Search the dblp DataBase
Gregory Vert :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Gregory Vert , James Arseneau , Sara Nasser Fuzzy Rules for Finger Print Verification using Ridge Extraction. [Citation Graph (0, 0)][DBLP ] CAINE, 2003, pp:113-116 [Conf ] Gregory Vert , Aparna Phadnis , Rajasekhar Yakkali , Xin Yu Towards an Automated Adaptive Content Delivery Training System. [Citation Graph (0, 0)][DBLP ] CAINE, 2003, pp:339- [Conf ] Gregory Vert , B. Yuan , N. Cole A Visual Algebra for Detecting Port Attacks on Computer Systems. [Citation Graph (0, 0)][DBLP ] CAINE, 2003, pp:131-135 [Conf ] Gregory Vert , Rawan Alkhaldi , Sara Nasser An Architectural Model for Low Overhead Spatial Data Authentication and Distribution in a Peer To Peer Based Spatial Database Model. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2005, pp:423-428 [Conf ] Satish Baddelpeli , Gregory Vert Adaptive Security Metrics for Computer Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:351-356 [Conf ] Sara Nasser , Sergiu Dascalu , Gregory Vert User Interface Design of the Interactive Fingerprint Recognition (INFIR) System. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:371-377 [Conf ] Gregory Vert , Manaf Alfize An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:364-370 [Conf ] Gregory Vert , Sergiu M. Dascalu , Frederick C. Harris Jr. , Sermsak Buntha A Visual Environment for Characterization of State Changes in Computer Systems. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:435-440 [Conf ] Arthur Reloj , Gregory Vert Optical Wireless: Chromatic Encoded Visual Data Transfer. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:378-383 [Conf ] Gregory Vert , Nic Herndon Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases. [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:384-389 [Conf ] Rajasekhar Yakkali , Gregory Vert Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs). [Citation Graph (0, 0)][DBLP ] Security and Management, 2006, pp:357-363 [Conf ] Gregory Vert , Sergiu M. Dascalu Towards A White Box Testing Methodology for Safe Software Development. [Citation Graph (0, 0)][DBLP ] IASSE, 2003, pp:233-237 [Conf ] Gregory Vert , Jill Heaton , Ashley Morris A Fuzzy Method to Reconcile Spatial Object Discrepancies In A New Peer To Peer Based Database System. [Citation Graph (0, 0)][DBLP ] PDPTA, 2005, pp:1222-1229 [Conf ] Gregory Vert , Molly Stock , Ashley Morris Extending ERD modeling notation to fuzzy management of GIS data files. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 2002, v:40, n:2, pp:163-179 [Journal ] Gregory Vert , Ashley Morris , Molly Stock Converting a Fuzzy Data Model to an Object-Oriented Design for Managing GIS Data Files. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Knowl. Data Eng., 2003, v:15, n:2, pp:510-511 [Journal ] A Logical Data Model for Genome Data. [Citation Graph (, )][DBLP ] Multiple Sequence Alignment using Fuzzy Logic. [Citation Graph (, )][DBLP ] A Generic Metric for Evaluation of Database Security. [Citation Graph (, )][DBLP ] Defining A New Type of Global Information Architecture for Contextual Information Processing. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.003secs