The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for liability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1966-1986 (15) 1987-1990 (17) 1991-1993 (15) 1994-1996 (16) 1997 (16) 1998-1999 (24) 2000 (18) 2001 (15) 2002-2003 (30) 2004 (23) 2005 (20) 2006 (26) 2007 (25) 2008-2009 (31) 2010 (15) 2011 (20) 2012 (17) 2013-2014 (22) 2015-2016 (27) 2017-2018 (40) 2019 (24) 2020 (26) 2021 (34) 2022 (33) 2023 (45) 2024 (12)
Publication types (Num. hits)
article(395) book(1) incollection(12) inproceedings(197) phdthesis(1)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 226 occurrences of 179 keywords

Results
Found 606 publication records. Showing 606 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
17George J. Febish Data Processing: A Corporate Asset or Liability? Search on Bibsonomy Int. CMG Conference The full citation details ... 1983 DBLP  BibTeX  RDF
17Kenneth D. Lawrence, Gary R. Reeves A zero-one goal programming model for capital budgeting in a property and liability insurance company. Search on Bibsonomy Comput. Oper. Res. The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
17Charles R. Franz, Sharon A. Asbill Liability implications in electronic fund transfers. Search on Bibsonomy Inf. Manag. The full citation details ... 1982 DBLP  DOI  BibTeX  RDF
17J. T. Westmeier Legal liability for malpractice of computer specialists. Search on Bibsonomy SIGCPR The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
17Donald F. Costello, Jane P. Devlin, Fred Greguras, John High, Jeff Meldman, Susan H. Nycum Software liability issues in the 80's. Search on Bibsonomy ACM Annual Conference The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
13Mark A. Rosso, Bernard J. Jansen Smart marketing or bait & switch: competitors' brands as keywords in online advertising. Search on Bibsonomy WICOW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF deceptive advertising, paid placement, paid search, passing off, search advertising, trademark infringement, trust, e-commerce, search engine, marketing, intellectual property, sponsored search, brand, trademark, internet advertising, search engine marketing, pay per click, keyword advertising
13Qing Zhang 0012, John McCullough, Justin Ma, Nabil Schear, Michael Vrable, Amin Vahdat, Alex C. Snoeren, Geoffrey M. Voelker, Stefan Savage Neon: system support for derived data management. Search on Bibsonomy VEE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF difc, memory tainting, qemu, virtualization, xen
13Yuko J. Nakanishi Vehicle and Road Automation. Search on Bibsonomy Handbook of Automation The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Simon Edward Parkin, Aad P. A. van Moorsel, Robert Coles An information security ontology incorporating human-behavioural implications. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF human behavioural implications, information security ontology, password policy
13Jianhua Gao, Wensheng Yang, Guixi Fang A study on government-dominated e-government outsourcing model. Search on Bibsonomy ICEGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF e-government outsourcing, government-dominated, quality inspection and quarantine
13Timothy Daryl Stanley, Don Colton Six years of sustainable IT service learning. Search on Bibsonomy SIGITE Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF pc hardware & operating systems, information technology education, service learning
13Eric Alata, Ion Alberdi, Vincent Nicomette, Philippe Owezarski, Mohamed Kaâniche Internet attacks monitoring with dynamic connection redirection mechanisms. Search on Bibsonomy J. Comput. Virol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Yuri Gurevich, Itay Neeman DKAL: Distributed-Knowledge Authorization Language. Search on Bibsonomy CSF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Datalog with constraints, existential fixed-point logic, infon, security, access control, authorization, Datalog, information leakage, distributed knowledge
13Stefan Rass, Simone Fuchs, Martin Schaffer, Kyandoghere Kyamakya How to protect privacy in floating car data systems. Search on Bibsonomy Vehicular Ad Hoc Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF privacy, anonymization, pseudonyms, discrete logarithm problem
13Stephen Wassef Moving mountains in Motown: trailblazing technology at the Wayne State University PC clinic. Search on Bibsonomy SIGUCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cisco Clean Access Agent, Dynamic Host Configuration Protocol (dhcp), Lightweight Directory Access Protocol (ldap), network authentication
13Christian Prause, Markus Eisenhauer Social aspects of a continuous inspection platform for software source code. Search on Bibsonomy CHASE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF software quality, code inspection, code ownership
13Stephen Wilson Public key superstructure "it's PKI Jim, but not as we know it!". Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authentication, PKI, public key infrastructure, digital certificates
13Davide Maria Parrilli Grid and Taxation: The Server as Permanent Establishment in International Grids. Search on Bibsonomy GECON The full citation details ... 2008 DBLP  DOI  BibTeX  RDF taxation, permanent establishment, server
13Ronald Hochreiter, Georg Ch. Pflug Financial scenario generation for stochastic multi-stage decision processes as facility location problems. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-stage financial scenario generation, Stochastic programming
