The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for legitimacy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1987-2000 (17) 2001-2003 (19) 2004-2005 (29) 2006 (33) 2007 (18) 2008 (16) 2009-2010 (17) 2011-2013 (17) 2014-2015 (15) 2016-2017 (26) 2018-2019 (30) 2020-2021 (27) 2022 (19) 2023 (22) 2024 (3)
Publication types (Num. hits)
article(143) incollection(1) inproceedings(161) phdthesis(2) proceedings(1)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 164 occurrences of 143 keywords

Results
Found 308 publication records. Showing 308 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Mattias Kettner Deliberative democracy : from Rational Discourse to Public Debate. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Kai K. Kimppa Introduction to part II. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Chris Zielinski Introduction to part V. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Deborah G. Johnson Democracy, Technology, and Information Societies. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jean Herveg, Yves Poullet Which Major Legal Concerns in future e-Health? Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Eric Brousseau When Economics meets Ethics : the Governance of Economic Activities in the Information Society. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Penny Duquenoy The Information Society : What Next? Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Philippe Defraigne Economy, Industry, Innovation and Technical Democracy. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Diane Whitehouse Introduction to part IV. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Les Neal Embedding Professional Issues within University Degree Courses. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20René von Schomberg From the Ethics of Technology to the Ethics of Knowledge Assessment. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jeroen van den Hoven ICT and Value Sensitive Design. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Tom Dedeurwaerdere The Institutional Dynamics of Sharing Biological Information : Towards Reflexive Governance of the Information Society. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Stefano Rodotà Democracy, innovation, and the information society. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Jacques Berleur Governance Challenges: First Lessons from the WSIS - An Ethical and Social Perspective. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yves Poullet Internet Governance : Some Thoughts after the two WSIS. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Kai K. Kimppa Introduction to part III. Search on Bibsonomy The Information Society The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
20Yariv Tsfati, Jonathan Cohen 0002 The Influence of Presumed Media Influence on Democratic Legitimacy. Search on Bibsonomy Commun. Res. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Youngmin Yoon Legitimacy, Public Relations, and Media Access: Proposing and Testing a Media Access Model. Search on Bibsonomy Commun. Res. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Nick G. Duffield Stress Testing Traffic to Infer Its Legitimacy. Search on Bibsonomy SRUTI The full citation details ... 2005 DBLP  BibTeX  RDF
20Randall B. Kemp, Pnina Shachaf, Kenneth Einar Himma, Cavinda Caldera, Kathryn Clodfelter The moral legitimacy of intellectual property and copyright as policy and code: Librarians, pirates, and the myth of the intellectual commons. Search on Bibsonomy ASIST The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
20Kalle Lyytinen, John Leslie King Nothing At The Center?: Academic Legitimacy in the Information Systems Field. Search on Bibsonomy J. Assoc. Inf. Syst. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Armin Grunwald Participation as a means of enhancing the legitimacy of decisions on technology? A sceptical analysis. Search on Bibsonomy Poiesis Prax. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Bernd Carsten Stahl E-Teaching: The Economic Threat to the Ethical Legitimacy of Education? Search on Bibsonomy J. Inf. Syst. Educ. The full citation details ... 2004 DBLP  BibTeX  RDF
20Frantz Rowe, Duane P. Truex, Lynette Kvasny Cores and Definitions: Building the Cognitive Legitimacy of the Information Systems Discipline Across the Atlantic. Search on Bibsonomy Relevant Theory and Informed Practice The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
20Daniel Robey Identity, Legitimacy and the Dominant Research Paradigm: An Alternative Prescription for the IS Discipline: A Response to Benbasat and Zmud's Call for Returning to the IT Artifact. Search on Bibsonomy J. Assoc. Inf. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Stephan Lingner Legitimacy of tolerating limited environmental pollution? The case for natural attenuation. Search on Bibsonomy Poiesis Prax. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Kåre Lines, Kim Viborg Andersen, Eric Montiero MIS and the Dynamics of Legitimacy in Health Care. Search on Bibsonomy Diffusion and Adoption of Networked Information Technologies The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Roshan K. Thomas, Brian L. Mark, Tommy Johnson, James Croall NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Roshan K. Thomas, Hong Zhu, Tim Huck, Tommy Johnson NetBouncer: Client-legitimacy-based High-performance DDoS Filtering. Search on Bibsonomy DISCEX (2) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Geoffry L. Taubman Keeping Out the Internet? Non-Democratic Legitimacy and Access to the Web. Search on Bibsonomy First Monday The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
