Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
Likely matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 21 matches
- 2022
- Chia-Shan Liu, Yu-Ching Ling, Yung-Hua Lu, Yu-Hua Yang, Hao-Yang Peng:
違禁品 Outlaw. SIGGRAPH Asia Computer Animation Festival 2022: 10:1 - 2021
- Debabrata Dey, Atanu Lahiri:
Should We Outlaw Ransomware Payments? HICSS 2021: 1-9 - 2020
- Julian F. Müller, Jan Gogoll:
Should Manual Driving be (Eventually) Outlawed? Sci. Eng. Ethics 26(3): 1549-1567 (2020) - Miranda Nixon-Hill, Felix Outlaw, Lindsay W. MacDonald, Rajeshwar P. Mookerjee, Terence S. Leung:
Minimising ambient illumination via ambient subtraction: smartphone assessment of jaundice in liver patients via sclera images. CIC 2020: 307-312 - Duc Anh Le, Blair MacIntyre, Jessica Outlaw:
Enhancing the Experience of Virtual Conferences in Social Virtual Environments. VR Workshops 2020: 485-494 - Diane Hosfelt, Jessica Outlaw, Tyesha Snow, Sara Carbonneau:
Look Before You Leap: Trusted User Interfaces for the Immersive Web. CoRR abs/2011.03570 (2020) - 2019
- Jop Briët, Zeev Dvir, Sivakanth Gopi:
Outlaw Distributions and Locally Decodable Codes. Theory Comput. 15: 1-24 (2019) - Felix Outlaw, Miranda Nixon, Nana Okai Brako, Lindsay W. MacDonald, Judith Meek, Christabel Enweronu-Laryea, Terence S. Leung:
Smartphone colorimetry using ambient subtraction: application to neonatal jaundice screening in Ghana. UbiComp/ISWC Adjunct 2019: 172-175 - Miranda Nixon, Felix Outlaw, Lindsay W. MacDonald, Terence S. Leung:
The importance of a device specific calibration for smartphone colorimetry. CIC 2019: 49-54 - 2017
- Felix Outlaw, Judith Meek, Lindsay W. MacDonald, Terence S. Leung:
Screening for Neonatal Jaundice with a Smartphone. DH 2017: 241-242 - Jop Briët, Zeev Dvir, Sivakanth Gopi:
Outlaw Distributions and Locally Decodable Codes. ITCS 2017: 20:1-20:19 - 2016
- Robert Schaefer:
Science, Society, and Software Engineering Part 2: If science is outlawed, will only outlaws do science? ACM SIGSOFT Softw. Eng. Notes 41(5): 7-8 (2016) - Jop Briët, Zeev Dvir, Sivakanth Gopi:
Outlaw distributions and locally decodable codes. CoRR abs/1609.06355 (2016) - 2014
- Hans-Juergen Boehm, Brian Demsky:
Outlawing ghosts: avoiding out-of-thin-air results. MSPC@PLDI 2014: 7:1-7:6 - 2006
- Sylvia Mercado Kierkegaard:
Outlawing circumvention of technological measures going overboard: Hollywood style. Comput. Law Secur. Rev. 22(1): 46-56 (2006) - 2002
- Enda Brophy:
The Outlaw 'Net': Opposition to ICANN's New Internet Order. SIGCAS Comput. Soc. 32(4): 1 (2002) - Vandana Pursnani Janeja, Vijayalakshmi Atluri, Nabil R. Adam:
OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes. DG.O 2002 - 1999
- K. Burton Harvey, Chrisila C. Pettey:
The Outlaw Method for Solving Multimodal Functions with Split Ring Parallel Genetic Algorithms. GECCO 1999: 274-280 - 1998
- Barbara Simons:
Outlawing Technology. Commun. ACM 41(10): 17-18 (1998) - 1996
- Rob Kling:
Beyond outlaws, hackers and pirates. SIGCAS Comput. Soc. 26(2): 5-15 (1996) - Rob Kling:
Beyond Outlaws, Hackers, and Pirates: Ethical Issues in the Work of Information and Computer Science Professionals. Computerization and Controversy, 2nd Ed. 1996: 848-869
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-12 03:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint