2002-01-03
Iterating Transducers.
286-297
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020286.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#DamsLS01
2002-01-03
Vectorized Model Checking for Computation Tree Logic.
44-53
1990
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1990.html#HiraishiMH90
2002-10-09
NuSMV 2: An OpenSource Tool for Symbolic Model Checking.
359-364
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040359.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#CimattiCGGPRST02
2002-02-28
Model Checking LTL Using Net Unforldings.
207-218
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#Wallner98
2003-01-20
Automatic Verification of Combinatorial and Pipelined FFT.
380-393
http://link.springer.de/link/service/series/0558/bibs/1633/16330380.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#Bjesse99
2003-01-20
Verification of Infinite-State Systems by Combining Abstraction and Reachability Analysis.
146-159
http://link.springer.de/link/service/series/0558/bibs/1633/16330146.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#AbdullaABBHL99
2002-01-03
Liveness and Acceleration in Parameterized Verification.
328-343
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#PnueliS00
2002-10-09
A Platform for Combining Deductive with Algorithmic Verification.
184-195
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#PnueliS96
2003-07-24
Symbolic Model Checking with Rich ssertional Languages.
424-435
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#KestenMMPS97
2002-01-03
Mechanical Verification of Concurrent Systems with TLA.
44-55
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#EngbergGL92
2002-10-09
The Mobility Workbench - A Tool for the pi-Calculus.
428-440
1994
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav94.html#VictorM94
2002-10-09
Functional Extension of Symbolic Model Checking.
225-232
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#Filkorn91
2002-02-28
Verification of Timed Systems Using POSETs.
403-415
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#BelluominiM98
2003-01-20
Latency Insensitive Protocols.
123-133
http://link.springer.de/link/service/series/0558/bibs/1633/16330123.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#CarloniMS99
2003-10-09
Evidence Explorer: A Tool for Exploring Model-Checking Proofs.
215-218
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=215
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#DongRS03
2002-01-03
Decidability of Bisimulation Equivalences for Parallel Timer Processes.
302-315
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#Cerans92
2002-10-09
Semi-formal Bounded Model Checking.
280-294
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040280.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#BinghamH02
2003-10-09
Dense Counter Machines and Verification Problems.
93-105
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=93
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#XieDIP03
2002-01-03
<sup>m</sup>).
465-477
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020465.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#MoriokaKY01
2003-10-09
Deductive Verification of Advanced Out-of-Order Microprocessors.
341-353
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=341
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#LahiriB03
2002-10-09
A Graphical Interval Logic Toolset for Verifying Concurrent Systems.
138-153
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#KuttyRMDM93
2002-10-09
Symbolic Model Checking Using Algebraic Geometry.
26-37
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#Avrunin96
2002-10-09
The Formal Verification of an Algorithm for Interactive Consistency under a Hybrid Fault Model.
292-304
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#LincolnR93
2002-01-03
Verifying Temporal Properties of Sequential Machines Without Building their State Diagrams.
23-32
1990
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1990.html#CoudertMB90
2002-10-09
Modeling and Verification of a Real Life Protocol Using Symbolic Model Checking.
194-206
1994
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav94.html#NaikS94
2003-01-20
Stepwise CTL Model Checking of State/Event Systems.
316-327
http://link.springer.de/link/service/series/0558/bibs/1633/16330316.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#Lind-NielsenA99
2002-10-09
Verification of Arithmetic Circuits by Comparing Two Similar Circuits.
159-168
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#Fujita96
2002-02-28
Transforming the Theorem Prover into a Digital Design Tool: From Concept Car to Off-Road Vehicle.
39-44
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#HardinWG98
2002-10-09
Efficient Checking of Behavioural Relations and Modal Assertions using Fixed-Point Inversion.
142-154
1995
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav95.html#AndersenV95
2002-10-09
Compositional Checking of Satisfaction.
24-36
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#AndersenW91
2002-10-09
Verification Support Environment.
454-457
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#KochUW96
2002-02-28
A Provably Correct Embedded Verifier for the Certification of Safety Critical Software.
202-213
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#CimattiGPPPRTY97
2002-01-03
PET: An Interactive Software Testing Tool.
552-556
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#GunterKP00
2002-02-28
Efficient Symbolic Detection of Global Properties in Distributed Systems.
357-368
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#StollerL98
2002-01-03
Syntactic Program Transformations for Automatic Abstraction.
435-449
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#NamjoshiK00
2003-01-20
Efficient Analysis of Cyclic Definitions.
394-405
http://link.springer.de/link/service/series/0558/bibs/1633/16330394.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#NamjoshiK99
2002-01-03
On the Competeness of Compositional Reasoning.
139-153
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#NamjoshiT00
2002-10-09
Compressing Transitions for Model Checking.
569-581
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040569.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#KurshanLY02
2003-10-09
Model Checking Conformance with Scenario-Based Specifications.
328-340
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=328
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#GlusmanK03
2003-01-20
Mechanizing Proofs of Computation Equivalence.
354-367
http://link.springer.de/link/service/series/0558/bibs/1633/16330354.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#GlusmanK99
2002-02-28
A Formal Method Experience at Secure Computing Corporation.
49-56
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#HoffmanP98
2002-10-09
Using Abstractions for the Verification of Linear Hybrid Systems.
81-94
1994
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav94.html#OliveroSY94
2002-10-09
Efficient Timing Analysis of a Class of Petri Nets.
423-436
1995
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav95.html#HulgaardB95
2002-01-03
AGVI - Automatic Generation, Verification, and Implementation of Security Protocols.
241-245
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020241.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#SongPP01
2002-01-03
A Fast Bisimulation Algorithm.
79-90
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020079.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#DovierPP01
2002-10-09
The Quest for Efficient Boolean Satisfiability Solvers.
17-36
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040017.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#ZhangM02
2003-10-14
Unbounded, Fully Symbolic Model Checking of Timed Automata using Boolean Methods.
154-166
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=154
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#SeshiaB03
2002-01-03
Modular Abstractions for Verifying Real-Time Distributed Systems.
2-15
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#De-LeonG92
2002-01-03
Generating Diagnostic Information for Behavioral Preorders.
370-383
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#CelikkanC92
2002-10-09
Deductive Model Checking.
208-219
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#SipmaUM96
2002-10-09
Temporal Precondition Verification of Design Transformations.
125-135
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#VemuriS91
2004-11-25
Combining Constraint Solving and Symbolic Model Checking for a Class of a Systems with Non-linear Constraints.
316-327
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#ChanABN97
2002-10-09
Models Whose Checks Don't Explode.
222-233
1994
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav94.html#Kurshan94
2002-01-03
Rewriting for Symbolic Execution of State Machine Models.
411-422
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020411.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#Moore01
2002-02-28
An ACL2 Proof of Write Invalidate Cache Coherence.
29-38
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#Moore98
2002-10-09
Atomicity Refinement and Trace Reduction Theorems.
311-322
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#Gribomont96
2002-10-09
Using Canonical Representations of Solutions to Speed Up Infinite-State Model Checking.
386-400
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040386.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#RybinaV02
2002-01-03
Automatic Reduction in CTL Compositional Model Checking.
234-247
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#ShipleCSB92
2002-01-03
Building Circuits from Relations.
113-123
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#KukulaS00
2002-10-09
Model Checking for Infinite State Systems Using Data Abstraction, Assumption-Commitment Style reasoning and Theorem Proving.
54-69
1995
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav95.html#DingelF95
2003-01-20
Automated Verification of a Parametric Real-Time Program: The ABR Conformance Protocol.
96-107
http://link.springer.de/link/service/series/0558/bibs/1633/16330096.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#BerardF99
2002-10-09
Symbolic Verification of Communication Protocols with Infinite State Spaces Using QDDs (Extended Abstract).
1-12
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#BoigelotG96
2002-10-09
Symbolic Verification with Periodic Sets.
55-67
1994
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav94.html#BoigelotW94
2003-10-09
Calculating-Confluence Compositionally.
446-459
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=446
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#PaceLM03
2003-01-20
Improved Automata Generation for Linear Temporal Logic.
249-260
http://link.springer.de/link/service/series/0558/bibs/1633/16330249.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#DanieleGV99
2002-02-28
HYTECH: A Model Checker for Hybrid Systems.
460-463
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#HenzingerHW97
2002-02-28
<i>Pre</i><i>Post</i>-modern Symbolic Model Checking.
195-206
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#HenzingerKQ98
2002-02-28
You Assume, We Guarantee: Methodology and Case Studies.
440-451
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#HenzingerQR98
2003-01-20
Assume-Guarantee Refinement Between Different Time Scales.
208-221
http://link.springer.de/link/service/series/0558/bibs/1633/16330208.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#HenzingerQR99
2002-01-03
Verifying a Logic Synthesis Tool in Nuprl: A Case Study in Software Verification.
69-81
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#AagaardL92
2002-10-09
Integer Programming in the Analysis of Concurrent Systems.
92-102
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#AvruninBC91
2003-10-09
Efficient Image Computation in Infinite State Model Checking.
249-261
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=249
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#BartzisB03
2002-02-28
Kronos: A Model-Checking Tool for Real-Time Systems.
546-550
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#BozgaDMOTY98
2002-01-03
Finding Bugs in an Alpha Microprocessor Using Satisfiability Solvers.
454-464
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020454.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#BjesseLM01
2002-10-09
Functionality Decomposition by Compositional Correstness Preserving Transformation.
371-384
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#BrinksmaLB93
2002-10-09
SPeeDI - A Verification Tool for Polygonal Hybrid Systems.
354-358
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040354.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#AsarinPSY02
2002-10-09
Checking for Language Inclusion Using Simulation Preorders.
255-265
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#DillHW91
2003-01-20
Exploiting Positive Equality in a Logic of Equality with Uninterpreted Functions.
470-482
http://link.springer.de/link/service/series/0558/bibs/1633/16330470.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#BryantGV99
2002-10-09
Modeling and Verifying Systems Using a Logic of Counter Arithmetic with Lambda Expressions and Uninterpreted Functions.
78-92
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040078.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#BryantLS02
2002-01-03
Efficient Detection of Global Properties in Distributed Systems Using Partial-Order Methods.
264-279
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#StollerUL00
2002-10-09
On the Model Checking Problem for Branching Time Logics and Basic Parallel Processes.
353-366
1995
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav95.html#EsparzaK95
2002-01-03
A BDD-Based Model Checker for Recursive Programs.
324-336
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020324.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#EsparzaS01
2002-10-09
Verifying Continuous Time Markov Chains.
269-276
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#AzizSSB96
2002-01-03
EASN: Integrating ASN.1 and Model Checking.
382-386
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020382.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#ShanbhagGTAL01
2002-10-09
Automatic Translation of Natural Language System Specifications.
360-371
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#NelkenF96
2002-02-28
A Comparison of Presburger Engines for EFSM Reachability.
280-292
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#ShipleKR98
2002-10-09
A Modal Logic for Message passing Processes (Extended Abstract).
359-370
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#HennessyL93
2002-10-09
Real-Time System Verification using P/T Nets.
14-26
1994
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav94.html#GorrieriS94
2002-10-09
Protocol Design for an Automated Highway System (Abstract).
180
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#Varaiya93
2003-10-09
Rabbit: A Tool for BDD-Based Verification of Real-Time Systems.
122-125
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=122
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#BeyerLN03
2002-02-28
Automatic Datapath Extraction for Efficient Usage of HDD.
95-106
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#KamhiWF97
2002-10-09
The Concurrency Workbench with Priorities.
147-157
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#Jensen91
2002-10-09
Automatic Abstraction Using Generalized Model Checking.
137-150
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040137.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#GodefroidJ02
2002-10-09
Refining Dependencies Improves Partial-Order Verification Methods (Extended Abstract).
438-449
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#GodefroidP93
2002-10-09
Using Partial Orders for the Efficient Verification of Deadlock Freedom and Safety Properties.
332-342
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#GodefroidW91
2002-02-28
Trace Table Based Approach for Pipeline Microprocessor Verification.
364-375
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#SawadaH97
2002-02-28
Processor Verification with Precise Exeptions and Speculative Execution.
135-146
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#SawadaH98
2002-10-09
Mechanically Verifying Safety and Liveness Properties of Delay Insensitive Circuits.
354-364
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#Goldschlag91
2002-01-03
A Verification Procedure via Invariant for Extended Communicating Finite-State Machines.
384-395
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#HiguchiSSFK92
2002-01-03
Verification of a Multiprocessor Cache Protocol Using Simulation Relations and Higher-Order Logic.
302-311
1990
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1990.html#LoewensteinD90
2003-01-20
Verifiying Safety Properties of a Power PC Microprocessor Using Symbolic Model Checking without BDDs.
60-71
http://link.springer.de/link/service/series/0558/bibs/1633/16330060.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#BiereCRZ99
2002-02-28
Some Thoughts on Statecharts, 13 Years Later.
226-231
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#Harel97
2004-02-11
UPPAAL: Status & Developments.
456-459
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#LarsenPY97
2003-10-09
Fast Mu-Calculus Model Checking when Tree-Width Is Bounded.
80-92
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=80
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#Obdrzalek03
2002-02-28
Efficient Model Checking Using Tabled Resolution.
143-154
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#RamakrishnanRRSSW97
2002-01-03
On Automatically Explaining Bisimulation Inequivalence.
364-372
1990
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1990.html#Cleaveland90
2002-10-09
A Structural Linearization Principle for Processes.
491-504
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#KurshanMOS93
2002-10-09
Modelling Asynchrony with a Synchronous Model.
339-352
1995
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav95.html#KurshanMOS95
2003-10-09
Monitoring Temporal Rules Combined with Time Series.
114-117
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=114
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#Drusinsky03
2003-10-09
Abstraction and BDDs Complement SAT-Based BMC in DiVer.
206-209
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=206
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#GuptaGWYA03
2002-01-03
Regular Model Checking.
403-418
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#BouajjaniJNT00
2002-02-28
Exploiting Symmetry When Verifying Transitor-Level Circuits by Symbolic Trajectory Evaluation.
244-255
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#PandeyB97
2002-01-03
Achieving Scalability in Parallel Reachability Analysis of Very Large Circuits.
20-35
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#HeymanGGS00
2003-01-20
Efficient Timed Reachability Analysis Using Clock Difference Diagrams.
341-353
http://link.springer.de/link/service/series/0558/bibs/1633/16330341.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#BehrmannLPWY99
2002-10-09
PVS: Combining Specification, Proof Checking, and Model Checking.
411-414
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#OwreRRSS96
2002-02-28
Formal Verification of Digital Systems, from ASICs to HW/SW Codesign - a Pragmatic Approach.
3-6
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#Hughes97
2002-01-03
Extension of the Karp and Miller Procedure to Lotos Specifications.
333-342
1990
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1990.html#BarbeauB90
2002-10-09
The Lotos Model of a Fault Protected System and its Verification Using a Petri Net Based Approach.
103-113
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#BarbeauB91
2002-01-03
Branching Time Regular Temporal Logic for Model Checking with Linear Time Complexity.
253-262
1990
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1990.html#HamaguchiHY90
2002-10-09
Formal Verification of Speed-Dependent Asynchronous Cicuits Using Symbolic Model Checking of branching Time Regular Temporal Logic.
410-420
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#HamaguchiHY91
2002-01-03
Design Verification of a Microprocessor Using Branching Time Regular Temporal Logic.
206-219
1992
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1992.html#HamaguchiHY92
2002-10-09
Deciding Separation Formulas with SAT.
209-222
2002
CAV
http://link.springer.de/link/service/series/0558/bibs/2404/24040209.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2002.html#StrichmanSB02
2005-09-16
Mechanically Verifying a Family of Multiplier Circuits.
135-146
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#KapurS96
2003-01-20
Validation of Pipelined Processor Designs Using Esterel Tools: A Case Study.
84-95
http://link.springer.de/link/service/series/0558/bibs/1633/16330084.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#RameshB99
2003-01-20
Test Generation Derived from Model-Checking.
108-121
http://link.springer.de/link/service/series/0558/bibs/1633/16330108.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#JeronM99
2002-10-09
Delay Analysis in Synchronous Programs.
333-346
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#Halbwachs93
2002-02-28
Synchronous Programming of Reactive Systems.
1-16
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#Halbwachs98
2005-01-18
Verifying Mobile Processes in the HAL Environment.
511-515
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#FerrariGMPR98
2002-10-09
An Automata-Theoretic Approach to Fair Realizability and Synthesis.
267-278
1995
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav95.html#Vardi95
2003-01-20
Model Checking Based on Sequential ATPG.
418-430
http://link.springer.de/link/service/series/0558/bibs/1633/16330418.htm
1999
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav99.html#BoppanaRTF99
2002-10-09
Complexity Results for POMSET Languages.
343-353
1991
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav91.html#FeigenbaumKL91
2003-10-09
Theorem Proving Using Lazy Proof Explication.
355-367
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=355
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#FlanaganJOS03
2002-01-03
Keynote Address: Abstraction, Composition, Symmetry, and a Little Deduction: The Remedies to State Explosion.
1
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#Pnueli00
2003-10-09
TRIM: A Tool for Triggered Message Sequence Charts.
106-109
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2725&spage=106
2003
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2003.html#SenguptaC03
2002-01-03
Model Checking with Formula-Dependent Abstract Models.
155-168
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020155.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#AsterothBA01
2002-01-03
Verifying Advanced Microarchitectures that Support Speculation and Exceptions.
521-537
2000
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2000.html#HosabettuGS00
2002-10-09
Efficient Verification of Parallel Real-Time Systems.
321-346
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#YonedaSSC93
2002-10-09
A Tool for Symbolic Program Verification and Abstration.
71-84
1993
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav93.html#GrafL93
2002-02-28
Decomposing the Proof of Correctness of pipelined Microprocessors.
122-134
1998
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav98.html#HosabettuSG98
2002-01-03
Compositional Minimization of Finite State Systems.
186-196
1990
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav1990.html#GrafS90
2002-10-09
Verifying Invariants Using theorem Proving.
196-207
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#GrafS96
2002-02-28
Construction of Abstract State Graphs with PVS.
72-83
1997
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav97.html#GrafS97
2002-10-09
The Real-Time Graphical Interval Logic Toolset.
446-449
1996
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav96.html#MoserMRKD96
2002-01-03
Meta-BDDs: A Decomposed Representation for Layered Symbolic Manipulation of Boolean Functions.
118-130
2001
CAV
http://link.springer.de/link/service/series/0558/bibs/2102/21020118.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2001.html#Cabodi01
2004-09-01
CVC Lite: A New Implementation of the Cooperating Validity Checker Category B.
515-518
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=515
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#BarrettB04
2004-09-01
Abstract Regular Model Checking.
372-386
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=372
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#BouajjaniHV04
2004-09-01
Indexed Predicate Discovery for Unbounded System Verification.
135-147
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=135
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#LahiriB04
2004-09-01
The HiVy Tool Set.
466-469
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=466
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#PingreeM04
2004-09-01
WSAT: A Tool for Formal Analysis of Web Services.
510-514
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=510
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#FuBS04
2004-09-01
Compositional Specification and Model Checking in GSTE.
216-228
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=216
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#YangS04
2004-09-01
PlayGame: A Platform for Diagnostic Games.
492-495
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=492
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Tan04
2004-09-01
Image Computation in Infinite State Model Checking.
361-371
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=361
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#FinkelL04
2004-09-01
Rob Tristan Gerth: 1956?2003.
1-14
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=1
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#OLearyR04
2004-09-01
A Toolset for Modelling and Verification of GALS Systems.
506-509
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=506
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#RameshSDCV04
2004-09-01
Symbolic Model Checking of Non-regular Properties.
83-95
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=83
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Lange04
2004-09-01
Mechanical Mathematical Methods for Microprocessor Verification.
523-533
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=523
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Hunt04
2004-09-01
JNuke: Efficient Dynamic Analysis for Java.
462-465
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=462
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#ArthoSBEBZ04
2004-09-01
ObsSlice: A Timed Automata Slicer Based on Observers.
470-474
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=470
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#BrabermanGO04
2004-09-01
Efficient Modeling of Embedded Memories in Bounded Model Checking.
440-452
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=440
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GanaiGA04
2004-09-01
Regular Model Checking for LTL(MSO).
348-360
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=348
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#AbdullaJNdS04
2004-09-01
Using Interface Refinement to Integrate Formal Verification into the Design Cycle.
122-134
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=122
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#ChangBD04
2004-09-01
Why Model Checking Can Improve WCET Analysis.
334-347
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=334
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Metzner04
2004-09-01
Termination of Linear Programs.
70-82
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=70
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Tiwari04
2004-09-01
Symbolic Simulation, Model Checking and Abstraction with Partially Ordered Boolean Functional Vectors.
255-267
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=255
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GoelB04
2004-09-01
DPLL( T): Fast Decision Procedures.
175-188
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=175
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GanzingerHNOT04
2004-09-01
Widening Arithmetic Automata.
321-333
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=321
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#BartzisB04
2004-09-01
An Efficiently Checkable, Proof-Based Formulation of Vacuity in Model Checking.
57-69
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=57
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Namjoshi04
2004-09-01
Static Program Analysis via 3-Valued Logic.
15-30
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=15
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#RepsSW04
2004-09-01
Verifying omega-Regular Properties of Markov Chains.
189-201
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=189
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#BustanRV04
2004-09-01
The UCLID Decision Procedure.
475-478
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=475
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#LahiriS04
2004-09-01
An Experimental Evaluation of Ground Decision Procedures.
162-174
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=162
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#MouraR04
2004-09-01
SAL 2.
496-500
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=496
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#MouraORRSST04
2004-09-01
Range Allocation for Separation Logic.
148-161
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=148
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#TalupurSSP04
2004-09-01
GSTE Is Partitioned Model Checking.
229-241
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=229
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#SebastianiSTV04
2004-09-01
Zapato: Automatic Theorem Proving for Predicate Abstraction Refinement.
457-461
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=457
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#BallCLZ04
2004-09-01
Zing: A Model Checker for Concurrent Software.
484-487
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=484
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#AndrewsQRRX04
2004-09-01
Abstraction-Based Satisfiability Solving of Presburger Arithmetic.
308-320
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=308
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#KroeningOSS04
2004-09-14
Verification via Structure Simulation.
281-294
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=281
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#ImmermanRRSY04
2004-09-01
Parallel LTL-X Model Checking of High-Level Petri Nets Based on Unfoldings.
109-121
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=109
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#SchroterK04
2004-09-01
Understanding Counterexamples with explain.
453-456
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=453
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GroceKL04
2004-09-01
Deductive Verification of Pipelined Machines Using First-Order Quantification.
31-43
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=31
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#RayH04
2004-09-01
Verification of an Advanced mips-Type Out-of-Order Execution Algorithm.
414-426
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=414
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Arons04
2004-09-01
QB or Not QB: An Efficient Execution Verification Tool for Memory Orderings.
401-413
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=401
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GopalakrishnanYS04
2004-09-01
Symbolic Parametric Safety Analysis of Linear Hybrid Systems with BDD-Like Data-Structures.
295-307
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=295
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#Wang04
2004-09-01
Stuck-Free Conformance.
242-254
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=242
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#FournetHRR04
2004-09-01
MCK: Model Checking the Logic of Knowledge.
479-483
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=479
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GammieM04
2004-09-01
A Formal Reduction for Lock-Free Parallel Algorithms.
44-56
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=44
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GaoH04
2004-09-01
Automatic Verification of Sequential Consistency for Unbounded Addresses and Data Values.
427-439
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=427
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#BinghamCHQZ04
2004-09-01
Proving More Properties with Bounded Model Checking.
96-108
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=96
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#AwedhS04
2004-09-01
The Mec 5 Model-Checker.
488-491
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=488
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#GriffaultV04
2004-09-01
CirCUs: A Satisfiability Solver Geared towards Bounded Model Checking.
519-522
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=519
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#JinAS04
2004-09-01
Formal Analysis of Java Programs in JavaFAN.
501-505
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=501
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#FarzanCMR04
2004-09-01
Statistical Model Checking of Black-Box Probabilistic Systems.
202-215
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=202
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#SenVA04
2004-12-09
Functional Dependency for Verification Reduction.
268-280
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=268
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#JiangB04
2004-09-01
Global Model-Checking of Infinite-State Systems.
387-400
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3114&spage=387
2004
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2004.html#PitermanV04
2005-07-28
Computer Aided Verification, 17th International Conference, CAV 2005, Edinburgh, Scotland, UK, July 6-10, 2005, Proceedings
3576
3-540-27231-3
2005
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html
2005-07-28
Reasoning About Threads Communicating via Locks.
505-518
2005
CAV
http://dx.doi.org/10.1007/11513988_49
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#KahlonIG05
2005-07-28
DPLL(T) with Exhaustive Theory Propagation and Its Application to Difference Logic.
321-334
2005
CAV
http://dx.doi.org/10.1007/11513988_33
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#NieuwenhuisO05
2005-07-28
Validating a Modern Microprocessor.
2-4
2005
CAV
http://dx.doi.org/10.1007/11513988_2
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#Bentley05
2005-07-28
Efficient Monitoring of omega-Languages.
364-378
2005
CAV
http://dx.doi.org/10.1007/11513988_36
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#dAmorimR05
2005-07-28
Efficient Satisfiability Modulo Theories via Delayed Theory Combination.
335-349
2005
CAV
http://dx.doi.org/10.1007/11513988_34
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BozzanoBCJRRS05
2005-07-28
Predicate Abstraction via Symbolic Decision Procedures.
24-38
2005
CAV
http://dx.doi.org/10.1007/11513988_5
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#LahiriBC05
2006-08-10
SMT-COMP: Satisfiability Modulo Theories Competition.
20-23
2005
CAV
http://dx.doi.org/10.1007/11513988_4
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BarrettMS05
2005-07-28
Concrete Model Checking with Abstract Matching and Refinement.
52-66
2005
CAV
http://dx.doi.org/10.1007/11513988_7
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#PasareanuPV05
2005-07-28
F-Soft: Software Verification Platform.
301-306
2005
CAV
http://dx.doi.org/10.1007/11513988_31
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#IvancicYGGSA05
2005-07-28
Building Your Own Software Model Checker Using the Bogor Extensible Model Checking Framework.
148-152
2005
CAV
http://dx.doi.org/10.1007/11513988_15
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#DwyerHHR05
2005-07-28
Wolf - Bug Hunter for Concurrent Software Using Formal Methods.
153-157
2005
CAV
http://dx.doi.org/10.1007/11513988_16
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BarnerGR05
2005-07-28
Data Structure Specifications via Local Equality Axioms.
476-490
2005
CAV
http://dx.doi.org/10.1007/11513988_47
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#McPeakN05
2005-07-28
Interpolant-Based Transition Relation Approximation.
39-51
2005
CAV
http://dx.doi.org/10.1007/11513988_6
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#JhalaM05
2005-07-28
Romeo: A Tool for Analyzing Time Petri Nets.
418-423
2005
CAV
http://dx.doi.org/10.1007/11513988_41
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#GardeyLMR05
2005-07-28
Cogent: Accurate Theorem Proving for Program Verification.
296-300
2005
CAV
http://dx.doi.org/10.1007/11513988_30
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#CookKS05
2005-07-28
Symbolic Compositional Verification by Learning Assumptions.
548-562
2005
CAV
http://dx.doi.org/10.1007/11513988_52
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#AlurMN05
2005-07-28
On Statistical Model Checking of Stochastic Systems.
266-280
2005
CAV
http://dx.doi.org/10.1007/11513988_26
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#SenVA05
2005-07-28
The ComFoRT Reasoning Framework.
164-169
2005
CAV
http://dx.doi.org/10.1007/11513988_18
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#ChakiISW05
2005-07-28
Algorithmic Algebraic Model Checking I: Challenges from Systems Biology.
5-19
2005
CAV
http://dx.doi.org/10.1007/11513988_3
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#PiazzaAMPWM05
2005-07-28
Incremental and Complete Bounded Model Checking for Full PLTL.
98-111
2005
CAV
http://dx.doi.org/10.1007/11513988_10
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#HeljankoJL05
2006-05-19
Model Checking x86 Executables with CodeSurfer/x86 and WPDS++.
158-163
2005
CAV
http://dx.doi.org/10.1007/11513988_17
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BalakrishnanRKLLMGYCT05
2005-07-28
TRANSYT: A Tool for the Verification of Asynchronous Concurrent Systems.
424-428
2005
CAV
http://dx.doi.org/10.1007/11513988_42
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#PastorPS05
2005-07-28
A Policy Iteration Algorithm for Computing Fixed Points in Static Analysis of Programs.
462-475
2005
CAV
http://dx.doi.org/10.1007/11513988_46
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#CostanGGMP05
2005-07-28
Probabilistic Verification for "Black-Box" Systems.
253-265
2005
CAV
http://dx.doi.org/10.1007/11513988_25
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#Younes05
2005-07-28
Bounded Model Checking of Concurrent Programs.
82-97
2005
CAV
http://dx.doi.org/10.1007/11513988_9
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#RabinovitzG05
2005-07-28
Ymer: A Statistical Model Checker.
429-433
2005
CAV
http://dx.doi.org/10.1007/11513988_43
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#Younes05a
2005-07-28
Abstraction Refinement via Inductive Learning.
519-533
2005
CAV
http://dx.doi.org/10.1007/11513988_50
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#LoginovRS05
2005-07-28
Yet Another Decision Procedure for Equality Logic.
307-320
2005
CAV
http://dx.doi.org/10.1007/11513988_32
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#MeirS05
2005-07-28
Linear Ranking with Reachability.
491-504
2005
CAV
http://dx.doi.org/10.1007/11513988_48
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BradleyMS05
2005-07-28
Incremental Algorithms for Inter-procedural Analysis of Safety Properties.
449-461
2005
CAV
http://dx.doi.org/10.1007/11513988_45
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#ConwayNDE05
2005-07-28
Verification of Tree Updates for Optimization.
379-393
2005
CAV
http://dx.doi.org/10.1007/11513988_37
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BenediktBFV05
2005-07-28
Abstraction for Falsification.
67-81
2005
CAV
http://dx.doi.org/10.1007/11513988_8
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BallKY05
2005-07-28
Improved Probabilistic Models for 802.11 Protocol Verification.
239-252
2005
CAV
http://dx.doi.org/10.1007/11513988_24
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#0002G05
2005-07-28
IIV: An Invisible Invariant Verifier.
408-412
2005
CAV
http://dx.doi.org/10.1007/11513988_39
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BalabanFPZ05
2005-07-28
Abstraction Refinement for Bounded Model Checking.
112-124
2005
CAV
http://dx.doi.org/10.1007/11513988_11
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#GuptaS05
2005-07-28
Formal Verification of Pentium® 4 Components with Symbolic Simulation and Inductive Invariants.
170-184
2005
CAV
http://dx.doi.org/10.1007/11513988_19
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#Kaivola05
2005-07-28
JVer: A Java Verifier.
144-147
2005
CAV
http://dx.doi.org/10.1007/11513988_14
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#ChanderEILN05
2005-07-28
Randomized Algorithms for Program Analysis and Verification.
1
2005
CAV
http://dx.doi.org/10.1007/11513988_1
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#NeculaG05
2005-07-28
Formal Verification of Backward Compatibility of Microcode.
185-198
2005
CAV
http://dx.doi.org/10.1007/11513988_20
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#AronsEFMMSSTVZ05
2005-07-28
TVOC: A Translation Validator for Optimizing Compilers.
291-295
2005
CAV
http://dx.doi.org/10.1007/11513988_29
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#BarrettFGHPZ05
2005-07-28
Symmetry Reduction in SAT-Based Model Checking.
125-138
2005
CAV
http://dx.doi.org/10.1007/11513988_12
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#TangMGI05
2005-07-28
Saturn: A SAT-Based Tool for Bug Detection.
139-143
2005
CAV
http://dx.doi.org/10.1007/11513988_13
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#XieA05
2005-07-28
Syntax-Driven Reachable State Space Construction of Synchronous Reactive Programs.
213-225
2005
CAV
http://dx.doi.org/10.1007/11513988_22
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#VecchieS05
2005-07-28
Program Repair as a Game.
226-238
2005
CAV
http://dx.doi.org/10.1007/11513988_23
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#JobstmannGB05
2005-07-28
Action Language Verifier, Extended.
