The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Josep Domingo-Ferrer: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Agusti Solanas, Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz
    A 2d-Tree-Based Blocking Method for Microaggregating Very Large Data Sets. [Citation Graph (0, 0)][DBLP]
    ARES, 2006, pp:922-928 [Conf]
  2. Francesc Sebé, Josep Domingo-Ferrer
    Short 3-Secure Fingerprinting Codes for Copyright Protection. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:316-327 [Conf]
  3. Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé
    A Smart Card-Based Mental Poker System. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:48-61 [Conf]
  4. Jordi Castellà-Roca, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí, Jordi Planes
    A Performance Comparison of Java Cards for Micropayment Implementation. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2000, pp:19-38 [Conf]
  5. Josep Domingo-Ferrer
    Multi-Application Smart Cards and Encrypted Data Processing. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1996, pp:- [Conf]
  6. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Efficient Smart-Card Based Anonymous Fingerprinting. [Citation Graph (0, 0)][DBLP]
    CARDIS, 1998, pp:221-228 [Conf]
  7. Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Francesc Sebé
    MICROCAST: Smart Card Based (Micro)Pay-per-View for Multicast Services. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2002, pp:125-134 [Conf]
  8. Josep Domingo-Ferrer, Vicenç Torra
    Validating Distance-Based Record Linkage with Probabilistic Record Linkage. [Citation Graph (0, 0)][DBLP]
    CCIA, 2002, pp:207-215 [Conf]
  9. M. Mar Albà, Josep Domingo-Ferrer, Francesc Sebé
    Asynchronous Large-Scale Certification Based on Certificate Verification Trees. [Citation Graph (0, 0)][DBLP]
    Communications and Multimedia Security, 2001, pp:- [Conf]
  10. Josep Domingo-Ferrer, Antoni Martínez-Ballesté
    STREAMOBILE: Pay-per-View Video Streaming to Mobile Devices Over the Internet. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2002, pp:418-422 [Conf]
  11. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer, Miguel Soriano
    Practical Asymmetric Fingerprinting with a TTP. [Citation Graph (0, 0)][DBLP]
    DEXA Workshops, 2003, pp:352-356 [Conf]
  12. Josep Domingo-Ferrer, Llorenç Huguet i Rotger
    A cryptographic tool for programs protection. [Citation Graph (0, 0)][DBLP]
    EUROCODE, 1990, pp:227-240 [Conf]
  13. Josep Domingo-Ferrer
    Software Run-Time Protection: A Cryptographic Issue. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:474-480 [Conf]
  14. Josep Domingo-Ferrer
    Untransferable Rights in a Client-Independent Server Environment. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:260-266 [Conf]
  15. Josep Domingo-Ferrer, Llorenç Huguet i Rotger
    Full Secure Key Exchange and Authentication with no Previously Shared Secrets. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1989, pp:665-669 [Conf]
  16. Josep Domingo-Ferrer
    On the Synergy Between Certificate Verification Trees and PayTree-like Micropayments. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:180-190 [Conf]
  17. Josep Domingo-Ferrer, Ricardo X. Sanchez del Castillo
    An implementable scheme for secure delegation of computing and data. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:445-451 [Conf]
  18. Ramesh A. Dandekar, Josep Domingo-Ferrer, Francesc Sebé
    LHS-Based Hybrid Microdata vs Rank Swapping and Microaggregation for Numeric Microdata Protection. [Citation Graph (0, 0)][DBLP]
    Inference Control in Statistical Databases, 2002, pp:153-162 [Conf]
  19. Josep Domingo-Ferrer
    Advances in Inference Control in Statistical Databases: An Overview. [Citation Graph (0, 0)][DBLP]
    Inference Control in Statistical Databases, 2002, pp:1-7 [Conf]
  20. Francesc Sebé, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Vicenç Torra
    Post-Masking Optimization of the Tradeoff between Information Loss and Disclosure Risk in Masked Microdata Sets. [Citation Graph (0, 0)][DBLP]
