Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
2386
search results - page 6 / 478
»
Database Security 2000
Sort
relevance
views
votes
recent
update
View
thumb
title
55
click to vote
PODS
2000
ACM
106
views
Database
»
more
PODS 2000
»
Verification of Relational Transducers for Electronic Commerce
15 years 1 months ago
Download
cimic.rutgers.edu
Marc Spielmann
claim paper
Read More »
66
click to vote
VLDB
2000
ACM
128
views
Database
»
more
VLDB 2000
»
Design and Implementation of a Genetic-Based Algorithm for Data Mining
15 years 1 months ago
Download
ir.iit.edu
Sunil Choenni
claim paper
Read More »
73
click to vote
VLDB
2000
ACM
132
views
Database
»
more
VLDB 2000
»
Data Mining in the Bioinformatics Domain
15 years 1 months ago
Download
www.vldb.org
Shalom Tsur
claim paper
Read More »
57
click to vote
ESE
2000
74
views
Database
»
more
ESE 2000
»
An Empirical Investigation Of Software Project Schedule Behaviour
14 years 9 months ago
Download
homepages.feis.herts.ac.uk
Austen Rainer
claim paper
Read More »
62
click to vote
ESE
2000
102
views
Database
»
more
ESE 2000
»
Hints for Reviewing Empirical Work in Software Engineering
14 years 9 months ago
Download
alarcos.inf-cr.uclm.es
Walter F. Tichy
claim paper
Read More »
« Prev
« First
page 6 / 478
Last »
Next »