|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11972 occurrences of 4272 keywords
|
|
|
Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Donald Gotterbarn |
Raising the bar: a software engineering code of ethics and professional practice. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 26-28, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
ACM |
26 | Richard S. Rosenberg |
Beyond the code of ethics: the responsibility of professional societies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 18-25, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
ACM |
26 | Patricia Figliola Lewis |
The FCC's universal service rules (abstract): for schools and libraries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 17, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | David Preston |
What makes professionals so difficult: an investigation into professional ethics teaching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 58-67, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jessica Clark |
Who profits? online copyright concerns for writers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 33-36, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
26 | Jenny Shearer |
The campaign for an ethical Internet. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 80-85, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Internet |
26 | Tracy Camp |
Survey results from the incredible shrinking pipeline (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 68, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | David Primeaux |
Using an alternative ethical paradigm for analysis: an example regarding e-mail privacy issues. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 52-55, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Richard G. Epstein |
In-depth! The Silicon Valley Sentinel-Observer's public affairs NetTV program presents: toxic knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 86-91, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Florence Appel |
Including the social and ethical implications of computing in the computer science curriculum. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 56-57, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan P. Allen |
Who shapes the future? problem framings and the development of handheld computers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 3-8, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | |
CORPORATE IEEE-CS-ACM Joint Task Force on Software Engineering Ethics: Software engineering code of ethics and professional practice (version 4). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 29-32, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Barry S. Fagin |
Liberty and community online. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 69-78, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Internet |
26 | John P. Sullins |
Navigating the knowledge infrastructure: strategies for increasing workplace democracy and knowledge management (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 79, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jean-François Blanchette, Deborah G. Johnson |
Cryptography, data retention, and the panopticon society (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 1-2, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 37-38, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Internet |
26 | Gary T. Marx |
An ethics for the new surveillance (abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Policy ![In: ACM Policy 1998, The ethics and social impact component on Shaping policy in the information age, Washington, DC, USA, May 10-12, 1998, Proceedings, pp. 1, 1998, ACM, 1-58113-038-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Ross J. Anderson |
Crypto in Europe - Markets, Law and Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 75-89, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Willis H. Ware |
Privacy and Security Policy Choices in an NII Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Cryptography: Policy and Algorithms ![In: Cryptography: Policy and Algorithms, International Conference, Brisbane, Queensland, Australia, July 3-5, 1995, Proceedings, pp. 20-39, 1995, Springer, 3-540-60759-5. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Hejiao Huang, Hélène Kirchner |
Policy Composition Based on Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC (2) ![In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2, pp. 416-421, 2009, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Mandeep Saran, Pavol Zavarsky |
A Study of the Methods for Improving Internet Usage Policy Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (3) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 371-378, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Sourav Roy |
H-NMRU: A Low Area, High Performance Cache Replacement Policy for Embedded Processors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VLSI Design ![In: VLSI Design 2009: Improving Productivity through Higher Abstraction, The 22nd International Conference on VLSI Design, New Delhi, India, 5-9 January 2009, pp. 553-558, 2009, IEEE Computer Society, 978-0-7695-3506-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Mahalingam Ramkumar |
Trustworthy Computing under Resource Constraints with the DOWN Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(1), pp. 49-61, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security, Security, Mobile Computing, integrity and protection |
26 | Tan Phan, Jun Han 0004, Jean-Guy Schneider, Tim Ebringer, Tony Rogers |
A Survey of Policy-Based Management Approaches for Service Oriented Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Australian Software Engineering Conference ![In: 19th Australian Software Engineering Conference (ASWEC 2008), March 25-28, 2008, Perth, Australia, pp. 392-401, 2008, IEEE Computer Society, 978-0-7695-3100-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Da Wei, Yanheng Liu, Lian-deng Li, Xuejie Liu, Hai-yan Hu |
