Niki Pissinou

Orcid: 0009-0003-7329-9496

Affiliations:
  • Florida International University, University Park, FL, USA


According to our database1, Niki Pissinou authored at least 189 papers between 1992 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Adversarial Training Method for Machine Learning Model in a Resource-Constrained Environment.
Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2023

Towards Parametric Robust Activation Functions in Adversarial Machine Learning.
Proceedings of the First Tiny Papers Track at ICLR 2023, 2023

Resource-Limited Localized Adaptive Adversarial Training for Machine Learning Model.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
A Multidimensional Blockchain Framework For Mobile Internet of Things.
Proceedings of the IEEE International Conference on Trust, 2022

The Dilemma Between Data Transformations and Adversarial Robustness for Time Series Application Systems.
Proceedings of the Workshop on Artificial Intelligence Safety 2022 (SafeAI 2022) co-located with the Thirty-Sixth AAAI Conference on Artificial Intelligence (AAAI2022), 2022

2021
Delay-aware privacy-preserving location-based services under spatiotemporal constraints.
Int. J. Commun. Syst., 2021

Jespipe: A Plugin-Based, Open MPI Framework for Adversarial Machine Learning Analysis.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
The Dilemma Between Dimensionality Reduction and Adversarial Robustness.
CoRR, 2020

2019
Placing Traffic-Changing and Partially-Ordered NFV Middleboxes via SDN.
IEEE Trans. Netw. Serv. Manag., 2019

n-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality.
CoRR, 2019

Quantifying location privacy in permissioned blockchain-based internet of things (IoT).
Proceedings of the MobiQuitous 2019, 2019

Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT.
Proceedings of the 16th IEEE International Conference on Mobile Ad Hoc and Sensor Systems Workshops, 2019

Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019

Privacy-Preserving Deep Learning for Enabling Big Edge Data Analytics in Internet of Things.
Proceedings of the Tenth International Green and Sustainable Computing Conference, 2019

2018
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

KLAP for Real-World Protection of Location Privacy.
Proceedings of the 2018 IEEE World Congress on Services, 2018

Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks.
Proceedings of the 2018 IEEE Symposium on Computers and Communications, 2018

Semantic-Aware Clustering-based Approach of Trajectory Data Stream Mining.
Proceedings of the 2018 International Conference on Computing, 2018

Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach.
Proceedings of the 2018 International Conference on Computing, 2018

Reputation-Aware Data Fusion and Malicious Participant Detection in Mobile Crowdsensing.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

Using Candlestick Charting and Dynamic Time Warping for Data Behavior Modeling and Trend Prediction for MWSN in IoT.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
SDN-Based Traffic Aware Placement of NFV Middleboxes.
IEEE Trans. Netw. Serv. Manag., 2017

Game Theory for Cyber Security and Privacy.
ACM Comput. Surv., 2017

Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration.
Proceedings of the 2017 Annual IEEE International Systems Conference, 2017

Approach to detect non-adversarial overlapping collusion in crowdsourcing.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

Traffic aware placement of interdependent NFV middleboxes.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Preventing Colluding Identity Clone Attacks in Online Social Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

PPVC: Privacy Preserving Voronoi Cell for location-based services.
Proceedings of the 2017 International Conference on Computing, 2017

Cyber Security Resource Allocation: A Markov Decision Process Approach.
Proceedings of the 18th IEEE International Symposium on High Assurance Systems Engineering, 2017

A novel cleaning approach of environmental sensing data streams.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Game theoretic modeling of security and trust relationship in cyberspace.
Int. J. Commun. Syst., 2016

A game-theoretic approach on resource allocation with colluding nodes in MANETs.
Proceedings of the Annual IEEE Systems Conference, 2016

Privacy-aware mobile sensing in vehicular networks.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Distributed temperature-aware resource management in virtualized data center.
Sustain. Comput. Informatics Syst., 2015

Mobile learning object authoring tool and management system for mobile ad hoc wireless networks.
Int. J. Commun. Syst., 2015

In-Network Trajectory Privacy Preservation.
ACM Comput. Surv., 2015

Ensemble stream model for data-cleaning in sensor networks.
AI Matters, 2015

Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach.
Proceedings of the 2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications, 2015

Pseudonym-based anonymity zone generation for mobile service with strong adversary model.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
Geofit: Verifiable Fitness Challenges.
Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2014

Location aware code offloading on mobile cloud with QoS constraint.
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014

2013
OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches.
IEEE Trans. Computers, 2013

A survey of privacy vulnerabilities and defenses in geosocial networks.
IEEE Commun. Mag., 2013

SPOTLESS: Similarity patterns of trajectories in label-less sensor streams.
Proceedings of the 2013 IEEE International Conference on Pervasive Computing and Communications Workshops, 2013

Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013

Joint Host-Network Optimization for Energy-Efficient Data Center Networking.
Proceedings of the 27th IEEE International Symposium on Parallel and Distributed Processing, 2013

Sketch-based data recovery in sensor data streams.
Proceedings of the 19th IEEE International Conference on Networks, 2013

Distributed resource management in data center with temperature constraint.
Proceedings of the International Green Computing Conference, 2013

2012
Belief based data cleaning for wireless sensor networks.
Wirel. Commun. Mob. Comput., 2012

An epistemic event-based correlation approach for managing pervasive networks.
Int. J. Netw. Manag., 2012

Game theoretic analysis of users and providers behavior in network under scarce resources.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

Belief-based cleaning in trajectory sensor streams.
Proceedings of IEEE International Conference on Communications, 2012

Hiding trajectory on the fly.
Proceedings of IEEE International Conference on Communications, 2012

Efficient VM placement with multiple deterministic and stochastic resources in data centers.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks.
Int. J. Netw. Secur., 2011

Machine Learning on Congestion Analysis Based Real-Time Navigation System.
Int. J. Artif. Intell. Tools, 2011

Fast Normalized Cross-Correlation enhanced floating car data estimation.
Proceedings of the 20th Annual Wireless and Optical Communications Conference, 2011

Cellular network location estimation via RSS-based data clean enhanced scheme.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy.
Proceedings of IEEE International Conference on Communications, 2011

Parallel Packet Switch without Segmentation-and-Reassembly.
Proceedings of the Global Communications Conference, 2011

2010
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Achieve constant performance guarantees using asynchronous crossbar scheduling without speedup.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring.
Proceedings of the 29th International Performance Computing and Communications Conference, 2010

On the Robustness of the Botnet Topology Formed by Worm Infection.
Proceedings of the Global Communications Conference, 2010

Buffered Crossbar Based Parallel Packet Switch.
Proceedings of the Global Communications Conference, 2010

Virtual Sensor for Mobile Sensor Data Cleaning.
Proceedings of the Global Communications Conference, 2010

Achieving Flow Level Constant Performance Guarantees for CICQ Switches without Speedup.
Proceedings of the Global Communications Conference, 2010

2009
A future location-aware replacement policy for the cache management at the mobile terminal.
Wirel. Commun. Mob. Comput., 2009

On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks.
Int. J. Interdiscip. Telecommun. Netw., 2009

Sensor network security: a survey.
IEEE Commun. Surv. Tutorials, 2009

A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation.
Proceedings of the 70th IEEE Vehicular Technology Conference, 2009

Providing Performance Guarantees for Buffered Crossbar Switches without Speedup.
Proceedings of the Quality of Service in Heterogeneous Networks, 2009

Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Attack Distribution Modeling and Its Applications in Sensor Network Security.
EURASIP J. Wirel. Commun. Netw., 2008

On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

Mobility-Assisted Location Management for Vehicular Ad Hoc Networks.
Proceedings of the WCNC 2008, IEEE Wireless Communications & Networking Conference, March 31 2008, 2008

A proactive secure routing algorithm defense against node compromise in sensor networks.
Proceedings of the LCN 2008, 2008

Approximate replication of data using adaptive filters in Wireless Sensor Networks.
Proceedings of the Third International Symposium on Wireless Pervasive Computing, 2008

Self-organized forensic support in MANETs.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

Inferring Internet Worm Temporal Characteristics.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Estimated replication of data in wireless sensor networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
Maximizing lifetime of sensor surveillance systems.
IEEE/ACM Trans. Netw., 2007

A context-aware cache structure for mobile computing environments.
J. Syst. Softw., 2007

Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Fuzzy belief pattern classification of incomplete data.
Proceedings of the IEEE International Conference on Systems, 2007

Evolution of Cooperation in Multi-Class Wireless Sensor Networks.
Proceedings of the 32nd Annual IEEE Conference on Local Computer Networks (LCN 2007), 2007

On Optimal Slot Allocation for Reservation TDMA MAC Protocol in Shadow Fading Environment.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Node Compromise Modeling and its Applications in Sensor Networks.
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007

Fuzzy Belief Reasoning for Intrusion Detection Design.
Proceedings of the 3rd International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2007), 2007

Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007

A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model.
Proceedings of the Sixth International Conference on Networking (ICN 2007), 2007

Revisiting Global Time Synchronization.
Proceedings of the Global Communications Conference, 2007

Concurrency Handling in TCP.
Proceedings of the Fifth Annual Conference on Communication Networks and Services Research (CNSR 2007), 2007

The Optimization of Location Management.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

Cluster-Based Reputation and Trust for Wireless Sensor Networks.
Proceedings of the 4th IEEE Consumer Communications and Networking Conference, 2007

2006
On Optimizing Compatible Security Policies in Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2006

A future location-prediction replacement strategy for mobile computing environments.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

An Efficient and Robust Routing Protocol for Data Aggregation.
Proceedings of the Wireless Algorithms, 2006

Accusation Resolution Using Security Metrology.
Proceedings of the Wireless Algorithms, 2006

MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

A context-aware prefetching strategy for mobile computing environments.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2005
Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks.
Mob. Networks Appl., 2005

Maximal lifetime scheduling in sensor surveillance networks.
Proceedings of the INFOCOM 2005. 24th Annual Joint Conference of the IEEE Computer and Communications Societies, 2005

2004
Resource allocation based on pricing for wireless multimedia networks.
Proceedings of the 2004 IEEE Wireless Communications and Networking Conference , 2004

Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks.
Proceedings of the NETWORKING 2004, 2004

Simulation of Wireless Sensor Networks Based on Energy Aware Routing Approach.
Proceedings of the International Conference on Wireless Networks, 2004

LEACH Protocol for Assigning Cluster-Heads Using a Deterministic and Stochastic Approach for Wireless Sensor Networks.
Proceedings of the International Conference on Wireless Networks, 2004

A Framework For Policy Based Coordinated Adaptation in Mobile Systems.
Proceedings of the International Conference on Wireless Networks, 2004

The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV).
Proceedings of the International Conference on Security and Management, 2004

2003
LEO satellite communication networks - a routing approach.
Wirel. Commun. Mob. Comput., 2003

Mobile users in heterogeneous environments with middleware platform.
Comput. Commun., 2003

Mobile and wireless Internet access.
Comput. Commun., 2003

On Quality Of Service Routing in Ad-Hoc Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003

Provisioning an Interactive DVB Satellite Return Channel.
Proceedings of the International Conference on Wireless Networks, 2003

Ad Hoc Wireless Network Fault/Configuration Management.
Proceedings of the International Conference on Wireless Networks, 2003

Predictive Routing Extensions to AODV to Support Quality of Service.
Proceedings of the International Conference on Wireless Networks, 2003

Study of Network Performance in a Simulated Network for Optimized Node Degree and Network Cost.
Proceedings of the International Conference on Internet Computing, 2003

