The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for policies with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1971 (19) 1972-1974 (24) 1975-1976 (22) 1977 (16) 1978-1979 (25) 1980 (20) 1981-1982 (25) 1983 (18) 1984 (19) 1985-1986 (31) 1987 (28) 1988 (28) 1989 (43) 1990 (40) 1991 (48) 1992 (60) 1993 (82) 1994 (90) 1995 (103) 1996 (121) 1997 (140) 1998 (166) 1999 (240) 2000 (344) 2001 (395) 2002 (510) 2003 (690) 2004 (832) 2005 (984) 2006 (1189) 2007 (1313) 2008 (1262) 2009 (986) 2010 (559) 2011 (524) 2012 (460) 2013 (468) 2014 (462) 2015 (493) 2016 (454) 2017 (483) 2018 (560) 2019 (611) 2020 (661) 2021 (732) 2022 (813) 2023 (757) 2024 (166)
Publication types (Num. hits)
article(6540) book(11) data(3) incollection(96) inproceedings(11253) phdthesis(197) proceedings(16)
Venues (Conferences, Journals, ...)
CoRR(1328) POLICY(378) Eur. J. Oper. Res.(208) Oper. Res.(168) WSC(156) SACMAT(148) HICSS(126) CDC(110) ICRA(105) AAMAS(104) Comput. Ind. Eng.(98) Ann. Oper. Res.(84) SAC(84) IEEE Trans. Autom. Control.(83) IPDPS(83) Reliab. Eng. Syst. Saf.(77) More (+10 of total 3391)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10474 occurrences of 3799 keywords

Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
33Danny C. C. Poo Policy Definition in Application-Domain-Related Classes. Search on Bibsonomy TOOLS (27) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Software Maintenance, Policies, Business Rules, Classes, Object-Oriented Software Engineering
32Jean-Phillipe Martin, Michael Hicks 0001, Manuel Costa, Periklis Akritidis, Miguel Castro 0001 Dynamically checking ownership policies in concurrent c/c++ programs. Search on Bibsonomy POPL The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, testing, concurrency, debugging, tools, dynamic analysis
32Bruce E. Hajek, Kevin Mitzel, Sichao Yang Paging and Registration in Cellular Networks: Jointly Optimal Policies and an Iterative Algorithm. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
32Christophe De Vleeschouwer, Pascal Frossard Dependent Packet Transmission Policies in Rate-Distortion Optimized Media Scheduling. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jian Ni, Danny H. K. Tsang, Sekhar Tatikonda, Brahim Bensaou Optimal and Structured Call Admission Control Policies for Resource-Sharing Systems. Search on Bibsonomy IEEE Trans. Commun. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Mikko T. Siponen, Seppo Pahnila, M. Adam Mahmood Employees' Adherence to Information Security Policies: An Empirical Study. Search on Bibsonomy SEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Kris Verlaenen, Bart De Win, Wouter Joosen Policy Analysis Using a Hybrid Semantic Reasoning Engine. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Zvi Rosberg Asymptotically Optimal Power Control Policies for MMSE Multiuser Detector. Search on Bibsonomy Wirel. Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF random spreading sequence, MMSE multiuser detector, power control, CDMA, outage probability, fading channels
32Romuald Thion, Stéphane Coulondre Modeling and Inferring on Role-Based Access Control Policies Using Data Dependencies. Search on Bibsonomy DEXA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Raphael M. Bahati, Michael A. Bauer 0001, Elvis M. Vieira, O. K. Baek Using Policies to Drive Autonomic Management. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Sufyan Almajali, Tzilla Elrad Dynamic Network Policies Using Aspect Oriented Network Framework. Search on Bibsonomy ICN/ICONS/MCL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Matthew Caesar 0001, Jennifer Rexford BGP routing policies in ISP networks. Search on Bibsonomy IEEE Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
32Sankalp Kallakuri, Alex Doboli, Simona Doboli Stochastic Modeling Based Environment for Synthesis and Comparison of Bus Arbitration Policies. Search on Bibsonomy ISVLSI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
32Ping Xuan, Victor R. Lesser Multi-agent policies: from centralized ones to decentralized ones. Search on Bibsonomy AAMAS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF agent comm languages and protocols, coordinating multi agents & activities, cooperation, action selection and planning, methodologies and tools
32S. Dandamudi, C.-Y. Chow Performance of transaction scheduling policies for parallel database systems. Search on Bibsonomy ICDCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
32Hassan Takabi, Morteza Amini, Rasool Jalili Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
32Jun Feng, Lingling Cui, Glenn S. Wasson, Marty Humphrey Policy-Directed Data Movement in Grids. Search on Bibsonomy ICPADS (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
32Adam Wierman, Mor Harchol-Balter, Takayuki Osogami Nearly insensitive bounds on SMART scheduling. Search on Bibsonomy SIGMETRICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF PSJF, preemptive shortest job first, scheduling, response time, processor sharing, M/G/1, SMART, SRPT, shortest remaining processing time, PS
32Annie I. Antón, Julia Brande Earp A requirements taxonomy for reducing Web site privacy vulnerabilities. Search on Bibsonomy Requir. Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security requirements, Privacy requirements
32Yan-Nong Huang, Ming-Chien Shan Policy-Based Resource Management. Search on Bibsonomy CAiSE The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Interval-Based, Workflow, Policy, Query Rewriting, Resource
32Ashok K. Thareja, Ashok K. Agrawala Characterization of an optimal delayed resolution policy. Search on Bibsonomy SIGMETRICS The full citation details ... 1983 DBLP  DOI  BibTeX  RDF
30Jeffrey A. Vaughan, Stephen Chong Inference of Expressive Declassification Policies. Search on Bibsonomy IEEE Symposium on Security and Privacy The full citation details ... 2011 DBLP  DOI  BibTeX  RDF declassification policies, inference of security policies, information flow, language-based security
30Paul Seymer, Angelos Stavrou, Duminda Wijesekera, Sushil Jajodia QoP and QoS Policy Cognizant Module Composition. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Policy-based software composition, Policies for software interfaces, Policies for aspect-oriented software
30Marianne Winslett, Charles C. Zhang, Piero A. Bonatti PeerAccess: a logic for distributed authorization. Search on Bibsonomy CCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF logical signature, proof hints, release policies, P2P systems, distributed authorization, sticky policies
30Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne Domain and Type Enforcement Firewalls. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP
30Raymond J. Madachy System Dynamics Modeling of an Inspection-Based Process. Search on Bibsonomy ICSE The full citation details ... 1996 DBLP  BibTeX  RDF development phases, dynamic process factors, error flows, industrial data, inspection policies, inspection-based software lifecycle process, knowledge-based method, managerial policies, manpower allocation, personnel flows, process evaluation, quantitative process evaluation, software project dynamics, system dynamics modeling, task flows, scheduling, knowledge based systems, project management, quality, risk management, calibration, inspection, risk assessment, cost estimation, software development management, quality control, software cost estimation, project planning, human resource management, personnel
30Nicholas Yialelis, Emil Lupu, Morris Sloman Role-based security for distributed object systems. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF role based security, multi organisational enterprise, role framework, obligation policies, domain based authentication service, replicated servers, minimal state, access control, distributed processing, role based access control, security policies, authorisation, security architecture, distributed object systems, access rights, symmetric cryptography, security agents
30Brian Wongchaowart, Adam J. Lee Oblivious enforcement of hidden information release policies. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF distributed proof, hidden credentials, hidden policies
30Heiko Klarl, Florian Marmé, Christian Wolff 0001, Christian Emig, Sebastian Abeck An MDA-Based Environment for Generating Access Control Policies. Search on Bibsonomy TrustBus The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Model-driven Development Process, Identity Management, Access Control Policies, Model-driven Security
30Patrick Gage Kelley, Paul Hankes Drielsma, Norman M. Sadeh, Lorrie Faith Cranor User-controllable learning of security and privacy policies. Search on Bibsonomy AISec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security and privacy policies, user-controllable learning, usable security
30Jan Reineke 0001, Daniel Grund, Christoph Berg, Reinhard Wilhelm Timing predictability of cache replacement policies. Search on Bibsonomy Real Time Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Predictability, Timing analysis, Hard real-time systems, Cache replacement policies, Cache analysis
30José Niño-Mora Marginal Productivity Index Policies for Admission Control and Routing to Parallel Multi-server Loss Queues with Reneging. Search on Bibsonomy NET-COOP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF loss queues, admission control, dynamic routing, multi-server, parallel queues, index policies
30José Niño-Mora Marginal productivity index policies for scheduling a multiclass delay-/loss-sensitive queue. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Multiclass queue, Multi-queue switch, Delay-sensitive, Loss-sensitive, Restless bandits, Work-cost analysis, Index policies, Bias optimality, Scheduling, Conservation laws, Finite buffers
30Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri Semantic Web Policies - A Discussion of Requirements and Research Issues. Search on Bibsonomy ESWC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Integrated heterogeneous policies, Cooperative policy enforcement, Lightweight trust, Explanation mechanisms, Trust management, Natural language interfaces
30Roland Rieke Modelling and Analysing Network Security Policies in a Given Vulnerability Setting. Search on Bibsonomy CRITIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF attack simulation, network security policies, security modelling and simulation, risk assessment, threats analysis, critical infrastructure protection
30Jay Ligatti, Lujo Bauer, David Walker 0001 Edit automata: enforcement mechanisms for run-time security policies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Run-time checking and monitoring, Classification of security policies, Language-based security, Security automata
30Arsalan Farrokh, Vikram Krishnamurthy Optimal Threshold Policies for Operation of a Dedicated-Platform with Imperfect State Information - A POMDP Framework. Search on Bibsonomy ECSQARU The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Partially Observable Markov Decision Process (POMDP), optimal threshold policies, Bellman equation, two-state Markov chain, overlook probability, dynamic programming, Hidden Markov Model (HMM), sufficient statistics, optimal search
30Christian Guttmann, Ingrid Zukerman Voting policies that cope with unreliable agents. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF unreliable team members, variable performance, voting policies, agent collaboration
30J.-M. Bollon, Maria di Mascolo, Yannick Frein Unified Framework for Describing and Comparing the Dynamics of Pull Control Policies. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pull control policies, basestock, generalized kanban, extended kanban, (min,+) algebra, queueing systems
30Stephen Chong, Andrew C. Myers Security policies for downgrading. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF information flow, security policies, noninterference, declassification, downgrading
30Claudia Schremmer Empirical Evaluation of Boundary Policies for Wavelet-Based Image Coding. Search on Bibsonomy WAA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Boundary Policies, Empirical Evaluation, Wavelet Analysis
30André L. M. dos Santos, Richard A. Kemmerer Implementing Security Policies using the Safe Areas of Computation Approach. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Safe Areas of Computation approach, business costs, SAC approach, Internet, Internet, World Wide Web, digital libraries, digital libraries, security policies, authorisation, information resources, telecommunication security, bank data processing, access control lists, online banks
30Constantinos Maglaras Dynamic scheduling in multiclass queueing networks: Stability under discrete-review policies. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF open multiclass queueing networks, discrete-review policies, scheduling, stability, fluid models
30I-Lung Kao, Randy Chow Enforcing complex security policies for commercial applications. Search on Bibsonomy COMPSAC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF complex security policy enforcement, commercial applications, complex access control policies, multilevel security model, systematic frequently-desired multilevel exception categorization, commercial sectors, classified categories, Boolean functions, exception handling, security of data, authorisation, Boolean expressions
29Hang Zhao, Jorge Lobo 0001, Steven M. Bellovin An Algebra for Integration and Analysis of Ponder2 Policies. Search on Bibsonomy POLICY The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Apu Kapadia, Prasad Naldurg, Roy H. Campbell Distributed Enforcement of Unlinkability Policies: Looking Beyond the Chinese Wall. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Marco Casassa Mont, Filipe Beato On Parametric Obligation Policies: Enabling Privacy-Aware Information Lifecycle Management in Enterprises. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Carlos Alberto Kamienski, Joseane Farias Fidalgo, Ramide Dantas, Djamel Sadok, Börje Ohlman XACML-Based Composition Policies for Ambient Networks. Search on Bibsonomy POLICY The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Karl Quinn, David Lewis 0001, Declan O'Sullivan, Vincent P. Wade Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management. Search on Bibsonomy POLICY The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Pedro Gama, Paulo Ferreira 0001 Obligation Policies: An Enforcement Platform. Search on Bibsonomy POLICY The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Linying Su, David W. Chadwick, Andrew Basden, James A. Cunningham Automated Decomposition of Access Control Policies. Search on Bibsonomy POLICY The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Pranam Kolari, Li Ding 0001, Shashidhara Ganjugunte, Anupam Joshi, Timothy W. Finin, Lalana Kagal Enhancing Web Privacy Protection through Declarative Policies. Search on Bibsonomy POLICY The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Charles Riedesel, Eric D. Manley, Susan Poser, Jitender S. Deogun A model academic ethics and integrity policy for computer science departments. Search on Bibsonomy SIGCSE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF codes of conduct, integrity, policies, ethics
29Chamseddine Talhi, Nadia Tawbi, Mourad Debbabi Execution monitoring enforcement for limited-memory systems. Search on Bibsonomy PST The full citation details ... 2006 DBLP  DOI  BibTeX  RDF bounded history automata, enforcement mechanisms, locally-testable properties, security policies, execution monitoring, edit automata
29Brian M. Carlson, Lawrence W. Dowdy Static Processor Allocation in a Soft Real-Time Multiprocessor Environment. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1994 DBLP  DOI  BibTeX  RDF static processor allocation, soft real-time multiprocessor environment, parallelenvironment, static allocation policies, equal partitions, two partitions, 16-node iPSC/2hypercube, real-time systems, resource allocation, hypercube networks, multiprocessing programs
29Lujo Bauer, Jay Ligatti, David Walker 0001 Composing expressive runtime security policies. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF policy-specification language, policy enforcement, Policy composition
29Su-Hui Chiang, Sangsuree Vasupongayya Design and Potential Performance of Goal-Oriented Job Scheduling Policies for Parallel Computer Workloads. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Trilce Estrada, Olac Fuentes, Michela Taufer A distributed evolutionary method to design scheduling policies for volunteer computing. Search on Bibsonomy Conf. Computing Frontiers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF volatile systems, genetic algorithms, distributed systems, global computing
29Nikhil Swamy, Brian J. Corcoran, Michael Hicks 0001 Fable: A Language for Enforcing User-defined Security Policies. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF verified enforcement, access control, information flow, provenance, Language-based security
29Lalana Kagal, Tim Finin Modeling conversation policies using permissions and obligations. Search on Bibsonomy Auton. Agents Multi Agent Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Conversation policy, Conversation specifications, Speech act ontology, Agent communication, Permissions, Obligations, Ontology languages
29Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Pierangela Samarati Access Control Policies and Languages in Open Environments. Search on Bibsonomy Secure Data Management in Decentralized Systems The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Kiyohiko Okayama, Nariyoshi Yamai, Hayato Ishibashi, Kota Abe, Toshio Matsuura An Efficient Management Method of Access Policies for Hierarchical Virtual Private Networks. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
29Qingfeng He, Paul N. Otto, Annie I. Antón, Laurie A. Jones Ensuring Compliance between Policies, Requirements and Software Design: A Case Study. Search on Bibsonomy IWIA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Anna V. Álvarez, Karen A. García, Raúl Monroy, Luis A. Trejo, Jesús Vázquez A Tool for Managing Security Policies in Organisations. Search on Bibsonomy IWSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Evan Martin, Tao Xie 0001, Ting Yu 0001 Defining and Measuring Policy Coverage in Testing Access Control Policies. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
29Jonathan D. Pincus, Jeannette M. Wing Towards an Algebra for Security Policies. Search on Bibsonomy ICATPN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Marco Antonio Montes de Oca, Leonardo Garrido, José-Luis Aguirre Effects of Inter-agent Communication in Ant-Based Clustering Algorithms: A Case Study on Communication Policies in Swarm Systems. Search on Bibsonomy MICAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Cédric Fournet, Andrew D. Gordon 0001, Sergio Maffeis A Type Discipline for Authorization Policies. Search on Bibsonomy ESOP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Dakshi Agrawal, James Giles, Kang-Won Lee, Jorge Lobo 0001 Policy Ratification. Search on Bibsonomy POLICY The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Phan Minh Dung, Phan Minh Thang Trust Negotiation with Nonmonotonic Access Policies. Search on Bibsonomy INTELLCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Hubie Chen, Stephen Chong Owned Policies for Information Security. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Zeyad Ali, Qutaibah M. Malluhi Application-Controllable Policies in the NSM Distributed Mass Storage System. Search on Bibsonomy CLADE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Ewen Denney, Bernd Fischer 0002 Correctness of Source-Level Safety Policies. Search on Bibsonomy FME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF program safety, code certification, Program verification, Hoare logic, proof-carrying code
29Bianca Schroeder, Mor Harchol-Balter Evaluation of Task Assignment Policies for Supercomputing Servers: The Case for Load Unbalancing and Fairness. Search on Bibsonomy HPDC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
29Ira A. Smith, Philip R. Cohen, Jeffrey Bradshaw, Mark Greaves, Heather Holmback Designing Conversation Policies using Joint Intention Theory. Search on Bibsonomy ICMAS The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
29Latha S. Colby, Akira Kawaguchi, Daniel F. Lieuwen, Inderpal Singh Mumick, Kenneth A. Ross Supporting Multiple View Maintenance Policies. Search on Bibsonomy SIGMOD Conference The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
29Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian, Elisa Bertino A Unified Framework for Enforcing Multiple Access Control Policies. Search on Bibsonomy SIGMOD Conference The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
29Elisa Bertino, Sushil Jajodia, Pierangela Samarati Supporting Multiple Access Control Policies in Database Systems. Search on Bibsonomy S&P The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
29Su-Hui Chiang, Rajesh K. Mansharamani, Mary K. Vernon Use of Application Characteristics and Limited Preemption for Run-to-Completion Parallel Processor Scheduling Policies. Search on Bibsonomy SIGMETRICS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
29Zhen Liu 0001, Philippe Nain, Donald F. Towsley On optimal polling policies. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF polling policy, optimal stochastic scheduling, coupling, Polling system, stochastic ordering
29Scott T. Leutenegger, Mary K. Vernon The Performance of Multiprogrammed Multiprocessor Scheduling Policies. Search on Bibsonomy SIGMETRICS The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
28Gregory Neven Privacy-enhanced access control in primelife. Search on Bibsonomy Digital Identity Management The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
28Steven Davy, Brendan Jennings, John Strassner Application domain independent policy conflict analysis using information models. Search on Bibsonomy NOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
28Adam Wierman, Misja Nuyens Scheduling despite inexact job-size information. Search on Bibsonomy SIGMETRICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF job size estimates, scheduling, response time, queueing, M/G/1, SMART, SRPT, shortest remaining processing time
28Jun Feng, Glenn S. Wasson, Marty Humphrey Resource usage policy expression and enforcement in grid computing. Search on Bibsonomy GRID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
28Aaron D. Jaggard, Vijay Ramachandran Robust Path-Vector Routing Despite Inconsistent Route Preferences. Search on Bibsonomy ICNP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
28Lalana Kagal, Timothy W. Finin Modeling Communicative Behavior Using Permissions and Obligations. Search on Bibsonomy AC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
28Sivarama P. Dandamudi, K. C. Michael Lo A Hierarchical Load Sharing Policy for Distributed Systems. Search on Bibsonomy MASCOTS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
27Molka Gharbaoui, Francesco Paolucci, Barbara Martini, Filippo Cugini, Piero Castoldi Behavior-Based Policies for Preserving Confidentiality in PCE-based Multi-domain MPLS Networks. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF PCE, Policies, Confidentiality, XACML
27Marco Casassa Mont, Richard Brown 0001 Risk Assessment and Decision Support for Security Policies and Related Enterprise Operational Processes. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF Security Analytics, Simulation, Modelling, Decision Support, Security Policies, Risk Assessment, Access Management
27Sören Preibusch Information Flow Control for Static Enforcement of User-Defined Privacy Policies. Search on Bibsonomy POLICY The full citation details ... 2011 DBLP  DOI  BibTeX  RDF privacy policy enforcement, user-defined policies, JIF, privacy negotiations, electronic commerce, case-study, information flow control
27JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu, Mine Altunay ACPT: A Tool for Modeling and Verifying Access Control Policies. Search on Bibsonomy POLICY The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Policy Testing, Access Control Policies, Policy Verification, Policy Modeling
26David A. Basin, Felix Klaedtke, Samuel Müller 0002 Monitoring security policies with metric first-order temporal logic. Search on Bibsonomy SACMAT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF access control, monitoring, temporal logic, security policies, compliance, separation of duty, usage control
26Yi Wang, Min Zhang 0002 Penalty policies in professional software development practice: a multi-method field study. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF penalty policies, perception and performance of software developers, software defects
26Elisa Gebennini, Sara Dallari, Giuseppe Perrica, Andrea Grassi, Bianca Rimini, Cesare Fantuzzi Adoption of control policies in a simulative model for the design of AGV systems. Search on Bibsonomy SpringSim The full citation details ... 2009 DBLP  DOI  BibTeX  RDF AGV system, design support systems, discrete event simulation, control policies
26Francisco J. Arcelus, T. P. M. Pakkala, Gopalan Srinivasan Retailer's inventory policies for a one time only manufacturer trade deal of uncertain duration. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Inventory/marketing/production interface, Discount-duration uncertainty, Temporary-sales policies
26Jackie Phahlamohlaka Globalisation and national security issues for the state: Implications for national ICT policies. Search on Bibsonomy HCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF national ICT policies, information and communications technologies, security threats, Globalisation, national security
26Benoît Combemale, Laurent Broto, Alain Tchana, Daniel Hagimont Metamodeling Autonomic System Management Policies - Ongoing Works. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Management policies, Autonomic computing, metamodeling, DSL
26Martin Karusseit, Tiziana Margaria, Holger Willebrandt Policy expression and checking in XACML, WS-Policies, and the jABC. Search on Bibsonomy TAV-WEB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF model checking, access control, validation, policies
26Carla Merkle Westphall, Joni da Silva Fraga Mandatory and Discretionary Policies for CORBA Security. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CORBAsec, authorization, Security policies, common criteria, security evaluation
Displaying result #101 - #200 of 18116 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license