|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 6505 occurrences of 3767 keywords
|
|
|
Results
Found 23679 publication records. Showing 23679 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
54 | Ricci S. C. Ieong, H. C. Leung |
Deriving cse-specific live forensics investigation procedures from FORZA. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
FORZA, digital forensics framework, live forensics |
46 | Maaria Nuutinen, Leena Norros |
Core task analysis in accident investigation: analysis of maritime accidents in piloting situations. |
Cogn. Technol. Work. |
2009 |
DBLP DOI BibTeX RDF |
Accident models, Expert cooperation, Pilotage, Maritime, Practices, Accident investigation |
43 | Georgia Frantzeskou, Stephen G. MacDonell, Efstathios Stamatatos |
Source Code Authorship Analysis For Supporting the Cybercrime Investigation Process. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
43 | Ricci S. C. Ieong, Pierre K. Y. Lai, Kam-Pui Chow, Michael Y. K. Kwan, Frank Y. W. Law |
Forensic Investigation of Peer-to-Peer Networks. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
42 | Jolanta Cybulka |
Applying the c.DnS Design Pattern to Obtain an Ontology for Investigation Management System. |
ICCCI |
2009 |
DBLP DOI BibTeX RDF |
Constructive descriptions and situations ontology, ontology of criminal and investigation processes, investigation management system |
41 | Anish Das Sarma, Alpa Jain, Divesh Srivastava |
I4E: interactive investigation of iterative information extraction. |
SIGMOD Conference |
2010 |
DBLP DOI BibTeX RDF |
explain, interactive investigation, information extraction, debugging, diagnose, repair |
37 | Heum Park, SunHo Cho, Hyuk-Chul Kwon |
Cyber Forensics Ontology for Cyber Criminal Investigation. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
criminal investigation, cyber forensics, ontology, digital evidence, cyber crime |
37 | Chung C. Chang, Kuo H. Hua |
Applying Case-Based Reasoning and Expert Systems to Coastal Patrol Crime Investigation in Taiwan. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
case-based reasoning (CBR), experts systems (ES), computerassisted instruction (CAI), crime investigation, coastal patrol |
36 | Gian Luca Marcialis, Fabio Roli, Pietro Coli, Giovanni Delogu |
A Fingerprint Forensic Tool for Criminal Investigations. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Christopher A. Canning, Baoying Wang |
Trends in Information Security Regulation. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Lodovico Marziale, Santhi Movva, Golden G. Richard III, Vassil Roussev, Loren Schwiebert |
Massively Threaded Digital Forensics Tools. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Bo Zhou 0001, Qi Shi 0001, Madjid Merabti |
A Novel Intrusion Detection System for Smart Space. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Xiaoling Chen, Rohan D. W. Perera, Ziqian Dong, Rajarathnam Chandramouli, Koduvayur P. Subbalakshmi |
Deception Detection on the Internet. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Antonio Savoldi, Paolo Gubian |
Embedded Forensics. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Stefan Katzenbeisser 0001, Huajian Liu, Martin Steinebach |
Challenges and Solutions in Multimedia Document Authentication. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Gian Piero Zarri |
Conceptual Tools for Dealing with 'Narrative' Terrorism Information. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Hong Cai, Sos S. Agaian |
A Novel Multilevel DCT Based Reversible Data Hiding. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Matthew Sorell |
Digital Camera Photographic Provenance. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Lynn Margaret Batten, Lei Pan 0002 |
Testing Digital Forensic Software Tools Used in Expert Testimony. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Patrizio Campisi, Emanuele Maiorana, Alessandro Neri 0001 |
Privacy Enhancing Technologies in Biometrics. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Thomas M. Chen |
