Thomas H. Hinke
According to our database1,
Thomas H. Hinke
authored at least 27 papers
between 1983 and 2005.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on cs.uah.edu
On csauthors.net:
Bibliography
2005
Proceedings of the Distributed Computing, 2005
2003
2002
2001
IEEE Trans. Pattern Anal. Mach. Intell., 2001
2000
Artif. Intell. Rev., 2000
Proceedings of the Ninth IEEE International Symposium on High Performance Distributed Computing, 2000
1997
Proceedings of the Ninth International Conference on Scientific and Statistical Database Management, 1997
Target-Independent Mining for Scientific Data: Capturing Transients and Trends for Phenomena Mining.
Proceedings of the Third International Conference on Knowledge Discovery and Data Mining (KDD-97), 1997
1996
IEEE Trans. Knowl. Data Eng., 1996
Proceedings of the 1st IEEE Metadata Conference 1996, MD 1996, Silver Spring, 1996
Proceedings of the Conceptual Structures: Knowledge Representation as Interlingua, 1996
A Framework for Inference-Directed Data Mining.
Proceedings of the Database Security Volume X, 1996
1995
J. Comput. Secur., 1995
Security and Data Mining.
Proceedings of the Database Security IX: Status and Prospects, 1995
ILIAD: An Integrated Laboratoty For Inference Analysis and Detection.
Proceedings of the Database Security IX: Status and Prospects, 1995
1993
Layered Knowledge Chunks for Database Inference.
Proceedings of the Database Security, 1993
1992
Proceedings of the Conceptual Structures: Theory and Implementation, 1992
Aerie: An Inference Modeling and Detection Approach for Databases.
Proceedings of the Database Security, 1992
1989
DBMS Trusted Computing Base Taxonomy.
Proceedings of the Database Security, 1989
A Layered TCB Implementation versus the Hinke-Schaefer Approach.
Proceedings of the Database Security, 1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
Proceedings of the Fifth Annual Computer Security Applications Conference, 1989
1988
Proceedings of the 1988 IEEE Symposium on Security and Privacy, 1988
Database Inference Engine Design Approach.
Proceedings of the Database Security, 1988
1987
DBMS Technology vs. Threats.
Proceedings of the Database Security: Status and Prospects. Results of the IFIP WG 11.3 Initial Meeting, 1987
1983
Proceedings of the 1983 IEEE Symposium on Security and Privacy, 1983