Mehmet A. Orgun
Orcid: 0000-0002-7873-1562Affiliations:
- Macquarie University, Sydney, Australia
According to our database1,
Mehmet A. Orgun
authored at least 284 papers
between 1991 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Aerosp. Electron. Syst., February, 2024
2023
IEEE Trans. Knowl. Data Eng., November, 2023
IEEE Trans. Cybern., November, 2023
IEEE Trans. Knowl. Data Eng., 2023
UniMOS: A Universal Framework For Multi-Organ Segmentation Over Label-Constrained Datasets.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
2022
World Wide Web, 2022
Inf. Process. Manag., 2022
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
SEC<sup>2</sup>: A Secure and Energy Efficient Barrier Coverage Scheduling for WSN-Based IoT Applications.
IEEE Trans. Green Commun. Netw., 2021
Neural Networks, 2021
A Graph-Based Fault-Tolerant Approach to Modeling QoS for IoT-Based Surveillance Applications.
IEEE Internet Things J., 2021
QoS-Aware Energy Management and Node Scheduling Schemes for Sensor Network-Based Surveillance Applications.
IEEE Access, 2021
Corrections to "Risk Analysis of Cloud Sourcing in Healthcare and Public Health Industry".
IEEE Access, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
2020
World Wide Web, 2020
Guest editorial: special issue on trust, privacy, and security in crowdsourcing computing.
World Wide Web, 2020
High-capacity (2, 3) threshold quantum secret sharing based on asymmetric quantum lossy channels.
Quantum Inf. Process., 2020
Weakly supervised learning for image keypoint matching using graph convolutional networks.
Knowl. Based Syst., 2020
Knowl. Based Syst., 2020
Using Bayesian networks with hidden variables for identifying trustworthy users in social networks.
J. Inf. Sci., 2020
Beyond CNNs: Exploiting Further Inherent Symmetries in Medical Images for Segmentation.
CoRR, 2020
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020
Correlation Matters: Multi-scale Fine-Grained Contextual Information Extraction for Hepatic Tumor Segmentation.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020
Proceedings of the MoMM '20: The 18th International Conference on Advances in Mobile Computing and Multimedia, Chiang Mai, Thailand, November 30, 2020
Fine-grained tumor segmentation on computed tomography slices by leveraging bottom-up and top-down strategies.
Proceedings of the Medical Imaging 2020: Image Processing, 2020
Intention2Basket: A Neural Intention-driven Approach for Dynamic Next-basket Planning.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proceedings of the Service-Oriented Computing - ICSOC 2020 Workshops, 2020
Intention Nets: Psychology-Inspired User Choice Behavior Modeling for Next-Basket Prediction.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Joint Power Control and Resource Allocation Mode Selection for Safety-Related V2X Communication.
IEEE Trans. Veh. Technol., 2019
A Proof-of-Trust Consensus Protocol for Enhancing Accountability in Crowdsourcing Services.
IEEE Trans. Serv. Comput., 2019
IEEE J. Biomed. Health Informatics, 2019
Medical Biol. Eng. Comput., 2019
Real-time event detection from the Twitter data stream using the TwitterNews+ Framework.
Inf. Process. Manag., 2019
Cybersecurity and privacy issues for socially integrated mobile healthcare applications operating in a multi-cloud environment.
Health Informatics J., 2019
Proceedings of the 23rd Pacific Asia Conference on Information Systems, 2019
Proceedings of the MoMM 2019: The 17th International Conference on Advances in Mobile Computing & Multimedia, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
Modeling Multi-Purpose Sessions for Next-Item Recommendations via Mixture-Channel Purpose Routing Networks.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
N2TM: A New Node to Trust Matrix Method for Spam Worker Defense in Crowdsourcing Environments.
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019
Fast and Accurate Lung Tumor Spotting and Segmentation for Boundary Delineation on CT Slices in a Coarse-to-Fine Framework.
Proceedings of the Neural Information Processing - 26th International Conference, 2019
Proceedings of the AI 2019: Advances in Artificial Intelligence, 2019
2018
A Hybrid Quantum Key Distribution Protocol for Tele-care Medicine Information Systems.
Wirel. Pers. Commun., 2018
Wirel. Commun. Mob. Comput., 2018
IEEE Trans. Veh. Technol., 2018
Secure sensors data acquisition and communication protection in eHealthcare: Review on the state of the art.
Telematics Informatics, 2018
A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement.
Quantum Inf. Process., 2018
Tunable multi-party high-capacity quantum key distribution based on <i>m</i>-generalized Fibonacci sequences using golden coding.
Quantum Inf. Process., 2018
J. Inf. Sci., 2018
Efficient quantum key distribution using Fibonacci-number coding with a biased basis choice.
Inf. Process. Lett., 2018
Comput. Methods Programs Biomed., 2018
High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space.
Sci. China Inf. Sci., 2018
Privacy Preservation in e-Healthcare Environments: State of the Art and Future Directions.
IEEE Access, 2018
A Critical Analysis of Mobility Management Related Issues of Wireless Sensor Networks in Cyber Physical Systems.
IEEE Access, 2018
IEEE Access, 2018
SETTRUST: Social Exchange Theory Based Context-Aware Trust Prediction in Online Social Networks.
Proceedings of the Data Quality and Trust in Big Data - 5th International Workshop, 2018
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Joint Autonomous Resource Selection and Scheduled Resource Allocation for D2D-Based V2X Communication.
Proceedings of the 87th IEEE Vehicular Technology Conference, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Proceedings of the Service-Oriented Computing - 16th International Conference, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Joint Distributed and Centralized Resource Scheduling for D2D-Based V2X Communication.
Proceedings of the IEEE Global Communications Conference, 2018
2017
Multiple ECG Fiducial Points-Based Random Binary Sequence Generation for Securing Wireless Body Area Networks.
IEEE J. Biomed. Health Informatics, 2017
J. Medical Syst., 2017
A novel end-to-end classifier using domain transferred deep convolutional neural networks for biomedical images.
Comput. Methods Programs Biomed., 2017
Behav. Inf. Technol., 2017
Proceedings of the 28th IEEE Annual International Symposium on Personal, 2017
Proceedings of the 8th International IEEE/EMBS Conference on Neural Engineering, 2017
From WannaCry to WannaDie: Security trade-offs and design for implantable medical devices.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017
Proceedings of the Eleventh International Conference on Sensing Technology, 2017
2016
J. Vis. Lang. Comput., 2016
J. Vis. Lang. Comput., 2016
Cost-Effective Encryption-Based Autonomous Routing Protocol for Efficient and Secure Wireless Sensor Networks.
Sensors, 2016
High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding.
Quantum Inf. Process., 2016
PeerJ Prepr., 2016
Neurocomputing, 2016
Leveraging adjusted user behavior in the detection and prevention of outgoing malicious SMSs in Android devices.
Comput. Hum. Behav., 2016
TwitterNews+: A Framework for Real Time Event Detection from the Twitter Data Stream.
Proceedings of the Social Informatics - 8th International Conference, 2016
Empirical Studies of ECG Multiple Fiducial-Points Based Binary Sequence Generation (MFBSG) Algorithm in E-Health Sensor Platform.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016
A Dispute Arbitration Protocol Based on a Peer-to-Peer Service Contract Management Scheme.
Proceedings of the IEEE International Conference on Web Services, 2016
Strong Social Component-Aware Trust Sub-network Extraction in Contextual Social Networks.
Proceedings of the IEEE International Conference on Web Services, 2016
A Robust Approach to Finding Trustworthy Influencer in Trust-Oriented E-Commerce Environments.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016
An Uncertain Assessment Compatible Incentive Mechanism for Eliciting Continual and Truthful Assessments of Cloud Services.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016
Proceedings of the 18th IEEE International Conference on e-Health Networking, 2016
Proceedings of the 24th European Conference on Information Systems, 2016
A Novel Incentive Mechanism for Truthful Performance Assessments of Cloud Services: (Extended Abstract).
Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems, 2016
2015
CCCloud: Context-Aware and Credible Cloud Service Selection Based on Subjective Assessment and Objective Assessment.
IEEE Trans. Serv. Comput., 2015
A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes.
Quantum Inf. Process., 2015
Int. J. Web Serv. Res., 2015
J. Inf. Secur. Appl., 2015
A Review of Secure Routing Approaches for Current and Next-Generation Wireless Multimedia Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Concurr. Comput. Pract. Exp., 2015
Comput. Hum. Behav., 2015
Analyzing ant colony optimization based routing protocol against the hole problem for enhancing user's connectivity experience.
