The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "EISIC"( http://dblp.L3S.de/Venues/EISIC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/eisic

Publication years (Num. hits)
2011 (75) 2012 (64) 2013 (69) 2015 (45) 2016 (47) 2017 (30) 2018 (16) 2019 (24)
Publication types (Num. hits)
inproceedings(362) proceedings(8)
Venues (Conferences, Journals, ...)
EISIC(370)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 370 publication records. Showing 370 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Iordanis Kavathatzopoulos, Ryoko Asai, Mikael Laaksoharju Tools and Methods for Security: Stimulating the Skill to Philosophize. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 2013 European Intelligence and Security Informatics Conference, Uppsala, Sweden, August 12-14, 2013 Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  BibTeX  RDF
1Jyri Rajamäki Mobile Digital Services for Border Protection: Standardization of Emergency Response Vehicles. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Paresh Rathod, John Holmström Decentralized Fully Redundant Cyber Secure Governmental Communications Concept. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tommaso Fornaciari, Fabio Celli, Massimo Poesio The Effect of Personality Type on Deceptive Communication Style. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lisa Rajbhandari Consideration of Opportunity and Human Factor: Required Paradigm Shift for Information Security Risk Management. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lorena Montoya, Marianne Junger, Pieter H. Hartel How "Digital" is Traditional Crime? Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Luca Mazzola, Aris Tsois, Tatyana Dimitrova, Elena Camossi Contextualisation of Geographical Scraped Data to Support Human Judgment and Classification. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Andrew J. Park, Herbert H. Tsang Detecting Key Players in Criminal Networks Using Dynalink. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Debra L. Tower, Matthew L. Jensen, Norah E. Dunbar, Aaron C. Elkins Don't Lie to Me: The Impact of Deception on Vocalic and Linguistic Synchrony. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Martin D. Sykora, Thomas W. Jackson, Ann O'Brien, Suzanne Elayan National Security and Social Media Monitoring: A Presentation of the EMOTIVE and Related Systems. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bo Li 0030, Duo-Yong Sun, Julei Fu, Zi-Han Lin Organization Network Construction and Understanding Based on Photo Face Recognition. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florence Amardeilh, Wessel Kraaij, Martijn Spitters, Corné Versloot, Sinan Yurtsever Semi-automatic Ontology Maintenance in the Virtuoso News Monitoring System. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeffrey L. Jenkins, Jim Marquardson, Jeffrey Gainer Proudfoot, Joseph S. Valacich, Elyse Golob, Jay F. Nunamaker Jr. The Checkpoint Simulation: A Tool for Informing Border Patrol Checkpoint Design and Resource Allocation. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jakub Piskorski, Hristo Tanev, Alexandra Balahur Exploiting Twitter for Border Security-Related Intelligence Gathering. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chris Hurrey The 'Swiss Army Knife' Approach to Border Control: Multitasking in a Multi-threat World. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Egon L. van den Broek, Martijn Spitters Physiological Signals: The Next Generation Authentication and Identification Methods!? Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fabrizio Albertetti, Paul Cotofrei, Lionel Grossrieder, Olivier Ribaux, Kilian Stoffel The CriLiM Methodology: Crime Linkage with a Fuzzy MCDM Approach. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vasile Florian Pais, Dan S. Ciobanu Fast Name Searching on GPU. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kyle Goslin, Markus Hofmann 0002 Cross Domain Assessment of Document to HTML Conversion Tools to Quantify Text and Structural Loss during Document Analysis. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Paresh Rathod Service Standardization with Utility Computing and Service Oriented Architecture as a Tool for Public Protection and Disaster Relief. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ala Berzinji, Frzand Sherko Abdullah, Ali Hayder Kakei Analysis of Terrorist Groups on Facebook. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Richard Colbaugh, Kristin Glass Analyzing Social Media Content for Security Informatics. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anna Fensel, Michael Rogger, Tove Gustavi, Andreas Horndahl, Christian Mårtenson Semantic Data Management: Sensor-Based Port Security Use Case. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Marianela García Lozano Trusting Open Source Information. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xingan Li, Martti Juhola Crime and Its Social Context: Analysis Using the Self-Organizing Map. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1M. Saravanan, Rakhi Thayyil, Shwetha Narayanan Enabling Real Time Crime Intelligence Using Mobile GIS and Prediction Methods. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeffrey Gainer Proudfoot Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sandrine Trochu, Olivier Touret Managing the Border, Smartly. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tove Gustavi, Maja Karasalo, Christian Mårtenson A Tool for Generating, Structuring, and Analyzing Multiple Hypotheses in Intelligence Work. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bart Adams, Frank Suykens Astute: Increased Situational Awareness through Proactive Decision Support and Adaptive Map-Centric User Interfaces. Search on Bibsonomy EISIC The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muhammad Adnan Tariq, Joel Brynielsson, Henrik Artman Framing the Attacker in Organized Cybercrime. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alex Antoniou, Gauri Sinha Laundering Sexual Deviance: Targeting Online Pornography through Anti-money Laundering. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Danny Livshitz, Newton Howard, Yair Neuman Can Computers Help Us to Better Understand Different Cultures? Toward a Computer-Based CULINT. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Giusj Digioia, Chiara Foglietta, Stefano Panzieri, Alessandro Falleni Mixed Holistic Reductionistic Approach for Impact Assessment of Cyber Attacks. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michal Tanas, Grzegorz Taberski, Witold Holubowicz, Krzysztof Samp, Agnieszka Spronska, Jakub Glówka, Mateusz Macias The TALOS Project - Autonomous Robotic Patrol Vehicles. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andrew J. Park, Herbert H. Tsang, Patricia L. Brantingham Dynalink: A Framework for Dynamic Criminal Network Visualization. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Tove Gustavi, Pontus Svenson Pattern Theory in Intelligence Analysis. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aaron Hunter 0001 Structured Documents: Signatures and Deception. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mojtaba Eskandari, Zeinab Khorshidpour, Sattar Hashemi To Incorporate Sequential Dynamic Features in Malware Detection Engines. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1James R. (Bob) Johnson Detecting Emergent Terrorism Events: Finding Needles in Information Haystacks. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hsinchun Chen From Dark Web to GeoPolitical Web: Exploring the Value of Social Media Informatics. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Natalia Iwanski, Richard Frank, Andrew A. Reid, Vahid Dabbaghian A Computational Model for Predicting the Location of Crime Attractors on a Road Network. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Judee K. Burgoon, Lauren Hamel, Tiantian Qin Predicting Veracity from Linguistic Indicators. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anthony Celso Al Qaeda Affiliates Operating in Failed States: The Next Front in the War on Terror. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Richard Frank SPORS: A Suspect Recommendation System Based on Offenders' Reconstructed Spatial Profile. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bisharat Rasool Memon Identifying Important Nodes in Weighted Covert Networks Using Generalized Centrality Measures. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jeffrey Gainer Proudfoot, Nathan W. Twyman, Judee K. Burgoon A Comparison of Invasive and Noninvasive Sensors in the Concealed Information Test. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gregorio Ameyugo, Michal Art, Ana Sofia Esteves, Jakub Piskorski Creation of an EU-Level Information Exchange Network in the Domain of Border Security. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Newton Howard Perception in International Conflict: An Agent-Based Approach. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Justin Sahs, Latifur Khan A Machine Learning Approach to Android Malware Detection. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Richard Frank, Bryan Kinney How Many Ways Do Offenders Travel - Evaluating the Activity Paths of Offenders. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hervé Borrion, Timothy Mitchener-Nissen, Jonathon Taylor, Ka-Man Lai Countering Bioterrorism: Why Smart Buildings Should Have a Code of Ethics. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1John V. Monaco, Ned Bakelman, Sung-Hyuk Cha, Charles C. Tappert Developing a Keystroke Biometric System for Continual Authentication of Computer Users. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mariëlle den Hengst, Jan ter Mors Community of Intelligence: The Secret Behind Intelligence-Led Policing. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paul Elzinga, Karl Erich Wolff, Jonas Poelmans Analyzing Chat Conversations of Pedophiles with Temporal Relational Semantic Systems. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rasmus Rosenqvist Petersen Association and Centrality in Criminal Networks. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Koosha Golmohammadi, Osmar R. Zaïane Data Mining Applications for Fraud Detection in Securities Market. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vanni Zavarella, Jakub Piskorski, Ana Sofia Esteves, Stefano Bucci Refining Border Security News Event Geotagging through Deployment of Lexico-Semantic Patterns. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Henry C. Lee The Utilization of Forensic Evidence in IED Incidents. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Clive Best OSINT, the Internet and Privacy. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Athakorn Kengpol, Pakorn Neungrit A Prediction of Terrorist Distribution Range Radius and Elapsing Time: A Case Study in Southern Parts of Thailand. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ala Berzinji, Lisa Kaati, Ahmed Rezine Detecting Key Players in Terrorist Networks. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Antonis Mouhtaropoulos, Chang-Tsun Li, Marthie Grobler Proactive Digital Forensics: The Ever-Increasing Need for Standardization. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hanno Langweg Information Security Aspects of the 22/7 Attacks. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Bryce Westlake, Martin Bouchard 0002, Richard Frank Comparing Methods for Detecting Child Exploitation Content Online. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1María Victoria Moreno Cano, Carolina Piñana-Díaz, Rafael Toledo-Moreo, Miguel A. Zamora 0001, Antonio Fernandez Gómez-Skarmeta Multi-sensor Multi-target Tracking for Infrastructure Protection. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1James A. Danowski Semantic Network Analysis of Islamist Sources Using Time Slices as Nodes and Semantic Similarity as Link Strengths: Some Implications for Propaganda Analysis about Jihad. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Paresh Rathod, Anu Ahlgren, Johanna Aho, Mari Takari, Sami Ahlgren Resilience of Cyber-Physical System: A Case Study of Safe School Environment. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1James R. (Bob) Johnson, Anita Miller, Latifur Khan, Bhavani Thuraisingham Measuring Relatedness and Augmentation of Information of Interest within Free Text Law Enforcement Documents. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anthony J. Palmer, Chris Hurrey Ten Reasons Why IRIS Needed 20: 20 Foresight: Some Lessons for Introducing Biometric Border Control Systems. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Gerhard Backfried, Christian Schmidt 0005, Mark Pfeiffer, Gerald Quirchmayr, Markus Glanzer, Karin Rainer Open Source Intelligence in Disaster Management. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Erick E. Ruiz, K. Larry Head Use of an Automatic Under-Vehicle Inspection System as a Tool to Streamline Vehicle Screening at Ports of Entry and Security Checkpoints. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jyri Rajamäki, Jutta Tervahartiala, Sofia Tervola, Sari Johansson, Leila Ovaska, Paresh Rathod How Transparency Improves the Control of Law Enforcement Authorities' Activities? Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Natalia Danilova, David Stupples Application of Natural Language Processing and Evidential Analysis to Web-Based Intelligence Information Acquisition. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Duncan Hodges, Sadie Creese, Michael Goldsmith A Model for Identity in the Cyber and Natural Universes. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Maciej M. Latek, Seyed M. Mussavi Rizi, Andrew T. Crooks, Mark Fraser Social Simulations for Border Security. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mayra Sacanamboy, Bojan Cukic, Vittorio Cortellessa Performance and Risk Analysis for Border Management Applications: A Model-Driven Approach and a Perspective View. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David B. Skillicorn, Lynnette D. Purda Detecting Fraud in Financial Reports. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elena Camossi, Tatyana Dimitrova, Aris Tsois Detecting Anomalous Maritime Container Itineraries for Anti-fraud and Supply Chain Security. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1James A. Danowski Sentiment Network Analysis of Taleban and RFE/RL Open-Source Content about Afghanistan. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hervé Borrion, Noémie Bouhana iCARE: A Scenario-Based Method for the RIBS Project. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nasrullah Memon, Daniel Zeng 0001 (eds.) 2012 European Intelligence and Security Informatics Conference, EISIC 2012, Odense, Denmark, August 22-24, 2012 Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  BibTeX  RDF
1David E. A. Johnson, Newton Howard Network Intelligence: An Emerging Discipline. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hirad Asadi, Christian Mårtenson, Pontus Svenson, Magnus Sköld The HiTS/ISAC Social Network Analysis Tool. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Cor J. Veenman Data Base Investigation as a Ranking Problem. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Navot Akiva, Moshe Koppel Identifying Distinct Components of a Multi-author Document. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Travis Morris Extracting and Networking Emotions in Extremist Propaganda. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Archibald Owen, Gregory Duckworth, Jerry Worsley OptaSense: Fibre Optic Distributed Acoustic Sensing for Border Monitoring. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fredrik Johansson, Joel Brynielsson, Maribel Narganes Quijano Estimating Citizen Alertness in Crises Using Social Media Monitoring and Analysis. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andi Fitriah Abdul Kadir, Raja Azrina Raja Othman, Normaziah Abdul Aziz Behavioral Analysis and Visualization of Fast-Flux DNS. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mortaza S. Bargh, Sunil Choenni, Ingrid Mulder, Roland Pastoor Exploring a Warrior Paradigm to Design Out Cybercrime. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Joel Brynielsson, Andreas Horndahl, Fredrik Johansson, Lisa Kaati, Christian Mårtenson, Pontus Svenson Analysis of Weak Signals for Detecting Lone Wolf Terrorists. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paolo D'Arminio, Ricardo Buendia Iglesias, Janusz Cichowski, Piotr Dalka, Damian Ellwart, Sateesh Pedagadi, James Orwell, Inga Kroener, Daniel Neyland Technologies for Granting Balance between Security and Privacy in Video-Surveillance. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Senya Polikovsky, Maria Alejandra Quiros-Ramirez, Yoshinari Kameda, Yuichi Ohta, Judee K. Burgoon Benchmark Driven Framework for Development of Emotion Sensing Support Systems. Search on Bibsonomy EISIC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yonca Ustunbas, Sule Gündüz Ögüdücü A Recommendation Model for Social Resource Sharing Systems Based on Tripartite Graph Clustering. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pir Abdul Rasool Qureshi, Nasrullah Memon, Uffe Kock Wiil, Panagiotis Karampelas, Jose Ignacio Nieto Sancheze Harvesting Information from Heterogeneous Sources. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1M. A. J. Bourassa, J. Fugère, David B. Skillicorn Interestingness - Directing Analyst Focus to Significant Data. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Hans Önnerud, Sara Wallin, Henric Östmark Localisation of Threat Substances in Urban Society - LOTUS: Tomorrow's System for Finding Illicit Manufacturing of Drugs and Home Made Explosives. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ulrik Spak, Mats Lind Change Blindness in Intelligence: Effects of Attention Guidance by Instructions. Search on Bibsonomy EISIC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 370 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license