The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase e-Policies (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1971 (19) 1972-1974 (24) 1975-1976 (22) 1977 (16) 1978-1979 (25) 1980 (20) 1981-1982 (25) 1983 (18) 1984 (19) 1985-1986 (31) 1987 (28) 1988 (28) 1989 (43) 1990 (40) 1991 (48) 1992 (60) 1993 (82) 1994 (90) 1995 (103) 1996 (121) 1997 (140) 1998 (166) 1999 (240) 2000 (344) 2001 (395) 2002 (510) 2003 (690) 2004 (832) 2005 (984) 2006 (1189) 2007 (1313) 2008 (1262) 2009 (986) 2010 (559) 2011 (524) 2012 (460) 2013 (468) 2014 (462) 2015 (493) 2016 (454) 2017 (483) 2018 (560) 2019 (611) 2020 (661) 2021 (732) 2022 (813) 2023 (757) 2024 (166)
Publication types (Num. hits)
article(6540) book(11) data(3) incollection(96) inproceedings(11253) phdthesis(197) proceedings(16)
Venues (Conferences, Journals, ...)
CoRR(1328) POLICY(378) Eur. J. Oper. Res.(208) Oper. Res.(168) WSC(156) SACMAT(148) HICSS(126) CDC(110) ICRA(105) AAMAS(104) Comput. Ind. Eng.(98) Ann. Oper. Res.(84) SAC(84) IEEE Trans. Autom. Control.(83) IPDPS(83) Reliab. Eng. Syst. Saf.(77) More (+10 of total 3391)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10474 occurrences of 3799 keywords

Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
135Derek L. Eager, Edward D. Lazowska, John Zahorjan A Comparison of Receiver-Initiated and Sender-Initiated Adaptive Load Sharing. Search on Bibsonomy SIGMETRICS The full citation details ... 1985 DBLP  DOI  BibTeX  RDF
82Wihem Arsac, Luca Compagna, Samuel Paul Kaluvuri, Serena Elisa Ponta Security validation tool for business processes. Search on Bibsonomy SACMAT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
77Phillip Krueger, Niranjan G. Shivaratri Adaptive Location Policies for Global Scheduling. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF adaptive location policies, global scheduling algorithm, transfer policy, location policy, location policies, receiver-initiated, sender-initiated, symmetrically-initiated, system workload, search activities, short transfer latency, nonadaptive policies, system instability, scheduling, performance evaluation, distributed systems, load balancing, resource allocation, distributed processing, probability, load sharing, distributed scheduling, task migration, low overhead
59James B. Cole, John Derrick, Zoran Milosevic, Kerry Raymond Author Obliged to Submit Paper before 4 July: Policies in an Enterprise Specification. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF ODP enterprise viewpoint, enterprise policies, formalising and refining policies, case study, delegation
56I-Lung Kao, Randy Chow An Extended Capability Architecture To Enforce Dynamic Access Control Policies. Search on Bibsonomy ACSAC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF extended capability architecture, dynamic access control policies, user process, object access, access request, centralized access control lists, object protection, capability based systems, static access control policies, access privileges, capability systems, access history, capability management, distributed systems, distributed system, distributed processing, security policies, access rights, object manager, object managers
54Shuo Tang, Chris Grier, Onur Aciiçmez, Samuel T. King Alhambra: a system for creating, enforcing, and testing browser security policies. Search on Bibsonomy WWW The full citation details ... 2010 DBLP  DOI  BibTeX  RDF web browser, web security, cross-site scripting
50Scott J. Harmon, Scott A. DeLoach, Robby Trace-Based Specification of Law and Guidance Policies for Multi-Agent Systems. Search on Bibsonomy ESAW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
50Danièle Beauquier, Dima Burago, Anatol Slissenko On the Complexity of Finite Memory Policies for Markov Decision Processes. Search on Bibsonomy MFCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
50Emil Lupu, Morris Sloman Conflicts in Policy-Based Distributed Systems Management. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Obligation policy, meta-policy, management roles, conflict resolution, authorization policy, policy conflict
47Alan R. Peslak Privacy policies of the largest privately held companies: a review and analysis of the forbes private 50. Search on Bibsonomy CPR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF fair information practices, private companies, privately held companies, privacy policies
47Feng Wang 0017, Lixin Gao 0001 On inferring and characterizing internet routing policies. Search on Bibsonomy Internet Measurement Conference The full citation details ... 2003 DBLP  DOI  BibTeX  RDF BGP, traffic engineering, routing policies
44Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha MacLean Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF mobile policies, electronic commerce applications, business-to-consumer applications, business-to-business applications, data access requests, distributed data representation, application-specific policies, user credentials, policy-to-data mapping context, middle tier, user management, application-specific control specification, fine-grained information, security principles, high-level definition language, mobile computing, electronic commerce, specification languages, data management, certification, message authentication, system administration, distributed computing environments, attribute certificates, multi-tier architecture
44Yongbing Zhang, Katsuya Hakozaki, Hisao Kameda, Kentaro Shimizu A performance comparison of adaptive and static load balancing in heterogeneous distributed systems. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF heterogeneous distributed system model, processing capacities, job transfer, system state-information exchange, system loads, static policies, simulation, performance evaluation, resource allocation, virtual machines, delays, distributed processing, local area networks, local area networks, performance comparison, overheads, adaptive policies, heterogeneous distributed systems, adaptive load balancing, static load balancing
44Eran Toch, Norman M. Sadeh, Jason I. Hong Generating default privacy policies for online social networks. Search on Bibsonomy CHI Extended Abstracts The full citation details ... 2010 DBLP  DOI  BibTeX  RDF default policies, location sharing technology, privacy, information sharing, online social networks
44Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyerovich, Michael Carl Tschantz Verification and change-impact analysis of access-control policies. Search on Bibsonomy ICSE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF verification, XACML, decision diagram, change-impact analysis, access-control policies
44Mohamed Ganna, Eric Horlait On Using Policies for Managing Service Provisioning in Agent-Based Heterogeneous Environments for Mobile Users. Search on Bibsonomy POLICY The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
43Vahid R. Karimi, Donald D. Cowan Verification of Access Control Policies for REA Business Processes. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
43Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor A user study of the expandable grid applied to P3P privacy policy visualization. Search on Bibsonomy WPES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF expandable grid, privacy, user interface, policy, p3p
41Fred B. Schneider Enforceable security policies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF EM security policies, SASI, security policies, proof carrying code, safety properties, security automata, inlined reference monitors
41Patricia Balbastre, Ismael Ripoll, Alfons Crespo Control tasks delay reduction under static and dynamic scheduling policies. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF control task delay reduction, dynamic scheduling policy, static scheduling policy, control action delays, dynamic scheduling policies, data acquisition interval, control action interval, DAI, control design phase, scheduling, delays, control systems, industrial application, data acquisition, data acquisition, scheduling policies, static scheduling, control algorithms, EDF scheduling, industrial control, CAI, worst case response time, task decomposition, control performances, digital control
41Simon N. Foley Supporting Secure Canonical Upgrade Policies in Multilevel Secure Object Stores. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF secure canonical upgrade policies, multilevel secure object stores, multilevel relabel policies, high-level subjects, low-level security labels, message filter model, object-oriented database, security of data
41Piero A. Bonatti, Fabio Mogavero Comparing Rule-Based Policies. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rule-based policies, Policy comparison, Policy-aware service selection, Policy compliance, Datalog query containment, Policy verification
40Jay Ligatti, Lujo Bauer, David Walker 0001 Run-Time Enforcement of Nonsafety Policies. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF monitoring, safety, Security policies, liveness, policy enforcement, security automata
40Ramprasad Ravichandran, Michael Benisch, Patrick Gage Kelley, Norman M. Sadeh Capturing Social Networking Privacy Preferences: Can Default Policies Help Alleviate Tradeoffs between Expressiveness and User Burden? Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mining default policies, Privacy, User modeling
