The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for investigation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1951-1962 (16) 1963-1966 (18) 1967-1969 (18) 1970-1972 (17) 1973-1974 (23) 1975-1976 (30) 1977-1978 (24) 1979-1980 (26) 1981-1982 (29) 1983-1984 (49) 1985 (34) 1986 (30) 1987 (46) 1988 (47) 1989 (58) 1990 (74) 1991 (55) 1992 (65) 1993 (87) 1994 (88) 1995 (137) 1996 (139) 1997 (151) 1998 (184) 1999 (231) 2000 (303) 2001 (342) 2002 (418) 2003 (551) 2004 (651) 2005 (842) 2006 (962) 2007 (1082) 2008 (1126) 2009 (915) 2010 (659) 2011 (700) 2012 (749) 2013 (844) 2014 (860) 2015 (933) 2016 (918) 2017 (1025) 2018 (1106) 2019 (1228) 2020 (1279) 2021 (1392) 2022 (1386) 2023 (1397) 2024 (335)
Publication types (Num. hits)
article(10161) book(11) data(8) incollection(134) inproceedings(12706) phdthesis(657) proceedings(2)
Venues (Conferences, Journals, ...)
CoRR(839) SENSORS(377) IEEE Access(371) HICSS(229) Microelectron. Reliab.(198) AMCIS(179) EMBC(173) Remote. Sens.(159) IGARSS(149) NeuroImage(141) INTERSPEECH(129) ICIS(121) J. Comput. Chem.(114) Comput. Hum. Behav.(98) IEEE Trans. Ind. Electron.(94) Symmetry(93) More (+10 of total 4642)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 6505 occurrences of 3767 keywords

Results
Found 23679 publication records. Showing 23679 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
54Ricci S. C. Ieong, H. C. Leung Deriving cse-specific live forensics investigation procedures from FORZA. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FORZA, digital forensics framework, live forensics
46Maaria Nuutinen, Leena Norros Core task analysis in accident investigation: analysis of maritime accidents in piloting situations. Search on Bibsonomy Cogn. Technol. Work. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Accident models, Expert cooperation, Pilotage, Maritime, Practices, Accident investigation
43Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
43Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law Forensic Investigation of Peer-to-Peer Networks. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
42Jolanta Cybulka Applying the c.DnS Design Pattern to Obtain an Ontology for Investigation Management System. Search on Bibsonomy ICCCI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Constructive descriptions and situations ontology, ontology of criminal and investigation processes, investigation management system
41Anish Das Sarma, Alpa Jain, Divesh Srivastava I4E: interactive investigation of iterative information extraction. Search on Bibsonomy SIGMOD Conference The full citation details ... 2010 DBLP  DOI  BibTeX  RDF explain, interactive investigation, information extraction, debugging, diagnose, repair
37Heum Park, SunHo Cho, Hyuk-Chul Kwon Cyber Forensics Ontology for Cyber Criminal Investigation. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF criminal investigation, cyber forensics, ontology, digital evidence, cyber crime
37Chung C. Chang, Kuo H. Hua Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF case-based reasoning (CBR), experts systems (ES), computerassisted instruction (CAI), crime investigation, coastal patrol
36Gian Luca Marcialis, Fabio Roli, Pietro Coli, Giovanni Delogu A Fingerprint Forensic Tool for Criminal Investigations. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Christopher A. Canning, Baoying Wang Trends in Information Security Regulation. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Lodovico Marziale, Santhi Movva, Golden G. Richard III, Vassil Roussev, Loren Schwiebert Massively Threaded Digital Forensics Tools. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Bo Zhou 0001, Qi Shi 0001, Madjid Merabti A Novel Intrusion Detection System for Smart Space. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Xiaoling Chen, Rohan D. W. Perera, Ziqian Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi Deception Detection on the Internet. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Antonio Savoldi, Paolo Gubian Embedded Forensics. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Stefan Katzenbeisser 0001, Huajian Liu, Martin Steinebach Challenges and Solutions in Multimedia Document Authentication. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Gian Piero Zarri Conceptual Tools for Dealing with 'Narrative' Terrorism Information. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Hong Cai, Sos S. Agaian A Novel Multilevel DCT Based Reversible Data Hiding. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Matthew Sorell Digital Camera Photographic Provenance. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Lynn Margaret Batten, Lei Pan 0002 Testing Digital Forensic Software Tools Used in Expert Testimony. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Patrizio Campisi, Emanuele Maiorana, Alessandro Neri 0001 Privacy Enhancing Technologies in Biometrics. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Thomas M. Chen Identity Theft through the Web. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Adel Elmaghraby, Deborah W. Keeling, Michael Losavio Legal Issues for Research and Practice in Computational Forensics. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Roberto Caldelli, Irene Amerini, Francesco Picchioni, Alessia De Rosa, Francesca Uccheddu Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Xi Zhao, Anthony T. S. Ho Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Michael I. Cohen Network Forensics. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Tim Rawlinson, Abhir Bhalerao, Li Wang 0005 Principles and Methods for Face Recognition and Face Modelling. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Pawel T. Puslecki Biometrical Processing of Faces in Security and Forensics. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
36Cosimo Anglano Forensic Implications of Virtualization Technologies. Search on Bibsonomy Handbook of Research on Computational Forensics, Digital Crime, and Investigation The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
35Timothy Neville, Matthew Sorell Audit Log for Forensic Photography. Search on Bibsonomy e-Forensics The full citation details ... 2009 DBLP  DOI  BibTeX  RDF crime investigation, forensic investigation, digital negative, Digital photography
35Anna Götmar, Jonas Lundberg Effective recommendations in loosely coupled accident investigations. Search on Bibsonomy ECCE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF recommendations, accident investigation
35Martin P. Robillard, Wesley Coelho, Gail C. Murphy How Effective Developers Investigate Source Code: An Exploratory Study. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF program investigation, Software evolution, program understanding, empirical software engineering
33Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Michael Freemon, Von Welch, Randy Butler Palantir: a framework for collaborative incident response and investigation. Search on Bibsonomy IDtrust The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-site collaboration, digital investigation, incident response
33Svein Yngvar Willassen Using simplified event calculus in digital investigation. Search on Bibsonomy SAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF propositional logic, event calculus, digital investigation
33Witold Halas, Victor Taranenko, Antoni Swic, Georgij Taranenko Investigation of Influence of Grinding Regimes on Surface Tension State. Search on Bibsonomy IEA/AIE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF grinding, surface tension state, influence, investigation
32Martin P. Robillard, Putra Manggala Reusing Program Investigation Knowledge for Code Understanding. Search on Bibsonomy ICPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
30Fredrik Sundt Breien, Ingerid Rødseth Usability factors of 3D criminal archive in an augmented reality environment. Search on Bibsonomy NordiCHI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF criminal investigation, usability, augmented reality, computer graphics, tangible user interfaces
28Sukanya Manna, Tom Gedeon A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Gain of Words, Gain of Sentences, term significance, Information retrieval, summarization, investigation
28Steve Counsell, George Loizou, Rajaa Najjar Quality of manual data collection in Java software: an empirical investigation. Search on Bibsonomy Empir. Softw. Eng. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Java, Software metrics, Data collection, Empirical investigation
28Slim Rekhis, Noureddine Boudriga A formal logic-based language and an automated verification tool for computer forensic investigation. Search on Bibsonomy SAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF S-TLA+, S-TLC, formal forensic investigation, temporal logic of security actions
26Long Chen 0022, Guoyin Wang 0001 An Efficient Piecewise Hashing Method for Computer Forensics. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF File system investigation, Hash, Digital forensics, Computer forensics
26Meredith Ringel Morris, Eric Horvitz S3: Storable, Shareable Search. Search on Bibsonomy INTERACT (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF persistent search, Web search, exploratory search, investigation
26Bob Breeden, Judie Mulholland Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ICAC, internet crimes against children, proactive investigation, training, forensics, law enforcement
26Jennifer Jie Xu 0001, Hsinchun Chen CrimeNet explorer: a framework for criminal network knowledge discovery. Search on Bibsonomy ACM Trans. Inf. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF complete-link algorithm, crime investigation, clustering, visualization, knowledge discovery, social network analysis, multidimensional scaling, Law enforcement, concept space, precision and recall
26Robert Schaefer Software maturity: design as dark art. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
24Bayrem Triki, Slim Rekhis, Noureddine Boudriga Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF wireless digital investigation, wireless sensor networks, wormhole attacks
24Yousheng Liu, Yuxian Wang, Huazhi Xiao Application of Active Service Component in Intelligent Investigation System of Specialty Provision. Search on Bibsonomy IFITA (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF demand perception, intellectualization, code generation initiative, investigation system of specialty provision, component, active service
24Jewan Bang, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee 0002 Analysis of Time Information for Digital Investigation. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Time, File system, Windows, Digital Investigation
24Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. Search on Bibsonomy Intelligence and Security Informatics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Forum-based Community, Gray Web Forum, Forum Analysis & Investigation, Crime Lead Discovering, Content Analysis
24Yong-Dal Shin New Digital Forensics Investigation Procedure Model. Search on Bibsonomy NCM (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital crime, digital forensics, investigation
24Marilyn Sue Bogner The How and Why of Incident Investigation: Implications for Health Information Technology. Search on Bibsonomy USAB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Incident Investigation, Health Information Technology, Systems, Error, Behavior, User Support
24Wen-Chin Li, Don Harris Confucius in Western Cockpits: The Investigation of Long-Term Versus Short-Term Orientation Culture and Aviation Accidents. Search on Bibsonomy HCI (13) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Confucian, Human Factors Analysis and Classification System, Human Error, Cross-culture, Accident Investigation
24Han-Shik Kim, Byung-Seok Kang, Sangheon Pack, Chul-Hee Kang Route Investigation for Secure Routing in Mobile Ad-hoc Networks. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Martin P. Robillard, Gail C. Murphy Automatically Inferring Concern Code from Program Investigation Activities. Search on Bibsonomy ASE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Massimiliano Di Penta, Sandro Morasca, Alberto Sillitti 3rd International Workshop on Designing Empirical Studies: Assessing the Effectiveness of Agile Methods (IWDES 2009). Search on Bibsonomy XP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF data collection, Empirical investigation
22Bruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese Artificial intelligence applied to computer forensics. Search on Bibsonomy SAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF artificial intelligence, multiagent systems, computer forensics, JADE, digital investigation
22Xinyan Zhao, Ge Wei, Lu Tingjie Study on consumer demands and merchant participation motives of mobile payment services in China. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF consumer demands, merchant participation motives, mobile payment, investigation
22Xinyan Zhao, Wei Ge, Tingjie Lu Study on consumer demands and merchant participation motives of mobile payment services in China. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF consumer demands, merchant participation motives, mobile payment, investigation
22Bruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese, Hugo C. Junior MADIK: A Collaborative Multi-agent ToolKit to Computer Forensics. Search on Bibsonomy OTM Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaborative multi-agent systems, computer forensics, JADE, digital investigation, JESS
22Reid Holmes, Andrew Begel Deep intellisense: a tool for rehydrating evaporated information. Search on Bibsonomy MSR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF code investigation, mining repositories
22Yacine Djemaiel, Noureddine Boudriga A global marking scheme for tracing cyber attacks. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF global marking, malicious activity, digital investigation, security attack
22Nayot Poolsapassit, Indrajit Ray Investigating Computer Attacks Using Attack Trees. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensic investigation, computer attacks, log file filtering, attack tree
22Bruce A. Reinig, Robert O. Briggs, Morgan M. Shepherd, Jerome Yen, Jay F. Nunamaker Jr. Developing and validating an instrument to measure the impact of group support technology on affective reward. Search on Bibsonomy HICSS (4) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF group support technology, group productivity, user resistance, excitation transfer, affective reward, emotionally unfulfilled, laboratory investigation, groupware, human factors, business data processing, social aspects of automation, team effectiveness
22Daniel D. Harrison, M. P. Weir High-Speed Triangulation-Based 3-D Imaging with Orthonormal Data Projections and Error Detection. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1990 DBLP  DOI  BibTeX  RDF surface topography measurement, triangulation-based 3-D imaging, orthonormal data projections, charge-injection-device image sensor, laser-based investigation system, printed-circuit board inspection, laser beam applications, surface topography measurement, computer vision, error detection, inspection, CCD image sensors, CCD image sensors, printed circuit testing
22Robert Law Using student blogs for documentation in software development projects. Search on Bibsonomy ITiCSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
19Mario Trottini, Krishnamurty Muralidhar, Rathindra Sarathy A Preliminary Investigation of the Impact of Gaussian Versus t-Copula for Data Perturbation. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Tail Dependence, Copula, Data Perturbation, Data Masking
19Chris W. Johnson 0001 Using IEC 61508 to Guide the Investigation of Computer-Related Incidents and Accidents. Search on Bibsonomy SAFECOMP The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Peng Ji, Junzhou Luo A Feedback and Investigation Based Resources Discovery and Management Model on Computational Grid. Search on Bibsonomy GCC (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Robert L. Sedlmeyer, Marc J. Lipman Computer-aided investigation in graph theory (abstract only). Search on Bibsonomy ACM Conference on Computer Science The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
18Mayu Iwata, Takahiro Hara, Shojiro Nishio How Different are Preferences of Children and Adults on Web Pages? Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Children, Preference, Web page, Investigation
18Matthew Simon, Jill Slay Recovery of Skype Application Activity Data from Physical Memory. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Electronic evidence, RAM forensics, Volatile memory forensics, Computer forensics, Digital evidence, Digital investigation
18Norsaremah Salleh, Emilia Mendes, John C. Grundy, Giles St. J. Burch An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model. Search on Bibsonomy ICSE (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF conscientiousness, five-factor model, formal experiment, higher education, pair programming, empirical investigation, personality type
18Wen-Chin Li, Don Harris, Lon-Wen Li, Thomas Wang The Differences of Aviation Human Factors between Individualism and Collectivism Culture. Search on Bibsonomy HCI (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Human Factors, Cross-culture, Aviation Safety, Accident Investigation
18SeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee 0002 A Stepwise Methodology for Tracing Computer Usage. Search on Bibsonomy NCM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF selectively acquisition, pre-investigation, PIM
18Feng Jing Application of 3S Technology to the Updating Survey of Land. Search on Bibsonomy ESIAT (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF 3S technology, land survey, updating investigation
18Yan Zhang, Bin Xu, Qiao Liang Groundwater Quality Research Based on PDA and 3S Technology. Search on Bibsonomy ESIAT (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Groundwater Quality Investigation, Jinghui Canal irrigation zones, GIS, PDA, groundwater
18Marcel Worring, Rita Cucchiara Multimedia in forensics. Search on Bibsonomy ACM Multimedia The full citation details ... 2009 DBLP  DOI  BibTeX  RDF forensic investigation, forensic mining, multimedia search, pattern recognition, computer vision, surveillance
18Yiming Yang, Subramaniam Ganapathy, Abhay Harpale Protein identification as an information retrieval problem. Search on Bibsonomy SIGIR The full citation details ... 2009 DBLP  DOI  BibTeX  RDF interdisciplinary investigation, vector space models, tandem mass spectra, protein identification
18Sebastian Adam, Kizito Ssamula Mukasa, Kai Breiner, Marcus Trapp An apartment-based metaphor for intuitive interaction with ambient assisted living applications. Search on Bibsonomy BCS HCI (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF apartment metaphor, navigation structure, ubiquitous interactivity, usability, accessibility, ambient intelligence, metaphor, ambient assisted living, empirical investigation
18Bogdan Werth, Scott Moss Intrusion of Agent-Based Social Simulation in Economic Theory. Search on Bibsonomy MABS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF transaction cost theory, investigation of economic theory, outsourcing, agent-based modeling, model validation, offshoring, transaction cost economics
18Li Ding, Brandon Dixon Using an edge-dual graph and k-connectivity to identify strong connections in social networks. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF crime investigation, strong connections, social network analysis, law enforcement, k-connectivity
18Paolo Casari, Michele Rossi, Michele Zorzi Fountain codes and their application to broadcasting in underwater networks: performance modeling and relevant tradeoffs. Search on Bibsonomy Underwater Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF performance investigation, modeling, broadcast, underwater acoustic networks, hybrid ARQ, fountain codes
18Alta de Waal, Jacobus Venter, Etienne Barnard Applying Topic Modeling to Forensic Data. (PDF / PS) Search on Bibsonomy IFIP Int. Conf. Digital Forensics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF analysis phase, evidence mining, topic modeling, Digital investigation