413-417
2005
CAV
http://dx.doi.org/10.1007/11513988_40
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#Yavuz-KahveciBB05
2005-07-28
The Orchids Intrusion Detection Tool.
286-290
2005
CAV
http://dx.doi.org/10.1007/11513988_28
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#OlivainG05
2005-07-28
Extended Weighted Pushdown Systems.
434-448
2005
CAV
http://dx.doi.org/10.1007/11513988_44
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#LalRB05
2005-11-28
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications.
281-285
2005
CAV
http://dx.doi.org/10.1007/11513988_27
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#ArmandoBBCCCDHKMMORSTVV05
2005-07-28
Expand, Enlarge and Check... Made Efficient.
394-407
2005
CAV
http://dx.doi.org/10.1007/11513988_38
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#GeeraertsRB05
2005-07-28
Symbolic Systems, Explicit Properties: On Hybrid Approaches for LTL Symbolic Model Checking.
350-363
2005
CAV
http://dx.doi.org/10.1007/11513988_35
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#SebastianiTV05
2005-07-28
Automated Assume-Guarantee Reasoning for Simulation Conformance.
534-547
2005
CAV
http://dx.doi.org/10.1007/11513988_51
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#ChakiCST05
2005-07-28
Compositional Analysis of Floating-Point Linear Numerical Filters.
199-212
2005
CAV
http://dx.doi.org/10.1007/11513988_21
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2005.html#Monniaux05
2006-08-21
Computer Aided Verification, 18th International Conference, CAV 2006, Seattle, WA, USA, August 17-20, 2006, Proceedings
4144
2006
3-540-37406-X
CAV
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html
2006-08-21
Languages of Nested Trees.
329-342
2006
CAV
http://dx.doi.org/10.1007/11817963_31
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#AlurCM06
2006-08-21
Model Checking Multithreaded Programs with Asynchronous Atomic Methods.
300-314
2006
CAV
http://dx.doi.org/10.1007/11817963_29
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#SenV06
2006-08-21
FAST Extended Release.
63-66
2006
CAV
http://dx.doi.org/10.1007/11817963_9
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BardinLP06
2006-08-21
cascade: C Assertion Checker and Deductive Engine.
166-169
2006
CAV
http://dx.doi.org/10.1007/11817963_17
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#SethiB06
2006-08-21
Minimizing Generalized Büchi Automata.
45-58
2006
CAV
http://dx.doi.org/10.1007/11817963_7
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#JuvekarP06
2006-08-21
Lazy Shape Analysis.
532-546
2006
CAV
http://dx.doi.org/10.1007/11817963_48
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BeyerHT06
2006-08-21
I Think I Voted: E-Voting vs. Democracy.
2
2006
CAV
http://dx.doi.org/10.1007/11817963_2
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#Dill06
2006-08-21
Improving Pushdown System Model Checking.
343-357
2006
CAV
http://dx.doi.org/10.1007/11817963_32
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#LalR06
2006-08-21
Symbolic Model Checking of Concurrent Programs Using Partial Orders and On-the-Fly Transactions.
286-299
2006
CAV
http://dx.doi.org/10.1007/11817963_28
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#KahlonGS06
2006-08-21
Repair of Boolean Programs with an Application to C.
358-371
2006
CAV
http://dx.doi.org/10.1007/11817963_33
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#GriesmayerBC06
2006-08-21
Allen Linear (Interval) Temporal Logic - Translation to LTL and Monitor Synthesis.
263-277
2006
CAV
http://dx.doi.org/10.1007/11817963_25
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#RosuB06
2006-08-21
Deriving Small Unsatisfiable Cores with Dominators.
109-122
2006
CAV
http://dx.doi.org/10.1007/11817963_13
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#GershmanKS06
2006-08-21
Termination of Integer Linear Programs.
372-385
2006
CAV
http://dx.doi.org/10.1007/11817963_34
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#Braverman06
2006-08-21
Terminator: Beyond Safety.
415-418
2006
CAV
http://dx.doi.org/10.1007/11817963_37
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#CookPR06
2006-08-21
Antichains: A New Algorithm for Checking Universality of Finite Automata.
17-30
2006
CAV
http://dx.doi.org/10.1007/11817963_5
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#WulfDHR06
2006-08-21
Playing with Verification, Planning and Aspects: Unusual Methods for Running Scenario-Based Programs.
3-4
2006
CAV
http://dx.doi.org/10.1007/11817963_3
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#Harel06
2006-08-22
Fast and Generalized Polynomial Time Memory Consistency Verification.
503-516
2006
CAV
http://dx.doi.org/10.1007/11817963_46
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#RoyZFH06
2006-08-21
Termination Analysis with Calling Context Graphs.
401-414
2006
CAV
http://dx.doi.org/10.1007/11817963_36
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#ManoliosV06
2006-08-21
Communicating Timed Automata: The More Synchronous, the More Difficult to Verify.
249-262
2006
CAV
http://dx.doi.org/10.1007/11817963_24
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#KrcalY06
2006-08-21
Check It Out: On the Efficient Formal Verification of Live Sequence Charts.
219-233
2006
CAV
http://dx.doi.org/10.1007/11817963_22
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#KloseTWW06
2006-08-21
The Ideal of Verified Software.
5-16
2006
CAV
http://dx.doi.org/10.1007/11817963_4
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#Hoare06
2006-08-21
Don't Care Words with an Application to the Automata-Based Approach for Real Addition.
67-80
2006
CAV
http://dx.doi.org/10.1007/11817963_10
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#EisingerK06
2006-08-21
LEVER: A Tool for Learning Based Verification.
471-474
2006
CAV
http://dx.doi.org/10.1007/11817963_43
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#VardhanV06
2006-08-21
Automatic Refinement and Vacuity Detection for Symbolic Trajectory Evaluation.
190-204
2006
CAV
http://dx.doi.org/10.1007/11817963_20
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#TzorefG06
2006-08-21
Bounded Model Checking for Weak Alternating Büchi Automata.
95-108
2006
CAV
http://dx.doi.org/10.1007/11817963_12
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#HeljankoJKLL06
2006-08-21
Lookahead Widening.
452-466
2006
CAV
http://dx.doi.org/10.1007/11817963_41
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#GopanR06
2006-08-21
Lazy Abstraction with Interpolants.
123-136
2006
CAV
http://dx.doi.org/10.1007/11817963_14
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#McMillan06
2006-08-21
Bounded Model Checking of Concurrent Data Types on Relaxed Memory Models: A Case Study.
489-502
2006
CAV
http://dx.doi.org/10.1007/11817963_45
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BurckhardtAM06
2006-08-21
Automatic Termination Proofs for Programs with Shape-Shifting Heaps.
386-400
2006
CAV
http://dx.doi.org/10.1007/11817963_35
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BerdineCDO06
2006-08-21
Symmetry Reduction for Probabilistic Model Checking.
234-248
2006
CAV
http://dx.doi.org/10.1007/11817963_23
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#KwiatkowskaNP06
2006-08-21
Using Statically Computed Invariants Inside the Predicate Abstraction and Refinement Loop.
137-151
2006
CAV
http://dx.doi.org/10.1007/11817963_15
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#JainIGSW06
2006-08-21
DiVinE - A Tool for Distributed Verification.
278-281
2006
CAV
http://dx.doi.org/10.1007/11817963_26
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BarnatBCMRS06
2006-08-21
Yasm: A Software Model-Checker for Verification and Refutation.
170-174
2006
CAV
http://dx.doi.org/10.1007/11817963_18
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#GurfinkelWC06
2006-08-21
The Power of Hybrid Acceleration.
438-451
2006
CAV
http://dx.doi.org/10.1007/11817963_40
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BoigelotH06
2006-08-21
Some Complexity Results for SystemVerilog Assertions.
205-218
2006
CAV
http://dx.doi.org/10.1007/11817963_21
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BustanH06
2006-08-21
Counterexamples with Loops for Predicate Abstraction.
152-165
2006
CAV
http://dx.doi.org/10.1007/11817963_16
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#KroeningW06
2006-08-21
Programs with Lists Are Counter Automata.
517-531
2006
CAV
http://dx.doi.org/10.1007/11817963_47
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#BouajjaniBHIMV06
2006-08-21
Formal Verification of a Lazy Concurrent List-Based Set Algorithm.
475-488
2006
CAV
http://dx.doi.org/10.1007/11817963_44
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#ColvinGLM06
2006-08-22
Ticc: A Tool for Interface Compatibility and Composition.
59-62
2006
CAV
http://dx.doi.org/10.1007/11817963_8
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#AdlerASFLRR06
2006-08-21
Formal Specifications on Industrial-Strength Code-From Myth to Reality.
1
2006
CAV
http://dx.doi.org/10.1007/11817963_1
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#Das06
2006-08-21
A Fast Linear-Arithmetic Solver for DPLL(T).
81-94
2006
CAV
http://dx.doi.org/10.1007/11817963_11
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#DutertreM06
2006-08-21
SMT Techniques for Fast Predicate Abstraction.
424-437
2006
CAV
http://dx.doi.org/10.1007/11817963_39
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#LahiriNO06
2006-08-21
EverLost: A Flexible Platform for Industrial-Strength Abstraction-Guided Simulation.
282-285
2006
CAV
http://dx.doi.org/10.1007/11817963_27
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#PaulaH06
2006-08-21
Causal Atomicity.
315-328
2006
CAV
http://dx.doi.org/10.1007/11817963_30
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#FarzanM06
2006-08-21
CUTE and jCUTE: Concolic Unit Testing and Explicit Path Model-Checking Tools.
419-423
2006
CAV
http://dx.doi.org/10.1007/11817963_38
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#SenA06
2006-08-21
The Heuristic Theorem Prover: Yet Another SMT Modulo Theorem Prover.
467-470
2006
CAV
http://dx.doi.org/10.1007/11817963_42
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#Roe06
2006-08-21
Safraless Compositional Synthesis.
31-44
2006
CAV
http://dx.doi.org/10.1007/11817963_6
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#KupfermanPV06
2006-08-21
SAT-Based Assistance in Abstraction Refinement for Symbolic Trajectory Evaluation.
175-189
2006
CAV
http://dx.doi.org/10.1007/11817963_19
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#RoordaC06
2006-08-21
Abstraction for Shape Analysis with Fast and Precise Transformers.
547-561
2006
CAV
http://dx.doi.org/10.1007/11817963_49
http://www.informatik.uni-trier.de/~ley/db/conf/cav/cav2006.html#Lev-AmiIS06
2002-01-03
Computable Economic Analysis.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/wong.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#RichterW96
2005-12-07
An Extension Theorem for Ultraweakly Continuous Linear Functionals on B(X, Y).
77-89
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#BridgesV05
2005-09-06
Randomness and Universal Machines.
103-116
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#FigueiraSW05
2002-01-03
Admissible Representations of Limit Spaces.
273-295
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640273.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Schroder00
2005-09-06
Effectively Open Real Functions.
357-374
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Ziegler05
2002-01-03
On the Computational Content of the Krasnoselski and Ishikawa Fixed Point Theorems.
119-145
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640119.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Kohlenbach00
2002-01-03
Characterization of the Computable Real Numbers by Means of Primitive Recursive Functions.
296-309
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640296.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Skordev00
2002-01-03
Computabilities of Fine-Continuous Functions.
200-221
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640200.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Mori00
2005-09-06
Mathematical Computability Questions for some Classes of Linear and Non-Linear Differential Equations Originated from Hilbert's Tenth Problem.
161-168
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Kieu05
2005-09-06
A Sequentially Computable Function that is not Effectively Continous at any Point.
131-148
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Hertling05
2002-01-03
The Wave Equation with Computable Initial Data Whose Unique Solution is Nowhere Computable.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/pourel.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Pour-ElZ96
2005-09-06
Implementing Exact Real Numbers Efficiently.
378
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Muller05
2002-01-03
Some Properties of the Effective Uniform Topological Space.
336-356
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640336.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#TsujiiYM00
2005-09-06
Ideals in Constructive Banach Algebra Theory.
65-75
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#BridgesHS05
2005-09-06
Some Aspects of Computable Functional Analysis.
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Brattka05
2005-09-06
Multi-Functions on Multi-Represented Sets are Closed under Flowchart Programming.
267-300
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Weihrauch05
2005-09-06
On the Complexity of Finding Circumscribed Rectangles for a Two-Dimensional Domain.
341-355
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#YuCK05
2002-01-03
A Generic Root Operation for Exact Real Arithmetic.
82-87
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640082.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#HurD00
2006-05-05
A Lambda Calculus for Real Analysis.
227-266
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Taylor05
2005-09-06
Compactness in Topology and Computation.
379
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Escardo05
2005-09-06
Effective Sequence of Uniformities and its Effective Limit.
301-318
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#YasugiMT05
2002-01-03
Computable Invariance.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/brattka.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Brattka96
2005-09-06
Generalized Functions with Pseudobounded Support in Constructive Mathematics.
319-340
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Yoshida05
2005-09-06
Fine Computable Functions and Effective Fine Convergence.
177-197
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#MoriTY05
2002-01-03
Fast Online Real Multiplication.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/schroeder.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Schroder96
2002-01-03
Formalisation of Computability of Operators and Real-Valued Functionals via Domain Theory.
146-168
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640146.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#KorovinaK00
2005-09-06
Real Number Representations of Graph-Directed IFS Attractors.
3-24
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#AkamaI05
2002-01-03
On diagonal sets in uncountable structures.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/meer.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Meer96
2002-01-03
Banach-Mazur Computable Functions on Metric Spaces.
69-81
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640069.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Hertling00
2002-01-03
The Uniformity Conjecture.
253-272
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640253.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Richardson00
2002-01-03
On Computable Metric Spaces Tietze-Urysohn Extension Is Computable.
357-368
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640357.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Weihrauch00
2002-01-03
A Computable Spectral Theorem.
378-388
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640378.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#ZieglerB00
2002-01-03
delta-Approximable Functions.
187-199
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640187.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#MeyssonnierBV00
2002-01-03
Fractals and Complexity.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/ko.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Ko96
2002-01-03
Computability on Continuous, Lower Semi-Continuous and Upper Semi-Continuous Real Functions.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/weihrauchzheng.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#WeihrauchZ96
2005-09-06
RealLib: an Efficient Implementation of Exact Real Arithmetic.
169-175
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Lambov05
2005-12-07
Proximal Connectedness.
91-101
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#BridgesV05a
2002-01-03
Computability and Complexity in Analysis, 4th International Workshop, CCA 2000, Swansea, UK, September 17-19, 2000, Selected Papers
CCA
2064
2001
3-540-42197-1
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html
2002-01-03
Computational Dimension of Topological Spaces.
323-335
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640323.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Tsuiki00
2006-05-05
The Dedekind Reals in Abstract Stone Duality.
25-64
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#BauerT05
2005-09-06
Low Temperature Limit of Equations - Hidden Discrete Structure.
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Takahashi05
2005-09-06
Realizability as Connection between Constructive and Computable Mathematics.
378-379
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Bauer05
2005-09-06
Design of Neuromorphic Hardwares.
377-378
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Kohno05
2002-01-03
A Survey of Exact Arithmetic Implementations.
30-47
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640030.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#GowlandL00
2002-01-03
Computable Real Functions: Type 1 Computability Versus Type 2 Computability.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/hertling.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Hertling96
2005-09-06
A Computable Version of Dini's Theorem for Topological Spaces.
117-129
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#GrubbaW05
2005-09-06
CCA 2005 - Second International Conference on Computability and Complexity in Analysis, August 25-29, 2005, Kyoto, Japan
CCA
2005
326-7/2005
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html
2002-01-03
Computing a Required Absolute Precision from a Stream of Linear Fractional Transformations.
169-186
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640169.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Krznaric00
2002-01-03
Computability on the probability measures on the Borel sets of the unit interval.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/weihrauch.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Weihrauch96
2002-01-03
Decidability of the graph of a map in the model of Blum, Shub and Smale.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/ceola.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Ceola96
2002-01-03
Towards a real Real RAM: a Prototype using C++.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/mueller.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Muller96
2005-09-06
Computable Versions of Basic Theorems in Functional Analysis.
378
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#YoshikawaY05
2005-09-06
A Hierarchy of Turing Degrees for Divergence Bounded Computable Real Numbers.
199-209
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#RettingerZ05
2005-09-06
Computable Analysis via Representations.
377
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Hertling05a
2002-01-03
Exact Real Arithmetic Systems: Results of Competition.
389-394
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640389.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Blanck00a
2002-01-03
Effective Contraction Theorem and Its Application.
88-100
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640088.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Kamo00
2002-01-03
The Degree of Unsolvability of a Real Number.
16-29
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640016.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#DunlopP00
2005-09-06
Computability and Computable Uniqueness of Urysohn's Universal Metric Space.
149-159
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Kamo05
2002-01-03
Standard Representations of Effective Metric Spaces.
48-68
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640048.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Hemmerling00
2002-01-03
The iRRAM: Exact Arithmetic in C++.
222-252
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640222.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Muller00
2002-01-03
Effective Fixed Point Theorem over a Non-computably Separable Metric Space.
310-322
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640310.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Takeuti00
2002-01-03
Program Schemes over Continuous Algebras.
1996
CCA
ftp://ftp.informatik.uni-trier.de/pub/Users-Root/reports/96-44/oliveira.ps
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca1996.html#Oliveira96
2005-09-06
Representing Probability Measures using Probabilistic Processes.
211-226
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#SchroderS05
2005-09-06
Molecular Computing and Real Number Computing.
2005
CCA
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2005.html#Hagiya05
2002-01-03
Polynomially Time Computable Functions over p-Adic Fields.
101-118
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640101.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Kapoulas00
2006-04-27
Is the Linear Schrödinger Propagator Turing Computable?
369-377
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640369.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#WeihrauchZ00
2002-01-03
Effectivity of Regular Spaces.
1-15
2000
CCA
http://link.springer.de/link/service/series/0558/bibs/2064/20640001.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cca/cca2000.html#Blanck00
2002-09-04
The Alpha du Centaur environment.
325-334
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#DezanVQS91
2006-09-11
Matrix Multiplication on an associative string processor: application to image compression by Gabor expansion.
305-310
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#DufauxK91
2002-09-04
Direct mapping of nested loops on piecewise regular processor arrays.
145-150
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#SoudrisBG91
2002-09-04
Signal analysis and signal transformations for ASIC regular array architecture synthesis.
223-232
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#SwaaljCM91
2002-09-04
Experience in the design of paralle processor arrays.
233-242
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#FrisonL91
2003-08-21
Implementing cellular automata on the ArMen machine.
317-324
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#BouazzaCNPR91
2002-09-04
Synthesis of size-optimal toroidal arrays for the algebraic path problem.
199-204
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#ClaussMP91
2002-09-04
Nonlinear adaptive filtering algorithms for parallel and systolic implementation.
279-284
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#RaufA91
2002-09-04
Synthesis of intermediate memories for the data supply to processor arrays.
365-370
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#MSchonfeldSP91
2002-09-04
Mapping QR decomposition of a banded matrix on a ID systolic array with data contraflow and pipelined functional units.
25-38
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Valero-GarciaNLVL91
2002-09-04
Transe: an experimental design tool.
299-304
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#DurrieuKL91
2002-09-04
A programmable VLSI array with constant I/O pins.
205-210
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#AboelazeLW91
2004-02-18
A parallel thinning algorithm using the bounding boxes technique.
97-102
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Ubeda91
2002-09-04
Loop unrolling for processors with instruction cache.
311-316
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Charles91
2002-09-04
POLLUS: A LUSTRE based hardware design environment.
335-346
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#RocheteauH91
2002-12-05
The derivation of dependence graphs from PASCAL programs for array processor design.
371-376
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Vehlies91
2002-09-04
Generalized cycle shrinking.
131-144
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#ShangOF91
2002-09-04
Parallel algorithms for finding connected, independent and total domination in interval graphs.
85-90
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#AdharP91
2002-09-04
An improved systolic algorithm for the algebraic path problem.
187-198
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Rajopadhye91
2006-08-30
Algorithms and architectures for recursive total least squares estimation.
39-46
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Moonen91
2002-09-04
Distributed simulation of parallel VLSI architectures.
285-298
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Arvind91
2002-09-04
On-line computing: a survey and some new results.
261-272
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Muller91
2002-09-04
Algorithms and Parallel VLSI Architectures II, Proceedings of the International Workshop Algorithms and Parallel VLSI Architectures II, Château de Bonas, Gers, France, June 3-6, 1991
Algorithms and Parallel VLSI Architectures
1992
0-444-89153-6
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html
2002-09-04
Time-varying system theory for computational networks.
103-130
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#VeenD91
2002-09-04
Parallel algorithms for color image quantization on hypercubes and meshes.
91-96
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#DehneR91
2002-09-04
Specifying control signals for one-dimensional systolic arrays by uniform recurrence equations.
181-186
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#XueL91
2002-09-04
Array design methodologies for real-time signal processing in the CATHEDRAL-IV synthesis environment.
211-222
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#CatthoorSRM91
2005-07-29
Comparison of scheduling techniques for the parallel implementation of the Hough transform.
377-382
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#LaghariD91
2002-09-04
Meshes with flexible redundancy.
47-58
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#MelhemR91
2002-09-04
Linear systolic arrays for matrix multiplication: comparisons of existing synthesis methods and new results.
163-174
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Risset91
2002-09-04
On the use of most significant digit first arithmetic in the design of high performance DSP chips.
243-260
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#McCanny91
2005-07-06
Delays of on-line floating point operators in borrow-save representation.
273-278
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#DupratFMY91
2002-09-04
Systolic generation of derangements.
59-70
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#AklCS91
2002-09-04
A 2D toroidal systolic array for the knapsack problem.
71-78
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#AndonovG91
2002-09-04
A Parallel program for the recognition of P-Invariant segments.
79-84
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#KatoenS91
2002-09-04
Refinement based algorithm mapping techniques for linear systolic arrays.
175-180
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#VaradarajanR91
2002-09-04
Algorithms and Parallel VLSI Architectures.
1-10
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#QuintonR91
2002-09-04
From systolic to periodic array design.
151-162
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Dongen91
2002-09-04
The SIGNAL programming environment.
347-358
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Guernic91
2002-09-04
Two heuristics for task scheduling.
383-
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#Darte91
2006-08-30
Orthogonal lattice algorithms for adaptive filtering and beamforming.
11-24
1991
Algorithms and Parallel VLSI Architectures
http://www.informatik.uni-trier.de/~ley/db/conf/ccc/ccc1991.html#McWhirterP91
2003-01-09
Ordered Binary Decision Diagrams and the Davis-Putnam Procedure.
34-49
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#UribeS94
2003-01-09
Set Constraints and Logic Programming.
302-303
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Kozen94
2002-01-03
Constraints in Computational Logics: Theory and Applications, International Summer School, CCL'99 Gif-sur-Yvette, France, September 5-8, 1999, Revised Lectures
CCL
2002
2001
3-540-41950-0
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl1999.html
2003-01-09
Modular AC Unification of Higher-Order Patterns.
105-120
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#QianW94
2003-01-09
Constraints in Computational Logics, First International Conference, CCL'94, Munich, Germant, September 7-9, 1994
CCL
845
1994
3-540-58403-X
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html
2002-01-03
Combining Constraint Solving.
104-158
1999
CCL
http://link.springer.de/link/service/series/0558/bibs/2002/2002104.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl1999.html#BaaderS99
2003-01-09
Local Simplification.
3-18
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Lynch94
2003-01-09
A Foundation for Higher-order Concurrent Constraint Programming.
50-72
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Smolka94
2003-01-09
Applications of Constraint Logic Programming.
152-153
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Simonis94
2003-01-09
Solving Simplification Ordering Constraints.
352-367
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#JohannS94
2003-01-09
On Modularity in Term Rewriting and Narrowing.
253-268
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Prehofer94
2003-01-09
Automated Deduction with Constraints.
1-2
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Snyder94
2003-01-09
Some new Decidability Results on Positive and Negative Set Constraints.
336-351
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#GilleronTT94
2004-02-17
"Syntactic" AC-Unification.
136-151
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#BoudedC94
2002-01-03
Constraints and Constraint Solving: An Introduction.
1-46
1999
CCL
http://link.springer.de/link/service/series/0558/bibs/2002/20020001.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl1999.html#JouannaudT99
2002-01-03
Constraints and Theorem Proving.
159-201
1999
CCL
http://link.springer.de/link/service/series/0558/bibs/2002/2002159.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl1999.html#GanzingerN99
2003-01-09
A Record Calculus with Principal Types.
219-236
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#HenseS94
2002-01-03
Functional and Constraint Logic Programming.
202-270
1999
CCL
http://link.springer.de/link/service/series/0558/bibs/2002/2002202.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl1999.html#Rodriguez-Artalejo99
2003-01-09
Symbolic Constraints and Tree Automata.
217-218
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Dauchet94
2003-01-09
Application of Constraint Logic Programming for VLSI CAD Tools.
183-200
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#BeckmannBM94
2003-01-09
Buchberger's Algorithm: A Constraint-Based Completion Procedure.
285-301
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#BachmairG94
2003-01-09
Higher Order Disunification: Some decidable cases.
121-135
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Lugiez94
2002-01-03
Constraint Solving on Terms.
47-103
1999
CCL
http://link.springer.de/link/service/series/0558/bibs/2002/2002047.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl1999.html#ComonK99
2003-01-09
Constraints for Polymorphic Behaviours of Concurrent ML.
73-88
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#NielsonN94
2003-01-09
A Confluent Relational Calculus for Higher-Order Programming with Constraints.
89-104
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#NiehrenS94
2003-01-09
ECOLOG: an Environment for COnstraint LOGics.
237-252
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Haberstrau94
2003-01-09
Set Constraints in Some Equational Theories.
304-319
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Charatonik94
2003-01-09
Simplifying Clausal Satisfiability Problems.
19-33
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Barth94
2003-01-09
An Efficient Algorithm of Logic Programming with Constraint Hierarchy.
170-182
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Tsutsumi94
2003-01-09
Repeated Redundant Inequalities in Constraint Logic Programming.
154-169
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#Michaylov94
2002-01-03
Building Industrial Applications with Constraint Programming.
271-309
1999
CCL
http://link.springer.de/link/service/series/0558/bibs/2002/2002271.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl1999.html#Simonis99
2003-01-09
How to Win a Game with Features.
320-335
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#BackofenT94
2003-01-09
Path Consistency in clp(FD).
201-216
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#CodognetN94
2003-01-09
Higher Order Conditional Rewriting and Narrowing.
269-284
1994
CCL
http://www.informatik.uni-trier.de/~ley/db/conf/ccl/ccl94.html#AvenhausL94
2003-01-13
Planar Topological Queries.
1-6
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Papadimitriou97
2003-01-13
Constraint Databases and Applications, ESPRIT WG CONTESSA Workshop, Friedrichshafen, Germany, September 8-9, 1995, Proceedings
CDB
1034
1996
3-540-60794-3
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html
2003-01-13
Constraint Databases and Their Applications, Second International Workshop on Constraint Database Systems, CDB '97, Delphi, Greece, January 11-12, 1997, CP '96 Workshop on Constraints and Databases, Cambridge, MA, USA, August 19, 1996, Selected Papers
CDB
1191
1997
3-540-62501-1
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html
2003-01-13
Generalized Relational Algebra: Modeling Spatial Queries in Constraint Databases.
40-67
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#BelussiBBC95
2003-01-13
Integrity Constraint Checking in Chimera.
160-186
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#BertinoCB97
2003-01-13
Query Evaluation as Constraint Search; An Overview of Early Results.
53-63
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#MirankerBS97
2002-01-03
Linear-Constraint Databases.
199-229
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#GyssensVG00
2003-01-13
Decomposition and Lossless Join in Constraint Databases.
80-91
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#WangSQ97
2002-01-03
Linear Repeating Points.
305-314
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#Wolper00
2003-01-13
Towards the Definition of a Spatial Object-Oriented Data Model with Constraints.
120-131
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#HermosillaK95
2002-01-03
Aggregate Languages for Constraint Databases.
131-154
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#ChomickiL00
2003-01-13
The C3 Constraint Object-Oriented Database System: An Overview.
134-159
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#BrodskyS97
2002-01-03
Genericity in Spatial Databases.
293-303
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#KuijpersG00
2003-01-13
On Expressing Topological Connectivity in Spatial Datalog.
116-133
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#KuijpersS97
2002-01-03
Topological Queries.
231-273
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#KuijpersV00
2002-01-03
Introduction.
1-16
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#KuperLP00
2003-01-13
A Temporal Constraint System for Object-Oriented Databases.
208-218
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Alagic97
2003-01-13
DISCO: A Constraint Database System with Sets.
68-83
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#ByonR95
2003-01-13
Constraint Databases and Program Analysis Using Abstract Interpretation.
246-262
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Toman97a
2003-01-13
Constraint-Based Query Optimization and Processing.
84-101
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#GaedeG95
2003-01-13
An Informal Introduction to Constraint Database Systems.
7-52
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#GaedeW97
2003-01-13
Application Development with the CHIP System.
1-21
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#Simonis95
2003-01-13
FISSURE: FInder of Solutions with SUbdefinite REsources.
167-185
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#YakhnoCZ95
2003-01-13
The Application of Multi-Dimensional Indexing Methods to Constraints.
102-119
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#Freeston95
2003-01-13
On the Complexity of BV-tree Updates.
282-293
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Freeston97
2003-01-13
Querying Indexed Files.
263-281
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Sexton97
2002-01-03
Constraint Algebras.
335-342
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#Goldin00
2003-01-13
Implementing Index Data Structures Using Constraint Logic Programming.
294-301
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#BressanSW97
2003-01-13
On the Expressiveness of First-Order Constraint Languages.
22-39
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#AfratiAK95
2003-01-13
On the Expressiveness of Query Languages with Linear Constraints; Capturing Desirable Spatial Properties.
105-115
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#AfratiAK97
2002-01-03
The DISCO System.
383-389
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#Revesz00a
2003-01-13
Problem Solving in the DISCO Constraint Database System.
302-315
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Revesz97a
2003-01-13
Magic Checking: Constraint Checking for Database Query Optimization.
148-166
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#WallaceBP95
2003-01-13
Interval Domain Library for ECLiPSe and Its Application.
316-328
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#YakhnoZ97
2003-01-13
Ambiguity for Referential Integrity Is Undecidable.
132-147
1995
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb95.html#Reiner95
2003-01-13
A Rule-Based CQL for 2-Dimensional Tables.
92-104
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#HacidMR97
2003-01-13
A Semantic Query Optimization Algorithm for Object-Oriented Databases.
329-344
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#NigamD97
2003-01-13
SICSDD: Techniques and Implementation.
187-207
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#IbrahimGF97
2002-01-03
Expressive Power: The Finite Case.
55-87
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#BenediktL00
2002-01-03
Expressive Power: The Infinite Case.
89-107
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#GrumbachKS00
2003-01-13
Using Database Versions to Implement Temporal Integrity Constraints.
219-233
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#DoucetFGJM97
2002-01-03
Geographic Information Systems.
175-198
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#KuperS00
2002-01-03
SQL/TP: A Temporal Extension of SQL.
391-399
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#Toman00
2003-01-13
Computing the Well-Founded Semantics for Constraint Extensions of Datalog.
64-79
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Toman97
2002-01-03
Constraint Databases, Queries, and Query Languages.
20-54
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#Bussche00
2002-01-03
I/O-Efficient Algorithms for CDBs.
343-360
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#Ramaswamy00
2002-01-03
Datalog and Constraints.
155-170
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#Revesz00
2003-01-13
Genomic Database Applications in DISCO.
234-245
1997
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb97.html#Revesz97
2002-01-03
Query Safety with Constraints.
109-129
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#BenediktL00a
2002-01-03
Optimization Techniques.
319-334
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#GrumbachLRS00
2002-01-03
The DEDALE Prototype.
365-382
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#GrumbachRSS00
2002-01-03
Euclidean Query Languages.
275-291
2000
Constraint Databases
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2000.html#KuijpersKP00
2004-03-30
Constraint Databases, Proceedings of the 1st International Symposium on Applications of Constraint Databases, CDB'04, Paris, June 12-13, 2004
CDB
3074
2004
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html
2004-03-30
Integrating Constraint and Relational Database Systems.
180-188
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=180
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#Cai04
2004-03-30
Constraint Database Solutions to the Genome Map Assembly Problem.
90-116
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=90
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#RamanathanR04
2004-03-30
Semantic Optimization of Preference Queries.
133-148
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=133
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#Chomicki04
2004-03-30
Constraint Databases, Data Structures and Efficient Query Evaluation.
1-24
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=1
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#HeintzK04
2004-03-30
Moving Objects and Their Equations of Motion.
41-52
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=41
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#Geerts04
2004-03-30
Taking Constraints out of Constraint Databases.
168-179
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=168
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#Goldin04
2004-03-30
Dynamic FP-Tree Based Mining of Frequent Patterns Satisfying Succinct Constraints.
117-132
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=117
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#Leung04
2006-03-28
Applying Constraint Databases in the Determination of Potential Minimal Conflicts to Polynomial Model-based Diagnosis.
75-89
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=75
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#GomezCGV04
2004-03-30
Constraint Processing Techniques for Improving Join Computation: A Proof of Concept.
149-167
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=149
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#LalC04
2004-03-30
A New Shape Function Based Spatiotemporal Interpolation Method.
25-40
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=25
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#LiLP04
2004-03-30
A Triangle-Based Logic for Affine-Invariant Querying of Two-Dimensional Spatial Data.
53-74
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3074&spage=53
2004
CDB
http://www.informatik.uni-trier.de/~ley/db/conf/cdb/cdb2004.html#Haesevoets04
2003-08-26
TSP Cuts Which Do Not Conform to the Template Paradigm.
261-304
2001
Computational Combinatorial Optimization
http://link.springer.de/link/service/series/0558/bibs/2241/22410261.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html#ApplegateBCC01
2002-01-03
Projection and Lifting in Combinatorial Optimization.
26-56
2001
Computational Combinatorial Optimization
http://link.springer.de/link/service/series/0558/bibs/2241/22410026.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html#Balas01
2002-07-02
Computational Combinatorial Optimization, Optimal or Provably Near-Optimal Solutions [based on a Spring School, Schloß Dagstuhl, Germany, 15-19 May 2000]
Computational Combinatorial Optimization
2241
2001
3-540-42877-1
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html
2002-01-03
Branch-and-Cut Algorithms for Combinatorial Optimization and Their Implementation in ABACUS.
157-222
2001
Computational Combinatorial Optimization
http://link.springer.de/link/service/series/0558/bibs/2241/22410157.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html#ElfGJR01
2002-01-03
General Mixed Integer Programming: Computational Issues for Branch-and-Cut Algorithms.
1-25
2001
Computational Combinatorial Optimization
http://link.springer.de/link/service/series/0558/bibs/2241/22410001.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html#Martin01
2002-01-03
Mathematical Programming Models and Formulations for Deterministic Production Planning Problems.
57-111
2001
Computational Combinatorial Optimization
http://link.springer.de/link/service/series/0558/bibs/2241/22410057.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html#Pochet01
2002-01-03
Branch, Cut, and Price: Sequential and Parallel.
223-260
2001
Computational Combinatorial Optimization
http://link.springer.de/link/service/series/0558/bibs/2241/22410223.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html#LadanyiRT01
2004-12-21
Lagrangian Relaxation.
112-156
2001
Computational Combinatorial Optimization
http://link.springer.de/link/service/series/0558/bibs/2241/22410112.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cco/cco2001.html#Lemarechal01
2003-07-28
Sensor-based intrusion detection for intra-domain distance-vector routing.
127-137
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586129
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#MittalV02
2003-07-28
Tarzan: a peer-to-peer anonymizing network layer.
193-206
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586137
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#FreedmanM02
2003-07-28
Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washingtion, DC, USA, November 18-22, 2002
ACM Conference on Computer and Communications Security
2002
1-58113-612-9
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html
2002-12-11
Adding Time to a Logic of Authentication.
97-101
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168600
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Syverson93
2002-12-11
Anonymity on the Internet (Panel).
37
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288100
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#Syverson98
2002-12-11
Cross-domain one-shot authorization using smart cards.
220-227
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352635
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#AuLA00
2002-12-11
Delegation of cryptographic servers for capture-resilient devices.
10-19
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501986
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#MacKenzieR01
2003-07-28
DRM: doesn't realy mean digital copyright management.
78-87
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586122
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#Camp02
2002-12-11
New Iterative Geometric Methods for Robust Perceptual Image Hashing.
13-21
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200013.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#MihcakV01
2003-07-28
A temporal key management scheme for secure broadcasting of XML documents.
31-40
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586116
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#BertinoCF02
2002-12-11
A Temporal Authorization Model.
126-135
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191202
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#BertinoBS94
2002-12-11
A Non-Timestamped Authorization Model for Data Management Systems.
169-178
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238211
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#BertinoJS96
2002-12-11
Authorizations in Relational Database Management Systems.
130-139
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168605
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#BertinoSJ93
2003-07-28
Mimicry attacks on host-based intrusion detection systems.
255-264
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586145
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#WagnerS02
2002-12-11
The Security of Static Typing with Dynamic Linking.
18-27
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266428
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#Dean97
2002-12-11
Public-Key Cryptography and Password Protocols.
122-131
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288118
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#HaleviK98
2002-12-11
An Approach to the Formal Verification of Cryptographic Protocols.
106-118
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238196
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#Bolignano96
2002-12-11
Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria.
156-165
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191209
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#ZhangTC94
2002-12-11
Security Planning for Personal Communications.
107-111
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168602
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Brown93a
2002-12-11
An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis.
270-281
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191244
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#Browne94
2002-12-11
Prerequisite Confidentiality.
282-293
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191245
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#NestorL94
2002-12-11
An Authentication Logic Supporting Synchronization, Revocation, and Recency.
95-105
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238195
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#StubblebineW96
2003-07-28
Query-flood DoS attacks in gnutella.
181-192
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586136
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#DaswaniG02
2003-07-28
Silicon physical random functions.
148-160
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586132
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#GassendCDD02
2002-12-11
An authorization model for temporal data.
144-153
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352621
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#GalA00
2002-12-11
Provably authenticated group Diffie-Hellman key exchange.
255-264
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502018
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#BressonCPQ01
2002-12-11
Authenticated Group Key Agreement and Friends.
17-26
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288097
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#AtenieseST98
2003-07-28
The verification of an industrial payment protocol: the SET purchase phase.
12-20
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586113
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#BellaPM02
2002-12-11
Proactive Password Checking with Decision Trees.
67-77
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266437
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#BergadanoCR97
2002-12-11
Lower Bounds on Messages and Rounds for Network Authentication Protocols.
26-37
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168592
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Gong93
2002-12-11
New Protocols for Third-Party-Based Authentication and Secure Broadcast.
176-183
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191218
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#Gong94
2002-12-11
On Simple and Secure Key Distribution.
49-57
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168594
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#TsudikH93
2002-12-11
Operating system enhancements to prevent the misuse of system calls.
174-183
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352624
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#BernaschiGM00
2003-11-06
Theft-Protected Proprietary Certificates.
208-220
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=208
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#BoldyrevaJ02
2002-12-11
How to Manage Persistent State in DRM Systems.
176-191
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200176.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#ShapiroV01
2002-12-11
An Experiment on DES Statistical Cryptanalysis.
139-147
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238206
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#Vaudenay96
2002-12-11
Dynamic Self-Checking Techniques for Improved Tamper Resistance.
141-159
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200141.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#HorneMST01
2002-12-11
Fair Exchange with a Semi-Trusted Third Party (extended abstract).
1-5
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266424
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#FranklinR97
2002-12-11
A Fuzzy Commitment Scheme.
28-36
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319714
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#JuelsW99
2002-12-11
Design of a High-Performance ATM Firewall.
93-102
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288113
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#XuS98
2002-12-11
Accountable-subgroup multisignatures: extended abstract.
245-254
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502017
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#MicaliOR01
2002-12-11
Scalable Multicast Security in Dynamic Groups.
101-112
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319723
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#MolvaP99
2002-12-11
Application Access Control at Network Level.
219-228
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191234
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#MolvaR94
2002-12-11
The Design and Implementation of Tripwire: A File System Integrity Checker.
18-29
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191183
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#KimS94
2002-12-11
Distributed credential chain discovery in trust management: extended abstract.
156-165
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502005
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#LiWM01
2002-12-11
Integration of DCE and Local Registries: Design Approaches.
165-170
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168609
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#LinC93
2002-12-11
Optimality of Multi-Domain Protocols.
38-48
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168593
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Yahalom93
2002-12-11
Proof-Carrying Authentication.
52-62
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319718
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#AppelF99
2002-12-11
Formalizing GDOI group key management requirements in NPATRL.
235-244
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502016
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#MeadowsS01
2002-12-11
Efficient State Updates for Key Management.
40-56
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200040.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#Pinkas01
2002-12-11
Support for the File System Security Requirements of Computational E-Mail Systems.
1-9
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191179
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#JaegerP94
2002-12-11
A verifiable secret shuffle and its application to e-voting.
116-125
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502000
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#Neff01
2002-12-11
Discouraging Software Piracy Using Software Aging.
1-12
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200001.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#JakobssonR01
2002-12-11
Revokable and Versatile Electronic Money (extended abstract).
76-87
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238191
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#JakobssonY96
2002-12-11
Paillier's cryptosystem revisited.
206-214
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502012
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#CatalanoGHN01
2002-12-11
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
89-95
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191196
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#CharnesPS94
2002-12-11
A Cryptographic File System for UNIX.
9-16
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168590
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Blaze93
2002-12-11
Protocol Failure in the Escrowed Encryption Standard.
59-67
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191193
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#Blaze94
2002-12-11
How to Break Gifford's Cipher (extended abstract).
198-209
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191227
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#CainS94
2002-12-11
Verifiable Secret Sharing for Monotone Access Structures.
189-194
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168612
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#BethKO93
2002-12-11
Propagation of Authorizations in Distributed Database Systems.
136-147
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191204
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#SamaratiAJ94
2002-12-11
Network Security Probe.
229-240
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191235
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#RolinTG94
2002-12-11
Analysis of an Algorithm for Distributed Recognition and Accountability.
154-164
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168608
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#KoFGHLMW93
2002-12-11
Secure External References in Multimedia Email Messages.
11-18
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238179
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#Wiegel96
2002-12-11
Does Licensing Require New Access Control Techniques?
1-8
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168589
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Hauser93
2002-12-11
NetCash: A Design for Practical Electronic Currency on the Internet.
102-106
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168601
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#MedvinskyN93
2002-12-11
Securing ATM Networks.
19-30
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238181
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#Chuang96
2002-12-11
A High-Performance Network Intrusion Detection System.
8-17
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319712
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#SekarGVS99
2002-12-11
Practical forward secure group signature schemes.
225-234
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502015
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#Song01
2003-11-26
Inductive methods and contract-signing protocols.
176-185
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502008
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#ChadhaKS01
2002-12-11
From Copyright to Information Law - Implications of Digital Rights Management.
213-232
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200213.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#Bechtold01
2002-12-11
Secure Protocol Transformation via "Expansion": From Two-Party to Groups.
83-92
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319721
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#MayerY99
2002-12-11
Cryptanalysis of Private-Key Encryption Schemes Based on Burst-Error-Correcting Codes.
153-156
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238208
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#SunS96
2002-12-11
Why Cryptosystems Fail.
215-227
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168615
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Anderson93
2002-12-11
Batch Exponentiation: A Fast DLP-Based Signature Generation Strategy.
58-61
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238187
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#MRaihiN96
2002-12-11
On the Fly Signatures Based on Factoring.
37-45
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319715
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#PoupardS99
2003-07-28
MOPS: an infrastructure for examining security properties of software.
235-244
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586142
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#ChenW02
2002-12-11
History-Based Access Control for Mobile Code.
38-48
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288102
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#EdjlaliAC98
2002-12-11
Digital Signatures: Can They be Accepted as Legal Signatures in EDI?
86-92
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168598
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Brown93
2002-12-11
New constructions for multicast re-keying schemes using perfect hash families.
228-234
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352637
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#Safavi-NainiW00
2002-12-11
Collusion Secure q-ary Fingerprinting for Perceptual Content.
57-75
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200057.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#Safavi-NainiW01
2003-11-06
Traitor Tracing for Shortened and Corrupted Fingerprints.
81-100
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=81
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#Safavi-NainiW02
2002-12-11
An Advanced Commit Protocol for MLS Distributed Database Systems.
119-128
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238198
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#RayBJM96
2002-12-11
A protocol for anonymous communication over the Internet.
33-42
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352607
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#ShieldsL00
2002-12-11
The Compatibility of Policies.
258-269
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191243
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#HintonL94
2002-12-11
Conditional Purchase Orders.
117-124
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266446
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#KelseyS97
2002-12-11
A Framework for Distributed Authorization.
112-118
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168603
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#WooL93
2002-12-11
Key Management for Encrypted broadcast.
7-16
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288096
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#Wool98
2002-12-11
Implications of Digital Rights Management for Online Music - A Business Perspective.
201-212
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200201.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#Buhse01
2002-12-11
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
118-125
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191201
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#AmmannJ94
2003-07-28
Defending against redirect attacks in mobile IP.
59-67
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586120
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#DengZB02
2002-12-11
Efficient fault-tolerant certificate revocation.
19-24
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352605
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#WrightLM00
2002-12-11
The faithfulness of abstract protocol analysis: message authentication.
186-195
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502009
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#GuttmanTZ01
2002-12-11
High Assurance Discretionary Access Control for Object Bases.
140-150
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168606
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#BertinoSJ93a
2002-12-11
``Mainstreaming'' Automated Information Systems Security Engineering (a case study in security run amok).
251-257
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191241
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#CoyneK94
2002-12-11
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
210-219
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352633
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#YuMW00
2002-12-11
Interoperable strategies in automated trust negotiation.
146-155
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502004
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#YuWS01
2002-12-11
A Pump for Rapid, Reliable, Secure Communication.
119-129
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168604
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#KangM93
2003-07-28
Efficient, DoS-resistant, secure key exchange for internet protocols.
48-58
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586118
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#AielloBBIRCK02
2002-12-11
How to Simultaneously Exchange Secrets by General Assumptions.
184-192
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191221
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#OkamotoO94
2002-12-11
A Cryptanalysis of the High-Bandwidth Digital Content Protection System.
192-200
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200192.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#CrosbyGJSW01
2002-12-11
A modular approach to composing access control policies.
164-173
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352623
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#BonattiVS00
2002-12-11
On Key Distribution via True Broadcasting.
81-88
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191195
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#JustKKO94
2002-12-11
<i>r</i>-Fold Secure Against Spoofing.
166-169
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191211
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#TombakS94
2002-12-11
Optimistic Protocols for Fair Exchange.
7-17
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266426
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#AsokanSW97
2003-07-28
Authenticated-encryption with associated-data.
98-107
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586125
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#Rogaway02
2002-12-11
Cryptanalysis and Protocol Failures (abstract).
213-214
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168614
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Simmons93
2002-12-11
On the Importance of Securing Your Bins: The Garbage-man-in-the-middle Attack.
135-141
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266449
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#JoyeQ97
2002-12-11
A New On-Line Cash Check Scheme.
111-116
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266444
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#DengHJN97
2002-12-11
A Practical Secure Physical Random Bit Generator.
103-111
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288114
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#JakobssonSHJ98
2003-07-28
Scalable, graph-based network vulnerability analysis.
217-224
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586140
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#AmmannWK02
2002-12-11
A New Signature Scheme Based on the DSA Giving Message Recovery.
58-61
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168595
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#NybergR93
2002-12-11
Human-Computer Cryptography: An Attempt.
68-75
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238190
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#Matsumoto96
2002-12-11
Public-Key Cryptography and Password Protocols: The Multi-User Case.
63-72
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319719
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#BoyarskyP99
2002-12-11
An access control model for simplifying constraint expression.
154-163
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352622
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#TidswellJ00
2002-12-11
User privacy issues regarding certificates and the TLS protocol: the design and implementation of the SPSL protocol.
53-62
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352609
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#PersianoV00
2002-12-11
Simple and fault-tolerant key agreement for dynamic collaborative groups.
235-244
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352638
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#KimPT00
2003-06-24
Flexible authentication of XML documents.
136-145
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502003
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#DevanbuGKMNS01
2002-12-11
MPEG-4 IPMP Extensions.
126-140
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200126.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#KingK01
2002-12-11
Communication-Efficient Anonymous Group Identification.
73-82
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288110
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#SantisCP98
2002-12-11
A Security Architecture for Computational Grids.
83-92
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288111
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#FosterKTT98
2002-12-11
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
39-50
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191188
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#AmorosoTWW94
2002-12-11
Timing attacks on Web privacy.
25-32
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352606
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#FeltenS00
2003-07-28
Generic implementations of elliptic curve cryptography using partial reduction.
108-116
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586126
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#GuraES02
2002-12-11
The Design, Implementation and Operation of an Email Pseudonym Server.
27-36
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288098
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#MazieresK98
2002-12-11
Regulating service access and information release on the Web.
134-143
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352620
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#BonattiS00
2002-12-11
Temporal Sequence Learning and Data Reduction for Anomaly Detection.
150-158
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288122
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#LaneB98
2003-12-18
The Failure of Anti-Hacking Legislation: A Hong Kong Perspective.
62-67
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238189
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#LauLC96
2002-12-11
Threshold-based identity recovery for privacy enhanced applications.
71-79
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352611
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#BiskupF00
2002-12-11
Secure Open Systems for Protecting Privacy and Digital Services.
106-125
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200106.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#KravitzYS01
2002-12-11
Unified Login with Pluggable Authentication Modules (PAM).
1-10
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238177
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#Samar96
2003-07-28
A key-management scheme for distributed sensor networks.
41-47
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586117
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#EschenauerG02
2002-12-11
Using router stamping to identify the source of IP packets.
184-189
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352627
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#DoeppnerKK00
2003-07-28
Authenticated encryption in SSH: provably fixing the SSH binary packet protocol.
1-11
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586112
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#BellareKN02
2002-12-11
Efficient Verifiable Encryption (and Fair Exchange) of Digital Signatures.
138-146
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319728
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#Ateniese99
2002-12-11
A secure execution framework for Java.
43-52
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352608
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#HauswirthKK00
2003-11-06
Replacement Attack on Arbitrary Watermarking Systems.
177-189
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=177
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#KirovskiP02
2002-12-11
A Compact and Fast Hybrid Signature Scheme for Multicast Packet Authentication.
93-100
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319722
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#Rohatgi99
2002-12-11
Evaluating certificate status information mechanisms.
1-8
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352603
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#IliadisSGPK00
2002-12-11
An Efficient Non-Interactive Statistical Zero-Knowledge Proof System for Quasi-Safe Prime Products.
67-72
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288108
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#GennaroMR98
2002-12-11
Design and implementation of a flexible RBAC-service in an object-oriented scripting language.
58-67
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501992
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#NeumannS01
2002-12-11
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
210-218
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191231
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#OorschotW94
2002-12-11
An efficient security verification method for programs with stack inspection.
68-77
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501994
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#NittaTS01
2002-12-11
Systematic Generation of Cryptographically Robust S-Boxes.
171-182
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168610
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#SeberryZZ93
2002-12-11
Endorsements, Licensing, and Insurance for Distributed System Services.
170-175
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191215
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#MedvinskyLN94
2002-12-11
New Blind Signatures Equivalent to Factorization (extended abstract).
92-99
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266440
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#PointchevalS97
2002-12-11
Anonymous Authentication with Subset Queries (extended abstract).
113-119
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319725
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#BonehF99
2003-07-28
Almost entirely correct mixing with applications to voting.
68-77
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586121
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#BonehG02
2003-07-28
Runtime verification of authorization hook placement for the linux security modules framework.
225-234
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586141
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#EdwardsJZ02
2003-11-06
The Darknet and the Future of Content Protection.
155-176
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=155
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#BiddleEPW02
2002-12-11
Extending Cryptographic Logics of Belief to Key Agreement Protocols.
232-243
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168617
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Oorschot93
2002-12-11
XML document security based on provisional authorization.
87-96
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352613
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#KudoH00
2005-01-12
Specification-based anomaly detection: a new approach for detecting network intrusions.
265-274
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586146
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#SekarGFSTYZ02
2002-12-11
Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP.
80-86
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352612
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#WatanabeI00
2002-12-11
Augmented Encrypted Key Exchange: A Password-Based Protocol Secure against Dictionary Attacks and Password File Compromise.
244-250
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168618
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#BellovinM93
2002-12-11
Implementing a distributed firewall.
190-199
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.353052
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#IoannidisKBS00
2003-11-06
Key Challenges in DRM: An Industry Perspective.
51-60
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=51
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#LaMacchia02
2002-12-11
Security enhanced mobile agents.
200-209
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352632
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#Varadharajan00
2002-12-11
Authentication via Keystroke Dynamics.
48-56
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266434
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#MonroseR97
2003-11-06
Public Key Broadcast Encryption for Stateless Receivers.
61-80
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=61
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#DodisF02
2002-12-11
The BiBa one-time signature and broadcast authentication protocol.
28-37
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501988
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#Perrig01
2002-12-11
Privacy Engineering for Digital Rights Management Systems.
76-105
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200076.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#FeigenbaumFSS01
2002-12-11
Breaking and Repairing a Convertible Undeniable Signature Scheme.
148-152
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238207
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#MichelsPH96
2002-12-11
Differential Cryptanalysis of Hash Functions Based on Block Ciphers.
183-188
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168611
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#PreneelGV93
2002-12-11
The Base-Rate Fallacy and Its Implications for the Difficulty of Intrusion Detection.
1-7
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319710
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#Axelsson99
2002-12-11
Electronic payment technologies.
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352602
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#Frankel00
2002-12-11
Error-tolerant password recovery.
1-9
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501985
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#FrykholmJ01
2002-12-11
Policy algebras for access control: the propositional case.
38-47
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501990
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#WijesekeraJ01
2003-07-28
Policy algebras for access control the predicate case.
171-180
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586134
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#WijesekeraJ02
2002-12-11
An Efficient Fair Payment System.
88-94
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238193
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#CamenischPS96
2003-01-03
Distribution chain security.
63-70
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352610
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#DurfeeF00
2002-12-11
Funkspiel schemes: an alternative to conventional tamper resistance.
125-133
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352619
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#HastadJJY00
2002-12-11
Anonymous Credit Cards.
108-117
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191199
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#LowPM94
2002-12-11
Diffie-Hellman Key Distribution Extended to Group Communication.
31-37
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238182
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#SteinerTW96
2002-12-11
A New Public Key Cryptosystem Based on Higher Residues.
59-66
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288106
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#NaccacheS98
2002-12-11
Sorting Out Signature Schemes.
74-85
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168597
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Pfitzmann93
2002-12-11
The performance of public key-enabled kerberos authentication in mobile computing applications.
78-85
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501995
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#HarbitterM01
2004-06-01
Implementing Copyright Limitations in Rights Expression Languages.
137-154
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=137
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#MulliganB02
2002-12-11
A Specification of Java Loading and Bytecode Verification.
49-58
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288104
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#Goldberg98
2002-12-11
Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
68-80
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191194
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#Reiter94
2002-12-11
Twin signatures: an alternative to the hash-and-sign paradigm.
20-27
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501987
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#NaccachePS01
2003-07-28
Efficient packet marking for large-scale IP traceback.
117-126
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586128
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#Goodrich02
2002-12-11
Constraint solving for bounded-process cryptographic protocol analysis.
166-175
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502007
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#MillenS01
2002-12-11
Taking the Copy Out of Copyright.
233-244
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200233.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#MillerF01
2002-12-11
Design of the Commercial Data Masking Facility Data Privacy Algorithm.
93-96
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168599
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#JohnsonMLW93
2003-07-28
Code red worm propagation modeling and analysis.
138-147
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586130
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#ZouGT02
2002-12-11
Composition and integrity preservation of secure reactive systems.
245-254
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352639
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#PfitzmannW00
2002-12-11
Asymmetric Fingerprinting for Larger Collusions.
151-160
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266453
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#PfitzmannW97
2002-12-11
Multi-round passive attacks on server-aided RSA protocols.
102-107
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352616
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#Merkle00
2002-12-11
Simple forward-secure signatures from any signature scheme.
108-115
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352617
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#Krawczyk00
2002-12-11
Security: the state of the practice (invited talk).
97
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352614
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#Ganesan00
2003-11-06
FAIR: Fair Audience InfeRence.
190-207
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=190
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#JohnsonS02
2002-12-11
Communication Complexity of Group Key Distribution.
1-6
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288094
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#BeckerW98
2003-11-06
Evaluating New Copy-Prevention Techniques for Audio CDs.
101-117
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=101
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#Halderman02
2002-12-11
Denial of Service.
151-153
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168607
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Needham93
2002-12-11
Access Control and Signatures via Quorum Secret Sharing.
157-168
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238209
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#NaorW96
2002-12-11
Improved Security Bounds for Pseudorandom Permutations.
142-150
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266452
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#Patarin97
2003-07-28
Securing passwords against dictionary attacks.
161-170
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586133
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#PinkasS02
2002-12-11
The Specification and Implementation of ``Commercial'' Security Requirements Including Dynamic Segregation of Duties.
125-134
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266447
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#Foley97
2002-12-11
Cryptanalysis of Microsoft's Point-to-Point Tunneling Protocol (PPTP).
132-141
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288119
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#SchneierM98
2002-12-11
Securing a Global Village and Its Resources: Baseline Security for Interconnected Signaling System #7 Telecommunications Networks.
195-212
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168613
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#Kluepfel93
2006-03-14
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500.
30-38
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191185
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#JurecicB94
2004-03-17
Network security and IPsec (tutorial).
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352601
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#IoannidesK00
2002-12-11
A Key Distribution Method for Object-Based Protection.
193-197
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191225
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#FordW94
2002-12-11
On the relationship between strand spaces and multi-agent systems.
106-115
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501999
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#HalpernP01
2002-12-11
A new approach to DNS security (DNSSEC).
86-95
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501996
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#AtenieseM01
2002-12-11
Which PKI (public key infrastructure) is the right one? (panel session).
98-101
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352615
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#AdamsBDRZ00
2002-12-11
Meta-ElGamal Signature Schemes.
96-107
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191197
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#HorsterPM94
2003-07-28
Asynchronous verifiable secret sharing and proactive cryptosystems.
88-97
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586124
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#CachinKLS02
2002-12-11
Proactive Public Key and Signature Systems.
100-110
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266442
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#HerzbergJJKY97
2002-12-11
The Proactive Security Toolkit and Applications.
18-27
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319713
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#BarakHNS99
2002-12-11
A Probabilistic Poly-Time Framework for Protocol Analysis.
112-121
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288117
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#LincolnMMS98
2002-12-11
A Chinese wall security model for decentralized workflow systems.
48-57
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501991
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#AtluriCM01
2003-07-28
A reputation-based approach for choosing reliable resources in peer-to-peer networks.
207-216
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586138
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#DamianiVPSV02
2003-07-28
Constructing attack scenarios through correlation of intrusion alerts.
245-254
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586144
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#NingCR02
2003-07-28
<i>idemix</i>anonymous credential system.
21-30
2002
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/586110.586114
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2002.html#CamenischH02
2002-12-11
On Crafty Pirates and Foxy Tracers.
22-39
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200022.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#KiayiasY01
2003-11-06
Breaking and Repairing Asymmetric Public-Key Traitor Tracing.
32-50
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=32
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#KiayiasY02
2002-12-11
Secure Wireless LANs.
10-17
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191181
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#Bharghavan94
2002-12-11
The Omega Key Management Service.
38-47
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238184
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#ReiterFLW96
2002-12-11
Security Modelling for Organisations.
241-250
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191239
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#AndersonLK94
2002-12-11
A Calculus for Cryptographic Protocols: The Spi Calculus.
36-47
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266432
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#AbadiG97
2002-12-11
Towards Acceptable Key Escrow Systems.
51-58
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191191
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#BethKOSW94
2002-12-11
Towards Practical ``Proven Secure'' Authenticated Key Distribution.
228-231
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168616
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#DesmedtB93
2002-12-11
Moiré cryptography.
116-124
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352618
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#DesmedtL00
2002-12-11
Several Secure Store and Forward Devices.
129-137
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238200
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#Goldschlag96
2002-12-11
A Particular Solution to Provide Secure Communications in an Ethernet Environment.
17-25
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168591
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#SorianoFRM93
2002-12-11
OCB: a block-cipher mode of operation for efficient authenticated encryption.
196-205
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502011
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#RogawayBBK01
2002-12-11
Signature Schemes Based on the Strong RSA Assumption.
46-51
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319716
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#CramerS99
2002-12-11
Using Smartcards to Secure a Personalized Gambling Device.
128-137
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319727
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#AielloRS99
2002-12-11
Path Independence for Authentication in Large-Scale Systems.
57-66
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266435
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#ReiterS97
2002-12-11
Verifiable Partial Key Escrow.
78-91
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266439
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#BellareG97
2002-12-11
Random Oracles are Practical: A Paradigm for Designing Efficient Protocols.
62-73
1993
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/168588.168596
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1993.html#BellareR93
2002-12-11
How to Prove Where You Are: Tracking the Location of Customer Equipment.
142-149
1998
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/288090.288121
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1998.html#GabberW98
2002-12-11
Securely combining public-key cryptosystems.
215-224
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502013
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#HaberP01
2002-12-11
Secure Names for Bit-Strings.
28-35
1997
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/266420.266430
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1997.html#HaberS97
2002-12-11
Events in security protocols.
96-105
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.501998
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#CrazzolaraW01
2003-09-04
Tangler: a censorship-resistant publishing system based on document entanglements.
126-135
2001
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/501983.502002
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2001.html#WaldmanM01
2003-11-06
Attacking an Obfuscated Cipher by Injecting Faults.
16-31
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=16
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#JacobBF02
2002-12-11
Proxy Signatures for Delegating Signing Operation.
48-57
1996
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/238168.238185
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1996.html#MamboUO96
2002-12-11
Accountable certificate management using undeniable attestations.
9-17
2000
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/352600.352604
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2000.html#BuldasLL00
2002-12-11
Security and Privacy in Digital Rights Management, ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001, Revised Papers
Digital Rights Management Workshop
2320
2002
3-540-43677-4
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html
2003-11-06
Security and Privacy in Digital Rights Management, ACM CCS-9 Workshop, DRM 2002, Washington, DC, USA, November 18, 2002, Revised Papers
Digital Rights Management Workshop
2696
2003
3-540-40410-4
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html
2002-12-11
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
148-155
1994
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/191177.191206
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1994.html#HeysT94
2002-12-11
Protecting Software Code by Guards.
160-175
2001
Digital Rights Management Workshop
http://link.springer.de/link/service/series/0558/bibs/2320/23200160.htm
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2001.html#ChangA01
2003-11-06
A White-Box DES Implementation for DRM Applications.
1-15
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=1
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#ChowEJO02
2003-11-06
Towards Meeting the Privacy Challenge: Adapting DRM.
118-136
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2696&spage=118
2002
Digital Rights Management Workshop
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccsdrm2002.html#KorbaK02
2002-12-11
Efficient Private Bidding and Auctions with an Oblivious Third Party.
120-127
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319726
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#Cachin99
2002-12-11
Password Hardening Based on Keystroke Dynamics.
73-82
1999
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/319709.319720
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs1999.html#MonroseRW99
2005-02-22
Proceedings of the 2004 ACM Workshop on Formal Methods in Security Engineering, FMSE 2004, Washingtion, DC, USA, October 29, 2004
FMSE
2004
1-58113-971-3
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html
2004-11-09
Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washingtion, DC, USA, October 27-30, 2003
ACM Conference on Computer and Communications Security
2003
1-58113-738-9
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html
2006-02-08
Anomaly detection of web-based attacks.
251-261
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948144
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#KrugelV03
2006-02-08
Privacy cognizant information systems.
1-
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948111
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#Agrawal03
2006-02-08
Countering code-injection attacks with instruction-set randomization.