Dynamic Policy Updating Based on One-Point Coverage Random Sets Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 639-643, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Thirusellvan Vandeyar |
A Participatory Approach to the Formulation of an Information and Communication Technology Policy: A Q-Methodology Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (5) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 5: E-learning and Knowledge Management / Socially Informed and Instructinal Design / Learning Systems Platforms and Architectures / Modeling and Representation / Other Applications , December 12-14, 2008, Wuhan, China, pp. 1117-1123, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Chenghua Tang, Shunzheng Yu |
Assessment of Network Security Policy Based on Security Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 906-910, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Evan Martin, JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu |
Assessing Quality of Policy Properties in Verification of Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 163-172, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Heng Yin 0001, Haining Wang |
Building an application-aware IPsec policy system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 15(6), pp. 1502-1513, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
IP, computer network security, communication system security |
26 | Ajey Kumar, Manoj Misra, Anil Kumar Sarje |
A weighted cache replacement policy for location dependent data in mobile environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), Seoul, Korea, March 11-15, 2007, pp. 920-924, 2007, ACM, 1-59593-480-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mobile computing, cache replacement, location dependent data |
26 | Roger Curry, Cameron Kiddle, Rob Simmonds |
Policy Based Job Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCS ![In: 21st Annual International Symposium on High Performance Computing Systems and Applications (HPCS 2007), 13-16 May 2007, Saskatoon, Saskatchewan, Canada, pp. 19, 2007, IEEE Computer Society, 978-0-7695-2813-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Li Wang, Ken'ichi Kawanishi, Yoshikuni Onozato |
Simulation-Based Optimization on MPEG-4 over SCTP Multi-streaming with Differentiated Retransmission Policy in Lossy Link. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APSCC ![In: Proceedings of The 2nd IEEE Asia-Pacific Services Computing Conference, APSCC 2007, December 11-14, 2007, Tsukuba Science City, Japan, pp. 164-171, 2007, IEEE Computer Society, 0-7695-3051-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood |
Employees' Behavior towards IS Security Policy Compliance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), CD-ROM / Abstracts Proceedings, 3-6 January 2007, Waikoloa, Big Island, HI, USA, pp. 156, 2007, IEEE Computer Society, 0-7695-2755-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Charles C. Zhang, Marianne Winslett, Carl A. Gunter |
On the Safety and Efficiency of Firewall Policy Deployment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 2007 IEEE Symposium on Security and Privacy (S&P 2007), 20-23 May 2007, Oakland, California, USA, pp. 33-50, 2007, IEEE Computer Society, 0-7695-2848-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Changming Yin, Liyun Li, Hanxing Wang |
Reinforcement Learning Algorithms Based on mGA and EA with Policy Iterations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LSMS (1) ![In: Bio-Inspired Computational Intelligence and Applications, International Conference on Life System Modeling and Simulation, LSMS 2007, Shanghai, China, September 14-17, 2007, Proceedings, pp. 191-204, 2007, Springer, 978-3-540-74768-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Zude Li, Xiaojun Ye |
Towards a dynamic multi-policy dissemination control model: (DMDCON). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMOD Rec. ![In: SIGMOD Rec. 35(1), pp. 33-38, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
active time range, dissemination control, dissemination tree |
26 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
X-FEDERATE: A Policy Engineering Framework for Federated Access Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 32(5), pp. 330-346, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
software engineering, role-based access control, security management, Federated systems |
26 | A. Murali M. Rao |
Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 9th International Conference in Information Technology, ICIT 2006, Bhubaneswar, Orissa, India, 18-21 December 2006, pp. 172-175, 2006, IEEE Computer Society, 0-7695-2635-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Amit Sasturkar, Ping Yang 0002, Scott D. Stoller, C. R. Ramakrishnan 0001 |
Policy Analysis for Administrative Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSFW ![In: 19th IEEE Computer Security Foundations Workshop, (CSFW-19 2006), 5-7 July 2006, Venice, Italy, pp. 124-138, 2006, IEEE Computer Society, 0-7695-2615-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Cheng Zang, Zhongdong Huang, Ke Chen 0005, Jinxiang Dong |
An Architecture Approach to Dynamic Policy in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design III, 10th International Conference, CSCWD 2006, Nanjing, China, May 3-5, 2006, Revised Selected Papers, pp. 627-634, 2006, Springer, 978-3-540-72862-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Pedro Gama, Carlos Ribeiro, Paulo Ferreira 0001 |
Heimdhal: A History-Based Policy Engine for Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCGRID ![In: Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 16-19 May 2006, Singapore, pp. 481-488, 2006, IEEE Computer Society, 0-7695-2585-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Evan Martin, Tao Xie 0001, Ting Yu 0001 |
Defining and Measuring Policy Coverage in Testing Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 139-158, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma |
Policy management for networked systems and applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, pp. 455-468, 2005, IEEE. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Martin Hall-May, Tim Kelly |
Defining and Decomposing Safety Policy for Systems of Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAFECOMP ![In: Computer Safety, Reliability, and Security, 24th International Conference, SAFECOMP 2005, Fredrikstad, Norway, September 28-30, 2005, Proceedings, pp. 37-51, 2005, Springer, 3-540-29200-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Cheng Zang, Zhongdong Huang, Gang Chen 0001, Jinxiang Dong |
A State-Transfer-Based Dynamic Policy Approach for Constraints in RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WAIM ![In: Advances in Web-Age Information Management, 6th International Conference, WAIM 2005, Hangzhou, China, October 11-13, 2005, Proceedings, pp. 755-760, 2005, Springer, 3-540-29227-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Rohit Lotlikar, Ranga Raju Vatsavai, Mukesh K. Mohania, Sharma Chakravarthy |
Policy Schedule Advisor for Performance Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: Second International Conference on Autonomic Computing (ICAC 2005), 13-16 June 2005, Seattle, WA, USA, pp. 183-192, 2005, IEEE Computer Society, 0-7695-2276-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn |
Composing and combining policies under the policy machine. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 11-20, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
access control, role based access control, separation of duty, multi-level security |
26 | Jing You, Jian Xu, Xue-long Zhao, Feng-Yu Liu |
Modeling and Cost Analysis of Nested Software Rejuvenation Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNC (3) ![In: Advances in Natural Computation, First International Conference, ICNC 2005, Changsha, China, August 27-29, 2005, Proceedings, Part III, pp. 1280-1289, 2005, Springer, 3-540-28320-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Wei-Tek Tsai, Xinxin Liu, Yinong Chen |
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2005 IEEE International Conference on e-Business Engineering (ICEBE 2005), 18-21 October 2005, Beijing, China, pp. 10-17, 2005, IEEE Computer Society, 0-7695-2430-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jiangtao Li 0001, Ninghui Li |
Policy-hiding access control in open environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 29-38, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
cryptographic commitment, secure function, privacy, evaluation, access control, cryptographic protocol, automated trust negotiation, digital credentials |
26 | Lan Li, Xinghao Jiang, Jianhua Li 0001 |
Enforce Mandatory Access Control Policy on XML Documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 336-349, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Xu Li, Chunxia Lu |
Research on the policy optimization problems in system dynamics model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (1) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 224-228, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Trent Jaeger, Xiaolan Zhang 0001, Antony Edwards |
Policy management using access control spaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 6(3), pp. 327-364, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, Access control models |
26 | Gianluca Tonti, Jeffrey M. Bradshaw, Renia Jeffers, Rebecca Montanari, Niranjan Suri, Andrzej Uszok |
Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISWC ![In: The Semantic Web - ISWC 2003, Second International Semantic Web Conference, Sanibel Island, FL, USA, October 20-23, 2003, Proceedings, pp. 419-437, 2003, Springer, 3-540-20362-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Symon Chang, Qiming Chen, Meichun Hsu |
Managing Security Policy in a Large Distributed Web Services Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 3-6 November 2003, Dallas, TX, USA, Proceedings, pp. 610-615, 2003, IEEE Computer Society, 0-7695-2020-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Bas van Aarle, Jacob Engwerda, Joseph Plasmans |
Monetary and Fiscal Policy Interaction in the EMU: A Dynamic Game Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 109(1-4), pp. 229-264, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
EMU, stabilisation policies, full and partial cooperation, LQ dynamic game |
26 | Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn |
Security Policy Deployment in IPsec. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN (2) ![In: Information Networking, Wireless Communications Technologies and Network Applications, International Conference, ICOIN 2002, Cheju Island, Korea, January 30 - February 1, 2002, Revised Papers, Part II, pp. 453-466, 2002, Springer, 3-540-44255-3. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki |
A Specification Language for Distributed Policy Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 386-398, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Zhengao Zhou, Sivarama P. Dandamudi |
An Adaptive Space-Sharing Policy for Heterogeneous Parallel Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCN ![In: High-Performance Computing and Networking, 9th International Conference, HPCN Europe 2001, Amsterdam, The Netherlands, June 25-27, 2001, Proceedings, pp. 353-362, 2001, Springer, 3-540-42293-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Leonid Peshkin, Sayan Mukherjee 0004 |
