|
Search the dblp DataBase
Michael Gertz:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Michael Gertz, Udo W. Lipeck
Deriving Integrity Maintaining Triggers from Transition Graphs. [Citation Graph (9, 14)][DBLP] ICDE, 1993, pp:22-29 [Conf]
- Michael Gertz
Specifying Reactive Integrity Control for Active Databases. [Citation Graph (4, 0)][DBLP] RIDE-ADS, 1994, pp:62-70 [Conf]
- Udo W. Lipeck, Michael Gertz, Gunter Saake
Transitional Monitoring of Dynamic Inegrity Constraints. [Citation Graph (1, 11)][DBLP] IEEE Data Eng. Bull., 1994, v:17, n:2, pp:38-42 [Journal]
- Alexander Scharnofske, Udo W. Lipeck, Michael Gertz
SubQuery-By-Example: Eine orthogonale Erweiterung von QBE. [Citation Graph (0, 0)][DBLP] BTW, 1997, pp:132-152 [Conf]
- Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine
Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP] ACM Conference on Computer and Communications Security, 2001, pp:136-145 [Conf]
- Premkumar T. Devanbu, Michael Gertz, Brian Toone
Static Type-Inference for Trust in Distributed Information Systems. [Citation Graph (0, 0)][DBLP] CoopIS/DOA/ODBASE, 2003, pp:370-388 [Conf]
- Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
Authentic Third-party Data Publication. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:101-112 [Conf]
- Christina Yip Chung, Michael Gertz, Karl N. Levitt
Discovery of Multi-Level Security Policies. [Citation Graph (0, 0)][DBLP] DBSec, 2000, pp:173-184 [Conf]
- Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. [Citation Graph (0, 0)][DBLP] DIMVA, 2006, pp:1-16 [Conf]
- Michael Gertz, Kai-Uwe Sattler
Integrating Scientific Data through External Concept-based annotations. [Citation Graph (0, 0)][DBLP] DIWeb, 2002, pp:87-101 [Conf]
- Michael Gertz, Quinn Hart, Carlos Rueda, Shefali Singhal, Jie Zhang
A Data and Query Model for Streaming Geospatial Image Data. [Citation Graph (0, 0)][DBLP] EDBT Workshops, 2006, pp:687-699 [Conf]
- Michael Gertz, Kai-Uwe Sattler
Integrating Scientific Data through External, Concept-Based Annotations. [Citation Graph (0, 0)][DBLP] EEXTT, 2002, pp:220-240 [Conf]
- Vram Kouramajian, Michael Gertz
A Visual Query Editor for Temporal Databases. [Citation Graph (0, 13)][DBLP] OOER, 1995, pp:388-399 [Conf]
- Michael Gertz, Ingo Schmitt
Data Integration Techniques based on Data Quality Aspects. [Citation Graph (0, 0)][DBLP] Föderierte Datenbanken, 1998, pp:1-19 [Conf]
- Michael Gertz
An Extensible Framework for Repairing Constraint Violations. [Citation Graph (0, 0)][DBLP] FMLDO, 1996, pp:41-56 [Conf]
- Jie Zhang, Michael Gertz, Demet Aksoy
Spatio-temporal aggregates over raster image data. [Citation Graph (0, 0)][DBLP] GIS, 2004, pp:39-46 [Conf]
- Quinn Hart, Michael Gertz
Optimization of multiple continuous queries over streaming satellite data. [Citation Graph (0, 0)][DBLP] GIS, 2006, pp:243-250 [Conf]
- Michael Gertz
Deriving Integrity Constraints Maintaining Triggers from Transition Graphs. [Citation Graph (0, 0)][DBLP] Grundlagen von Datenbanken, 1992, pp:40-44 [Conf]
- Michael Gertz
Integritätssicherung in aktiven Datenbanken. [Citation Graph (0, 0)][DBLP] Grundlagen von Datenbanken, 1993, pp:1-5 [Conf]
- Christina Yip Chung, Michael Gertz, Neel Sundaresan
Reverse Engineering for Web Data: From Visual to Semantic Structure. [Citation Graph (0, 0)][DBLP] ICDE, 2002, pp:53-63 [Conf]
- Bruce Rosenstock, Michael Gertz
Web-based scholarship: annotating the digital library. [Citation Graph (0, 0)][DBLP] JCDL, 2001, pp:104-105 [Conf]
- Christian Bird, Alex Gourley, Premkumar T. Devanbu, Michael Gertz, Anand Swaminathan
Mining email social networks. [Citation Graph (0, 0)][DBLP] MSR, 2006, pp:137-143 [Conf]
- Christian Bird, Alex Gourley, Premkumar T. Devanbu, Michael Gertz, Anand Swaminathan
Mining email social networks in Postgres. [Citation Graph (0, 0)][DBLP] MSR, 2006, pp:185-186 [Conf]
- Christina Yip Chung, Michael Gertz, Karl N. Levitt
Misuse Detection in Database Systems Through User Profiling. [Citation Graph (0, 0)][DBLP] Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
- Jan-Marco Bremer, Michael Gertz
Web Data Indexing Through External Semantic-carrying Annotations. [Citation Graph (0, 6)][DBLP] RIDE-DM, 2001, pp:69-76 [Conf]
- Brian Toone, Michael Gertz, Premkumar T. Devanbu
Trust Mediation for Distributed Information Systems. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:1-12 [Conf]
- Omar Alonso, Michael Gertz
Clustering of search results using temporal attributes. [Citation Graph (0, 0)][DBLP] SIGIR, 2006, pp:597-598 [Conf]
- Quinn Hart, Michael Gertz, Jie Zhang
Evaluation of a Dynamic Tree Structure for Indexing Query Regions on Streaming Geospatial Data. [Citation Graph (0, 0)][DBLP] SSTD, 2005, pp:145-162 [Conf]
- Michael Gertz, Kai-Uwe Sattler, Fredric Gorin, Michael Hogarth, Jim Stone
Annotating Scientific Images: A Concept-Based Approach. [Citation Graph (0, 0)][DBLP] SSDBM, 2002, pp:59-68 [Conf]
- Quinn Hart, Michael Gertz
Querying Streaming Geospatial Image Data: The GeoStreams Project. [Citation Graph (0, 0)][DBLP] SSDBM, 2005, pp:147-150 [Conf]
- Carlos Rueda, Michael Gertz, Bertram Ludäscher, Bernd Hamann
An Extensible Infrastructure for Processing Distributed Geospatial Data Streams. [Citation Graph (0, 0)][DBLP] SSDBM, 2006, pp:285-290 [Conf]
- Quinn Hart, Michael Gertz
Indexing Query Regions for Streaming Geospatial Data. [Citation Graph (0, 0)][DBLP] STDBM, 2004, pp:49-56 [Conf]
- Christina Yip Chung, Michael Gertz, Karl N. Levitt
DEMIDS: A Misuse Detection System for Database Systems. [Citation Graph (0, 0)][DBLP] IICIS, 1999, pp:159-178 [Conf]
- Michael Gertz
Opportunities and Challenges in Tracing Security Breaches. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:223-226 [Conf]
- Michael Gertz
Managing Data Quality and Integrity in Federated Databases. [Citation Graph (0, 0)][DBLP] IICIS, 1998, pp:211-230 [Conf]
- Michael Gertz, George Csaba
Monitoring Mission Critical Data for Integrity and Availability. [Citation Graph (0, 0)][DBLP] IICIS, 2002, pp:189-201 [Conf]
- Michael Gertz, Udo W. Lipeck
An Extensible Framework for Repairing Constraint Violations. [Citation Graph (0, 0)][DBLP] IICIS, 1997, pp:89-111 [Conf]
- Michael Gertz, Udo W. Lipeck
"Temporal" Integrity Constraints in Temporal Databases [Citation Graph (0, 0)][DBLP] Temporal Databases, 1995, pp:77-92 [Conf]
- T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz
A Model for the Visualization Exploration Process. [Citation Graph (0, 0)][DBLP] IEEE Visualization, 2002, pp:- [Conf]
- Jan-Marco Bremer, Michael Gertz
XQuery/IR: Integrating XML Document and Data Retrieval. [Citation Graph (0, 0)][DBLP] WebDB, 2002, pp:1-6 [Conf]
- Jan-Marco Bremer, Michael Gertz
On Distributing XML Repositories. [Citation Graph (0, 0)][DBLP] WebDB, 2003, pp:73-78 [Conf]
- Christina Yip Chung, Michael Gertz, Neel Sundaresan
Quixote: Building XML Repositories from Topic Specific Web Documents. [Citation Graph (0, 0)][DBLP] WebDB, 2001, pp:103-108 [Conf]
- April Kwong, Michael Gertz
Authentic Publication of XML Document Data. [Citation Graph (0, 0)][DBLP] WISE (1), 2001, pp:331-340 [Conf]
- Charles U. Martel, Glen Nuckolls, Premkumar T. Devanbu, Michael Gertz, April Kwong, Stuart G. Stubblebine
A General Model for Authenticated Data Structures. [Citation Graph (0, 0)][DBLP] Algorithmica, 2004, v:39, n:1, pp:21-41 [Journal]
- Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls
Databases that tell the Truth: Authentic Data Publication. [Citation Graph (0, 0)][DBLP] IEEE Data Eng. Bull., 2004, v:27, n:1, pp:26-33 [Journal]
- Michael Gertz, Udo W. Lipeck
Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints. [Citation Graph (0, 0)][DBLP] Data Knowl. Eng., 1996, v:20, n:2, pp:163-193 [Journal]
- Michael Gertz
Diagnosis and Repair of Constraint Violations in Database Systems. [Citation Graph (0, 0)][DBLP] Datenbank Rundbrief, 1997, v:19, n:, pp:96- [Journal]
- Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
Authentic Data Publication Over the Internet. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2003, v:11, n:3, pp:291-314 [Journal]
- Premkumar T. Devanbu, Michael Gertz, April Kwong
Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2004, v:12, n:6, pp:841-864 [Journal]
- Michael Gertz, M. Tamer Özsu, Gunter Saake, Kai-Uwe Sattler
Report on the Dagstuhl Seminar: "data quality on the Web". [Citation Graph (0, 0)][DBLP] SIGMOD Record, 2004, v:33, n:1, pp:127-132 [Journal]
- T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz
A Model and Framework for Visualization Exploration. [Citation Graph (0, 0)][DBLP] IEEE Trans. Vis. Comput. Graph., 2007, v:13, n:2, pp:357-369 [Journal]
- Jan-Marco Bremer, Michael Gertz
Integrating document and data retrieval based on XML. [Citation Graph (0, 0)][DBLP] VLDB J., 2006, v:15, n:1, pp:53-83 [Journal]
- Can Türker, Michael Gertz
Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems. [Citation Graph (0, 0)][DBLP] VLDB J., 2001, v:10, n:4, pp:241-269 [Journal]
- Omar Alonso, Michael Gertz, Ricardo A. Baeza-Yates
Search results using timeline visualizations. [Citation Graph (0, 0)][DBLP] SIGIR, 2007, pp:908- [Conf]
- Daniel Zinn, Jim Bosch, Michael Gertz
Modeling and Querying Vague Spatial Objects Using Shapelets. [Citation Graph (0, 0)][DBLP] VLDB, 2007, pp:567-578 [Conf]
- Jan-Marco Bremer, Michael Gertz
Integrating document and data retrieval based on XML. [Citation Graph (0, 0)][DBLP] VLDB J., 2008, v:0, n:, pp:- [Journal]
In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles. [Citation Graph (, )][DBLP]
Clustering and exploring search results using timeline constructions. [Citation Graph (, )][DBLP]
Modeling satellite image streams for change analysis. [Citation Graph (, )][DBLP]
Security and privacy for geospatial data: concepts and research directions. [Citation Graph (, )][DBLP]
Efficiently managing large-scale raster species distribution data in PostgreSQL. [Citation Graph (, )][DBLP]
Detection and Exploration of Outlier Regions in Sensor Data Streams. [Citation Graph (, )][DBLP]
Expertise identification and visualization from CVS. [Citation Graph (, )][DBLP]
ORDEN: outlier region detection and exploration in sensor networks. [Citation Graph (, )][DBLP]
Constraint-Based Learning of Distance Functions for Object Trajectories. [Citation Graph (, )][DBLP]
Real-Time Integration of Geospatial Raster and Point Data Streams. [Citation Graph (, )][DBLP]
Search in 0.030secs, Finished in 0.032secs
|