Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
37217
search results - page 89 / 7444
»
is 2010
Sort
relevance
views
votes
recent
update
View
thumb
title
95
Voted
ZEUS
2010
181
views
Communications
»
more
ZEUS 2010
»
3D-Darstellung von Ressourcenattributen bei der Geschäftsprozessmodellierung
15 years 5 months ago
Download
sunsite.informatik.rwth-aachen.de
Daniel Eichhorn, Agnes Koschmider
claim paper
Read More »
115
Voted
CMS
2003
119
views
Communications
»
more
CMS 2003
»
AUTHMAC_DH: A New Protocol for Authentication and Key Distribution
15 years 5 months ago
Download
security.polito.it
Heba Kamal Aslan
claim paper
Read More »
113
Voted
CMS
2003
127
views
Communications
»
more
CMS 2003
»
Multipoint-to-Multipoint Secure-Messaging with Threshold-Regulated Authorisation and Sabotage Detection
15 years 5 months ago
Download
security.polito.it
Alwyn Goh, David Ngo Chek Ling
claim paper
Read More »
110
Voted
CMS
2003
104
views
Communications
»
more
CMS 2003
»
Privacy and Trust in Distributed Networks
15 years 5 months ago
Download
security.polito.it
Thomas Rössler, Arno Hollosi
claim paper
Read More »
122
Voted
AMW
2009
154
views
Knowledge Management
»
more
AMW 2009
»
From Database Repair Programs to Consistent Query Answering in Classical Logic (extended abstract)
15 years 4 months ago
Download
sunsite.informatik.rwth-aachen.de
Leopoldo E. Bertossi
claim paper
Read More »
« Prev
« First
page 89 / 7444
Last »
Next »