The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jim Hughes: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Jim Hughes, Steven Jones
    Reflections on the use of grounded theory in interpretive information systems research. [Citation Graph (0, 0)][DBLP]
    ECIS, 2003, pp:- [Conf]
  2. Peter Steenkiste, Brian Zill, H. T. Kung, Steven Schlick, Jim Hughes, Bob Kowalski, John Mullaney
    A Host Interface Architecture for High-Speed Networks. [Citation Graph (0, 0)][DBLP]
    HPN, 1992, pp:31-46 [Conf]
  3. Jim Hughes
    IEEE Standard for Encrypted Storage. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2004, v:37, n:11, pp:110-112 [Journal]
  4. Jim Hughes, Jack Cole
    Security in Storage. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:1, pp:124-125 [Journal]
  5. Ting Chen, Q. H. Wu, Reza Rahmani-Torkaman, Jim Hughes
    A pseudo top-hat mathematical morphological approach to edge detection in dark regions. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition, 2002, v:35, n:1, pp:199-210 [Journal]

Search in 0.001secs, Finished in 0.001secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002