The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICITST"( http://dblp.L3S.de/Venues/ICITST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icitst

Publication years (Num. hits)
2009 (148) 2010 (84) 2011 (141) 2012 (140) 2013 (115) 2014 (74) 2015 (77) 2016 (86) 2017 (105) 2020 (28)
Publication types (Num. hits)
inproceedings(988) proceedings(10)
Venues (Conferences, Journals, ...)
ICITST(998)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 998 publication records. Showing 998 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Muhammad Shaheen, Saeed Iqbal, Fazl-e-Basit Labeled clustering a unique method to label unsupervised classes. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jacques Bou Abdo, Jacques Demerjian, Hakima Chaouchi, Kablan Barbar, Guy Pujolle Broker-based Cross-Cloud Federation Manager. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Naji Al-Kabi, Nawaf A. Abdulla, Mahmoud Al-Ayyoub An analytical study of Arabic sentiments: Maktoob case study. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Adam Oest, Manjeet Rege Feedback-driven clustering for automated linking of web pages. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Arome Junior Gabriel, Boniface Kayode Alese, Adebayo O. Adetunmbi, Olumide S. Adewale Post-Quantum Crystography: A combination of Post-Quantum Cryptography and Steganography. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mustafa Aydin, Jeremy Jacob A comparison of major issues for the development of forensics in cloud computing. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sahar Maalej Dammak, Anis Jedidi, Rafik Bouaziz Automation and evaluation of the semantic annotation of Web resources. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Asma Hamed, Hella Kaffel-Ben Ayed, Mohamed Ali Kâafar, Ahmed Kharraz Evaluation of third party tracking on the web. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ove Sörensen Zombie-cookies: Case studies and mitigation. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bernd Borchert, Max Günther Indirect NFC-login. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muteveri Kandira, Jabu Mtsweni, Keshnee Padayachee Cloud security and compliance concerns: Demystifying stakeholders' roles and responsibilities. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nasser Zalmout, Moustafa Ghanem Multidimensional community detection in Twitter. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed Awad, Ernst L. Leiss End-to-End cryptographic voting: Potentials and limitations. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Miklós Kálmán ProtoML: A rule-based validation language for Google Protocol Buffers. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohamed A. Abdelshafy, Peter J. B. King Analysis of security attacks on AODV routing. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matrazali Noorafiza, Hiroshi Maeda, Toshiyuki Kinoshita, Ryuya Uda Virtual machine remote detection method using network timestamp in cloud computing. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel Caragata, Karim Tabia, Mauricio Luduena Cryptanalysis of a chaos-based encryption algorithm for distributed systems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Antti Evesti, Jani Suomalainen, Reijo Savola Security risks in the short-range communication of ubiquitous application. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fatimah Y. Akeel, Gary B. Wills, Andrew M. Gravell SecureDIS: A framework for secure Data Integration Systems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bruno Silva 0001, Paulo Romero Martins Maciel, Armin Zimmermann Performability models for designing disaster tolerant Infrastructure-as-a-Service cloud computing systems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Oleg Garasym, Ina Taralova High-speed encryption method based on switched chaotic model with changeable parameters. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1David Stupples ICITST-2013: Keynote speaker 2: Security challenge of TOR and the deep web. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abdussalam Elzawi, Stephen J. Wade, Thuraya Kenan, Crinela Pislaru Exploratory study of the attitudes of academic staff in Libyan Universities towards the role of the Internet. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Young-Ji Byon, Young-Seon Jeong, Said M. Easa, Joonsang Baek Feasibility analysis of transportation applications based on APIs of social network services. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Shafiq-Ur Rehman, Naveed Ejaz Towards an efficient shopping mechanism for M-commerce. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ibrahim Kabiru Musa, Stuart D. Walker Adaptive market place for converged cloud computing model. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1 8th International Conference for Internet Technology and Secured Transactions, ICITST 2013, London, United Kingdom, December 9-12, 2013 Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  BibTeX  RDF
1Umar Manzoor, Maria Zubair, Kanwal Batool Using multi-agent systems to solve food distribution problem in disaster area. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Charles A. Clarke, Eckhard Pfluegel, Dimitris Tsaptsinos Enhanced Virtual Private Social Networks: Implementing user content confidentiality. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Bas Geerdink A reference architecture for big data solutions introducing a model to perform predictive analytics using big data technology. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aditya Yulianto, Maria Irmina Prasetiyowati BoxLock: Mobile-based Serpent cryptographic algorithm and One-Time Password mechanism implementation for Dropbox files security. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aneel Rahim, Paul Malone Intrusion detection system for Wireless Nano sensor Networks. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Xian Chen, Meilian Chen, Hyoseop Shin, Eun Yi Kim Mining salient images from a large-scale blogosphere. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jong-Hoon Lee, Jung-Tae Kim, Ik-Kyun Kim, Ki Jun Han Design and implementation of the contents visualization system for social networks. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Margarita Velasco, David While, Pathmeswaran Raju Adaptation of Web services using policies. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Charl van der Westhuizen, Marijke Coetzee Context-aware RESTful services on mobile devices. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nan Zhao, Loïc Baud, Patrick Bellot Characteristics analysis for the cyberlockers files study on Rapidgator Speedyshare and 1Fichier. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abdullah A. Alabdulatif, Xiaoqi Ma, Lars Nolle Analysing and attacking the 4-way handshake of IEEE 802.11i standard. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ahmed Osama Fathy Atya, Jilong Kuang RUFC: A flexible framework for reliable UDP with flow control. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Melanie Willett, Rossouw von Solms A framework for assuring the conformance of cloud-based email. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hemlal Sahu, Birendra Kumar Sharma A new encryption scheme based on hybrid Problems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi Design and development of Anti-XSS proxy. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Saeed Iqbal, Muhammad Shaheen, Fazl-e-Basit A machine learning based method for optimal journal classification. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Vivek Shandilya, Sajjan G. Shiva Security in the cloud based systems: Structure and breaches. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel Fischer 0003, Bernd Markscheffel, T. Seyffarth Smartphone security: Overview of security software solutions. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tyson T. Brooks ICITST-2013: Keynote speaker 3: Blurred nets: Disruption and the risk to future 'Internet of Things' (IoT) architectures. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chongxiao Cao, Fengguang Song, Daniel G. Waddington Implementing a high-performance recommendation system using Phoenix++. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sofia Najwa Ramli, Rabiah Ahmad, Mohd Faizal Abdollah Electrocardiogram (ECG) signals as biometrics in securing Wireless Body Area Network. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Fahad M. Alotaibi, Jordan Dimitrov Implementation and evaluation of classroom simulation for trainee teacher using second life environments. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Iman Ranaee, Mahdi Majidi Nia, Reza Jahantigh, Amirhossein Gharib Introducing a new algorithm for medical image encryption based on chaotic feature of cellular automata. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mouza Ahmad Bani Shemaili, Chan Yeob Yeun, Mohamed Jamal Zemerly, Khalid Mubarak, Yoon Seok Chang Securing E-Seal real time tracking system for Internet of Things. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes A mutual authentication protocol for low-cost RFID tags formally verified using CasperFDR and AVISPA. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daehee Kim 0001, Sangwook Kang, Sunshin An Energy efficient time synchronization for target tracking in heterogeneous sensor networks. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hisham Al-Assam, Rasber Dh. Rashid, Sabah Jassim Combining steganography and biometric cryptosystems for secure mutual authentication and key exchange. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Denis Obrul, Borut Zalik Real-time adaptive arrival prediction system for public transport. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Balkis Hamdane, Ahmed Serhrouchni, Sihem Guemara El Fatmi Access control enforcement in Named Data Networking. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mounira Msahli, Rached Abdeljaoued, Ahmed Serhrouchni Access control in probative value Cloud. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Luigi Catuogno, Clemente Galdi Towards the design of a film-based graphical password scheme. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Kamyab Karimi, Carl Hauser Internet Unite-and-Conquer architecture. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Robert Costello, Nigel Shaw Assisted Learning Virtual Support (ALVS) for postgraduate students, through the Graduate Virtual Research Environment (GVRE). Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Ryo Onuma, Hiroki Nakayama, Hiroaki Kaminaga, Yasuhiko Morimoto, Youzou Miyadera, Shoichi Nakamura Methods for strategic accumulation of context information in research activities. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1O. A. Akinsowon, Boniface Kayode Alese Edge detection methods in palm-print identification. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Thuraya Kenan, Crinela Pislaru, Abdussalam Elzawi, Maysoun Restoum Improving the effectiveness of collaborative learning processes in Libyan Higher Education. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Muhannad Quwaider, Yaser Jararweh Cloudlet-based for big data collection in body area networks. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Huda Elmogazy, Omaima Bamasak Towards healthcare data security in cloud computing. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Nalin Asanka Gamagedara Arachchilage, Cornelius Namiluko, Andrew P. Martin A taxonomy for securely sharing information among others in a trust domain. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abdullah Ali Alshehri 0001, Steve A. Schneider Formally defining NFC M-coupon requirements, with a case study. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Chiara Peretti, Paolo Gastaldo, Marco Stramezzi, Rodolfo Zunino Embedded implementation of Edwards curve- and extended Jacobi quartic curve-based cryptosystems. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Miyoung Jang, Ara Jo, Jae-Woo Chang A privacy-aware query authentication index for encrypted database in cloud. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Rawan T. Khasawneh, Heider Wahsheh 0001, Mohammed Al-Kabi, Izzat Mahmoud Alsmadi Sentiment analysis of arabic social media content: a comparative study. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Luciene Cristina Alves Rinaldi, Briseida Dogo de Resende, Rodrigo Bossini Tavares Moreira, Márcio Lobo Netto A system for social network analysis. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Charles A. Shoniregun ICITST-2013: Keynote speaker 4: Writing a sustainable research paper. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hyun-Hwa Choi, Byoung-Seob Kim, Shin-Young Ahn, Seung-Jo Bae A workflow for parallel and distributed computing of large-scale genomic data. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Leonard James Mselle, Tabu S. Kondo Results on implementing personal learning environments in Tanzanian secondary schools. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Haruhiko Fujii, Yukio Tsuruoka SV-2FA: Two-factor user authentication with SMS and voiceprint challenge response. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Aspen Olmsted, Csilla Farkas Web Service constraint optimization. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Elhadj Benkhelifa, Thomas Welsh A Cloud Enabled Social Media Monitoring Platform for Events Detection and Prediction. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Hiroki Nakayama, Ryo Onuma, Hiroaki Kaminaga, Youzou Miyadera, Setsuo Yokoyama, Shoichi Nakamura Extraction methods of e-mail discussion processes considering diversity of description granularity and their complicated relationships. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Zeinab Fawaz, Safwan El Assad, M. Frajallah, Ayman Khalil, René Lozi, Olivier Déforges Lightweight chaos-based cryptosystem for secure images. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mohammed A. Alhomidi, Martin J. Reed Security risk analysis as a service. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sarita Paudel, Markus Tauber, Ivona Brandic Security standards taxonomy for Cloud applications in Critical Infrastructure IT. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Dinkar Sitaram, H. L. Phalachandra, Anush Vishwanath, Pramod Ramesh, Meghana Prashanth, Akshay G. Joshi, Anoop R. Desai, Harikrishna Prabhu C. R, Prafulla, Shwetha R, Yashaswini A Keystone federated security. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Tyson Brooks, Michelle L. Kaarst-Brown, Carlos Caicedo 0001, Joon Park, Lee McKnight A failure to communicate: Security vulnerabilities in the GridStreamX Edgeware application. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Afnan Ullah Khan, Manuel Oriol, Mariam Kiran Threat methodology for securing scalable video in the Cloud. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Abdolazim Rezaei, Zarinah Mohd Kasirun, Vala Ali Rohani, Touraj Khodadadi Anomaly detection in Online Social Networks using structure-based technique. Search on Bibsonomy ICITST The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Afif Mghawish, Akram A. AbdelQader, Mahmoud A. Al-Jezawi, Mohammad AbuMahfouz Multi function control system using GSM modem based SM5100B Module. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Jeffrey J. Wiley, Frank P. Coyle Semantic hedgehog for log analysis. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Yusuke Morita, Hiroyuki Anzai, Hiroaki Kaminaga, Youzou Miyadera, Shoichi Nakamura Visual support system for semi-automatic generation of spadework of academic paper from presentation slides. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Sanchika Gupta, Anjali Sardana, Padam Kumar A light weight centralized file monitoring approach for securing files in Cloud environment. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Funminiyi Olajide, Nick Savage 0001, Galyna A. Akmayeva, Richard Trafford Forensic memory evidence of windows application. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mikhail Y. R. Gadelha, Cicero Ferreira Fernandes Costa Filho, Marly Guimarães Fernandes Costa Proposal of a cryptography method using gray scale digital images. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Eyad Taqieddin, Jagannathan Sarangapani Vulnerability analysis of two ultra-lightweight RFID authentication protocols: RAPP and gossamer. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Maja Vidovic, Josip Kolic Are contemporary trade unions utilizing the opportunities for revival presented by internet technology? A comparison of Croatian, UK and USA practice. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Maryline Chetto, Hassan Noura 0001, Safwan El Assad, Mousa Farajallah How to guarantee secured transactions with QoS and real-time constraints. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ruhma Tahir, Huosheng Hu, Dongbing Gu, Klaus D. McDonald-Maier, Gareth Howells 0001 A scheme for the generation of strong cryptographic key pairs based on ICMetrics. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Hsi-Chung Lin Content Extraction Signatures Revisited. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Tran Thao Phuong, Kazumasa Omote, Nguyen Gia Luyen, Nguyen Dinh Thuc Improvement of multi-user searchable encrypted data scheme. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Mafawez T. Alharbi, Amelia Platt, Ali H. Al-Bayatti Context-aware Personal Learning Environment. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Ana A. Andrade, Vitor V. Lopes, Augusto Q. Novais Quantifying the impact on distrust of e-commerce trust factors: A non-parametric study. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
1Sukyoung Kim, Kihong Ahn User-intent custom adaptive search service based on ontology and similar-word retrieval algorithm composition. Search on Bibsonomy ICITST The full citation details ... 2012 DBLP  BibTeX  RDF
Displaying result #401 - #500 of 998 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license