The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Delegation with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1967-1991 (21) 1992-1993 (16) 1994-1995 (21) 1996-1997 (23) 1998 (29) 1999 (17) 2000 (31) 2001 (39) 2002 (46) 2003 (75) 2004 (85) 2005 (123) 2006 (100) 2007 (110) 2008 (104) 2009 (93) 2010 (58) 2011 (80) 2012 (50) 2013 (54) 2014 (53) 2015 (45) 2016 (37) 2017 (36) 2018 (46) 2019 (60) 2020 (67) 2021 (50) 2022 (56) 2023 (63) 2024 (15)
Publication types (Num. hits)
article(504) book(1) incollection(7) inproceedings(1163) phdthesis(28)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 990 occurrences of 519 keywords

Results
Found 1703 publication records. Showing 1703 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
23Bruce Christianson, James A. Malcolm Delegation and Not-So Smart Cards (Position Paper). Search on Bibsonomy Security Protocols Workshop The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Oded Goldreich 0001, Birgit Pfitzmann, Ronald L. Rivest Self-Delegation with Controlled Propagation - or - What If You Lose Your Laptop. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
23Liisa Räihä Delegation: Dynamic Specialization. Search on Bibsonomy TRI-Ada The full citation details ... 1994 DBLP  DOI  BibTeX  RDF Ada
17Hua Wang 0002, Yanchun Zhang, Jinli Cao Effective Collaboration with Information Sharing in Virtual Universities. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
17Jian Weng 0001, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai Conditional proxy re-encryption secure against chosen-ciphertext attack. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, bilinear pairing, chosen-ciphertext security
17Cheng-Kang Chu, Jian Weng 0001, Sherman S. M. Chow, Jianying Zhou 0001, Robert H. Deng Conditional Proxy Broadcast Re-Encryption. Search on Bibsonomy ACISP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF conditional proxy re-encryption, hierarchical identity-coupling broadcast encryption, broadcast encryption, proxy re-encryption
17Caimu Tang, Dapeng Oliver Wu An Efficient Mobile Authentication Scheme for Wireless Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Ki-Woong Park, Sang Seok Lim, Kyu Ho Park Computationally Efficient PKI-Based Single Sign-On Protocol, PKASSO for Mobile Devices. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Network-level security and protection
17Youan Xiao New Self Certified Proxy Digital Signature Scheme based on Elliptic Curve Cryptosystem. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. Search on Bibsonomy SUTC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ontology, semantic web, rule, privacy protection, web 3.0, semantic email
17Vijay Erramilli, Mark Crovella Forwarding in opportunistic networks with resource constraints. Search on Bibsonomy Challenged Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF mobile opportunistic networks, delay tolerant networks, pocket switched networks, forwarding algorithms
17Raymond Hu, Nobuko Yoshida, Kohei Honda 0001 Session-Based Distributed Programming in Java. Search on Bibsonomy ECOOP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Youan Xiao, Zude Zhou A New Kind of Self-Certified Proxy Digital Signature Scheme. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Shangyuan Guan, Xiaoshe Dong, Yiduo Mei, Weiguo Wu, Zhenghua Xue Towards Automated Trust Negotiation for Grids. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Jan Tozicka, Stepán Urban, Magdalena Prokopová, Michal Pechoucek Filter Allocation Using Iterative ECNP. Search on Bibsonomy CIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Pei-Yih Ting, Fang-Dar Chu Enhancing the Security Promise of a Digital Time-Stamp. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hierarchical distributed time source, forward-secure digital signature, PKI, time-stamps
17Gang Yin, Huaimin Wang, Jian-quan Ouyang, Ning Zhou, Dian-xi Shi Towards Role Based Trust Management without Distributed Searching of Credentials. Search on Bibsonomy ICICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
17Felicia Ionescu, Vlad Nae, Alexandru Gherega Credentials Management for Authentication in a Grid-Based E-Learning Platform. Search on Bibsonomy ISPDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Mark Reith, Jianwei Niu 0001, William H. Winsborough Apply Model Checking to Security Analysis in Trust Management. Search on Bibsonomy ICDE Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Hua Wang 0002, Qing Li 0001 Secure and Efficient Information Sharing in Multi-university E-Learning Environments. Search on Bibsonomy ICWL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, E-Learning, Information sharing
17He Wang 0020, Sylvia L. Osborn Discretionary access control with the administrative role graph model. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF role graph model, role-based access control, DAC
17Donggang Liu Efficient and Distributed Access Control for Sensor Networks. Search on Bibsonomy DCOSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang A proxy blind signature scheme based on elliptic curve with proxy revocation. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Pedro Felix, Carlos Ribeiro A scalable and flexible web services authentication model. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF authentication, trust management, web services security
17Ki-Woong Park, Hyunchul Seok, Kyu Ho Park pKASSO: Towards Seamless Authentication Providing Non-Repudiation on Resource-Constrained Devices. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Guido Boella, Leendert W. N. van der Torre Power in Norm Negotiation. Search on Bibsonomy KES-AMSTA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Wamberto Weber Vasconcelos, Martin J. Kollingbaum, Timothy J. Norman Resolving conflict and inconsistency in norm-regulated virtual organizations. Search on Bibsonomy AAMAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF norms, institutions, artificial social systems, conventions
17Hongbin Zhou, Simon N. Foley A Framework for Establishing Decentralized Secure Coalitions. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jun-Cheol Jeon, Kee-Young Yoo Conflict Detection in Role-Based Access Control Using Multiple-Attractor Cellular Automata. Search on Bibsonomy ICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
17Jaime A. Pavlich-Mariscal, Steven A. Demurjian, Laurent D. Michel A Framework for Composable Security Definition, Assurance, and Enforcement. Search on Bibsonomy MoDELS (Satellite Events) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Gísli Hjálmtýsson, Ólafur Ragnar Helgason, Björn Brynjúlfsson gTrace: Simple Mechanisms for Monitoring of Multicast Sessions. Search on Bibsonomy NETWORKING The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Jing Wu, Jennifer Seberry, Yi Mu 0001, Chun Ruan Delegatable Access Control for Fine-Grained XML. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Dan Boneh, Xavier Boyen, Eu-Jin Goh Hierarchical Identity Based Encryption with Constant Size Ciphertext. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Xu Liao, Li Zhang 0065, Stephen Chi-fai Chan A Task-Oriented Access Control Model for WfMS. Search on Bibsonomy ISPEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Gang Yin, Huaimin Wang, Tao Liu, Dian-xi Shi, Ming-Feng Chen Distributed Access Control for Grid Environments Using Trust Management Approach. Search on Bibsonomy ISPA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Access Control, Grid, Trust Management, VO
17Shujing Wang 0001, Yan Zhang 0003 Answer Set Programming for Distributed Authorization: The Language, Computations, and Application. Search on Bibsonomy Australian Conference on Artificial Intelligence The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
17Vasileios Pappas, Zhiguo Xu, Songwu Lu, Daniel Massey, Andreas Terzis, Lixia Zhang 0001 Impact of configuration errors on DNS robustness. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF resiliency, DNS, misconfigurations
17Venugopalan Ramasubramanian, Emin Gün Sirer The design and implementation of a next generation name service for the internet. Search on Bibsonomy SIGCOMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF proactive caching, peer to peer, DNS
17Changqin Huang, Guanghua Song, Yao Zheng, Deren Chen An Authorization Architecture Oriented to Engineering and Scientific Computation in Grid Environments. Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Vishwas Patil, R. K. Shyamasundar An Efficient, Secure and Delegable Micro-Payment System. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Weizhong Qiang, Hai Jin 0001, Xuanhua Shi, Deqing Zou A Novel VO-Based Access Control Model for Grid. Search on Bibsonomy GCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Moritz Y. Becker, Peter Sewell Cassandra: Distributed Access Control Policies with Tunable Expressiveness. Search on Bibsonomy POLICY The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
17Xin Li 0010, Mizuhito Ogawa A Lightweight Mutual Authentication Based on Proxy Certificate Trust List. Search on Bibsonomy PDCAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Grid Computing, Mutual Authentication, Proxy Certificate
17Mads Dam Regular SPKI. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Yuh-Jong Hu, Chao-Wei Tang Agent-Oriented Public Key Infrastructure for Multi-agent E-service. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Neil Taurisson, Pierre Tchounikine Introducing Software Agents to Support a Web-based Collective Activity. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Abdenour Bouzouane, Bruno Bouchard 0001 Human-Agent Viewpoint Similarity based on Terminological Logic for Mixed-Initiative Planning. Search on Bibsonomy IAT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Jacob Zimmermann, Ludovic Mé, Christophe Bidan An Improved Reference Flow Control Model for Policy-Based Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Policy-based intrusion detection, access control, information flow control
17Michael K. Reiter, Asad Samar, Chenxi Wang The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure. Search on Bibsonomy SRDS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
17Patrick C. K. Hung Specifying conflict of interest in web services endpoint language (WSEL). Search on Bibsonomy SIGecom Exch. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security risk factor, web services Endpoint language, Java, XML, separation of duties, conflict of interest
17Chun Ruan, Vijay Varadharajan Resolving Conflicts in Authorization Delegations. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
17Ninghui Li, John C. Mitchell, William H. Winsborough Design of a Role-Based Trust-Management Framework. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF access control, role-based access control, trust management, distributed system security, attribute-based access control, attribute certificates
17Babak Sadighi Firozabadi Using Attribute Certificates for Creating Management Structures (Transcript of Discussion). Search on Bibsonomy Security Protocols Workshop The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Young-Ho Suh, Han Namgoong, Jeong-Joon Yoo, Dong-Ik Lee Design of a Mobile Agent-Based Workflow Management System. Search on Bibsonomy MATA The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
17Simon A. Dobson, Brian Matthews Ionic Types. Search on Bibsonomy ECOOP The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Åsa Hagström, Viiveke Fåk, Mark Vandenwauver EWS-A Case Study on Access Control in Workflow Systems. Search on Bibsonomy WETICE The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
17Mehmet Aksit, Bedir Tekinerdogan Aspect-Oriented Programming Using Composition-Filters. Search on Bibsonomy ECOOP Workshops The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
17Jan Bosch Delegating Compiler Objects: An Object-Oriented Approach to Crafting Compilers. Search on Bibsonomy CC The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
17Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber Authentication in Distributed Systems: Theory and Practice. Search on Bibsonomy SOSP The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
17Oscar Nierstrasz Two models of concurrent objects. Search on Bibsonomy OOPSLA/ECOOP Workshop on Object-based Concurrent Programming The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
15Hiroyuki Sato, Takeshi Nishimura Federated Authentication in a Hierarchy of IdPs by Using Shibboleth. Search on Bibsonomy SAINT The full citation details ... 2011 DBLP  DOI  BibTeX  RDF authentication, middleware, trust, delegation, federation
15Jinyuan Sun, Yuguang Fang Cross-Domain Data Sharing in Distributed Electronic Health Record Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF security, privacy, delegation, electronic health record, Cross domain
15Mohsen Saffarian, Babak Sadighi Owner-Based Role-Based Access Control OB-RBAC. Search on Bibsonomy ARES The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Administrative Policies, Access Control, RBAC, Delegation
15Yang Zhang 0015, Junliang Chen Universal Identity Management Model Based on Anonymous Credentials. Search on Bibsonomy IEEE SCC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Privacy Concerns of Service-Oriented Solutions, Identity Metasystem, Privilege Delegation, Identity Management
15Weizhong Qiang, Aleksandr Konstantinov Towards cross-middleware authentication and single sign-on for ARC Grid middleware. Search on Bibsonomy Comput. Sci. Res. Dev. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF ARC middleware, Virtual organization, Delegation, Single sign-on
