The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for policies with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1954-1971 (19) 1972-1974 (24) 1975-1976 (22) 1977 (16) 1978-1979 (25) 1980 (20) 1981-1982 (25) 1983 (18) 1984 (19) 1985-1986 (31) 1987 (28) 1988 (28) 1989 (43) 1990 (40) 1991 (48) 1992 (60) 1993 (82) 1994 (90) 1995 (103) 1996 (121) 1997 (140) 1998 (166) 1999 (240) 2000 (344) 2001 (395) 2002 (510) 2003 (690) 2004 (832) 2005 (984) 2006 (1189) 2007 (1313) 2008 (1262) 2009 (986) 2010 (559) 2011 (524) 2012 (460) 2013 (468) 2014 (462) 2015 (493) 2016 (454) 2017 (483) 2018 (560) 2019 (611) 2020 (661) 2021 (732) 2022 (813) 2023 (757) 2024 (166)
Publication types (Num. hits)
article(6540) book(11) data(3) incollection(96) inproceedings(11253) phdthesis(197) proceedings(16)
Venues (Conferences, Journals, ...)
CoRR(1328) POLICY(378) Eur. J. Oper. Res.(208) Oper. Res.(168) WSC(156) SACMAT(148) HICSS(126) CDC(110) ICRA(105) AAMAS(104) Comput. Ind. Eng.(98) Ann. Oper. Res.(84) SAC(84) IEEE Trans. Autom. Control.(83) IPDPS(83) Reliab. Eng. Syst. Saf.(77) More (+10 of total 3391)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10474 occurrences of 3799 keywords

Results
Found 18116 publication records. Showing 18116 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
15Mike P. Papazoglou The Challenges of Service Evolution. Search on Bibsonomy CAiSE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF service versioning, service contracts and policies, Web services, regulatory compliance, business protocols, service contracts
15José Niño-Mora A Marginal Productivity Index Rule for Scheduling Multiclass Queues with Setups. Search on Bibsonomy NET-COOP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF optimal service control of queues, multiclass queues, setup costs, marginal productivity index, queues with hysteresis, polling systems, Stochastic scheduling, setup times, index policies
15Akhil Kumar 0001, Rong Liu A Rule-Based Framework Using Role Patterns for Business Process Compliance. Search on Bibsonomy RuleML The full citation details ... 2008 DBLP  DOI  BibTeX  RDF generic role patterns, compliant business process, task categories, declarative approach, Sarbanes-oxley, constraints, rules, separation of duty, internal control, control policies
15Elisa Bertino, Elena Ferrari, Federica Paci, Loredana Parasiliti Provenza A system for securing push-based distribution of XML documents. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Push-based data dissemination, XML, Authentication, Security policies
15Enzo Baccarelli, Mauro Biagi, Nicola Cordeschi, Cristian Pelizzoni Minimization of Download Times for Large Files over Wireless Channels. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Minimum download time, energy-scheduling policies, Multi-Antenna downlink channels, convex Calculus of Variations, CDNs, elastic traffic
15Xenofontas A. Dimitropoulos, Dmitri V. Krioukov, Marina Fomenkov, Bradley Huffaker, Young Hyun, Kimberly C. Claffy, George F. Riley AS relationships: inference and validation. Search on Bibsonomy Comput. Commun. Rev. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF inference, as relationships, routing policies
15Marjan Bozinovski, Hans-Peter Schwefel, Ramjee Prasad Maximum availability server selection policy for efficient and reliable session control systems. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF server selection policies (SSP), session control, fault-tolerance, performance
15Patrick C. K. Hung, Dickson K. W. Chiu, W. W. Fung, William K. Cheung 0001, Raymond K. Wong 0001, Samuel P. M. Choi, Eleanna Kafeza, James T. Kwok, Joshua C. C. Pun, Vivying S. Y. Cheng End-to-end privacy control in service outsourcing of human intensive processes: A multi-layered Web service integration approach. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Web service integration, Need-to-know principle, APPEL, SLA, Privacy policies, P3P, Layered architecture
15Kim-Phuong L. Vu, Fredrick P. Garcia, Deborah Nelson, John Sulaitis, Beth Creekmur, Vanessa Chambers, Robert W. Proctor Examining User Privacy Practices While Shopping Online: What Are Users Looking for? Search on Bibsonomy HCI (9) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF usability, e-commerce, eye-tracking, privacy policies
15Enrico Ferro, J. Ramón Gil-García, Natalie Helbig The Digital Divide Metaphor: Understanding Paths to IT Literacy. Search on Bibsonomy EGOV The full citation details ... 2007 DBLP  DOI  BibTeX  RDF e-Skills, e-Policies, Digital Divide, e-Inclusion
15Joaquín García-Alfaro, Guillermo Navarro-Arribas Prevention of Cross-Site Scripting Attacks on Current Web Applications. Search on Bibsonomy OTM Conferences (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security Policies, Software Protection, Code Injection Attacks
15José Niño-Mora Computing an index policy for bandits with switching penalties. Search on Bibsonomy VALUETOOLS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF bandits, restless, switching delays, Markov decision processes, switching costs, index policies
15Anne Benoit, Veronika Rehn, Yves Robert Impact of QoS on Replica Placement in Tree Networks. Search on Bibsonomy International Conference on Computational Science (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF QoS constraints, access policies, placement heuristics, complexity, heterogeneous platforms, Replica placement
15Berthold Agreiter, Muhammad Alam, Ruth Breu, Michael Hafner, Alexander Pretschner, Jean-Pierre Seifert, Xinwen Zhang A technical architecture for enforcing usage control requirements in service-oriented architectures. Search on Bibsonomy SWS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SOA, access control, policies, trusted computing, usage control
15Vibhore Kumar, Brian F. Cooper, Greg Eisenhauer, Karsten Schwan iManage: Policy-Driven Self-management for Enterprise-Scale Systems. Search on Bibsonomy Middleware The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bayesian Networks, Policies, Self-Management, Enterprise-Systems
15Munish Goyal, Anurag Kumar 0001, Vinod Sharma A stochastic control approach for scheduling multimedia transmissions over a polled multiaccess fading channel. Search on Bibsonomy Wirel. Networks The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Scheduling over fading wireless channels, Indexability and index policies, QoS in 802.11 wireless LANs
15Stijn Vansummeren Type inference for unique pattern matching. Search on Bibsonomy ACM Trans. Program. Lang. Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF disambiguation policies, XML, programming languages, Pattern matching
15Donald Joyce Raising awareness about academic integrity. Search on Bibsonomy ITiCSE The full citation details ... 2006 DBLP  DOI  BibTeX  RDF academic integrity, policies, detection, response
15David W. Chadwick, Sassa Otenko, Tuan-Anh Nguyen Adding Support to XACML for Dynamic Delegation of Authority in Multiple Domains. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Delegation of Authority, Policies, XACML, Attributes, Credentials, PDP
15Mario Trottini, Luisa Franconi, Silvia Polettini Italian Household Expenditure Survey: A Proposal for Data Dissemination. Search on Bibsonomy Privacy in Statistical Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Sample Survey Data, Dissemination Policies, Risk-Utility Assessment, Disclosure Limitation
15Alessandro Fantechi, Stefania Gnesi, Laura Semini Achieving Fault Tolerance by a Formally Validated Interaction Policy. Search on Bibsonomy RODIN Book The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Integrity policies, fault tolerance, model checking, process algebras
15Qingbo Zhu, Yuanyuan Zhou 0001 Power-Aware Storage Cache Management. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2005 DBLP  DOI  BibTeX  RDF storage cache replacement, Power management, disk storage, write policies
15Carl E. Landwehr Green Computing. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF interfaces, security policies, green computing
15Tabatha Verbick, Merlin Miller PERTs: the support side solution to residential computing. Search on Bibsonomy SIGUCCS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF residence halls, training, policies, support, staffing
15Ivo José Garcia dos Santos, Edmundo Roberto Mauro Madeira, Volker Tschammer Towards Dynamic Composition of E-Government Services. Search on Bibsonomy I3E The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Autonomy and Privacy Policies, Web Services, Collaboration, e-Government, Dynamic Composition
15Patrick C. K. Hung, Dickson K. W. Chiu, W. W. Fung, William K. Cheung 0001, Raymond K. Wong 0001, Samuel P. M. Choi, Eleanna Kafeza, James T. Kwok, Joshua C. C. Pun, Vivying S. Y. Cheng Towards end-to-end privacy control in the outsourcing of marketing activities: a web service integration solution. Search on Bibsonomy ICEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Web service integration, need-to-know principle, OWL, SOAP, WSDL, privacy policies, UDDI, EPAL
15Robert C. Kremer, Roberto A. Flores Using a performative subsumption lattice to support commitment-based conversations. Search on Bibsonomy AAMAS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF CASA, performatives, protocols, policies, agent communications languages, ACL, FIPA, social commitments
15Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera Reasoning with advanced policy rules and its application to access control. Search on Bibsonomy Int. J. Digit. Libr. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Policy rule evaluation, Access control, Policies, Provisions, Obligations
15Vladimir Rykov, Dimitri Efrosinin Optimal Control of Queueing Systems with Heterogeneous Servers. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF controllable queueing systems, monotonicity of optimal policies, numerical analysis
15Pedro Marcuello, Antonio González 0001, Jordi Tubella Thread Partitioning and Value Prediction for Exploiting Speculative Thread-Level Parallelism. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Speculative thread-level parallelism, thread spawning policies, branch prediction, value prediction, clustered architectures
15Idir Fodil, Vincent Jardin, Guy Pujolle RSM-WISP: Roaming and Service Management in Hotspot Networks Through a Policy Based Management Architecture. Search on Bibsonomy MWCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF WISPs, PBM, WLAN, Management, Policies, Services, SLA, Roaming, Hotspot, IEEE802.11
15Patrick C. K. Hung, Elena Ferrari, Barbara Carminati Towards Standardized Web Services Privacy Technologies. Search on Bibsonomy ICWS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Web services, SOAP, WSDL, WS-Security, privacy policies, P3P, UDDI, EPAL
15James Broberg, Zahir Tari, Panlop Zeephongsekul Task Assignment Based on Prioritising Traffic Flows. Search on Bibsonomy OPODIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF heavy-tailed workloads, load balancing, supercomputing, task assignment, load sharing, scheduling policies
15Hamid Harroud, Mohamed Ahmed, Ahmed Karmouch Policy-Driven Personalized Multimedia Services for Mobile Users. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF service presentation, multimedia abstraction service, Software agent, agent negotiation, authorization policies
15Paulo Ferreira 0001, Luís Veiga, Carlos Ribeiro OBIWAN: Design and Implementation of a Middleware Platform. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Middleware, mobile agents, replication, security policies, distributed garbage collection
15Khaled Alghathbar, Duminda Wijesekera authUML: a three-phased framework to analyze access control specifications in use cases. Search on Bibsonomy FMSE The full citation details ... 2003 DBLP  DOI  BibTeX  RDF semi-formal methods, use cases, Security engineering, access control policies
15Andrei Sabelfeld, Andrew C. Myers A Model for Delimited Information Release. Search on Bibsonomy ISSS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Computer security, information flow, security policies, confidentiality, noninterference, declassification, security-type systems
15Steve Zdancewic, Lantian Zheng, Nathaniel Nystrom, Andrew C. Myers Secure program partitioning. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF mutual distrust, distributed systems, integrity, type systems, security policies, Confidentiality, secrecy, declassification, downgrading
15Tara M. Madhyastha, Daniel A. Reed Learning to Classify Parallel Input/Output Access Patterns. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF access pattern classification, neural networks, hidden Markov models, Parallel I/O, adaptive policies
15Carla Alessandra Lima Reis, Rodrigo Quites Reis, Heribert Schlebbe, Daltro José Nunes A policy-based resource instantiation mechanism to automate software process management. Search on Bibsonomy SEKE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF software process instantiation, resource allocation, policies, process-centered software engineering environments
15Santiago Ontañón, Enric Plaza Cooperative Case Bartering for Case-Based Reasoning Agents. Search on Bibsonomy CCIA The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cooperative CBR, Multiagent CBR, Collaboration Policies, Multiagent Learning, Bartering
15Alan S. Abrahams, David M. Eyers, Jean Bacon An asynchronous rule-based approach for business process automation using obligations. Search on Bibsonomy ACM SIGPLAN Workshop on Rule-Based Programming The full citation details ... 2002 DBLP  DOI  BibTeX  RDF policies, contracts, conflict resolution, conflict detection
15Jinx P. Walton Developing an enterprise information security policy. Search on Bibsonomy SIGUCCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, network security, policies, network management, data security, regulation, compliance, unauthorized access
15Sandrine Duflos, Brigitte Kervella, Eric Horlait An architecture for policy-based security management for distributed multimedia services. Search on Bibsonomy ACM Multimedia The full citation details ... 2002 DBLP  DOI  BibTeX  RDF policy-driven management, security policies, security management
15David W. Chadwick, Alexander Otenko The PERMIS X.509 role based privilege management infrastructure. Search on Bibsonomy SACMAT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Privilege management infrastructure, XML, authorization, RBAC, policies, X.509, attribute certificates
