dblp.uni-trier.dewww.uni-trier.de

Dawn N. Jutla

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
49EEDawn N. Jutla, Dimitri Kanevsky: wisePad services for vision-, hearing-, and speech-impaired users. Commun. ACM 52(1): 64-69 (2009)
2008
48EEPeter Bodorik, Dawn N. Jutla, Mike Xuehai Wang: Consistent privacy preferences (CPP): model, semantics, and properties. SAC 2008: 2368-2375
47EEPeter Bodorik, Dawn N. Jutla: Privacy with Web Serivces: Intelligence Gathering and Enforcement. Web Intelligence/IAT Workshops 2008: 546-549
46EEDawn N. Jutla, Wei Yu: Applying the Delta model to mobile marketing management in the US marketplace. IJEB 6(3): 216-231 (2008)
2007
45EEDawn N. Jutla: Usable SPACE: Security, Privacy, and Context for the Mobile User. Financial Cryptography 2007: 245
44EERafiy Saleh, Dawn N. Jutla, Peter Bodorik: Management of Users' Privacy Preferences in Context. IRI 2007: 91-97
2006
43EEXiangdong An, Dawn N. Jutla, Nick Cercone: Auditing and Inference Control for Privacy Preservation in Uncertain Environments. EuroSSC 2006: 159-173
42EEYingxin (Sheila) He, Dawn N. Jutla: Contextual e-Negotiation for the Handling of Private Data in e-Commerce on a Semantic Web. HICSS 2006
41EEXiangdong An, Dawn N. Jutla, Nick Cercone: A Bayesian Network Approach to Detecting Privacy Intrusion. IAT Workshops 2006: 73-76
40EEDawn N. Jutla, Dimitri Kanevsky: Adding User-Level SPACe: Security, Privacy, and Context to Intelligent Multimedia Information Architectures. IAT Workshops 2006: 77-84
39EEXiangdong An, Dawn N. Jutla, Nick Cercone: Privacy intrusion detection using dynamic Bayesian networks. ICEC 2006: 208-215
38EEXiangdong An, Dawn N. Jutla, Nick Cercone: Probabilistic Internal Privacy Intrusion Detection. IDEAS 2006: 317-318
37EEXiangdong An, Dawn N. Jutla, Nick Cercone: Dynamic inference control in privacy preference enforcement. PST 2006: 24
36EEXiangdong An, Dawn N. Jutla, Nick Cercone: Temporal Context Lie Detection and Generation. Secure Data Management 2006: 30-47
35EEXiangdong An, Dawn N. Jutla, Nick Cercone: Reasoning about obfuscated private information: who have lied and how to lie. WPES 2006: 85-88
34EEXiangdong An, Dawn N. Jutla, Nick Cercone: Privacy Preserving Multiagent Probabilistic Reasoning about Ambiguous Contexts: A Case Study. Web Intelligence 2006: 801-807
33EEDawn N. Jutla, Peter Bodorik, Yanjun Zhang: PeCAN: An architecture for users' privacy-aware electronic commerce contexts on the semantic web. Inf. Syst. 31(4-5): 295-320 (2006)
2005
32EEYaomin Fu, Peter Bodorik, Dawn N. Jutla: A Self-Managed Predicate-Based Cache. CNSR 2005: 313-318
31EEWei Yu, Dawn N. Jutla, Shyamala C. Sivakumar: A Churn-Strategy Alignment Model for Managers in Mobile Telecom. CNSR 2005: 48-53
30EEDawn N. Jutla, Yanjun Zhang: Maturing e-Privacy with P3P and Context Agents. EEE 2005: 536-541
29EEYueping Lu, Peter Bodorik, Dawn N. Jutla: Evaluation of Integration of ACBL and AOCC Caching Algorithms. IDEAS 2005: 398-405
28EEVlado Keselj, Dawn N. Jutla: QTIP: Multi-Agent NLP and Privacy Architecture for Information Retrieval in Usable Web Privacy Software. Web Intelligence 2005: 718-724
27EEDawn N. Jutla, Peter Bodorik: Sociotechnical Architecture for Online Privacy. IEEE Security & Privacy 3(2): 29-39 (2005)
2004
26EEDawn N. Jutla, E. Kevin Kelloway, Said Saifi: Evaluation of User Intervention Mechanisms for Privacy on SME Online Trust. CEC 2004: 281-288
25EEPeter Bodorik, Dawn N. Jutla, Yueping Lu: Interoperable Server-Based Cache Consistency Algorithm. IDEAS 2004: 312-321
24EEDawn N. Jutla, Peter Bodorik, Deyun Gao: Management of Private Data: Addressing User Privacy and Economic, Social, and Ethical Concerns. Secure Data Management 2004: 100-117
23EEYiyu Yao, Jingtao Yao, Cory J. Butz, Pawan Lingras, Dawn N. Jutla: Web-based Support Systems (WSS): A Report of the WIC Canada Research Centre. Web Intelligence 2004: 787-788
2003
22 Peter Bodorik, Dawn N. Jutla: Architecture for User-Controlled e-Privacy. SAC 2003: 609-616
2002
21 Dawn N. Jutla, Terrance Weatherbee: Supporting CLEAR: A Strategy for Small and Medium Size Enterprise Adoption of e-Business Practices in Atlantic Canada. E-Business: Multidisciplinary Research and Practice 2002: 169-186
20EEPeter Bodorik, Shawn Best, Dawn N. Jutla: QoS Monitoring In Middleware. ECIS 2002
19EEDawn N. Jutla, Peter Bodorik, Terrance Weatherbee, Barry Hudson: e-government In Execution : Building Organizational Infrastructure. ECIS 2002
18EEDawn N. Jutla, Peter Bodorik, Jasbir Dhaliwal: Government Support for E-readiness of Small and Medium Sized Enterprises. HICSS 2002: 127
17 Peter Bodorik, Shawn Best, Dawn N. Jutla: Toolkit for QoS Monitoring in Middleware. ICEIS 2002: 244-249
2001
16EEDawn N. Jutla, James Craig, Peter Bodorik: A Methodology for Creating E-Business Strategy. HICSS 2001
15EEDawn N. Jutla, James Craig, Peter Bodorik: Enabling and Measuring Electronic Customer Relationship Management Readiness. HICSS 2001
14EEDawn N. Jutla, Peter Bodorik, Y. Cai: Interoperability for Accessing DBs by E-Commerce Applications. HICSS 2001
2000
13EEDawn N. Jutla, Peter Bodorik, Yie Wang: A Step towards a Suite of E-commerce Benchmarks. EC-Web 2000: 419-428
1999
12EEPeter Bodorik, Dawn N. Jutla, A. Agarwal: Recoverable Virtual Memory through the Multi-View Memory Computer System. HICSS 1999
11EEDawn N. Jutla, Peter Bodorik, Shaohua Ma, Yie Wang: WebTP: A Benchmark for Web-based Order Management Systems. HICSS 1999
10EEPeter Bodorik, Dawn N. Jutla, Jacob Slonim, A. Agarwal: Locking with Different Granularities for Reads and Writes in an MVM System. IDEAS 1999: 311-320
9 Dawn N. Jutla, Peter Bodorik, Yie Wang: WebEC: A Benchmark for the Cybermediary Business Model in E-Commerce. IMSA 1999: 388-392
8 Dawn N. Jutla, Peter Bodorik, Catherine Hajnal, Charles Davis: Making Business Sense of Electronic Commerce. IEEE Computer 32(3): 67-75 (1999)
7EEDawn N. Jutla, Peter Bodorik, Yie Wang: Developing Internet E-Commerce Benchmarks. Inf. Syst. 24(6): 475-493 (1999)
1998
6EEDawn N. Jutla, Peter Bodorik: Architectural Support for Synchronization of Threads Accessing Variable-Sized Units of Virtual Memory. HICSS (3) 1998: 197-206
5 Dawn N. Jutla, Peter Bodorik: A Benchmark Suite for Electronic Commerce. WebNet 1998
4 Peter Bodorik, Dawn N. Jutla: Multi-View Memory Support to Operating Systems in Locking for Transaction and Database Systems. Comput. J. 41(2): 84-97 (1998)
1997
3 Peter Bodorik, Dawn N. Jutla: Multi-view Memory To Support OS Locking for Transaction Systems. IDEAS 1997: 45-52
1994
2EEPeter Bodorik, Dawn N. Jutla: Multi-View Access Control Memory Computer System. ACM Conference on Computer Science 1994: 241-248
1993
1 Dawn N. Jutla, Peter Bodorik, J. Spruce Riordon: Integrated Concurrency-Coherence Control in Distributed Shared Memory. ICCI 1993: 251-255

