Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
22 | Erin Egan, Tim Jucovy |
Building a better filter how to create a safer Internet and avoid the litigation trap. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 4(3), pp. 37-44, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Sylvia Mercado Kierkegaard |
Blogs, lies and the doocing: The next hotbed of litigation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 22(2), pp. 127-136, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Anthony Cox, Trevor J. Smedley |
Reverse Engineering in Support of Litigation: Experiences in an Adversarial Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 13th Working Conference on Reverse Engineering (WCRE 2006), 23-27 October 2006, Benevento, Italy, pp. 288-292, 2006, IEEE Computer Society, 0-7695-2719-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kwok-Wing Chau |
A Split-Step PSO Algorithm in Predicting Construction Litigation Outcome. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRICAI ![In: PRICAI 2006: Trends in Artificial Intelligence, 9th Pacific Rim International Conference on Artificial Intelligence, Guilin, China, August 7-11, 2006, Proceedings, pp. 1211-1215, 2006, Springer, 3-540-36667-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Kwok-Wing Chau |
Prediction of Construction Litigation Outcome Using a Split-Step PSO Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICONIP (2) ![In: Neural Information Processing, 13th International Conference, ICONIP 2006, Hong Kong, China, October 3-6, 2006, Proceedings, Part II, pp. 1101-1107, 2006, Springer, 3-540-46481-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Susan Howick |
Using system dynamics models with litigation audiences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Eur. J. Oper. Res. ![In: Eur. J. Oper. Res. 162(1), pp. 239-250, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
22 | Linda Levine, Kurt M. Saunders |
Software Patents: Innovation or Litigation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
IT Innovation for Adaptability and Competitiveness ![In: IT Innovation for Adaptability and Competitiveness, edited proceedings of the Seventh Working Conference on IT Innovation for Adaptability and Competitiveness, IFIP WG 8.6, Intel Corporation, Leixlip, Ireland, May-June 2004, pp. 229-242, 2004, Springer, 978-1-4020-7999-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
22 | Susan Howick |
Using system dynamics to analyse disruption and delay in complex projects for litigation: can the modelling purposes be met? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Oper. Res. Soc. ![In: J. Oper. Res. Soc. 54(3), pp. 222-229, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Stephen Castell |
Role of the IT expert witness: The role of the IT expert witness in software and systems development/implementation contract disputes and litigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 19(3), pp. 228-231, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Ephraim Nissan |
Identification and Doing Without It, IV: A Formal Mathematical Analysis for the Feveroles Case, of Mix-Up of Kinds and Ensuing Litigation; and a Formalism for the "Cardiff Giant" Double Hoax. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cybern. Syst. ![In: Cybern. Syst. 34(6-7), pp. 501-530, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Zaw Z. Han, Tin T. Khine, Imtinan Ahmad, Sunil Shrestha, Laurence L. Leff |
Interoperability from Electronic Commerce to Litigation Using XML Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the 9th International Conference on Artificial Intelligence and Law, ICAIL 2003, Edinburgh, Scotland, UK, June 24-28, 2003, pp. 93-94, 2003, ACM, 1-58113-747-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Vijay K. Vemuri, Vince Bertone |
US Software and Business Method Patents: Stimulus to Innovation or Litigation? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICWI ![In: Proceedings of the IADIS International Conference WWW/Internet 2003, ICWI 2003, Algarve, Portugal, November 5-8, 2003, pp. 995-998, 2003, IADIS, 972-98947-1-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
22 | Mayur S. Desai, Judith Ogden, Thomas C. Richards |
Information Technology Litigation and Software Failure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Law Technol. ![In: J. Inf. Law Technol. 2002(2), 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
22 | Yannis Bakos, Chrysanthos Dellarocas |
Cooperation Without Enforcement? A Comparative Analysis of Litigation and Online Reputation as Quality Assurance Mechanisms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the International Conference on Information Systems, ICIS 2002, Barcelona, Spain, December 15-18, 2002, pp. 12, 2002, Association for Information Systems. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
22 | Kenneth J. Withers |