    Inference Control in Statistical Databases, 2002, pp:163-171 [Conf]
  21. Josep Domingo-Ferrer
    Mobile Agent Route Protection through Hash-Based Mechanisms. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2001, pp:17-29 [Conf]
  22. Jordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell
    Practical Mental Poker Without a TTP Based on Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:280-294 [Conf]
  23. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer
    Secure Many-to-One Transmission of q-ary Symbols. [Citation Graph (0, 0)][DBLP]
    INTELLCOMM, 2004, pp:85-91 [Conf]
  24. Josep Domingo-Ferrer
    A Provably Secure Additive and Multiplicative Privacy Homomorphism. [Citation Graph (0, 0)][DBLP]
    ISC, 2002, pp:471-483 [Conf]
  25. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Spending Programs: A Tool for Flexible Micropayments. [Citation Graph (0, 0)][DBLP]
    ISW, 1999, pp:1-13 [Conf]
  26. Francesc Sebé, Josep Domingo-Ferrer
    Oblivious Image Watermarking Robust against Scaling and Geometric Distortions. [Citation Graph (0, 0)][DBLP]
    ISC, 2001, pp:420-432 [Conf]
  27. Francesc Sebé, Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:44-53 [Conf]
  28. Jordi Castellà-Roca, Josep Domingo-Ferrer
    A Non-Repudiable Bitstring Commitment Scheme Based on a Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:778-780 [Conf]
  29. Jordi Castellà-Roca, Josep Domingo-Ferrer
    On the Security of an Efficient TTP-Free Mental Poker Protocol. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:781-0 [Conf]
  30. Josep Domingo-Ferrer
    Networking in the New ICT Curricula. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:20-24 [Conf]
  31. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    Simple Collusion-Secure Fingerprinting Schemes for Images. [Citation Graph (0, 0)][DBLP]
    ITCC, 2000, pp:128-132 [Conf]
  32. Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Francesc Sebé
    Watermarking for Multilevel Access to Statistical Databases. [Citation Graph (0, 0)][DBLP]
    ITCC, 2001, pp:243-248 [Conf]
  33. Josep Domingo-Ferrer, Francesc Sebé
    Enhancing Watermark Robustness through Mixture of Watermarked Digital Objects. [Citation Graph (0, 0)][DBLP]
    ITCC, 2002, pp:85-89 [Conf]
  34. Josep Domingo-Ferrer, Francesc Sebé
    Invertible Spread-Spectrum Watermarking for Image Authentication and Multilevel Access to Precision-Critical Watermarked Images. [Citation Graph (0, 0)][DBLP]
    ITCC, 2002, pp:152-157 [Conf]
  35. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer
    Computer Skills Training to (Middle-aged) Adults: Problems and Program. [Citation Graph (0, 0)][DBLP]
    ITCC (1), 2004, pp:146-150 [Conf]
  36. Antoni Martínez-Ballesté, Josep Domingo-Ferrer, Francesc Sebé
    MINPAY: a Multi-device INternet PAY-as-you-watch system. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:258-262 [Conf]
  37. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer
    Secure Large-Scale Bingo. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:758-762 [Conf]
  38. Jordi Castellà-Roca, Josep Domingo-Ferrer, Francesc Sebé
    On the Security of a Repaired Mental Poker Protocol. [Citation Graph (0, 0)][DBLP]
    ITNG, 2006, pp:664-668 [Conf]
  39. Francesc Sebé, Josep Domingo-Ferrer, Agusti Solanas
    Noise-Robust Watermarking for Numerical Datasets. [Citation Graph (0, 0)][DBLP]
    MDAI, 2005, pp:134-143 [Conf]
  40. Agusti Solanas, Josep Domingo-Ferrer
    Watermarking Non-numerical Databases. [Citation Graph (0, 0)][DBLP]
    MDAI, 2006, pp:239-250 [Conf]
  41. Josep Maria Mateo-Sanz, Josep Domingo-Ferrer, Vicenç Torra
    Object Positioning Based on Partial Preferences. [Citation Graph (0, 0)][DBLP]
    MDAI, 2004, pp:252-259 [Conf]
  42. Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Francesc Sebé
    Secure Reverse Communication in a Multicast Tree. [Citation Graph (0, 0)][DBLP]
    NETWORKING, 2004, pp:807-816 [Conf]
  43. Josep Domingo-Ferrer
    Microaggregation for Database and Location Privacy. [Citation Graph (0, 0)][DBLP]
    NGITS, 2006, pp:106-116 [Conf]
  44. Josep Domingo-Ferrer
    Anonymous Fingerprinting Based on Committed Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1999, pp:43-52 [Conf]
  45. Josep Domingo-Ferrer, Francesc Sebé
    Optimal Multivariate 2-Microaggregation for Microdata Protection: A 2-Approximation. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2006, pp:129-138 [Conf]
  46. Josep Domingo-Ferrer, Francesc Sebé, Jordi Castellà-Roca
    On the Security of Noise Addition for Privacy in Statistical Databases. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2004, pp:149-161 [Conf]
  47. Josep Maria Mateo-Sanz, Antoni Martínez-Ballesté, Josep Domingo-Ferrer
    Fast Generation of Accurate Synthetic Microdata. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2004, pp:298-306 [Conf]
  48. Josep Maria Mateo-Sanz, Francesc Sebé, Josep Domingo-Ferrer
    Outlier Protection in Continuous Microdata Masking. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2004, pp:201-215 [Conf]
  49. Vicenç Torra, John M. Abowd, Josep Domingo-Ferrer
    Using Mahalanobis Distance-Based Record Linkage for Disclosure Risk Assessment. [Citation Graph (0, 0)][DBLP]
    Privacy in Statistical Databases, 2006, pp:233-242 [Conf]
  50. Josep Domingo-Ferrer, Anna Oganian, Vicenç Torra
    Information-Theoretic Disclosure Risk Measures in Statistical Disclosure Control of Tabular Data. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2002, pp:227-231 [Conf]
  51. Jordi Castellà-Roca, Francesc Sebé, Josep Domingo-Ferrer
    Dropout-Tolerant TTP-Free Mental Poker. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2005, pp:30-40 [Conf]
  52. Antoni Martínez-Ballesté, Francesc Sebé, Josep Domingo-Ferrer
    Large-Scale Pay-As-You-Watch for Unicast and Multicast Communications. [Citation Graph (0, 0)][DBLP]
    TrustBus, 2004, pp:261-268 [Conf]
  53. Josep Domingo-Ferrer, Pieter H. Hartel
    Current directions in smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2001, v:36, n:4, pp:377-379 [Journal]
  54. Francesc Sebé, Josep Domingo-Ferrer
    Scalability and security in biased many-to-one communication. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:1, pp:1-13 [Journal]
  55. Josep Domingo-Ferrer
    Algorithm- sequenced access control. [Citation Graph (0, 0)][DBLP]
    Computers & Security, 1991, v:10, n:7, pp:639-652 [Journal]
  56. Josep Maria Mateo-Sanz, Josep Domingo-Ferrer, Francesc Sebé
    Probabilistic Information Loss Measures in Confidentiality Protection of Continuous Microdata. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:2, pp:181-193 [Journal]
  57. Josep Domingo-Ferrer, Vicenç Torra
    Privacy in Data Mining. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:2, pp:117-119 [Journal]
  58. Josep Domingo-Ferrer, Vicenç Torra
    Ordinal, Continuous and Heterogeneous k-Anonymity Through Microaggregation. [Citation Graph (0, 0)][DBLP]
    Data Min. Knowl. Discov., 2005, v:11, n:2, pp:195-212 [Journal]
  59. Josep Domingo-Ferrer
    Achieving Rights Untransferability with Client-Independent Servers. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 1996, v:8, n:3, pp:263-271 [Journal]
  60. Josep Domingo-Ferrer, Vicenç Torra
    Median-based aggregation operators for prototype construction in ordinal scales. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2003, v:18, n:6, pp:633-655 [Journal]
  61. Aïda Valls, Vicenç Torra, Josep Domingo-Ferrer
    Semantic-based aggregation for statistical disclosure control. [Citation Graph (0, 0)][DBLP]
    Int. J. Intell. Syst., 2003, v:18, n:9, pp:939-951 [Journal]
  62. Josep Domingo-Ferrer, Vicenç Torra
    A Critique of the Sensitivity Rules Usually Employed for Statistical Table Protection. [Citation Graph (0, 0)][DBLP]
    International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, v:10, n:5, pp:545-556 [Journal]
  63. Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Anna Oganian, Aánge Torres
    On the Security of Microaggregation with Individual Ranking: Analytical Attacks. [Citation Graph (0, 0)][DBLP]
    International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, v:10, n:5, pp:477-492 [Journal]
