The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Gertz: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael Gertz, Udo W. Lipeck
    Deriving Integrity Maintaining Triggers from Transition Graphs. [Citation Graph (9, 14)][DBLP]
    ICDE, 1993, pp:22-29 [Conf]
  2. Michael Gertz
    Specifying Reactive Integrity Control for Active Databases. [Citation Graph (4, 0)][DBLP]
    RIDE-ADS, 1994, pp:62-70 [Conf]
  3. Udo W. Lipeck, Michael Gertz, Gunter Saake
    Transitional Monitoring of Dynamic Inegrity Constraints. [Citation Graph (1, 11)][DBLP]
    IEEE Data Eng. Bull., 1994, v:17, n:2, pp:38-42 [Journal]
  4. Alexander Scharnofske, Udo W. Lipeck, Michael Gertz
    SubQuery-By-Example: Eine orthogonale Erweiterung von QBE. [Citation Graph (0, 0)][DBLP]
    BTW, 1997, pp:132-152 [Conf]
  5. Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine
    Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:136-145 [Conf]
  6. Premkumar T. Devanbu, Michael Gertz, Brian Toone
    Static Type-Inference for Trust in Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    CoopIS/DOA/ODBASE, 2003, pp:370-388 [Conf]
  7. Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
    Authentic Third-party Data Publication. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:101-112 [Conf]
  8. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    Discovery of Multi-Level Security Policies. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:173-184 [Conf]
  9. Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop
    Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. [Citation Graph (0, 0)][DBLP]
    DIMVA, 2006, pp:1-16 [Conf]
  10. Michael Gertz, Kai-Uwe Sattler
    Integrating Scientific Data through External Concept-based annotations. [Citation Graph (0, 0)][DBLP]
    DIWeb, 2002, pp:87-101 [Conf]
  11. Michael Gertz, Quinn Hart, Carlos Rueda, Shefali Singhal, Jie Zhang
    A Data and Query Model for Streaming Geospatial Image Data. [Citation Graph (0, 0)][DBLP]
    EDBT Workshops, 2006, pp:687-699 [Conf]
  12. Michael Gertz, Kai-Uwe Sattler
    Integrating Scientific Data through External, Concept-Based Annotations. [Citation Graph (0, 0)][DBLP]
    EEXTT, 2002, pp:220-240 [Conf]
  13. Vram Kouramajian, Michael Gertz
    A Visual Query Editor for Temporal Databases. [Citation Graph (0, 13)][DBLP]
    OOER, 1995, pp:388-399 [Conf]
  14. Michael Gertz, Ingo Schmitt
    Data Integration Techniques based on Data Quality Aspects. [Citation Graph (0, 0)][DBLP]
    Föderierte Datenbanken, 1998, pp:1-19 [Conf]
  15. Michael Gertz
    An Extensible Framework for Repairing Constraint Violations. [Citation Graph (0, 0)][DBLP]
    FMLDO, 1996, pp:41-56 [Conf]
  16. Jie Zhang, Michael Gertz, Demet Aksoy
    Spatio-temporal aggregates over raster image data. [Citation Graph (0, 0)][DBLP]
    GIS, 2004, pp:39-46 [Conf]
  17. Quinn Hart, Michael Gertz
    Optimization of multiple continuous queries over streaming satellite data. [Citation Graph (0, 0)][DBLP]
    GIS, 2006, pp:243-250 [Conf]
  18. Michael Gertz
    Deriving Integrity Constraints Maintaining Triggers from Transition Graphs. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1992, pp:40-44 [Conf]
  19. Michael Gertz
    Integritätssicherung in aktiven Datenbanken. [Citation Graph (0, 0)][DBLP]
    Grundlagen von Datenbanken, 1993, pp:1-5 [Conf]
  20. Christina Yip Chung, Michael Gertz, Neel Sundaresan
    Reverse Engineering for Web Data: From Visual to Semantic Structure. [Citation Graph (0, 0)][DBLP]
    ICDE, 2002, pp:53-63 [Conf]
  21. Bruce Rosenstock, Michael Gertz
    Web-based scholarship: annotating the digital library. [Citation Graph (0, 0)][DBLP]
    JCDL, 2001, pp:104-105 [Conf]