15Xiaohui Liang, Zhenfu Cao, Huang Lin, Jun Shao Attribute based proxy re-encryption with delegating capabilities. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF key delegation, attribute based encryption, proxy re-encryption
15Sébastien Noël, Pierre Manneback, Gheorghe Cosmin Silaghi Response Deadline Evaluation in Point-to-Point Negotiation on Grids. Search on Bibsonomy GECON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Service access, Negotiation, Delegation
15Shafi Goldwasser, Yael Tauman Kalai, Guy N. Rothblum Delegating computation: interactive proofs for muggles. Search on Bibsonomy STOC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF muggles, delegation, interactive proofs
15Mikaël Ates, Jacques Fayolle, Christophe Gravier, Jérémy Lardon Complex federation architectures: stakes, tricks & issues. Search on Bibsonomy CSTST The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed identity management systems, privacy, architecture, delegation, identity federation
15George Pavlou On the Evolution of Management Approaches, Frameworks and Protocols: A Historical Perspective. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Manager-agent, Web-based management, Management by delegation, Distributed objects, Mobile code
15Angelos D. Keromytis, Jonathan M. Smith Requirements for scalable access control and security management architectures. Search on Bibsonomy ACM Trans. Internet Techn. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF distributed systems, access control, authorization, security policy, trust management, delegation, credentials, Large-scale systems
15Li-Sha He, Ning Zhang 0001, Li-Rong He, Ian Rogers Secure M-commerce Transactions: A Third Party Based Signature Protocol. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF m-commerce security, signature delegation, digital signatures, cryptographic protocols
15Lorenzo Bettini, Sara Capecchi, Elena Giachino Featherweight wrap Java. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF delegation, wrappers, language extensions, featherweight Java
15Paul Z. Kolano Mesh: secure, lightweight grid middleware using existing SSH infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security, distributed systems, authentication, access control, middleware, grids, authorization, delegation, single sign-on, SSH
15Samir Saklikar, Subir Saha Next steps for security assertion markup language (saml). Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF liberty alliance, multifactor, identity, delegation, assertion, federation, SAML
15Dmitrij Lagutin, Hannu H. Kari Controlling Incoming Connections Using Certificates and Distributed Hash Tables. Search on Bibsonomy NEW2AN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF rights delegation, DoS countermeasures, certificates, Session management, rights management
15Ted Wobber, Aydan R. Yumerefendi, Martín Abadi, Andrew Birrell, Daniel R. Simon Authorizing applications in singularity. Search on Bibsonomy EuroSys The full citation details ... 2007 DBLP  DOI  BibTeX  RDF application identity, access control, pattern matching, regular expressions, delegation, capabilities, channels
15Fabio Massacci, John Mylopoulos, Nicola Zannone Hierarchical hippocratic databases with minimal disclosure for virtual organizations. Search on Bibsonomy VLDB J. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Minimal disclosure, Private data management, Access control, Information security, Virtual organizations, Delegation, Privacy protection
15Luis F. G. Sarmenta, Marten van Dijk, Charles W. O'Donnell, Jonathan Rhodes, Srinivas Devadas Virtual monotonic counters and count-limited objects using a TPM without a trusted OS. Search on Bibsonomy STC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF e-wallet memory integrity checking, key delegation, stored-value, trusted storage, certified execution
15Pradeep Kumar Modal logic & ownership types: uniting three worlds. Search on Bibsonomy OOPSLA Companion The full citation details ... 2006 DBLP  DOI  BibTeX  RDF split-objects, modal logic, roles, delegation, ownership types, dynamic binding, ownership transfer
15David Fisher, Olin Shivers Static analysis for syntax objects. Search on Bibsonomy ICFP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF extensible programming languages, language towers, lazy delegation, static analysis, domain-specific languages, type inference, flow analysis, macros
