The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Policy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1968 (19) 1969-1972 (30) 1973-1974 (19) 1975 (20) 1976 (18) 1977 (15) 1978 (20) 1979 (17) 1980 (16) 1981 (19) 1982 (19) 1983 (26) 1984 (37) 1985 (23) 1986 (30) 1987 (41) 1988 (39) 1989 (57) 1990 (77) 1991 (77) 1992 (79) 1993 (86) 1994 (126) 1995 (164) 1996 (158) 1997 (178) 1998 (204) 1999 (243) 2000 (393) 2001 (514) 2002 (687) 2003 (849) 2004 (1116) 2005 (1312) 2006 (1502) 2007 (1685) 2008 (1657) 2009 (1353) 2010 (911) 2011 (800) 2012 (823) 2013 (828) 2014 (798) 2015 (817) 2016 (935) 2017 (1118) 2018 (1309) 2019 (1525) 2020 (1761) 2021 (1870) 2022 (2005) 2023 (2167) 2024 (534)
Publication types (Num. hits)
article(13935) book(20) data(10) incollection(248) inproceedings(16642) phdthesis(236) proceedings(35)
Venues (Conferences, Journals, ...)
CoRR(3405) Inf. Econ. Policy(516) POLICY(378) ICML(303) NeurIPS(270) Eur. J. Oper. Res.(255) HICSS(242) Internet Policy Rev.(230) IEEE Access(194) AAAI(193) Comput. Ind. Eng.(187) AAMAS(183) Reliab. Eng. Syst. Saf.(165) CDC(162) WSC(153) ICC(151) More (+10 of total 4263)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11972 occurrences of 4272 keywords

Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Gerald R. Faulhaber Policy-induced competition: the telecommunications experiments. Search on Bibsonomy Inf. Econ. Policy The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  BibTeX  RDF
20Francisco Durán 0001, Javier Herrador, Antonio Vallecillo Using UML and Maude for Writing and Reasoning about ODP Policies. Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Pedro Dias, Carlos Ribeiro, Paulo Ferreira 0001 Enforcing History-Based Security Policies in Mobile Agent Systems. Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Günter Karjoth, Matthias Schunter, Els Van Herreweghen Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Peter F. Linington, Stephen W. Neal Using Policies in the Checking of Business to Business Contracts. Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Vijay G. Bharadwaj, John S. Baras Towards Automated Negotiation of Access Control Policies. Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin Organization based access contro. Search on Bibsonomy POLICY The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  BibTeX  RDF
20William H. Winsborough, Ninghui Li Towards Practical Automated Trust Negotiation. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca A System to Specify and Manage Multipolicy Access Control Models. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Tatyana Ryutov, B. Clifford Neuman The Specification and Enforcement of Advanced Security Policies. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Grit Denker, Jonathan K. Millen, Yutaka Miyake Cross-Domain Access Control via PKI. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Babak Sadighi Firozabadi, Marek J. Sergot Revocation Schemes for Delegated Authorities. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Laura Pearlman, Von Welch, Ian T. Foster, Carl Kesselman, Steven Tuecke A Community Authorization Service for Group Collaboration. Search on Bibsonomy POLICY The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Jan Chomicki, Jorge Lobo 0001 Monitors for History-Based Policies. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Michael Hitchens, Vijay Varadharajan Tower: A Language for Role Based Access Control. Search on Bibsonomy POLICY The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Peter Read An information perspective on dynamic efficiency in environmental policy. Search on Bibsonomy Inf. Econ. Policy The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20F. Gasmi, J. J. Laffont, W. W. Sharkey Competition, universal service and telecommunications policy in developing countries. Search on Bibsonomy Inf. Econ. Policy The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Jeong-Yoo Kim, Sang Taek Kim, Dong-Ju Kim Local loop unbundling and antitrust policy. Search on Bibsonomy Inf. Econ. Policy The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Elizabeth Webster The growth of enterprise intangible investment in Australia, Information Economics And Policy. Search on Bibsonomy Inf. Econ. Policy The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Ed Dawson, Jovan Dj. Golic (eds.) Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Steve Orlowski Encryption and the Gloval Information Infrastructure: An Australian Perspective. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20William Millan Low Order Approximation of Cipher Functions. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Lidong Chen Access with Pseudonyms. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Mark Ames Saving Dollars Makes Sense of Crypto Export Controls. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20He Jingmin, Ed Dawson How to Fairly Reconstruct a Shared Secret. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20William J. Caelli Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew J. Clark, Abdollah Khodkar, Ed Dawson Discrete Optimisation and Fast Correlation Attacks. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos Public-key Cryptography on Smart Cards. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Kefei Chen A New Identification Algorithm. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk Keyed Hash Functions. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli The CASS Shell. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Nigel Jefferies, Chris J. Mitchell, Michael Walker 0001 A Proposed Architecture for Trusted Third Party Services. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Chi-Sung Laih, Wen-Chung Kuo Cryptanalysis of the Enhanced ElGamal's Signature Scheme. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Dieter Gollmann Cryptographic APIs. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Jovan Dj. Golic A Note on Nonuniform Decimation of Periodic Sequences. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Ivan Damgård, Lars R. Knudsen Multiple Encryption with Minimum Key. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Selwyn Russell Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20William J. Caelli Commercial Key Escrow: An Australian Perspective. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Marc Gysin A One-Key Cryptosystem Based on a Finite Nonlinear Automaton. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Gary Gaskell, Mark Looi Integrating Smart Cards Into Authentication Systems. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Jovan Dj. Golic, Luke O'Connor A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Jaroslav Hruby Smart Card with Interferometric Quantum Cryptography Device. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Shin-Jia Hwang, Chin-Chen Chang 0001, Wei-Pang Yang Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20He Jingmin, Ed Dawson A New Key Escrow Cryptosystem. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Helen Gustafson, Ed Dawson, Jovan Dj. Golic Randomness Measures Related to Subset Occurrence. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
20Michael Moeng, Rami G. Melhem Applying statistical machine learning to multicore voltage & frequency scaling. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF decision tree, power management, multicore
20Dmitry G. Korzun, Andrei V. Gurtov A local equilibrium model for P2P resource ranking. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Sipat Triukose, Zhihua Wen, Michael Rabinovich Content delivery networks: how big is big enough? Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Alma Riska, Erik Riedel Evaluation of disk-level workloads at different time scales. Search on Bibsonomy SIGMETRICS Perform. Evaluation Rev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Armin Hornung, Hauke Strasdat, Maren Bennewitz, Wolfram Burgard Learning efficient policies for vision-based navigation. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Zhengping Wu, Lifeng Wang An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
20Kamesh Munagala, Peng Shi 0002 The Stochastic Machine Replenishment Problem. Search on Bibsonomy IPCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Mahdi Lotfinezhad, Ben Liang 0001, Elvino S. Sousa Dynamic Control of Tunable Sub-Optimal Algorithms for Scheduling of Time-Varying Wireless Networks. Search on Bibsonomy IWQoS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham ROWLBAC: representing role based access control in OWL. Search on Bibsonomy SACMAT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ontology, semantic web, RBAC, OWL, access control model
20Sertan Girgin, Philippe Preux Basis Expansion in Natural Actor Critic Methods. Search on Bibsonomy EWRL The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Nevine AbouGhazaleh, Bruce R. Childers, Daniel Mossé, Rami G. Melhem Integrated CPU Cache Power Management in Multiple Clock Domain Processors. Search on Bibsonomy HiPEAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Naikuo Yang, Howard Barringer, Ning Zhang 0001 A Purpose-Based Access Control Model. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Adam Wierzbicki, Lukasz Zaczek, Radoslaw Adamus, Edgar Glowacki Access Control Management in Open Distributed Virtual Repositories and the Grid. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Access Control Management, Virtual Repository, Role-based access control, data grid
20Martin B. Haugh, Ashish Jain Path-wise estimators and cross-path regressions: an application to evaluating portfolio strategies. Search on Bibsonomy WSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks. Search on Bibsonomy ICN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Hong Zhu 0003, Kevin Lü 0001 Fine-Grained Access Control for Database Management Systems. Search on Bibsonomy BNCOD The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Min Xi, Jizhong Zhao, Yong Qi, Hui He, Liang Liu 0010 An Offset Algorithm for Conflict Resolution in Context-Aware Computing. Search on Bibsonomy UIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
20Hadi Bannazadeh, Alberto Leon-Garcia Service Commitment Strategies in Allocating Services to Applications. Search on Bibsonomy IEEE SCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Service-Oriented Architecture, Service Composition, Markov Decision Processes, Composite Applications
20Koushik Kar, Ananth Krishnamurthy, Neeraj Jaggi Dynamic node activation in networks of rechargeable sensors. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF rechargable sensors, sensor activation, spatial correlation
20Lang Lin, Roy D. Yates, Predrag Spasojevic Adaptive transmission with finite code rates. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Lei Ying 0001, R. Srikant 0001, Atilla Eryilmaz, Geir E. Dullerud A Large Deviations Analysis of Scheduling in Wireless Networks. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20George Yee Personalized Security for E-Services. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Nicole Megow, Tjark Vredeveld Approximation in Preemptive Stochastic Online Scheduling. Search on Bibsonomy ESA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Chetan Shiva Shankar, Roy H. Campbell Managing Pervasive Systems using Role-based Obligation Policies. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Byeong Heon Cho, Sung Hoon Jung, Kwang-Hyun Shim, Yeong Rak Seong, Ha Ryoung Oh Reinforcement Learning of Intelligent Characters in Fighting Action Games. Search on Bibsonomy ICEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Ritu Chadha Beyond the Hype: Policies for Military Network Operations. Search on Bibsonomy ICSNC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Kayvan Mosharaf, Jerome Talim, Ioannis Lambadaris Optimal Resource Allocation and Fairness Control in All-Optical WDM Networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Charles Pandana, K. J. Ray Liu Near-optimal reinforcement learning framework for energy-aware sensor communications. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Vladimir Kolovski, Bijan Parsia, Yarden Katz, James A. Hendler Representing Web Service Policies in OWL-DL. Search on Bibsonomy ISWC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Koushik Kar, Ananth Krishnamurthy, Neeraj Jaggi Dynamic node activation in networks of rechargeable sensors. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Paolo Giaccone, Emilio Leonardi, Devavrat Shah On the maximal throughput of networks with finite buffers and its application to buffered crossbars. Search on Bibsonomy INFOCOM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Pradeep Varakantham, Rajiv T. Maheswaran, Milind Tambe Implementation Techniques for Solving POMDPs in Personal Assistant Agents. Search on Bibsonomy PROMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero Modeling and Verification of IPSec and VPN Security Policies. Search on Bibsonomy ICNP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jan Peters 0001, Sethu Vijayakumar, Stefan Schaal Natural Actor-Critic. Search on Bibsonomy ECML The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Jan Cosyn, Karl Sigman Stochastic Networks: Admission and Routing Using Penalty Functions. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF exponential penalty, stochastic knapsack, admission control, routing control
20Jae-Hoon Kim 0001 Optimal Buffer Management via Resource Augmentation. Search on Bibsonomy ISAAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies. Search on Bibsonomy NOMS (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Francisco J. Cazorla, Alex Ramírez, Mateo Valero, Enrique Fernández Dynamically Controlled Resource Allocation in SMT Processors. Search on Bibsonomy MICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Chiu-Man Yu, Kam-Wing Ng A Dynamic Management Framework for Security Policies in Open Grid Computing Environments. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Philip W. L. Fong Access Control By Tracking Shallow Execution History. Search on Bibsonomy S&P The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Mike Chen, Charuhas Pandit, Sean P. Meyn In Search of Sensitivity in Network Optimization. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF scheduling, routing, queueing networks, optimal control
20Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park A Location Privacy Protection Mechanism for Smart Space. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Ting Yu 0001, Marianne Winslett A Unified Scheme for Resource Protection in Automated Trust Negotiation. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith Design and Implementation of Virtual Private Services. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Ricardo Nabhen, Edgard Jamhour, Carlos Maziero RBPIM: A PCIM-Based Framework for RBAC. Search on Bibsonomy LCN The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Philippe de Cuetos, Keith W. Ross Adaptive rate control for streaming stored rine-grained scalable video. Search on Bibsonomy NOSSDAV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fine-grained scalability, internet video streaming, network-adaptive applications
20Hamid Beigy, Mohammad Reza Meybodi A Learning Automata Based Dynamic Guard Channel Scheme. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Hamid Beigy, Mohammad Reza Meybodi Call Admission Control in Cellular Mobile Networks: A Learning Automata Approach. Search on Bibsonomy EurAsia-ICT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Tadashige Iwao, Yuji Wada, Makoto Okada, Makoto Amamiya A Framework for the Exchange and Installation of Protocols in a Multi-agent System. Search on Bibsonomy CIA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Debendra Das Sharma, Dhiraj K. Pradhan Job Scheduling in Mesh Multicomputers. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF deallocation, scheduling, mesh, priority, Allocation, reservation
20Ramachandran Ramjee, Donald F. Towsley, Ramesh Nagarajan On optimal call admission control in cellular networks. Search on Bibsonomy Wirel. Networks The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Sivarama P. Dandamudi The Effect of Scheduling Discipline on Dynamic Load Sharing in Heterogeneous Distributed Systems. Search on Bibsonomy MASCOTS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
Displaying result #1001 - #1100 of 31126 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19]
[20][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license