|
Search the dblp DataBase
Gordon A. Manson:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett
Parallel Text Searching in Serial Files Using a Processor Farm. [Citation Graph (3, 0)][DBLP] SIGIR, 1990, pp:429-453 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Ian R. Philp, Gordon A. Manson
Using Tropos Methodology to Model an Integrated Health Assessment System. [Citation Graph (0, 0)][DBLP] AOIS@CAiSE, 2002, pp:- [Conf]
- Agostino Poggi, Giovanni Rimassa, Paola Turci, James Odell, Haralambos Mouratidis, Gordon A. Manson
Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML. [Citation Graph (0, 0)][DBLP] AOSE, 2003, pp:69-84 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
Modelling secure multiagent systems. [Citation Graph (0, 0)][DBLP] AAMAS, 2003, pp:859-866 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. [Citation Graph (0, 0)][DBLP] CAiSE, 2003, pp:63-78 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
Using Security Attack Scenarios to Analyse Security During Information Systems Design. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2004, pp:10-17 [Conf]
- Haralambos Mouratidis, Gordon A. Manson, Abdullah Gani, Paolo Giorgini
Analysing Security Requirements of Information Systems Using Tropos. [Citation Graph (0, 0)][DBLP] ICEIS (3), 2003, pp:623-626 [Conf]
- Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson
UMAS Learning Requirement for Controlling Network Resources. [Citation Graph (0, 0)][DBLP] IEA/AIE, 2003, pp:487-494 [Conf]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
An Ontology for Modelling Security: The Tropos Approach. [Citation Graph (0, 0)][DBLP] KES, 2003, pp:1387-1394 [Conf]
- Gang Lu, Demetrios Belis, Gordon A. Manson
A Novel Environment-Aware Mobility Model for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] MSN, 2005, pp:654-665 [Conf]
- Paolo Bresciani, Paolo Giorgini, Haralambos Mouratidis, Gordon A. Manson
Multi-agent Systems and Security Requirements Analysis. [Citation Graph (0, 0)][DBLP] SELMAS, 2003, pp:35-48 [Conf]
- Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett
Nearest-neighbour Searching in Files of Text Signatures Using Transputer Networks. [Citation Graph (0, 0)][DBLP] Electronic Publishing, 1991, v:4, n:4, pp:185-203 [Journal]
- Nasser Abouzakhar, Gordon A. Manson
An intelligent approach to prevent distributed systems attacks. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2002, v:10, n:5, pp:203-209 [Journal]
- Nasser Abouzakhar, Gordon A. Manson
Networks security measures using neuro-fuzzy agents. [Citation Graph (0, 0)][DBLP] Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:33-38 [Journal]
- Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett
Network design for the implementation of text searching using a multicomputer. [Citation Graph (0, 0)][DBLP] Inf. Process. Manage., 1991, v:27, n:4, pp:265-283 [Journal]
- Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
When security meets software engineering: a case of modelling secure information systems. [Citation Graph (0, 0)][DBLP] Inf. Syst., 2005, v:30, n:8, pp:609-629 [Journal]
- Valerie J. Gillet, Stephen M. Welford, Michael F. Lynch, Peter Willett, John M. Barnard, Geoffrey M. Downs, Gordon A. Manson, J. Thompson
Computer storage and retrieval of generic chemical structures in patents. 7. Parallel simulation of a relaxation algorithm for chemical substructure search. [Citation Graph (0, 0)][DBLP] Journal of Chemical Information and Computer Sciences, 1986, v:26, n:3, pp:118-126 [Journal]
- Andrew T. Brint, Valerie J. Gillet, Michael F. Lynch, Peter Willett, Gordon A. Manson, G. A. Wilson
Chemical graph matching using transputer networks. [Citation Graph (0, 0)][DBLP] Parallel Computing, 1988, v:8, n:1-3, pp:295-300 [Journal]
- Fethi A. Rabhi, Gordon A. Manson
Divide-and-conquer and parallel graph reduction. [Citation Graph (0, 0)][DBLP] Parallel Computing, 1991, v:17, n:2-3, pp:189-205 [Journal]
- R. Luo, Demetrios Belis, R. M. Edwards, Gordon A. Manson
A simulation design for link connection-oriented wireless mesh networks. [Citation Graph (0, 0)][DBLP] MWCN, 2002, pp:665-669 [Conf]
- C. Ladas, R. M. E. Amiee, Mehdi Mahdavi, Gordon A. Manson
Class based selective-ARQ scheme for high performance TCP and UDP over wireless links. [Citation Graph (0, 0)][DBLP] MWCN, 2002, pp:311-315 [Conf]
Enhancing routing performance for inter-vehicle communication in city environment. [Citation Graph (, )][DBLP]
Experiments with a transputer-based parallel graph reduction machine. [Citation Graph (, )][DBLP]
Search in 0.003secs, Finished in 0.004secs
|