default search action
Search dblp for Publications
export results for "toc:db/journals/ac/ac98.bht:"
@article{DBLP:journals/ac/BechikhKSG15, author = {Slim Bechikh and Marouane Kessentini and Lamjed Ben Said and Khaled Gh{\'{e}}dira}, title = {Chapter Four - Preference Incorporation in Evolutionary Multiobjective Optimization: {A} Survey of the State-of-the-Art}, journal = {Adv. Comput.}, volume = {98}, pages = {141--207}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.03.001}, doi = {10.1016/BS.ADCOM.2015.03.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/BechikhKSG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/Hurson15, author = {Ali R. Hurson}, title = {Preface}, journal = {Adv. Comput.}, volume = {98}, pages = {vii--viii}, year = {2015}, url = {https://doi.org/10.1016/S0065-2458(15)00042-X}, doi = {10.1016/S0065-2458(15)00042-X}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/Hurson15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/MarinescuSGP15, author = {Raluca Marinescu and Cristina Seceleanu and H{\'{e}}l{\`{e}}ne Le Guen and Paul Pettersson}, title = {Chapter Three - {A} Research Overview of Tool-Supported Model-based Testing of Requirements-based Designs}, journal = {Adv. Comput.}, volume = {98}, pages = {89--140}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.03.003}, doi = {10.1016/BS.ADCOM.2015.03.003}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ac/MarinescuSGP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/RatkovicBUCM15, author = {Ivan Ratkovic and Nikola Bezanic and Osman S. {\"{U}}nsal and Adri{\'{a}}n Cristal and Veljko Milutinovic}, title = {Chapter One - An Overview of Architecture-Level Power- and Energy-Efficient Design Techniques}, journal = {Adv. Comput.}, volume = {98}, pages = {1--57}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.04.001}, doi = {10.1016/BS.ADCOM.2015.04.001}, timestamp = {Wed, 20 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/RatkovicBUCM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ac/WoodardSH15, author = {Mark Woodard and Sahra Sedigh Sarvestani and Ali R. Hurson}, title = {Chapter Two - {A} Survey of Research on Data Corruption in Cyber-Physical Critical Infrastructure Systems}, journal = {Adv. Comput.}, volume = {98}, pages = {59--87}, year = {2015}, url = {https://doi.org/10.1016/bs.adcom.2015.03.002}, doi = {10.1016/BS.ADCOM.2015.03.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ac/WoodardSH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.