|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 574 occurrences of 458 keywords
|
|
|
Results
Found 8388 publication records. Showing 8388 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
74 | Ronald Joe Stanley, Sanjeev Agarwal, Satish Somanchi |
The impact of false alarm mitigation on surface landmine detection in MWIR imagery. |
Pattern Anal. Appl. |
2004 |
DBLP DOI BibTeX RDF |
Airborne, Circular harmonics, False alarm mitigation, Landmine, RX, Image Processing, Transform |
74 | Dimitrios Georgakopoulos 0001, Hans Schuster, Donald Baker, Andrzej Cichocki |
Managing Escalation of Collaboration Processes in Crisis Mitigation Situations. |
ICDE |
2000 |
DBLP DOI BibTeX RDF |
Collaboration Management, Workflow, Awareness, Dynamic Change |
65 | Hemant Joshi, Remzi Seker, Coskun Bayrak, Srini Ramaswamy, Jeffrey B. Connelly |
Ontology for disaster mitigation and planning. |
SCSC |
2007 |
DBLP BibTeX RDF |
disaster mitigation, disaster planning, disaster simulation, ontology-based simulation |
64 | Young Min Ki, Jeong Woo Kim, Sang Rok Kim, Dong Ku Kim |
Modified RWGH and Positive Noise Mitigation Schemes for TOA Geolocation in Indoor Multi-hop Wireless Networks. (PDF / PS) |
PWC |
2006 |
DBLP DOI BibTeX RDF |
|
64 | Richard Tabors, Judith B. Cardell |
Ex Ante and Ex Post Designs for Electric Market Mitigation: Past and Present Experience and Lessons from California. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
57 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Report - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
57 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst |
10341 Abstracts Collection - Insider Threats: Strategies for Prevention, Mitigation, and Response. |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
57 | Sarah Smith Heckman, Laurie A. Williams |
On establishing a benchmark for evaluating static analysis alert prioritization and classification techniques. |
ESEM |
2008 |
DBLP DOI BibTeX RDF |
alert classification, alert prioritization, automated static analysis, benchmark creation, false positive mitigation |
57 | Hans Schuster, Donald Baker, Andrzej Cichocki, Dimitrios Georgakopoulos 0001, Marek Rusinkiewicz |
The Collaboration Management Infrastructure. |
ICDE |
2000 |
DBLP DOI BibTeX RDF |
Process Templates, Dynamic Process Change, Crisis Mitigation, Collaboration, Workflow Management |
56 | Abhishek Dubey, Steven Nordstrom, Turker Keskinpala, Sandeep Neema, Ted Bapty, Gabor Karsai |
Towards a verifiable real-time, autonomic, fault mitigation framework for large scale real-time systems. |
Innov. Syst. Softw. Eng. |
2007 |
DBLP DOI BibTeX RDF |
Fault mitigation, Healing, Fault tolerance, Real time systems, Model checking, Autonomic computing, Timed automaton, Reflex |
55 | Robert G. Cole, Nam Phamdo, Moheeb Abu Rajab, Andreas Terzis |
Requirements on Worm Mitigation Technologies in MANETS. |
PADS |
2005 |
DBLP DOI BibTeX RDF |
|
49 | Matt Bishop, Lizzie Coles-Kemp, Dieter Gollmann, Jeffrey Hunker, Christian W. Probst (eds.) |
Insider Threats: Strategies for Prevention, Mitigation, and Response, 22.08. - 26.08.2010 |
Insider Threats: Strategies for Prevention, Mitigation, and Response |
2010 |
DBLP BibTeX RDF |
|
47 | Fabrizio Baiardi, S. Suin, Claudio Telmon, M. Pioli |
Assessing the Risk of an Information Infrastructure Through Security Dependencies. |
CRITIS |
2006 |
DBLP DOI BibTeX RDF |
mitigation plan, ranking, risk assessment, vulnerability, countermeasure |
46 | Gao Peng, Meng Dexiang, Zhang Dongchen, Song Zhiyuan |
Inter-cell interference mitigation based on resource joint time-frequency planning and scheduling in OFDMA system. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
cell-edge throughput, inter-cell interference mitigation, orthogonal frequency division multiple access |
46 | Michael Nicolaidis |
A Low-Cost Single-Event Latchup Mitigation Sscheme. |
IOLTS |
2006 |
DBLP DOI BibTeX RDF |
Latchup, Single-event effects, singleevent lathcup, SEL, mitigation of single-event effects |
46 | Arjen K. Lenstra, Tim Voss |
Information Security Risk Assessment, Aggregation, and Mitigation. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
risk aggregation, risk mitigation, Basel 2, multiple-choice knapsack problem, Risk management, risk assessment |
46 | Sanghun Kim, Seungsoo Yoo, Seokho Yoon, Sun Yong Kim |
A Novel Unambiguous Multipath Mitigation Scheme for BOC(kn, n) Tracking in GNSS. |
SAINT Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, Marco Salvato |
Model-Based Mitigation of Availability Risks. |
BDIM |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Tsuyoshi Hatori, Kakuya Matsushima, Kiyoshi Kobayashi |
Providing disaster information and motivation for mitigation. |
SMC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
38 | Kay M. Stanney, Kelly S. Hale, David Jones 0001 |
Augmented Cognition Design Approaches for Treating Mild Traumatic Brain Injuries. |
HCI (16) |
2009 |
DBLP DOI BibTeX RDF |
mild traumatic brain injury, mitigation strategies, Augmented cognition |
38 | Dianxiang Xu, Vivek Goel, Kendall E. Nygard |
An Aspect-Oriented Approach to Security Requirements Analysis. |
COMPSAC (2) |
2006 |
DBLP DOI BibTeX RDF |
use case, aspect-oriented software development, Security requirements, threats, mitigation |
37 | Alberto Avritzer, Robert G. Cole, Elaine J. Weyuker |
Using performance signatures and software rejuvenation for worm mitigation in tactical MANETs. |
WOSP |
2007 |
DBLP DOI BibTeX RDF |
mobile ad hoc networks (MANETS), software monitoring, computer worms, mitigation |
37 | Keiji Nagatani, Kazuya Yoshida, Kiyoshi Kiyokawa, Yasushi Yagi, Tadashi Adachi, Hiroaki Saitoh, Toshiya Suzuki, Osamu Takizawa |
Development of a Networked Robotic System for Disaster Mitigation. |
FSR |
2007 |
DBLP DOI BibTeX RDF |
Disaster mitigation, Surveillance robots, Laser range sensor, Ad-hoc network, Augmented reality, Teleoperation, Omnidirectional camera |
37 | Kohl Witmer, Rhoda Baggs Koss, Tamas Kasza |
A method for risk mitigation during the requirements phase for multimedia software systems. |
SIGDOC |
2006 |
DBLP DOI BibTeX RDF |
multimedia requirements, risk mitigation |
37 | Kazuya Yoshida, Keiji Nagatani, Kiyoshi Kiyokawa, Yasushi Yagi, Tadashi Adachi, Hiroaki Saito, Hiroyuki Tanaka, Hiroyuki Ohno |
Development of a Networked Robotic System for Disaster Mitigation - Test Bed Experiments for Remote Operation over Rough Terrain and High Resolution 3D Geometry Acquisition. |
FSR |
2005 |
DBLP DOI BibTeX RDF |
Disaster Mitigation, Surveillance Robots, Wireless and Satellite-Based IP Communication, Telepresence and Teleoperation, Ad-hoc Networking, Mixed Reality, Omnidirectional Camera, Laser Range Scanner |
37 | Ali Alaghehbandian, Ping Zhu, Masato Abé, Junji Kiyono |
Developing an Internet Oriented Platform for Earthquake Engineering Application and Web-based Simulation System for Seismic Hazards: Towards Disaster Mitigation in Metropolises. |
IV |
2003 |
DBLP DOI BibTeX RDF |
Disaster mitigation, Internet, XML, Virtual Reality, Information system, VRML, Risk communication |
36 | Xiaohua Li, Fan Ng, Taewoo Han |
Carrier Frequency Offset Mitigation in Asynchronous Cooperative OFDM Transmissions. |
IEEE Trans. Signal Process. |
2008 |
DBLP DOI BibTeX RDF |
|
36 | Swaroop Venkatesh, R. Michael Buehrer |
A linear programming approach to NLOS error mitigation in sensor networks. |
IPSN |
2006 |
DBLP DOI BibTeX RDF |
NLOS environment, time-of-arrival estimation, wireless sensor networks, location estimation, line-of-sight |
36 | Judith B. Cardell |
Defining a Market: Market Mitigation by Theory versus Convenience. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
36 | Benjamin A. Carreras, Vickie E. Lynch, David E. Newman, Ian Dobson |
Blackout Mitigation Assessment in Power Transmission Systems. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
36 | Khalid Saeed 0003, Atsushi Fukuda |
Testing Design of a Social Innovation The Environmental Mitigation Banking System. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
|
36 | W. J. Blackert, Donna M. Gregg, A. K. Castner, E. M. Kyle, R. L. Hom, R. M. Jokerst |
Analyzing Interaction Between Distributed Denial of Service Attacks And Mitigation Technologies. |
DISCEX (1) |
2003 |
DBLP DOI BibTeX RDF |
|
29 | Kyung Hoon Won, Jung-Su Han, Hyung-Jin Choi, BonYoung Koo |
Noise insensitive sampling frequency offset estimation methods for DVB-T/H systems. |
ICUIMC |
2009 |
DBLP DOI BibTeX RDF |
DVB-T/H, iterative interpolation, noise mitigation, sampling frequency offset, OFDM |
29 | David John Zage, Cristina Nita-Rotaru |
On the accuracy of decentralized virtual coordinate systems in adversarial networks. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
attack mitigation, virtual coordinate systems, security, reliability, network coordinates |
29 | Onur Aciiçmez, Shay Gueron, Jean-Pierre Seifert |
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
branch prediction attacks, cache eviction attacks, Binary Extended Euclidean Algorithm, software mitigation methods, OpenSSL, RSA, Side channel attacks, CRT, modular inversion |
29 | Geoffrey G. Roy, Terence L. Woodings |
A framework for risk analysis in software engineering. |
APSEC |
2000 |
DBLP DOI BibTeX RDF |
project management process quality, risk mitigation strategies, ProRisk, risk management tool, software engineering, software development, project management, risk management, software development management, risk analysis, project plan |
28 | Markus Goldstein, Matthias Reif, Armin Stahl, Thomas M. Breuel |
Server-Side Prediction of Source IP Addresses Using Density Estimation. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jeremy Goecks, W. Keith Edwards, Elizabeth D. Mynatt |
Challenges in supporting end-user privacy and security management with social navigation. |
SOUPS |
2009 |
DBLP DOI BibTeX RDF |
acumen, bonfire, end-user privacy and security, herding, decision making, social navigation, informational cascades |
28 | Muthusrinivasan Muthuprasanna, G. Manimaran, Zhengdao Wang |
Unified Defense Against DDoS Attacks. |
Networking |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Haruhiko Kaneko, Eiji Fujiwara |
Reconstruction of Erasure Correcting Codes for Dependable Distributed Storage System without Spare Disks. |
DFT |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Varadraj Prabhu Gurupur, Urcun John Tanik |
Software cultivation using the artificial intelligence design framework. |
ACM Southeast Regional Conference |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Melanie Berg |
Fault Tolerance Implementation within SRAM Based FPGA Design Based upon the Increased Level of Single Event Upset Susceptibility. |
IOLTS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Joshua J. Pauli, Dianxiang Xu |
Integrating Functional and Security Requirements with Use Case Decomposition. |
ICECCS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Louis C. Rose |
Risk Management of COTS Based Systems Development. |
Component-Based Software Quality |
2003 |
DBLP DOI BibTeX RDF |
|
28 | Kiyoshi Nagata |
On Clustering of Risk Mitigation Controls. |
NBiS |
2011 |
DBLP DOI BibTeX RDF |
mitigation control, Information security, fuzzy clustering |
28 | Sinem Güven, Catalin-Mihai Barbu |
A Real-Time Risk Assessment and Mitigation Engine Based on Dynamic Context. |
IEEE SCC |
2011 |
DBLP DOI BibTeX RDF |
Risk Mitigation, Risk Assesment, Dynamic Context, Risk Management, Change Management |
28 | Lei Zhong, Yusheng Ji, Min Gong, Fuqiang Liu 0001 |
Interference mitigation for distributed MIMO cellular systems using cooperative beamforming. |
IWCMC |
2010 |
DBLP DOI BibTeX RDF |
cooperative beamforming, distributed MIMO, interference mitigation |
28 | Basit Shahzad, Abdullah S. Al-Mudimigh |
Risk Identification, Mitigation and Avoidance Model for Handling Software Risk. |
CICSyN |
2010 |
DBLP DOI BibTeX RDF |
software risk handling, risk mitigation, Software risk management |
28 | Khalid Elbadawi, Ehab Al-Shaer |
TimeVM: a framework for online intrusion mitigation and fast recovery using multi-time-lag traffic replay. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
traffic replay, virtual machine, recovery, replay, intrusion, mitigation |
28 | Brunil Dalila Romero Marino, Hisham M. Haddad |
Security Vulnerabilities and Mitigation Strategies for Application Development. |
ITNG |
2009 |
DBLP DOI BibTeX RDF |
software threat mitigation, software quality, software security, software vulnerability |
28 | Laura Frigerio, Matteo Alan Radaelli, Fabio Salice |
Convolutional Coding for SEU mitigation. |
ETS |
2008 |
DBLP DOI BibTeX RDF |
SEU mitigation, convolutional coding |
28 | Markus Goldstein, Christoph H. Lampert, Matthias Reif, Armin Stahl, Thomas M. Breuel |
Bayes Optimal DDoS Mitigation by Adaptive History-Based IP Filtering. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
History-Based IP Filtering, DDoS, Bayes, Mitigation |
27 | Murad Abusubaih, Berthold Rathke, Adam Wolisz |
A framework for interference mitigation in multi-BSS 802.11 wireless LANs. |
WOWMOM |
2009 |
DBLP DOI BibTeX RDF |
|
27 | Sobeeh Almukhaizim, Yiorgos Makris |
Soft Error Mitigation Through Selective Addition of Functionally Redundant Wires. |
IEEE Trans. Reliab. |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Guanhua Yan, Stephan J. Eidenbenz |
DDoS Mitigation in Non-cooperative Environments. |
Networking |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Rab Nawaz, Sumei Sun |
Bluetooth Interference Mitigation in 802.11g. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Itsuki Noda |
Integrated Simulation and Information Sharing System for Disaster Mitigation. |
ACRI |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Reiko Ann Miura-Ko, Nicholas Bambos |
Dynamic Risk Mitigation in Computing Infrastructures. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Sheetal Kalyani, Vimal Raj, Krishnamurthy Giridhar |
Narrowband Interference Mitigation in Turbo-Coded OFDM Systems. |
ICC |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Hamid R. Zarandi, Seyed Ghassem Miremadi, Dhiraj K. Pradhan, Jimson Mathew |
SEU-Mitigation Placement and Routing Algorithms and Their Impact in SRAM-Based FPGAs. |
ISQED |
2007 |
DBLP DOI BibTeX RDF |
|
27 | Jang-Wook Moon, John M. Shea, Tan F. Wong |
Collaborative mitigation of partial-time jamming on nonfading channels. |
IEEE Trans. Wirel. Commun. |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Lei Zhang 0015, Shaoqian Li, Hongming Zheng, May Wu |
A Selective Co-Channel Interference Mitigation Method for Alamouti Code. |
ISCC |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Patrick Picher, Leonard Bolduc, Bruno Girard, Van Nhi Nguyen |
Mitigation of Ferroresonance Induced by Single-Phase Opening of a Three-Phase Transformer Feeder. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Panneerselvam Kolandaivel, Rajat Aggarwal |
A Novel Earthquake Mitigation Information expert System: EMIS. |
CCECE |
2006 |
DBLP DOI BibTeX RDF |
|
27 | Yasamin Mostofi, Donald C. Cox |
ICI mitigation for pilot-aided OFDM mobile systems. |
IEEE Trans. Wirel. Commun. |
2005 |
DBLP DOI BibTeX RDF |
|
27 | Ikuo Takeuchi |
A Massively Multi-agent Simulation System for Disaster Mitigation. |
MMAS |
2004 |
DBLP DOI BibTeX RDF |
|
27 | Kamal E. Alameh, Abdesselam Bouzerdoum, Selam T. Ahderom, Mehrdad Raisi, Kamran Eshraghian, X. Zhao, Rong Zheng 0002, Zhenglin Wang |
Integrated MicroPhotonic Wideband RF Interference Mitigation Filter. |
DELTA |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Zhe Feng 0002, Naifeng Jing, GengSheng Chen, Yu Hu 0002, Lei He 0001 |
IPF: In-Place X-Filling to Mitigate Soft Errors in SRAM-Based FPGAs. |
FPL |
2011 |
DBLP DOI BibTeX RDF |
in-place, soft error, don't care, mitigation, SRAM-based FPGA |
19 | Mingyan Li, Iordanis Koutsopoulos, Radha Poovendran |
