|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 19 occurrences of 18 keywords
|
|
|
Results
Found 41 publication records. Showing 41 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
122 | Ravi S. Sandhu, Srinivas Ganta |
On the Expressive Power of the Unary Transformation Model. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Access Control, Authorization, Expressive Power, Client-Server Architecture, Access Rights |
102 | Daniel L. Silver, Robert E. Mercer |
The Task Rehearsal Method of Life-Long Learning: Overcoming Impoverished Data. |
AI |
2002 |
DBLP DOI BibTeX RDF |
|
91 | Peter W. Sauer |
Alternatives for Calculating Transmission Reliability Margin (TRM) in Available Transfer Capability (ATC). |
HICSS (3) |
1998 |
DBLP DOI BibTeX RDF |
|
53 | Bin Xu, Jian-Fei Lu, Jian-Hua Wang |
Dynamic Responses of an Infinite Beam on a Layered Water-Saturated Poroelastic Foundation Under Moving Loads. |
International Conference on Computational Science (3) |
2007 |
DBLP DOI BibTeX RDF |
Moving loads, layered poroelastic foundation, Biot’s theory, infinite beam, TRM method |
41 | Maohua Lu, Shibiao Lin, Tzi-cker Chiueh |
Efficient Logging and Replication Techniques for Comprehensive Data Protection. |
MSST |
2007 |
DBLP DOI BibTeX RDF |
|
41 | Ravi S. Sandhu, Xinwen Zhang |
Peer-to-peer access control architecture using trusted computing technology. |
SACMAT |
2005 |
DBLP DOI BibTeX RDF |
access control, trusted computing, security architecture, policy enforcement |
34 | Md. Forhad Rabbi, Khan Olid Bin Mannan |
A Review of Software Risk Management for Selection of Best Tools and Techniques. |
SNPD |
2008 |
DBLP DOI BibTeX RDF |
SRE, Softrisk, TRM, ARMOR, Riskit, SEI |
30 | Zhengyang Wang, Xiufen Ye, Xue Shang, Shuzhi Sam Ge, Shuxiang Guo |
Person re-identification method with Mahalanobis TRM triplet on multi-branch network. |
Appl. Intell. |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Yiran Liu, Xin Feng, Yunlong Wang, Wu Yang, Di Ming |
TRM-UAP: Enhancing the Transferability of Data-Free Universal Adversarial Perturbation via Truncated Ratio Maximization. |
ICCV |
2023 |
DBLP DOI BibTeX RDF |
|
30 | Subash Rajendran, R. Jebakumar 0001 |
Friendliness Based Trustworthy Relationship Management (F-TRM) in Social Internet of Things. |
Wirel. Pers. Commun. |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Masayoshi Watanabe, Yuto Nakagami, Toshiyuki Isshiki, Motoshi Kunugi, Yuko Yasunaga |
Research on the TRM Kaizen Method for Governmental Organizations to Apply Technology Roadmapping as a Methodology to Achieve the Goals of Industrial Technology Policy. |
IEEE Trans. Engineering Management |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Yuta Naruse, Kazuki Takaya, Fumio Ito, Jun'ichi Watanabe, Taro Nakamura 0001 |
Confirmation of Variable Diameter TRM Operation. |
CLAWAR |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Yijun Qian, Guoliang Kang, Lijun Yu, Wenhe Liu, Alexander G. Hauptmann |
TRM: Temporal Relocation Module for Video Recognition. |
WACV (Workshops) |
2022 |
DBLP DOI BibTeX RDF |
|
30 | Yun Du, Desheng Wen, Guizhong Liu, Shi Qiu |
Small Moving Target Recognition in Star Image with TRM. |
Int. J. Pattern Recognit. Artif. Intell. |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Karollay Giuliani Oliveira Valério, Carlos Eduardo Sanches da Silva, Sandra Miranda Neves |
Overview on the technology roadmapping (TRM) literature: gaps and perspectives. |
Technol. Anal. Strateg. Manag. |
2021 |
DBLP DOI BibTeX RDF |
|
30 | Luis Giraldo-Alvarado, Javier Riascos-Ochoa |
Time Series Models for the Colombian TRM Exchange Rate. |
ICAI Workshops |
2020 |
DBLP BibTeX RDF |
|
30 | Marek Janiszewski |
TRM-EAT - a New Tool for Reliability Evaluation of Trust and Reputation Management Systems in Mobile Environments. |
CCGRID |
2020 |
DBLP DOI BibTeX RDF |
|
30 | Lukás Vojácek, Michal Podhorányi, Pavel Strof |
Development and HPC Preliminary Testing of a TRM Reactive-transport Model for Solving Potential Environmental Issues. |
CCIOT |
2019 |
DBLP DOI BibTeX RDF |
|
30 | Ashutosh Bhatia, R. C. Hansdah |
TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability. |
Comput. Networks |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Guangquan Xu, Yan Cao, Yao Zhang, Gaoxu Zhang, Xiaohong Li 0001, Zhiyong Feng 0002 |
TRM: Computing Reputation Score by Mining Reviews. |
AAAI Workshop: Incentives and Trust in Electronic Communities |
2016 |
DBLP BibTeX RDF |
|
30 | Eleftherios Kokoris-Kogias, Orfefs Voutyras, Theodora A. Varvarigou |
TRM-SIoT: A scalable hybrid trust & reputation model for the social Internet of Things. |
ETFA |
2016 |
DBLP DOI BibTeX RDF |
|
30 | Ying-Li Lee, Tsai-Feng Chien, Hsiu-Chin Chen |
Applying an instant messaging system at the hospital to support TRM. |
AMIA |
2015 |
DBLP BibTeX RDF |
|
30 | Mijung Kim |
TensorDB and Tensor-Relational Model (TRM) for Efficient Tensor-Relational Operations. |
|
2014 |
RDF |
|
30 | Veli Bicer, Thanh Tran 0001, Yongtao Ma, Rudi Studer |
TRM - Learning Dependencies between Text and Structure with Topical Relational Models. |
ISWC (1) |
2013 |
DBLP DOI BibTeX RDF |
|
30 | Dong Chen 0010, Guiran Chang, Dawei Sun 0001, Jiajia Li, Jie Jia, Xingwei Wang 0001 |
TRM-IoT: A trust management model based on fuzzy reputation for internet of things. |
Comput. Sci. Inf. Syst. |
2011 |
DBLP DOI BibTeX RDF |
|
30 | Mosad Zineldin, Valiantsina Vasicheva |
A Cyber Organization in the Cyber World - ICT and e.Total Relationship Management (e.TRM). |
ICEIS (5) |
2008 |
DBLP BibTeX RDF |
|
30 | Emil Vassev, Olga Ormandjieva, Joey Paquet |
Assl Specification of Reliability Self-Assessment in the As-Trm. |
ICSOFT (SE) |
2007 |
DBLP BibTeX RDF |
|
30 | Emil Vassev, Heng Kuang, Olga Ormandjieva, Joey Paquet |
Reactive, distributed and autonomic computing aspects of AS-TRM. |
ICSOFT (1) |
2006 |
DBLP BibTeX RDF |
|
30 | Jean-Paul Chaib, Harry Leib |
Very low rate trellis/Reed-Muller (TRM) codes. |
IEEE Trans. Commun. |
1999 |
DBLP DOI BibTeX RDF |
|
30 | Lawrence L. Rose |
TRM: A resource model for networked processes. |
ANSS |
1982 |
DBLP BibTeX RDF |
|
20 | Ram Krishnan, Ravi S. Sandhu |
A Hybrid Enforcement Model for Group-centric Secure Information Sharing. |
CSE (3) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Helano Castro, Alexandre Augusto Coelho, Ricardo Jardel Silveira |
Fault-tolerance in FPGA's through CRC voting. |
SBCCI |
2008 |
DBLP DOI BibTeX RDF |
cyclic redundancy check, fault tolerance, FPGA, partial reconfiguration |
20 | Hee-Chun Song, William S. Hodgkiss, William A. Kuperman |
MIMO time reversal communications. |
Underwater Networks |
2007 |
DBLP DOI BibTeX RDF |
time reversal mirror, MIMO |
20 | A. R. Ali Ahmadi, Farzad Soltani, Majid Gheitasi |
An ICT Technical Reference Model for Iran Universities. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
20 | Arkadiusz Janik, Krzysztof Zielinski |
Transparent Resource Management with Java RM API. |
International Conference on Computational Science (4) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Cristina Castejón, Beatriz L. Boada, Dolores Blanco, Luis Moreno 0001 |
Traversable Region Modeling for Outdoor Navigation. |
J. Intell. Robotic Syst. |
2005 |
DBLP DOI BibTeX RDF |
3D scanner laser, navigation map, traversability, robot mapping, outdoor |
20 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
Efficient and Leakage-Resilient Authenticated Key Transport Protocol Based on RSA. |
ACNS |
2005 |
DBLP DOI BibTeX RDF |
|
20 | SeongHan Shin, Kazukuni Kobara, Hideki Imai |
A Simplified Leakage-Resilient Authenticated Key Exchange Protocol with Optimal Memory Size. |
ICN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
20 | Yoshitoshi Murata, Katsuhisa Sugiura, Susumu Ishihara, Fumiaki Sato, Tadanori Mizuno |
The Multi-Sharing Mobile Remote Monitoring System - The Four Layer Object Management Model and Practical System. |
AINA |
2003 |
DBLP DOI BibTeX RDF |
wireless packet system, data logger wireless packet system, ASP, remote monitoring |
20 | Giuseppe Acciani, D. Congedo, Bruno Dilecce |
Improving the computational efficiency of the tree relaxation method for an iterative solution of linear circuit equations. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
1991 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #41 of 41 (100 per page; Change: )
|
|