The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP World Computer Congress (ifip)
1992 (conf/ifip/1992-2)

  1. Ferran Ruiz i Tarragó
    Educational Telecommunications Services: A Case Study on an Integrated Approach. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:3-9 [Conf]
  2. Jordi Castells, Guillem Carreras, Jaume Porta, Jordi Bertran, Xavier Jordà
    Telematic Services in Catalan Schools: Working Environment and Achievements. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:10-16 [Conf]
  3. Benita Compostela, Henk Sligte
    E-mail as an Educational Tool in Learning Statistics. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:17-23 [Conf]
  4. Hock-Guan Tan
    ISDN Interactive Distance Learning - A Step Closer To Near Paperless Learning Environment? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:24-30 [Conf]
  5. Geoff Cumming
    Where is the ELITE: Excellent Liberal I. T. Education? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:31-44 [Conf]
  6. Robert Behling, Wallace Wood
    Mapping a Microcomputer Strategy for Informatics Education. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:45-51 [Conf]
  7. H. C. Harrison, Gong Oizhong
    Managing End-User Computing: A Systematic View. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:52-58 [Conf]
  8. Thierry Nodenot, Guy Gouardères
    MAGE: A Methodological Framework for the Cooperative Development of Educational Software. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:59-65 [Conf]
  9. Wes Regian, Gerald Pitts
    A Fuzzy Logic-Based Intelligent Tutoring System (ITS). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:66-72 [Conf]
  10. Sylvia Willie
    Takeaway Learning Resources for Information Technology Courses. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:73-79 [Conf]
  11. Baruch Offir, Yaacov J. Katz
    Computer-Related Attitudes and Self-Image as a Function of Students' Age. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:80-84 [Conf]
  12. Laura R. Winer, Marion A. Barfurth
    In Support of Children: Research on Learning with Computers. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:85-92 [Conf]
  13. Nam Won Suh
    Reorganization of Management Information Education In Light of the Advent of EUC/UF. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:93-99 [Conf]
  14. C. James Bacon
    A Model for Teaching the Management of Information Systems & Technology. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:100-106 [Conf]
  15. Stephen D. Franklin
    Academic Computing Centers as Strategic University Resources. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:107-115 [Conf]
  16. Ali Mili, Noureddine Boudriga
    Computers in the Classroom: A National Proposal. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:116-122 [Conf]
  17. Abdallah D. Abdallah, Adnan H. Yahya
    University Computer Services: A Third World Experience. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:123-129 [Conf]
  18. Bernard Dumond
    A National Survey of the Pedagogical Uses of Informatics in French Universities. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:130-136 [Conf]
  19. C. Dianne Martin, H. J. Holz
    Integrating Social Impact and Ethics Issues Across the Computer Science Curriculum. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:137-143 [Conf]
  20. Tom J. van Weert
    Application Oriented Informatics and Informational Disciplines: A Symbiosis Briding the Gap. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:144-150 [Conf]
  21. Judith H. Hammond
    Harmonising Information Technology Curricula with the Needs of Industry: An Australian Approach. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:151-157 [Conf]
  22. Robert Lewis
    Strategies for Research - Integrating Outcomes into Practice. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:158-166 [Conf]
  23. Lone Dirckinck-Holmfeld, Janni Nielsen
    Visual Operational Thinking and Communicative Competence - A Prerequisiste for Bringing Multimedia Network Systems and Learners into Action. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:167-173 [Conf]
  24. Evgenia Sendova
    Enhancing the Scientist in the Pupil: A Computer Environment Supporting Mathematical Discoveries in the Classroom. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:174-180 [Conf]
  25. Andrew C. Jones
    Should Smalltalk be Used in Educational Research? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:181-187 [Conf]
  26. N. Hoskin, R. M. Aiken
    Co-Explainer: A Machine-Learning Companion. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:188-196 [Conf]
  27. J. Anderson
    Courseware to Help Readers Trace the Ties in Text as an Aid to Comprehension. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:197-203 [Conf]
  28. Igor N. Sinitsyn
    New Intellectual Software for Statistical Informatics Education and Research. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:204-210 [Conf]
  29. Bent B. Andresen
    Knowledge Based Systems in Education: An Instructional Method that Places the Responsibility for Learning on the Students. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:211-216 [Conf]
  30. Mohand-Said Hacid, Christine Bonnet, Jacques Kouloumdjian
    Knowledge-Based Simulation in Memory Re-Education. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:217-223 [Conf]
  31. A. M. Bruin
    A Century after Lady Lovelace' Tragedy. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:224-232 [Conf]
  32. Vasilios Makrakis
