|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11972 occurrences of 4272 keywords
|
|
|
Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
20 | Gerald R. Faulhaber |
Policy-induced competition: the telecommunications experiments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Econ. Policy ![In: Inf. Econ. Policy 15(1), pp. 73-97, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | |
4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![IEEE Computer Society, 0-7695-1933-4 The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP BibTeX RDF |
|
20 | Francisco Durán 0001, Javier Herrador, Antonio Vallecillo |
Using UML and Maude for Writing and Reasoning about ODP Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 15-25, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Pedro Dias, Carlos Ribeiro, Paulo Ferreira 0001 |
Enforcing History-Based Security Policies in Mobile Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 231-234, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Günter Karjoth, Matthias Schunter, Els Van Herreweghen |
Translating Privacy Practices into Privacy Promises -How to Promise What You Can Keep. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 135-146, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Peter F. Linington, Stephen W. Neal |
Using Policies in the Checking of Business to Business Contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 207-218, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Vijay G. Bharadwaj, John S. Baras |
Towards Automated Negotiation of Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 111-119, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Anas Abou El Kalam, Salem Benferhat, Alexandre Miège, Rania El Baida, Frédéric Cuppens, Claire Saurel, Philippe Balbiani, Yves Deswarte, Gilles Trouessin |
Organization based access contro. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2003), 4-6 June 2003, Lake Como, Italy, pp. 120-, 2003, IEEE Computer Society, 0-7695-1933-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | |
3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![IEEE Computer Society, 0-7695-1611-4 The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP BibTeX RDF |
|
20 | William H. Winsborough, Ninghui Li |
Towards Practical Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 92-103, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Elisa Bertino, Barbara Catania, Elena Ferrari, Paolo Perlasca |
A System to Specify and Manage Multipolicy Access Control Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 116-127, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Tatyana Ryutov, B. Clifford Neuman |
The Specification and Enforcement of Advanced Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 128-138, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Grit Denker, Jonathan K. Millen, Yutaka Miyake |
Cross-Domain Access Control via PKI. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 202-205, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Babak Sadighi Firozabadi, Marek J. Sergot |
Revocation Schemes for Delegated Authorities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 210-213, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Laura Pearlman, Von Welch, Ian T. Foster, Carl Kesselman, Steven Tuecke |
A Community Authorization Service for Group Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 5-7 June 2002, Monterey, CA, USA, pp. 50-59, 2002, IEEE Computer Society, 0-7695-1611-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Jan Chomicki, Jorge Lobo 0001 |
Monitors for History-Based Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 57-72, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Michael Hitchens, Vijay Varadharajan |
Tower: A Language for Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 88-106, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Peter Read |
An information perspective on dynamic efficiency in environmental policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Econ. Policy ![In: Inf. Econ. Policy 12(1), pp. 47-68, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
20 | F. Gasmi, J. J. Laffont, W. W. Sharkey |
Competition, universal service and telecommunications policy in developing countries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Econ. Policy ![In: Inf. Econ. Policy 12(3), pp. 221-248, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Jeong-Yoo Kim, Sang Taek Kim, Dong-Ju Kim |
Local loop unbundling and antitrust policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Econ. Policy ![In: Inf. Econ. Policy 12(4), pp. 393-412, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Elizabeth Webster |
The growth of enterprise intangible investment in Australia, Information Economics And Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inf. Econ. Policy ![In: Inf. Econ. Policy 12(1), pp. 1-25, 2000. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
20 | Ed Dawson, Jovan Dj. Golic (eds.) |
Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![Springer, 3-540-60759-5 The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Steve Orlowski |
Encryption and the Gloval Information Infrastructure: An Australian Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 65-74, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | William Millan |
Low Order Approximation of Cipher Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 144-155, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Lidong Chen |
Access with Pseudonyms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 232-243, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Mark Ames |
Saving Dollars Makes Sense of Crypto Export Controls. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 90-97, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | He Jingmin, Ed Dawson |
How to Fairly Reconstruct a Shared Secret. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 115-124, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | William J. Caelli |
Open Forum - Cryptography: Personal Freedom and Law Enforcement - Is it Possible to Get Agreement? ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 1-19, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Jovan Dj. Golic, Mahmoud Salmasizadeh, Andrew J. Clark, Abdollah Khodkar, Ed Dawson |
Discrete Optimisation and Fast Correlation Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 186-200, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Andreas Fuchsberger, Dieter Gollmann, Paul J. G. Lothian, Kenneth G. Paterson, Abraham Sidiropoulos |
Public-key Cryptography on Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 250-269, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Kefei Chen |
A New Identification Algorithm. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 244-249, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Shahram Bakhtiari, Reihaneh Safavi-Naini, Josef Pieprzyk |
Keyed Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 201-214, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | George M. Mohay, Hasmukh Morarji, Q. Le Viet, Lance Munday, William J. Caelli |
The CASS Shell. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 313-325, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Nigel Jefferies, Chris J. Mitchell, Michael Walker 0001 |
A Proposed Architecture for Trusted Third Party Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 98-104, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Chi-Sung Laih, Wen-Chung Kuo |
Cryptanalysis of the Enhanced ElGamal's Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 228-231, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Dieter Gollmann |
Cryptographic APIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 290-300, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Jovan Dj. Golic |
A Note on Nonuniform Decimation of Periodic Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 125-131, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Ivan Damgård, Lars R. Knudsen |
Multiple Encryption with Minimum Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 156-164, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Selwyn Russell |
Foiling Active Network Impersonisation Attacks Made in Collusion with an Insider. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 301-312, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | William J. Caelli |
Commercial Key Escrow: An Australian Perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 40-64, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Marc Gysin |
A One-Key Cryptosystem Based on a Finite Nonlinear Automaton. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 165-173, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Gary Gaskell, Mark Looi |
Integrating Smart Cards Into Authentication Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 270-281, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Jovan Dj. Golic, Luke O'Connor |
A Cryptanalysis of Clock-Controlled Shift Registers with Multiple Steps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 174-185, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Jaroslav Hruby |
Smart Card with Interferometric Quantum Cryptography Device. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 282-289, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Shin-Jia Hwang, Chin-Chen Chang 0001, Wei-Pang Yang |
Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 215-227, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | He Jingmin, Ed Dawson |
A New Key Escrow Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 105-114, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Helen Gustafson, Ed Dawson, Jovan Dj. Golic |
Randomness Measures Related to Subset Occurrence. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 132-143, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
20 | Michael Moeng, Rami G. Melhem |
Applying statistical machine learning to multicore voltage & frequency scaling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Conf. Computing Frontiers ![In: Proceedings of the 7th Conference on Computing Frontiers, 2010, Bertinoro, Italy, May 17-19, 2010, pp. 277-286, 2010, ACM, 978-1-4503-0044-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
decision tree, power management, multicore |
20 | Dmitry G. Korzun, Andrei V. Gurtov |
A local equilibrium model for P2P resource ranking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 27-29, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Bill Lin 0001, Jun (Jim) Xu, Nan Hua, Hao Wang 0006, Haiquan (Chuck) Zhao |
A randomized interleaved DRAM architecture for the maintenance of exact statistics counters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 53-54, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Sipat Triukose, Zhihua Wen, Michael Rabinovich |
Content delivery networks: how big is big enough? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 59-60, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Alma Riska, Erik Riedel |
Evaluation of disk-level workloads at different time scales. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS Perform. Evaluation Rev. ![In: SIGMETRICS Perform. Evaluation Rev. 37(2), pp. 67-68, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Armin Hornung, Hauke Strasdat, Maren Bennewitz, Wolfram Burgard |
Learning efficient policies for vision-based navigation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IROS ![In: 2009 IEEE/RSJ International Conference on Intelligent Robots and Systems, October 11-15, 2009, St. Louis, MO, USA, pp. 4590-4595, 2009, IEEE, 978-1-4244-3803-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Zhengping Wu, Lifeng Wang |
An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 329-334, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Kamesh Munagala, Peng Shi 0002 |
The Stochastic Machine Replenishment Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPCO ![In: Integer Programming and Combinatorial Optimization, 13th International Conference, IPCO 2008, Bertinoro, Italy, May 26-28, 2008, Proceedings, pp. 169-183, 2008, Springer, 978-3-540-68886-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Mahdi Lotfinezhad, Ben Liang 0001, Elvino S. Sousa |
Dynamic Control of Tunable Sub-Optimal Algorithms for Scheduling of Time-Varying Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWQoS ![In: 16th International Workshop on Quality of Service, IWQoS 2008, University of Twente, Enskede, The Netherlands, 2-4 June 2008., pp. 139-149, 2008, IEEE, 978-1-4244-2084-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu 0001, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham |
ROWLBAC: representing role based access control in OWL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 73-82, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ontology, semantic web, RBAC, OWL, access control model |
20 | Sertan Girgin, Philippe Preux |
Basis Expansion in Natural Actor Critic Methods. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EWRL ![In: Recent Advances in Reinforcement Learning, 8th European Workshop, EWRL 2008, Villeneuve d'Ascq, France, June 30 - July 3, 2008, Revised and Selected Papers, pp. 110-123, 2008, Springer, 978-3-540-89721-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Nevine AbouGhazaleh, Bruce R. Childers, Daniel Mossé, Rami G. Melhem |
Integrated CPU Cache Power Management in Multiple Clock Domain Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HiPEAC ![In: High Performance Embedded Architectures and Compilers, Third International Conference, HiPEAC 2008, Göteborg, Sweden, January 27-29, 2008, Proceedings, pp. 209-223, 2008, Springer, 978-3-540-77559-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Naikuo Yang, Howard Barringer, Ning Zhang 0001 |
A Purpose-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Third International Symposium on Information Assurance and Security, IAS 2007, August 29-31, 2007, Manchester, United Kingdom, pp. 143-148, 2007, IEEE Computer Society, 978-0-7695-2876-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Adam Wierzbicki, Lukasz Zaczek, Radoslaw Adamus, Edgar Glowacki |
Access Control Management in Open Distributed Virtual Repositories and the Grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Conferences (2) ![In: On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS, OTM Confederated International Conferences CoopIS, DOA, ODBASE, GADA, and IS 2007, Vilamoura, Portugal, November 25-30, 2007, Proceedings, Part II, pp. 1186-1199, 2007, Springer, 978-3-540-76835-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Access Control Management, Virtual Repository, Role-based access control, data grid |
20 | Martin B. Haugh, Ashish Jain |
Path-wise estimators and cross-path regressions: an application to evaluating portfolio strategies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WSC ![In: Proceedings of the Winter Simulation Conference, WSC 2007, Washington, DC, USA, December 9-12, 2007, pp. 1013-1020, 2007, WSC, 1-4244-1306-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hussein Al-Zubaidy, Jerome Talim, Ioannis Lambadaris |
Heuristic Approach of Optimal Code Allocation in High Speed Downlink Packet Access Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN ![In: Sixth International Conference on Networking (ICN 2007), 22-28 April 2007, Sainte-Luce, Martinique, France, pp. 22, 2007, IEEE Computer Society, 978-0-7695-2805-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hong Zhu 0003, Kevin Lü 0001 |
Fine-Grained Access Control for Database Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BNCOD ![In: Data Management. Data, Data Everywhere, 24th British National Conference on Databases, BNCOD 24, Glasgow, UK, July 3-5, 2007, Proceedings, pp. 215-223, 2007, Springer, 978-3-540-73389-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Min Xi, Jizhong Zhao, Yong Qi, Hui He, Liang Liu 0010 |
An Offset Algorithm for Conflict Resolution in Context-Aware Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 4th International Conference, UIC 2007, Hong Kong, China, July 11-13, 2007, Proceedings, pp. 878-887, 2007, Springer, 978-3-540-73548-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Hadi Bannazadeh, Alberto Leon-Garcia |
Service Commitment Strategies in Allocating Services to Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2007 IEEE International Conference on Services Computing (SCC 2007), 9-13 July 2007, Salt Lake City, Utah, USA, pp. 91-97, 2007, IEEE Computer Society, 0-7695-2925-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Service-Oriented Architecture, Service Composition, Markov Decision Processes, Composite Applications |
20 | Koushik Kar, Ananth Krishnamurthy, Neeraj Jaggi |
Dynamic node activation in networks of rechargeable sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 14(1), pp. 15-26, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
rechargable sensors, sensor activation, spatial correlation |
20 | Lang Lin, Roy D. Yates, Predrag Spasojevic |
Adaptive transmission with finite code rates. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 52(5), pp. 1847-1860, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Lei Ying 0001, R. Srikant 0001, Atilla Eryilmaz, Geir E. Dullerud |
A Large Deviations Analysis of Scheduling in Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 52(11), pp. 5088-5098, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | George Yee |
Personalized Security for E-Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The First International Conference on Availability, Reliability and Security, ARES 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria, pp. 140-147, 2006, IEEE Computer Society, 0-7695-2567-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Nicole Megow, Tjark Vredeveld |
Approximation in Preemptive Stochastic Online Scheduling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESA ![In: Algorithms - ESA 2006, 14th Annual European Symposium, Zurich, Switzerland, September 11-13, 2006, Proceedings, pp. 516-527, 2006, Springer, 3-540-38875-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Chetan Shiva Shankar, Roy H. Campbell |
Managing Pervasive Systems using Role-based Obligation Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PerCom Workshops ![In: 4th IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2006 Workshops), 13-17 March 2006, Pisa, Italy, pp. 373-377, 2006, IEEE Computer Society, 0-7695-2520-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Byeong Heon Cho, Sung Hoon Jung, Kwang-Hyun Shim, Yeong Rak Seong, Ha Ryoung Oh |
Reinforcement Learning of Intelligent Characters in Fighting Action Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2006, 5th International Conference, Cambridge, UK, September 20-22, 2006, Proceedings, pp. 310-313, 2006, Springer, 3-540-45259-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Ritu Chadha |
Beyond the Hype: Policies for Military Network Operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSNC ![In: Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29 - November 3, 2006, Papeete, Tahiti, French Polynesia, pp. 38, 2006, IEEE Computer Society, 0-7695-2699-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Kayvan Mosharaf, Jerome Talim, Ioannis Lambadaris |
Optimal Resource Allocation and Fairness Control in All-Optical WDM Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 23(8), pp. 1496-1507, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Charles Pandana, K. J. Ray Liu |
Near-optimal reinforcement learning framework for energy-aware sensor communications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE J. Sel. Areas Commun. ![In: IEEE J. Sel. Areas Commun. 23(4), pp. 788-797, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Vladimir Kolovski, Bijan Parsia, Yarden Katz, James A. Hendler |
Representing Web Service Policies in OWL-DL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2005, 4th International Semantic Web Conference, ISWC 2005, Galway, Ireland, November 6-10, 2005, Proceedings, pp. 461-475, 2005, Springer, 3-540-29754-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Koushik Kar, Ananth Krishnamurthy, Neeraj Jaggi |
Dynamic node activation in networks of rechargeable sensors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 1997-2007, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Paolo Giaccone, Emilio Leonardi, Devavrat Shah |
On the maximal throughput of networks with finite buffers and its application to buffered crossbars. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INFOCOM ![In: INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 13-17 March 2005, Miami, FL, USA, pp. 971-980, 2005, IEEE, 0-7803-8968-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Pradeep Varakantham, Rajiv T. Maheswaran, Milind Tambe |
Implementation Techniques for Solving POMDPs in Personal Assistant Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PROMAS ![In: Programming Multi-Agent Systems, Third International Workshop, ProMAS 2005, Utrecht, The Netherlands, July 26, 2005, Revised and Invited Papers, pp. 76-89, 2005, Springer, 3-540-32616-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Hazem H. Hamed, Ehab S. Al-Shaer, Will Marrero |
Modeling and Verification of IPSec and VPN Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: 13th IEEE International Conference on Network Protocols (ICNP 2005), 6-9 November 2005, Boston, MA, USA, pp. 259-278, 2005, IEEE Computer Society, 0-7695-2437-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Jan Peters 0001, Sethu Vijayakumar, Stefan Schaal |
Natural Actor-Critic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML ![In: Machine Learning: ECML 2005, 16th European Conference on Machine Learning, Porto, Portugal, October 3-7, 2005, Proceedings, pp. 280-291, 2005, Springer, 3-540-29243-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Jan Cosyn, Karl Sigman |
Stochastic Networks: Admission and Routing Using Penalty Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 48(3-4), pp. 237-262, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
exponential penalty, stochastic knapsack, admission control, routing control |
20 | Jae-Hoon Kim 0001 |
Optimal Buffer Management via Resource Augmentation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 15th International Symposium, ISAAC 2004, Hong Kong, China, December 20-22, 2004, Proceedings, pp. 618-628, 2004, Springer, 3-540-24131-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Yanyan Yang, Charles U. Martel, Shyhtsun Felix Wu |
On building the minimum number of tunnels: an ordered-split approach to manage IPSec/VPN policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS (1) ![In: Managing Next Generation Convergence Networks and Services, IEEE/IFIP Network Operations and Management Symposium, NOMS 2004, Seoul, Korea, 19-23 April 2004, Proceedings, pp. 277-290, 2004, IEEE, 0-7803-8230-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Francisco J. Cazorla, Alex Ramírez, Mateo Valero, Enrique Fernández |
Dynamically Controlled Resource Allocation in SMT Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICRO ![In: 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 4-8 December 2004, Portland, OR, USA, pp. 171-182, 2004, IEEE Computer Society, 0-7695-2126-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Chiu-Man Yu, Kam-Wing Ng |
A Dynamic Management Framework for Security Policies in Open Grid Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing - GCC 2004: Third International Conference, Wuhan, China, October 21-24, 2004. Proceedings, pp. 871-874, 2004, Springer, 3-540-23564-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Philip W. L. Fong |
Access Control By Tracking Shallow Execution History. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2004 IEEE Symposium on Security and Privacy (S&P 2004), 9-12 May 2004, Berkeley, CA, USA, pp. 43-55, 2004, IEEE Computer Society, 0-7695-2136-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
20 | Mike Chen, Charuhas Pandit, Sean P. Meyn |
In Search of Sensitivity in Network Optimization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 44(4), pp. 313-363, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
scheduling, routing, queueing networks, optimal control |
20 | Yeongsub Cho, Sangrae Cho, Daeseon Choi, Seunghun Jin, Kyoil Chung, Cheehang Park |
A Location Privacy Protection Mechanism for Smart Space. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 162-173, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Ting Yu 0001, Marianne Winslett |
A Unified Scheme for Resource Protection in Automated Trust Negotiation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11-14 May 2003, Berkeley, CA, USA, pp. 110-122, 2003, IEEE Computer Society, 0-7695-1940-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith |
Design and Implementation of Virtual Private Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 12th IEEE International Workshops on Enabling Technologies (WETICE 2003), Infrastructure for Collaborative Enterprises, 9-11 June 2003, Linz, Austria, pp. 269-274, 2003, IEEE Computer Society, 0-7695-1963-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Ricardo Nabhen, Edgard Jamhour, Carlos Maziero |
RBPIM: A PCIM-Based Framework for RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), The Conference on Leading Edge and Practical Computer Networking, 20-24 October 2003, Bonn/Königswinter, Germany, Proceedings, pp. 52-, 2003, IEEE Computer Society, 0-7695-2037-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Philippe de Cuetos, Keith W. Ross |
Adaptive rate control for streaming stored rine-grained scalable video. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOSSDAV ![In: Network and Operating System Support for Digital Audio and Video, 12th International Workshop, NOSSDAV 2002, Miami Beach, Florida, USA, May 12-14, 2002, Proceedings, pp. 3-12, 2002, ACM. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
fine-grained scalability, internet video streaming, network-adaptive applications |
20 | Hamid Beigy, Mohammad Reza Meybodi |
A Learning Automata Based Dynamic Guard Channel Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EurAsia-ICT ![In: EurAsia-ICT 2002: Information and Communication Technology, First EurAsian Conference, Shiraz, Iran, October 29-31, 2002, Proceedings, pp. 643-650, 2002, Springer, 3-540-00028-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Hamid Beigy, Mohammad Reza Meybodi |
Call Admission Control in Cellular Mobile Networks: A Learning Automata Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EurAsia-ICT ![In: EurAsia-ICT 2002: Information and Communication Technology, First EurAsian Conference, Shiraz, Iran, October 29-31, 2002, Proceedings, pp. 450-457, 2002, Springer, 3-540-00028-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
20 | Tadashige Iwao, Yuji Wada, Makoto Okada, Makoto Amamiya |
A Framework for the Exchange and Installation of Protocols in a Multi-agent System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIA ![In: Cooperative Information Agents V, 5th International Workshop, CIA 2001, Modena, Italy, September 6-8, 2001, Proceedings, pp. 211-222, 2001, Springer, 3-540-42545-4. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
20 | Debendra Das Sharma, Dhiraj K. Pradhan |
Job Scheduling in Mesh Multicomputers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Parallel Distributed Syst. ![In: IEEE Trans. Parallel Distributed Syst. 9(1), pp. 57-70, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
deallocation, scheduling, mesh, priority, Allocation, reservation |
20 | Ramachandran Ramjee, Donald F. Towsley, Ramesh Nagarajan |
On optimal call admission control in cellular networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Wirel. Networks ![In: Wirel. Networks 3(1), pp. 29-41, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
20 | Sivarama P. Dandamudi |
The Effect of Scheduling Discipline on Dynamic Load Sharing in Heterogeneous Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MASCOTS ![In: MASCOTS 1997, Proceedings of the Fifth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, January 12-15, 1997 Haifa, Israel, pp. 17-, 1997, IEEE Computer Society, 0-8186-7758-9. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
|
|