The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "NSPW"( http://dblp.L3S.de/Venues/NSPW )

URL (DBLP): http://dblp.uni-trier.de/db/conf/nspw

Publication years (Num. hits)
1993 (29) 1994 (15) 1995-1996 (30) 1997-1999 (30) 2000 (16) 2001 (17) 2002 (19) 2003-2004 (26) 2005 (19) 2006-2007 (24) 2008-2009 (26) 2010 (15) 2011-2012 (26) 2013 (15) 2014-2015 (26) 2016-2017 (22) 2018 (12)
Publication types (Num. hits)
inproceedings(341) proceedings(26)
Venues (Conferences, Journals, ...)
NSPW(367)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 116 occurrences of 95 keywords

Results
Found 367 publication records. Showing 367 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Steve Dierker, Volker Roth Can Software Licenses Contribute to Cyberarms Control? Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Arne Padmos Against Mindset. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Diptendu Mohan Kar, Indrajit Ray, Jenna Gallegos, Jean Peccoud Digital Signatures to Ensure the Authenticity and Integrity of Synthetic DNA Molecules. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Adam Trowbridge, Filipo Sharevski, Jessica Westbrook Malicious User Experience Design Research for Cybersecurity. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Marco Carvalho 0001, Matt Bishop, Anil Somayaji, Wolter Pieters, Mohammad Mannan (eds.) Proceedings of the New Security Paradigms Workshop, NSPW 2018, Windsor, UK, August 28-31, 2018 Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wolter Pieters On Security Singularities. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Matt Bishop, Carrie Gates, Karl N. Levitt Augmenting Machine Learning with Argumentation. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Mark Burgess, Anil Somayaji After the BlockCLoud Apocalypse. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Aaron Ceross, Andrew Simpson Rethinking the Proposition of Privacy Engineering. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Vivien M. Rooney, Simon N. Foley An Online Consent Maturity Model: Moving from Acceptable Use Towards Ethical Practice. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Heather Vescent, Bob Blakley Shifting Paradigms: Using Strategic Foresight to Plan for Security Evolution. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Prashant Anantharaman, J. Peter Brady, Patrick Flathers, Vijay H. Kothari, Michael C. Millian, Jason Reeves, Nathan Reitinger, William G. Nisen, Sean W. Smith Going Dark: A Retrospective on the North American Blackout of 2038. Search on Bibsonomy NSPW The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Sean Peisert, Matt Bishop, Edward B. Talbot A Model of Owner Controlled, Full-Provenance, Non-Persistent, High-Availability Information Sharing. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Karen Renaud, Merrill Warkentin Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1George Bissias, Brian Neil Levine, Nikunj Kapadia Market-based Security for Distributed Applications. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Yang Wang The Third Wave?: Inclusive Privacy and Security. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Nick Merrill, Max T. Curran, John Chuang Is the Future of Authenticity All In Our Heads?: Moving Passthoughts From the Lab to the World. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Scott Ruoti, Kent E. Seamons End-to-End Passwords. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Jonathan M. Spring, Tyler Moore, David J. Pym Practicing a Science of Security: A Philosophy of Science Perspective. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Carlos Hernandez Gañán, Michael Ciere, Michel van Eeten Beyond the pretty penny: the Economic Impact of Cybercrime. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Olgierd Pieczul, Simon N. Foley, Mary Ellen Zurko Developer-centered security and the symmetry of ignorance. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1 Proceedings of the 2017 New Security Paradigms Workshop, NSPW 2017, Santa Cruz, CA, USA, October 01-04, 2017 Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Borke Obada-Obieh, Anil Somayaji Can I believe you?: Establishing Trust in Computer Mediated Introductions. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Sam Weber, Adam Shostack, Jon A. Solworth, Mary Ellen Zurko Panel: Empirically-based Secure OS Design. Search on Bibsonomy NSPW The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Mark E. Fioravanti II, Matt Bishop, Richard Ford I'm not sure if we're okay: uncertainty for attackers and defenders. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Scott Brookes, Stephen Taylor Rethinking operating system design: asymmetric multiprocessing for security and performance. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Alexander Afanasyev, J. Alex Halderman, Scott Ruoti, Kent E. Seamons, Yingdi Yu, Daniel Zappala, Lixia Zhang 0001 Content-based security for the web. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Aokun Chen, Pratik Prabhanjan Brahma, Dapeng Oliver Wu, Natalie C. Ebner, Brandon Matthews, Jedidiah R. Crandall, Xuetao Wei, Michalis Faloutsos, Daniela A. S. de Oliveira Cross-layer personalization as a first-class citizen for situation awareness and computer infrastructure security. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Chad Heitzenrater, Andrew C. Simpson A case for the economics of secure software development. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Carrie Gates, Rainer Böhme, Mohammad Mannan, Serge Egelman (eds.) Proceedings of the 2016 New Security Paradigms Workshop, NSPW 2016, Granby, Colorado, USA, September 26-29, 2016 Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Gilmore R. Lundquist, Vishwath Mohan, Kevin W. Hamlen Searching for software diversity: attaining artificial diversity through program synthesis. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Ranjbar A. Balisane, Andrew C. Martin Trusted execution environment-based authentication gauge (TEEBAG). Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Hassan Halawa, Konstantin Beznosov, Yazan Boshmaf, Baris Coskun, Matei Ripeanu, Elizeu Santos-Neto Harvesting the low-hanging fruits: defending against automated large-scale cyber-intrusions by focusing on the vulnerable population. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Laura Fichtner, Wolter Pieters, André Teixeira Cybersecurity as a Politikum: implications of security discourses for infrastructures. Search on Bibsonomy NSPW The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Serge Egelman, Eyal Péer The Myth of the Average User: Improving Privacy and Security Systems through Individualization. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Odette Beris, Adam Beautement, M. Angela Sasse Employee Rule Breakers, Excuse Makers and Security Champions: : Mapping the risk perceptions and emotions that drive security behaviors. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Peter Hall, Claude Heath, Lizzie Coles-Kemp, Axel Tanner Examining the Contribution of Critical Visualisation to Information Security. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Christian T. Zenger, Jan Zimmer, Mario Pietersz, Jan-Felix Posielek, Christof Paar Exploiting the Physical Environment for Securing the Internet of Things. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammad Mannan, Arash Shahkar, Atieh Saberi Pirouz, Vladimir Rabotka Peace vs. Privacy: Leveraging Conflicting Jurisdictions for Email Security. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Alain Forget, Sonia Chiasson, Robert Biddle Choose Your Own Authentication. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Raquel Hill, Devan Ray Donaldson Bridging the Trust Gap: Integrating Models of Behavior and Perception. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Trey Herr, Eric Armbrust Milware: Identification and Implications of State Authored Malicious Software. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Riccardo Pelizzi, R. Sekar WebSheets: Web Applications for Non-Programmers. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Zinaida Benenson, Gabriele Lenzini, Daniela Oliveira, Simon Parkin, Sven Uebelacker Maybe Poor Johnny Really Cannot Encrypt: The Case for a Complexity Theory for Usable Security. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Anil Somayaji, Paul C. van Oorschot, Mohammad Mannan, Rainer Böhme (eds.) Proceedings of the 2015 New Security Paradigms Workshop, NSPW 2015, Twente, The Netherlands, September 8-11, 2015 Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Cormac Herley, Wolter Pieters "If you were attacked, you'd be sorry": Counterfactuals as security arguments. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Aaron Elliott, Scott Knight Towards Managed Role Explosion. Search on Bibsonomy NSPW The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Mohammed H. Almeshekah, Eugene H. Spafford Planning and Integrating Deception into Computer Security Defenses. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Carrie Gates, Peter Matthews Data Is the New Currency. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wolter Pieters, Dina Hadziosmanovic, Francien Dechesne Cyber Security as Social Experiment. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Poller, Sven Türpe, Katharina Kinder-Kurlanda An Asset to Security Modeling?: Analyzing Stakeholder Collaborations Instead of Threats to Assets. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Elizabeth Stobert, Robert Biddle A Password Manager that Doesn't Remember Passwords. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Benjamin Edwards, Michael E. Locasto, Jeremy Epstein Panel Summary: The Future of Software Regulation. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Nathaniel Husted, Steven Myers Emergent Properties & Security: The Complexity ofSecurity as a Science. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andreas Kuehn, Milton Mueller Shifts in the Cybersecurity Paradigm: Zero-Day Exploits, Discourse, and Emerging Institutions. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Paul Dunphy, John Vines, Lizzie Coles-Kemp, Rachel Clarke, Vasillis Vlachokyriakos, Peter C. Wright, John C. McCarthy, Patrick Olivier Understanding the Experience-Centeredness of Privacy and Security Technologies. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Olgierd Pieczul, Simon N. Foley, Vivien M. Rooney I'm OK, You're OK, the System's OK: Normative Security for Systems. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Andrew M. White 0002, Katherine Shaw, Fabian Monrose, Elliott Moreton Isn't that Fantabulous: Security, Linguistic and Usability Challenges of Pronounceable Tokens. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Justin Cappos, Yanyan Zhuang, Daniela A. S. de Oliveira, Marissa Rosenthal, Kuo-Chuan Yeh Vulnerabilities as Blind Spots in Developer's Heuristic-Based Decision-Making Processes. Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Konstantin Beznosov, Anil Somayaji, Tom Longstaff, Paul C. van Oorschot (eds.) Proceedings of the 2014 workshop on New Security Paradigms Workshop, Victoria, BC, Canada, September 15-18, 2014 Search on Bibsonomy NSPW The full citation details ... 2014 DBLP  BibTeX  RDF