40Mohammad Mehdi Gilanian Sadeghi, Borhanuddin Mohd Ali, Hossein Pedram, Mehdi Dehghan 0001, Masoud Sabaei A New Method for Creating Efficient Security Policies in Virtual Private Network. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IPsec policies, security policy, security requirement, virtual private network
40Lujo Bauer, Jay Ligatti, David Walker 0001 Composing security policies with polymer. Search on Bibsonomy PLDI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF composable security policies, run-time enforcement, security automata, program monitors, edit automata
40Asit Dan, Philip S. Yu Performance Analysis of Buffer Coherency Policies in a Multisystem Data Sharing Environment. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF integrated analytic models, buffer coherency policies, multisystem data sharing environment, multisystem transaction processing environment, propagation oriented approaches, coherency messages, buffer hit probability, independent reference model, CPU overhead, performance evaluation, performance analysis, transaction processing, detection, shared memory systems, response time, simulation models, notification, maximum throughput
40Soon Ae Chun, Vijayalakshmi Atluri, Nabil R. Adam Using Semantics for Policy-Based Web Service Composition. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web services, workflow, composition, policies
40Laura Bright, Avigdor Gal, Louiqa Raschid Adaptive pull-based policies for wide area data delivery. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Pull-based, update models, caching, data delivery
40Jian Ni, Danny H. K. Tsang, Sekhar Tatikonda, Brahim Bensaou Threshold and reservation based call admission control policies for multiservice resource-sharing systems. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
40Ronald van der Lingen, André van der Hoek Dissecting Configuration Management Policies. Search on Bibsonomy SCM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
40Prasad Naldurg, Roy H. Campbell, M. Dennis Mickunas Developing Dynamic Security Policies. Search on Bibsonomy DANCE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
40Xuhui Ao, Naftaly H. Minsky, Thu D. Nguyen A Hierarchical Policy Specification Language and Enforcement Mechanism for Governing Digital Enterprises. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
39David F. Ferraiolo, Vijay Atluri A meta model for access control: why is it needed and is it even possible to achieve? Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
38Brian P. Kettler, Gary Edwards, Mark Hoffman Facilitating Information Sharing Across Intelligence Community Boundaries Using Knowledge Management and Semantic Web Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Jennifer Golbeck, Aaron Mannes, James A. Hendler Semantic Web Technologies for Terrorist Network Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38 Legal Standards for Data Mining. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Krishna R. Pattipati, Peter Willett 0001, Jefferey Allanach, Haiying Tu, Satnam Singh Hidden Markov Models and Bayesian Networks for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Janusz Marecki, Nathan Schurr, Milind Tambe Agent-Based Simulations for Disaster Rescue Using the DEFACTO Coordination System. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Reda A. Ammar, Steven A. Demurjian, Ian R. Greenshields, Krishna R. Pattipati, Sanguthevar Rajasekaran Analysis of Heterogeneous Data in Ultrahigh Dimensions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Michael D. McNeese, Isaac Brewer, Rashaad E. T. Jones, Erik S. Connors Supporting Knowledge Management In Emergency Crisis Management Domains: Envisioned Designs for Collaborative Work. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Seth Greenblatt, Thayne Coffman, Sherry Marcus Behavioral Network Analysis for Terrorist Detection. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38J. Brian Sharkey, Doyle Weishar, John W. Lockwood, Ron Loui, Richard Rohwer, John Byrnes, Krishna R. Pattipati, Stephen G. Eick, David Cousins, Michael Nicoletti Information Processing at Very High Speed Data Ingestion Rates. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Kim A. Taipale Designing Technical Systems to Support Policy: Enterprise Architecture, Policy Appliances, and Civil Liberties. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Mark Lazaroff, David Snowden Anticipatory Models for Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Shuang Sun, Xiaocong Fan, John Yen Sharing Intelligence Using Information Supply Chains. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Douglas W. Oard Transcending the Tower of Babel: Supporting Access to Multilingual Information with Cross-Language Information Retrieval. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Paul A. Kogut, Yui Leung, Kathleen Ryan, Linda Gohari, Mieczyslaw M. Kokar, Jerzy Letkowski Applying Semantic Web Reasoning to Counter-Terrorism. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Jeff Jonas, John Karat Anonymized Semantic Directories and a Privacy-Enhancing Architecture for Enterprise Discovery. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Aaron B. Frank, Desmond Saunders-Newton Journey from Analysis to Inquiry: Technology and Transformation of Counter-Terrorism Analysis. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Tom Mifflin, Chris Boner, Greg Godfrey, Michael Greenblatt Detecting Terrorist Activities in the Twenty-First Century: A Theory of Detection for Transactional Networks. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Clifford Behrens, Hyong Sop Shim, Devasis Bassu Schemer: Consensus-Based Knowledge Validation and Collaboration Services for Virtual Teams of Intelligence Experts. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38David B. Skillicorn Social Network Analysis Via Matrix Decompositions. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Nazli Choucri, Stuart E. Madnick, Michael D. Siegel Improving National and Homeland Security Through Context Knowledge Representation and Reasoning Technologies. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Robert L. Popp, David Allen, Claudio Cioffi-Revilla Utilizing Information and Social Science Technology to Understand and Counter the Twenty-First Century Strategic Threat 1. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
38Paul Rosenzweig Privacy and Consequences: Legal and Policy Structures for Implementing New Counter-Terrorism Technologies and Protecting Civil Liberty. Search on Bibsonomy Emergent Information Technologies and Enabling Policies for Counter-Terrorism The full citation details ... 2006 DBLP  BibTeX  RDF
37Steffen Heinzl, Dominik Seiler, Ernst Juhnke, Bernd Freisleben Exposing validity periods of prices for resource consumption to web service users via temporal policies. Search on Bibsonomy iiWAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF temporal policies, web services, pricing, mashup, WS-Policies
37Wolfgang A. Halang, Soon-Key Jung, Bernd J. Krämer Enforcing management policies in distributed systems. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF management policies, formally definable management policies, platform independent management architecture, clerical management tasks, object-oriented class structure, rule execution, automated management tool invocation, automated policy management, object-oriented programming, resource allocation, open systems, processor scheduling, operating systems (computers), network operating systems, computer network management, production rules, open distributed systems, distributed systems management, middleware platforms
37Randy Chow, I-Lung Kao Modeling complex access control policies in distributed systems. Search on Bibsonomy FTDCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF access authorization, classified categories, state-dependent security, distributed systems, distributed processing, security policies, security of data, authorisation, access control model, access control policies, Boolean expressions
37Dan Lin 0001, Prathima Rao, Elisa Bertino, Jorge Lobo 0001 An approach to evaluate policy similarity. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XACML policies, policy similarity measure, access control policies
37David W. Chadwick, Stijn F. Lievens Enforcing "sticky" security policies throughout a distributed application. Search on Bibsonomy Middleware Security The full citation details ... 2008 DBLP  DOI  BibTeX  RDF application independent PEP, obligation enforcement, privacy policy enforcement, PDP, sticky policies
37Wolfgang Mühlbauer, Steve Uhlig, Bingjie Fu, Mickael Meulle, Olaf Maennel In search for an appropriate granularity to model routing policies. Search on Bibsonomy SIGCOMM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF BGP, inter-domain routing, routing policies
37Massimo Marchi, Alessandra Mileo, Alessandro Provetti Specification and Execution of Declarative Policies for Grid Service Selection. Search on Bibsonomy ECOWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Declarative Policies, Customization, Grid Services, User preferences, Answer Set Programming
37Kim Todd, Tabatha Verbick, Merlin Miller Policies for the digital age campus. Search on Bibsonomy SIGUCCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF privacy, information technology, policies, computing, e-mail
37Xiao-Yu Hu, Pablo Rodriguez 0001, Ernst W. Biersack Performance Study of Satellite-Linked Web Caches and Filtering Policies. Search on Bibsonomy NETWORKING The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Satellite Distribution, Filtering Policies, World-Wide Web, Web Caching
37Steven Davy, Brendan Jennings, John Strassner Using an Information Model and Associated Ontology for Selection of Policies for Conflict Analysis. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy Conflict Analysis, Policy Selection
36Knot Pipatsrisawat, Adnan Darwiche Width-Based Restart Policies for Clause-Learning Satisfiability Solvers. Search on Bibsonomy SAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Aleecia M. McDonald, Robert W. Reeder, Patrick Gage Kelley, Lorrie Faith Cranor A Comparative Study of Online Privacy Policies and Formats. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Arie Orlovsky, Danny Raz Decentralized enforcement of security policies for distributed computational systems. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, distributed system, policy enforcment
36Vincent C. Hu, Evan Martin, JeeHyun Hwang, Tao Xie 0001 Conformance Checking of Access Control Policies Specified in XACML. Search on Bibsonomy COMPSAC (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Giovanni Russello, Changyu Dong, Naranker Dulay Authorisation and Conflict Resolution for Hierarchical Domains. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
36Adam Wierman On the effect of inexact size information in size based policies. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Chang-Woo Yang, Adam Wierman, Sanjay Shakkottai, Mor Harchol-Balter Tail asymptotics for policies favoring short jobs in a many-flows regime. Search on Bibsonomy SIGMETRICS/Performance The full citation details ... 2006 DBLP  DOI  BibTeX  RDF many-sources, rate function, scheduling, large-deviations, SMART, SRPT, LAS
36Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan, Kevin I. Jones A Compositional Event & Time-Based Policy Model. Search on Bibsonomy POLICY The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Wei Zhou 0006, Christoph Meinel, Vinesh H. Raja A Framework for Supporting Distributed Access Control Policies. Search on Bibsonomy ISCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
36Spyros Kokolakis, Costas Lambrinoudakis, Dimitris Gritzalis A Knowledge-Based Repository Model for Security Policies Management. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
36Zhi Fu, Shyhtsun Felix Wu, He Huang, Kung Loh, Fengmin Gong, Ilia Baldine, Chong Xu IPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
36Francesco Parisi-Presicce, Alexander L. Wolf Foundations for Software Configuration Management Policies Using Graph Transformations. Search on Bibsonomy FASE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
34P. R. Kumar 0001 Re-entrant lines. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF thin film lines, re-entrant lines, buffer priority policies, due date policies, variance of delay, machine failures, set-up times, stability, queueing networks, scheduling policies, Manufacturing systems, semiconductor manufacturing, stochastic control, mean delay
34Sruthi Bandhakavi, Charles C. Zhang, Marianne Winslett Super-sticky and declassifiable release policies for flexible information dissemination control. Search on Bibsonomy WPES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF release policies, privacy, declassification, sticky policies
34Lisandro Zambenedetti Granville, Gustavo Augusto Faraco de Sá Coelho, Maria Janilce Bosquiroli Almeida, Liane Margarida Rockenbach Tarouco An architecture for automated replacement of QoS policies. Search on Bibsonomy ISCC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF policy definition, policy of policies, meta-policies, policy replacement automation, policy-based network management
34Yusen Lin, Sourav Bhattacharya Impact of rollback recovery to program locality of reference and page replacement policies. Search on Bibsonomy FTDCS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF page replacement policies, cache block replacement policies, fault-triggered rollback, simulation, fault tolerance, performance, memory management, checkpointing, research, system recovery, rollback recovery, locality of reference, fault propagation
34Ing-Ray Chen, Sayed Atef Banawan Modeling and Analysis of Concurrent Maintenance Policies for Data Structures Using Pointers. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF concurrent maintenance policies, state reduction method, two-dimensional Markov model, one-dimensional Markov model, concurrent data structure maintenance policies, service time per operation, priority allocation functions, binary tree data structure, 1D Markov model, 2D Markov model, performance evaluation, performance analysis, data structures, software maintenance, Markov processes, tree data structures, pointers, closed form expression
