|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 332 occurrences of 274 keywords
|
|
|
Results
Found 3531 publication records. Showing 3530 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
62 | Reind P. van de Riet, Wouter Janssen, Martin S. Olivier, Radu Serban |
A Comparison of Two Architectures for Implementing Security and Privacy in Cyberspace. |
DEXA |
2000 |
DBLP DOI BibTeX RDF |
architecture, object-orientation, capability, security and privacy, cyberspace |
59 | Metodi Hadji-Janev |
Southeast European(SEE) States' International Legal Rights And Obligations In The Cyberspace. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
59 | Stefano Mele |
The Italian Strategic Response Against Cyber Threats and the Terrorist Use of Cyberspace. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
59 | Zlatogor Minchev |
Human Factor Dual Role in Modern Cyberspace Social Engineering. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
52 | Janusz Wielki |
A Framework of the Impact of Cyberspace on Contemporary Organizations. |
DEXA Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
52 | Yee Fen Lim |
Law and Regulation in cyberspace. |
CW |
2003 |
DBLP DOI BibTeX RDF |
|
52 | Jeffrey M. Bradshaw, Niranjan Suri, Alberto J. Cañas, Robert Davis, Kenneth M. Ford, Robert R. Hoffman, Renia Jeffers, Thomas Reichherzer |
Terraforming Cyberspace. |
Computer |
2001 |
DBLP DOI BibTeX RDF |
|
52 | Pat Jefferies |
Multimedia, Cyberspace & Ethics. |
IV |
2000 |
DBLP DOI BibTeX RDF |
|
52 | Ken Musgrave |
Building Worlds in Cyberspace. |
Computer Graphics International |
1999 |
DBLP DOI BibTeX RDF |
|
52 | Kara L. Nance, Mahla Strohmaier |
Ethical accountability in the cyberspace. |
Ethics in Computer Age |
1994 |
DBLP DOI BibTeX RDF |
|
51 | Chinese Academy of Cyberspace Studies |
China Internet Development Report 2018 - Blue Book of World Internet Conference |
|
2020 |
DOI RDF |
|
50 | Tara Krueger |
Mapping Cyberspace: The Image of the Internet. |
IEEE Ann. Hist. Comput. |
2007 |
DBLP DOI BibTeX RDF |
cyberspace map, Internet space place, Mapping, conceptual map |
49 | W. Yang |
Pictopia. |
ACM Multimedia |
2004 |
DBLP DOI BibTeX RDF |
cybertecture, mediatecture, architecture, locatability, urbanism |
49 | Mao Lin Huang, Wei Lai, Yanchun Zhang |
Mapping and Browsing the Web in a 2D Space. |
DEXA Workshops |
1999 |
DBLP DOI BibTeX RDF |
Information Visualization, Web Browser, Web Graph, Web Navigation |
44 | David Mair |
Conforming to al Qaeda's single narrative - an analysis of al Shabaab's Tweets during the Westgate terrorist attack. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Mitko Bogdanoski, Aleksandar Risteski, Marjan Bogdanoski |
Steganography in Support of the Global Terrorism. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Nancy Houston |
How Human Issues Impact Confronting Cyber Terrorism. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Nancy Houston |
Cultural Aspects of Information Sharing and Collaboration. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Ronald S. Bearse |
Protecting Critical Information Infrastructure from Terrorist Attacks and Other Threats: Strategic Challenges for NATO and its Partner Countries. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Alan Brill |
The Use of Internet Technology by Cyber Terrorists & Cyber Criminals: The 2014 Report. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Stuart MacDonald |
Assessing and Responding to the Cyberterrorism Threat. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Alan Brill |
Virtual Currencies and Terrorist Financing: Basics for Anti-Terrorist Professionals. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Elliot Zweig |
From Al-Qaeda To The Islamic State (ISIS), Jihadi Groups Engage in Cyber Jihad: Beginning with 1980s Promotion Of Use Of 'Electronic Technologies' Up To Today's Embrace Of Social Media to Attract A New Jihadi Generation. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Raoul Chiesa |
Cyber-Attacking a Country: What Terrorists Haven't Done So Far (and they could do). |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Arthur L. Brocato Jr. |
Tackling Terrorists' Use of the Internet: Propaganda Dispersion & the Threat of Radicalization. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Ivica Simonovski |
The Use Of Cyber Space For Terrorist Purposes - With Special Reference To The Financing Terrorist Activity. |
Terrorist Use of Cyberspace and Cyber Terrorism |
2015 |
DBLP DOI BibTeX RDF |
|
44 | Bracha Shapira |
A Content-Based Model for Web-Monitoring. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yehuda Shaffer |
Analysis of Financial Intelligence and the Detection of Terror Financing. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Mark Last |
Using Data Mining Technology for Terrorist Detection on the Web. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yuval Elovici |
TDS - An Innovative Terrorist Detection System. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Abraham R. Wagner |
Terrorism and the Internet: Use and Abuse. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Menahem Friedman, Moti Schneider, Abraham Kandel |
Clustering Algorithms for Variable-Length Vectors and Their Application to Detecting Terrorist Activities. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Alex Markov, Mark Last |
Identification of Terrorist Web Sites with Cross-Lingual Classification Tools. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Shaul Shay |
The Radical Islam and the Cyber Jihad. |
Fighting Terror in Cyberspace |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Zijia Wang, Han-Teng Liao, Jiacheng Lou, Yu Liu |
Making Cyberspace Towards Sustainability A Scientometric Review for a Cyberspace that Enables Green and Digital Transformation. |
CIAT |
2020 |
DBLP DOI BibTeX RDF |
|
39 | Shankar Sastry 0001 |
TRUST: in cyberspace and beyond. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
|
39 | David W. Valentine |
Practical computer security: a new service course based upon the national strategy to secure cyberspace. |
SIGITE Conference |
2005 |
DBLP DOI BibTeX RDF |
model syllabi, security, education |
39 | Mihaela Ulieru |
Emergence in Cyberspace: Towards the Evolutionary Self-Organizing Enterprise. |
Agent Technologies, Infrastructures, Tools, and Applications for E-Services |
2002 |
DBLP DOI BibTeX RDF |
|
39 | Herbert Fiedler |
Der Staat im Cyberspace - zur Diskussion gestellt. |
Inform. Spektrum |
2001 |
DBLP DOI BibTeX RDF |
|
38 | Yoshitaka Sakurai, Kinshuk, Kouhei Takada, Rainer Knauf, Setsuo Tsuruta |
Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration. |
AINA Workshops |
2010 |
DBLP DOI BibTeX RDF |
enriched cyberspace, CSCW (computer-supported cooperative work), situation assessment |
38 | Andrey Leonov, Alexander Serebrov, Mikhail Anikushkin, Dmitriy Belosokhov, Alexander Bobkov, Evgeny Eremchenko, Pavel Frolov, Ilya Kazanskiy, Andrey Klimenko, Stanislav V. Klimenko, Viktoria Leonova, Andrey Rashidov, Vasil Urazmetov, Valeriy Droznin, Viktor Dvigalo, Vladimir Leonov, Sergey Samoylenko, Alexander Aleynikov, Tikhon Shpilenok |
Virtual Story in Cyberspace: Valley of Geysers, Kamchatka. |
CW |
2010 |
DBLP DOI BibTeX RDF |
Heritage in cyberspace, Mixed and virtual reality, Cyberworlds and their impact on the real worlds, Neogeography, Virtual story, Valley of Geysers, Kamchatka, Situational awareness, Shared virtual worlds, Virtual collaborative spaces |
38 | Narushige Shiode, Tomoko Kanoshima |
Utilising the Spatial Features of Cyberspace for Generating a Dynamic Museum Environment. |
VRML |
1999 |
DBLP DOI BibTeX RDF |
art experience, interactivity, VRML, dynamic environment, virtual museum, cyberspace |
38 | K. Andrews |
Case study: Visualising cyberspace: information visualisation in the Harmony Internet browser. |
INFOVIS |
1995 |
DBLP DOI BibTeX RDF |
