![]() | 2009 | |
---|---|---|
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Conny Franke, Marcel Karnstedt, Daniel Klan, Michael Gertz, Kai-Uwe Sattler, Wolfram Kattanek: In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles. BTW 2009: 367-386 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Omar Alonso, Michael Gertz, Ricardo A. Baeza-Yates: Clustering and exploring search results using timeline constructions. CIKM 2009: 97-106 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Jianting Zhang, Michael Gertz, Le Gruenwald: Efficiently managing large-scale raster species distribution data in PostgreSQL. GIS 2009: 316-325 |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Conny Franke, Michael Gertz: ORDEN: outlier region detection and exploration in sensor networks. SIGMOD Conference 2009: 1075-1078 |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Yu, Michael Gertz: Constraint-Based Learning of Distance Functions for Object Trajectories. SSDBM 2009: 627-645 |
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Omar Alonso, Michael Gertz: Time and Information Retrieval. Encyclopedia of Database Systems 2009: 3098-3103 |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Conny Franke, Marcel Karnstedt, Daniel Klan, Michael Gertz, Kai-Uwe Sattler, Elena Chervakova: In-network detection of anomaly regions in sensor networks with obstacles. Computer Science - R&D 24(3): 153-170 (2009) |
2008 | ||
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Conny Franke, Michael Gertz: Detection and Exploration of Outlier Regions in Sensor Data Streams. ICDM Workshops 2008: 375-384 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Omar Alonso, Premkumar T. Devanbu, Michael Gertz: Expertise identification and visualization from CVS. MSR 2008: 125-128 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Elisa Bertino, Bhavani M. Thuraisingham, Michael Gertz, Maria Luisa Damiani: Security and privacy for geospatial data: concepts and research directions. SPRINGL 2008: 6-19 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Carlos Rueda, Michael Gertz: Real-Time Integration of Geospatial Raster and Point Data Streams. SSDBM 2008: 605-611 |
2007 | ||
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Carlos Rueda, Michael Gertz: Modeling satellite image streams for change analysis. GIS 2007: 7 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Omar Alonso, Michael Gertz, Ricardo A. Baeza-Yates: Search results using timeline visualizations. SIGIR 2007: 908 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Daniel Zinn, Jim Bosch, Michael Gertz: Modeling and Querying Vague Spatial Objects Using Shapelets. VLDB 2007: 567-578 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz: A Model and Framework for Visualization Exploration. IEEE Trans. Vis. Comput. Graph. 13(2): 357-369 (2007) |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Omar Alonso, Michael Gertz, Ricardo A. Baeza-Yates: On the value of temporal information in information retrieval. SIGIR Forum 41(2): 35-41 (2007) |
2006 | ||
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Ebrima N. Ceesay, Jingmin Zhou, Michael Gertz, Karl N. Levitt, Matt Bishop: Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs. DIMVA 2006: 1-16 |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Quinn Hart, Carlos Rueda, Shefali Singhal, Jie Zhang: A Data and Query Model for Streaming Geospatial Image Data. EDBT Workshops 2006: 687-699 |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Quinn Hart, Michael Gertz: Optimization of multiple continuous queries over streaming satellite data. GIS 2006: 243-250 |
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Bird, Alex Gourley, Premkumar T. Devanbu, Michael Gertz, Anand Swaminathan: Mining email social networks. MSR 2006: 137-143 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Christian Bird, Alex Gourley, Premkumar T. Devanbu, Michael Gertz, Anand Swaminathan: Mining email social networks in Postgres. MSR 2006: 185-186 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Omar Alonso, Michael Gertz: Clustering of search results using temporal attributes. SIGIR 2006: 597-598 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Carlos Rueda, Michael Gertz, Bertram Ludäscher, Bernd Hamann: An Extensible Infrastructure for Processing Distributed Geospatial Data Streams. SSDBM 2006: 285-290 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan-Marco Bremer, Michael Gertz: Integrating document and data retrieval based on XML. VLDB J. 15(1): 53-83 (2006) |
2005 | ||
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Felix Naumann, Michael Gertz, Stuart E. Madnick: Proceedings of the 2005 International Conference on Information Quality (MIT IQ Conference), Sponsored by Lockheed Martin, MIT, Cambridge, MA, USA, November 10-12, 2006 MIT 2005 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Quinn Hart, Michael Gertz: Querying Streaming Geospatial Image Data: The GeoStreams Project. SSDBM 2005: 147-150 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Quinn Hart, Michael Gertz, Jie Zhang: Evaluation of a Dynamic Tree Structure for Indexing Query Regions on Streaming Geospatial Data. SSTD 2005: 145-162 |
2004 | ||
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Jie Zhang, Michael Gertz, Demet Aksoy: Spatio-temporal aggregates over raster image data. GIS 2004: 39-46 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Quinn Hart, Michael Gertz: Indexing Query Regions for Streaming Geospatial Data. STDBM 2004: 49-56 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Charles U. Martel, Glen Nuckolls, Premkumar T. Devanbu, Michael Gertz, April Kwong, Stuart G. Stubblebine: A General Model for Authenticated Data Structures. Algorithmica 39(1): 21-41 (2004) |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls: Databases that tell the Truth: Authentic Data Publication. IEEE Data Eng. Bull. 27(1): 26-33 (2004) |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Premkumar T. Devanbu, Michael Gertz, April Kwong: Flexible authentication of XML documents. Journal of Computer Security 12(6): 841-864 (2004) |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, M. Tamer Özsu, Gunter Saake, Kai-Uwe Sattler: Report on the Dagstuhl Seminar: "data quality on the Web". SIGMOD Record 33(1): 127-132 (2004) |
2003 | ||
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany Kluwer 2003 |
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Premkumar T. Devanbu, Michael Gertz, Brian Toone: Static Type-Inference for Trust in Distributed Information Systems. CoopIS/DOA/ODBASE 2003: 370-388 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Brian Toone, Michael Gertz, Premkumar T. Devanbu: Trust Mediation for Distributed Information Systems. SEC 2003: 1-12 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan-Marco Bremer, Michael Gertz: On Distributing XML Repositories. WebDB 2003: 73-78 |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine: Authentic Data Publication Over the Internet. Journal of Computer Security 11(3): 291-314 (2003) |
2002 | ||
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Erik Guldentops, Leon Strous: Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium Kluwer 2002 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Kai-Uwe Sattler: Integrating Scientific Data through External Concept-based annotations. DIWeb 2002: 87-101 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Kai-Uwe Sattler: Integrating Scientific Data through External, Concept-Based Annotations. EEXTT 2002: 220-240 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Christina Yip Chung, Michael Gertz, Neel Sundaresan: Reverse Engineering for Web Data: From Visual to Semantic Structure. ICDE 2002: 53-63 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | T. J. Jankun-Kelly, Kwan-Liu Ma, Michael Gertz: A Model for the Visualization Exploration Process. IEEE Visualization 2002 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, George Csaba: Monitoring Mission Critical Data for Integrity and Availability. IICIS 2002: 189-201 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Opportunities and Challenges in Tracing Security Breaches. IICIS 2002: 223-226 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Kai-Uwe Sattler, Fredric Gorin, Michael Hogarth, Jim Stone: Annotating Scientific Images: A Concept-Based Approach. SSDBM 2002: 59-68 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan-Marco Bremer, Michael Gertz: XQuery/IR: Integrating XML Document and Data Retrieval. WebDB 2002: 1-6 |
2001 | ||
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Premkumar T. Devanbu, Michael Gertz, April Kwong, Charles U. Martel, Glen Nuckolls, Stuart G. Stubblebine: Flexible authentication of XML documents. ACM Conference on Computer and Communications Security 2001: 136-145 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Bruce Rosenstock, Michael Gertz: Web-based scholarship: annotating the digital library. JCDL 2001: 104-105 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Jan-Marco Bremer, Michael Gertz: Web Data Indexing Through External Semantic-carrying Annotations. RIDE-DM 2001: 69-76 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | April Kwong, Michael Gertz: Authentic Publication of XML Document Data. WISE (1) 2001: 331-340 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Christina Yip Chung, Michael Gertz, Neel Sundaresan: Quixote: Building XML Repositories from Topic Specific Web Documents. WebDB 2001: 103-108 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Can Türker, Michael Gertz: Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems. VLDB J. 10(4): 241-269 (2001) |
2000 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Premkumar T. Devanbu, Michael Gertz, Charles U. Martel, Stuart G. Stubblebine: Authentic Third-party Data Publication. DBSec 2000: 101-112 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Christina Yip Chung, Michael Gertz, Karl N. Levitt: Discovery of Multi-Level Security Policies. DBSec 2000: 173-184 |
1999 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Christina Yip Chung, Michael Gertz, Karl N. Levitt: DEMIDS: A Misuse Detection System for Database Systems. IICIS 1999: 159-178 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Christina Yip Chung, Michael Gertz, Karl N. Levitt: Misuse Detection in Database Systems Through User Profiling. Recent Advances in Intrusion Detection 1999 |
1998 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Ingo Schmitt: Data Integration Techniques based on Data Quality Aspects. Föderierte Datenbanken 1998: 1-19 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Managing Data Quality and Integrity in Federated Databases. IICIS 1998: 211-230 |
1997 | ||
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Alexander Scharnofske, Udo W. Lipeck, Michael Gertz: SubQuery-By-Example: Eine orthogonale Erweiterung von QBE. BTW 1997: 132-152 |
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Udo W. Lipeck: An Extensible Framework for Repairing Constraint Violations. IICIS 1997: 89-111 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Diagnosis and Repair of Constraint Violations in Database Systems. Datenbank Rundbrief 19: 96 (1997) |
1996 | ||
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Diagnosis and Repair of Constraint Violations in Database Systems. Infix Verlag, St. Augustin, Germany 1996 |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: An Extensible Framework for Repairing Constraint Violations. FMLDO 1996: 41-56 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Udo W. Lipeck: Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints. Data Knowl. Eng. 20(2): 163-193 (1996) |
1995 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Vram Kouramajian, Michael Gertz: A Visual Query Editor for Temporal Databases. OOER 1995: 388-399 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Udo W. Lipeck: "Temporal" Integrity Constraints in Temporal Databases Temporal Databases 1995: 77-92 |
1994 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Specifying Reactive Integrity Control for Active Databases. RIDE-ADS 1994: 62-70 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Udo W. Lipeck, Michael Gertz, Gunter Saake: Transitional Monitoring of Dynamic Inegrity Constraints. IEEE Data Eng. Bull. 17(2): 38-42 (1994) |
1993 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Integritätssicherung in aktiven Datenbanken. Grundlagen von Datenbanken 1993: 001-005 |
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz, Udo W. Lipeck: Deriving Integrity Maintaining Triggers from Transition Graphs. ICDE 1993: 22-29 |
1992 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael Gertz: Deriving Integrity Constraints Maintaining Triggers from Transition Graphs. Grundlagen von Datenbanken 1992: 40-44 |