Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 58 matches
- 2017
- Okhaide Akhigbe, Daniel Amyot, John Mylopoulos, Gregory Richards:
What can information systems do for regulators? A review of the state-of-practice in Canada. RCIS 2017: 57-65 - Alaa S. A. Alkhafaji, Mihaela Cocea, Jonathan Crellin, Sanaz Fallahkhair:
Guidelines for designing a smart and ubiquitous learning environment with respect to cultural heritage. RCIS 2017: 334-339 - Duaa Alkubaisy:
A framework managing conflicts between security and privacy requirements. RCIS 2017: 427-432 - Moneef Almutairi, Stephen Riddle:
Security threat classification for outsourced IT projects. RCIS 2017: 447-448 - Mohammad Alsaffar:
Online visual search behaviour, performance and satisfaction: A comparative study of English, Arabic and Chinese users. RCIS 2017: 408-413 - Mohammad Salih Alsaffar, Lyn Pemberton, Karina Rodriguez-Echavarria, Mithileysh Sathiyanarayanan:
Visual behaviour in searching information: A preliminary eye tracking study. RCIS 2017: 365-370 - Modhi Al Alshaikh, Gulden Uchyigit, Roger Evans:
A research paper recommender system using a Dynamic Normalized Tree of Concepts model for user modelling. RCIS 2017: 200-210 - Essayeh Aroua, Mourad Abed:
An ontology-based framework for enhancing personalized content and retrieval information. RCIS 2017: 276-285 - Myrsini Athinaiou:
Cyber security risk management for health-based critical infrastructures. RCIS 2017: 402-407 - Afef Awadid:
Supporting the consistency in multi-perspective Business Process Modeling: A mapping approach. RCIS 2017: 414-419 - Thomas Becmeur, Xavier Boudvin, David Brosset, Gael Heno, Benjamin Coste, Yvon Kermarrec, Pedro Merino Laso:
Generating data sets as inputs of reference for cyber security issues and industrial control systems. RCIS 2017: 453-454 - Oualid Benyahia, Christine Largeron, Baptiste Jeudy:
Community detection in dynamic graphs with missing edges. RCIS 2017: 372-381 - Fabrice Boissier:
Supporting modelers with model qualities and patterns. RCIS 2017: 440-445 - Sara Bouzit, Gaëlle Calvary, Joëlle Coutaz, Denis Chêne, Éric Petit, Jean Vanderdonckt:
The PDA-LPA design space for user interface adaptation. RCIS 2017: 353-364 - Verónica Burriel, José Fabián Reyes Román, Ana Heredia Casanoves, Carlos Iñiguez-Jarrín, Ana León:
GeIS based on Conceptual Models for the risk assessment of Neuroblastoma. RCIS 2017: 451-452 - Ornela Cela, Agnès Front, Dominique Rieu:
CEFOP: A method for the Continual Evolution of Organisational Processes. RCIS 2017: 33-43 - Guillaume Collard, Stephane Ducroquet, Eric Disson, Guilaine Talens:
A definition of Information Security Classification in cybersecurity context. RCIS 2017: 77-82 - Soumya Kanti Datta, Christian Bonnet:
Demonstrating Named Data Networking integration into DataTweet IoT Architecture. RCIS 2017: 457-458 - Vasiliki Diamantopoulou, Nikolaos Argyropoulos, Christos Kalloniatis, Stefanos Gritzalis:
Supporting the design of privacy-aware business processes via privacy process patterns. RCIS 2017: 187-198 - Vasiliki Diamantopoulou, Michalis Pavlidis:
Visual Privacy Management in User Centric Open Environments. RCIS 2017: 461-462 - Priscila Engiel, Julio César Sampaio do Prado Leite, John Mylopoulos:
A tool-supported compliance process for software systems. RCIS 2017: 66-76 - Chiara Francalanci, Paolo Guglielmino, Matteo Montalcini, Gabriele Scalia, Barbara Pernici:
IMEXT: A method and system to extract geolocated images from Tweets - Analysis of a case study. RCIS 2017: 382-390 - Mohammad Ghufran, Nacéra Bennacer, Gianluca Quercini:
Wikipedia-based extraction of key information from resumes. RCIS 2017: 135-145 - Cesar Gonzalez-Perez, Patricia Martín-Rodilla:
A metamodel and code generation approach for symmetric unary associations. RCIS 2017: 84-94 - George Grispos, Jesús García-Galán, Liliana Pasquale, Bashar Nuseibeh:
Are you ready? Towards the engineering of forensic-ready systems. RCIS 2017: 328-333 - Alexander Gröflin, Mario Weber, Martin Guggisberg, Helmar Burkhart:
Traffic flow measurement of a public transport system through automated Web observation. RCIS 2017: 156-161 - Veerle Jessen, Hans Weigand:
Privacy proof in the cloud. RCIS 2017: 175-186 - Diana Jlailaty, Daniela Grigori, Khalid Belhajjame:
Multi-level clustering for extracting process-related information from email logs. RCIS 2017: 455-456 - Hermann Kaindl, Ralph Hoch, Roman Popp:
Semantic task specification in business process context. RCIS 2017: 286-291 - Duncan Ki-Aries, Shamal Faily, Huseyin Dogan, Christopher Williams:
Re-framing "the AMN": A case study eliciting and modelling a System of Systems using the Afghan Mission Network. RCIS 2017: 103-108
skipping 28 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 17:58 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint