The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Nahid Shahmehri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cécile Aberg, Johan Aberg, Patrick Lambrix, Nahid Shahmehri
    A Platform to Evaluate the Technology for Service Discovery in the Semantic Web. [Citation Graph (0, 0)][DBLP]
    AAAI, 2006, pp:- [Conf]
  2. Nahid Shahmehri, Mariam Kamkar, Peter Fritzson
    Usability Criteria for Automated Debugging Systems. [Citation Graph (0, 0)][DBLP]
    AADEBUG, 1993, pp:16-39 [Conf]
  3. Dennis Maciuszek, Johan Aberg, Nahid Shahmehri
    What help do older people need?: constructing a functional design space of electronic assistive technology applications. [Citation Graph (0, 0)][DBLP]
    ASSETS, 2005, pp:4-11 [Conf]
  4. Nahid Shahmehri, Peter Fritzson
    Algorithmic Debugging for Imperative Languages with Side-Effects (Abstract). [Citation Graph (0, 0)][DBLP]
    CC, 1990, pp:226-227 [Conf]
  5. Johan Aberg, Nahid Shahmehri
    An empirical study of human Web assistants: implications for user support in Web information systems. [Citation Graph (0, 0)][DBLP]
    CHI, 2001, pp:404-411 [Conf]
  6. Claudiu Duma, Martin Karresand, Nahid Shahmehri, Germano Caronni
    A Trust-Aware, P2P-Based Overlay for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2006, pp:692-697 [Conf]
  7. Claudiu Duma, Nahid Shahmehri, Germano Caronni
    Dynamic Trust Metrics for Peer-to-Peer Systems. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2005, pp:776-781 [Conf]
  8. Juha Takkinen, Nahid Shahmehri
    Coordination in Message-Based Environments: Restructuring Internet E-Mail to Accomplish Tasks. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1998, pp:566-571 [Conf]
  9. Patrick Lambrix, Nahid Shahmehri, Niclas Wahllöf
    Dwebic: An Intelligent Search Engine based on Default Description Logics. [Citation Graph (0, 0)][DBLP]
    Description Logics, 1997, pp:- [Conf]
  10. Piero A. Bonatti, Claudiu Duma, Norbert E. Fuchs, Wolfgang Nejdl, Daniel Olmedilla, Joachim Peer, Nahid Shahmehri
    Semantic Web Policies - A Discussion of Requirements and Research Issues. [Citation Graph (0, 0)][DBLP]
    ESWC, 2006, pp:712-724 [Conf]
  11. Johan Aberg, Nahid Shahmehri
    Collection and Exploitation of Expert Knowledge in Web Assistant Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  12. Patrick Lambrix, Nahid Shahmehri
    TRIFU: The Right Information For yoU. [Citation Graph (0, 0)][DBLP]
    HICSS (4), 1998, pp:505-512 [Conf]
  13. Patrick Lambrix, Nahid Shahmehri, Niclas Wahllöf
    A Default Extension to Description Logics for Use in an Intelligent Search Engine. [Citation Graph (0, 0)][DBLP]
    HICSS (5), 1998, pp:28-35 [Conf]
  14. Juha Takkinen, Nahid Shahmehri
    CAFE: A Conceptual Model for Managing Information in Electronic Mail. [Citation Graph (0, 0)][DBLP]
    HICSS (5), 1998, pp:44-53 [Conf]
  15. Juha Takkinen, Nahid Shahmehri
    Task-Oriented Restructuring of an Application Domain: A Multi-Agent Architecture for Doing Things in Internet E-Mail. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  16. Mariam Kamkar, Peter Fritzson, Nahid Shahmehri
    Interprocedural Dynamic Slicing Applied to Interprocedural Data How Testing. [Citation Graph (0, 0)][DBLP]
    ICSM, 1993, pp:386-395 [Conf]
  17. David Byers, Shanai Ardi, Nahid Shahmehri, Claudiu Duma
    Modeling Software VulnerabilitiesWith Vulnerability Cause Graphs. [Citation Graph (0, 0)][DBLP]
    ICSM, 2006, pp:411-422 [Conf]
  18. Cécile Aberg, Nahid Shahmehri
    A Framework for Generating Task Specific Information Extraction Systems. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2002, pp:491-502 [Conf]
  19. Cécile Boisson, Nahid Shahmehri
    Template Generation for Identifying Text Patterns. [Citation Graph (0, 0)][DBLP]
    ISMIS, 2000, pp:463-473 [Conf]
  20. Patrick Lambrix, Nahid Shahmehri, Svend Jacobsen
    Querying Document Bases by Content, Structure and Properties. [Citation Graph (0, 0)][DBLP]
    ISMIS, 1999, pp:123-132 [Conf]
  21. Eduard Turcan, Nahid Shahmehri, Ross Lee Graham
    Intelligent Software Delivery Using P2P. [Citation Graph (0, 0)][DBLP]
    Peer-to-Peer Computing, 2002, pp:136-143 [Conf]
  22. He Tan, Vaida Jakoniene, Patrick Lambrix, Johan Aberg, Nahid Shahmehri
    Alignment of Biomedical Ontologies Using Life Science Literature. [Citation Graph (0, 0)][DBLP]
    KDLL, 2006, pp:1-17 [Conf]
  23. Peter Fritzson, Tibor Gyimóthy, Mariam Kamkar, Nahid Shahmehri
    Generalized Algorithmic Debugging and Testing. [Citation Graph (0, 0)][DBLP]
    PLDI, 1991, pp:317-326 [Conf]
  24. Mariam Kamkar, Nahid Shahmehri, Peter Fritzson
    Bug Localization by Algorithmic Debugging and Program Slicing. [Citation Graph (0, 0)][DBLP]
    PLILP, 1990, pp:60-74 [Conf]
  25. Mariam Kamkar, Nahid Shahmehri, Peter Fritzson
    Interprocedural Dynamic Slicing. [Citation Graph (0, 0)][DBLP]
    PLILP, 1992, pp:370-384 [Conf]
  26. Claudiu Duma, Nahid Shahmehri, Patrick Lambrix
    A Flexible Category-Based Collusion-Restistant Key Management Scheme for Multicast. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:133-144 [Conf]
  27. Almut Herzog, Nahid Shahmehri
    A Usability Study of Security Policy Management. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:296-306 [Conf]
  28. Martin Karresand, Nahid Shahmehri
    Oscar - File Type Identification of Binary Data in Disk Clusters and RAM Pages. [Citation Graph (0, 0)][DBLP]
    SEC, 2006, pp:413-424 [Conf]
  29. Johan Aberg, Nahid Shahmehri, Dennis Maciuszek
    User modelling for live help systems: initial results. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Electronic Commerce, 2001, pp:194-197 [Conf]
  30. Mariam Kamkar, Nahid Shahmehri, Peter Fritzson
    Affect-Chaining and Dependency Oriented Flow Analysis Applied to Queries of Programs. [Citation Graph (0, 0)][DBLP]
    SIGSMALL/PC, 1988, pp:36-44 [Conf]
  31. Ioan Chisalita, Nahid Shahmehri
    Vehicular communication - a candidate technology for traffic safety. [Citation Graph (0, 0)][DBLP]
    SMC (4), 2004, pp:3903-3908 [Conf]
  32. Johan Aberg, Nahid Shahmehri
    User Modelling as an Aid for Human Web Assistants. [Citation Graph (0, 0)][DBLP]
    User Modeling, 2001, pp:201-203 [Conf]
  33. Johan Aberg, Nahid Shahmehri, Dennis Maciuszek
    User Modelling for Live Help Systems. [Citation Graph (0, 0)][DBLP]
    WELCOM, 2001, pp:164-179 [Conf]
  34. Ioan Chisalita, Nahid Shahmehri
    Issues in Image Utilization within Mobile E-Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2001, pp:62-67 [Conf]
  35. Cécile Aberg, Patrick Lambrix, Nahid Shahmehri
    An Agent-based Framework for Integrating Workflows and Web Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:27-32 [Conf]
  36. Yahya Y. Al-Salqan, Nahid Shahmehri, Wu Wen, Mourad Debbabi
    Final Summary Report on Enterprise Security. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:134- [Conf]
  37. Claudiu Duma, Almut Herzog, Nahid Shahmehri
    Towards Secure e-Services. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:221-224 [Conf]
  38. Claudiu Duma, Nahid Shahmehri, Patrick Lambrix
    A Hybrid Key Tree Scheme for Multicast to Balance Security and Efficiency Requirements. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:208-213 [Conf]
  39. Mats Gustafsson, Benoit Deligny, Nahid Shahmehri
    Using NFS to Implement Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    WETICE, 1997, pp:299-304 [Conf]
  40. Lin Han, Nahid Shahmehri
    Secure Multicast Software Delivery. [Citation Graph (0, 0)][DBLP]
    WETICE, 2000, pp:207-212 [Conf]
  41. Lin Han, Nahid Shahmehri
    Establishing a Secure Multicast Group for Remote Software Delivery. [Citation Graph (0, 0)][DBLP]
    WETICE, 1999, pp:194-198 [Conf]
  42. Almut Herzog, Nahid Shahmehri
    An Evaluation of Java Application Containers according to Security Requirements. [Citation Graph (0, 0)][DBLP]
    WETICE, 2005, pp:178-186 [Conf]
  43. Nahid Shahmehri, Juha Takkinen, Cécile Aberg
    Towards Creating Workflows On-the-Fly and Maintaining Them Using the Semantic Web: The sButler Project at Linköping University. [Citation Graph (0, 0)][DBLP]
    WWW (Posters), 2003, pp:- [Conf]
  44. Almut Herzog, Nahid Shahmehri
    Performance of the Java security manager. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 2005, v:24, n:3, pp:192-207 [Journal]
  45. Patrick Lambrix, Nahid Shahmehri
    Querying Documents using Content, Structure and Properties. [Citation Graph (0, 0)][DBLP]
    J. Intell. Inf. Syst., 2000, v:15, n:3, pp:287-307 [Journal]
  46. Peter Fritzson, Mikhail Auguston, Nahid Shahmehri
    Using assertions in declarative and operational models for automated debugging. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:25, n:3, pp:223-239 [Journal]
  47. Nahid Shahmehri, Mariam Kamkar, Peter Fritzson
    Usability criteria for automated debugging systems. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1995, v:31, n:1, pp:55-70 [Journal]
  48. Peter Fritzson, Nahid Shahmehri, Mariam Kamkar, Tibor Gyimóthy
    Generalized Algorithmic Debugging and Testing. [Citation Graph (0, 0)][DBLP]
    LOPLAS, 1992, v:1, n:4, pp:303-322 [Journal]
  49. Claudiu Duma, Almut Herzog, Nahid Shahmehri
    Privacy in the Semantic Web: What Policy Languages Have to Offer. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:109-118 [Conf]

  50. Design of a Process for Software Security. [Citation Graph (, )][DBLP]


  51. How can the developer benefit from security modeling? [Citation Graph (, )][DBLP]


  52. A Cause-Based Approach to Preventing Software Vulnerabilities. [Citation Graph (, )][DBLP]


  53. Integrating a Security Plug-in with the OpenUP/Basic Development Process. [Citation Graph (, )][DBLP]


  54. Prioritisation and Selection of Software Security Activities. [Citation Graph (, )][DBLP]


  55. A Post-Mortem Incident Modeling Method. [Citation Graph (, )][DBLP]


  56. An Architectural Foundation for Security Model Sharing and Reuse. [Citation Graph (, )][DBLP]


  57. 2-clickAuth. [Citation Graph (, )][DBLP]


  58. Usability and Security of Personal Firewalls. [Citation Graph (, )][DBLP]


  59. Introducing Vulnerability Awareness to Common Criteria's Security Targets. [Citation Graph (, )][DBLP]


  60. User help techniques for usable security. [Citation Graph (, )][DBLP]


  61. Adaptive Dissemination of Safety Data Among Vehicles. [Citation Graph (, )][DBLP]


  62. Emergency Information Dissemination in Mobile Networks for Vehicles. [Citation Graph (, )][DBLP]


  63. Contagious errors: Understanding and avoiding issues with imaging drives containing faulty sectors. [Citation Graph (, )][DBLP]


  64. A systematic evaluation of disk imaging in EnCase® 6.8 and LinEn 6.1. [Citation Graph (, )][DBLP]


Search in 0.020secs, Finished in 0.022secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002