The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gordon A. Manson: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett
    Parallel Text Searching in Serial Files Using a Processor Farm. [Citation Graph (3, 0)][DBLP]
    SIGIR, 1990, pp:429-453 [Conf]
  2. Haralambos Mouratidis, Paolo Giorgini, Ian R. Philp, Gordon A. Manson
    Using Tropos Methodology to Model an Integrated Health Assessment System. [Citation Graph (0, 0)][DBLP]
    AOIS@CAiSE, 2002, pp:- [Conf]
  3. Agostino Poggi, Giovanni Rimassa, Paola Turci, James Odell, Haralambos Mouratidis, Gordon A. Manson
    Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML. [Citation Graph (0, 0)][DBLP]
    AOSE, 2003, pp:69-84 [Conf]
  4. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    Modelling secure multiagent systems. [Citation Graph (0, 0)][DBLP]
    AAMAS, 2003, pp:859-866 [Conf]
  5. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. [Citation Graph (0, 0)][DBLP]
    CAiSE, 2003, pp:63-78 [Conf]
  6. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    Using Security Attack Scenarios to Analyse Security During Information Systems Design. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2004, pp:10-17 [Conf]
  7. Haralambos Mouratidis, Gordon A. Manson, Abdullah Gani, Paolo Giorgini
    Analysing Security Requirements of Information Systems Using Tropos. [Citation Graph (0, 0)][DBLP]
    ICEIS (3), 2003, pp:623-626 [Conf]
  8. Abdullah Gani, Nasser Abouzakhar, Gordon A. Manson
    UMAS Learning Requirement for Controlling Network Resources. [Citation Graph (0, 0)][DBLP]
    IEA/AIE, 2003, pp:487-494 [Conf]
  9. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    An Ontology for Modelling Security: The Tropos Approach. [Citation Graph (0, 0)][DBLP]
    KES, 2003, pp:1387-1394 [Conf]
  10. Gang Lu, Demetrios Belis, Gordon A. Manson
    A Novel Environment-Aware Mobility Model for Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MSN, 2005, pp:654-665 [Conf]
  11. Paolo Bresciani, Paolo Giorgini, Haralambos Mouratidis, Gordon A. Manson
    Multi-agent Systems and Security Requirements Analysis. [Citation Graph (0, 0)][DBLP]
    SELMAS, 2003, pp:35-48 [Conf]
  12. Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett
    Nearest-neighbour Searching in Files of Text Signatures Using Transputer Networks. [Citation Graph (0, 0)][DBLP]
    Electronic Publishing, 1991, v:4, n:4, pp:185-203 [Journal]
  13. Nasser Abouzakhar, Gordon A. Manson
    An intelligent approach to prevent distributed systems attacks. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2002, v:10, n:5, pp:203-209 [Journal]
  14. Nasser Abouzakhar, Gordon A. Manson
    Networks security measures using neuro-fuzzy agents. [Citation Graph (0, 0)][DBLP]
    Inf. Manag. Comput. Security, 2003, v:11, n:1, pp:33-38 [Journal]
  15. Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett
    Network design for the implementation of text searching using a multicomputer. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Manage., 1991, v:27, n:4, pp:265-283 [Journal]
  16. Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson
    When security meets software engineering: a case of modelling secure information systems. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 2005, v:30, n:8, pp:609-629 [Journal]
  17. Valerie J. Gillet, Stephen M. Welford, Michael F. Lynch, Peter Willett, John M. Barnard, Geoffrey M. Downs, Gordon A. Manson, J. Thompson
    Computer storage and retrieval of generic chemical structures in patents. 7. Parallel simulation of a relaxation algorithm for chemical substructure search. [Citation Graph (0, 0)][DBLP]
    Journal of Chemical Information and Computer Sciences, 1986, v:26, n:3, pp:118-126 [Journal]
  18. Andrew T. Brint, Valerie J. Gillet, Michael F. Lynch, Peter Willett, Gordon A. Manson, G. A. Wilson
    Chemical graph matching using transputer networks. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1988, v:8, n:1-3, pp:295-300 [Journal]
  19. Fethi A. Rabhi, Gordon A. Manson
    Divide-and-conquer and parallel graph reduction. [Citation Graph (0, 0)][DBLP]
    Parallel Computing, 1991, v:17, n:2-3, pp:189-205 [Journal]
  20. R. Luo, Demetrios Belis, R. M. Edwards, Gordon A. Manson
    A simulation design for link connection-oriented wireless mesh networks. [Citation Graph (0, 0)][DBLP]
    MWCN, 2002, pp:665-669 [Conf]
  21. C. Ladas, R. M. E. Amiee, Mehdi Mahdavi, Gordon A. Manson
    Class based selective-ARQ scheme for high performance TCP and UDP over wireless links. [Citation Graph (0, 0)][DBLP]
    MWCN, 2002, pp:311-315 [Conf]

  22. Enhancing routing performance for inter-vehicle communication in city environment. [Citation Graph (, )][DBLP]


  23. Experiments with a transputer-based parallel graph reduction machine. [Citation Graph (, )][DBLP]


Search in 0.025secs, Finished in 0.026secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002