The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Oliver Pfaff, Sebastian Ries Avoiding security integration pitfalls in the cloud. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omer Nawaz, Tahir Nawaz Minhas, Markus Fiedler Optimal MTU for realtime video broadcast with packet loss - A QoE perspective. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ricardo Villalón-Fonseca, Braulio J. Solano-Rojas, Gabriela Marín Raventós An applied methodology for information security and assurance: A study case for cloud computing. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Potchara Pruksasri, Jan van den Berg, Wout Hofman, Yao-Hua Tan Data concealing of supply chain transactions using the Distributed Trust Backbone. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vincent Chan, Tony Hao Wu, Grantham Pang Decision support and data mining for direct consumer-to-consumer trading. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Sabah Al-Fedaghi, Heba Al Meshari Characterizing social networks based on interior processes of nodes. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Norah S. Farooqi, Siobhán North Time cost evaluation of trust based access control for XML databases. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Boniface Kayode Alese, O. Oyebade, A. Osuolale Festus, Otasowie Iyare, Aderonke Favour-Bethy Thompson Evaluation of information security risks using hybrid assessment model. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pedro Roger Magalhães Vasconcelos, Gisele Azevedo de Araújo Freitas Performance analysis of Hadoop MapReduce on an OpenNebula cloud with KVM and OpenVZ virtualizations. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Patrick Dressler, Daniel Fischer 0003, Bernd Markscheffel Software solutions for high-security voice and data communication for smartphones. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad Kamel Alomari Towards E-democracy in the middle east: E-voting adoption. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pino Caballero-Gil, Francisco Martín-Fernández, Cándido Caballero-Gil Using query frequencies in tree-based revocation for certificateless authentication in VANETs. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mario Diego Munoz-Hernandez, Jose Juan Garcia-Hernandez, Miguel Morales-Sandoval Study on the robustness to retyping attacks of fingerprinted digital documents in the frequential domain. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elarbi Badidi A context broker federation for QoC-driven selection of cloud-based context services. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christopher Morrell, J. Scot Ransbottom, Randy C. Marchany, Joseph G. Tront Scaling IPv6 address bindings in support of a moving target defense. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shruti Kohli, Ankit Gupta 0004 Modeling anonymous human behavior using social media. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Otasowie Iyare, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese A replication model for students' result processing. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fahad Polash, Abdullah Abuhussein, Sajjan G. Shiva A survey of cloud computing taxonomies: Rationale and overview. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Christian M. Lesjak, Thomas Ruprechter, Holger Bock, Josef Haid, Eugen Brenner ESTADO - Enabling smart services for industrial equipment through a secured, transparent and ad-hoc data transmission online. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nawaf Sulaiman Alharbi, Maria Papadaki, Paul Dowland 0001 Security challenges of E-government adoption based on end users' perspective. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Boniface Kayode Alese, R. A. Akingbola, Folasade Mojisola Dahunsi, Olumide S. Adewale, T. J. Ogundele Improving deception in honeynet: Through data manipulation. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Francisco J. Aparicio-Navarro, Konstantinos G. Kyriakopoulos, David J. Parish Empirical study of automatic dataset labelling. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Brika Ammar, Fahima Nader Creation of educative content on the web. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gilmini Dantanarayana, Prasad M. Jayaweera Value oriented service designing for successful e-Health. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1L. A. Nwosu, Aderonke Favour-Bethy Thompson, Boniface Kayode Alese, Olumide Olayinka Obe An Attribute-Based Signature using rivest shamir adleman scheme. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Suresh Kumar Aditya, Kavya Premkumar, R. Anitha 0001, Saswati Mukherjee Combined security framework for multi-cloud environment. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Victor Clincy Detection of repackaged Android Malware. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Keisuke Kato, Vitaly Klyuev Large-scale network packet analysis for intelligent DDoS attack detection development. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Karol Desnos, Safwan El Assad, Aurore Arlicot, Maxime Pelcat, Daniel Ménard Efficient multicore implementation of an advanced generator of discrete chaotic sequences. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Daniel Caragata, Safwan El Assad, Kassem Ahmad Survey of network access security in UMTS/LTE networks. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Johann Betz, Dirk Westhoff C3-Sched - A cache covert channel robust cloud computing scheduler. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Matej Kacic, Daniel Ovsonka, Petr Hanácek, Maros Barabas Traffic generator based on behavioral pattern. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Olusegun Ademolu Ajigini, John A. van der Poll, Jan H. Kroeze Towards a model on security challenges during closed source software to OSS migrations. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff CBAC4C: Conflict Based Allocation Control for Cloud. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Igor Mishsky, Nurit Gal-Oz, Ehud Gudes Computing domains reputation using flow. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dirk Burkhardt, Kawa Nazemi, Wilhelm Retz, Jörn Kohlhammer Visual explanation of government-data for policy making through open-data inclusion. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eric Amankwa, Marianne Loock, Elmarie Kritzinger A conceptual analysis of information security education, information security training and information security awareness definitions. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abikoye Oluwakemi Christianah, Boniface Kayode Alese, Aderonke Favour-Bethy Thompson, D. Alowolodu Olufunso, A. Osuolale Festus A robust multicast authentication scheme based on asymmetric key signature. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Pushpinder-Kaur Chouhan, Sakir Sezer, Yangseo Choi, Ikkyun Kim, Chunghwan Jung Secure virtualised environment. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rafal Leszczyna, Michal R. Wróbel Security information sharing for smart grids: Developing the right data model. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mee Hong Ling, Kok-Lim Alvin Yau Reinforcement learning-based trust and reputation model for cluster head selection in cognitive radio networks. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1 9th International Conference for Internet Technology and Secured Transactions, ICITST 2014, London, United Kingdom, December 8-10, 2014 Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  BibTeX  RDF
1Loubna El Faquih, Hanae Sbaï, Mounia Fredj Semantic variability modeling in business processes: A comparative study. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Udsanee Pakdeetrakulwong, Pornpit Wongthongtham, Waralak V. Siricharoen Recommendation systems for software engineering: A survey from software development life cycle phase perspective. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wided Boubakri, Walid Abdallah, Noureddine Boudriga A chaos-based authentication and key management scheme for M2M communication. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Simona Petrakieva, Oleg Garasym, Ina Taralova G-interval method for secure chaotic synchronization and information transmission. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abdulrazaq Almutairi, David J. Parish Using classification techniques for creation of predictive intrusion detection model. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Surabhi Mour, Priyansh Srivastava, Payal Patel, Hari Ram, Bhavesh N. Gohil, Dhiren R. Patel Load management model for cloud computing. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Abrar Ullah, Hannan Xiao, Trevor Barker, Mariana Lilley Graphical and text based challenge questions for secure and usable authentication in online examinations. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Ali Yousuf, Fatimah Y. Akeel, Nawfal F. Fadhel, Gary B. Wills Resolving coreference and security issues of linked data by focusing on OWL: Same As: A method for similarity matching score on linked data. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Rahul Kumar, Indraveni K, Aakash Kumar Goel Automation of detection of security vulnerabilities in web services using dynamic analysis. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tiwalade Adelola, Ray Dawson, Firat Batmaz Privacy and data protection in E-commerce: The effectiveness of a government regulation approach in developing nations, using Nigeria as a case. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem Advanced encryption standard development based quantum key distribution. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ivan Homoliak, Daniel Ovsonka, Matej Grégr, Petr Hanácek NBA of obfuscated network vulnerabilities' exploitation hidden into HTTPS traffic. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1André A. Osti, Bruno Alves Pereira Botelho, Nelson Uto Implementation aspects of software guards: A case study. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Manuel Rudolph, Reinhard Schwarz, Christian Jung 0001 Security policy specification templates for critical infrastructure services in the cloud. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Dimitrios Kasiaras, Thomas Zafeiropoulos, Nathan L. Clarke, Georgios Kambourakis Android forensics: Correlation analysis. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Antonia Rana, Andrea Ciardulli Enabling consumers to self-verify authenticity of products. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saurabh Kulkarni, Shayan Saha, Ryler Hockenbury Preserving privacy in sensor-fog networks. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fahad M. Alotaibi Architectural framework proposed of behavioural classroom simulation based second life environment. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Edina Hatunic-Webster, Fredrick Mtenzi, Brendan O'Shea Model for analysing Anti-Phishing Authentication Ceremonies. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Souad Sadki, Hanan El Bakkali PPAMH: A novel privacy-preserving approach for mobile healthcare. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nikolai Joukov, Vladislav Shorokhov, Dmytro Tantsuyev Security audit of data flows across enterprise systems and networks. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seokhwan Yang, Jaechun Kim, Mokdong Chung A prediction model based on Big Data analysis using hybrid FCM clustering. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Saleh Albahli, Austin Melton ohStore: Ontology hierarchy solution to improve RDF data management. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Regio A. Michelin, Avelino F. Zorzo, César A. F. De Rose Mitigating DoS to authenticated cloud REST APIs. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell Exposing data leakage in Data Integration Systems. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1F. Y. Osisanwo, Adebayo O. Adetunmbi, Boniface Kayode Alese Barefoot morphology: A person unique feature for forensic identification. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Fatiha Djebbar, Beghdad Ayad Image hiding in speech spectrum. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted, RoxAnn H. Stalvey Highly available, consistent, business rule filters. Search on Bibsonomy ICITST The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1L. J. Ontanon-Garcia, M. Garcia-Martinez, Eric Campos-Cantón, Sergej Celikovský Grayscale image encryption using a hyperchaotic unstable dissipative system. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nadianatra Musa, Bob Clift A model of component interaction between Formal, Technical and Informal components within IS/IT security governance. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Omer K. Jasim Mohammad, Safia Abbas, El-Sayed M. El-Horbaty, Abdel-Badeeh M. Salem A comparative study between modern encryption algorithms based on cloud computing environment. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeffrey J. Wiley ICITST-2013: Keynote speaker 1: Principles of information security risk management. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Timo Schless, Harald P. E. Vranken Counter botnet activities in the Netherlands a study on organisation and effectiveness. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mario Sicuranza, Angelo Esposito An access control model for easy management of patient privacy in EHR systems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shiu Hong Choi, Bo Yang 0027, H. H. Cheung, Y. X. Yang Data management of RFID-based track-and-trace anti-counterfeiting in apparel supply chain. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kiswendsida K. Kabore, Oumarou Sie, Florence Sèdes, André Péninou Information Access Assistant Service (IAAS). Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Akintoba Emmanuel Akinwonmi, Boniface Kayode Alese A prosodic Text-to-Speech system for Yorùbá language. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Love Adedayo, Sergey Butakov, Ron Ruhl, Dale Lindskog E-Government web services and security of Personally Identifiable Information in developing nations a case of some Nigerian embassies. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nicholas Dzugan, Lance Fannin, S. Kami Makki A recommendation scheme utilizing Collaborative Filtering. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Markus Florian, Sarita Paudel, Markus Tauber Trustworthy evidence gathering mechanism for multilayer cloud compliance. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Saadia Kedjar, Abdelkamel Tari The hybrid model for web services security access control and information flow control. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nwankwo Nonso Prince Design and implementation of microcontroller based short message service control system. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Clara Bertolissi, Silvio Ranise A methodology to build run-time monitors for security-aware workflows. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Maher Salem, Ulrich Buehler Reinforcing network security by converting massive data flow to continuous connections for IDS. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Liangxiu Han, Zheng Xie, Richard A. Baldock Automatic data reuse for accelerating data intensive applications in the Cloud. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dalia Battikh, Safwan El Assad, Bassem Bakhache, Olivier Déforges, Mohamad Khalil Enhancement of two spatial steganography algorithms by using a chaotic system: Comparative analysis. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Brika Ammar, Fahima Nader Pedagogical hypermédias systems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Supakorn Prungsinchai, Fouad Khelifi, Ahmed Bouridane DCT sign-based robust image hashing. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yuri Nakagawa, Yuuki Matsuda, Tetsuro Ogi Framework for handling personal data proposed system of the self-control on buying information. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sara Jeza Alotaibi, Mike Wald Evaluation of the UTAUT model for acceptable user experiences in Identity Access Management Systems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Boniface Kayode Alese, Iwasokun Gabriel Babatunde, Haruna Danjuma Israel DGM approach to network attacker and defender strategies. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Adel Boukhadra, Karima Benatchba, Amar Balla DA5DCSWS: A Distributed Architecture for semantic Web services Discovery and Composition. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abdullah Algarni, Yue Xu 0001, Taizan Chan, Yu-Chu Tian Social engineering in social networking sites: Affect-based model. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Yoon Seok Chang RISC'13 Workshop: Keynote speaker 5. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1S. Ananda Kanagaraj, G. Arjun, T. Sree Sharmila Pseudo Eye: The next-generation shopping application using Augmented Reality. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wafa Slaibi Al-Shorafat Security in software engineering requirement. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Áine MacDermott, Qi Shi 0001, Madjid Merabti, Kashif Kifayat Considering an elastic scaling model for cloud Security. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Alex Akinbi, Ella Pereira, Chris Beaumont Evaluating security mechanisms implemented on public Platform-as-a-Service cloud environments case study: Windows Azure. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license