default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 1998
- Roberta Brody:
The conditions and consequences of profiling in commercial and governmental settings. ISTAS 1998: 148-154 - Joy M. Callan:
Access to computers: is there a gender gap? ISTAS 1998: 94-97 - R. B. Everetts:
Experiences in distance learning from a student's perspective. ISTAS 1998: 155-160 - Wayne Fisher, Slawomir Wesolkowski:
How to determine who is impacted by the introduction of new technology into an organization. ISTAS 1998: 116-122 - J. A. Griffin:
Privacy and security in the Digital Age. ISTAS 1998: 135-137 - D. J. Heindl:
A framework for applying technology to learning. ISTAS 1998: 33-36 - Leif Isaksen, John M. Peschon:
The dynamics of an independent city. ISTAS 1998: 123-128 - Paul Johnson, Hugh Jack:
The impact of the WWW on engineering education. ISTAS 1998: 7-10 - Joseph M. Kayany, Paul Yelsma:
Gender and generational differences in the use of computer-mediated communications in households. ISTAS 1998: 85-93 - Tomas A. Lipinski:
Information warfare American style: the battle for page numbers, real time event data and other factual information. Recent legal developments. ISTAS 1998: 105-115 - Alessandro Lofaro:
The cultural factor in information warfare. ISTAS 1998: 11-17 - Meighan Maguire:
The role of municipal officials in telephone system development: San Francisco, 1893-1915. ISTAS 1998: 59-71 - Aaron D. Manire:
Negative externalities on the Internet: the case of recombinant bovine somatotropin. ISTAS 1998: 24-27 - Massimo Mauro:
Cultural issues in planet-wide Internet management and administration. ISTAS 1998: 167-169 - John E. McEneaney:
Are less able readers disadvantaged by reading in electronic environments? ISTAS 1998: 28-32 - Michael D. McNeese:
Teamwork, team performance, and team interfaces: historical precedence and application significance of the research at the USAF Fitts Human Engineering Division. ISTAS 1998: 161-166 - Gene Moriarty:
Toward an engineering ethics for the global information era. ISTAS 1998: 52-57 - Brian M. O'Connell:
Parallel processing: the private creation of digital "law". ISTAS 1998: 129-134 - D. O'Neill, Chuck Huff:
Ensuring universal access to telecommunications technologies for all citizens: equity vs. economic considerations. ISTAS 1998: 170-175 - John M. Peschon, Leif Isaksen:
Globalization versus independent cities: what is best? ISTAS 1998: 72-84 - Jeff Robbins:
Intensity impact of its escalation on people, society and the environment. ISTAS 1998: 98-104 - Richard S. Rosenberg:
Privacy protection on the Internet: the marketplace versus the state. ISTAS 1998: 138-147 - Junho Song, Lulu Rodriguez:
"Abetting the enemy": the repercussions of a Website-based information campaign to assist the flood victims of North Korea. ISTAS 1998: 18-23 - C. A. Welch:
Characteristics correlated with an individual's predisposition to making a computer-related ethical judgment. ISTAS 1998: 44-51 - William Wresch:
Invisible Africa: information traffic patterns as illustrated by technical training, the Internet, African mail systems, Baywatch, and books. ISTAS 1998: 1-6 - Walter W. Zessner:
Knowledge and information structuring: projecting a dynamic and transformative frame of reference. ISTAS 1998: 37-43 - Wiring the World - The Impact of Information Technology on Society: Proceedings of the 1998 International Symposium on Technology and Society, ISTAS 1998, South Bend, IN, USA, June 12-13, 1998. IEEE 1998, ISBN 0-7803-4327-1 [contents]
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-04 07:23 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint