The SCEAS System
Navigation Menu

Search the dblp DataBase


Matthew Smith: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Matthew Smith, Thomas Friese, Bernd Freisleben
    Model Driven Development of Service-Oriented Grid Applications. [Citation Graph (0, 0)][DBLP]
    AICT/ICIW, 2006, pp:139- [Conf]
  2. Matthew Smith, Michael Engel, Thomas Friese, Bernd Freisleben, Gregory A. Koenig, William Yurcik
    Security Issues in On-Demand Grid and Cluster Computing. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2006, pp:24- [Conf]
  3. Matthew Smith, Thomas Friese, Bernd Freisleben
    Intra-engine service security for grids based on WSRF. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2005, pp:644-653 [Conf]
  4. Elvis Papalilo, Thomas Friese, Matthew Smith, Bernd Freisleben
    Trust Shaping: Adapting Trust Establishment and Management to Application Requirements in a Service-Oriented Grid Environment. [Citation Graph (0, 0)][DBLP]
    GCC, 2005, pp:47-58 [Conf]
  5. Thomas Friese, Matthew Smith, Bernd Freisleben, Julian Reichwald, Thomas Barth, Manfred Grauer
    Collaborative Grid Process Creation Support in an Engineering Domain. [Citation Graph (0, 0)][DBLP]
    HiPC, 2006, pp:263-276 [Conf]
  6. Matthew Smith, Michael Engel, Sven Hanemann, Bernd Freisleben
    Towards a Roadcasting Communications Infrastructure. [Citation Graph (0, 0)][DBLP]
    ICN/ICONS/MCL, 2006, pp:213- [Conf]
  7. Thomas Friese, Matthew Smith, Bernd Freisleben
    Hot service deployment in an ad hoc grid environment. [Citation Graph (0, 0)][DBLP]
    ICSOC, 2004, pp:75-83 [Conf]
  8. Steffen Heinzl, Markus Mathes, Thomas Friese, Matthew Smith, Bernd Freisleben
    Flex-SwA: Flexible Exchange of Binary Data Based on SOAP Messages with Attachments. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:3-10 [Conf]
  9. Matthew Smith, B. Klose, Ralph Ewerth, Thomas Friese, Michael Engel, Bernd Freisleben
    Runtime Integration of Reconfigurable Hardware in Service-Oriented Grids. [Citation Graph (0, 0)][DBLP]
    ICWS, 2006, pp:945-948 [Conf]
  10. Matthew Smith, Thomas Friese, Bernd Freisleben
    Towards a Service-Oriented Ad Hoc Grid. [Citation Graph (0, 0)][DBLP]
    ISPDC/HeteroPar, 2004, pp:201-208 [Conf]
  11. Thomas Friese, Jörg P. Müller, Matthew Smith, Bernd Freisleben
    A Robust Business Resource Management Framework Based on a Peer-to-Peer Infrastructure. [Citation Graph (0, 0)][DBLP]
    CEC, 2005, pp:215-222 [Conf]
  12. Matthew Smith, Thomas Friese, Michael Engel, Bernd Freisleben
    Countering security threats in service-oriented on-demand grid computing using sandboxing and trusted computing techniques. [Citation Graph (0, 0)][DBLP]
    J. Parallel Distrib. Comput., 2006, v:66, n:9, pp:1189-1204 [Journal]
  13. Matthew Smith, Larry Bull
    Improving the human readability of features constructed by genetic programming. [Citation Graph (0, 0)][DBLP]
    GECCO, 2007, pp:1694-1701 [Conf]
  14. Rebecca Klein, Matthew Smith, David Sierkowski
    Reduce response time: get "hooked" on a wiki. [Citation Graph (0, 0)][DBLP]
    SIGUCCS, 2007, pp:185-189 [Conf]
  15. Thomas Friese, Matthew Smith, Bernd Freisleben
    Native Code Security for Grid Services. [Citation Graph (0, 0)][DBLP]
    Wirtschaftsinformatik (1), 2007, pp:513-530 [Conf]

  16. Identity-Based Cryptography for Securing Mobile Phone Calls. [Citation Graph (, )][DBLP]

  17. Using Simple Computer Exercises to Assist in the Rehabilitation of Stroke Patients : A Prototype. [Citation Graph (, )][DBLP]

  18. Composition and Execution of Secure Workflows in WSRF-Grids. [Citation Graph (, )][DBLP]

  19. Secure Service-Oriented Grid Computing with Public Virtual Worker Nodes. [Citation Graph (, )][DBLP]

  20. GDT: A Toolkit for Grid Service Development. [Citation Graph (, )][DBLP]

  21. A Streaming Intrusion Detection System for Grid Computing Environments. [Citation Graph (, )][DBLP]

  22. Securing stateful grid servers through virtual server rotation. [Citation Graph (, )][DBLP]

  23. Early defense: enabling attribute-based authorization in Grid firewalls. [Citation Graph (, )][DBLP]

  24. Automated Actin Filament Segmentation, Tracking and TIP Elongation Measurements Based on Open Active Contour Models. [Citation Graph (, )][DBLP]

  25. Efficient Distribution of Virtual Machines for Cloud Computing. [Citation Graph (, )][DBLP]

  26. An Identity-Based Key Agreement Protocol for the Network Layer. [Citation Graph (, )][DBLP]

  27. Pursuing the peak of excellence: Wiki as a knowledge base. [Citation Graph (, )][DBLP]

  28. Secure Grid Micro-Workflows Using Virtual Workspaces. [Citation Graph (, )][DBLP]

  29. Securing Mobile Phone Calls with Identity-Based Cryptography. [Citation Graph (, )][DBLP]

  30. TrueIP: prevention of IP spoofing attacks using identity-based cryptography. [Citation Graph (, )][DBLP]

Search in 0.025secs, Finished in 0.027secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002