Identity Theft through the Web. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Adel Elmaghraby, Deborah W. Keeling, Michael Losavio |
Legal Issues for Research and Practice in Computational Forensics. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Roberto Caldelli, Irene Amerini, Francesco Picchioni, Alessia De Rosa, Francesca Uccheddu |
Multimedia Forensic Techniques for Acquisition Device Identification and Digital Image Authentication. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Xi Zhao, Anthony T. S. Ho |
Semi-Fragile Image Watermarking, Authentication and Localization Techniques for Law Enforcement Applications. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Michael I. Cohen |
Network Forensics. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Tim Rawlinson, Abhir Bhalerao, Li Wang 0005 |
Principles and Methods for Face Recognition and Face Modelling. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Pawel T. Puslecki |
Biometrical Processing of Faces in Security and Forensics. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
36 | Cosimo Anglano |
Forensic Implications of Virtualization Technologies. |
Handbook of Research on Computational Forensics, Digital Crime, and Investigation |
2010 |
DBLP DOI BibTeX RDF |
|
35 | Timothy Neville, Matthew Sorell |
Audit Log for Forensic Photography. |
e-Forensics |
2009 |
DBLP DOI BibTeX RDF |
crime investigation, forensic investigation, digital negative, Digital photography |
35 | Anna Götmar, Jonas Lundberg |
Effective recommendations in loosely coupled accident investigations. |
ECCE |
2007 |
DBLP DOI BibTeX RDF |
recommendations, accident investigation |
35 | Martin P. Robillard, Wesley Coelho, Gail C. Murphy |
How Effective Developers Investigate Source Code: An Exploratory Study. |
IEEE Trans. Software Eng. |
2004 |
DBLP DOI BibTeX RDF |
program investigation, Software evolution, program understanding, empirical software engineering |
33 | Himanshu Khurana, Jim Basney, Mehedi Bakht, D. Michael Freemon, Von Welch, Randy Butler |
Palantir: a framework for collaborative incident response and investigation. |
IDtrust |
2009 |
DBLP DOI BibTeX RDF |
multi-site collaboration, digital investigation, incident response |
33 | Svein Yngvar Willassen |
Using simplified event calculus in digital investigation. |
SAC |
2008 |
DBLP DOI BibTeX RDF |
propositional logic, event calculus, digital investigation |
33 | Witold Halas, Victor Taranenko, Antoni Swic, Georgij Taranenko |
Investigation of Influence of Grinding Regimes on Surface Tension State. |
IEA/AIE |
2008 |
DBLP DOI BibTeX RDF |
grinding, surface tension state, influence, investigation |
32 | Martin P. Robillard, Putra Manggala |
Reusing Program Investigation Knowledge for Code Understanding. |
ICPC |
2008 |
DBLP DOI BibTeX RDF |
|
30 | Fredrik Sundt Breien, Ingerid Rødseth |
Usability factors of 3D criminal archive in an augmented reality environment. |
NordiCHI |
2006 |
DBLP DOI BibTeX RDF |
criminal investigation, usability, augmented reality, computer graphics, tangible user interfaces |
28 | Sukanya Manna, Tom Gedeon |
A Term Association Inference Model for Single Documents: A Stepping Stone for Investigation through Information Extraction. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
Gain of Words, Gain of Sentences, term significance, Information retrieval, summarization, investigation |
28 | Steve Counsell, George Loizou, Rajaa Najjar |
Quality of manual data collection in Java software: an empirical investigation. |
Empir. Softw. Eng. |
2007 |
DBLP DOI BibTeX RDF |
Java, Software metrics, Data collection, Empirical investigation |
28 | Slim Rekhis, Noureddine Boudriga |
A formal logic-based language and an automated verification tool for computer forensic investigation. |
SAC |
2005 |
DBLP DOI BibTeX RDF |
S-TLA+, S-TLC, formal forensic investigation, temporal logic of security actions |
26 | Long Chen 0022, Guoyin Wang 0001 |
An Efficient Piecewise Hashing Method for Computer Forensics. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
