Ken Barker

According to our database1, Ken Barker authored at least 146 papers between 1982 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
The Privacy Policy Permission Model: A Unified View of Privacy Policies.
Trans. Data Priv., 2021

Don't fool yourself with Forward Privacy, Your queries STILL belong to us!
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Corrections to "A Social Crowdsourcing Community Case Study: Interaction Patterns, Evolution, and Factors That Affect Them".
IEEE Trans. Comput. Soc. Syst., 2020

A Social Crowdsourcing Community Case Study: Interaction Patterns, Evolution, and Factors That Affect Them.
IEEE Trans. Comput. Soc. Syst., 2020

Contextual Privacy Policy Modeling in IoT.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2018
Structure of Crowdsourcing Community Networks.
IEEE Trans. Comput. Soc. Syst., 2018

Dynamic Visual Analytics for Elicitation Meetings with ELICA.
Proceedings of the 26th IEEE International Requirements Engineering Conference, 2018

ELICA: An Automated Tool for Dynamic Extraction of Requirements Relevant Information.
Proceedings of the 5th International Workshop on Artificial Intelligence for Requirements Engineering, 2018

Towards Quantifying Behaviour in Social Crowdsourcing Communities.
Proceedings of the Sixth AAAI Conference on Human Computation and Crowdsourcing, 2018

Two Sides of the Same Coin: Software Developers' Perceptions of Task Switching and Task Interruption.
Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018

Task Interruption in Software Development Projects: What Makes some Interruptions More Disruptive than Others?
Proceedings of the 22nd International Conference on Evaluation and Assessment in Software Engineering, 2018

2017
Inferring Time when People Visit a Location Using Social Network Data.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

2016
Managing dimensionality in data privacy anonymization.
Knowl. Inf. Syst., 2016

Privacy-preservation in the integration and querying of multidimensional data models.
Proceedings of the 14th Annual Conference on Privacy, Security and Trust, 2016

2015
Privacy-preserving big data publishing.
Proceedings of the 27th International Conference on Scientific and Statistical Database Management, 2015

Big Graph Privacy.
Proceedings of the Workshops of the EDBT/ICDT 2015 Joint Conference (EDBT/ICDT), 2015

Privacy Protection or Data Value: Can We Have Both?
Proceedings of the Big Data Analytics - 4th International Conference, 2015

2014
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies.
ACM Trans. Inf. Syst. Secur., 2014

Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy: An Extended Version.
CoRR, 2014

Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

A Model for Privacy Compromisation Value.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

2013
Redeem with privacy (RWP): privacy protecting framework for geo-social commerce.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Automatic Identification of Hexagonal Pattern Artifacts in Radio Astronomical Surveys.
Proceedings of the 13th IEEE International Conference on Data Mining Workshops, 2013

A privacy preserving model bridging data provider and collector preferences.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
Decentralised privacy preservation in social networks.
Int. J. Bus. Inf. Syst., 2012

Privacy Consensus in Anonymization Systems via Game Theory.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

An information theoretic privacy and utility measure for data sanitization mechanisms.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
An experimental comparison of fuzzy logic and analytic hierarchy process for medical decision support systems.
Comput. Methods Programs Biomed., 2011

Quantifying Privacy Violations.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

Data preprocessing for distance-based unsupervised Intrusion Detection.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Delegation of access rights in a privacy preserving access control model.
Proceedings of the Ninth Annual Conference on Privacy, Security and Trust, 2011

Thematic data extraction from Web for GIS and applications.
Proceedings of the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services, 2011

Capturing P3P semantics using an enforceable lattice-based structure.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

Towards defining semantic foundations for purpose-based privacy policies.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Extraction of geospatial information on the Web for GIS applications.
Proceedings of the 10th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2011

2010
Attractive Interface for XML: Convincing Naive Users to Go Online.
Proceedings of the Soft Computing in XML Data Management, 2010

Extending SQL to Support Privacy Policies.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

Expert systems and uncertainty in medical diagnosis: a proposal for fuzzy-ANP hybridisation.
Int. J. Medical Eng. Informatics, 2010

Programming-by-Example Meets the Semantic Web: Using Ontologies and Web Services to Close the Semantic Gap.
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2010

Analysis of social networking privacy policies.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

Helping Biologists Effectively Build Workflows, without Programming.
Proceedings of the Data Integration in the Life Sciences, 7th International Conference, 2010

"Valuing" Privacy While Exposing Data Utility.
Proceedings of the Data Security and Security Data, 2010

2009
Performance evaluation of different replica placement algorithms.
Int. J. Grid Util. Comput., 2009

Mining online shopping patterns and communities.
Proceedings of the iiWAS'2009, 2009

Text summarization techniques: SVM versus neural networks.
Proceedings of the iiWAS'2009, 2009

Privacy FP-Tree.
Proceedings of the Database Systems for Advanced Applications, 2009

A Lattice-Based Privacy Aware Access Control Model.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A Model for Privacy Policy Visualization.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Answering Multiple-Item Queries in Data Broadcast Systems.
Proceedings of the Dataspace: The Final Frontier, 2009

A Data Privacy Taxonomy.
Proceedings of the Dataspace: The Final Frontier, 2009

Twins (1): Extending SQL to Support Corporation Privacy Policies in Social Networks.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

SQL Privacy Model for Social Networks.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2008
Alternative Method for Incrementally Constructing the FP-Tree.
Proceedings of the Intelligent Techniques and Tools for Novel System Architectures, 2008

Replica selection strategies in data grid.
J. Parallel Distributed Comput., 2008

Replica Placement Strategies in Data Grid.
J. Grid Comput., 2008

Controlling Inference: Avoiding P-level Reduction During Analysis.
J. Res. Pract. Inf. Technol., 2008

A Dynamic Ontology Mapping Architecture for a Grid Database System.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

Grid Scheduling Hub.
Proceedings of the Fourth International Conference on Semantics, Knowledge and Grid, 2008

P4A: A New Privacy Model for XML.
Proceedings of the Data and Applications Security XXII, 2008

2007
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening.
J. Netw. Comput. Appl., 2007

Semantic Interoperability Between Relational Database Systems.
Proceedings of the Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), 2007

An insertion strategy for a two-dimensional spatial access method.
Proceedings of the ICEIS 2007, 2007

XML schema structural equivalence.
Proceedings of the ICEIS 2007, 2007

A Cost Model for Storing and Retrieving Data in Wireless Sensor Networks.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

Performance Analysis of a Replica Selection Strategy in Grid Environment Tuned with Replica Placement Decisions.
Proceedings of the 2007 International Conference on Grid Computing & Applications, 2007

Study of Different Replica Placement and Maintenance Strategies in Data Grid.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

A Predictive Technique for Replica Selection in Grid Environment.
Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2007), 2007

2006
A complex adaptive system based on squirrels behaviors for distributed resource allocation.
Web Intell. Agent Syst., 2006

VIREX: visual relational to XML conversion tool.
J. Vis. Lang. Comput., 2006

Genetic algorithms based approach to database vertical partition.
J. Intell. Inf. Syst., 2006

Combining advantages of new chromosome representation scheme and multi-objective genetic algorithms for better clustering.
Intell. Data Anal., 2006

A comprehensive survey of numeric and symbolic outlier mining techniques.
Intell. Data Anal., 2006

VIREX: Interactive Approach for Database Querying and Integration by Re-engineering Relational Data into XML.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Efficient Data Harvesting for Tracing Phenomena in Sensor Networks.
Proceedings of the 18th International Conference on Scientific and Statistical Database Management, 2006

Update-Aware Scheduling Algorithms for Hierarchical Data Dissemination Systems.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Effective Clustering of High-Dimensional Data.
Proceedings of the 6th Industrial Conference on Data Mining, Poster Proceedings, 2006

Searching through spatial relationships using the 2DR-tree.
Proceedings of the Tenth IASTED International Conference on Internet and Multimedia Systems and Applications (IMSA 2006), 2006

Constructing Complete FP-Tree for Incremental Mining of Frequent Patterns in Dynamic Databases.
Proceedings of the Advances in Applied Artificial Intelligence, 2006

Clustering by Integrating Multi-objective Optimization with Weighted K-Means and Validity Analysis.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2006

Effective Dynamic Replica Maintenance Algorithm for the Grid Environment.
Proceedings of the Advances in Grid and Pervasive Computing, 2006

Discovering Accurate and Interesting Classification Rules Using Genetic Algorithm.
Proceedings of the 2006 International Conference on Data Mining, 2006

Replica Placement Design with Static Optimality and Dynamic Maintainability.
Proceedings of the Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGrid 2006), 2006

RDB2ONT: A Tool for Generating OWL Ontologies From Relational Database Systems.
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006

RA: An XML Schema Reduction Algorithm.
Proceedings of the ADBIS 2006, 2006

2005
Integrating Multi-Objective Genetic Algorithm and Validity Analysis for Locating and Ranking Alternative Clustering.
Informatica (Slovenia), 2005

Web outlier mining: Discovering outliers from web datasets.
Intell. Data Anal., 2005

Finding differentially expressed genes for pattern generation.
Bioinform., 2005

Viruses 101.
Proceedings of the 36th SIGCSE Technical Symposium on Computer Science Education, 2005

Replica selection in grid environment: a data-mining approach.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Mining web content outliers using structure oriented weighting techniques and N-grams.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Maintaining Knowledge-Bases of Navigational Patterns from Streams of Navigational Sequences.
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005

Alternative Clustering by Utilizing Multi-objective Genetic Algorithm with Linked-List Based Chromosome Encoding.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2005

Replica Placement in Data Grid: Considering Utility and Risk.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

WCOND-Mine: Algorithm for Detecting Web Content Outliers from Web Documents.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005

Effective data mining by integrating genetic algorithm into the data preprocessing phase.
Proceedings of the Fourth International Conference on Machine Learning and Applications, 2005

Novel Approach for Reengineering Relational Databases into XML.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Replica Placement in Data Grid: A Multi-objective Approach.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005

Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques.
Proceedings of the Data Mining, 2005

Hybrid Approach to Web Content Outlier Mining Without Query Vector.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005

The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation.
Proceedings of the Self-star Properties in Complex Information Systems, 2005

Cognitive information fusion of georeferenced data for tactical applications.
Proceedings of the 4th IEEE International Conference on Cognitive Informatics (ICCI 2005), 2005

2004
A framework for representing navigational patterns as full temporal objects.
SIGecom Exch., 2004

Simplified access to structured databases by adapting keyword search and database selection.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

ConvRel: relationship conversion to XML nested structures.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Framework for mining web content outliers.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Finding differentially expressed genes: pattern generation using Q-values.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Utilizing Rough Sets and Multi-objective Genetic Algorithms for Automated Clustering.
Proceedings of the Rough Sets and Current Trends in Computing, 2004

Mining User Navigational Patterns in Dynamically Changing Environments.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Data Stream Mining Architecture for Network Intrusion Detection.
Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, 2004

Predicting the Performance of GridFTP Transfers.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Hybrid Cache Invalidation Schemes in Mobile Environments.
Proceedings of the IEEE/ACS International Conference on Pervasive Services (ICPS'04), 2004

Multi-dimensional sequential web mining by utilizing fuzzy interferencing.
Proceedings of the 2004 International Conference on Machine Learning and Applications, 2004

Converting Legacy Relational Database into XML Database through Reverse Engineering.
Proceedings of the ICEIS 2004, 2004

An Efficient Framework for Iterative Time-Series Trend Mining.
Proceedings of the ICEIS 2004, 2004

Conv2XML: Relational Schema Conversion to XML Nested-Based Schema.
Proceedings of the ICEIS 2004, 2004

Flexible User Interface for Converting Relational Data into XML.
Proceedings of the Flexible Query Answering Systems, 6th International Conference, 2004

