Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/saj/saj34.bht:"
@article{DBLP:journals/saj/Bagula05, author = {Antoine B. Bagula}, title = {Hybrid traffic engineering : from Constraint Shortest Path First to Least Path Interference}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {2--10}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27986}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Bagula05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/DrewesTEHMW05, author = {Frank Drewes and Christine du Toit and Sigrid Ewert and Johanna H{\"{o}}gberg and Brink van der Merwe and Andries P. J. van der Walt}, title = {Random context tree grammars and tree transducers}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {11--25}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27985}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/DrewesTEHMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/FrankenE05, author = {Nelis Franken and Andries P. Engelbrecht}, title = {Evolving intelligent game-playing agent}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {87}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27977}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/FrankenE05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Gruner05, author = {Stefan Gruner}, title = {Report on {SAC-SE-2005} : communication}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {85--86}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27978}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Gruner05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Kourie05a, author = {Derrick G. Kourie}, title = {Editorial}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {1}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27987}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Kourie05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Laidlaw05, author = {M. G. G. Laidlaw}, title = {The construction of codes for infinite sets}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {26--32}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27984}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Laidlaw05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Olivier05, author = {Martin S. Olivier}, title = {Flocks : distributed proxies for browsing privacy}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {33--40}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27983}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Olivier05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/Rock05, author = {S. T. Rock}, title = {Quantifier interaction in the temporal structure of extended eventualities}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {41--51}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27982}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/Rock05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/UwadiaO05, author = {Charles Onuwa Uwadia and Od{\'{e}}t{\'{u}}nj{\'{\i}} {\`{A}}j{\`{a}}d{\'{\i}} Od{\'{e}}job{\'{\i}}}, title = {Optimal test-case generation for program testing : a Genetic Algorithms approach}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {52--68}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27981}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/UwadiaO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/ZielinskiV05, author = {Marek Zielinski and Lucas M. Venter}, title = {Applying mobile agents in an immune-system-based intrusion detection system}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {76--83}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27979}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/ZielinskiV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/saj/ZijlMD05, author = {Lynette van Zijl and Graham Muller and Jan Daciuk}, title = {Minimization of unary symmetric difference NFAs}, journal = {South Afr. Comput. J.}, volume = {34}, pages = {69--75}, year = {2005}, url = {http://reference.sabinet.co.za/document/EJC27980}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/saj/ZijlMD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.