|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 11972 occurrences of 4272 keywords
|
|
|
Results
Found 31127 publication records. Showing 31126 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
23 | Issam Aib, Raouf Boutaba |
Business-Driven Optimization of Policy-Based Management solutions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2007. 10th IFIP/IEEE International Symposium on Integrated Network Management, Munich, Germany, 21-25 May 2007, pp. 254-263, 2007, IEEE. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | John Strassner, David Raymer, Srini Samudrala, José Neuman de Souza, Steven Davy, Keara Barrett |
The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LANOMS ![In: 2007 Latin American Network Operations and Management Symposium, LANOMS 2007, Petrópolis, Brazil, April 10-12, 2007. Proceedings, pp. 114-125, 2007, IEEE, 1-4244-1182-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Sarmad Sadik, Arshad Ali, Hafiz Farooq Ahmad, Hiroki Suguri |
Policy based Ontology Framework for Mobile Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACIS-ICIS ![In: 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia, pp. 483-488, 2007, IEEE Computer Society, 0-7695-2841-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Richard John Anthony |
Policy-Centric Integration and Dynamic Composition of Autonomic Computing Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICAC ![In: Fourth International Conference on Autonomic Computing (ICAC'07), Jacksonville, Florida, USA, June 11-15, 2007, pp. 2, 2007, IEEE Computer Society, 0-7695-2779-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Hiroyuki Sakakibara, Kyohei Kimura, Shin-ya Yamasaki |
Policy conflict model as shared communication base. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SMC ![In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montréal, Canada, 7-10 October 2007, pp. 1818-1823, 2007, IEEE, 978-1-4244-0990-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Arjmand Samuel, Shahab Baqai, Arif Ghafoor |
XML-Based Policy Engineering Framework for Heterogeneous Network Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APNOMS ![In: Managing Next Generation Networks and Services, 10th Asia-Pacific Network Operations and Management Symposium, APNOMS 2007, Sapporo, Japan, October 10-12, 2007, Proceedings, pp. 244-253, 2007, Springer, 978-3-540-75475-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Jun Feng, Glenn S. Wasson, Marty Humphrey |
Resource usage policy expression and enforcement in grid computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: 8th IEEE/ACM International Conference on Grid Computing (GRID 2007), September 19-21, 2007, Austin, Texas, USA, Proceedings, pp. 66-73, 2007, IEEE Computer Society, 1-4244-1560-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
23 | Almut Herzog, Nahid Shahmehri |
A Usability Study of Security Policy Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: Security and Privacy in Dynamic Environments, Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden, pp. 296-306, 2006, Springer, 0-387-33405-X. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Korosh Golnabi, Richard K. Min, Latifur Khan, Ehab Al-Shaer |
Analysis of Firewall Policy Rules Using Data Mining Techniques. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, pp. 305-315, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Yacine Ghamri-Doudane, Sidi-Mohammed Senouci, Nazim Agoulmine |
P-SEAN: A Framework for Policy-based Server Election in Ad hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, pp. 271-281, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Javier Rubio-Loyola, Joan Serrat 0001, Marinos Charalambides, Paris Flegkas, George Pavlou |
GOREMOCH: A Distributed Goal-oriented Policy Refinement Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NOMS ![In: Management of Integrated End-to-End Communications and Services, 10th IEEE/IFIP Network Operations and Management Symposium, NOMS 2006, Vancouver, Canada, April 3-7, 2006. Proceedings, 2006, IEEE, 1-4244-0143-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Song Ouyang |
Implementation of Policy Based Management in Workflow Management System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD (Selected Papers) ![In: Computer Supported Cooperative Work in Design III, 10th International Conference, CSCWD 2006, Nanjing, China, May 3-5, 2006, Revised Selected Papers, pp. 657-666, 2006, Springer, 978-3-540-72862-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Cheng Zang, Zhongdong Huang, Gang Chen 0001, Jinxiang Dong |
A Network Access Control Architecture Using State-Transfer-Based Dynamic Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSCWD ![In: Proceedings of the 10th International Conference on CSCW in Design, CSCWD 2006, May 3-5, 2006, Southeast University, Nanjing, China, pp. 1010-1014, 2006, IEEE, 1-4244-0165-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Guoming Lai 0001, Katia P. Sycara, Laurens G. Debo, Cuihong Li |
An analysis on price matching policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 451-462, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
post-sale, price matching, strategic consumer, win-win, pricing, retailing |
23 | Dong Huang, Yi Yang 0013, Jacques Calmet |
ModelingWeb Services Policy with Corporate Knowledge. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 24-26 October 2006, Shanghai, China, pp. 216-223, 2006, IEEE Computer Society, 0-7695-2645-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Richard J. Wallace |
Heuristic Policy Analysis and Efficiency Assessment in Constraint Satisfaction Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICTAI ![In: 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 13-15 November 2006, Arlington, VA, USA, pp. 305-314, 2006, IEEE Computer Society, 0-7695-2728-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Srinivasan Seetharaman, Mostafa H. Ammar |
Characterizing and Mitigating Inter-domain Policy Violations in Overlay Routes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNP ![In: Proceedings of the 14th IEEE International Conference on Network Protocols, ICNP 2006, November 12-15, 2006, Santa Barbara, California, USA, pp. 259-268, 2006, IEEE Computer Society, 1-4244-0593-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | Ki-Sang Ok, Daniel W. Hong, Byung-Soo Chang |
The Design of Service Management System based on Policy-based Network Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNS ![In: 2006 International Conference on Networking and Services (ICNS 2006), 16-21 July 2006, Silicon Valley, California, USA, pp. 59, 2006, IEEE Computer Society, 0-7695-2622-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
23 | S. Hinrichs |
Integrating changes to a hierarchical policy model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Integrated Network Management ![In: Integrated Network Management, IM 2005. 9th IFIP/IEEE International Symposium on Integrated Network Management, 15-19 May 2005, Nice, France, pp. 441-454, 2005, IEEE. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Chetan Shiva Shankar, Anand Ranganathan, Roy H. Campbell |
An ECA-P Policy-based Framework for Managing Ubiquitous Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiQuitous ![In: 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 17-21 July 2005, San Diego, CA, USA, pp. 33-44, 2005, IEEE Computer Society, 0-7695-2375-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Stephen E. Levy, Carl Gutwin |
Improving understanding of website privacy policies with fine-grained policy anchors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 14th international conference on World Wide Web, WWW 2005, Chiba, Japan, May 10-14, 2005, pp. 480-488, 2005, ACM, 1-59593-046-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
APPEL, conformance conflicts, e-commerce, privacy policies, P3P, user agents, privacy preferences |
23 | Taner Dursun |
A Generic Policy-Conflict Handling Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2005, 20th International Symposium, Istanbul, Turkey, October 26-28, 2005, Proceedings, pp. 193-204, 2005, Springer, 3-540-29414-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Hyung-Jin Lim, Dong-Young Lee, Tae-Kyung Kim, Tai-Myoung Chung |
An Analysis and Evaluation of Policy-Based Network Management Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCNMC ![In: Networking and Mobile Computing, Third International Conference, ICCNMC 2005, Zhangjiajie, China, August 2-4, 2005, Proceedings, pp. 590-599, 2005, Springer, 3-540-28102-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Keon-Myung Lee, Jee-Hyong Lee 0001, Myung-Geun Chun |
Incorporating Privacy Policy into an Anonymity-Based Privacy-Preserving ID-Based Service Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I, pp. 1028-1035, 2005, Springer, 3-540-28894-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Iftekhar Ahmad, Joarder Kamruzzaman, Srinivas Aswathanarayaniah |
Revenue Aware Preemption Policy in Multimedia Communication Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6-9, 2005, Amsterdam, The Netherlands, pp. 1374-1377, 2005, IEEE Computer Society, 0-7803-9331-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | James F. Peters, Daniel Lockery, Sheela Ramanna |
Monte Carlo Off-Policy Reinforcement Learning: A Rough Set Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HIS ![In: 5th International Conference on Hybrid Intelligent Systems (HIS 2005), 6.9 November 2005, Rio de Janeiro, Brazil, pp. 187-192, 2005, IEEE Computer Society, 0-7695-2457-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Frode Hansen, Vladimir A. Oleshchuk |
Conformance Checking of RBAC Policy and its Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings, pp. 144-155, 2005, Springer, 3-540-25584-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Dan Feng 0001, Lingfang Zeng |
