default search action
Search dblp for Publications
export results for "toc:db/journals/ac/ac79.bht:"
@article{DBLP:journals/ac/KienleM10, author = {Holger M. Kienle and Hausi A. M{\"{u}}ller}, title = {The Tools Perspective on Software Reverse Engineering: Requirements, Construction, and Evaluation}, journal = {Adv. Comput.}, volume = {79}, pages = {189--290}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79005-7}, doi = {10.1016/S0065-2458(10)79005-7}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KienleM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Loo10, author = {Alfred W. Loo}, title = {Illusion of Wireless Security}, journal = {Adv. Comput.}, volume = {79}, pages = {119--167}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79003-3}, doi = {10.1016/S0065-2458(10)79003-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Loo10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Marowka10, author = {Ami Marowka}, title = {Pitfalls and Issues of Manycore Programming}, journal = {Adv. Comput.}, volume = {79}, pages = {71--117}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79002-1}, doi = {10.1016/S0065-2458(10)79002-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Marowka10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/McFarlandW10, author = {Dennis J. McFarland and Jonathan R. Wolpaw}, title = {Brain-Computer Interfaces for the Operation of Robotic and Prosthetic Devices}, journal = {Adv. Comput.}, volume = {79}, pages = {169--187}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79004-5}, doi = {10.1016/S0065-2458(10)79004-5}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/McFarlandW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/ShahABCCCGGHJJKMMMOPSVWa10, author = {Anuj R. Shah and Joshua N. Adkins and Douglas J. Baxter and William R. Cannon and Daniel G. Chavarr{\'{\i}}a{-}Miranda and Sutanay Choudhury and Ian Gorton and Deborah K. Gracio and Todd D. Halter and Navdeep Jaitly and John R. Johnson and Richard T. Kouzes and Matthew C. Macduff and Andr{\`{e}}s M{\'{a}}rquez and Matthew E. Monroe and Christopher S. Oehmen and William A. Pike and Chad Scherrer and Oreste Villa and Bobbie{-}Jo M. Webb{-}Robertson and Paul D. Whitney and Nino Zuljevic}, title = {Applications in Data-Intensive Computing}, journal = {Adv. Comput.}, volume = {79}, pages = {1--70}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79001-X}, doi = {10.1016/S0065-2458(10)79001-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ShahABCCCGGHJJKMMMOPSVWa10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz10a, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {79}, pages = {xvii--xviii}, year = {2010}, url = {https://doi.org/10.1016/S0065-2458(10)79011-2}, doi = {10.1016/S0065-2458(10)79011-2}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.