default search action
Search dblp for Publications
export results for "toc:db/journals/ac/ac83.bht:"
@article{DBLP:journals/ac/ChellappaT11, author = {Rama Chellappa and Pavan K. Turaga}, title = {Advances in Video-Based Biometrics}, journal = {Adv. Comput.}, volume = {83}, pages = {183--203}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00004-7}, doi = {10.1016/B978-0-12-385510-7.00004-7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/ChellappaT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/GroverBC11, author = {Amit Grover and Hal Berghel and Dennis Cobb}, title = {The State of the Art in Identity Theft}, journal = {Adv. Comput.}, volume = {83}, pages = {1--50}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00001-1}, doi = {10.1016/B978-0-12-385510-7.00001-1}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/GroverBC11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/HidalgoA11, author = {Jos{\'{e}} Mar{\'{\i}}a G{\'{o}}mez Hidalgo and Gonzalo {\'{A}}lvarez Mara{\~{n}}{\'{o}}n}, title = {CAPTCHAs: An Artificial Intelligence Application to Web Security}, journal = {Adv. Comput.}, volume = {83}, pages = {109--181}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00003-5}, doi = {10.1016/B978-0-12-385510-7.00003-5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/HidalgoA11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/KesslerH11, author = {Gary C. Kessler and Chet Hosmer}, title = {An Overview of Steganography}, journal = {Adv. Comput.}, volume = {83}, pages = {51--107}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00002-3}, doi = {10.1016/B978-0-12-385510-7.00002-3}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/KesslerH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RayACSM11, author = {Arnab Ray and Christopher Ackermann and Rance Cleaveland and Charles P. Shelton and Chris Martin}, title = {Functional and Nonfunctional Design Verification for Embedded Software Systems}, journal = {Adv. Comput.}, volume = {83}, pages = {277--321}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00006-0}, doi = {10.1016/B978-0-12-385510-7.00006-0}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RayACSM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/SantosT11, author = {Paulo S{\'{e}}rgio Medeiros dos Santos and Guilherme Horta Travassos}, title = {Action Research Can Swing the Balance in Experimental Software Engineering}, journal = {Adv. Comput.}, volume = {83}, pages = {205--276}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00005-9}, doi = {10.1016/B978-0-12-385510-7.00005-9}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/SantosT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Zelkowitz11b, author = {Marvin V. Zelkowitz}, title = {Preface}, journal = {Adv. Comput.}, volume = {83}, pages = {ix--xii}, year = {2011}, url = {https://doi.org/10.1016/B978-0-12-385510-7.00014-X}, doi = {10.1016/B978-0-12-385510-7.00014-X}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Zelkowitz11b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.