|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 15 keywords
|
|
|
Results
Found 14 publication records. Showing 14 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
38 | Helen Malin |
Evaluating student employee performance. |
SIGUCCS |
2006 |
DBLP DOI BibTeX RDF |
computer consultants, full-disclosure, performance record, real-time, standards, training, transformation, statistics, digital, customer service, professional development, mentoring, evaluation system, cumulative |
30 | Bruce Schneier |
Locks and Full Disclosure. |
IEEE Secur. Priv. |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Paolo D'Arco, Alfredo De Santis |
Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol. |
AFRICACRYPT |
2008 |
DBLP DOI BibTeX RDF |
|
19 | S. Matthew English, Ehsan Nezhadian |
Conditions of Full Disclosure: The Blockchain Remuneration Model. |
CoRR |
2017 |
DBLP BibTeX RDF |
|
19 | S. Matthew English, Ehsan Nezhadian |
Conditions of Full Disclosure: The Blockchain Remuneration Model. |
EuroS&P Workshops |
2017 |
DBLP DOI BibTeX RDF |
|
19 | Michael Parmisano Canares |
Opening the local: full disclosure policy and its impact on local governments in the Philippines. |
ICEGOV |
2014 |
DBLP DOI BibTeX RDF |
|
19 | Hung-Yu Chien, Chu-Sing Yang, Hung-Pin Hou |
Non-linearity cannot help RFID resist full-disclosure attacks and terrorist fraud attacks. |
Secur. Commun. Networks |
2013 |
DBLP DOI BibTeX RDF |
|
19 | Jeremy Pitt, Julia Schaumeier |
Provision and Appropriation of Common-Pool Resources without Full Disclosure. |
PRIMA |
2012 |
DBLP DOI BibTeX RDF |
|
19 | Karen Hogenboom |
Full Disclosure: The Perils and Promise of Transparency, Archon Fung, Mary Graham, David Weil. Cambridge University Press, New York (2008). |
Gov. Inf. Q. |
2010 |
DBLP DOI BibTeX RDF |
|
19 | Wilton C. Levine, Mark A. Meyer, Marie T. Egan, Philip Brzezinski, Jeffrey Robbins, Henry Chueh, Warren S. Sandberg |
Development of a Vendor Agnostic, Full Disclosure System for Capture, Display, and Storage of Operative Systems Data. |
AMIA |
2006 |
DBLP BibTeX RDF |
|
11 | Tieyan Li, Robert H. Deng |
Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
11 | Paul Brebner, Jeffrey Gosper |
J2EE infrastructure scalability and throughput estimation. |
SIGMETRICS Perform. Evaluation Rev. |
2003 |
DBLP DOI BibTeX RDF |
ECperf benchmark, Enterprise Java Beans (EJB), scalability, throughput, J2EE |
11 | Paul Brebner, Jeffrey Gosper |
How scalable is J2EE technology? |
ACM SIGSOFT Softw. Eng. Notes |
2003 |
DBLP DOI BibTeX RDF |
Enterprise Java Beans (EJB), scale-up, scalability, J2EE, scale-out |
11 | Ramesh Bhashyam |
TCP-D - The Challenges, Issues and Results. |
SIGMOD Rec. |
1996 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #14 of 14 (100 per page; Change: )
|
|