The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for compromise with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1979 (16) 1980-1988 (17) 1989-1990 (18) 1991-1993 (24) 1994-1995 (31) 1996 (22) 1997 (30) 1998 (18) 1999 (35) 2000 (48) 2001 (69) 2002 (79) 2003 (96) 2004 (153) 2005 (195) 2006 (226) 2007 (236) 2008 (251) 2009 (170) 2010 (41) 2011 (28) 2012 (24) 2013 (32) 2014 (25) 2015 (24) 2016 (30) 2017 (29) 2018 (41) 2019 (37) 2020 (41) 2021 (47) 2022 (72) 2023 (66) 2024 (8)
Publication types (Num. hits)
article(714) book(1) data(1) incollection(13) inproceedings(1538) phdthesis(12)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1926 occurrences of 1317 keywords

Results
Found 2279 publication records. Showing 2279 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
16Hong Yan 0002, Quanling Wei Determining compromise weights for group decision making. Search on Bibsonomy J. Oper. Res. Soc. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Ozhand Ganjavi, Belaïd Aouni, Z. Wang Technical note on balanced solutions in goal programming, compromise programming and reference point method. Search on Bibsonomy J. Oper. Res. Soc. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Gustavo Bergantiños, Jordi Massó The Chi-compromise value for non-transferable utility games. Search on Bibsonomy Math. Methods Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Jaroslav Ramík, Milan Vlach Pareto-optimality of compromise decisions. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16Mathieu S. Capcarrère Evolution Of Asynchronous Cellular Automata: Finding The Good Compromise. Search on Bibsonomy GECCO The full citation details ... 2002 DBLP  BibTeX  RDF
16Joshua D. Guttman Key Compromise, Strand Spaces, and the Authentication Tests. Search on Bibsonomy MFPS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Wlodzimierz Ogryczak Comments on Romero C, Tamiz M and Jones DF (1998). Goal programming, compromise programming and reference point method formulations: linkages and utility interpretations. Search on Bibsonomy J. Oper. Res. Soc. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16José M. Peña 0001, José Antonio Lozano 0001, Pedro Larrañaga Performance evaluation of compromise conditional Gaussian networks for data clustering. Search on Bibsonomy Int. J. Approx. Reason. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Yusen Xia, Shouyang Wang, Xiaotie Deng A compromise solution to mutual funds portfolio selection with transaction costs. Search on Bibsonomy Eur. J. Oper. Res. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Grzegorz Czajkowski, Laurent Daynès Multitasking without Compromise: A Virtual Machine Evolution. Search on Bibsonomy OOPSLA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
16Quanling Wei, Hong Yan 0002, Jian Ma 0008, Zhiping Fan A compromise weight for multi-criteria group decision making with individual preference. Search on Bibsonomy J. Oper. Res. Soc. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Marilyn M. Helms, Lawrence P. Ettkin, Daniel J. Morris Viewpoint: The Risk of Information Compromise and Approaches to Prevention. Search on Bibsonomy J. Strateg. Inf. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Joaquín Sánchez-Soriano A note on compromise values. Search on Bibsonomy Math. Methods Oper. Res. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Fernando Blasco, Eduardo Cuchillo-Ibáñez, Manuel Alonso Morón, Carlos Romero Computing compromise sets in polyhedral framework. Search on Bibsonomy Appl. Math. Lett. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Marilyn M. Helms, Lawrence P. Ettkin, Daniel J. Morris Shielding your company against information compromise. Search on Bibsonomy Inf. Manag. Comput. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Michael J. Bender, Slobodan P. Simonovic A fuzzy compromise approach to water resource systems planning under uncertainty. Search on Bibsonomy Fuzzy Sets Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Pengjun Pei, Guohua Cui, Kun Peng On a Session Key Compromise Problem in [KC95] protocol. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Manel Martínez-Ramón, José-Luis Sancho-Gómez, Antonio Artés-Rodríguez, Aníbal R. Figueiras-Vidal Adaptive combination of LMS and logistic-linear equalizers to improve the speed-performance compromise. Search on Bibsonomy EUSIPCO The full citation details ... 2000 DBLP  BibTeX  RDF
16Ni-Bin Chang, S. C. Yeh, G. C. Wu Stability analysis of grey compromise programming and its application to watershed land-use planning. Search on Bibsonomy Int. J. Syst. Sci. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Mike Just, Paul C. van Oorschot Addressing the Problem of Undetected Signature Key Compromise. Search on Bibsonomy NDSS The full citation details ... 1999 DBLP  BibTeX  RDF
16Nathaniel S. Borenstein Utopia, Oblivion, or Muddled Compromise ? Fantasies and Realities about the Coming Global Society. Search on Bibsonomy WebNet The full citation details ... 1999 DBLP  BibTeX  RDF
16Carlos Romero, Mehrdad Tamiz, Dylan F. Jones Goal programming, compromise programming and reference point method formulations: linkages and utility interpretations. Search on Bibsonomy J. Oper. Res. Soc. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Hee-Soo Hwang Control strategy for optimal compromise between trip time and energy consumption in a high-speed railway. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Marwan Krunz, Armand M. Makowski Modeling video traffic using M/G/∞ input processes: a compromise between Markovian and LRD models. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
16Sara Reese Hedberg HP's International Cryptography Framework: Compromise or Threat? Search on Bibsonomy Computer The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Eugene C. Freuder, Peggy S. Eaton Compromise Strategies for Constraint Agents. Search on Bibsonomy AAAI Workshop: Constraints & Agents The full citation details ... 1997 DBLP  BibTeX  RDF
16Jim Burr, Anantha P. Chandrakasan, Fari Assaderaghi, Francky Catthoor, Frank Fox, Dave Greenhill, Deo Singh, Jim Sproch Low power design without compromise (panel). Search on Bibsonomy ISLPED The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16Ljiljana Brankovic, Peter Horák, Mirka Miller, Graham Wrightson Usability of Compromise-Free Statistical Databases Search on Bibsonomy SSDBM The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
16R. Clark, Clifford Grossner, Thiruvengadam Radhakrishnan Consensus and Compromise: Planning in Cooperating Agents. Search on Bibsonomy Int. J. Cooperative Inf. Syst. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Heeseok Lee, Yong Shi 0001, Sufi M. Nazem Supporting rural telecommunications: A compromise solutions approach. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Steven W. Usselman Fostering a Capacity for Compromise: Business, Government, and the Stages of Innovation in American Computing. Search on Bibsonomy IEEE Ann. Hist. Comput. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Gilad Zlotkin, Jeffrey S. Rosenschein Compromise in Negotiation: Exploiting Worth Functions over States. Search on Bibsonomy Artif. Intell. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
16Ljiljana Brankovic, Mirka Miller, Jozef Sirán Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise. Search on Bibsonomy Australasian Database Conference The full citation details ... 1996 DBLP  BibTeX  RDF
16Boualem Benatallah Gestion d'un évolution du schéma d'une base de données à objets: une approche par compromis. (Object-Oriented Database Schema Evolution: A compromise). Search on Bibsonomy 1996   RDF
16Dennis R. Bahler, Catherine Dupont, James Bowen Mixed quantitative/qualitative method for evaluating compromise solutions to conflicts in collaborative design. Search on Bibsonomy Artif. Intell. Eng. Des. Anal. Manuf. The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
16Heeseok Lee, Yong Shi 0001, Justin Stolen Allocating data files over a wide area network: Goal setting and compromise design. Search on Bibsonomy Inf. Manag. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
16Shimon Schocken, Robert A. Hummel Compromise Reaching Mechanisms in Multi-Group/Multi-Player Negotiation Processes. Search on Bibsonomy HICSS (4) The full citation details ... 1994 DBLP  BibTeX  RDF
16David Kahn Compromise of Naval Code F-3. Search on Bibsonomy Cryptologia The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
16Enrique Ballestero, Carlos Romero Weighting in compromise programming: A theorem on shadow prices. Search on Bibsonomy Oper. Res. Lett. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
16Steven M. Bellovin, Michael Merritt Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
16Subir Bhattacharya, Amitava Bagchi QuickGame: A Compromise Between Pure Depth-first and Pure Best-first Game Tree Search Strategies. Search on Bibsonomy IWAR The full citation details ... 1992 DBLP  BibTeX  RDF
16Enrique Ballestero, Carlos Romero A theorem connecting utility function optimization and compromise programming. Search on Bibsonomy Oper. Res. Lett. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
16John R. Current, Charles S. Revelle, Jared L. Cohon An interactive approach to identify the best compromise solution for two objective shortest path problems. Search on Bibsonomy Comput. Oper. Res. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
16Philippe Jégou Cyclic-Clustering: A Compromise between Tree-Clustering and Cycle-Cutset Method for Improving Search Efficiency. Search on Bibsonomy ECAI The full citation details ... 1990 DBLP  BibTeX  RDF
16Elizabeth A. Unger, Sallie Keller-McNulty, Paul Connelly Natural change in dynamic databases as a deterrent to compromise by trackers. Search on Bibsonomy ACSAC The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
16Mirka Miller, Jennifer Seberry Relative Compromise of Statistical Databases. Search on Bibsonomy Aust. Comput. J. The full citation details ... 1989 DBLP  BibTeX  RDF
16Katia P. Sycara Multiagent Compromise via Negotiation. Search on Bibsonomy Distributed Artificial Intelligence The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
16Wojtek Michalowski Use of the displaced worst compromise in interactive multiobjective programming. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
16Belden Menkus Understanding password compromise. Search on Bibsonomy Comput. Secur. The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
16Elizabeth A. Unger, Charles M. Hassett, Constanza Castro IS and MIS: a compromise? Search on Bibsonomy SIGCSE The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
16Michael A. Palley Security of Statistical Databases - Compromise through Attribute Correlational Modeling. Search on Bibsonomy ICDE The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
16Ernst L. Leiss Randomizing, A Practical Method for Protecting Statistical Databases Against Compromise. Search on Bibsonomy VLDB The full citation details ... 1982 DBLP  BibTeX  RDF
16Dorothy E. Denning Restriciting Queries that Might Lead to Compromise. Search on Bibsonomy S&P The full citation details ... 1981 DBLP  DOI  BibTeX  RDF
16Rolf Wehrmann, Juergen Van Der List, Peter Meissner A Noise-Insensitive Compromise Gradient Method for the Adjustment of Adaptive Echo Cancellers. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 1980 DBLP  DOI  BibTeX  RDF
16Francis R. Magee Jr. A Comparison of Compromise Viterbi Algorithm and Standard Equalization Techniques Over Band-Limited Channels. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 1975 DBLP  DOI  BibTeX  RDF
16Milan Zelany A concept of compromise solutions and the method of the displaced ideal. Search on Bibsonomy Comput. Oper. Res. The full citation details ... 1974 DBLP  DOI  BibTeX  RDF
16William H. Burge An Analysis of the Compromise Merge Sorting Techniques. Search on Bibsonomy IFIP Congress (1) The full citation details ... 1971 DBLP  BibTeX  RDF
13Dov M. Gabbay, Andrzej Szalas Voting by Eliminating Quantifiers. Search on Bibsonomy Stud Logica The full citation details ... 2009 DBLP  DOI  BibTeX  RDF voting, quantifier elimination, social choice
13Damien Douxchamps, Kunihiro Chihara High-Accuracy and Robust Localization of Large Control Markers for Geometric Camera Calibration. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Mark W. Storer, Kevin M. Greenan, Ethan L. Miller, Kaladhar Voruganti POTSHARDS - a secure, recoverable, long-term archival storage system. Search on Bibsonomy ACM Trans. Storage The full citation details ... 2009 DBLP  DOI  BibTeX  RDF approximate pointers, secret splitting, Archival storage
13Paul A. Karger Securing virtual machine monitors: what is needed? Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF virtual machine monitors, hypervisors, security kernels
13Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas P2F: A User-Centric Privacy Protection Framework. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Joni Hahkala, John White, Ákos Frohner Proxy Restrictions for Grid Usage. Search on Bibsonomy GPC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Abhishek Parakh, Subhash C. Kak A Distributed Data Storage Scheme for Sensor Networks. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF sensor networks, Distributed data storage
13Wenting Jin, Jing Xu 0002 An Efficient and Provably Secure Cross-Realm Client-to-Client Password-Authenticated Key Agreement Protocol with Smart Cards. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Password-authenticated key agreement, Client-to-client, Smart cards, Provable security, Cross-realm
13Shubham Agrawal, Bijaya Ketan Panigrahi, Manoj Kumar Tiwari Multiobjective Particle Swarm Algorithm With Fuzzy Clustering for Electrical Power Dispatch. Search on Bibsonomy IEEE Trans. Evol. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Haojin Zhu, Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen SLAB: A secure localized authentication and billing scheme for wireless mesh networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ellen J. Bass, Amy R. Pritchett Human-Automated Judge Learning: A Methodology for Examining Human Interaction With Information Analysis Automation. Search on Bibsonomy IEEE Trans. Syst. Man Cybern. Part A The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Hui Song, Sencun Zhu, Wensheng Zhang 0001, Guohong Cao Least privilege and privilege deprivation: Toward tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF sensor networks, key management, pairwise key, Least privilege, key revocation
13Anh Nguyen-Tuong, David Evans 0001, John C. Knight, Benjamin Cox, Jack W. Davidson Security through redundant data diversity. Search on Bibsonomy DSN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Alfred Menezes, Berkant Ustaoglu Security arguments for the UM key agreement protocol in the NIST SP 800-56A standard. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF NIST SP 800-56A, provable security, security models, key agreement protocols
13Shouhuai Xu, Xiaohu Li, T. Paul Parker Exploiting social networks for threshold signing: attack-resilience vs. availability. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF attack-resilience, threshold signing, social networks, availability, threshold cryptography
13Di Ma, Gene Tsudik DISH: Distributed Self-Healing. Search on Bibsonomy SSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Sushmita Ruj, Bimal K. Roy Key Predistribution Schemes Using Codes in Wireless Sensor Networks. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Scalability, Codes, Reed Solomon code
13Tamara Ulrich, Dimo Brockhoff, Eckart Zitzler Pattern identification in pareto-set approximations. Search on Bibsonomy GECCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF heuristics, decision making, multi-objective optimization, representations
13Patrick Tague, David Slater, Jason Rogers, Radha Poovendran Vulnerability of Network Traffic under Node Capture Attacks Using Circuit Theoretic Analysis. Search on Bibsonomy INFOCOM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Brett Stone-Gross, David Sigal, Rob Cohn, John Morse, Kevin C. Almeroth, Christopher Kruegel VeriKey: A Dynamic Certificate Verification System for Public Key Exchanges. Search on Bibsonomy DIMVA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Christos Xenakis, Danae Apostolopoulou, Angeliki Panou, Ioannis Stavrakakis A Qualitative Risk Analysis for the GPRS Technology. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13David J. Hand, Wojtek J. Krzanowski, Martin Crowder Optimal predictive partitioning. Search on Bibsonomy Stat. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Alternating least squares, Criterion optimisation, Transfer algorithm, Clustering, Discrimination, Error rates
13Moritz Steiner, Taoufik En-Najjary, Ernst W. Biersack Exploiting KAD: possible uses and misuses. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed hash table, peer-to-peer system, sybil attack