Adaptive Policy Triggering for Load Balancing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICA3PP ![In: Distributed and Parallel Computing, 6th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP, Melbourne, Australia, October 2-3, 2005, Proceedings, pp. 240-245, 2005, Springer, 3-540-29235-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Iftekhar Ahmad, Joarder Kamruzzaman, Srinivas Aswathanarayaniah |
An Improved Preemption Policy for Higher User Satisfaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 749-754, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Nidal Nasser, Hossam S. Hassanein |
Optimal multi-class guard channel admission policy under hard handoff constraints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AICCSA ![In: 2005 ACS / IEEE International Conference on Computer Systems and Applications (AICCSA 2005), January 3-6, 2005, Cairo, Egypt, pp. 53, 2005, IEEE Computer Society, 0-7803-8735-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Jin Xiong, Rongfeng Tang, Sining Wu, Dan Meng, Ninghui Sun |
An Efficient Metadata Distribution Policy for Cluster File Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CLUSTER ![In: 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26 - 30, 2005, Boston, Massachusetts, USA, pp. 1-10, 2005, IEEE Computer Society, 0-7803-9485-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Félix J. García Clemente, Gregorio Martínez Pérez, Antonio Fernandez Gómez-Skarmeta |
An XML-Seamless Policy Based Management Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MMM-ACNS ![In: Computer Network Security, Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005, Proceedings, pp. 418-423, 2005, Springer, 3-540-29113-X. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
23 | Koenraad Debackere, Wolfgang Glänzel |
Using a bibliometric approach to support research policy making: The case of the Flemish BOF-key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Scientometrics ![In: Scientometrics 59(2), pp. 253-276, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Natenapa Sriharee, Twittie Senivongse, Kunal Verma, Amit P. Sheth |
On Using WS-Policy, Ontology, and Rule Reasoning to Discover Web Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INTELLCOMM ![In: Intelligence in Communication Systems, IFIP International Conference, INTELLCOMM 2004, Bangkok, Thailand, November 23-26, 2004, Proceedings, pp. 246-255, 2004, Springer, 3-540-23893-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Kyoung Jun Lee |
Business Models and Governance Strategy of Policy Knowledge Service for National Knowledge Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KMGov ![In: Knowledge Management in Electronic Government, 5th IFIP International Working Conference, KMGov 2004, Krems, Austria, May 17-19, 2004, Proceedings, pp. 27-36, 2004, Springer, 3-540-22002-X. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Xingyan Tian, Kejia Zhao, Huowang Chen, Hongyan Du |
Cache Behavior Analysis of a Compiler-Assisted Cache Replacement Policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asia-Pacific Computer Systems Architecture Conference ![In: Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, ACSAC 2004, Beijing, China, September 7-9, 2004, Proceedings, pp. 30-43, 2004, Springer, 3-540-23003-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Si-Ho Cha, Jong-Eon Lee, WoongChul Choi, Jae-Oh Lee, Kuk-Hyun Cho |
Policy-Based Differentiated QoS Provisioning for DiffServ Enabled IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICOIN ![In: Information Networking, Networking Technologies for Broadband and Mobile Networks, International Conference ICOIN 2004, Busan, Korea, February 18-20, 2004, Revised Selected Papers, pp. 360-369, 2004, Springer, 3-540-23034-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
23 | Shane G. Henderson, Sean P. Meyn, Vladislav B. Tadic |
Performance Evaluation and Policy Selection in Multiclass Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Discret. Event Dyn. Syst. ![In: Discret. Event Dyn. Syst. 13(1-2), pp. 149-189, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Alenka Brezavscek, Alenka Hudoklin |
Joint optimization of block-replacement and periodic-review spare-provisioning policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Reliab. ![In: IEEE Trans. Reliab. 52(1), pp. 112-117, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Konstantinos Oikonomou, Ioannis Stavrakakis |
Throughput Analysis of a Probabilistic Topology-Unaware TDMA MAC Policy for Ad-hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QofIS ![In: Quality for All, 4th COST 263 International Workshop on Quality of Future, Internet Services, QoFIS 2003, Stockholm, Sweden, October 1-2, 2003, Proceedings, pp. 172-181, 2003, Springer, 3-540-20192-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Jari Arkko |
Limitations of IPsec Policy Mechanisms (Discussion). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Security Protocols Workshop ![In: Security Protocols, 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers, pp. 252-254, 2003, Springer, 3-540-28389-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Taner Dursun, Bülent Örencik |