20Jacques Berleur, Tanguy Ewbank de Wespin Self-regulation: Content, Legitimacy and Efficiency - Governance and Ethics. Search on Bibsonomy HCC The full citation details ... 2002 DBLP  BibTeX  RDF
20Tamir Sheafer Charismatic Skill and Media Legitimacy. Search on Bibsonomy Commun. Res. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
20Jonathan W. Palmer, Cheri Speier, Daniel Wren, Susan Hahn Electronic Journals in Business Schools: Legitimacy, Acceptance, and Use. Search on Bibsonomy J. Assoc. Inf. Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Clinton J. Andrews Restoring legitimacy to the systems approach. Search on Bibsonomy IEEE Technol. Soc. Mag. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
20Cheri Speier, Jonathan W. Palmer, Daniel Wren, Susan Hahn Faculty Perceptions of Electronic Journals as Scholarly Communication: A Question of Prestige and Legitimacy. Search on Bibsonomy J. Am. Soc. Inf. Sci. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Chris Westrup Knowledge, legitimacy and progress? Requirements as inscriptions in information systems development. Search on Bibsonomy Inf. Syst. J. The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
20Alex Morrison Hijack on the road to Xanadu: The Infringement of Copyright in HTML Documents via Networked Computers and the Legitimacy of Browsing Hypermedia Documents. Search on Bibsonomy J. Inf. Law Technol. The full citation details ... 1999 DBLP  BibTeX  RDF
20Michel Keable, Maurice Landry, Claude Banville The Legitimacy Gap Between IS Professionals and Users. Search on Bibsonomy Commun. ACM The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
20Claude Banville, Maurice Landry, Michel Keable On the sensitivity of IS professionals to the legitimacy of their interventions. Search on Bibsonomy ECIS The full citation details ... 1998 DBLP  BibTeX  RDF
20Dietmar Lippold The Legitimacy of Positions in Endgame Databases. Search on Bibsonomy J. Int. Comput. Games Assoc. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
20Linda Lan Introducing the Concept of Legitimacy of Participation. Search on Bibsonomy PACIS The full citation details ... 1995 DBLP  BibTeX  RDF
20Lynette A. C. Hunter AI and Representation: A Study of a Rhetorical Context for Legitimacy. Search on Bibsonomy AI Soc. The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
20Romain Laufer The Social Acceptability of AI Systems: Legitimacy Epistemology and Marketing. Search on Bibsonomy AI Soc. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
20J. Michael Steele Certifying smoothness of discrete functions and measuring legitimacy of images. Search on Bibsonomy J. Complex. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
15Adonis P. H. Fung, K. W. Cheung 0003 SSLock: sustaining the trust on entities brought by SSL. Search on Bibsonomy AsiaCCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF SSL trust management, domain naming convention, man-in-the-middle attacks
15Peter Muhlberger Information technology and public deliberation: research on improving public input into government. Search on Bibsonomy DG.O The full citation details ... 2010 DBLP  BibTeX  RDF public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking
15Björn Niehaves, Robert Malsch Democratizing Process Innovation? On Citizen Involvement in Public Sector BPM. Search on Bibsonomy EGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Quantitative Study, Empirical Study, Business Process Management, Public Sector
15Yan Bai, Xiao Su, Bharat K. Bhargava Adaptive Voice Spam Control with User Behavior Analysis. Search on Bibsonomy HPCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Tara Kelly, Jim Buckley An in-vivo study of the cognitive levels employed by programmers during software maintenance. Search on Bibsonomy ICPC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Baba Piprani A Model for Semantic Equivalence Discovery for Harmonizing Master Data. Search on Bibsonomy OTM Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Master Data, data equivalency, semantic interoperability, Entity Resolution, Semantic Equivalence
15Patrik Bichsel, Samuel Müller 0002, Franz-Stefan Preiss, Dieter Sommer, Mario Verdicchio Security and Trust through Electronic Social Network-Based Interactions. Search on Bibsonomy CSE (4) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Peter Muhlberger New research on public deliberation and information technology. Search on Bibsonomy D.GO The full citation details ... 2009 DBLP  BibTeX  RDF public input, collaboration, natural language processing, video, Wikipedia, government, collective intelligence, deliberation, rulemaking
15Robyn R. Mace Intelligence, Dataveillance, and Information Privacy. Search on Bibsonomy ISIPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF dataveillance, privacy, surveillance, intelligence, terrorism
15Naoki Iwasaki, Katsumi Wasaki A Meta Hardware Description Language Melasy for Model-Checking Systems. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hardware/Software co-design and co-verification, Model Checking, Haskell, Design-for-test, Hardware Compilers
15Tore Hoel, Jan M. Pawlowski, Paul A. Hollins Learning Technology Standards Development Planning for an Improved Process and Product. Search on Bibsonomy ICALT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Sharon S. Dawes, Theresa A. Pardo, Yuanfu Jiang A holistic framework for understanding government information access initiatives. Search on Bibsonomy ICEGOV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF cross-boundary information sharing, management, transformation, knowledge sharing, government, electronic governance
15Albert Jacob Meijer, Marcel Thaens What should government agencies do with information that is relevant for citizens? Search on Bibsonomy DG.O The full citation details ... 2008 DBLP  BibTeX  RDF information strategy, public information, structuration
15Kai Xing, Fang Liu 0025, Xiuzhen Cheng 0001, David Hung-Chang Du Real-Time Detection of Clone Attacks in Wireless Sensor Networks. Search on Bibsonomy ICDCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Johan Magnusson, Bo Oskarsson Evasive Maneuvers and Guerilla Tactics: A Scandinavian Institutional Perspective on Chief Information Officer's Strategies for Legitimization. Search on Bibsonomy HICSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
15Hongjie He, Jiashu Zhang, Heng-Ming Tai Block-Chain Based Fragile Watermarking Scheme with Superior Localization. Search on Bibsonomy Information Hiding The full citation details ... 2008 DBLP  DOI  BibTeX  RDF block-chain, security strength, false rejection rate, false acceptance rate, fragile watermarking
15Francesco Garibaldo Democratising change. Search on Bibsonomy AI Soc. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Sukumar Ghosh, Arobinda Gupta, Ted Herman, Sriram V. Pemmaraju Fault-containing self-stabilizing distributed protocols. Search on Bibsonomy Distributed Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed algorithms, Transformer, Self-stabilization, Fault-containment
15Prakash Kolan, Ram Dantu Socio-technical defense against voice spamming. Search on Bibsonomy ACM Trans. Auton. Adapt. Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SIP (Session Initiation Protocol), SPIT (Spam over IP Telephony), Trust, reputation, behavior, tolerance
15Kui Ren 0001, Wenjing Lou Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pervasive computing environment (PCE), context authentication, security, privacy, access control
15Philip Inglesant, Martina Angela Sasse Usability is the best policy: public policy and the lived experience of transport systems in London. Search on Bibsonomy BCS HCI (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF lived experience, design, usability, ubiquitous computing, e-government, embodied interaction, public policy
15Norman Makoto Su, Hiroko Wilensky, David F. Redmiles, Gloria Mark The gospel of knowledge management in and out of a professional community. Search on Bibsonomy GROUP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF social construction of technology, knowledge management, community of practice, aerospace industry
15B. Sathish Babu, Pallapa Venkataram Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach. Search on Bibsonomy IPDPS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Markus Wälchli, Piotr Skoczylas, Michael Meer, Torsten Braun Distributed Event Localization and Tracking with Wireless Sensors. Search on Bibsonomy WWIC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sensor network, tracking, monitoring, hardware
15Jeffrey Wilhelm, Tzi-cker Chiueh A Forced Sampled Execution Approach to Kernel Rootkit Identification. Search on Bibsonomy RAID The full citation details ... 2007 DBLP  DOI  BibTeX  RDF X86 ISA emulation, dynamic malware analysis, intrusion prevention, Bayes classifier, rootkit detection
15Elankayer Sithirasenan, Vallipuram Muthukkumarasamy Detecting Security Threats in Wireless LANs Using Timing and Behavioral Anomalies. Search on Bibsonomy ICON The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Srikanth Palla, Ram Dantu Unwanted SMTP Paths and Relays. Search on Bibsonomy COMSWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
15Carles Sierra, John K. Debenham The LOGIC negotiation model. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multiagent systems, negotiation
15Gualtiero Piccinini Computational explanation in neuroscience. Search on Bibsonomy Synth. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Computational explanation, Mechanistic explanation, Cognitive neuroscience, Theoretical neuroscience, Computationalism, Pancomputationalism, Computational theory of mind, Models, Representation, Computational neuroscience, Introspection
15Yoohwan Kim, Wing Cheong Lau, Mooi Choo Chuah, H. Jonathan Chao PacketScore: A Statistics-Based Packet Filtering Scheme against Distributed Denial-of-Service Attacks. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security, simulation, performance evaluation, network monitoring, traffic analysis, Network level security and protection
15Erica Melis, Martin Pollet, Jörg H. Siekmann Reductio ad Absurdum: Planning Proofs by Contradiction. Search on Bibsonomy Reasoning, Action and Interaction in AI Theories and Systems The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Johan Magnusson, Andreas Nilsson Infusing an Architectural Framework with Neo-Institutional Theory: Reports from Recent Change Management Initiatives within the Swedish Public Administration. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Youngsook Lee, Junghyun Nam, Seungjoo Kim, Dongho Won Two Efficient and Secure Authentication Schemes Using Smart Cards. Search on Bibsonomy ICCSA (5) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF smart card, password, mutual authentication, Authentication scheme
15Susanta Nanda, Wei Li 0020, Lap-Chung Lam, Tzi-cker Chiueh Foreign Code Detection on the Windows/X86 Platform. Search on Bibsonomy ACSAC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
15Hans Johnsen, Roger Normann, Jens Fosse Reflexive democracy: creating actionable knowledge through regional development coalitions. Search on Bibsonomy AI Soc. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Reflexive democracy, Regional development coalitions, Participation, Dialogue, Action research, Co-operation
15Haining Wang, Abhijit Bose, Mohamed A. El-Gendy, Kang G. Shin IP Easy-pass: a light-weight network-edge resource access control. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF resource access control, network QoS
15Martin Edin Grimheden, Martin Törngren What is embedded systems and how should it be taught?---results from a didactic analysis. Search on Bibsonomy ACM Trans. Embed. Comput. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Didactic analysis, education
15Michel Zitt, Suzy Ramanana-Rahary, Elise Bassecoulard Relativity of citation performance and excellence measures: From cross-field to cross-scale effects of field-normalisation. Search on Bibsonomy Scientometrics The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Francesco Palmieri 0002, Ugo Fiore Securing the MPLS Control Plane. Search on Bibsonomy HPCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF strong authentication, label distribution, integrity, MPLS, signaling
15Mahir Akgun, Kursat Cagiltay, Jeng-Yi Tzeng Computer Apology: The Effect of the Apologetic Feedback on Users in Computerized Environment. Search on Bibsonomy ICALT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Yanjiang Yang, Feng Bao 0001, Robert H. Deng Security Analysis and Fix of an Anonymous Credential System. Search on Bibsonomy ACISP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Nicholas Lambert The CACHe project: its work and outcomes. Search on Bibsonomy Creativity & Cognition The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Britain, history of graphics, computer graphics, cybernetics, computer art
15Ismail Khalil Ibrahim, Reinhard Kronsteiner, Gabriele Kotsis Norms Enforcement as a Coordination Strategy in Ubiquitous Environments. Search on Bibsonomy EUC Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
15Brian D. Carrier, Clay Shields The session token protocol for forensics and traceback. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF TCP traceback, auditing and intrusion detection, privacy, Digital forensics, digital investigations
15Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach Hack-a-Vote: Security Issues with Electronic Voting Systems. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF election fraud, security, electronic voting, hacking
15Chin-Chen Chang 0001, Iuon-Chang Lin Remarks on fingerprint-based remote user authentication scheme using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF conspiring attack, smart card, user authentication
15Shouhuai Xu, Moti Yung k-anonymous secret handshakes with reusable credentials. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems
15David D. Jensen, Jennifer Neville, Brian Gallagher Why collective inference improves relational classification. Search on Bibsonomy KDD The full citation details ... 2004 DBLP  DOI  BibTeX  RDF relational learning, probabilistic relational models, collective inference
15Lilly Irani Understanding gender and confidence in CS course culture. Search on Bibsonomy SIGCSE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF classroom case study, classroom issues, gender and diversity, gender and education, social factors in computing, confidence, women
15Vincent Homburg E-government and NPM: a perfect marriage? Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF e-government, virtual organizations, new public management
15Francesco Palmieri 0002 A Scalable PKI for Secure Routing in the Internet. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Ismail Khalil Ibrahim, Gabriele Kotsis, Reinhard Kronsteiner Substitution Rules for the Verification of Norm-Compliance in Electronic Institutions. Search on Bibsonomy WETICE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
15Ana Paula Cláudio, João Duarte Cunha A Race Detection Mechanism Embedded in a Conceptual Model for the Debugging of Message-Passing Distributed Programs. Search on Bibsonomy Euro-Par The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Ismail Khalil Ibrahim, Gabriele Kotsis, Wieland Schwinger Mapping Abstractions of Norms in Electronic Institutions. Search on Bibsonomy WETICE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
15Thomas F. Gordon, Gernot Richter Discourse Support Systems for Deliberative Democracy. Search on Bibsonomy EGOV The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
Displaying result #201 - #300 of 308 (100 per page; Change: )
Pages: [<<][1][2][3][4][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license