The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for sophistication with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1985 (16) 1986-1990 (15) 1991-1994 (16) 1995-1998 (26) 1999-2000 (26) 2001 (23) 2002 (27) 2003 (19) 2004 (29) 2005 (47) 2006 (50) 2007 (42) 2008 (44) 2009 (28) 2010-2012 (19) 2013-2017 (18) 2018-2022 (19) 2023-2024 (8)
Publication types (Num. hits)
article(133) incollection(2) inproceedings(335) phdthesis(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 424 occurrences of 378 keywords

Results
Found 472 publication records. Showing 472 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
10Thierry Delbecque, Pierre Zweigenbaum MetaCoDe: A Lightweight UMLS Mapping Tool. Search on Bibsonomy AIME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Medical Terminologies, MetaMap, MMTx, Information Retrieval, Natural Language Processing, Information Extraction, Concept Mapping, UMLS
10Kyueun Yi, Jean-Luc Gaudiot Architectural Support for Network Applications on Simultaneous MultiThreading Processors. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Jason B. Ellis, Shahtab Wahid, Catalina Danis, Wendy A. Kellogg Task and social visualization in software development: evaluation of a prototype. Search on Bibsonomy CHI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF change tracking systems, coordination of work, task visualization, information visualization, software development, social visualization
10Marco Cova, Davide Balzarotti, Viktoria Felmetsger, Giovanni Vigna Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web Attacks, Anomaly Detection, Dynamic Analysis, Code Instrumentation
10Taraneh Taghavi, Foad Dabiri, Ani Nahapetian, Majid Sarrafzadeh Tutorial on congestion prediction. Search on Bibsonomy SLIP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF algorithm, prediction, delay, congestion, wirelength
10Christopher Scaffidi, Allen Cypher, Sebastian G. Elbaum, Andhy Koesnandar, Brad A. Myers Scenario-Based Requirements for Web Macro Tools. Search on Bibsonomy VL/HCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Eusebio Scornavacca Jr., Stephen Marshall TXT-2-LRN: improving students' learning exper ience in the classroom through interactive SMS. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Raymond Y. K. Lau, On Wong Mining Negotiation Knowledge for Adaptive Negotiation Agents in e-Marketplaces. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Lilia Efimova, Jonathan Grudin Crossing Boundaries: A Case Study of Employee Blogging. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10George P. Mylonas, Danail Stoyanov, Ara Darzi, Guang-Zhong Yang Assessment of Perceptual Quality for Gaze-Contingent Motion Stabilization in Robotic Assisted Minimally Invasive Surgery. Search on Bibsonomy MICCAI (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Taraneh Taghavi, Ani Nahapetian, Majid Sarrafzadeh System Level Estimation of Interconnect Length in the Presence of IP Blocks. Search on Bibsonomy ISQED The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Wirelength Estimation, Hierarchical Placement, Large-scale Circuits, Non-Uniform Probability Distribution, Rent's Rule, IP Blocks
10Michele Banko, Oren Etzioni Strategies for lifelong knowledge extraction from the web. Search on Bibsonomy K-CAP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF machine reading, lifelong learning
10Philipp Kistner, Nadine Rottenbacher, Klaus Weber 0003 Optimizing Flight and Cruise Occupancy of a Cruise Line. Search on Bibsonomy OR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Eric Beyne Tutorial T7A: Advanced IC Packaging. Search on Bibsonomy VLSI Design The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Frank Dignum, Virginia Dignum, John Thangarajah, Lin Padgham, Michael Winikoff Open Agent Systems??? Search on Bibsonomy AOSE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
10Paul Rouse, Robert Swales Pricing public health care services using DEA: Methodology versus politics. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Healthcare, Pricing, Data Envelopment Analysis
10Keith S. Vallerio, Lin Zhong 0001, Niraj K. Jha Energy-Efficient Graphical User Interface Design. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF low power, Graphical user interfaces, handheld computers
10Gregory Kulczycki, Murali Sitaraman, Bruce W. Weide, Atanas Rountev A specification-based approach to reasoning about pointers. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2006 DBLP  DOI  BibTeX  RDF heap memory management, pointer specification, reasoning
10Cuihong Li, Joseph Andrew Giampapa, Katia P. Sycara Bilateral negotiation decisions with uncertain dynamic outside options. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part C The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Charles C. Kemp Wearables and Robots: A Shared View. Search on Bibsonomy IEEE Pervasive Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF robotics, wearable, humanoid robot
10Norman Chonacky The Spread Spectrum in Computing. Search on Bibsonomy Comput. Sci. Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF scientific computing, special-purpose computing
10Chengyu Sun, Nagender Bandi, Divyakant Agrawal, Amr El Abbadi Exploring spatial datasets with histograms. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Databases, Geographic information systems, Query processing
10Yang Liu 0014, Helmut Pottmann, Johannes Wallner 0001, Yong-Liang Yang, Wenping Wang Geometric modeling with conical meshes and developable surfaces. Search on Bibsonomy ACM Trans. Graph. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF developable subdivision surface, nonlinear subdivision, offset mesh, principal mesh, surfaces in architecture, discrete differential geometry, developable surface, quad mesh
10Onur G. Guleryuz Linear, Worst-Case Estimators for Denoising Quantization Noise in Transform Coded Images. Search on Bibsonomy IEEE Trans. Image Process. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Simon J. Perkins, Patrick C. Marais Identification and reconstruction of bullets from multiple X-rays. Search on Bibsonomy Afrigraph The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bullets, segmentation, medical imaging, reconstruction
10Manuel Llavador, José H. Canós XWebMapper: A Web-Based Tool for Transforming XML Documents. Search on Bibsonomy ECDL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Tamas Suto, Jeremy T. Bradley, William J. Knottenbelt Performance Trees: A New Approach to Quantitative Performance Specification. Search on Bibsonomy MASCOTS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Bee-Chung Chen, Vinod Yegneswaran, Paul Barford, Raghu Ramakrishnan 0001 Toward a Query Language for Network Attack Data. Search on Bibsonomy ICDE Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Marianna Sigala A Framework for Developing and Evaluating Mass Customisation Strategies for Online Travel Companies. Search on Bibsonomy ENTER The full citation details ... 2006 DBLP  DOI  BibTeX  RDF travel information services, evaluation, strategies, mass customization
10John Strassner, David Raymer Implementing Next Generation Services Using Policy-Based Management and Autonomic Computing Principles. Search on Bibsonomy NOMS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Haggai Roitman, Avigdor Gal, Louiqa Raschid ProMo - A Scalable and Efficient Framework for Online Data Delivery. Search on Bibsonomy NGITS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10José M. Fernandez 0001, Pierre-Marc Bureau Optimising malware. Search on Bibsonomy IPCCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jules S. Jaffe, Curt Schurgers Sensor networks of freely drifting autonomous underwater explorers. Search on Bibsonomy Underwater Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF autonomous vehicles, underwater sensor networking, underwater acoustic communication
10Phayung Meesad, Tong Srikhacha Universal Data Forecasting with an Adaptive Approach and Seasonal Technique. Search on Bibsonomy CIMCA/IAWTIC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Subrata Acharya, Jia Wang 0001, Zihui Ge, Taieb Znati, Albert G. Greenberg Simulation Study of Firewalls to Aid Improved Performance. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Karen McDowell Now that we are all so well-educated about spyware, can we put the bad guys out of business? Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF antispyware, greyware, malware, spyware, bots, adware
10Madhusudhanan Chandrasekaran, Ramkumar Chinchani, Shambhu J. Upadhyaya PHONEY: Mimicking User Response to Detect Phishing Attacks. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly Secrecy, flagging, and paranoia: adoption criteria in encrypted email. Search on Bibsonomy CHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF encrypted e-mail, extended case method, security, activism
10Kenichi Nishikawa, Nobuhide Nishiyama, Fumihiko Ito, Tetsuya Yamamura Individual Knowledge Generation for Individual User Environments by Relating User Network Ontology to Local Protocols. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Fabio Crestani, Matt Jones 0001, Stefano Mizzaro MUIA 2006: third international workshop on mobile and ubiquitous information access. Search on Bibsonomy Mobile HCI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF mobile information access
10Rodrigo Lanka, Kentaro Oda, Takaichi Yoshida Active Fault-Tolerant System for Open Distributed Computing. Search on Bibsonomy ATC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Leszek A. Maciaszek From Hubs Via Holons to an Adaptive Meta-Architecture - the "AD-HOC" Approach. Search on Bibsonomy SET The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Geoffrey C. Fox Implications of Web 2.0 for the Semantic Grid. Search on Bibsonomy SKG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ioannis V. Papaioannou, Ioanna Roussaki, Miltiades E. Anagnostou Comparing the Performance of MLP and RBF Neural Networks Employed by Negotiating Intelligent Agents. Search on Bibsonomy IAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Amy Unruh, James Bailey 0001, Kotagiri Ramamohanarao A Logging-Based Approach for Building More Robust Multi-agent Systems. Search on Bibsonomy IAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Ignacio J. Martinez-Moyano Using system dynamics for theory building in digital government research: exploring the dynamics of digital government evolution. Search on Bibsonomy DG.O The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-government, formal modeling, system dynamics, systems thinking
10Yan Gao 0003, Zhichun Li, Yan Chen 0004 A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks. Search on Bibsonomy ICDCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10H. Van Dyke Parunak, Paul Nielsen, Sven Brueckner, Rafael Alonso Hybrid Multi-agent Systems: Integrating Swarming and BDI Agents. Search on Bibsonomy ESOA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Vicente Berbegall, Leroy Anthony Drummond, Gumersindo Verdú, Vicente Vidal A Purely Distributed Approach for Coupling Scientific and Engineering Applications. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Aynur A. Dayanik, David D. Lewis, David Madigan, Vladimir Menkov, Alexander Genkin Constructing informative prior distributions from domain knowledge in text classification. Search on Bibsonomy SIGIR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF knowledge-based, maximum entropy, MAP estimation
10M. Tamer Özsu Achievements and remaining challenges in multimedia data modeling. Search on Bibsonomy MMM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Klaus Duellmann Basel II - Achievements and Challenges. Search on Bibsonomy OR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Jamie L. Griffiths, Donald J. Berndt, Alan R. Hevner Naturally Occurring Incidents as Facsimiles for Biochemical Terrorist Attacks. Search on Bibsonomy ISI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Livio Riciulli Advanced networks - High speed firewalls: securing the 10 gigabit ethernet WAN. Search on Bibsonomy SC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Paul J. Feltovich, Jeffrey M. Bradshaw, William J. Clancey, Matthew Johnson 0001 Toward an Ontology of Regulation: Socially-Based Support for Coordination in Human and Machine Joint Activity. Search on Bibsonomy ESAW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF human-agent-robotic systems, joint activity, ontology, predictability, Coordination, policy, culture, teamwork, regulation
10Ponnurangam Kumaraguru, Alessandro Acquisti, Lorrie Faith Cranor Trust modelling for online transactions: a phishing scenario. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Marco Autili, Paola Inverardi, Patrizio Pelliccione A scenario based notation for specifying temporal properties. Search on Bibsonomy SCESM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF scenario based notation, system requirements specification, temporal properties specification
10Phillip A. Porras, Vitaly Shmatikov Large-scale collection and sanitization of network security data: risks and challenges. Search on Bibsonomy NSPW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Zhaoyu Liu, Roopesh Uppala A Dynamic Countermeasure Method for Large-Scale Network Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
10Tibor Bosse, Dung N. Lam, K. Suzanne Barber Automated analysis and verification of agent behavior. Search on Bibsonomy AAMAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF tracer, verification of agent systems, reverse engineering, debugging, maintenance, agent-oriented software engineering, software comprehension
