|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 15 keywords
|
|
|
Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
38 | Helen Malin |
Evaluating student employee performance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 34th Annual ACM SIGUCCS Conference on User Services 2006, Edmonton, Alberta, Canada, November 5-8, 2006, pp. 214-218, 2006, ACM, 1-59593-438-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
computer consultants, full-disclosure, performance record, real-time, standards, training, transformation, statistics, digital, customer service, professional development, mentoring, evaluation system, cumulative |
30 | Bruce Schneier |
Locks and Full Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Secur. Priv. ![In: IEEE Secur. Priv. 1(2), pp. 88, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Paolo D'Arco, Alfredo De Santis |
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings, pp. 27-39, 2008, Springer, 978-3-540-68159-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
19 | S. Matthew English, Ehsan Nezhadian |
Conditions of Full Disclosure: The Blockchain Remuneration Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/1703.04196, 2017. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP BibTeX RDF |
|
19 | S. Matthew English, Ehsan Nezhadian |
Conditions of Full Disclosure: The Blockchain Remuneration Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroS&P Workshops ![In: 2017 IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2017, Paris, France, April 26-28, 2017, pp. 64-67, 2017, IEEE, 978-1-5386-2244-5. The full citation details ...](Pics/full.jpeg) |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Michael Parmisano Canares |
Opening the local: full disclosure policy and its impact on local governments in the Philippines. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance, ICEGOV 2014, Guimaraes, Portugal, October 27-30, 2014, pp. 89-98, 2014, ACM, 978-1-60558-611-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou |
Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 6(12), pp. 1490-1495, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Jeremy Pitt, Julia Schaumeier |
Provision and Appropriation of Common-Pool Resources without Full Disclosure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PRIMA ![In: PRIMA 2012: Principles and Practice of Multi-Agent Systems - 15th International Conference, Kuching, Sarawak, Malaysia, September 3-7, 2012. Proceedings, pp. 199-213, 2012, Springer, 978-3-642-32728-5. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Karen Hogenboom |
Full Disclosure: The Perils and Promise of Transparency, Archon Fung, Mary Graham, David Weil. Cambridge University Press, New York (2008). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Gov. Inf. Q. ![In: Gov. Inf. Q. 27(3), pp. 309, 2010. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Wilton C. Levine, Mark A. Meyer, Marie T. Egan, Philip Brzezinski, Jeffrey Robbins, Henry Chueh, Warren S. Sandberg |
Development of a Vendor Agnostic, Full Disclosure System for Capture, Display, and Storage of Operative Systems Data. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AMIA ![In: AMIA 2006, American Medical Informatics Association Annual Symposium, Washington, DC, USA, November 11-15, 2006, 2006, AMIA. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
11 | Tieyan Li, Robert H. Deng |
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Second International Conference on Availability, Reliability and Security, ARES 2007, The International Dependability Conference - Bridging Theory and Practice, April 10-13 2007, Vienna, Austria, pp. 238-245, 2007, IEEE Computer Society, 0-7695-2775-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Paul Brebner, Jeffrey Gosper |
J2EE infrastructure scalability and throughput estimation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 31(3), pp. 30-36, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
ECperf benchmark, Enterprise Java Beans (EJB), scalability, throughput, J2EE |
11 | Paul Brebner, Jeffrey Gosper |
How scalable is J2EE technology? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 28(3), pp. 4, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Enterprise Java Beans (EJB), scale-up, scalability, J2EE, scale-out |
11 | Ramesh Bhashyam |
TCP-D - The Challenges, Issues and Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 25(4), pp. 89-93, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #14 of 14 (100 per page; Change: )
|
|