The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "CODASPY"( http://dblp.L3S.de/Venues/CODASPY )

URL (DBLP): http://dblp.uni-trier.de/db/conf/codaspy

Publication years (Num. hits)
2011 (29) 2012 (32) 2013 (43) 2014 (44) 2015 (43) 2016 (41) 2017 (43) 2018 (48) 2019 (36) 2020 (45) 2021 (41) 2022 (48) 2023 (33)
Publication types (Num. hits)
inproceedings(513) proceedings(13)
Venues (Conferences, Journals, ...)
CODASPY(526)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 526 publication records. Showing 526 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Tsung-Hsuan Ho, Daniel Joseph Dean, Xiaohui Gu, William Enck PREC: practical root exploit containment for android devices. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wu Zhou 0001, Zhi Wang 0004, Yajin Zhou, Xuxian Jiang DIVILAR: diversifying intermediate language for anti-repackaging on android platform. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Davide Alberto Albertini, Barbara Carminati Relationship-based information sharing in cloud-based decentralized social networks. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gabriel Ghinita, Razvan Rughinis An efficient privacy-preserving system for monitoring mobile users: making searchable encryption practical. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Ragib Hasan, Rasib Khan Interaction provenance model for unified authentication factors in service oriented computing. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Ravi S. Sandhu, Jaehong Park (eds.) Fourth ACM Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, USA - March 03 - 05, 2014 Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  BibTeX  RDF
1Ebrahim Tarameshloo, Philip W. L. Fong, Payman Mohassel On protection in federated social computing systems. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seung-Hyun Seo, Jongho Won, Elisa Bertino POSTER: a pairing-free certificateless hybrid sign-cryption scheme for advanced metering infrastructures. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mihai Maruseac, Gabriel Ghinita, Razvan Rughinis Privacy-preserving publication of provenance workflows. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Holger Kühner, Hannes Hartenstein Spoilt for choice: graph-based assessment of key management protocols to share encrypted data. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Chee Meng Tey, Payas Gupta, Kartik Muralidharan, Debin Gao Keystroke biometrics: the user perspective. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Mohammad Saiful Islam, Mehmet Kuzu, Murat Kantarcioglu Inference attack against encrypted range queries on outsourced databases. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Kevin Allix, Tegawendé F. Bissyandé, Quentin Jérome, Jacques Klein, Radu State, Yves Le Traon Large-scale machine learning-based malware detection: confronting the "10-fold cross validation" scheme with reality. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Haruna Kibirige, Lila Ghemri Trust ranking of medical websites. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paul Giura, Ilona Murynets, Roger Piqueras Jover, Yevgeniy Vahlis Is it really you?: user identification via adaptive behavior fingerprinting. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Tien Tuan Anh Dinh, Anwitaman Datta Streamforce: outsourcing access control enforcement for stream data to the clouds. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Bastian Braun, Martin Johns, Johannes Köstler, Joachim Posegga PhishSafe: leveraging modern JavaScript API's for transparent and robust protection. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Koki Murakami, Tsuyoshi Yamada, Rie Shigetomi Yamaguchi, Masahiro Goshima, Shuichi Sakai A cloud architecture for protecting guest's information from malicious operators with memory management. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura DroidBarrier: know what is executing on your android. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Yifei Wang, Srinivas Hariharan, Chenxi Zhao, Jiaming Liu, Wenliang Du Compac: enforce component-level access control in android. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jarret Raim Shared responsibility is better than no responsibility: federated encryption in the cloud. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Muhammad Umer Arshad, Ashish Kundu, Elisa Bertino, Krishna Madhavan, Arif Ghafoor Security of graph data: hashing schemes and definitions. Search on Bibsonomy CODASPY The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Filipe Beato, Iulia Ion, Srdjan Capkun, Bart Preneel, Marc Langheinrich For some eyes only: protecting online information sharing. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Malgorzata Urbanska, Mark Roberts, Indrajit Ray, Adele E. Howe, Zinta S. Byrne Accepting the inevitable: factoring the user into home computer security. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rui Zhao 0005, Chuan Yue All your browser-saved passwords could belong to us: a security analysis and a cloud-based new design. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mahdi N. Al-Ameen, Matthew K. Wright Persea: a sybil-resistant social DHT. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vaibhav Rastogi, Yan Chen 0004, William Enck AppsPlayground: automatic security analysis of smartphone applications. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ashwini Rao, Birendra Jha, Gananand Kini Effect of grammar on security of long passwords. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Salmin Sultana, Elisa Bertino A file provenance system. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wu Zhou 0001, Yajin Zhou, Michael C. Grace, Xuxian Jiang, Shihong Zou Fast, scalable detection of "Piggybacked" mobile applications. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Timothy Vidas, Nicolas Christin Sweetening android lemon markets: measuring and combating malware in application marketplaces. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sumeet Gujrati, Eugene Y. Vasserman The usability of truecrypt, or how i learned to stop whining and fix an interface. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lianshan Sun, Jaehong Park, Ravi S. Sandhu Engineering access control policies for provenance-aware systems. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Majid Arianezhad, L. Jean Camp, Timothy Kelley, Douglas Stebila Comparative eye tracking of experts and novices in web single sign-on. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel Le Métayer Privacy by design: a formal framework for the analysis of architectural choices. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rimma V. Nehme, Hyo-Sang Lim, Elisa Bertino FENCE: continuous access control enforcement in dynamic data stream environments. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xihui Chen, Jun Pang 0001 Exploring dependency for query privacy protection in location-based services. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mark A. Gondree, Zachary N. J. Peterson Geolocation of data in the cloud. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tongbo Luo, Xing Jin, Wenliang Du Mediums: visual integrity preserving framework. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1S. M. Taiabul Haque, Matthew K. Wright, Shannon Scielzo A study of user password strategy for multiple accounts. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Adam Bates 0001, Benjamin Mood, Masoud Valafar, Kevin R. B. Butler Towards secure provenance-based access control in cloud environments. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Anna Cinzia Squicciarini, Giuseppe Petracca, Elisa Bertino Adaptive data protection in distributed systems. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Devdatta Kulkarni A fine-grained access control model for key-value systems. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Xu, Fangfang Zhang 0005, Sencun Zhu JStill: mostly static detection of obfuscated malicious JavaScript code. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hans Lo, Gabriel Ghinita Authenticating spatial skyline queries with low communication overhead. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sanae Rosen, Zhiyun Qian, Zhuoqing Morley Mao AppProfiler: a flexible method of exposing privacy-related behavior in android applications to end users. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Li Xu, Zhenxin Zhan, Shouhuai Xu, Keying Ye Cross-layer detection of malicious websites. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Ravi S. Sandhu, Lujo Bauer, Jaehong Park (eds.) Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013 Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  BibTeX  RDF
1Florian Kerschbaum Expression rewriting for optimizing secure computation. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ronnie L. Killough I see we still like C. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao 0001 Insured access: an approach to ad-hoc information sharing for virtual organizations. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bo Chen, Reza Curtmola Towards self-repairing replication-based storage systems using untrusted clouds. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Florian Kelbert, Alexander Pretschner Data usage control enforcement in distributed systems. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Graciela Perera, Nathan Miller, John Mela, Michael P. McGarry, Jaime C. Acosta Emulating internet topology snapshots in deterlab. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xiao Liang Hu, Sylvia L. Osborn A new approach for delegation in usage control. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Christoph Busold, Ahmed Taha 0002, Christian Wachsmann, Alexandra Dmitrienko, Hervé Seudie, Majid Sobhani, Ahmad-Reza Sadeghi Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bin Zan, Zhanbo Sun, Marco Gruteser, Xuegang Ban Linking anonymous location traces through driving characteristics. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sebastian Labitzke, Florian Werling, Jens Mittag, Hannes Hartenstein Do online social network friends still threaten my privacy? Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stephen R. Tate, Roopa Vishwanathan, Lance Everhart Multi-user dynamic proofs of data possession using trusted hardware. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Razvan Rughinis Enhancing performance of searchable encryption in cloud computing. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nazari Skrupsky, Prithvi Bisht, Timothy L. Hinrichs, V. N. Venkatakrishnan, Lenore D. Zuck TamperProof: a server-agnostic defense for parameter tampering attacks on web applications. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Seung-Hyun Seo, Mohamed Nabeel, Xiaoyu Ding, Elisa Bertino An efficient certificateless cryptography scheme without pairing. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Weiyi Xia, Raymond Heatherly, Xiaofeng Ding 0001, Jiuyong Li, Bradley A. Malin Efficient discovery of de-identification policy options through a risk-utility frontier. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zhongyuan Xu, Scott D. Stoller Mining parameterized role-based policies. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Wei Wei, Ting Yu 0001, Rui Xue 0001 iBigTable: practical data integrity for bigtable in public cloud. Search on Bibsonomy CODASPY The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Michael Mitzenmacher, Olga Ohrimenko, Roberto Tamassia Practical oblivious storage. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Murillo Pontual, Andreas Gampe, Omar Chowdhury, Bazoumana Kone, Md. Shamim Ashik, William H. Winsborough The privacy in the time of the internet: secrecy vs transparency. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Vincent Toubiana, Vincent Verdot, Benoit Christophe Cookie-based privacy issues on google services. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kalpana Gondi, Prithvi Bisht, Praveen Venkatachari, A. Prasad Sistla, V. N. Venkatakrishnan SWIPE: eager erasure of sensitive data in large scale systems software. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Suhendry Effendy, Roland H. C. Yap, Felix Halim Revisiting link privacy in social networks. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mina Askari, Reihaneh Safavi-Naini, Ken Barker 0001 An information theoretic privacy and utility measure for data sanitization mechanisms. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Qingji Zheng, Shouhuai Xu Secure and efficient proof of storage with deduplication. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xihui Chen, Jun Pang 0001 Measuring query privacy in location-based services. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ashish Kundu, Mikhail J. Atallah, Elisa Bertino Leakage-free redactable signatures. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fabio Martinelli, Charles Morisset Quantitative access control with partially-observable Markov decision processes. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xiaowei Li 0003, Wei Yan, Yuan Xue 0001 SENTINEL: securing database from logic flaws in web applications. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Glenn Bruns, Philip W. L. Fong, Ida Sri Rejeki Siahaan, Michael Huth 0001 Relationship-based access control: its expression and enforcement through hybrid logic. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Musheer Ahmed, Mustaque Ahamad Protecting health information on mobile devices. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Nino Vincenzo Verde, Jaideep Vaidya, Vijay Atluri, Alessandro Colantonio Role engineering: from theory to practice. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuxin Chen 0001, Bo Luo S2A: secure smart household appliances. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ian M. Molloy, Luke Dickens, Charles Morisset, Pau-Chen Cheng, Jorge Lobo 0001, Alessandra Russo Risk-based security decisions under uncertainty. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Martin Kost, Johann Christoph Freytag Privacy analysis using ontologies. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Prachi Kumari, Alexander Pretschner Deriving implementation-level policies for usage control enforcement. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Konstantine Arkoudas, Akshay Vashist A model-theoretic approach to data anonymity and inference control. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wu Zhou 0001, Yajin Zhou, Xuxian Jiang, Peng Ning Detecting repackaged smartphone applications in third-party android marketplaces. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin Wu 0001, Yonggang Wen 0001 Towards end-to-end secure content storage and delivery with public cloud. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Hussain M. J. Almohri, Danfeng (Daphne) Yao, Dennis G. Kafura Identifying native applications with high assurance. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wanying Zhao, Jianwei Niu 0001, William H. Winsborough Refinement-based design of a group-centric secure information sharing model. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Elisa Bertino, Ravi S. Sandhu (eds.) Second ACM Conference on Data and Application Security and Privacy, CODASPY 2012, San Antonio, TX, USA, February 7-9, 2012 Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  BibTeX  RDF
1Xi Gong, Ting Yu 0001, Adam J. Lee Bounding trust in reputation systems with incomplete information. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jie Shi, Darren Sim, Yingjiu Li, Robert Huijie Deng SecDS: a secure EPC discovery service system in EPCglobal network. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wen Ming Liu, Lingyu Wang 0001 Privacy streamliner: a two-stage approach to improving algorithm efficiency. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuhao Yang 0007, Jonathan Lutes, Fengjun Li, Bo Luo, Peng Liu 0005 Stalking online: on user privacy in social networks. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yan Zhu 0010, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hong-Jia Zhao Comparison-based encryption for fine-grained access control in clouds. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lujo Bauer, Yuan Liang, Michael K. Reiter, Chad Spensky Discovering access-control misconfigurations: new approaches and evaluation methodologies. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ninghui Li, Haining Chen, Elisa Bertino On practical specification and enforcement of obligations. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Alessandro Armando, Silvio Ranise, Fatih Turkmen, Bruno Crispo Efficient run-time solving of RBAC user authorization queries: pushing the envelope. Search on Bibsonomy CODASPY The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Prachi Kumari, Alexander Pretschner, Jonas Peschla, Jens-Michael Kuhn Distributed data usage control for web applications: a social network implementation. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael T. Goodrich, Florian Kerschbaum Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ravi S. Sandhu, Elisa Bertino (eds.) First ACM Conference on Data and Application Security and Privacy, CODASPY 2011, San Antonio, TX, USA, February 21-23, 2011, Proceedings Search on Bibsonomy CODASPY The full citation details ... 2011 DBLP  BibTeX  RDF
Displaying result #401 - #500 of 526 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license