10John Krogstie, Vibeke Dalberg, Siri Moe Jensen Process Modeling Value Framework. Search on Bibsonomy ICEIS (Selected Papers) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Business process modeling, enterprise modeling
10Eli E. W. Van Houten, Marvin M. Doyley, Francis E. Kennedy, Keith D. Paulsen, John B. Weaver A three-parameter mechanical property reconstruction method for MR-based elastic property imaging. Search on Bibsonomy IEEE Trans. Medical Imaging The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Liviu Panait, Sean Luke Cooperative Multi-Agent Learning: The State of the Art. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF machine learning, multi-agent systems, cooperation, survey, multi-agent learning
10William G. J. Halfond, Alessandro Orso Combining static analysis and runtime monitoring to counter SQL-injection attacks. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Terence K. T. Law, John C. S. Lui, David K. Y. Yau You Can Run, But You Can't Hide: An Effective Statistical Methodology to Trace Back DDoS Attackers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF attack traffic filtering, minimum stable time, DDoS attack, traceback
10Ueli Rutishauser, Josef Joller, Rodney J. Douglas Control and learning of ambience by an intelligent building. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Stephen F. Bush A simple metric for ad hoc network adaptation. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10A. Krishnamoorthy, Achilleas Anastasopoulos Code and receiver design for the noncoherent fast-fading channel. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Nenad Medvidovic Software Architectures and Embedded Systems: A Match Made in Heaven? Search on Bibsonomy IEEE Softw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF embedded systems, software architectures
10Carla P. Gomes, Cèsar Fernández, Bart Selman, Christian Bessière Statistical Regimes Across Constrainedness Regions. Search on Bibsonomy Constraints An Int. J. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF runtime distributions, typical case analysis, phase transitions, heavy-tailed distributions, backtrack search
10Paul Browne, Alan F. Smeaton Video retrieval using dialogue, keyframe similarity and video objects. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yandong Fan, Elizabeth A. Kendall A Case-Based Reasoning Approach for Speech Corpus Generation. Search on Bibsonomy IJCNLP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Rongjie Shi, I-Fan Shen, Wenbin Chen 0006 Image Denoising through Locally Linear Embedding. Search on Bibsonomy CGIV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Mohammad H. Rahimi, Rick Baer, Obimdinachi I. Iroezi, Juan C. García, Jay Warrior, Deborah Estrin, Mani B. Srivastava Cyclops: in situ image sensing and interpretation in wireless sensor networks. Search on Bibsonomy SenSys The full citation details ... 2005 DBLP  DOI  BibTeX  RDF sensor network, imaging, vision, power efficiency, CMOS imaging
10Qingchun Jiang, Raman Adaikkalavan, Sharma Chakravarthy NFMi: An Inter-domain Network Fault Management System. Search on Bibsonomy ICDE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Bruce E. Martin Uncovering Database Access Optimizations in the Middle Tier with TORPEDO. Search on Bibsonomy ICDE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Christian Del Rosso Performance analysis framework for large software-intensive systems with a message passing paradigm. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF performance tuning of embedded systems, dynamic analysis, software performance engineering
10Jose J. Gonzalez Towards a Cyber Security Reporting System - A Quality Improvement Process. Search on Bibsonomy SAFECOMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Rongjie Shi, I-Fan Shen, Wenbin Chen 0006, Su Yang Manifold Learning for Image Denoising. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Fernando Alonso Mendo, Guy Fitzgerald A Preliminary Study of the Evolution of SMEs Web Sites in the UK. Search on Bibsonomy CSMR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Fernando Alonso Mendo The Evolution of SMEs Web Sites in the UK. Search on Bibsonomy CSMR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Susan A. Vowels DIY-IT: an empirical study of website development staffing by non-profit organizations. Search on Bibsonomy CPR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF DIY-IT, IT productivity, IT staffing, do-it-yourself, non-profit, IT workforce, IT professionals, IT careers, IS professionals, small business, IT profession, volunteer, IS careers
10Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu A Transparent End-to-End Security Solution. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Jason R. Schenk, Deng Huang, Ning Zheng, Theodore T. Allen Multiple fidelity simulation optimization of hospital performance under high consequence event scenarios. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Engin Kirda, Christopher Krügel Protecting Users Against Phishing Attacks with AntiPhish. Search on Bibsonomy COMPSAC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Phishing Attacks, User Protection, Security
10Alistair Barros, Marlon Dumas, Arthur H. M. ter Hofstede Service Interaction Patterns. Search on Bibsonomy Business Process Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Yi Jiao, Baifeng Wu, Kun Zhu 0005, Qiang Yu Towards a Systematic Conflict Resolution Policy in Multi-agent System: A Conceptual Framework. Search on Bibsonomy CSCWD (Selected papers) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Kumar Chellapilla, Kevin Larson, Patrice Y. Simard, Mary Czerwinski Designing human friendly human interaction proofs (HIPs). Search on Bibsonomy CHI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF completely automated public turing tests to tell computers and humans apart (CAPTCHAs), visual letter recognition, evaluation, computer vision, human perception, human interaction proofs (HIPs)
10Theodore Johnson, S. Muthukrishnan 0001, Oliver Spatscheck, Divesh Srivastava Streams, Security and Scalability. Search on Bibsonomy DBSec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Andrew Stout, Lee Spector Validation of evolutionary activity metrics for long-term evolutionary dynamics. Search on Bibsonomy GECCO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF evolutionary activity metrics, long-term evolutionary dynamics, artificial life
10Boby George, H. Lally Singh, Shawn A. Bohner, Denis Gracanin Requirements Capture for Cougaar Model-Driven Architecture System. Search on Bibsonomy SEW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Manhee Lee, Mazin S. Yousif Instant attack stopper in InfiniBand architecture. Search on Bibsonomy CCGRID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Dalu Zhang, Fang Gao, Zhe Yang 0003 SophiNode: An Efficient Service Discovery System of Decentralized E-Commerce. Search on Bibsonomy EEE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF decentralized E-Commerce, SophiNode, Peer-to-Peer, service discovery
10Lori A. Flynn, Hans-Peter Dommel The QuORRUM Protocol: Efficient Tree Repair for Qualification-Based Multicast. Search on Bibsonomy QSHINE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Multicast tree formation and repair, sparsemode protocols, QoS routing
10Jochen Rode, Yogita Bhardwaj, Manuel A. Pérez-Quiñones, Mary Beth Rosson, Jonathan Randall Howarth As Easy as "Click": End-User Web Engineering. Search on Bibsonomy ICWE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Hans Jochen Scholl Employing the mobility paradigm: the next big leap in digital government? Search on Bibsonomy DG.O The full citation details ... 2005 DBLP  BibTeX  RDF fully mobile wirelessly connected applications, integration with stationary systems, interoperational sustainability, mobile operations in government, organizational challenges in digital government, policy principles, wireless connectivity, maintainability
10Cuihong Li, Katia P. Sycara, Joseph Andrew Giampapa Dynamic Outside Options in Alternating-Offers Negotiations. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
10Aseem Daga, Sergio de Cesare, Mark Lycett, Christopher Partridge An Ontological Approach for Recovering Legacy Business Content. Search on Bibsonomy HICSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF legacy transformation, content transformation, ontology, legacy system
10John V. Harrison Enhancing Network Security By Preventing User-Initiated Malware Execution. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Network Security, Computer Security, Malicious Software, Operating System Security
10William G. J. Halfond, Alessandro Orso AMNESIA: analysis and monitoring for NEutralizing SQL-injection attacks. Search on Bibsonomy ASE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF static analysis, runtime monitoring, SQL injection
Displaying result #201 - #300 of 472 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license