Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Gordon A. Manson
@article{DBLP:journals/jnw/LuMB06, author = {Gang Lu and Gordon A. Manson and Demetrios Belis}, title = {Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware}, journal = {J. Networks}, volume = {1}, number = {1}, pages = {54--63}, year = {2006}, url = {https://doi.org/10.4304/jnw.1.1.54-63}, doi = {10.4304/JNW.1.1.54-63}, timestamp = {Tue, 15 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnw/LuMB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mswim/LuMB06, author = {Gang Lu and Gordon A. Manson and Demetrios Belis}, editor = {Mohamed Ould{-}Khaoua and Mar{\'{\i}}a Blanca Caminero}, title = {Enhancing routing performance for inter-vehicle communication in city environment}, booktitle = {Proceedings of the 1st {ACM} Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks, {PM2HW2N} 2006, Terromolinos, Spain, October 2, 2006}, pages = {82--89}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1163653.1163669}, doi = {10.1145/1163653.1163669}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mswim/LuMB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/is/MouratidisGM05, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, title = {When security meets software engineering: a case of modelling secure information systems}, journal = {Inf. Syst.}, volume = {30}, number = {8}, pages = {609--629}, year = {2005}, url = {https://doi.org/10.1016/j.is.2004.06.002}, doi = {10.1016/J.IS.2004.06.002}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/is/MouratidisGM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msn/LuBM05, author = {Gang Lu and Demetrios Belis and Gordon A. Manson}, editor = {Xiaohua Jia and Jie Wu and Yanxiang He}, title = {A Novel Environment-Aware Mobility Model for Mobile Ad Hoc Networks}, booktitle = {Mobile Ad-hoc and Sensor Networks, First International Conference, {MSN} 2005, Wuhan, China, December 13-15, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3794}, pages = {654--665}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11599463\_64}, doi = {10.1007/11599463\_64}, timestamp = {Wed, 11 Mar 2020 08:37:17 +0100}, biburl = {https://dblp.org/rec/conf/msn/LuBM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijde/AbouzakharM04, author = {Nasser Salem Abouzakhar and Gordon A. Manson}, title = {Evaluation of Intelligent Intrusion Detection Models}, journal = {Int. J. Digit. EVid.}, volume = {3}, number = {1}, year = {2004}, url = {http://www.utica.edu/academic/institutes/ecii/publications/articles/A0B5CEAB-E87A-0E38-2D38CE3A3FB2F737.pdf}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijde/AbouzakharM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/MouratidisGM04, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, title = {Using Security Attack Scenarios to Analyse Security During Information Systems Design}, booktitle = {{ICEIS} 2004, Proceedings of the 6th International Conference on Enterprise Information Systems, Porto, Portugal, April 14-17, 2004}, pages = {10--17}, year = {2004}, timestamp = {Thu, 02 Feb 2017 12:56:49 +0100}, biburl = {https://dblp.org/rec/conf/iceis/MouratidisGM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hij/MouratidisMP03, author = {Haralambos Mouratidis and Gordon A. Manson and Ian R. Philp}, title = {Analysis and Design of the eSAP: An Integrated Health and Social Care Information System}, journal = {Health Informatics J.}, volume = {9}, number = {2}, pages = {89--92}, year = {2003}, url = {https://doi.org/10.1177/1460458203009002003}, doi = {10.1177/1460458203009002003}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hij/MouratidisMP03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/hij/MouratidisMP03a, author = {Haralambos Mouratidis and Gordon A. Manson and Ian R. Philp}, title = {A Novel Agent-Based System to Support the Single Assessment Process of Older People}, journal = {Health Informatics J.}, volume = {9}, number = {3}, pages = {149--162}, year = {2003}, url = {https://doi.org/10.1177/14604582030093003}, doi = {10.1177/14604582030093003}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/hij/MouratidisMP03a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbouzakharM03, author = {Nasser Salem Abouzakhar and Gordon A. Manson}, title = {Networks security measures using neuro-fuzzy agents}, journal = {Inf. Manag. Comput. Secur.}, volume = {11}, number = {1}, pages = {33--38}, year = {2003}, url = {https://doi.org/10.1108/09685220310463713}, doi = {10.1108/09685220310463713}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbouzakharM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aose/PoggiRTOMM03, author = {Agostino Poggi and Giovanni Rimassa and Paola Turci and James Odell and Haralambos Mouratidis and Gordon A. Manson}, editor = {Paolo Giorgini and J{\"{o}}rg P. M{\"{u}}ller and James Odell}, title = {Modeling Deployment and Mobility Issues in Multiagent Systems Using {AUML}}, booktitle = {Agent-Oriented Software Engineering IV, 4th International Workshop, {AOSE} 2003, Melbourne, Australia, July 15, 2003, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2935}, pages = {69--84}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24620-6\_5}, doi = {10.1007/978-3-540-24620-6\_5}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/aose/PoggiRTOMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/atal/MouratidisGM03, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, title = {Modelling secure multiagent systems}, booktitle = {The Second International Joint Conference on Autonomous Agents {\&} Multiagent Systems, {AAMAS} 2003, July 14-18, 2003, Melbourne, Victoria, Australia, Proceedings}, pages = {859--866}, publisher = {{ACM}}, year = {2003}, url = {https://doi.org/10.1145/860575.860713}, doi = {10.1145/860575.860713}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/atal/MouratidisGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caise/MouratidisGM03, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, editor = {Johann Eder and Michele Missikoff}, title = {Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems}, booktitle = {Advanced Information Systems Engineering, 15th International Conference, CAiSE 2003, Klagenfurt, Austria, June 16-18, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2681}, pages = {63--78}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45017-3\_7}, doi = {10.1007/3-540-45017-3\_7}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/caise/MouratidisGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceis/MouratidisMGG03, author = {Haralambos Mouratidis and Gordon A. Manson and Abdullah Gani and Paolo Giorgini}, title = {Analysing Security Requirements of Information Systems Using Tropos}, booktitle = {{ICEIS} 2003, Proceedings of the 5th International Conference on Enterprise Information Systems, Angers, France, April 22-26, 2003}, pages = {623--626}, year = {2003}, timestamp = {Thu, 02 Feb 2017 12:57:29 +0100}, biburl = {https://dblp.org/rec/conf/iceis/MouratidisMGG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ieaaie/GaniAM03, author = {Abdullah Gani and Nasser Salem Abouzakhar and Gordon A. Manson}, editor = {Paul Wai Hing Chung and Chris J. Hinde and Moonis Ali}, title = {{UMAS} Learning Requirement for Controlling Network Resources}, booktitle = {Developments in Applied Artificial Intelligence, 16th International Conference on Industrial and Engineering Applications of Artificial Intelligence and Expert Systems, {IEA/AIE} 2003, Laughborough, UK, June 23-26, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2718}, pages = {487--494}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45034-3\_49}, doi = {10.1007/3-540-45034-3\_49}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/ieaaie/GaniAM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/MouratidisGM03, author = {Haralambos Mouratidis and Paolo Giorgini and Gordon A. Manson}, editor = {Vasile Palade and Robert J. Howlett and Lakhmi C. Jain}, title = {An Ontology for Modelling Security: The Tropos Approach}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 7th International Conference, {KES} 2003, Oxford, UK, September 3-5, 2003, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {2773}, pages = {1387--1394}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45224-9\_187}, doi = {10.1007/978-3-540-45224-9\_187}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/MouratidisGM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/selmas/BrescianiGMM03, author = {Paolo Bresciani and Paolo Giorgini and Haralambos Mouratidis and Gordon A. Manson}, editor = {Carlos Jos{\'{e}} Pereira de Lucena and Alessandro F. Garcia and Alexander B. Romanovsky and Jaelson Castro and Paulo S. C. Alencar}, title = {Multi-agent Systems and Security Requirements Analysis}, booktitle = {Software Engineering for Multi-Agent Systems II, Research Issues and Practical Applications [the book is a result of {SELMAS} 2003]}, series = {Lecture Notes in Computer Science}, volume = {2940}, pages = {35--48}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-24625-1\_3}, doi = {10.1007/978-3-540-24625-1\_3}, timestamp = {Fri, 06 Nov 2020 10:10:09 +0100}, biburl = {https://dblp.org/rec/conf/selmas/BrescianiGMM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/LuoEM03, author = {R. Luo and R. M. Edwards and Gordon A. Manson}, title = {Capacity assignment on asymmetric Bluetooth link}, booktitle = {2003 {IEEE} Wireless Communications and Networking, {WCNC} 2003, New Orleans, LA, USA, 16-20 March, 2003}, pages = {1470--1474}, publisher = {{IEEE}}, year = {2003}, url = {https://doi.org/10.1109/WCNC.2003.1200603}, doi = {10.1109/WCNC.2003.1200603}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/LuoEM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imcs/AbouzakharM02, author = {Nasser Salem Abouzakhar and Gordon A. Manson}, title = {An intelligent approach to prevent distributed systems attacks}, journal = {Inf. Manag. Comput. Secur.