    Cross-Cultural Gender Differences in Student Self-Efficacy: The Impact of Culture. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:233-238 [Conf]
  33. C. Dianne Martin
    Addressing the gender Gap in Informatics Education. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:239-245 [Conf]
  34. Dirk Meyerhoff, Monika Müllerburg
    Structured Hypertext Applied to Software Measurement. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:246-252 [Conf]
  35. Alfred Bork, Bertrand Ibrahim, Bernard Levrat, Alastair Milne, Rika Yoshii
    The Irvine-Geneva Course Development System. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:253-261 [Conf]
  36. Luis Osin
    A Complete Computerized Instructional System and Its Authoring Facility. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:262-269 [Conf]
  37. Ricardo A. Baeza-Yates, David A. Fuller, José A. Pino
    Innovation as a Critical Success Factor for the Development of an Information Technology Industry in Chile. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:273-280 [Conf]
  38. Elrique Calderón Alzati, Elvia Martinez Viveros, Daniel Cazes
    Informatics and Democracy. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:281-287 [Conf]
  39. José A. Pino
    Information Technology Usage and Industry in Developing Countries. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:288- [Conf]
  40. Subhash C. Bhatnagar
    Informatics and Development. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:289- [Conf]
  41. M. Korpela
    Systems Development for Development - Is It Possible, How, By Whom? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:290- [Conf]
  42. Mayuri Odedra
    African Development Through Information Technology? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:291- [Conf]
  43. Sam Lanfranco
    Participant: Panel on Informatics and Development. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:292- [Conf]
  44. T. M. Waema, A. J. Rodrigues
    Computer-Based Information Systems in Their Social Context: Use of Different Perspectives. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:293- [Conf]
  45. Jacques Berleur
    Risk and Vulnerability in an Information and Artificial Society. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:294-313 [Conf]
  46. Simone Fischer-Hübner, Louise Yngström, Jan Holvast
    Addressing Vulnerability and Privacy Problems generated by the Use of IT-Security Mechanisms. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:314-321 [Conf]
  47. Ibibia Dabipi, Husam Yaghi, Issam Qasem
    Human Factors In Computer Security. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:322-328 [Conf]
  48. Ryan Tewari
    How Vulnerable is Information Society? A Sociological Approach. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:329-335 [Conf]
  49. Marc van Lieshout, Mieke Massink
    Responsible Scientists - A Social-Constructivist Approach. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:336-343 [Conf]
  50. Julie Cameron, Roger Clarke, Simon Davies, Agnes Jackson, Mark Prentice, Brian Regan
    Ethics, Vulnerability and Information Technology (IT). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:344-350 [Conf]
  51. Richard Sizer
    An IFIP Code of Ethics - Some of the Issues Involved. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:351-354 [Conf]
  52. K. A. Duncan
    A Perspective on Social Responsibility for the Computing Community. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:355-362 [Conf]
  53. Andrew B. Morris
    Ethics and Information System Practice. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:363-369 [Conf]
  54. Blagovest Sendov
    Towards an IFIP Frame Code of Ethics (Panel). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:370- [Conf]
  55. Harold Sackman
    Aims and Scope of the Draft IFIP Code of Ethics (Panel). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:371- [Conf]
  56. John A. N. Lee
    Towards an IFIP Frame Code of Ethics (Panel). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:372- [Conf]
  57. C. Dianne Martin, D. H. Martin
    Efficacy of Ethics Codes for Computer Professionals (panel). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:373- [Conf]
  58. Bryan Niblett
    Legal Aspects of the Information Society. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:374-376 [Conf]
  59. Wolfgang Kilian
    Legal Apects of Data Security. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:377-384 [Conf]
  60. Martin Wasik
    Legal Control of IT Misuse: The Limited Relevance of the Criminal Law. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:385-392 [Conf]
  61. Henrik Kaspersen
    Security Mearures, Standardisation and the Law. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:393-399 [Conf]
  62. Herbert Kubicek
    Network(er)s at Risk: The Fairy-Tale of Invulerability of Computer Supported Work. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:400-418 [Conf]
  63. Pertti Järvinen
    Impacts of Electronic Markets on Work. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:419-425 [Conf]
  64. S. Parasuraman, Indramani L. Singh, Robert Molloy, Raja Parasuraman
    Automation-Related Complacency: A Source of Vulnerability in Contemporary Organizations. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:426-432 [Conf]
  65. Ina Wagner
    Vulnerability of Computer Systems: Establishing Organizational Accountability. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:433-439 [Conf]
  66. Harold Joseph Highland
    Perspectives in Information Technology Security. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:440-446 [Conf]