Optimal Jamming Attack Strategies and Network Defense Policies in Wireless Sensor Networks. |
IEEE Trans. Mob. Comput. |
2010 |
DBLP DOI BibTeX RDF |
jamming detection and mitigation, wireless multiple access, security, wireless sensor network, optimization, Jamming |
19 | Cameron D. Patterson, Steven W. Ellingson, Brian S. Martin, K. Deshpande, John H. Simonetti, Michael Kavic, Sean E. Cutchin |
Searching for Transient Pulses with the ETA Radio Telescope. |
ACM Trans. Reconfigurable Technol. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Direct sampling radio telescope array, FPGA cluster computing, RFI mitigation, signal dedispersion |
19 | Ayman Elezabi, Mohamed Kashef, Mohamed M. Abdallah 0001, Mohamed M. Khairy |
Cognitive interference-minimizing code assignment for underlay CDMA networks in asynchronous multipath fading channels. |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
blind epoch acquisition, interference mitigation, underlay CDMA networks, cognitive radio |
19 | Robert Strauss, Ali Abedi 0001 |
Game theoretic power allocation in sparsely distributed clusters of wireless sensors (GPAS). |
IWCMC |
2009 |
DBLP DOI BibTeX RDF |
interference mitigation, sparse distributions, wireless sensor networks, game theory, power minimization |
19 | Yves Louët, Jacques Palicot |
A classification of methods for efficient power amplification of signals. |
Ann. des Télécommunications |
2008 |
DBLP DOI BibTeX RDF |
PAPR mitigation, Classification, Methods, Linearization |
19 | Christian G. Zoellin, Hans-Joachim Wunderlich, Ilia Polian, Bernd Becker 0001 |
Selective Hardening in Early Design Steps. |
ETS |
2008 |
DBLP DOI BibTeX RDF |
Soft error mitigation, reliability |
19 | Juan C. Dueñas, Hugo A. Parada G., Félix Cuadrado, Manuel Santillán, José L. Ruiz 0001 |
Apache and Eclipse: Comparing Open Source Project Incubators. |
IEEE Softw. |
2007 |
DBLP DOI BibTeX RDF |
Free and open source software, open source processes, incubation processes, project risk mitigation, open source software, open source communities |
19 | Sylvain Guilley, Florent Flament, Philippe Hoogvorst, Renaud Pacalet, Yves Mathieu |
Secured CAD Back-End Flow for Power-Analysis-Resistant Cryptoprocessors. |
IEEE Des. Test Comput. |
2007 |
DBLP DOI BibTeX RDF |
robust hardware, back-end design automation, power-constant architectures, DFY, side-channel attacks, DFM, mitigation |
19 | Julian Seidenberg, Alan L. Rector |
A methodology for asynchronous multi-user editing of semantic web ontologies. |
K-CAP |
2007 |
DBLP DOI BibTeX RDF |
error mitigation, multi-user editing, ontology, semantic web, concurrency, knowledge representation, methodology |
19 | Haizhi Xu, Steve J. Chapin |
Improving address space randomization with a dynamic offset randomization technique. |
SAC |
2006 |
DBLP DOI BibTeX RDF |
address space randomization, code islands, derandomization attacks, intrusion mitigation, randomization, denial-of-service attacks |
19 | Alyson K. Fletcher, Sundeep Rangan, Vivek K. Goyal |
Estimation from lossy sensor data: jump linear modeling and Kalman filtering. |
IPSN |
2004 |
DBLP DOI BibTeX RDF |
loss mitigation, minimum mean-squared error estimation, signal recovery, tracking, state-space modeling |
19 | Jeffrey M. Voas |
A World Without Risks: Let Me Out! |
HASE |
1999 |
DBLP DOI BibTeX RDF |
avoidance, software, risk, mitigation |
19 | Steven Gringeri, Roman V. Egorov, Khaled Shuaib, Arianne Lewis, Bert Basch |
Robust compression and transmission of MPEG-4 video. |
ACM Multimedia (1) |
1999 |
DBLP DOI BibTeX RDF |
error mitigation, robust video, MPEG-4, error resilience |
19 | Gianmarco Baldini, Janie Baños, Xiaochen Chen |
Test bed design for detect and avoid of ultra wideband devices. |
CoRoNet@MobiCom |
2009 |
DBLP DOI BibTeX RDF |
testing, UWB, DAA |
19 | Mikhail M. Lavrentiev Jr., Alexey Romanenko, Vasily Titov, Alexander Vazhenin |
High-Performance Tsunami Wave Propagation Modeling. |
PaCT |
2009 |
DBLP DOI BibTeX RDF |
