Search the dblp DataBase
Willem Jonker :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Willem Jonker , Jan Willem Spee Yet Another Formalisation of KADS Conceptual Models. [Citation Graph (1, 0)][DBLP ] EKAW, 1992, pp:211-229 [Conf ] Petra Bayer , Willem Jonker A Framework for Supporting Triggers in Deductive Databases. [Citation Graph (1, 0)][DBLP ] Rules in Database Systems, 1993, pp:316-330 [Conf ] Wijnand Derks , Juliane Dehnert , Paul W. P. J. Grefen , Willem Jonker Customized Atomicity Specification for Transactional Workflows. [Citation Graph (0, 0)][DBLP ] CODAS, 2001, pp:155-164 [Conf ] Jeroen Wijnands , Sietse Dijkstra , Wijnand Derks , Willem Jonker Experimenting NT Cluster Technology for Massive CDR Processing. [Citation Graph (0, 0)][DBLP ] Databases in Telecommunications, 2001, pp:19-36 [Conf ] Stéphane Bressan , Willem Jonker , Andrea Sikeler Extending Deductive Databases with Object Orientation. [Citation Graph (0, 0)][DBLP ] Workshop on Programming with Logic Databases (Informal Proceedings), ILPS, 1993, pp:167- [Conf ] Wijnand Derks , Sietse Dijkstra , H. D. Enting , Willem Jonker , Jeroen Wijnands Experimenting NUMA for Scalable CDR Processing. [Citation Graph (0, 0)][DBLP ] DEXA, 2000, pp:970-980 [Conf ] Ling Feng , Peter M. G. Apers , Willem Jonker Towards Context-Aware Data Management for Ambient Intelligence. [Citation Graph (0, 0)][DBLP ] DEXA, 2004, pp:422-431 [Conf ] Marko Smiljanic , Maurice van Keulen , Willem Jonker Formalizing the XML Schema Matching Problem as a Constraint Optimization Problem. [Citation Graph (0, 0)][DBLP ] DEXA, 2005, pp:333-342 [Conf ] Claudine Conrado , Frank Kamperman , Geert Jan Schrijen , Willem Jonker Privacy in an Identity-based DRM System. [Citation Graph (0, 0)][DBLP ] DEXA Workshops, 2003, pp:389-395 [Conf ] Wijnand Derks , Willem Jonker Practical Experiences with Materialized Views in a Very Large Data Store for Telecommunication Service Management. [Citation Graph (0, 0)][DBLP ] DEXA Workshop, 1998, pp:881-886 [Conf ] Milan Petkovic , Willem Jonker Cobra: A Content-Based Video Retrieval System. [Citation Graph (0, 0)][DBLP ] EDBT, 2002, pp:736-738 [Conf ] Milan Petkovic , Vojkan Mihajlovic , Willem Jonker Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study. [Citation Graph (0, 0)][DBLP ] EDBT Workshops, 2002, pp:318-341 [Conf ] Milan Petkovic , Willem Jonker Content-Based Video Retrieval by Integrating Spatio-Temporal and Stochastic Recognition of Events. [Citation Graph (0, 0)][DBLP ] IEEE Workshop on Detection and Recognition of Events in Video, 2001, pp:75-82 [Conf ] Paul de Jager , Willem Jonker , Albert Wammes , Johan Wester An Interactive Programming Environment for LOTOS. [Citation Graph (0, 0)][DBLP ] FORTE, 1990, pp:581-584 [Conf ] Milan Petkovic , Roelof van Zwol , Henk Ernst Blok , Willem Jonker , Peter M. G. Apers , Menzo Windhouwer , Martin L. Kersten Content-Based Video Indexing for the Support of Digital Library Search. [Citation Graph (0, 0)][DBLP ] ICDE, 2002, pp:494-495 [Conf ] Marko Smiljanic , Maurice van Keulen , Willem Jonker Using Element Clustering to Increase the Efficiency of XML Schema Matching. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2006, pp:45- [Conf ] Marko Smiljanic , Maurice van Keulen , Willem Jonker Effectiveness Bounds for Non-Exhaustive Schema Matching Systems. [Citation Graph (0, 0)][DBLP ] ICDE Workshops, 2006, pp:83- [Conf ] Milan Petkovic , Vojkan Mihajlovic , Willem Jonker Techniques for automatic video content derivation. [Citation Graph (0, 0)][DBLP ] ICIP (2), 2003, pp:611-614 [Conf ] A. Woudstra , D. D. Velthausz , H. J. G. de Poot , F. Moelaert El-Hadidy , Willem Jonker , Maurice A. W. Houtsma , R. G. Heller , J. N. H. Heemskerk Modeling and Retrieving Audiovisual Information: A Soccer Video Retrieval System. [Citation Graph (0, 0)][DBLP ] Multimedia Information Systems, 1998, pp:161-173 [Conf ] Ling Feng , Willem Jonker Efficient Processing of Secured XML Metadata. [Citation Graph (0, 0)][DBLP ] OTM Workshops, 2003, pp:704-717 [Conf ] Andreas Wombacher , Roel Wieringa , Willem Jonker , Predrag Knezevic , Stanislav Pokraev Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions. [Citation Graph (0, 0)][DBLP ] OTM Workshops, 2005, pp:526-536 [Conf ] Richard Brinkman , Jeroen Doumen , Willem Jonker Using Secret Sharing for Searching in Encrypted Data. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2004, pp:18-27 [Conf ] Richard Brinkman , Berry Schoenmakers , Jeroen Doumen , Willem Jonker Experiments with Queries over Encrypted Data Using Secret Sharing. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2005, pp:33-46 [Conf ] Claudine Conrado , Milan Petkovic , Willem Jonker Privacy-Preserving Digital Rights Management. [Citation Graph (0, 0)][DBLP ] Secure Data Management, 2004, pp:83-99 [Conf ] Willem Jonker , Bob Goedhart KBS Development: From Design Models to Implementations. [Citation Graph (0, 0)][DBLP ] SEKE, 1993, pp:657-664 [Conf ] Willem Jonker , Heribert Schütz The ECRC Multi Database System. [Citation Graph (0, 1)][DBLP ] SIGMOD Conference, 1995, pp:490- [Conf ] Richard Brinkman , Ling Feng , Jeroen Doumen , Pieter H. Hartel , Willem Jonker Efficient Tree Search in Encrypted Data. [Citation Graph (0, 0)][DBLP ] WOSIS, 2004, pp:126-135 [Conf ] Milan Petkovic , Willem Jonker , Z. Zivkovic Recognizing Strokes in Tennis Videos using Hidden Markov Models. [Citation Graph (0, 0)][DBLP ] VIIP, 2001, pp:512-516 [Conf ] Henk Ernst Blok , Menzo Windhouwer , Roelof van Zwol , Milan Petkovic , Peter M. G. Apers , Martin L. Kersten , Willem Jonker Flexible and scalable digital library search. [Citation Graph (0, 0)][DBLP ] VLDB, 2001, pp:705-706 [Conf ] Wijnand Derks , Sietse Dijkstra , Willem Jonker , Jeroen Wijnands Assesment of Scaleable Database Architectures for CDR Analysis - An Experimental Approach. [Citation Graph (0, 0)][DBLP ] Databases in Telecommunications, 1999, pp:133-143 [Conf ] Willem Jonker , Wim Nijenhuis , Zef Damen , Martin Verwijmeren Workflow Management Systems and Cross-Organisational Logistics. [Citation Graph (0, 0)][DBLP ] Cross-Organisational Workflow Management and Co-ordination, 1999, pp:- [Conf ] Marko Smiljanic , Ling Feng , Willem Jonker Web-Based Distributed XML Query Processing. [Citation Graph (0, 0)][DBLP ] Intelligent Search on XML Data, 2003, pp:207-216 [Conf ] Willem Jonker XML and secure data management in an ambient world. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2003, v:18, n:5, pp:311-317 [Journal ] Ling Feng , Willem Jonker Preparations for encrypted XML metadata querying. [Citation Graph (0, 0)][DBLP ] Comput. Syst. Sci. Eng., 2004, v:19, n:3, pp:- [Journal ] Milan Petkovic , Willem Jonker Integrated use of different content derivation techniques within a multimedia database management system. [Citation Graph (0, 0)][DBLP ] J. Visual Communication and Image Representation, 2004, v:15, n:3, pp:303-329 [Journal ] Anna Zych , Milan Petkovic , Willem Jonker The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. [Citation Graph (0, 0)][DBLP ] DBSec, 2007, pp:95-97 [Conf ] Inter-domain Identity-Based Proxy Re-encryption. [Citation Graph (, )][DBLP ] Towards an Information Theoretic Analysis of Searchable Encryption. [Citation Graph (, )][DBLP ] Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. [Citation Graph (, )][DBLP ] Searching Keywords with Wildcards on Encrypted Data. [Citation Graph (, )][DBLP ] Computationally Efficient Searchable Symmetric Encryption. [Citation Graph (, )][DBLP ] A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare. [Citation Graph (, )][DBLP ] A Key Management Method for Cryptographically Enforced Access Control. [Citation Graph (, )][DBLP ] Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. [Citation Graph (, )][DBLP ] Search in 0.060secs, Finished in 0.062secs