33Christer Magnusson, Louise Yngström Method for Insuring IT Risks. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF IT insurance method, IT insurance policies, estimated maximum IT loss, commercial and industrial security, risk management, security policies
33Mor Armony, Nicholas Bambos Queueing Dynamics and Maximal Throughput Scheduling in Switched Processing Systems. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF switched processing systems, cone policies, adaptive batching policies, trace-based modeling, dynamic scheduling, throughput maximization
33Fei Yan, Philip W. L. Fong Efficient IRM enforcement of history-based access control policies. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF distributed optimization protocol, history-based access control policies, language-based security, security automata, inlined reference monitors
33Laurent Vanbever, Bruno Quoitin, Olivier Bonaventure A hierarchical model for BGP routing policies. Search on Bibsonomy PRESTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network configuration, bgp, routing policies
33John W. Stamey, Ryan A. Rossi Automatically identifying relations in privacy policies. Search on Bibsonomy SIGDOC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF latent relations, ambiguities, privacy policies
33Brian S. Butler, Elisabeth Joyce, Jacqueline Pike Don't look now, but we've created a bureaucracy: the nature and roles of policies and rules in wikipedia. Search on Bibsonomy CHI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF collaboration, community, policies, policy, wikis, dynamics, wikipedia, rules
33Benjamin Aziz, Alvaro Arenas, Fabio Martinelli, Ilaria Matteucci, Paolo Mori Controlling Usage in Business Process Workflows through Fine-Grained Security Policies. Search on Bibsonomy TrustBus The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fine-grained Security Policies, Workflow Monitoring, Business Processes
33Johs Hansen Hammer, Gerardo Schneider On the Definition and Policies of Confidentiality. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF policies, confidentiality, norms
33Kim-Phuong L. Vu, Vanessa Chambers, Fredrick P. Garcia, Beth Creekmur, John Sulaitis, Deborah Nelson, Russell Pierce, Robert W. Proctor How Users Read and Comprehend Privacy Policies. Search on Bibsonomy HCI (9) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF usability, eye-tracking, privacy policies, reading comprehension
33Evan Martin, Tao Xie 0001 A fault model and mutation testing of access control policies. Search on Bibsonomy WWW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF test generation, fault model, mutation testing, access control policies
33Ian Welch, Fan Lu Policy-driven reflective enforcement of security policies. Search on Bibsonomy SAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF reflection, security policies
33Bradley Simmons, Hanan Lutfiyya Policies, grids and autonomic computing. Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2005 DBLP  DOI  BibTeX  RDF optimisation, resource management, policies, autonomic computing
33Michael Katchabaw, Hanan Lutfiyya, Michael A. Bauer 0001 Administrative Policies to Regulate Quality of Service Management in Distributed Multimedia Applications. Search on Bibsonomy MMNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Administrative policies, QoS management
33Hilla Atzmon, Roy Friedman, Roman Vitenberg Replacement Policies for a Distributed Object Caching Service. Search on Bibsonomy OTM The full citation details ... 2002 DBLP  DOI  BibTeX  RDF CORBA, Cache Replacement Policies, Object Caching
33Helge Janicke, Antonio Cau, François Siewe, Hussein Zedan Concurrent Enforcement of Usage Control Policies. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy, System Management, Usage Control, Enforcement
33Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
33Stuart G. Stubblebine, Rebecca N. Wright An Authentication Logic with Formal Semantics Supporting Synchronization, Revocation, and Recency. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF authentication logic, recent-secure authentication, reasoning about time, authentication, formal methods, computer security, security policies, clock synchronization, revocation, security analysis, protocol analysis, distributed systems security
Displaying result #1 - #100 of 18116 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license