Novel Clustering That Employs Genetic Algorithm with New Representation Scheme and Multiple Objectives.
Proceedings of the Data Warehousing and Knowledge Discovery, 6th International Conference, 2004

Multi-objective Genetic Algorithm Based Clustering Approach and Its Application to Gene Expression Data.
Proceedings of the Advances in Information Systems, Third International Conference, 2004

2003
Cluster validity analysis using subsampling.
Proceedings of the IEEE International Conference on Systems, 2003

Database Selection and Keyword Search of Structured Databases: Powerful Search for Naive Users.
Proceedings of the 2003 IEEE International Conference on Information Reuse and Integration, 2003

Attraction - A Global Affinity Measure for Database Vertical Partitioning.
Proceedings of the IADIS International Conference WWW/Internet 2003, 2003

A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Techniques for Rule Pre-screening.
Proceedings of the Design and Application of Hybrid Intelligent Systems, 2003

2002
VICO: A Tool for Supporting Visual Comparisons of Different Pine-Beetle Management Approaches.
Proceedings of the International Conference on Information Visualisation, 2002

Using Unity to Semi-Automatically Integrate Relational Schema.
Proceedings of the 18th International Conference on Data Engineering, San Jose, CA, USA, February 26, 2002

2001
A Graphical Approach to Allocating Class Fragments in Distributed Objectbase Systems.
Distributed Parallel Databases, 2001

Integrating relational database schemas using a standardized dictionary.
Proceedings of the 2001 ACM Symposium on Applied Computing (SAC), 2001

Querying Relational Databases without Explicit Joins.
Proceedings of the ER 2001 Workshops, 2001

2000
A formal perspective to specification of transaction systems.
South Afr. Comput. J., 2000

Change Propagation in an Axiomatic Model of Schema Evolution for Objectbase Management Systems.
Proceedings of the Database Schema Evolution and Meta-Modeling, 2000

1999
Partial Re-execution: Reconciling Transactions to Increase Concurrency in Object-bases.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

A Horizontal Fragmentation Algorithm for the Fact Relation in a Distributed Data Warehouse.
Proceedings of the 1999 ACM CIKM International Conference on Information and Knowledge Management, 1999

1998
Distributed Object Based Design: Vertical Fragmentation of Classes.
Distributed Parallel Databases, 1998

WWW in DSM: Collaborative Caching on the Web.
Proceedings of the 1998 International Database Engineering and Applications Symposium, 1998

1997
A Formal Specification Strategy for Electronic Commerce.
Proceedings of the International Database Engineering and Applications Symposium, 1997

CSP with Record Data Type for Supporting Transaction Systems Specification.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997

1996
Value-serializability and an Architecture for Managing Transactions in Multiversion Objectbase Systems.
Proceedings of the Third International Workshop on Advances in Databases and Information Systems, 1996

1995
A Comprehensive Approach to Horizontal Class Fragmentation in a Distributed Object Based System.
Distributed Parallel Databases, 1995

Static Allocation in Distributed Objectbase Systems: A Graphical Approach.
Proceedings of the Information Systems and Data Management, 1995

1994
Quantification of autonomy on multidatabase systems.
J. Syst. Integr., 1994

Effective Optimistic Concurrency Control in Multiversion Object Bases.
Proceedings of the Object-Oriented Methodologies and Systems, 1994

1993
The Serializability of Transactions in Object Bases.
Proceedings of the Computing and Information, 1993

1992
A Logical Model and Schema Integration Architecture for Determining Equivalence in ER-Diagrams.
Proceedings of the Computing and Information, 1992

1991
Reliable Transaction Execution in Multidatabase Systems.
Proceedings of the RIDE-IMS '91, 1991

1990
Architectural Classification and Transaction Execution Models of Multidatabase Systems.
Proceedings of the Advances in Computing and Information, 1990

Concurrent transaction execution in multidatabase systems.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1982
A computer systems simulator.
Proceedings of the 14th conference on Winter Simulation, 1982


  Loading...