Bounds on Sample Size for Policy Evaluation in Markov Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COLT/EuroCOLT ![In: Computational Learning Theory, 14th Annual Conference on Computational Learning Theory, COLT 2001 and 5th European Conference on Computational Learning Theory, EuroCOLT 2001, Amsterdam, The Netherlands, July 16-19, 2001, Proceedings, pp. 616-630, 2001, Springer, 3-540-42343-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Kei Kato, Shugo Shiba |
Designing Policy Networking System Using Active Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAN ![In: Active Networks, Second International Working Conference, IWAN 2000, Tokyo, Japan, October 16-18, 2000, Proceedings, pp. 316-325, 2000, Springer, 3-540-41179-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Mor Harchol-Balter, Mark Crovella, Cristina D. Murta |
On Choosing a Task Assignment Policy for a Distributed Server System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Computer Performance Evaluation (Tools) ![In: Computer Performance Evaluation: Modelling Techniques and Tools, 10th International Conference, Tools '98, Palma de Mallorca, Spain, September 14-18, 1998, Proceedings, pp. 231-242, 1998, Springer, 3-540-64949-2. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Hwa-Chun Lin, Cauligi S. Raghavendra |
A dynamic load balancing policy with a central job dispatcher (LBC). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS ![In: 10th International Conference on Distributed Computing Systems (ICDCS 1991), May 20-24, 1991, Arlington, Texas, USA, pp. 264-271, 1991, IEEE Computer Society, 0-8186-2144-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
25 | Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé |
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 355-356, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Yutaka Nakamura, Takeshi Mori, Shin Ishii |
An Off-Policy Natural Policy Gradient Method for a Partial Observable Markov Decision Process. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICANN (2) ![In: Artificial Neural Networks: Formal Models and Their Applications - ICANN 2005, 15th International Conference, Warsaw, Poland, September 11-15, 2005, Proceedings, Part II, pp. 431-436, 2005, Springer, 3-540-28755-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Diego Garcia, David S. Allison, Miriam A. M. Capretz, Maria Beatriz Felgar de Toledo |
Privacy Protection Mechanisms for Web Service Technology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SERA ![In: Proceedings of the Eighth ACIS International Conference on Software Engineering Research, Management and Applications, SERA 2010, Montreal, Canada, May 24-26, 2010, pp. 337-344, 2010, IEEE Computer Society, 978-0-7695-4075-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
Web Services Policy Framework (WS-Policy), Ontology, Web Service, Privacy, Policy, Web Ontology Language (OWL) |
25 | Imrich Chlamtac, Aura Ganz, Martin G. Kienzle |
An HIPPI Interconnection System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 42(2), pp. 138-150, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
high performance parallel interface, HIPPI interconnection system, connection-oriented communication standard, very-high-speed interconnection systems, high-end computing systems, centralized policy, broadcast policy, distributed policy, protocols, standard, network interfaces, crossbar switch, system configurations, cost measure |
25 | Scott D. Stoller, Ping Yang 0002, Mikhail I. Gofman, C. R. Ramakrishnan 0001 |
Symbolic reachability analysis for parameterized administrative role based access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 14th ACM Symposium on Access Control Models and Technologies, SACMAT 2009, Stresa, Italy, June 3-5, 2009, Proceedings, pp. 165-174, 2009, ACM, 978-1-60558-537-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
parameterized administrative role based access control, security policy analysis |
25 | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea |
Real life challenges in access-control management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 899-908, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
policy creation, access control |
25 | Adam J. Lee, Marianne Winslett |
Towards an efficient and language-agnostic compliance checker for trust negotiation systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 228-239, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
compliance checker, satisfying sets, policy, trust negotiation |
25 | Ehsan Atoofian, Amirali Baniasadi, Yvonne Coady |
Adaptive Read Validation in Time-Based Software Transactional Memory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Euro-Par Workshops ![In: Euro-Par 2008 Workshops - Parallel Processing, VHPC 2008, UNICORE 2008, HPPC 2008, SGS 2008, PROPER 2008, ROIA 2008, and DPA 2008, Las Palmas de Gran Canaria, Spain, August 25-26, 2008, Revised Selected Papers, pp. 152-162, 2008, Springer, 978-3-642-00954-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
read validation policy, time-based transactional memory, transactional memory |
25 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 58-71, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
25 | Sandro Etalle, William H. Winsborough |
A posteriori compliance control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 12th ACM Symposium on Access Control Models and Technologies, SACMAT 2007, Sophia Antipolis, France, June 20-22, 2007, Proceedings, pp. 11-20, 2007, ACM, 978-1-59593-745-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
access control, trust management, policy enforcement |
25 | Evan Martin |