  22. Christian Bird, Alex Gourley, Premkumar T. Devanbu, Michael Gertz, Anand Swaminathan
    Mining email social networks. [Citation Graph (0, 0)][DBLP]
    MSR, 2006, pp:137-143 [Conf]
  23. Christian Bird, Alex Gourley, Premkumar T. Devanbu, Michael Gertz, Anand Swaminathan
    Mining email social networks in Postgres. [Citation Graph (0, 0)][DBLP]
    MSR, 2006, pp:185-186 [Conf]
  24. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    Misuse Detection in Database Systems Through User Profiling. [Citation Graph (0, 0)][DBLP]
    Recent Advances in Intrusion Detection, 1999, pp:- [Conf]
  25. Jan-Marco Bremer, Michael Gertz
    Web Data Indexing Through External Semantic-carrying Annotations. [Citation Graph (0, 6)][DBLP]
    RIDE-DM, 2001, pp:69-76 [Conf]
  26. Brian Toone, Michael Gertz, Premkumar T. Devanbu
    Trust Mediation for Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:1-12 [Conf]
  27. Omar Alonso, Michael Gertz
    Clustering of search results using temporal attributes. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2006, pp:597-598 [Conf]
  28. Quinn Hart, Michael Gertz, Jie Zhang
    Evaluation of a Dynamic Tree Structure for Indexing Query Regions on Streaming Geospatial Data. [Citation Graph (0, 0)][DBLP]
    SSTD, 2005, pp:145-162 [Conf]
  29. Michael Gertz, Kai-Uwe Sattler, Fredric Gorin, Michael Hogarth, Jim Stone
    Annotating Scientific Images: A Concept-Based Approach. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2002, pp:59-68 [Conf]
  30. Quinn Hart, Michael Gertz
    Querying Streaming Geospatial Image Data: The GeoStreams Project. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2005, pp:147-150 [Conf]
  31. Carlos Rueda, Michael Gertz, Bertram Ludäscher, Bernd Hamann
    An Extensible Infrastructure for Processing Distributed Geospatial Data Streams. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2006, pp:285-290 [Conf]
  32. Quinn Hart, Michael Gertz
    Indexing Query Regions for Streaming Geospatial Data. [Citation Graph (0, 0)][DBLP]
    STDBM, 2004, pp:49-56 [Conf]
  33. Christina Yip Chung, Michael Gertz, Karl N. Levitt
    DEMIDS: A Misuse Detection System for Database Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 1999, pp:159-178 [Conf]
  34. Michael Gertz
    Opportunities and Challenges in Tracing Security Breaches. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:223-226 [Conf]
  35. Michael Gertz
    Managing Data Quality and Integrity in Federated Databases. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:211-230 [Conf]
  36. Michael Gertz, George Csaba
    Monitoring Mission Critical Data for Integrity and Availability. [Citation Graph (0, 0)][DBLP]
    IICIS, 2002, pp:189-201 [Conf]
  37. Michael Gertz, Udo W. Lipeck
    An Extensible Framework for Repairing Constraint Violations. [Citation Graph (0, 0)][DBLP]
    IICIS, 1997, pp:89-111 [Conf]
  38. Michael Gertz, Udo W. Lipeck
    "Temporal" Integrity Constraints in Temporal Databases [Citation Graph (0, 0)][DBLP]
    Temporal Databases, 1995, pp:77-92 [Conf]
  39. T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz
    A Model for the Visualization Exploration Process. [Citation Graph (0, 0)][DBLP]
    IEEE Visualization, 2002, pp:- [Conf]
  40. Jan-Marco Bremer, Michael Gertz
    XQuery/IR: Integrating XML Document and Data Retrieval. [Citation Graph (0, 0)][DBLP]
    WebDB, 2002, pp:1-6 [Conf]
  41. Jan-Marco Bremer, Michael Gertz
    On Distributing XML Repositories. [Citation Graph (0, 0)][DBLP]
    WebDB, 2003, pp:73-78 [Conf]
  42. Christina Yip Chung, Michael Gertz, Neel Sundaresan
    Quixote: Building XML Repositories from Topic Specific Web Documents. [Citation Graph (0, 0)][DBLP]
    WebDB, 2001, pp:103-108 [Conf]
  43. April Kwong, Michael Gertz
    Authentic Publication of XML Document Data. [Citation Graph (0, 0)][DBLP]
    WISE (1), 2001, pp:331-340 [Conf]
  44. Charles U. Martel, Glen Nuckolls, Premkumar T. Devanbu, Michael Gertz, April Kwong, Stuart G. Stubblebine
    A General Model for Authenticated Data Structures. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2004, v:39, n:1, pp:21-41 [Journal]
  45. Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls
    Databases that tell the Truth: Authentic Data Publication. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:26-33 [Journal]
  46. Michael Gertz, Udo W. Lipeck
    Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:20, n:2, pp:163-193 [Journal]
  47. Michael Gertz
    Diagnosis and Repair of Constraint Violations in Database Systems. [Citation Graph (0, 0)][DBLP]
    Datenbank Rundbrief, 1997, v:19, n:, pp:96- [Journal]
  48. Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine
    Authentic Data Publication Over the Internet. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2003, v:11, n:3, pp:291-314 [Journal]
  49. Premkumar T. Devanbu, Michael Gertz, April Kwong
    Flexible authentication of XML documents. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 2004, v:12, n:6, pp:841-864 [Journal]
  50. Michael Gertz, M. Tamer Özsu, Gunter Saake, Kai-Uwe Sattler
    Report on the Dagstuhl Seminar: "data quality on the Web". [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:1, pp:127-132 [Journal]
  51. T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz
    A Model and Framework for Visualization Exploration. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Vis. Comput. Graph., 2007, v:13, n:2, pp:357-369 [Journal]
  52. Jan-Marco Bremer, Michael Gertz
    Integrating document and data retrieval based on XML. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2006, v:15, n:1, pp:53-83 [Journal]
  53. Can Türker, Michael Gertz
    Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2001, v:10, n:4, pp:241-269 [Journal]
  54. Omar Alonso, Michael Gertz, Ricardo A. Baeza-Yates
    Search results using timeline visualizations. [Citation Graph (0, 0)][DBLP]
    SIGIR, 2007, pp:908- [Conf]
  55. Daniel Zinn, Jim Bosch, Michael Gertz
    Modeling and Querying Vague Spatial Objects Using Shapelets. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:567-578 [Conf]
  56. Jan-Marco Bremer, Michael Gertz
    Integrating document and data retrieval based on XML. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  57. In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles. [Citation Graph (, )][DBLP]


  58. Clustering and exploring search results using timeline constructions. [Citation Graph (, )][DBLP]


  59. Modeling satellite image streams for change analysis. [Citation Graph (, )][DBLP]


  60. Security and privacy for geospatial data: concepts and research directions. [Citation Graph (, )][DBLP]


  61. Efficiently managing large-scale raster species distribution data in PostgreSQL. [Citation Graph (, )][DBLP]


  62. Detection and Exploration of Outlier Regions in Sensor Data Streams. [Citation Graph (, )][DBLP]


  63. Expertise identification and visualization from CVS. [Citation Graph (, )][DBLP]


  64. ORDEN: outlier region detection and exploration in sensor networks. [Citation Graph (, )][DBLP]


  65. Constraint-Based Learning of Distance Functions for Object Trajectories. [Citation Graph (, )][DBLP]


  66. Real-Time Integration of Geospatial Raster and Point Data Streams. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.458secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002