File system investigation, Hash, Digital forensics, Computer forensics |
26 | Meredith Ringel Morris, Eric Horvitz |
S3: Storable, Shareable Search. |
INTERACT (1) |
2007 |
DBLP DOI BibTeX RDF |
persistent search, Web search, exploratory search, investigation |
26 | Bob Breeden, Judie Mulholland |
Investigating 'Internet Crimes Against Children' (ICAC) cases in the state of Florida. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
ICAC, internet crimes against children, proactive investigation, training, forensics, law enforcement |
26 | Jennifer Jie Xu 0001, Hsinchun Chen |
CrimeNet explorer: a framework for criminal network knowledge discovery. |
ACM Trans. Inf. Syst. |
2005 |
DBLP DOI BibTeX RDF |
complete-link algorithm, crime investigation, clustering, visualization, knowledge discovery, social network analysis, multidimensional scaling, Law enforcement, concept space, precision and recall |
26 | Robert Schaefer |
Software maturity: design as dark art. |
ACM SIGSOFT Softw. Eng. Notes |
2009 |
DBLP DOI BibTeX RDF |
|
24 | Bayrem Triki, Slim Rekhis, Noureddine Boudriga |
Digital Investigation of Wormhole Attacks in Wireless Sensor Networks. |
NCA |
2009 |
DBLP DOI BibTeX RDF |
wireless digital investigation, wireless sensor networks, wormhole attacks |
24 | Yousheng Liu, Yuxian Wang, Huazhi Xiao |
Application of Active Service Component in Intelligent Investigation System of Specialty Provision. |
IFITA (3) |
2009 |
DBLP DOI BibTeX RDF |
demand perception, intellectualization, code generation initiative, investigation system of specialty provision, component, active service |
24 | Jewan Bang, Byeongyeong Yoo, Jongsung Kim, Sangjin Lee 0002 |
Analysis of Time Information for Digital Investigation. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
Time, File system, Windows, Digital Investigation |
24 | Jau-Hwang Wang, Tianjun Fu, Hong-Ming Lin, Hsinchun Chen |
Exploring Gray Web Forums: Analysis and Investigation of Forum-Based Communities in Taiwan. |
Intelligence and Security Informatics |
2008 |
DBLP DOI BibTeX RDF |
Forum-based Community, Gray Web Forum, Forum Analysis & Investigation, Crime Lead Discovering, Content Analysis |
24 | Yong-Dal Shin |
New Digital Forensics Investigation Procedure Model. |
NCM (1) |
2008 |
DBLP DOI BibTeX RDF |
digital crime, digital forensics, investigation |
24 | Marilyn Sue Bogner |
The How and Why of Incident Investigation: Implications for Health Information Technology. |
USAB |
2007 |
DBLP DOI BibTeX RDF |
Incident Investigation, Health Information Technology, Systems, Error, Behavior, User Support |
24 | Wen-Chin Li, Don Harris |
Confucius in Western Cockpits: The Investigation of Long-Term Versus Short-Term Orientation Culture and Aviation Accidents. |
HCI (13) |
2007 |
DBLP DOI BibTeX RDF |
Confucian, Human Factors Analysis and Classification System, Human Error, Cross-culture, Accident Investigation |
24 | Han-Shik Kim, Byung-Seok Kang, Sangheon Pack, Chul-Hee Kang |
Route Investigation for Secure Routing in Mobile Ad-hoc Networks. |
SECURWARE |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Martin P. Robillard, Gail C. Murphy |
Automatically Inferring Concern Code from Program Investigation Activities. |
ASE |
2003 |
DBLP DOI BibTeX RDF |
|
22 | Massimiliano Di Penta, Sandro Morasca, Alberto Sillitti |
3rd International Workshop on Designing Empirical Studies: Assessing the Effectiveness of Agile Methods (IWDES 2009). |
XP |
2009 |
DBLP DOI BibTeX RDF |
data collection, Empirical investigation |
22 | Bruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese |
Artificial intelligence applied to computer forensics. |
SAC |
2009 |
DBLP DOI BibTeX RDF |
artificial intelligence, multiagent systems, computer forensics, JADE, digital investigation |
22 | Xinyan Zhao, Ge Wei, Lu Tingjie |
Study on consumer demands and merchant participation motives of mobile payment services in China. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
consumer demands, merchant participation motives, mobile payment, investigation |
22 | Xinyan Zhao, Wei Ge, Tingjie Lu |
Study on consumer demands and merchant participation motives of mobile payment services in China. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
consumer demands, merchant participation motives, mobile payment, investigation |
22 | Bruno W. P. Hoelz, Célia Ghedini Ralha, Rajiv Geeverghese, Hugo C. Junior |
MADIK: A Collaborative Multi-agent ToolKit to Computer Forensics. |
OTM Workshops |
2008 |
DBLP DOI BibTeX RDF |
collaborative multi-agent systems, computer forensics, JADE, digital investigation, JESS |
22 | Reid Holmes, Andrew Begel |
Deep intellisense: a tool for rehydrating evaporated information. |
MSR |
2008 |
DBLP DOI BibTeX RDF |
code investigation, mining repositories |
22 | Yacine Djemaiel, Noureddine Boudriga |
A global marking scheme for tracing cyber attacks. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
global marking, malicious activity, digital investigation, security attack |
22 | Nayot Poolsapassit, Indrajit Ray |
Investigating Computer Attacks Using Attack Trees. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2007 |
DBLP DOI BibTeX RDF |
Forensic investigation, computer attacks, log file filtering, attack tree |
22 | Bruce A. Reinig, Robert O. Briggs, Morgan M. Shepherd, Jerome Yen, Jay F. Nunamaker Jr. |
Developing and validating an instrument to measure the impact of group support technology on affective reward. |
HICSS (4) |
1995 |
DBLP DOI BibTeX RDF |
group support technology, group productivity, user resistance, excitation transfer, affective reward, emotionally unfulfilled, laboratory investigation, groupware, human factors, business data processing, social aspects of automation, team effectiveness |
22 | Daniel D. Harrison, M. P. Weir |
High-Speed Triangulation-Based 3-D Imaging with Orthonormal Data Projections and Error Detection. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1990 |
DBLP DOI BibTeX RDF |
surface topography measurement, triangulation-based 3-D imaging, orthonormal data projections, charge-injection-device image sensor, laser-based investigation system, printed-circuit board inspection, laser beam applications, surface topography measurement, computer vision, error detection, inspection, CCD image sensors, CCD image sensors, printed circuit testing |
22 | Robert Law |
Using student blogs for documentation in software development projects. |
ITiCSE |
2011 |
DBLP DOI BibTeX RDF |
|
19 | Mario Trottini, Krishnamurty Muralidhar, Rathindra Sarathy |
A Preliminary Investigation of the Impact of Gaussian Versus t-Copula for Data Perturbation. |
Privacy in Statistical Databases |
2008 |
DBLP DOI BibTeX RDF |
Tail Dependence, Copula, Data Perturbation, Data Masking |
19 | Chris W. Johnson 0001 |
Using IEC 61508 to Guide the Investigation of Computer-Related Incidents and Accidents. |
SAFECOMP |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Peng Ji, Junzhou Luo |
A Feedback and Investigation Based Resources Discovery and Management Model on Computational Grid. |
GCC (2) |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Robert L. Sedlmeyer, Marc J. Lipman |
Computer-aided investigation in graph theory (abstract only). |
ACM Conference on Computer Science |
1985 |
DBLP DOI BibTeX RDF |
|
18 | Mayu Iwata, Takahiro Hara, Shojiro Nishio |
How Different are Preferences of Children and Adults on Web Pages? |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
Children, Preference, Web page, Investigation |
18 | Matthew Simon, Jill Slay |
Recovery of Skype Application Activity Data from Physical Memory. |
ARES |
2010 |
DBLP DOI BibTeX RDF |
Electronic evidence, RAM forensics, Volatile memory forensics, Computer forensics, Digital evidence, Digital investigation |
18 | Norsaremah Salleh, Emilia Mendes, John C. Grundy, Giles St. J. Burch |
An empirical study of the effects of conscientiousness in pair programming using the five-factor personality model. |
ICSE (1) |
2010 |
DBLP DOI BibTeX RDF |
conscientiousness, five-factor model, formal experiment, higher education, pair programming, empirical investigation, personality type |
18 | Wen-Chin Li, Don Harris, Lon-Wen Li, Thomas Wang |
The Differences of Aviation Human Factors between Individualism and Collectivism Culture. |
HCI (4) |
2009 |
DBLP DOI BibTeX RDF |
Human Factors, Cross-culture, Aviation Safety, Accident Investigation |
18 | SeungBong Lee, Jewan Bang, Kyung-Soo Lim, Jongsung Kim, Sangjin Lee 0002 |
A Stepwise Methodology for Tracing Computer Usage. |
NCM |
2009 |
DBLP DOI BibTeX RDF |
selectively acquisition, pre-investigation, PIM |
18 | Feng Jing |
Application of 3S Technology to the Updating Survey of Land. |
ESIAT (1) |
2009 |
DBLP DOI BibTeX RDF |
3S technology, land survey, updating investigation |
18 | Yan Zhang, Bin Xu, Qiao Liang |
Groundwater Quality Research Based on PDA and 3S Technology. |
ESIAT (2) |
2009 |
DBLP DOI BibTeX RDF |
Groundwater Quality Investigation, Jinghui Canal irrigation zones, GIS, PDA, groundwater |
18 | Marcel Worring, Rita Cucchiara |
Multimedia in forensics. |
ACM Multimedia |
2009 |
DBLP DOI BibTeX RDF |
forensic investigation, forensic mining, multimedia search, pattern recognition, computer vision, surveillance |
18 | Yiming Yang, Subramaniam Ganapathy, Abhay Harpale |
Protein identification as an information retrieval problem. |
SIGIR |
2009 |
DBLP DOI BibTeX RDF |
interdisciplinary investigation, vector space models, tandem mass spectra, protein identification |
18 | Sebastian Adam, Kizito Ssamula Mukasa, Kai Breiner, Marcus Trapp |
An apartment-based metaphor for intuitive interaction with ambient assisted living applications. |
BCS HCI (1) |
2008 |
DBLP DOI BibTeX RDF |
apartment metaphor, navigation structure, ubiquitous interactivity, usability, accessibility, ambient intelligence, metaphor, ambient assisted living, empirical investigation |
18 | Bogdan Werth, Scott Moss |
Intrusion of Agent-Based Social Simulation in Economic Theory. |
MABS |
2008 |
DBLP DOI BibTeX RDF |
transaction cost theory, investigation of economic theory, outsourcing, agent-based modeling, model validation, offshoring, transaction cost economics |
18 | Li Ding, Brandon Dixon |
Using an edge-dual graph and k-connectivity to identify strong connections in social networks. |
ACM Southeast Regional Conference |
2008 |
DBLP DOI BibTeX RDF |
crime investigation, strong connections, social network analysis, law enforcement, k-connectivity |
18 | Paolo Casari, Michele Rossi, Michele Zorzi |
Fountain codes and their application to broadcasting in underwater networks: performance modeling and relevant tradeoffs. |
Underwater Networks |
2008 |
DBLP DOI BibTeX RDF |
performance investigation, modeling, broadcast, underwater acoustic networks, hybrid ARQ, fountain codes |
18 | Alta de Waal, Jacobus Venter, Etienne Barnard |
Applying Topic Modeling to Forensic Data. (PDF / PS) |
IFIP Int. Conf. Digital Forensics |
2008 |
DBLP DOI BibTeX RDF |
analysis phase, evidence mining, topic modeling, Digital investigation |
18 | Katrin Franke |
Stroke-Morphology Analysis Using Super-Imposed Writing Movements. |
IWCF |
2008 |
DBLP DOI BibTeX RDF |
residual ink trace, writing behavior, combined on/offline handwriting analysis, forensic investigation, signature verification |
18 | Katrin Franke, Sargur N. Srihari |
Computational Forensics: An Overview. |
IWCF |
2008 |
DBLP DOI BibTeX RDF |
Forensic science, Investigation services, Artificial intelligence, Computational science, Computer science, Law enforcement |
18 | Thomas Wilde, Thomas Hess |
Forschungsmethoden der Wirtschaftsinformatik. |
Wirtschaftsinf. |
2007 |
DBLP DOI BibTeX RDF |
Information Systems, Methodology, Comparison, Research Methods, Empirical Investigation, Longitudinal Analysis |
18 | Philippe A. Palanque, Sandra Basnyat, David Navarre |
Improving Interactive Systems Usability Using Formal Description Techniques: Application to HealthCare. |
USAB |
2007 |
DBLP DOI BibTeX RDF |
Incident and Accident Investigation, Human-Computer Interaction, Medical Informatics, Formal Description Techniques, Patient Monitoring |
18 | I. F. Shishkin, A. G. Sergushev |
Space-Extensive Targets Radar Search in the Presence of Noise. |
IF&GIS |
2007 |
DBLP DOI BibTeX RDF |
Theory of search, search of space-extensive targets, efficiency of searching aids, search of traces on the sea surface, investigation of traces in water areas |
18 | Amy J. Ko, Brad A. Myers, Michael J. Coblenz, Htet Htet Aung |
An Exploratory Study of How Developers Seek, Relate, and Collect Relevant Information during Software Maintenance Tasks. |
IEEE Trans. Software Eng. |
2006 |
DBLP DOI BibTeX RDF |
Program investigation, program comprehension, program understanding, empirical software engineering, information foraging, information scent |
18 | Daniela E. Damian, James Chisan |
An Empirical Study of the Complex Relationships between Requirements Engineering Processes and Other Processes that Lead to Payoffs in Productivity, Quality, and Risk Management. |
IEEE Trans. Software Eng. |
2006 |
DBLP DOI BibTeX RDF |
process interactions, Requirements engineering, process improvement, empirical investigation |
18 | James William Rust |
Corporate management of computer forensics evidence. |
InfoSecCD |
2006 |
DBLP DOI BibTeX RDF |
management, information security, computer forensics, hackers, digital evidence, investigation, incident response |
18 | Martin P. Robillard, Gail C. Murphy |
Just-in-time concern modeling. |
ACM SIGSOFT Softw. Eng. Notes |
2005 |
DBLP DOI BibTeX RDF |
program investigation, separation of concerns, inconsistency management, concern modeling |
18 | Greg Goth, Barton C. Massey |
In the News. |
IEEE Softw. |
2005 |
DBLP DOI BibTeX RDF |
Medsphere, SpikeSource, Center for Open Source Investigation, Gluecode, Cloudscape, SourceForge.net, JBoss, Business Readiness Rating, Java Enterprise Middleware Server, GNU Lesser General Public License, Larry Wall, OSCON, O'Reilly, Drupal Content Management Systems Conference, Asterisk OSS, Linux desktop, Linux, open source software, open source software, PHP, Perl, Ruby on Rails, WebSphere |
18 | Imran Majid, Martin P. Robillard |
NaCIN: an Eclipse plug-in for program navigation-based concern inference. |
eTX |
2005 |
DBLP DOI BibTeX RDF |
concern inference, program investigation, program navigation, concern modeling |
18 | Katerina Pastra, Horacio Saggion, Yorick Wilks |
Intelligent Indexing of Crime Scene Photographs. |
IEEE Intell. Syst. |
2003 |
DBLP DOI BibTeX RDF |
text-based image indexing, relational fact, crime investigation technology, image retrieval, image indexing |
18 | Daniel Micusík, Viera Stopjaková, Lubica Benusková |
Application of Feed-forward Artificial Neural Networks to the Identification of Defective Analog Integrated Circuits. |
Neural Comput. Appl. |
2002 |
DBLP DOI BibTeX RDF |
Circuits response investigation, Fault modelling and simulation, Resilient-backpropagation neural networks, Signal filtering, Supply current analysis |
18 | Klaus Julisch, Marc Dacier |
Mining intrusion detection alarms for actionable knowledge. |
KDD |
2002 |
DBLP DOI BibTeX RDF |
alarm investigation, episode rules, data mining, intrusion detection, conceptual clustering |
18 | Martin J. Shepperd, Chris Schofield |
Estimating Software Project Effort Using Analogies. |
IEEE Trans. Software Eng. |
1997 |
DBLP DOI BibTeX RDF |
estimation process, case-based reasoning, analogy, Effort prediction, empirical investigation |
17 | Jun Moriyama, Yasushi Kato, Yoshika Aoki, Akihito Kito, Maryam Behnoodi, Youichi Miyagawa, Masashi Matsuura |
Self-efficacy and learning experience of information education: in case of junior high school. |
AI Soc. |
2009 |
DBLP DOI BibTeX RDF |
|
17 | Yeog Kim, Jewan Bang, Gu Taek Lee, Sangjin Lee 0002, Jongin Lim 0001 |
A Field Guide to Hidden Accounting Information Detection. |
FGCN (2) |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Jau-Hwang Wang, Bill T. Lin, Ching-Chin Shieh, Peter S. Deng |
Criminal Record Matching Based on the Vector Space Model. |
ISI |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 23679 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|