Filter your results
- 5
- 5
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 5
- 5
- 1
- 2
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
A Methodological Approach for Ontologising and Aligning Health Level Seven (HL7) Applications1st Availability, Reliability and Security (CD-ARES), Aug 2011, Vienne, Austria. pp.102-117, ⟨10.1007/978-3-642-23300-5_9⟩
Conference papers
hal-01240094v1
|
||
|
Authorization Policies for Materialized Views27th Information Security and Privacy Conference (SEC), Jun 2012, Heraklion, Crète, Greece. pp.525-530, ⟨10.1007/978-3-642-30436-1_43⟩
Conference papers
hal-01352972v1
|
||
|
Inference Leakage Detection for Authorization Policies over RDF Data29th IFIP Annual Conference on Data and Applications Security and Privacy (DBSEC), Jul 2015, Fairfax, VA, United States. pp.346-361, ⟨10.1007/978-3-319-20810-7_24⟩
Conference papers
hal-01745813v1
|
||
|
Dynamic Distributed Job-Shop Scheduling Problem Consisting of Reconfigurable Machine ToolsIFIP International Conference on Advances in Production Management Systems (APMS), Aug 2020, Novi Sad, Serbia. pp.460-468, ⟨10.1007/978-3-030-57997-5_53⟩
Conference papers
hal-03635652v1
|
||
|
Developing a Bi-objective Model to Configure a Scalable Manufacturing Line Considering Energy ConsumptionIFIP International Conference on Advances in Production Management Systems, Sep 2021, Nantes, France. pp.363-371, ⟨10.1007/978-3-030-85874-2_38⟩
Conference papers
hal-03626190v1
|