cyberspace visualisation, Harmony Internet browser, Gopher spaces, WWW spaces, Hyper-G Internet information system, Harmony client, navigational facilities, location feedback, Internet, information retrieval, data structures, information systems, information systems, data models, hypermedia, data visualisation, information visualisation |
37 | Daniel L. Rubin, Pattanasak Mongkolwat, Vladimir Kleper, Kaustubh Supekar, David S. Channin |
Annotation and Image Markup: Accessing and Interoperating with the Semantic Content in Medical Imaging. |
IEEE Intell. Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
37 | Frank A. Biocca |
The Space of Cognitive Technology: The Design Medium and Cognitive Properties of Virtual Space. |
Cognitive Technology |
2001 |
DBLP DOI BibTeX RDF |
|
37 | Bruce Damer, Stuart Gold, Jan de Bruin, Dirk-Jan de Bruin |
Conferences and Trade Shows in Inhabited Virtual Worlds: A Case Study of Avatars98 & 99. |
Virtual Worlds |
2000 |
DBLP DOI BibTeX RDF |
|
35 | Donald P. Brutzman, Michael Zyda, Kent Watsen, Michael R. Macedonia |
Virtual Reality Transfer Protocol (VRTP) Design Rationale. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
virtual reality transfer protocol, VRTP, network support, Cyberspace Backbone, CBone, interactive internetworked 3D worlds, Internet, World Wide Web, virtual reality, testing, Virtual Reality Modeling Language, VRML, HTML, http, network monitoring, design rationale, client-server, peer-to-peer communications, hypertext transfer protocol, large-scale virtual environments |
35 | Urs E. Gattiker, Helen Kelley |
Morality and technology, or is it wrong to create and let loose a computer virus. |
HICSS (3) |
1995 |
DBLP DOI BibTeX RDF |
computer related actions, women end users, context specific situation, policy makers, moral conduct, electronic highway, moral judgment, cyberspace domain, privacy, human factors, researchers, social aspects of automation, computer crime, social norms, computer virus, computer viruses, morality, theoretical models, professional aspects, civil liberties |
29 | Nikola Pijovic |
The Cyberspace 'Great Game'. The Five Eyes, the Sino-Russian Bloc and the Growing Competition to Shape Global Cyberspace Norms. |
CyCon |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Aleksandra Pawlicka, Michal Choras, Marek Pawlicki |
Cyberspace threats: not only hackers and criminals. Raising the awareness of selected unusual cyberspace actors - cybersecurity researchers' perspective. |
ARES |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Chenhui Zhao, Bo Zhang |
Research on the ideology monitoring system of cyberspace legal security based on Neural Network. |
CIAT |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Fenghua Li, Zifu Li, Weili Han, Ting Wu 0001, Lihua Chen, Yunchuan Guo, Jinjun Chen |
Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies. |
IEEE Internet Things J. |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Huansheng Ning, Xiaozhen Ye, Mohammed Amine Bouras, Dawei Wei, Mahmoud Daneshmand |
General Cyberspace: Cyberspace and Cyber-Enabled Spaces. |
IEEE Internet Things J. |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Jinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Yuanxin Zhang |
Evaluation on Availability of Entity Information in Cyberspace. |
DSC |
2018 |
DBLP DOI BibTeX RDF |
|
29 | Jinlin Wang, Hongli Zhang 0001, Binxing Fang, Xing Wang, Lin Ye |
A Survey on Data Cleaning Methods in Cyberspace. |
DSC |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Fenghua Li, Zifu Li, Weili Han, Ting Wu 0001, Lihua Chen, Yunchuan Guo |
Cyberspace-Oriented Access Control: Model and Policies. |
DSC |
2017 |
DBLP DOI BibTeX RDF |
|
29 | Paul A. Walker |
Law of the horse to law of the submarine: The future of State behavior in cyberspace. |
CyCon |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Geoffrey S. DeWeese |
Anticipatory and preemptive self-defense in cyberspace: The challenge of imminence. |
CyCon |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Alison L. Russell |
Strategic anti-access/area denial in cyberspace. |
CyCon |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Mark W. Bell |
A Review of "Ethics in Cyberspace: How Cyberspace May Influence Interpersonal Interaction". |
Inf. Soc. |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Ronald J. Deibert, Rafal Rohozinski |
Control and Subversion in Russian Cyberspace. |
Access Controlled |
2010 |
DBLP BibTeX RDF |
|
29 | Georgios I. Zekos |
State Cyberspace Jurisdiction and Personal Cyberspace Jurisdiction. |
Int. J. Law Inf. Technol. |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Wen-Bin Chiou, Chin-Sheng Wan |
Sexual Self-Disclosure in Cyberspace among Taiwanese Adolescents: Gender Differences and the Interplay of Cyberspace and Real Life. |
Cyberpsychology Behav. Soc. Netw. |
2006 |
DBLP DOI BibTeX RDF |
|
29 | Michael T. Zimmer |
The tensions of securing cyberspace: The Internet, state power and The National Strategy to Secure Cyberspace. |
First Monday |
2004 |
DBLP DOI BibTeX RDF |
|
29 | Claire Coleman |
Cyberspace security: Securing cyberspace - new laws and developing strategies. |
Comput. Law Secur. Rev. |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Mo Fu, Christopher Yeo, Yuetong Lin, Fei-Yue Wang 0001 |
WAVES: towards real time laboratory experiments in cyberspace. |
SMC |
2001 |
DBLP DOI BibTeX RDF |
|
29 | Todd Papaioannou |
Mobile Information Agents for Cyberspace - State of the Art and Visions. |
CIA |
2000 |
DBLP DOI BibTeX RDF |
|
29 | David Judah |
Liability in cyberspace - I: Defamation in cyberspace. |
Comput. Law Secur. Rev. |
1997 |
DBLP DOI BibTeX RDF |
|
27 | Hiromu Miyashita, Ryo Segawa, Ken-ichi Okada |
Estimation of thinking states in cyberspace using multiple physiological parameters. |
VRST |
2009 |
DBLP DOI BibTeX RDF |
presence, psychology, feelings |
27 | Ahmed Abbasi, Hsinchun Chen |
Writeprints: A stylometric approach to identity-level identification and similarity detection in cyberspace. |
ACM Trans. Inf. Syst. |
2008 |
DBLP DOI BibTeX RDF |
online text, style classification, text mining, discourse, Stylometry |
27 | Karine Barzilai-Nahon |
Gatekeeping in Virtual Communities: On Politics of Power in Cyberspace. |
HICSS |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Sheng Fang 0001, Min Zhang, Ling Huang, Yongshan Wei |
The Social Context Model for Research Activities in a Cyberspace. |
ICAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Shi-Cho Cha 0001, Yuh-Jzer Joung |
On Derived Data Services in Cyberspace. |
SAINT |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Tzong-Song Wang, Larry K. Bright |
The Challenge of Exclusions in Pervasive Cyberspace. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Ko Fujimura, Naoto Tanimoto |
The EigenRumor Algorithm for Calculating Contributions in Cyberspace Communities. |
Trusting Agents for Trusting Electronic Societies |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Naftaly H. Minsky |
Regularity-Based Trust in Cyberspace. |
iTrust |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Alessandro Aurigi |
Urban Cyberspace as a Social Construction: Non-technological Factors in the Shaping of Digital Bristol. |
Digital Cities |
2003 |
DBLP DOI BibTeX RDF |
|
27 | Alexander Roßnagel |
Freiheit im Cyberspace. |
Inform. Spektrum |
2002 |
DBLP DOI BibTeX RDF |
|
27 | Pekka Nikander |
Users and Trust in Cyberspace (Transcript of Discussion). |
Security Protocols Workshop |
2000 |
DBLP DOI BibTeX RDF |
|
27 | Betty Beaumont |
Decompression: a living laboratory in cyberspace. |
ACM Multimedia Workshops |
2000 |
DBLP DOI BibTeX RDF |
ecological art, electronic media, virtual reality, perceptual models, invisibility |
27 | Ravi S. Sandhu |
Engineering authority and trust in cyberspace: the OM-AM and RBAC way. |
ACM Workshop on Role-Based Access Control |
2000 |
DBLP DOI BibTeX RDF |
|
27 | George E. Mobus, Manuel Aparicio IV |
Foraging for information resources in cyberspace: intelligent foraging agent in a distributed network. |
CASCON |
1994 |
DBLP BibTeX RDF |
Internet |
25 | Jay S. Bayne |
Cyberspatial Mechanics. |
IEEE Trans. Syst. Man Cybern. Part B |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Ahmad Nadzri Muhammad Nasir, Ali Selamat, Md. Hafiz Selamat |
Web Mining for Malaysia's Political Social Networks Using Artificial Immune System. |
PKAW |
2008 |
DBLP DOI BibTeX RDF |
Political Parties, General Elections, Social Network Analysis, Artificial Immune System |
25 | Rung-Huei Liang, Yin-Huan Chen |
Planning Locative Media within Physical Space and Collaborative Workspace. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
25 | Yoshifumi Kitamura, Rong Rong, Yoshinori Hirano, Kazuhiro Asai, Fumio Kishino |
Video agent: interactive autonomous agents generated from real-world creatures. |
VRST |
2008 |
DBLP DOI BibTeX RDF |
interactive multimedia content, image processing, fuzzy logic, computer animation, video database, characters |
25 | Leonardo M. Trejos, Masaru Kamada, Tatsuhiro Yonekura, Mamun Bin Ibne Reaz |
Wildlife net-gamekeepers using sensor network. |
NETGAMES |
2007 |
DBLP DOI BibTeX RDF |
game modification, nature conservation, pattern recognition, network monitoring |
25 | Cheng-De Qin |
Personal data protection in electronic business. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
personal data protection, tort, privacy, legislation, electronic business |
25 | Dae-Hee Seo, Im-Yeong Lee, Hee-Un Park |
A Study on Key Recovery Agent Protection Profile Having Composition Function. |
ICCSA (1) |
2004 |
DBLP DOI BibTeX RDF |
Key Recovery Protection Profile, Evaluation Methodology, Common Criteria |
25 | Zheng Yan 0002, Piotr Cofta |
A Mechanism for Trust Sustainability Among Trusted Computing Platforms. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Matthew Allen |
Dematerialised data and human desire: the Internet and copy culture. |
CW |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Shambhu J. Upadhyaya |
Real-Time Intrusion Detection with Emphasis on Insider Attacks. |
MMM-ACNS |
2003 |
DBLP DOI BibTeX RDF |
|
25 | Donald J. Welch, Daniel Ragsdale, Wayne Schepens |
Training for Information Assurance. |
Computer |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Herbert Fiedler |
zur diskussion gestellt: Cyber - libertär? Nach dem 11. September. |
Inform. Spektrum |
2002 |
DBLP DOI BibTeX RDF |
|
25 | Richard O. Mason |
Intellectual Property and Open Systems. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
Proprietary Property, Closed Source, Public Property, Open Source, Intellectual Property |
23 | Yayoi Itoh, Yang Chen, Kazuhiko Iida, Mamoru Shiiki, Keiji Mitsubuchi |
Experiment of metaverse learning method using anatomical 3D object. |
VRCAI |
2009 |
DBLP DOI BibTeX RDF |
virtual world, Second Life, 3D object, cyberspace, metaverse, learning method |
23 | Roberto Siagri |
Pervasive computers and the GRID: the birth of a computational exoskeleton for augmented reality. |
ESEC/SIGSOFT FSE |
2007 |
DBLP DOI BibTeX RDF |
invited talk, mest compression, java, internet, sensor networks, grid, pervasive computing, wearable computers, eclipse, cyberspace, soda, exoskeleton |
23 | Daniel Memmi |
The nature of virtual communities. |
AI Soc. |
2006 |
DBLP DOI BibTeX RDF |
Gemeinschaft, Gesellschaft, Community, Social networks, Groupware, Virtual communities, Cyberspace, Collaborative software |
23 | Manuel Oliveira 0002 |
Virtual environment system layered object model. |
Advances in Computer Entertainment Technology |
2004 |
DBLP DOI BibTeX RDF |
virtual environments, online games, component frameworks, cyberspace |
23 | Dennis L. Chao |
Doom as an interface for process management. |
CHI |
2001 |
DBLP DOI BibTeX RDF |
Doom, Post-Modernism, vernacular, visualization, games, operating systems, video games, metaphors, 3D user interfaces, first-person shooter, cyberspace |
Displaying result #1 - #100 of 3530 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|