The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002 Evaluation of ensemble machine learning methods in mobile threat detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ali Aydin Selçuk, Fatih Orhan, Berker Batur Undecidable problems in malware analysis. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Seth Stoudenmier, Aspen Olmsted Efficient retrieval of information from hierarchical REST requests. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nabil Abdoun, Safwan El Assad, Khodor Hammoud, Rima Assaf, Mohamad Khalil, Olivier Déforges New keyed chaotic neural network hash function based on sponge construction. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Casey Wilson, Aspen Olmsted Handling an organization's communication needs with a single web service. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Walter Blair, Aspen Olmsted, Paul Anderson Spark framework for transcriptomic trimming algorithm reduces cost of reading multiple input files. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Md. Tomig Uddin Ahmed, Nazrul Islam Bhuiya, Md. Mahbubur Rahman A secure enterprise architecture focused on security and technology-transformation (SEAST). Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Ta Thi Kim Hue, Thang Manh Hoang, An Braeken Lightweight signcryption scheme based on discrete Chebyshev maps. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Omego Obinna, Eckhard Pfluegel, Charles A. Clarke, Martin J. Tunnicliffe A multi-channel steganographic protocol for secure SMS mobile banking. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Prathap Siddavaatam, Reza Sedaghat, Aakriti Tarun Sharma intel-LEACH: An optimal framework for node selection using dynamic clustering for wireless sensor networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Gary B. Wills Keynote speaker 3: Looking after our IP in supply chain. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anderson Holguin Avila, Brigitte Rodriguez Mendoza, Maria Bohorquez Sotelo, Delgadillo Loaiza Juan Sebastian Work in Progress: Nobody knows who you really are online/on the world wide web - Amazon-recognition-service based 'Virtualnet' supported authentication: How certain are you it is indeed you in front of a screen? Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paweena Wanchai Customer churn analysis : A case study on the telecommunication industry of Thailand. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Anne E. James Keynote speaker 4: Cloud forensics. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Kritika Kongsoontornkijkul, Rath Pichyangkura, Pakpachong Vadhanasindhu, Kanlaya Vanichbuncha A study of factors effecting Thailand talent mobility programme: Case of university and food technology industry. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shaikha AlShehyari, Chan Yeob Yeun, Ernesto Damiani Monitoring darknet activities by using network telescope. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Daniel Fischer 0003, Bernd Markscheffel, K. Scherr Secure e-mail communication - Comparison and selection of encryption solutions using an utility value analysis approach. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Abidullah Zarghoon, Irfan Awan, Jules Pagna Disso, Richard Dennis Evaluation of AV systems against modern malware. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Charles Kim Keynote speaker 1: Cyber-resilient ICS through diversified redundancy and intrusion detection. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Elisabeth Bauer, Oliver Schluga, Silia Maksuti, Ani Bicaku, David Hofbauer, Igor Ivkic, Markus Gerhard Tauber, Alexander Wöhrer Towards a security baseline for IaaS-cloud back-ends in Industry 4.0. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Fayez Alotaibi, Nathan L. Clarke, Steven Furnell An analysis of home user security awareness & education. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Husna Siddiqui, Elizabeth Healy, Aspen Olmsted Bot or not. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Deepak Janardhanan, Enda Barrett CPU workload forecasting of machines in data centers using LSTM recurrent neural networks and ARIMA models. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yen-Mei Lee Seeking academic information on the Internet: Doctoral students' Internet self-efficacy and emotions. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Roman Graf, Ross King Secured transactions technique based on smart contracts for situational awareness tools. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Timibloudi S. Enamamu, Nathan L. Clarke, Paul S. Haskell-Dowland, Fudong Li 0001 Transparent authentication: Utilising heart rate for user authentication. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Pasha Sadeghian, Casey Wilson, Stephen Goeddel, Aspen Olmsted Classification of music by composer using fuzzy min-max neural networks. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Steven Furnell Keynote speaker 5: Taming security technology. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nagul Cooharojananone, Krittika Akasarakul, Thipsuda Wongkhamdi, Phonkornkrit Pruetthiwongwanich, Kanokwan Atchariyachanvanich The study of the local community products (OTOP) website characteristics toward buyer decision using eye tracking. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Igor Ivkic, Stephan Wolfauer, Thomas Oberhofer, Markus Gerhard Tauber On the cost of cyber security in smart business. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Paul Helling, Ahana Roy, Aspen Olmsted Effects of lexicon size on solving bananagrams. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Casey Wilson, Anna V. Sandifer, Aspen Olmsted Designing an assembly language using MIT App inventor. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Evangelos Pournaras Keynote speaker 2: Participatory self-management systems for resilient smart cities. Search on Bibsonomy ICITST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Tiago Vieira, Carlos Serrão Web security in the finance sector. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kheng Kok Mar, ZhengQing Hu, Chee Yong Law, Meifen Wang Secure cloud distributed file system. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gaurav Varshney, Manoj Misra, Pradeep K. Atrey Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Robin Fay, Christoph Ruland Compressive Sensing encryption modes and their security. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Leandro Ordoñez-Ante, Thomas Vanhove, Gregory van Seghbroeck, Tim Wauters, Filip De Turck Interactive querying and data visualization for abuse detection in social network sites. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Martin Visser Keynote speaker 1: Critical Infrastructures SMART ready? Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alex M. S. Orozco, Charles V. Neu, Regio A. Michelin, Avelino F. Zorzo Security analysis of forwarding strategies in network time measurements using Openflow. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Daisuke Arakawa, Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura Dynamically visualizing the relationships between Web pages depending on user's search viewpoints. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ibrahim Almarashdeh, Mutasem Alsmadi Heuristic evaluation of mobile government portal services: An experts' review. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Francesco Buccafurri, Gianluca Lax, Serena Nicolazzo, Antonino Nocera Range query integrity in the cloud: the case of video surveillance. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gabriele Spenger, Jörg Keller 0001 Structural improvements of chaotic PRNG implementations. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hlib Mykhailenko, Giovanni Neglia, Fabrice Huet Which metrics for vertex-cut partitioning? Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Adnan Ahmed 0001, Pardeep Kumar 0003, Ali Raza Bhangwar, Muhammad Ibrahim Channa A secure and QoS aware routing protocol for Wireless Sensor Network. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gozde Ozcan, Sule Gündüz Ögüdücü Applying different classification techniques in reciprocal job recommender system for considering job candidate preferences. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michal Kvet, Monika Vajsová Performance study of the index structures in audited environment. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Steven Furnell, Charles A. Shoniregun Welcome message. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alessandro Greco, Alberto Caponi, Giuseppe Bianchi 0001 Facing lateral movements using widespread behavioral probes. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Niranjan Sivakumar, Maxime Crepel, Dominique Boullier Risk management in payment system architectures. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Isil Karabey, Gamze Akman A cryptographic approach for secure client - server chat application using public key infrastructure (PKI). Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sanjay Kumar, Ari Viinikainen, Timo Hämäläinen 0002 Machine learning classification model for Network based Intrusion Detection System. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abdullateef Rabab'ah, Mahmoud Al-Ayyoub, Mohammed A. Shehab, Yaser Jararweh, Bernard J. Jansen Using the Panama Papers to explore the financial networks of the Middle East. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Khawla Alghafli 0001, Thomas Martin 0002 Identification and recovery of video fragments for forensics file carving. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dennis M. Lupiana, Fredrick Mtenzi KiCM: A knowledge-intensive context model. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gerard Vidal, Rabei Bechikh, Rhouma Rhouma, Safya Belghith A commercial application of a chaos-based-stream cipher: Performance and Security analysis. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jarkko Kuusijärvi, Reijo Savola, Pekka Savolainen, Antti Evesti Mitigating IoT security threats with a trusted Network element. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aneesha Sethi, Federica Paci, Gary B. Wills EEVi - framework for evaluating the effectiveness of visualization in cyber-security. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Radu Velea, Noel Gordon Comparison of color profile gamut coverage for computer monitors. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oleg Garasym, Ina Taralova, René Lozi Key requirements for the design of robust chaotic PRNG. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted Modeling cloud applications for partition contingency. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aymen J. Salman, Adil Al-Yasiri Developing Domain-Specific Language for Wireless Sensor Network application development. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Emad Al-Mohammed, Nigel Linge A generic, personalized electronic program guide system for accessing multiple online TV providers. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Louis Tajan, Dirk Westhoff, Christian A. Reuter, Frederik Armknecht Private information retrieval and Searchable Encryption for privacy-preserving multi-client cloud auditing. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jorge Lopez Hernandez-Ardieta Keynote speaker 2: Cyber ranges: The (r)evolution in cybersecurity training. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Óscar Corcho Keynote speaker 3: Open Data city portals: Working towards their homogeneisation. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas, Thales Guimaraes Marques Virtualization technologies in web conferencing systems: A performance overview. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andres Paz Sampedro, Shantanu Srivastava Cost to serve of large scale online systems. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nouredine Seddiki, Amel Douli Maximizing the wireless sensor networks lifetime. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sophia Moganedi, Njabulo Mkhonto, Jabu Mtsweni Evaluating the development and implementation of a profile-aware microtasking platform for crowdsourcing services. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Asad Masood Khattak, Farkhund Iqbal, Patrick C. K. Hung, Jwo-Shiun Sun, Guan-Pu Pan, Jing-Jie Lin Privacy Requirements for mobile e-Service in the Health Authority - Abu Dhabi (HAAD). Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Amina Djellalbia, Nadjib Badache, Souad Benmeziane, Sihem Bensimessaoud Anonymous authentication scheme in e-Health Cloud environment. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aisha Suliaman Alazri Telecommunication traffic through submarine cables: Security and vulnerabilities. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carles Antón-Haro Invited speaker (IEEE Spain section professional activities): Scientific resumes and job interviews - how to make (a positive) impact. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Madeline Little, Aspen Olmsted Temporal resource scheduling equity. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Roberto Nardone, Ricardo J. Rodríguez, Stefano Marrone 0001 Formal security assessment of Modbus protocol. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tomas Marques-Arpa, Jordi Serra-Ruiz PRS signal in acquiring evidence of Digital Chain of Custody. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sean T. Miller, Curtis Busby-Earle The role of machine learning in botnet detection. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Seyed Mahdi Jameii, Mohsen Maadani Intelligent dynamic Connectivity Control Algorithm for cluster-based wireless sensor networks. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Benfilali Mostefa, Sofiane Boukli Hacene Adaptive image compression in wireless sensor networks. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lotfi Hajjem, Salah Benabdallah An MMAS-GA for resource allocation in multi-cloud systems. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohamed A. Nassar, Layla A. A. El-Sayed, Yousry Taha Efficient parallel Stochastic Gradient Descent for matrix factorization using GPU. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aiman Ghannami, Chenxi Shao Efficient fast recovery mechanism in Software-Defined Networks: Multipath routing approach. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Moses Moyo, Marianne Loock South African small and medium-sized enterprises' reluctance to adopt and use cloud-based business intelligence systems: A literature review. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Norah Ahmed Almubairik, Gary B. Wills Automated penetration testing based on a threat model. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Regio A. Michelin, Avelino F. Zorzo, Marcia B. Campos, Charles V. Neu, Alex M. S. Orozco Smartphone as a biometric service for web authentication. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1S. Srinivasan Data privacy concerns involving cloud. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tasneem Salah, M. Jamal Zemerly, Chan Yeob Yeun, Mahmoud Al-Qutayri, Yousof Al-Hammadi The evolution of distributed systems towards microservices architecture. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Samaneh Rashidibajgan A trust structure for detection of sybil attacks in opportunistic networks. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gaseb Alotibi, Nathan L. Clarke, Fudong Li 0001, Steven Furnell User profiling from network traffic via novel application-level interactions. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Antonis Michalas Sharing in the rain: Secure and efficient data sharing for the Cloud. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Cynthia Lizbeth Guzman-Candelario, Jose Juan Garcia-Hernandez, Loreto Gonzalez-Hernandez A low-distortion QR Code watermarking scheme for digital color images robust to gamma correction attack. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tiago Santos, Carlos Serrão Secure Javascript Object Notation (SecJSON) Enabling granular confidentiality and integrity of JSON documents. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Charles V. Neu, Avelino F. Zorzo, Alex M. S. Orozco, Regio A. Michelin An approach for detecting encrypted insider attacks on OpenFlow SDN Networks. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Lo'ai Ali Tawalbeh, Turki F. Al-Somani, Hilal Houssain Towards secure communications: Review of side channel attacks and countermeasures on ECC. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aiman Ghannami, Chenxi Shao Experience-based learning for identifying sub-regions in Wireless Sensor Networks. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Neyire Deniz Sarier Efficient biometric-based Encryption for fingerprints. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hiroki Nakayama, Shoichi Nakamura, Kaname Nozaki, Yasuhiko Morimoto, Hiroaki Kaminaga, Youzou Miyadera Learning History Transition Graphs for understanding the programming learning situations. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sihem Bensimessaoud, Nadjib Badache, Souad Benmeziane, Amina Djellalbia An enhanced approach to preserving privacy in social network data publishing. Search on Bibsonomy ICITST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #101 - #200 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license