272-280
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948146
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#KcKP03
2006-02-08
Balancing confidentiality and efficiency in untrusted relational DBMSs.
93-102
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948124
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#DamianiVJPS03
2006-02-08
Establishing pairwise keys in distributed sensor networks.
52-61
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948119
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#LiuN03
2006-02-08
XML access control using static analysis.
73-84
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948122
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#MurataTKH03
2006-02-08
Buffer overrun detection using linear programming and static analysis.
345-354
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948155
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#GanapathyJCMV03
2006-02-08
Hop-count filtering: an effective defense against spoofed DDoS traffic.
30-41
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948116
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#JinWS03
2006-02-08
Enhancing byte-level network intrusion detection signatures with context.
262-271
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948145
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#SommerP03
2006-02-08
Automatic generation of two-party computations.
210-219
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948139
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#MacKenzieOR03
2006-02-08
MECA: an extensible, expressive system and language for statically checking security properties.
321-334
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948153
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#YangKXE03
2006-02-08
Origin authentication in interdomain routing.
165-178
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948133
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#AielloIM03
2005-12-22
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005
ACM Conference on Computer and Communications Security
2005
1-59593-226-7
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html
2006-02-08
CDiff: a new reduction technique for constraint-based analysis of security protocols.
335-344
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948154
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#BasinMV03
2006-02-08
Efficiency improvements for signature schemes with tight security reductions.
155-164
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948132
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#KatzW03
2006-02-08
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays.
20-29
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948115
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#WangR03
2006-02-08
LEAP: efficient security mechanisms for large-scale distributed sensor networks.
62-72
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948120
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#ZhuSJ03
2006-02-08
A new CRT-RSA algorithm secure against bellcore attacks.
311-320
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948151
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#BlomerOS03
2006-02-08
Receiver anonymity via incomparable public keys.
112-121
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948127
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#WatersFS03
2006-02-08
k-anonymous message transmission.
122-130
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948128
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#AhnBH03
2006-02-08
Monitoring and early warning for internet worms.
190-199
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948136
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#ZouGGT03
2006-02-08
Security proofs for an efficient password-based key exchange.
241-250
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948142
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#BressonCP03
2006-02-08
Cryptographic tamper evidence.
355-364
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948156
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#Itkis03
2006-02-08
Randomized instruction set emulation to disrupt binary code injection attacks.
281-289
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948147
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#BarrantesAPSZ03
2006-02-08
Incentive-based modeling and inference of attacker intent, objectives, and strategies.
179-189
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948135
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#LiuZ03
2006-02-08
PPay: micropayments for peer-to-peer systems.
300-310
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948150
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#YangG03
2006-02-08
The blocker tag: selective blocking of RFID tags for consumer privacy.
103-111
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948126
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#JuelsRS03
2006-02-08
A composable cryptographic library with nested operations.
220-230
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948140
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#BackesPW03
2006-02-08
Learning attack strategies from intrusion alerts.
200-209
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948137
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#NingX03
2006-02-08
Using graphic turing tests to counter automated DDoS attacks against web servers.
8-19
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948114
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#MoreinSCKMR03
2006-02-08
A pairwise key pre-distribution scheme for wireless sensor networks.
42-51
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948118
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#DuDHV03
2006-02-08
Obfuscation of executable code to improve resistance to static disassembly.
290-299
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948149
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#LinnD03
2006-02-08
Print signatures for document authentication.
145-154
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948131
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#ZhuWK03
2006-02-08
Efficient self-healing group key distribution with revocation capability.
231-240
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948141
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#LiuNS03
2006-02-08
On the performance, feasibility, and use of forward-secure signatures.
131-144
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948130
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#CroninJMM03
2006-02-08
DoS protection for UDP-based protocols.
2-7
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948113
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#KaufmanPS03
2006-02-08
On permissions, inheritance and role hierarchies.
85-92
2003
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/948109.948123
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003.html#Crampton03
2006-02-08
Timed model checking of security protocols.
23-32
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029137
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#CorinEHM04
2006-02-08
Authenticity by tagging and typing.
1-12
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029135
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#BugliesiFM04
2006-02-08
Synthesising verified access control systems in XACML.
56-65
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029141
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#ZhangRG04
2006-02-08
Formally verifying information flow type systems for concurrent and thread systems.
13-22
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029136
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#BartheN04
2006-02-08
Stepwise development of security protocols: a speech act-oriented approach.
33-44
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029139
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#DungT04
2006-02-08
MAC and UML for secure software design.
75-85
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029144
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#DoanDTK04
2006-02-08
A logic-based framework for attribute based access control.
45-55
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029140
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#WangWJ04
2006-02-08
Automatic analysis of firewall and network intrusion detection system configurations.
66-74
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029143
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#UribeC04
2006-02-08
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture.
86-95
2004
FMSE
http://doi.acm.org/10.1145/1029133.1029145
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004.html#Hashii04
2005-10-18
Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washingtion, DC, USA, October 25-29, 2004
ACM Conference on Computer and Communications Security
2004
1-58113-961-6
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html
2006-04-27
Trusting a trusted system.
1
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030084
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#McLean04
2006-02-08
Security policies for downgrading.
198-209
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030110
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#ChongM04
2006-02-08
Reusable cryptographic fuzzy extractors.
82-91
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030096
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#Boyen04
2006-02-08
On the effectiveness of address-space randomization.
298-307
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030124
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#ShachamPPGMB04
2006-02-08
Versatile padding schemes for joint signature and encryption.
344-353
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030129
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#DodisFJW04
2006-02-08
Private inference control.
188-197
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030109
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#WoodruffS04
2006-02-08
On the difficulty of scalably detecting network attacks.
12-20
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030087
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#LevchenkoPV04
2006-02-08
Verifying policy-based security for web services.
268-277
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030120
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#BhargavanFG04
2006-02-08
Group signatures with verifier-local revocation.
168-177
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030106
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#BonehS04
2006-02-08
Pong-cache poisoning in GUESS.
98-109
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030099
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#DaswaniG04
2006-02-08
The dual receiver cryptosystem and its applications.
330-343
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030128
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#DiamentLKY04
2006-02-08
Fragile mixing.
227-235
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030114
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#ReiterW04
2006-02-08
Web tap: detecting covert web traffic.
110-120
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030100
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#BordersP04
2006-02-08
A PIN-entry method resilient against shoulder surfing.
236-245
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030116
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#RothRF04
2006-02-08
k-anonymous secret handshakes with reusable credentials.
158-167
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030105
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#XuY04
2006-02-08
On mutually-exclusive roles and separation of duty.
42-51
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030091
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#LiBT04
2006-02-08
New client puzzle outsourcing techniques for DoS resistance.
246-256
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030117
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#WatersJHF04
2006-02-08
IP covert timing channels: design and detection.
178-187
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030108
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#CabukBS04
2006-02-08
Attacking and repairing the winZip encryption scheme.
72-81
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030095
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#Kohno04
2006-02-08
Attestation-based policy enforcement for remote access.
308-317
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030125
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#SailerJZD04
2006-02-08
Comparing the expressive power of access control models.
62-71
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030093
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#TripunitaraL04
2006-02-08
A decision procedure for the verification of security protocols with explicit destructors.
278-287
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030121
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#DelauneJ04
2006-02-08
Using build-integrated static checking to preserve correctness invariants.
288-297
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030122
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#ChenS04
2006-02-08
Operational experiences with high-volume network intrusion detection.
2-11
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030086
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#DregerFPS04
2006-02-08
Cryptanalysis of a provably secure CRT-RSA algorithm.
92-97
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030097
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#Wagner04
2006-02-08
On achieving software diversity for improved network security using distributed coloring algorithms.
121-131
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030101
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#ODonnellS04
2006-02-08
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption.
354-363
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030130
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#YaoFDL04
2006-02-08
Mitigating bandwidth-exhaustion attacks using congestion puzzles.
257-267
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030118
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#WangR04
2006-02-08
Gray-box extraction of execution graphs for anomaly detection.
318-329
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030126
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#GaoRS04
2006-02-08
Concealing complex policies with hidden credentials.
146-157
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030104
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#BradshawHS04
2006-02-08
Direct anonymous attestation.
132-145
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030103
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#BrickellCC04
2006-02-08
Privacy and security in library RFID: issues, practices, and architectures.
210-219
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030112
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#MolnarW04
2006-02-08
KNOW Why your access was denied: regulating feedback for usable security.
52-61
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030092
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#KapadiaSC04
2006-02-08
Payload attribution via hierarchical bloom filters.
31-41
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030089
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#ShanmugasundaramBM04
2006-02-08
Parallel mixing.
220-226
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030113
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#GolleJ04
2006-02-08
Testing network-based intrusion detection signatures using mutant exploits.
21-30
2004
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1030083.1030088
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2004p.html#VignaRB04
2006-02-08
Control-flow integrity.
340-353
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102165
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#AbadiBEL05
2006-02-08
Misbehaving TCP receivers can cause internet-wide congestion collapse.
383-392
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102170
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#SherwoodBB05
2006-02-08
CPOL: high-performance policy evaluation.
147-157
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102142
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#BordersZP05
2006-02-08
Dynamic and efficient key management for access hierarchies.
190-202
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102147
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#AtallahFB05
2006-02-08
Improving Brumley and Boneh timing attack on unprotected SSL implementations.
139-146
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102140
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#AciicmezSK05
2006-02-08
Aggregated path authentication for efficient BGP security.
128-138
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102139
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#ZhaoSN05
2006-02-08
Secure collaboration in mediator-free environments.
58-67
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102130
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#ShehabBG05
2006-02-08
An auctioning reputation system based on anomaly.
270-279
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102156
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#RubinCGGKWK05
2006-02-08
New approaches for deniable authentication.
112-121
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102137
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#RaimondoG05
2006-02-08
A model and architecture for pseudo-random generation with applications to /dev/random.
203-212
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102148
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#BarakH05
2006-02-08
A modular correctness proof of IEEE 802.11i and TLS.
2-15
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102124
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#HeSDDM05
2006-02-08
Tracking anonymous peer-to-peer VoIP calls on the internet.
81-91
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102133
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#WangCJ05
2006-02-08
Automatic diagnosis and response to memory corruption vulnerabilities.
223-234
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102151
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#XuNKZB05
2006-02-08
PeerAccess: a logic for distributed authorization.
168-179
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102144
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#WinslettZB05
2006-02-08
Automatic placement of authorization hooks in the linux security modules framework.
330-339
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102164
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#GanapathyJJ05
2006-02-08
Preventing format-string attacks via automatic and efficient dynamic checking.
354-363
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102166
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#RingenburgG05
2006-02-08
Fast dictionary attacks on passwords using time-space tradeoff.
364-372
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102168
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#NarayananS05a
2006-02-08
On authenticated computing and RSA-based authentication.
122-127
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102138
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Seifert05
2006-02-08
Untraceable RFID tags via insubvertible encryption.
92-101
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102134
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#AtenieseCM05
2006-02-08
Biometrics hit the mainstream: an analysis of security and privacy implications.
407
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102175
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Bjorn05
2006-02-08
Exploiting open functionality in SMS-capable cellular networks.
393-404
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102171
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#EnckTMP05
2006-02-08
Countering DoS attacks with stateless multipath overlays.
249-259
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102153
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#StavrouK05
2006-02-08
Automated trust negotiation using cryptographic credentials.
46-57
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102129
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#LiLW05
2006-02-08
Proxy re-signatures: new definitions, algorithms, and applications.
310-319
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102161
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#AtenieseH05
2006-02-08
A framework for concrete reputation-systems with applications to history-based access control.
260-269
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102155
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#KrukowNS05
2006-02-08
Understanding and developing role-based administrative models.
158-167
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102143
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Crampton05
2006-02-08
Direct chosen ciphertext security from identity-based techniques.
320-329
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102162
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#BoyenMW05
2006-02-08
Keyboard acoustic emanations revisited.
373-382
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102169
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#ZhuangZT05
2006-03-07
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits.
235-248
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102152
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#CrandallSW05
2006-02-08
Preventing attribute information leakage in automated trust negotiation.
36-45
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102128
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#IrwinY05
2006-02-08
Securing publish-subscribe overlay services with EventGuard.
289-298
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102158
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#SrivatsaL05
2006-02-08
Secrecy types for a simulatable cryptographic library.
26-35
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102126
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Laud05
2006-06-06
On the cost-ineffectiveness of redundancy in commercial P2P computing.
280-288
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102157
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#YurkewychLR05
2006-02-08
Password authenticated key exchange using hidden smooth subgroups.
299-309
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102160
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#GentryMR05
2006-02-08
Deciding security of protocols against off-line guessing attacks.
16-25
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102125
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Baudet05
2006-02-08
Applications of secure electronic voting to automated privacy-preserving troubleshooting.
68-80
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102132
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#HuangJW05
2006-02-08
Fast and automated generation of attack signatures: a basis for building self-protecting servers.
213-222
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102150
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#LiangS05
2006-02-08
Modeling insider attacks on group key-exchange protocols.
180-189
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102146
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#KatzS05
2006-02-08
Identity-based encryption from algorithm to enterprise deployment.
406
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102174
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Appenzeller05
2006-02-08
Homeland security: cyber security R&D initiatives.
1
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102122
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Maughan05
2006-02-08
Security market: incentives for disclosure of vulnerabilities.
405
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102173
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#Swire05
2006-04-25
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, FMSE 2005, Fairfax, VA, USA, November 11, 2005
FMSE
2005
1-59593-231-3
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html
2006-02-08
Obfuscated databases and group privacy.
102-111
2005
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1102120.1102135
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005.html#NarayananS05
2006-04-25
A rewriting-based inference system for the NRL protocol analyzer: grammar generation.
1-12
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103578
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#EscobarMM05
2006-04-25
Provable anonymity.
63-72
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103585
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#GarciaHPR05
2006-04-25
Email feedback: a policy-based approach to overcoming false positives.
73-82
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103586
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#KaushikWWA05
2006-04-25
The framework of selective interleaving functions and the modular assembly kit.
53-62
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103584
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#Mantel05
2006-04-25
Towards computationally sound symbolic analysis of key exchange protocols.
23-32
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103580
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#GuptaS05
2006-06-21
Risk assessment in distributed authorization.
33-42
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103581
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#ChapinSW05
2006-04-25
On fairness in simulatability-based cryptographic systems.
13-22
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103579
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#BackesHMU05
2006-04-25
Formal security analysis of basic network-attached storage.
43-52
2005
FMSE
http://doi.acm.org/10.1145/1103576.1103583
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2005fmse.html#ChaudhuriA05
2006-09-01
Proceedings of the 2003 ACM workshop on Formal methods in security engineering, FMSE 2003, Washington, DC, USA, October 30, 2003
FMSE
2003
1-58113-781-8
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html
2006-09-01
Fast automatic synthesis of security protocols using backward search.
1-10
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035430
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#ZhouF03
2006-09-01
Algebraic specification of network security risk management.
52-60
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035435
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#HamdiB03
2006-09-01
Using interval logics for temporal analysis of security protocols.
24-31
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035432
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#HansenS03
2006-09-01
Relating cryptography and formal methods: a panel.
61-66
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035436
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#BackesMM03
2006-09-01
Formal access control analysis in the software development process.
67-76
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035437
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#KochP03
2006-09-08
Representation and analysis of coordinated attacks.
43-51
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035434
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#BraynovJ03
2006-09-01
authUML: a three-phased framework to analyze access control specifications in use cases.
77-86
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035438
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#AlghathbarW03
2006-09-06
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, CCS 2006, Taipei, Taiwan, March 21-24, 2006
1-59593-272-0
2006
ACM Conference on Computer and Communications Security
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html
2006-09-01
A compositional framework for access control policies enforcement.
32-42
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035433
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#SieweCZ03
2006-09-01
Secure protocol composition.
11-23
2003
FMSE
http://doi.acm.org/10.1145/1035429.1035431
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2003fmse.html#DattaDMP03
2006-09-06
Periodicity, complementarity and complexity of 2-adic FCSR combiner generators.
275-282
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128858
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#AnandR06
2006-09-06
Design and implementation of a reconfigurable hardware for secure embedded systems.
364
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128880
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ChiangCS06
2006-09-06
An efficient key establishment scheme for secure aggregating sensor networks.
303-310
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128863
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#BlassZ06
2006-09-06
Software integrity protection using timed executable agents.
189-200
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128847
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#GarayH06
2006-09-06
Tamper proofing and attack identification of corrupted image by using semi-fragile multiple-watermarking algorithm.
166-174
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128843
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#PeiZ06
2006-09-20
Self-organised group key management for ad hoc networks.
138-147
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128839
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#LuoSBS06
2006-09-06
An attack-localizing watermarking scheme for natural language documents.
157-165
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128842
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#GuptaPW06
2006-09-06
Measuring intrusion detection capability: an information-theoretic approach.
90-101
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128834
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#GuFDLS06
2006-09-06
Democratic group signatures: on an example of joint ventures.
365
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128882
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Manulis06
2006-09-06
Design space and analysis of worm defense strategies.
125-137
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128837
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#BrumleyLPS06
2006-09-06
Dynamic rule-ordering optimization for high-speed firewall filtering.
332-342
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128867
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#HamedA06
2006-09-06
Finding the original point set hidden among chaff.
182-188
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128845
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ChangST06
2006-09-06
A control flow obfuscation method to discourage malicious tampering of software codes.
362
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128878
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#HuangHTK06
2006-09-06
Continuous fingerprints classification by symmetrical filters.
357
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128872
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#LiYW06
2006-09-06
Quadtree based perceptual watermarking scheme.
356
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128871
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#TsuH06
2006-09-06
Approvability.
231-242
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128852
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Solworth06
2006-09-06
Analysis of traceability attack on Camenisch et al.'s blind signature schemes.
366
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128883
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Wu06
2006-09-06
Provably secure password-based authentication in TLS.
35-45
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128827
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#AbdallaBCMP06
2006-09-06
A refined look at Bernstein's AES side-channel analysis.
369
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128887
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#NeveSW06
2006-09-06
An efficient secure communication between set-top box and smart card in DTV broadcasting.
360
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128876
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#LaiH06
2006-09-06
Identity-based registry for secure interdomain routing.
321-331
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128866
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#KimNXP06
2006-09-06
Publicly verifiable ownership protection for relational databases.
78-89
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128832
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#LiD06
2006-09-06
Restricted message signing.
367
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128884
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Matsuo06
2006-09-06
Designated group credentials.
59-65
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128829
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#NgSM06
2006-09-06
Cryptanalysis of the "Grain" family of stream ciphers.
283-288
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128859
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Maximov06
2006-09-06
Problems on the MR micropayment schemes.
363
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128879
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#MamboSOK06
2006-09-06
Supporting location-based conditions in access control policies.
212-222
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128850
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ArdagnaCDVS06
2006-09-06
Certified mailing lists.
46-58
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128828
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#KhuranaH06
2006-09-06
Improving secure server performance by re-balancing SSL/TLS handshakes.
26-34
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128826
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#CastellucciaMT06
2006-09-06
Emergent properties in ad-hoc networks: a security perspective.
1
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128819
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Gligor06
2006-09-06
Security vulnerabilities: from measurements to design.
15
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128823
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Iyer06
2006-09-06
Application security support in the operating system kernel.
201-211
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128848
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#RadhakrishnanS06
2006-09-06
A general design towards secure ad-hoc collaboration.
358
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128874
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#NakaeZS06
2006-09-06
Fortifying password authentication in integrated healthcare delivery systems.
255-265
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128855
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#YangDB06
2006-09-06
Policy-based encryption schemes from bilinear pairings.
368
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128886
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#BaggaMC06
2006-09-06
Forgery attack on the RPC incremental unforgeable encryption scheme.
361
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128877
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#WangKY06
2006-09-06
Can machine learning be secure?
16-25
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128824
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#BarrenoNSJT06
2006-09-06
Lightweight, pollution-attack resistant multicast authentication scheme.
148-156
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128840
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#LinSL06
2006-09-06
An efficient broadcast authentication scheme in wireless sensor networks.
311-320
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128864
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ChangSLH06
2006-09-06
Time series modeling for IDS alert management.
102-113
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128835
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ViinikkaDMS06
2006-09-06
Privacy-preserving semantic interoperation and access control of heterogeneous databases.
66-77
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128831
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#MitraPLA06
2006-09-06
TRUST: in cyberspace and beyond.
13
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128821
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Sastry06
2006-09-06
Attack graph generation and analysis.
14
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128822
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Wing06
2006-09-06
A distributed key assignment protocol for secure multicast based on proxy cryptography.
359
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128875
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#HuangCCL06
2006-09-06
Digital invisible ink: revealing true secrets via attacking.
355
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128870
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#HuangKW06
2006-09-06
Addressing the shortcomings of one-way chains.
289-296
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128860
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#PietroMDP06
2006-09-06
Ring signatures without random oracles.
297-302
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128861
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ChowWLY06
2006-09-06
Digitally signed document sanitizing scheme based on bilinear maps.
343-354
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128868
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#MiyazakiHI06
2006-09-06
Safety analysis of usage control authorization models.
243-254
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128853
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ZhangSP06
2006-09-06
Augmenting storage with an intrusion response primitive to ensure the security of critical data.
114-124
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128836
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#GehaniCK06
2006-09-06
Image-adaptive watermarking based on perceptually shaping watermark blockwise.
175-181
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128844
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ZhuGZ06
2006-09-06
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys.
223-230
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128851
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#Tzeng06
2006-09-06
Secure information sharing enabled by Trusted Computing and PEI models.
2-12
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128820
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#SandhuRZ06
2006-09-06
Collusion secure convolutional fingerprinting information codes.
266-274
2006
ACM Conference on Computer and Communications Security
http://doi.acm.org/10.1145/1128817.1128856
http://www.informatik.uni-trier.de/~ley/db/conf/ccs/ccs2006.html#ZhuZZ06
2003-06-02
Mining Most Specific Workflow Models from Event-Based Data.
25-40
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780025.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#Schimm03
2002-05-10
Business Process Management, Models, Techniques, and Empirical Studies
Business Process Management
1806
2000
3-540-67454-3
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html
2003-06-02
Business Process Management, International Conference, BPM 2003, Eindhoven, The Netherlands, June 26-27, 2003, Proceedings
Business Process Management
2678
2003
3-540-40318-3
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html
2003-06-02
Contracting Workflows and Protocol Patterns.
152-167
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780152.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#Dijk03
2003-06-02
Ratios to Support the Exploration of Business Process Models.
291-301
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780291.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#Dietzsch03
2003-06-02
Workflow: A Language for Composing Web Services.
13-24
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780013.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#PiccinelliW03
2002-03-18
Using Formal Analysis Techniques in Business Process Redesign.
142-160
http://link.springer.de/link/service/series/0558/bibs/1806/18060142.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#HeeR00
2002-03-18
The "Organized Activity" Foundation for Business Processes and Their Management.
66-82
http://link.springer.de/link/service/series/0558/bibs/1806/18060066.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Holt00
2002-03-18
Management-Oriented Models of Business Processes.
99-109
http://link.springer.de/link/service/series/0558/bibs/1806/18060099.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Holt00a
2002-03-18
Documentary Petri Nets: A Modeling Representation for Electronic Trade Procedures.
359-375
http://link.springer.de/link/service/series/0558/bibs/1806/18060359.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Lee00
2003-06-02
Pattern Based Workflow Design Using Reference Nets.
246-260
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780246.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#MoldtR03
2002-03-18
Object Oriented Petri Nets in Business Process Modeling.
254-273
http://link.springer.de/link/service/series/0558/bibs/1806/18060254.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#MoldtV00
2002-03-18
Why Modellers Wreck Workflow Innovations.
289-300
http://link.springer.de/link/service/series/0558/bibs/1806/18060289.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Joosten00
2003-06-02
A Process-Oriented Model for Authentication on the Basis of a Coloured Petri Net.
232-245
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780232.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#Lory03
2003-06-02
Integrating Business Process Reengineering with Information Systems Development: Issues & Implications.
302-320
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780302.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#WeerakkodyC03
2003-06-02
Security in Business Process Engineering.
168-183
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780168.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#BackesPW03
2003-06-02
A Top-Down Petri Net-Based Approach for Dynamic Workflow Modeling.
336-353
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780336.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#Chrzastowski-WachtelBHOS03
2003-06-02
Personal Schedules for Workflow Systems.
216-231
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780216.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#EderPGN03
2003-06-02
Business Process Management: A Survey.
1-12
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780001.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#AalstHW03
2003-06-02
Undo in Workflow Management Systems.
321-335
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780321.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#AgostiniML03
2003-06-02
A Model for Process Service Interaction.
261-275
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780261.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#BainaTB03
2003-06-02
Towards a Library for Process Programming.
120-135
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780120.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#Yang03
2002-03-18
Modeling, Simulation and Analysis of Business Processes.
129-141
http://link.springer.de/link/service/series/0558/bibs/1806/18060129.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#DeselE00
2002-03-18
Validation of Process Models by Construction of Process Nets.
110-128
http://link.springer.de/link/service/series/0558/bibs/1806/18060110.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Desel00
2003-06-02
Structuring Business Objectives: A Business Process Modeling Perspective.
72-87
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780072.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#NeigerC03
2002-03-18
Techniques for Modeling Workflows and Their Support of Reuse.
1-15
http://link.springer.de/link/service/series/0558/bibs/1806/18060001.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#JanssensVW00
2003-06-02
Generic Recurrent Patterns in Business Processes.
200-215
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780200.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#Dietz03
2003-06-02
Evaluation of Correctness Criteria for Dynamic Workflow Changes.
41-57
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780041.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#RinderleRD03
2002-03-18
Guidelines of Business Process Modeling.
30-49
http://link.springer.de/link/service/series/0558/bibs/1806/18060030.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#BeckerRU00
2002-03-18
Evaluation of Generic Process Design Patterns: An Experimental Study.
83-98
http://link.springer.de/link/service/series/0558/bibs/1806/18060083.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#ZapfH00
2003-06-02
Use Cases as Workflows.
88-103
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780088.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#ChaudronHS03
2002-03-18
The Effects of Workflow Systems on Organizations: A Qualitative Study.
301-316
http://link.springer.de/link/service/series/0558/bibs/1806/18060301.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Kueng00
2003-06-02
Integrated Business Process Management: Using State-Based Business Rules to Communicate between Disparate Stakeholders.
58-71
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780058.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#McDermid03
2003-06-02
ADEPT Workflow Management System: .
370-379
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780370.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#ReichertRD03
2002-03-18
On the Practical Relevance of an Integrated Workflow Management System - Results of an Empirical Study.
317-327
http://link.springer.de/link/service/series/0558/bibs/1806/18060317.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Meyer00
2003-06-02
Query Nets: Interacting Workflow Modules That Ensure Global Termination.
184-199
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780184.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#GlabbeekS03
2003-06-02
A Case-Based Framework for Workflow Model Management.
354-369
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780354.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#MadhusudanZ03
2002-03-18
Workflow Management Between Formal Theory and Pragmatic Approaches.
345-358
http://link.springer.de/link/service/series/0558/bibs/1806/18060345.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Jablonski00
2002-03-18
Configurable Business Objects for Building Evolving Enterprise Models and Applications.
328-344
http://link.springer.de/link/service/series/0558/bibs/1806/18060328.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#PapazoglouH00
2003-06-02
Generating a Process Model from a Process Audit Log.
136-151
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780136.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#GolaniP03
2003-06-02
Exception Handling in the BPEL4WS Language.
276-290
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780276.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#CurberaKLW03
2003-06-02
Modelling and Validation with VipTool.
380-389
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780380.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#DeselJLN03
2002-03-18
A Knowledge-Based Approach for Designing Robust Business Processes.
50-65
http://link.springer.de/link/service/series/0558/bibs/1806/18060050.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#DellarocasK00
2002-03-18
Information Gathering and Process Modeling in a Petri Net Based Approach.
274-288
http://link.springer.de/link/service/series/0558/bibs/1806/18060274.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Deiters00
2002-05-10
Workflow Verification: Finding Control-Flow Errors Using Petri-Net-Based Techniques.
161-183
http://link.springer.de/link/service/series/0558/bibs/1806/18060161.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Aalst00
2002-03-18
A Workflow Change Is a Workflow.
201-217
http://link.springer.de/link/service/series/0558/bibs/1806/18060201.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#EllisK00
2002-03-18
Modeling Processes and Workflows by Business Rules.
16-29
http://link.springer.de/link/service/series/0558/bibs/1806/18060016.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#KnolmayerEP00
2002-03-18
Improving Flexibility of Workflow Management Systems.
218-234
http://link.springer.de/link/service/series/0558/bibs/1806/18060218.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#AgostiniM00
2002-03-18
Inter-operability of Workflow Applications: Local Criteria for Global Soundness.
235-253
http://link.springer.de/link/service/series/0558/bibs/1806/18060235.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#KindlerMR00
2002-03-18
ARIS Architecture and Reference Models for Business Process Management.
376-389
http://link.springer.de/link/service/series/0558/bibs/1806/18060376.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#ScheerN00
2003-06-02
A Model to Support Collaborative Work in Virtual Enterprises.
104-119
2003
Business Process Management
http://link.springer.de/link/service/series/0558/bibs/2678/26780104.htm
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2003.html#PerrinWBG03
2002-05-07
Compositional Modeling and Verification of Workflow Processes.
184-200
http://link.springer.de/link/service/series/0558/bibs/1806/18060184.htm
2000
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2000.html#Voorhoeve00
2004-07-02
Business Process Management: Second International Conference, BPM 2004, Potsdam, Germany, June 17-18, 2004. Proceedings
Business Process Management
3080
2004
3-540-22235-9
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html
2004-07-02
Mining Social Networks: Uncovering Interaction Patterns in Business Processes.
244-260
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=244
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#AalstS04
2004-07-02
Cohesion and Coupling Metrics for Workflow Process Design.
290-305
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=290
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#ReijersV04
2004-07-02
Supporting Usage-Centered Workflow Design: Why and How?
227-243
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=227
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#Kleiner04
2004-07-02
Management of Knowledge Intensive Business Processes.
163-178
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=163
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#GronauW04
2004-07-02
On the Semantics of EPCs: A Framework for Resolving the Vicious Circle.
82-97
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=82
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#Kindler04
2004-07-02
OPCATeam - Collaborative Business Process Modeling with OPM.
66-81
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=66
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#DoriBT04
2004-07-02
Business to Business Transaction Modeling and WWW Support.
132-147
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=132
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#CostaRAS04
2004-07-02
Workload Balancing on Agents for Business Process Efficiency Based on Stochastic Model.
195-210
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=195
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#HaBK04
2004-07-02
Model-Driven Approach to Workflow Execution.
261-273
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=261
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#HurJKK04
2004-07-02
Interactive Workflow Mining.
211-226
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=211
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#HammoriHK04
2004-07-02
On Dealing with Structural Conflicts between Process Type and Instance Changes.
274-289
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=274
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#RinderleRD04
2004-07-02
Goal-Oriented Business Process Modeling with EPCs and Value-Focused Thinking.
98-115
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=98
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#NeigerC04
2004-07-02
Integration of Multi-attributed Negotiations within Business Processes.
148-162
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=148
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#SimonR04
2004-07-02
A Workflow-Oriented System Architecture for the Management of Container Transportation.
116-131
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=116
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#BassilKK04
2004-07-02
SMART: System Model Acquisition from Requirements Text.
179-194
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=179
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#DoriKSC04
2004-07-02
Using TimeNET to Evaluate Operational Planning Processes.
17-32
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=17
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#FreiheitB04
2004-07-02
Modeling Medical E-services.
49-65
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=49
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#AnzbockD04
2004-07-02
Consistency in Model Integration.
1-16
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=1
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#HeeSSV04
2004-07-02
Business Objectives as Drivers for Process Improvement: Practices and Experiences at Thales Naval The Netherlands (TNNL).
33-48
http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=3080&spage=33
2004
Business Process Management
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2004.html#TrienekensKRS04
2005-09-29
Business Process Management, 3rd International Conference, BPM 2005, Nancy, France, September 5-8, 2005, Proceedings
Business Process Management
3649
2005
3-540-28238-6
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html
2005-09-29
Specifying Web Workflow Services for Finding Partners in the Context of Loose Inter-organizational Workflow.
120-136
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_9
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#AndonoffBH05
2005-09-29
Process Management in Health Care: A System for Preventing Risks and Medical Errors.
334-343
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_22
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#RuffoloCG05
2005-09-29
Verification of SAP Reference Models.
464-469
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_41
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#DongenJ05
2005-09-29
Service Retrieval Based on Behavioral Specifications and Quality Requirements.
392-397
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_29
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GrigoriPB05
2005-09-29
sPAC (Web Services Performance Analysis Center): Performance Analysis and Estimation Tool of Web Services.
109-119
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_8
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#SongL05
2005-09-29
On the Semantics of EPCs: Efficient Calculation and Simulation.
398-403
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_30
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#CuntzK05
2005-09-29
Mining Workflow Recovery from Event Based Logs.
169-185
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_12
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GaaloulG05
2005-09-29
Using Software Quality Characteristics to Measure Business Process Quality.
374-379
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_26
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GucegliogluD05
2005-09-29
A Pathway for Process Improvement Activities in a Production Environment: A Case Study in a Rework Department.
344-353
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_23
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#OzkokPCBK05
2005-09-29
Service Interaction Patterns.
302-318
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_20
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#BarrosDH05
2005-09-29
Visualization Support for Managing Large Business Process Specifications.
205-219
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_14
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#StreitPB05
2005-09-29
Semi-automatic Generation of Web Services and BPEL Processes - A Model-Driven Approach.
64-79
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_5
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#AnzbockD05
2005-09-29
On the Suitability of Correctness Criteria for Business Process Models.
386-391
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_28
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#DehnertZ05
2005-09-29
Event-Based Coordination of Process-Oriented Composite Applications.
236-251
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_16
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#DumasFMV05
2005-09-29
Introducing Business Process into Legacy Information Systems.
452-457
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_39
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#BorgesVPA05
2005-09-29
Towards Integrating Business Policies with Business Processes.
404-409
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_31
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#Milosevic05
2005-09-29
Behavior Based Integration of Composite Business Processes.
186-204
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_13
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GrossmannRSS05
2005-09-29
An Effective Content Management Methodology for Business Process Management.
416-421
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_33
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#KimPKK05
2005-09-29
An Analysis and Taxonomy of Unstructured Workflows.
268-284
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_18
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#LiuK05
2005-09-29
An Organisational Perspective on Collaborative Business Processes.
17-31
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_2
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#ZhaoLY05
2005-09-29
Overview of Transactional Patterns: Combining Workflow Flexibility and Transactional Reliability for Composite Web Services.
440-445
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_37
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#BhiriGPG05
2005-09-29
The Price of Coordination in Resource Management.
96-108
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_7
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#HeeSSVW05
2005-09-29
A Contract Layered Architecture for Regulating Cross-Organisational Business Processes.
410-415
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_32
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#RouachedPG05
2005-09-29
Accelerated Enterprise Process Modeling Through a Formalized Functional Typology.
446-451
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_38
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#WasserLK05
2005-09-29
A Human-Oriented Tuning of Workflow Management Systems.
80-95
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_6
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#VanderfeestenR05
2005-09-29
Specification and Management of Policies in Service Oriented Business Collaboration.
422-427
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_34
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#OrriensY05
2005-09-29
Mining Hierarchies of Models: From Abstract Views to Concrete Specifications.
32-47
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_3
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GrecoGP05
2005-09-29
Comparing the Control-Flow of EPC and Petri Net from the End-User Perspective.
434-439
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_36
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#SarsharL05
2005-09-29
Transforming BPEL to Petri Nets.
220-235
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_15
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#HinzSS05
2005-09-29
From RosettaNet PIPs to BPEL Processes: A Three Level Approach for Business Protocols.
364-373
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_25
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#Khalaf05
2005-09-29
<i>pi</i>-Calculus for Formalizing Workflow Patterns.
153-168
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_11
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#PuhlmannW05
2005-09-29
Flexible Business Process Management Using Forward Stepping and Alternative Paths.
48-63
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_4
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GolaniG05
2005-09-29
Integrating Process Learning and Process Evolution - A Semantics Based Approach.
252-267
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_17
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#RinderleWRW05
2005-09-29
Business Process Modelling and Improvement Using TAD Methodology.
380-385
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_27
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#DamijD05
2005-09-29
Modeling and Analysis of Mobile Service Processes by Example of the Housing Industry.
1-16
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_1
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GruhnKK05
2005-09-29
Modeling and Assessment of Production Printing Workflows Using Petri Nets.
319-333
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_21
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GottumukkalaS05
2005-09-29
Spheres of Isolation: Adaptation of Isolation Levels to Transactional Workflow.
458-463
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_40
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#GuabtniCG05
2005-09-29
A Framework for Document-Driven Workflow Systems.
285-301
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_19
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#WangK05
2005-09-29
Yet Another Event-Driven Process Chain.
428-433
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_35
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#MendlingNN05
2005-09-29
IT Support for Healthcare Processes.
354-363
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_24
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#LenzR05
2005-09-29
An Intuitive Formal Approach to Dynamic Workflow Modeling and Analysis.
137-152
2005
Business Process Management
http://dx.doi.org/10.1007/11538394_10
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpm2005.html#WangRTMS05
2006-02-23
Business Process Management Workshops, BPM 2005 International Workshops, BPI, BPD, ENEI, BPRM, WSCOBPM, BPS, Nancy, France, September 5, 2005, Revised Selected Papers
3-540-32595-6
3812
Business Process Management Workshops
2006
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html
2006-02-23
Preface (BPS 2005).
1-2
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_1
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#DumasDL05
2006-02-23
Global and Local QoS Guarantee in Web Service Selection.
32-46
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_4
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#ArdagnaP05
2006-02-23
Architecture-Based Interoperability Evaluation in Evolutions of Networked Enterprises.
293-304
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_26
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#Chen05
2006-02-23
Mining Staff Assignment Rules from Event-Based Data.
177-190
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_16
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#LyRDR05
2006-02-23
Preface (BPD 2005).
397-398
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_36
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#Reijers05
2006-03-01
Conformance Testing: Measuring the Fit and Appropriateness of Event Logs and Process Models.
163-176
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_15
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#RozinatA05
2006-02-23
Enabling Interoperability of Networked Enterprises Through an Integrative Information System Architecture for CRM and SCM.
305-316
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_27
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#SelkKA05
2006-02-23
Configurable Process Models as a Basis for Reference Modeling.
512-518
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_47
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#AalstDGRJ05
2006-02-23
Web Services Experiment Using TravelXML: Standard XML for Electronic Commerce in the Travel Industry.
385-389
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_34
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#ObaMNK05
2006-02-23
A Methodology for Process Evaluation and Activity Based Costing in Health Care Supply Chain.
375-384
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_33
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#ChabrolCFG05
2006-02-23
Understanding the Term Reference Model in Information Systems Research: History, Literature Analysis and Explanation.
484-496
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_45
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#Thomas05
2006-02-23
Applying Specialization to Petri Nets: Implications for Workflow Design.
432-443
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_40
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#WynerL05
2006-02-23
Towards a Framework for the Agile Mining of Business Processes.
191-202
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_17
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#WeberRRW05
2006-02-23
Genetic Process Mining: A Basic Approach and Its Challenges.
203-215
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_18
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#MedeirosWA05
2006-02-23
Standards for Web Service Choreography and Orchestration: Status and Perspectives.
61-74
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_7
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#BarrosDO05
2006-02-23
Risk Management in the BPM Lifecycle.
454-466
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_42
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#MuehlenH05
2006-02-23
WSMX Process Mediation Based on Choreographies.
130-143
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_12
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#CimpianM05
2006-02-23
Preface (BPI 2005).
159-161
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_14
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#CastellanosW05
2006-02-23
On Automating Networked Enterprise Management.
363-374
2005
Business Process Management Workshops
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#YildizPG05
http://dx.doi.org/10.1007/11678564_32
2006-02-23
Interoperability in Service-Based Communities.
317-328
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_28
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#RuokolainenK05
2006-02-23
A Framework for Automated Negotiation of Service Level Agreements in Services Grids.
89-101
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_9
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#LudwigBKF05
2006-02-23
From Collaboration Models to BPEL Processes Through Service Models.
75-88
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_8
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#BrunoR05
2006-02-23
On Web Services Workflow Mining.
216-228
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_19
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#GombotzD05
2006-02-23
Preface (ENEI 2005).
229-232
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_20
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#BoudjlidaP05
2006-02-23
Designing Business Process Variants - Using the BAT Framework as a Pragmatic Lens.
408-420
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_38
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#LindG05
2006-02-23
Requirements to Improve the Synchronisation of Inter-enterprise Models.
353-362
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_31
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#CamposGCC05
2006-02-23
Guided Interaction: A Language and Method for Incremental Revelation of Software Interfaces for Ad Hoc Interaction.
3-17
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_2
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#OaksH05
2006-02-23
On the Syntax of Reference Model Configuration - Transforming the C-EPC into Lawful EPC Models.
497-511
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_46
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#ReckerRAM05
2006-02-23
Data Level Enterprise Applications Integration.
390-395
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_35
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#VujasinovicM05
2006-02-23
Web Service Discovery and Dynamic Invocation Based on UDDI/OWL-S.
47-55
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_5
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#YuZ05
2006-02-23
"Intelligent" Tools for Workflow Process Redesign: A Research Agenda.
444-453
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_41
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#NetjesVR05
2006-02-23
UEML 1.0 and UEML 2.0: Benefits, Problems and Comparison.
245-256
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_22
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#Berio05
2006-02-23
CoSeRT: A Framework for Composing Service-Based Real-Time Applications.
329-341
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_29
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#Garcia-VallsEBK05
2006-02-23
BPR Implementation: A Decision-Making Strategy.
421-431
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_39
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#MansarRO05
2006-02-23
Business Process Reference Models: Survey and Classification.
469-483
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_44
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#FettkeLZ05
2006-02-23
Preface (WSCOBPM 2005).
57-59
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_6
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#StollbergRDB05
2006-02-23
An Abstract Machine Architecture for Web Service Based Business Process Management.
144-157
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_13
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#FarahbodGV05
2006-02-23
A High-Level Specification for Mediators(Virtual Providers).
116-129
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_11
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#AltenhofenBL05
2006-02-23
A Constrained Object Model for Configuration Based Workflow Composition.
102-115
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_10
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#AlbertHK05
2006-02-23
Exchange of Business Process Models Using the POP* Meta-model.
233-244
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_21
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#GrangelCSP05
2006-02-23
Applying Enterprise Models to Design Cooperative Scientific Environments.
281-292
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_25
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#BosinDFLP05
2006-02-23
Preface (BPRM 2005).
467-468
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_43
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#KindlerN05
2006-02-23
Design Processes for Sustainable Performances: A Model and a Method.
399-407
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_37
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#LongoM05
2006-02-23
Supporting Business Experts in the Design of B2B Transactions Through Interactive Process Simulation.
342-352
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_30
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#SchmittID05
2006-02-23
Inter-agent Communications During the Virtual Enterprise Creation.
269-280
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_24
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#BoukhelfaB05
2006-02-23
Facilitating Interoperability: A Cross-Analysis of the Language UEML and the Standard ISO/DIS 19440.
257-268
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_23
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#WohedAP05
2006-02-23
Towards P2P-Based Semantic Web Service Discovery with QoS Support.
18-31
2005
Business Process Management Workshops
http://dx.doi.org/10.1007/11678564_3
http://www.informatik.uni-trier.de/~ley/db/conf/bpm/bpmw2005.html#VuHA05
2002-04-29
Dynamic Voronoi Diagrams in Motion Planning.
227-236
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#RoosN91
2002-04-29
Planar Geometric Reasoning with the Theory of Hints.
141-159
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Monney91
2002-04-29
Geometric Modeling of Smooth Surfaces.
158-167
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Hagen88
2002-04-29
Internal and External Algorithms for the Points-in-Regions Problem - the Inside Join of Geo-Relational Algebra.
85-89
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#BlankenagelG88
2002-04-29
An On-Line Algorithm for Constructing Sweep Planes in Regular Position.
27-35
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#BieriS91
2002-04-29
Preclassification and Delayed Classification of Boundary Entities in Arbitrary Dimensions.
57-69
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Durst91
2002-04-29
An Optimal Algorithm for Approximating a Set of Rectangles by Two Minimum Area Rectangles.
13-25
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#BeckerFGOTW91
2002-04-29
Time Coherence in Computer Animation by Ray Tracing.
187-201
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Muller88
2002-04-29
Computational Geometry and its Applications, CG'88, International Workshop on Computational Geometry, Würzburg, Germany, March 24-25, 1988
Workshop on Computational Geometry
333
1988
3-540-50335-8
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html
2002-04-29
Geometrical Abstract Automata.
217-231
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Huckenbeck88
2002-04-29
A Divide-and-Conquer Algorithm for Computing 4-Dimensional Convex Hulls.
113-135
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Buckley88
2002-04-29
On Separable and Rectangular Clusterings.
25-42
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#HeusingerN88
2002-04-29
Triangulating a Monotone Polygon in Parallel.
136-147
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Wagener88
2002-04-29
Automatizing Geometric Proofs and Constructions.
232-252
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Bruderlin88
2002-04-29
Performance Analysis of Three Curve Presentation Schemes.
37-56
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#DominguezG91
2002-04-29
Elementary Set Operations with d-Dimensional Polyhedra.
97-112
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#BieriN88
2002-04-29
Computing the Rectilinear Link Diameter of a Polygon.
203-215
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#NilssonS91
2002-04-29
Using Graphical Information from a Grid File's Directory to Visualize Patterns in Cartesian Product Spaces.
1-14
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Hinterberger88
2002-04-29
Using Gale Transforms in Computational Geometry.
202-216
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Aurenhammer88
2002-04-29
A Voronoi Diagram Based Adaptive K-Means-Type Clustering Algorithm for Multidimenstional Weighted Data.
265-275
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Schreiber91
2002-04-29
Moving Along a Street.
123-140
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Klein91
2002-04-29
Solving Algebraic Systems in Bernstein-Bézier Representation.
161-169
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#MullerO91
2002-04-29
Abstract Voronoi Diagrams and their Applications.
148-157
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Klein88
2002-04-29
Geo-Relational Algebra: A Model and Query Language for Geometric Database Systems.
90-96
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Guting88
2002-04-29
A New Simple Linear Algorithm to Recognize Interval Graphs.
289-308
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Simon91
2003-03-18
Determination of the Symmetries of Polyhedra and an Application to Object Recognition.
113-121
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#JiangB91
2002-04-29
Point Location in Arrangements.
71-84
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Meiser88
2002-04-29
On Shortest Networks for Classes of Points in the Plane.
103-111
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#IhlerRW91
2002-04-29
Computational Geometry - Methods, Algorithms and Applications, International Workshop on Computational Geometry CG'91, Bern, Switzerland, March 21-22, 1991
Workshop on Computational Geometry
553
1991
3-540-54891-2
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html
2002-04-29
A Sweep Algorithm for the All-Nearest-Neighbors Problem.
43-54
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#HinrichsNS88
2002-04-29
Collision Avoidance for Nonrigid Objects.
168-179
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Abramowski88
2002-04-29
On the Detection of a Common Intersection of k Convex Polyhedra.
180-186
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#Reichling88
2002-04-29
On Continuous Homotopic One Layer Routing.
55-70
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#GaoKMRSJ88
2002-04-29
The Post Office Problem for Fuzzy Point Sets.
1-11
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#AurenhammerSW91
2002-04-29
Robustness in Geometric Modeling - Tolerance-Based Methods.
85-101
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#FangB91
2002-04-29
<sup>*</sup>-Tree: A New Representation of Polygonal Objects Supporting Spatial Queries and Operations.
249-263
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#SchneiderK91
2002-04-29
XYZ: A Project in Experimental Geometric Computation.
171-186
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#NievergeltSLAB91
2002-04-29
Twin Grid Files: A Performance Evaluation.
15-24
1988
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1988.html#HutfleszWS88
2002-04-29
Generating Triangulations of 2-Manifolds.
237-248
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Schipper91
2002-04-29
Implementing the XYZ GeoBench: A Programming Environment for Geometric Algorithms.
187-202
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Schorn91
2002-04-29
<sup>d</sup>.
71-83
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Engel91
2002-04-29
Predictions About Collision Free Paths from Intersection Tests.
309-320
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Stifter91
2002-04-29
A Generalization of Staircase Visibility.
277-287
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#SchuiererRW91
2002-04-29
Layout of Flexible Manufacturing Systems - Selected Problems.
217-225
1991
Workshop on Computational Geometry
http://www.informatik.uni-trier.de/~ley/db/conf/cga/cga1991.html#Noltemeier91
2003-08-27
Cartoon Blur: Non-Photorealistic Motion Blur.
276-281
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460276abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#KawagishiHK03
2003-09-23
1998 Computer Graphics International (CGI '98), June 22-24, 1998 - Hannover, Germany, Proceedings
Computer Graphics International
1998
0-8186-8445-3
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html
2003-01-30
Computer Graphics International 2001 (CGI'01), July 3-6, 2001, Hong Kong, China, Proceedings
Computer Graphics International
2001
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html
0-7695-1007-8
2003-08-27
2003 Computer Graphics International (CGI 2003), 9-11 July 2003, Tokyo, Japan
Computer Graphics International
2003
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html
0-7695-1946-6
2004-02-11
International Activities and Future Perspectives of Virtual Reality.
9-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180009abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#EncarnacaoF96
2002-01-03
A Field Interpolated Texture Mapping Algorithm for Skeletal Implicit Surfaces.
25-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850025abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#TiggesW99
2003-01-30
Visualization of Geostress Tensor along Oil Well Trajectory.
317-320
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070317abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ZhouLM01
2003-09-23
VUEMS: A Virtual Urban Environment Modeling System.
84-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250084abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Donikian97
2003-09-23
Rendering Objects with Small Elements Based on their Micro and Macro Structures.
268-272
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450268abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#TerasawaK98
2003-09-23
View Interpolation with Range Data for Navigation Applications.
90-
1996
Computer Graphics International
http://csdl.computer.org/dl/proceedings/cgi/1996/7518/00/75180090.pdf
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#KanekoO96
2003-01-30
Modeling and Rendering of Various Natural Phenomena Consisting of Particles.
149-158
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070149abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#NishitaD01
2002-01-03
Generating Motion Fields of Complex Scenes.
65-69
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850065abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#MasonMN99
2003-01-30
Creating Pen-and-Ink Illustration Using Stroke Morphing Method.
113-122
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070113abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#KimJYC01
2003-09-23
An Intuitive Approach to Convex Curve Design.
214-219
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180214abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#GuanT96
2003-09-23
Modifying Curvatures at Design Points for Convex B-spline Curves.
223-229
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250223abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#GuanT97
2002-08-04
Using the Implicit Surface Paradigm for Smooth Animation of Triangle Meshes.
214-221
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850214abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#OverveldB99
2003-09-23
An Algorithm for Polygon Subdivision Based on Vertex Normals.
3-12
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250003abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#OverveldW97
2003-01-30
Animating Chinese Landscape Paintings and Panorama Using Multi-Perspective Modeling.
107-112
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070107abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ChuT01
2003-09-23
Stability Conditions for Free Form Surfaces.
41-47
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450041abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#HagenH98
2003-09-23
Generating Various Levels of Detail of Architectural Objects for Image-Quality and Frame-Rate Control Rendering.
84-89
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180084abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#Belblidia96
2003-01-30
Water Animation with Disturbance Model.
73-80
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070073abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ChenDC01
2002-01-03
Real-Time Collision Detection and Response for Complex Environments.
105-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430105abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#Geiger00
2003-01-30
Mosaic and Warping for Forward Moving Images.
363-365
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070363abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ZhangCS01
2003-08-27
A Framework to Customize a Face Model for Reusing Animation.
258-261
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460258abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#ZhangHC03
2003-01-30
Real-Time Physically-Based Facial Expression Animation Using Mass-Spring System.
347-350
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070347abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ZhangPS01
2003-09-23
An Advanced Graphics Chip with Bump-mapped Phong Shading.
156-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250156abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#IkedoM97
2003-01-30
A Realtime Rough Surface Renderer.
355-358
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070355abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#IkedoO01
2003-09-23
Physically Based Adaptive Triangulation of Freeform Surfaces.
144-153
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180144abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#ChouraquiE96
2003-09-23
3D - Visualization of Garments.
396-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450396abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Rodiger98
2003-09-23
Ray Tracing Optimization Utilizing Projective Methods.
47-53
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180047abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#ReethMBF96
2003-09-23
Invited Lecture: Interactive Exploration of Distributed 3D Databases over the Internet.
324-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450324abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Rossignac98
2003-01-30
Physically-Based Real-Time Animation of Draped Cloth.
257-264
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070257abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ChengSXS01
2003-09-25
An inverse kinematics method for 3D figures with motion data.
266-271
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460266abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#KomuraKKLS03
2003-09-23
On Polyhedral Approximations to a Sphere.
426-432
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450426abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#FoxJ98
2003-01-30
The Hash Function and the Principle of Duality.
167-174
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070167abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#SkalaK01
2003-08-27
Design and Implementation of Panoramic Movie System by Using Commodity 3D Graphics Hardware.
14-21
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460014abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#YamamotoD03
2003-09-23
Multiresolution Triangular B-Spline Surfaces.
166-177
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450166abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#DregerGS98
2003-09-23
Modeler Independent Procedural Interfaces for Solid Modeling.
176-183
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180176abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#HanR96
2003-09-23
Efficient and Reliable Triangulation of Polygons.
633-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450633abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Held98
2003-09-23
3-D Modelling of Buildings using High-Level Knowledge.
605-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450605abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Grau98
2002-01-03
Volume Decimation of Irregular Tetrahedral Grids.
222-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850222abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#GelderVW99
2002-01-03
Fuzzy-Based Person Tracking in Real-Time.
201-208
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430201abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#HochM00
2002-01-03
Visualization and Virtual Reality for Art and Science.
34-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850034abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#Cox99
2003-08-27
"Nijimi" Rendering Algorithm for Creating Quality Black Ink Paintings.
152-161
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460152abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#GuoK03
2003-09-23
Review of Circle Measurements in Computer Vision and Novel Use of Computational Geometry in Image Metrology.
350-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450350abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#GuoP98
2003-09-23
Calligraphic Character Synthesis using Brush Model.
13-21
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250013abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#IpW97
2003-01-30
Layout Adjustment and Boundary Detection for a Diagram.
351-354
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070351abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#Lai01
2002-01-03
Evolutionary Optimization of Functionally Defined Shapes: Case Study of Natural Optical Objects.
20-24
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850020abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#SavchenkoP99
2003-01-30
NURBS Streams.
337-342
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070337abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#LiL01
2005-12-22
Ray Tracing Height Fields.
202-209
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460202abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#QuQZKW03
2003-01-30
A Multi-Layered Reflection Model of Natural Human Skin.
249-256
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070249abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#NgL01
2003-09-23
Deforming Virtual Objects with an Instrumented Glove.
393-395
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450393abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#HuiM98
2003-09-23
Keynote Lecture: Human Media Technology - The Human-Centered, Sustainable Technology Development.
132-141
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450132abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#EncarnacaoLS98
2002-01-03
Hand Gesture Animation from Static Postures Using an Anatomy-Based Model.
29-36
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430029abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#IpCL00
2002-01-03
Simulated Patient for Orthognathic Surgery.
239-246
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430239abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#IpKX00
2003-09-23
Integrating Flying and Fish Tank Metaphors with Cyclopean Scale.
39-46
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250039abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#WareF97
2002-01-03
Augmented Reality for Real and Virtual Humans.
303-308
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430303abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#BalcisoyTPFT00
2003-09-23
Visualization of Noh Mask Curvature Features.
572-574
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450572abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#TakagiBK98
2004-03-17
Data Compression for a Massive Image Data Set in IBMR.
68-73
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460068abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#LeungMW03
2003-09-23
"THIN" vs. "FAT" Visualization Client.
772-788
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450772abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Jern98
2003-09-23
A New Type of Free-Form Curve Given by an Integral Form.
722-725
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450722abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#MiuraNI98
2003-01-30
Technical Illustration Based on Human-Like Approach.
343-346
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070343abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#GengFYP01
2002-01-03
Virtual Laboratory: An Interactive Software Environment for Computer Graphics.
93-100
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850093abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#FederlP99
2003-09-23
Robust Tesselation of Trimmed Rational B-Spline Surface Patches.
543-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450543abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#ChoMPP98
2002-01-03
Time Warping of Audio Signals.
52-57
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850052abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#GoldensteinG99
2006-03-30
An Animation Toolkit Based on Motion Mapping.
11-18
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430011abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#LeeL00
2003-09-23
Automatic Exposure in Computer Graphics Based on the Minimum Information Loss Principle.
666-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450666abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#NeumannMP98
2003-01-30
3D Discrete Clothoid Splines.
321-324
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070321abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#LiLL01
2003-08-27
Time-Sequence Dynamic Virtual Images.
236-239
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460236abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#LiSZ03
2003-09-23
Using Physics Based Models in Virtual Reality for Dynamic Emulation of Robotic Systems.
388-390
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450388abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#LiWH98
2003-08-27
Creating Various Styles of Animations Using Example-Based Filtering.
312-317
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460312abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#HashimotoJN03
2003-09-23
Real Time Muscle Deformations using Mass-Spring Systems.
156-165
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450156abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#NedelT98
2002-01-03
A Technique for Precise Depth Representation in Stereoscopic Display.
80-84
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850080abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#YoshidaMHOHYY99
2003-09-23
Semi-Automatic Modelling of Urban Buildings from High Resolution Aerial Imagery.
588-596
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450588abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#FrereVMG98
2003-09-23
PC-based Quick Algorithm for Rendering Semi-Transparent Multi-Isosurfaces of Volumetric Data.
54-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180054abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#WanTTL96
2003-09-23
Hierarchical Decomposition of Datasets on Irregular Surface Meshes.
59-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450059abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#BonneauG98
2003-09-23
Scaling VR in VRML: Integrating Different VR Methodologies in a VRML Browsing System.
564-567
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450564abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#DornerLSSZ98
2003-11-04
An Interpolation Subspline Scheme Related to B-Spline Techniques.
131-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250131abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Roschel97
2003-01-30
Providing Local Interpolation, Tension and Normal Control in the Manipulation of Loop Subdivision Surfaces.
299-305
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070299abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ClaesRR01
2003-09-23
An Array Processor Architecture with Parallel Data Cache for Image Rendering and Compositing.
411-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450411abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#BerekovicP98
2003-09-23
Visualization of Fluid Displacement in Porous Media.
740-751
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450740abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#FedenczukW98
2003-01-30
Blendeforming: Ray Traceable Localized Foldover-Free Space Deformation.
183-192
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070183abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#MasonW01
2003-09-23
A Prototype System for Light Propagation in Terrains.
103-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450103abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#StammEBSW98
2003-08-27
Mesh Denoising via Iterative Alpha-Trimming and Nonlinear Diffusion of Normals with Automatic Thresholding.
28-33
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460028abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#YagouOB03
2002-01-03
Local and Global Geometric Methods for Analysis Interrogation, Reconstruction, Modification and Design of Shape.
137-152
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430137abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#WolterF00
2002-01-03
Hybridization Techniques for Fast Radiosity Solvers.
269-278
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430269abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#LeblondRR00
2002-01-03
Near-Optimal Adaptive Polygonization.
206-213
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850206abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#SeiboldJ99
2003-09-23
Towards an Understanding of Surfaces through Polygonization.
416-425
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450416abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#SeiboldW98
2004-02-20
Fast Volumetric Display of Natural Gaseous Phenomena.
74-83
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460074abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#RoettgerE03
2005-03-08
Characterizing Images Based on Lines for Image Indexing.
94-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250094abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#KuniiMSO97
2002-01-03
Effective Volume Sampling of Solid Models using Distance Measures.
12-19
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850012abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#SealyN99
2003-09-23
Smoothing Of Three Dimensional Models By Convolution.
184-190
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180184abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#SealyW96
2003-09-23
Virtual 3D Sculpturing with a Parametric Hand Surface.
178-186
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450178abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#WongLM98
2003-01-30
Affine-Invariant Sketch-Based Retrieval of Images.
55-61
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070055abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#IpCWF01
2003-01-30
A Hybrid Approach to the Recovery of Deformable Superquadric Models from 3D Data.
131-138
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070131abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#SinnottH01
2003-09-23
Interactive Visualization of Particle Systems.
88-95
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450088abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#BackesDR98
2003-09-23
Reversibly Visible Polygons and Polygonal Approximation in Two Dimensional Space.
74-83
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250074abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#RaoK97
2003-09-23
Curve and Surface Design Using Multiresolution Constraints.
121-130
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250121abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#TakahashiSK97
2003-09-23
Implicit Surface Reconstruction from 2D CT Scan Sections.
583-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450583abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#PontierSV98
2004-09-09
Volume Rendering for Curvilinear and Unstructured Grids.
210-217
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460210abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#MaxWSC03
2004-12-21
Robust Watermarking of 3D Polygonal Models Based on Vertice Scrambling.
254-257
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460254abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#Zhi-qiangIK03
2003-01-30
Hardware-Accelerated Rendering of Antialiased Shadows with Shadow Maps.
209-214
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070209abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#BrabecS01
2002-01-03
A Hybrid, Hierarchical Data Structure for Real-Time Terrain Visualization.
85-92
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850085abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#BaumannDHK99
2003-09-23
Ridges and Ravines on Implicit Surfaces.
530-535
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450530abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#BelyaevPK98
2003-09-23
Visualizing 3-D Geographical Data with VRML.
108-110
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450108abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Shan98
2003-01-30
Using A-Buffer in Radiosity.
193-200
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070193abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#WangTLTH01
2003-09-23
Computing the Constrained Euclidean Geodesic and Link Center of a Simple Polygon with Application.
102-110
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180102abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#BoseT96
2003-08-27
Interactive Transfer Function Modification For Volume Rendering Using Compressed Sample Runs.
8-13
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460008abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#SrivastavaCM03
2003-09-23
Memory Management Schemes for Radiosity Computation in Complex Environments.
706-714
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450706abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#MeneveauxBM98
2003-09-23
On Optimality of OBBs for Visibility Tests for Frustum Culling, Ray Shooting and Collision Detection.
256-263
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450256abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#IonesZK98
2003-08-27
VHD++ Development Framework: Towards Extendible, Component Based VR/AR Simulation Engine Featuring Advanced Virtual Character Technologies.
96-104
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460096abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#PonderPMMT03
2003-08-27
Rendering Artistic and Believable Trees for Cartoon Animation.
144-151
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460144abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#FioreHR03
2003-09-23
Deformable Surfaces for Feature Based Indirect Volume Rendering.
752-760
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450752abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#LurigKE98
2003-01-30
What Do You Think You're Doing? Measuring Perception in Fish Tank Virtual Reality.
325-328
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070325abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#TreadgoldNWN01
2003-09-23
Generalized Geometric Cubic Splines.
220-229
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180220abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#Sarfraz96
2003-09-23
Rational Spline Interpolation Preserving the Shape of the Monotonic Data.
238-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250238abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Sarfraz97
2003-01-30
Towards Real Time Virtual Human Life Simulations.
31-37
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070031abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#SevinKT01
2003-08-27
An Efficient Mesh Simplification Method with Feature Detection for Unstructured Meshes and Web Graphics.
34-43
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460034abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#ChenN03
2002-01-03
Interactive Specification of 3D Displacement Vectors using Arcball.
70-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850070abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#PinheiroGV99
2003-09-23
Design of Anisotropic Functions within Spatial Analysis of Data.
726-729
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450726abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#MolinaF98
2003-09-23
Improved Specular Highlights With Adaptive Shading.
38-46
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180038abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#ChoNW96
2003-09-23
Evaluation Of Surfaces For Automobile Body Styling.
202-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180202abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#ChoiL96
2003-08-27
Interpolatory Subdivision Curves via Diffusion of Normals.
22-27
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460022abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#OhtakeBS03
2003-09-23
Controlling Object Natural Behaviors with a 3D Declarative Modeler.
248-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450248abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#KwaiterGC98
2002-01-03
Dynamic 3D Maps and Their Texture-Based Design.
325-334
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430325abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#DollnerH00
2003-09-23
Interactive, Animated 3D Widgets.
278-286
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450278abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#DollnerH98
2003-09-23
The Visorama System: A Functional Overview of a New Virtual Reality Environment.
205-212
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250205abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#MatosVGPS97
2003-09-23
CVP: Recognizable and Hierarchical 3D Overviews of the WWW by Persistence Directory Placement.
404-410
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450404abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#AdlerHMS98
2005-05-23
The Analysis and Reconstruction of Repetitive Textures.
273-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450273abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Handley98
2003-09-23
Integration of Basic CAD Functions into a VR Environment.
238-241
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450238abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Rabatje98
2006-01-23
Visualizing Knowledge about Virtual Reconstructions of Ancient Architecture.
36-43
1999
Computer Graphics International
http://doi.ieeecomputersociety.org/10.1109/CGI.1999.777901
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#StrothotteMI99
2003-09-23
VE platform: A Base System for Distributed Virtual Reality.
568-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450568abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#DemuynckBA98
2002-01-03
Homotopical Modeling as the Basis of New CAD Standard Homotopy CAD for Collaboration Engineering.
231-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850231abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#HagiwaraN99
2003-01-30
Robust Invisible Watermarking of Volume Data Using the 3D DCT.
359-362
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070359abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#WuGKH01
2003-01-30
An Intelligent System for Integrating Semantic and Iconic Features for Image Retrieval.
240-248
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070240abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#TangHICL01
2003-09-23
3D Visualization and Exploration of Remote Sensing Data.
455-465
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450455abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#SchulzeGT98
2003-09-23
Geodesic Voronoi Diagrams on Parametric Surfaces.
230-237
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250230abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#KunzeWR97
2003-01-30
Javra: A Simple, Extensible Java Package for VRML.
333-336
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070333abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#Wetering01
2003-08-27
Textile and Tile Pattern Design Automatic Cataloguing Using Detection of the Plane Symmetry Group.
112-119
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460112abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#ValorAGC03
2003-09-23
Hierarchical Meshes for Volume Data.
761-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450761abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#GrossoG98
2003-01-30
Cartoon Image Vectorization Based on Shape Subdivision.
225-231
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070225abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ZouY01
2003-09-23
Geometric- and Parametric-Tolerance Constraints in Variational Design of Multiresolution Curves and Surfaces.
688-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450688abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Takahashi98
2005-05-27
A Hashing Strategy for Efficient k-Nearest Neighbors Computation.
120-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850120abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#VancoBS99
2003-09-23
The Styria Flyover - LoD Management for Huge Textured Terrain Models.
444-454
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450444abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#KoflerGG98
2003-09-23
Efficient Parallel Recursive Voxelization for SGI Challenge Multi-Processor System.
66-72
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450066abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#StolteK98
2003-09-23
Invited Lecture: Virtual Humans in CyberDance.
142-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450142abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#CarionSM98
2003-09-23
Visualization of Geographic Data using VRML - An Internet Client for a Geographic Information System (GIS).
111-112
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450111abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#StuweLD98
2003-01-30
Ray Tracing Surfaces of Revolution: An Old Problem with A New Perspective.
215-224
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070215abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#BaciuJL01
2002-01-03
Homological Invariants and HolorGraphic Representations of Topological Structures in Cellular Spaces.
89-98
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430089abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#BaciuK00
2003-09-23
Special Lecture: Computer Visualization for the Topology of Integrable Cases in Rigid Body Dynamics.
490-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450490abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Fomenko98
2003-08-27
Visualization of Musical Pitch.
300-305
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460300abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#McLeodW03
2003-09-23
A Data Dependent Triangulation for Vector Fields.
96-102
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450096abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#ScheuermannH98
2003-09-23
Modelling by a Rational Spline with Interval Shape Control.
730-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450730abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#SarfrazAAR98
2003-09-23
Handling Interactions Between Real And Virtual Worlds.
74-83
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180074abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#Chevrier96
2003-09-23
Fast Approximate Quantitative Visibility for Complex Scenes.
220-227
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450220abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#ChrysanthouCL98
2005-05-30
VISJET - A Computer Ocean Outfall Modeling System.
75-80
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430075abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#CheungLWLC00
2003-09-16
Flexible Materials in AvangoTM Virtual Environment Framework.
84-89
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460084abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#NikitinaNK03
2004-12-21
Ocean Waves Synthesis using a Spectrum-Based Turbulence Function.
65-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430065abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#ThonDG00
2003-01-30
Visual Simulation of Lightning Taking into Account Cloud Growth.
89-98
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070089abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#SosorbaramFMC01
2003-09-23
Illumination Analysis for Synthetic/Natural Hybrid Image Sequence Generation.
506-511
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450506abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Stauder98
2004-07-16
2004 Computer Graphics International (CGI 2004), 16-19 June 2004, Crete, Greece
Computer Graphics International
2004
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html
2003-09-23
Visualization of Meteorological Data using an Interactive Flight.
402-403
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450402abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#KonigLD98
2003-09-23
Illumination Dependent Refinement of Multiresolution Meshes.
680-687
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450680abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#SchillingKS98
2003-08-27
Diorama Engine - A 3D Directing Tool for 3D Computer Animation Production.
318-323
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460318abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#MikamiT03
2002-01-03
Neural Network-based Violinist's Hand Animation.
37-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430037abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#KimCM00
2003-08-27
Modeling Rocky Scenery Taking into Account Joints.
244-247
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460244abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#ItoFMC03
2006-01-03
An Automatic Description of Volumetric Objects using Metaballs.
65-73
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250065abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#KimKP97
2002-01-03
SQUEEZE: Fast and Progressive Decompression of Triangle Meshes.
173-182
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430173abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#PajarolaR00
2003-09-23
Tailor Made Dynamic Programming for Edge Matching.
700-705
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450700abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#TeferaH98
2004-02-20
Controlling Fluid Animation.
178-188
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250178abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#FosterM97
2002-01-03
A Homotopy Model for Cup Lifting.
117-126
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430117abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#OhmoriK00
2005-03-17
Orientation Lightmaps for Photon Tracing in Complex Environments.
279-286
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430279abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#WilkieTP00
2003-08-27
1/f\beta Noise-Based Real-Time Animation of Trees Swaying in Wind Fields.
52-59
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460052abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#OtaFTMFC03
2002-01-03
Social and Industrial Impacts of Homotopy Modeling.
142-155
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850142abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#AkiyoshiA99
2002-01-03
Implementing Fast Cloth Simulation with Collision Response.
257-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430257abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#VolinoM00
2003-01-30
Comparing Efficiency of Integration Methods for Cloth Simulation.
265-274
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070265abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#VolinoM01
2003-09-23
Simplicial Sets and Triangular Patches.
154-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180154abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#LangL96
2003-09-23
Incremental Techniques for Implicit Surface Modeling.
312-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450312abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#GalinA98
2003-10-24
Haptics Issues in Virtual Environments.
295-302
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430295abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#Burdea00
2003-09-23
Uncertainty Coding and Controlled Data Reduction using Fuzzy-B-Splines.
536-542
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450536abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#GalloS98
2003-09-23
Classifications of Curve-Curve Intersections from the CAD/CAM Viewpoin.
230-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180230abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#Rohmfeld96
2003-08-27
Generation of Varying Line Thickness.
294-299
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460294abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#SaitoKCN03
2003-01-30
Hierarchical Implicit Surface Refinement.
291-298
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070291abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#LiangW01
2003-01-30
Applying Functional Networks to Fit Data Points from B-Spline Surfaces.
329-332
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070329abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#IglesiasG01
2003-09-23
Volume Modelling: Representations and Advanced Operations.
4-13
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450004abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#SavchenkoPSK98
2002-01-03
To Gesture or Not to Gesture: What is the Question?
3-10
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430003abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#BadlerCZC00
2003-09-23
Random Walk Radiosity with Generalized Absorption Probabilities.
658-665
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450658abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Sbert98
2003-09-23
Floating Ring: A New Tool for Visualizing Distortion in Map Projections.
466-481
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450466abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#BrainerdP98
2002-01-03
Hair Rendering by Jittering and Pseudo Shadow.
287-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430287abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#KongN00
2002-01-03
Crack Pattern Simulation Based on 3D Surface Cellular Automaton.
153-162
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430153abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#GobronC00
2002-01-03
Monotonic Cubic Spline Interpolation.
188-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850188abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#WolbergA99
2003-01-30
Polygonizing Non-Uniformly Distributed 3D Points by Advancing Mesh Frontiers.
175-182
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070175abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#AtmosukartoZLH01
2003-09-23
An Object-Oriented Approach to Model Scenes of Buildings.
14-23
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450014abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#MattheyB98
2004-02-11
Modeling Murex cabritii Sea Shell with a Structured Implicit Surface Modeler.
55-64
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430055abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#GalbraithPW00
2003-09-23
Autonomous Animated Interactive Characters: Do We Need Them?.
29-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250029abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Blumberg97
2003-08-27
A Method of Rendering Scenes Including Volumetric Objects Using Ray-Volume Buffers - Expanding to Render Scenes Including Overlapped Volumetric Object.
230-235
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460230abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#KajiharaTN03
2002-01-03
Behavior-Friendly Graphics.
44-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850044abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#RussellB99
2002-01-03
Visual Simulation of Texture/Non-Texture Image Synthesis.
343-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430343abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#KaramHN00
2003-09-23
Improved Triangular Subdivision Schemes.
626-632
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450626abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#PrautzschU98
2003-09-23
Image Retrieval in Digital Library Based on Symmetry Detection.
366-372
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450366abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#CheungI98
2003-09-23
Representing and Rendering Sweep Objects using Volume Models.
22-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250022abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Sealy97
2003-09-23
Model-Based View-Extrapolation for Interactive VR Web-Systems.
104-112
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250104abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Cohen-Or97
2003-10-07
Object and Ray Coherence in the Optimization of the Ray Tracing Algorithm.
264-267
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450264abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#LopezC98
2003-09-24
A User-Friendly Texture-Fitting Methodology for Virtual Humans.
167-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250167abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#SannierM97
2003-08-27
Real-time Visualization of Japanese Artcraft.
184-189
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460184abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#DurikovicKK03
2003-01-30
A New Approach of Point-Based Rendering.
275-284
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070275abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#PengHY01
2003-08-27
An Educational Tool for Basic Techniques in Beginner's Pencil Drawing.
288-293
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460288abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#TakagiMSTSY03
2002-01-03
LaTex Human Motion Planning Based on Recursive Dynamics and Optimal Control Techniques.
19-28
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430019abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#HuangML00
2003-09-23
Sculpting and Animating in a Desktop VR Environment.
187-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450187abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#NobleC98
2003-01-30
Dynamic Refinement of Deformable Triangle Meshes for Rendering.
285-290
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070285abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#KahlerHS01
2003-09-23
Fast Realistic Human Body Deformations for Animation and VR Applications.
166-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180166abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#ThalmannSC96
2003-01-30
Region Matching and Optimal Matching Pair Theorem.
232-239
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070232abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ZengY01
2003-01-30
A Marching Voxels Method for Surface Rendering of Volume Data.
306-316
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070306abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#LinYC01
2003-09-23
Determining Visibility between Extended Objects.
23-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450023abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#HinkenjannM98
2003-09-23
Using Scattered Data Interpolation for Radiosity Reconstruction.
715-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450715abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#HinkenjannP98
2003-09-23
Digital Robbery; Authors are not Unprotected.
558-563
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450558abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#GarofalakisKS98
2003-08-27
Automatic Tracking of Face Sequences in MPEG Video.
170-175
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460170abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#ZhaoC03
2003-09-23
Conceptual Visual Human Algorithms: A Requirement-Driven Skiing Algorithm Design.
2-8
1996
Computer Graphics International
http://csdl.computer.org/dl/proceedings/cgi/1996/7518/00/75180002.pdf
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#Kunii96
2002-01-03
Homotopy Modeling as World Modeling.
130-141
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850130abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#Kunii99
2002-01-03
Object Reconstruction from Slices for Vision.
58-64
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850058abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#ParkerA99
2002-01-03
Interactive Human Motion Acquisition from Video Sequences.
209-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430209abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#ZhengSS00
2003-09-23
Rational Quadratic Bézier Triangles on Quadrics.
34-40
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450034abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Albrecht98
2002-01-03
The Challenges of Digital Media: Research Issues and Future Directions.
195-200
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430195abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#Earnshaw00
2003-09-23
An Anti-Aliasing Method for Parallel Rendering.
228-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450228abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#LinLLC98
2003-09-23
Special Lecture: 3D Modeling for Communications.
482-489
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450482abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#GoolDKPPV98
2003-01-30
Animating the Escape Response of the Sea Anemone, Stomphia Coccinea from the Starfish, Dermasterias imbricata Modeled Using Implicit Surfaces.
81-88
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070081abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#NurLWB01
2006-07-25
Reaching Volumes Generated by Means of Octal Trees and Cartesian Constraints.
324-330
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460324abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#RodriguezPBM03
2002-01-03
Building Worlds in Cyberspace.
164-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850164abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#Musgrave99
2003-08-27
Modeling lobed leaves.
60-67
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460060abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#MundermannMPP03
2003-01-30
A Monte Carlo Method for Accelerating the Computation of Animated Radiosity Sequences.
201-208
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070201abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#BesuievskyP01
2003-09-23
Internet Business Opportunities.
138-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250138abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Machover97
2004-01-12
Using GIS to Visualize Environmental Information - A Case Study Based on Digital Terrain Models.
123-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450123abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#ClematisM98
2002-01-03
Visualization of Dominant Region in Team Games and Its Application to Teamwork Analysis.
227-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430227abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#TakiH00
2002-01-03
Rendering Optimal Solar Shadows using Plural Sunlight Depth Buffers.
166-173
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850166abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#TadamuraQJN99
2003-09-23
Performing 3D Scene and Animation Authoring Tasks Efficiently: An Innovative Approach.
242-244
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450242abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#ElcachoSDL98
2003-08-27
Compressing Texture Coordinates with Selective Linear Predictions.
126-133
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460126abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#IsenburgS03
2003-09-23
Shedding Light on Shadow.
90-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180090abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#HsiehW96
2003-09-23
Computer Modeling For The Occlusal Surface Of Teeth.
191-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180191abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#MyszkowskiSK96
2002-01-03
Molecular Dynamics Visualization with XML and VRML.
335-342
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430335abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#ArunCGM00
2003-10-10
Visualization of Biomedical Processes: Local Quantitative Physiological Functions in Living Human Body.
319-324
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430319abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#FengC00
2003-09-23
Graph-Based Surface Reconstruction Using Structures in Scattered Point Sets.
298-311
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450298abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#MenclM98
2003-09-23
Integration Techniques for 3D Surface Reconstruction.
575-577
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450575abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#ThieleK98
2003-01-30
Principal Components of Expressive Speech Animation.
38-46
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070038abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#KshirsagarMM01
2003-09-23
A Cached Frame Buffer System for Object-Space parallel Processing System.
146-155
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250146abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Kobayashi97
2004-12-21
Automatic Creation of Flexible Antropomorphic Models for 3D Video-Conferencing.
520-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450520abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#WeikWN98
2003-09-23
Virtual Worlds - A Virtual Environment Architecture.
287-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450287abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#OliveiraP98
2003-08-27
Natural Human Animation via Learning with Dynamic Manipulability.
272-275
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460272abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#MukaiKK03
2003-09-23
Interactive Navigation through Glial Cells.
73-77
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450073abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#MeyerHLD98
2003-08-27
Consistent Visualization and Querying of GIS Databases by a Location-Aware Mobile Agent.
248-253
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460248abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#LodhaFWK03
2003-09-23
An Adaptable Modular Software Architecture for Distant Control of Virtual Actors.
245-247
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450245abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#PieskHOT98
2003-09-23
Varying Neighborhood Parameters for the Computation of Normals on Surfaces in Discrete Space.
616-625
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450616abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#ThurmerW98
2003-10-08
Fast Depth of Field Rendering with Surface Splatting.
196-201
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460196abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#KrivanekZB03
2002-08-04
Enabling Cuts on Multiresolution Representation.
183-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430183abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#GanovelliCMS00
2003-01-30
Multiple Conceptions of Character-Based Interactive Installations.
5-14
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070005abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#BlumbergTD01
2003-08-27
Camera Self-Calibration Using the Geometric Structure in Real Scenes.
262-265
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460262abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#LiuSZJ03
2003-01-30
Web-Based Image Retrieval: A Hybrid Approach.
62-72
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070062abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ZhuangLL01
2003-09-23
Synthesis of Facial Expressions for Semantic Coding of Videophone Sequences.
512-519
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450512abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#KampmannN98
2002-01-03
Homotopy and Intellectual Property.
156-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850156abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#MorishitaH99
2003-01-30
Implementation of Object Attachments by Cellular Modeling.
159-166
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070159abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#HisadaK01
2003-09-23
Integrated Registration and Visualization of Medical Image Data.
78-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450078abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#HastreiterE98
2003-09-23
Hierarchical Visibility Culling with Occlusion Trees.
207-219
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450207abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#BittnerHS98
2003-08-27
Hardware Assisted Multichannel Volume Rendering.
2-7
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460002abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#GhoshPKM03
2003-09-23
Sketching Shadows and Highlights to Position Lights.
56-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250056abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#PoulinRJ97
2002-01-03
Visualization of Eclipses and Planetary Conjunction Events: The Interplay between Model Coherence, Scaling and Animation.
81-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430081abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#OberschelpHS00
2003-08-27
Real Time Detection Interface For Walking on CAVE.
105-111
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460105abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#BarreraRSTN03
2003-08-27
Clinical Application of Augmented Reality in Neurosurgical Field.
44-51
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460044abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#IsekiHMHNT03
2003-09-23
The Virtual Display Case.
200-204
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250200abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Wyvill97
2003-09-23
Polyhedral approximation and First Order Segmentation of Unstructured Point Sets.
433-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450433abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#IsselhardBS98
2003-08-27
Cut-and-Paste Editing Based on Constrained B-spline Volume Fitting.
222-225
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460222abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#FurukawaMMY03
2003-08-27
A Production Method of Reusing Existing 2D Animation Sequences .
282-287
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460282abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#SumiN03
2002-01-03
Reconstruction of B-spline Surfaces from Scattered Data Points.
163-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430163abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#GregorskiHJ00
2003-09-23
Automatic 3D Model Acquisition from Uncalibrated Image Sequences.
597-604
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450597abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#KochPG98
2003-08-27
Sphairahedral Approach to Parameterize Visible Three Dimensional Quasi-Fuchsian Fractals.
226-229
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460226abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#AharaA03
2003-09-23
Sensor Based Synthetic Actors in a Tennis Game Simulation.
189-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250189abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#NoserT97
2003-09-23
Using Kinematic Clones to Control the Dynamic Simulation of Articulated Figures.
26-37
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180026abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#WestenhoferH96
2002-01-03
A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces.
180-187
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850180abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#OhbuchiMA99
2003-08-27
Image Restoration using Multiresolution Texture Synthesis and Image Inpainting.
120-125
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460120abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#YamauchiHS03
2002-01-03
Modeling Plants and Plant Ecosystems: Recent Results and Current Open Problems.
110-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850110abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#Prusinkiewicz99
2003-09-23
A Hybrid 2D / 3D User Interface for Immersive Object Modeling.
47-55
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250047abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#ConinxRF97
2003-09-23
Geometric Computation Based on an Adaptive Data Length Computation Processor.
122-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180122abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#NiizekiYKY96
2003-01-30
3D Animated Movie Actor Training Using Fuzzy Logic.
23-30
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070023abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#KarunaratneY01
2004-01-06
Time-Dependent Parametric Surface Models of the Human Heart.
174-179
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850174abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#BloorWKKH99
2003-01-30
Volumes of Expression: Artistic Modelling and Rendering of Volume Datasets.
99-106
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070099abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#TreavettCSJ01
2002-01-03
Active Storytelling.
2-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850002abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#Glassner99
2002-01-03
Head Detection and Tracking by 2-D and 3-D Ellipsoid Fitting.
221-226
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430221abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#GrammalidisS00
2003-08-27
Virtualizing Real-World Objects.
134-143
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460134abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#LenschKGLS03
2003-01-30
Efficient 3D Image Warping for Composing Novel Views.
123-130
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070123abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ZhengW01
2002-01-03
From Synthesis to Analysis: Fitting Human Animation Models to Image Data.
4-11
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850004abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#FuaPT99
2003-08-27
A Framework for Transfer Colors Based on the Basic Color Categories.
176-183
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460176abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#ChangSN03
2002-01-03
Efficient Occlusion Culling for Z-Buffer Systems.
78-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850078abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#Greene99
2006-04-26
The Digital Ocean.
45-54
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430045abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#PatrikalakisABCMRSW00
2003-09-23
Visibility as an Intrinsic Property of Geometric Models.
198-206
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450198abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Bar-LevE98
2002-01-03
Interactive 3D Landscape Visualization: Improved Realism through use of Remote Sensing Data and Geoinformation.
101-
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850101abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#HirtzHN99
2003-08-27
Extraction of Motion Individuality in Sports and its Application to Motion of Characters with Different Figures.
306-311
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460306abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#KawasakiKK03
2003-01-30
Paint By Relaxation.
47-54
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070047abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#Hertzmann01
2003-09-23
A Method for Filling n-Sided Holes in a Surface.
578-582
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450578abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#SavvaC98
2003-08-27
Visualization of Distributed Processes Using "Data Jewelry Box" Algorithm.
162-169
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460162abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#YamaguchiI03
2002-01-03
VPARK - A Windows NT Software Platform for a Virtual Networked Amusement Park.
309-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430309abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#SeoJBMJETP00
2003-09-23
Distortion Correction of Magnetic Fields for Position Tracking.
213-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250213abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#Zachmann97
2004-03-17
Virtual clothes, Hair and Skin for Beautiful Top Models.
132-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180132abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#Magnenat-ThalmannCCVW96
2003-08-27
A Real-Time Refraction Renderer for Volume Objects Using a Polygon-Rendering Scheme.
190-195
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460190abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#Ohbuchi03
2005-03-15
Integrating Molecular Modeling Tools and Virtual Reality Engines: An Architecture for a Highly Immersive Molecular Modeling (HIMM) Environment.
391-392
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450391abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#DreesPSR98
2003-09-23
Invited Lecture: A Shape Abstraction Paradigm for Modeling Geometry and Semantics.
646-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450646abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#FalcidienoS98
2003-08-27
Interactive Editing of Arbitrary Sub-meshes.
218-221
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460218abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#SilvaG03
2003-09-23
An Architecture of a Universal DBMS for Graphics Applications.
373-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450373abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#CollisonB98
2003-09-23
WebVizard: Intelligent System for Geodata Visualization and CBT in the WWW.
113-122
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450113abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#Gobel98
2003-09-23
Real Time Simulation and Visualization of NC Milling Processes for Inhomogeneous Materials on Low-End Graphics Hardware.
338-349
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450338abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#KonigG98
2003-09-23
Recent Advances in Image Morphing.
64-
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180064abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#Wolberg96
2002-01-03
Islamic Symmetric Pattern Generation based on Group Theory.
112-119
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850112abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#KaramN99
2002-01-03
X_Machines + L_Systems = XL_Systems.
127-
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430127abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#Vanak00
2002-01-03
Using an Enhanced LBG Algorithm to Reduce the Codebook Error in Vector Quantization.
99-104
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430099abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#HaberS00
2003-08-27
Immersive Vehicle Simulators for Prototyping, Training and Ergonomics.
90-95
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460090abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#KallmannLTCMRQ03
2003-09-23
Virtual Reality - New Methods for Improving and Accelerating the Development Process in Vehicle Styling and Design.
789-
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450789abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#PurschkeSZ98
2002-01-03
Edge Extraction for Adaptive Mesh Construction.
198-205
1999
Computer Graphics International
http://computer.org/proceedings/cgi/0185/01850198abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1999.html#MiyazakiH99
2003-09-23
Three Major Extensions to Kirkpatrick's Point Location Algorithm.
112-121
1996
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1996/7518/00/75180112abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1996.html#TalibCT96
2003-01-30
A Motion Prediction Method for Mouse-Based Navigation.
139-148
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070139abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#ChanLS01
2003-09-23
DOOViE: An Architecture for Networked Virtual Environment Systems.
113-
1997
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1997/7825/00/78250113abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1997.html#AhnLL97
2003-01-30
An Inverse Kinematics Method Based on Muscle Dynamics.
15-22
2001
Computer Graphics International
http://computer.org/proceedings/cgi/1007/10070015abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2001.html#KomuraSK01
2003-09-23
Adaptive Subdivision Curves and Surfaces.
48-58
1998
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/1998/8445/00/84450048abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi1998.html#MullerJ98
2002-01-03
Fast and Stable Animation of Cloth with an Approximated Implicit Method.
247-256
2000
Computer Graphics International
http://computer.org/proceedings/cgi/0643/06430247abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2000.html#KangCCP00
2003-08-27
Using Virtual Reality to bring Singaporean Heritage to Life.
240-243
2003
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2003/1946/00/19460240abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2003.html#SongEMC03
2004-07-16
The Experience of the Empty Museum. Displaying Cultural Contents on an Immersive, Walkable VR Room.
436-443
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710436abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#HernandezTSLL04
2004-10-07
Generic Path Planning for Real-Time Applications.
299-306
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710299abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#NiederbergerRG04
2004-07-16
Extracting 3D Stylized Accentuation Effects from a Painted Image.
222-229
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710222abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SatoDYTA04
2004-07-16
Digital Watermarking of Three-Dimensional Polygonal Models in the Spherical Coordinate System.
590-593
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710590abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#AshourianEJ04
2004-07-16
A Hybrid LOD Based Rendering Approach for Dynamic Scenes.
274-277
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710274abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#HilbertB04
2004-07-16
Bounding Volumes for Linearly Interpolated Shapes.
134-139
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710134abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KlugA04
2005-05-09
Curvature Tensor Based Triangle Mesh Segmentation with Boundary Rectification.
10-17
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710010abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GuillaumeFA04
2004-07-16
Real-Time Watercolor Painting on a Distributed Paper Model.
640-643
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710640abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LaerhovenLR04
2004-07-16
Hair Paint.
578-581
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710578abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#HernandezR04
2004-07-16
CSG Operations with Voxelized Solids.
370-373
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710370abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#NovotnyDS04
2004-07-16
Consistent Normal Orientation for Polygonal Meshes.
18-25
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710018abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#BorodinZK04
2004-07-16
Comparing CAVE, Wall, and Desktop Displays for Navigation and Wayfinding in Complex 3D Models.
420-427
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710420abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SwindellsPHCDFB04
2004-07-16
Tiled Shadow Maps.
240-247
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710240abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#Arvo04
2004-07-16
Deformable Object Model Matching by Topological and Geometric Similarity.
335-342
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710335abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#TamLN04
2004-07-16
An Efficient Central Path Algorithm for Virtual Navigation.
188-195
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710188abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#ChaudhuriKSK04
2004-12-21
Surface Denoising Using a Tight Frame.
553-560
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710553abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KakadiarisSPKKH04
2004-07-16
Physically Based Simulation of Cracks on Drying 3D Solids.
357-364
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710357abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#AokiDKK04
2004-07-16
Adaptive Strip Compression for Panorama Video Streaming.
470-475
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710470abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KimJJ04
2004-07-16
Participant Activity Detection by Hands and Face Movement Tracking in the Meeting Room.
632-635
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710632abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#PotucekS04
2004-07-16
Simplification of Vector Fields over Tetrahedral Meshes.
174-181
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710174abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#PlatisT04
2004-07-16
Vision-Based Camera Motion Recovery for Augmented Reality.
569-576
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710569abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LourakisA04
2005-09-16
Visualizing Sunsets through Inhomogeneous Atmospheres.
349-356
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710349abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SeronGGC04
2004-07-16
Extracting Measurements from Existing Photographs of Ancient Pottery.
614-617
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710614abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#WyvillA04
2004-07-16
Automatic Techniques for Texture Mapping in Virtual Urban Environments.
586-589
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710586abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LaycockD04a
2004-07-16
Mixing Deformable and Rigid-Body Mechanics Simulation.
327-334
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710327abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LenoirF04
2004-07-16
Ontology Based Interactive Graphic Environment for Product Presentation.
644-647
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710644abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#TsampoulatidisNTS04
2004-09-03
Fairing of Point Based Surfaces.
600-603
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710600abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#ClarenzRT04
2004-07-16
Modelling and Animating Cartoon Hair with NURBS Surfaces.
60-67
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710060abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#NobleT04
2004-09-09
Range Image Registration via Probability Field.
546-552
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710546abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#ZhangHK04
2004-07-16
Multi-Path Algorithm for Triangle Strips.
2-9
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710002abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#VanecekK04
2004-07-16
Real-Time Dynamic Wrinkles.
522-525
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710522abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LarbouletteC04
2004-12-14
Efficient Hardware for Antialiasing Coverage Mask Generation.
257-264
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710257abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#CrisuCVL04
2004-07-16
Interactive Rendering with LOD Control and Occlusion Culling Based on Polygon Hierarchies.
536-539
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710536abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#TsujiZKH04
2004-07-16
Determining Collisions between Moving Spheres for Distributed Virtual Environments.
140-147
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710140abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#StoreyLM04
2004-07-16
Spatio-Temporal Photon Density Estimation Using Bilateral Filtering.
120-127
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710120abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#WeberMMDRS04
2004-07-16
Point Based Rendering for Massive Data Sets: A Case Study.
182-187
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710182abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MantlerF04
2004-09-21
Reuse of Paths in Light Source Animation.
532-535
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710532abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SbertCH04
2004-07-16
A New Line Clipping Algorithm with Hardware Acceleration.
270-273
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710270abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#Skala04
2005-02-21
Exploring Collaboration with Group Pointer Interaction.
636-639
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710636abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#VogtWPAFB04
2004-07-16
Fast and High Quality Overlap Repair for Patch-Based Texture Synthesis.
582-585
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710582abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#NealenA04
2004-07-16
Motion Blending for Real-Time Animation while Accounting for the Environment.
156-159
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710156abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MenardaisMKA04
2004-07-16
Stabilizing Explicit Methods in Spring-Mass Simulation.
528-531
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710528abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#Shinya04
2004-07-16
Creating Mixed Reality Content: Problems, Concepts and Solutions.
444-451
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710444abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#AbawiD04
2004-07-16
PCA-Based Walking Engine Using Motion Capture Data.
292-298
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710292abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GlardonBT04
2004-07-16
Building Personal Digital Photograph Libraries: An Approach with Ontology-Based MPEG-7 Dozen Dimensional Digital Content Architecture.
482-489
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710482abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KuoAY04
2004-07-16
Iconographical Virtual Polyhedrons for Constructing Graphical User Interface.
497-504
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710497abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GuoKH04
2004-07-16
Reconstruction Techniques in the Image Analysis of Islamic Mosaics from the Alhambra.
618-621
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710618abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GilGV04
2004-07-16
Point Set Surface Editing Techniques Based on Level-Sets.
52-59
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710052abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GuoHQ04
2004-07-16
Multidimensional Data Visualization for Decay Study in Cultural Heritage: An Object-Oriented Implementation.
505-508
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710505abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#ChiappiniCL04
2004-07-16
Geometry Image Matching for Similarity Estimation of 3D Shape.
490-496
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710490abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LagaTN04
2004-08-25
Three-Dimensional Whole Body of Virtual Character Animation for its Behavior in a Virtual Environment Using H-Anim and Inverse Kinematics.
307-310
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710307abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#OrtizOAP04
2004-07-16
BlobTree Trees.
78-85
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710078abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GalbraithMW04
2005-02-09
Combining Sampling and Autoregression for Motion Synthesis.
510-513
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710510abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#OziemCDGT04
2004-07-16
Real-Time Rendering of Human Hair Using Programmable Graphics Hardware.
248-256
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710248abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KosterHS04
2004-07-16
Composing 6 DOF Tracking Systems for VR/AR.
411-418
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710411abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SchwaldSS04
2004-07-16
Maintaining Constant Frame Rates in 3D Texture-Based Volume Rendering.
604-607
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710604abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#WeiskopfWE04
2004-07-16
Probabilistic Motion Sequence Generation.
514-517
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710514abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SattlerSK04
2004-07-16
Flat3D: A Shared Virtual 3D World Grown by Creative Activities and Communication through the Network.
476-479
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710476abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#TobitaR04
2004-07-16
Memory Efficient Adjacent Triangle Connectivity of a Vertex Using Triangle Strips.
278-281
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710278abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#AnnakaM04
2004-07-16
Face Recognition Using Computer-Generated Database.
561-568
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710561abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LeeS04
2004-07-16
P-Quadtrees: A Point and Polygon Hybrid Multi-Resolution Rendering Approach.
382-385
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710382abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#JiLLW04
2004-07-16
Physically-Based Simulation of Objects Represented by Surface Meshes.
26-33
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710026abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MullerTG04
2004-09-21
A Hybrid Collision Detection Approach for the Haptic Rendering of Deformable Tools.
148-155
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710148abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#LaycockD04
2005-10-31
ARCO - An Architecture for Digitization, Management and Presentation of Virtual Exhibitions.
622-625
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710622abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#WhiteMDPLLWWCCSWPSMGSG04
2004-07-16
Exploiting Temporal Coherence in Final Gathering for Dynamic Scenes.
110-119
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710110abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#TawaraMS04
2004-07-16
Fast Environmental Lighting for Local-PCA Encoded BTFs.
198-205
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710198abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MullerMK04
2004-11-30
Lighting Design in Low-Cost Immersive Systems.
266-269
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710266abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MagallonSSG04
2004-07-16
Computer Aided Design for Origamic Architecture Models with Polygonal Representation.
93-99
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710093abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MitaniS04
2004-07-16
Visual-Fidelity? Dataglove Calibration.
403-410
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710403abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KahleszZK04
2004-07-16
Hands-Free Navigation Methods for Moving through a Virtual Landscape Walking Interface Virtual Reality Input Devices.
388-394
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710388abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#BarreraTN04
2004-07-16
Sketch Interface Based Expressive Hairstyle Modelling and Rendering.
608-611
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710608abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MaoKIA04
2004-07-16
Application of Virtual Showcase Technologies in Real Scenarios: The Case of San Telmo Museum.
428-435
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710428abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#MaciaSCLMS04
2004-07-16
Flow Feature Extraction in Oceanographic Visualization.
162-173
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710162abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GuoEP04
2004-07-16
Adaptive Edge Spinning Algorithm for Poligonization of Implicit Surfaces.
36-43
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710036abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#CermakS04
2004-07-16
The Complexity of Testing a Motivational Model of Action Selection for Virtual Humans.
540-543
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710540abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SevinT04
2004-12-21
A Versatile and Robust Model for Geometrically Complex Deformable Solids.
312-319
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710312abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#TeschnerHMG04
2004-12-21
From Continuous to Discrete Games.
626-629
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710626abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GarciaMM04
2004-07-16
Real-Time Rendering of Soap Bubbles Taking into Account Light Interference.
344-348
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710344abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#IwasakiMN04
2004-07-16
Interaction with Hand Gesture for a Back-Projection Wall.
395-402
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710395abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KimF04
2004-07-16
Computing Polygonal Surfaces from Unions of Balls.
86-92
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710086abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#TamH04
2004-07-16
Animated Sweepers: Keyframed Swept Deformations.
320-326
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710320abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#AngelidisW04
2004-07-16
Adaptation-Based Individualized Face Modeling for Animation Using Displacement Map.
518-521
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710518abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#ZhangST04
2006-05-16
Efficient Hardware Voxelization.
374-377
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710374abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#PassalisKT04
2004-07-16
Adaptation Mechanism for Three Dimensional Content within the MPEG-21 Framework.
462-469
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710462abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#KimJGGM04
2004-07-16
An Adaptive Sampling Method for Layered Depth Image.
206-213
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710206abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#NambooriTH04
2004-07-16
Interactive Global Illumination for Quasi-Static Scenes.
128-131
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710128abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#GarciaULMR04
2004-07-16
A Hybrid Physics-Based Subdivision Technique Using Coupled Dynamic and Subdivision Parameters.
44-51
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710044abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#RayQ04
2004-07-16
Using Poxels for Reproducing Traditional Pierced Byzantine Jewellery.
378-381
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710378abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#StamatiFTEA04
2004-07-16
Feature-Sensitive 3D Shape Matching.
596-599
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710596abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SharfS04
2004-07-16
A Virtual Light Field Approach to Global Illumination.
102-109
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710102abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SlaterMKY04
2005-12-22
Boundary Correct Real-Time Soft Shadows.
232-239
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710232abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#JakobsenCLP04
2004-07-16
Combination of Facial Movements on a 3D Talking Head.
284-291
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710284abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#BuiHN04
2004-07-16
Surface Models of Tube Trees .
70-77
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710070abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#FelkelWB04
2004-07-16
Remote Line Rendering for Mobile Devices.
454-461
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710454abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#DiepstratenGE04
2004-07-16
Depicting Shape Features with Directional Strokes and Spotlighting.
214-221
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710214abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#SousaSB04
2004-07-16
Updating Building Layouts of Time-Varying Virtual Cities.
365-368
2004
Computer Graphics International
http://csdl.computer.org/comp/proceedings/cgi/2004/2171/00/21710365abs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2004.html#HondaMFN04
2006-10-31
Advances in Computer Graphics, 24th Computer Graphics International Conference, CGI 2006, Hangzhou, China, June 26-28, 2006, Proceedings
CGI
4035
2006
3-540-35638-X
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html
2006-10-31
Automatic Stained Glass Rendering.
682-691
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_66
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#SetlurW06
2006-10-31
MIP-Guided Vascular Image Visualization with Multi-Dimensional Transfer Function.
372-384
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_32
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ChanWQCW06
2006-10-31
Optimized Framework for Real Time Hair Simulation.
702-710
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_68
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#GuptaMVM06
2006-10-31
Providing Full Awareness to Distributed Virtual Environments Based on Peer-to-Peer Architectures.
336-347
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_29
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#MorilloMOD06
2006-10-31
Steganography for Three-Dimensional Models.
510-517
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_46
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ChengWTCW06
2006-10-31
Simulating Reactive Motions for Motion Capture Animation.
530-537
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_48
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#TangPZZ06
2006-10-31
Steganography on 3D Models Using a Spatial Subdivision Technique.
469-476
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_41
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#TsaiWCCW06
2006-10-31
Subdivision Depth Computation for Extra-Ordinary Catmull-Clark Subdivision Surface Patches.
404-416
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_35
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ChengCY06
2006-10-31
Automatic Foreground Extraction of Head Shoulder Images.
385-396
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_33
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#WangYGP06
2006-10-31
Detail-Preserving Local Editing for Point-Sampled Geometry.
673-681
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_65
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#MiaoFXLP06
2006-10-31
A Comparison of Three Techniques to Interact in Large Virtual Environments Using Haptic Devices with Limited Workspace.
288-299
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_25
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#DominjonLBR06
2006-10-31
Vision-Based Augmented Reality Visual Guidance with Keyframes.
692-701
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_67
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#GanD06
2006-10-31
Symmetric Tiling Patterns with the Extended Picard Group in Three-Dimensional Space.
486-493
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_43
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#YeML06
2006-10-31
Electric Field Force Features-Harmonic Representation for 3D Shape Similarity.
221-230
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_19
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LiuLL06
2006-10-31
Automated Face Identification Using Volume-Based Facial Models.
753-760
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_74
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#HuangMF06
2006-10-31
Dynamic Medial Axes of Planar Shapes.
460-468
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_40
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#TangL06
2006-10-31
Properties of G1 Continuity Conditions Between Two B-Spline Surfaces.
743-752
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_73
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ZhaoM06
2006-10-31
Target Shape Controlled Cloud Animation.
578-585
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_54
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LiuJW06
2006-10-31
An Approach for Embedding Regular Analytic Shapes with Subdivision Surfaces.
417-429
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_36
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#AbbasNM06
2006-10-31
Real-Time Rendering of Point Based Water Surfaces.
102-114
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_9
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#IwasakiDYN06
2006-10-31
Real-Time Shadow Volume Algorithm for Subdivision Surface Based Models.
538-545
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_49
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#TangDC06
2006-10-31
Motion Editing with the State Feedback Dynamic Model.
348-359
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_30
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ZhuWX06
2006-10-31
Compression of Complex Animated Meshes.
606-613
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_57
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#AmjounSS06
2006-10-31
GVF-Based Transfer Functions for Volume Rendering.
727-734
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_71
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#WangL06
2006-10-31
Multi-layered Stack Mosaic with Rotatable Objects.
12-23
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_2
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ParkYR06
2006-10-31
Shape Matching Based on Fully Automatic Face Detection on Triangular Meshes.
242-253
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_21
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#FunckTS06
2006-10-31
Anticipation Effect Generation for Character Animation.
639-646
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_61
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#KimCSL06
2006-10-31
An Approximate Image-Space Approach for Real-Time Rendering of Deformable Translucent Objects.
124-135
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_11
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#GongCZZP06
2006-10-31
Content-Based Human Motion Retrieval with Automatic Transition.
360-371
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_31
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#GaoMCL06
2006-10-31
Controllable Multi-phase Smoke with Lagrangian Particles.
115-123
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_10
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#RohK06
2006-10-31
Skeleton-Based Shape Deformation Using Simplex Transformations.
66-77
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_6
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#YanHM06
2006-10-31
Wang-Tiles for the Simulation and Visualization of Plant Competition.
1-11
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_1
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#AlsweisD06
2006-10-31
Matching 2D Shapes Using U Descriptors.
209-220
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_18
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#CaiSQ06
2006-10-31
Simulating Pedestrian Behavior with Potential Fields.
324-335
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_28
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#DapperSIN06
2006-10-31
A Feature-Preserving and Volume-Constrained Flow for Fairing Irregular Meshes.
197-208
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_17
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#XiaoLPF06
2006-10-31
A Novel Data Hiding Algorithm Using Normal Vectors of 3D Model.
231-241
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_20
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ChangWTC06
2006-10-31
Rendering Optical Effects Based on Spectra Representation in Complex Scenes.
719-726
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_70
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#Dong06
2006-10-31
Quasi-physical Simulation of Large-Scale Dynamic Forest Scenes.
735-742
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_72
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ZhangSTCP06
2006-10-31
A Video-Driven Approach to Continuous Human Motion Synthesis.
614-621
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_58
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#WangQWX06
2006-10-31
Trajectory-Based Grasp Interaction for Virtual Environments.
300-311
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_26
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ZhuGWY06
2006-10-31
A Visibility-Based Automatic Path Generation Method for Virtual Colonoscopy.
452-459
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_39
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LeeKS06
2006-10-31
Real-Time Simulation of Dynamic Mirage Scenes.
647-654
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_62
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#WangWZJP06
2006-10-31
Research on User-Centered Design and Recognition Pen Gestures.
312-323
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_27
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#TianCWD06
2006-10-31
Visualization of Whole Genome Alignment with LOD Representation.
502-509
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_45
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#JinC06
2006-10-31
Manifold Parameterization.
160-171
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_14
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ZhangLJW06
2006-10-31
Human Animation from 2D Correspondence Based on Motion Trend Prediction.
546-553
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_50
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ZhangL06
2006-10-31
Adaptive Point-Cloud Surface Interpretation.
430-441
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_37
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#MengLH06
2006-10-31
Feature Sensitive Out-of-Core Chartification of Large Polygonal Meshes.
518-529
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_47
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ChoeAL06
2006-10-31
Fuzziness Driven Adaptive Sampling for Monte Carlo Global Illuminated Rendering.
148-159
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_13
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#XuSPWX06
2006-10-31
Spline Thin-Shell Simulation of Manifold Surfaces.
570-577
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_53
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#WangHGQ06
2006-10-31
Plausible Locomotion for Bipedal Creatures Using Motion Warping and Inverse Kinematics.
586-593
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_55
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#NicolasMBM06
2006-10-31
Interactively Rendering Dynamic Caustics on GPU.
136-147
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_12
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LiuWL06
2006-10-31
Optimizing Mesh Construction for Quad/Triangle Schemes.
711-718
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_69
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#BeetsCR06
2006-10-31
3D City Model Generation from Ground Images.
630-638
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_60
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#JangJ06
2006-10-31
Sketch Based Mesh Fusion.
90-101
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_8
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LinJW06
2006-10-31
Comprehending and Transferring Facial Expressions Based on Statistical Shape and Texture Models.
265-276
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_23
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#XiLFJZ06
2006-10-31
Appearance and Geometry Completion with Constrained Texture Synthesis.
24-35
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_3
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#XiaoZMZP06
2006-10-31
An Accurate Vertex Normal Computation Scheme.
442-451
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_38
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ZhaoX06
2006-10-31
Addressing Scalability Issues in Large-Scale Collaborative Virtual Environment.
477-485
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_42
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LinZNK06
2006-10-31
Real-Time Facial Expression Mapping for High Resolution 3D Meshes.
277-287
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_24
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#SongLG06
2006-10-31
Improving the Interval Ray Tracing of Implicit Surfaces.
655-664
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_63
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#FlorezSSV06
2006-10-31
Near-Optimum Adaptive Tessellation of General Catmull-Clark Subdivision Surfaces.
562-569
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_52
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LaiC06
2006-10-31
Sub-sampling for Efficient Spectral Mesh Processing.
172-184
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_15
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#LiuJZ06
2006-10-31
Feature Curves with Cross Curvature Control on Catmull-Clark Subdivision Surfaces.
761-768
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_75
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#NasriSZNS06
2006-10-31
Direct Volume Rendering of Volumetric Protein Data.
397-403
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_34
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#HuCZP06
2006-10-31
Skeleton-Driven Animation Transfer Based on Consistent Volume Parameterization.
78-89
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_7
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ChangCLH06
2006-10-31
Skin Color Analysis in HSV Color Space and Rendering with Fine Scale Skin Structure.
254-264
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_22
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#KimK06
2006-10-31
Aerial Image Relighting: Simulating Time of Day Variations.
594-605
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_56
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#ChandraAT06
2006-10-31
Spatio-temporal Visualization of Battlefield Entities and Events.
622-629
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_59
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#FongNH06
2006-10-31
Non-uniform Differential Mesh Deformation.
54-65
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_5
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#XuZB06
2006-10-31
Highly Stylised Drawn Animation.
36-53
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_4
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#FioreRPW06
2006-10-31
Active Contours with Level-Set for Extracting Feature Curves from Triangular Meshes.
185-196
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_16
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#MinMJ06
2006-10-31
Algorithms for Vector Graphic Optimization and Compression.
665-672
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_64
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#SongEG06
2006-10-31
A Straightforward and Intuitive Approach on Generation and Display of Crack-Like Patterns on 3D Objects.
554-561
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_51
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#HsiehT06
2006-10-31
An Efficient Keyframe Extraction from Motion Capture Data.
494-501
2006
Computer Graphics International
http://dx.doi.org/10.1007/11784203_44
http://www.informatik.uni-trier.de/~ley/db/conf/cgi/cgi2006.html#XiaoZYW06
2002-12-13
Dynamic Generation of Follow Up Question Menus: Facilitating Interactive Natural Language Dialogues.
90-97
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#MittalM95
2002-12-13
Social presence in Web surveys.
412-417
2001
CHI
http://doi.acm.org/10.1145/365024.365306
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#CouperTS01
2002-12-13
The Human Factors Group at Compaq Computer Corporation.
285-286
1992
CHI
http://doi.acm.org/10.1145/142750.142815
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Group92
2002-12-13
Social Trends and Product Opportunities: Philips' Vision of the Future Project.
494-501
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#LambourneFR97
2003-08-25
Displayless Interface Access to Spatial Data: Effects on Speaker Prosodics.
51-52
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/doc/jab.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Baca97
2003-08-25
Kinetic Typography: Issues in time-based presentation of text.
269-270
1997
CHI Extended Abstracts
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#FordFI97
2002-12-13
Usability Problem Identification Using Both Low- and High-Fidelity Prototypes.
236-243
1996
CHI
http://doi.acm.org/10.1145/238386.238516
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#VirziSK96
2002-12-13
Do Color Models Really Make a Difference?
399-
1996
CHI
http://doi.acm.org/10.1145/238386.238585
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#DouglasK96
2002-12-13
Design Issues Involving Entertainment Click-Ons.
179-180
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257245
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#SuperWK96
2002-12-13
Extending Fitts' Law to Two-Dimensional Tasks.
219-226
1992
CHI
http://doi.acm.org/10.1145/142750.142794
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#MacKenzieB92
2003-08-25
The Tactile Touchpad.
309-310
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/sm.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#MacKenzieO97
2002-12-13
A Comparison of Three Selection Techniques for Touchpads.
336-343
1998
CHI
http://doi.acm.org/10.1145/274644.274691
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#MacKenzieO98
2002-12-13
The Design and Evaluation of a High-Performance Soft Keyboard.
25-31
1999
CHI
http://doi.acm.org/10.1145/302979.302983
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#MacKenzieZ99
2002-12-13
Design for Network Communities.
210-217
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#MynattAIO97
2002-12-13
IVEE: an environment for automatic creation of dynamic queries applications.
15-16
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223381
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#AhlbergW95
2002-12-13
Community Volunteers - Getting Involved Locally.
127-128
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257206
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#MillenYS96
2002-12-13
Appropriateness of Graphical Program Representations for Training Applications.
91-92
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257168
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#WilliamsVB96
2002-12-13
The Interchange Online Network: Simplifying Information Access.
558-565
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#Perkins95
2002-12-13
Usability management maturity, part 1: self assessment - how do you stack up? (abstract).
336
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223705
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#FlanaganR95
2002-12-13
Technical Considerations in the Design of an Intelligent Agent Using Automated Speech Recognition (ASR).
250-251
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257306
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#CaiC96
2003-08-25
Intelligent Software Agents vs. User-Controlled Direct Manipulation: A Debate (Panel).
105-106
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/panel/jrm.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#MillerMS97
2002-12-13
The Anti-Mac: violating the Macintosh human interface guidelines (panel session).
183-184
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223496
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Card95
2002-12-13
A Visual Medium for Programmatic Control of Interactive Applications.
199-206
1999
CHI
http://doi.acm.org/10.1145/302979.303039
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#ZettlemoyerA99
2002-12-13
Visual Access for 3D Data.
175-176
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257242
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#CowperthwaiteSCF96
2002-12-13
Hyperbolic user interfaces for computer aided architectural design.
304-305
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223686
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#HovestadtGD95
2002-12-13
Bringing Treasures to the Surface: Iterative Design for the Library of Congress National Digital Library Program.
518-525
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#PlaisantMBKC97
2002-12-13
Orchestrating a mixed reality performance.
38-45
2001
CHI
http://doi.acm.org/10.1145/365024.365033
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#KolevaTBFGSLHRA01
2002-12-13
Flatland: New Dimensions in Office Whiteboards.
346-353
1999
CHI
http://doi.acm.org/10.1145/302979.303108
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#MynattIEL99
2002-12-13
CyberBELT: multi-modal interaction with a multi-threaded documentary.
322-323
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223695
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#BersELT95
2002-12-13
Human and machine dimensions of 3D interfaces for virtual environments.
41-42
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223417
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Boyd95
2003-08-25
Does Immersion Make a Virtual Environment More Usable?
325-326
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/cb.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Boyd97
2002-12-13
Hedonic and ergonomic quality aspects determine a software's appeal.
201-208
2000
CHI
http://doi.acm.org/10.1145/332040.332432
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#HassenzahlPBL00
2002-12-13
The augurscope: a mixed reality interface for outdoors.
9-16
2002
CHI
http://doi.acm.org/10.1145/503376.503379
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#SchnadelbachKFFICFBGR02
2002-12-13
Pointing and Visualization.
665-666
1992
CHI
http://doi.acm.org/10.1145/142750.143078
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#HillH92
2004-02-12
Doom as an interface for process management.
152-157
2001
CHI
http://doi.acm.org/10.1145/365024.365078
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#Chao01
2002-12-13
Leveraging the asymmetric sensitivity of eye contact for videoconference.
49-56
2002
CHI
http://doi.acm.org/10.1145/503376.503386
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#Chen02
2002-12-13
Personality Trait Attributions to Voice Mail User Interfaces.
248-249
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257305
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Chin96
2003-08-25
Single Display Groupware.
71-72
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/doc/jes.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Stewart97
2002-12-13
Value bars: an information visualization and navigation tool for multi-attribute listings.
293-294
1992
CHI
http://doi.acm.org/10.1145/142750.142817
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Chimera92
2002-12-13
The Human-Computer Technology Group at Bellcore.
283-284
1992
CHI
http://doi.acm.org/10.1145/142750.142813
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Bush92
2002-12-13
HomeNet: A Field Trial of Residential Internet Services.
284-291
1996
CHI
http://doi.acm.org/10.1145/238386.238531
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#KrautSMMK96
2002-12-13
Demonstrating the Electronic Cocktail Napkin: A Paper-Like Interface for Early Design.
5-6
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257092
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#GrossD96
2002-12-13
Spatial Workspace Collaboration: A SharedView Video Support System for Remote Collaboration Capability.
533-540
1992
CHI
http://doi.acm.org/10.1145/142750.142980
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Kuzuoka92
2002-12-13
Practical usability evaluation.
369-370
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223726
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Perlman95
2003-08-25
Practical Usability Evaluation.
168-169
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/gp.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Perlman97
2002-12-13
Demo or Die: User Interface as Marketing Theatre.
458-465
1996
CHI
http://doi.acm.org/10.1145/238386.238606
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#WagnerC96
2002-12-13
The effect of domain knowledge on elementary school children's search behavior on an information retrieval system: the science library catalog.
55-56
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223424
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Hirsh95
2002-12-13
Digital family portraits: supporting peace of mind for extended family members.
333-340
2001
CHI
http://doi.acm.org/10.1145/365024.365126
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#MynattRCJ01
2002-12-13
Technomethodology: Paradoxes and Possibilities.
19-26
1996
CHI
http://doi.acm.org/10.1145/238386.238394
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#ButtonD96
2002-12-13
Interacting with eye movements in virtual environments.
265-272
2000
CHI
http://doi.acm.org/10.1145/332040.332443
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#TanriverdiJ00
2002-12-13
Time Affordances: The Time Factor in Diagnostic Usability Heuristics.
186-193
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#Conn95
2002-12-13
Pre-Screen Projection: From Concept to Testing of a New Interaction Technique.
226-233
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#HixTJ95
2003-08-25
An Automatic Method for Arranging Symbols and Widgets to Reflect their Internal Relations.
337-338
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/jh.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Hagman97
2002-12-13
SenseMaker: An Information-Exploration Interface Supporting the Contextual Evolution of a User's Interests.
11-18
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#BaldonadoW97
2002-12-13
Hi-Cites: Dynamically Created Citations with Active Highlighting.
408-415
1998
CHI
http://doi.acm.org/10.1145/274644.274700
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#BaldonadoW98
2002-12-13
Visual interaction design special interest area annual meeting.
332
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223701
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#StaplesW95
2002-12-13
Concurrent Engineering for an Interactive TV Interface.
117-118
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257194
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#BretanK96
2002-12-13
Improving Communication in Programming-by-Demonstration.
55-56
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257135
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#McDaniel96
2002-12-13
Interaction Design and Human Factors Support in the Development of a Personal Communicator for Children.
450-457
1996
CHI
http://doi.acm.org/10.1145/238386.238603
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#OosterholtKV96
2002-12-13
Teaching problem-solving through a cooperative learning environment.
9-10
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223371
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#DenningS95
2002-12-13
Illuminating clay: a 3-D tangible interface for landscape analysis.
355-362
2002
CHI
http://doi.acm.org/10.1145/503376.503439
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#PiperRI02
2002-12-13
LifeLines: Visualizing Personal Histories.
221-227
1996
CHI
http://doi.acm.org/10.1145/238386.238493
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#PlaisantMRWS96
2002-12-13
Usability at Eastman Kodak Company: a study in group collaboration.
156-157
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223478
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#RosenzweigL95
2002-12-13
Vection with Large Screen 3D Imagery.
233-234
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257297
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#LowtherW96
2002-12-13
Mapping the design process: visualizing what we don't see (panel session).
189-190
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223503
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#BoyarskiHMP95
2002-12-13
A Task-Oriented Interface to a Digital Library.
103-104
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257183
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Cousins96
2004-10-27
Designing for User Acceptance Using Analysis Techniques Based on Responsibility Modelling.
217-218
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257289
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#HarperN96
2004-10-27
Collaborative Tools and the Practicalities of Professional Work at the International Monetary Fund.
122-129
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#HarperS95
2002-12-13
Enhanced Dynamic Queries via Movable Filters.
415-420
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#FishkinS95
2002-12-13
Interactive multimedia conference proceedings.
13-14
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223377
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#RebelskyFHMMO95
2002-12-13
End-User Training: An Empirical Study Comparing On-Line Practice Methods.
74-81
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#WiedenbeckZM95
2002-12-13
An Empirical Study of How People Establish Interaction: Implications for CSCW Session Management Models.
1-8
1999
CHI
http://doi.acm.org/10.1145/302979.302980
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#KristoffersenL99
2002-12-13
Walking the Walk is Doing the Work - Flexible Interaction Management in Video-Supported Cooperative Work.
171-172
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257239
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#KristoffersenR96
2002-12-13
Gender and Skill in Human Computer Interaction.
93-94
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257174
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Balka96
2003-08-25
Criteria for Effective Groupware 2.
242-243
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/poster/ma.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#AmbeM97
2002-12-13
Contextual inquiry: grounding your design in user's work.
359-360
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223721
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#DuncanB95
2002-12-13
Information Foraging in Information Access Environments.
51-58
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#PirolliC95
2002-12-13
Device Design Methodology for Trauma Applications.
590-594
1998
CHI
http://doi.acm.org/10.1145/274644.274723
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#BrownM98
2003-08-25
Distributed Applets.
204-205
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/video/man.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#BrownN97
2002-12-13
A new paradigm for browsing the web.
320-321
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223694
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#BrownS95
2003-08-25
Structured Observation: Practical methods for understanding users and their work context.
182-183
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/smd.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Dray97
2002-12-13
Scribbler: a tool for searching digital ink.
252-253
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223660
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#PoonWC95
2002-12-13
A Study of Fonts Designed for Screen Display.
87-94
1998
CHI
http://doi.acm.org/10.1145/274644.274658
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#BoyarskiNFR98
2002-12-13
Peepholes: Low Cost Awareness of One's Community.
206-207
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257283
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Greenberg96
2002-12-13
DataTiles: a modular platform for mixed physical and graphical interactions.
269-276
2001
CHI
http://doi.acm.org/10.1145/365024.365115
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#RekimotoUO01
2002-12-13
A system for application-independent time-critical renderin.
53-54
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223423
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Gossweiler95
2002-12-13
Using information scent to model user information needs and actions and the Web.
490-497
2001
CHI
http://doi.acm.org/10.1145/365024.365325
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#ChiPCP01
2003-08-25
Support for Cooperatively Controlled Objects in Multimedia Applications.
313-314
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/ljb.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#BrickerBT97
2002-12-13
Designing a Graphical User Interface for Healthcare Workers in Rural India.
471-478
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#GrisedaleGG97
2005-05-11
Students' use of animations for algorithm understanding.
238-239
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223550
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#WilsonKIAH95
2002-12-13
Providing integrated toolkit-level support for ambiguity in recognition-based interfaces.
368-375
2000
CHI
http://doi.acm.org/10.1145/332040.332459
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#MankoffHA00
2002-12-13
Gesture at the user interface (abstract).
438
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223776
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#WexelblatC95
2002-12-13
Footprints: History-Rich Tools for Information Foraging.
270-277
1999
CHI
http://doi.acm.org/10.1145/302979.303060
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#WexelblatM99
2003-08-25
A Method for Graphical Input on the WWW.
339-340
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/lmp.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#ParksE97
2002-12-13
Communicating Graphical Information to Blind Users Using Music: The Role of Context.
574-581
1998
CHI
http://doi.acm.org/10.1145/274644.274721
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#AltyR98
2002-12-13
Should we Leverage Natural-Language Knowledge? An Analysis of User Errors in a Natural-Language-Style Programming Language.
207-214
1999
CHI
http://doi.acm.org/10.1145/302979.303040
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#BruckmanE99
2002-12-13
High-end high school communication: strategies and practices of students in a networked environment (poster).
99-100
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223449
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Fishman95a
2002-12-13
Learning from diversity: interactive TV, computers, and the frontier of the cognitive sciences.
197
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223512
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#McDonald95
2002-12-13
What can I say? Evaluating a Spoken Language Interface to Email.
582-589
1998
CHI
http://doi.acm.org/10.1145/274644.274722
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#WalkerFFMH98
2002-12-13
ScienceSpace: Lessons for Designing Immersive Virtual Realities.
89-90
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257167
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#SalzmanLDM96
2002-12-13
Implementing Interface Attachments Based on Surface Representations.
191-198
1999
CHI
http://doi.acm.org/10.1145/302979.303038
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#OlsenHVHP99
2002-12-13
A Collaborative Approach to Developing Style Guides.
362-367
1996
CHI
http://doi.acm.org/10.1145/238386.238572
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#Gale96
2002-12-13
Reading of electronic documents: the usability of linear, fisheye, and overview+detail interfaces.
293-300
2001
CHI
http://doi.acm.org/10.1145/365024.365118
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#HornbaekF01
2002-12-13
Visual Tracking for Multimodal Human Computer Interaction.
140-147
1998
CHI
http://doi.acm.org/10.1145/274644.274666
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#YangSMW98
2002-12-13
The TrackPad: a study on user comfort and performance (poster).
97-98
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223448
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#CakirCMU95
2002-12-13
Using naming time to evaluate quality predictors for model simplification.
113-120
2000
CHI
http://doi.acm.org/10.1145/332040.332414
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#WatsonFM00
2003-07-28
Editing user-specific diagrams by direct manipulation.
137-138
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223468
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#ViehstaedtM95
2002-12-13
User-Centered Development of a Large-Scale Complex Networked Virtual Environment.
546-552
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#MastaglioW95
2002-12-13
HCI Standards on Trial: You be the Jury.
635-638
1992
CHI
http://doi.acm.org/10.1145/142750.143058
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#SchrierWMPSWW92
2002-12-13
Effectiveness of Spatial Level of Detail Degradation in the Periphery of Head-Mounted Displays.
227-228
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257294
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#WatsonWH96
2002-12-13
Selectors: Going Beyond User-Interface Widgets.
273-279
1992
CHI
http://doi.acm.org/10.1145/142750.142810
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Johnson92
2002-12-13
A Comparison of User Interfaces for Panning on a Touch-Controlled Display.
218-225
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#Johnson95
2003-08-25
Universal Access to the Net: Requirements and Social Impact.
118
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/invited/jj.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Johnson97
2002-12-13
Simplifying the Controls of an Interactive Movie Game.
65-72
1998
CHI
http://doi.acm.org/10.1145/274644.274655
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Johnson98
2002-12-13
Issues of gestural navigation in abstract information spaces.
