Nabil R. Adam

Orcid: 0000-0002-9931-9972

Affiliations:
  • Rutgers University, USA


According to our database1, Nabil R. Adam authored at least 129 papers between 1983 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
A Framework for Dynamic Composition and Management of Emergency Response Processes.
IEEE Trans. Serv. Comput., 2022

2021
ASSEMBLE: Attribute, Structure and Semantics Based Service Mapping Approach for Collaborative Business Process Development.
IEEE Trans. Serv. Comput., 2021

2020
Comorbidity Patterns and Its Impact on Health Outcomes: Two-Way Clustering Analysis.
IEEE Trans. Big Data, 2020

Requirements modeling of Web services-based business processes.
Bus. Process. Manag. J., 2020

BP-Com: A Service Mapping Tool for Rapid Development of Business Processes.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

Visual Analytics for Global Migration Policy Discovery and NGO Collaboration.
Proceedings of the dg.o '20: The 21st Annual International Conference on Digital Government Research, 2020

2019
Crime Prediction Model using Deep Neural Networks.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019

Discovering Events from Social Media for Emergency Planning.
Proceedings of the 20th Annual International Conference on Digital Government Research, 2019

2018
Differentially Private Outlier Detection in a Collaborative Environment.
Int. J. Cooperative Inf. Syst., 2018

ASSEMBLE: a collaborative business process development tool.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Emergency response plan recommendation and composition system (ERPRCS).
Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age, 2018

2017
Homeland Security and Spatial Data Mining.
Proceedings of the Encyclopedia of GIS., 2017

Secure and Efficient k-NN Queries.
Proceedings of the ICT Systems Security and Privacy Protection, 2017

Evaluation on Social Media User's Knowledge Behavior Model.
Proceedings of the 18th Annual International Conference on Digital Government Research, 2017

A Scalable Privacy-preserving Data Generation Methodology for Exploratory Analysis.
Proceedings of the AMIA 2017, 2017

2016
Emergency Management and Smart Safety Workshop (EM-SS 2016).
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Social Media User Behavior Analysis in E-Government Context.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Big Data-based Smart City Platform: Real-Time Crime Analysis.
Proceedings of the 17th International Digital Government Research Conference on Digital Government Research, 2016

Collaborative Differentially Private Outlier Detection for Categorical Data.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

2015
Agent driving behavior modeling for traffic simulation and emergency decision support.
Proceedings of the 2015 Winter Simulation Conference, 2015

Preserving Privacy in Collaborative Business Process Composition.
Proceedings of the SECRYPT 2015, 2015

A Privacy-Sensitive Collaborative Approach to Business Process Development.
Proceedings of the E-Business and Telecommunications - 12th International Joint Conference, 2015

2014
Utilizing social media to improve local government responsiveness.
Proceedings of the 15th Annual International Conference on Digital Government Research, 2014

2013
Community based emergency response.
Proceedings of the 14th Annual International Conference on Digital Government Research, 2013

2012
Structure-aware graph anonymization.
Web Intell. Agent Syst., 2012

Semantics-Based Automated Service Discovery.
IEEE Trans. Serv. Comput., 2012

Spatial Computing and Social Media in the Context of Disaster Management.
IEEE Intell. Syst., 2012

Defense and security applications of modeling and simulation - grand challenges and current efforts.
Proceedings of the Winter Simulation Conference, 2012

Privacy Preserving Maximum-Flow Computation in Distributed Graphs.
Proceedings of the 2012 International Conference on Privacy, 2012

Privacy-Preserving Subgraph Discovery.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012

Secure composition of cascaded Web services.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Statistical Databases.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Secure construction and publication of contingency tables from distributed data.
J. Comput. Secur., 2011

Developing a common analytical framework for models, simulations, and data.
Proceedings of the 2011 International Conference on Collaboration Technologies and Systems, 2011

2010
Privacy Preserving Integration of Health Care Data.
Int. J. Comput. Model. Algorithms Medicine, 2010

Spatial neighborhood based anomaly detection in sensor datasets.
Data Min. Knowl. Discov., 2010

Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Privacy-preserving trust verification.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Cyber physical systems R&D at DHS Science and Technology Directorate.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

Preview.
Proceedings of the Complex Data Warehousing and Knowledge Discovery for Advanced Retrieval Development, 2010

2009
Object discovery in high-resolution remote sensing images: a semantic perspective.
Knowl. Inf. Syst., 2009

Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Cyber-physical systems security.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Homeland Security and Spatial Data Mining.
Proceedings of the Encyclopedia of GIS., 2008

Migrating to optimal RBAC with minimal perturbation.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Privacy-preserving link discovery.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Secure information sharing and analysis for effective emergency management.
Proceedings of the 9th Annual International Conference on Digital Government Research, 2008

Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008

Semantics-Based Threat Structure Mining for Homeland Security.
Proceedings of the Digital Government: E-Government Research, 2008

2007
Policy based Web Service Orchestration and Goal Reachability Analysis using MSC and CP Nets.
Proceedings of the 9th IEEE International Conference on E-Commerce Technology (CEC 2007) / 4th IEEE International Conference on Enterprise Computing, 2007

Web service orchestration and verification using MSC and CP nets.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Semantic Feature Selection for Object Discovery in High-Resolution Remote Sensing Imagery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

Approach for Discovering and Handling Crisis in a Service-Oriented Environment.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

MENVIS: mobile environmental information system.
Proceedings of the 8th Annual International Conference on Digital Government Research, 2007

Keynote Speech 1: Secure Information Sharing and Dissemination in the Context of Public Security.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Web Service Discovery: Adding Semantics through Service Request Expansion and Latent Semantic Indexing.
Proceedings of the 2007 IEEE International Conference on Services Computing (SCC 2007), 2007

2006
Secure Information Sharing in a Virtual Multi-Agency Team Environment.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

Web Service Discovery via Semantic Association Ranking and Hyperclique Pattern Discovery.
Proceedings of the 2006 IEEE / WIC / ACM International Conference on Web Intelligence (WI 2006), 2006

Mutual trust in open environment for cascaded web services.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Semantically enhanced enforcement of mobile consumer's privacy preferences.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Challenges in eGovernment technology transfer.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Secure interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Semantics-based threat structure mining.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Constituent-centric municipal government coalition portal.
Proceedings of the 7th Annual International Conference on Digital Government Research, 2006

Cascaded Star: A Hyper-Dimensional Model for a Data Warehouse.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

Preview: Optimizing View Materialization Cost in Spatial Data Warehouses.
Proceedings of the Data Warehousing and Knowledge Discovery, 8th International Conference, 2006

2005
Using Semantics for Policy-Based Web Service Composition.
Distributed Parallel Databases, 2005

Color Time Petri Net for Interactive Adaptive Multimedia Objects.
Proceedings of the 11th International Conference on Multi Media Modeling (MMM 2005), 2005

Preserving mobile customer privacy: an access control system for moving objects and customer profiles.
Proceedings of the 6th International Conference on Mobile Data Management (MDM 2005), 2005

Collusion Set Detection Through Outlier Discovery.
Proceedings of the Intelligence and Security Informatics, 2005

Adapting spatial constraints of composite multimedia objects to achieve universal access.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Texture-Based Remote-Sensing Image Segmentation.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

DM-AMS: employing data mining techniques for alert management.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Agency interoperation for effective data mining in border control and homeland security applications.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Technology transfer of inter-agency government services and their transnational feasibility studies.
Proceedings of the 2005 National Conference on Digital Government Research, 2005

Selective View Materialization in a Spatial Data Warehouse.
Proceedings of the Data Warehousing and Knowledge Discovery, 2005

2004
A clickstream-based collaborative filtering personalization model: towards a better performance.
Proceedings of the Sixth ACM CIKM International Workshop on Web Information and Data Management (WIDM 2004), 2004

Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

Policy-Based Web Service Composition.
Proceedings of the 14th International Workshop on Research Issues in Data Engineering (RIDE-WS-ECEG 2004), 2004

Detecting Anomalous Geospatial Trajectories through Spatial Characterization and Spatio-Semantic Associations.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Agency Interoperation for Effective Data Mining in Border Control and Homeland Security Applications.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

Human-Centered Systems for Business Services.
Proceedings of the 2004 Annual National Conference on Digital Government Research, 2004

2003
Data warehousing in environmental digital libraries.
Commun. ACM, 2003

Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Electronic Negotiation of Government Contracts through Transducers.
Proceedings of the 2003 Annual National Conference on Digital Government Research, 2003

2002
Automating the Delivery of Governmental Business Services Through Workflow Technology.
Proceedings of the Advances in Digital Government - Technology, Human Factors, and Policy, 2002

An authorization system for digital libraries.
VLDB J., 2002

A Content-Based Authorization Model for Digital Libraries.
IEEE Trans. Knowl. Data Eng., 2002

OUTLAW: Using Geo-Spatial Associations for Outlier Detection and Visual Analysisof Cargo Routes.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Dynamic Composition of Workflows for Customized eGovernment Service Delivery.
Proceedings of the 2002 Annual National Conference on Digital Government Research, 2002

Domain Knowledge-Based Automatic Workflow Generation.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

2001
A Dynamic Manifestation Approach for Providing Universal Access to Digital Library Objects.
IEEE Trans. Knowl. Data Eng., 2001

Efficient Splitting Rules Based on the Probabilities of Pre-assigned Intervals.
Proceedings of the 2001 IEEE International Conference on Data Mining, 29 November, 2001

A Study on the Indexing of Satellite Images at NASA Regional Application Center.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

2000
SI in Digital Libraries.
Commun. ACM, 2000

Evolution of Business to Business Electronic Commerce - Introduction.
Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (HICSS-33), 2000

Detecting Data and Schema Changes in Scientific Documents.
Proceedings of IEEE Advances in Digital Libraries 2000 (ADL 2000), 2000

1999
Digital Sky - Panel.
Proceedings of the IEEE Forum on Research and Technology Advances in Digital Libraries, 1999

1998
Modeling and Analysis of Workflows Using Petri Nets.
J. Intell. Inf. Syst., 1998

Content-Based Retrieval in Digital Libraries.
Computer, 1998

Electronic Commerce: Tutorial.
Proceedings of the SIGMOD 1998, 1998

EDI Through A Distributed Information Systems Approach.
Proceedings of the Thirty-First Annual Hawaii International Conference on System Sciences, 1998

1997
Database Issues in Geographic Information Systems
Advances in Database Systems 6, Kluwer, ISBN: 978-0-7923-9924-7, 1997

A Form-Based Natural Language Front-End to a CIM Database.
IEEE Trans. Knowl. Data Eng., 1997

Globalizing Business, Education, Culture Through the Internet.
Commun. ACM, 1997

Information Extraction based Multiple-Category Document Classification for the Global Legal Information Network.
Proceedings of the Fourteenth National Conference on Artificial Intelligence and Ninth Innovative Applications of Artificial Intelligence Conference, 1997

1996
Guest Editors' Introduction: Special Section on Digital Libraries.
IEEE Trans. Knowl. Data Eng., 1996

Strategic Directions in Electronic Commerce and Digital Libraries: Towards a Digital Agora.
ACM Comput. Surv., 1996

Universal Access in Digital Libraries.
ACM Comput. Surv., 1996

1995
An N-ary view integration method using conceptual dependencies.
Proceedings of the 28th Annual Hawaii International Conference on System Sciences (HICSS-28), 1995

1994
A New Dynamic Voting Algorithm for Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 1994

Electronic Commerce: An Overview.
Proceedings of the Electronic Commerce, 1994

Overview.
Proceedings of the Electronic Commerce, 1994

Promising Research Disrections in Disgital Libraries.
Proceedings of the Digital Libraries: Current Issues, 1994

Some Key Issues in Database Systems in a Digital Library Setting.
Proceedings of the Digital Libraries: Current Issues, 1994

1993
Regeneration with Virtual Copies for Distributed Computing Systems.
IEEE Trans. Software Eng., 1993

Applying OOAD in the Design and Implementation of an Intelligent Geographic Information System.
Proceedings of the Advanced Database Systems, 1993

Design and Implementation of a Knowledge-Based Query Processor.
Int. J. Cooperative Inf. Syst., 1993

Integrating Functional and Data Modeling in a Computer Integrated Manufacturing System.
Proceedings of the Ninth International Conference on Data Engineering, 1993

The Design and Implementation of an Expert Object-Oriented Geographic Database Model.
Proceedings of the CIKM 93, 1993

1992
Using semantic knowledge of transactions to improve recovery and availability of replicated data.
Inf. Syst., 1992

Distributed File Allocation with Consistency Constraints.
Proceedings of the 12th International Conference on Distributed Computing Systems, 1992

1991
Regeneration with virtual copies for replicated databases.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1989
Security of Statistical Databases with an Output Perturbation Technique.
J. Manag. Inf. Syst., 1989

Security-Control Methods for Statistical Databases: A Comparative Study.
ACM Comput. Surv., 1989

1987
Special Issue: Database Management.
J. Manag. Inf. Syst., 1987

1983
Preface.
Oper. Res., 1983


  Loading...