default search action
Philip Robinson
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i1]Douwe J. Spaanderman, Matthew Marzetti, Xinyi Wan, Andrew F. Scarsbrook, Philip Robinson, Edwin H. G. Oei, Jacob J. Visser, Robert Hemke, Kirsten van Langevelde, David F. Hanff, Geert J. L. H. van Leenders, Cornelis Verhoef, Dirk J. Gruühagen, Wiro J. Niessen, Stefan Klein, Martijn P. A. Starmans:
AI in radiological imaging of soft-tissue and bone tumours: a systematic review evaluating against CLAIM and FUTURE-AI guidelines. CoRR abs/2408.12491 (2024)
2010 – 2019
- 2014
- [j5]Bartosz Belter, Juan Rodríguez Martinez, José Ignacio Aznar, Jordi Ferrer Riera, Luis Miguel Contreras Murillo, Monika Antoniak-Lewandowska, Matteo Biancani, Jens Buysse, Chris Develder, Yuri Demchenko, Pasquale Donadio, Dimitra Simeonidou, Reza Nejabati, Shuping Peng, Lukasz Drzewiecki, Eduard Escalona, Joan Antoni García Espín, Steluta Gheorghiu, Mattijs Ghijsen, Jakub Gutkowski, Giada Landi, Gino Carrozzo, Damian Parniewicz, Philip Robinson, Sebastien Soudan:
The GEYSERS optical testbed: A platform for the integration, validation and demonstration of cloud-based infrastructure services. Comput. Networks 61: 197-216 (2014) - [j4]Barry McLarnon, Philip Robinson, Peter Milligan, Paul Sage:
An Iterative Approach to Trustable Systems Management Automation and Fault Handling. J. Netw. Syst. Manag. 22(3): 366-395 (2014) - 2013
- [j3]Justin L. Rice, Vir V. Phoha, Philip Robinson:
Using Mussel-Inspired Self-Organization and Account Proxies to Obfuscate Workload Ownership and Placement in Clouds. IEEE Trans. Inf. Forensics Secur. 8(6): 963-972 (2013) - [c32]Anna Tzanakaki, Sergi Figuerola, Joan Antoni García Espín, Dimitra Simeonidou, Nicola Ciulli, Philip Robinson, Juan Rodríguez Martinez, Giada Landi, Bartosz Belter, Pascale Vicat-Blanc, Matteo Biancani, Cees de Laat, Eduard Escalona, Artur Binczewski:
The GEYSERS Concept and Major Outcomes. Future Internet Assembly 2013: 346-349 - [c31]Alexandru-Florian Antonescu, Andre S. Gomes, Philip Robinson, Torsten Braun:
SLA-driven predictive orchestration for distributed cloud-based mobile services. ICC Workshops 2013: 738-743 - [c30]Alexandru-Florian Antonescu, Philip Robinson, Torsten Braun:
Dynamic SLA management with forecasting using multi-objective optimization. IM 2013: 457-463 - 2012
- [c29]Alexandru-Florian Antonescu, Matthias Thoma, Philip Robinson:
Service level management convergence for future network enterprise platforms. Future Network & Mobile Summit 2012: 1-9 - [c28]Alexandru-Florian Antonescu, Philip Robinson, Luis Miguel Contreras Murillo, José I. Aznar, Sebastien Soudan, Fabienne Anhalt, Joan Antoni García Espín:
Towards Cross Stratum SLA Management with the GEYSERS Architecture. ISPA 2012: 527-533 - [c27]Alexandru-Florian Antonescu, Philip Robinson, Torsten Braun:
Dynamic Topology Orchestration for Distributed Cloud-Based Applications. NCCA 2012: 116-123 - [p1]Florian Marienfeld, Edzard Höfig, Michele Bezzi, Matthias Flügge, Jonas Pattberg, Gabriel Serme, Achim D. Brucker, Philip Robinson, Stephen Dawson, Wolfgang Theilmann:
Service Levels, Security, and Trust. Handbook of Service Description 2012: 295-326 - 2011
- [c26]Philip Robinson, Carmelo Ragusa:
Taxonomy and Requirements Rationalization for Infrastructure in Cloud-based Software Testing. CloudCom 2011: 454-461 - [c25]Eduard Escalona, Shuping Peng, Reza Nejabati, Dimitra Simeonidou, Joan Antoni García Espín, Jordi Ferrer Riera, Sergi Figuerola, Giada Landi, Nicola Ciulli, Javier Jiménez, Bartosz Belter, Yuri Demchenko, Cees de Laat, Xiaomin Chen, Admela Yukan, Sebastien Soudan, Pascale Vicat-Blanc, Jens Buysse, Marc De Leenheer, Chris Develder, Anna Tzanakaki, Philip Robinson, Marc Brogle, Thomas Michael Bohnert:
GEYSERS: A novel architecture for virtualization and co-provisioning of dynamic optical networks and IT services. Future Network & Mobile Summit 2011: 1-8 - [c24]Maik A. Lindner, Fiona McDonald, Barry McLarnon, Philip Robinson:
Towards automated business-driven indication and mitigation of VM sprawl in Cloud supply chains. Integrated Network Management 2011: 1062-1065 - [c23]Barry McLarnon, Philip Robinson, Peter Milligan, Paul Sage:
Introducing automated management through iteratively increased automation and indicators. Integrated Network Management 2011: 1116-1121 - 2010
- [c22]Sebastian Herden, André Zwanziger, Philip Robinson:
Declarative application deployment and change management. CNSM 2010: 126-133 - [c21]Benjamin Aziz, Alvaro Arenas, Ian Johnson, Matej Artac, Ales Cernivec, Philip Robinson:
Management of Security Policies in Virtual Organisations. SECRYPT 2010: 467-477 - [c20]Maik A. Lindner, Philip Robinson, Barry McLarnon, Fiona McDonald:
The Bullwhip Effect and VM Sprawl in the Cloud Supply Chain. ServiceWave Workshops 2010: 26-37
2000 – 2009
- 2009
- [j2]Florian Kerschbaum, Philip Robinson:
Security architecture for virtual organizations of business web services. J. Syst. Archit. 55(4): 224-232 (2009) - 2007
- [c19]Erica Y. Yang, Brian Matthews, Amit D. Lakhani, Yvon Jégou, Christine Morin, Oscar David Sánchez, Carsten Franke, Philip Robinson, Adolf Hohl, Bernd Scheuermann, Daniel Vladusic, Haiyan Yu, An Qin, Rubao Lee, Erich Focht, Massimo Coppola:
Virtual Organization Management in XtreemOS: an Overview. CoreGRID 2007: 73-82 - [c18]Philip Robinson:
Extensible Security Patterns. DEXA Workshops 2007: 729-733 - [c17]Carsten Franke, Adolf Hohl, Philip Robinson, Bernd Scheuermann:
On Business Grid Demands and Approaches. GECON 2007: 124-135 - [c16]Florian Kerschbaum, Rafael Deitos, Philip Robinson:
Securing VO Management. TrustBus 2007: 14-23 - 2006
- [c15]Philip Robinson, Florian Kerschbaum, Andreas Schaad:
From Business Process Choreography to Authorization Policies. DBSec 2006: 297-309 - [c14]Florian Kerschbaum, Jochen Haller, Yücel Karabulut, Philip Robinson:
PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation. iTrust 2006: 193-205 - [c13]Rafael Deitos, Florian Kerschbaum, Philip Robinson:
A comprehensive security architecture for dynamic, web service based virtual organizations for businesses. SWS 2006: 103-104 - [c12]Yücel Karabulut, Florian Kerschbaum, Fabio Massacci, Philip Robinson, Artsiom Yautsiukhin:
Security and Trust in IT Business Outsourcing: a Manifesto. STM 2006: 47-58 - 2005
- [c11]Philip Robinson, Yücel Karabulut, Jochen Haller:
Dynamic virtual organization management for service oriented enterprise applications. CollaborateCom 2005 - [c10]Jochen Haller, Yücel Karabulut, Philip Robinson:
Security Controls in Collaborative Business Processes. PRO-VE 2005: 247-254 - [c9]Philip Robinson, Christian Schaefer, Thomas Walter:
POSSET - Policy-Driven Secure Session Transfer. ISPEC 2005: 13-24 - 2004
- [j1]Thomas Walter, Laurent Bussard, Yves Roudier, Jochen Haller, Roger Kilian-Kehr, Joachim Posegga, Philip Robinson:
Secure mobile business applications - framework, architecture and implementation. Inf. Secur. Tech. Rep. 9(4): 6-21 (2004) - [c8]Philip Robinson, Jochen Haller, Roger Kilian-Kehr:
Towards Trust Relationship Planning for Virtual Organizations. iTrust 2004: 355-361 - [c7]Christian Decker, Michael Beigl, Albert Krohn, Philip Robinson, Uwe Kubach:
eSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity. Pervasive 2004: 254-268 - [c6]Thomas Walter, Laurent Bussard, Philip Robinson, Yves Roudier:
Security and Trust Issues in Ubiquitous Environments - The Business-to-Employee Dimension. SAINT Workshops 2004: 696-701 - [c5]Albert Krohn, Michael Beigl, Christian Decker, Uwe Kochendörfer, Philip Robinson, Tobias Zimmer:
Inexpensive and Automatic Calibration for Acceleration Sensors. UCS 2004: 245-258 - 2003
- [c4]Philip Robinson, Jochen Haller:
Revisiting the Firewall Abolition Act. HICSS 2003: 206 - [c3]Michael Beigl, Albert Krohn, Tobias Zimmer, Christian Decker, Philip Robinson:
AwareCon: Situation Aware Context Communication. UbiComp 2003: 132-139 - [c2]Jochen Haller, Philip Robinson, Thomas Walter, Roger Kilian-Kehr:
Framework and Architecture for Secure Mobile Business Applications. SEC 2003: 413-416 - [c1]Philip Robinson, Michael Beigl:
Trust Context Spaces: An Infrastructure for Pervasive Security in Context-Aware Environments. SPC 2003: 157-172
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint