Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
125 | Safaa Zaman, Fakhri Karray |
Lightweight IDS Based on Features Selection and IDS Classification Scheme. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
95 | Xin Jin, Yaoxue Zhang, Yue-Zhi Zhou, Yaya Wei |
A Novel IDS Agent Distributing Protocol for MANETs. |
International Conference on Computational Science (2) |
2005 |
DBLP DOI BibTeX RDF |
|
87 | Sebastian Roschke, Feng Cheng 0002, Christoph Meinel |
An Extensible and Virtualization-Compatible IDS Management Architecture. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
84 | N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit |
Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
Challenges in IDS, IDS Architecture, IDS Standards |
80 | Rodrigo Werlinger, Kirstie Hawkey, Kasia Muldner, Pooya Jaferian, Konstantin Beznosov |
The challenges of using an intrusion detection system: is it worth the effort? |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
collaboration, intrusion detection, usable security, security management, qualitative research, organizational factors, security tools |
80 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
|
79 | Mauro Silva, Denivaldo Lopes, Zair Abdelouahab |
A Remote IDS Based on Multi-Agent Systems, Web Services and MDA. |
ICSEA |
2006 |
DBLP DOI BibTeX RDF |
Software security privacy, metadata repository, agents, intrusion detection, Model-Driven Architecture |
72 | Hongjian Li, Ming Xu 0002, Yi Li |
The Research of Frame and Key Technologies for Intrusion Detection System in IEEE 802.11-based Wireless Mesh Networks. |
CISIS |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric |
Measuring intrusion detection capability: an information-theoretic approach. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
information-theoretic, intrusion detection, performance measurement |
71 | William H. Allen |
Mixing Wheat with the Chaff: Creating Useful Test Data for IDS Evaluation. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Payas Gupta, Chedy Raïssi, Gérard Dray, Pascal Poncelet, Johan Brissaud |
SS-IDS: Statistical Signature Based IDS. |
ICIW |
2009 |
DBLP DOI BibTeX RDF |
|
65 | Kenichi Kourai, Shigeru Chiba |
HyperSpector: virtual distributed monitoring environments for secure intrusion detection. |
VEE |
2005 |
DBLP DOI BibTeX RDF |
inter-VM monitoring, virtual machine, virtual network, distributed IDS |
64 | Dong Yu 0001, Deborah A. Frincke |
Towards Survivable Intrusion Detection System . |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
63 | Jungsuk Song, Hiroki Takakura, Yongjin Kwon |
A Generalized Feature Extraction Scheme to Detect 0-Day Attacks via IDS Alerts. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Sufatrio, Roland H. C. Yap |
Improving Host-Based IDS with Argument Abstraction to Prevent Mimicry Attacks. |
RAID |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Nathan Carey, Andrew J. Clark, George M. Mohay |
IDS Interoperability and Correlation Using IDMEF and Commodity Systems. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
Interoperability, Intrusion Detection, Network Management, Correlation, Data Analysis |
63 | Hee Suk Seo, Tae Ho Cho |
Simulation of Network Security with Collaboration among IDS Models. |
Australian Joint Conference on Artificial Intelligence |
2001 |
DBLP DOI BibTeX RDF |
|
56 | Liwei Kuang, Mohammad Zulkernine |
An Intrusion-Tolerant Mechanism for Intrusion Detection Systems. |
ARES |
2008 |
DBLP DOI BibTeX RDF |
Intrusion detection systems, Intrusion-tolerance |
56 | Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt |
Formal Reasoning About Intrusion Detection Systems. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
verification, formal method, Intrusion detection, security policy |
56 | Tieyan Li, Wai-Meng Chew, Kwok-Yan Lam |
Defending against Distributed Denial of Service Attacks Using Resistant Mobile Agent Architecture. |
IPDPS |
2002 |
DBLP DOI BibTeX RDF |
attack resistant, mobile agents, intrusion detection systems, DoS attacks |
56 | Jia Wang, Insup Lee 0001 |
Measuring False-Positive by Automated Real-Time Correlated Hacking Behavior Analysis. |
ISC |
2001 |
DBLP DOI BibTeX RDF |
|
56 | Guangchun Luo, Xianliang Lu, Jiong Li, Jun Zhang |
MADIDS: a novel distributed IDS based on mobile agent. |
ACM SIGOPS Oper. Syst. Rev. |
2003 |
DBLP DOI BibTeX RDF |
performance, mobile agent, distributed IDS |
55 | Xiantao Zhang, Qi Li 0002, Sihan Qing, Huanguo Zhang |
VNIDA: Building an IDS Architecture Using VMM-Based Non-Intrusive Approach. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
55 | Vidar Evenrud Seeberg, Slobodan Petrovic |
A New Classification Scheme for Anonymization of Real Data Used in IDS Benchmarking. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
50 | Alia Fourati, Khaldoun Al Agha |
Detecting forged routing messages in ad hoc networks. |
Telecommun. Syst. |
2008 |
DBLP DOI BibTeX RDF |
OLSR protocol, Routing vulnerabilities, MANET, IDS, Security services |
50 | Hoda M. Hassan, Mohy Mahmoud, Sherif El-Kassas |
Securing the AODV protocol using specification-based intrusion detection. |
Q2SWinet |
2006 |
DBLP DOI BibTeX RDF |
specification-based detection, IDS, network monitoring, AODV |
49 | Julio Gómez, Consolación Gil, Nicolás Padilla, Raul Baños, C. Jiménez |
Design of a Snort-Based Hybrid Intrusion Detection System. |
IWANN (2) |
2009 |
DBLP DOI BibTeX RDF |
anomaly detection, Intrusion detection systems, Snort, Network IDS |
48 | Jin-Hee Cho, Ing-Ray Chen, Phu-Gui Feng |
Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks. |
PRDC |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Guy G. Helmer, Johnny S. Wong, Mark Slagell, Vasant G. Honavar, Les Miller, Robyn R. Lutz |
A Software Fault Tree Approach to Requirements Analysis of an Intrusion Detection System. |
Requir. Eng. |
2002 |
DBLP DOI BibTeX RDF |
Software fault tree, Mobile agents, Intrusion detection system, Requirements analysis, Coloured Petri nets |
48 | Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, Yi Zhang |
Performance Adaptation in Real-Time Intrusion Detection Systems. |
RAID |
2002 |
DBLP DOI BibTeX RDF |
Real-time intrusion detection, performance adaptation, optimization, performance metrics |
48 | Steve Jones, Stephen Lundy, Gordon W. Paynter |
Interactive Document Summarisation Using Automatically Extracted Keyphrases. |
HICSS |
2002 |
DBLP DOI BibTeX RDF |
|
48 | Danny Dhillon, Jerry Zhu, John Richards, Tejinder S. Randhawa |
Implementation & evaluation of an IDS to safeguard OLSR integrity in MANETs. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
multipoint relay (MPR), optimized link state routing (OLSR), routing protocol integrity, security, mobile ad-hoc networks (MANET), IP, intrusion detection systems (IDS) |
47 | Han Qiu 0001, Luna Li, Linghe Kong |
Message from the Program Chairs IDS 2022. |
BigDataSecurity/HPSC/IDS |
2022 |
DBLP DOI BibTeX RDF |
|
47 | Masayuki Murakami, Nakaji Honda |
Experimental Investigation of the Fault Tolerance of IDS Models. |
FUZZ-IEEE |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Mehdi Salour, Xiao Su |
Dynamic Two-Layer Signature-Based IDS with Unequal Databases. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
47 | A. Karygiannis, K. Robotis, E. Antonakakis |
Creating Offline MANET IDS Network Traces. |
WOWMOM |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Marko Jahnke, Jens Tölle, Alexander Finkenbrink, Alexander Wenzel, Elmar Gerhards-Padilla, Nils Aschenbruck, Peter Martini |
Methodologies and frameworks for testing ids in adhoc networks. |
Q2SWinet |
2007 |
DBLP DOI BibTeX RDF |
attacks and attack implementations, hardware testbed, reproducible node motion, semi-virtual testbed, smart MANET jamming, worm hole, black hole |
47 | Masayuki Murakami, Nakaji Honda |
Fault Tolerance Comparison of IDS Models with Multilayer Perceptron and Radial Basis Function Networks. |
IJCNN |
2007 |
DBLP DOI BibTeX RDF |
|
47 | Abhishek Mitra, Walid A. Najjar, Laxmi N. Bhuyan |
Compiling PCRE to FPGA for accelerating SNORT IDS. |
ANCS |
2007 |
DBLP DOI BibTeX RDF |
deep payload inspection, nondeterministic nite automata, intrusion detection system, regular expressions |
47 | Emilio Corchado, Álvaro Herrero 0001, José Manuel Sáiz |
Testing CAB-IDS Through Mutations: On the Identification of Network Scans. |
KES (2) |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Nigel Jacob, Carla E. Brodley |
Offloading IDS Computation to the GPU. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
47 | Lingjuan Li, Wenyu Tang, Ruchuan Wang 0001 |
A CBR Engine Adapting to IDS. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Ilija Basicevic, Miroslav Popovic, Vladimir Kovacevic |
The Use of Distributed Network-Based IDS Systems in Detection of Evasion Attacks. |
AICT/SAPIR/ELETE |
2005 |
DBLP DOI BibTeX RDF |
|
47 | Nathan Carey, George M. Mohay, Andrew J. Clark |
Attack Signature Matching and Discovery in Systems Employing Heterogeneous IDS. |
ACSAC |
2003 |
DBLP DOI BibTeX RDF |
|
47 | Ricki G. Ingalls, John W. Nazemetz |
Supply chain applications I: designing the support logistics for the FAA ACE-IDS system. |
WSC |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Kulsoom Abdullah, Christopher P. Lee 0001, Gregory J. Conti, John A. Copeland, John T. Stasko |
IDS RainStorm: Visualizing IDS Alarms. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
IDS alarms, alert visualization, log visualization, alarm visualization, network security information visualization, network monitoring |
42 | Chinyang Henry Tseng, Shiau-Huey Wang, Calvin Ko, Karl N. Levitt |
DEMEM: Distributed Evidence-Driven Message Exchange Intrusion Detection Model for MANET. |
RAID |
2006 |
DBLP DOI BibTeX RDF |
DEMEM, TBRPF, attack method, MPR selector, Hello message, TC message, ID message, ID Manager, ID-Evidence, ID-Forward, ID-Request, MANET, constraint, IDS, AODV, evidence, DSR, OLSR, forwarder, TESLA, MPR |
42 | María Bermúdez-Edo, Rolando Salazar-Hernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro |
Proposals on Assessment Environments for Anomaly-Based Network Intrusion Detection Systems. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
Intrusion event, Network security, Assessment, IDS |
41 | Patrick S. Wheeler, Errin W. Fulp |
A taxonomy of parallel techniques for intrusion detection. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
security, intrusion detection systems (IDS) |
41 | Hyun-A Park, Dong Hoon Lee 0001, Jongin Lim 0001, Sang Hyun Cho |
PPIDS: Privacy Preserving Intrusion Detection System. |
PAISI |
2007 |
DBLP DOI BibTeX RDF |
Host-based IDS, Privacy, Intrusion Detection System, Audit log, Privacy Homomorphism |
41 | John McHugh |
The 1998 Lincoln Laboratory IDS Evaluation. |
Recent Advances in Intrusion Detection |
2000 |
DBLP DOI BibTeX RDF |
Evaluation, IDS, ROC Analysis |
40 | Sven Ehlert, Ge Zhang, Thomas Magedanz |
Increasing SIP firewall performance by ruleset size limitation. |
PIMRC |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Hui Liu, Zhitang Li |
Methodology of Network Intrusion Detection System Penetration Testing. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Babak Khosravifar, Jamal Bentahar |
An Experience Improving Intrusion Detection Systems False Alarm Ratio by Using Honeypot. |
AINA |
2008 |
DBLP DOI BibTeX RDF |
|
40 | Luciano Bononi, Carlo Tacconi |
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks. |
Int. J. Inf. Sec. |
2007 |
DBLP DOI BibTeX RDF |
Secure clustering and routing, Statistically unique and cryptographically verifiable identifiers, Mobile Ad Hoc and Vehicular Networks, Intrusion detection system |
40 | Kuo Zhao, Meng Zhang 0006, Kexin Yang, Liang Hu 0001 |
Data Collection for Intrusion Detection System Based on Stratified Random Sampling. |
ICNSC |
2007 |
DBLP DOI BibTeX RDF |
|
40 | Luciano Bononi, Carlo Tacconi |
A Wireless Intrusion Detection System for Secure Clustering and Routing in Ad Hoc Networks. |
ISC |
2006 |
DBLP DOI BibTeX RDF |
Secure Clustering and Routing, Statistically Unique and Cryptographically Verifiable Identifiers, Mobile Ad Hoc Networks, Intrusion Detection System |
40 | Shukor Abd Razak, Steven Furnell, Nathan L. Clarke, Phillip J. Brooke |
A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks - A Friend Approach. |
ISI |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Frédéric Massicotte, François Gagnon, Yvan Labiche, Lionel C. Briand, Mathieu Couture |
Automatic Evaluation of Intrusion Detection Systems. |
ACSAC |
2006 |
DBLP DOI BibTeX RDF |
|
40 | Ioannis Sourdis, Vassilis Dimopoulos, Dionisios N. Pnevmatikatos, Stamatis Vassiliadis |
Packet pre-filtering for network intrusion detection. |
ANCS |
2006 |
DBLP DOI BibTeX RDF |
packet inspection, packet pre-filtering, intrusion detection |
40 | Oge Marques, Pierre Baillargeon |
A Multimedia Traffic Classification Scheme for Intrusion Detection Systems. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Se-Yul Lee, Yong-Soo Kim, Bong-Hwan Lee, Sukhoon Kang, Chan-Hyun Youn |
A Probe Detection Model Using the Analysis of the Fuzzy Cognitive Maps. |
ICCSA (1) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Yong Zeng 0002, Jianfeng Ma 0001 |
Sampling Distance Analysis of Gigantic Data Mining for Intrusion Detection Systems. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Matthew V. Mahoney 0001, Philip K. Chan |
Learning nonstationary models of normal network traffic for detecting novel attacks. |
KDD |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Henry Dol, Koen Blom, Richard Heusdens, Richard C. Hendriks, Geert Leus |
On the equivalence of OSDM and OTFS. |
Signal Process. |
2024 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Richard Heusdens, Richard C. Hendriks, Geert Leus |
Optimal Pilot Design for OTFS in Linear Time-Varying Channels. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Richard C. Hendriks, Richard Heusdens, Geert Leus |
Transmit Waveform Design Based on the Cramér-Rao Lower Bound. |
CAMSAP |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Richard C. Hendriks, Richard Heusdens |
Channel Parameter Estimation Using a Wideband LFM Preamble: Comparison of the Fractional Fourier Transform and Matched Filtering. |
EUSIPCO |
2023 |
DBLP DOI BibTeX RDF |
|
40 | Ids Van der Werf, Pablo Martínez-Nuevo, Martin Bo Møller, Richard C. Hendriks, Jorge Martínez 0002 |
Towards Gridless Sound Field Reconstruction. |
EUSIPCO |
2022 |
DBLP BibTeX RDF |
|
40 | Lennart Blanken, Ids van den Meijdenberg, Tom Oomen |
Kernel-based regression of non-causal systems for inverse model feedforward estimation. |
AMC |
2018 |
DBLP DOI BibTeX RDF |
|
40 | Emmy Rood, Robert-Jan Bosman, Johan Ids van der Spoel, Paul Taylor, Durk Freark Zandstra |
Research Paper: Use of a Computerized Guideline for Glucose Regulation in the Intensive Care Unit Improved Both Guideline Adherence and Glucose Regulation. |
J. Am. Medical Informatics Assoc. |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Paul T. M. van Zeijl, Jan-Wim Th. Eikenbroek, Peter Paul Vervoort, Suma Setty, Jurjen Tangenberg, Gary Shipton, Eric Kooistra, Ids C. Keekstra, Didier Belot, Klaas Visser, Erwin Bosma, Stephan C. Blaakmeer |
A 1.1-V 270-μA mixed-signal hearing aid chip. |
IEEE J. Solid State Circuits |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Paul T. M. van Zeijl, Jan-Wim Th. Eikenbroek, Peter Paul Vervoort, Suma Setty, Jurjen Tangenberg, Gary Shipton, Eric Kooistra, Ids C. Keekstra, Didier Belot, Klaas Visser, Erwin Bosma, Stephan C. Blaakmeer |
A Bluetooth radio in 0.18-μm CMOS. |
IEEE J. Solid State Circuits |
2002 |
DBLP DOI BibTeX RDF |
|
40 | Jouni Viinikka, Hervé Debar |
Monitoring IDS Background Noise Using EWMA Control Charts and Alert Information. |
RAID |
2004 |
DBLP DOI BibTeX RDF |
IDS background noise, alert volume reduction, EWMA |
39 | Steven Noel, Sushil Jajodia |
Optimal IDS Sensor Placement and Alert Prioritization Using Attack Graphs. |
J. Netw. Syst. Manag. |
2008 |
DBLP DOI BibTeX RDF |
Topological vulnerability analysis, Intrusion detection, Attack graphs, Sensor placement |
39 | Masayuki Murakami, Nakaji Honda |
Performance of the IDS Method as a Soft Computing Tool. |
IEEE Trans. Fuzzy Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Ashok Kumar Tummala, Parimal Patel |
Distributed IDS using Reconfigurable Hardware. |
IPDPS |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Álvaro Herrero 0001, Emilio Corchado, José Manuel Sáiz |
MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection. |
IDEAL |
2006 |
DBLP DOI BibTeX RDF |
Exploratory Projection Pursuit, Neural Networks, Intrusion Detection, Multiagent Systems, Unsupervised Learning, Computer Network Security |
39 | Emmanuel Hooper |
An Intelligent Detection and Response Strategy to False Positives and Network Attacks: Operation of Network Quarantine Channels and Feedback Methods to IDS. |
SecPerU |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Emanoel Costa Claudino, Zair Abdelouahab, Mário Meireles Teixeira |
Management and Integration of Information in Intrusion Detection System: Data Integration System for IDS Based Multi-Agent Systems. |
IAT Workshops |
2006 |
DBLP DOI BibTeX RDF |
|
39 | Ricardo Staciarini Puttini, Jean-Marc Percher, Ludovic Mé, Rafael T. de Sousa Jr. |
A fully distributed IDS for MANET. |
ISCC |
2004 |
DBLP DOI BibTeX RDF |
|
35 | A. Maciej Rossudowski, Hein S. Venter, Jan H. P. Eloff |
Personal Anomaly-based Intrusion Detection Smart Card Using Behavioural Analysis. |
SEC |
2007 |
DBLP DOI BibTeX RDF |
personal IDS, smart card, Intrusion Detection System, IDS, behavioural analysis |
34 | Rituparna Chaki, Nabendu Chaki |
IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. |
CISIM |
2007 |
DBLP DOI BibTeX RDF |
Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS |
34 | A. Karygiannis, E. Antonakakis, A. Apostolopoulos |
Detecting Critical Nodes for MANET Intrusion Detection Systems. |
SecPerU |
2006 |
DBLP DOI BibTeX RDF |
edge-cut, vertex-cut, security, mobile ad hoc network, MANET, intrusion detection, IDS |
34 | Jessie B. Kennedy, Peter J. Barclay (eds.) |
Interfaces to Databases (IDS-3), Proceedings of the 3rd International Workshop on Interfaces to Databases, Napier University, Edinburgh, UK, 8-10 July 1996. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Marc Gemis |
The Use of the Data Dictionary in DBMS Based on Graphs. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Mohamed Dbouk, Donatas Kvedarauskas, Patrice Boursier |
Dynamic Maps: An Intuitive Interface for Naive Users of Geographical Database Systems. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Thomas Schweikert, Matthias L. Hemmje |
A Graphical User Interface to the Object-Oriented Database System VODAK on the Basis of the Generic Visualisation Toolkit Lyberworld. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Kenneth J. Mitchell, Jessie B. Kennedy |
DRIVE - An Environment for the Organised Construction of User-Interfaces to Databases. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Ee-Peng Lim, Soo-Yin Cheng |
LibSearch: A Window-Based Frontend to Remote Bibliographic Databases on the Internet. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Norman W. Paton, Khoa Doan, Oscar Díaz, Arturo Jaime 0001 |
Exploitation of Object-Oriented and Active Constructs in Database Interface Development. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Laura Tarantino |
Hypertabular Representation of Database Relations in World Wide Web Front-Ends. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Francesca Benzi, Dario Maio, Stefano Rizzi |
Visionary: A Visual Query Language Based on the User Viewpoint Approach. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Shi-Kuo Chang, Maria Francesca Costabile, M. Vairo |
VR Queries and Their Transformations in a Progressive Querying Environment. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Alison Crerar, Peter J. Barclay, Richard Watt |
TOTEM: An Interactive Tool for Creative Data Modelling. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Armstrong Kadyamatimba, John A. Mariani, Peter Sawyer |
Desktop Objects: Directly Manipulating Data and Meta Data. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | J. Boyle, H. Horch, M. Scharf |
Visualising Large Data Sets in Molecular Biology. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Matthew Chalmers |
Interface Design: More Craft than Science? |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Marie-Aude Aufaure-Portier, Claude Trépied |
A Survey of Query Languages for Geographic Information Systems. |
IDS |
1996 |
DBLP BibTeX RDF |
|
34 | Albert N. Badre, Tiziana Catarci, Antonio Massari, Giuseppe Santucci |
Comparative Ease of Use of a Diagrammatic vs. an Iconic Query Language. |
IDS |
1996 |
DBLP BibTeX RDF |
|