The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for role with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1955-1961 (15) 1964-1967 (15) 1968-1970 (17) 1971-1973 (27) 1974 (20) 1975-1976 (35) 1977 (26) 1978 (23) 1979 (26) 1980 (31) 1981 (24) 1982 (47) 1983 (34) 1984 (42) 1985 (73) 1986 (59) 1987 (85) 1988 (126) 1989 (108) 1990 (148) 1991 (126) 1992 (164) 1993 (220) 1994 (260) 1995 (330) 1996 (283) 1997 (367) 1998 (430) 1999 (568) 2000 (735) 2001 (1327) 2002 (1081) 2003 (1383) 2004 (1814) 2005 (2258) 2006 (2654) 2007 (2756) 2008 (2909) 2009 (2269) 2010 (1258) 2011 (1098) 2012 (1054) 2013 (1108) 2014 (1281) 2015 (1256) 2016 (1284) 2017 (1373) 2018 (1473) 2019 (1537) 2020 (1761) 2021 (2029) 2022 (2006) 2023 (2180) 2024 (569)
Publication types (Num. hits)
article(16479) book(22) data(3) incollection(447) inproceedings(26818) phdthesis(377) proceedings(36)
Venues (Conferences, Journals, ...)
CoRR(1479) HICSS(731) IROS(468) Comput. Hum. Behav.(461) AMCIS(452) ICIS(340) CogSci(326) PACIS(254) NeuroImage(248) ECIS(235) CHI(198) CHI Extended Abstracts(186) PLoS Comput. Biol.(170) J. Knowl. Manag.(164) Inf. Manag.(145) SIGCSE(140) More (+10 of total 6127)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 20325 occurrences of 7772 keywords

Results
Found 44187 publication records. Showing 44182 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
13Cene Bavec, Mirko Vintar What Matters in the Development of the E-Government in the EU? Search on Bibsonomy EGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF eGovernment policies, Cross-national comparative studies, Societal aspects of eGovernment, The role of eGovenment in development, European Union
13Tae-Hum Lim, Sang-Uk Shin Intelligent Access Control Mechanism for Ubiquitous Applications. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ubiquitous application, neural network algorithm, access control, context aware, role based
13Mohamed Mahdi Malik, Jean Royauté A Predicate Database for Assisting the Design of a Lexicon-Grammar of Predicative Nouns. Search on Bibsonomy LTC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Predicate noun phrase, Lexicon-grammar, Argument role, Nominal and verbal constructions, Database, Nominalization
13Le Yang 0003, Yongsun Choi A Flexible Access Control Model for Dynamic Workflow Using Extended WAM and RBAC. Search on Bibsonomy CSCWD (Selected Papers) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Workflow Authorization Model, Role-based Access Control, Workflow System
13Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt Achieving DRBAC Authorization in Multi-trust Domains with MAS Architecture and PMI. Search on Bibsonomy PRIMA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Distributed Role Based Access Control, Privilege Management Infrastructure, Multi-Agent Systems, Authentication, Public Key Infrastructure
13Masayuki Okamoto, Hideo Umeki Toward Video Bookmarking Search: Search-Target Inference from TVWatching. Search on Bibsonomy ICSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Keyword Inference, Semantic Role Analysis, Japanese Closed Captions, Named Entity Recognition
13Guillermo Jiménez-Díaz, Mercedes Gómez-Albarrán, Pedro A. González-Calero Pass the Ball: Game-Based Learning of Software Design. Search on Bibsonomy ICEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF object-oriented design, Game-based learning, role-play
13Eric Gouardères, Yon Dourisboure, Guy Gouardères, Mansour Saber The ARS Model: Virtual Learning Communities with P2PAgents on the Grid. Search on Bibsonomy ICDCS Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Peer-to-Peer Agents, e-Portfolio, Grid, Role Models, Virtual Learning Communities
13Kursat Kursat Ozenc, James P. Brommer, Bong-keum Jeong, Nina Shih, Karen Au, John Zimmerman Reverse alarm clock: a research through design example of designing for the self. Search on Bibsonomy DPPI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF alarm clock, bedtime, designing for the self, material possession attachment, children, time, clock, consumer behavior, parents, social role, wakeup
13Rafae Bhatti, Elisa Bertino, Arif Ghafoor X-FEDERATE: A Policy Engineering Framework for Federated Access Management. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF software engineering, role-based access control, security management, Federated systems
13David A. Basin, Jürgen Doser, Torsten Lodderstedt Model driven security: From UML models to access control infrastructures. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Unified Modeling Language, Role-Based Access Control, Model Driven Architecture, metamodeling, Object Constraint Language, security engineering
13Hongxia Cai, Tao Yu, Minglun Fang Access Control Model of Manufacturing Grid. Search on Bibsonomy PROLAMAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Role-based Access Control Model, security, Manufacturing Grid
13Bechara al Bouna, Richard Chbeir Multimedia-based authorization and access control policy specification. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF authorization and access control, security, user model, role based access control, multimedia content
13Prateek Sarkar Document image analysis for digital libraries. Search on Bibsonomy IWRIDL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF UpLib, document image classification, functional role labeling, image layer separation, perceptual document analysis, robust OCR, ubitext, document processing, personal digital library, DICE
13Rafae Bhatti, Khalid Moidu, Arif Ghafoor Policy-based security management for federated healthcare databases (or RHIOs). Search on Bibsonomy HIKM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF federated healthcare architecture, privacy and disclosure policy, role based access control
13Rafae Bhatti, Basit Shafiq, Elisa Bertino, Arif Ghafoor, James Joshi X-gtrbac admin: A decentralized administration model for enterprise-wide access control. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF policy administration, XML, role-based access control, secure interoperation
13Willem-Jan van den Heuvel, Kees Leune, Mike P. Papazoglou EFSOC: A Layered Framework for Developing Secure Interactions between Web-Services. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2005 DBLP  DOI  BibTeX  RDF security, role based access control, business process
13Rafae Bhatti, Elisa Bertino, Arif Ghafoor A Trust-Based Context-Aware Access Control Model for Web-Services. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web services, XML, Role-Based Access Control, Trust Management
13Suroop Mohan Chandran, James B. D. Joshi LoT-RBAC: A Location and Time-Based RBAC Model. Search on Bibsonomy WISE The full citation details ... 2005 DBLP  DOI  BibTeX  RDF location based access, role based access, temporal constraint
13Michelle L. Kaarst-Brown, Indira R. Guzman Who is "the IT workforce"?: challenges facing policy makers, educators, management, and research. Search on Bibsonomy CPR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF IT identify, role of IT professionals, IT professional
13David F. Ferraiolo, Serban I. Gavrila, Vincent C. Hu, D. Richard Kuhn Composing and combining policies under the policy machine. Search on Bibsonomy SACMAT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, role based access control, separation of duty, multi-level security
13Hanna Strömberg, Valtteri Pirttilä, Veikko Ikonen Interactive scenarios-building ubiquitous computing concepts in the spirit of participatory design. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Scenario building, Participatory design, Role-playing, Improvisation
13Mark Strembeck, Gustaf Neumann An integrated approach to engineer and enforce context constraints in RBAC environments. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Context-dependent access control, constraints engineering, context constraints, role-based access control
13Octavian Andrei Dragoi, James P. Black Discovering Services Is Not Enough. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2004 DBLP  DOI  BibTeX  RDF ubiquitous computing, role-based access control, service discovery
13Steve Neely, Helen Lowe, David M. Eyers, Jean Bacon, Julian Newman, Xiaofeng Gong An architecture for supporting vicarious learning in a distributed environment. Search on Bibsonomy SAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF role-based access control, policy, OASIS
13Rafae Bhatti, Elisa Bertino, Arif Ghafoor A Trust-based Context-Aware Access Control Model for Web-Services. Search on Bibsonomy ICWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Web-Services, XML, Role-Based Access Control, Trust Management
13Shu-Ching Chen, Mei-Ling Shyu, Na Zhao 0003 SMARXO: towards secured multimedia applications by adopting RBAC, XML and object-relational database. Search on Bibsonomy ACM Multimedia The full citation details ... 2004 DBLP  DOI  BibTeX  RDF XML, role-based access control (RBAC), object-relational databases, multimedia security
13Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce Administrative scope in the graph-based framework. Search on Bibsonomy SACMAT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF role-based access control, graph transformations, administration
13Ramaswamy Chandramouli Enterprise access policy enforcement for applications through hybrid models and XSLT technologies. Search on Bibsonomy ICEC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF domain type enforcement (DTE), policy rules, role-based access control (RBAC), XML schema, XSLT, provisioning
13Chek Yang Foo, Elina M. I. Koivisto Defining grief play in MMORPGs: player and developer perceptions. Search on Bibsonomy Advances in Computer Entertainment Technology The full citation details ... 2004 DBLP  DOI  BibTeX  RDF greed play, grief play, harassment, power imposition, scamming, avatars, game design, MMORPG, role-play
13Steve Barker, Peter J. Stuckey Flexible access control policy specification with constraint logic programming. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Role-based access control, constraint logic programming
13James Odell, H. Van Dyke Parunak, Mitchell Fleischer Modeling agent organizations using roles. Search on Bibsonomy Softw. Syst. Model. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Agent, Role, Active object
13Somchai Chatvichienchai, Mizuho Iwaihara, Yahiko Kambayashi Translating Content-Based Authorizations for XML Documents. Search on Bibsonomy WISE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Authorizations, Role-based Access Control, XML Documents, Schema Transformation, Document Transformation
13Barry G. Silverman, Michael Johns, Ransom Weaver, Joshua Mosley Authoring Edutainment Stories for Online Players (AESOP): Introducing Gameplay into Interactive Dramas. Search on Bibsonomy International Conference on Virtual Storytelling The full citation details ... 2003 DBLP  DOI  BibTeX  RDF videogame generator, stealth learning, agent ap- proach, training, interactive drama, role-playing games
13Sachin Abhyankar, Rishi Toshniwal, Carlos Cordeiro 0001, Dharma P. Agrawal On the application of traffic engineering over bluetooth ad hoc networks. Search on Bibsonomy MSWiM The full citation details ... 2003 DBLP  DOI  BibTeX  RDF piconet partitioning, role switching, performance evaluation, bluetooth, traffic engineering
13Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce A graph-based formalism for RBAC. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Access control in information systems, decentralized administration, permission management, role-based access control, correctness, graph transformations
13Ian Beeson, Stewart Green, Jin Sa, Alan Sully Linking Business Processes and Information Systems Provision in a Dynamic Environment. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2002 DBLP  DOI  BibTeX  RDF role activity diagrams, business process, process modelling, information system development, information systems architecture
13Tu Bao Ho, Trong Dung Nguyen, DucDung Nguyen Visualization support for a user-centered KDD process. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF the user's active role, model selection, data and knowledge visualization, knowledge discovery process
13Trent Jaeger, Jonathon Tidswell Practical safety in flexible access control models. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF authorization mechanisms, role-based access control, Access control models
13Mahdi Hannoun, Olivier Boissier, Jaime Simão Sichman, Claudette Sayettat MOISE: An Organizational Model for Multi-agent Systems. Search on Bibsonomy IBERAMIA-SBIA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Organizational link, Multi-Agent System, Group, Organization, Role
13Amir Herzberg, Yosi Mass, Joris Mihaeli, Dalit Naor, Yiftach Ravid Access Control Meets Public Key Infrastructure, Or: Assigning Roles to Strangers. Search on Bibsonomy S&P The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Authentication, logic programming, role based access control, key management, trust management, public key certificates, X.509
13Pierre Bieber, D. Raujol, Pierre Siron Security Architecture for Federated Cooperative Information Systems. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF federated cooperative information systems, role-based policy, software architecture, interoperability, CORBA, distributed databases, case study, open systems, security of data, security architecture, distributed object management, commercial off the shelf components
13Shelby Abraham, Keith Duddy, Michael Lawley, Zoran Milosevic, Kerry Raymond, Andrew Wood Mapping Enterprise Events to the CORBA Notification Service. Search on Bibsonomy EDOC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF enterprise event mapping, CORBA notification service, enterprise modelling choices, role based modelling concepts, expressive business event model, expressive enterprise models, business context, modelling concepts, UML Profile for Enterprise Distributed Object Computing, business event model, high level enterprise models, business processes, business data processing, automated tools
13Franz Witzeling Demo CD "Relationship", a Demonstration. Search on Bibsonomy ICMCS, Vol. 2 The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Interface man - multimedia, cyber-office, cyber doctor, role game, search for human synergy, problem-solving and co-operation between partners and in teams, relationship between virtual reality, real life, senso-mental-identity
13Kari Kivisto Roles of Developers as Part of a Software Process Model. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF object orientation, Process model, role, team, client/server architecture
13Charles N. Payne, D. J. Thomsen, J. Bogle, Richard C. O'Brien Napoleon: A Recipe for Workflow. Search on Bibsonomy ACSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF workflow, role-based access control, security policy, distributed system security
13J. Hoffman Implementing RBAC on a Type Enforced System. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforced system, security database implementations, RBAC mechanisms, LOCK6, RBAC features, firewall construction, lower level mechanism, type enforcement, Role Based Access Control, authorisation, application domain, application domains, secure operating system
13Karen A. Oostendorp, Lee Badger, C. D. Vance, W. G. Morrison, Michael J. Petkac, David L. Sherman, Daniel F. Sterne Domain and Type Enforcement Firewalls. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF type enforcement firewalls, Internet connected organizations, Internet firewall, system penetration, business practices, external entities, Domain and Type Enforcement, DTE firewall, application level proxies, restrictive domains, network based attacks, local resources, role based security policies, DTE security attributes, DTE clients, Internet, access control, security policies, HTTP, servers, network services, security breaches, FTP
13António Rito Silva, Teresa Gonçalves, Francisco Assis Rosa, Arne-Jørgen Berre, Jan Øyvind Aagedal Organization, Information System and Distribution Modeling: An Integrated Approach. Search on Bibsonomy EDOC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Information Systems, Distribution, Enterprise Modeling, Role Modeling
13G. Osguthorpe, B. Steele, A. Houldcroft A method for developing CSCW systems. Search on Bibsonomy WETICE The full citation details ... 1996 DBLP  DOI  BibTeX  RDF CSCW systems development, organizational views, business view, group view, role view, application view, system view, organizational structure model, British health authority, modeling, computer supported cooperative work, requirements engineering, groupware, process model, information model, operations research, SODA, groupware systems
13Christoph Bussler, Stefan Jablonski Policy resolution for workflow management systems. Search on Bibsonomy HICSS (4) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF policy resolution, work assignment, arbitrary role models, groupware, business data processing, workflow management systems, office automation, cooperative information systems, organization models
13Timo Käkölä Fostering organizational learning with embedded application systems: the XTEND2 prototype. Search on Bibsonomy HICSS (3) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF embedded application systems, XTEND2 prototype, computerized tasks, embedded systems approach, extended support systems, coordinating role, unexpected breakdowns, Embedded Application Systems, commercial implementations, real-time systems, learning (artificial intelligence), information systems, information systems, organizational learning, software systems
13Butler W. Lampson, Martín Abadi, Michael Burrows, Edward Wobber Authentication in Distributed Systems: Theory and Practice. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF loading programs, path name, principal, speaks for, group, role, delegation, key distribution, interprocess communication, certification authority, trusted computing base, secure channel
13Carlo Blundo, Stelvio Cimato A simple role mining algorithm. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Frances Paulisch, Peter Zimmerer A role-based qualification and certification program for software architects: an experience report from Siemens. Search on Bibsonomy ICSE (2) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF software engineering, software architecture, education, testing, training, curriculum, certification
13Ryohei Ueha, Hang T. T. Pham, Hiroaki Hirai, Fumio Miyazaki A simple control design for human-robot coordination based on the knowledge of dynamical role division. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Matthew Curland, Terry A. Halpin, Kurt Stirewalt A Role Calculus for ORM. Search on Bibsonomy OTM Workshops The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Federica Paci, Rodolfo Ferrini, Elisa Bertino Identity Attribute-Based Role Provisioning for Human WS-BPEL Processes. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Jun Zhu, Yong Tang 0001, Jianguo Li, Hai Liu 0006 A role hierarchical group awareness model and its time possibility analysis based fuzzy time. Search on Bibsonomy CSCWD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Baingio Pinna, Marco Elio Tabacchi A Fuzzy Approach to the Role of Symmetry in Shape Formation: The Illusion of the Scalene Triangle. Search on Bibsonomy WILF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF fuzzy operators, shape formation, perception, symmetry
13Dong-Hyun Lee, Jong-Hwan Kim 0001 Motivation and Context-Based Multi-Robot Architecture for Dynamic Task, Role and Behavior Selections. Search on Bibsonomy FIRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multi-robot coordination, probabilistic behavior selection, team strategy
13Anne Sullivan Gender-inclusive quest design in massively multiplayer online role-playing games. Search on Bibsonomy FDG The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Alessandro Colantonio, Roberto Di Pietro, Alberto Ocello Leveraging Lattices to Improve Role Mining. Search on Bibsonomy SEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Wang Xiaoqing, Gu Tianyang, Guo Yong, Zheng Yanxing, Zong Jianjian An Efficient Algorithm of Role Mapping across Security Domains in Data-Sharing Environments. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Zhijiao Xiao, Zhong Ming 0001, Jianfei Yin Role-Oriented Workflow Modeling Based on Object Petri Net. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Samrat Mondal, Shamik Sural A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Temporal RBAC, Model Checking, Verification, Timed Automata, CTL
13Hui Zhao, Zhiyi Fang, Peng Xu, Lianyu Zhao, Jin Liu, Tianyang Wang An Improved Role-Based Workflow Access Control Model. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF authorization restriction, Access control, workflow, transaction, task
13Pilu Crescenzi, Miriam Di Ianni, Federico Greco, Gianluca Rossi, Paola Vocca Making Role Assignment Feasible: A Polynomial-Time Algorithm for Computing Ecological Colorings. Search on Bibsonomy WG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ildar Farkhatdinov, Jee-Hwan Ryu A Study on the Role of Force Feedback for Teleoperation of Industrial Overhead Crane. Search on Bibsonomy EuroHaptics The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Industrial crane, force feedback, haptic interface, teleoperation
13Sebastian Rudolph, Markus Krötzsch, Pascal Hitzler Cheap Boolean Role Constructors for Description Logics. Search on Bibsonomy JELIA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Tomoya Enokido, Makoto Takizawa 0001 Role Based Access Control in Distributed Object Systems. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Qi Li 0002, Mingwei Xu, Xinwen Zhang Towards a Group-Based RBAC Model and Decentralized User-Role Administration. Search on Bibsonomy ICDCS Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Songfang Huang, Steve Renals Modeling Topic and Role Information in Meetings Using the Hierarchical Dirichlet Process. Search on Bibsonomy MLMI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ilaria Liccardi, Asma Ounnas, Reena Pau, Elizabeth Massey, Päivi Kinnunen, Sarah Lewthwaite, Marie-Anne Midy, Chandan Sarkar The role of social networks in students' learning experiences. Search on Bibsonomy ACM SIGCSE Bull. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF student experience, social network, computer science education, higher education, learning process