13Rahul Telang, Sunil Wattal An Empirical Analysis of the Impact of Software Vulnerability Announcements on Firm Stock Price. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software vendors, quality, Information security, patching, software vulnerability, event-study
13Wullianallur Raghupathi Corporate governance of IT: a framework for development. Search on Bibsonomy Commun. ACM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Janice C. Sipior, Burke T. Ward Unintended invitation: organizational wi-fi use by external roaming users. Search on Bibsonomy Commun. ACM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Pamela Samuelson Software patents and the metaphysics of Section 271(f). Search on Bibsonomy Commun. ACM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Keqiang Wu, David J. Lilja, Haowei Bai An adaptive dual control framework for QoS design. Search on Bibsonomy Clust. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Adaptive dual control, Quality of service, Distributed system
13Jeffrey M. Voas, Keith W. Miller 0001 One in a Baker's Dozen: Debugging Debugging. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Jason D. Lee, Praveen Bhojwani, Rabi N. Mahapatra A Safety Analysis Framework for COTS Microprocessors in Safety-Critical Applications. Search on Bibsonomy HASE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Ross J. Anderson Position Statement in RFID S&P Panel: RFID and the Middleman. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Elisabeth M. Uijttenbroek, Michel C. A. Klein, Arno R. Lodder, Frank van Harmelen Case law retrieval by concept search and visualization. Search on Bibsonomy ICAIL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Christopher Dozier, Ravi Kondadadi, Khalid Al-Kofahi, Mark Chaudhary, Xi S. Guo Fast tagging of medical terms in legal text. Search on Bibsonomy ICAIL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF MetaMap, context disambiguation, medical litigation, medical terms, medical text, UMLS
13James Skene, Allan Skene, Jason Crampton, Wolfgang Emmerich The monitorability of service-level agreements for application-service provision. Search on Bibsonomy WOSP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SLA, ASP
13Slinger Jansen, Sjaak Brinkkemper, Anthony Finkelstein Providing Transparency In The Business Of Software: A Modeling Technique For Software Supply Networks. Search on Bibsonomy Virtual Enterprises and Collaborative Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Frank van der Linden 0001, Björn Lundell Open Source Software and Product Lines 2007. (PDF / PS) Search on Bibsonomy OSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Nic Suzor, Brian Fitzgerald 0002, Mark Perry 0001 Legal issues for free and open source software in government. (PDF / PS) Search on Bibsonomy OSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Juan R. Pimentel, Jason Paskvan Experimental Jitter Analysis in a FlexCAN Based Drive-by-Wire Automotive Application. Search on Bibsonomy DAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Étienne Baudrier, A. Riffaud A Method for Image Local-Difference Visualization. Search on Bibsonomy ICDAR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mark Huang, Andy C. Bavier, Larry L. Peterson PlanetFlow: maintaining accountability for network services. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Giovanni Sartor Fundamental legal concepts: A formal and teleological characterisation. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2006 DBLP  DOI  BibTeX  RDF normative positions, teleological reasoning
13Peter Holm Nielsen Utility maximization and risk minimization in life and pension insurance. Search on Bibsonomy Finance Stochastics The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Participating life insurance, dividends, bonus, optimization, investment strategies, risk minimization
13Steven Fraser 0001, Pär J. Ågerfalk, Jutta Eckstein, Timothy D. Korson, J. B. Rainsberger Open Source Software in an Agile World. Search on Bibsonomy XP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Cliff Changchun Zou, Ryan Cunningham Honeypot-Aware Advanced Botnet Construction and Maintenance. Search on Bibsonomy DSN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Yanjiang Yang, Robert H. Deng, Feng Bao 0001 Practical private data matching deterrent to spoofing attacks. Search on Bibsonomy CIKM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data privacy, secure multi-party computation
13Wei Jiang, Chris Clifton Transforming Semi-Honest Protocols to Ensure Accountability. Search on Bibsonomy ICDM Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Christine L. Borgman, Jillian C. Wallis, Noel Enyedy Building Digital Libraries for Scientific Data: An Exploratory Study of Data Practices in Habitat Ecology. Search on Bibsonomy ECDL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Vincent Naessens, Bart De Decker A Methodology for Designing Controlled Anonymous Applications. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Alain J. Martin Can Asynchronous Techniques Help the SoC Designer? Search on Bibsonomy VLSI-SoC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Klaus Lamberg Model-based testing of automotive electronics. Search on Bibsonomy DATE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Mingxi Wu, Chris Jermaine Outlier detection by sampling with accuracy guarantees. Search on Bibsonomy KDD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF active learning, outlier detection, ensemble method
