Timothy Redmond

Orcid: 0009-0006-2218-4789

According to our database1, Timothy Redmond authored at least 16 papers between 1988 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Ontology Repositories and Semantic Artefact Catalogues with the OntoPortal Technology.
Proceedings of the Semantic Web - ISWC 2023, 2023

2013
Binary OWL.
Proceedings of the 10th International Workshop on OWL: Experiences and Directions (OWLED 2013) co-located with 10th Extended Semantic Web Conference (ESWC 2013), 2013

2012
Formalizing Meta Models with FDMM: The ADOxx Case.
Proceedings of the Enterprise Information Systems - 14th International Conference, 2012

FDMM: A Formalism for Describing ADOxx Meta Models and Models.
Proceedings of the ICEIS 2012 - Proceedings of the 14th International Conference on Enterprise Information Systems, Volume 3, Wroclaw, Poland, 28 June, 2012

2010
A multilinear operator for almost product evaluation of Hankel determinants.
J. Comb. Theory A, 2010

An Open Source Database Backend for the OWL API and Protege 4.
Proceedings of the 7th International Workshop on OWL: Experiences and Directions (OWLED 2010), 2010

2008
Almost Product Evaluation of Hankel Determinants.
Electron. J. Comb., 2008

Managing Change: An Ontology Version Control System.
Proceedings of the Fifth OWLED Workshop on OWL: Experiences and Directions, 2008

2002
Noninterference and Intrusion Detection.
Proceedings of the 2002 IEEE Symposium on Security and Privacy, 2002

2001
From a Polynomial Riemann Hypothesis to Alternating Sign Matrices.
Electron. J. Comb., 2001

1993
A Lattice of Information.
Proceedings of the 6th IEEE Computer Security Foundations Workshop, 1993

1992
Unwinding and the LOCK Proof Referees Study.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

A Framework for Composition of Security Models.
Proceedings of the 5th IEEE Computer Security Foundations Workshop, 1992

1989
Formal Policies for Trusted Processes.
Proceedings of the Second IEEE Computer Security Foundations Workshop, 1989

1988
A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies.
Proceedings of the First IEEE Computer Security Foundations Workshop, 1988

Two Automated Methods in Implementation Proofs.
Proceedings of the 9th International Conference on Automated Deduction, 1988


  Loading...