The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for policy with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1968 (19) 1969-1972 (30) 1973-1974 (19) 1975 (20) 1976 (18) 1977 (15) 1978 (20) 1979 (17) 1980 (16) 1981 (19) 1982 (19) 1983 (26) 1984 (37) 1985 (23) 1986 (30) 1987 (41) 1988 (39) 1989 (57) 1990 (77) 1991 (77) 1992 (79) 1993 (86) 1994 (126) 1995 (164) 1996 (158) 1997 (178) 1998 (204) 1999 (243) 2000 (393) 2001 (514) 2002 (687) 2003 (849) 2004 (1116) 2005 (1312) 2006 (1502) 2007 (1685) 2008 (1657) 2009 (1353) 2010 (911) 2011 (800) 2012 (823) 2013 (828) 2014 (798) 2015 (817) 2016 (935) 2017 (1118) 2018 (1309) 2019 (1525) 2020 (1761) 2021 (1870) 2022 (2005) 2023 (2167) 2024 (534)
Publication types (Num. hits)
article(13935) book(20) data(10) incollection(248) inproceedings(16642) phdthesis(236) proceedings(35)
Venues (Conferences, Journals, ...)
CoRR(3405) Inf. Econ. Policy(516) POLICY(378) ICML(303) NeurIPS(270) Eur. J. Oper. Res.(255) HICSS(242) Internet Policy Rev.(230) IEEE Access(194) AAAI(193) Comput. Ind. Eng.(187) AAMAS(183) Reliab. Eng. Syst. Saf.(165) CDC(162) WSC(153) ICC(151) More (+10 of total 4263)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 11972 occurrences of 4272 keywords

Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Donald Gotterbarn Raising the bar: a software engineering code of ethics and professional practice. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF ACM
26Richard S. Rosenberg Beyond the code of ethics: the responsibility of professional societies. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF ACM
26Patricia Figliola Lewis The FCC's universal service rules (abstract): for schools and libraries. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26David Preston What makes professionals so difficult: an investigation into professional ethics teaching. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Jessica Clark Who profits? online copyright concerns for writers. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF World Wide Web (WWW)
26Jenny Shearer The campaign for an ethical Internet. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Internet
26Tracy Camp Survey results from the incredible shrinking pipeline (abstract). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26David Primeaux Using an alternative ethical paradigm for analysis: an example regarding e-mail privacy issues. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Richard G. Epstein In-depth! The Silicon Valley Sentinel-Observer's public affairs NetTV program presents: toxic knowledge. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Florence Appel Including the social and ethical implications of computing in the computer science curriculum. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Jonathan P. Allen Who shapes the future? problem framings and the development of handheld computers. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26 CORPORATE IEEE-CS-ACM Joint Task Force on Software Engineering Ethics: Software engineering code of ethics and professional practice (version 4). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Barry S. Fagin Liberty and community online. Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Internet
26John P. Sullins Navigating the knowledge infrastructure: strategies for increasing workplace democracy and knowledge management (abstract). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Jean-François Blanchette, Deborah G. Johnson Cryptography, data retention, and the panopticon society (abstract). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Deborah G. Johnson, Keith W. Miller 0001 Anonymity, pseudonymity, or inescapable identity on the net (abstract). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Internet
26Gary T. Marx An ethics for the new surveillance (abstract). Search on Bibsonomy ACM Policy The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Ross J. Anderson Crypto in Europe - Markets, Law and Policy. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26Willis H. Ware Privacy and Security Policy Choices in an NII Environment. Search on Bibsonomy Cryptography: Policy and Algorithms The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
26Hejiao Huang, Hélène Kirchner Policy Composition Based on Petri Nets. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Mandeep Saran, Pavol Zavarsky A Study of the Methods for Improving Internet Usage Policy Compliance. Search on Bibsonomy CSE (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Sourav Roy H-NMRU: A Low Area, High Performance Cache Replacement Policy for Embedded Processors. Search on Bibsonomy VLSI Design The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Mahalingam Ramkumar Trustworthy Computing under Resource Constraints with the DOWN Policy. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Security, Mobile Computing, integrity and protection
26Tan Phan, Jun Han 0004, Jean-Guy Schneider, Tim Ebringer, Tony Rogers A Survey of Policy-Based Management Approaches for Service Oriented Systems. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Da Wei, Yanheng Liu, Lian-deng Li, Xuejie Liu, Hai-yan Hu Dynamic Policy Updating Based on One-Point Coverage Random Sets Theory. Search on Bibsonomy WKDD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Thirusellvan Vandeyar A Participatory Approach to the Formulation of an Information and Communication Technology Policy: A Q-Methodology Case Study. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Chenghua Tang, Shunzheng Yu Assessment of Network Security Policy Based on Security Capability. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Evan Martin, JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu Assessing Quality of Policy Properties in Verification of Access Control Policies. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Heng Yin 0001, Haining Wang Building an application-aware IPsec policy system. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF IP, computer network security, communication system security
26Ajey Kumar, Manoj Misra, Anil Kumar Sarje A weighted cache replacement policy for location dependent data in mobile environments. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile computing, cache replacement, location dependent data
26Roger Curry, Cameron Kiddle, Rob Simmonds Policy Based Job Analysis. Search on Bibsonomy HPCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Li Wang, Ken'ichi Kawanishi, Yoshikuni Onozato Simulation-Based Optimization on MPEG-4 over SCTP Multi-streaming with Differentiated Retransmission Policy in Lossy Link. Search on Bibsonomy APSCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood Employees' Behavior towards IS Security Policy Compliance. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Charles C. Zhang, Marianne Winslett, Carl A. Gunter On the Safety and Efficiency of Firewall Policy Deployment. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Changming Yin, Liyun Li, Hanxing Wang Reinforcement Learning Algorithms Based on mGA and EA with Policy Iterations. Search on Bibsonomy LSMS (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Zude Li, Xiaojun Ye Towards a dynamic multi-policy dissemination control model: (DMDCON). Search on Bibsonomy SIGMOD Rec. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF active time range, dissemination control, dissemination tree
26Rafae Bhatti, Elisa Bertino, Arif Ghafoor X-FEDERATE: A Policy Engineering Framework for Federated Access Management. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software engineering, role-based access control, security management, Federated systems
26A. Murali M. Rao Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Amit Sasturkar, Ping Yang 0002, Scott D. Stoller, C. R. Ramakrishnan 0001 Policy Analysis for Administrative Role Based Access Control. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Cheng Zang, Zhongdong Huang, Ke Chen 0005, Jinxiang Dong An Architecture Approach to Dynamic Policy in RBAC. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Pedro Gama, Carlos Ribeiro, Paulo Ferreira 0001 Heimdhal: A History-Based Policy Engine for Grids. Search on Bibsonomy CCGRID The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Evan Martin, Tao Xie 0001, Ting Yu 0001 Defining and Measuring Policy Coverage in Testing Access Control Policies. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma Policy management for networked systems and applications. Search on Bibsonomy Integrated Network Management The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Martin Hall-May, Tim Kelly Defining and Decomposing Safety Policy for Systems of Systems. Search on Bibsonomy SAFECOMP The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Cheng Zang, Zhongdong Huang, Gang Chen 0001, Jinxiang Dong A State-Transfer-Based Dynamic Policy Approach for Constraints in RBAC. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Rohit Lotlikar, Ranga Raju Vatsavai, Mukesh K. Mohania, Sharma Chakravarthy Policy Schedule Advisor for Performance Management. Search on Bibsonomy ICAC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn Composing and combining policies under the policy machine. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, role based access control, separation of duty, multi-level security
26Jing You, Jian Xu, Xue-long Zhao, Feng-Yu Liu Modeling and Cost Analysis of Nested Software Rejuvenation Policy. Search on Bibsonomy ICNC (3) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Wei-Tek Tsai, Xinxin Liu, Yinong Chen Distributed Policy Specification and Enforcement in Service-Oriented Business Systems. Search on Bibsonomy ICEBE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jiangtao Li 0001, Ninghui Li Policy-hiding access control in open environment. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF cryptographic commitment, secure function, privacy, evaluation, access control, cryptographic protocol, automated trust negotiation, digital credentials
26Lan Li, Xinghao Jiang, Jianhua Li 0001 Enforce Mandatory Access Control Policy on XML Documents. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Xu Li, Chunxia Lu Research on the policy optimization problems in system dynamics model. Search on Bibsonomy SMC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Trent Jaeger, Xiaolan Zhang 0001, Antony Edwards Policy management using access control spaces. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF authorization mechanisms, role-based access control, Access control models
26Gianluca Tonti, Jeffrey M. Bradshaw, Renia Jeffers, Rebecca Montanari, Niranjan Suri, Andrzej Uszok Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder. Search on Bibsonomy ISWC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Symon Chang, Qiming Chen, Meichun Hsu Managing Security Policy in a Large Distributed Web Services Environment. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Bas van Aarle, Jacob Engwerda, Joseph Plasmans Monetary and Fiscal Policy Interaction in the EMU: A Dynamic Game Approach. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF EMU, stabilisation policies, full and partial cooperation, LQ dynamic game
26Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn Security Policy Deployment in IPsec. Search on Bibsonomy ICOIN (2) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki A Specification Language for Distributed Policy Control. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Zhengao Zhou, Sivarama P. Dandamudi An Adaptive Space-Sharing Policy for Heterogeneous Parallel Systems. Search on Bibsonomy HPCN The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Leonid Peshkin, Sayan Mukherjee 0004 Bounds on Sample Size for Policy Evaluation in Markov Environments. Search on Bibsonomy COLT/EuroCOLT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Kei Kato, Shugo Shiba Designing Policy Networking System Using Active Networks. Search on Bibsonomy IWAN The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Mor Harchol-Balter, Mark Crovella, Cristina D. Murta On Choosing a Task Assignment Policy for a Distributed Server System. Search on Bibsonomy Computer Performance Evaluation (Tools) The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Hwa-Chun Lin, Cauligi S. Raghavendra A dynamic load balancing policy with a central job dispatcher (LBC). Search on Bibsonomy ICDCS The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
25Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Yutaka Nakamura, Takeshi Mori, Shin Ishii An Off-Policy Natural Policy Gradient Method for a Partial Observable Markov Decision Process. Search on Bibsonomy ICANN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Diego Garcia, David S. Allison, Miriam A. M. Capretz, Maria Beatriz Felgar de Toledo Privacy Protection Mechanisms for Web Service Technology. Search on Bibsonomy SERA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Web Services Policy Framework (WS-Policy), Ontology, Web Service, Privacy, Policy, Web Ontology Language (OWL)
25Imrich Chlamtac, Aura Ganz, Martin G. Kienzle An HIPPI Interconnection System. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1993 DBLP  DOI  BibTeX  RDF high performance parallel interface, HIPPI interconnection system, connection-oriented communication standard, very-high-speed interconnection systems, high-end computing systems, centralized policy, broadcast policy, distributed policy, protocols, standard, network interfaces, crossbar switch, system configurations, cost measure
25Scott D. Stoller, Ping Yang 0002, Mikhail I. Gofman, C. R. Ramakrishnan 0001 Symbolic reachability analysis for parameterized administrative role based access control. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF parameterized administrative role based access control, security policy analysis
25Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea Real life challenges in access-control management. Search on Bibsonomy CHI The full citation details ... 2009 DBLP  DOI  BibTeX  RDF policy creation, access control
25Adam J. Lee, Marianne Winslett Towards an efficient and language-agnostic compliance checker for trust negotiation systems. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF compliance checker, satisfying sets, policy, trust negotiation
25Ehsan Atoofian, Amirali Baniasadi, Yvonne Coady Adaptive Read Validation in Time-Based Software Transactional Memory. Search on Bibsonomy Euro-Par Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF read validation policy, time-based transactional memory, transactional memory
25Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 Dynamic pharming attacks and locked same-origin policies for web browsers. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF same-origin policy, pharming, web authentication
25Sandro Etalle, William H. Winsborough A posteriori compliance control. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, trust management, policy enforcement
25Evan Martin Automated test generation for access control policies. Search on Bibsonomy OOPSLA Companion The full citation details ... 2006 DBLP  DOI  BibTeX  RDF test generation, XACML, access control policy
25Sushant Sinha, C. Siva Ram Murthy Information theoretic approach to traffic adaptive WDM networks. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF LZ78 algorithm, network learning, prediction of traffic sequences, reconfiguration policy, virtual topology design, virtual topology reconfiguration, WDM networks
25Victoria Ungureanu, Benjamin Melamed, Phillip G. Bradford, Michael N. Katehakis Class-Dependent Assignment in cluster-based servers. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF assignment policy, cluster-based server, simulation, power-law distribution
25Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian Flexible support for multiple access control policies. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF logic programming, authorization, access control policy
25Laurence Cholvy, Frédéric Cuppens Analyzing Consistency of Security Policies. Search on Bibsonomy S&P The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security policy consistency analysis, deontic formulae, normative conflicts, role priorities, methodology, problem solving, roles, formal language, security of data, regulation, formal logic
25Marco Ajmone Marsan, Gianfranco Balbo, Andrea Bobbio, Giovanni Chiola, Gianni Conte, Aldo Cumani The Effect of Execution Policies on the Semantics and Analysis of Stochastic Petri Nets. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF execution policies, atomic transitions, race policy, continuous time homogeneous Markov chain, performance evaluation, Petri nets, semantics, Markov processes, stochastic Petri nets
24Gabriel A. Weaver, Scott A. Rea, Sean W. Smith Computational techniques for increasing PKI policy comprehension by human analysts. Search on Bibsonomy IDtrust The full citation details ... 2010 DBLP  DOI  BibTeX  RDF certificate policy formalization, XML, PKI
24Qun Ni, Elisa Bertino, Jorge Lobo 0001 D-algebra for composing access control policy decisions. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF many-valued logic, MV-algebras, decision, policy composition
24Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf PBES: a policy based encryption system with application to data sharing in the power grid. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-party data sharing, phasor measurement units (PMUs), policy based encryption, power grid
24Hejiao Huang, Hélène Kirchner Component-Based Security Policy Design with Colored Petri Nets. Search on Bibsonomy Semantics and Algebraic Specification The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security policy, colored Petri net, specification and verification, property-preservation
24Jay Ligatti, Billy Rickey, Nalin Saigal LoPSiL: A Location-Based Policy-Specification Language. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Policy-specification languages, location-dependent policies, mobile devices, security and privacy
24Haoqi Zhang, David C. Parkes, Yiling Chen 0001 Policy teaching through reward function learning. Search on Bibsonomy EC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF active indirect elicitation, environment design, policy teaching, preference elicitation, preference learning
24Gianluca Misuraca Futuring e-government: governance and policy implications for designing an ICT-enabled knowledge society. Search on Bibsonomy ICEGOV The full citation details ... 2009 DBLP  DOI  BibTeX  RDF foresight, e-government, policy, knowledge, governance, ICTs
24Renato Iannella Towards the policy-aware web: the real web 3.0? Search on Bibsonomy WWW The full citation details ... 2008 DBLP  DOI  BibTeX  RDF policy-aware web, privacy, identity, rights
24Paolo Greci, Fabio Martinelli, Ilaria Matteucci A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application. Search on Bibsonomy ISoLA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Contract-policy matching, symbolic transition systems, mobile application, simulation relation
24Jie Ma, Stephen Cameron Combining Policy Search with Planning in Multi-agent Cooperation. Search on Bibsonomy RoboCup The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Policy Search, Machine Learning, Multi-agent Systems, Planning
24Phu H. Phung, David Sands 0001 Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. Search on Bibsonomy COMPSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors
24Steffen Heinzl, Markus Mathes, Bernd Freisleben A Web Service Communication Policy for Describing Non-standard Application Requirements. Search on Bibsonomy SAINT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF communication policy, Web Services, real-time, specification, streaming, legacy
24Nobutaka Matsumoto, Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka BPEL Driven Policy Management of Virtualized Network Resources for IMS Environments. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF QoS, SOA, BPEL, IMS, Policy management, network resource management
24Michihiko Koeda, Takeo Shibata, Kunihiko Asai, Yoshiro Okubo, Hiroshi Tanaka Care Policy for Patients with Dementia: Family's Decision and Its Impact. Search on Bibsonomy BMEI (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Care Policy, AHP and Caregiver, Family, Dementia
24Roohollah Honarvar Lessons from a dropped ICT curriculum design project: A retrospective view. Search on Bibsonomy HCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IT/S professionals’ training, national ICT development policy, higher education, Developing countries, curriculum design
24Dimitris Boucas National variations of the information society: Evidence from the Greek case. Search on Bibsonomy HCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF implementation politics, state, Information society, IT policy
24Dongbing Gu, Erfu Yang Fuzzy Policy Reinforcement Learning in Cooperative Multi-robot Systems. Search on Bibsonomy J. Intell. Robotic Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF flocking behavior, policy gradient reinforcement learning, cooperative control, multi-agent reinforcement learning
24Dong-Xi Liu CSchema: A Downgrading Policy Language for XML Access Control. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF XML, access control, programming language, type system, security policy
24Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori An Implementation Design of a Fine-Grained Database Access Control Policy Consistency Checking Mechanism. Search on Bibsonomy KES (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fine-grained database access control, policy consistency
24Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino Password policy simulation and analysis. Search on Bibsonomy Digital Identity Management The full citation details ... 2007 DBLP  DOI  BibTeX  RDF simulation, modeling, management, policy, password
24Jennifer Stoll IdeaMurals: supporting ideation in public policy knowledge work. Search on Bibsonomy Creativity & Cognition The full citation details ... 2007 DBLP  DOI  BibTeX  RDF ideation support, text-based knowledge work, visualization, information management, public policy
Displaying result #501 - #600 of 31126 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license