The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Willem Jonker: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Willem Jonker, Jan Willem Spee
    Yet Another Formalisation of KADS Conceptual Models. [Citation Graph (1, 0)][DBLP]
    EKAW, 1992, pp:211-229 [Conf]
  2. Petra Bayer, Willem Jonker
    A Framework for Supporting Triggers in Deductive Databases. [Citation Graph (1, 0)][DBLP]
    Rules in Database Systems, 1993, pp:316-330 [Conf]
  3. Wijnand Derks, Juliane Dehnert, Paul W. P. J. Grefen, Willem Jonker
    Customized Atomicity Specification for Transactional Workflows. [Citation Graph (0, 0)][DBLP]
    CODAS, 2001, pp:155-164 [Conf]
  4. Jeroen Wijnands, Sietse Dijkstra, Wijnand Derks, Willem Jonker
    Experimenting NT Cluster Technology for Massive CDR Processing. [Citation Graph (0, 0)][DBLP]
    Databases in Telecommunications, 2001, pp:19-36 [Conf]
  5. Stéphane Bressan, Willem Jonker, Andrea Sikeler
    Extending Deductive Databases with Object Orientation. [Citation Graph (0, 0)][DBLP]
    Workshop on Programming with Logic Databases (Informal Proceedings), ILPS, 1993, pp:167- [Conf]
  6. Wijnand Derks, Sietse Dijkstra, H. D. Enting, Willem Jonker, Jeroen Wijnands
    Experimenting NUMA for Scalable CDR Processing. [Citation Graph (0, 0)][DBLP]
    DEXA, 2000, pp:970-980 [Conf]
  7. Ling Feng, Peter M. G. Apers, Willem Jonker
    Towards Context-Aware Data Management for Ambient Intelligence. [Citation Graph (0, 0)][DBLP]
    DEXA, 2004, pp:422-431 [Conf]
  8. Marko Smiljanic, Maurice van Keulen, Willem Jonker
    Formalizing the XML Schema Matching Problem as a Constraint Optimization Problem. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:333-342 [Conf]
  9. Claudine Conrado, Frank Kamperman, Geert Jan Schrijen, Willem Jonker
    Privacy in an Identity-based DRM System. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:389-395 [Conf]
  10. Wijnand Derks, Willem Jonker
    Practical Experiences with Materialized Views in a Very Large Data Store for Telecommunication Service Management. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:881-886 [Conf]
  11. Milan Petkovic, Willem Jonker
    Cobra: A Content-Based Video Retrieval System. [Citation Graph (0, 0)][DBLP]
    EDBT, 2002, pp:736-738 [Conf]
  12. Milan Petkovic, Vojkan Mihajlovic, Willem Jonker
    Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study. [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2002, pp:318-341 [Conf]
  13. Milan Petkovic, Willem Jonker
    Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events. [Citation Graph (0, 0)][DBLP]
    IEEE Workshop on Detection and Recognition of Events in Video, 2001, pp:75-82 [Conf]
  14. Paul de Jager, Willem Jonker, Albert Wammes, Johan Wester
    An Interactive Programming Environment for LOTOS. [Citation Graph (0, 0)][DBLP]
    FORTE, 1990, pp:581-584 [Conf]
  15. Milan Petkovic, Roelof van Zwol, Henk Ernst Blok, Willem Jonker, Peter M. G. Apers, Menzo Windhouwer, Martin L. Kersten
    Content-Based Video Indexing for the Support of Digital Library Search. [Citation Graph (0, 0)][DBLP]
    ICDE, 2002, pp:494-495 [Conf]
  16. Marko Smiljanic, Maurice van Keulen, Willem Jonker
    Using Element Clustering to Increase the Efficiency of XML Schema Matching. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:45- [Conf]
  17. Marko Smiljanic, Maurice van Keulen, Willem Jonker
    Effectiveness Bounds for Non-Exhaustive Schema Matching Systems. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:83- [Conf]
  18. Milan Petkovic, Vojkan Mihajlovic, Willem Jonker
    Techniques for automatic video content derivation. [Citation Graph (0, 0)][DBLP]
    ICIP (2), 2003, pp:611-614 [Conf]
  19. A. Woudstra, D. D. Velthausz, H. J. G. de Poot, F. Moelaert El-Hadidy, Willem Jonker, Maurice A. W. Houtsma, R. G. Heller, J. N. H. Heemskerk
    Modeling and Retrieving Audiovisual Information: A Soccer Video Retrieval System. [Citation Graph (0, 0)][DBLP]
    Multimedia Information Systems, 1998, pp:161-173 [Conf]
  20. Ling Feng, Willem Jonker
    Efficient Processing of Secured XML Metadata. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2003, pp:704-717 [Conf]
  21. Andreas Wombacher, Roel Wieringa, Willem Jonker, Predrag Knezevic, Stanislav Pokraev
    Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions. [Citation Graph (0, 0)][DBLP]
    OTM Workshops, 2005, pp:526-536 [Conf]
  22. Richard Brinkman, Jeroen Doumen, Willem Jonker
    Using Secret Sharing for Searching in Encrypted Data. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:18-27 [Conf]
  23. Richard Brinkman, Berry Schoenmakers, Jeroen Doumen, Willem Jonker
    Experiments with Queries over Encrypted Data Using Secret Sharing. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2005, pp:33-46 [Conf]
  24. Claudine Conrado, Milan Petkovic, Willem Jonker
    Privacy-Preserving Digital Rights Management. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:83-99 [Conf]
  25. Willem Jonker, Bob Goedhart
    KBS Development: From Design Models to Implementations. [Citation Graph (0, 0)][DBLP]
    SEKE, 1993, pp:657-664 [Conf]
  26. Willem Jonker, Heribert Schütz
    The ECRC Multi Database System. [Citation Graph (0, 1)][DBLP]
    SIGMOD Conference, 1995, pp:490- [Conf]
  27. Richard Brinkman, Ling Feng, Jeroen Doumen, Pieter H. Hartel, Willem Jonker
    Efficient Tree Search in Encrypted Data. [Citation Graph (0, 0)][DBLP]
    WOSIS, 2004, pp:126-135 [Conf]
  28. Milan Petkovic, Willem Jonker, Z. Zivkovic
    Recognizing Strokes in Tennis Videos using Hidden Markov Models. [Citation Graph (0, 0)][DBLP]
    VIIP, 2001, pp:512-516 [Conf]
  29. Henk Ernst Blok, Menzo Windhouwer, Roelof van Zwol, Milan Petkovic, Peter M. G. Apers, Martin L. Kersten, Willem Jonker
    Flexible and scalable digital library search. [Citation Graph (0, 0)][DBLP]
    VLDB, 2001, pp:705-706 [Conf]
  30. Wijnand Derks, Sietse Dijkstra, Willem Jonker, Jeroen Wijnands
    Assesment of Scaleable Database Architectures for CDR Analysis - An Experimental Approach. [Citation Graph (0, 0)][DBLP]
    Databases in Telecommunications, 1999, pp:133-143 [Conf]
  31. Willem Jonker, Wim Nijenhuis, Zef Damen, Martin Verwijmeren
    Workflow Management Systems and Cross-Organisational Logistics. [Citation Graph (0, 0)][DBLP]
    Cross-Organisational Workflow Management and Co-ordination, 1999, pp:- [Conf]
  32. Marko Smiljanic, Ling Feng, Willem Jonker
    Web-Based Distributed XML Query Processing. [Citation Graph (0, 0)][DBLP]
    Intelligent Search on XML Data, 2003, pp:207-216 [Conf]
  33. Willem Jonker
    XML and secure data management in an ambient world. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2003, v:18, n:5, pp:311-317 [Journal]
  34. Ling Feng, Willem Jonker
    Preparations for encrypted XML metadata querying. [Citation Graph (0, 0)][DBLP]
    Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal]
  35. Milan Petkovic, Willem Jonker
    Integrated use of different content derivation techniques within a multimedia database management system. [Citation Graph (0, 0)][DBLP]
    J. Visual Communication and Image Representation, 2004, v:15, n:3, pp:303-329 [Journal]
  36. Anna Zych, Milan Petkovic, Willem Jonker
    The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. [Citation Graph (0, 0)][DBLP]
    DBSec, 2007, pp:95-97 [Conf]

  37. Inter-domain Identity-Based Proxy Re-encryption. [Citation Graph (, )][DBLP]


  38. Towards an Information Theoretic Analysis of Searchable Encryption. [Citation Graph (, )][DBLP]


  39. Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Citation Graph (, )][DBLP]


  40. Searching Keywords with Wildcards on Encrypted Data. [Citation Graph (, )][DBLP]


  41. Computationally Efficient Searchable Symmetric Encryption. [Citation Graph (, )][DBLP]


  42. A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. [Citation Graph (, )][DBLP]


  43. A Key Management Method for Cryptographically Enforced Access Control. [Citation Graph (, )][DBLP]


  44. Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. [Citation Graph (, )][DBLP]


Search in 0.060secs, Finished in 0.062secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002