Comput. Hum. Behav., 2015
IEEE Access, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A comparison of key distribution schemes using fuzzy commitment and fuzzy vault within wireless body area networks.
Proceedings of the 26th IEEE Annual International Symposium on Personal, 2015
Analysis of the Scalability and Stability of an ACO Based Routing Protocol for Wireless Sensor Networks.
Proceedings of the 12th International Conference on Information Technology, 2015
BiNet: Trust Sub-network Extraction Using Binary Ant Colony Algorithm in Contextual Social Networks.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
2014
Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes.
Quantum Inf. Process., 2014
Fault-tolerant high-capacity quantum key distribution over a collective-noise channel using extended unitary operations.
Quantum Inf. Process., 2014
The Impact of Discrimination on the Spread of Infectious Diseases in Complex Networks.
New Gener. Comput., 2014
An ECG-based Secret Data Sharing scheme supporting emergency treatment of Implantable Medical Devices.
Proceedings of the 2014 International Symposium on Wireless Personal Multimedia Communications, 2014
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
Context-Aware Cloud Service Selection Based on Comparison and Aggregation of User Subjective Assessment and Objective Performance Assessment.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014
Evaluating Cloud Users' Credibility of Providing Subjective Assessment or Objective Assessment for Cloud Services.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE 14th International Conference on Advanced Learning Technologies, 2014
Cloud service selection based on contextual subjective assessment and objective assessment.
Proceedings of the International conference on Autonomous Agents and Multi-Agent Systems, 2014
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
2013
Finding the Optimal Social Trust Path for the Selection of Trustworthy Service Providers in Complex Social Networks.
IEEE Trans. Serv. Comput., 2013
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013
Optimization of XML Queries by Using Semantics in XML Schemas and the Document Structure.
Proceedings of the Web Information Systems Engineering - WISE 2013, 2013
Efficient Random Key Based Encryption System for Data Packet Confidentiality in WSNs.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 2013 IEEE 20th International Conference on Web Services, Santa Clara, CA, USA, June 28, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Representing and Reasoning about Utilization of Cloud Computing as Bayesian Games with Epistemic Logic.
Proceedings of the 4th International Conference on Ambient Systems, 2013
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013
Cloud Service Selection Based on the Aggregation of User Feedback and Quantitative Performance Assessment.
Proceedings of the 2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28, 2013
2012
J. Artif. Soc. Soc. Simul., 2012
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012
Discovering Trust Networks for the Selection of Trustworthy Service Providers in Complex Contextual Social Networks.
Proceedings of the 2012 IEEE 19th International Conference on Web Services, 2012
Proceedings of the 11th International Conference on Machine Learning and Applications, 2012
Modelling Bayesian attacker detection game in wireless networks with epistemic logic.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012
Proceedings of the 11th IEEE International Conference on Cognitive Informatics and Cognitive Computing, 2012
2011
IEEE Trans. Fuzzy Syst., 2011
J. Appl. Log., 2011
Int. J. Intell. Inf. Database Syst., 2011
Expert Syst. J. Knowl. Eng., 2011
Finding K Optimal Social Trust Paths for the Selection of Trustworthy Service Providers in Complex Social Networks.
Proceedings of the IEEE International Conference on Web Services, 2011
The prediction of trust rating based on the quality of services using fuzzy linear regression.
Proceedings of the FUZZ-IEEE 2011, 2011
A scalable approach for inferring transcriptional regulation in the yeast cell cycle.
Proceedings of the ACM International Conference on Bioinformatics, 2011
Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence, 2011
2010
Analysis of microarray data to infer transcription regulation in the yeast cell cycle.
Int. J. Funct. Informatics Pers. Medicine, 2010
Appl. Artif. Intell., 2010
Proceedings of the PRICAI 2010: Trends in Artificial Intelligence, 2010
Proceedings of the Fourth International Conference on Network and System Security, 2010
A least square approach for the detection and removal of outliers for fuzzy linear regressions.
Proceedings of the Second World Congress on Nature & Biologically Inspired Computing, 2010
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2010
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010
Proceedings of the Advances in Data Mining. Applications and Theoretical Aspects, 2010
Proceedings of the Fourteenth International Database Engineering and Applications Symposium (IDEAS 2010), 2010
The Discovery of Hierarchical Cluster Structures Assisted by a Visualization Technique.
Proceedings of the Neural Information Processing. Theory and Algorithms, 2010
Proceedings of the 18th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
Failed-tuple triggered blocking strategy for managing near real-time spatial data replication.
Proceedings of the 1st International Conference and Exhibition on Computing for Geospatial Research & Application, 2010
Proceedings of the AI 2010: Advances in Artificial Intelligence, 2010
Proceedings of the AI 2010: Advances in Artificial Intelligence, 2010
Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2010), 2010
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
Efficiently Querying XML Documents Stored in RDBMS in the Presence of Dewey-Based Labeling Scheme.
Proceedings of the Intelligent Information and Database Systems, 2010
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence, 2010
A Heuristic Algorithm for Trust-Oriented Service Provider Selection in Complex Social Networks.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010
2009
IEEE Trans. Syst. Man Cybern. Part B, 2009
Auton. Agents Multi Agent Syst., 2009
Using dynamic bayesian networks to infer gene regulatory networks from expression profiles.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
Proceedings of the Knowledge Science, 2009
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the Neural Information Processing, 16th International Conference, 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
A 2-Stage Approach for Inferring Gene Regulatory Networks Using Dynamic Bayesian Networks.
Proceedings of the 2009 IEEE International Conference on Bioinformatics and Biomedicine, 2009
Proceedings of the Autonomic and Trusted Computing, 6th International Conference, 2009
2008
Knowledge Representation, Reasoning and Integration Using Temporal Logic with Clocks.
Math. Comput. Sci., 2008
Inf. Syst. Frontiers, 2008
Expert Syst. J. Knowl. Eng., 2008
A Multi-Versioning Scheme for Intention Preservation in Collaborative Editing Systems.
Comput. Support. Cooperative Work., 2008
The Reactive-Causal Architecture: Introducing an Emotion Model along with Theories of Needs.
Proceedings of the Research and Development in Intelligent Systems XXV, 2008
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008
Proceedings of the Intelligent Virtual Agents, 8th International Conference, 2008
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008
The reactive-causal architecture: Combining intentional notion and theories of needs.
Proceedings of the Seventh IEEE International Conference on Cognitive Informatics, 2008
2007
Unsupervised Learning Aided by Clustering and Local-Global Hierarchical Analysis in Knowledge Exploration.
J. Digit. Inf. Manag., 2007
Proceedings of the Advances in Visual Information Systems, 9th International Conference, 2007
A Prediction-Based Visual Approach for Cluster Exploration and Cluster Validation by HOV<sup>3</sup>.
Proceedings of the Knowledge Discovery in Databases: PKDD 2007, 2007
Proceedings of the IEEE International Conference on Information Reuse and Integration, 2007
Proceedings of the IJCAI 2007, 2007
Proceedings of the Fourth European Conference on Universal Multiservice Networks (ECUMN 2007), 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
Proceedings of the Computational Logic in Multi-Agent Systems, 8th International Workshop, 2007
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007
2006
From Predefined Consistency to User-Centered Emergent Consistency in Real-Time Collaborative Editing Systems.
IEEE Trans. Syst. Man Cybern. Part A, 2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
Proceedings of the Knowledge Science, 2006
Proceedings of the Knowledge Science, 2006
Proceedings of the Sixth International Conference on Intelligent Systems Design and Applications (ISDA 2006), 2006
Representation and integration of knowledge based on multiple granularity of time using temporal logic.
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006
Proceedings of the 2006 IEEE International Conference on Information Reuse and Integration, 2006
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006
Proceedings of the 10th International Conference on CSCW in Design, 2006
Proceedings of the working conference on Advanced visual interfaces, 2006
Proceedings of the Data Mining - Theory, Methodology, Techniques, and Applications, 2006
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
Proceedings of the Advances in Information Systems, 4th International Conference, 2006
Proceedings of the Advanced Data Mining and Applications, Second International Conference, 2006
2005
Locking without requesting a lock: A consistency maintenance mechanism in Internet-based real-time group editors.
J. Parallel Distributed Comput., 2005
Proceedings of the Computer and Information Sciences, 2005
Proceedings of the HYPERTEXT 2005, 2005
Proceedings of the Belief Change in Rational Agents: Perspectives from Artificial Intelligence, 2005
Proceedings of the AI 2005: Advances in Artificial Intelligence, 2005
2004
An Analytical Framework for Consistency Maintenance Mechanisms in Collaborative Editing Systems.
Proceedings of the Sixteenth International Conference on Software Engineering & Knowledge Engineering (SEKE'2004), 2004
A Temporalised Belief Logic for Specifying the Dynamics of Trust for Multi-agent Systems.
Proceedings of the Advances in Computer Science, 2004
2003
Proceedings of the Visual Information Processing 2003, 2003
Proceedings of the 2003 Symposium on Applications and the Internet (SAINT 2003), 27-31 January 2003, 2003
A Multi-versioning Algorithm for Intention Preservation in Distributed Real-time Group Editors.
Proceedings of the Computer Science 2003, 2003
2002
Proceedings of the Visualisation 2002, 2002
Editing Any Version at Any Time: a consistency maintenance mechanism in Internet-based collaborative environments.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002
Proceedings of the Engineering and Deployment of Cooperative Information Systems, 2002
Proceedings of the Diagrammatic Representation and Inference, 2002
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002
Proceedings of the Distributed Communities on the Web, 4th International Workshop, 2002
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002
An Overview Of Temporal Data Mining.
Proceedings of the 15th Australian Joint Conference on Artificial Intelligence 2002, 2002
2001
World Wide Web, 2001
A parallel execution model for Chronolog.
Comput. Syst. Sci. Eng., 2001
Using Graph Grammer to Implement Global Layout for a Visual Programming Language Generation System.
Proceedings of the Visualisation 2001, 2001
Proceedings of the Knowledge Discovery and Data Mining, 2001
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001
Proceedings of the Database Systems for Advanced Applications, Proceedings of the 7th International Conference on Database Systems for Advanced Applications (DASFAA 2001), 18-20 April 2001, 2001
2000
Proceedings of the Foundations of Intelligent Systems, 12th International Symposium, 2000
Proceedings of the Intelligent Data Engineering and Automated Learning, 2000
Proceedings of the Seventh International Conference on Parallel and Distributed Systems Workshops, 2000
Proceedings of the Distributed Communities on the Web, Third International Workshop, 2000
Proceedings of the Current Issues in Databases and Information Systems, 2000
1999
Theor. Comput. Sci., 1999
Proceedings of the 6th International Workshop on Temporal Representation and Reasoning, 1999
Proceedings of the Foundations of Intelligent Systems, 11th International Symposium, 1999
Proceedings of the 1999 International Database Engineering and Applications Symposium, 1999
1998
Proceedings of the 5th Workshop on Temporal Representation and Reasoning, 1998
Proceedings of the 1998 International Database Engineering and Applications Symposium, 1998
Proceedings of the Flexible Query Answering Systems, Third International Conference, 1998
Proceedings of the Eleventh International Florida Artificial Intelligence Research Society Conference, 1998
Proceedings of the Advances in Databases and Information Systems, 1998
1997
Theor. Comput. Sci., 1997
Proceedings of the 4th International Workshop on Temporal Representation and Reasoning, 1997
A Constraint Mechanism for Knowlege Specification of Simulation Systems Based on Temporal Logic.
Proceedings of the Advanced Topics in Artificial Intelligence, 1997
1996
Executable Temporal Logic Systems.
J. Symb. Comput., 1996
J. Symb. Comput., 1996
RAIRO Theor. Informatics Appl., 1996
Proceedings of the Third International Workshop on Temporal Representation and Reasoning, 1996
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996
1995
A temporal paraconsistent relational algebra for incomplete and inconsistent information.
Proceedings of the 33th Annual Southeast Regional Conference, 1995
1994
J. Log. Comput., 1994
Proceedings of the Temporal Logic, First International Conference, 1994
1993
J. Softw. Maintenance Res. Pract., 1993
The Soundness and Completeness of a Temporal Extension of Logic Programming.
Proceedings of the Logic Programming, 1993
Chronolog (Z): Linear-Time Logic Programming.
Proceedings of the Computing and Information, 1993
A Temporal Algebra Based on an Abstract Model.
Proceedings of the Advances in Database Research, 1993
1992
Proceedings of the 10th Annual International Conference on Systems Documentation, 1992
A reverse engineering environment based on spatial and visual software interconnection models.
Proceedings of the 5th ACM SIGSOFT Symposium on Software Development Environments, 1992
A Relational Algebra as a Query Language for Temporal DATALOG.
Proceedings of the International Conference on Database and Expert Systems Applications, 1992
1991