default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 213 matches
- 2014
- Kevin Abas, Caio Porto, Katia Obraczka:
Wireless Smart Camera Networks for the Surveillance of Public Spaces. Computer 47(5): 37-44 (2014) - Youngjung Ahn, Yongsuk Lee, Jin-Young Choi, Gyungho Lee, Dongkyun Ahn:
Monitoring Translation Lookahead Buffers to Detect Code Injection Attacks. Computer 47(7): 66-72 (2014) - Midhat Ali, Francesco De Angelis, Daniele Fanì, Antonia Bertolino, Guglielmo De Angelis, Andrea Polini:
An Extensible Framework for Online Testing of Choreographed Services. Computer 47(2): 23-29 (2014) - Nuno Antunes, Marco Vieira:
Penetration Testing for Web Services. Computer 47(2): 30-36 (2014) - Carmelo Ardito, Paolo Buono, Danilo Caivano, Maria Francesca Costabile, Rosa Lanzilotti, Yvonne Dittrich:
Human-Centered Design in Industry: Lessons from the Trenches. Computer 47(12): 86-89 (2014) - Alessandro Armando, Gabriele Costa, Luca Verderame, Alessio Merlo:
Securing the "Bring Your Own Device" Paradigm. Computer 47(6): 48-56 (2014) - Fernando Arnez, Jason Pace, Kelvin Sung:
Learning while Building Games for Teaching. Computer 47(4): 88-91 (2014) - Jun Axup, AnnMarie P. Thomas, Ariel Waldman, Susan Faulkner, Carolina Odman-Govender, Jim St. Leger, Jessica Polka, Melissa Gregg, Brian David Johnson:
The World of Making. Computer 47(12): 24-40 (2014) - Elyse N. Ball, Kenneth G. Preston:
University Commercialization Models: The University of Akron. Computer 47(8): 28-36 (2014) - Alberto Bartoli, Giorgio Davanzo, Andrea De Lorenzo, Eric Medvet, Enrico Sorio:
Automatic Synthesis of Regular Expressions from Examples. Computer 47(12): 72-80 (2014) - Dirk Basten, Thomas Hoerstrup:
Organizational Effort Estimation. Computer 47(8): 76-79 (2014) - Rick Bauer, Ron Milford, Li Zhen:
Aligning Technology and Market Drivers in an Open Source Standards Testing Program. Computer 47(11): 30-36 (2014) - Jason W. Bay:
Turning Video Gamers into Software Developers. Computer 47(10): 99-101 (2014) - Crystal Beasley, Emmeline Parsons, Melissa Pierce, Sam Baumgarten, Andrius Neviera, Shubham Banerjee, Tyesha Snow, Carla Diana, Nicholas Nakadate, Shruti Satsangi:
Passionate Projects: This Is What I Made. Computer 47(12): 42-54 (2014) - Sarah Beecham, Pádraig O'Leary, Seán Baker, Ita Richardson, John Noll:
Making Software Engineering Research Relevant. Computer 47(4): 80-83 (2014) - Hal Berghel:
Privacy Informatics: A Primer on Defensive Tactics for a Society under Siege. Computer 47(1): 78-82 (2014) - Hal Berghel:
Moral Hazards, Negative Externalities, and the Surveillance Economy. Computer 47(2): 73-77 (2014) - Hal Berghel:
STEM, Revisited. Computer 47(3): 70-73 (2014) - Hal Berghel:
Mr. Snowden's Legacy. Computer 47(4): 66-70 (2014) - Hal Berghel:
PII, the FTC, Car Dealers, and You. Computer 47(5): 102-106 (2014) - Hal Berghel:
Leadership Failures in the National Security Complex. Computer 47(6): 64-67 (2014) - Hal Berghel:
Robert David Steele on OSINT. Computer 47(7): 76-81 (2014) - Hal Berghel:
The Future of Digital Money Laundering. Computer 47(8): 70-75 (2014) - Hal Berghel:
Sticky Wikis. Computer 47(9): 90-93 (2014) - Hal Berghel:
Defending against Big Dada: Defensive Tactics for Weapons of Mass Deception. Computer 47(10): 94-98 (2014) - Hal Berghel:
Why Clouds Give Me a Case of the Vapors. Computer 47(11): 82-85 (2014) - Hal Berghel:
Judson Rosebush on Computer Graphics and Animation. Computer 47(12): 95-99 (2014) - Giampiero E. G. Beroggi:
Internet Voting: An Empirical Evaluation. Computer 47(4): 44-50 (2014) - Oliver Bimber:
Thinking Virtual. Computer 47(7): 22-23 (2014) - F. Alexander Bogert, Nicholas Smith, John Holdener, Eric M. De Jong, Andrew F. Hart, Luca Cinquini, Shakeh E. Khudikyan, David R. Thompson, Chris A. Mattmann, Kiri Wagstaff, Joseph Lazio, Dayton L. Jones, Alice Allen, Lior Shamir, Peter J. Teuben:
Computing in Astronomy: Applications and Examples. Computer 47(9): 62-69 (2014)
skipping 183 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-10-21 18:20 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint