Mehmet A. Orgun

According to our database1, Mehmet A. Orgun authored at least 240 papers between 1992 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Joint Power Control and Resource Allocation Mode Selection for Safety-Related V2X Communication.
IEEE Trans. Vehicular Technology, 2019

A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services.
IEEE Trans. Services Computing, 2019

Finger-to-Heart (F2H): Authentication for Wireless Implantable Medical Devices.
IEEE J. Biomedical and Health Informatics, 2019

A novel fused convolutional neural network for biomedical image classification.
Med. Biol. Engineering and Computing, 2019

Real-time event detection from the Twitter data stream using the TwitterNews+ Framework.
Inf. Process. Manage., 2019

Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
Health Informatics Journal, 2019

On Conforming and Conflicting Values.
CoRR, 2019

Sequential Recommender Systems: Challenges, Progress and Prospects.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Modeling Multi-Purpose Sessions for Next-Item Recommendations via Mixture-Channel Purpose Routing Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems.
Wireless Personal Communications, 2018

An Engagement Model Based on User Interest and QoS in Video Streaming Systems.
Wireless Communications and Mobile Computing, 2018

Resource Allocation for Underlay D2D Communication With Proportional Fairness.
IEEE Trans. Vehicular Technology, 2018

Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics and Informatics, 2018

A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Information Processing, 2018

Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding.
Quantum Information Processing, 2018

A survey on real-time event detection from the Twitter data stream.
J. Inf. Sci., 2018

Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice.
Inf. Process. Lett., 2018

A novel biomedical image indexing and retrieval system via deep preference learning.
Computer Methods and Programs in Biomedicine, 2018

High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
SCIENCE CHINA Information Sciences, 2018

Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018

A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018

Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry.
IEEE Access, 2018

SETTRUST: Social Exchange Theory Based Context-Aware Trust Prediction in Online Social Networks.
Proceedings of the Data Quality and Trust in Big Data - 5th International Workshop, 2018

Social Context-Aware Trust Prediction: Methods for Identifying Fake News.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Joint Autonomous Resource Selection and Scheduled Resource Allocation for D2D-Based V2X Communication.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018

A Deep Framework for Cross-Domain and Cross-System Recommendations.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Context-Aware Trustworthy Service Evaluation in Social Internet of Things.
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018

Incremental Graph Pattern Based Node Matching.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication.
Proceedings of the IEEE Global Communications Conference, 2018

2017
Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks.
IEEE J. Biomedical and Health Informatics, 2017

A Survey of Authentication Schemes in Telecare Medicine Information Systems.
J. Medical Systems, 2017

A novel end-to-end classifier using domain transferred deep convolutional neural networks for biomedical images.
Computer Methods and Programs in Biomedicine, 2017

An efficient quantum blind digital signature scheme.
SCIENCE CHINA Information Sciences, 2017

Design and deployment challenges in immersive and wearable technologies.
Behaviour & IT, 2017

Joint mode selection and proportional fair scheduling for D2D communication.
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017

Leveraging deep preference learning for indexing and retrieval of biomedical images.
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017

From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

2016
Special issue on Information Visualization in Machine Learning and Applications.
J. Vis. Lang. Comput., 2016

Classifying high dimensional data by interactive visual analysis.
J. Vis. Lang. Comput., 2016

Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016

High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding.
Quantum Information Processing, 2016

TwitterNews: Real time event detection from the Twitter data stream.
PeerJ PrePrints, 2016

Offer acceptance prediction of academic placement.
Neural Computing and Applications, 2016

Fundamental Issues in Mobile Healthcare Information Systems.
Mobile Information Systems, 2016

Behavior analysis in social networks: Challenges, technologies, and trends.
Neurocomputing, 2016

Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Computers in Human Behavior, 2016

TwitterNews+: A Framework for Real Time Event Detection from the Twitter Data Stream.
Proceedings of the Social Informatics - 8th International Conference, 2016

Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

A Dispute Arbitration Protocol Based on a Peer-to-Peer Service Contract Management Scheme.
Proceedings of the IEEE International Conference on Web Services, 2016

Strong Social Component-Aware Trust Sub-network Extraction in Contextual Social Networks.
Proceedings of the IEEE International Conference on Web Services, 2016

A Robust Approach to Finding Trustworthy Influencer in Trust-Oriented E-Commerce Environments.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

An Uncertain Assessment Compatible Incentive Mechanism for Eliciting Continual and Truthful Assessments of Cloud Services.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

Survey on cybersecurity issues in wireless mesh networks based eHealthcare.
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016

Adoption of Data-Driven Decision Making in Fire Emergency Management.
Proceedings of the 24th European Conference on Information Systems, 2016

A Novel Incentive Mechanism for Truthful Performance Assessments of Cloud Services: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016

2015
CCCloud: Context-Aware and Credible Cloud Service Selection Based on Subjective Assessment and Objective Assessment.
IEEE Trans. Services Computing, 2015

A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes.
Quantum Information Processing, 2015

Modeling Accountable Cloud Services Based on Dynamic Logic for Accountability.
Int. J. Web Service Res., 2015

Editorial: Special issue on security of information and networks.
J. Inf. Sec. Appl., 2015

A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
IJDSN, 2015

Special issue on trust and security in wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2015

Secure transfer of environmental data to enhance human decision accuracy.
Computers in Human Behavior, 2015

Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Computers in Human Behavior, 2015

Encryption for Implantable Medical Devices Using Modified One-Time Pads.
IEEE Access, 2015

Contextual Sub-network Extraction in Contextual Social Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015

BiNet: Trust Sub-network Extraction Using Binary Ant Colony Algorithm in Contextual Social Networks.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Multi-Constrained Graph Pattern Matching in large-scale contextual social graphs.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

An Improved Binary Sequence Generation for Securing Wireless Body Area Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes.
Quantum Information Processing, 2014

Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations.
Quantum Information Processing, 2014

The Impact of Discrimination on the Spread of Infectious Diseases in Complex Networks.
New Generation Comput., 2014

An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014

Securing wireless medical implants using an ECG-based secret data sharing scheme.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

Modeling Accountable Cloud Services.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Context-Aware Cloud Service Selection Based on Comparison and Aggregation of User Subjective Assessment and Objective Performance Assessment.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Social Context-Aware Trust Prediction in Social Networks.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

Evaluating Cloud Users' Credibility of Providing Subjective Assessment or Objective Assessment for Cloud Services.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014

A non-key based security scheme supporting emergency treatment of wireless implants.
Proceedings of the IEEE International Conference on Communications, 2014

Towards an OWL 2 Profile for Defining Learning Ontologies.
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014

Cloud service selection based on contextual subjective assessment and objective assessment.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014

Trust Prediction with Propagation and Similarity Regularization.
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014

2013
Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks.
IEEE Trans. Services Computing, 2013

KPMCF: A Learning Model for Measuring Social Relationship Strength.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

Optimization of XML Queries by Using Semantics in XML Schemas and the Document Structure.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013

Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Modeling the Dynamic Trust of Online Service Providers Using HMM.
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013

Subset Selection Classifier (SSC): A Training Set Reduction Method.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

Representing and Reasoning about Utilization of Cloud Computing as Bayesian Games with Epistemic Logic.
Proceedings of the 4th International Conference on Ambient Systems, 2013

Software Clustering Using Automated Feature Subset Selection.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013

2012
Three Approaches to Iterated Belief Contraction.
J. Philosophical Logic, 2012

The Reactive-Causal Architecture: Radar Task Simulation.
J. Artificial Societies and Social Simulation, 2012

A Visual Approach for Classification Based on Data Projection.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

Discovering Trust Networks for the Selection of Trustworthy Service Providers in Complex Contextual Social Networks.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012

Interactive Visual Classification of Multivariate Data.
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012

Modelling Bayesian attacker detection game in wireless networks with epistemic logic.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Social Context-Aware Trust Network Discovery in Complex Contextual Social Networks.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

BRINK: Initial theory on bounded rationality and inconsistent knowledge.
Proceedings of the 11th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2012

2011
A Tabu-Harmony Search-Based Approach to Fuzzy Linear Regression.
IEEE Trans. Fuzzy Systems, 2011

Special issue on logics for intelligent agents and multi-agent systems.
J. Applied Logic, 2011

An analytic tableau calculus for a temporalised belief logic.
J. Applied Logic, 2011

Efficiently querying dynamic XML documents stored in relational database systems.
IJIIDS, 2011

Introduction to the special issue on engineering semantic agent systems.
Expert Systems, 2011

Hybrid optimization with improved tabu search.
Appl. Soft Comput., 2011

Finding K Optimal Social Trust Paths for the Selection of Trustworthy Service Providers in Complex Social Networks.
Proceedings of the IEEE International Conference on Web Services, 2011

The prediction of trust rating based on the quality of services using fuzzy linear regression.
Proceedings of the FUZZ-IEEE 2011, 2011

A scalable approach for inferring transcriptional regulation in the yeast cell cycle.
Proceedings of the ACM International Conference on Bioinformatics, 2011

Trust Transitivity in Complex Social Networks.
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011

2010
Analysis of microarray data to infer transcription regulation in the yeast cell cycle.
I. J. Functional Informatics and Personalised Medicine, 2010

Introduction: Special Issue on Knowledge Representation and Ontology Research.
Applied Artificial Intelligence, 2010

A Stratified Model for Short-Term Prediction of Time Series.
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010

An Improved Wavelet Analysis Method for Detecting DDoS Attacks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A least square approach for the detection and removal of outliers for fuzzy linear regressions.
Proceedings of the Second World Congress on Nature & Biologically Inspired Computing, 2010

A Dynamic Authentication Scheme for Hierarchical Wireless Sensor Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010

A trust management architecture for hierarchical wireless sensor networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

An Application of Element Oriented Analysis Based Credit Scoring.
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2010

Optimizing XML twig queries in relational systems.
Proceedings of the Fourteenth International Database Engineering and Applications Symposium (IDEAS 2010), 2010

The Discovery of Hierarchical Cluster Structures Assisted by a Visualization Technique.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010

Geospatial editing over a federated cloud geodatabase for the state of NSW.
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010

A Dynamic Trust Establishment and Management Framework for Wireless Sensor Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

Failed-tuple triggered blocking strategy for managing near real-time spatial data replication.
Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application, 2010

Belief Erasure Using Partial Imaging.
Proceedings of the AI 2010: Advances in Artificial Intelligence, 2010

Temporal Belief-Change: kappa-functions Approach.
Proceedings of the AI 2010: Advances in Artificial Intelligence, 2010

Quality of trust for social trust path selection in complex social networks.
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010

A Top-Down Approach for Hierarchical Cluster Exploration by Visualization.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

Efficiently Querying XML Documents Stored in RDBMS in the Presence of Dewey-Based Labeling Scheme.
Proceedings of the Intelligent Information and Database Systems, 2010

Optimal Social Trust Path Selection in Complex Social Networks.
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010

A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
Analysis of Authentication Protocols in Agent-Based Systems Using Labeled Tableaux.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2009

Modal tableaux for verifying stream authentication protocols.
Autonomous Agents and Multi-Agent Systems, 2009

Using dynamic bayesian networks to infer gene regulatory networks from expression profiles.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Two Approaches to Iterated Belief Contraction.
Proceedings of the Knowledge Science, 2009

Critical Issues in Trust Management for Mobile Ad-Hoc Networks.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009

A Visual Method for High-Dimensional Data Cluster Exploration.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

Solving Fuzzy Linear Regression with Hybrid Optimization.
Proceedings of the Neural Information Processing, 16th International Conference, 2009

Temporalised Epistemic Logic for Reasoning about Agent-Based Systems.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009

Securing Session Initiation Protocol in Voice over IP Domain.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Trust Inference in Complex Trust-Oriented Social Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Context-Aware Trust Management for Peer-to-Peer Mobile Ad-Hoc Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

A 2-Stage Approach for Inferring Gene Regulatory Networks Using Dynamic Bayesian Networks.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009

Theories of Trust for Communication Protocols.
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009

2008
In Honour of Bill Wadge.
Mathematics in Computer Science, 2008

Knowledge Representation, Reasoning and Integration Using Temporal Logic with Clocks.
Mathematics in Computer Science, 2008

Querying Historical Data Over Multiple Time-Lines.
Mathematics in Computer Science, 2008

Formalising theories of trust for authentication protocols.
Information Systems Frontiers, 2008

Introduction to the special issue on advances in ontologies.
Expert Systems, 2008

A Multi-Versioning Scheme for Intention Preservation in Collaborative Editing Systems.
Computer Supported Cooperative Work, 2008

The Reactive-Causal Architecture: Introducing an Emotion Model along with Theories of Needs.
Proceedings of the Research and Development in Intelligent Systems XXV, 2008

Mining Multidimensional Data through Element Oriented Analysis.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

The Reactive-Causal Architecture: Towards Development of Believable Agents.
Proceedings of the Intelligent Virtual Agents, 8th International Conference, 2008

Analytic Tableaux for Verifying Agent Beliefs.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008

ESAS 2008 Workshop Organization.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Message from the ESAS 2008 Workshop Organizers.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

The reactive-causal architecture: Combining intentional notion and theories of needs.
Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, 2008

2007
Unsupervised Learning Aided by Clustering and Local-Global Hierarchical Analysis in Knowledge Exploration.
JDIM, 2007

Enhanced Visual Separation of Clusters by M-Mapping to Facilitate Cluster Analysis.
Proceedings of the Advances in Visual Information Systems, 9th International Conference, 2007

A Prediction-Based Visual Approach for Cluster Exploration and Cluster Validation by HOV3.
Proceedings of the Knowledge Discovery in Databases: PKDD 2007, 2007

An Adaptive Labeling Method for Dynamic XML Documents.
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007

Iterated Belief Contraction from First Principles.
Proceedings of the IJCAI 2007, 2007

Specifying Agent Beliefs for Authentication Systems.
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007

Intelligent Agents and P2P Semantic Web.
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007

Towards Context Sensitive Defeasible Rules.
Proceedings of the Computational Logic in Multi-Agent Systems, 8th International Workshop, 2007

A Visual Approach for External Cluster Validation.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
From Predefined Consistency to User-Centered Emergent Consistency in Real-Time Collaborative Editing Systems.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

Trust management and trust theory revision.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

Observation-Based Logic of Knowledge, Belief, Desire and Intention.
Proceedings of the Knowledge Science, 2006

Taking Levi Identity Seriously: A Plea for Iterated Belief Contraction.
Proceedings of the Knowledge Science, 2006

Unsupervised Learning Aided by Hierarchical Analysis in Knowledge Exploration.
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006

Representation and integration of knowledge based on multiple granularity of time using temporal logic.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

Reasoning about dynamics of trust and agent beliefs.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006

Analysing Stream Authentication Protocols in Autonomous Agent-Based Systems.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Supporting Distributed Collaborative Work with Multi-versioning.
Proceedings of the 10th International Conference on CSCW in Design, 2006

Hypothesis oriented cluster analysis in data mining by visualization.
Proceedings of the working conference on Advanced visual interfaces, 2006

An Application of Time-Changing Feature Selection.
Proceedings of the Data Mining - Theory, Methodology, Techniques, and Applications, 2006

The interpreted system model of knowledge, belief, desire and intention.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

Labeling XML Nodes in RDBMS.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

XMask: An Enabled XML Management System.
Proceedings of the Advances in Information Systems, 4th International Conference, 2006

HOV3: An Approach to Visual Cluster Analysis.
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006

Towards security labelling.
Proceedings of the Computer Science 2006, 2006

2005
Locking without requesting a lock: A consistency maintenance mechanism in Internet-based real-time group editors.
J. Parallel Distrib. Comput., 2005

Managing Theories of Trust in Agent Based Systems.
Proceedings of the Computer and Information Sciences, 2005

Separating XHTML content from navigation clutter using DOM-structure block analysis.
Proceedings of the HYPERTEXT 2005, 2005

Iterated Belief Change and the Levi Identity.
Proceedings of the Belief Change in Rational Agents: Perspectives from Artificial Intelligence, 2005

A Fibred Belief Logic for Multi-agent Systems.
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005

2004
An Analytical Framework for Consistency Maintenance Mechanisms in Collaborative Editing Systems.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004

A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems.
Proceedings of the Advances in Computer Science, 2004

2003
Compiled Visual Programs by VisPro.
Proceedings of the Visual Information Processing 2003, 2003

An Exclusive Version Locking Scheme in Internet-based Real-time Group Editors.
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003

A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors.
Proceedings of the Computer Science 2003, 2003

2002
Visual Language Semantics Specification in the VisPro System.
Proceedings of the Visualisation 2002, 2002

Editing Any Version at Any Time: a consistency maintenance mechanism in Internet-based collaborative environments.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

Intention Preservation by Multi-versioning in Distributed Real-Time Group Editors.
Proceedings of the Engineering and Deployment of Cooperative Information Systems, 2002

Grammar-Based Layout for a Visual Programming Language Generation System.
Proceedings of the Diagrammatic Representation and Inference, 2002

A User-Centred Consistency Model in Real-Time Collaborative Editing Systems.
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002

A Group-Based Time-Stamping Scheme for the Preservation of Group Intentions.
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002

Mining Temporal Patterns from Health Care Data.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

An Overview Of Temporal Data Mining.
Proceedings of the 15th Australian Joint Conference on Artificial Intelligence 2002, 2002

2001
Modelling and Manipulating Multidimensional Data in Semistructured Databases.
World Wide Web, 2001

A parallel execution model for Chronolog.
Comput. Syst. Sci. Eng., 2001

Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System.
Proceedings of the Visualisation 2001, 2001

Temporal Data Mining Using Hidden Markov-Local Polynomial Models.
Proceedings of the Knowledge Discovery and Data Mining, 2001

A Secure Transaction Environment for Workflows in Distributed Systems.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

Modeling and Manipulating Multidimensional Data in Semistructured Databases.
Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001

2000
Temporal Data Mining Using Hidden Periodicity Analysis.
Proceedings of the Foundations of Intelligent Systems, 12th International Symposium, 2000

Temporal Data Mining Using Multilevel-Local Polynominal Models.
Proceedings of the Intelligent Data Engineering and Automated Learning, 2000

ADDROL: a method for on-line reorganization in a multisystem DBMS with shared disks.
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000

Towards a Logical Basis for Modelling and Querying Multi-dimensional Databases.
Proceedings of the Distributed Communities on the Web, Third International Workshop, 2000

On the Analysis of On-Line Database Reorganization.
Proceedings of the Current Issues in Databases and Information Systems, 2000

1999
Verification of Reactive Systems Using Temporal Logic with Clocks.
Theor. Comput. Sci., 1999

A Temporal Relational Algebra Based on Multiple Time-Lines.
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999

Modelling and Reasoning about Multi-dimensional Information.
Proceedings of the Foundations of Intelligent Systems, 11th International Symposium, 1999

Dynamic Reorganization of Object Databases.
Proceedings of the 1999 International Database Engineering and Applications Symposium, 1999

1998
Embedding a Timing System in TLC.
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998

VERSANT Architecture: Supporting High - Performance Object Databases.
Proceedings of the 1998 International Database Engineering and Applications Symposium, 1998

Querying Clocked Databases.
Proceedings of the Flexible Query Answering Systems, Third International Conference, 1998

A Structural Knowledge-Based Simulation Methodology for Distributed Systems.
Proceedings of the Eleventh International Florida Artificial Intelligence Research Society Conference, 1998

Clustering Techniques for Minimizing Object Access Time.
Proceedings of the Advances in Databases and Information Systems, 1998

1997
Multi-Dimensional Logic Programming: Theoretical Foundations.
Theor. Comput. Sci., 1997

BCTL: A Branching Clock Temporal Logic.
Proceedings of the 4th International Workshop on Temporal Representation and Reasoning, 1997

A Constraint Mechanism for Knowlege Specification of Simulation Systems Based on Temporal Logic.
Proceedings of the Advanced Topics in Artificial Intelligence, 1997

1996
Executable Temporal Logic Systems.
J. Symb. Comput., 1996

Dealing with Multiple Granularity of Time in Temporal Logic Programming.
J. Symb. Comput., 1996

Incorporating an Implicit Time Dimension Into the Relational Model and Algebra.
ITA, 1996

On Temporal Deductive Databases.
Computational Intelligence, 1996

A recursive temporal algebra and temporal completeness.
Proceedings of the Third International Workshop on Temporal Representation and Reasoning, 1996

Executing specifications of distributed computations with Chronolog(MC).
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

1995
Foundations of linear-time logic programming.
Int. J. Comput. Math., 1995

A temporal paraconsistent relational algebra for incomplete and inconsistent information.
Proceedings of the 33th Annual Southeast Regional Conference, 1995

1994
Temporal and Modal Logic Programming: An Annotated Bibliography.
SIGART Bulletin, 1994

Extending Temporal Logic Programming with Choice Predicates Non-Determinism.
J. Log. Comput., 1994

An Overview of Temporal and Modal Logic Programming.
Proceedings of the Temporal Logic, First International Conference, 1994

1993
A reverse-engineering approach to subsystem structure identification.
Journal of Software Maintenance, 1993

The Soundness and Completeness of a Temporal Extension of Logic Programming.
Proceedings of the Logic Programming, 1993

Chronolog (Z): Linear-Time Logic Programming.
Proceedings of the Computing and Information, 1993

A Temporal Algebra Based on an Abstract Model.
Proceedings of the Advances in Database Research, 1993

1992
Towards a Unified Theory of Intensional Logic Programming.
J. Log. Program., 1992

Documenting software systems with views.
Proceedings of the 10th Annual International Conference on Systems Documentation, 1992

A reverse engineering environment based on spatial and visual software interconnection models.
Proceedings of the SDE 5: 5th ACM SIGSOFT Symposium on Software Development Environments, 1992

A Relational Algebra as a Query Language for Temporal DATALOG.
Proceedings of the International Conference on Database and Expert Systems Applications, 1992


  Loading...