The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICCST"( http://dblp.L3S.de/Venues/ICCST )

URL (DBLP): http://dblp.uni-trier.de/db/conf/iccst

Publication years (Num. hits)
2011 (59) 2012 (59) 2014 (85) 2015 (76) 2016 (54) 2017 (76) 2018 (53) 2019 (40) 2021 (34) 2022 (27) 2023 (41)
Publication types (Num. hits)
inproceedings(593) proceedings(11)
Venues (Conferences, Journals, ...)
ICCST(604)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 604 publication records. Showing 604 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Matthew Ibekwe, Stanislav Vítek, Milos Klima, Petr Dostál Modeling and evaluation of image quality in wireless surveillance networks. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Kenneth K. Yamamoto, Sergey N. Vecherin, D. Keith Wilson, Christian T. Borden, Elizabeth Bettencourt, Chris L. Pettit General software for multimodal signal modeling and optimal sensor placement: Environmental Awareness for Sensor and Emitter Employment (EASEE). Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Addisson Salazar, Gonzalo Safont, Antonio Soriano 0001, Luis Vergara Automatic credit card fraud detection based on non-linear signal processing. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jeff Hamar, Rick Dove A quorum sensing pattern for multi-agent self-organizing security systems. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mark D. Murton, Dale T. van Dongen, Michael P. Ross, Francis A. Bouchier Toward a performance requirement for sensored conformable apertures. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ed Rao Air cargo screening for stowaway detection: Carbon dioxide monitors and Heartbeat Monitor assessment and qualification. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anika Pflug, Philip Michael Back, Christoph Busch 0001 Towards making HCS ear detection robust against rotation. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sung Choi, David Zage Addressing insider threat using "where you are" as fourth factor authentication. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Donald A. Sheaffer, David C. Burnett Improved surface swimmer detection through multimodal data fusion. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sylvio Bisson, Pushkar E. Godbole, Matthew McKee, Marc St-Amand Methods for the prevention of the use of mobile phones in Correctional institutions. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Virginia Espinosa-Duro, Marcos Faúndez-Zanuy, Jirí Mekyska Contribution of the temperature of the objects to the problem of thermal imaging focusing. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yuichiro Yamada, Daisuke Sasagawa Super-resolution processing of the partial pictorial image of the single pictorial image which eliminated artificiality. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Eric D. Vugrin, Kevin L. Stamber, Michael J. Baca, Gio Kao, Hai Le, Michael Mtchell, Rick Ramirez, Kim Welch A mission resilience assessment methodology for infrastructure disruptions. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Xuebing Zhou, Christoph Busch 0001 Measuring privacy and security of iris fuzzy commitment. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Stanislav Vítek, Milos Klima, Petr Dostál Cost-effective automatic stereoscopic security video system 3DSec. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Richard M. Guest, Oscar Miguel-Hurtado Enhancing static biometric signature verification using Speeded-Up Robust Features. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Paul C. Haddock, John W. Hatley, William D. Morse, Robert D. Tooley Integrated communications and navigation module. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Min-Ku Kim, Dong-Guk Han, Jeong Choon Ryoo, Okyeon Yi CPA performance enhancement based on spectrogram. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Brett C. Tjaden, Robert Floodeen Communication among incident responders - A study. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ernesto Gonzaga, Harold J. Cossette Plasma barrier force-field access denial system. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Philipp Sury, Sandrina Ritzmann, Adrian Schwaninger Initial results of web based blended learning in the field of air cargo security. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lisa A. Shay, Gregory J. Conti, Dominic M. Larkin, John Nelson A framework for analysis of quotidian exposure in an instrumented world. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Esther González, Luis Álvarez, Luis Mazorra Normalization and feature extraction on ear images. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Dean Dominguez, Mancel Jordan Parks, Adam D. Williams, Susan Washburn Special Nuclear material and critical infrastructure security modeling and simulation of physical protection systems. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1David Streisand, Rick Dove Basic genetic-algorithm-neural-network (GANN) pattern with a self-organizing security example. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aesun Park, Dong-Guk Han, Jeong Choon Ryoo CPA performance comparison based on Wavelet Transform. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Marcia Mendes, Adrian Schwaninger, Nadine Strebel, Stefan Michel Why laptops should be screened separately when conventional x-ray screening is used. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Chang-Lung Tsai, Chun-Jung Chen, Wei-Lieh Hsu Multi-morphological image data hiding based on the application of Rubik's cubic algorithm. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1S. Rankin, N. Cohen, K. MacLennan-Brown, K. Sage CCTV Operator Performance Benchmarking. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Lester A. Cano Using Neural Networks for Extended Detection. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Fabio Garzia, Roberto Cusani, Enzo Sammarco Advanced access control system for ports. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Andre Gagnon, René Schmidt Trial results conducted by multiple Canadian government agencies of the recent covert technology developped by Tektrap to trace and track the integrity of maritime containers worldwide. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Robert Gurney, Mike Rhead, Soodamani Ramalingam, Neil Cohen Working towards an international ANPR Standard - An initial investigation into the UK standard. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Edward L. Witzke, Joseph P. Brenkosh, Karl L. Green, Loren E. Riblett, James M. Wiseman Encryption in mobile wireless mesh networks. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zdenek Vintr, Michal Vintr, Jindrich Malach Evaluation of physical protection system effectiveness. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Philip Campbell Department of Defense Instruction 8500.2 "Information Assurance (IA) Implementation: " A retrospective. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zdenek Vintr, David Valis, Jindrich Malach Attack tree-based evaluation of physical protection systems vulnerability. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Multisampling approach applied to contactless hand biometrics. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1 IEEE International Carnahan Conference on Security Technology, ICCST 2012, Newton, MA, USA, October 15-18, 2012 Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Felicia A. Durán Probabilistic basis and assessment methodology for effectiveness of protecting nuclear materials. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Ramon Blanco-Gonzalo, Oscar Miguel-Hurtado, Aitor Mendaza-Ormaza, Raul Sánchez-Reillo Handwritten signature recognition in mobile scenarios: Performance evaluation. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mofreh A. Hogo Biometrie keys based on pseudorandom sequences. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jonny A. Uribe, Luis Fonseca, J. F. Vargas Video based system for railroad collision warning. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Keith Harman, Wayne K. Messner Outdoor perimeter security sensors a forty year perspective. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Mike Rhead, Robert Gurney, Soodamani Ramalingam, Neil Cohen Accuracy of automatic number plate recognition (ANPR) and real world UK number plate problems. Search on Bibsonomy ICCST The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Michael Brockly, Richard M. Guest, Stephen J. Elliott, James Scott Dynamic signature verification and the human biometric sensor interaction model. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Petr Dostál, Milos Klima Locally adaptive demosaicing technique for security images based upon region-of-interest analysis. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Imanol de Arriba-Ruiz, Félix Pérez-Martínez, José Maria Muñoz-Ferreras New technique for static target detection in dense-multipath urban environments. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1 International Carnahan Conference on Security Technology, ICCST 2011, Barcelona, Spain, October 18-21, 2011 Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova Study of the effect of blurriness in image acquisition for hand biometrics in mobile devices. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kamil Malinka, Petr Hanácek, Michal Trzos Evaluation of biometric authentication based on visual evoked potentials. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tien-Sheng Lin, Ting-Hsu Chang, Chia-Hung Chien, Sy-Yen Kuo Quantum circuits and quantum message integrity. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Carlos M. Travieso, Juan José Fuertes 0002, Jesús B. Alonso Derivative method for hand palm texture biometric verification. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ben Jones, Tom Hounsham, Carinna Brown, Stephen Tarr The development of a methodology for the evaluation of Wide Area Detection Systems (WADS). Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ester González, Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Looking for hand shape based biometric devices interoperability. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vishrut Sharma A theoretical implementation of Blended Program Analysis for virus signature extraction. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rudolf Volner, Petr Bores Home system - Biometric privacy and identity management. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Enric Sesa-Nogueras Discriminative power of online handwritten words for writer recognition. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Tien-Sheng Lin, Chia-Hung Chien, Ting-Hsu Chang, Sy-Yen Kuo Quantum signature scheme for vehicular networks using entangled states. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zahid Akhtar, Giorgio Fumera, Gian Luca Marcialis, Fabio Roli Robustness analysis of likelihood ratio score fusion rule for multimodal biometric systems under spoof attacks. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jaime Ortiz-López, Javier Galbally, Julian Fiérrez, Javier Ortega-Garcia Predicting iris vulnerability to direct attacks based on quality related features. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jaime Roberto Ticay-Rivas, Marcos del Pozo-Baños, Carlos M. Travieso, Jesús B. Alonso, Miguel A. Ferrer Multi-spectral information regarding face recognition. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Keiji Takeda, Masayoshi Mizutani Design and prototyping of framework for automated continuous malware collection and analysis. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nora Barroso, Karmele López de Ipiña, Carmen Hernández 0001, Aitzol Ezeiza Matrix Covariance Estimation methods for robust Security Speech Recognition with under-resourced conditions. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Koldo Pecina, Ricardo Estremera, Alfonso Bilbao, Enrique Bilbao Physical and Logical Security management organization model based on ISO 31000 and ISO 27001. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Vladimir Smejkal, Jindrich Kodl Strong authentication using dynamic biometric signature. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ana Ferreira 0001, Ricardo João Cruz Correia, Luis Antunes 0002 Usability of authentication and access control: A case study in healthcare. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Inmaculada Tomeo-Reyes, Ivan Rubio-Polo, Judith Liu-Jimenez, Belen Fernandez-Saavedra Quality metrics influence on iris recognition systems performance. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jirí Mekyska, Xavier Font-Aragonès, Marcos Faúndez-Zanuy, Ruben Hernandez-Mingorance, Aythami Morales, Miguel Angel Ferrer-Ballester Thermal hand image segmentation for biometric recogniton. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jong-Yeon Park, Okyeon Yi, Dong-Guk Han, Dooho Choi Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Demian Tinkiel, David White, Neil A. Trappe Efficient design of THz security systems. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Olive E. Wetter, Hartwig Fuhrmann, Michael Lipphardt, Franziska Hofer Bringing adversaries together: The importance of a common management-level approach in complex work domains. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Stephen J. Elliott, Mitchell Mershon, Vandhana Chandrasekaran, Shruti Gupta The evolution of the HBSI model with the convergence of performance methodologies. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Koldo Pecina, Alfonso Bilbao, Enrique Bilbao Physical and logical Security Risk Analysis model. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Richard M. Guest, Oscar Miguel-Hurtado Enhancing off-line biometric signature verification using a fingerprint assessment approach. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jesús Villalba 0001, Eduardo Lleida Preventing replay attacks on speaker verification systems. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fernando Martín Rodríguez, Juan Manuel Fernandez Montenegro Scanned documents secure authentication based on simple watermarking. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Philipp Sury, Adrian Schwaninger, Jasmin Nef Improving secure handling of air cargo by means of web based blended learning. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rudolf Volner, Dasa Ticha, Hedvika Palásthy Computer-based cognitive and socio-emotional training in personal health information management. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matthew Ibekwe, Milos Klima, Pavel Soucek The objective image quality criteria and QoE in the security technology. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yu-Chen Wang, Chen-Ta Hsieh, Chin-Chuan Han, Kuo-Chin Fan The color identification of automobiles for video surveillance. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Chien-Lung Hsu, Boo-Chen Liu, Yu-Li Lin A digital evidence protection method with hierarchical access control mechanisms. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ed Rao Cargo supply chain technology development and standardization initiatives. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rudolf Volner, Lubomir Volner Information security risk management for air transport. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Yuichiro Yamada Increase of digital CCTVs makes it difficult to analyze record images. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández 0001 Language identification for Internet security in the Basque context. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Zdenek Vintr, Michal Vintr, Jindrich Malach Does appropriate software support for target identification exist? Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Adam Wamsley, Stephen J. Elliott, Carl Dunkelberger, Mitch Mershon Analysis of slap segmentation and HBSI errors across different force levels. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Karmele López de Ipiña, Carmen Hernández 0001, Nora Barroso, Aitzol Ezeiza Must security listen to Kokoro? Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Fabio Garzia, Roberto Cusani The integrated safety/security system of the Gran Sasso mountain in Italy. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Javier Guerra Casanova, Carmen Sánchez Ávila, Gonzalo Bailador, Alberto de Santos Sierra Time series distances measures to analyze in-air signatures to authenticate users on mobile phones. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Alberto de Santos Sierra, Carmen Sánchez Ávila, Gonzalo Bailador, Javier Guerra Casanova Secure access control by means of human stress detection. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ed Rao Air cargo screening technology qualification program: Process and development of Qualified Screening Technology List. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nora Barroso, Karmele López de Ipiña, Aitzol Ezeiza, Carmen Hernández 0001 An ontology-driven semantic speech recognition system for security tasks. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Pedro Gómez Vilda, María Victoria Rodellar Biarge, Cristina Muñoz-Mulas, Rafael Martínez-Olalla, Luis Miguel Mazaira-Fernández, Agustín Álvarez Marquina Glottal parameter estimation by wavelet transform for voice biometry. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Aitor Mendaza-Ormaza, Oscar Miguel-Hurtado, Ramon Blanco-Gonzalo, Francisco-Jose Diez-Jimeno Analysis of handwritten signature performances using mobile devices. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Jia-Guu Leu, Liang-tsair Geeng, Chang En Pu, Jyh-Bin Shiau Speaker verification based on comparing normalized spectrograms. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Nora Barroso, Karmele López de Ipiña, Carmen Hernández 0001, Aitzol Ezeiza Design of multi-feature class models for Speech Recognition Security systems with under-resourced languages. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Christian Maaser, Harald Baier A concept for monitoring self-transforming code using memory page access control management. Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Marcia Mendes, Adrian Schwaninger, Stefan Michel Does the application of virtually merged images influence the effectiveness of computer-based training in x-ray screening? Search on Bibsonomy ICCST The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 604 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license