The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for compromise with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1959-1979 (16) 1980-1988 (17) 1989-1990 (18) 1991-1993 (24) 1994-1995 (31) 1996 (22) 1997 (30) 1998 (18) 1999 (35) 2000 (48) 2001 (69) 2002 (79) 2003 (96) 2004 (153) 2005 (195) 2006 (226) 2007 (236) 2008 (251) 2009 (170) 2010 (41) 2011 (28) 2012 (24) 2013 (32) 2014 (25) 2015 (24) 2016 (30) 2017 (29) 2018 (41) 2019 (37) 2020 (41) 2021 (47) 2022 (72) 2023 (66) 2024 (8)
Publication types (Num. hits)
article(714) book(1) data(1) incollection(13) inproceedings(1538) phdthesis(12)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1926 occurrences of 1317 keywords

Results
Found 2279 publication records. Showing 2279 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
68Hui Song, Liang Xie 0002, Sencun Zhu, Guohong Cao Sensor node compromise detection: the location perspective. Search on Bibsonomy IWCMC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF node compromise detection, wireless sensor networks
52Shouhuai Xu, Ravi S. Sandhu A Scalable and Secure Cryptographic Service. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptographic service, compromise detection, compromise confinement, security, scalability, availability
48Prince Mahajan, Ramakrishna Kotla, Catherine C. Marshall, Venugopalan Ramasubramanian, Thomas L. Rodeheffer, Douglas B. Terry, Ted Wobber Effective and efficient compromise recovery for weakly consistent replication. Search on Bibsonomy EuroSys The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compromise recovery, replication
48Ethem Tolga, S. Emre Alptekin Product Development Process Using a Fuzzy Compromise-Based Goal Programming Approach. Search on Bibsonomy ICCSA (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF compromise programming, e-learning, goal programming, Quality function deployment, analytic network process
48Maurizio Adriano Strangio On the Resilience of Key Agreement Protocols to Key Compromise Impersonation. Search on Bibsonomy EuroPKI The full citation details ... 2006 DBLP  DOI  BibTeX  RDF key agreement protocols, key compromise impersonation
48Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou Node Compromise Modeling and its Applications in Sensor Networks. Search on Bibsonomy ISCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
48Craig Gentry, Philip D. MacKenzie, Zulfikar Ramzan A Method for Making Password-Based Key Exchange Resilient to Server Compromise. Search on Bibsonomy CRYPTO The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
42M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Group Key Exchange, Insider Attacks, Key Compromise Impersonation
42Haigen Hu, Lihong Xu, Qingsong Hu Model-based compromise control of greenhouse climate using pareto optimization. Search on Bibsonomy GEC Summit The full citation details ... 2009 DBLP  DOI  BibTeX  RDF compromise control algorithm, greenhouse climate model, weather forecast model, energy-saving, NSGA-ii
42Henryk Piech, Pawel Figat A Method for Evaluation of Compromise in Multiple Criteria Problems. Search on Bibsonomy ICAISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Michael Backes 0001, Martin P. Grochulla, Catalin Hritcu, Matteo Maffei Achieving Security Despite Compromise Using Zero-knowledge. Search on Bibsonomy CSF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Protocol Transformation, Security Despite Compromise, Type Systems, Protocol Design, Zero-Knowledge Proofs
35Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu A proactive secure routing algorithm defense against node compromise in sensor networks. Search on Bibsonomy LCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
35Yanchao Zhang, Wei Liu 0008, Wenjing Lou, Yuguang Fang Location-based compromise-tolerant security mechanisms for wireless sensor networks. Search on Bibsonomy IEEE J. Sel. Areas Commun. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Samir Aknine, Onn Shehory A Feasible and Practical Coalition Formation Mechanism Leveraging Compromise and Task Relationships. Search on Bibsonomy IAT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
35Michael A. Palley, Jeffrey S. Simonoff The Use of Regression Methodology for the Compromise of Confidential Information in Statistical Databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1987 DBLP  DOI  BibTeX  RDF
33Christoph Krauß, Markus Schneider 0002, Claudia Eckert 0001 Defending against false-endorsement-based dos attacks in wireless sensor networks. Search on Bibsonomy WISEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, wireless sensor network, node compromise, denial-of-service attacks, report generation
33Yun Zhou, Yuguang Fang A Two-Layer Key Establishment Scheme for Wireless Sensor Networks. Search on Bibsonomy IEEE Trans. Mob. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sensor networks, key establishment, transport layer, link layer, node compromise
33Wiebren de Jonge Compromising Statistical Databases Responding to Queries about Means. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1983 DBLP  DOI  BibTeX  RDF database security, statistical databases, compromise
31Francisco J. André, Carlos Romero Computing compromise solutions: On the connections between compromise programming and composite programming. Search on Bibsonomy Appl. Math. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Pradip De, Yonghe Liu, Sajal K. Das 0001 Deployment-aware modeling of node compromise spread in wireless sensor networks using epidemic theory. Search on Bibsonomy ACM Trans. Sens. Networks The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Random key predistribution, epidemic theory, group-based deployment, sensor networks, random graph
29Tyler Moore 0001, Richard Clayton 0001 Evil Searching: Compromise and Recompromise of Internet Hosts for Phishing. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
29Xiaodong Lin 0001, Rongxing Lu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao TUA: A Novel Compromise-Resilient Authentication Architecture for Wireless Mesh Networks. Search on Bibsonomy IEEE Trans. Wirel. Commun. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29David John Leversage, Eric James James Estimating a System's Mean Time-to-Compromise. Search on Bibsonomy IEEE Secur. Priv. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
29Odysseus G. Manoliadis, John Paris Pantouvakis, Ioannis E. Tsolas compromise programming model in site selection for construction temporary facilities. Search on Bibsonomy Oper. Res. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-criteria decision making analysis, composite programming, site selection, construction
29Pradip De, Yonghe Liu, Sajal K. Das 0001 Modeling Node Compromise Spread in Wireless Sensor Networks Using Epidemic Theory. Search on Bibsonomy WOWMOM The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Random Key Predistribution, Sensor Networks, Random Graph, Epidemiology
29Abdulrahman Alarifi, Wenliang Du Diversify sensor nodes to improve resilience against node compromise. Search on Bibsonomy SASN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF wireless sensor networks, reverse engineering, diversity, obfuscation
29Andrew D. Gordon 0001, Alan Jeffrey Secrecy Despite Compromise: Types, Cryptography, and the Pi-Calculus. Search on Bibsonomy CONCUR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
29Krzysztof Cpalka, Leszek Rutkowski Fuzzy Modelling with a Compromise Fuzzy Reasoning. Search on Bibsonomy ICAISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
29Alain Herment, Elodie Roullot, Isabelle Bloch, Claire Pellot, Andrew Todd-Pokropek, Élie Mousseaux Improvement of the SNR-resolution compromise in MRA using spatial segmented k-space acquisitions. Search on Bibsonomy ISBI The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Linchun Li, Jianhua Li 0001, Yue Wu 0010, Ping Yi A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. Search on Bibsonomy PerCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF loss tolerance, authentication, revocation, group key management, node compromise
26Konstantinos Chalkias, Spyros T. Halkidis, Dimitrios Hristu-Varsakelis, George Stephanides, Anastasios Alexiadis A Provably Secure One-Pass Two-Party Key Establishment Protocol. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF One-pass protocols, two-party key agreement, loss of information, key-compromise impersonation
26Yuichi Sei, Shinichi Honiden Resilient Security for False Event Detection Without Loss of Legitimate Events in Wireless Sensor Networks. Search on Bibsonomy OTM Conferences (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF false event, security, wireless sensor network, node compromise, en-route filtering
26Gary T. Leavens, Curtis Clifton Multiple concerns in aspect-oriented language design: a language engineering approach to balancing benefits, with examples. Search on Bibsonomy SPLAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF aspect-oriented programming language design, ease of maintenance, ease of reasoning, goals, quantification, tradeoff, balance, scattering, concerns, compromise, tangling, obliviousness
26Md. Abdul Hamid, Choong Seon Hong A Secure Message Percolation Scheme for Wireless Sensor Network. Search on Bibsonomy ICOIN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Secure Group, Star Key Graph, Robustness, Node Compromise
26Di Ma, Gene Tsudik Extended Abstract: Forward-Secure Sequential Aggregate Authentication. Search on Bibsonomy S&P The full citation details ... 2007 DBLP  DOI  BibTeX  RDF key compromise, sensors, forward security, signature schemes, authentication schemes, aggregate signatures
26Michal Ren, Tanmoy Kanti Das, Jianying Zhou 0001 Diverging Keys in Wireless Sensor Networks. Search on Bibsonomy ISC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Node Compromise Attack, Diverging Keys, Sensor Network Security
26Ik Rae Jeong, Jeong Ok Kwon, Dong Hoon Lee 0001 A Diffie-Hellman Key Exchange Protocol Without Random Oracles. Search on Bibsonomy CANS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Diffie-Hellman protocol, Strong forward secrecy, Unknown key share, Key exchange, Key compromise impersonation
26Patricia Jaramillo, Ricardo A. Smith, Joaquín Andréu Multi-Decision-Makers Equalizer: A Multiobjective Decision Support System for Multiple Decision-Makers. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF multicriteria decision support system, compromise programming, group decision making, multiobjective
26Hao Yang 0004, Fan Ye 0003, Yuan Yuan 0035, Songwu Lu, William A. Arbaugh Toward resilient security in wireless sensor networks. Search on Bibsonomy MobiHoc The full citation details ... 2005 DBLP  DOI  BibTeX  RDF location-based security, wireless sensor networks, resiliency, key distribution, node compromise, en-route filtering
26Hajime Sawamura, Yuichi Umeda, Robert K. Meyer Computational Dialectics for Argument-Based Agent Systems. Search on Bibsonomy ICMAS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF dialectical logic, Aufheben, argumentation, dialectics, compromise
26Yuichi Umeda, Masashi Yamashita, Masanobu Inagaki, Hajime Sawamura Argumentation as a Social Computing Paradigm. Search on Bibsonomy PRIMA The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Aufheben, concession, agent, cooperation, argumentation, dialectics, compromise
26David P. Dobkin, Anita K. Jones, Richard J. Lipton Secure Databases: Protection Against User Influence. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1979 DBLP  DOI  BibTeX  RDF security, database, information flow, inference, protection, compromise, statistical query
26Wei-Min Shi ID-Based Non-interactive Deniable Authentication Protocol. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Miles A. McQueen, Wayne F. Boyer, Mark A. Flynn, George A. Beitel Quantitative Cyber Risk Reduction Estimation Methodology for a Small SCADA Control System. Search on Bibsonomy HICSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yi Tang 0001, Jiming Liu 0001, Xiaolong Jin Agent Compromises in Distributed Problem Solving. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Agent Compromises, Distributed GCP Solving, Graph Coloring Problem, Distributed Constraint Satisfaction Problem
22Manuel A. Pulido, Peter Borm, Ruud Hendrickx, Natividad Llorca, Joaquín Sánchez-Soriano Compromise solutions for bankruptcy situations with references. Search on Bibsonomy Ann. Oper. Res. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Nhan Tran, Vijay Somers Modeling privacy compromise: visibility of individuals via DRM and RFID in ubiquitous computing. Search on Bibsonomy SpringSim The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed security, modeling, privacy, ubiquitous computing, pervasive computing, RFID, digital rights management
22Chao-Lieh Chen, Syue-You Chen, Jeng-Wei Lee, Yau-Hwang Kuo Hierarchical cross-layer fuzzy control for compromise of multiple objectives in wireless mobile networks. Search on Bibsonomy Mobility Conference The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hierarchical fuzzy control, wireless networks, cross-layer design
22Ming-Guang Shi, Michael R. Lyu, Tat-Ming Lok Maximal-Robustness-Minimal-Fragility Controller: A Compromise between Robustness and Fragility of Biochemical Networks. Search on Bibsonomy ICIC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ?/H2/H??? control, Biochemical networks, Maximal-Robustness- Minimal-Fragility controller, Perfect Bayesian-Nash equilibrium
22Iosif Androulidakis, Chris Basios A plain type of mobile attack: Compromise of user's privacy through a simple implementation method. Search on Bibsonomy COMSWARE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Ting-Ching Lin, Hsien-Chao Huang, Yueh-Min Huang A Parallax-Map-Based DIBR System to Compromise Visual Quality and Depth Resolution. Search on Bibsonomy PCM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
22Christoph Krauß, Frederic Stumpf, Claudia Eckert 0001 Detecting Node Compromise in Hybrid Wireless Sensor Networks Using Attestation Techniques. Search on Bibsonomy ESAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security, Sensor Network, Trusted Computing, Attestation
22Xiang Li 0006, Baoding Liu Compromise Chance Measure for Hybrid Events. Search on Bibsonomy FUZZ-IEEE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Jesus Molina, Xavier Chorin, Michel Cukier Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF SSH compromises, filesystem data, host intrusion detection systems, intrusion detection systems evaluation
22Hongfeng Zhu, Tianhua Liu, Jie Liu, Guiran Chang An Efficient Client-to-Client Password-Authenticated Key Exchange Resilient to Server Compromise. Search on Bibsonomy PRDC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
22Taekyoung Kwon 0002, Dong Hoon Lee 0002 Three-Party Password Authenticated Key Agreement Resistant to Server Compromise. Search on Bibsonomy WISA The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
22Cor J. Veenman, Marcel J. T. Reinders The Nearest Subclass Classifier: A Compromise between the Nearest Mean and Nearest Neighbor Classifier. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22Jacob W. Crandall, Michael A. Goodrich Learning to compete, compromise, and cooperate in repeated general-sum games. Search on Bibsonomy ICML The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
22David McSherry Similarity and Compromise. Search on Bibsonomy ICCBR The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Seung Bae Park, Moon Seol Kang, Sang Jun Lee Authenticated Key Exchange Protocol Secure against Offline Dictionary Attack and Server Compromise. Search on Bibsonomy GCC (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
22Ljiljana Brankovic, Jozef Sirán 2-Compromise Usability in 1-Dimensional Statistical Databases. Search on Bibsonomy COCOON The full citation details ... 2002 DBLP  DOI  BibTeX  RDF privacy in data mining, statistical database security, combinatorics, discrete mathematics
22Pieter S. Kritzinger, J. W. Graham A Theorem in the Theory of Compromise Merge Methods. Search on Bibsonomy J. ACM The full citation details ... 1974 DBLP  DOI  BibTeX  RDF
20Jesus Molina, Michel Cukier Evaluating Files to Audit for Detecting Intrusions in FileSystem Data. Search on Bibsonomy NCA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF filesystem data, attacker behavior, SSH compromise, Intrusion detection systems, honeypots, empirical analysis
20Shouhuai Xu, Moti Yung Expecting the Unexpected: Towards Robust Credential Infrastructure. Search on Bibsonomy Financial Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Credential infrastructures, key compromise, hit-and-run attack, hit-and-stick attack, digital signatures, PKI, insider attack
20Raphael C.-W. Phan, Wei-Chuen Yau, Bok-Min Goi Analysis of Two Pairing-Based Three-Party Password Authenticated Key Exchange Protocols. Search on Bibsonomy NSS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF three-party, cryptanalysis, provable security, attacks, Weil pairing, Password-authenticated key exchange, key compromise impersonation
20Fucai Zhou, Xiumei Liu, Hong Yan, Guiran Chang Cryptanalysis and Improvement of EC2C-PAKA Protocol in Cross-Realm. Search on Bibsonomy NPC Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF C2C-PAKA, password-compromise impersonate attack, Cross-Realm
