2009 |
66 | | Conny Franke,
Marcel Karnstedt,
Daniel Klan,
Michael Gertz,
Kai-Uwe Sattler,
Wolfram Kattanek:
In-Network Detection of Anomaly Regions in Sensor Networks with Obstacles.
BTW 2009: 367-386 |
2008 |
65 | EE | Conny Franke,
Michael Gertz:
Detection and Exploration of Outlier Regions in Sensor Data Streams.
ICDM Workshops 2008: 375-384 |
64 | EE | Omar Alonso,
Premkumar T. Devanbu,
Michael Gertz:
Expertise identification and visualization from CVS.
MSR 2008: 125-128 |
63 | EE | Elisa Bertino,
Bhavani M. Thuraisingham,
Michael Gertz,
Maria Luisa Damiani:
Security and privacy for geospatial data: concepts and research directions.
SPRINGL 2008: 6-19 |
62 | EE | Carlos Rueda,
Michael Gertz:
Real-Time Integration of Geospatial Raster and Point Data Streams.
SSDBM 2008: 605-611 |
2007 |
61 | EE | Carlos Rueda,
Michael Gertz:
Modeling satellite image streams for change analysis.
GIS 2007: 7 |
60 | EE | Omar Alonso,
Michael Gertz,
Ricardo A. Baeza-Yates:
Search results using timeline visualizations.
SIGIR 2007: 908 |
59 | EE | Daniel Zinn,
Jim Bosch,
Michael Gertz:
Modeling and Querying Vague Spatial Objects Using Shapelets.
VLDB 2007: 567-578 |
58 | EE | T. J. Jankun-Kelly,
Kwan-Liu Ma,
Michael Gertz:
A Model and Framework for Visualization Exploration.
IEEE Trans. Vis. Comput. Graph. 13(2): 357-369 (2007) |
57 | EE | Omar Alonso,
Michael Gertz,
Ricardo A. Baeza-Yates:
On the value of temporal information in information retrieval.
SIGIR Forum 41(2): 35-41 (2007) |
2006 |
56 | EE | Ebrima N. Ceesay,
Jingmin Zhou,
Michael Gertz,
Karl N. Levitt,
Matt Bishop:
Using Type Qualifiers to Analyze Untrusted Integers and Detecting Security Flaws in C Programs.
DIMVA 2006: 1-16 |
55 | EE | Michael Gertz,
Quinn Hart,
Carlos Rueda,
Shefali Singhal,
Jie Zhang:
A Data and Query Model for Streaming Geospatial Image Data.
EDBT Workshops 2006: 687-699 |
54 | EE | Quinn Hart,
Michael Gertz:
Optimization of multiple continuous queries over streaming satellite data.
GIS 2006: 243-250 |
53 | EE | Christian Bird,
Alex Gourley,
Premkumar T. Devanbu,
Michael Gertz,
Anand Swaminathan:
Mining email social networks.
MSR 2006: 137-143 |
52 | EE | Christian Bird,
Alex Gourley,
Premkumar T. Devanbu,
Michael Gertz,
Anand Swaminathan:
Mining email social networks in Postgres.
MSR 2006: 185-186 |
51 | EE | Omar Alonso,
Michael Gertz:
Clustering of search results using temporal attributes.
SIGIR 2006: 597-598 |
50 | EE | Carlos Rueda,
Michael Gertz,
Bertram Ludäscher,
Bernd Hamann:
An Extensible Infrastructure for Processing Distributed Geospatial Data Streams.
SSDBM 2006: 285-290 |
49 | EE | Jan-Marco Bremer,
Michael Gertz:
Integrating document and data retrieval based on XML.
VLDB J. 15(1): 53-83 (2006) |
2005 |
48 | | Felix Naumann,
Michael Gertz,
Stuart E. Madnick:
Proceedings of the 2005 International Conference on Information Quality (MIT IQ Conference), Sponsored by Lockheed Martin, MIT, Cambridge, MA, USA, November 10-12, 2006
MIT 2005 |
47 | | Quinn Hart,
Michael Gertz:
Querying Streaming Geospatial Image Data: The GeoStreams Project.
SSDBM 2005: 147-150 |
46 | EE | Quinn Hart,
Michael Gertz,
Jie Zhang:
Evaluation of a Dynamic Tree Structure for Indexing Query Regions on Streaming Geospatial Data.
SSTD 2005: 145-162 |
2004 |
45 | EE | Jie Zhang,
Michael Gertz,
Demet Aksoy:
Spatio-temporal aggregates over raster image data.
GIS 2004: 39-46 |
44 | EE | Quinn Hart,
Michael Gertz:
Indexing Query Regions for Streaming Geospatial Data.
STDBM 2004: 49-56 |
43 | EE | Charles U. Martel,
Glen Nuckolls,
Premkumar T. Devanbu,
Michael Gertz,
April Kwong,
Stuart G. Stubblebine:
A General Model for Authenticated Data Structures.
Algorithmica 39(1): 21-41 (2004) |
42 | EE | Michael Gertz,
April Kwong,
Charles U. Martel,
Glen Nuckolls:
Databases that tell the Truth: Authentic Data Publication.
IEEE Data Eng. Bull. 27(1): 26-33 (2004) |
41 | | Premkumar T. Devanbu,
Michael Gertz,
April Kwong:
Flexible authentication of XML documents.
Journal of Computer Security 12(6): 841-864 (2004) |
40 | EE | Michael Gertz,
M. Tamer Özsu,
Gunter Saake,
Kai-Uwe Sattler:
Report on the Dagstuhl Seminar: "data quality on the Web".
SIGMOD Record 33(1): 127-132 (2004) |
2003 |
39 | | Michael Gertz:
Integrity and Internal Control in Information Systems V, IFIP TC11/WG11.5 Fifth Working Conference on Integrity and Internal Control in Information Systems (IICIS), November 11-12, 2002, Bonn, Germany
Kluwer 2003 |
38 | EE | Premkumar T. Devanbu,
Michael Gertz,
Brian Toone:
Static Type-Inference for Trust in Distributed Information Systems.
CoopIS/DOA/ODBASE 2003: 370-388 |
37 | | Brian Toone,
Michael Gertz,
Premkumar T. Devanbu:
Trust Mediation for Distributed Information Systems.
SEC 2003: 1-12 |
36 | EE | Jan-Marco Bremer,
Michael Gertz:
On Distributing XML Repositories.
WebDB 2003: 73-78 |
35 | | Premkumar T. Devanbu,
Michael Gertz,
Charles U. Martel,
Stuart G. Stubblebine:
Authentic Data Publication Over the Internet.
Journal of Computer Security 11(3): 291-314 (2003) |
2002 |
34 | | Michael Gertz,
Erik Guldentops,
Leon Strous:
Integrity, Internal Control and Security in Information Systems: Connecting Governance and Technology, IFIP TC11/WG11.5 Fourth Working Conference on Integrity, Internal Control and Security in Information Systems, November 15-16, 2001, Brussels, Belgium
Kluwer 2002 |
33 | | Michael Gertz,
Kai-Uwe Sattler:
Integrating Scientific Data through External Concept-based annotations.
DIWeb 2002: 87-101 |
32 | EE | Michael Gertz,
Kai-Uwe Sattler:
Integrating Scientific Data through External, Concept-Based Annotations.
EEXTT 2002: 220-240 |
31 | EE | Christina Yip Chung,
Michael Gertz,
Neel Sundaresan:
Reverse Engineering for Web Data: From Visual to Semantic Structure.
ICDE 2002: 53-63 |
30 | EE | T. J. Jankun-Kelly,
Kwan-Liu Ma,
Michael Gertz:
A Model for the Visualization Exploration Process.
IEEE Visualization 2002 |
29 | | Michael Gertz,
George Csaba:
Monitoring Mission Critical Data for Integrity and Availability.
IICIS 2002: 189-201 |
28 | | Michael Gertz:
Opportunities and Challenges in Tracing Security Breaches.
IICIS 2002: 223-226 |
27 | EE | Michael Gertz,
Kai-Uwe Sattler,
Fredric Gorin,
Michael Hogarth,
Jim Stone:
Annotating Scientific Images: A Concept-Based Approach.
SSDBM 2002: 59-68 |
26 | EE | Jan-Marco Bremer,
Michael Gertz:
XQuery/IR: Integrating XML Document and Data Retrieval.
WebDB 2002: 1-6 |
2001 |
25 | EE | Premkumar T. Devanbu,
Michael Gertz,
April Kwong,
Charles U. Martel,
Glen Nuckolls,
Stuart G. Stubblebine:
Flexible authentication of XML documents.
ACM Conference on Computer and Communications Security 2001: 136-145 |
24 | EE | Bruce Rosenstock,
Michael Gertz:
Web-based scholarship: annotating the digital library.
JCDL 2001: 104-105 |
23 | EE | Jan-Marco Bremer,
Michael Gertz:
Web Data Indexing Through External Semantic-carrying Annotations.
RIDE-DM 2001: 69-76 |
22 | EE | April Kwong,
Michael Gertz:
Authentic Publication of XML Document Data.
WISE (1) 2001: 331-340 |
21 | | Christina Yip Chung,
Michael Gertz,
Neel Sundaresan:
Quixote: Building XML Repositories from Topic Specific Web Documents.
WebDB 2001: 103-108 |
20 | EE | Can Türker,
Michael Gertz:
Semantic integrity support in SQL: 1999 and commercial (object-)relational database management systems.
VLDB J. 10(4): 241-269 (2001) |
2000 |
19 | | Premkumar T. Devanbu,
Michael Gertz,
Charles U. Martel,
Stuart G. Stubblebine:
Authentic Third-party Data Publication.
DBSec 2000: 101-112 |
18 | | Christina Yip Chung,
Michael Gertz,
Karl N. Levitt:
Discovery of Multi-Level Security Policies.
DBSec 2000: 173-184 |
1999 |
17 | | Christina Yip Chung,
Michael Gertz,
Karl N. Levitt:
DEMIDS: A Misuse Detection System for Database Systems.
IICIS 1999: 159-178 |
16 | EE | Christina Yip Chung,
Michael Gertz,
Karl N. Levitt:
Misuse Detection in Database Systems Through User Profiling.
Recent Advances in Intrusion Detection 1999 |
1998 |
15 | | Michael Gertz,
Ingo Schmitt:
Data Integration Techniques based on Data Quality Aspects.
Föderierte Datenbanken 1998: 1-19 |
14 | | Michael Gertz:
Managing Data Quality and Integrity in Federated Databases.
IICIS 1998: 211-230 |
1997 |
13 | | Alexander Scharnofske,
Udo W. Lipeck,
Michael Gertz:
SubQuery-By-Example: Eine orthogonale Erweiterung von QBE.
BTW 1997: 132-152 |
12 | | Michael Gertz,
Udo W. Lipeck:
An Extensible Framework for Repairing Constraint Violations.
IICIS 1997: 89-111 |
11 | | Michael Gertz:
Diagnosis and Repair of Constraint Violations in Database Systems.
Datenbank Rundbrief 19: 96 (1997) |
1996 |
10 | | Michael Gertz:
Diagnosis and Repair of Constraint Violations in Database Systems.
Infix Verlag, St. Augustin, Germany 1996 |
9 | EE | Michael Gertz:
An Extensible Framework for Repairing Constraint Violations.
FMLDO 1996: 41-56 |
8 | EE | Michael Gertz,
Udo W. Lipeck:
Deriving Optimized Integrity Monitoring Triggers from Dynamic Integrity Constraints.
Data Knowl. Eng. 20(2): 163-193 (1996) |
1995 |
7 | EE | Vram Kouramajian,
Michael Gertz:
A Visual Query Editor for Temporal Databases.
OOER 1995: 388-399 |
6 | | Michael Gertz,
Udo W. Lipeck:
"Temporal" Integrity Constraints in Temporal Databases
Temporal Databases 1995: 77-92 |
1994 |
5 | | Michael Gertz:
Specifying Reactive Integrity Control for Active Databases.
RIDE-ADS 1994: 62-70 |
4 | EE | Udo W. Lipeck,
Michael Gertz,
Gunter Saake:
Transitional Monitoring of Dynamic Inegrity Constraints.
IEEE Data Eng. Bull. 17(2): 38-42 (1994) |
1993 |
3 | | Michael Gertz:
Integritätssicherung in aktiven Datenbanken.
Grundlagen von Datenbanken 1993: 001-005 |
2 | EE | Michael Gertz,
Udo W. Lipeck:
Deriving Integrity Maintaining Triggers from Transition Graphs.
ICDE 1993: 22-29 |
1992 |
1 | | Michael Gertz:
Deriving Integrity Constraints Maintaining Triggers from Transition Graphs.
Grundlagen von Datenbanken 1992: 40-44 |