Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
7433
search results - page 101 / 1487
»
Management of Technology
Sort
relevance
views
votes
recent
update
View
thumb
title
128
Voted
ISAS
2005
Springer
76
views
Information Technology
»
more
ISAS 2005
»
Model-Based Optimization of Enterprise Application and Service Deployment
15 years 10 months ago
Download
www.inf.mit.bme.hu
András Balogh, Dániel Varró, ...
claim paper
Read More »
115
Voted
ITRUST
2005
Springer
118
views
Information Technology
»
more
ITRUST 2005
»
Towards a Generic Trust Model - Comparison of Various Trust Update Algorithms
15 years 10 months ago
Download
www.tml.tkk.fi
Michael Kinateder, Ernesto Baschny, Kurt Rothermel
claim paper
Read More »
114
click to vote
INEX
2004
Springer
96
views
Information Technology
»
more
INEX 2004
»
Overview of INEX 2004
15 years 10 months ago
Download
www.dcs.gla.ac.uk
Saadia Malik, Mounia Lalmas, Norbert Fuhr
claim paper
Read More »
105
Voted
DISCEX
2003
IEEE
99
views
Information Technology
»
more
DISCEX 2003
»
A Framework for Automated Negotiation of Access Control Policies
15 years 10 months ago
Download
www.ece.umd.edu
Vijay G. Bharadwaj, John S. Baras
claim paper
Read More »
95
Voted
IAW
2003
IEEE
106
views
Information Technology
»
more
IAW 2003
»
Hidden Processes: The Implication for Intrusion Detection
15 years 10 months ago
Download
www.blackhat.com
James Butler, Jeffrey Undercoffer, John Pinkston
claim paper
Read More »
« Prev
« First
page 101 / 1487
Last »
Next »