Computer-Based Disclosure and Discovery in Civil Litigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Law Technol. ![In: J. Inf. Law Technol. 2001(1), 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
|
22 | John Warchus |
Avoiding litigation: Drafting successful IT contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 15(2), pp. 117-119, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | John Warchus |
Impact of the woolf reforms on it litigation - The new civil procedure rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 15(5), pp. 314-316, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
22 | John Peysner |
Y2K - Will There be a Litigation Explosion? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Inf. Law Technol. ![In: J. Inf. Law Technol. 1999(2), 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP BibTeX RDF |
|
22 | Joseph P. McMenamin |
Does products liability litigation threaten picture archiving and communication systems and/or telemedicine? ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 11(1), pp. 21-32, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
22 | |
Kluwer published in 1995 two further texts within their computer/law series which has now concluded: The first is: Advanced litigation support & document imaging, Edited by V Mital 1995, soft cover, Kluwer Law International, 212 pp., £65; US$106; NLG 145, ISBN 9041101136. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 12(5), pp. 276, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
22 | Dennis M. Brewer, Charlton B. Ogden III |
Animation and imaging for litigation support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGGRAPH Visual Proceedings ![In: ACM SIGGRAPH 96 Visual Proceedings: The art and interdisciplinary programs of SIGGRAPH 1996, New Orleans, LA, USA, August 4-9, 1996, pp. 122, 1996, ACM, 0-89791-784-7. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
22 | Tom Waite |
The Crisis In Litigation Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Law Inf. Technol. ![In: Int. J. Law Inf. Technol. 3(2), pp. 179-195, 1995. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
22 | Gordon Hughes |
Semiconductor litigation in Australia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 8(4), pp. 162-165, 1992. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
22 | George Vossos, John Zeleznikow |
Improving Automated Litigation Support by Supplementing Rule-Based Reasoning with Case-Based Reasoning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Proceedings of the International Conference on Database and Expert Systems Applications, Valencia, Spain, 1992., pp. 138-142, 1992, Springer-Verlag, Wien, 3-211-82400-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP BibTeX RDF |
|
22 | Vijay Mital, Agathoclis Kyprou Stylianou, Les Johnson |
Conceptual Information Retrieval in Litigation Support Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: Proceedings of the Third International Conference on Artificial Intelligence and Law, ICAIL '91, Oxford, England, June 25-28, 1991, pp. 235-243, 1991, ACM, 0-89791-399-X. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
22 | Stephen Saxby |
Litigation: Reports on recent cases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 4(4), pp. 41-44, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
22 | R. W. Wright |
R.W. Wright: Address to ITAC conference a litigation solicitor's view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Law Secur. Rev. ![In: Comput. Law Secur. Rev. 3(5), pp. 41-42, 1988. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
22 | J. Zacher |
Computer contracting and litigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Annual Conference ![In: Proceedings of the ACM 1981 Annual Conference, Los Angeles, CA, USA, November 9-11, 1981., pp. 118, 1981, ACM, 0-89791-049-4. The full citation details ...](Pics/full.jpeg) |
1981 |
DBLP DOI BibTeX RDF |
|
16 | Mark E. Kotanchek |
Real-world data modeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO (Companion) ![In: Genetic and Evolutionary Computation Conference, GECCO 2010, Proceedings, Portland, Oregon, USA, July 7-11, 2010, Companion Material, pp. 2863-2896, 2010, ACM, 978-1-4503-0073-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
16 | John Zeleznikow, Brooke Abrahams |
Incorporating issues of fairness into development of a multi-agent negotiation support system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: The 12th International Conference on Artificial Intelligence and Law, Proceedings of the Conference, June 8-12, 2009, Barcelona, Spain, pp. 177-184, 2009, ACM, 978-1-60558-597-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
BATNAs, integrative negotiation, multi-agent systems, Bayesian belief networks, negotiation supports systems |
16 | John Zeleznikow |
