Filter your results
- 4
- 4
- 4
- 2
- 1
- 1
- 1
- 1
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
4 results
|
|
sorted by
|
|
Leveraging UML for Security Engineering and Enforcement in a Collaboration on Duty and Adaptive Workflow Model That Extends NIST RBAC23th Data and Applications Security (DBSec), Jul 2011, Richmond, VA, United States. pp.293-300, ⟨10.1007/978-3-642-22348-8_25⟩
Conference papers
hal-01586593v1
|
||
|
MetaExtractor: A System for Metadata Extraction from Structured Data Sources1st Cross-Domain Conference and Workshop on Availability, Reliability, and Security in Information Systems (CD-ARES), Sep 2013, Regensburg, Germany. pp.84-99
Conference papers
hal-01506797v1
|
||
|
Participatory Design in Practice15th Human-Computer Interaction (INTERACT), Sep 2015, Bamberg, Germany. pp.518-525, ⟨10.1007/978-3-319-22698-9_35⟩
Conference papers
hal-01609420v1
|
||
|
Spanish Twitter Data Used as a Source of Information About Consumer Food Choice2nd International Cross-Domain Conference for Machine Learning and Knowledge Extraction (CD-MAKE), Aug 2018, Hamburg, Germany. pp.134-146, ⟨10.1007/978-3-319-99740-7_9⟩
Conference papers
hal-02060053v1
|