Using Visual Cryptography. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Yuka Ikebe, Takehiro Nakayama, Masaji Katagiri, Satoshi Kawasaki, Hirotake Abe, Takahiro Shinagawa, Kazuhiko Kato Efficient Anomaly Detection System for Mobile Handsets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Anders Moen Hagalisletto Proving Trust Locally. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jean-Michel Sahut Security and Adoption of Internet Payment. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Marek Woda, Tomasz Walkowiak Agent Based Approach to Events Monitoring in Complex Information Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Rainer Falk, Steffen Fries Security Governance for Enterprise VoIP Communication. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Sergio Pozo Hidalgo, Rafael Ceballos, Rafael M. Gasca, Angel Jesus Varela-Vaca Polynomial Heuristic Algorithms for Inconsistency Characterization in Firewall Rule Sets. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Juan Manuel Marín Pérez, Jorge Bernal Bernabé, Daniel J. Martínez-Manzano, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta Towards the Definition of a Web Service Based Management Framework. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Sameerchand Pudaruth, Nevin Vunka Jungum, Soulakshmee D. Ghurbhurrun, Leckraj Nagowah Controlling Access to Location-Based Services in Vehicular Mobile Pervasive Environments. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Anders Moen Hagalisletto, Lars Strand Formal Modeling of Authentication in SIP Registration. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Audun Jøsang, Touhid Bhuiyan Optimal Trust Network Analysis with Subjective Logic. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Cheun Ngen Chong, Dan Jiang, Jiagang Zhang, Long Guo Anti-counterfeiting with a Random Pattern. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Mihaela Ion, Hristo Koshutanski, Volker Hoyer, Luigi Telesca Rating Agencies Interoperation for Peer-to-Peer Online Transactions. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22H. Rezaei Ghaleh, M. A. Doustari A New Approach for Secure and Portable OS. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Kreetta Askola, Rauli Puuperä, Pekka Pietikäinen, Juhani Eronen, Marko Laakso, Kimmo Halunen, Juha Röning Vulnerability Dependencies in Antivirus Software. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Maurice Israël, Julien Borgel, André Cotton Heuristics to Perform Molecular Decomposition of Large Mission-Critical Information Systems. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Marcin Dabrowski, Piotr Pacyna Generic and Complete Three-Level Identity Management Model. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Jan Feyereisl, Uwe Aickelin ToLeRating UR-STD. Search on Bibsonomy SECURWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Olivier Tardieu, Stephen A. Edwards Instantaneous Transitions in Esterel. Search on Bibsonomy SLA++P@ETAPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jan Lukoschus, Reinhard von Hanxleden Removing Cycles in Esterel Programs. Search on Bibsonomy EURASIP J. Embed. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Stephen A. Edwards, Jia Zeng Code Generation in the Columbia Esterel Compiler. Search on Bibsonomy EURASIP J. Embed. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Dumitru Potop-Butucaru, Stephen A. Edwards, Gérard Berry Compiling Esterel. Search on Bibsonomy 2007   DOI  RDF
22 Proceedings of the Second International Conference on Software Engineering Advances (ICSEA 2007), August 25-31, 2007, Cap Esterel, French Riviera, France Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  BibTeX  RDF
22Jens Brandt 0001, Klaus Schneider 0001 How Different are Esterel and SystemC?. Search on Bibsonomy FDL The full citation details ... 2007 DBLP  BibTeX  RDF
22 Proceedings of the Second International Conference on Systems and Networks Communications (ICSNC 2007), August 25-31, 2007, Cap Esterel, French Riviera, France Search on Bibsonomy ICSNC The full citation details ... 2007 DBLP  BibTeX  RDF
22Satnam Singh Hardware/Software Synthesis and Verification Using Esterel. Search on Bibsonomy CPA The full citation details ... 2007 DBLP  BibTeX  RDF
22Jan Lukoschus Removing cycles in esterel programs. Search on Bibsonomy 2007   RDF
22Xin Li 0020 The Kiel Esterel processor: a multi-threaded reactive processor. Search on Bibsonomy 2007   RDF
22Prabhat Ranjan, Arun Kumar Misra Improving the Agent Based Software Development Process. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Nuo Li, Maozhong Jin, Chao Liu 0002 Web Application Model Recovery for User Input Validation Testing. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Michael J. McMahon Jr., Sergiu M. Dascalu, Frederick C. Harris Jr., Juan C. Quiroz An Extensible Architecture for Network-Attached Device Management. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Gordon Fraser 0001, Franz Wotawa Test-Case Generation and Coverage Analysis for Nondeterministic Systems Using Model-Checkers. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Bart J. F. De Smet, Kristof Steurbaut, Sofie Van Hoecke, Filip De Turck, Bart Dhoedt Dynamic Workflow Instrumentation for Windows Workflow Foundation. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Muneyuki Shimokura, Shuichi Nakanishi, Tadashi Ohta Home Network Service Programs described in a Rule-based Language. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Roy Oberhauser, Rainer Schmidt 0001 Improving the Integration of the Software Supply Chain via the Semantic Web. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Xueling Shu, Frank Maurer A Tool for Automated Performance Testing of Java3D Applications in Agile Environments. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Bastian Dölle, Walter Dosch From Signatures of Algebraic Specifications to Collections of Object-Oriented Class Signatures. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Reijo Savola Towards a Security Metrics Taxonomy for the Information and Communication Technology Industry. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Antonio-Javier García-Sánchez, Felipe García-Sánchez, Joan García-Haro Comparative for Middleware Video Streaming Services. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jaroslav Král, Michal Zemlicka The Most Important Service-Oriented Antipatterns. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Osamu Takaki, Takahiro Seino, Izumi Takeuti, Noriaki Izumi, Koichi Takahashi Verification Algorithm of Evidence Life Cycles in Extended UML Activity Diagrams. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Fabrizio Fabbrini, Mario Fusani, Stefania Gnesi, Giuseppe Lami Controlling Requirements Evolution: a Formal Concept Analysis-Based Approach. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Yifeng Sun, David Levy 0001 Suggestions on Pattern Transformation in UML-RT. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Dhafer Thabet, Lamia Hassine, Henda Hajjami Ben Ghézala Situational Secure Web Services Design Methods. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Peter Z. Kunszt Grid Middleware Development in Large International Projects - Experience and Recommendations. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jaana Nyfjord, Mira Kajko-Mattsson Commonalities in Risk Management and Agile Process Models. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22K. Alagarsamy, Selwyn Justus, K. Iyakutti The Knowledge Based Software Process Improvement Program: A Rational Analysis. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Gregor Fischer, J. Lusiardi, Jürgen Wolff von Gudenberg Abstract Syntax Trees - and their Role in Model Driven Software Development. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Teemu Kanstrén Towards Trace Based Model Synthesis for Program Understanding and Test Automation. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Hyunmin Ko, Gihun Chang, Kangtae Kim A Reengineering Approach of the Legacy System in the Digital Media Domain. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Anil Shankar, Juan C. Quiroz, Sergiu M. Dascalu, Sushil J. Louis, Monica N. Nicolescu Sycophant: An API for Research in Context-Aware User Interfaces. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Ivan Garcia, Luis E. Suarez Determining Practice Achievement in Project Management using a Two-Phase Questionnaire on Small and Medium Enterprises. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Gélio M. Ferreira, Marcelo Zanchetta do Nascimento, Karcius D. R. Assis, Rodrigo Pereira Ramos Teaching object oriented programming computer languages: learning based on projects. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Ali Kamandi, Jafar Habibi Toward a New Analyzable Architectural Description Language based on OSAN. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Lars Borner, Timea Illes-Seifert, Barbara Paech The Testing Process - A Decision Based Approach. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Lydie du Bousquet, Michel Delaunay Using mutation analysis to evaluate test generation strategies in a synchronous context. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Frédéric Pourraz, Hervé Verjus Diapason: an Engineering Approach for Designing, Executing and Evolving Service-Oriented Architectures. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Christian Emig, Frank Brandt, Sebastian Abeck, Jürgen Biermann, Heiko Klarl An Access Control Metamodel for Web Service-Oriented Architecture. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Miia-Maarit Saarelainen, Jussi Koskinen, Jarmo J. Ahonen, Irja Kankaanpää, Henna Sivula, Heikki Lintinen, Päivi Juutilainen, Tero Tilus Group Decision-Making Processes in Industrial Software Evolution. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Ryan Voigt, Kareem Fazal, Hassan Reza Specification-based Testing Method Using Testing Flow Graphs. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Atif Mashkoor, João M. Fernandes Deriving Software Architectures for CRUD Applications: The FPL Tower Interface Case Study. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Hanh Nhi Tran, Bernard Coulette, Bich Thuy Dong Modeling Process Patterns and Their Application. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Eduardo Martins Guerra, Clovis Torres Fernandes Refactoring Test Code Safely. Search on Bibsonomy ICSEA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 419 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license