The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ASIAN"( http://dblp.L3S.de/Venues/ASIAN )

URL (DBLP): http://dblp.uni-trier.de/db/conf/asian

Publication years (Num. hits)
1995 (30) 1996 (50) 1997 (38) 1998 (23) 1999 (42) 2000 (22) 2002 (21) 2003 (20) 2004 (37) 2005 (43) 2006 (27) 2007 (29) 2008-2009 (14)
Publication types (Num. hits)
inproceedings(383) proceedings(13)
Venues (Conferences, Journals, ...)
ASIAN(396)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 79 occurrences of 74 keywords

Results
Found 396 publication records. Showing 396 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Yoshihiko Kakutani A Logic for Formal Verification of Quantum Programs. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Robert Grabowski, Lennart Beringer Noninterference with Dynamic Security Domains and Policies. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jean Goubault-Larrecq "Logic Wins!". Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anguraj Baskar, Ramaswamy Ramanujam, S. P. Suresh A Dolev-Yao Model for Zero Knowledge. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Klaas Ole Kürtz, Henning Schnoor, Thomas Wilke A Simulation-Based Treatment of Authenticated Message Exchange. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Deqing Zou, Jinjiu Long, Hai Jin 0001 Trusted Deployment of Virtual Execution Environment in Grid Systems. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Naoki Kobayashi 0001 Higher-Order Program Verification and Language-Based Security. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Sergiu Bursuc, Hubert Comon-Lundh, Stéphanie Delaune Deducibility Constraints. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Anupam Datta (eds.) Advances in Computer Science - ASIAN 2009. Information Security and Privacy, 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009. Proceedings Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Steve Kremer, Antoine Mercier 0002, Ralf Treinen Reducing Equational Theories for the Decision of Static Equivalence. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Matt Henricksen A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Martin Gagné, Pascal Lafourcade 0001, Yassine Lakhnech, Reihaneh Safavi-Naini Automated Security Proof for Symmetric Encryption Modes. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jianhong Zhang, Hua Chen, Shengnan Gao, Yixian Yang A Special Proxy Signature Scheme with Multi-warrant. Search on Bibsonomy ASIAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mitsu Okada, Ichiro Satoh (eds.) Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues, 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers Search on Bibsonomy ASIAN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi Masquerade Detection Based Upon GUI User Profiling in Linux Systems. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF GUI based Profiling, Mouse events, KDE, Linux Profiling, Intrusion detection, Anomaly detection, One-class SVM, Masquerade detection
1Joshua D. Guttman How to do Things with Cryptographic Protocols. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Andrei Sabelfeld Dimensions of Declassification in Theory and Practice. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Harshit J. Shah, R. K. Shyamasundar On Run-Time Enforcement of Policies. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens An Integrated Model for Access Control and Information Flow Requirements. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DTE, RBAC, Security Policy, MLS, OrBAC
1Hyoungshick Kim Scalable DRM System for Media Portability. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Media Portability, Scalability, Transcoding, Home Network, DRM
1Iliano Cervesato (eds.) Advances in Computer Science - ASIAN 2007. Computer and Network Security, 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Tomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Imad M. Abbadi Digital Rights Management Using a Master Control Device. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Sriperumbuduru Kandala Simhalu, Keiji Takeda Browser Based Agile E-Voting System. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Individual Verifiability, Agile Voting, Anonymity, E-Voting
1Michele Bugliesi, Damiano Macedonio, Sabina Rossi Static vs Dynamic Typing for Access Control in Pi-Calculus. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gurvan Le Guernic Information Flow Testing. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Vitaly Shmatikov, Ming-Hsiu Wang Secure Verification of Location Claims with Simultaneous Distance Modification. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Junji Nakazato, Lihua Wang 0001, Akihiro Yamamura Privacy Enhancing Credentials. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa Compiling C Programs into a Strongly Typed Assembly Language. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF C, memory safety, typed assembly language
1Gavin O'Gorman, Stephen Blott Large Scale Simulation of Tor: . Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Elie Bursztein, Jean Goubault-Larrecq A Logical Framework for Evaluating Network Resilience Against Faults and Attacks. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mengjun Li, Ti Zhou, Zhoujun Li, Huowang Chen An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF abstraction and refinement, security protocol
1Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Mohammad Jafari, Mohammad Fathian Management Advantages of Object Classification in Role-Based Access Control (RBAC). Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access Control, Role-Based Access Control (RBAC), Object Classification
1Ali Borji Combining Heterogeneous Classifiers for Network Intrusion Detection. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection, PCA, Anomaly Detection, Combined Classifiers, Misuse Detection
1E. Ramirez-Silva, Marc Dacier Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Atsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani One-Time Receiver Address in IPv6 for Protecting Unlinkability. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Kazuhiko Kato Modeling and Virtualization for Secure Computing Environments. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Muhammad Torabi Dashti, Yanjing Wang 0001 Risk Balance in Exchange Protocols. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Gergei Bana, Koji Hasebe, Mitsuhiro Okada Computational Semantics for Basic Protocol Logic - A Stochastic Approach. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF formal methods, cryptographic protocols, first order logic, computational semantics
1Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han A Static Birthmark of Binary Executables Based on API Call Structure. Search on Bibsonomy ASIAN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF software piracy, binary analysis, software birthmark
1Gurvan Le Guernic, Anindya Banerjee 0001, Thomas P. Jensen, David A. Schmidt Automata-Based Confidentiality Monitoring. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Ming-Hsien Tsai, Bow-Yaw Wang Formalization of CTL* in Calculus of Inductive Constructions. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Corneliu Popeea, Wei-Ngan Chin Inferring Disjunctive Postconditions. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nguyen Van Tang, Dang Van Hung, Mizuhito Ogawa Modeling Urgency in Component-Based Real-Time Systems. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Duration Automata, Real-time Systems, Model Checking, Automatic Verification, Component Software
1Ming-Hsien Tsai, Bow-Yaw Wang Modular Formalization of Reactive Modules in COQ. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Nai Xia, Bing Mao, Qingkai Zeng, Li Xie 0001 Efficient and Practical Control Flow Monitoring for Program Security. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Program Vulnerability, Source Code Instrumentation, Static Analysis, Control Flow, Dynamic Profiling
1Thierry Sans, Frédéric Cuppens, Nora Cuppens-Boulahia FORM : A Federated Rights Expression Model for Open DRM Frameworks. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Khandoker Asadul Islam, Yoshimichi Watanabe Maintaining Data Consistency of XML Databases Using Verification Techniques. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Verification, XML Database
1Lucia Acciai, Michele Boreale Responsiveness in Process Calculi. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Reynald Affeldt, Nicolas Marti An Approach to Formal Verification of Arithmetic Functions in Assembly. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Arnab Roy 0001, Anupam Datta, Ante Derek, John C. Mitchell, Jean-Pierre Seifert Secrecy Analysis in Protocol Composition Logic. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Souhei Ito, Shigeki Hagihara, Naoki Yonezaki An Operational Semantics of Program Dependence Graphs for Unstructured Programs. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Naokata Shikuma, Atsushi Igarashi Proving Noninterference by a Fully Complete Translation to the Simply Typed lambda-Calculus. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gergei Bana, Payman Mohassel, Till Stegers Computational Soundness of Formal Indistinguishability and Static Equivalence. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay, Christopher Walstad Breaking and Fixing Public-Key Kerberos. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Vincent Bernat, Hubert Comon-Lundh Normal Proofs in Intruder Theories. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhaohui Luo A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yannick Chevalier, Mounira Kourjieh A Symbolic Intruder Model for Hash-Collision Attacks. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Slawomir Lasota 0001, David Nowak, Yu Zhang On Completeness of Logical Relations for Monadic Types. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Patrick Cousot, Radhia Cousot, Jérôme Feret, Laurent Mauborgne, Antoine Miné, David Monniaux, Xavier Rival Combination of Abstractions in the ASTRÉE Static Analyzer. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Akira Matsunaga, Tsutomu Matsumoto Security Evaluation of a Type of Table-Network Implementation of Block Ciphers. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alejandro Russo, John Hughes, David A. Naumann, Andrei Sabelfeld Closing Internal Timing Channels by Transformation. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Huibiao Zhu, Geguang Pu, Jifeng He A Denotational Approach to Scope-Based Compensable Flow Language for Web Service. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Qin Ma 0002, Luc Maranget Information Hiding in the Join Calculus. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Masatomo Hashimoto A Method of Safety Analysis for Runtime Code Update. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zining Cao A Spatial Logical Characterisation of Context Bisimulation. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Tarjei K. Mandt, Chik How Tan Certificateless Authenticated Two-Party Key Agreement Protocols. Search on Bibsonomy ASIAN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bilinear map, authenticated key agreement, Certificateless public key cryptography
1Junfeng Tian, Min Peng, Yuling Liu A New Active DDoS Defense System Based on Automatic Learning. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF active defense, neural network, statistical analysis, DDoS, traffic monitoring
1Tova Milo Peer-to-Peer Data Integration with Active XML. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Stéphane Grumbach, Liying Sui, Victor Vianu (eds.) Advances in Computer Science - ASIAN 2005, Data Management on the Web, 10th Asian Computing Science Conference, Kunming, China, December 7-9, 2005, Proceedings Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yue Li, Xing Li, Jingfang Xu Systematic Study on Query Expansion. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Tao Du, Shensheng Zhang, Zongjiang Wang Parallel Learning of Bayesian Networks Based on Ordering of Sets. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1 Shared Ontology for Pervasive Computing. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yan Zhu 0007, Alejandro P. Buchmann Cubing Web Data Based on Multidimensional Arrays. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hao Wu 0033, Hai Jin 0001, Yunfa Li, Hanhan Chen An Approach for Service Discovery Based on Semantic Peer-to-Peer. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Fei Shi, Ahmad AlShibli Searching Patterns in Digital Image Databases. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Teng Lv, Ping Yan, Qiongxiang Huang Relational to XML Schema Conversion with Constraints. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Akiyoshi Sugiki, Kenji Kono, Hideya Iwasaki A Practical Approach to Automatic Parameter-Tuning of Web Servers. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Junfeng Man, Aimin Yang, Jianshe Li, Qianqian Li Research on the Similarity of Constraint Driven Semantic Web Services. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dong-Zhan Zhang, Yong-Sheng Xue An Extended Mandatory Access Control Model for XML. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yanhua Wu, Yunze Cai, Xiaoming Xu Dynamic Hybrid DVE Architecture. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Changxuan Wan, Xiping Liu, Dahai Lin Efficient Evaluation of Sibling Relationship in XPath Queries. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Prabhakar Raghavan Query Incentive Networks. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiujun Ma, Kunqing Xie, Chen Liu, Chenyu Li Dynamic Geospatial Web Services Composition in Peer-to-Peer Networks. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Dongkyu Kim, Sang-goo Lee, Junho Shim, Jonghoon Chun, Zoonky Lee, Heungsun Park Practical Ontology Systems for Enterprise Application. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Yichun Liu, Jianming Fu, Huanguo Zhang An Optimistic Fair Protocol for P2P Chained Transaction. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF P2P transaction, chained transaction, onion payment, fairness
1Zijing Hu, Hongyan Li, Baojun Qiu, Lv-an Tang, Yu Fan, Haibin Liu, Jianlong Gao, Xinbiao Zhou Using Control Theory to Guide Load Shedding in Medical Data Stream Management System. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Xiujuan Xu, Lifeng Jia, Zhe Wang 0007, Chunguang Zhou DualRank: A Dual-Phase Algorithm for Optimal Profit Mining in Retailing Market. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Ting Yin, Hongyan Li, Zijing Hu, Yu Fan, Jianlong Gao, Shiwei Tang A Hybrid Method for Detecting Data Stream Changes with Complex Semantics in Intensive Care Unit. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhi Zhang, Haoyang Che, Pengfei Shi, Yong Sun, Jun Gu Schema Homomorphism - An Algebraic Framework for Schema Matching. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Junhu Zhang, Dongqing Yang, Shiwei Tang ACB-R: An Adaptive Clustering-Based Data Replication Algorithm on a P2P Data-Store. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Qian Zhang, Yu Sun 0008, Xia Zhang, Xuezhi Wen, Zheng Liu TOP-k Query Calculation in Peer-to-Peer Networks. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Baojun Qiu, Hongyan Li, Zijing Hu, Dongqing Yang, Lv-an Tang, Jianjun Wang, Meimei Li, Shiwei Tang General Consistency Management Within the Development of Ontology-Driven Web Information System. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sylvia B. Encheva, Sharil Tumin Security Concerns for Web Services and Applications. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Zhiqiang Zhang, Qi Guo, Hang Guo, Lizhu Zhou Three-Level Schema Model in a Web Data Engine. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Hongzhi Wang, Wei Wang 0011, Jianzhong Li, Xuemin Lin, Reymond Wong Practical Indexing XML Document for Twig Query. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Haibo Li, Lizhen Wang An Equity-Based and Cell-Based Spatial Object Fusion Method. Search on Bibsonomy ASIAN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 396 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license