|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 10474 occurrences of 3799 keywords
|
|
|
Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
19 | Giovanni Russello, Naranker Dulay |
xDUCON: Coordinating Usage Control Policies in Distributed Domains. |
NSS |
2009 |
DBLP DOI BibTeX RDF |
Cross domain policy enforcement, Usage control policies, Shared Data Space |
19 | Eric Angel, Evripidis Bampis, Fanny Pascual |
The impact of local policies on the quality of packet routing in paths, trees, and rings. |
J. Sched. |
2008 |
DBLP DOI BibTeX RDF |
Approximation with performance guarantee, Price of anarchy, Packet routing, Scheduling policies |
19 | Nawel Gharbi |
On the Applicability of Stochastic Petri Nets for Analysis of Multiserver Retrial Systems with Different Vacation Policies. |
ATVA |
2008 |
DBLP DOI BibTeX RDF |
Multiserver retrial systems, Finite-source, Vacation policies, Modeling and Performance measures, Generalized Stochastic Petri nets |
19 | Gansen Zhao, David W. Chadwick |
On the Modeling of Bell-LaPadula Security Policies Using RBAC. |
WETICE |
2008 |
DBLP DOI BibTeX RDF |
Bell-LaPadula Security Policies, Modelling, RBAC |
19 | Dimitri Efrosinin, Lothar Breuer |
Threshold policies for controlled retrial queues with heterogeneous servers. |
Ann. Oper. Res. |
2006 |
DBLP DOI BibTeX RDF |
Retrial queueing system, Controllable queueing systems, Monotonicity of optimal policies, Threshold levels, Optimal Control, Numerical analysis, MAP, PH |
19 | Anna Satsiou, Michael Paterakis |
Frequency-based cache management policies for collaborative and non-collaborative topologies of segment based video caching proxies. |
Multim. Syst. |
2006 |
DBLP DOI BibTeX RDF |
Collaborative caching, Frequency-based cache management policies, Segment-based video caching, Caching architecture |
19 | William Kulju, Hanan Lutfiyya |
Reducing Resource Usage Based on User Hints and Policies. |
J. Netw. Syst. Manag. |
2006 |
DBLP DOI BibTeX RDF |
user hints, CPU management, Policies, network management |
19 | Marco Conti, Enrico Gregori, Willy Lapenna |
Content Delivery Policies in Replicated Web Services: Client-Side vs. Server-Side. |
Clust. Comput. |
2005 |
DBLP DOI BibTeX RDF |
content delivery policies, QoS, Web Service, replication, HTTP, content distribution, server selection, parallel access |
19 | Alexander Thomasian, Chang Liu |
Disk scheduling policies with lookahead. |
SIGMETRICS Perform. Evaluation Rev. |
2002 |
DBLP DOI BibTeX RDF |
LOOK, SATF, scheduling policies with lookahead, simulation, SCAN, disk scheduling |
19 | Paul Ashley, Satoshi Hada, Günter Karjoth, Matthias Schunter |
E-P3P privacy policies and privacy authorization. |
WPES |
2002 |
DBLP DOI BibTeX RDF |
E-P3P, privacy policies, privacy manager |
19 | Nathan N. Vuong, Geoffrey S. Smith, Yi Deng 0001 |
Managing security policies in a distributed environment using eXtensible markup language (XML). |
SAC |
2001 |
DBLP DOI BibTeX RDF |
managing security policies, Java, XML, XML, RBAC, meta-language, distributed authorization |
19 | Luigi Rizzo, Lorenzo Vicisano |
Replacement policies for a proxy cache. |
IEEE/ACM Trans. Netw. |
2000 |
DBLP DOI BibTeX RDF |
caching, Web, policies, communication networks, replacement |
19 | Supriya Sharma, Yannis Viniotis |
Optimal buffer management policies for shared-buffer ATM switches. |
IEEE/ACM Trans. Netw. |
1999 |
DBLP DOI BibTeX RDF |
optimal policies, buffer management, ATM switches |
19 | W. Keith Edwards |
Policies and Roles in Collaborative Applications. |
CSCW |
1996 |
DBLP DOI BibTeX RDF |
Intermezzo, access control, computer-supported cooperative work, policies, roles, infrastructure |
19 | Edmundo de Souza e Silva, H. Richard Gail |
Analyzing Scheduled Maintenance Policies for Repairable Computer Systems. |
IEEE Trans. Computers |
1990 |
DBLP DOI BibTeX RDF |
transient measures, scheduled maintenance policies, repairable computer systems, continuous-time Markov process, steady-state measures, randomization technique, computer maintenance, performance evaluation, numerical stability |
19 | Anna Cinzia Squicciarini, Marco Casassa Mont, Abhilasha Bhargav-Spantzel, Elisa Bertino |
Automatic Compliance of Privacy Policies in Federated Digital Identity Management. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
|
19 | David M. Eyers, Sriram Srinivasan 0002, Ken Moody, Jean Bacon |
Compile-Time Enforcement of Dynamic Security Policies. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
Kilim, Dynamic security constraints, compile-time security enforcement |
19 | Giacomo Fiumara, Massimo Marchi, Alessandro Provetti |
Adaptive Web Data Extraction Policies. |
POLICY |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Mathieu Blanc, Jérémy Briffaut, Jean-François Lalande, Christian Toinard |
Distributed Control Enabling Consistent MAC Policies and IDS Based on a Meta-Policy Approach. |
POLICY |
2006 |
DBLP DOI BibTeX RDF |
|
19 | Steffen Lamparter, Daniel Oberle, Andreas Eberhart |
Approximating Service Utility from Policies and Value Function Patterns. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Travis D. Breaux, Annie I. Antón |
Deriving Semantic Models from Privacy Policies. |
POLICY |
2005 |
DBLP DOI BibTeX RDF |
|
19 | Rob Barrett |
People and Policies: Transforming the Human-Computer Partnership. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Khaled Alghathbar, Duminda Wijesekera |
Analyzing Information Flow Control Policies in Requirements Engineering. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Bryan Smith, Kent E. Seamons, Michael D. Jones |
Responding to Policies at Runtime in TrustBuilder. |
POLICY |
2004 |
DBLP DOI BibTeX RDF |
|
19 | Francisco Durán 0001, Javier Herrador, Antonio Vallecillo |
Using UML and Maude for Writing and Reasoning about ODP Policies. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Niranjan Suri, Marco M. Carvalho, Jeffrey M. Bradshaw, Maggie R. Breedy, Thomas B. Cowin, Paul T. Groth, Raul Saavedra, Andrzej Uszok |
Enforcement of Communications Policies in Software Agent Systems through Mobile Code. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Pedro Dias, Carlos Ribeiro, Paulo Ferreira 0001 |
Enforcing History-Based Security Policies in Mobile Agent Systems. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
19 | Stefano Bistarelli, Simon N. Foley |
Analysis of Integrity Policies using Soft Constraints. |
POLICY |
2003 |
DBLP DOI BibTeX RDF |
|
18 | Giovanna Di Marzo Serugendo, John S. Fitzgerald, Alexander B. Romanovsky |
MetaSelf: an architecture and a development method for dependable self-* systems. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
design-time and run-time adaptation, metadata, policies, self-adaptation, self-organisation, control loop |
18 | Mohammad Y. Hajjat, Xin Sun 0002, Yu-Wei Eric Sung, David A. Maltz, Sanjay G. Rao, Kunwadee Sripanidkulchai, Mohit Tawarmalani |
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud. |
SIGCOMM |
2010 |
DBLP DOI BibTeX RDF |
cloud computing, performance modeling, security policies, enterprise applications, network configurations |
18 | Maria J. Blesa, Daniel Calzada, Antonio Fernández 0001, Luis López, Andrés L. Martínez, Agustín Santos, Maria J. Serna, Christopher Thraves |
Adversarial Queueing Model for Continuous Network Dynamics. |
Theory Comput. Syst. |
2009 |
DBLP DOI BibTeX RDF |
Adversarial queueing theory, Stability of networks, Stability of queueing policies, Packet-switched networks |
18 | Elisa Bertino |
Assured information sharing: concepts and issues. |
SIN |
2009 |
DBLP DOI BibTeX RDF |
information lifecycle, policy management systems, security policies, information sharing |
18 | Serge Egelman, Janice Y. Tsai, Lorrie Faith Cranor, Alessandro Acquisti |