18Katrin Franke Stroke-Morphology Analysis Using Super-Imposed Writing Movements. Search on Bibsonomy IWCF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF residual ink trace, writing behavior, combined on/offline handwriting analysis, forensic investigation, signature verification
18Katrin Franke, Sargur N. Srihari Computational Forensics: An Overview. Search on Bibsonomy IWCF The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Forensic science, Investigation services, Artificial intelligence, Computational science, Computer science, Law enforcement
18Thomas Wilde, Thomas Hess Forschungsmethoden der Wirtschaftsinformatik. Search on Bibsonomy Wirtschaftsinf. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Information Systems, Methodology, Comparison, Research Methods, Empirical Investigation, Longitudinal Analysis
18Philippe A. Palanque, Sandra Basnyat, David Navarre Improving Interactive Systems Usability Using Formal Description Techniques: Application to HealthCare. Search on Bibsonomy USAB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Incident and Accident Investigation, Human-Computer Interaction, Medical Informatics, Formal Description Techniques, Patient Monitoring
18I. F. Shishkin, A. G. Sergushev Space-Extensive Targets Radar Search in the Presence of Noise. Search on Bibsonomy IF&GIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Theory of search, search of space-extensive targets, efficiency of searching aids, search of traces on the sea surface, investigation of traces in water areas
18Amy J. Ko, Brad A. Myers, Michael J. Coblenz, Htet Htet Aung An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Program investigation, program comprehension, program understanding, empirical software engineering, information foraging, information scent
18Daniela E. Damian, James Chisan An Empirical Study of the Complex Relationships between Requirements Engineering Processes and Other Processes that Lead to Payoffs in Productivity, Quality, and Risk Management. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF process interactions, Requirements engineering, process improvement, empirical investigation
18James William Rust Corporate management of computer forensics evidence. Search on Bibsonomy InfoSecCD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF management, information security, computer forensics, hackers, digital evidence, investigation, incident response
18Martin P. Robillard, Gail C. Murphy Just-in-time concern modeling. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF program investigation, separation of concerns, inconsistency management, concern modeling
18Greg Goth, Barton C. Massey In the News. Search on Bibsonomy IEEE Softw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Medsphere, SpikeSource, Center for Open Source Investigation, Gluecode, Cloudscape, SourceForge.net, JBoss, Business Readiness Rating, Java Enterprise Middleware Server, GNU Lesser General Public License, Larry Wall, OSCON, O'Reilly, Drupal Content Management Systems Conference, Asterisk OSS, Linux desktop, Linux, open source software, open source software, PHP, Perl, Ruby on Rails, WebSphere
18Imran Majid, Martin P. Robillard NaCIN: an Eclipse plug-in for program navigation-based concern inference. Search on Bibsonomy eTX The full citation details ... 2005 DBLP  DOI  BibTeX  RDF concern inference, program investigation, program navigation, concern modeling
18Katerina Pastra, Horacio Saggion, Yorick Wilks Intelligent Indexing of Crime Scene Photographs. Search on Bibsonomy IEEE Intell. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF text-based image indexing, relational fact, crime investigation technology, image retrieval, image indexing
18Daniel Micusík, Viera Stopjaková, Lubica Benusková Application of Feed-forward Artificial Neural Networks to the Identification of Defective Analog Integrated Circuits. Search on Bibsonomy Neural Comput. Appl. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Circuits response investigation, Fault modelling and simulation, Resilient-backpropagation neural networks, Signal filtering, Supply current analysis
18Klaus Julisch, Marc Dacier Mining intrusion detection alarms for actionable knowledge. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF alarm investigation, episode rules, data mining, intrusion detection, conceptual clustering
18Martin J. Shepperd, Chris Schofield Estimating Software Project Effort Using Analogies. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF estimation process, case-based reasoning, analogy, Effort prediction, empirical investigation
17Jun Moriyama, Yasushi Kato, Yoshika Aoki, Akihito Kito, Maryam Behnoodi, Youichi Miyagawa, Masashi Matsuura Self-efficacy and learning experience of information education: in case of junior high school. Search on Bibsonomy AI Soc. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 A Field Guide to Hidden Accounting Information Detection. Search on Bibsonomy FGCN (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng Criminal Record Matching Based on the Vector Space Model. Search on Bibsonomy ISI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 23679 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license