13Teemu Pennanen Financial Optimization. Search on Bibsonomy OR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Errol A. Blake The management of access controls/biometrics in organizations. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IT spending, access control policy (ACP), cyber risk insurance, information technology (IT) information security (InfoSec), system specific policy (SSP), authentication, trust, policy, risk management, systems, return on investment (ROI)
13Anne M. Payton Data security breach: seeking a prescription for adequate remedy. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF data breach, data custodian, negligence, notification laws, identity theft, personal information, security breach
13Alan J. King, Olga Streltchenko, Yelena Yesha Using multi-agent simulation to understand trading dynamics of a derivatives market. Search on Bibsonomy Ann. Math. Artif. Intell. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Arjan Berkelaar, Joaquim A. S. Gromicho, Roy Kouwenberg, Shuzhong Zhang A Primal-Dual Decomposition Algorithm for Multistage Stochastic Convex Programming. Search on Bibsonomy Math. Program. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (1991) 90C15, 90C25, 90C51, 90C06
13Greg Goth A (P2) Perfect Storm? Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2005 DBLP  DOI  BibTeX  RDF legal aspects of computing, Internet, computer networks, peer-to-peer networks
13Judita Kruse, Clive Thomsen, Rolf Ernst, Thomas Volling, Thomas Spengler Introducing Flexible Quantity Contracts into Distributed SoC and Embedded System Design Processes. Search on Bibsonomy DATE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Jaeyoung Yang, Jinbeom Kang, Joongmin Choi A Focused Crawler with Document Segmentation. Search on Bibsonomy IDEAL The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Tobias Kiesling, Johannes Lüthi, Rachid El Abdouni Khayari Bias in parallel and distributed simulation systems. Search on Bibsonomy WSC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Preeti Bajaj, A. Dalavi, Sushant Dubey, Mrinal Mouza, Shalabh Batra, Sarika Bhojwani Soft Computing Based Real-Time Traffic Sign Recognition: A Design Approach. Search on Bibsonomy KES (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13David A. Miller, Sameer Tilak, Tony Fountain "Token" equilibria in sensor networks with multiple sponsors. Search on Bibsonomy CollaborateCom The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Georges De Moor Trends in Health Telematics: Electronic Health Records in an Intelligent and Communicating Environment. Search on Bibsonomy Universal Access in Health Telematics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Jos Lehmann, Joost Breuker, Bob Brouwer Causation in AI and Law. Search on Bibsonomy Artif. Intell. Law The full citation details ... 2004 DBLP  DOI  BibTeX  RDF causation in fact, legal responsibility, ontology, common sense
13Seung-Jong Park, Ramanuja Vedantham, Raghupathy Sivakumar, Ian F. Akyildiz A scalable approach for reliable downstream data delivery in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2004 DBLP  DOI  BibTeX  RDF sink-to-sensors reliability, wireless sensor networks, energy conservation, reliable transport protocols
13Wu-chun Feng A Multimodal Interface for the Immediate Transcription of Radiology Dictation. Search on Bibsonomy CBMS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Mike Wu, Brian Richards, Ronald Baecker Participatory design with individuals who have amnesia. Search on Bibsonomy PDC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF anterograde amnesia, cognitive prosthetics, memory aids, users with disabilities, participatory design, assistive technologies, personal digital assistants, user centred design
13Philippe Golle Reputable Mix Networks. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Cem Kaner, Holger M. Kienle, Scott R. Tilley 1st workshop on legal issues of documentation. Search on Bibsonomy SIGDOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF deep linking, link law, web, hypermedia, intellectual property, copyright, patents, trademarks, open content
13Amir Herzberg Controlling Spam by Secure Internet Content Selection. Search on Bibsonomy SCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
13Gilbert W. Laware, Andrew J. Walters Real world problems bringing life to course content. Search on Bibsonomy SIGITE Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF problem-based, problem-centered, project management, pedagogy, technology, experiential learning
13Duncan A. Buell, Ravi S. Sandhu Guest Editors' Introduction: Identity Management. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Anna Shubina, Sean W. Smith Using caching for browsing anonymity. Search on Bibsonomy SIGecom Exch. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF caching proxies, security, privacy, anonymity, human factors, legal aspects
13Xiao Han 0007, Chenyang Xu 0001, Jerry L. Prince A Topology Preserving Level Set Method for Geometric Deformable Models. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Geometric deformable model, active contours, level set method, digital topology, topology preservation, simple points, topological constraint