1Sean Peisert, Edward B. Talbot, Tom Kroeger Principles of authentication. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Suhas Mathur, Baris Coskun, Suhrid Balakrishnan Detecting hidden enemy lines in IP address space. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Stephen Crane, Per Larsen, Stefan Brunthaler, Michael Franz Booby trapping software. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Jeff Rowe, Karl N. Levitt, Mike Hogarth Towards the realization of a public health system for shared secure cyber-space. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Binbin Chen, Zbigniew Kalbarczyk, David M. Nicol, William H. Sanders, Rui Tan, William G. Temple, Nils Ole Tippenhauer, An Hoa Vu, David K. Y. Yau Go with the flow: toward workflow-oriented security assessment. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Debi Ashenden, Darren Lawrence Can we sell security like soap?: a new approach to behaviour change. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Markus Dürmuth Useful password hashing: how to waste computing cycles with style. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Matt Bishop, Emily Rine Butler, Kevin Butler, Carrie Gates, Steven Greenspan Forgive and forget: return to obscurity. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Lianying Zhao, Mohammad Mannan Explicit authentication response considered harmful. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Julie Boxwell Ard, Matt Bishop, Carrie Gates, Michael Xin Sun Information behaving badly. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Daniel Medeiros Nunes de Castro NSPHD: the polyglot computer. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sathya Chandran Sundaramurthy Designing forensic analysis techniques through anthropology. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Mary Ellen Zurko, Konstantin Beznosov, Tara Whalen, Tom Longstaff (eds.) New Security Paradigms Workshop, NSPW '13, Banff, AB, Canada, September 9-12, 2013 Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  BibTeX  RDF
1Anil Somayaji, David Mould, Carson Brown Towards narrative authentication: or, against boring authentication. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Serge Egelman, Cormac Herley, Paul C. van Oorschot Markets for zero-day exploits: ethics and implications. Search on Bibsonomy NSPW The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Sven Türpe Point-and-shoot security design: can we build better tools for developers? Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1William C. Garrison III, Adam J. Lee, Timothy L. Hinrichs The need for application-aware access control evaluation. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Zheng Dong, Vaibhav Garg, L. Jean Camp, Apu Kapadia Pools, clubs and security: designing for a party not a person. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Benjamin Edwards, Tyler Moore, George Stelle, Steven A. Hofmeyr, Stephanie Forrest Beyond the blacklist: modeling malware spread and the effect of interventions. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Heather Richter Lipford, Mary Ellen Zurko Someone to watch over me. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Richard Ford, Mary Ellen Zurko, Cormac Herley, Tara Whalen (eds.) The New Security Paradigms Workshop, NSPW '12, Bertinoro, Italy - September 18 - 21, 2012 Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  BibTeX  RDF
1Richard Ford, Liam M. Mayron All your base are belong to US. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Sean Peisert, Edward B. Talbot, Matt Bishop Turtles all the way down: a clean-slate, ground-up, first-principles approach to secure systems. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Julie Thorpe, Amirali Salehi-Abari, Robert Burden Video-passwords: advertising while authenticating. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wolter Pieters, Sanne H. G. van der Ven, Christian W. Probst A move in the security measurement stalemate: elo-style ratings to quantify vulnerability. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Anthony Morton, Martina Angela Sasse Privacy is a process, not a PET: a theory for effective privacy practice. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jedidiah R. Crandall, Daniela A. S. de Oliveira Holographic vulnerability studies: vulnerabilities as fractures in interpretation as information flows across abstraction boundaries. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jeff Rowe, Karl N. Levitt, Simon Parsons, Elizabeth Sklar, Andy Applebaum, Sharmin Jalal Argumentation logic to assist in security administration. Search on Bibsonomy NSPW The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Rainer Böhme, Jens Grossklags The security cost of cheap user interaction. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Matt Bishop, Marco M. Carvalho, Richard Ford, Liam M. Mayron Resilience is more than availability. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wenliang Du, Karthick Jayaraman, Xi Tan, Tongbo Luo, Steve J. Chapin Position paper: why are there so many vulnerabilities in web applications? Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wolter Pieters, Lizzie Coles-Kemp Reducing normative conflicts in information security. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kemal Bicakci, Paul C. van Oorschot A multi-word password proposal (gridWord) and exploring questions about science in security research and usable security evaluation. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Peter Gutmann Applying problem-structuring methods to problems in computer security. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Michael E. Locasto, Michael Massimi, Peter DePasquale Security and privacy considerations in digital death. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Dusko Pavlovic Gaming security by obscurity. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Sean Peisert, Richard Ford, Carrie Gates, Cormac Herley (eds.) 2011 New Security Paradigms Workshop, NSPW '11, Marin County, CA, USA, September 12-15, 2011 Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  BibTeX  RDF
1Gerald Friedland, Gregor Maier, Robin Sommer, Nicholas Weaver Sherlock holmes' evil twin: on the impact of global inference for online privacy. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Kay Hamacher, Stefan Katzenbeisser 0001 Public security: simulations need to replace conventional wisdom. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Rick Wash, Emilee J. Rader Influencing mental models of security: a research agenda. Search on Bibsonomy NSPW The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 367 (100 per page; Change: )
Pages: [1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license