The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Christian Schaefer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Philip Robinson, Christian Schaefer, Thomas Walter
    POSSET - Policy-Driven Secure Session Transfer. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2005, pp:13-24 [Conf]
  2. Frank Eyermann, Peter Racz, Burkhard Stiller, Christian Schaefer, Thomas Walter
    Service-oriented Accounting Configuration Management based on Diameter. [Citation Graph (0, 0)][DBLP]
    LCN, 2005, pp:621-623 [Conf]
  3. Christian Schaefer, Thomas Enderes, Hartmut Ritter, Martina Zitterbart
    Subjective quality assessment for multiplayer real-time games. [Citation Graph (0, 0)][DBLP]
    NETGAMES, 2002, pp:74-78 [Conf]
  4. Guntram Gräf, Christian Schaefer
    Application of ART2 Networks and Self-Organizing Maps to Collaborative Filtering. [Citation Graph (0, 0)][DBLP]
    OHS-7/SC-3/AH-3, 2001, pp:296-309 [Conf]
  5. Frank Eyermann, Peter Racz, Burkhard Stiller, Christian Schaefer, Thomas Walter
    Generic accounting configuration management for heterogeneous mobile networks. [Citation Graph (0, 0)][DBLP]
    WMASH, 2005, pp:46-55 [Conf]
  6. Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
    Usage Control Requirements in Mobile and Ubiquitous Computing Applications. [Citation Graph (0, 0)][DBLP]
    ICSNC, 2006, pp:27- [Conf]
  7. Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter
    A Policy Language for Distributed Usage Control. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2007, pp:531-546 [Conf]
  8. Manuel Hilty, Alexander Pretschner, Christian Schaefer, Thomas Walter
    DUKE - Distributed Usage Control Enforcement. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:275- [Conf]
  9. Srisakul Thakolsri, Christian Schaefer, Thomas Walter, Wolfgang Kellerer
    Accounting management for session mobility in an ubiquitous environment. [Citation Graph (0, 0)][DBLP]
    IWCMC, 2006, pp:311-316 [Conf]

  10. Formal Analyses of Usage Control Policies. [Citation Graph (, )][DBLP]


  11. Mechanisms for usage control. [Citation Graph (, )][DBLP]


  12. Evidence Gathering for Remuneration of Shared Connections. [Citation Graph (, )][DBLP]


  13. Protein secondary structure appears to be robust under in silico evolution while protein disorder appears not to be. [Citation Graph (, )][DBLP]


  14. Runtime monitoring for next generation Java ME platform. [Citation Graph (, )][DBLP]


  15. What the heck is this application doing? - A security-by-contract architecture for pervasive services. [Citation Graph (, )][DBLP]


  16. Policy Evolution in Distributed Usage Control. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002