The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Africa with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1976-1991 (15) 1992-1995 (19) 1996-1998 (30) 1999 (58) 2000 (20) 2001 (72) 2002 (56) 2003 (59) 2004 (94) 2005 (77) 2006 (117) 2007 (169) 2008 (394) 2009 (1200) 2010 (2187) 2011 (245) 2012 (258) 2013 (634) 2014 (213) 2015 (541) 2016 (390) 2017 (609) 2018 (460) 2019 (429) 2020 (656) 2021 (511) 2022 (364) 2023 (383) 2024 (74)
Publication types (Num. hits)
article(1385) book(2) data(2) incollection(14) inproceedings(8763) phdthesis(13) proceedings(155)
Venues (Conferences, Journals, ...)
ICC(995) SAICSIT(560) ISSA(439) AFRICACRYPT(336) FUSION(328) AFRICON(325) MedInfo(298) IGARSS (3)(278) IGARSS (2)(266) IGARSS (4)(263) SSCI(257) ICTAS(243) MENACOMM(190) ECIS(180) ICT4DA(165) Remote. Sens.(155) More (+10 of total 847)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1924 occurrences of 1247 keywords

Results
Found 10353 publication records. Showing 10334 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Naume Sonhera, Elmarie Kritzinger, Marianne Loock A proposed cyber threat incident handling framework for schools in South Africa. Search on Bibsonomy SAICSIT The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Salah Kabanda, Andrea Downes, Steven Baltazar dos Ramos Mobile Banking Services in South Africa: The case of M-Pesa. Search on Bibsonomy INC The full citation details ... 2012 DBLP  BibTeX  RDF
23Xuefei Leng, Gerhard P. Hancke 0002, Keith Mayes, Konstantinos Markantonakis Tag Group Authentication Using Bit-Collisions. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Aleksandar Valjarevic, Hein S. Venter Harmonised digital forensic investigation process model. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Christien Kroeze, Martin S. Olivier Gamifying authentication. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Tiny du Toit, Hennie A. Kruger Filtering spam e-mail with Generalized Additive Neural Networks. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Anne V. D. M. Kayem, Azhar Deshai, Stuart Hammer On anonymizing social network graphs. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Marius Potgieter, Johan Van Niekerk The use of computer vision technologies to augment human monitoring of secure computing facilities. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Jason Jordaan A Sample of digital forensic quality assurance in the South African criminal justice system. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Reijo M. Savola Strategies for security measurement objective decomposition. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Nickson M. Karie, Hein S. Venter Measuring semantic similarity between digital forensics terminologies using web search engines. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Barry Irwin A network telescope perspective of the Conficker outbreak. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Neil J. Croft On forensics: A silent SMS attack. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Heloise Pieterse, Martin S. Olivier Android botnets on the rise: Trends and characteristics. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Frank Breitinger, Harald Baier Properties of a similarity preserving hash function and their realization in sdhash. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Caroline Oehri, Stephanie Teufel Social media security culture. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Manuel Corregedor, Sebastiaan H. von Solms ATE: Anti-malware technique evaluator. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Nureni Ayofe Azeez, Isabella Margarethe Venter Towards achieving scalability and interoperability in a triple-domain grid-based environment (3DGBE). Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Kennedy Njenga, Sifiso Ndlovu On privacy calculus and underlying consumer concerns influencing mobile banking subscriptions. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Antonio Pooe, Les Labuschagne A conceptual model for digital forensic readiness. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Etienne Stalmans, Samuel O. Hunter, Barry Irwin Geo-spatial autocorrelation as a metric for the detection of Fast-Flux botnet domains. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Irene Okere, Johan Van Niekerk, Mariana Carroll Assessing information security culture: A critical analysis of current approaches. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Phumezo Ntlatywa, Reinhardt A. Botha, Bertram Haskins Claimed vs observed information disclosure on social networking sites. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Hein S. Venter, Marianne Loock, Marijke Coetzee Introduction. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Mark M. Seeger, Stephen D. Wolthusen A model for partially asynchronous observation of malicious behavior. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Sobhana Rama, Stephen Flowerday, Duane Boucher Information confidentiality and the Chinese Wall Model in Government tender fraud. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Samuel O. Hunter, Etienne Stalmans, Barry Irwin, John Richter Remote fingerprinting and multisensor data fusion. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23George Sibiya, Hein S. Venter, Sipho Ngobeni, Thomas Fogwill Guidelines for procedures of a harmonised digital forensic process in network forensics. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Tapiwa Gundu, Stephen Flowerday The enemy within: A behavioural intention model and an information security awareness process. Search on Bibsonomy ISSA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23Alfred Coleman, Marlien Herselman, Dalenca Pottas E-Health Readiness Assessment for E-Health Framework for Africa: A Case Study of Hospitals in South Africa. Search on Bibsonomy eHealth The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Hein S. Venter, Marijke Coetzee, Marianne Loock (eds.) Information Security South Africa Conference 2011, Hyatt Regency Hotel, Rosebank, Johannesburg, South Africa, August 15-17, 2011. Proceedings ISSA 2011 Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Chris Petzer, Carolyn McGibbon, Irwin Brown Adoption of Green IS in South Africa: an exploratory study. Search on Bibsonomy SAICSIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Kaashief Hartley, Lisa F. Seymour Towards a framework for the adoption of business intelligence in public sector organisations: the case of South Africa. Search on Bibsonomy SAICSIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23André P. Calitz, Jéan H. Greyling, Margaret D. M. Cullen The accreditation of ICT degree programs in South Africa. Search on Bibsonomy SAICSIT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
23Monontsi Nthontho, S. P. Chowdhury, Simon Winberg Investigating implementation of communication networks for advanced metering infrastructure in South Africa. Search on Bibsonomy Kaleidoscope The full citation details ... 2011 DBLP  BibTeX  RDF
23Robert Koletka, Andrew Hutchison An Architecture for Secure Searchable Cloud Storage. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Geoffrey Karokola, Stewart Kowalski, Louise Yngström Secure e-Government Services: Towards A Framework for Integrating IT Security Services into e-Government Maturity Models. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Nico Pieter Fouche, Kerry-Lynn Thomson Exploring the Human Dimension of TETRA. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Enos K. Mabuto, Hein S. Venter State of the Art of Digital Forensic Techniques. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Reijo Savola, Petri Heinonen A Visualization and Modeling Tool for Security Metrics and Measurements Management. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Ryan Galpin, Stephen Flowerday Online Social Networks: Enhancing user trust through effective controls and identity management. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Samuel O. Hunter, Barry Irwin Tartarus: A honeypot based malware tracking and mitigation framework. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Ryan Gavin Goss, Reinhardt A. Botha Traffic Management in Next Generation Service Provider Networks - Are We There Yet? Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Namosha Veerasamy, Jan H. P. Eloff UML Modelling Of Network Warfare Examples. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Sean Allam, Stephen Flowerday An adaptation of the awareness boundary model towards smartphone security. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Duane Boucher, Stephen Flowerday Privacy: In pursuit of Information security awareness. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Raja Khurram Shahzad, Niklas Lavesson Detecting Scareware by Mining Variable Length Instruction Sequences. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Aleksandar Valjarevic, Hein S. Venter Towards a Digital Forensics Readiness Framework for Public Key Infrastructure Systems. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Mariana Carroll, Paula Kotzé, Alta van der Merwe Secure Cloud Computing: Benefits, Risks and Controls. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Donovan Isherwood, Marijke Coetzee Enhancing Digital Business Ecosystem Trust and Reputation with Centrality Measures. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Nontokozo P. Khanyile, Jules-Raymond Tapamo, Erick Dube A Comparative Study of Fingerprint Thinning algorithms. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Ivan Daniel Burke, Martin S. Olivier Analysing the fairness of trust-based Mobile Ad Hoc Network protocols. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Aubrey Labuschagne, Namosha Veerasamy, Ivan Burke Design of cyber security awareness game utilizing a social media framework. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Hennie A. Kruger, Stephen Flowerday, Lynette Drevin, Tjaart Steyn An assessment of the role of cultural factors in information security awareness. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Elisha O. Ochola, Mariki M. Eloff A Review of Black Hole attack on AODV Routing in MANET. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Manuel Corregedor, Sebastiaan H. von Solms Implementing Rootkits to Address Operating System Vulnerabilities. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Paul Tarwireyi, Stephen Flowerday, Anass Bayaga Information Security Competence Test with Regards to Password Management. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Timo Winkelvos, Carsten Rudolph, Jürgen Repp A Property Based Security Risk Analysis Through Weighted Simulation. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Stephen Serra, Hein S. Venter Mobile cyber-bullying: A proposal for a pre-emptive approach to risk mitigation by employing digital forensic readiness. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Anton Borg, Martin Boldt, Niklas Lavesson Informed Software Installation Through License Agreement Categorization. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Waldo Delport, Michael Köhn, Martin S. Olivier Isolating a cloud instance for a digital forensic investigation. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Franscois Van Staden, Hein S. Venter Adding digital forensic readiness to electronic communication using a security monitoring tool. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Marthie Grobler, Zama Dlamini, Sipho Ngobeni, Aubrey Labuschagne Towards a Cyber security aware rural community. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Shaun Egan An Evaluation of Lightweight Classification Methods for Identifying Malicious URLs. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Rossouw von Solms, Kerry-Lynn Thomson, Mvikeli Maninjwa Information Security Governance control through comprehensive policy architectures. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Ka Fai Peter Chan Secret sharing in audio steganography. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Endre Bangerter, Stephan Krenn, Matrial Seifriz, Ulrich Ultes-Nitsche cPLC - A Cryptographic Programming Language and Compiler. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Rayne Reid, Johan Van Niekerk, Rossouw von Solms Guidelines for the creation of brain compatible cyber security educational material in Moodle 2.0. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Hector Beyers, Martin S. Olivier, Gerhard P. Hancke 0001 An approach to examine the Metadata and Data of a database Management System by making use of a forensic comparison tool. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Anastassia S. Rakitianskaia, Martin S. Olivier, Antony K. Cooper Nature and Forensic investigation of crime in Second Life. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Etienne Stalmans A Framework for DNS based detection and mitigation of malware infections on a network. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Anne V. D. M. Kayem, Patrick Martin 0001, Selim G. Akl Efficient Enforcement of Dynamic Access Control Policies for Outsourced Data. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Tinus Strauss, Martin S. Olivier Network Forensics in a Clean-Slate Internet Architecture. Search on Bibsonomy ISSA The full citation details ... 2011 DBLP  BibTeX  RDF
23Blessing Mukabeta Maumbe, Julius J. Okello Uses of Information and Communication Technology (ICT) in Agriculture and Rural Development in Sub-Saharan Africa: Experiences from South Africa and Kenya. Search on Bibsonomy Int. J. ICT Res. Dev. Afr. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Anastassios Pouris A scientometric assessment of the Southern Africa Development Community: science in the tip of Africa. Search on Bibsonomy Scientometrics The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23James E. Gain, Patrick C. Marais (eds.) Proceedings of the 7th International Conference on Computer Graphics, Virtual Reality, Visualisation and Interaction in Africa, Afrigraph 2010, Franschhoek, South Africa, June 21-23, 2010 Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  BibTeX  RDF
23Hein S. Venter, Marijke Coetzee, Marianne Loock (eds.) Information Security South Africa Conference 2010, Sandton Convention Centre, Sandton, South Africa, August 2-4, 2010. Proceedings ISSA 2010 Search on Bibsonomy ISSA The full citation details ... 2010 DBLP  BibTeX  RDF
23Daniel J. Bernstein, Tanja Lange 0001 (eds.) Progress in Cryptology - AFRICACRYPT 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings Search on Bibsonomy AFRICACRYPT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Val A. Hooper, Jacqui Kew, Mike Herrington The use of Mobile Phones by SMMEs in a Developing Economy: The Case in South Africa. Search on Bibsonomy ECIS The full citation details ... 2010 DBLP  BibTeX  RDF