Timing is everything?: the effects of timing and placement of online privacy indicators. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
website indicators, privacy, timing, mental models, privacy policies, usable privacy and security |
18 | Ricardo Bagnasco, Joan Serrat 0001 |
Multi-agent Reinforcement Learning in Network Management. (PDF / PS) |
AIMS |
2009 |
DBLP DOI BibTeX RDF |
autonomic communication system, Machine learning, policy-based management, adaptive policies |
18 | Pietro Mazzoleni, Bruno Crispo, Swaminathan Sivasubramanian, Elisa Bertino |
XACML Policy Integration Algorithms. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
Security policies integration, Web Services, Distributed Systems, SOA, Content Distributed Networks, XACML |
18 | Stephen Chong, Andrew C. Myers |
End-to-End Enforcement of Erasure and Declassification. |
CSF |
2008 |
DBLP DOI BibTeX RDF |
Erasure, Expressive security policies, Information flow, Language-based security, Noninterference, Declassification |
18 | Kami Vaniea, Clare-Marie Karat, Joshua B. Gross, John Karat, Carolyn Brodie |
Evaluating assistance of natural language policy authoring. |
SOUPS |
2008 |
DBLP DOI BibTeX RDF |
syntax highlighting, privacy, design process, privacy policies, natural language interfaces, social and legal issues |
18 | Stefano Braghin, Alberto Coen-Porisini, Pietro Colombo, Sabrina Sicari, Alberto Trombetta |
Introducing privacy in a hospital information system. |
SESS |
2008 |
DBLP DOI BibTeX RDF |
software engineering applications, conceptual models, privacy policies, hospital information system |
18 | Thomas B. Quillinan, Martijn Warnier, Michel A. Oey, Reinier J. Timmer, Frances M. T. Brazier |
Enforcing security in the AgentScape middleware. |
Middleware Security |
2008 |
DBLP DOI BibTeX RDF |
AgentScape, MAS, multi agent systems, agent, security policies |
18 | Rachid Hamadi, Hye-Young Paik, Boualem Benatallah |
Conceptual Modeling of Privacy-Aware Web Service Protocols. |
CAiSE |
2007 |
DBLP DOI BibTeX RDF |
Web services, conceptual modeling, privacy policies |
18 | Stephen Chong, Jed Liu, Andrew C. Myers, Xin Qi 0012, K. Vikram, Lantian Zheng, Xin Zheng |
Secure web application via automatic partitioning. |
SOSP |
2007 |
DBLP DOI BibTeX RDF |
compilers, information flow, security policies |
18 | Bhavani Thuraisingham |
Multimedia systems security. |
MM&Sec |
2007 |
DBLP DOI BibTeX RDF |
multimedia data management, security, data mining, privacy, policies, digital watermarking, video analysis, multimedia systems, surveillance, computer forensics |
18 | Carl Hewitt |
Large-Scale Organizational Computing Requires Unstratified Reflection and Strong Paraconsistency. |
COIN |
2007 |
DBLP DOI BibTeX RDF |
Direct Logic, Mental Agents, Organizational Computing, ORGs (Organizations of Restricted Generality), Concurrency, Policies, Reflection, Norms, Norms, Inconsistency, Practices, Institutions, Co-ordination, Paraconsistency |
18 | Pietro Mazzoleni, Elisa Bertino, Bruno Crispo |
XACML policy integration algorithms: not to be confused with XACML policy combination algorithms! |
SACMAT |
2006 |
DBLP DOI BibTeX RDF |
security policies integration, web services, distributed systems, content distributed networks, XACML |
18 | Julia Gideon, Lorrie Faith Cranor, Serge Egelman, Alessandro Acquisti |
Power strips, prophylactics, and privacy, oh my! |
SOUPS |
2006 |
DBLP DOI BibTeX RDF |
e-commerce, user studies, search engines, privacy policies, P3P |
18 | Qi Zhang 0012, Ningfang Mi, Alma Riska, Evgenia Smirni |
Load Unbalancing to Improve Performance under Autocorrelated Traffic. |
ICDCS |
2006 |
DBLP DOI BibTeX RDF |
autocorrelated arrivals, highly variable service times, self adaptive policies, load balancing |
18 | Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner |
Policy-Driven Memory Protection for Reconfigurable Hardware. |
ESORICS |
2006 |
DBLP DOI BibTeX RDF |
Embedded Systems, Computer Security, Security Policies, Policy Languages, Reference Monitors, Separation Kernels |
18 | Carolyn Brodie, Clare-Marie Karat, John Karat, Jinjuan Feng |
Usable security and privacy: a case study of developing privacy management tools. |
SOUPS |
2005 |
DBLP DOI BibTeX RDF |
security, privacy, design, privacy policies, social and legal issues |
18 | Sastry Duri, Jeffrey Elliott, Marco Gruteser, Xuan Liu, Paul Moskowitz, Ronald Perez, Moninder Singh, Jung-Mu Tang |
Data Protection and Data Sharing in Telematics. |
Mob. Networks Appl. |
2004 |
DBLP DOI BibTeX RDF |
data protection architecture, automotive telematics, privacy policies |
18 | Jennie Palmer, Isi Mitrani |
Optimal Server Allocation in Reconfigurable Clusters with Multiple Job Types. |
ICCSA (2) |
2004 |
DBLP DOI BibTeX RDF |
Optimal server allocation, Heuristic policies, Grid computing, Dynamic programming |
18 | Henrik Engström, Sharma Chakravarthy, Brian Lings |
Maintenance policy selection in heterogeneous data warehouse environments: a heuristics-based approach. |
DOLAP |
2003 |
DBLP DOI BibTeX RDF |
data integration, consistency, policies, data warehouse, view maintenance |
18 | Shing-Chi Cheung, Dickson K. W. Chiu |
A Watermarking Infrastructure for Enterprise Document Management. |
HICSS |
2003 |
DBLP DOI BibTeX RDF |
document distribution protocols, document management policies, copy deterrence, enterprise registration authority, registration certificate, copyright protection, digital rights management |
18 | Alma Riska, Wei Sun, Evgenia Smirni, Gianfranco Ciardo |
ADAPTLOAD: Effective Balancing in Custered Web Servers Under Transient Load Conditions. |
ICDCS |
2002 |
DBLP DOI BibTeX RDF |
clustered web servers, load balance, adaptive policies, transient overload |
18 | Gary Molenkamp, Michael Katchabaw, Hanan Lutfiyya, Michael A. Bauer 0001 |
Distributed Resource Management to Support Distributed Application-Specific Quality of Service. |
MMNS |
2001 |
DBLP DOI BibTeX RDF |
Dynamic Quality of Service, Control Actions, Multimedia, Policies |
18 | Tarek Helmy, Tsunenori Mine, Makoto Amamiya |
Adaptive Exploiting User Profile and Interpretation Policy for Searching and Browsing the Web on KODAMA System. |
DEXA Workshops |
2000 |
DBLP DOI BibTeX RDF |
adaptive exploitation, interpretation policy, KODAMA system, KODAMA research project, hyper-link structure, interpretation policies, online distributed relevant information retrieval, user interface agents, personalized information filtering, adaptive autonomous user interface agent, Web page agents, server agents, World Wide Web, user profile, interface agents, agent community, information resources, information needs |
18 | Joseph Kroculick, Cynthia Hood 0001 |
Provisioning Multilayer Restoration for Convergence. |
LCN |
2000 |
DBLP DOI BibTeX RDF |
multilayer restoration, mission critical service, protocol suites, recovery scheme, outage duration, escalation strategy, distributed coordination protocol, recovery agents, protocols, topology, network topology, deadlock, telecommunication network routing, telecommunication control, rerouting, telecommunication network reliability, control policies |
18 | Yun Bai 0001, Vijay Varadharajan |
A High Level Language for Conventional Access Control Models. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Policy Transformations, Formal Language, Access Control Model, Authorization Policies |
18 | Igor Tatarinov, Alex Rousskov, Valery Soloviev |
Static caching in Web servers. |
ICCCN |
1997 |
DBLP DOI BibTeX RDF |
implementation complexity an, static caching, cache policies, LRU-threshold, LFU, LRU-SIZE, LRU-MIN, LRU-k-threshold, Pitkow/Recker policy, Web document access patterns, request log file, small cache sizes, primary Web servers, CPU overhead, performance analysis, cache performance, log files, online front-ends |
18 | Emil Lupu, Morris Sloman |
A Policy Based Role Object Model. |
EDOC |
1997 |
DBLP DOI BibTeX RDF |
management roles, role class, management policies, consistency, relationships, Distributed systems management |
18 | David B. Stewart, Pradeep K. Khosla |
Policy-independent real-time operating system mechanisms for timing error detection, handling and monitoring. |
HASE |
1996 |
DBLP DOI BibTeX RDF |
supervisory programs, policy independent real time operating system mechanisms, timing error detection, estimated worst case execution times, missed deadline, policy independent mechanisms, real time task monitoring, reschedule operation, monitoring mechanism, 6 ms, 1 Kbyte, hard real time systems, scheduling policies, context switch, error handling |
18 | Chih Lai, H. Rebecca Callison |
A framework for simulation of concurrency control policy in real-time systems. |
IEEE Real Time Technology and Applications Symposium |
1996 |
DBLP DOI BibTeX RDF |
concurrency control policy, formal policies, logical correctness, concurrently executing processes, real-time environments, performance, real-time systems, real-time systems, resource allocation, virtual machines, distributed processing, concurrency control, transaction processing, correctness, scheduling policy, overload management, transaction processing systems |
18 | André van der Hoek, Dennis Heimbigner, Alexander L. Wolf |
A Generic, Peer-to-Peer Repository for Distributed Configuration Management. |
ICSE |
1996 |
DBLP BibTeX RDF |
NUCM, Network-Unified Configuration Management, artifact versions, change sets, check-in/check-out, configuration management policies, configuration management repositories, distributed configuration management, generic peer-to-peer repository, multi-site projects, programmatic interface, repository distribution mechanism, distributed databases, application program interfaces, configuration management, software management |
18 | Eitan Altman, Arie Hordijk |
Zero-sum Markov games and worst-case optimal control of queueing systems. |
Queueing Syst. Theory Appl. |
1995 |
DBLP DOI BibTeX RDF |
Zero-sum stochastic games, discounted and expected average cost, worst case control of queueing networks, value iteration, structural properties of optimal policies and value function |
18 | David M. Nicol, Albert G. Greenberg, Boris D. Lubachevsky |
Massively Parallel Algorithms for Trace-Driven Cache Simulations. |
IEEE Trans. Parallel Distributed Syst. |
1994 |
DBLP DOI BibTeX RDF |
massively parallel algorithms, trace-driven cache simulations, least-recently-used policy, EREW parallel model, algorithm timings, reference-based line replacement policies, least-frequently-used policy, random replacement policy, space overhead, SIMD implementation, parallel algorithms, computational complexity, parallel architectures, trace, buffer storage, program diagnostics, simulation algorithm, MasPar MP-1 |
18 | Augusto Cesar Espíndola Baffa, Angelo E. M. Ciarlini |
Modeling POMDPs for generating and simulating stock investment policies. |
SAC |
2010 |
DBLP DOI BibTeX RDF |
simulation, stock market, POMDP, technical analysis |
18 | Andrew Ian Stone, Steve DiBenedetto, Michelle Mills Strout, Daniel Massey |
Scalable simulation of complex network routing policies. |
Conf. Computing Frontiers |
2010 |
DBLP DOI BibTeX RDF |
metarouting, simulation, performance, routing, parallel, data-flow analysis |
18 | Micah Jones, Kevin W. Hamlen |
Disambiguating aspect-oriented security policies. |
AOSD |
2010 |
DBLP DOI BibTeX RDF |
aspect-oriented programming, declarative languages, reference monitors |
18 | Anna Cinzia Squicciarini, Smitha Sundareswaran |
Web-Traveler Policies for Images on Social Networks. |
World Wide Web |
2009 |
DBLP DOI BibTeX RDF |
privacy, social networks, access control policy |
18 | Stijn Eyerman, Lieven Eeckhout |
Memory-level parallelism aware fetch policies for simultaneous multithreading processors. |
ACM Trans. Archit. Code Optim. |
2009 |
DBLP DOI BibTeX RDF |
Fetch Policy, Simultaneous Multithreading (SMT), Memory-Level Parallelism (MLP) |
18 | Xiaohua Guan, Witawas Srisa-an, ChengHuan Jia |
Investigating the effects of using different nursery sizing policies on performance. |
ISMM |
2009 |
DBLP DOI BibTeX RDF |
multithreaded applications, generational garbage collection |
18 | Mainak Chaudhuri |
Pseudo-LIFO: the foundation of a new family of replacement policies for last-level caches. |
MICRO |
2009 |
DBLP DOI BibTeX RDF |
chip-multiprocessor, replacement policy, last-level cache |
18 | Hridesh Rajan, Jia Tao 0001, Steve M. Shaner, Gary T. Leavens |
Tisa: A Language Design and Modular Verification Technique for Temporal Policies in Web Services. |
ESOP |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Yu-Wei Eric Sung, Carsten Lund, Mark Lyn, Sanjay G. Rao, Subhabrata Sen |
Modeling and understanding end-to-end class of service policies in operational networks. |
SIGCOMM |
2009 |
DBLP DOI BibTeX RDF |
configuration modeling, differentiated service |
18 | Yi Wang, Michael Schapira, Jennifer Rexford |
Neighbor-specific BGP: more flexible routing policies while improving global stability. |
SIGMETRICS/Performance |
2009 |
DBLP DOI BibTeX RDF |
routing, stability, policy, flexibility, bgp |
18 | Varun Gupta 0004, Mor Harchol-Balter |
Self-adaptive admission control policies for resource-sharing systems. |
SIGMETRICS/Performance |
2009 |
DBLP DOI BibTeX RDF |
2-moment approximation, multiprogramming limit, optimal stochastic control, traffic-oblivious policy, admission control, processor sharing |
18 | Fatih Tekbacak, Tugkan Tuglular, Oguz Dikenelli |
An Architecture for Verification of Access Control Policies with Multi Agent System Ontologies. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Xiaozhi Du, Yong Qi, Di Hou, Ying Chen 0004, Xiao Zhong |
Modeling and Performance Analysis of Software Rejuvenation Policies for Multiple Degradation Systems. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Prathima Rao, Dan Lin 0001, Elisa Bertino, Ninghui Li, Jorge Lobo 0001 |
An algebra for fine-grained integration of XACML policies. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
policy integration, access control, XACML |
18 | David J. Power, Mark Slaymaker, Andrew C. Simpson |
On the Construction and Verification of Self-modifying Access Control Policies. |
Secure Data Management |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Mladen Nikolic, Filip Maric, Predrag Janicic |
Instance-Based Selection of Policies for SAT Solvers. |
SAT |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Lourdes Araujo, Juan Julián Merelo Guervós, Antonio Mora García, Carlos Cotta |
Genotypic differences and migration policies in an island model. |
GECCO |
2009 |
DBLP DOI BibTeX RDF |
migration policy, genetic algorithms, parallelism, diversity, island model |
18 | Peng Dai 0001, Judy Goldsmith |
Finding Best k Policies. |
ADT |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Anne Benoit, Veronika Rehn-Sonigo, Yves Robert |
Replica Placement and Access Policies in Tree Networks. |
IEEE Trans. Parallel Distributed Syst. |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Ninghui Li, Qihua Wang |
Beyond separation of duty: An algebra for specifying high-level security policies. |
J. ACM |
2008 |
DBLP DOI BibTeX RDF |
Access control, separation of duty, policy design |
18 | Stratos Ioannidis, Vassilis S. Kouikoglou, Yannis A. Phillis |
Analysis of Admission and Inventory Control Policies for Production Networks. |
IEEE Trans Autom. Sci. Eng. |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Thomas Scheffler, Stefan Geiß, Bettina Schnor |
An Implementation of a Privacy Enforcement Scheme based on the Java Security Framework using XACML Policies. |
SEC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Fabien Baligand, Nicolas Rivierre, Thomas Ledoux |
QoS Policies for Business Processes in Service Oriented Architectures. |
ICSOC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Christoph Mies, Alexander Ferrein, Gerhard Lakemeyer |
Repairing Decision-Theoretic Policies Using Goal-Oriented Planning. |
KI |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Yuh-Jong Hu, Hong-Yi Guo, Guang-De Lin |
Semantic Enforcement of Privacy Protection Policies via the Combination of Ontologies and Rules. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
ontology, semantic web, rule, privacy protection, web 3.0, semantic email |
18 | Fabio Massacci, Nicola Zannone |
A Model-Driven Approach for the Specification and Analysis of Access Control Policies. |
OTM Conferences (2) |
2008 |
DBLP DOI BibTeX RDF |
Access Control, Policy Specification, Security Requirements Engineering |
18 | Amir Krifa, Chadi Barakat, Thrasyvoulos Spyropoulos |
Optimal Buffer Management Policies for Delay Tolerant Networks. |
SECON |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Srijith Krishnan Nair, Andrew S. Tanenbaum, Gabriela Gheorghe, Bruno Crispo |
Enforcing DRM policies across applications. |
Digital Rights Management Workshop |
2008 |
DBLP DOI BibTeX RDF |
access control, digital rights management, usage control, policy enforcement |
18 | Scott J. Harmon, Scott A. DeLoach, Robby, Doina Caragea |
Leveraging Organizational Guidance Policies with Learning to Self-Tune Multiagent Systems. |
SASO |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Evan Martin, JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu |
Assessing Quality of Policy Properties in Verification of Access Control Policies. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Ricardo Neisse, Patricia Dockhorn Costa, Maarten Wegdam, Marten van Sinderen |
An Information Model and Architecture for Context-Aware Management Domains. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
context-aware, management, policy |
18 | Carolyn Brodie, David George, Clare-Marie Karat, John Karat, Jorge Lobo 0001, Mandis Beigi, Xiping Wang, Seraphin B. Calo, Dinesh C. Verma, Alberto E. Schaeffer Filho, Emil Lupu, Morris Sloman |
The Coalition Policy Management Portal for Policy Authoring, Verification, and Deployment. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
policy deployment, portal, demonstration, policy analysis, policy verification, policy authoring |
18 | Andrzej Uszok, Jeffrey M. Bradshaw |
Demonstrating Selected W3C Policy Languages Interest Group Use Cases Using the KAoS Policy Services Framework. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
policy use cases, PLING, W3C, KAoS |
18 | Daniel D. Walker, Eric G. Mercer, Kent E. Seamons |
Or Best Offer: A Privacy Policy Negotiation Protocol. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
privay policy negotiation protocol, privacy, protocol, game theory, negotiation, utility, pareto optimality, privacy policy, P3P, preference models |
18 | Flávio Bergamaschi, Dave Conway-Jones, Christopher Gibson, Andy J. Stanford-Clark, Dinesh C. Verma, Seraphin B. Calo, Greg Cirincione, Tien Pham |
Policy Enabled ITA Sensor Fabric, A Distributed Framework for the Validation of Experimental Algorithms Using Real and Simulated Sensors. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
Sensor Fabric, Policy, Sensor middleware |
18 | Zeinab Iranmanesh, Morteza Amini, Rasool Jalili |
A Logic for Multi-domain Authorization Considering Administrators. |
POLICY |
2008 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 18116 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|