Optimal Wavelength Conversion Degree in an All-Optical Network.
Proceedings of the International Conference on Communications in Computing, 2003

2002
Report on the NSF Workshop on Building an Infrastructure for Mobile and Wireless Systems.
SIGMOD Rec., 2002

Efficient implementations of a delay-constrained least-cost multicast algorithm.
J. Commun. Networks, 2002

Performance analysis of a PCS network with state dependent calls arrival processes and impatient calls.
Comput. Commun., 2002

Efficient implementations of bounded shortest multicast algorithm.
Proceedings of the 11th International Conference on Computer Communications and Networks, 2002

Performance evaluation of delay-constrained least-cost QoS routing algorithms based on linear and nonlinear Lagrange relaxation.
Proceedings of the IEEE International Conference on Communications, 2002

On Routing algorithms in Ad-hoc Networks.
Proceedings of the International Conference on Internet Computing, 2002

2001
Spatio-Temporal Composition of Video Objects: Representation and Querying in Video Database Systems.
IEEE Trans. Knowl. Data Eng., 2001

An integrated routing and admission control mechanism for real-time multicast connection establishment.
Int. J. Commun. Syst., 2001

Spatio-Temporal Modeling in Video and Multimedia Geographic Information Systems.
GeoInformatica, 2001

Secure data networking for enterprises.
ACIS Int. J. Comput. Inf. Sci., 2001

Research Direction for Developing an Infrastructure for Mobile & Wireless Systems: Consensus Report of the NSF Workshop Held on October 15, 2001 in Scottsdale, Arizona.
Proceedings of the Developing an Infrastructure for Mobile and Wireless Systems, 2001

A new routing algorithm for low Earth orbit satellite networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

An efficient approximate algorithm for delay-cost-constrained QoS routing.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

Strategies for Semantic Caching.
Proceedings of the Database and Expert Systems Applications, 12th International Conference, 2001

2000
Using Logical Rings to Solve the Distributed Mutual Exclusion Problem with Fault Tolerance Issues.
J. Supercomput., 2000

Evaluation of congestion control protocols for ABR traffic over ATM networks.
Int. J. Commun. Syst., 2000

A new framework for handling mobile clients in a client-server database system.
Comput. Commun., 2000

On optical communications networks and wideband network architecture.
Comput. Commun., 2000

Third generation wireless network: the integration of GSM and Mobile IP.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

On fundamental issues in mobile and wireless Internet.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

A hybrid method to cellular traffic using optic beam interconnects.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Waiting time of handoff calls for the wireless mobile networks with dependent calls arrival processes and impatient calls.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

Video Content Representation Based on Texture and Lighting.
Proceedings of the Advances in Visual Information Systems, 4th International Conference, 2000

A Middleware-based Architecture to Support Transparent Data Access by Mobile Users in Heterogeneous Environments.
Proceedings of the Tenth International Workshop on Research Issues on Data Engineering: Middleware for Mobile Business Applications and E-Commerce, 2000

Mobile Agents to Automate Fault Management in Wireless and Mobile Networks.
Proceedings of the Parallel and Distributed Processing, 2000

The secure model for enterprise connectivity.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
On the design of a location and query management strategy for mobile and wireless environments.
Comput. Commun., 1999

Efficient detection and resolution of deadlocks in distributed databases.
Comput. Commun., 1999

A Distributed Multicast Routing Protocol for Real-Time Multicast Applications.
Comput. Networks, 1999

Performance analysis of a PCS network with state-dependent calls arrival processes and impatient calls.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Graph-Based Object-Oriented Approach for Structural and Behavioral Representation of Multimedia Data.
Proceedings of the 1999 ACM CIKM International Conference on Information and Knowledge Management, 1999

1998
Group Channel Routing for Conferencing Systems in Wide Area Networks.
Inf. Sci., 1998

A Topological-Directional Model for the Apatio-Temporal Composition of Video Objects.
Proceedings of the RIDE'98, 1998

An Efficient Admission Control Method of Real-Time Multicast Connections in Wide Area Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

Attribute Weighting: A Method of Applying Domain Knowledge in the Decision Tree Process.
Proceedings of the 1998 ACM CIKM International Conference on Information and Knowledge Management, 1998

1997
Modeling and Simulation of Multicast Routing Algorithms for Advanced Network Applications.
Simul., 1997

Protocols for Mobile Environments - Editorial.
Mob. Networks Appl., 1997

An ECA Object Service to Support Active Distributed Objects.
Inf. Sci., 1997

A real-time multicast routing algorithm for multimedia applications.
Comput. Commun., 1997

Using Logical Rings to solve the Mutual Exclusion Problem in Distributed Memory Systems.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1997

A distributed algorithm of delay bounded multicast routing for multimedia applications.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

An Agent-Based Mobile System.
Proceedings of the Conceptual Modeling, 1997

1996
Efficient Solutions to Multicast Routing in Communication Networks.
Mob. Networks Appl., 1996

Encapsulation of ATM cell connections.
Comput. Commun., 1996

Efficient multicast tree algorithm in ATM networks.
Comput. Commun., 1996

A framework for modeling applications as distributed active objects.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

A Framework for Building Distributed Dynamic Applications.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

An Efficient Distributed Mutual Exclusion Algorithm.
Proceedings of the 1996 International Conference on Parallel Processing, 1996

1995
RIMM: A Reactive Integration Multidatabase Model.
Informatica (Slovenia), 1995

A Dynamic Framework to Actively Support Interoperability in Multidatabase Systems.
Proceedings of the Proceedings RIDE-DOM '95, Fifth International Workshop on Research Issues in Data Engineering, 1995

Detection and Resolution of Deadlocks in Distributed Database Systems.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

1994
Towards an Infrastructure for Temporal Databases: Report of an Invitational ARPA/NSF Workshop.
SIGMOD Rec., 1994

A coherent architecture for a temporal object data base management system.
J. Syst. Softw., 1994

A new storage organization for temporal data bases.
J. Syst. Softw., 1994

A Simulation Study of Token-Based Mutual-Exlusion Algorithms in Distributed Systems.
Int. J. Comput. Simul., 1994

On the Representation of Temporal Object Roles in Object Oriented Databases.
Proceedings of the TIME-94 International Workshop on Temporal Reasoning, 1994

An Efficient Solution To The Critical Section Problem In Distributed Systems.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

A Modeling Paradigm for Multidatabases.
Proceedings of the 1994 International Conference on Parallel Processing, 1994

Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994

1993
On Temporal Modeling in the Context of Object Databases.
SIGMOD Rec., 1993

An O(sqr N) Token Based Distributed Mutual Exclusion Algorithm.
Informatica (Slovenia), 1993

A Unified Model and Methodology for Temporal Object Databases.
Int. J. Cooperative Inf. Syst., 1993

A Parallel Algorithm for the Steiner Tree Problem.
Proceedings of the Computing and Information, 1993

Towards the Design and Development of a New Model for Geographic Information Systems.
Proceedings of the CIKM 93, 1993

Separating Semantics from Representation in a Temporal Object Database Domain.
Proceedings of the CIKM 93, 1993

1992
A Token Based Distributed K Mutual Exclusion Algorithm.
Proceedings of the Fourth IEEE Symposium on Parallel and Distributed Processing, 1992

On Algorithms for Mutual Exclusion in Distributed Systems.
Proceedings of the 1992 International Conference on Parallel Processing, 1992

The Steiner tree problem with minimum number of vertices in graphs.
Proceedings of the Second Great Lakes Symposium on VLSI, 1992

A Framework for Temporal Object Databases.
Proceedings of the Information and Knowledge Management, 1992


  Loading...