206-207
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223521
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#AllportRS95
2003-08-25
The User-Centered Globalization Group at AT&T.
93-94
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/overview/mga.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#AlvarezAL97
2002-12-13
NotePals: Light Weight Note Sharing by the Group, for the Group.
338-345
1999
CHI
http://doi.acm.org/10.1145/302979.303107
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#DavisLCHL99
2002-12-13
Introduction and overview to human-computer interaction.
345
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223714
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#ButlerJJ95
2003-08-25
OVID: Object View and Interaction Design.
186-187
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/djr.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#BerryIR97
2003-08-25
Captology: The Study of Computers as Persuasive Technologies.
129
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/sig/bjf.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Fogg97
2002-12-13
Persuasive Computers: Perspectives and Research Directions.
225-232
1998
CHI
http://doi.acm.org/10.1145/274644.274677
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Fogg98
2003-08-25
Designating Required vs. Optional Input Fields.
259-260
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/poster/tst1.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#TullisP97
2002-12-13
A Focus+Context Technique Based on Hyperbolic Geometry for Visualizing Large Hierarchies.
401-408
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#LampingRP95
2002-12-13
Making a Simple Interface Complex: Tnteractions among Telephone Features.
244-245
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257303
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Griffeth96
2002-12-13
SHK: Single Hand Key Card for Mobile Devices.
7-8
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257093
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#SugimotoT96
2002-12-13
A Better Mythology for System Design.
88-95
1999
CHI
http://doi.acm.org/10.1145/302979.303003
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#HarrisH99
2003-08-25
Beyond Fitts' Law: Models for Trajectory-Based HCI Tasks.
250
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/poster/ja.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#AccotZ97a
2002-12-13
Task Elaboration or Label Following: An Empirical Study of Representation in Human-Computer Interaction.
201-202
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257280
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#TerwilligerP96
2002-12-13
Relationships Between Users' and Interfaces' Task Representations.
99-106
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#TerwilligerP97
2002-12-13
Programming as driving: unsafe at any speed?
3-4
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223363
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#FryL95
2002-12-13
WebStage: An Active Media Enhanced World Wide Web Browser.
391-398
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#YamaguchiHM97
2003-08-25
Learning About User-Centered Design: A Multimedia Case Study Tutorial.
267-268
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-demo/dp.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#CareyPL97
2002-12-13
Participatory design practices: a special interest groups (abstract).
343
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223712
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#SandersN95
2002-12-13
PRoP: Personal Roving Presence.
296-303
1998
CHI
http://doi.acm.org/10.1145/274644.274686
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#PaulosC98
2002-12-13
Evolution of a User Interface Design: NCR's Management Discovery Tool.
526-533
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#KnutsonAH97
2002-12-13
The dynamics of mass online marketplaces: a case study of an online auction.
317-324
2001
CHI
http://doi.acm.org/10.1145/365024.365124
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#Hahn01
2002-12-13
HCI at Banc Sabadell.
135-136
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257213
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Hall96
2004-08-27
Helping and Hindering User Involvement - A Tale of Everyday Design.
178-185
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#WilsonBJJ97
2002-12-13
Bridging Physical and Virtual Worlds with Electronic Tags.
370-377
1999
CHI
http://doi.acm.org/10.1145/302979.303111
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#WantFGH99
2002-12-13
Touch-Sensing Input Devices.
223-230
1999
CHI
http://doi.acm.org/10.1145/302979.303045
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#HinckleyS99
2003-08-25
The Multimodal GUI: Developing Auditory Cues as Tools for Performance and Usability.
63-64
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/doc/lam.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Murray97
2002-12-13
A computer science community service project.
151-152
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223475
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Jimenez95
2002-12-13
Participatory design of a portable torque-feedback device.
439-446
1992
CHI
http://doi.acm.org/10.1145/142750.142895
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Good92
2003-08-25
Groupware Adoption & Adaptation.
67-68
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/doc/lap.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Palen97
2002-12-13
Social, Individual and Technological Issues for Groupware Calendar Systems.
17-24
1999
CHI
http://doi.acm.org/10.1145/302979.302982
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#Palen99
2002-12-13
Discount or disservice?: discount usability analysis--evaluation at a bargain price or simply damaged merchandise? (panel session).
176-177
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223488
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Gray95
2003-08-25
The Collaboratory: a Virtual, Collaborative Learning Environment.
210-211
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/video/ajc.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Cargile97
2002-12-13
A Case Study to Distill Structural Scaffolding Guidelines for Scaffolded Software Environments.
81-88
2002
CHI
http://doi.acm.org/10.1145/503376.503392
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#QuintanaKS02
2002-12-13
Partitioning digital worlds: focal and peripheral awareness in multiple monitor use.
458-465
2001
CHI
http://doi.acm.org/10.1145/365024.365312
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#Grudin01
2002-12-13
WorldBeat: Designing a Baton-Based Interface for an Interactive Music Exhibit.
131-138
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#Borchers97
2002-12-13
Netscape Communicator's Collapsible Toolbars.
81-86
1998
CHI
http://doi.acm.org/10.1145/274644.274657
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#AuL98
2002-12-13
Participatory Analysis: Shared Development of Requirements from Scenarios.
162-169
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#ChinRC97
2002-12-13
To influence time perception.
272-273
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223670
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#GeelhoedTRH95
2002-12-13
The Group Elicitation Method for Participatory Design and Usability Testing.
87-88
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257165
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Boy96
2002-12-13
Cognitive Function Analysis for Human-Centered Automation of Safety-Critical Systems.
265-272
1998
CHI
http://doi.acm.org/10.1145/274644.274682
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Boy98
2002-12-13
The abstraction-link-view paradigm: using constraints to connect user interfaces to applications.
335-342
1992
CHI
http://doi.acm.org/10.1145/142750.142828
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Hill92
2003-08-25
HyperMirror: A Video-Mediated Communication System.
317-318
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/omo.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#MorikawaM97
2003-08-25
Students at CHI.
130
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/sig/mb1.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#ByrneH97
2002-12-13
An example of formal usability inspections in practice at Hewlett-Packard company.
103-104
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223451
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Gunn95
2002-12-13
Effects of contextual navigation aids on browsing diverse Web systems.
257-264
2000
CHI
http://doi.acm.org/10.1145/332040.332442
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#ParkK00
2002-12-13
Automatic generation of starfield displays using constraints.
202-203
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223517
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#HudsonS95
2002-12-13
Electronic Mail Previews Using Non-Speech Audio.
237-238
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257299
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#HudsonS96
2002-12-13
Elastic graphical interfaces to precise data manipulation.
143-144
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223471
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#MasuiKB95
2002-12-13
The Effects of Information Accuracy on User Trust and Compliance.
35-36
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257119
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Fox96
2002-12-13
Composing Magic Lenses.
519-525
1998
CHI
http://doi.acm.org/10.1145/274644.274714
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Fox98
2002-12-13
Scale effects in steering law tasks.
1-8
2001
CHI
http://doi.acm.org/10.1145/365024.365027
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#AccotZ01
2002-12-13
More than dotting the i's - foundations for crossing-based interfaces.
73-80
2002
CHI
http://doi.acm.org/10.1145/503376.503390
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#AccotZ02
2002-12-13
Beyond Fitts' Law: Models for Trajectory-Based HCI Tasks.
295-302
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#AccotZ97
2002-12-13
Performance Evaluation of Input Devices in Trajectory-Based Tasks: An Application of the Steering Law.
466-472
1999
CHI
http://doi.acm.org/10.1145/302979.303133
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#AccotZ99
2002-12-13
Pointing the Way: Active Collaborative Filtering.
202-209
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#MaltzE95
2002-12-13
Translucent history.
250-251
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223659
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#GenauK95
2003-08-25
A Tour of TeamRooms.
208-209
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/video/mr.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#RosemanG97
2002-12-13
Examining Basic Items of a Screen Design.
79-80
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257160
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#IdoY96
2002-12-13
CompuMentor: people helping computers help people.
153-154
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223476
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#SchofieldB95
2002-12-13
"I'll Get That Off the Audio": A Case Study of Salvaging Multimedia Meeting Records.
202-209
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#MoranPHCKMMZ97
2002-12-13
STRIPE: remote driving using limited image data.
59-60
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223426
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Kay95
2002-12-13
Creative multimedia for children: Isis story builder.
37-38
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223415
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Kim95
2002-12-13
Testing Pointing Device Performance and User Assessment with the ISO 9241, Part 9 Standard.
215-222
1999
CHI
http://doi.acm.org/10.1145/302979.303042
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#DouglasKM99
2002-12-13
Directing Learner Attention with Manipulation Styles.
43-44
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257126
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Holst96
2003-08-25
Managing the Information Technology Infrastructure: HCI Design for Network and System Management Applications.
127
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/sig/tmg.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#GraefeW97
2002-12-13
The Virginia User Interface Laboratory.
63-64
1992
CHI
http://doi.acm.org/10.1145/142750.142758
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Pausch92
2005-05-31
The MidasPlus molecular modeling system.
521-522
1992
CHI
http://doi.acm.org/10.1145/142750.142915
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#FerrinHCPL92
2002-12-13
The role of contextual haptic and visual constraints on object manipulation in virtual environments.
532-539
2000
CHI
http://doi.acm.org/10.1145/332040.332494
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#WangM00
2002-12-13
Object Manipulation in Virtual Environments: Relative Size Matters.
48-55
1999
CHI
http://doi.acm.org/10.1145/302979.302989
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#WangM99
2002-12-13
Groupware walkthrough: adding context to groupware usability evaluation.
455-462
2002
CHI
http://doi.acm.org/10.1145/503376.503458
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#PinelleG02
2003-08-25
HCI at the University of Michigan's School of Information.
75-76
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/overview/gmo.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#OlsonOFSA97
2002-12-13
Enriching buyers' experiences: the SmartClient approach.
289-296
2000
CHI
http://doi.acm.org/10.1145/332040.332446
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#PuF00
2002-12-13
Crowded Collaborative Virtual Environments.
59-66
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#BenfordGL97
2002-12-13
Action Assignable Graphics: A Flexible Human-Computer Interface Design Process.
71-72
1992
CHI
http://doi.acm.org/10.1145/142750.142761
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#RussellXW92
2002-12-13
Does Animation in User Interfaces Improve Decision Making?
27-34
1996
CHI
http://doi.acm.org/10.1145/238386.238396
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#Gonzalez96
2002-12-13
Integrating multiple cues for spoken language understanding.
131-132
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223465
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#WardN95
2002-12-13
Orderable Dimensions of Visual Texture for Data Display: Orientation, Size and Contrast.
203-209
1992
CHI
http://doi.acm.org/10.1145/142750.142791
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#WareK92
2002-12-13
The DragMag image magnifier.
407-408
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223749
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#WareL95
2002-12-13
Iterative Design of an Interface for Easy 3-D Direct Manipulation.
135-142
1992
CHI
http://doi.acm.org/10.1145/142750.142772
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Houde92
2002-12-13
Using a large projection screen as an alternative to head-mounted displays for virtual environments.
478-485
2000
CHI
http://doi.acm.org/10.1145/332040.332479
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#PatrickCSRVC00
2002-12-13
DO-IT: deformable objects as input tools.
87-88
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223442
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#MurakamiHON95
2003-08-25
Designing Usable and Visually Appealing Web Sites.
170-171
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/wn.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#NealeM97
2003-08-25
Ubiquitous Computing: The Impact on Future Interaction Paradigms and HCI Research.
221-222
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/workshop/gda.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#AbowdS97
2004-11-30
Corporate Strategy and Usability Research: A New Partnership (Panel).
115-116
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/panel/slr.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#RosenbaumHRBTC97
2002-12-13
A three-step filtering mechanism.
426-427
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223768
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Uyama95
2002-12-13
Global-software development lifecycle: an exploratory study.
104-111
2001
CHI
http://doi.acm.org/10.1145/365024.365060
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#Yeo01
2006-06-20
A prototype user interface for a mobile multimedia terminal.
81-82
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223439
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#LongNBHLRSBR95
2002-12-13
Balancing Usability and Learning in an Interface.
479-486
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#RappinGRL97
2002-12-13
Visual Profiles: A Critical Component of Universal Access.
330-337
1999
CHI
http://doi.acm.org/10.1145/302979.303105
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#JackoDRSP99
2002-12-13
Interactive city planning using multimedia representation aids.
77-78
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223437
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Shiffer95
2002-12-13
STRIPE: remote driving using limited image data (poster).
107-108
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223453
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Kay95a
2003-08-25
Cognitive and Software Solutions for Computer-related Anxiety.
229
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/workshop/jr2.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#RamsayJ97
2002-12-13
Global user interface design.
363-364
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223723
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Fernandes95
2002-12-13
The Claris Interface Design Group: A Personal Retrospective.
139-140
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257216
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Fernandes96
2003-08-25
The Founding of the Netscape User Experience Group.
87-88
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/overview/tf.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Fernandes97
2002-12-13
Direct Combination.
262-269
1999
CHI
http://doi.acm.org/10.1145/302979.303057
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#HollandO99
2002-12-13
Browsing digital video.
169-176
2000
CHI
http://doi.acm.org/10.1145/332040.332425
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#LiGSHR00
2002-12-13
Extending and Evaluating Visual Information Seeking for Video Data.
41-42
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257124
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Hibino96
2002-12-13
Browser-Soar: A Computational Model of a Highly Interactive Task.
165-172
1992
CHI
http://doi.acm.org/10.1145/142750.142782
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#PeckJ92
2002-12-13
The use of an automatic "To Do" list to guide structured interaction.
232-233
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223543
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Rogers95
2002-12-13
Accuracy measures for evaluating computer pointing devices.
9-16
2001
CHI
http://doi.acm.org/10.1145/365024.365028
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#MacKenzieKS01
2002-12-13
Reno: a component-based user interface.
19-20
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223387
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#KerrMST95
2002-12-13
Towards a model of cognitive process in logical design: comparing object-oriented and traditional functional decomposition software methodologies.
489-498
1992
CHI
http://doi.acm.org/10.1145/142750.142905
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#KimL92
2003-08-25
Emotional Usability of Customer Interfaces - Focusing on Cyber Banking System Interfaces.
283-284
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/jki.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#KimM97
2003-08-25
A Two-Ball Mouse Affords Three Degrees of Freedom.
303-304
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/sm2.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#MacKenzieSP97
2003-08-25
Basic Research Symposium.
220
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/workshop/sj2.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#JulW97
2002-12-13
Adaptive testing: effects on user performance.
129-134
2002
CHI
http://doi.acm.org/10.1145/503376.503400
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#JettmarN02
2002-12-13
Using Small Screen Space More Efficiently.
383-390
1996
CHI
http://doi.acm.org/10.1145/238386.238582
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#KambaEHSS96
2002-12-13
MedSpeak: Report Creation with Continuous Speech Recognition.
431-438
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#LaiV97
2002-12-13
Reflections on I/Design: User Interface Design at a Startup.
487-493
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#Hansen97
2002-12-13
Pointing on a computer display.
314-315
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223691
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#GrahamM95
2002-12-13
Physical versus Virtual Pointing.
292-299
1996
CHI
http://doi.acm.org/10.1145/238386.238532
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#GrahamM96
2003-08-25
Developing Collaborative Applications Using the World Wide Web "Shell".
144-145
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/al.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#LeeG97
2003-08-25
Mind Maps and Causal Models: Using Graphical Representations of Field Research Data.
265-266
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/poster/mil.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#MillenSLD97
2002-12-13
SmartSkin: an infrastructure for freehand manipulation on interactive surfaces.
113-120
2002
CHI
http://doi.acm.org/10.1145/503376.503397
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#Rekimoto02
2002-12-13
A Multiple Device Approach for Supporting Whiteboard-Based Interactions.
344-351
1998
CHI
http://doi.acm.org/10.1145/274644.274692
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Rekimoto98
2002-12-13
Excentric Labeling: Dynamic Neighborhood Labeling for Data Visualization.
512-519
1999
CHI
http://doi.acm.org/10.1145/302979.303148
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#FeketeP99
2002-12-13
Science-by-Mail.
149-150
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223474
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#WhiteF95
2002-12-13
<i>curlybot</i>: designing a new class of computational toys.
129-136
2000
CHI
http://doi.acm.org/10.1145/332040.332416
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#FreiSMI00
2003-08-25
Computer Assisted Foundations - Interactive Design Problems.
271-272
1997
CHI Extended Abstracts
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#NelsonBM97
2002-12-13
Sympathetic Interfaces: Using a Plush Toy to Direct Synthetic Characters.
152-158
1999
CHI
http://doi.acm.org/10.1145/302979.303028
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#JohnsonWBKB99
2003-03-20
Bridging Strategies for VR-Based Learning.
536-543
1999
CHI
http://doi.acm.org/10.1145/302979.303153
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#MoherJOG99
2002-12-13
A Method for (recruiting) Methods: Facilitating Human Factors Input to System Design.
549-556
1992
CHI
http://doi.acm.org/10.1145/142750.142984
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#LimL92
2003-08-25
Technology at Home: A Digital Personal Scale.
216-217
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/video/sgm.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Moeslinger97
2002-12-13
Method engineering: from data to model to practice.
313-320
1992
CHI
http://doi.acm.org/10.1145/142750.142822
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#NilsenJOP92
2002-12-13
HCI Group at Computer Research Institute of Montreal.
147-148
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257223
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#VerteuilE96
2002-12-13
Dynamic Queries for Information Exploration: An Implementation and Evaluation.
619-626
1992
CHI
http://doi.acm.org/10.1145/142750.143054
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#AhlbergWS92
2002-12-13
Conversational dialogue in graphical user interfaces: interaction technique feedback and dialogue structure.
71-72
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223434
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Perez95
2003-08-25
Notes on a Pattern Language for Interactive Usability.
289-290
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/gca.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Casaday97
2003-08-25
'Eudaemonic Eye': 'Personal Imaging' and wearable computing as a result of deconstructing HCI; towards greater creativity and self-determination.
28-29
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/demo/sm.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Mann97
2002-12-13
Combining Observations of Intentional and Unintentional Behaviors for Human-Computer Interaction.
238-245
1999
CHI
http://doi.acm.org/10.1145/302979.303051
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#KunoINS99
2002-12-13
Describing interactive visualization artifacts-DIVA.
73-74
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223435
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Tweedie95
2002-12-13
Characterizing Interactive Externalizations.
375-382
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#Tweedie97
2002-12-13
The computer Sciences Electronic Magazine: Translating from Paper to Multimedia.
11-18
1992
CHI
http://doi.acm.org/10.1145/142750.142752
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#KoonsOFL92
2004-01-08
The decoupled simulation model for virtual reality systems.
321-328
1992
CHI
http://doi.acm.org/10.1145/142750.142824
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#ShawLGS92
2002-12-13
NIC: interaction on the World Wide Web.
27-28
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223402
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#OlsenRKJABD95
2002-12-13
The effect of computer experience on subjective and objective software usability measures.
284-285
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223676
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Kissel95
2002-12-13
When the Interface is a Talking Dinosaur: Learning Across Media with ActiMates Barney.
288-295
1998
CHI
http://doi.acm.org/10.1145/274644.274685
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Strommen98
2003-08-25
From the Flashing 12: 00 to a Usable Machine: Applying UbiComp to the VCR.
281-282
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/jrc.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Cooperstock97
2002-12-13
A Computer Participant in Musical Improvisation.
123-130
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#Walker97
2003-08-25
Transferring a designed user experience to product (Panel).
101-102
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/panel/gbs.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#SalomonEMMT97
2002-12-13
Metaphor design in user interfaces: how to effectively manage expectation, surprise, comprehension, and delight.
373-374
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223728
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Marcus95
2003-08-25
Metaphor Design in User Interfaces: How to Manage Expectation, Surprise, Comprehension, and Delight Effectively.
172-173
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/am.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Marcus97
2002-12-13
Retrospective views on Apple Computer's Interface Design Project.
172-173
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223486
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Mountford95
2002-12-13
Supporting Situated Actions in High Volume Conversational Data Situations.
472-479
1998
CHI
http://doi.acm.org/10.1145/274644.274708
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Lueg98
2002-12-13
The Design of a Wearable Computer.
139-146
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#BassKMSSS97
2003-08-25
Utopia Appropriated: The Future as It Was.
117
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/invited/rp.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Prelinger97
2002-12-13
Looking and lingering as conversational cues in video-mediated communication.
278-279
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223673
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#ColstonS95
2003-08-25
Interviewing Customers: Discovering What They Can't Tell You.
180-181
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/eai.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Isaacs97
2002-12-13
GUI Users Have Trouble Using Graphic Conventions on Novel Tasks.
75-76
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257151
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Ashworth96
2002-12-13
MAD: A Movie Authoring and Design System.
17-18
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257101
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#FriedlanderBRS96
2002-12-13
Triangles: Tangible Interface for Manipulation and Exploration of Digital Information Topography.
49-56
1998
CHI
http://doi.acm.org/10.1145/274644.274652
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#GorbetOI98
2005-09-07
"Body Coupled FingeRing": Wireless Wearable Keyboard.
147-154
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#FukumotoT97
2002-12-13
Whisper: A Wristwatch Style Wearable Handset.
112-119
1999
CHI
http://doi.acm.org/10.1145/302979.303009
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#FukumotoT99
2002-12-13
Aesthetics and Apparent Usability: Empirically Assessing Cultural and Methodological Issues.
115-122
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#Tractinsky97
2002-12-13
Merging language, direct manipulation, and visualization: a programmable research environment for diffusion-limited aggregation.
39-40
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223416
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Blough95
2002-12-13
Queries? Links? Is there a Difference?
407-414
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#Golovchinsky97
2002-12-13
The Effects of Distance in Local versus Remote Human-Computer Interaction.
103-108
1998
CHI
http://doi.acm.org/10.1145/274644.274660
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#Moon98
2002-12-13
Anthropometric Data on Horizontal Head Movements in Videocommunications.
95-96
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257175
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#BockerBM96
2002-12-13
An observational study of how objects support engineering design thinking and communication: implications for the design of tangible media.
217-224
2000
CHI
http://doi.acm.org/10.1145/332040.332434
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#BreretonM00
2003-08-25
Usability and Requirements: What role can usability professionals play in requirements definition?
133
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/sig/em.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Muncher97
2002-12-13
Towards demystification of direct manipulation: cognitive modeling charts the gulf of execution.
128-135
2001
CHI
http://doi.acm.org/10.1145/365024.365069
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#KierasMB01
2002-12-13
Predictive Engineering Models Using the EPIC Architecture for a High-Performance Task.
11-18
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#KierasWM95
2004-06-01
The influence explorer.
129-130
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223464
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#TweedieSDS95
2004-12-21
Externalising Abstract Mathematical Models.
406-
1996
CHI
http://doi.acm.org/10.1145/238386.238587
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#TweedieSDS96
2002-12-13
101 Spots, or How Do Users Read Menus?
132-139
1998
CHI
http://doi.acm.org/10.1145/274644.274664
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#AaltonenHR98
2002-12-13
Beating the Limitations of Camera-Monitor Mediated Telepresence with Extra Eyes.
50-57
1996
CHI
http://doi.acm.org/10.1145/238386.238402
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#YamaashiCNB96
2003-08-25
A Prototype Design Tool for Participants in Graphical Multiuser Environments.
246-247
1997
CHI Extended Abstracts
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#StroheckerB97
2003-08-25
Telework: When Your Job is on the Line (Panel).
107-108
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/panel/js2.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#ScholtzBEDLS97
2002-12-13
Designing Audio Aura.
566-573
1998
CHI
http://doi.acm.org/10.1145/274644.274720
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#MynattBWBE98
2002-12-13
Locus of feedback control in computer-based tutoring: impact on learning rate, achievement and attitudes.
245-252
2001
CHI
http://doi.acm.org/10.1145/365024.365111
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#CorbettA01
2002-12-13
Instructional interventions in computer-based tutoring: differential impact on learning time and accuracy.
97-104
2000
CHI
http://doi.acm.org/10.1145/332040.332412
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#CorbettT00
2003-08-25
Computers, Kids, and Creativity: What Does the Future Hold? (Panel).
111-112
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/panel/ajd1.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#DruinSHCB97
2003-08-25
Possibilities for the Digital Baton as a General-Purpose Gestural Interface.
311-312
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/tm.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Marrin97
2002-12-13
Maintaining a Focus on User Requirements Throughout the Development of Clinical Workstation Software.
170-177
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#CobleKK97
2002-12-13
The audible web: auditory enhancements for Mosaic.
318-319
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223693
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#AlbersB95
2002-12-13
A comparison of four navigation techniques in a 2D browsing task.
282-283
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223675
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Kaptelinin95
2003-08-25
Object Manipulation in Virtual Environments: Human Bias, Consistency and Individual Differences.
349-350
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/ywa.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#WangMS97
2002-12-13
Requirements and design of DesignVision and object-oriented graphical interface to an intelligent software design assistant.
499-506
1992
CHI
http://doi.acm.org/10.1145/142750.142908
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#Guindon92
2002-12-13
What makes Web sites credible?: a report on a large quantitative study.
61-68
2001
CHI
http://doi.acm.org/10.1145/365024.365037
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#FoggMLOVFPRSST01
2002-12-13
Chinese input with keyboard and eye-tracking: an anatomical study.
349-356
2001
CHI
http://doi.acm.org/10.1145/365024.365298
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#WangZS01
2002-12-13
The tablet newspaper: a vision for the future.
425
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223767
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#Martin95
2002-12-13
<i>Stimulus-Response</i>Demonstration.
252-259
1996
CHI
http://doi.acm.org/10.1145/238386.238522
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#Wolber96
2002-12-13
Introduction to object-oriented design: a minimalist approach.
361-362
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223722
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#RossonC95a
2002-12-13
Facilitating the exploration of interface design alternatives: the HUMANOID model of interface design.
507-515
1992
CHI
http://doi.acm.org/10.1145/142750.142912
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#SzekelyLN92
2003-08-25
Usability Testing of System Status Displays for Army Missile Defense.
255-256
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/poster/mp.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#PerrinFS97
2002-12-13
The Perceptual Structure of Multidimensional Input Device Selection.
211-218
1992
CHI
http://doi.acm.org/10.1145/142750.142792
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#JacobS92
2006-11-07
User-Centered Video: Transmitting Video Images Based on the User's Interest.
325-330
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#YamaashiKTM95
2002-12-13
Using thumbnails to search the Web.
198-205
2001
CHI
http://doi.acm.org/10.1145/365024.365098
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#WoodruffFRMP01
2002-12-13
Designing storytelling technologies to encouraging collaboration between young children.
556-563
2000
CHI
http://doi.acm.org/10.1145/332040.332502
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#BenfordBABDHHINOSSST00
2004-02-17
Visualizing the Internet: Putting the User in the Driver's Seat.
163-164
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257233
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#GershonAEFR96
2002-12-13
The WebBook and the Web Forager: An Information Workspace for the World-Wide Web.
111
1996
CHI
http://doi.acm.org/10.1145/238386.238446
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#CardRY96
2002-12-13
KidPad: A Design Collaboration Between Children, Technologists, and Educators.
463-470
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#DruinSPBH97
2002-12-13
Identity construction environments: supporting a virtual therapeutic community of pediatric patients undergoing dialysis.
380-387
2001
CHI
http://doi.acm.org/10.1145/365024.365302
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#BersGD01
2002-12-13
Cooperative Bimanual Action.
27-34
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#HinckleyPPPK97
2002-12-13
Contextual design: using customer work models to drive system design (abstract).
391-392
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223737
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#HoltzblattB95a
2003-08-25
Getting Started on a Contextual Project.
164-165
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/kh.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#HoltzblattB97a
2003-08-25
Contextual Design: Using Customer Work Models to Drive Systems Design.
184-185
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/tutorial/kah2.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#HoltzblattB97b
2003-08-25
Interfaces for Advanced Manufacturing Technology.
329-330
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/mv.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#VazquezR97
2002-12-13
User Centered Design: Quality or Quackery?
161-162
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257232
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#KaratADRW96
2004-02-11
Does Continuous Visual Feedback Aid Debugging in Direct-Manipulation Programming Systems?
258-265
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#WilcoxABCC97
2003-11-25
Towards Task Models for Embedded Information Retrieval.
173-180
1992
CHI
http://doi.acm.org/10.1145/142750.142785
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi92.html#HoppeS92
2002-12-13
Enhancing a digital book with a reading recommender.
153-160
2000
CHI
http://doi.acm.org/10.1145/332040.332419
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#WoodruffGPCC00
2002-12-13
A Factor Analysis of User Cognition and Emotion.
546-547
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#Ramsay97
2002-12-13
Putting the feel in 'look and feel'.
415-422
2000
CHI
http://doi.acm.org/10.1145/332040.332467
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#OakleyMBG00
2002-12-13
Speak out and annoy someone: experience with intelligent kiosks.
313-320
2000
CHI
http://doi.acm.org/10.1145/332040.332449
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#ChristianA00
2002-12-13
Digital Smart Kiosk Project.
155-162
1998
CHI
http://doi.acm.org/10.1145/274644.274668
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi98.html#ChristianA98
2003-08-25
Overlaying Motion, Time and Distance in 3-Space.
347-348
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/short-talk/mpe.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#Pell97
2002-12-13
Assessing the Effect of Non-Photorealistic Rendered Images in CAD.
35-41
1996
CHI
http://doi.acm.org/10.1145/238386.238398
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi96.html#SchumannSLR96
2002-12-13
Accessing Multimedia through Concept Clustering.
19-26
1997
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97.html#KominekK97
2002-12-13
An experimental evaluation of video support for shared work-space interaction.
306-307
1995
CHI 95 Conference Companion
http://doi.acm.org/10.1145/223355.223687
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi1995c.html#ApperleyM95
2003-08-25
Speech User Interface Design Challenges.
236
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/workshop/sb.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#BoyceMKY97
2003-08-25
0 to 50 in 4 Years: CUIS at Boeing.
85-86
1997
CHI Extended Abstracts
http://www.acm.org/sigchi/chi97/proceedings/overview/kn.htm
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi97ea.html#NeherW97
2002-12-13
Navigation as Multiscale Pointing: Extending Fitts' Model to Very High Precision Tasks.
450-457
1999
CHI
http://doi.acm.org/10.1145/302979.303128
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#GuiardBM99
2002-12-13
Quiet calls: talking silently on mobile phones.
174-187
2001
CHI
http://www.acm.org/pubs/citations/proceedings/chi/365024/p174-bly/
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#BlySN01
2003-05-07
Improving the performance of the cyberlink mental interface with ``yes / no program''.
69-76
2001
CHI
http://doi.acm.org/10.1145/365024.365038
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2001.html#DohertyCBB01
2002-12-13
Non-Keyboard QWERTY Touch Typing: A Portable Input Interface for The Mobile User.
32-39
1999
CHI
http://doi.acm.org/10.1145/302979.302984
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#GoldsteinBAT99
2002-12-13
Patterns of Entry and Correction in Large Vocabulary Continuous Speech Recognition System.
568-575
1999
CHI
http://doi.acm.org/10.1145/302979.303160
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi99.html#KaratHHK99
2002-12-13
Applying Electric Field Sensing to Human-Computer Interfaces.
280-287
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#ZimmermanSPAG95
2002-12-13
Investigating human-computer optimization.
155-162
2002
CHI
http://doi.acm.org/10.1145/503376.503405
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2002.html#ScottLK02
2002-12-13
A comparison of tools for building GOMS models.
502-509
2000
CHI
http://doi.acm.org/10.1145/332040.332485
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#BaumeisterJB00
2002-12-13
Using Cognitive Dimensions in the Classroom as a Discussion Tool for Visual Language Design.
187-188
1996
CHI Conference Companion
http://doi.acm.org/10.1145/257089.257252
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chiC96.html#Wilde96
2002-12-13
Providing Assurances in a Multimedia Interactive Environment.
250-256
1995
CHI
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi95.html#SeligmannME95
2002-12-13
Instrumental interaction: an interaction model for designing post-WIMP user interfaces.
446-453
2000
CHI
http://doi.acm.org/10.1145/332040.332473
http://www.informatik.uni-trier.de/~ley/db/conf/chi/chi2000.html#Beaudouin-Lafon00