|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 20325 occurrences of 7772 keywords
|
|
|
Results
Found 44187 publication records. Showing 44182 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Brian M. Slator, Harold Cliff Chaput, Robert Cosmano, Ben Dischinger, Christopher Imdieke, Bradley Vender |
A multi-user desktop virtual environment for teaching shop-keeping to children. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Virtual Real. ![In: Virtual Real. 9(1), pp. 49-56, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Role-based learning systems, Multi-user learning systems, Intelligent software tutoring agents, Agent-based economic simulation, Software agents |
15 | Ji-Won Byun, Elisa Bertino, Ninghui Li |
Purpose based access control of complex data for privacy protection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 10th ACM Symposium on Access Control Models and Technologies, SACMAT 2005, Stockholm, Sweden, June 1-3, 2005, Proceedings, pp. 102-110, 2005, ACM, 1-59593-045-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
private data, role attributes, privacy, access control, management, purpose |
15 | Sachoun Park, Gihwon Kwon |
Verification of UML-Based Security Policy Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part III, pp. 973-982, 2005, Springer, 3-540-25862-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Formal verification, Role-based access control, Visual specification, Security policy model |
15 | Václav Rajlich, Prashant Gosavi |
Incremental Change in Object-Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Softw. ![In: IEEE Softw. 21(4), pp. 62-69, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
incremental change, programming concepts, role splitting, software maintenance, refactoring, software evolution, agile development, impact analysis, incremental development, change propagation, concept location |
15 | Ninghui Li, Ziad Bizri, Mahesh V. Tripunitara |
On mutually-exclusive roles and separation of duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 42-51, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
verification, constraints, role-based access control, separation of duty |
15 | Emmanuel G. Blanchard, Claude Frasson |
An Autonomy-Oriented System Design for Enhancement of Learner?s Motivation in E-learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Intelligent Tutoring Systems ![In: Intelligent Tutoring Systems, 7th International Conference, ITS 2004, Maceiò, Alagoas, Brazil, August 30 - September 3, 2004, Proceedings, pp. 34-44, 2004, Springer, 3-540-22948-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Achievement Motivation, e-Learning, Emotions, Intelligent Tutoring Systems, Role-Playing, Pedagogical Agents, Open-Environment, Agents Collaboration, Constructivist Learning |
15 | Rafae Bhatti, James Joshi, Elisa Bertino, Arif Ghafoor |
X-GTRBAC admin: a decentralized administration model for enterprise wide access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 78-86, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
decentralized administration, XML, role based access control, temporal constraints |
15 | Qingping Lin, Weihua Wang, Liang Zhang 0024, Tian Fook Choo |
A novel method for supporting collaborative interaction management in Web-based CVE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
VRST ![In: Proceedings of the ACM Symposium on Virtual Reality Software and Technology, VRST 2003, Osaka, Japan, October 1-3, 2003, pp. 124-131, 2003, ACM, 1-58113-569-6. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
collaborative behavior description language, collaborative role, collaborative virtual environment, interaction management |
15 | Marc Wilikens, Simone Feriti, Alberto Sanna, Marcelo Masera |
A context-related authorization and access control method based on RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 7th ACM Symposium on Access Control Models and Technologies, SACMAT 2002, Naval Postgraduate School, Monterey, California, USA, June 3-4, 2002, pp. 117-124, 2002, ACM, 1-58113-496-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secure health care system, trust infrastructure, role based access control (RBAC) |
15 | Xiaofeng Gong, Julian Newman |
Selecting a Security Architecture for a New Model of Distributed Tutorial Support. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 11th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2002), 10-12 June 2002, Pittsburgh, PA, USA, pp. 89-94, 2002, IEEE Computer Society, 0-7695-1748-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Distributed collaborative computing, Role Based Access Control |
15 | Xunhua Wang, Yih Huang, Yvo Desmedt, David Rine |
Enabling Secure On-Line DNS Dynamic Update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 16th Annual Computer Security Applications Conference (ACSAC 2000), 11-15 December 2000, New Orleans, Louisiana, USA, pp. 52-, 2000, IEEE Computer Society, 0-7695-0859-6. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
secure online DNS dynamic update, Internet Engineering Task Force, DNS Security Extension, zone security key, role separation principle, signature computation time, Internet, authentication, cryptography, distributed databases, RSA, transport protocols, experimental results, message authentication, threshold cryptography, telecommunication security, MD5, Domain Name System, IP addresses, performance penalty, DNSSEC |
15 | Raymond K. Wong 0001 |
Heterogeneous Data Integration and Presentation in Multimedia Database Management Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 2 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume II, pp. 666-671, 1999, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
object-oriented databases, database views, multimedia authoring tools, object-role modeling |
15 | Francoise Balmas |
Toward a Framework for Conceptual and Formal Outlines of Programs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WCRE ![In: 4th Working Conference on Reverse Engineering, WCRE '97, Amsterdam, The Netherlands, October 6-8, 1997, pp. 226-235, 1997, IEEE Computer Society, 0-8186-8162-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
formal program outlines, conceptual program outlines, program re-documentation, computation localization, code role identification, PRISME system, automatic outline construction, Lisp looping functions, reverse specification, model, reverse engineering, debugging, program understanding, loops |
15 | Patrick C. K. Hung, Kamalakar Karlapalem |
A Paradigm for Security Enforcement in CapBasED-AMS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoopIS ![In: Proceedings of the Second IFCIS International Conference on Cooperative Information Systems, Kiawah Island, South Carolina, USA, June 24-27, 1997, Sponsored by IFCIS, The Intn'l Foundation on Cooperative Information Systems, pp. 79-88, 1997, IEEE Computer Society, 0-8186-7946-8. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access |
15 | Masahito Hirakawa, Minoru Tanaka, Tadao Ichikawa |
An Iconic Programming System, HI-VISUAL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Software Eng. ![In: IEEE Trans. Software Eng. 16(10), pp. 1178-1184, 1990. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
iconic programming system, HI-VISUAL, real objects, target application environment, role sharing, object-oriented programming, object-oriented, visual programming, system prototype |
15 | Danfeng Yao, Roberto Tamassia |
Compact and Anonymous Role-Based Authorization Chain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(3), pp. 15:1-15:27, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, Delegation, aggregate signature |
15 | Mei Yii Lim, Michael Kriegel, Ruth Aylett, Sibylle Enz, Natalie Vannini, Lynne E. Hall, Paola Rizzo, Karin Leichtenstern |
Technology-Enhanced Role-Play for Intercultural Learning Contexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Entertainment Computing - ICEC 2009, 8th International Conference, Paris, France, September 3-5, 2009. Proceedings, pp. 73-84, 2009, Springer, 978-3-642-04051-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Erdem Eser Ekinci, Oguz Dikenelli |
Evolutionary Role Model for Multi-Agent Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESAW ![In: Engineering Societies in the Agents World X, 10th International Workshop, ESAW 2009, Utrecht, The Netherlands, November 18-20, 2009. Proceedings, pp. 162-164, 2009, Springer, 978-3-642-10202-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
15 | Tomoya Enokido, Makoto Takizawa 0001 |
Preventing Illegal Information Flow Based on Role-Based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NBiS ![In: Network-Based Information Systems, 2nd International Conference, NBiS 2008, Turin, Italy, September 1-5, 2008. Proceedings, pp. 242-251, 2008, Springer, 978-3-540-85692-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Birte Glimm, Yevgeny Kazakov |
Role Conjunctions in Expressive Description Logics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LPAR ![In: Logic for Programming, Artificial Intelligence, and Reasoning, 15th International Conference, LPAR 2008, Doha, Qatar, November 22-27, 2008. Proceedings, pp. 391-405, 2008, Springer, 978-3-540-89438-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Haibin Zhu |
Role-based systems are autonomic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE ICCI ![In: Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, ICCI 2008, Stanford University, California, USA, August 14-16, 2008, pp. 144-152, 2008, IEEE Computer Society, 978-1-4244-2538-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Jason Crampton, Hoon Wei Lim |
Role Signatures for Access Control in Open Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Proceedings of The IFIP TC-11 23rd International Information Security Conference, IFIP 20th World Computer Congress, IFIP SEC 2008, September 7-10, 2008, Milano, Italy, pp. 205-220, 2008, Springer, 978-0-387-09698-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri |
Optimal Boolean Matrix Decomposition: Application to Role Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 24th International Conference on Data Engineering, ICDE 2008, April 7-12, 2008, Cancún, Mexico, pp. 297-306, 2008, IEEE Computer Society, 978-1-4244-1836-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Rattikorn Hewett, Phongphun Kijsanayothin, Aashay Thipse |
Security Analysis of Role-based Separation of Duty with Workflows. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Third International Conference on Availability, Reliability and Security, ARES 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain, pp. 765-770, 2008, IEEE Computer Society, 978-0-7695-3102-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Fahim Akhter |
E-Commerce Security: The Categorical Role of Computers in Forensic Online Crime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISI Workshops ![In: Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings, pp. 298-303, 2008, Springer, 978-3-540-69136-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
15 | Vineet Chaoji, Apirak Hoonlor, Boleslaw K. Szymanski |
Recursive data mining for role identification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSTST ![In: CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, Cergy-Pontoise, France, October 28-31, 2008, pp. 218-225, 2008, ACM, 978-1-60558-046-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
data mining, feature extraction, text classification |
15 | Gregorio Convertino, Dejin Zhao, Craig H. Ganoe, John M. Carroll 0001, Mary Beth Rosson |
A Role-Based Multiple View Approach to Distributed Geo-Collaboration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (4) ![In: Human-Computer Interaction. HCI Applications and Services, 12th International Conference, HCI International 2007, Beijing, China, July 22-27, 2007, Proceedings, Part IV, pp. 561-570, 2007, Springer, 978-3-540-73109-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Geo-Collaboration, Computer-Supported Cooperative Work (CSCW), Multiple Views, Common Ground, Collaborative Visualizations |
15 | Tomoya Enokido, Makoto Takizawa 0001 |
Design and Evaluation of a Legal Information Flow (LIF) Scheduler in a Role-based Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 10-14 September 2007, Xi-An, China, pp. 8, 2007, IEEE Computer Society, 978-0-7695-2934-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Gansen Zhao, David W. Chadwick, Sassa Otenko |
Obligations for Role Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA Workshops (1) ![In: 21st International Conference on Advanced Information Networking and Applications (AINA 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada, pp. 424-431, 2007, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
15 | Laila Oubenaissa-Giardina |
Understanding a Shift in Teacher Role as Opportunities to Promote Educational Designing Skills for Active Teacher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings of the 6th IEEE International Conference on Advanced Learning Technologies, ICALT 2006, Kerkrade, The Netherlands, July 5-7, 2006, pp. 1129-1130, 2006, IEEE Computer Society, 0-7695-2632-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Hong Zhang, Yeping He, Zhiguo Shi |
Spatial Context in Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2006, 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings, pp. 166-178, 2006, Springer, 3-540-49112-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Valeria Loscrì, Vincenzo Mantuano, Salvatore Marano |
A role dynamic management algorithm for prolonging lifetime in Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BROADNETS ![In: 3rd International Conference on Broadband Communications, Networks, and Systems (BROADNETS 2006), 1-5 October 2006, San José, California, USA, 2006, IEEE, 978-1-4244-0425-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Yuqing Sun 0001, Xiangxu Meng, Fang Yin |
A Novel Approach for Role Hierarchies in Flexible RBAC Workflow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 16-20 October 2006, Hong Kong, China, pp. 488-491, 2006, IEEE Computer Society, 0-7695-2558-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
15 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
A Flexible Payment Scheme and Its Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 17(3), pp. 425-436, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Patrick Ye, Timothy Baldwin |
Semantic Role Labelling of Prepositional Phrases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IJCNLP ![In: Natural Language Processing - IJCNLP 2005, Second International Joint Conference, Jeju Island, Korea, October 11-13, 2005, Proceedings, pp. 779-791, 2005, Springer, 3-540-29172-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Christian Frank, Kay Römer |
Algorithms for generic role assignment in wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SenSys ![In: Proceedings of the 3rd International Conference on Embedded Networked Sensor Systems, SenSys 2005, San Diego, California, USA, November 2-4, 2005, pp. 230-242, 2005, ACM, 1-59593-054-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
sensor networks, programming, configuration |
15 | Jaime A. Pavlich-Mariscal, Laurent Michel, Steven A. Demurjian |
A Formal Enforcement Framework for Role-Based Access Control Using Aspect-Oriented Programming. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoDELS ![In: Model Driven Engineering Languages and Systems, 8th International Conference, MoDELS 2005, Montego Bay, Jamaica, October 2-7, 2005, Proceedings, pp. 537-552, 2005, Springer, 3-540-29010-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Tomoya Enokido, Makoto Takizawa 0001 |
Concurrency Control on Distributed Objects using Role Ordering (RO) Scheduler. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WORDS ![In: 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems (WORDS 2005), 2-4 February 2005, Sedona, AZ, USA, pp. 66-73, 2005, IEEE Computer Society, 0-7695-2347-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Tomoya Enokido, Makoto Takizawa 0001 |
Concurrency Control Using Role Ordering (RO) Scheduler for Distributed Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 6-10 June 2005, Columbus, OH, USA, pp. 756-762, 2005, IEEE Computer Society, 0-7695-2328-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Aneta Poniszewska-Maranda |
Role engineering of information system using extended RBAC model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 13-15 June 2005, Linköping, Sweden, pp. 154-159, 2005, IEEE Computer Society, 0-7695-2362-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
15 | Roberto Tamassia, Danfeng Yao, William H. Winsborough |
Role-based cascaded delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 9th ACM Symposium on Access Control Models and Technologies, SACMAT 2004, Yorktown Heights, New York, USA, June 2-4, 2004, Proceedings, pp. 146-155, 2004, ACM, 1-58113-872-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
access control, RBAC, trust management, delegation |
15 | John Murdoch, Ken Astley |
Role-based planning for systems engineering and project management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC (6) ![In: Proceedings of the IEEE International Conference on Systems, Man & Cybernetics: The Hague, Netherlands, 10-13 October 2004, pp. 5447-5454, 2004, IEEE, 0-7803-8566-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Viktor Kuncak, Martin C. Rinard |
Generalized Records and Spatial Conjunction in Role Logic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAS ![In: Static Analysis, 11th International Symposium, SAS 2004, Verona, Italy, August 26-28, 2004, Proceedings, pp. 361-376, 2004, Springer, 3-540-22791-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Tatsuya Nozaki, Tomoya Enokido, Makoto Takizawa 0001 |
Role Ordering Scheduler for Concurrency Control in Distributed Objects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 10th International Conference on Parallel and Distributed Systems, ICPADS 2004, Newport Beach, CA, USA, July 7-9, 2004, pp. 485-, 2004, IEEE Computer Society, 0-7695-2152-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Paul Scerri, Alessandro Farinelli, Stephen Okamoto, Milind Tambe |
Token Approach for Role Allocation in Extreme Teams: Analysis and Experimental Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WETICE ![In: 13th IEEE International Workshops on Enabling Technologies (WETICE 2004), Infrastructure for Collaborative Enterprises, 14-16 June 2004, Modena, Italy, pp. 397-402, 2004, IEEE Computer Society, 0-7695-2183-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Ezedin Barka, Ravi S. Sandhu |
Role-Based Delegation Model/ Hierarchical Roles (RBDM1). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 20th Annual Computer Security Applications Conference (ACSAC 2004), 6-10 December 2004, Tucson, AZ, USA, pp. 396-404, 2004, IEEE Computer Society, 0-7695-2252-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
15 | Costin Badica, Amelia Badica, Valentin Litoiu |
Role Activity Diagrams as Finite State Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPDC ![In: 2nd International Symposium on Parallel and Distributed Computing (ISPDC 2003), 13-14 October 2003, Ljubljana, Slovenia, pp. 15-22, 2003, IEEE Computer Society, 0-7695-2069-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Xin Zhang 0005, Henry Hexmoor |
Balancing Individual Capabilities and Social Peer Pressure for Role Adoption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CEEMAS ![In: Multi-Agent Systems and Applications III, 3rd International Central and Eastern European Conference on Multi-Agent Systems, CEEMAS 2003, Prague, Czech Republic, June 16-18, 2003, Proceedings, pp. 100-110, 2003, Springer, 3-540-40450-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Song-hwa Chae, Wonil Kim, Dong-Kyoo Kim |
A Novel Approach to Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
International Conference on Computational Science ![In: Computational Science - ICCS 2003, International Conference, Melbourne, Australia and St. Petersburg, Russia, June 2-4, 2003. Proceedings, Part IV, pp. 1060-1068, 2003, Springer, 3-540-40197-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Baoyi Wang, Shaomin Zhang, Xiaodong Xia |
The Application Research of Role-Based Access Control Model in Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC (2) ![In: Grid and Cooperative Computing, Second International Workshop, GCC 2003, Shanghai, China, December 7-10, 2003, Revised Papers, Part II, pp. 1034-1037, 2003, Springer, 3-540-21993-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Marilyn Gore |
Thoughts on the Information System Architect Role. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC ![In: 2003 International Symposium on Information Technology (ITCC 2003), 28-30 April 2003, Las Vegas, NV, USA, pp. 706-710, 2003, IEEE Computer Society, 0-7695-1916-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Cynthia A. Thompson, Roger Levy, Christopher D. Manning |
A Generative Model for Semantic Role Labeling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML ![In: Machine Learning: ECML 2003, 14th European Conference on Machine Learning, Cavtat-Dubrovnik, Croatia, September 22-26, 2003, Proceedings, pp. 397-408, 2003, Springer, 3-540-20121-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Ruben Wolf, Markus Schneider 0002 |
Context-Dependent Access Control for Web-Based Collaboration Environments with Role-based Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003, Proceedings, pp. 267-278, 2003, Springer, 3-540-40797-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
15 | Evimaria Terzi, Yuhui Zhong, Bharat K. Bhargava, Pankaj, Sanjay Madria |
An Algorithm for Building User-Role Profiles in a Trust Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DaWaK ![In: Data Warehousing and Knowledge Discovery, 4th International Conference, DaWaK 2002, Aix-en-Provence, France, September 4-6, 2002, Proceedings, pp. 104-113, 2002, Springer, 3-540-44123-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
15 | Meral Binbasioglu, Elaine Winston |
Knowledge-Based IS Implementation Support: An Application to the IS Change Agent Role Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 35th Hawaii International Conference on System Sciences (HICSS-35 2002), CD-ROM / Abstracts Proceedings, 7-10 January 2002, Big Island, HI, USA, pp. 80, 2002, IEEE Computer Society, 0-7695-1435-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Change agent roles, IS implementation, Case study, Knowledge-based approach, Diagnostic reasoning |
15 | Hua Wang 0002, Jinli Cao, Yanchun Zhang |
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE (1) ![In: Proceedings of the 2nd International Conference on Web Information Systems Engineering, WISE'01, Organized by WISE Society and Kyoto University, Kyoto, Japan, 3-6 December 2001, Volume 1 (Main program), pp. 53-62, 2001, IEEE Computer Society, 0-7695-1393-X. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Anonymity, Hash function, Traceability, Electronic-cash |
15 | Brian M. Slator, Jeffrey T. Clark, Paul Juell, Philip E. McClean, Bernhardt Saini-Eidukat, Donald P. Schwert, Alan R. White |
Research on Role-Based Learning Technologies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALT ![In: Proceedings IEEE International Conference on Advanced Learning Technology: Issues, Achievements and Challenges, Madison, WI, USA, August 6-8, 2001, pp. 37-40, 2001, IEEE Computer Society, 0-7695-1013-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Jean Bacon, Michael Lloyd, Ken Moody |
Translating Role-Based Access Control Policy within Context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
POLICY ![In: Policies for Distributed Systems and Networks, International Workshop, POLICY 2001 Bristol, UK, January 29-31, 2001, Proceedings, pp. 107-119, 2001, Springer, 3-540-41610-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Andreas Schaad |
Detecting Conflicts in a Role-Based Delegation Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 117-126, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
15 | Friedrich Steimann |
A Radical Revision of UML's Role Concept. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UML ![In: «UML» 2000 - The Unified Modeling Language, Advancing the Standard, Third International Conference, York, UK, October 2-6, 2000, Proceedings, pp. 194-209, 2000, Springer. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Petter Gottschalk, Nolan J. Taylor |
Strategic Management of IS/IT Functions: The Role of the CIO. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HICSS ![In: 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 4-7 January, 2000, Maui, Hawaii, USA, 2000, IEEE Computer Society, 0-7695-0493-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
15 | Guy Genilloud, Alain Wegmann |
A Foundation for the Concept of Role in Object Modelling. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 4th International Enterprise Distributed Object Computing Conference (EDOC 2000), 25-28 September 2000, Makuhari, Japan, Proceedings, pp. 76-85, 2000, IEEE Computer Society, 0-7695-0865-0. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
standardization experts, instance concept, UML standard, ISO experts, ODP enterprise modelling, distributed processing, object modelling |
14 | Ludwig Fuchs, Christian Broser, Günther Pernul |
Different Approaches to In-House Identity Management - Justification of an Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ARES ![In: Proceedings of the The Forth International Conference on Availability, Reliability and Security, ARES 2009, March 16-19, 2009, Fukuoka, Japan, pp. 122-129, 2009, IEEE Computer Society, 978-1-4244-3572-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
14 | Cui-ru Wang, Shuang-xi Liu |
Study on Fuzzy Theory Based Web Access Control Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 178-182, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Access Control, Web, RBAC, Fuzzy Theory |
14 | Chengwan He, Zhijie Nie, Bifeng Li, Lianlian Cao, Keqing He |
Rava: Designing a Java Extension with Dynamic Object Roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECBS ![In: 13th Annual IEEE International Conference and Workshop on Engineering of Computer Based Systems (ECBS 2006), 27-30 March 2006, Potsdam, Germany, pp. 453-459, 2006, IEEE Computer Society, 0-7695-2546-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Kevin A. Kwiat, Shangping Ren |
A Coordination Model for Improving Software System Attack-tolerance and Survivability in Open Hostile Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (1) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 394-402, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Soomi Yang |
On the Security of Attribute Certificate Structuring for Highly Distributed Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Management of Convergence Networks and Services, 9th Asia-Pacific Network Operations and Management Symposium, APNOMS 2006 Busan, Korea, September 27-29, 2006, Proceedings, pp. 530-533, 2006, Springer, 3-540-45776-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
14 | Georgine Beranek, Wolfgang Zuser, Thomas Grechenig |
Functional group roles in software engineering teams. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-7, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
empirical survey, functional group roles, software engineering teams |
14 | Soomi Yang |
An Efficient Access Control Model for Highly Distributed Computing Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWDC ![In: Distributed Computing - IWDC 2005, 7th International Workshop, Kharagpur, India, December 27-30, 2005, Proceedings, pp. 392-397, 2005, Springer, 3-540-30959-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Soomi Yang |
An Efficient Access Control Model Utilized the Attribute Certificate Structuring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 466-471, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
14 | Shanshan Jiang, Cyril Carrez, Finn Arve Aagesen |
Automatic Translation of Service Specification to a Behavioral Type Language for Dynamic Service Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RISE ![In: Rapid Integration of Software Engineering Techniques, First International Workshop, RISE 2004, Luxembourg-Kirchberg, Luxembourg, November 26, 2004, Revised Selected Papers, pp. 34-44, 2004, Springer, 3-540-25812-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
14 | Matthew R. Link |
Transforming support: from helpdesk to information center. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGUCCS ![In: Proceedings of the 30th annual ACM SIGUCCS conference on User services: Charting Bold Courses - New Worlds in User Services, Providence, Rhode Island, USA, November 20-23, 2002, pp. 272-274, 2002, ACM, 1-58113-564-5. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
root cause management, customer service, communications management, problem management |
14 | M. Simpson |
Users invoked: How documents help readers assume user roles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGDOC ![In: Proceedings of the 7th Annual International Conference on Systems Documentation, SIGDOC 1989, Pittsburgh, Pennsylvania, USA, November 8-10, 1989, pp. 85-92, 1989, ACM, 0-89791-337-X. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
13 | Robert A. Chesebrough, Ivan Turner |
Parallel computing: at the interface of high school and industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGCSE ![In: Proceedings of the 41st ACM technical symposium on Computer science education, SIGCSE 2010, Milwaukee, Wisconsin, USA, March 10-13, 2010, pp. 280-284, 2010, ACM, 978-1-4503-0006-3. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
intel parallel studio, threading building blocks, parallelism, concurrency, synchronization, openmp, deadlocks, reductions, domain decomposition, role playing, race conditions, critical sections, high school, task decomposition |
13 | Brian Thompson, Danfeng Yao |
The union-split algorithm and cluster-based anonymization of social networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2009 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2009, Sydney, Australia, March 10-12, 2009, pp. 218-227, 2009, ACM, 978-1-60558-394-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
graph anonymization, social networks, clustering algorithms, social role |
13 | Francesca Pozzi |
Evaluating the Social Dimension in Online Learning Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HCI (12) ![In: Online Communities and Social Computing, Third International Conference, OCSC 2009, Held as Part of HCI International 2009, San Diego, CA, USA, July 19-24, 2009. Proceedings, pp. 498-506, 2009, Springer, 978-3-642-02773-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
collaborative techniques, Jigsaw, CSCL, Role Play, Discussion, social dimension |
13 | Francesca Pozzi |
Using Collaborative Techniques in Virtual Learning Communities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-TEL ![In: Learning in the Synergy of Multiple Disciplines, 4th European Conference on Technology Enhanced Learning, EC-TEL 2009, Nice, France, September 29 - October 2, 2009, Proceedings, pp. 670-675, 2009, Springer, 978-3-642-04635-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
collaborative technique, jigsaw, evaluation, CSCL, role play, discussion |
13 | Yuan Tian 0003, Biao Song, Eui-nam Huh |
A purpose-based privacy-aware system using privacy data graph. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MoMM ![In: MoMM'2009 - The 7th International Conference on Advances in Mobile Computing and Multimedia, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 412-416, 2009, ACM, 978-1-60558-659-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
privacy data graph, privacy, role based access control |
13 | Annika Wærn, Markus Montola, Jaakko Stenros |
The three-sixty illusion: designing for immersion in pervasive games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, CHI 2009, Boston, MA, USA, April 4-9, 2009, pp. 1549-1558, 2009, ACM, 978-1-60558-246-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
pervasive game, immersion, mobile game, role-play |
13 | Nuno Lau, Luís Seabra Lopes, Nelson Filipe, Gustavo A. Corrente |
Roles, Positionings and Set Plays to Coordinate a RoboCup MSL Team. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EPIA ![In: Progress in Artificial Intelligence, 14th Portuguese Conference on Artificial Intelligence, EPIA 2009, Aveiro, Portugal, October 12-15, 2009. Proceedings, pp. 323-337, 2009, Springer, 978-3-642-04685-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Multi-robot team coordination, strategic positioning, dynamic role assignment, coordinated procedures |
13 | Teo Poh Kuang, Hamidah Ibrahim |
Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 750-754, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conflict reconciliation, cross-organization collaboration, security policy integration, role-based access control, logical reasoning |
13 | John-Paul Bichard, Annika Waern |
Pervasive play, immersion and story: designing interference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DIMEA ![In: Proceedings of the Third International Conference on Digital Interactive Media in Entertainment and Arts, DIMEA 2008, 10-12 September 2008, Athens, Greece, pp. 10-17, 2008, ACM, 978-1-60558-248-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
game aesthetics, game mastering, pervasive storytelling, augmented reality, GPS, game design, pervasive game, role play, ubiquitous technology |
13 | Vít Sisler, Cyril Brom, Radovan Slavik |
Towards a novel paradigm for educational games: the augmented learning environment of 'Europe 2045'. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MindTrek ![In: Proceedings of the 12th international conference on Entertainment and media in the ubiquitous era, Mindtrek 2008, Tampere, Finland, October 7-9, 2008, pp. 34-38, 2008, ACM, 978-1-60558-197-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
learning, serious games, educational games, game-based learning, role-playing games, multi-player games |
13 | Jean Bacon, David M. Eyers, Jatinder Singh, Peter R. Pietzuch |
Access control in publish/subscribe systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEBS ![In: Proceedings of the Second International Conference on Distributed Event-Based Systems, DEBS 2008, Rome, Italy, July 1-4, 2008, pp. 23-34, 2008, ACM, 978-1-60558-090-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
role based access control, encryption, publish/subscribe |
13 | Andrew Camilleri, Lynne Blair, Geoffrey Coulson |
Securing aspect composition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), Fortaleza, Ceara, Brazil, March 16-20, 2008, pp. 278-279, 2008, ACM, 978-1-59593-753-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
role based access control models, security, software engineering, aspect oriented programming |
13 | Ye Xin, Niu Guangxin, Dai Zailin |
Research on Flexible Control on Dynamic Business Process in E-Government. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISIP ![In: International Symposium on Information Processing, ISIP 2008 / International Pacific Workshop on Web Mining, and Web-Based Application, WMWA 2008, Moscow, Russia, 23-25 May 2008, pp. 336-339, 2008, IEEE Computer Society, 978-0-7695-3151-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Role network model, Flexible control, E-government, Business process management |
13 | Stan Kurkovsky |
Four roles of instructor in software engineering projects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITiCSE ![In: Proceedings of the 13th Annual SIGCSE Conference on Innovation and Technology in Computer Science Education, ITiCSE 2008, Madrid, Spain, June 30 - July 2, 2008, pp. 354, 2008, ACM, 978-1-60558-078-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
role of instructor, software engineering project |
13 | Qun Ni, Elisa Bertino, Jorge Lobo 0001 |
An obligation model bridging access control policies and privacy policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SACMAT ![In: 13th ACM Symposium on Access Control Models and Technologies, SACMAT 2008, Estes Park, CO, USA, June 11-13, 2008, Proceedings, pp. 133-142, 2008, ACM, 978-1-60558-129-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
privacy, role based access control, policy, obligation |
13 | Jian Fan, Minrui Fei, Likang Shao, Feng Huang |
A Novel Multi-robot Coordination Method Based on Reinforcement Learning. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing Theories and Applications. With Aspects of Theoretical and Methodological Issues, 4th International Conference on Intelligent Computing, ICIC 2008, Shanghai, China, September 15-18, 2008, Proceedings, pp. 1198-1205, 2008, Springer, 978-3-540-87440-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
behavior weight, role transformation, reinforcement learning, multi-robot |
13 | Stella Boess |
Do that again? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI Extended Abstracts ![In: Extended Abstracts Proceedings of the 2008 Conference on Human Factors in Computing Systems, CHI 2008, Florence, Italy, April 5-10, 2008, pp. 2575-2578, 2008, ACM, 978-1-60558-012-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
interaction design, interpretation, role playing, ideation |
13 | Xiaogang Wang, Zhuoning Chen, Junxiang Tu |
Research of Integrated Access Control Based on Task-Driven RBAC for Lifecycle Software Quality Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIRA (2) ![In: Intelligent Robotics and Applications, First International Conference, ICIRA 2008, Wuhan, China, October 15-17, 2008 Proceedings, Part II, pp. 794-802, 2008, Springer, 978-3-540-88516-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Task-driven role-based access control (T-RBAC), Software lifecycle management, Software Quality Management and Support Platform (SQMSP) |
13 | Anders Tychsen, Jonas Heide Smith |
Game format effects on communication in multi-player games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Future Play ![In: Proceedings of the 2008 Conference on Future Play: Research, Play, Share, Future Play 2008, Toronto, Ontario, Canada, November 3-5, 2008, pp. 113-120, 2008, ACM, 978-1-60558-218-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
player behavior, communication, interaction, personality, human factors, online communication, experimentation, characters, role playing games |
13 | Juan Li 0001, Lishan Hou, Zhongsen Qin, Qing Wang 0001, Guisheng Chen |
An Empirically-Based Process to Improve the Practice of Requirement Review. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSP ![In: Making Globally Distributed Software Development a Success Story, International Conference on Software Process, ICSP 2008, Leipzig, Germany, May 10-11, 2008, Proceedings, pp. 135-146, 2008, Springer, 978-3-540-79587-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
requirement review, requirement quality characteristic, quantitative, role-based |
13 | Thang Tran, Kai Daniel, Christian Wietfeld |
Secure and Reliable Communication Infrastructure for a Distributed IT-Federation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Mobile Response ![In: Mobile Response, Second International Workshop on Mobile Information Technology for Emergency Response, MobileResponse 2008. Bonn, Germany, May 29-30, 2008, Revised Selected Papers, pp. 138-147, 2008, Springer, 978-3-642-00439-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
IT-Federation, Authentication, Authorization, Role Based Access Control (RBAC), Single Sign-On (SSO) |
13 | Manfred Lohr, Elisabeth Wallinger |
Collage - The Carnuntum Scenario. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WMUTE ![In: Proceedings of the Fifth IEEE International Conference on Wireless, Mobile and Ubiquitous Technologies in Education, WMUTE 2008, Beijing, China, March 23-26, 2008, pp. 161-163, 2008, IEEE Computer Society, 978-0-7695-3108-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
outdoor education, role game, mobile learning |
13 | Z. Cliffe Schreuders, Christian Payne |
Reusability of Functionality-Based Application Confinement Policy Abstractions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 10th International Conference, ICICS 2008, Birmingham, UK, October 20-22, 2008, Proceedings, pp. 206-221, 2008, Springer, 978-3-540-88624-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Functionality-Based Application Confinement (FBAC), Application-Oriented Access Control, Application Confinement, Reusable Policy, Role-Based Access Control (RBAC), Usable Security, Sandbox |
13 | Ninghui Li, Mahesh V. Tripunitara, Ziad Bizri |
On mutually exclusive roles and separation-of-duty. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(2), pp. 5, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computational complexity, verification, constraints, Role-based access control, separation-of-duty |
13 | Tanvir Ahmed 0002, Anand R. Tripathi |
Specification and verification of security requirements in a programming model for decentralized CSCW systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 10(2), pp. 7, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
finite state-based model checking, methodology for access-control policy design, role-based access control, Security policy specification |
13 | Bride Mallon |
Towards a taxonomy of perceived agency in narrative game-play. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Comput. Entertain. ![In: Comput. Entertain. 5(4), pp. 4:1-4:15, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
adventure, evaluation, interaction, interactivity, games, implementation, narrative, engagement, role-play, game-play, agency, authorship |
13 | Chaoyi Pang, David P. Hansen, Anthony J. Maeder |
Managing RBAC states with transitive relations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 139-148, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
graph theory, data integration, distributed database, role-based access control, redundant, directed acyclic graph (DAG) |
Displaying result #501 - #600 of 44182 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|