Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("Roberts, Fred")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 72

  • Page / 3
Export

Selection :

  • and

How hard Is it to determine if a graph has a 2-role assignment?ROBERTS, Fred S; LI SHENG.Networks (New York, NY). 2001, Vol 37, Num 2, pp 67-73, issn 0028-3045Article

The center function on treesMCMORRIS, F. R; ROBERTS, Fred S; CHI WANG et al.Networks (New York, NY). 2001, Vol 38, Num 2, pp 84-87, issn 0028-3045Article

Phlegmasia cerulea dolens of the upper extremityBOLITHO, D. Glynn; ELWOOD, Eric T; ROBERTS, Fred et al.Annals of plastic surgery. 2000, Vol 45, Num 6, pp 644-646, issn 0148-7043Article

Irreversible k-threshold processes : Graph-theoretical threshold models of the spread of disease and of opinionDREYER, Paul A; ROBERTS, Fred S.Discrete applied mathematics. 2009, Vol 157, Num 7, pp 1615-1627, issn 0166-218X, 13 p.Article

No-hole L(2, 1 )-coloringsFISHBUM, Peter C; ROBERTS, Fred S.Discrete applied mathematics. 2003, Vol 130, Num 3, pp 513-519, issn 0166-218X, 7 p.Article

Characterizations of consistent marked graphsROBERTS, Fred S; SHAOJI XU.Discrete applied mathematics. 2003, Vol 127, Num 2, pp 357-371, issn 0166-218X, 15 p.Conference Paper

Full color theorems for L(2,1)-coloringsFISHBURN, Peter C; ROBERTS, Fred S.SIAM journal on discrete mathematics (Print). 2007, Vol 20, Num 2, pp 428-443, issn 0895-4801, 16 p.Article

Design principles of coordinated multi-incident emergency response systemsRUI CHEN; SHARMAN, Raj; RAGHAV RAO, H et al.Lecture notes in computer science. 2005, pp 81-98, issn 0302-9743, isbn 3-540-25999-6, 18 p.Conference Paper

Learning classifiers for misuse detection using a bag of system calls representationKANG, Dae-Ki; FULLER, Doug; HONAVAR, Vasant et al.Lecture notes in computer science. 2005, pp 511-516, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Multi-modal biometrics with PKI technologies for border control applicationsKWON, Taekyoung; MOON, Hyeonjoon.Lecture notes in computer science. 2005, pp 99-114, issn 0302-9743, isbn 3-540-25999-6, 16 p.Conference Paper

An ontological approach to the document access problem of insider threatALEMAN-MEZA, Boanerges; BURNS, Phillip; EAVENSON, Matthew et al.Lecture notes in computer science. 2005, pp 486-491, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Collecting and analyzing the presence of terrorists on the web : A case study of jihad websitesREID, Edna; JIALUN QIN; YILU ZHOU et al.Lecture notes in computer science. 2005, pp 402-411, issn 0302-9743, isbn 3-540-25999-6, 10 p.Conference Paper

Forecasting terrorism : Indicators and proven analytic techniquesKHALSA, Sundri K.Lecture notes in computer science. 2005, pp 561-566, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Thematic indicators derived from world news reportsBEST, Clive; VAN DER GOOT, Erik; DE PAOLA, Monica et al.Lecture notes in computer science. 2005, pp 436-447, issn 0302-9743, isbn 3-540-25999-6, 12 p.Conference Paper

Incident and casualty databases as a tool for understanding low-intensity conflictsRADLAUER, Don.Lecture notes in computer science. 2005, pp 153-170, issn 0302-9743, isbn 3-540-25999-6, 18 p.Conference Paper

CODESSEAL : Compiler/FPGA approach to secure applicationsGELBART, Olga; OTT, Paul; NARAHARI, Bhagirath et al.Lecture notes in computer science. 2005, pp 530-535, issn 0302-9743, isbn 3-540-25999-6, 6 p.Conference Paper

Automatically determining an anonymous Author's native languageKOPPEL, Moshe; SCHLER, Jonathan; ZIGDON, Kfir et al.Lecture notes in computer science. 2005, pp 209-217, issn 0302-9743, isbn 3-540-25999-6, 9 p.Conference Paper

Modeling and multiway analysis of chatroom tensorsACAR, Evrim; QAMTEPE, Seyit A; KRISHNAMOORTHY, Mukkai S et al.Lecture notes in computer science. 2005, pp 256-268, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper

A conceptual model of counterterrorist operationsDAVIS, David; FRENDAK-BLUME, Allison; WHEELER, Jennifer et al.Lecture notes in computer science. 2005, pp 305-315, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper

Digging in the details : A case study in network data miningGALLOWAY, John; SIMOFF, Simeon J.Lecture notes in computer science. 2005, pp 14-26, issn 0302-9743, isbn 3-540-25999-6, 13 p.Conference Paper

Active automation of the DITSCAPSEOK WON LEE; GANDHI, Robin A; AHN, Gail-Joon et al.Lecture notes in computer science. 2005, pp 479-485, issn 0302-9743, isbn 3-540-25999-6, 7 p.Conference Paper

Risk management using behavior based bayesian networksDANTU, Ram; KOLAN, Prakash.Lecture notes in computer science. 2005, pp 115-126, issn 0302-9743, isbn 3-540-25999-6, 12 p.Conference Paper

Private mining of association rulesZHAN, Justin; MATWIN, Stan; LIWU CHANG et al.Lecture notes in computer science. 2005, pp 72-80, issn 0302-9743, isbn 3-540-25999-6, 9 p.Conference Paper

Integrating private databases for data analysisKE WANG; FUNG, Benjamin C. M; GUOZHU DONG et al.Lecture notes in computer science. 2005, pp 171-182, issn 0302-9743, isbn 3-540-25999-6, 12 p.Conference Paper

Automatic extraction of deceptive behavioral cues from videoMESERVY, Thomas O; JENSEN, Matthew L; KRUSE, John et al.Lecture notes in computer science. 2005, pp 198-208, issn 0302-9743, isbn 3-540-25999-6, 11 p.Conference Paper

  • Page / 3