The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase full-disclosure (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1996-2017 (14)
Publication types (Num. hits)
article(7) inproceedings(7)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 17 occurrences of 15 keywords

Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
38Helen Malin Evaluating student employee performance. Search on Bibsonomy SIGUCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF computer consultants, full-disclosure, performance record, real-time, standards, training, transformation, statistics, digital, customer service, professional development, mentoring, evaluation system, cumulative
30Bruce Schneier Locks and Full Disclosure. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Paolo D'Arco, Alfredo De Santis Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. Search on Bibsonomy AFRICACRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19S. Matthew English, Ehsan Nezhadian Conditions of Full Disclosure: The Blockchain Remuneration Model. Search on Bibsonomy CoRR The full citation details ... 2017 DBLP  BibTeX  RDF
19S. Matthew English, Ehsan Nezhadian Conditions of Full Disclosure: The Blockchain Remuneration Model. Search on Bibsonomy EuroS&P Workshops The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
19Michael Parmisano Canares Opening the local: full disclosure policy and its impact on local governments in the Philippines. Search on Bibsonomy ICEGOV The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
19Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
19Jeremy Pitt, Julia Schaumeier Provision and Appropriation of Common-Pool Resources without Full Disclosure. Search on Bibsonomy PRIMA The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Karen Hogenboom Full Disclosure: The Perils and Promise of Transparency, Archon Fung, Mary Graham, David Weil. Cambridge University Press, New York (2008). Search on Bibsonomy Gov. Inf. Q. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
19Wilton C. Levine, Mark A. Meyer, Marie T. Egan, Philip Brzezinski, Jeffrey Robbins, Henry Chueh, Warren S. Sandberg Development of a Vendor Agnostic, Full Disclosure System for Capture, Display, and Storage of Operative Systems Data. Search on Bibsonomy AMIA The full citation details ... 2006 DBLP  BibTeX  RDF
11Tieyan Li, Robert H. Deng Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. Search on Bibsonomy ARES The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
11Paul Brebner, Jeffrey Gosper J2EE infrastructure scalability and throughput estimation. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF ECperf benchmark, Enterprise Java Beans (EJB), scalability, throughput, J2EE
11Paul Brebner, Jeffrey Gosper How scalable is J2EE technology? Search on Bibsonomy ACM SIGSOFT Softw. Eng. Notes The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Enterprise Java Beans (EJB), scale-up, scalability, J2EE, scale-out
11Ramesh Bhashyam TCP-D - The Challenges, Issues and Results. Search on Bibsonomy SIGMOD Rec. The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #14 of 14 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license