  64. Vicenç Torra, Josep Domingo-Ferrer
    Editorial: Trends in Aggregation and Security Assessment for Inference Control in Statistical Databases. [Citation Graph (0, 0)][DBLP]
    International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2002, v:10, n:5, pp:453-458 [Journal]
  65. Josep Domingo-Ferrer
    Distributed User Identification by Zero-Knowledge Access Rights Proving. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1991, v:40, n:5, pp:235-239 [Journal]
  66. Josep Domingo-Ferrer
    A New Privacy Homomorphism and Applications. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1996, v:60, n:5, pp:277-282 [Journal]
  67. Josep Domingo-Ferrer, Vicenç Torra
    On the connections between statistical disclosure control for microdata and some artificial intelligence tools. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2003, v:151, n:, pp:153-170 [Journal]
  68. Vicenç Torra, Josep Domingo-Ferrer, Josep Maria Mateo-Sanz, Michael Ng
    Regression for ordinal variables without underlying continuous variables. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2006, v:176, n:4, pp:465-474 [Journal]
  69. Josep Domingo-Ferrer, Vicenç Torra I. Reventós
    Fuzzy Microaggregation for Microdata Protection. [Citation Graph (0, 0)][DBLP]
    JACIII, 2003, v:7, n:2, pp:153-159 [Journal]
  70. Josep Domingo-Ferrer, Vicenç Torra
    Selecting Potentially Relevant Records Using Re-identification Methods. [Citation Graph (0, 0)][DBLP]
    New Generation Comput., 2004, v:22, n:3, pp:- [Journal]
  71. Josep Domingo-Ferrer, Jordi Herrera-Joancomartí
    An Anonymous Electronic Commerce Scheme with an Off-Line Authority and Untrusted Agents. [Citation Graph (0, 8)][DBLP]
    SIGMOD Record, 1998, v:27, n:4, pp:62-67 [Journal]
  72. Josep Domingo-Ferrer, Josep Maria Mateo-Sanz
    Practical Data-Oriented Microaggregation for Statistical Disclosure Control. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2002, v:14, n:1, pp:189-201 [Journal]
  73. Francesc Sebé, Josep Domingo-Ferrer
    Collusion-secure and cost-effective detection of unlawful multimedia redistribution. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Systems, Man, and Cybernetics, Part C, 2003, v:33, n:3, pp:382-389 [Journal]
  74. Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Josep Maria Mateo-Sanz, Francesc Sebé
    Efficient multivariate data-oriented microaggregation. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2006, v:15, n:4, pp:355-369 [Journal]
  75. Vanesa Daza, Josep Domingo-Ferrer
    On Partial Anonymity in Secret Sharing. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2007, pp:193-202 [Conf]
  76. Alexandre Viejo, Francesc Sebé, Josep Domingo-Ferrer
    Secure and Private Incentive-Based Advertisement Dissemination in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:185-198 [Conf]
  77. Josep Domingo-Ferrer
    A Public-Key Protocol for Social Networks with Private Relationships. [Citation Graph (0, 0)][DBLP]
    MDAI, 2007, pp:373-379 [Conf]
  78. Jordi Castellà-Roca, Vanesa Daza, Josep Domingo-Ferrer, Jesús A. Manjón, Francesc Sebé, Alexandre Viejo
    An Incentive-Based System for Information Providers over Peer-to-Peer Mobile Ad-Hoc Networks. [Citation Graph (0, 0)][DBLP]
    MDAI, 2007, pp:380-392 [Conf]
  79. Josep Domingo-Ferrer
    A Three-Dimensional Conceptual Framework for Database Privacy. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:193-202 [Conf]
  80. Agusti Solanas, Josep Domingo-Ferrer, Antoni Martínez-Ballesté, Vanesa Daza
    A distributed architecture for scalable private RFID tag identification. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:9, pp:2268-2279 [Journal]
  81. Josep Domingo-Ferrer, Joachim Posegga, Francesc Sebé, Vicenç Torra
    Advances in smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:9, pp:2219-2222 [Journal]
  82. Francesc Sebé, Alexandre Viejo, Josep Domingo-Ferrer
    Secure many-to-one symbol transmission for implementation on smart cards. [Citation Graph (0, 0)][DBLP]
    Computer Networks, 2007, v:51, n:9, pp:2299-2307 [Journal]

  83. A Critique of k-Anonymity and Some of Its Enhancements. [Citation Graph (, )][DBLP]


  84. Feature Selection and Outliers Detection with Genetic Algorithms and Neural Networks. [Citation Graph (, )][DBLP]


  85. Weighted network decapitation: the economics of iterated attack and defense. [Citation Graph (, )][DBLP]


  86. Identity-Based Authenticated Asymmetric Group Key Agreement Protocol. [Citation Graph (, )][DBLP]


  87. Location privacy via unlinkability: an alternative to cloaking and perturbation. [Citation Graph (, )][DBLP]


  88. Micro-aggregation-based heuristics for p-sensitive k-anonymity: one step beyond. [Citation Graph (, )][DBLP]


  89. Location Privacy in Location-Based Services: Beyond TTP-based Schemes. [Citation Graph (, )][DBLP]


  90. Invited Talk Extended Abstract: Safety and Privacy in Vehicular Communications. [Citation Graph (, )][DBLP]


  91. Safety and Privacy in Vehicular Communications. [Citation Graph (, )][DBLP]


  92. The UNESCO Chair in Data Privacy Research in Vehicular Networks. [Citation Graph (, )][DBLP]


  93. Asymmetric Group Key Agreement. [Citation Graph (, )][DBLP]


  94. A Genetic Approach to Multivariate Microaggregation for Database Privacy. [Citation Graph (, )][DBLP]


  95. A Shared Steganographic File System with Error Correction. [Citation Graph (, )][DBLP]


  96. The Functionality-Security-Privacy Game. [Citation Graph (, )][DBLP]


  97. Coprivacy: Towards a Theory of Sustainable Privacy. [Citation Graph (, )][DBLP]


  98. Peer-to-Peer Private Information Retrieval. [Citation Graph (, )][DBLP]


  99. From t-Closeness to PRAM and Noise Addition Via Information Theory. [Citation Graph (, )][DBLP]


  100. An Anonymity Model Achievable Via Microaggregation. [Citation Graph (, )][DBLP]


  101. Aggregation of Trustworthy Announcement Messages in Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  102. Privacy homomorphisms for social networks with private relationships. [Citation Graph (, )][DBLP]


  103. Secure and scalable many-to-one symbol transmission for sensor networks. [Citation Graph (, )][DBLP]


  104. Secure network bootstrapping: An algorithm for authentic key exchange and digital signitures. [Citation Graph (, )][DBLP]


  105. User-private information retrieval based on a peer-to-peer community. [Citation Graph (, )][DBLP]


  106. Recent progress in database privacy. [Citation Graph (, )][DBLP]


Search in 0.086secs, Finished in 0.091secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002