Coauthor Index

1A. Agarwal [10] [12]
2Xiangdong An [34] [35] [36] [37] [38] [39] [41] [43]
3Shawn Best [17] [20]
4Peter Bodorik [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] [15] [16] [17] [18] [19] [20] [22] [24] [25] [27] [29] [32] [33] [44] [47] [48]
5Cory J. Butz [23]
6Y. Cai [14]
7Nick Cercone [34] [35] [36] [37] [38] [39] [41] [43]
8James Craig [15] [16]
9Charles Davis [8]
10Jasbir Dhaliwal [18]
11Yaomin Fu [32]
12Deyun Gao [24]
13Catherine Hajnal [8]
14Yingxin (Sheila) He [42]
15Barry Hudson [19]
16Dimitri Kanevsky [40] [49]
17E. Kevin Kelloway [26]
18Vlado Keselj [28]
19Pawan Lingras [23]
20Yueping Lu [25] [29]
21Shaohua Ma [11]
22J. Spruce Riordon [1]
23Said Saifi [26]
24Rafiy Saleh [44]
25Shyamala C. Sivakumar [31]
26Jacob Slonim [10]
27Mike Xuehai Wang [48]
28Yie Wang [7] [9] [11] [13]
29Terrance Weatherbee [19] [21]
30Jingtao Yao (J. T. Yao) [23]
31Yiyu Yao (Y. Y. Yao) [23]
32Wei Yu [31] [46]
33Yanjun Zhang [30] [33]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)