|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11972 occurrences of 4272 keywords
|
|
|
Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
26 | Donald Gotterbarn |
Raising the bar: a software engineering code of ethics and professional practice. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
ACM |
26 | Richard S. Rosenberg |
Beyond the code of ethics: the responsibility of professional societies. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
ACM |
26 | Patricia Figliola Lewis |
The FCC's universal service rules (abstract): for schools and libraries. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | David Preston |
What makes professionals so difficult: an investigation into professional ethics teaching. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jessica Clark |
Who profits? online copyright concerns for writers. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
World Wide Web (WWW) |
26 | Jenny Shearer |
The campaign for an ethical Internet. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
Internet |
26 | Tracy Camp |
Survey results from the incredible shrinking pipeline (abstract). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | David Primeaux |
Using an alternative ethical paradigm for analysis: an example regarding e-mail privacy issues. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Richard G. Epstein |
In-depth! The Silicon Valley Sentinel-Observer's public affairs NetTV program presents: toxic knowledge. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Florence Appel |
Including the social and ethical implications of computing in the computer science curriculum. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan P. Allen |
Who shapes the future? problem framings and the development of handheld computers. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | |
CORPORATE IEEE-CS-ACM Joint Task Force on Software Engineering Ethics: Software engineering code of ethics and professional practice (version 4). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Barry S. Fagin |
Liberty and community online. |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
Internet |
26 | John P. Sullins |
Navigating the knowledge infrastructure: strategies for increasing workplace democracy and knowledge management (abstract). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Jean-François Blanchette, Deborah G. Johnson |
Cryptography, data retention, and the panopticon society (abstract). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Deborah G. Johnson, Keith W. Miller 0001 |
Anonymity, pseudonymity, or inescapable identity on the net (abstract). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
Internet |
26 | Gary T. Marx |
An ethics for the new surveillance (abstract). |
ACM Policy |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Ross J. Anderson |
Crypto in Europe - Markets, Law and Policy. |
Cryptography: Policy and Algorithms |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Willis H. Ware |
Privacy and Security Policy Choices in an NII Environment. |
Cryptography: Policy and Algorithms |
1995 |
DBLP DOI BibTeX RDF |
|
26 | Hejiao Huang, Hélène Kirchner |
Policy Composition Based on Petri Nets. |
COMPSAC (2) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Mandeep Saran, Pavol Zavarsky |
A Study of the Methods for Improving Internet Usage Policy Compliance. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Sourav Roy |
H-NMRU: A Low Area, High Performance Cache Replacement Policy for Embedded Processors. |
VLSI Design |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Mahalingam Ramkumar |
Trustworthy Computing under Resource Constraints with the DOWN Policy. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
Security, Security, Mobile Computing, integrity and protection |
26 | Tan Phan, Jun Han 0004, Jean-Guy Schneider, Tim Ebringer, Tony Rogers |
A Survey of Policy-Based Management Approaches for Service Oriented Systems. |
Australian Software Engineering Conference |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Da Wei, Yanheng Liu, Lian-deng Li, Xuejie Liu, Hai-yan Hu |
Dynamic Policy Updating Based on One-Point Coverage Random Sets Theory. |
WKDD |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Thirusellvan Vandeyar |
A Participatory Approach to the Formulation of an Information and Communication Technology Policy: A Q-Methodology Case Study. |
CSSE (5) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Chenghua Tang, Shunzheng Yu |
Assessment of Network Security Policy Based on Security Capability. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Evan Martin, JeeHyun Hwang, Tao Xie 0001, Vincent C. Hu |
Assessing Quality of Policy Properties in Verification of Access Control Policies. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Heng Yin 0001, Haining Wang |
Building an application-aware IPsec policy system. |
IEEE/ACM Trans. Netw. |
2007 |
DBLP DOI BibTeX RDF |
IP, computer network security, communication system security |
26 | Ajey Kumar, Manoj Misra, Anil Kumar Sarje |
A weighted cache replacement policy for location dependent data in mobile environments. |
SAC |
2007 |
DBLP DOI BibTeX RDF |
mobile computing, cache replacement, location dependent data |
26 | Roger Curry, Cameron Kiddle, Rob Simmonds |
Policy Based Job Analysis. |
HPCS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Li Wang, Ken'ichi Kawanishi, Yoshikuni Onozato |
Simulation-Based Optimization on MPEG-4 over SCTP Multi-streaming with Differentiated Retransmission Policy in Lossy Link. |
APSCC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Seppo Pahnila, Mikko T. Siponen, M. Adam Mahmood |
Employees' Behavior towards IS Security Policy Compliance. |
HICSS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Charles C. Zhang, Marianne Winslett, Carl A. Gunter |
On the Safety and Efficiency of Firewall Policy Deployment. |
S&P |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Changming Yin, Liyun Li, Hanxing Wang |
Reinforcement Learning Algorithms Based on mGA and EA with Policy Iterations. |
LSMS (1) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Zude Li, Xiaojun Ye |
Towards a dynamic multi-policy dissemination control model: (DMDCON). |
SIGMOD Rec. |
2006 |
DBLP DOI BibTeX RDF |
active time range, dissemination control, dissemination tree |
26 | Rafae Bhatti, Elisa Bertino, Arif Ghafoor |
X-FEDERATE: A Policy Engineering Framework for Federated Access Management. |
IEEE Trans. Software Eng. |
2006 |
DBLP DOI BibTeX RDF |
software engineering, role-based access control, security management, Federated systems |
26 | A. Murali M. Rao |
Policy Specification and Enforcement for Detection of Security Violations in a Mail Service. |
ICIT |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Amit Sasturkar, Ping Yang 0002, Scott D. Stoller, C. R. Ramakrishnan 0001 |
Policy Analysis for Administrative Role Based Access Control. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Cheng Zang, Zhongdong Huang, Ke Chen 0005, Jinxiang Dong |
An Architecture Approach to Dynamic Policy in RBAC. |
CSCWD (Selected Papers) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Pedro Gama, Carlos Ribeiro, Paulo Ferreira 0001 |
Heimdhal: A History-Based Policy Engine for Grids. |
CCGRID |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Evan Martin, Tao Xie 0001, Ting Yu 0001 |
Defining and Measuring Policy Coverage in Testing Access Control Policies. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Dakshi Agrawal, Seraphin B. Calo, James Giles, Kang-Won Lee, Dinesh C. Verma |
Policy management for networked systems and applications. |
Integrated Network Management |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Martin Hall-May, Tim Kelly |
Defining and Decomposing Safety Policy for Systems of Systems. |
SAFECOMP |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Cheng Zang, Zhongdong Huang, Gang Chen 0001, Jinxiang Dong |
A State-Transfer-Based Dynamic Policy Approach for Constraints in RBAC. |
WAIM |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Rohit Lotlikar, Ranga Raju Vatsavai, Mukesh K. Mohania, Sharma Chakravarthy |
Policy Schedule Advisor for Performance Management. |
ICAC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn |
Composing and combining policies under the policy machine. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, role based access control, separation of duty, multi-level security |
26 | Jing You, Jian Xu, Xue-long Zhao, Feng-Yu Liu |
Modeling and Cost Analysis of Nested Software Rejuvenation Policy. |
ICNC (3) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Wei-Tek Tsai, Xinxin Liu, Yinong Chen |
Distributed Policy Specification and Enforcement in Service-Oriented Business Systems. |
ICEBE |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jiangtao Li 0001, Ninghui Li |
Policy-hiding access control in open environment. |
PODC |
2005 |
DBLP DOI BibTeX RDF |
cryptographic commitment, secure function, privacy, evaluation, access control, cryptographic protocol, automated trust negotiation, digital credentials |
26 | Lan Li, Xinghao Jiang, Jianhua Li 0001 |
Enforce Mandatory Access Control Policy on XML Documents. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Xu Li, Chunxia Lu |
Research on the policy optimization problems in system dynamics model. |
SMC (1) |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Trent Jaeger, Xiaolan Zhang 0001, Antony Edwards |
Policy management using access control spaces. |
ACM Trans. Inf. Syst. Secur. |
2003 |
DBLP DOI BibTeX RDF |
authorization mechanisms, role-based access control, Access control models |
26 | Gianluca Tonti, Jeffrey M. Bradshaw, Renia Jeffers, Rebecca Montanari, Niranjan Suri, Andrzej Uszok |
Semantic Web Languages for Policy Representation and Reasoning: A Comparison of KAoS, Rei, and Ponder. |
ISWC |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Symon Chang, Qiming Chen, Meichun Hsu |
Managing Security Policy in a Large Distributed Web Services Environment. |
COMPSAC |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Bas van Aarle, Jacob Engwerda, Joseph Plasmans |
Monetary and Fiscal Policy Interaction in the EMU: A Dynamic Game Approach. |
Ann. Oper. Res. |
2002 |
DBLP DOI BibTeX RDF |
EMU, stabilisation policies, full and partial cooperation, LQ dynamic game |
26 | Geon Woo Kim 0001, So-Hee Park, Jaehoon Nah, Sung Won Sohn |
Security Policy Deployment in IPsec. |
ICOIN (2) |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Shigeta Kuninobu, Yoshiaki Takata, Daigo Taguchi, Masayuki Nakae, Hiroyuki Seki |
A Specification Language for Distributed Policy Control. |
ICICS |
2002 |
DBLP DOI BibTeX RDF |
|
26 | Zhengao Zhou, Sivarama P. Dandamudi |
An Adaptive Space-Sharing Policy for Heterogeneous Parallel Systems. |
HPCN |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Leonid Peshkin, Sayan Mukherjee 0004 |
Bounds on Sample Size for Policy Evaluation in Markov Environments. |
COLT/EuroCOLT |
2001 |
DBLP DOI BibTeX RDF |
|
26 | Kei Kato, Shugo Shiba |
Designing Policy Networking System Using Active Networks. |
IWAN |
2000 |
DBLP DOI BibTeX RDF |
|
26 | Mor Harchol-Balter, Mark Crovella, Cristina D. Murta |
On Choosing a Task Assignment Policy for a Distributed Server System. |
Computer Performance Evaluation (Tools) |
1998 |
DBLP DOI BibTeX RDF |
|
26 | Hwa-Chun Lin, Cauligi S. Raghavendra |
A dynamic load balancing policy with a central job dispatcher (LBC). |
ICDCS |
1991 |
DBLP DOI BibTeX RDF |
|
25 | Laurent George 0002, Valérie Viet Triem Tong, Ludovic Mé |
Blare Tools: A Policy-Based Intrusion Detection System Automatically Set by the Security Policy. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
|
25 | Yutaka Nakamura, Takeshi Mori, Shin Ishii |
An Off-Policy Natural Policy Gradient Method for a Partial Observable Markov Decision Process. |
ICANN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
25 | Diego Garcia, David S. Allison, Miriam A. M. Capretz, Maria Beatriz Felgar de Toledo |
Privacy Protection Mechanisms for Web Service Technology. |
SERA |
2010 |
DBLP DOI BibTeX RDF |
Web Services Policy Framework (WS-Policy), Ontology, Web Service, Privacy, Policy, Web Ontology Language (OWL) |
25 | Imrich Chlamtac, Aura Ganz, Martin G. Kienzle |
An HIPPI Interconnection System. |
IEEE Trans. Computers |
1993 |
DBLP DOI BibTeX RDF |
high performance parallel interface, HIPPI interconnection system, connection-oriented communication standard, very-high-speed interconnection systems, high-end computing systems, centralized policy, broadcast policy, distributed policy, protocols, standard, network interfaces, crossbar switch, system configurations, cost measure |
25 | Scott D. Stoller, Ping Yang 0002, Mikhail I. Gofman, C. R. Ramakrishnan 0001 |
Symbolic reachability analysis for parameterized administrative role based access control. |
SACMAT |
2009 |
DBLP DOI BibTeX RDF |
parameterized administrative role based access control, security policy analysis |
25 | Lujo Bauer, Lorrie Faith Cranor, Robert W. Reeder, Michael K. Reiter, Kami Vaniea |
Real life challenges in access-control management. |
CHI |
2009 |
DBLP DOI BibTeX RDF |
policy creation, access control |
25 | Adam J. Lee, Marianne Winslett |
Towards an efficient and language-agnostic compliance checker for trust negotiation systems. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
compliance checker, satisfying sets, policy, trust negotiation |
25 | Ehsan Atoofian, Amirali Baniasadi, Yvonne Coady |
Adaptive Read Validation in Time-Based Software Transactional Memory. |
Euro-Par Workshops |
2008 |
DBLP DOI BibTeX RDF |
read validation policy, time-based transactional memory, transactional memory |
25 | Chris Karlof, Umesh Shankar, J. Doug Tygar, David A. Wagner 0001 |
Dynamic pharming attacks and locked same-origin policies for web browsers. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
same-origin policy, pharming, web authentication |
25 | Sandro Etalle, William H. Winsborough |
A posteriori compliance control. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
access control, trust management, policy enforcement |
25 | Evan Martin |
Automated test generation for access control policies. |
OOPSLA Companion |
2006 |
DBLP DOI BibTeX RDF |
test generation, XACML, access control policy |
25 | Sushant Sinha, C. Siva Ram Murthy |
Information theoretic approach to traffic adaptive WDM networks. |
IEEE/ACM Trans. Netw. |
2005 |
DBLP DOI BibTeX RDF |
LZ78 algorithm, network learning, prediction of traffic sequences, reconfiguration policy, virtual topology design, virtual topology reconfiguration, WDM networks |
25 | Victoria Ungureanu, Benjamin Melamed, Phillip G. Bradford, Michael N. Katehakis |
Class-Dependent Assignment in cluster-based servers. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
assignment policy, cluster-based server, simulation, power-law distribution |
25 | Sushil Jajodia, Pierangela Samarati, Maria Luisa Sapino, V. S. Subrahmanian |
Flexible support for multiple access control policies. |
ACM Trans. Database Syst. |
2001 |
DBLP DOI BibTeX RDF |
logic programming, authorization, access control policy |
25 | Laurence Cholvy, Frédéric Cuppens |
Analyzing Consistency of Security Policies. |
S&P |
1997 |
DBLP DOI BibTeX RDF |
security policy consistency analysis, deontic formulae, normative conflicts, role priorities, methodology, problem solving, roles, formal language, security of data, regulation, formal logic |
25 | Marco Ajmone Marsan, Gianfranco Balbo, Andrea Bobbio, Giovanni Chiola, Gianni Conte, Aldo Cumani |
The Effect of Execution Policies on the Semantics and Analysis of Stochastic Petri Nets. |
IEEE Trans. Software Eng. |
1989 |
DBLP DOI BibTeX RDF |
execution policies, atomic transitions, race policy, continuous time homogeneous Markov chain, performance evaluation, Petri nets, semantics, Markov processes, stochastic Petri nets |
24 | Gabriel A. Weaver, Scott A. Rea, Sean W. Smith |
Computational techniques for increasing PKI policy comprehension by human analysts. |
IDtrust |
2010 |
DBLP DOI BibTeX RDF |
certificate policy formalization, XML, PKI |
24 | Qun Ni, Elisa Bertino, Jorge Lobo 0001 |
D-algebra for composing access control policy decisions. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
many-valued logic, MV-algebras, decision, policy composition |
24 | Rakeshbabu Bobba, Himanshu Khurana, Musab AlTurki, Farhana Ashraf |
PBES: a policy based encryption system with application to data sharing in the power grid. |
AsiaCCS |
2009 |
DBLP DOI BibTeX RDF |
multi-party data sharing, phasor measurement units (PMUs), policy based encryption, power grid |
24 | Hejiao Huang, Hélène Kirchner |
Component-Based Security Policy Design with Colored Petri Nets. |
Semantics and Algebraic Specification |
2009 |
DBLP DOI BibTeX RDF |
security policy, colored Petri net, specification and verification, property-preservation |
