Christian Schaefer

According to our database1, Christian Schaefer authored at least 34 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
INTEND: Human-Like Intelligence for Intent-Based Data Operations in the Cognitive Computing Continuum.
Proceedings of the Companion Proceedings of the 8th International Joint Conference on Rules and Reasoning co-located with 20th Reasoning Web Summer School (RW 2024) and 16th DecisionCAMP 2024 as part of Declarative AI 2024, 2024


2021
Signals for Venture Performance After Initial Coin Offerings: the Role of Proceeds Allocation to Marketing and Market Orientation.
Proceedings of the 42nd International Conference on Information Systems, 2021

A Signaling Perspective on Token dispersion and Venture Performance in initial Coin Offerings.
Proceedings of the 29th European Conference on Information Systems, 2021

2019
Transparent Logging with Hyperledger Fabric.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2019

2015
Enabling Privacy Mechanisms in Apache Storm.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2013
Homology-based inference sets the bar high for protein function prediction.
BMC Bioinform., 2013

2012
SNPdbe: constructing an nsSNP functional impacts database.
Bioinform., 2012

2010
Runtime monitoring for next generation Java ME platform.
Comput. Secur., 2010

Protein secondary structure appears to be robust under <i>in silico</i> evolution while protein disorder appears not to be.
Bioinform., 2010

2009
What the heck is this application doing? - A security-by-contract architecture for pervasive services.
Comput. Secur., 2009

Usage Control Policy Enforcement in OpenOffice.org and Information Flow.
Proceedings of the Information Security South Africa Conference 2009, 2009

Formal Analyses of Usage Control Policies.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Usage Control Enforcement: Present and Future.
IEEE Secur. Priv., 2008

Enhancing Java ME Security Support with Resource Usage Monitoring.
ERCIM News, 2008

Policy Evolution in Distributed Usage Control.
Proceedings of the 4th International Workshop on Security and Trust Management, 2008

Selling multimedia resources in ad hoc networks.
IEEE Commun. Mag., 2008

A Runtime Monitoring Environment for Mobile Java.
Proceedings of the First International Conference on Software Testing Verification and Validation, 2008

Evidence Gathering for Remuneration of Shared Connections.
Proceedings of the Sixth Annual Conference on Communication Networks and Services Research (CNSR 2008), 2008

Mechanisms for usage control.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

2007
Usage Control Reference Monitor Architecture.
Proceedings of the Third International Workshop on Security, 2007

A Security-by-Contract Architecture for Pervasive Services.
Proceedings of the Third International Workshop on Security, 2007

DUKE - Distributed Usage Control Enforcement.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Monitors for Usage Control.
Proceedings of the Trust Management, 2007

A Policy Language for Distributed Usage Control.
Proceedings of the Computer Security, 2007

2006
Diameter-based accounting management for wireless services.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Accounting management for session mobility in an ubiquitous environment.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

Usage Control Requirements in Mobile and Ubiquitous Computing Applications.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

2005
Generic accounting configuration management for heterogeneous mobile networks.
Proceedings of the 3rd ACM International Workshop on Wireless Mobile Applications and Services on WLAN Hotspots, 2005

Service-oriented Accounting Configuration Management based on Diameter.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

POSSET - Policy-Driven Secure Session Transfer.
Proceedings of the Information Security Practice and Experience, 2005

2002
Subjective quality assessment for multiplayer real-time games.
Proceedings of the 1st Workshop on Network and System Support for Games, 2002

2001
Entwurf eines anthropomorphen Roboterarms: Kinematik, Arbeitsraumanalyse, Softwaremodellierung
PhD thesis, 2001

Application of ART2 Networks and Self-Organizing Maps to Collaborative Filtering.
Proceedings of the Hypermedia: Openness, 2001


  Loading...