15Urs Hengartner, Peter Steenkiste Access control to people location information. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF credential discovery, privacy, trust, RSA, location, Certificates, delegation, DSA, SPKI/SDSI
15Urs Hengartner, Peter Steenkiste Implementing access control to people location information. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF trust, rsa, location, certificates, delegation, dsa, spki/sdsi
15Patrick C. K. Hung From Conflict of Interest to Separation of Duties in WS-Policy for Web Services Matchmaking Process. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WS-PolicyAttachment, security assertion, Web services, delegation, matchmaking, separation of duties, conflict of interest, WS-Policy, service locator
15Chin-Chen Chang 0001, Chu-Hsing Lin, Wei Lee, Pai-Cheng Hwang Secret Sharing with Access Structures in a Hierarchy. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF delegation and agreement, secret sharing, document management, access structure, hierarchical access control
15Patrick C. K. Hung, Guang-Sha Qiu Specifying conflict of interest assertions in WS-policy with Chinese wall security policy. Search on Bibsonomy SIGecom Exch. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF WS-policy attachment, security assertion, XML, security policy, delegation, matchmaking, conflict of interest, WS-policy, service locators, Chinese wall security policy
15François Siewe, Antonio Cau, Hussein Zedan A compositional framework for access control policies enforcement. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF access control, authorization, delegation, policy composition
15Ilham Benyahia, Jean-Yves Potvin Framework Architecture for Information Management in Dynamic Vehicle Dispatching. Search on Bibsonomy HICSS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Framework design, Vehicle dispatching, Processing delegation, Simulation, Agents, Object-oriented, Information management, Deadlines
15Helmut Reiser, Gerald Vogt Security Requirements for Management Systems Using Mobile Agents. Search on Bibsonomy ISCC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Management by Delegation, Security, Mobile Agent Systems, Distributed Management
15David Fox 0001 Composing Magic Lenses. Search on Bibsonomy CHI The full citation details ... 1998 DBLP  DOI  BibTeX  RDF work-through interface, object-oriented, filter, inheritance, scheme, transparent, delegation, portal, lens, CLOS, pad, Magic Lens
14Hongmin Gao 0002, Pengfei Duan, Xiaofeng Pan, Xiaojing Zhang, Keke Ye, Ziyuan Zhong Blockchain-enabled supervised secure data sharing and delegation scheme in Web3.0. Search on Bibsonomy J. Cloud Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ulrich Frank, Tony Clark 0001, Jens Gulden, Daniel Töpel An Extended Concept of Delegation and its Implementation within a Modelling and Programming Language Architecture. Search on Bibsonomy Enterp. Model. Inf. Syst. Archit. Int. J. Concept. Model. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Yulan Gao, Chao Ren, Han Yu 0001 Fairness-Aware Multi-Server Federated Learning Task Delegation over Wireless Networks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Andrew Fuchs, Andrea Passarella, Marco Conti Optimizing Delegation in Collaborative Human-AI Hybrid Teams. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Ruqing Xu Persuasion, Delegation, and Private Information in Algorithm-Assisted Decisions. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Philipp Spitzer, Joshua Holstein, Patrick Hemmer, Michael Vössing, Niklas Kühl 0001, Dominik Martin, Gerhard Satzger On the Effect of Contextual Information on Human Delegation Behavior in Human-AI collaboration. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Oliver Sourbut, Lewis Hammond, Harriet Wood Cooperation and Control in Delegation Games. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Frederic Fieau, Emile Stephan, Sanjay Mishra Content Delivery Network Interconnection (CDNI) Delegation Using the Automated Certificate Management Environment. Search on Bibsonomy RFC The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
14Cécile Delerablée, Lénaïck Gouriou, David Pointcheval Attribute-Based Signatures with Advanced Delegation, and Tracing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2024 DBLP  BibTeX  RDF
14Taehoon Kim, Daehee Seo, Su-Hyun Kim, Im-Yeong Lee A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 1703 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license