Automated test generation for access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OOPSLA Companion ![In: Companion to the 21th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications, OOPSLA 2006, October 22-26, 2006, Portland, Oregon, USA, pp. 752-753, 2006, ACM, 1-59593-491-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
test generation, XACML, access control policy |
25 | Sushant Sinha, C. Siva Ram Murthy |
Information theoretic approach to traffic adaptive WDM networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE/ACM Trans. Netw. ![In: IEEE/ACM Trans. Netw. 13(4), pp. 881-894, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
LZ78 algorithm, network learning, prediction of traffic sequences, reconfiguration policy, virtual topology design, virtual topology reconfiguration, WDM networks |
25 | Victoria Ungureanu, Benjamin Melamed, Phillip G. Bradford, Michael N. Katehakis |
Class-Dependent Assignment in cluster-based servers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 1420-1425, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
assignment policy, cluster-based server, simulation, power-law distribution |
25 | Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian |
Flexible support for multiple access control policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 26(2), pp. 214-260, 2001. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
logic programming, authorization, access control policy |
25 | Laurence Cholvy, Frédéric Cuppens |
Analyzing Consistency of Security Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 103-112, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security policy consistency analysis, deontic formulae, normative conflicts, role priorities, methodology, problem solving, roles, formal language, security of data, regulation, formal logic |
25 | Marco Ajmone Marsan, Gianfranco Balbo, Andrea Bobbio, Giovanni Chiola, Gianni Conte, Aldo Cumani |
The Effect of Execution Policies on the Semantics and Analysis of Stochastic Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 15(7), pp. 832-846, 1989. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
execution policies, atomic transitions, race policy, continuous time homogeneous Markov chain, performance evaluation, Petri nets, semantics, Markov processes, stochastic Petri nets |
24 | Gabriel A. Weaver, Scott A. Rea, Sean W. Smith |
Computational techniques for increasing PKI policy comprehension by human analysts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDtrust ![In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDtrust 2010, Gaithersburg, Maryland, USA, April 13-15, 2010, pp. 51-62, 2010, ACM, 978-1-60558-895-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
certificate policy formalization, XML, PKI |
24 | Qun Ni, Elisa Bertino, Jorge Lobo 0001 |
D-algebra for composing access control policy decisions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 298-309, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
many-valued logic, MV-algebras, decision, policy composition |
24 | Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf |
PBES: a policy based encryption system with application to data sharing in the power grid. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 262-275, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
multi-party data sharing, phasor measurement units (PMUs), policy based encryption, power grid |
24 | Hejiao Huang, Hélène Kirchner |
Component-Based Security Policy Design with Colored Petri Nets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Semantics and Algebraic Specification ![In: Semantics and Algebraic Specification, Essays Dedicated to Peter D. Mosses on the Occasion of His 60th Birthday, pp. 21-42, 2009, Springer, 978-3-642-04163-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
security policy, colored Petri net, specification and verification, property-preservation |
24 | Jay Ligatti, Billy Rickey, Nalin Saigal |
LoPSiL: A Location-Based Policy-Specification Language. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 265-277, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Policy-specification languages, location-dependent policies, mobile devices, security and privacy |
24 | Haoqi Zhang, David C. Parkes, Yiling Chen 0001 |
Policy teaching through reward function learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC ![In: Proceedings 10th ACM Conference on Electronic Commerce (EC-2009), Stanford, California, USA, July 6--10, 2009, pp. 295-304, 2009, ACM, 978-1-60558-458-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
active indirect elicitation, environment design, policy teaching, preference elicitation, preference learning |
24 | Gianluca Misuraca |
Futuring e-government: governance and policy implications for designing an ICT-enabled knowledge society. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: ICEGOV 2009, Proceedings of the 3rd International Conference on Theory and Practice of Electronic Governance, Bogota, Colombia, November 10-13, 2009, pp. 83-90, 2009, ACM, 978-1-60558-663-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
foresight, e-government, policy, knowledge, governance, ICTs |
24 | Renato Iannella |
Towards the policy-aware web: the real web 3.0? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 17th International Conference on World Wide Web, WWW 2008, Beijing, China, April 21-25, 2008, pp. 1251-1252, 2008, ACM, 978-1-60558-085-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy-aware web, privacy, identity, rights |
24 | Paolo Greci, Fabio Martinelli, Ilaria Matteucci |
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISoLA ![In: Leveraging Applications of Formal Methods, Verification and Validation, Third International Symposium, ISoLA 2008, Porto Sani, Greece, October 13-15, 2008. Proceedings, pp. 221-236, 2008, Springer, 978-3-540-88478-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Contract-policy matching, symbolic transition systems, mobile application, simulation relation |
24 | Jie Ma, Stephen Cameron |
Combining Policy Search with Planning in Multi-agent Cooperation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RoboCup ![In: RoboCup 2008: Robot Soccer World Cup XII [papers from the 12th annual RoboCup International Symposium, Suzhou, China, July 15-18, 2008], pp. 532-543, 2008, Springer, 978-3-642-02920-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Policy Search, Machine Learning, Multi-agent Systems, Planning |
24 | Phu H. Phung, David Sands 0001 |
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COMPSAC ![In: Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, COMPSAC 2008, 28 July - 1 August 2008, Turku, Finland, pp. 1076-1082, 2008, IEEE Computer Society, 978-0-7695-3262-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors |
24 | Steffen Heinzl, Markus Mathes, Bernd Freisleben |
A Web Service Communication Policy for Describing Non-standard Application Requirements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAINT ![In: Proceedings of the 2008 International Symposium on Applications and the Internet, SAINT 2008, 28 July - 1 August 2008, Turku, Finland, pp. 40-47, 2008, IEEE Computer Society, 978-0-7695-3297-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
communication policy, Web Services, real-time, specification, streaming, legacy |
24 | Nobutaka Matsumoto, Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka |
BPEL Driven Policy Management of Virtualized Network Resources for IMS Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Challenges for Next Generation Network Operations and Service Management, 11th Asia-Pacific Network Operations and Management Symposium, APNOMS 2008, Beijing, China, October 22-24, 2008. Proceedings, pp. 317-326, 2008, Springer, 978-3-540-88622-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
QoS, SOA, BPEL, IMS, Policy management, network resource management |
24 | Michihiko Koeda, Takeo Shibata, Kunihiko Asai, Yoshiro Okubo, Hiroshi Tanaka |
Care Policy for Patients with Dementia: Family's Decision and Its Impact. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BMEI (2) ![In: Proceedings of the 2008 International Conference on BioMedical Engineering and Informatics, BMEI 2008, May 28-30, 2008, Sanya, Hainan, China - Volume 2, pp. 843-847, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Care Policy, AHP and Caregiver, Family, Dementia |
24 | Roohollah Honarvar |
Lessons from a dropped ICT curriculum design project: A retrospective view. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: Social Dimensions of Information And Communication Technology Policy, Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008, pp. 241-252, 2008, Springer, 978-0-387-84821-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IT/S professionals’ training, national ICT development policy, higher education, Developing countries, curriculum design |
24 | Dimitris Boucas |
National variations of the information society: Evidence from the Greek case. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCC ![In: Social Dimensions of Information And Communication Technology Policy, Proceedings of the Eighth International Conference on Human Choice and Computers (HCC8), IFIP TC 9, Pretoria, South Africa, September 25-26, 2008, pp. 63-79, 2008, Springer, 978-0-387-84821-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
implementation politics, state, Information society, IT policy |
24 | Dongbing Gu, Erfu Yang |
Fuzzy Policy Reinforcement Learning in Cooperative Multi-robot Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Intell. Robotic Syst. ![In: J. Intell. Robotic Syst. 48(1), pp. 7-22, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
flocking behavior, policy gradient reinforcement learning, cooperative control, multi-agent reinforcement learning |
24 | Dong-Xi Liu |
CSchema: A Downgrading Policy Language for XML Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 44-53, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
XML, access control, programming language, type system, security policy |
24 | Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori |
An Implementation Design of a Fine-Grained Database Access Control Policy Consistency Checking Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (2) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 11th International Conference, KES 2007, XVII Italian Workshop on Neural Networks, Vietri sul Mare, Italy, September 12-14, 2007. Proceedings, Part II, pp. 752-760, 2007, Springer, 978-3-540-74826-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
fine-grained database access control, policy consistency |
24 | Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino |
Password policy simulation and analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Identity Management ![In: Proceedings of the 2007 Workshop on Digital Identity Management, Fairfax, VA, USA, November 2, 2007, pp. 1-10, 2007, ACM, 978-1-59593-889-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
simulation, modeling, management, policy, password |
24 | Jennifer Stoll |
IdeaMurals: supporting ideation in public policy knowledge work. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Creativity & Cognition ![In: Proceedings of the 6th Conference on Creativity & Cognition, Washington, DC, USA, June 13-15, 2007, pp. 300, 2007, ACM, 978-1-59593-712-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
ideation support, text-based knowledge work, visualization, information management, public policy |
Displaying result #501 - #600 of 31126 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|