Tsunami Wave Propagation Modeling, Method of Splitting Tsunami, Fine-grain Parallel Algorithms, OpenMP Paradigm, Cell BE Architecture |
19 | Martijn Zoet, Richard J. Welke, Johan Versendaal, Pascal Ravesteyn |
Aligning Risk Management and Compliance Considerations with Business Process Development. |
EC-Web |
2009 |
DBLP DOI BibTeX RDF |
Business Processes, Risk Management, Governance, Business Rules, Regulatory Compliance |
19 | John W. Stamey, Ryan A. Rossi |
Automatically identifying relations in privacy policies. |
SIGDOC |
2009 |
DBLP DOI BibTeX RDF |
latent relations, ambiguities, privacy policies |
19 | Weihua Chen, Xia Lei, Shaoqian Li |
OFDM Channel Estimation and Signal Detection on Nonintegral-Delay and Fast Time-Varying Channels. |
RSKT |
2009 |
DBLP DOI BibTeX RDF |
Fast time-varying channel, nonintegral-delay, channel estimation, signal detection, ESPRIT |
19 | Jie Yu 0008, Chengfang Fang, Liming Lu, Zhoujun Li 0001 |
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks. |
Infoscale |
2009 |
DBLP DOI BibTeX RDF |
Trust, DDoS Attacks, Lightweight, Application layer |
19 | Zhongjun Wang, Yan Xin 0001, Masayuki Tomisawa |
Phase Error Suppression for Multi-Band OFDM-Based UWB Systems. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Che-Sheng Chiu, Chia-Chi Huang |
Combined Partial Reuse and Soft Handover in OFDMA Downlink Transmission. |
VTC Spring |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Taehoon Kwon, Hyungjoon Song, Jemin Lee, Youngju Kim, Jonghyuk Lee, Daesik Hong |
A Power Division Reuse Partitioning Scheme with Half Frequency Reuse Factor for OFDMA Downlink Systems. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Eric Koomen, Willem Loonen, Maarten Hilferink |
Climate-Change Adaptations in Land-Use Planning; A Scenario-Based Approach. |
AGILE Conf. |
2008 |
DBLP DOI BibTeX RDF |
land use modelling, climate change, spatial patterns, spatial planning |
19 | Tim Lant, Megan Jehn, Cody Christensen, Ozgur Merih Araz, John W. Fowler |
Simulating pandemic influenza preparedness plans for a public university: A hierarchical system dynamics approach. |
WSC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Joshua J. Pauli, Patrick Henry Engebretson |
Towards a Specification Prototype for Hierarchy-Driven Attack Patterns. |
ITNG |
2008 |
DBLP DOI BibTeX RDF |
Refinement, Hierarchy, Attack Trees, Attack Patterns |
19 | Jing Wang, Zhanli Liu, Yan Wang 0027, Xiaohu You 0001 |
Segmented Equalization for OFDM Systems with Phase Noise. |
WCNC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Yolanta Beres, Jonathan Griffin, Simon Shiu, Max Heitman, David Markle, Peter Ventura |
Analysing the Performance of Security Solutions to Reduce Vulnerability Exposure Window. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Stefan Geirhofer, Ozgur Oyman |
Client-centric fractional frequency reuse based on user cooperation in OFDMA networks. |
CISS |
2008 |
DBLP DOI BibTeX RDF |
|
19 | Ruiliang Chen, Jung-Min Park 0001, Randolph Marchany |
A Divide-and-Conquer Strategy for Thwarting Distributed Denial-of-Service Attacks. |
IEEE Trans. Parallel Distributed Syst. |
2007 |
DBLP DOI BibTeX RDF |
Network-level security and protection |
19 | Jonathan P. Caulkins, Eric D. Hough, Nancy R. Mead, Hassan Osman |
Optimizing Investments in Security Countermeasures: A Practical Tool for Fixed Budgets. |
IEEE Secur. Priv. |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Md. Mahbubur Rahman, Md. Delowar Hossain, A. B. M. Shawkat Ali |
Performance Analysis of OFDM Systems with Phase Noise. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
CPE, OFDM, BER, Phase Noise, AWGN, ICI |
19 | Enzo Baccarelli, Mauro Biagi, Cristian Pelizzoni, Nicola Cordeschi |
Multi-antenna cognitive radio for broadband access in 4G-WLANs. |
MOBIWAC |
2007 |
DBLP DOI BibTeX RDF |
competitive optimality, game theory, active networks, power allocation, MAI, multiple antennas, SDMA |
Displaying result #1 - #100 of 8388 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|