Search dblp for Publications

export results for "toc:db/journals/ac/ac83.bht:"

 download as .bib file

@article{DBLP:journals/ac/ChellappaT11,
  author       = {Rama Chellappa and
                  Pavan K. Turaga},
  title        = {Advances in Video-Based Biometrics},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {183--203},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00004-7},
  doi          = {10.1016/B978-0-12-385510-7.00004-7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/ChellappaT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/GroverBC11,
  author       = {Amit Grover and
                  Hal Berghel and
                  Dennis Cobb},
  title        = {The State of the Art in Identity Theft},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {1--50},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00001-1},
  doi          = {10.1016/B978-0-12-385510-7.00001-1},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/GroverBC11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/HidalgoA11,
  author       = {Jos{\'{e}} Mar{\'{\i}}a G{\'{o}}mez Hidalgo and
                  Gonzalo {\'{A}}lvarez Mara{\~{n}}{\'{o}}n},
  title        = {CAPTCHAs: An Artificial Intelligence Application to Web Security},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {109--181},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00003-5},
  doi          = {10.1016/B978-0-12-385510-7.00003-5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/HidalgoA11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/KesslerH11,
  author       = {Gary C. Kessler and
                  Chet Hosmer},
  title        = {An Overview of Steganography},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {51--107},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00002-3},
  doi          = {10.1016/B978-0-12-385510-7.00002-3},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/KesslerH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/RayACSM11,
  author       = {Arnab Ray and
                  Christopher Ackermann and
                  Rance Cleaveland and
                  Charles P. Shelton and
                  Chris Martin},
  title        = {Functional and Nonfunctional Design Verification for Embedded Software
                  Systems},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {277--321},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00006-0},
  doi          = {10.1016/B978-0-12-385510-7.00006-0},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/RayACSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/SantosT11,
  author       = {Paulo S{\'{e}}rgio Medeiros dos Santos and
                  Guilherme Horta Travassos},
  title        = {Action Research Can Swing the Balance in Experimental Software Engineering},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {205--276},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00005-9},
  doi          = {10.1016/B978-0-12-385510-7.00005-9},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/SantosT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ac/Zelkowitz11b,
  author       = {Marvin V. Zelkowitz},
  title        = {Preface},
  journal      = {Adv. Comput.},
  volume       = {83},
  pages        = {ix--xii},
  year         = {2011},
  url          = {https://doi.org/10.1016/B978-0-12-385510-7.00014-X},
  doi          = {10.1016/B978-0-12-385510-7.00014-X},
  timestamp    = {Wed, 20 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ac/Zelkowitz11b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics