The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "AISC"( http://dblp.L3S.de/Venues/AISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/aisc

Publication years (Num. hits)
1998 (25) 2000 (20) 2001-2002 (32) 2004 (26) 2006 (23) 2008 (16) 2009-2010 (24) 2011-2012 (22) 2013-2014 (38) 2015-2018 (31)
Publication types (Num. hits)
inproceedings(242) proceedings(15)
Venues (Conferences, Journals, ...)
AISC(257)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 68 occurrences of 64 keywords

Results
Found 257 publication records. Showing 257 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sólrún Halla Einarsdóttir, Moa Johansson, Johannes Åman Pohjola Into the Infinite - Theory Exploration for Coinduction. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Zoltán Kovács Discovering Geometry Theorems in Regular Polygons. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yu Wang, Wenyuan Wu, Bican Xia Early Ending in Homotopy Path-Tracking for Real Roots. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Alan Bundy, Kwabena Nuamah, Christopher Lucas Automated Reasoning in the Age of the Internet. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dongchen Jiang, Xiaoyu Chen, Xin Yang A Chinese New Word Detection Approach Based on Independence Testing. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xiaoyu Chen, Haotian Shuai, Dongming Wang, Jing Yang : A Linear Algebra Textbook System. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Martin Strecker Deciding Extended Modal Logics by Combining State Space Generation and SAT Solving. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pedro Quaresma Automatic Deduction in an AI Geometry Book. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1James H. Davenport Methodologies of Symbolic Computation. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Changbo Chen, Wenyuan Wu Revealing Bistability in Neurological Disorder Models By Solving Parametric Polynomial Systems Geometrically. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Tianshu Song, Feng Zhu 0005, Ke Xu 0001 Specialty-Aware Task Assignment in Spatial Crowdsourcing. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1David Braun, Nicolas Magaud, Pascal Schreck Formalizing Some "Small" Finite Models of Projective Geometry in Coq. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jacques D. Fleuriot, Dongming Wang, Jacques Calmet (eds.) Artificial Intelligence and Symbolic Computation - 13th International Conference, AISC 2018, Suzhou, China, September 16-19, 2018, Proceedings Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Ilias S. Kotsireas, Jing Yang Autocorrelation via Runs. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Francisco Botana, Zoltán Kovács, Tomás Recio Towards an Automated Geometer. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Pengcheng Peng, Chenqi Mou, Wei-Tek Tsai Game-Theoretic Analysis on the Number of Participants in the Software Crowdsourcing Contest. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shaofan Liu, Jie Luo FMUS2: An Efficient Algorithm to Compute Minimal Unsatisfiable Subsets. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Su, Chuan Cai, Jinzhao Wu The Accessibility of Mathematical Formulas for the Visually Impaired in China. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Fadoua Ghourabi, Kazuko Takahashi What Does Qualitative Spatial Knowledge Tell About Origami Geometric Folds? Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jose Divasón, Jesús Aransay A Formal Proof of the Computation of Hermite Normal Form in a General Setting. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yaqing Jiang, Petros Papapanagiotou, Jacques D. Fleuriot Machine Learning for Inductive Theorem Proving. Search on Bibsonomy AISC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Toby J. Richer, Grant Neale, Grant Osborne On the E ectiveness of Virtualisation Assisted View Comparison for Rootkit Detection. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Adrian Herrera, Ben Cheney JMD: A Hybrid Approach for Detecting Java Malware. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Binbin Di, Leonie Simpson, Harry Bartlett, Ed Dawson, Kenneth Koon-Ho Wong Correcting flaws in Mitchell's analysis of EPBC. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Deepa Mani, Alireza Heravi, Kim-Kwang Raymond Choo, Sameera Mubarak Information Privacy Concerns of Real Estate Customers and Information Security in the Real Estate Industry: an Empirical Analysis. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1David Myers, Ernest Foo, Kenneth Radke Internet-wide Scanning Taxonomy and Framework. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1John Shield, Bradley D. Hopkins, Mark R. Beaumont, Chris J. North Hardware Trojans - A Systemic Threat. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan Hypervisor-based Security Architecture to Protect Web Applications. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Tristan Newby, Duncan A. Grove, Alex Murray, Chris A. Owen, Jim McCarthy, Chris J. North Annex: A Middleware for Constructing High-Assurance Software Systems. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Ian Welch, Xun Yi (eds.) 13th Australasian Information Security Conference, AISC 2015, Sydney, Australia, January 2015 Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Nicholas R. Rodofile, Kenneth Radke, Ernest Foo Real-Time and Interactive Attacks on DNP3 Critical Infrastructure Using Scapy. Search on Bibsonomy AISC The full citation details ... 2015 DBLP  BibTeX  RDF
1Salvador Lucas Using Representation Theorems for Proving Polynomials Non-negative. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Lubjana Beshaj, Tony Shaska Decomposition of Some Jacobian Varieties of Dimension 3. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Shutaro Inoue, Yosuke Sato A Mathematical Hierarchy of Sudoku Puzzles and Its Computation by Boolean Gröbner Bases. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1David J. Jeffrey Multivalued Elementary Functions in Computer-Algebra Systems. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Juana Sendra, David Gómez 0002, Valerio Morán Rational Conchoid and Offset Constructions: Algorithms and Implementation. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Maricarmen Martínez, Ulf Krumnack, Alan Smaill, Tarek Richard Besold, Ahmed M. H. Abdel-Fattah, Martin Schmidt 0002, Helmar Gust, Kai-Uwe Kühnberger, Markus Guhe, Alison Pease Algorithmic Aspects of Theory Blending. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Uwe Egly, Martin Kronegger, Florian Lonsing, Andreas Pfandler Conformant Planning as a Case Study of Incremental QBF Solving. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Oumaima Boussarsar, Imen Boukhris, Zied Elouedi A Direct Propagation Method in Singly Connected Causal Belief Networks with Conditional Distributions for all Causes. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Eugenio Roanes-Lozano, Antonio Hernando A Simple GUI for Developing Applications That Use Mathematical Software Systems. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1José-Luis Ruiz-Reina Proving and Computing: Applying Automated Reasoning to the Verification of Symbolic Computation Systems (Invited Talk). Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Frédéric Lardeux, Eric Monfroy From Declarative Set Constraint Models to "Good" SAT Instances. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Volker Sorge Combining Systems for Mathematical Creativity (Invited Talk). Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Amira Essaid, Arnaud Martin, Grégory Smits, Boutheina Ben Yaghlane A Distance-Based Decision in the Credal Level. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Salvador Lucas, José Meseguer Models for Logics and Conditional Constraints in Automated Proofs of Termination. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Jesús Aransay-Azofra, Jose Divasón, Jónathan Heras, Laureano Lambán, María Vico Pascual, Angel Luis Rubio, Julio Rubio Obtaining an ACL2 Specification from an Isabelle/HOL Theory. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Gonzalo A. Aranda-Corral, Jacques Calmet, Francisco J. Martín-Mateos (eds.) Artificial Intelligence and Symbolic Computation - 12th International Conference, AISC 2014, Seville, Spain, December 11-13, 2014. Proceedings Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carlos Gamallo-Chicano, Eugenio Roanes-Lozano, Carlos Gamallo-Amat A Rule-Based Expert System for Vaginal Cytology Diagnosis. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Belaïd Benhamou Dynamic Symmetry Breaking in Itemset Mining. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Janaka Seneviratne, Udaya Parampalli, Lars Kulik An Authorised Pseudonym System for Privacy Preserving Location Proof Architectures. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Kamini Bajaj, Josef Pieprzyk A Case Study of User-Level Spam Filtering. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong Weak key-IV Pairs in the A5/1 Stream Cipher. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Sui-Guan Teo, Kenneth Koon-Ho Wong, Harry Bartlett, Leonie Simpson, Ed Dawson Algebraic analysis of Trivium-like ciphers (Poster). Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Dilshan Jayarathna, Udaya Kiran Tupakula, Vijay Varadharajan Hypervisor-based Security Architecture for Validating DNS Services (Poster). Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Masood Mansoori, Ian Welch, Qiang Fu YALIH, Yet Another Low Interaction Honeyclient. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Nishchal Kush, Ejaz Ahmed, Mark Branagan, Ernest Foo Poisoned GOOSE: Exploiting the GOOSE Protocol. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Sajal Bhatia, Nishchal Kush, Chris I. Djamaludin, Ayodeji J. Akande, Ernest Foo Practical Modbus Flooding Attack and Detection. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Kenneth Radke, Colin Boyd, Juanma González Nieto, Mark Manulis, Douglas Stebila Formalising Human Recognition: a Fundamental Building Block for Security Proofs. Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Udaya Parampalli, Ian Welch (eds.) Twelfth Australasian Information Security Conference, AISC 2014, Auckland, New Zealand, January 2014 Search on Bibsonomy AISC The full citation details ... 2014 DBLP  BibTeX  RDF
1Ali Al-Hamdan, Harry Bartlett, Ed Dawson, Leonie Simpson, Kenneth Koon-Ho Wong Slid Pairs in the Initialisation of the A5/1 Stream Cipher. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Duncan A. Grove, Alex Murray, Damien Gerhardy, Benjamin Turnbull, Troy Tobin, Christopher Moir An Overview of the Parallax BattleMind v1.5 for Computer Network Defence. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Tansu Alpcan A Decision and Game Theoretic Approach to Networked System Security with Applications to Power Grid (Invited Lecture). Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Russell Paulet, Xun Yi Cryptanalysis of Brenner et al.'s Somewhat Homomorphic Encryption Scheme. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Hadi Mohammadzadeh, Masood Mansoori, Ian Welch Evaluation of Fingerprinting Techniques and a Windows-based Dynamic Honeypot. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Thomas H. Morris, Rayford B. Vaughn, Elena Sitnikova Advances in the Protection of Critical Infrastructure by Improvement in Industrial Control System Security. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk Anatomy of Drive-by Download Attack. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Aswami Ariffin, Kim-Kwang Raymond Choo, Jill Slay Digital Camcorder Forensics. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Clark D. Thomborson, Udaya Parampalli (eds.) Eleventh Australasian Information Security Conference, AISC 2013, Adelaide, Australia, February 2013 Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Maryam Rajabzadeh Asaar, Ali Vardasbi, Mahmoud Salmasizadeh Non-Delegatable Strong Designated Verifier Signature Using a Trusted Third Party without Pairings. Search on Bibsonomy AISC The full citation details ... 2013 DBLP  BibTeX  RDF
1Christophe Hauser, Frédéric Tronel, Jason Reid, Colin J. Fidge A taint marking approach to confidentiality violation detection. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Younes Seifi, Suriadi Suriadi, Ernest Foo, Colin Boyd Analysis of Object-Specific Authorization Protocol (OSAP) using Coloured Petri Nets. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Josef Pieprzyk, Clark D. Thomborson (eds.) Tenth Australasian Information Security Conference, AISC 2012, Melbourne, Australia, January 2012 Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Kenneth Radke, Colin Boyd, Juan Manuel González Nieto, Margot Brereton Towards a Secure Human-and-Computer Mutual Authentication Protocol. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong State convergence in the initialisation of the Sfinks stream cipher. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Mohammad Ali Orumiehchiha, Josef Pieprzyk, Ron Steinfeld Cryptanalysis of RC4-Based Hash Function. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Christopher Doble, Colin J. Fidge, Diane Corney Data Flow Analysis of Embedded Program Expressions. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Vorapong Suppakitpaisarn, Masato Edahiro, Hiroshi Imai Fast Elliptic Curve Cryptography Using Minimal Weight Conversion of d Integers. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Chris Mills, Colin J. Fidge, Diane Corney Tool-Supported Dataflow Analysis of a Security-Critical Embedded Device. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Peter Hyun-Jeen Lee, Udaya Parampalli, Shivaramakrishnan Narayan E cient Identity-based Signcryption without Random Oracles. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Kaleb Lee, Juan Manuel González Nieto, Colin Boyd Improving the Efficiency of RFID Authentication with Pre-Computation. Search on Bibsonomy AISC The full citation details ... 2012 DBLP  BibTeX  RDF
1Günther Lackner, Peter Teufl IEEE 802.11 Chipset Fingerprinting by the Measurement of Timing Characteristics. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Andrea Agnesse, Marco Pedicini Cube Attack in Finite Fields of Higher Order. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Scott Campbell, Steve Chan, Jason Lee Detection of Fast Flux Service Networks. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Md. Golam Kaosar, Russell Paulet, Xun Yi Secure Two-Party Association Rule Mining. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Colin Boyd, Josef Pieprzyk (eds.) Ninth Australasian Information Security Conference, AISC 2011, Perth, Australia, January 2011 Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Yun Bai 0001, Khaled Khan A Modal Logic for Information System Security. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Ben Palmer, Kris Bubendorfer, Ian Welch Development and Evaluation of a Secure, Privacy Preserving Combinatorial Auction. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Van Lam Le, Ian Welch, Xiaoying Gao, Peter Komisarczuk Identification of Potential Malicious Web Pages. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Toru Nakamura, Shunsuke Inenaga, Kensuke Baba, Daisuke Ikeda, Hiroto Yasuura An Anonymous Authentication Protocol with Single-database PIR. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Malcolm Corney, George M. Mohay, Andrew J. Clark Detection of Anomalies from User Profiles Generated from System Logs. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Thorsten Ries, Radu State, Andriy Panchenko 0001 Comparison of Low-Latency Anonymous Communication Systems - Practical Usage and Performance. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Kimmo Halunen, Juha Kortelainen, Tuomas Kortelainen Combinatorial Multicollision Attacks on Generalized Iterated Hash Functions. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Simon R. Lang, Neville I. Williams Impeding CAPTCHA Breakers with Visual Decryption. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Farzad Salim, Jason Reid, Ed Dawson An Administrative Model for UCON ABC. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Salahuddin Alfawaz, Karen Nelson, Kavoos Mohannak Information security culture: A Behaviour Compliance Conceptual Framework. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Georg Lippold, Juanma González Nieto Certificateless Key Agreement in the Standard Model. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Maolin Tang, Colin J. Fidge Reconstruction of Falsified Computer Logs for Digital Forensics Investigations. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Ed Dawson, Jason Reid, Farzad Salim, Mark Burdon Information Sharing in the 21st century: Progress and Challenges. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
1Natascha Chrobok, Andrew Trotman, Richard A. O'Keefe Advantages and vulnerabilities of pull-based email-delivery. Search on Bibsonomy AISC The full citation details ... 2010 DBLP  BibTeX  RDF
Displaying result #1 - #100 of 257 (100 per page; Change: )
Pages: [1][2][3][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license