13Michael Lesk Copyright Enforcement or Censorship: New Uses for the DMCA? Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13John J. Benedetto, Matthew Fickus Finite Normalized Tight Frames. Search on Bibsonomy Adv. Comput. Math. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF tight frames, potential energy, equidistribution, equilibrium, Lagrange multipliers
13Fred von Lohmann Peer-to-Peer File Sharing and Copyright Law: A Primer for Developers. Search on Bibsonomy IPTPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Katy Whitelaw Why make websites accessible?: and how? Search on Bibsonomy SIGUCCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF internet, accessibility, web design, universal design
13Hans Moritsch, Georg Ch. Pflug Using a Distributed Active Tree in Java for the Parallel and Distributed Implementation of a Nested Optimization Algorithm. Search on Bibsonomy ICPP Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
13Deirdre K. Mulligan, John Han, Aaron J. Burstein How DRM-based content delivery systems disrupt expectations of "personal use". Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF personal use, privacy, access control, digital rights management, content distribution, copyright, fair use
13Jim Isaak Web Site Engineering Best Practice Standards (IEEE 2001). Search on Bibsonomy WSE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Pablo Noriega, Carles Sierra Electronic Institutions: Future Trends and Challenges. Search on Bibsonomy CIA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Donghua Xu, Chenghuai Lu, André L. M. dos Santos Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
13Munindar P. Singh Privacy and Open Services. Search on Bibsonomy IEEE Internet Comput. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Robert A. Martin Managing Vulnerabilities in Networked Systems. Search on Bibsonomy Computer The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Alan Harbitter, Daniel A. Menascé The performance of public key-enabled kerberos authentication in mobile computing applications. Search on Bibsonomy CCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF mobile computing, authentication, performance modeling, public key cryptography, proxy servers, kerberos
13Xiao Han 0007, Chenyang Xu 0001, Jerry L. Prince A Topology Preserving Deformable Model Using Level Sets. Search on Bibsonomy CVPR (2) The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Kikuko Harada, Hiroshi Hoshino Feasibility Study of Digital Community through Virtual Enterprise Network. Search on Bibsonomy Digital Cities The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Thomas Erickson, Susan Herring Persistent Conversation: A Dialog between Research and Design - Minitrack Introduction. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Ross J. Anderson Why Information Security is Hard-An Economic Perspective. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
13Jeffrey M. Voas Developing a Usage-Based Software Certification Process. Search on Bibsonomy Computer The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Jonathan K. Millen, Rebecca N. Wright Reasoning about Trust and Insurance in a Public Key Infrastructure. Search on Bibsonomy CSFW The full citation details ... 2000 DBLP  DOI  BibTeX  RDF cryptography, trust, logic, certificate, public key infrastructure, insurance
13Virgil D. Gligor Review and Revocation of Access Privileges Distributed with PKI Certificates (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Shingo Ogawa Building of trust evaluation model based on the failure prediction. Search on Bibsonomy KES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Erich J. Neuhold Business to Business Electronic Commerce at Work. Search on Bibsonomy HICSS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
13Thorsten Bohnenberger, Klaus Fischer 0001, Christian Gerber Agents in Manufacturing: Online Scheduling and Production Plant Configuration. Search on Bibsonomy ASA/MA The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
13Bas A. de Mol, Floor Koornneef "Profit by Safety" or Quackery in Biomedical Information Technology? Search on Bibsonomy SAFECOMP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13Arnd Weber See What You Sign: Secure Implementations of Digital Signatures. Search on Bibsonomy IS&N The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
13C. Hawkins, Margaret Ross 0001, Geoff Staples Quality issues of the Year 2000 problem. Search on Bibsonomy Softw. Qual. J. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Tick IT, ISO9000, year 2000
13Rajesh K. Gupta 0001, Yervant Zorian Introducing Core-Based System Design. Search on Bibsonomy IEEE Des. Test Comput. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
13Narayanan Krishnakumar, Arthur J. Bernstein Bounded Ignorance: A Technique for Increasing Concurrency in a Replicated System. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF concurrency control, replication, integrity constraints, reachability analysis, serializability
13Nancy J. Wahl Responsibility for unreliable software. Search on Bibsonomy Ethics in Computer Age The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
13David G. Kay A course in computer law. Search on Bibsonomy SIGCSE The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
13Julie S. McDuffee HELPing writer and product team communication through online document design. Search on Bibsonomy SIGDOC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
Displaying result #501 - #600 of 606 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license