Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Karen Renaud, Judy van Biljon |
Teaching SQL - Which Pedagogical Horse for This Course? |
BNCOD |
2004 |
DBLP DOI BibTeX RDF |
|
19 | John ffitch, Julian A. Padget |
Ride a Cock-Horse .... |
WEDELMUSIC |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Mikko Korpela, Anja Mursu, Hettie Abimbola Soriyan, Anne Eerola, Heidi Häkkinen, Marika Toivanen |
Information Systems Research and Development by Activity Analysis and Development: Dead Horse or the Next Wave? |
Relevant Theory and Informed Practice |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Shinobu Makita, Junji Furusho |
Development of Horse-type Quadruped Robot -Report 1, Development of Mechanism and Control System of Quadruped Robot PONY-. |
J. Robotics Mechatronics |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Thomas Mahlke |
fr-019: poem to a horse. |
SIGGRAPH Video Review on Animation Theater Program (2) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Jan-Åke Larsson |
A practical trojan horse for bell-inequality-based quantum cryptography. |
Quantum Inf. Comput. |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Adrian Spalka, Armin B. Cremers, Hanno Langweg |
Trojan horse attacks on software for electronic signatures. |
Informatica (Slovenia) |
2002 |
DBLP BibTeX RDF |
|
19 | Holly Kruse |
Narrowcast technology, interactivity, and the economic relations of space: the case of horse race simulcasting. |
New Media Soc. |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Robert L. Glass |
The Naturalness of Object Orientation: Beating a Dead Horse? |
IEEE Softw. |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Hisashi Miyamori |
A study on automatic database creation and summarization of a vaulting horse class. |
ICME (2) |
2002 |
DBLP DOI BibTeX RDF |
|
19 | Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka |
Protecting Java Component Integrity Against Trojan Horse Programs. |
IICIS |
2002 |
DBLP BibTeX RDF |
|
19 | Michael R. Macedonia |
Entertainment Computing - Will Linux Be Computer Games' Dark Horse OS? |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
19 | M. Boyle |
The computer as a Trojan Horse. |
J. Comput. Assist. Learn. |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Hugh M. Herr, Thomas Aquinas McMahon |
A Galloping Horse Model. |
Int. J. Robotics Res. |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Masahiko Suzaki, Osamu Yamakita, Shin-ichi Horikawa, Yuji Kuno, Hiroko Aida, Naoki Sasaki, Ryo Kusunose |
A horse identification system using biometrics. |
Syst. Comput. Jpn. |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Hiroki Takeuchi |
Development of MEL HORSE. |
ICRA |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Adrian Spalka, Armin B. Cremers, Hanno Langweg |
Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. |
SEC |
2001 |
DBLP BibTeX RDF |
|
19 | Paul Kafno |
Reflections from a Hobby Horse. |
International Conference on Virtual Storytelling |
2001 |
DBLP DOI BibTeX RDF |
|
19 | Robert Eklund |
Prolongations: A dark horse in the disfluency stable. |
DiSS |
2001 |
DBLP BibTeX RDF |
|
19 | Robert Read, Lyn C. Thomas, Alan Washburn |
Estimating means when sampling gives probabilities as well as values or "Looking a gift horse in the mouth". |
Stat. Comput. |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Garud Iyengar, Thomas M. Cover |
Growth optimal investment in horse race markets with costs. |
IEEE Trans. Inf. Theory |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Hugh M. Herr, Thomas Aquinas McMahon |
A Trotting Horse Model. |
Int. J. Robotics Res. |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Hiroki Takeuchi |
Development of MEL HORSE. |
IROS |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Adrian Spalka, Armin B. Cremers, Hartmut Lehmler |
Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. |
ACISP |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Giovanni De Micheli, Tony Correale, Pietro Erratico, Srini Raghvendra, Hugo De Man, Jerry Frankil, Vivek Tiwari |
Do our low-power tools have enough horse power? (panel session) (title only). |
ISLPED |
2000 |
DBLP DOI BibTeX RDF |
|
19 | Frances Deepwell, Andy Syson |
Online Learning at Coventry University: You Can Lead a Horse toWater.... |
J. Educ. Technol. Soc. |
1999 |
DBLP BibTeX RDF |
|
19 | Bruce Schneier |
The Trojan Horse Race. |
Commun. ACM |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Hiroki Takeuchi |
Development of "MEL HORSE". |
ICRA |
1999 |
DBLP DOI BibTeX RDF |
|
19 | Shuoyu Wang, Koichi Kawata, Takeshi Tsuchiya, Kenji Ishida, Tetsuhiko Kimura, Ryoji Nakajima, Youichi Shinomiya |
Horse riding robot for health promotion and its control. |
Adv. Robotics |
1998 |
DBLP DOI BibTeX RDF |
|
19 | Akemi Takeoka Chatfield, Niels Bjørn-Andersen |
Reengineering with EDI: a Trojan Horse in Circumventing Non-Tariff Barriers to Trade. |
ECIS |
1996 |
DBLP BibTeX RDF |
|
19 | Ed Sawicki |
Securing NetWare Against Trojan Horse Attacks. |
Inf. Secur. J. A Glob. Perspect. |
1995 |
DBLP DOI BibTeX RDF |
|
19 | Fred W. Weingarten |
The HPCC: Still a Percheron Horse. |
Commun. ACM |
1995 |
DBLP DOI BibTeX RDF |
|
19 | |
Intellectual property concepts - authorship and originality - II: The criterion of originality for copyright in computer programs and databases: A galloping trojan horse. |
Comput. Law Secur. Rev. |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Patti M. Koenig, George A. Bekey |
Generation and Control of Gait Patterns in a Simulated Horse. |
ICRA (3) |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Patti M. Koenig, George A. Bekey |
Generation and control of lateral gaits in a horse-rider simulation. |
IROS |
1993 |
DBLP DOI BibTeX RDF |
|
19 | Eugene J. Shekita |
TP-Lite: Harmless Intruder or Trojan Horse? |
HPTS |
1993 |
DBLP BibTeX RDF |
|
19 | Jonathan T. Trostle |
Multiple Trojan Horse Systems and Covert Channel Analysis. |
CSFW |
1991 |
DBLP DOI BibTeX RDF |
|
19 | Mary McLeish, Matthew Cecile |
Horse Colic. |
|
1989 |
DOI RDF |
|
19 | Mark B. Johnson |
You cannot lead a horse to water: taking charge of microcomputer support. |
SIGUCCS |
1987 |
DBLP DOI BibTeX RDF |
|
19 | Yeheskel Lapid, Niv Ahituv, Seev Neumann |
Approaches to handling "Trojan Horse" threats. |
Comput. Secur. |
1986 |
DBLP DOI BibTeX RDF |
|
15 | Alessandro Carpentiero, Manuela De Leo, Ivan Garcia Romero, Stefano Pozzi Mucelli, Freimut Reuther, Giorgio Stanta, Massimo Tormen, Paolo Ugo, Martina Zamuner |
Nanoelectrochemical Immunosensors for Protein Detection. |
NanoNet |
2009 |
DBLP DOI BibTeX RDF |
Nanoelectrode, electrochemical immunosensor, trastuzumab, voltammetry, electron beam lithography, proteomics |
15 | Chaitanya Desai, Dmitri V. Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian |
Using Semantics for Speech Annotation of Images. |
ICDE |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Jill Cousins, Sally Chambers, Eric van der Meulen |
Uncovering cultural heritage through collaboration. |
Int. J. Digit. Libr. |
2008 |
DBLP DOI BibTeX RDF |
|
15 | George Lawton |
Is It Finally Time to Worry about Mobile Malware? |
Computer |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Benedict R. Gaster |
Streams: Emerging from a Shared Memory Model. |
IWOMP |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Francis G. Wolff, Christos A. Papachristou, Swarup Bhunia, Rajat Subhra Chakraborty |
Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. |
DATE |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Mark V. Springett, Richard N. Griffiths |
Innovation for inclusive design: an approach to exploring the iDTV design space. |
UXTV |
2008 |
DBLP DOI BibTeX RDF |
evaluation, prototypes, creativity, task models, design-space |
15 | Nick C. Tang, Timothy K. Shih, Hsing-Ying Zhong, Joseph C. Tsai, Chin-Yao Tang |
Video falsifying for special effect production. |
ACM Multimedia |
2008 |
DBLP DOI BibTeX RDF |
layer segmentation, tracking, special effect, video inpainting |
15 | Ann Svensson |
Instructional-Design Theories Applied on a Web-Based Learning Application. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
instructional-design theory, interactive, web-based application, multimedia learning |
15 | Long Zhu, Yuanhao Chen, Xingyao Ye, Alan L. Yuille |
Structure-perceptron learning of a hierarchical log-linear model. |
CVPR |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Ljiljana Skrba, Ian O'Connell, Carol O'Sullivan |
Eye-tracking dynamic scenes with humans and animals. |
APGV |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Muazzam Siddiqui, Morgan C. Wang, Joohan Lee |
Detecting Trojans Using Data Mining Techniques. |
IMTIC |
2008 |
DBLP DOI BibTeX RDF |
Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly |
15 | Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry, Kunal Talwar |
Privacy, accuracy, and consistency too: a holistic solution to contingency table release. |
PODS |
2007 |
DBLP DOI BibTeX RDF |
privacy, OLAP, contingency table |
15 | Thomas Raffetseder, Christopher Krügel, Engin Kirda |
Detecting System Emulators. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Ralf Tautenhahn, Christoph Böttcher, Steffen Neumann |
Annotation of LC/ESI-MS Mass Signals. |
BIRD |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Songfeng Zheng, Zhuowen Tu, Alan L. Yuille |
Detecting Object Boundaries Using Low-, Mid-, and High-level Information. |
CVPR |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Andreas Moser, Christopher Krügel, Engin Kirda |
Exploring Multiple Execution Paths for Malware Analysis. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda |
Dynamic Analysis of Malicious Code. |
J. Comput. Virol. |
2006 |
DBLP DOI BibTeX RDF |
Virus worm, Static analysis, Analysis, Dynamic analysis, API, Malware |
15 | Brenda Laurel |
Designed animism. |
OOPSLA Companion |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Jon Louis Bentley |
Tiny Experiments for Algorithms and Life. |
WEA |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Robert A. Barta |
Towards a Formal TMQL Semantics. |
TMRA |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Brian Berenbach |
Requirements Engineering: An Industrial Perspective. |
RE |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Sebastian Klie, Steffen Neumann |
Storage and Processing of Mass Spectrometry Data. |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Eran Borenstein, Jitendra Malik |
Shape Guided Object Segmentation. |
CVPR (1) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Keith Forbes, Fred Nicolls, Gerhard de Jager, Anthon Voigt |
Shape-from-Silhouette with Two Mirrors and an Uncalibrated Camera. |
ECCV (2) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Shigeaki Harada, Eiji Takimoto, Akira Maruoka |
Online Allocation with Risk Information. |
ALT |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Adam L. Young, Moti Yung |
Malicious Cryptography: Kleptographic Aspects. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP |
15 | Shuning Cui, Boqin Feng |
A Fuzzy Integral Method to Merge Search Engine Results on Web. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Marc Lettrari |
Using Abstractions for Heuristic State Space Exploration of Reactive Object-Oriented Systems. |
FME |
2003 |
DBLP DOI BibTeX RDF |
UML, abstractions, heuristic search, symbolic execution |
15 | Robert L. Glass |
How to handle real project risks, while filing gaps in the risk theory literature. |
Data Base |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Hervé Debar, Benjamin Morin |
Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky |
Analysing Approximate Confinement under Uniform Attacks. |
SAS |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Eran Borenstein, Shimon Ullman |
Class-Specific, Top-Down Segmentation. |
ECCV (2) |
2002 |
DBLP DOI BibTeX RDF |
Figure-ground, Object classification, Top-down processing, Grouping and segmentation |
15 | Michael Weber, Matthew Schmid, Michael Schatz, David Geyer |
A Toolkit for Detecting and Analyzing Malicious Software. |
ACSAC |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Wilhelm Niethammer |
The Successive Over Relaxation Method (SOR) and Markov Chains. |
Ann. Oper. Res. |
2001 |
DBLP DOI BibTeX RDF |
|
15 | L. Aruna, Yamini Sharma, Rushikesh K. Joshi |
Design and Implementation of an RPC-Based ARC Kernel. |
HPCN |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Richard H. Stern |
Napster: A Walking Copyright Infringement? |
IEEE Micro |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Jill O'Neill, Richard Hulser, Susan Kesner, Val Tucci, John Tagler, Chris Leonard |
The Publishing Industry and Generational Changes in Product Development - Panel. |
ADL |
1999 |
DBLP DOI BibTeX RDF |
|
15 | Abderrahim Doumar, Satoshi Kaneko, Hideo Ito |
Defect and Fault Tolerance FPGAs by Shifting the Configuration Data. |
DFT |
1999 |
DBLP DOI BibTeX RDF |
|
15 | Yoram Gdalyahu, Daphna Weinshall |
Flexible Syntactic Matching of Curves. |
ECCV (2) |
1998 |
DBLP DOI BibTeX RDF |
|
15 | David A. Forsyth, Margaret M. Fleck |
Body plans. |
CVPR |
1997 |
DBLP DOI BibTeX RDF |
body plans, image color, uncontrolled test sets, diverse control sets, performance, computer vision, image segmentation, animals, object recognition, image recognition, image databases, content based retrieval, image representation, image representation, image texture, statistical learning, people, geometric properties |
15 | Raffaele di Giovanni, Pier Luigi Iachini |
HOOD and Z for the Development of Complex Software Systems. |
VDM Europe |
1990 |
DBLP DOI BibTeX RDF |
|
15 | Paul A. Karger |
The Lattice Security Model In A Public Computing Network. |
ACM Annual Conference (1) |
1978 |
DBLP DOI BibTeX RDF |
Data processing security, Lattice security model, Non-discretionary security, Computer security, Computer network security |