The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for FORTH with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1980 (16) 1981-1984 (16) 1985-1987 (17) 1988 (40) 1989 (33) 1990 (21) 1991 (60) 1992 (18) 1993-1995 (21) 1996 (72) 1997 (21) 1998 (23) 1999 (32) 2000 (70) 2001 (35) 2002 (45) 2003 (53) 2004 (89) 2005 (102) 2006 (134) 2007 (106) 2008 (116) 2009 (206) 2010 (18) 2011 (106) 2012-2013 (19) 2014-2016 (17) 2017-2018 (16) 2019-2020 (16) 2021-2022 (20) 2023-2024 (5)
Publication types (Num. hits)
article(285) incollection(13) inproceedings(1241) phdthesis(10) proceedings(14)
Venues (Conferences, Journals, ...)
ARES(160) WSDM(92) ACM SIGPLAN Notices(59) FORTH(57) Advanced Network Enterprises(46) ACM Multimedia(40) ISPW(33) ASPLOS(30) MOBIWAC(30) TAMODIA(23) CODES(17) IRCDL(17) Microprocess. Microsystems(13) CoRR(11) HICSS(11) SAC(10) More (+10 of total 641)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1196 occurrences of 936 keywords

Results
Found 1573 publication records. Showing 1563 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Marco Descher, Philip Masser, Thomas Feilhauer, A Min Tjoa, David Huemer Retaining Data Control to the Client in Infrastructure Clouds. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jun Li 0008, Bryan Stephenson, Sharad Singhal A Policy Framework for Data Management in Services Marketplaces. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Nina Moebius, Kurt Stenzel, Holger Grandy, Wolfgang Reif SecureMDD: A Model-Driven Development Method for Secure Smart Card Applications. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Sarat C. Addepalli, Piyush Bansal, Kannan Srinathan, K. Madhava Krishna Secured Multi-robotic Active Localization without Exchange of Maps: A Case of Secure Cooperation Amongst Non-trusting Robots. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Bagher Rahimpour Cami, Mohammad Reza Matash Brujerdi Using Hybrid Trust Model for Handling Inaccurate Resource. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Christian A. Schneider, Frederic Stumpf, Claudia Eckert 0001 Enhancing Control of Service Compositions in Service-Oriented Architectures. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Alireza Namazi, Seyed Ghassem Miremadi, Alireza Ejlali A High Speed and Low Cost Error Correction Technique for the Carry Select Adder. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Vincent Alimi, Marc Pasquet Post-Distribution Provisioning and Personalization of a Payment Application on a UICC-Based Secure Element. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Kimmo Halunen, Pauli Rikula, Juha Röning Finding Preimages of Multiple Passwords Secured with VSH. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Yves Younan, Frank Piessens, Wouter Joosen Protecting Global and Static Variables from Buffer Overflow Attacks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Marcin Gorawski, Szymon Panfil A System of Privacy Preserving Distributed Spatial Data Warehouse Using Relation Decomposition. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Eduardo B. Fernández, Nobukazu Yoshioka, Hironori Washizaki Modeling Misuse Patterns. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Xiaowei Shi, Fenlin Liu, Daofu Gong, Jing Jing An Authentication Watermark Algorithm for JPEG images. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Xianglin Deng, Malcolm Shore Advanced Flooding Attack on a SIP Server. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Shanai Ardi, Nahid Shahmehri A Post-Mortem Incident Modeling Method. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20George Hsieh, Keith Foster, Gerald Emamali, Gregory Patrick, Lisa M. Marvel Using XACML for Embedded and Fine-Grained Access Control Policy. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Mohaned Kafi, Sylvain Guilley, Sandra Marcello, David Naccache Deconvolving Protected Signals. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Hiroshi Kudou, Shunn-ichiro Nakayama, Atsushi Watanabe, Tomoyuki Nagase, Yoshio Yoshioka A Reconfigurable-Permutation Algorithm for M_S-Box. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Marco Descher, Thomas Feilhauer, Thomas Ludescher, Philip Masser, B. Wenzel, Peter Brezany, Ibrahim Elsayed, Alexander Wöhrer, A Min Tjoa, David Huemer Position Paper: Secure Infrastructure for Scientific Data Life Cycle Management. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy Methodology to Align Business and IT Policies: Use Case from an IT Company. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Chunyan Mu, David Clark 0001 Quantitative Analysis of Secure Information Flow via Probabilistic Semantics. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Grant Osborne, Benjamin P. Turnbull Enhancing Computer Forensics Investigation through Visualisation and Data Exploitation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Mourad Elhadef A Perceptron Neural Network for Asymmetric Comparison-Based System-Level Fault Diagnosis. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Wolfgang Boehmer Cost-Benefit Trade-Off Analysis of an ISMS Based on ISO 27001. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ludwig Fuchs, Christian Broser, Günther Pernul Different Approaches to In-House Identity Management - Justification of an Assumption. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Pin Zhang, Xiangwei Kong Detecting Image Tampering Using Feature Fusion. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel Server-Side Prediction of Source IP Addresses Using Density Estimation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Frédéric Majorczyk, Jonathan-Christofer Demay Automated Instruction-Set Randomization for Web Applications in Diversified Redundant Systems. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jörn-Marc Schmidt, Stefan Tillich On the Security of Untrusted Memory. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Filippo Chiariglione, Giacomo Cosenza, Sergio Matone Managing Rights and Value of Digital Media. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20S. Hamid Amiri, Mansour Jamzad A Robust Image Watermarking Method in Wavelet Domain Using Genetic Algorithm. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Claude Carlet On the Higher Order Nonlinearities of Boolean Functions and S-boxes. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ao Ma, Yang Yin, Wenwu Na, Xiaoxuan Meng, Qingzhong Bu, Lu Xu 0001 Scrubbing in Storage Virtualization Platform for Long-Term Backup Application. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20George Spanoudakis, Stephane LoPresti Web Service Trust: Towards a Dynamic Assessment Framework. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Kim Wuyts, Riccardo Scandariato, Bart De Decker, Wouter Joosen Linking Privacy Solutions to Developer Goals. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20 Novel Algorithms for Subgroup Detection in Terrorist Networks Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jaafar Almasizadeh, Mohammad Abdollahi Azgomi Intrusion Process Modeling for Security Quantification. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Michael Menzel 0001, Ivonne Thomas, Christoph Meinel Security Requirements Specification in Service-Oriented Business Process Management. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Kotaro Yamamoto, Munetoshi Iwakiri A Standard MIDI File Steganography Based on Fluctuation of Duration. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Gerardo Canfora, Corrado Aaron Visaggio, Vito Paradiso A Test Framework for Assessing Effectiveness of the Data Privacy Policy's Implementation into Relational Databases. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Omar Khadeer Hussain, Tharam S. Dillon Ascertaining the Financial Loss from Non-dependable Events in Business Interactions by Using the Monte Carlo Method. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Amirhossein Taherinia, Mansour Jamzad A Robust Image Watermarking Using Two Level DCT and Wavelet Packets Denoising. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Kohei Tatara, Yoshiaki Hori, Kouichi Sakurai Polymorphic Worm Detection by Analyzing Maximum Length of Instruction Sequence in Network Packets. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ying-Wei Kuo, Shou-Hsuan Stephen Huang Detecting Stepping-Stone Connection Using Association Rule Mining. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Carlos Blanco 0001, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini Applying an MDA-Based Approach to Consider Security Rules in the Development of Secure DWs. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Mehran Ahsant, Jim Basney Workflows in Dynamic and Restricted Delegation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Siv Hilde Houmb, Virginia N. L. Franqueira Estimating ToE Risk Level Using CVSS. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jooyoung Lee, Sungkyung Un, Dowon Hong Improving Performance in Digital Forensics: A Case Using Pattern Matching Board. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Chun-I Fan, Ming-Te Chen, Lung-Hsien Chen Truly Anonymous Paper Submission and Review Scheme. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon The User-Centric Vision Matches Credentials Exchanges. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Xiao Xiao 0002, Tadashi Dohi On Equilibrium Distribution Properties in Software Reliability Modeling. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Collin Mulliner Vulnerability Analysis and Attacks on NFC-Enabled Mobile Phones. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Hiroaki Kikuchi, Hiroyasu Kizawa, Minako Tada Privacy-Preserving Collaborative Filtering Schemes. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Frank Innerhofer-Oberperfler, Ruth Breu An Empirically Derived Loss Taxonomy Based on Publicly Known Security Incidents. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20George O. M. Yee An Automatic Privacy Policy Agreement Checker for E-services. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Alexander Pretschner, Judith Rüesch, Christian Schaefer, Thomas Walter 0001 Formal Analyses of Usage Control Policies. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Juhani Anttila, Jorma Kajava Haste in Knowledge-Intensive Work: A Major Threat to Information Security Management in Business Environments. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Yi Wang, Ping Chen 0003, Yi Ge, Bing Mao, Li Xie 0001 Traffic Controller: A Practical Approach to Block Network Covert Timing Channel. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Carlos Blanco 0001, Ignacio García Rodríguez de Guzmán, Eduardo Fernández-Medina, Juan Trujillo 0001, Mario Piattini Including Security Rules Support in an MDA Approach for Secure DWs. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Per Håkon Meland, Shanai Ardi, Jostein Jensen, Erkuden Rios, Txus Sanchez, Nahid Shahmehri, Inger Anne Tøndel An Architectural Foundation for Security Model Sharing and Reuse. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Javier Jiménez, Vicenç Torra Utility and Risk of JPEG-Based Continuous Microdata Protection Methods. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Luanna Lopes Lobato, Eduardo B. Fernández, Sérgio Donizetti Zorzo Patterns to Support the Development of Privacy Policies. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20George Poulopoulos, Konstantinos Markantonakis, Keith Mayes A Secure and Efficient Mutual Authentication Protocol for Low-Cost RFID Systems. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ya-Fen Chang, Yen-Cheng Lai An LPN-Problem-Based Lightweight Authentication Protocol for Wireless Communications. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Noam Ben-Asher, Joachim Meyer 0002, Sebastian Möller 0001, Roman Englert An Experimental System for Studying the Tradeoff between Usability and Security. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Sopheak Cheang, Sinawong Sang State of Cybersecurity and the Roadmap to Secure Cyber Community in Cambodia. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Koen Buyens, Bart De Win, Wouter Joosen Identifying and Resolving Least Privilege Violations in Software Architectures. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens Deploying Security Policy in Intra and Inter Workflow Management Systems. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Thomas Butter, Markus Aleksy MixVM - An Approach to Service Isolation and Data Protection in Mobile Context-Sensitive Applications. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Virginia N. L. Franqueira, Pascal van Eck, Roel J. Wieringa, Raul H. C. Lopes A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Meiko Jensen, Jörg Schwenk The Accountability Problem of Flooding Attacks in Service-Oriented Architectures. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Song Fu, Cheng-Zhong Xu 0001 Proactive Resource Management for Failure Resilient High Performance Computing Clusters. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Kara L. Nance, Brian Hay, Matt Bishop Investigating the Implications of Virtual Machine Introspection for Digital Forensics. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Mehrtash Manoochehri, Alireza Ejlali, Seyed Ghassem Miremadi Fault Tolerant and Low Energy Write-Back Heterogeneous Set Associative Cache for DSM Technologies. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka Yet Another Sanitizable Signature from Bilinear Maps. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Jan Paul Kolter, Günther Pernul Generating User-Understandable Privacy Preferences. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Guenther Starnberger, Lorenz Froihofer, Karl M. Göschka QR-TAN: Secure Mobile Transaction Authentication. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Binbin Wang, Zhitang Li, Hao Tu, Jie Ma Measuring Peer-to-Peer Botnets Using Control Flow Stability. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Vik Tor Goh, Jacob Zimmermann, Mark Looi Towards Intrusion Detection for Encrypted Networks. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ping Chen 0003, Yi Wang, Zhi Xin, Bing Mao, Li Xie 0001 BRICK: A Binary Tool for Run-Time Detecting and Locating Integer-Based Vulnerability. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Masami Izumi, Kazuo Sakiyama, Kazuo Ohta A New Approach for Implementing the MPL Method toward Higher SPA Resistance. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Stefan Rass, Peter Schartner Security in Quantum Networks as an Optimization Problem. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Youcheng Chen, Mohammad Reza Selim, Yuichi Goto, Jingde Cheng An Improvement of REM: A Replication Oriented Event-Based Middleware. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ryuzou Nishi, Yoshiaki Hori, Kouichi Sakurai Secrecy Capacity of Wireless LAN. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Solange Ghernaouti-Helie An Inclusive Information Society Needs a Global Approach of Information Security. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson Package-Role Based Authorization Control Model for Wireless Network Services. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Sebastian Mödersheim Algebraic Properties in Alice and Bob Notation. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Ganugula Umadevi, Sarat C. Addepalli, Kannan Srinathan Generalized Robust Combiners for Oblivious Transfer. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Marko Hölbl, Tatjana Welzer An Improved Authentication Protocol Based on One-Way Hash Functions and Diffie-Hellman Key Exchange. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Daniel Mellado, Jesús Rodríguez, Eduardo Fernández-Medina, Mario Piattini Automated Support for Security Requirements Engineering in Software Product Line Domain Engineering. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Amine Boukhtouta, Dima Alhadidi, Mourad Debbabi A Practical Framework for the Dataflow Pointcut in AspectJ. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Thomas Heyman, Riccardo Scandariato, Wouter Joosen Risk-Driven Architectural Decomposition. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Tomasz Polacik Back and Forth Between First-Order Kripke Models. Search on Bibsonomy Log. J. IGPL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Simon Gog, Martin Bader Fast Algorithms for Transforming Back and Forth between a Signed Permutation and Its Equivalent Simple Permutation. Search on Bibsonomy J. Comput. Biol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Michele Piunti, Alessandro Ricci From Agents to Artifacts Back and Forth: Purposive and Doxastic use of Artifacts in MAS. Search on Bibsonomy Programming Multi-Agent Systems The full citation details ... 2008 DBLP  BibTeX  RDF
20Paolo Atzeni, Stefano Paolozzi, Pierluigi Del Nostro Ontologies And Databases: Going Back And Forth. Search on Bibsonomy ODBIS The full citation details ... 2008 DBLP  BibTeX  RDF
20Maristella Agosti, Floriana Esposito, Costantino Thanos (eds.) Post-proceedings of the Forth Italian Research Conference on Digital Library Systems, IRCDL 2008, Padova, Italy, 24-25 January 2008 Search on Bibsonomy IRCDL The full citation details ... 2008 DBLP  BibTeX  RDF
20Michele Piunti, Alessandro Ricci From Agents to Artifacts Back and Forth: Operational and Doxastic Use of Artifacts in MAS. Search on Bibsonomy WOA The full citation details ... 2008 DBLP  BibTeX  RDF
20Xiao Yang, Guican Chen, Jun Cheng, Xiaoyun Xu A novel two-channel time-interleaved forth-order sigma-delta modulator topology. Search on Bibsonomy APCCAS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Nirmala Pudota, Paolo Casoto, Antonina Dattolo, Paolo Omero, Carlo Tasso Towards Bridging the Gap between Personalization and Information Extraction. Search on Bibsonomy IRCDL The full citation details ... 2008 DBLP  BibTeX  RDF
Displaying result #401 - #500 of 1563 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license