default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 420 matches
- 2015
- Ayodeji James Akande, Colin J. Fidge, Ernest Foo:
Component Modeling for SCADA Network Mapping. ACSC 2015: 91-100 - Sarawat Anam, Yang Sok Kim, Byeong Ho Kang, Qing Liu:
Schema Mapping Using Hybrid Ripple-Down Rules. ACSC 2015: 17-26 - Jacqui Chetty:
Lego© Mindstorms: Merely a Toy or a Powerful Pedagogical Tool for Learning Computer Programming? ACSC 2015: 111-118 - Sepehr Damavandinejadmonfared, Vijay Varadharajan:
A New Extension of Kernel Principal Component Analysis for Finger Vein Authentication. ACSC 2015: 59-63 - Xi Ding, Lanshan Zhang, Ye Tian, Xiangyang Gong, Wendong Wang:
Dynamic Topic Detection Model by Fusing Sentiment Polarity. ACSC 2015: 65-71 - Jeff Herbert, Alan T. Litchfield:
A Novel Method for Decentralised Peer-to-Peer Software License Validation Using Cryptocurrency Blockchain Technology. ACSC 2015: 27-35 - Christopher Moir, Jonathan Dean:
A Machine Learning approach to Generic Entity Resolution in support of Cyber Situation Awareness. ACSC 2015: 47-58 - Parma Nand, Rivindu Perera:
An Evaluation of POS Tagging for Tweets Using HMM Modelling. ACSC 2015: 83-89 - Yuki Osada, Mark Reynolds, Tim French:
Hourglass Systems. ACSC 2015: 119-123 - Graeme Smith, Jeff W. Sanders, Qin Li:
A Macro-Level Model for Investigating the E ect of Directional Bias on Network Coverage. ACSC 2015: 73-81 - Martin Stabauer, Gerald Quirchmayr, Johann Höller:
An Integration of Software Engineering Methods and Semantic Technologies for Drafting and Modeling Statutes and Legal Rules. ACSC 2015: 9-15 - Jason Thompson, Torab Torabi:
Visualising Moving Clusters using Cluster Flow Diagrams. ACSC 2015: 37-45 - Udaya Wijesinghe, Udaya Kiran Tupakula, Vijay Varadharajan:
An Enhanced Model for Network Flow Based Botnet Detection. ACSC 2015: 101-110 - Hanxu You, Jie Zhu:
Image Reconstruction based on Block-based Compressive Sensing. ACSC 2015: 3-7 - David Parry:
38th Australasian Computer Science Conference, ACSC 2015, Sydney, Australia, January 2015. CRPIT 159, Australian Computer Society 2015, ISBN 978-1-921770-41-8 [contents] - 2014
- X. Chen, A. Y. Wang, Ewan D. Tempero:
A Replication and Reproduction of Code Clone Detection Studies. ACSC 2014: 105-114 - David Friggens, Lindsay Groves:
Shape Predicates Allow Unbounded Verification of Linearizability Using Canonical Abstraction. ACSC 2014: 49-56 - Doug Hunt, Dave Parry, Stefan Schliebs:
Exploring the applicability of Reservoir methods for Classifying Punctual Sports Activities Using On-body Sensors. ACSC 2014: 67-73 - Sushanta Karmakar, Subhrendu Chattopadhyay:
A Trigger Counting Mechanism for Ring Topology. ACSC 2014: 81-87 - Roman Klapaukh, David J. Pearce, Stuart Marshall:
Towards a Vertex and Edge Label Aware Force Directed Layout Algorithm. ACSC 2014: 29-37 - C. L. Lim, Alistair Moffat, Anthony Ian Wirth:
Lazy and Eager Approaches for the Set Cover Problem. ACSC 2014: 19-27 - H. Margono, X. Yi, G. Raikundalia:
Mining Indonesian Cyber Bullying Patterns in Social Networks. ACSC 2014: 115-124 - O. Mayan, Judithe Sheard, Angela Carbone:
Understanding Saudi Arabian students' engagement in E-learning 2.0 in Australian Higher Education. ACSC 2014: 135-143 - Stephan Müller, Lars Butzmann, Stefan Klauck, Hasso Plattner:
An Adaptive Aggregate Maintenance Approach for Mixed Workloads in Columnar In-Memory Databases. ACSC 2014: 3-12 - Hoang Minh Nguyen, Burkhard C. Wünsche, Patrice Delmas, Christof Lutteroth:
Poisson Blended Exemplar-based Texture Completion. ACSC 2014: 99-104 - Michael Rinck, Annika Hinze, David Bainbridge:
Document DNA: Content Centric Provenance Data Tracking in Documents. ACSC 2014: 57-66 - Tong-Wook Shinn, Tadao Takaoka:
Combining the Shortest Paths and the Bottleneck Paths Problems. ACSC 2014: 13-18 - S. Tucker, Peter Darcy, Bela Stantic:
A Comparative Study of RFID Technology Measuring Efficiency and Acceptance when Capturing Attendance. ACSC 2014: 75-79 - Nicholas Vanderschantz, Annika Hinze, Sally Jo Cunningham:
Current Educational Technology Use for Digital Information Acquisition by Young New Zealand Children. ACSC 2014: 125-134 - Johannes Wust, C. Meyer, Hasso Plattner:
DAC: Database Application Context Analysis applied to Enterprise Applications. ACSC 2014: 39-48
skipping 390 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-20 06:08 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint