The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Sotirios Terzis: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Graham Thomson, Sotirios Terzis, Paddy Nixon
    A model and architecture for situation determination. [Citation Graph (0, 0)][DBLP]
    CASCON, 2006, pp:380- [Conf]
  2. Sotirios Terzis, Paddy Nixon
    Semantic Trading: Tackling Interoperability Problems During System Integration. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:9- [Conf]
  3. Sotirios Terzis, Paddy Nixon
    Component Trading: the Basis for a Component-Oriented Development Framework. [Citation Graph (0, 0)][DBLP]
    ECOOP Workshops, 1999, pp:186- [Conf]
  4. Sarantos Kapidakis, Sotirios Terzis, Jakka Sairamesh
    A Management Architecture for Measuring and Monitoring the Behavior of Digital Libraries. [Citation Graph (0, 0)][DBLP]
    ECDL, 1998, pp:95-114 [Conf]
  5. Sotirios Terzis, Waleed Wagealla, Colin English, Paddy Nixon
    Trust Lifecycle Management in a Global Computing Environment. [Citation Graph (0, 0)][DBLP]
    Global Computing, 2004, pp:291-313 [Conf]
  6. Simon A. Dobson, Paddy Nixon, Vincent P. Wade, Sotirios Terzis, John Fuller
    Vanilla: An Open Language Framework. [Citation Graph (0, 0)][DBLP]
    GCSE, 1999, pp:91-104 [Conf]
  7. Paddy Nixon, Vincent P. Wade, Sotirios Terzis, Marcus O'Connell, Simon A. Dobson
    The Virtues Architecture: A Software Infrastructure for Business-to-Business E-Commerce. [Citation Graph (0, 0)][DBLP]
    ICEIS, 2000, pp:461-466 [Conf]
  8. Sotirios Terzis, Paddy Nixon, Vincent P. Wade, Simon A. Dobson, John Fuller
    The Future of Enterprise Groupware Applications. [Citation Graph (0, 0)][DBLP]
    ICEIS, 1999, pp:525-532 [Conf]
  9. Colin English, Sotirios Terzis
    Gathering Experience in Trust-Based Interactions. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:62-76 [Conf]
  10. Colin English, Sotirios Terzis, Waleed Wagealla
    Engineering Trust Based Collaborations in a Global Computing Environment. [Citation Graph (0, 0)][DBLP]
    iTrust, 2004, pp:120-134 [Conf]
  11. Colin English, Waleed Wagealla, Paddy Nixon, Sotirios Terzis, Helen Lowe, Andrew D. McGettrick
    Trusting Collaboration in Global Computing Systems. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:136-149 [Conf]
  12. Richard Glassey, Graeme Stevenson, Matthew Richmond, Paddy Nixon, Sotirios Terzis, Feng Wang, Ian Ferguson
    Towards a Middleware for Generalised Context Management. [Citation Graph (0, 0)][DBLP]
    Middleware Workshops, 2003, pp:45-52 [Conf]
  13. Sotirios Terzis, Paddy Nixon
    Component Location and the Role of Trading in Large Scale Distributed Systems. [Citation Graph (0, 0)][DBLP]
    PDSE, 2000, pp:173-179 [Conf]
  14. Graham Thomson, Sotirios Terzis, Paddy Nixon
    Situation Determination with Reusable Situation Specifications. [Citation Graph (0, 0)][DBLP]
    PerCom Workshops, 2006, pp:620-623 [Conf]
  15. Colin English, Sotirios Terzis, Waleed Wagealla, Helen Lowe, Paddy Nixon, Andrew D. McGettrick
    Trust Dynamics for Collaborative Global Computing. [Citation Graph (0, 0)][DBLP]
    WETICE, 2003, pp:283-0 [Conf]
  16. Ann Nosseir, Richard C. H. Connor, Crawford Revie, Sotirios Terzis
    Question-based authentication using context data. [Citation Graph (0, 0)][DBLP]
    NordiCHI, 2006, pp:429-432 [Conf]
  17. Sarantos Kapidakis, Sotirios Terzis, Jakka Sairamesh
    A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries. [Citation Graph (0, 0)][DBLP]
    Int. J. on Digital Libraries, 2000, v:3, n:1, pp:19-35 [Journal]
  18. Colin English, Sotirios Terzis, Paddy Nixon
    Towards self-protecting ubiquitous systems: monitoring trust-based interactions. [Citation Graph (0, 0)][DBLP]
    Personal and Ubiquitous Computing, 2006, v:10, n:1, pp:50-54 [Journal]
  19. Sotirios Terzis, Paddy Nixon, Nitya Narasimhan, Tim Walsh
    Middleware for pervasive and ad hoc computing. [Citation Graph (0, 0)][DBLP]
    Personal and Ubiquitous Computing, 2006, v:10, n:1, pp:4-6 [Journal]
  20. Paddy Nixon, Feng Wang, Sotirios Terzis
    Programming structures for adaptive ambient systems. [Citation Graph (0, 0)][DBLP]
    ISICT, 2003, pp:193-198 [Conf]

  21. Danger Theory and Intrusion Detection: Possibilities and Limitations of the Analogy. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002