The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Raj Sharman: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman
    Mini Track: 'Information Systems Security Management'. [Citation Graph (0, 0)][DBLP]
    HICSS, 2005, pp:- [Conf]
  2. Gurpreet Dhillon, Mikko T. Siponen, Raj Sharman
    Minitrack Introduction. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  3. Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya
    Framework for Analyzing Critical Incident Management Systems (CIMS). [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  4. Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya, Partha Khot, Sumit Manocha, Saumitra Ganguly
    Functionality Defense by Heterogeneity: A new paradigm for Securing Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  5. Hong Zhang, Rajiv Kishore, Raj Sharman, Ram Ramesh
    The GRITIKA Ontology for Modeling e-Service Applications: Formal Specification and Illustration. [Citation Graph (0, 0)][DBLP]
    HICSS, 2004, pp:- [Conf]
  6. Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya
    Design Principles of Coordinated Multi-incident Emergency Response Systems. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:81-98 [Conf]
  7. Jinkyu Lee, Shambhu J. Upadhyaya, H. Raghav Rao, Raj Sharman
    Secure knowledge management and the semantic web. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2005, v:48, n:12, pp:48-54 [Journal]
  8. Debanjan Ghosh, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya
    Self-healing systems - survey and synthesis. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:42, n:4, pp:2164-2185 [Journal]
  9. Oleg S. Pianykh, John M. Tyler, Raj Sharman
    Nearly-lossless autoregressive image compression. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 1999, v:20, n:2, pp:221-228 [Journal]
  10. Raj Sharman, John M. Tyler, Oleg S. Pianykh
    A fast and accurate method to register medical images using Wavelet Modulus Maxima. [Citation Graph (0, 0)][DBLP]
    Pattern Recognition Letters, 2000, v:21, n:6-7, pp:447-462 [Journal]
  11. Sangmi Chai, Raj Sharman, Smitha Patil, Shruta Satam, H. Raghav Rao, Shambhu J. Upadhyaya
    Surface Transportation and Cyber-Infrastructure: An Exploratory Study. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:124-128 [Conf]
  12. Raj Sharman, Himabindu Challapalli, H. Raghav Rao, Shambhu J. Upadhyaya
    A Framework for a Secure Federated Patient Healthcare System. [Citation Graph (0, 0)][DBLP]
    ISI, 2004, pp:512-513 [Conf]
  13. Insu Park, R. Sharman, H. R. Rao, S. Upadhyaya
    Short Term and Total Life Impact analysis of email worms in computer systems. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:43, n:3, pp:827-841 [Journal]
  14. Jin Ki Kim, Raj Sharman, H. Raghav Rao, Shambhu Upadhyaya
    Efficiency of critical incident management systems: Instrument development and validation. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:44, n:1, pp:235-250 [Journal]
  15. Hong Zhang, Rajiv Kishore, Raj Sharman, Ram Ramesh
    Agile Integration Modeling Language (AIML): A conceptual modeling grammar for agile integrative business information systems. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2007, v:44, n:1, pp:266-284 [Journal]
  16. Rui Chen, Raj Sharman, H. Raghav Rao, Shambhu J. Upadhyaya
    Design principles for critical incident response systems. [Citation Graph (0, 0)][DBLP]
    Inf. Syst. E-Business Management, 2007, v:5, n:3, pp:201-227 [Journal]
  17. Raj Sharman, Shiva Shankar Ramanna, Ram Ramesh, Ram D. Gopal
    Cache architecture for on-demand streaming on the Web. [Citation Graph (0, 0)][DBLP]
    TWEB, 2007, v:1, n:3, pp:- [Journal]

  18. Security enhanced integrative modeling language (SEIML): a conceptual modeling grammar for agile business information systems. [Citation Graph (, )][DBLP]


  19. Coordination in emergency response management. [Citation Graph (, )][DBLP]


  20. Security in grid computing: A review and synthesis. [Citation Graph (, )][DBLP]


Search in 0.069secs, Finished in 0.070secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002