Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 54 matches
- 2003
- Norio Adachi, Yuichi Komano, Satoshi Aoki, Kazuo Ohta:
The Security Problems of Rivest and Shamir's PayWord Scheme. CEC 2003: 20-23 - Vikas Agarwal, Neeran M. Karnik, Arun Kumar:
Metering and Accounting for Composite e-Services. CEC 2003: 35-39 - Mikhail J. Atallah, Hicham G. Elmongui, Vinayak Deshpande, Leroy B. Schwarz:
Secure Supply-Chain Protocols. CEC 2003: 293-302 - Mikhail J. Atallah, Jiangtao Li:
Enhanced Smart-card based License Management. CEC 2003: 111-119 - Andrea Bonaccorsi, Bruno Codenotti, Nicola Dimitri, Mauro Leoncini, Giovanni Resta, Paolo Santi:
Generating Realistic Data Sets for Combinatorial Auctions. CEC 2003: 331-338 - Sviatoslav B. Braynov, Tuomas Sandholm:
Auctions with Untrustworthy Bidders. CEC 2003: 363- - Andrew Byde:
Applying Evolutionary Game Theory to Auction Mechanism Design. CEC 2003: 347-354 - Andrew Byde, Michael Yearworth, Kay-Yut Chen, Claudio Bartolini:
AutONA: A System for Automated Multiple 1-1 Negotiation. CEC 2003: 59-67 - Per Carlsson, Arne Andersson, Fredrik Ygge:
A Tractable Mechanism for Time Dependent Markets. CEC 2003: 31-34 - Kuo-Ming Chao, Muhammad Younas, Rachid Anane, Chen-Fang Tsai, Von-Wun Soo:
Degree of Satisfaction in Agent Negotiation. CEC 2003: 68-75 - Giorgos Cheliotis, Chris Kenyon:
Autonomic Economics. CEC 2003: 120-127 - Qiming Chen, Meichun Hsu, Vinkesh Mehta:
How Public Conversation Management Integrated with Local Business Process Management. CEC 2003: 199-206 - David L. Cohn:
Building and Managing Adaptive e-Business Solution Infrastructure. CEC 2003: 3- - Anwitaman Datta, Manfred Hauswirth, Karl Aberer:
Beyond "web of trust": Enabling P2P E-commerce. CEC 2003: 303-312 - Jingzhi Guo, Chengzheng Sun:
Concept Exchange: Constructing Interoperable Electronic Product Catalogues in an Emergent Environment. CEC 2003: 165-172 - John V. Harrison, Anna Andrusiewicz:
An Emerging Marketplace for Digital Advertising Based on Amalgamated Digital Signage Networks. CEC 2003: 149-156 - Patrick C. K. Hung, Guang-Sha Qiu:
Implementing Conflict of Interest Assertions for Web Services Matchmaking Process. CEC 2003: 373-380 - Jun-Jang Jeng, Henry Chang, Jen-Yao Chung:
A Policy Framework for Business Activity Management. CEC 2003: 238-245 - Radu Jurca, Boi Faltings:
An Incentive Compatible Reputation Mechanism. CEC 2003: 285-292 - S. Kameshwaran, Y. Narahari:
Trade Determination in Multi-Attribute Exchanges. CEC 2003: 173-180 - Jin Baek Kim, Arie Segev:
A Framework for Dynamic eBusiness Negotiation Processes. CEC 2003: 84-91 - Haifei Li, Jun-Jang Jeng, Jen-Yao Chung:
Commitment-Based Approach to Categorizing, Organizing and Executing Negotiation Processes. CEC 2003: 12-15 - Raymund J. Lin, Seng-cho Timothy Chou:
Mediating a Bilateral Multi-Issue Negotiation. CEC 2003: 76-83 - Te-Kai Liu, Amir Behroozi, Santhosh Kumaran:
A Performance Model for a Business Process Integration Middleware. CEC 2003: 191-198 - Zhen Liu, Laura Wynter, Cathy H. Xia:
Usage-based versus flat pricing for e-business services with differentiated QoS. CEC 2003: 355-362 - Carolyn McGregor, Josef Schiefer:
A Framework for Analyzing and Measuring Business Performance with Web Services. CEC 2003: 405- - Carlos Molina-Jiménez, Santosh K. Shrivastava, Ellis Solaiman, John P. Warne:
Contract Representation for Run-time Monitoring and Enforcement. CEC 2003: 103-110 - Jose Antonio Onieva, Jianying Zhou, Mildrey Carbonell, Javier López:
Intermediary Non-repudiation Protocols. CEC 2003: 207-214 - Jonghun Park, Ki-Seok Choi:
Design of an Efficient Tentative Hold Protocol for Automated Coordination of Multi-Business Transactions. CEC 2003: 215-222 - Vishnu S. Pendyala, Simon S. Y. Shim, Jerry Z. Gao:
An XML Based Framework for Enterprise Application Integration. CEC 2003: 128-135
skipping 24 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-20 04:46 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint