Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 109 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
100
click to vote
OOPSLA
2001
Springer
96
views
Security Privacy
»
more
OOPSLA 2001
»
The Architecture of a UML Virtual Machine
15 years 8 months ago
Download
dirkriehle.com
Dirk Riehle, Steven Fraleigh, Dirk Bucka-Lassen, N...
claim paper
Read More »
96
click to vote
SAFECOMP
2001
Springer
89
views
Security Privacy
»
more
SAFECOMP 2001
»
About the Design of Distributed Control Systems: The Quasi-Synchronous Approach
15 years 8 months ago
Download
www-verimag.imag.fr
Paul Caspi, Christine Mazuet, Natacha Reynaud Pali...
claim paper
Read More »
91
Voted
ACSAC
2000
IEEE
83
views
Security Privacy
»
more
ACSAC 2000
»
Using Attribute Certificates with Mobile Policies in Electronic Commerce Applications
15 years 8 months ago
Download
www.acsac.org
Vinti Doshi, Amgad Fayad, Sushil Jajodia, Roswitha...
claim paper
Read More »
113
click to vote
SP
2000
IEEE
115
views
Security Privacy
»
more
SP 2000
»
Efficient Authentication and Signing of Multicast Streams over Lossy Channels
15 years 8 months ago
Download
www.cs.berkeley.edu
Adrian Perrig, Ran Canetti, J. D. Tygar, Dawn Xiao...
claim paper
Read More »
82
click to vote
AGENTS
2000
Springer
88
views
Security Privacy
»
more
AGENTS 2000
»
A Multi-agent system architecture for monitoring medical protocols
15 years 8 months ago
Download
fermat.eup.udl.es
Teresa Alsinet, Ramón Béjar, C&egrav...
claim paper
Read More »
« Prev
« First
page 109 / 1024
Last »
Next »