Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 67 matches
- 2011
- Pelin Aksoy:
A novel junior transition course for students of applied information technology. SIGITE Conference 2011: 49-54 - Hend S. Al-Khalifa, Nora I. Al-Rajebah:
Integrating mobile web development into IT curriculum. SIGITE Conference 2011: 87-90 - Yan Bai, Carol Taylor:
Cyber defense competition: enhancing student competency in information security. SIGITE Conference 2011: 305-306 - Mostafa A. Bassiouni, Ratan Guha:
Enhancing network security education with research and development content. SIGITE Conference 2011: 293-298 - Maurizio Cembalo, Alfredo De Santis, Umberto Ferraro Petrillo:
SAVI: a new system for advanced SQL visualization. SIGITE Conference 2011: 165-170 - Alexander B. Cerier, Matt Visich, Chris Bork, Jon Brooks, Brian W. Perrault, Philip Haddad, Xinli Wang:
Infrastructure-as-a-service clouds in a professional environment. SIGITE Conference 2011: 301-302 - Randy W. Connolly, Bill Paterson:
Even so with the pieces borrowed from others: dressing an IS program in IT clothing. SIGITE Conference 2011: 139-144 - Steve R. Cosgrove:
Bringing together a low-cost networking learning environment. SIGITE Conference 2011: 101-106 - Michael A. Costa:
A solace in quantum. SIGITE Conference 2011: 263-268 - Donald Davis, Iffat Jabeen:
Learning in the GNU/Linux community. SIGITE Conference 2011: 21-26 - Delvin C. Defoe:
Teaching garbage collection with open source virtual machine. SIGITE Conference 2011: 197-202 - Joseph V. Elarde, Fatt-Fei Chong:
Introductory computing course content: educator and student perspectives. SIGITE Conference 2011: 55-60 - Heidi J. C. Ellis, Gregory W. Hislop:
Student IT services to support open source software for humanity. SIGITE Conference 2011: 307-308 - Oduronke T. Eyitayo:
Do students have the relevant ICT skills they need to do their research projects. SIGITE Conference 2011: 287-292 - Susan Feather-Gannon, James Lawler, Pauline Mosley, Jean F. Coppola:
Community empowering service-learning courses through 21st century technologies. SIGITE Conference 2011: 97-98 - Stefano Federici:
A minimal, extensible, drag-and-drop implementation of the C programming language. SIGITE Conference 2011: 191-196 - Joseph Finkelstein, Jeffrey Wood:
Information technology for continuous patient health education. SIGITE Conference 2011: 245-250 - Ron Fulbright:
Teaching innovation-on-demand in an undergraduate information technology program. SIGITE Conference 2011: 233-238 - Sandra Gorka, Jacob R. Miller, Daniel W. Yoas:
A competency based approach to developing articulation agreements in computing. SIGITE Conference 2011: 129-132 - Art Gowan, Kam Fui Lau, Angela Leverett, Byron Jeff, Wayne Summers, Andy Ju An Wang, Simon Baev:
The Georgia WebBSIT: profile of an online student reexamined. SIGITE Conference 2011: 155-160 - Ruth A. Guthrie, Elaine K. Yakura, Louise L. Soe:
How did mathemathematics and accounting get so many women majors?: what can IT disciplines learn? SIGITE Conference 2011: 15-20 - Elizabeth K. Hawthorne, Robert D. Campbell, Anita Verno:
Findings from the NSF-ACM strategic summit on computing education in community colleges. SIGITE Conference 2011: 315-316 - C. Richard G. Helps:
A domain model to improve IT course design. SIGITE Conference 2011: 323-324 - C. Richard G. Helps, Jim Leone, Barbara A. Price, Han Reichgelt:
Assessment and accreditation. SIGITE Conference 2011: 299-300 - Edward P. Holden, Jai W. Kang, Geoffrey R. Anderson, Dianne P. Bills:
Databases in the cloud: a status report. SIGITE Conference 2011: 171-176 - Rick Homkes, Robert A. Strikwerda:
Applying CPR to the teaching of IT ethics. SIGITE Conference 2011: 79-82 - Khondkar R. Islam, Charles M. Snow:
An architecture for delivery of distance education in developing countries. SIGITE Conference 2011: 215-220 - Stephen Jacobs, Clif Kussmaul, Mihaela Sabin:
Free and open source software in computing education. SIGITE Conference 2011: 41-42 - Michael Jonas:
Capstone experience: lessons from an undergraduate research group in speech at UNH Manchester. SIGITE Conference 2011: 275-280 - Chris Kadlec, Art Gowan:
Building and utilizing an IT data center lab. SIGITE Conference 2011: 321-322
skipping 37 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-27 15:36 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint