The SCEAS System
Navigation Menu

Conferences in DBLP

ACM Annual Computer Science Conference (CSC) (acm)
1984 (conf/acm/1984)

  1. Towards a methodology for a design of knowledge based systems. [Citation Graph (, )][DBLP]

  2. Integrating knowledge in problem solving search procedures. [Citation Graph (, )][DBLP]

  3. Knowledge acquisition for classification expert systems. [Citation Graph (, )][DBLP]

  4. The design of the Dipmeter Advisor system. [Citation Graph (, )][DBLP]

  5. ACE: Going from prototype to product with an expert system. [Citation Graph (, )][DBLP]

  6. Artificial intelligence and software engineering: The Programmer's Apprentice project. [Citation Graph (, )][DBLP]

  7. A fifth generation approach to intelligent information retrieval. [Citation Graph (, )][DBLP]

  8. Knowledge representation and inference control of SPERIL-II. [Citation Graph (, )][DBLP]

  9. A logic interpreter to handle time and negation in logic data bases. [Citation Graph (, )][DBLP]

  10. Functional requirements for very large knowledge bases. [Citation Graph (, )][DBLP]

  11. PVS - design for a practical verification system. [Citation Graph (, )][DBLP]

  12. The evolution of an integrated testing environment by the Domain Testing Strategy. [Citation Graph (, )][DBLP]

  13. Parallel algorithms for unification and other complete problems in p. [Citation Graph (, )][DBLP]

  14. Design principles for software manufacturing tools. [Citation Graph (, )][DBLP]

  15. Application generators: Ideas for programming language extensions. [Citation Graph (, )][DBLP]

  16. A general purpose data base design. [Citation Graph (, )][DBLP]

  17. An automated software design evaluator. [Citation Graph (, )][DBLP]

  18. An approach to software design documentation. [Citation Graph (, )][DBLP]

  19. The IEEE Software Engineering standards process. [Citation Graph (, )][DBLP]

  20. Information Wheel - a framework to identify roles of information systems. [Citation Graph (, )][DBLP]

  21. A user's approach to requirements analysis of a large software system. [Citation Graph (, )][DBLP]

  22. A design framework for the ALVEY/ICL/DHSS demonstrator process. [Citation Graph (, )][DBLP]

  23. A requirement model for the 5th generation. [Citation Graph (, )][DBLP]

  24. Nial: A candidate language for fifth generation computer systems. [Citation Graph (, )][DBLP]

  25. Compiling prolog programs for parallel execution on a cellular machine. [Citation Graph (, )][DBLP]

  26. Zeus: An object-oriented distributed operating system for reliable applications. [Citation Graph (, )][DBLP]

  27. Handling of recursion in dataflow model. [Citation Graph (, )][DBLP]

  28. On the scope of static checking in definitional languages. [Citation Graph (, )][DBLP]

  29. An application of network flow programming to locate concentrators in a communication network. [Citation Graph (, )][DBLP]

  30. An associative array architecture intended for semantic network processing. [Citation Graph (, )][DBLP]

  31. Visions of future programming environments. [Citation Graph (, )][DBLP]

  32. Software and system design: VHSIC Hardware Description Language overview. [Citation Graph (, )][DBLP]

  33. Open systems standardization. [Citation Graph (, )][DBLP]

  34. Images as MAPS / MAPS from images. [Citation Graph (, )][DBLP]

  35. Interactive image understanding. [Citation Graph (, )][DBLP]

  36. Models (fractal and otherwise) for perception and generation of images. [Citation Graph (, )][DBLP]

  37. Caricatures from images. [Citation Graph (, )][DBLP]

  38. Vision, perception and imagery. [Citation Graph (, )][DBLP]

  39. Towards knowledge-based robotics systems. [Citation Graph (, )][DBLP]

  40. The emerging technology of CAD/CAM. [Citation Graph (, )][DBLP]

  41. Treating information as an asset. [Citation Graph (, )][DBLP]

  42. A national perspective on computer security. [Citation Graph (, )][DBLP]

  43. Security and audit: Needs of the business sector for security and integrity controls. [Citation Graph (, )][DBLP]

  44. User identification, access control, and audit requirements. [Citation Graph (, )][DBLP]

  45. Logging, security experts data base, and crypto key management. [Citation Graph (, )][DBLP]

  46. Security design considerations of hardware. [Citation Graph (, )][DBLP]

  47. Security considerations in system design. [Citation Graph (, )][DBLP]

  48. Contingency planning and disaster recovery. [Citation Graph (, )][DBLP]

  49. Evaluation of computer and network security systems. [Citation Graph (, )][DBLP]

  50. Wealth and jobs in the fifth new world. [Citation Graph (, )][DBLP]

  51. The impact and issues of the fifth generation: Ethical issues in new computing technologies. [Citation Graph (, )][DBLP]

  52. Truth in advertising in present and future generation computing. [Citation Graph (, )][DBLP]

  53. The ethics of macines which mimic people. [Citation Graph (, )][DBLP]

  54. Ethical questions and military dominance in next generation computing. [Citation Graph (, )][DBLP]

  55. Computing applications as social experimentation. [Citation Graph (, )][DBLP]

  56. The impact and issues of the fifth generation: Social and organization consequences of new generation technology. [Citation Graph (, )][DBLP]

  57. Workplace impacts—ai and automation: Privacy and accountability of large-scale high-capacity personal data systems. [Citation Graph (, )][DBLP]

  58. Social dimensions of reliability of complex systems. [Citation Graph (, )][DBLP]

  59. Social implications of artificial intelligence. [Citation Graph (, )][DBLP]

  60. A hierarchy for classifying AI implications. [Citation Graph (, )][DBLP]

  61. Soothsayers of the electronic age. [Citation Graph (, )][DBLP]

  62. Beyond the data processing horizon. [Citation Graph (, )][DBLP]

  63. The seventh generation. [Citation Graph (, )][DBLP]

  64. The alvey DHSS major demonstrator. [Citation Graph (, )][DBLP]

  65. The Fifth Generation grail: A survey of related research. [Citation Graph (, )][DBLP]

  66. Towards a western Fifth-Generation Computer System project. [Citation Graph (, )][DBLP]

  67. Blueprints for the computer city: The quest for an architect's computer. [Citation Graph (, )][DBLP]

  68. Delivering the word—integrating publications technologies. [Citation Graph (, )][DBLP]

  69. Integrating uncertainty into a language for knowledge based systems. [Citation Graph (, )][DBLP]

  70. Design of an ATN generator/modifier for supporting a communication prosthesis. [Citation Graph (, )][DBLP]

  71. Dialogue management in the personal sequential inference machine (PSI). [Citation Graph (, )][DBLP]

  72. Modern educational techniques - high tech and the traditional approach. [Citation Graph (, )][DBLP]

  73. AFIPS secondary education curriculum in information technology. [Citation Graph (, )][DBLP]

  74. National educational computing policy alternatives. [Citation Graph (, )][DBLP]

  75. Proposed curriculum for programs leading to teacher certification in computer science. [Citation Graph (, )][DBLP]

  76. Computer science for secondary schools: Course content. [Citation Graph (, )][DBLP]

  77. Government agencies' activities in education. [Citation Graph (, )][DBLP]

System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002