Paul Helman

According to our database1, Paul Helman
  • authored at least 23 papers between 1986 and 2009.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2009
Negative representations of information.
Int. J. Inf. Sec., 2009

2007
Protecting data privacy through hard-to-reverse negative databases.
Int. J. Inf. Sec., 2007

Learning and modeling biosignatures from tissue images.
Comp. in Bio. and Med., 2007

2006
Protecting Data Privacy Through Hard-to-Reverse Negative Databases.
Proceedings of the Information Security, 9th International Conference, 2006

2005
On-line Negative Databases.
IJUC, 2005

Learning Optimal Augmented Bayes Networks
CoRR, 2005

2004
A Bayesian Network Classification Methodology for Gene Expression Data.
Journal of Computational Biology, 2004

Online Negative Databases.
Proceedings of the Artificial Immune Systems, Third International Conference, 2004

2003
The Crossover Closure and Partial Match Detection.
Proceedings of the Artificial Immune Systems, Second International Conference, 2003

2001
The application of automated reasoning to formal models of combinatorial optimization.
Applied Mathematics and Computation, 2001

1998
Prioritizing Information for the Discovery of Phenomena.
J. Intell. Inf. Syst., 1998

1997
A statistically based system for prioritizing information exploration under uncertainty.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 1997

1996
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications.
Proceedings of the 1996 IEEE Symposium on Security and Privacy, 1996

1993
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse.
IEEE Trans. Software Eng., 1993

An Exact Characterization of Greedy Structures.
SIAM J. Discrete Math., 1993

1992
An Exact Characterization of Greedy Structures.
Proceedings of the 2nd Integer Programming and Combinatorial Optimization Conference, 1992

Foundations of Intrusion Detection.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1991
A Mass Production Technique to Speed Multiple-Query Optimization and Physical Database Design.
INFORMS Journal on Computing, 1991

Intermediate problem solving and data structures - walls and mirrors (2. ed.).
Benjamin/Cummings series in computer science, Benjamin/Cummings, ISBN: 978-0-8053-0321-6, 1991

1989
A common schema for dynamic programming and branch and bound algorithms.
J. ACM, 1989

A Family of NP-Complete Data Aggregation Problems.
Acta Inf., 1989

1988
Designing Deductive Databases.
J. Autom. Reasoning, 1988

1986
Understanding and Extending Transformation-Based Optimizers.
IEEE Database Eng. Bull., 1986


  Loading...