The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "PST"( http://dblp.L3S.de/Venues/PST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/pst

Publication years (Num. hits)
2004 (27) 2005 (32) 2006 (80) 2008 (26) 2010 (32) 2011 (39) 2012 (44) 2013 (52) 2014 (56) 2015 (28) 2016 (106) 2017 (47) 2018 (54) 2019 (51) 2021 (61) 2022 (32) 2023 (56)
Publication types (Num. hits)
inproceedings(806) proceedings(17)
Venues (Conferences, Journals, ...)
PST(823)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 156 occurrences of 123 keywords

Results
Found 823 publication records. Showing 823 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Daniel Augot, Hervé Chabanne, Olivier Clémot, William George Transforming Face-to-Face Identity Proofing into Anonymous Digital Identity Using the Bitcoin Blockchain. Search on Bibsonomy PST The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Janice Canedo, Anthony Skjellum Using machine learning to secure IoT systems. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kheng Kok Mar, ZhengQing Hu, Chee Yong Law, Meifen Wang Securing cloud data using information dispersal. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael T. Krieger, Josef Küng I've been - Web analytics from a user's point of view. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rakan Alkhulaiwi, Abdulhakim Sabur, Khalid Aldughayem, Osama Almanna Survey of secure anonymous peer to peer Instant Messaging protocols. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Takeshi Takahashi 0001, Daisuke Inoue Generating software identifier dictionaries from Vulnerability Database. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Pei-Shan Chang, Hoon Sin Cheong, Hon Loon Wong, Seyedvahid Dianat, Cheong Seak Sea Secure intra-device communication protocol between applications on a smart device. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Michael Mireku Kwakye, Ken Barker 0001 Privacy-preservation in the integration and querying of multidimensional data models. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Takeharu Shirai, Masahiro Fujita, Daisuke Arai, Tomohiko Ogishi, Masakatsu Nishigaki Study on relationship between user awareness and QoE in communication delay on smartphones. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fatema Rashid, Ali Miri Secure image data deduplication through compressive sensing. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Naonori Kato, Yosuke Murakami, Toshiki Endo, Kazunari Nawa Study on privacy setting acceptance of the drivers for the data utilization on the car. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anirban Basu 0001, Rui Xu 0006, Mohammad Shahriar Rahman, Shinsaku Kiyomoto User-in-a-context: A blueprint for context-aware identification. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ariana Mirian, Zane Ma, David Adrian, Matthew Tischer, Thasphon Chuenchujit, Tim Yardley, Robin Berthier, Joshua Mason, Zakir Durumeric, J. Alex Halderman, Michael D. Bailey An Internet-wide view of ICS devices. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Federico Griscioli, Maurizio Pizzonia, Marco Sacchetti USBCheckIn: Preventing BadUSB attacks by forcing human-device interaction. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthew Bernhard, Gabe Stocco, J. Alex Halderman Implementing Attestable kiosks. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nada Essaouini, Said Oulmakhzoune, Nora Cuppens-Boulahia, Frédéric Cuppens Toward an off-line analysis of obligation with deadline policies. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthew Comb, Paul A. Watters Peeking behind the great firewall: Privacy on Chinese file sharing networks. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rong Zhu, Yun Mao, Ying Guo A vessel segmentation method for low contrast CT angiography image. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1John Bjornson, Aaron Hunter 0001 Mobile forensics for cloud data: Practical and legal considerations. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md. Sadek Ferdous, Ron Poet Formalising Identity Management protocols. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ahlem Kalaï, Wafa Abdelghani, Corinne Amel Zayani, Ikram Amous LoTrust: A social Trust Level model based on time-aware social interactions and interests similarity. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Shagufta Mehnaz, Elisa Bertino Building robust temporal user profiles for anomaly detection in file system accesses. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bahman A. Sassani, Charly Abarro, Ivan Pitton, Craig Young, Farhad Mehdipour Analysis of NTP DRDoS attacks' performance effects and mitigation techniques. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthieu Faou, Antoine Lemay, David Décary-Hétu, Joan Calvet, Francois Labreche, Militza Jean, Benoit Dupont, José M. Fernandez 0001 Follow the traffic: Stopping click fraud by disrupting the value chain. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sarah Asiri, Ali Miri An IoT trust and reputation model based on recommender systems. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Stefan Wüller, Wadim Pessin, Ulrike Meyer, Susanne Wetzel Privacy-preserving two-party bartering secure against active adversaries. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hugo Gonzalez, Natalia Stakhanova, Ali A. Ghorbani 0001 Measuring code reuse in Android apps. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Moesfa Soeheila Mohamad, Ji-Jian Chin, Geong Sen Poh On the security advantages of block-based multiserver searchable symmetric encryption. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yu-Ju Lee, Eric Wustrow OverTorrent: Anticensorship without centralized servers. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1David Lacey, Jim Zaiss, K. Suzanne Barber Understanding victim-enabled identity theft. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sebastian Friebe, Martin Florian, Ingmar Baumgart Decentralized and sybil-resistant pseudonym registration using social graphs. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Zhenhua Tan, Yicong Niu, Yuan Liu 0002, Guangming Yang A novel trust model based on SLA and behavior evaluation for clouds. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Su Mon Kywe, Yingjiu Li, Kunal Petal, Michael Grace Attacking Android smartphone systems without permissions. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chin-Shyurng Fahn, Chu-Ping Lee, Heng-I Chen A text independent handwriting forgery detection system based on branchlet features and Gaussian mixture models. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yuta Kurihara, Masakazu Soshi A novel hash chain construction for simple and efficient authentication. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hossein Hadian Jazi, Ali A. Ghorbani 0001 Dynamic graph-based malware classifier. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Andrii Shalaginov, Katrin Franke Automated intelligent multinomial classification of malware species using dynamic behavioural analysis. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Matan Monitz, Yuval Elovici USBee: Air-gap covert-channel via electromagnetic emission from USB. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Jacqueline Brendel, Denise Demirel Efficient proactive secret sharing. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Toshiki Endo, Kazunari Nawa, Naonori Kato, Yosuke Murakami Study on privacy setting acceptance of drivers for data utilization on connected cars. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Nico Schlitter, Markus Ullrich, Jörg Lässig Scalability and performance of the Privacy-Aware Classification method GenPAC. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mike Moody, Aaron Hunter 0001 Exploiting known vulnerabilities of a smart thermostat. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Francesco Mercaldo, Andrea Saracino, Corrado Aaron Visaggio I find your behavior disturbing: Static and dynamic app behavioral analysis for detection of Android malware. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mehmood Baryalai, Julian Jang-Jaccard, Dongxi Liu Towards privacy-preserving classification in neural networks. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maheswara Rao Valluri Digital signature scheme based on truncated polynomial over finite fields. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kyusuk Han, Kang G. Shin Prevention of information mis-translation by a malicious gateway in connected vehicles. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Huan Feng, Kang G. Shin Masquerade of mobile applications: Introducing unlinkability in a practical way. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dianxiang Xu, Shuai Peng Towards automatic repair of access control policies. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dominik Herrmann, Matthias Kirchler, Jens Lindemann 0001, Marius Kloft Behavior-based tracking of Internet users with semi-supervised learning. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Galoh Rashidah Haron, Dharmadharshni Maniam, Latifah Mat Nen, Nor Izyani Daud User behaviour and interactions for multimodal authentication. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Limei Guo, Yun Mao, Ying Guo Non-invertible fingerprint template protection with polar transformations. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Maryam Davari, Mohammad Zulkernine Analysing vulnerability reproducibility for Firefox browser. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sreenivas Sremath Tirumala, Abdolhossein Sarrafzadeh, Paul Pang A survey on internet usage and cybersecurity awareness in students. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rishabh Kaushal, Srishty Saha, Payal Bajaj, Ponnurangam Kumaraguru KidsTube: Detection, characterization and analysis of child unsafe content & promoters on YouTube. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carlos Garcia Cordero, Sascha Hauke, Max Mühlhäuser, Mathias Fischer 0001 Analyzing flow-based anomaly intrusion detection using Replicator Neural Networks. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Iznan Husainy Hasbullah, Mohammad M. Kadhum, Yung-Wey Chong, Kamal Alieyan, Azlan Osman, Supriyanto Timestamp utilization in Trust-ND mechanism for securing Neighbor Discovery Protocol. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sujit Kumar Basak, Desmond Wesley Govender, Irene Govender Examining the impact of privacy, Security, and trust on the TAM and TTF models for e-commerce consumers: A pilot study. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Md Siam Hasan, Ali ElShakankiry, Thomas R. Dean, Mohammad Zulkernine Intrusion detection in a private network by satisfying constraints. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammad Khaliqur Rahman, Muhammad Abdullah Adnan Dynamic Weight on Static Trust for trustworthy social media networks. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Sazzad Hossain, Alwyn Goh, Hoon Sin Cheong, Kay Win Lee Generation of one-time keys for single line authentication. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Etienne Cartolano, Antonio Mauro Saraiva, Robert D. Stevenson PlayGround 2.0: Simulating behavior decisions with trust and control computations. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alwyn Goh, Hoon Sin Cheong, Geong Sen Poh, Seyedvahid Dianat Remote website authentication using dynamic multi-scale code visualization. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Anindya Shankar Bhandari, Dipanwita Roy Chowdhury SCARAB: A continuous authentication scheme for biomedical application. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Safaà Hachana, Frédéric Cuppens, Nora Cuppens-Boulahia Towards a new generation of industrial firewalls: Operational-process aware filtering. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Oluwakemi Hambolu, Lu Yu 0001, Jon Oakley, Richard R. Brooks, Ujan Mukhopadhyay, Anthony Skjellum Provenance threat modeling. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ilya Kabanov Effective frameworks for delivering compliance with personal data privacy regulatory requirements. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Min Wang 0009, Hussein A. Abbass, Jiankun Hu Continuous authentication using EEG and face images for trusted autonomous systems. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Tobias Wüchner, Martín Ochoa, Enrico Lovat, Alexander Pretschner Generating behavior-based malware detection models with genetic programming. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Noria Foukia, David Billard, Eduardo Solana PISCES: A framework for privacy by design in IoT. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Munalih Ahmad Syarif, Latifah Mat Nen, Alwyn Goh, Kay Win Lee, Kang Siong Ng, Leslie Ching Ow Tiong Challenge response interaction for biometric liveness establishment and template protection. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Max Smith-Creasey, Muttukrishnan Rajarajan A continuous user authentication scheme for mobile devices. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mohammed Anbar, Rosni Abdullah, Iznan Husainy Hasbullah, Yung-Wey Chong, Omar E. Elejla Comparative performance analysis of classification algorithms for intrusion detection system. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Federico Griscioli, Maurizio Pizzonia Securing promiscuous use of untrusted USB thumb drives in Industrial Control Systems. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Bede Ravindra Amarasekara, Anuradha Mathrani Controlling risks and fraud in affiliate marketing: A simulation and testing environment. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mehrdad Nojoumian Unconditionally secure proactive verifiable secret sharing using new detection and recovery techniques. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu 0001, Richard R. Brooks A brief survey of Cryptocurrency systems. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Thiago S. Rocha, Eduardo Souto, Brandell Cassio, Diego Azulay, Alex Monteiro, Felipe Boeira, Pedro Minatel, Breno Silva Data leakage detection in Tizen Web applications. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hanif-Mohaddes Deylami, Ravie Chandren Muniyandi, Iman Tabatabaei Ardekani, Abdolhossein Sarrafzadeh Taxonomy of malware detection techniques: A systematic literature review. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abhinav, Mohit Mishra, Benoit Baudry libmask: Protecting browser JIT engines from the devil in the constants. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ping Ren, Wu Liu, Donghong Sun, Jian-Ping Wu, Ke Liu Analysis and forensics for Behavior Characteristics of Malware in Internet. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clemens Zeidler, Muhammad Rizwan Asghar CloudEFS: Efficient and secure file system for cloud storage. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mario Luca Bernardi, Marta Cimitile, Damiano Distante, Francesco Mercaldo A constraint-driven approach for dynamic malware detection. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Abdulaziz Almehmadi, Khalil El-Khatib Intention-based Trust Re-evaluation. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chin-Ling Chen, Yong-Yuan Deng, Yun-Ciao Wang Cryptanalysis of Lee and Lin's innovative electronic group-buying system. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hsiao-Ying Huang, Masooda N. Bashir Users' perspective on designing inclusive privacy-enhancing indicators. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Matthias Geihs, Denise Demirel, Johannes Buchmann 0001 A security analysis of techniques for long-term integrity protection. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Giulia Traverso, Denise Demirel, Sheikh Mahbub Habib, Johannes Buchmann 0001 AS3: Adaptive social secret sharing for distributed storage systems. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yasushi Shinjo, Naoki Kainuma, Daiyuu Nobori, Akira Sato Magic mantle using social VPNs against centralized social networking services. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Kouya Tochikubo Improvement of information rates for specified participants in general secret sharing schemes. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Robert Koch 0002, Teo Kuhn, Marcel Odenwald, Gabi Dreo Rodosek Dr. WATTson: Lightweight current-based Intrusion Detection (CBID). Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hoang Giang Do, Wee Keong Ng Multidimensional range query on outsourced database with strong privacy guarantee. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Solenn Brunet, Sébastien Canard, Sébastien Gambs, Baptiste Olivier Edge-calibrated noise for differentially private mechanisms on graphs. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wencheng Yang, Jiankun Hu, Clinton Fernandes, Vijay Sivaraman, Qianhong Wu Vulnerability analysis of iPhone 6. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hamid Ebadi, Thibaud Antignac, David Sands 0001 Sampling and partitioning for differential privacy. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aaron Hunter 0001 A logical approach to promoting trust over knowledge to trust over action. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clemens Martin, Rania Nasr, Mark Hoersken, Tobias Fuechtler Automating Information Security assessments using intelligent software agents. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mahendra Pratap Singh AHCSABAC: Attribute value hierarchies and constraints specification in attribute-based access control. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Clark D. Thomborson Privacy patterns. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Mordechai Guri, Ofer Hasson, Gabi Kedma, Yuval Elovici An optical covert-channel to leak data through an air-gap. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ayane Sano, Masahiro Fujita, Masakatsu Nishigaki Directcha: A proposal of spatiometric mental rotation CAPTCHA. Search on Bibsonomy PST The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 823 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license