15Stephan Reiff-Marganiec, Kenneth J. Turner Use of Logic to Describe Enhanced Communications Services. Search on Bibsonomy FORTE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Enhanced Communications Services, Policy Description Language, Ponder, Policies, SIP
15Santiago Ontañón, Enric Plaza Case Exchange Strategies in Multiagent Learning. Search on Bibsonomy ECML The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Cooperative CBR, Multiagent CBR, Collaboration Policies, Multiagent Learning, Bartering
15Andrew C. Myers, Barbara Liskov Protecting privacy using the decentralized label model. Search on Bibsonomy ACM Trans. Softw. Eng. Methodol. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF principals, integrity, policies, lattice, confidentiality, roles, type checking, information flow controls, declassification, end-to-end, downgrading
15Dimitrios S. Stamoulis, Panagiotis Georgiadis 0001 Vision, Roles and Steps for Governments in Transition to the Digital Age. Search on Bibsonomy DEXA Workshops The full citation details ... 2000 DBLP  DOI  BibTeX  RDF market globalization, digital age, e-government, electronic commerce, electronic commerce, policies, legislation
15Yves Meylan, Aneema Bajpai, Riccardo Bettati ProtEx: a toolkit for the analysis of distributed real-time systems. Search on Bibsonomy RTCSA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF ProtEx toolkit, distributed real-time systems analysis, Rate Monotonic Analysis framework, queuing policies, RMA approach, flexible resource modeling, scheduling, scheduling, real-time systems, prototyping, distributed processing, software tools, systems analysis, workload, software prototyping
15Helen M. Edwards, Gillian Margaret Mallalieu, J. Barrie Thompson Some Insights into the Maintenance of Legacy Systems within Small Manufacturing and Distribution Organizations in the UK. Search on Bibsonomy COMPSAC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF maintenance strategy, business process change, software acquisition policies, empirical study, case studies, Legacy systems, risk evaluation, small organizations
15Ger Koole Structural results for the control of queueing systems using event-based dynamic programming. Search on Bibsonomy Queueing Syst. Theory Appl. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF control of queueing systems, dynamic programming, threshold policies, supermodularity
15Michele Cermele, Michele Colajanni, G. Necci Dynamic load balancing of distributed SPMD computations with explicit message-passing. Search on Bibsonomy Heterogeneous Computing Workshop The full citation details ... 1997 DBLP  DOI  BibTeX  RDF distributed SPMD computations, explicit message-passing, shared heterogeneous components, variable computational power, load status, workload adaption, dynamic platform conditions, linear algebra problems, partial differential equation solvers, activation mechanisms, load monitoring techniques, program consistency, PVM library, parallel computations, resource allocation, data management, dynamic load balancing, data migration, Single Program Multiple Data, task migration, image processing algorithms, decision policies
15Aileen Cater-Steel, Edmond P. Fitzgerald Quality assurance certification: adoption by Australian software developers and its association with capability maturity. Search on Bibsonomy APSEC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF software quality assurance certification, Australian software developers, capability maturity, government purchasing policies, QA certification, JAS-ANZ register, organisational characteristics, software quality, survey, CMM, questionnaire, Australia, Hong Kong, research project, Singapore
15Jian-Cheng Dai, Gwo-Dong Chen, Chen-Chung Liu, Baw-Jhiune Liu A temporal behavioral object model for object-oriented databases. Search on Bibsonomy COMPSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF temporal behavioral object model, data history management, data value changes, DSS debugging systems, DSS maintenance systems, database debugging systems, database maintenance systems, method signatures, method invocation network, subtype object substitutability enforcement, class inheritance hierarchy, database application developers, event effect querying, decision support system, policies, finite state machines, object-oriented databases, object-oriented databases, type system, temporal databases, users, procedures, data objects, decision makers
15Anastasio Molano, Kanaka Juvva, Ragunathan Rajkumar Real-time filesystems - Guaranteeing timing constraints for disk accesses in RT-Mach. Search on Bibsonomy RTSS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF real-time file systems, RT-Mach, real-time database applications, real-time disk scheduling algorithm, earliest deadline scheduling, just-in-time scheduling, aperiodic servers, disk throughput, admission control policies, microkernel-based system, real-time shell, resource reservation paradigm, disk scheduling algorithms, performance, usability, real-time systems, multimedia systems, timing constraint, disks, disk access, concurrent applications
15Alfred Inselberg Multidimensional detective. Search on Bibsonomy INFOVIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF multidimensional detective, multivariate dataset display, 2D pattern recognition problem, modeling relations, economic sectors, economic policies, trade-off analyses, approximate optimization, monitoring, knowledge discovery, decision support, data visualisation, competition, visual data mining, parallel coordinates, economic model, VLSI chip
15Patrick C. K. Hung, Kamalakar Karlapalem A Paradigm for Security Enforcement in CapBasED-AMS. Search on Bibsonomy CoopIS The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security enforcement paradigm, CapBasED-AMS, capability-based event-driven activity management system, activity execution, problem-solving agent, multiple interdependent tasks, task execution, unauthorized modification, pilferage, illegal privacy violation, specification-time data, compile-time data, run-time data, system infrastructure, secure match-making, security constraints, task coordination model, security resource control, role-based resource security model, security policies, task scheduling, security of data, security threats, unauthorized access
15A. Siafa Flexible multicast protocol. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF flexible multicast protocol, SRM algorithm, reliable multipoint communication, SRM repair/request policies, recovery treatments, failure occurence, multicast applications, multicast transport protocols, formal specification, transport protocols, service selection, reliable multicast, Estelle, application level
15Cheng-Chi Yu, Sourav Bhattacharya Dynamic scheduling of real-time messages over an optical network. Search on Bibsonomy ICCCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF real-time messages, real-time traffic management algorithms, multihop optical network, TWDM transmission schedule, time-critical messages, priority levels, static scheduling policies, deadline values, simulation, scheduling, performance, algorithms, dynamic scheduling, load, priority ordering
15James Coyle, James Demerest, Richard McAllister 0002 A Proposed Security Management Framework for the Global Information Community. Search on Bibsonomy WETICE The full citation details ... 1997 DBLP  DOI  BibTeX  RDF security management framework, global information community, security architect, product vendor, globally distributed systems, multiple security policies, communications network management, security infrastructure management, system management, office automation
15T. Mitchem, R. Lu, R. O'Brian Using Kernel Hypervisors to Secure Applications. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF kernel hypervisors, secure applications, selective control, loadable module, unbypassable security wrappers, application specific security requirements, client kernel hypervisors, application specific policies, loadable modules, user systems, malicious active content, wrapping servers, firewall services, Web browser, operating system kernels, Linux kernel, COTS components, replication services
15Qingxin Zhu, B. John Oommen On the Optimal Search Problem: The Case when the Target Distribution is Unknown. Search on Bibsonomy SCCC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF optimal search problem, target distribution, detection function, exponential function, large database searching, strategic policies, resource allocation, probability, search problems, error bounds
15Thomas M. Conte, Sumedh W. Sathaye, Sanjeev Banerjia A Persistent Rescheduled-page Cache for Low Overhead Object Code Compatibility in VLIW Architectures. Search on Bibsonomy MICRO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF LRU replacement, disk caching scheme, dynamic rescheduling, first-time page faults, high-overhead programs, low overhead object code compatibility, overhead-based replacement, page replacement policies, persistent rescheduled-page cache, run-time software rescheduling, simulations, cache storage, VLIW architectures, program executions, operating system support, program performance
15Brian Field, Daniel Mossé, Taieb Znati Simulation of ν-NET, a versatile network architecture for real-time and non-real-time traffic. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1996 DBLP  DOI  BibTeX  RDF nonreal-time traffic, Versatile Network Architecture, /spl nu/-NET, flexible communication requirement support, traffic policing mechanisms, /spl nu/-NET validation, real-time performance requirements, /spl nu/-channel traffic profiles, /spl nu/-NET performance, simulations, scheduling, performance evaluation, real-time systems, virtual machines, multimedia systems, correctness, multimedia applications, wide area networks, telecommunication traffic, information dissemination, information networks, scheduling policies, real-time traffic, real-time networks, QoS requirements, packet scheduling algorithms
