The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for HORSE with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1978-1997 (18) 1998-2000 (20) 2001-2002 (23) 2003-2005 (24) 2006 (15) 2007-2008 (24) 2009-2010 (19) 2011-2012 (24) 2013-2014 (19) 2015-2016 (35) 2017-2018 (24) 2019 (21) 2020 (30) 2021 (19) 2022 (34) 2023 (29) 2024 (5)
Publication types (Num. hits)
article(178) data(1) inproceedings(201) phdthesis(3)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 140 occurrences of 133 keywords

Results
Found 385 publication records. Showing 383 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
19Karen Renaud, Judy van Biljon Teaching SQL - Which Pedagogical Horse for This Course? Search on Bibsonomy BNCOD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19John ffitch, Julian A. Padget Ride a Cock-Horse .... Search on Bibsonomy WEDELMUSIC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Mikko Korpela, Anja Mursu, Hettie Abimbola Soriyan, Anne Eerola, Heidi Häkkinen, Marika Toivanen Information Systems Research and Development by Activity Analysis and Development: Dead Horse or the Next Wave? Search on Bibsonomy Relevant Theory and Informed Practice The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Shinobu Makita, Junji Furusho Development of Horse-type Quadruped Robot -Report 1, Development of Mechanism and Control System of Quadruped Robot PONY-. Search on Bibsonomy J. Robotics Mechatronics The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Thomas Mahlke fr-019: poem to a horse. Search on Bibsonomy SIGGRAPH Video Review on Animation Theater Program (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Jan-Åke Larsson A practical trojan horse for bell-inequality-based quantum cryptography. Search on Bibsonomy Quantum Inf. Comput. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Adrian Spalka, Armin B. Cremers, Hanno Langweg Trojan horse attacks on software for electronic signatures. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2002 DBLP  BibTeX  RDF
19Holly Kruse Narrowcast technology, interactivity, and the economic relations of space: the case of horse race simulcasting. Search on Bibsonomy New Media Soc. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Robert L. Glass The Naturalness of Object Orientation: Beating a Dead Horse? Search on Bibsonomy IEEE Softw. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Hisashi Miyamori A study on automatic database creation and summarization of a vaulting horse class. Search on Bibsonomy ICME (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
19Marcel Winandy, Armin B. Cremers, Hanno Langweg, Adrian Spalka Protecting Java Component Integrity Against Trojan Horse Programs. Search on Bibsonomy IICIS The full citation details ... 2002 DBLP  BibTeX  RDF
19Michael R. Macedonia Entertainment Computing - Will Linux Be Computer Games' Dark Horse OS? Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19M. Boyle The computer as a Trojan Horse. Search on Bibsonomy J. Comput. Assist. Learn. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Hugh M. Herr, Thomas Aquinas McMahon A Galloping Horse Model. Search on Bibsonomy Int. J. Robotics Res. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Masahiko Suzaki, Osamu Yamakita, Shin-ichi Horikawa, Yuji Kuno, Hiroko Aida, Naoki Sasaki, Ryo Kusunose A horse identification system using biometrics. Search on Bibsonomy Syst. Comput. Jpn. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Hiroki Takeuchi Development of MEL HORSE. Search on Bibsonomy ICRA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Adrian Spalka, Armin B. Cremers, Hanno Langweg Protecting the Creation of Digital Signatures with Trusted Computing Platform Technology Against Attacks by Trojan Horse Programs. Search on Bibsonomy SEC The full citation details ... 2001 DBLP  BibTeX  RDF
19Paul Kafno Reflections from a Hobby Horse. Search on Bibsonomy International Conference on Virtual Storytelling The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Robert Eklund Prolongations: A dark horse in the disfluency stable. Search on Bibsonomy DiSS The full citation details ... 2001 DBLP  BibTeX  RDF
19Robert Read, Lyn C. Thomas, Alan Washburn Estimating means when sampling gives probabilities as well as values or "Looking a gift horse in the mouth". Search on Bibsonomy Stat. Comput. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Garud Iyengar, Thomas M. Cover Growth optimal investment in horse race markets with costs. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Hugh M. Herr, Thomas Aquinas McMahon A Trotting Horse Model. Search on Bibsonomy Int. J. Robotics Res. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Hiroki Takeuchi Development of MEL HORSE. Search on Bibsonomy IROS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Adrian Spalka, Armin B. Cremers, Hartmut Lehmler Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System. Search on Bibsonomy ACISP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Giovanni De Micheli, Tony Correale, Pietro Erratico, Srini Raghvendra, Hugo De Man, Jerry Frankil, Vivek Tiwari Do our low-power tools have enough horse power? (panel session) (title only). Search on Bibsonomy ISLPED The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Frances Deepwell, Andy Syson Online Learning at Coventry University: You Can Lead a Horse toWater.... Search on Bibsonomy J. Educ. Technol. Soc. The full citation details ... 1999 DBLP  BibTeX  RDF
19Bruce Schneier The Trojan Horse Race. Search on Bibsonomy Commun. ACM The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Hiroki Takeuchi Development of "MEL HORSE". Search on Bibsonomy ICRA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
19Shuoyu Wang, Koichi Kawata, Takeshi Tsuchiya, Kenji Ishida, Tetsuhiko Kimura, Ryoji Nakajima, Youichi Shinomiya Horse riding robot for health promotion and its control. Search on Bibsonomy Adv. Robotics The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Akemi Takeoka Chatfield, Niels Bjørn-Andersen Reengineering with EDI: a Trojan Horse in Circumventing Non-Tariff Barriers to Trade. Search on Bibsonomy ECIS The full citation details ... 1996 DBLP  BibTeX  RDF
19Ed Sawicki Securing NetWare Against Trojan Horse Attacks. Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
19Fred W. Weingarten The HPCC: Still a Percheron Horse. Search on Bibsonomy Commun. ACM The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
19 Intellectual property concepts - authorship and originality - II: The criterion of originality for copyright in computer programs and databases: A galloping trojan horse. Search on Bibsonomy Comput. Law Secur. Rev. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
19Patti M. Koenig, George A. Bekey Generation and Control of Gait Patterns in a Simulated Horse. Search on Bibsonomy ICRA (3) The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
19Patti M. Koenig, George A. Bekey Generation and control of lateral gaits in a horse-rider simulation. Search on Bibsonomy IROS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
19Eugene J. Shekita TP-Lite: Harmless Intruder or Trojan Horse? Search on Bibsonomy HPTS The full citation details ... 1993 DBLP  BibTeX  RDF
19Jonathan T. Trostle Multiple Trojan Horse Systems and Covert Channel Analysis. Search on Bibsonomy CSFW The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
19Mary McLeish, Matthew Cecile Horse Colic. Search on Bibsonomy 1989   DOI  RDF
19Mark B. Johnson You cannot lead a horse to water: taking charge of microcomputer support. Search on Bibsonomy SIGUCCS The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
19Yeheskel Lapid, Niv Ahituv, Seev Neumann Approaches to handling "Trojan Horse" threats. Search on Bibsonomy Comput. Secur. The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
15Alessandro Carpentiero, Manuela De Leo, Ivan Garcia Romero, Stefano Pozzi Mucelli, Freimut Reuther, Giorgio Stanta, Massimo Tormen, Paolo Ugo, Martina Zamuner Nanoelectrochemical Immunosensors for Protein Detection. Search on Bibsonomy NanoNet The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Nanoelectrode, electrochemical immunosensor, trastuzumab, voltammetry, electron beam lithography, proteomics
15Chaitanya Desai, Dmitri V. Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian Using Semantics for Speech Annotation of Images. Search on Bibsonomy ICDE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Jill Cousins, Sally Chambers, Eric van der Meulen Uncovering cultural heritage through collaboration. Search on Bibsonomy Int. J. Digit. Libr. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15George Lawton Is It Finally Time to Worry about Mobile Malware? Search on Bibsonomy Computer The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Benedict R. Gaster Streams: Emerging from a Shared Memory Model. Search on Bibsonomy IWOMP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Francis G. Wolff, Christos A. Papachristou, Swarup Bhunia, Rajat Subhra Chakraborty Towards Trojan-Free Trusted ICs: Problem Analysis and Detection Scheme. Search on Bibsonomy DATE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Mark V. Springett, Richard N. Griffiths Innovation for inclusive design: an approach to exploring the iDTV design space. Search on Bibsonomy UXTV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, prototypes, creativity, task models, design-space
15Nick C. Tang, Timothy K. Shih, Hsing-Ying Zhong, Joseph C. Tsai, Chin-Yao Tang Video falsifying for special effect production. Search on Bibsonomy ACM Multimedia The full citation details ... 2008 DBLP  DOI  BibTeX  RDF layer segmentation, tracking, special effect, video inpainting
15Ann Svensson Instructional-Design Theories Applied on a Web-Based Learning Application. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF instructional-design theory, interactive, web-based application, multimedia learning
15Long Zhu, Yuanhao Chen, Xingyao Ye, Alan L. Yuille Structure-perceptron learning of a hierarchical log-linear model. Search on Bibsonomy CVPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Ljiljana Skrba, Ian O'Connell, Carol O'Sullivan Eye-tracking dynamic scenes with humans and animals. Search on Bibsonomy APGV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Muazzam Siddiqui, Morgan C. Wang, Joohan Lee Detecting Trojans Using Data Mining Techniques. Search on Bibsonomy IMTIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Trojan Detection, Data Mining, Support Vector Machines, Principal Component Analysis, Random Forest, Disassembly
15Boaz Barak, Kamalika Chaudhuri, Cynthia Dwork, Satyen Kale, Frank McSherry, Kunal Talwar Privacy, accuracy, and consistency too: a holistic solution to contingency table release. Search on Bibsonomy PODS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy, OLAP, contingency table
15Thomas Raffetseder, Christopher Krügel, Engin Kirda Detecting System Emulators. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Ralf Tautenhahn, Christoph Böttcher, Steffen Neumann Annotation of LC/ESI-MS Mass Signals. Search on Bibsonomy BIRD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Songfeng Zheng, Zhuowen Tu, Alan L. Yuille Detecting Object Boundaries Using Low-, Mid-, and High-level Information. Search on Bibsonomy CVPR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Andreas Moser, Christopher Krügel, Engin Kirda Exploring Multiple Execution Paths for Malware Analysis. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Ulrich Bayer, Andreas Moser, Christopher Krügel, Engin Kirda Dynamic Analysis of Malicious Code. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Virus worm, Static analysis, Analysis, Dynamic analysis, API, Malware
15Brenda Laurel Designed animism. Search on Bibsonomy OOPSLA Companion The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Jon Louis Bentley Tiny Experiments for Algorithms and Life. Search on Bibsonomy WEA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Robert A. Barta Towards a Formal TMQL Semantics. Search on Bibsonomy TMRA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Brian Berenbach Requirements Engineering: An Industrial Perspective. Search on Bibsonomy RE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Sebastian Klie, Steffen Neumann Storage and Processing of Mass Spectrometry Data. Search on Bibsonomy DEXA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Eran Borenstein, Jitendra Malik Shape Guided Object Segmentation. Search on Bibsonomy CVPR (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Keith Forbes, Fred Nicolls, Gerhard de Jager, Anthon Voigt Shape-from-Silhouette with Two Mirrors and an Uncalibrated Camera. Search on Bibsonomy ECCV (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Shigeaki Harada, Eiji Takimoto, Akira Maruoka Online Allocation with Risk Information. Search on Bibsonomy ALT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Adam L. Young, Moti Yung Malicious Cryptography: Kleptographic Aspects. Search on Bibsonomy CT-RSA The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Rabin, malicious cryptography, RSA, public key cryptography, attacks, random oracle, security threats, kleptography, SETUP
15Shuning Cui, Boqin Feng A Fuzzy Integral Method to Merge Search Engine Results on Web. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Marc Lettrari Using Abstractions for Heuristic State Space Exploration of Reactive Object-Oriented Systems. Search on Bibsonomy FME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF UML, abstractions, heuristic search, symbolic execution
15Robert L. Glass How to handle real project risks, while filing gaps in the risk theory literature. Search on Bibsonomy Data Base The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Hervé Debar, Benjamin Morin Evaluation of the Diagnostic Capabilities of Commercial Intrusion Detection Systems. Search on Bibsonomy RAID The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Alessandra Di Pierro, Chris Hankin, Herbert Wiklicky Analysing Approximate Confinement under Uniform Attacks. Search on Bibsonomy SAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Eran Borenstein, Shimon Ullman Class-Specific, Top-Down Segmentation. Search on Bibsonomy ECCV (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Figure-ground, Object classification, Top-down processing, Grouping and segmentation
15Michael Weber, Matthew Schmid, Michael Schatz, David Geyer A Toolkit for Detecting and Analyzing Malicious Software. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
15Wilhelm Niethammer The Successive Over Relaxation Method (SOR) and Markov Chains. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15L. Aruna, Yamini Sharma, Rushikesh K. Joshi Design and Implementation of an RPC-Based ARC Kernel. Search on Bibsonomy HPCN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
15Richard H. Stern Napster: A Walking Copyright Infringement? Search on Bibsonomy IEEE Micro The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
15Jill O'Neill, Richard Hulser, Susan Kesner, Val Tucci, John Tagler, Chris Leonard The Publishing Industry and Generational Changes in Product Development - Panel. Search on Bibsonomy ADL The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Abderrahim Doumar, Satoshi Kaneko, Hideo Ito Defect and Fault Tolerance FPGAs by Shifting the Configuration Data. Search on Bibsonomy DFT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
15Yoram Gdalyahu, Daphna Weinshall Flexible Syntactic Matching of Curves. Search on Bibsonomy ECCV (2) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
15David A. Forsyth, Margaret M. Fleck Body plans. Search on Bibsonomy CVPR The full citation details ... 1997 DBLP  DOI  BibTeX  RDF body plans, image color, uncontrolled test sets, diverse control sets, performance, computer vision, image segmentation, animals, object recognition, image recognition, image databases, content based retrieval, image representation, image representation, image texture, statistical learning, people, geometric properties
15Raffaele di Giovanni, Pier Luigi Iachini HOOD and Z for the Development of Complex Software Systems. Search on Bibsonomy VDM Europe The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
15Paul A. Karger The Lattice Security Model In A Public Computing Network. Search on Bibsonomy ACM Annual Conference (1) The full citation details ... 1978 DBLP  DOI  BibTeX  RDF Data processing security, Lattice security model, Non-discretionary security, Computer security, Computer network security
Displaying result #301 - #383 of 383 (100 per page; Change: )
Pages: [<<][1][2][3][4]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license