|
Search the dblp DataBase
Marc Donner:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Marc Donner, David Nochin, Dennis Shasha, Wendy Walasek
Algorithms and Experience in Increasing the Intelligibility and Hygiene of Access Control in Large Organizations. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:195-316 [Conf]
- David Notkin, Marc Donner, Michael D. Ernst, Michael M. Gorlick, E. James Whitehead Jr.
Panel: Perspectives on Software Engineering. [Citation Graph (0, 0)][DBLP] ICSE, 2001, pp:699-702 [Conf]
- Marc Donner
AI Bites Man? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:1, pp:63-66 [Journal]
- Marc Donner
Post-Apocalypse Now. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:2, pp:53-55 [Journal]
- Marc Donner
Toward a Security Ontology. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:3, pp:6-7 [Journal]
- Marc Donner
Hey, Robot! [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:3, pp:51-55 [Journal]
- Marc Donner
The Girl with No Eyes. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2003, v:1, n:4, pp:60-64 [Journal]
- Marc Donner
Die Gedanken Sind Frei. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:1, pp:53-55 [Journal]
- Marc Donner
Hacking the Best-Seller List. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:2, pp:51-53 [Journal]
- Marc Donner
From the Editors: Whose Data Are These, Anyway? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:5-6 [Journal]
- Marc Donner
Cult Classics. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:3, pp:66-68 [Journal]
- Marc Donner
From the Editors: A Witty Lesson. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:5- [Journal]
- Marc Donner
Deus Est Machina. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:4, pp:51-53 [Journal]
- Marc Donner
Jennifer Government. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:5, pp:57-59 [Journal]
- Marc Donner
Use the Force, Luke! [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2004, v:2, n:6, pp:53-55 [Journal]
- Marc Donner
What's in a Name? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:2, pp:4-5 [Journal]
- Marc Donner
A Young Geek's Fancy Turns to...Science Fiction? [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:3, pp:58-60 [Journal]
- Marc Donner
There Ain't No Inside, There Ain't No Outside... [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2005, v:3, n:5, pp:4-5 [Journal]
- Marc Donner
The Impending Debate. [Citation Graph (0, 0)][DBLP] IEEE Security & Privacy, 2006, v:4, n:2, pp:4-5 [Journal]
Search in 0.082secs, Finished in 0.084secs
|