The Need to Incorporate Justice into Negotiation Support Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BIS (Workshops) ![In: Business Information Systems Workshops, BIS 2009 International Workshops, Poznan, Poland, April 27-29, 2009. Revised Papers, pp. 256-267, 2009, Springer, 978-3-642-03423-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Bargaining in the Shadow of the Law, BATNAs, Negotiation Support Systems, Justice |
16 | Ludmila Cherkasova, Kave Eshghi, Charles B. Morrey III, Joseph A. Tucek, Alistair C. Veitch |
Applying syntactic similarity algorithms for enterprise information management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KDD ![In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28 - July 1, 2009, pp. 1087-1096, 2009, ACM, 978-1-60558-495-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
performance, similarity, document management |
16 | Jianbing Ma, Weiru Liu, Paul Miller 0003, WeiQi Yan 0001 |
Event Composition with Imperfect Information for Bus Surveillance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AVSS ![In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, 2-4 September 2009, Genova, Italy, pp. 382-387, 2009, IEEE Computer Society, 978-0-7695-3718-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | R. E. Kurt Stirewalt, Laura K. Dillon, Eileen T. Kraemer |
The inference validity problem in legal discovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSE Companion ![In: 31st International Conference on Software Engineering, ICSE 2009, May 16-24, 2009, Vancouver, Canada, Companion Volume, pp. 303-306, 2009, IEEE, 978-1-4244-3494-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
16 | Poramin Bheganan, Richi Nayak, Yue Xu 0001 |
Thai Word Segmentation with Hidden Markov Model and Decision Tree. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PAKDD ![In: Advances in Knowledge Discovery and Data Mining, 13th Pacific-Asia Conference, PAKDD 2009, Bangkok, Thailand, April 27-30, 2009, Proceedings, pp. 74-85, 2009, Springer, 978-3-642-01306-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Thai Word segmentation, Hidden Markov Model, Decision tree |
16 | Mark Blythe, Peter C. Wright |
Technology scruples: why intimidation will not save the recording industry and how enchantment might. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pers. Ubiquitous Comput. ![In: Pers. Ubiquitous Comput. 12(5), pp. 411-420, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Digital reproduction, Experience centred design, Music, Ethics, Copyright, Grounded theory, Enchantment |
16 | Rossana Motta, Wickus Nienaber, Jon Jenkins |
Gnutella: integrating performance and security in fully decentralized P2P models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 46th Annual Southeast Regional Conference, 2008, Auburn, Alabama, USA, March 28-29, 2008, pp. 272-277, 2008, ACM, 978-1-60558-105-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
security, P2P, Gnutella |
16 | Frank Wagner 0002, Kathleen Krebs, Cataldo Mega, Bernhard Mitschang, Norbert Ritter |
Towards the Design of a Scalable Email Archiving and Discovery Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ADBIS ![In: Advances in Databases and Information Systems, 12th East European Conference, ADBIS 2008, Pori, Finland, September 5-9, 2008. Proceedings, pp. 305-320, 2008, Springer, 978-3-540-85712-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Email Archiving and Discovery, Legal Compliance, Engineering for Scalability, Virtualization, Enterprise Content Management, Scale-out |
16 | Martin S. Meyer, Puay Tang |
Exploring the "value" of academic patents: IP management practices in UK universities and their implications for Third-Stream indicators. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 70(2), pp. 415-440, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Stan Kelly-Bootle |
The Code Delusion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Queue ![In: ACM Queue 5(6), pp. 52-, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | John Zeleznikow, Emilia Bellucci, Uri J. Schild, Geraldine Mackenzie |
Bargaining in the shadow of the law - using utility functions to support legal negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAIL ![In: The Eleventh International Conference on Artificial Intelligence and Law, Proceedings of the Conference, June 4-8, 2007, Stanford Law School, Stanford, California, USA, pp. 237-246, 2007, ACM, 978-1-59593-680-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
bargaining in the shadow of the law, utility functions, negotiation support systems |
16 | Richard Fry, Lionel Slade, George E. Taylor, Ian Davy |
A GIS Based Approach to Predicting Road Surface Temperatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
W2GIS ![In: Web and Wireless Geographical Information Systems, 7th International Symposium, W2GIS 2007, Cardiff, UK, November 28-29, 2007. Proceedings, pp. 16-29, 2007, Springer, 978-3-540-76923-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ice Prediction, ArcGIS Server, GIS, Roads, ASP.NET |
16 | Birgit Pfitzmann |