POLICE: A Novel Policy Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2003, 18th International Symposium, Antalya, Turkey, November 3-5, 2003, Proceedings, pp. 819-827, 2003, Springer, 3-540-20409-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Ricardo Nabhen, Edgard Jamhour, Carlos Maziero |
A Policy-based Framework for RBAC. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Self-Managing Distributed Systems, 14th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2003, Heidelberg, Germany, October 20-22, 2003, Proceedings, pp. 181-193, 2003, Springer, 3-540-20314-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Konstantinos Oikonomou, Ioannis Stavrakakis |
A Probabilistic Topology Unaware TDMA Medium Access Control Policy for Ad Hoc Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PWC ![In: Personal Wireless Communications, IFIP-TC6 8th International Conference, PWC 2003, Venice, Italy, September 23-25, 2003, Proceedings, pp. 291-305, 2003, Springer, 3-540-20123-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Ying Luo, Yi Pan 0001, Jie Li 0002, Yang Xiao 0001, Xiaola Lin |
A New Overflow Replacement Policy for Efficient Location Management in Mobile Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCS Workshops ![In: 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 19-22 May 2003, Providence, RI, USA, pp. 830-, 2003, IEEE Computer Society, 0-7695-1921-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Christos Stergiou 0003, Geert Arys |
A Policy Based Framework for Software Agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEA/AIE ![In: Developments in Applied Artificial Intelligence, 16th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, IEA/AIE 2003, Laughborough, UK, June 23-26, 2003, Proceedings, pp. 426-436, 2003, Springer, 3-540-40455-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Patrick D. McDaniel, Atul Prakash 0001 |
A Flexible Architecture for Security Policy Enforcement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DISCEX (2) ![In: 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 22-24 April 2003, Washington, DC, USA, pp. 234-239, 2003, IEEE Computer Society, 0-7695-1897-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
23 | Hakima Chaouchi, Guy Pujolle |
A New Policy Based Management of Mobile IP Users. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2002, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, Second International IFIP-TC6 Networking Conference, Pisa, Italy, May 19-24, 2002, Proceedings, pp. 1099-1104, 2002, Springer, 3-540-43709-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Piergiorgio Cremonese, Marcello Esposito, Silvia Giordano, M. Mondini, Simon Pietro Romano, Giorgio Ventre |
A Framework for Policy-Based Management of QoS Aware IP Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2002, Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; and Mobile and Wireless Communications, Second International IFIP-TC6 Networking Conference, Pisa, Italy, May 19-24, 2002, Proceedings, pp. 1105-1110, 2002, Springer, 3-540-43709-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Ellen S. Hoffman, Edward A. Fox |
Building Policy, Building Community: An Example from the US National Science, Technology, Engineering, and Mathematics Education Library (NSDL). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICADL ![In: Digital Libraries: People, Knowledge, and Technology, 5th International Conference on Asian Digital Libraries, ICADL 2002 Singapore, December 11-14, 2002, Proceedings, pp. 299-300, 2002, Springer, 3-540-00261-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Adel Said Elmaghraby, Anup Kumar, Mehmed M. Kantardzic, Mostafa Gamal Mostafa |
Bandwidth allocation in a dynamic environment using a variable pricing policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCC ![In: Proceedings of the Seventh IEEE Symposium on Computers and Communications (ISCC 2002), 1-4 July 2002, Taormina, Italy, pp. 589-594, 2002, IEEE Computer Society, 0-7695-1671-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Jemal H. Abawajy |
Job Scheduling Policy for High Throughput Computing Environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS ![In: 9th International Conference on Parallel and Distributed Systems, ICPADS 2002, Taiwan, ROC, December 17-20, 2002, pp. 605-610, 2002, IEEE Computer Society, 0-7695-1760-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Opportunistic Job Scheduling, Performance Analysis, Cluster Computing, Job Scheduling, High Throughput Computing, Condor |
23 | Achim Streit |
A Self-Tuning Job Scheduler Family with Dynamic Policy Switching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
JSSPP ![In: Job Scheduling Strategies for Parallel Processing, 8th International Workshop, JSSPP 2002, Edinburgh, Scotland, UK, July 24, 2002, Revised Papers, pp. 1-23, 2002, Springer, 3-540-00172-7. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
23 | Yasusi Kanada |
Two Rule-Based Building-Block Architectures for Policy-Based Network Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWAN ![In: Active Networks, Second International Working Conference, IWAN 2000, Tokyo, Japan, October 16-18, 2000, Proceedings, pp. 195-210, 2000, Springer, 3-540-41179-8. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
|
23 | Ulrik Brandes, Patrick Kenis, Dorothea Wagner |
Centrality in Policy Network Drawings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GD ![In: Graph Drawing, 7th International Symposium, GD'99, Stirín Castle, Czech Republic, September 1999, Proceedings, pp. 250-258, 1999, Springer, 3-540-66904-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
23 | Timothy Fraser, Lee Badger |
Ensuring Continuity During Dynamic Security Policy Reconfiguration in DTE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: Security and Privacy - 1998 IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 3-6, 1998, Proceedings, pp. 15-26, 1998, IEEE Computer Society, 0-8186-8386-4. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
23 | Cathy McCann, Raj Vaswani, John Zahorjan |
A Dynamic Processor Allocation Policy for Multiprogrammed Shared-memory Multiprocessors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Comput. Syst. ![In: ACM Trans. Comput. Syst. 11(2), pp. 146-178, 1993. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
shared memory parallel processors, threads, two-level scheduling |
23 | Vijay Varadharajan |
Network Security Policy Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AUSCRYPT ![In: Advances in Cryptology - AUSCRYPT '90, International Conference on Cryptology, Sydney, Australia, January 8-11, 1990, Proceedings, pp. 74-95, 1990, Springer, 3-540-53000-2. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
23 | Ashok K. Thareja, Ashok K. Agrawala |
Characterization of an optimal delayed resolution policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGMETRICS ![In: Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 1983, August 29-31, 1983, Minneapolis, Minnesota, USA, pp. 257-265, 1983, ACM, 0-89791-112-1. The full citation details ...](Pics/full.jpeg) |
1983 |
DBLP DOI BibTeX RDF |
|
22 | Ramasamy Ramachandran |
A policy tool on developing a national strategic framework on bridging digital divide: a Malaysian public policy perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEGOV ![In: Proceedings of the 2nd International Conference on Theory and Practice of Electronic Governance, ICEGOV 2008, Cairo, Egypt, December 1-4, 2008, pp. 447-451, 2008, ACM, 978-1-60558-386-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
8-S framework of mukim development, augmentation methodology, census 2000, conversion of rates into index, national strategic framework on bridging digital divide, ninth Malaysia plan, sample survey 2004 |
22 | Kumar Padmanabh |
Cost Sensitive Pushout Policy and Expelling Policy with Dynamic Threshold for Shared memory switches with Versatile Traffic. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICN/ICONS/MCL ![In: Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 23-29 April 2006, Mauritius, pp. 56, 2006, IEEE Computer Society, 0-7695-2552-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
22 | Babu Sundaram, Barbara M. Chapman |
Policy Engine: A Framework for Authorization, Accouting Policy Specification and Evaluation in Grids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GRID ![In: Grid Computing - GRID 2001, Second International Workshop, Denver, CO, USA, November 12, 2001, Proceedings, pp. 145-153, 2001, Springer, 3-540-42949-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
22 | Richard Shay, Saranga Komanduri, Patrick Gage Kelley, Pedro Giovanni Leon, Michelle L. Mazurek, Lujo Bauer, Nicolas Christin, Lorrie Faith Cranor |
Encountering stronger password requirements: user attitudes and behaviors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SOUPS ![In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, Redmond, Washington, USA, July 14-16, 2010, 2010, ACM, 978-1-4503-0264-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
security, usability, policy, survey, passwords |
22 | Richard Shay, Elisa Bertino |
A comprehensive simulation tool for the analysis of password policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(4), pp. 275-289, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Simulation, Management, Policy, Password |
22 | Ninghui Li, Qihua Wang, Mahesh V. Tripunitara |
Resiliency Policies in Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. Secur. ![In: ACM Trans. Inf. Syst. Secur. 12(4), pp. 20:1-20:34, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
fault-tolerant, Access control, policy design |
22 | Shivaram Kalyanakrishnan, Peter Stone |
Learning complementary multiagent behaviors: a case study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AAMAS (2) ![In: 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), Budapest, Hungary, May 10-15, 2009, Volume 2, pp. 1359-1360, 2009, IFAAMAS, 978-0-9817381-7-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
multiagent reinforcement learning, policy search, robot soccer |
22 | Jiafu Tang, Kai-Leung Yung, Ikou Kaku, Jianbo Yang |
The scheduling of deliveries in a production-distribution system with multiple buyers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. Oper. Res. ![In: Ann. Oper. Res. 161(1), pp. 5-23, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Buyer-vendor coordination, Scheduling of deliveries, Heuristics procedure, Lot-for-lot-policy |
22 | Yacine Gasmi, Ahmad-Reza Sadeghi, Patrick Stewin, Martin Unger, Marcel Winandy, Rani Husseiki, Christian Stüble |
Flexible and secure enterprise rights management based on trusted virtual domains. ![Search on Bibsonomy](Pics/bibsonomy.png) |
STC ![In: Proceedings of the 3rd ACM Workshop on Scalable Trusted Computing, STC 2008, Alexandria, VA, USA, October 31, 2008, pp. 71-80, 2008, ACM, 978-1-60558-295-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
enterprise rights management (ERM), trusted virtual domain (TVD), security policy, trusted computing |
22 | Andranik Tangian |
Monitoring Flexicurity Labour Market Policies in the European Union. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDS ![In: Second International Conference on the Digital Society (ICDS 2008), February 10-15, 2008, Sainte Luce, Martinique, France, pp. 64-69, 2008, IEEE Computer Society, 978-0-7695-3087-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
labour market, flexibilisation, flexicurity, precarious work, policy monitoring, indicators, employability |
22 | Christos Fragos, Maria Karyda 0001, Evangelos A. Kiountouzis |
Using the Lens of Circuits of Power in Information Systems Security Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business, 4th International Conference, TrustBus 2007, Regensburg, Germany, September 3-7, 2007, Proceedings, pp. 228-236, 2007, Springer, 978-3-540-74408-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
information systems security management, Circuits of Power Framework, power, security policy |
22 | Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latifur Khan |
Vulnerability analysis For evaluating quality of protection of security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
QoP ![In: Proceedings of the 2nd ACM Workshop on Quality of Protection, QoP 2006, Alexandria, VA, USA, October 30, 2006, pp. 49-52, 2006, ACM, 1-59593-553-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security, evaluation, metric, policy |
22 | Ninghui Li, Qihua Wang |
Beyond separation of duty: an algebra for specifying high-level security policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 356-369, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
access control, category, separation of duty, policy design |
22 | Basit Shafiq, James Joshi, Elisa Bertino, Arif Ghafoor |
Secure Interoperation in a Multidomain Environment Employing RBAC Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 17(11), pp. 1557-1577, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
policy integration, multidomain, Role-Based Access Control (RBAC), Secure interoperation |
22 | Victoria Ungureanu |
Efficient support for enterprise delegation policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), Santa Fe, New Mexico, USA, March 13-17, 2005, pp. 340-345, 2005, ACM, 1-58113-964-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
decentralized authorization, delegation chain, delegation policy |
22 | S. Suresh 0001, Özdemir Göl |
Rule Based Congestion Management - Monitoring Self-similar IP Traffic in Diffserv Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (1) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part I, pp. 987-995, 2005, Springer, 3-540-28894-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
IP Networks Congestion Management, Self-similar input, Policy based rules, Quality of service, Mobile Agents |
22 | Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell |
KNOW Why your access was denied: regulating feedback for usable security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 52-61, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
policy protection, security, privacy, usability, access control, feedback |
22 | Diego R. López, Chelo Malagon, Licia Florio |
TACAR: a Simple and Fast Way for Building Trust among PKIs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, First European PKIWorkshop: Research and Applications, EuroPKI 2004, Samos Island, Greece, June 25-26, 2004, Proceedings, pp. 173-179, 2004, Springer, 3-540-22216-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trust link, trust anchor, policy, Certificate, repository |
22 | Hussein Al-Zoubi, Aleksandar Milenkovic, Milena Milenkovic |
Performance evaluation of cache replacement policies for the SPEC CPU2000 benchmark suite. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Southeast Regional Conference ![In: Proceedings of the 42nd Annual Southeast Regional Conference, 2004, Huntsville, Alabama, USA, April 2-3, 2004, pp. 267-272, 2004, ACM, 1-58113-870-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
performance evaluation, cache memory, replacement policy |
22 | Ana Maria Madrigal, Jim Q. Smith |
Causal Identification in Design Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2004: Advances in Artificial Intelligence, Third Mexican International Conference on Artificial Intelligence, Mexico City, Mexico, April 26-30, 2004, Proceedings, pp. 517-526, 2004, Springer, 3-540-21459-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Design interventions and strategies, Identification of Policy Effects, Confounders, Directed Acyclic Graphs (DAGs), Influence diagrams, Causal inference, Bayesian decision theory |
22 | Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett |
PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secure Data Management ![In: Secure Data Management, VLDB 2004 Workshop, SDM 2004, Toronto, Canada, August 30, 2004, Proceedings, pp. 118-132, 2004, Springer, 3-540-22983-3. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Semantic Web, Peer-to-Peer, Policy Languages, Automated Trust Negotiation |
22 | Tao Song, Calvin Ko, Jim Alves-Foss, Cui Zhang, Karl N. Levitt |
Formal Reasoning About Intrusion Detection Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pp. 278-295, 2004, Springer, 3-540-23123-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
verification, formal method, Intrusion detection, security policy |
22 | Joachim Biskup, Piero A. Bonatti |
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ESORICS ![In: Computer Security - ESORICS 2002, 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002, Proceedings, pp. 39-54, 2002, Springer, 3-540-44345-2. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Potential secret, Combined refusal and lying, Policy, Confidentiality, Inference control, Secrecy, Lying, Refusal, Controlled query evaluation |
22 | Eungab Kim, Mark P. Van Oyen |
Dynamic scheduling to minimize lost sales subject to set-up costs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Queueing Syst. Theory Appl. ![In: Queueing Syst. Theory Appl. 29(2-4), pp. 193-229, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
make-to-stock scheduling, CONWIP, set-up costs, heuristic policy, Markov decision process, closed queueing network |
22 | Yun Bai 0001, Vijay Varadharajan |
A High Level Language for Conventional Access Control Models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 273-283, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Policy Transformations, Formal Language, Access Control Model, Authorization Policies |
22 | Sushil Jajodia, Pierangela Samarati, V. S. Subrahmanian |
A Logical Language for Expressing Authorizations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
S&P ![In: 1997 IEEE Symposium on Security and Privacy, May 4-7, 1997, Oakland, CA, USA, pp. 31-42, 1997, IEEE Computer Society, 0-8186-7828-3. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
secuity policy, Access control, authorization |
21 | William R. Claycomb, Rodrigo Lopes, Dongwan Shin, Byunggi Kim |
A group-based security policy for wireless sensor networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 778-785, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
wireless sensor network, access control, security policy |
21 | Sid Stamm, Brandon Sterne, Gervase Markham |
Reining in the web with content security policy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the 19th International Conference on World Wide Web, WWW 2010, Raleigh, North Carolina, USA, April 26-30, 2010, pp. 921-930, 2010, ACM, 978-1-60558-799-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
content restrictions, security policy, http, web security |
21 | Heather Richter Lipford, Jason Watson, Michael Whitney, Katherine Froiland, Robert W. Reeder |
Visual vs. compact: a comparison of privacy policy interfaces. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CHI ![In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI 2010, Atlanta, Georgia, USA, April 10-15, 2010, pp. 1111-1114, 2010, ACM, 978-1-60558-929-9. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
privacy, social network site, access control policy |
21 | Marc Lacoste, Tahar Jarboui, Ruan He |
A component-based policy-neutral architecture for kernel-level access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ann. des Télécommunications ![In: Ann. des Télécommunications 64(1-2), pp. 121-146, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Policy-neutral authorization, Access control, Operating systems, Authorization, Flexibility, Security kernels, Component-based architectures |
21 | Samrat Mondal, Shamik Sural |
XML-based policy specification framework for spatiotemporal access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 98-103, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
estarbac, permission extent, role extent, spatiotemporal policy specification, xml |
21 | Jeffrey Johnson 0001 |
