The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Alberto Trombetta: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Danilo Montesi, Alberto Trombetta
    Similarity Search through Fuzzy Relational Algebra. [Citation Graph (0, 0)][DBLP]
    DEXA Workshop, 1999, pp:235-239 [Conf]
  2. Paolo Ciaccia, Danilo Montesi, Wilma Penzo, Alberto Trombetta
    Imprecision and User Preferences in Multimedia Queries: A Generic Algebraic Approach. [Citation Graph (0, 0)][DBLP]
    FoIKS, 2000, pp:50-71 [Conf]
  3. Michela Acquaviva, Marco Benini, Alberto Trombetta
    Short-Term Content Adaptation in Web-based Learning Systems. [Citation Graph (0, 0)][DBLP]
    Web Technologies, Applications, and Services, 2005, pp:198-203 [Conf]
  4. Alberto Trombetta, Elisa Bertino
    Private Updates to Anonymous Databases. [Citation Graph (0, 0)][DBLP]
    ICDE, 2006, pp:116- [Conf]
  5. Danilo Montesi, Alberto Trombetta
    Imprecision Based Queries Over Materialized and Virtual Integrated Views. [Citation Graph (0, 0)][DBLP]
    ICEIS (1), 2003, pp:407-413 [Conf]
  6. Elisa Bertino, Danilo Montesi, Alberto Trombetta
    Fuzzy and Presentation Algebras for Web and Multimedia Data. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2000, pp:134-144 [Conf]
  7. Avigdor Gal, Alberto Trombetta, Ateret Anaby-Tavor, Danilo Montesi
    A Model for Schema Integration in Heterogeneous Databases. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2003, pp:2-11 [Conf]
  8. Alberto Trombetta, Danilo Montesi
    Equivalences and Optimizations in an Expressive XSLT Fragment. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2004, pp:171-180 [Conf]
  9. Ateret Anaby-Tavor, Avigdor Gal, Alberto Trombetta
    Evaluating Matching Algorithms: the Monotonicity Principle. [Citation Graph (0, 0)][DBLP]
    IIWeb, 2003, pp:47-52 [Conf]
  10. Danilo Montesi, Alberto Trombetta
    An Extraction Language for the Web. [Citation Graph (0, 0)][DBLP]
    Workshop on Web Information and Data Management, 1998, pp:49-52 [Conf]
  11. Marco Benini, Alberto Trombetta, Michela Acquaviva
    A model for short-term content adaptation. [Citation Graph (0, 0)][DBLP]
    WWW (Special interest tracks and posters), 2005, pp:1034-1035 [Conf]
  12. Alberto Trombetta, Danilo Montesi
    Equivalences and optimizations in an expressive XSLT subset. [Citation Graph (0, 0)][DBLP]
    Acta Inf., 2006, v:42, n:6-7, pp:515-539 [Journal]
  13. Elisa Bertino, Alberto Trombetta, Danilo Montesi
    Workflow Architecture for Interactive Video Management Systems. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2002, v:11, n:1, pp:33-51 [Journal]
  14. Danilo Montesi, Alberto Trombetta, Peter A. Dearnley
    A similarity based relational algebra for Web and multimedia data. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 2003, v:39, n:2, pp:307-322 [Journal]
  15. Daniele Mundici, Alberto Trombetta
    Optimal Comparison Strategies in Ulam's Searching Game with Two Errors. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 1997, v:182, n:1-2, pp:217-232 [Journal]
  16. Danilo Montesi, Alberto Trombetta
    An Imprecision-based Language for the Web. [Citation Graph (0, 0)][DBLP]
    J. Vis. Lang. Comput., 2001, v:12, n:1, pp:3-35 [Journal]
  17. Avigdor Gal, Ateret Anaby-Tavor, Alberto Trombetta, Danilo Montesi
    A framework for modeling and evaluating automatic semantic reconciliation. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2005, v:14, n:1, pp:50-67 [Journal]
  18. Anna Cinzia Squicciarini, Alberto Trombetta, Elisa Bertino
    Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2007, pp:57- [Conf]
  19. Qun Ni, Alberto Trombetta, Elisa Bertino, Jorge Lobo
    Privacy-aware role based access control. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:41-50 [Conf]
  20. Cristina Ghiselli, Loris Bozzato, Alberto Trombetta
    Representation and management of ontologies in cultural heritage domain. [Citation Graph (0, 0)][DBLP]
    SWAP, 2005, pp:- [Conf]

  21. Modbus/DNP3 State-Based Intrusion Detection System. [Citation Graph (, )][DBLP]


  22. Adaptive and Distributed Access Control in Cognitive Radio Networks. [Citation Graph (, )][DBLP]


  23. Identity-based long running negotiations. [Citation Graph (, )][DBLP]


  24. Privately Updating Suppression and Generalization based k-Anonymous Databases. [Citation Graph (, )][DBLP]


  25. Introducing privacy in a hospital information system. [Citation Graph (, )][DBLP]


  26. Integrating Privacy Policies into Business Processes. [Citation Graph (, )][DBLP]


  27. Modeling and Validating BPMN Diagrams. [Citation Graph (, )][DBLP]


  28. Scada Malware, a Proof of Concept. [Citation Graph (, )][DBLP]


  29. State-Based Network Intrusion Detection Systems for SCADA Protocols: A Proof of Concept. [Citation Graph (, )][DBLP]


  30. Building a Domain Ontology from Glossaries: A General Methodology. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.006secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002