Multi-layer Audit of Access Rights. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007, Proceedings, pp. 18-32, 2007, Springer, 978-3-540-75247-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Robert Charles Lange, Spiros Mancoridis |
Using code metric histograms and genetic algorithms to perform author identification for software forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GECCO ![In: Genetic and Evolutionary Computation Conference, GECCO 2007, Proceedings, London, England, UK, July 7-11, 2007, pp. 2082-2089, 2007, ACM, 978-1-59593-697-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
author identification, genetic algorithm applications, pygene, software forensics, software metrics |
16 | Jenny Eriksson Lundström, Guido Governatori, Subhasis Thakur, Vineet Padmanabhan |
An Asymmetric Protocol for Argumentation Games in Defeasible Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: Agent Computing and Multi-Agent Systems, 10th Pacific Rim International Conference on Multi-Agents, PRIMA 2007, Bangkok, Thailand, November 21-23, 2007. Revised Papers, pp. 219-231, 2007, Springer, 978-3-642-01638-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
16 | Ashwin Swaminathan, Yinian Mao, Guan-Ming Su, Hongmei Gou, Avinash L. Varna, Shan He 0002, Min Wu 0001, Douglas W. Oard |
Confidentiality-preserving rank-ordered search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, StorageSS 2007, Alexandria, VA, USA, October 29, 2007, pp. 7-12, 2007, ACM, 978-1-59593-891-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
encrypted domain search, secure index, ranked retrieval |
16 | Soumyadeb Mitra, Marianne Winslett |
Secure deletion from inverted indexes on compliance storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
StorageSS ![In: Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, StorageSS 2006, Alexandria, VA, USA, October 30, 2006, pp. 67-72, 2006, ACM, 1-59593-552-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
secure deletion, inverted index, regulatory compliance |
16 | D. Schofield, Norriza Hussin, M. Tarek Shalaby |
A Methodology for the Evidential Analysis of Computer-Generated Animation (CGA). ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: 9th International Conference on Information Visualisation, IV 2005, 6-8 July 2005, London, UK, pp. 565-570, 2005, IEEE Computer Society, 0-7695-2397-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Computer-Generated Animation, Forensic Animation, Visual, Knowledge, Evidence |
16 | C. Abe, I. L. Lin, T. H. Lan, Tzong-Chen Wu |
Establishment of the Standard Operating Procedure (SOP) for Gathering Digital Evidence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SADFE ![In: First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2005), 7-10 November 2005, Taipei, Taiwan, pp. 56-68, 2005, IEEE Computer Society, 0-7695-2478-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | Asimina Vasalou, Jeremy Pitt |
Reinventing Forgiveness: A Formal Investigation of Moral Facilitation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iTrust ![In: Trust Management, Third International Conference, iTrust 2005, Paris, France, May 23-26, 2005, Proceedings, pp. 146-160, 2005, Springer, 3-540-26042-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
16 | John V. Harrison |
Enhancing Network Security By Preventing User-Initiated Malware Execution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (2) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 2, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 597-602, 2005, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Network Security, Computer Security, Malicious Software, Operating System Security |
16 | Emily S. Patterson, Michelle L. Rogers, Marta L. Render |
A simulation-based embedded probe technique for human-computer interaction evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cogn. Technol. Work. ![In: Cogn. Technol. Work. 6(3), pp. 197-205, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Human factors, Usability testing, Patient safety, Medication errors, Bar coding |
16 | Simeon Keates |
Developing BS7000 Part 6 - Guide to Managing Inclusive Design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
User Interfaces for All ![In: User-Centered Interaction Paradigms for Universal Access in the Information Society, 8th ERCIM Workshop on User Interfaces for All, Vienna, Austria, June 28-29, 2004, Revised Selected Papers, pp. 332-339, 2004, Springer, 3-540-23375-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
16 | M. Tarek Shalaby, Norriza Hussin, D. Schofield |
Forensic Animation: Measuring the Reliability and Accuracy of Computer Generated Animation Used in the Courtroom. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IV ![In: Seventh International Conference on Information Visualization, IV 2003, 16-18 July 2003, London, UK, pp. 606-613, 2003, IEEE Computer Society, 0-7695-1988-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Forensic animation, accident reconstruction, syllogism, virtual reality |
16 | Erik Beulen, Pieter M. A. Ribbers |
IT Outsourcing Contracts: Practical Implications of the Incomplete Contract Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 36th Hawaii International Conference on System Sciences (HICSS-36 2003), CD-ROM / Abstracts Proceedings, January 6-9, 2003, Big Island, HI, USA, pp. 268-, 2003, IEEE Computer Society, 0-7695-1874-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
16 | Erin Kenneally |
Who's Liable for Insecure Networks? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer ![In: Computer 35(6), pp. 93-95, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Paul P. Polanski, Robert B. Johnston |
International Custom as a Source of Law in Global Electronic Commerce. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 166, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
16 | Richard H. Stern |
Another Update on Standardization Skullduggery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Micro ![In: IEEE Micro 21(5), pp. 8-10, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
16 | Diane Lending, Sandra Slaughter |
Research in progress: the effects of ethical climate on attitudes and behaviors toward software piracy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCPR ![In: Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, San Diego, California, USA, 2001, pp. 198-200, 2001, ACM, 1-58113-363-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
computer education and training, management of information systems, software ethics, computer crime, software piracy |
16 | Tuomas Sandholm, Vincent Ferrandon |
Safe Exchange Planner. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMAS ![In: 4th International Conference on Multi-Agent Systems, ICMAS 2000, Boston, MA, USA, July 10-12, 2000, pp. 255-262, 2000, IEEE Computer Society, 0-7695-0625-9. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Agents in electronic commerce, Mechanism design |
16 | Audrey Biloon |
Caveat emptor. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Manag. ![In: Int. J. Netw. Manag. 9(4), pp. 209-211, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Leon A. Kappelman, James J. Cappel |
The Year 2000 Problem: Ethical Implications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Syst. Frontiers ![In: Inf. Syst. Frontiers 1(2), pp. 127-139, 1999. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Janice Singer, Norman G. Vinson |
Empirical Software Engineering Research Ethics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE METRICS ![In: 6th IEEE International Software Metrics Symposium (METRICS 1999), 4-6 November 1999, Boca Raton, FL, USA, pp. 326, 1999, IEEE Computer Society, 0-7695-0403-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Edoardo Charbon, Ilhami Torunoglu |
Copyright protection of designs based on multi source IPs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 1999 IEEE/ACM International Conference on Computer-Aided Design, 1999, San Jose, California, USA, November 7-11, 1999, pp. 591-595, 1999, IEEE Computer Society, 0-7803-5832-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Darko Kirovski, Miodrag Potkonjak |
Localized watermarking: methodology and application to operation scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCAD ![In: Proceedings of the 1999 IEEE/ACM International Conference on Computer-Aided Design, 1999, San Jose, California, USA, November 7-11, 1999, pp. 596-599, 1999, IEEE Computer Society, 0-7803-5832-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
16 | Rajashekar Kailar |
Accountability in Electronic Commerce Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 22(5), pp. 313-328, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
electronic commerce, logic, cryptographic protocols, Accountability, formal analysis, protocol analysis |
16 | Jean-Jacques Quisquater, André Bouckaert |
Zero-Knowledge Procedures for Confidential Access to Medical Records (Extended Summary). ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 662-664, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
16 | Steven Brower |
Function Design Document: Toward better documentation for data processing contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 1st Annual International Conference on Systems Documentation, SIGDOC 1982, Carson, California, USA, January 22-23, 1982, pp. 9-12, 1982, ACM, 0-89791-080-X. The full citation details ...](Pics/full.jpeg) |
1982 |
DBLP DOI BibTeX RDF |
|
16 | Stephen N. Hollman |
A perspective of standard form contracts in the data processing industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFIPS National Computer Conference ![In: American Federation of Information Processing Societies: 1977 National Computer Conference, June 13-16, 1977, Dallas, Texas, USA, pp. 765-769, 1977, AFIPS Press, 978-1-4503-7914-4. The full citation details ...](Pics/full.jpeg) |
1977 |
DBLP DOI BibTeX RDF |
|