  67. Morrie Gasser, Charles Kaufman, J. Linn, Y. Le Roux, Joseph Tardo
    DASS: Distributed Authentication Security Service. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:447-456 [Conf]
  68. Snehamay Banerjee, Damodar Y. Golhar
    Security Issues in EDI Environment. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:457-463 [Conf]
  69. S. H. Banks
    Security Policy. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:464-471 [Conf]
  70. Tsau Young Lin
    Attribute Based Data Model and Polyinstantiation. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:472-478 [Conf]
  71. Mike Burmester, Yvo Desmedt
    Zero-Knowledge Based Identification: From a Theoretical Concept Towards a Practical Token. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:479-485 [Conf]
  72. Peter Lipp
    Security in Local Area Networks. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:486-493 [Conf]
  73. Felix van Rijn, Kresten Bjerg, Gisela Frerk
    Perspectives on Home-Oriented Informatics and Telematics. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:494-507 [Conf]
  74. Andy Sloane
    Vulnerability in the Electronic Cottage - Electronic Data Interchange and the Electronic Cottage (Panel). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:508- [Conf]
  75. Andrew Clement
    Reducing the Vulnerability of Women in an Information Society: Enlarging Information Systems Perspectives (Panel). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:509- [Conf]
  76. Siv Friis
    Vulnerability and Gender Issues in Information Systems Design seen in a Euro-business Perspective (Panel). [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:510- [Conf]
  77. Y. Radai
    Checksumming Techniques for Anti-Viral Purposes. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:511-517 [Conf]
  78. Ernst Piller
    Generation of Secure Passwords by the User. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:518-524 [Conf]
  79. Ralf C. Hauser, E. Stewart Lee
    Reducing the Proliferation of Passwords in Distributed Systems. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:525-531 [Conf]
  80. Nikos Alexandris, Mike Burmester, Vassilios Chrissikopoulos
    An Efficient Public Key Distribution System. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:532-539 [Conf]
  81. Yasushi Mutoh, Kazuyuki Takagi, Ken-ichi Okada, Yutaka Matsushita
    Group-Oriented Key Management and Authentication Methods. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:540-546 [Conf]
  82. Hua Chang, Ostap Monkewich, William A. McCrum
    Implementation of Security Functions into File Transfer, Access and Management Protocol. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:547-553 [Conf]
  83. Lance J. Hoffman
    Reducing Society's Vulnerability as Computers and Networks Proliferate. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:554-563 [Conf]
  84. Roger Clarke
    Extra-Organisational Systems: A Challenge to the Software Engineering Paradigm. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:564-570 [Conf]
  85. Yannis Skulikaris
    Artificial Intelligence Systems and Patents - the Challenge. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:571-578 [Conf]
  86. Michael Gehrke, Andreas Pfitzmann, Kai Rannenberg
    Information Technology Security Evaluation Criteria (ITSEC) - a Contribution to Vulnerability? [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:579-587 [Conf]
  87. Klaus Brunnstein
    Perspectives of the Vulnerability of IT-based Societies. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:588-592 [Conf]
  88. Bernd Page
    Environmental Protection as a Challenge to Applied Informatics - A Workshop Introduction. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:595-604 [Conf]
  89. Ian K. Crain
    The Evolving Technology For Environmental Decision-Making - Towards the Environmental Decision Support System. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:605-614 [Conf]
  90. Werner Pillmann, D. J. Kahn
    Distributed Environmental Data Compendia. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:615-624 [Conf]
  91. A. M. Din
    Global Environmental Change Data and Modelling. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:625-634 [Conf]
  92. L. Buisson, Roger Martin-Clouaire, Jean Luc Wybo
    Artificial Intelligence and Environmental Protection: A Survey of Selected Applications in France. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:635-644 [Conf]
  93. Andreas Jaeschke, Werner Geiger, Matthias Reißfelder, Rainer Weidemann
    The XUMA Expert System "Enviromental Hazards from Contamined Sites". [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:645-654 [Conf]
  94. R. Becker, Detlef Küpper, M. Strobel, Dietmar Rösner
    A Cooperative, Natural Language Enviromental Information Systems. [Citation Graph (1, 0)][DBLP]
    IFIP Congress (2), 1992, pp:655-665 [Conf]
  95. Catherine M. Beise, Nanette Meeks Griffith
    Application of Fourth Generation Prototyping Tools and Methods: A Municipal Industrial Water Quality Monitoring System. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:666-675 [Conf]
  96. J. Fürst
    Integration of GIS into Decision Support Systems for Management of Ground Water. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:676-684 [Conf]
  97. U. Bosler, D. Squires, R. Tsankova, W. Ziebarth
    Linking Environmental Studies and IT - a East-West Project in Bulgaria, Germany and the United Kingdom. [Citation Graph (0, 0)][DBLP]
    IFIP Congress (2), 1992, pp:685-886 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002