Policy, Design and Management: The in-vivo Laboratory for the Science of Complex System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Complex (1) ![In: Complex Sciences, First International Conference, Complex 2009, Shanghai, China, February 23-25, 2009. Revised Papers, Part 1, pp. 232-241, 2009, Springer, 978-3-642-02465-8. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Design, Prediction, Management, Policy, Complex Systems |
21 | Juan Frausto Solís, Elizabeth Santiago D., Jaime Mora-Vargas |
Cosine Policy Iteration for Solving Infinite-Horizon Markov Decision Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MICAI ![In: MICAI 2009: Advances in Artificial Intelligence, 8th Mexican International Conference on Artificial Intelligence, Guanajuato, Mexico, November 9-13, 2009. Proceedings, pp. 75-86, 2009, Springer, 978-3-642-05257-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
cosine simplex method, Markov decision processes, hybrid method, policy iteration |
21 | Chunming Liu, Jinze Song, Xin Xu 0001, Pengcheng Zhang |
Reordering Sparsification of Kernel Machines in Approximate Policy Iteration. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part II, pp. 398-407, 2009, Springer, 978-3-642-01509-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Approximate policy iteration, Reinforcement learning, Sparsification |
21 | Zhi Yang, Wei Zeng 0009, Hongtao Zhou, Lingru Cai, Guangyong Liu, Qi Fei |
Synthetic Modeling and Policy Simulation of Regional Economic System: A Case Study. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (3) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part III, pp. 1122-1129, 2009, Springer, 978-3-642-01512-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Regional economy, Policy simulation, System dynamics, Econometrics |
21 | Carly J. Lassig |
Promoting creativity in education -- from policy to practice: an australian perspective. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Creativity & Cognition ![In: Proceedings of the 7th Conference on Creativity & Cognition, Berkeley, California, USA, October 26-30, 2009, pp. 229-238, 2009, ACM, 978-1-60558-865-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
education, policy, creativity, student, australia, teacher, self-efficacy, school |
21 | Klaus Petrik |
Participation and e-democracy how to utilize web 2.0 for policy decision-making. ![Search on Bibsonomy](Pics/bibsonomy.png) |
D.GO ![In: Proceedings of the 10th Annual International Conference on Digital Government Research, Partnerships for Public Innovation, DG.O 2009, Puebla, Mexico, May 17-20, 2009, pp. 254-263, 2009, Digital Government Research Center, 978-1-60558-535-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
collective intelligence (CI), participatory decision-making (policy cycle), proxy voting, web 2.0, e-democracy, deliberative democracy, civic engagement |
21 | Teo Poh Kuang, Hamidah Ibrahim |
Security privacy access control for policy integration and conflict reconciliation in health care organizations collaborations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
iiWAS ![In: iiWAS'2009 - The Eleventh International Conference on Information Integration and Web-based Applications and Services, 14-16 December 2009, Kuala Lumpur, Malaysia, pp. 750-754, 2009, ACM, 978-1-60558-660-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
conflict reconciliation, cross-organization collaboration, security policy integration, role-based access control, logical reasoning |
21 | Tetsuro Morimura, Eiji Uchibe, Junichiro Yoshimoto, Kenji Doya |
A New Natural Policy Gradient by Stationary Distribution Metric. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECML/PKDD (2) ![In: Machine Learning and Knowledge Discovery in Databases, European Conference, ECML/PKDD 2008, Antwerp, Belgium, September 15-19, 2008, Proceedings, Part II, pp. 82-97, 2008, Springer, 978-3-540-87480-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
policy gradient reinforcement learning, Riemannian metric matrix, Markov decision process, natural gradient |
21 | Zhaoguang Hu, Minjie Xu, Baoguo Shan, Xiandong Tan |
Laboratory of Policy Study on Electricity Demand Forecasting by Intelligent Engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IDEAL ![In: Intelligent Data Engineering and Automated Learning - IDEAL 2008, 9th International Conference, Daejeon, South Korea, November 2-5, 2008, Proceedings, pp. 420-427, 2008, Springer, 978-3-540-88905-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Intelligent engineering, Laboratory of policy study, Electricity demand forecasting, Generalized model, Intelligent space |
21 | Robert W. Reeder, Patrick Gage Kelley, Aleecia M. McDonald, Lorrie Faith Cranor |
A user study of the expandable grid applied to P3P privacy policy visualization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WPES ![In: Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, WPES 2008, Alexandria, VA, USA, October 27, 2008, pp. 45-54, 2008, ACM, 978-1-60558-289-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
expandable grid, privacy, user interface, policy, p3p |
|
|