24 | Jay Ligatti, Billy Rickey, Nalin Saigal |
LoPSiL: A Location-Based Policy-Specification Language. |
MobiSec |
2009 |
DBLP DOI BibTeX RDF |
Policy-specification languages, location-dependent policies, mobile devices, security and privacy |
24 | Haoqi Zhang, David C. Parkes, Yiling Chen 0001 |
Policy teaching through reward function learning. |
EC |
2009 |
DBLP DOI BibTeX RDF |
active indirect elicitation, environment design, policy teaching, preference elicitation, preference learning |
24 | Gianluca Misuraca |
Futuring e-government: governance and policy implications for designing an ICT-enabled knowledge society. |
ICEGOV |
2009 |
DBLP DOI BibTeX RDF |
foresight, e-government, policy, knowledge, governance, ICTs |
24 | Renato Iannella |
Towards the policy-aware web: the real web 3.0? |
WWW |
2008 |
DBLP DOI BibTeX RDF |
policy-aware web, privacy, identity, rights |
24 | Paolo Greci, Fabio Martinelli, Ilaria Matteucci |
A Framework for Contract-Policy Matching Based on Symbolic Simulations for Securing Mobile Device Application. |
ISoLA |
2008 |
DBLP DOI BibTeX RDF |
Contract-policy matching, symbolic transition systems, mobile application, simulation relation |
24 | Jie Ma, Stephen Cameron |
Combining Policy Search with Planning in Multi-agent Cooperation. |
RoboCup |
2008 |
DBLP DOI BibTeX RDF |
Policy Search, Machine Learning, Multi-agent Systems, Planning |
24 | Phu H. Phung, David Sands 0001 |
Security Policy Enforcement in the OSGi Framework Using Aspect-Oriented Programming. |
COMPSAC |
2008 |
DBLP DOI BibTeX RDF |
Security policy enforcement, vehicle software, middleware, Aspect-oriented programming, OSGi, reference monitors |
24 | Steffen Heinzl, Markus Mathes, Bernd Freisleben |
A Web Service Communication Policy for Describing Non-standard Application Requirements. |
SAINT |
2008 |
DBLP DOI BibTeX RDF |
communication policy, Web Services, real-time, specification, streaming, legacy |
24 | Nobutaka Matsumoto, Takahiro Miyamoto, Michiaki Hayashi, Hideaki Tanaka |
BPEL Driven Policy Management of Virtualized Network Resources for IMS Environments. |
APNOMS |
2008 |
DBLP DOI BibTeX RDF |
QoS, SOA, BPEL, IMS, Policy management, network resource management |
24 | Michihiko Koeda, Takeo Shibata, Kunihiko Asai, Yoshiro Okubo, Hiroshi Tanaka |
Care Policy for Patients with Dementia: Family's Decision and Its Impact. |
BMEI (2) |
2008 |
DBLP DOI BibTeX RDF |
Care Policy, AHP and Caregiver, Family, Dementia |
24 | Roohollah Honarvar |
Lessons from a dropped ICT curriculum design project: A retrospective view. |
HCC |
2008 |
DBLP DOI BibTeX RDF |
IT/S professionals’ training, national ICT development policy, higher education, Developing countries, curriculum design |
24 | Dimitris Boucas |
National variations of the information society: Evidence from the Greek case. |
HCC |
2008 |
DBLP DOI BibTeX RDF |
implementation politics, state, Information society, IT policy |
24 | Dongbing Gu, Erfu Yang |
Fuzzy Policy Reinforcement Learning in Cooperative Multi-robot Systems. |
J. Intell. Robotic Syst. |
2007 |
DBLP DOI BibTeX RDF |
flocking behavior, policy gradient reinforcement learning, cooperative control, multi-agent reinforcement learning |
24 | Dong-Xi Liu |
CSchema: A Downgrading Policy Language for XML Access Control. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
XML, access control, programming language, type system, security policy |
24 | Bat-Odon Purevjii, Masayoshi Aritsugi, Sayaka Imai, Yoshinari Kanamori |
An Implementation Design of a Fine-Grained Database Access Control Policy Consistency Checking Mechanism. |
KES (2) |
2007 |
DBLP DOI BibTeX RDF |
fine-grained database access control, policy consistency |
24 | Richard Shay, Abhilasha Bhargav-Spantzel, Elisa Bertino |
Password policy simulation and analysis. |
Digital Identity Management |
2007 |
DBLP DOI BibTeX RDF |
simulation, modeling, management, policy, password |
24 | Jennifer Stoll |
IdeaMurals: supporting ideation in public policy knowledge work. |
Creativity & Cognition |
2007 |
DBLP DOI BibTeX RDF |
ideation support, text-based knowledge work, visualization, information management, public policy |
Displaying result #501 - #600 of 31126 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|