15Ching-Chih Han, Kang G. Shin Message transmission with timing constraints in ring networks . Search on Bibsonomy RTSS The full citation details ... 1996 DBLP  DOI  BibTeX  RDF message transmission problem, unidirectional slotted ring networks, evacuation mode, continuation mode, system initialization, message scheduling policies, message deadlines, maximum delay, least-slack-time-first scheduling policy, optimal scheduling policy, farthest-destination-first policy, message passing, performance measures, timing constraints, average delay, operation modes
15Lawrence Chung, Brian A. Nixon, Eric S. K. Yu Using non-functional requirements to systematically support change. Search on Bibsonomy RE The full citation details ... 1995 DBLP  DOI  BibTeX  RDF Barclays Bank, systematic change support, goal decomposition, goal achievement, historical record, banking policies, Barclays Bank, performance, software engineering, formal specification, software quality, evolution, systems analysis, confidentiality, system development, development process, software system, timeliness, banking, design decisions, management of change, quality requirement, nonfunctional requirements, design tradeoffs
15Arindam Saha A simulator for real-time parallel processing architectures. Search on Bibsonomy Annual Simulation Symposium The full citation details ... 1995 DBLP  DOI  BibTeX  RDF real-time parallel processing architectures, time-driven flit-based wormhole-routed parallel processor network simulator, user-friendly graphical user interface, prioritized queues, resource allocation policies, message priorities, average latency convergence, throughput monitoring, communication characteristics, performance, real-time systems, resource allocation, parallel architectures, graphical user interfaces, virtual machines, concurrency control, convergence, deadlocks, virtual channel, overlaps, real-time networks
15Larry T. Chen, Leslee Xu, Tatsuya Suda, Tetsuya Yamamoto, Koji Obinata A reflective object-oriented distributed system for heterogeneous multimedia environments. Search on Bibsonomy ICCCN The full citation details ... 1995 DBLP  DOI  BibTeX  RDF reflective object-oriented distributed system, heterogeneous multimedia environments, object migration inheritance delegation, RODS, object distribution, underlying platform heterogeneity, flexible multimedia object adaptor, reflective object request broker, FMOA, RORB, CORBA object request broker, smart proxies, distributed object management policies, migration, multimedia communication, sharing, application framework, application programming, distributed multimedia applications
15Farnaz Mounes-Toussi, David J. Lilja Write buffer design for cache-coherent shared-memory multiprocessors. Search on Bibsonomy ICCD The full citation details ... 1995 DBLP  DOI  BibTeX  RDF write-buffer configurations, one word per buffer entry, one block per buffer entry, write-through, write-back, competitive-performance, shared-memory multiprocessors, shared memory systems, cache-coherent, memory architecture, buffer storage, cache storage, execution-driven simulator, write policies
15Atsushi Hori, Munenori Maeda, Yutaka Ishikawa, Takashi Tomokiyo, Hiroki Konaka A scalable time-sharing scheduling for partitionable distributed memory parallel machines. Search on Bibsonomy HICSS (2) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF time-sharing systems, scalable time-sharing scheduling, partitionable distributed memory parallel machines, process scheduling queue system, distributed queue tree, dynamically partitionable parallel machines, dynamically nested partitioning, time-sharing scheduling, process scheduling queues, round-robin scheduling algorithm, task allocation policies, high-load situations, parallel machines, reconfigurable architectures, trees (mathematics), distributed memory systems, processor scheduling, simulation results, interactive environment, time-sharing, nested, batch scheduling, processor utilization
15Sulin Ba, Andrew B. Whinston, Karl Reiner Lang An enterprise modeling approach to organizational decision support. Search on Bibsonomy HICSS (3) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF enterprise modeling approach, organizational decision support, conceptual level, future enterprise modeling systems, corporate issues, enterprise wide environment, enterprise modeling system, business policies, business opportunities, decision support systems, problem solving, problem solving, business data processing, future research, strategic decision making
15Sreeram Duvvuru, Siamak Arya Evaluation of a branch target address cache. Search on Bibsonomy HICSS (1) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF branch target address cache evaluation, sequential flow, pipeline bubbles, branch penalty, cycles per instruction, multiple instruction issue processors, branch resolution scheme, target instruction fetch, unpredictable branches, fully predicated processor architecture, fetch stage, branch target caching policies, branch target address cache, register-relative branches, performance evaluation, interrupts, interrupt, program compilers, pipeline processing, cache storage, storage allocation, instructions, program control structures, cache sizes
15Juha S. Knuuttila, Kenneth R. Walsh, Andrea L. Houston, E. Golla DeleGate: towards a conference diplomat's multidimensional workstation. Search on Bibsonomy HICSS (4) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF multidimensional workstation, intergovernmental conferences, multilateral diplomatic conference environment, groupware standardization, PCMCIA connectivity, interorganizational group process, network platform, user-centered multimethodological IS research, groupware development, information systems, information systems, groupware, groupware, standard, interfaces, DeleGate, server, teleconferencing, workstations, standardisation, government data processing, government policies, collaborative software
15Garett O. Dworman, Steven O. Kimbrough, James D. Laing On automated discovery of models using genetic programming in game-theoretic contexts. Search on Bibsonomy HICSS (3) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF high-quality negotiation policies, three-player coalitions game, genetic algorithms, learning (artificial intelligence), genetic programming, game theory, game-theory, evolutionary computation, mathematical models, qualitative models, machine learning techniques
15Scott D. Carson, Sanjeev Setia Analysis of the Periodic Update Write Policy For Disk Cache. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF periodic update write policy, average access time, dirty cache blocks, disk read requests, cache-hit ratio, competing cache write policies, bulk arrivals, traffic jam effect, degraded service, write packages, scheduling, file systems, storage management, buffer storage, storage allocation, disk scheduling, data storage, computer systems, disk cache, design criteria, average response time
15Nazim H. Madhavji Environment Evolution: The Prism Model of Changes. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1992 DBLP  DOI  BibTeX  RDF Prism model, Prism project, change-related environment infrastructures, environmental facilities, dependency structure, change structure, change-related data, qualitative judgments, built-in mechanism, data structures, software tools, policies, programming environments, feedback, processes, complex network, resources, laws, software development environment, people
15Sridhar Madala, James B. Sinclair Performance of Synchronous Parallel Algorithms with Regular Structures. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF distribution driven simulations, synchronous parallelalgorithms, mean execution time, program-driven simulations, average execution time, multiphasealgorithms, execution time bounds, scheduling, performance evaluation, parallel algorithms, parallel programming, upper bounds, bounding, scheduling policies, partitioning algorithm, parallel tasks, asymptotic approximations, regular structures
15Wesley W. Chu, Chi-Man Sit, Kin K. Leung Task Response Time For Real-Time Distributed Systems With Resource Contentions. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1991 DBLP  DOI  BibTeX  RDF task response times, extended queuing network model, module response times, weighted control-flow graph model, task response time, invocation rates, module assignments, real-time systems, computational complexity, computational complexity, graph theory, resource allocation, distributed processing, queueing theory, analytic model, simulation results, interprocessor communications, scheduling policies, resource contentions, decomposition technique, real-time distributed systems, submodels, distributed processing systems
15Jean-Loup Baer, Yi-Bing Lin Improving Quicksort Performance with a Codewort Data Structure. Search on Bibsonomy IEEE Trans. Software Eng. The full citation details ... 1989 DBLP  DOI  BibTeX  RDF codeword data structure, long, alphanumeric sequences, bytes, codeword generator, character count, first nonequal byte, quicksort algorithm, architecture-dependent parameters, in-line expansion, data structures, caches, sorting, compiler optimizations, register allocation, performance improvement, ordering, pointer, records, keys, swaps, write policies
15Devavrat Shah, John N. Tsitsiklis, Yuan Zhong Qualitative properties of alpha-weighted scheduling policies. Search on Bibsonomy SIGMETRICS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF exponential bound, maximum weight-alpha, state space collapse, Markov chain, switched network
15Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Barker 0001 Analysis of social networking privacy policies. Search on Bibsonomy EDBT/ICDT Workshops The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
15Jeffrey Stuecheli, Dimitris Kaseridis, David Daly, Hillery C. Hunter, Lizy K. John The virtual write queue: coordinating DRAM and last-level cache policies. Search on Bibsonomy ISCA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF cmp many-core, ddr ddr2 ddr3, dram-parameters, memory-scheduling writeback, page-mode, write-queue, write-scheduling, dram, cache-replacement, last-level-cache
15Richard Shay, Elisa Bertino A comprehensive simulation tool for the analysis of password policies. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Simulation, Management, Policy, Password
15Norman M. Sadeh, Jason I. Hong, Lorrie Faith Cranor, Ian Fette, Patrick Gage Kelley, Madhu K. Prabaker, Jinghai Rao Understanding and capturing people's privacy policies in a mobile social networking application. Search on Bibsonomy Pers. Ubiquitous Comput. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Ying Xu, Aabhas S. Agarwal, Brian T. Davis Prediction in Dynamic SDRAM Controller Policies. Search on Bibsonomy SAMOS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Access Control Policy, Memory Latency, SDRAM
15Hauke Strasdat, Cyrill Stachniss, Wolfram Burgard Which landmark is useful? Learning selection policies for navigation in unknown environments. Search on Bibsonomy ICRA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda Extended electronic signature policies. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF extended business model, signature policy, e-commerce, public key infrastructure, electronic signature, ASN.1
15Armin Hornung, Hauke Strasdat, Maren Bennewitz, Wolfram Burgard Learning efficient policies for vision-based navigation. Search on Bibsonomy IROS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Christophe Feltus, Christophe Incoul, Jocelyn Aubert, Benjamin Gâteau, André Adelsbach, Marc Camy Methodology to Align Business and IT Policies: Use Case from an IT Company. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Luanna Lopes Lobato, Eduardo B. Fernández, Sérgio Donizetti Zorzo Patterns to Support the Development of Privacy Policies. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Franz Baader, Andreas Bauer 0002, Alwen Tiu Matching Trace Patterns with Regular Policies. Search on Bibsonomy LATA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Tengjiao Wang 0003, Bishan Yang, Allen Huang, Qi Zhang, Jun Gao 0003, Dongqing Yang, Shiwei Tang, Jinzhong Niu Dynamic Data Migration Policies for Query-Intensive Distributed Data Environments. Search on Bibsonomy APWeb/WAIM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Zhengping Wu, Lifeng Wang An Enforcement Architecture for Security and Trust Policies in Federated Web-Service-Based Systems. Search on Bibsonomy COMPSAC (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Subana Thanasegaran, Yi Yin, Yuichiro Tateiwa, Yoshiaki Katayama, Naohisa Takahashi A topological approach to detect conflicts in firewall policies. Search on Bibsonomy IPDPS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Sandra Julieta Rueda, Hayawardh Vijayakumar, Trent Jaeger Analysis of virtual machine system policies. Search on Bibsonomy SACMAT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF xen security modules (xsm), virtual machines, selinux, policy analysis
15Soohong Min, JoAnne Holliday Replacement policies for super-peer in unstructured P2P network. Search on Bibsonomy ISCIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15Niklas Broberg, David Sands 0001 Flow-sensitive semantics for dynamic information flow policies. Search on Bibsonomy PLAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF information flow control, declassification, security type system
15Chenyun Dai, Dan Lin 0001, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani Thuraisingham Query Processing Techniques for Compliance with Data Confidence Policies. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
15John Levine, Carl Henrik Westerberg, Michelle Galea, David Humphreys Evolutionary-based learning of generalised policies for AI planning domains. Search on Bibsonomy GECCO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF decision list learning, iterative rule learning, rule order optimisation, inductive learning, automated planning
Displaying result #901 - #1000 of 18116 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][19][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license