13Pascal Volino, Pierre Davy, Ugo Bonanni, Christiane Luible, Nadia Magnenat-Thalmann, Mailis Mäkinen, Harriet Meinander From measured physical parameters to the haptic feeling of fabric. Search on Bibsonomy Vis. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Real-time, Haptics, Force feedback, Cloth-simulation, Elastic deformation
13A. C. Murillo, José Jesús Guerrero, Carlos Sagüés SURF features for efficient robot localization with omnidirectional images. Search on Bibsonomy ICRA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Nicolas Szilas BEcool: Towards an Author Friendly Behaviour Engine. Search on Bibsonomy International Conference on Virtual Storytelling The full citation details ... 2007 DBLP  DOI  BibTeX  RDF behaviour engine, authoring, authorability, expressiveness, Virtual characters, interactive drama
13Edzus Zeiris, Maris Ziema E-Service Architecture Selection Based on Multi-criteria Optimization. Search on Bibsonomy PROFES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Farooq Anjum Location dependent key management in sensor networks without using deployment knowledge. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Adam J. Aviv, Michael E. Locasto, Shaya Potter, Angelos D. Keromytis SSARES: Secure Searchable Automated Remote Email Storage. Search on Bibsonomy ACSAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Philip D. MacKenzie, Thomas Shrimpton, Markus Jakobsson Threshold Password-Authenticated Key Exchange. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Key exchange, Password authentication, Dictionary attack, Threshold cryptosystems
13Donald E. Grierson Welfare Economics Applied to Design Engineering. Search on Bibsonomy EG-ICE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multi-criteria design engineering, multi-goods welfare economics, Pareto optimization
13Richard Sharp, James Scott, Alastair R. Beresford Secure Mobile Computing Via Public Terminals. Search on Bibsonomy Pervasive The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Debin Gao, Michael K. Reiter, Dawn Xiaodong Song Behavioral Distance Measurement Using Hidden Markov Models. Search on Bibsonomy RAID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF behavioral distance, intrusion detection, anomaly detection, system call
13Jason E. Holt Logcrypt: forward security and public verification for secure audit logs. Search on Bibsonomy ACSW The full citation details ... 2006 DBLP  BibTeX  RDF
13Md. Abdul Hamid, Mustafizur Rahman 0001, Choong Seon Hong Energy Conserving Security Mechanism for Wireless Sensor Network. Search on Bibsonomy ICCSA (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13T. Paul Parker, Shouhuai Xu Towards Understanding the (In)security of Networked Systems under Towards Understanding the (In)security of Networked Systems under Topology-Directed Stealthy Attacks. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13William B. Levy, A. Sanyal, Xiangbao Wu, Paul Rodríguez, David W. Sullivan The formation of neural codes in the hippocampus: trace conditioning as a prototypical paradigm for studying the random recoding hypothesis. Search on Bibsonomy Biol. Cybern. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Keith Braithwaite, Tim Joyce XP Expanded: Distributed Extreme Programming. Search on Bibsonomy XP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF distributed, XP, Extreme Programming, outsourcing, Agile, Scrum, multi-site
13Gwendoline Blanchet, Lionel Moisan, Bernard Rougé A linear prefilter for image sampling with ringing artifact control. Search on Bibsonomy ICIP (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Shuo Chen 0001, Jun Xu 0003, Nithin Nakka, Zbigniew Kalbarczyk, Ravishankar K. Iyer Defeating Memory Corruption Attacks via Pointer Taintedness Detection. Search on Bibsonomy DSN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Wensheng Zhang 0001, Hui Song, Sencun Zhu, Guohong Cao Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF privilege, wireless sensor networks, mobile sinks
13Rhys Hill, Anton van den Hengel Experiences with Simulated Robot Soccer as a Teaching Tool. Search on Bibsonomy ICITA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Rob Delicata, Steve A. Schneider Temporal Rank Functions for Forward Secrecy. Search on Bibsonomy CSFW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #701 - #800 of 2279 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license