The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Gregory Vert: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Gregory Vert, James Arseneau, Sara Nasser
    Fuzzy Rules for Finger Print Verification using Ridge Extraction. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:113-116 [Conf]
  2. Gregory Vert, Aparna Phadnis, Rajasekhar Yakkali, Xin Yu
    Towards an Automated Adaptive Content Delivery Training System. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:339- [Conf]
  3. Gregory Vert, B. Yuan, N. Cole
    A Visual Algebra for Detecting Port Attacks on Computer Systems. [Citation Graph (0, 0)][DBLP]
    CAINE, 2003, pp:131-135 [Conf]
  4. Gregory Vert, Rawan Alkhaldi, Sara Nasser
    An Architectural Model for Low Overhead Spatial Data Authentication and Distribution in a Peer To Peer Based Spatial Database Model. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2005, pp:423-428 [Conf]
  5. Satish Baddelpeli, Gregory Vert
    Adaptive Security Metrics for Computer Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:351-356 [Conf]
  6. Sara Nasser, Sergiu Dascalu, Gregory Vert
    User Interface Design of the Interactive Fingerprint Recognition (INFIR) System. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:371-377 [Conf]
  7. Gregory Vert, Manaf Alfize
    An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:364-370 [Conf]
  8. Gregory Vert, Sergiu M. Dascalu, Frederick C. Harris Jr., Sermsak Buntha
    A Visual Environment for Characterization of State Changes in Computer Systems. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:435-440 [Conf]
  9. Arthur Reloj, Gregory Vert
    Optical Wireless: Chromatic Encoded Visual Data Transfer. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:378-383 [Conf]
  10. Gregory Vert, Nic Herndon
    Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases. [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:384-389 [Conf]
  11. Rajasekhar Yakkali, Gregory Vert
    Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs). [Citation Graph (0, 0)][DBLP]
    Security and Management, 2006, pp:357-363 [Conf]
  12. Gregory Vert, Sergiu M. Dascalu
    Towards A White Box Testing Methodology for Safe Software Development. [Citation Graph (0, 0)][DBLP]
    IASSE, 2003, pp:233-237 [Conf]
  13. Gregory Vert, Jill Heaton, Ashley Morris
    A Fuzzy Method to Reconcile Spatial Object Discrepancies In A New Peer To Peer Based Database System. [Citation Graph (0, 0)][DBLP]
    PDPTA, 2005, pp:1222-1229 [Conf]
  14. Gregory Vert, Molly Stock, Ashley Morris
    Extending ERD modeling notation to fuzzy management of GIS data files. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 2002, v:40, n:2, pp:163-179 [Journal]
  15. Gregory Vert, Ashley Morris, Molly Stock
    Converting a Fuzzy Data Model to an Object-Oriented Design for Managing GIS Data Files. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2003, v:15, n:2, pp:510-511 [Journal]

  16. A Logical Data Model for Genome Data. [Citation Graph (, )][DBLP]


  17. Multiple Sequence Alignment using Fuzzy Logic. [Citation Graph (, )][DBLP]


  18. A Generic Metric for Evaluation of Database Security. [Citation Graph (, )][DBLP]


  19. Defining A New Type of Global Information Architecture for Contextual Information Processing. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002