20Chung-Wei Chen, Shiuh-Jeng Wang, Yuh-Ren Tsai Geometrically Reciprocal Authentication Scheme Using Shift Tangent Line in Ad Hoc Network Systems. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad-hoc network, authentication, security analysis, compromise
20Heinrich J. Rommelfanger Optimization of Fuzzy Objective Functions in Fuzzy (Multicriteria) Linear Programs - A Critical Survey. Search on Bibsonomy IFSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF fuzzy objective functions, fuzzy inequality relations, compromise solution, set of feasible solutions, Fuzzy linear programming
20Mary Mathews, Min Song 0002, Sachin Shetty, Rick McKenzie Detecting Compromised Nodes in Wireless Sensor Networks. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Sensor networks, algorithm, detection, intrusion, compromise
20Rituparna Chaki, Nabendu Chaki IDSX: A Cluster Based Collaborative Intrusion Detection Algorithm for Mobile Ad-Hoc Network. Search on Bibsonomy CISIM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compromise node, Internal intrusion, Phantom intrusion detection, Mobile ad hoc network, IDS
20Feng Li 0001, Jie Wu 0001 A probabilistic voting-based filtering scheme in wireless sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF probabilistic key assignment, voting method, wireless sensor networks, wireless communications, node compromise
20Wei-Chi Ku A hash-based strong-password authentication scheme without using smart cards. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF password-file compromise attack, strong password, user authentication, replay attack, denial-of-service attack
20Kyungah Shim The Risks of Compromising Secret Information. Search on Bibsonomy ICICS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Authenticated key agreement protocol, insider, known-key attack, key-compromise impersonation attack
20Poppy L. McLeod, Scott E. Elston Persuasive linguistic devices in anonymous vs. identified computer supported groups: an exploratory study. Search on Bibsonomy HICSS (4) The full citation details ... 1995 DBLP  DOI  BibTeX  RDF persuasive linguistic devices, anonymous computer supported groups, identified computer supported groups, jury decision-making task, character identities, factual information errors, compromise requests, persuasive arguments, groupware, human factors, cooperation, consensus, flexibility, group decision support systems, linguistics, polling, negotiation support systems, electronic communication, law administration
20G. D. Miller Programming Techniques: An algorithm for the probability of the union of a large number of events. Search on Bibsonomy Commun. ACM The full citation details ... 1968 DBLP  DOI  BibTeX  RDF mutually exclusive events, optimum, storage vs. time compromise, algorithm, probability, set union
19Gicheol Wang, Deokjai Choi, Daewook Kang A lightweight key renewal scheme for clustered sensor networks. Search on Bibsonomy ICUIMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF security, wireless sensor networks, key management
19Stephen S. Yau, Yin Yin A Privacy Preserving Repository for Data Integration across Data Sharing Services. Search on Bibsonomy IEEE Trans. Serv. Comput. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Chris Grier, Shuo Tang, Samuel T. King Secure Web Browsing with the OP Web Browser. Search on Bibsonomy SP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security, browser, web security
19Xiaolong Xue, Jinfeng Lu, Yaowu Wang, Qiping Shen 0001 A Relative Entropy Method for Improving Agent-Based Negotiation Efficiency of Collaborative Working in Construction Projects. Search on Bibsonomy CDVE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Agent, Negotiation, Collaborative working, Relative entropy
19Chengqing Zong, Mark Seligman Toward Practical Spoken Language Translation. Search on Bibsonomy Mach. Transl. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF User cooperation, Human factors engineering, Cooperative systems, Spoken Language Translation
19Sarit Kraus, Onn Shehory, Gilad Taase The Advantages of Compromising in Coalition Formation with Incomplete Information. Search on Bibsonomy AAMAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
19Liqun Chen 0002, Caroline Kudla Identity Based Authenticated Key Agreement Protocols from Pairings. Search on Bibsonomy CSFW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Dimitar Lakov, George Kirov On intelligent human intelligible routing. Search on Bibsonomy KES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
19Joseph F. Traub, Yechiam Yemini, Henryk Wozniakowski The Statistical Security of a Statistical Database. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1984 DBLP  DOI  BibTeX  RDF
19Mayer D. Schwartz, Dorothy E. Denning, Peter J. Denning Linear Queries in Statistical Databases. Search on Bibsonomy ACM Trans. Database Syst. The full citation details ... 1979 DBLP  DOI  BibTeX  RDF linear query, secure query functions, statical database, inference, confidentiality, data security, database security
19David Alan Hanson Data security. Search on Bibsonomy ACM Southeast Regional Conference The full citation details ... 1979 DBLP  DOI  BibTeX  RDF
16Wenchang Zou, Shu-Ping Wan, Jiu-Ying Dong Trust evolution based minimum adjustment consensus framework with dynamic limited compromise behavior for probabilistic linguistic large scale group decision-making. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Olivia Cannon, Ty Bondurant, Malindi Whyte, Arnd Scheel Shifting Consensus in a Biased Compromise Model. Search on Bibsonomy SIAM J. Appl. Dyn. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Roberto Sanchis 0001, Ignacio Peñarrocha A PID tuning approach to find the optimal compromise among robustness, performance and control effort: implementation in a free software tool. Search on Bibsonomy Int. J. Control The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Dávid Zajacek, Adriána Dunárová, Lukás Bucinský, Marek Steklác Compromise in Docking Power of Liganded Crystal Structures of Mpro SARS-CoV-2 Surpasses 90% Success Rate. Search on Bibsonomy J. Chem. Inf. Model. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Vincent Tan Framework and Classification of Indicator of Compromise for physics-based attacks. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Tianyang Chen, Peng Xu, Stjepan Picek, Bo Luo, Willy Susilo, Hai Jin 0001, Kaitai Liang The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Zhenjun Ming, Yuyu Luo, Guoxin Wang 0001, Yan Yan 0008, Janet K. Allen, Farrokh Mistree Designing self-organizing systems using surrogate models and the compromise decision support problem construct. Search on Bibsonomy Adv. Eng. Informatics The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Anastasios Papathanasiou, George Liontos, Georgios Paparis, Vasiliki Liagkou, Euripides Glavas BEC Defender: QR Code-Based Methodology for Prevention of Business Email Compromise (BEC) Attacks. Search on Bibsonomy Sensors The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
16Alexander Goldberg, Giulia Fanti, Nihar B. Shah Batching of Tasks by Users of Pseudonymous Forums: Anonymity Compromise and Protection. Search on Bibsonomy Proc. ACM Meas. Anal. Comput. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Mostapha Diss, Clinton Gubong Gassi, Issofa Moyouwou Social acceptability and the majoritarian compromise rule. Search on Bibsonomy Soc. Choice Welf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Atieh Mohammadkhani, Seyed Meysam Mousavi A new last aggregation fuzzy compromise solution approach for evaluating sustainable third-party reverse logistics providers with an application to food industry. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Zhiqiang Liao, Huchang Liao, Xinli Zhang A contextual Choquet integral-based preference learning model considering both criteria interactions and the compromise effects of decision-makers. Search on Bibsonomy Expert Syst. Appl. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Wenchao Jiang, Xiaolei Yang, Yuqi Zang, Xumei Yuan, Rui Liu Picture hesitant fuzzy grey compromise relational bidirectional projection method with application in multi-attribute recommendation. Search on Bibsonomy J. Intell. Fuzzy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
16Engla Rencelj Ling, Mathias Ekstedt Estimating Time-To-Compromise for Industrial Control System Attack Techniques Through Vulnerability Data. Search on Bibsonomy SN Comput. Sci. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2279 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license