The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Dawn N. Jutla: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Xiangdong An, Dawn N. Jutla, Nick Cercone
    Privacy intrusion detection using dynamic Bayesian networks. [Citation Graph (0, 0)][DBLP]
    ICEC, 2006, pp:208-215 [Conf]
  2. Peter Bodorik, Dawn N. Jutla
    Multi-View Access Control Memory Computer System. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer Science, 1994, pp:241-248 [Conf]
  3. Yaomin Fu, Peter Bodorik, Dawn N. Jutla
    A Self-Managed Predicate-Based Cache. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:313-318 [Conf]
  4. Wei Yu, Dawn N. Jutla, Shyamala C. Sivakumar
    A Churn-Strategy Alignment Model for Managers in Mobile Telecom. [Citation Graph (0, 0)][DBLP]
    CNSR, 2005, pp:48-53 [Conf]
  5. Peter Bodorik, Shawn Best, Dawn N. Jutla
    QoS Monitoring In Middleware. [Citation Graph (0, 0)][DBLP]
    ECIS, 2002, pp:- [Conf]
  6. Dawn N. Jutla, Peter Bodorik, Terrance Weatherbee, Barry Hudson
    e-government In Execution : Building Organizational Infrastructure. [Citation Graph (0, 0)][DBLP]
    ECIS, 2002, pp:- [Conf]
  7. Dawn N. Jutla, Peter Bodorik, Yie Wang
    A Step towards a Suite of E-commerce Benchmarks. [Citation Graph (0, 0)][DBLP]
    EC-Web, 2000, pp:419-428 [Conf]
  8. Dawn N. Jutla, Yanjun Zhang
    Maturing e-Privacy with P3P and Context Agents. [Citation Graph (0, 0)][DBLP]
    EEE, 2005, pp:536-541 [Conf]
  9. Xiangdong An, Dawn N. Jutla, Nick Cercone
    Auditing and Inference Control for Privacy Preservation in Uncertain Environments. [Citation Graph (0, 0)][DBLP]
    EuroSSC, 2006, pp:159-173 [Conf]
  10. Yingxin (Sheila) He, Dawn N. Jutla
    Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web. [Citation Graph (0, 0)][DBLP]
    HICSS, 2006, pp:- [Conf]
  11. Peter Bodorik, Dawn N. Jutla, A. Agarwal
    Recoverable Virtual Memory through the Multi-View Memory Computer System. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  12. Dawn N. Jutla, Peter Bodorik
    Architectural Support for Synchronization of Threads Accessing Variable-Sized Units of Virtual Memory. [Citation Graph (0, 0)][DBLP]
    HICSS (3), 1998, pp:197-206 [Conf]
  13. Dawn N. Jutla, Peter Bodorik, Y. Cai
    Interoperability for Accessing DBs by E-Commerce Applications. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  14. Dawn N. Jutla, Peter Bodorik, Jasbir Dhaliwal
    Government Support for E-readiness of Small and Medium Sized Enterprises. [Citation Graph (0, 0)][DBLP]
    HICSS, 2002, pp:127- [Conf]
  15. Dawn N. Jutla, Peter Bodorik, Shaohua Ma, Yie Wang
    WebTP: A Benchmark for Web-based Order Management Systems. [Citation Graph (0, 0)][DBLP]
    HICSS, 1999, pp:- [Conf]
  16. Dawn N. Jutla, James Craig, Peter Bodorik
    Enabling and Measuring Electronic Customer Relationship Management Readiness. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  17. Dawn N. Jutla, James Craig, Peter Bodorik
    A Methodology for Creating E-Business Strategy. [Citation Graph (0, 0)][DBLP]
    HICSS, 2001, pp:- [Conf]
  18. Dawn N. Jutla, Dimitri Kanevsky
    Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:77-84 [Conf]
  19. Xiangdong An, Dawn N. Jutla, Nick Cercone
    A Bayesian Network Approach to Detecting Privacy Intrusion. [Citation Graph (0, 0)][DBLP]
    IAT Workshops, 2006, pp:73-76 [Conf]
  20. Dawn N. Jutla, Peter Bodorik, J. Spruce Riordon
    Integrated Concurrency-Coherence Control in Distributed Shared Memory. [Citation Graph (0, 0)][DBLP]
    ICCI, 1993, pp:251-255 [Conf]
  21. Peter Bodorik, Shawn Best, Dawn N. Jutla
    Toolkit for QoS Monitoring in Middleware. [Citation Graph (0, 0)][DBLP]
    ICEIS, 2002, pp:244-249 [Conf]
  22. Peter Bodorik, Dawn N. Jutla
    Multi-view Memory To Support OS Locking for Transaction Systems. [Citation Graph (0, 0)][DBLP]
    IDEAS, 1997, pp:45-52 [Conf]
  23. Peter Bodorik, Dawn N. Jutla, Yueping Lu
    Interoperable Server-Based Cache Consistency Algorithm. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2004, pp:312-321 [Conf]
  24. Peter Bodorik, Dawn N. Jutla, Jacob Slonim, A. Agarwal
    Locking with Different Granularities for Reads and Writes in an MVM System. [Citation Graph (0, 0)][DBLP]
    IDEAS, 1999, pp:311-320 [Conf]
  25. Yueping Lu, Peter Bodorik, Dawn N. Jutla
    Evaluation of Integration of ACBL and AOCC Caching Algorithms. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2005, pp:398-405 [Conf]
  26. Xiangdong An, Dawn N. Jutla, Nick Cercone
    Probabilistic Internal Privacy Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    IDEAS, 2006, pp:317-318 [Conf]
  27. Dawn N. Jutla, Terrance Weatherbee
    Supporting CLEAR: A Strategy for Small and Medium Size Enterprise Adoption of e-Business Practices in Atlantic Canada. [Citation Graph (0, 0)][DBLP]
    E-Business: Multidisciplinary Research and Practice, 2002, pp:169-186 [Conf]
  28. Dawn N. Jutla, Peter Bodorik, Yie Wang
    WebEC: A Benchmark for the Cybermediary Business Model in E-Commerce. [Citation Graph (0, 0)][DBLP]
    IMSA, 1999, pp:388-392 [Conf]
  29. Peter Bodorik, Dawn N. Jutla
    Architecture for User-Controlled e-Privacy. [Citation Graph (0, 0)][DBLP]
    SAC, 2003, pp:609-616 [Conf]
  30. Xiangdong An, Dawn N. Jutla, Nick Cercone
    Temporal Context Lie Detection and Generation. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2006, pp:30-47 [Conf]
  31. Dawn N. Jutla, Peter Bodorik, Deyun Gao
    Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:100-117 [Conf]
  32. Vlado Keselj, Dawn N. Jutla
    QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2005, pp:718-724 [Conf]
  33. Yiyu Yao, JingTao Yao, Cory J. Butz, Pawan Lingras, Dawn N. Jutla
    Web-based Support Systems (WSS): A Report of the WIC Canada Research Centre. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2004, pp:787-788 [Conf]
  34. Xiangdong An, Dawn N. Jutla, Nick Cercone
    Privacy Preserving Multiagent Probabilistic Reasoning about Ambiguous Contexts: A Case Study. [Citation Graph (0, 0)][DBLP]
    Web Intelligence, 2006, pp:801-807 [Conf]
  35. Dawn N. Jutla, Peter Bodorik
    A Benchmark Suite for Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    WebNet, 1998, pp:- [Conf]
  36. Dawn N. Jutla, E. Kevin Kelloway, Said Saifi
    Evaluation of User Intervention Mechanisms for Privacy on SME Online Trust. [Citation Graph (0, 0)][DBLP]
    CEC, 2004, pp:281-288 [Conf]
  37. Peter Bodorik, Dawn N. Jutla
    Multi-View Memory Support to Operating Systems in Locking for Transaction and Database Systems. [Citation Graph (0, 0)][DBLP]
    Comput. J., 1998, v:41, n:2, pp:84-97 [Journal]
  38. Dawn N. Jutla, Peter Bodorik, Catherine Hajnal, Charles Davis
    Making Business Sense of Electronic Commerce. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 1999, v:32, n:3, pp:67-75 [Journal]
  39. Dawn N. Jutla, Peter Bodorik
    Sociotechnical Architecture for Online Privacy. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2005, v:3, n:2, pp:29-39 [Journal]
  40. Dawn N. Jutla, Peter Bodorik, Yie Wang
    Developing Internet E-Commerce Benchmarks. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1999, v:24, n:6, pp:475-493 [Journal]
  41. Dawn N. Jutla, Peter Bodorik, Yanjun Zhang
    PeCAN: An architecture for users' privacy-aware electronic commerce contexts on the semantic web. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2006, v:31, n:4-5, pp:295-320 [Journal]
  42. Rafiy Saleh, Dawn N. Jutla, Peter Bodorik
    Management of Users' Privacy Preferences in Context. [Citation Graph (0, 0)][DBLP]
    IRI, 2007, pp:91-97 [Conf]

  43. Usable SPACE: Security, Privacy, and Context for the Mobile User. [Citation Graph (, )][DBLP]


  44. Privacy with Web Serivces: Intelligence Gathering and Enforcement. [Citation Graph (, )][DBLP]


  45. Compliance of Privacy Policies with Legal Regulations - Compliance of Privacy Policies with Canadian PIPEDA. [Citation Graph (, )][DBLP]


  46. Dynamic inference control in privacy preference enforcement. [Citation Graph (, )][DBLP]


  47. Consistent privacy preferences (CPP): model, semantics, and properties. [Citation Graph (, )][DBLP]


  48. Reasoning about obfuscated private information: who have lied and how to lie. [Citation Graph (, )][DBLP]


  49. wisePad services for vision-, hearing-, and speech-impaired users. [Citation Graph (, )][DBLP]


Search in 0.108secs, Finished in 0.109secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002