13Alessandro Vinciarelli Speakers Role Recognition in Multiparty Audio Recordings Using Social Network Analysis and Duration Distribution Modeling. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Mina Ryoke, Andrzej P. Wierzbicki Gaming and Role Playing as Tools for Creativity Training. Search on Bibsonomy Creative Environments The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt AmTRUE: Authentication Management and Trusted Role-based Authorization in Multi-Application and Multi-User Environment. Search on Bibsonomy SECURWARE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Hassan Takabi, Morteza Amini, Rasool Jalili Separation of Duty in Role-Based Access Control Model through Fuzzy Relations. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13NorolHamiza Zamzuri, WanAdilah WanAdnan The Role of Cognitive Styles in Groupware Acceptance. Search on Bibsonomy HCI (4) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Somchart Fugkeaw, Piyawit Manpanpanich, Sekpon Juntapremjitt Exploiting X.509 Certificate and Multi-agent System Architecture for Role-Based Access Control and Authentication Management. Search on Bibsonomy CIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Matti Mäntymäki The role of post-adoption phase trust in B2C e-service loyalty: towards a more comprehensive picture. Search on Bibsonomy I3E (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Katsumi Morikawa, Katsuhiko Takahashi Analysis of the Human Role in Planning and Scheduling via System Dynamics. Search on Bibsonomy APMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF scheduling, Planning, system dynamics, human
13Jing Qiu, Lejian Liao Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking. Search on Bibsonomy SNPD (3) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Daniel Qi Chen, David S. Preston Understanding CIO Role Effectiveness: The Antecedents and Consequents. Search on Bibsonomy HICSS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Myrna Flores, Claudio Roberto Boër, Charles Huber, Adrian Plüss, Roger Schoch, Michel Pouly The Role Of Universities Developing New Collaborative Environments; Analysing The Virtuelle Fabrik, Swiss Microtech And The Tenet Group. Search on Bibsonomy Virtual Enterprises and Collaborative Networks The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Feng Chen 0004, Shaoyun Li, Hongji Yang Enforcing Role-Based Access Controls in Software Systems with an Agent Based Service Oriented Approach. Search on Bibsonomy ICNSC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Maulin Patel, S. Venkatesan 0001, Doug Weiner Role Assignment for Data Aggregation in Wireless Sensor Networks. Search on Bibsonomy AINA Workshops (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Daniele Pighin, Alessandro Moschitti A Tree Kernel-Based Shallow Semantic Parser for Thematic Role Extraction. Search on Bibsonomy AI*IA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Bastin Tony Roy Savarimuthu, Stephen Cranefield, Maryam Purvis, Martin K. Purvis Role Model Based Mechanism for Norm Emergence in Artificial Agent Societies. Search on Bibsonomy COIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Milan Petkovic, Claudine Conrado, Malik Hammoutène Cryptographically Enforced Personalized Role-Based Access Control. Search on Bibsonomy SEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Prasanna H. Bammigatti, P. R. Rao GenericWA-RBAC: Role Based Access Control Model for Web Applications. Search on Bibsonomy ICIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Youhei Tanaka, Tomoya Enokido, Makoto Takizawa 0001 Role-Based Serializability for Distributed Object Systems. Search on Bibsonomy DEXA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Matthias Merz, Markus Aleksy Using JDOSecure to Introduce Role-Based Permissions to Java Data Objects-Based Applications. Search on Bibsonomy DEXA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Amit Sasturkar, Ping Yang 0002, Scott D. Stoller, C. R. Ramakrishnan 0001 Policy Analysis for Administrative Role Based Access Control. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely lambda-RBAC: Programming with Role-Based Access Control. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Akio Sashima, Noriaki Izumi, Koichi Kurumatani, Yoshiyuki Kotani Dynamic Role Assignment Protocol for Pervasive Computing. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Chetan Shiva Shankar, Roy H. Campbell Managing Pervasive Systems using Role-based Obligation Policies. Search on Bibsonomy PerCom Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Yanqin Zhu, Peide Qian, Yueqin Liu A Role-based PMI Authentication Model and its Application. Search on Bibsonomy SNPD The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Peter Lamb, Robert Power, Gavin Walker, Michael Compton Role-based access control for data service integration. Search on Bibsonomy SWS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, data integration
13Tomoya Enokido, Makoto Takizawa 0001 Concurrency Control in Multi-Role Association. Search on Bibsonomy ICDCS Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 44182 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license