23Cheick Oumar Bagayoko, Mahamoudane Niang, Seydou T. Traoré, Georges Bediang, Jean-Marc Naef, Antoine Geissbühler Deploying Portable Ultrasonography with Remote Assistance for Isolated Physicians in Africa: Lessons from a Pilot Study in Mali. Search on Bibsonomy MedInfo The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Retha de la Harpe, Jay Barnes, Mikko Korpela Information Needs in Home Based Healthcare in South Africa. Search on Bibsonomy MedInfo The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Parimalaranie Yogeswaran, Graham Wright EHR Implementation in South Africa: How do we get it right? Search on Bibsonomy MedInfo The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Lyn A. Hanmer, Sedick Isaacs, J. Dewald Roode Factors associated with health information system success: Results of a survey of hospitals in South Africa. Search on Bibsonomy MedInfo The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Catherine Searle, Arthi Ramkissoon, Thamandrie Govender Using a File Audit to Evaluate Retention in Care and Patient Outcomes in a Programme to Decentralise Antiretroviral Treatment to Primary Health Care Facilities in a High Prevalence Setting in KwaZulu-Natal, South Africa. Search on Bibsonomy MedInfo The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Khatry-Chhetry Mukund Bahadur, Peter J. Murrayb Cell Phone Short Messaging Service (SMS) for HIV/AIDS in South Africa: A literature review. Search on Bibsonomy MedInfo The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Kim Gush, Ruth de Villiers Application usage of unsupervised digital doorway computer kiosks in remote locations in South Africa. Search on Bibsonomy SAICSIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23David Denton, Irwin Brown The shortage of skilled storage professionals in South Africa and coping strategies employed. Search on Bibsonomy SAICSIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23María S. Sáncheza, James O. Lloyd-Smith, Brian G. Williams, Wayne M. Getz Using Mathematical Models to Monitor and Evaluate the Impact of Public Health Interventions on Epidemics: The Case of the TB/HIV Co-pandemic in Africa. Search on Bibsonomy Modeling Paradigms and Analysis of Disease Trasmission Models The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
23Rico Richter, Jürgen Döllner Out-of-core real-time visualization of massive 3D point clouds. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF 3D point clouds, LiDAR, point-based rendering, out-of-core visualization
23Bernardt Duvenhage, Kadi Bouatouch, Derrick G. Kourie Exploring the use of glossy light volumes for interactive global illumination. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF backward polygon beam tracing, glossy, light volume, caustics
23Daniele Panozzo, Enrico Puppo Adaptive LOD editing of quad meshes. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF adaptive subdivision surfaces, quaddominant meshes, level of detail
23Bernardt Duvenhage, J. P. Delport, Jason P. de Villiers Implementation of the Lucas-Kanade image registration algorithm on a GPU for 3D computational platform stabilisation. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Lucas-Kanade, image stabilisation, graphics processing unit
23Johannes Jansen van Vuuren, Michelle Kuttel, James E. Gain Visualization of solution sets from automated docking of molecular structures. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF multi-dimensional visualization, molecular docking, glyphs
23Václav Skala Progressive RBF interpolation. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF graphics and vision, interpolation, RBF, incremental computation
23Shaun Bangay, David de Bruyn, Kevin R. Glass Minimum spanning trees for valley and ridge characterization in digital elevation maps. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF graph, minimum spanning tree, line, DEM, ridge
23Alexandre Hardy, Johannes Venter 3-view impostors. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF volume rendering, distance fields, impostors, raycasting
23Jason P. de Villiers A comparison of image sharpness metrics and real-time sharpening methods with GPU implementations. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF image sharpening, image sharpness, real-time, GPU
23Belma Ramic-Brkic, Alan Chalmers Virtual smell: authentic smell diffusion in virtual environments. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF high-fidelity virtual environments, smell diffusion, human perception
23Alena Petrásová, Gabriela Czanner, Jassim Happa, Silvester Czanner, Dieter Wolke, Alan Chalmers Assessing a virtual baby feeding training system. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF education and computer graphics, infant feeding difficulties, presence in virtual reality, human computer interaction, virtual reality, user studies, serious games
23Catherine Sauvaget, Vincent Boyer 0001 Harmonic colorization using proportion contrast. Search on Bibsonomy Afrigraph The full citation details ... 2010 DBLP  DOI  BibTeX  RDF colour harmonization, non-photorealistic techniques
Displaying result #501 - #600 of 10334 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license