}, volume = {10}, number = {5}, pages = {203--209}, year = {2002}, url = {https://doi.org/10.1108/09685220210447505}, doi = {10.1108/09685220210447505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/imcs/AbouzakharM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aois/MouratidisGPM02, author = {Haralambos Mouratidis and Paolo Giorgini and Ian R. Philp and Gordon A. Manson}, editor = {Paolo Giorgini and Yves Lesp{\'{e}}rance and Gerd Wagner and Eric S. K. Yu}, title = {Using Tropos Methodology to Model an Integrated Health Assessment System}, booktitle = {{AOIS} '02, Agent-Oriented Information Systems, Proceedings of the Fourth International Bi-Conference Workshop on Agent-Oriented Information Systems {(AOIS-2002} at CAiSE*02)}, series = {{CEUR} Workshop Proceedings}, volume = {57}, publisher = {CEUR-WS.org}, year = {2002}, url = {https://ceur-ws.org/Vol-57/id-16.pdf}, timestamp = {Fri, 10 Mar 2023 16:22:53 +0100}, biburl = {https://dblp.org/rec/conf/aois/MouratidisGPM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwcn/LadasAMM02, author = {Charalampos V. Ladas and R. M. E. Amiee and Mehdi Mahdavi and Gordon A. Manson}, title = {Class based selective-ARQ scheme for high performance {TCP} and {UDP} over wireless links}, booktitle = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm, Sweden}, pages = {311--315}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/MWCN.2002.1045743}, doi = {10.1109/MWCN.2002.1045743}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwcn/LadasAMM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mwcn/LuoBEM02, author = {R. Luo and Demetrios Belis and R. M. Edwards and Gordon A. Manson}, title = {A simulation design for link connection-oriented wireless mesh networks}, booktitle = {Proceedings of The Fourth {IEEE} Conference on Mobile and Wireless Communications Networks, {MWCN} 2002, September 9-11, 2002, Stockholm, Sweden}, pages = {665--669}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/MWCN.2002.1045849}, doi = {10.1109/MWCN.2002.1045849}, timestamp = {Fri, 02 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mwcn/LuoBEM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/MansonSE94, author = {Gordon A. Manson and Shahrin Sahib and Chandran Elamvazuthi}, title = {Design and code derivation in the {PCSC} methodology}, journal = {Inf. Softw. Technol.}, volume = {36}, number = {7}, pages = {413--417}, year = {1994}, url = {https://doi.org/10.1016/0950-5849(94)90063-9}, doi = {10.1016/0950-5849(94)90063-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/MansonSE94.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/RabhiM91, author = {Fethi A. Rabhi and Gordon A. Manson}, title = {Experiments with a transputer-based parallel graph reduction machine}, journal = {Concurr. Pract. Exp.}, volume = {3}, number = {4}, pages = {413--422}, year = {1991}, url = {https://doi.org/10.1002/cpe.4330030417}, doi = {10.1002/CPE.4330030417}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/RabhiM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/epodd/CringeanEMW91, author = {Janey K. Cringean and Roger England and Gordon A. Manson and Peter Willett}, title = {Nearest-neighbour Searching in Files of Text Signatures Using Transputer Networks}, journal = {Electron. Publ.}, volume = {4}, number = {4}, pages = {185--203}, year = {1991}, timestamp = {Tue, 01 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/epodd/CringeanEMW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipm/CringeanEMW91, author = {Janey K. Cringean and Roger England and Gordon A. Manson and Peter Willett}, title = {Network design for the implementation of text searching using a multicomputer}, journal = {Inf. Process. Manag.}, volume = {27}, number = {4}, pages = {265--283}, year = {1991}, url = {https://doi.org/10.1016/0306-4573(91)90084-Y}, doi = {10.1016/0306-4573(91)90084-Y}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipm/CringeanEMW91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/RabhiM91, author = {Fethi A. Rabhi and Gordon A. Manson}, title = {Divide-and-conquer and parallel graph reduction}, journal = {Parallel Comput.}, volume = {17}, number = {2-3}, pages = {189--205}, year = {1991}, url = {https://doi.org/10.1016/S0167-8191(05)80105-X}, doi = {10.1016/S0167-8191(05)80105-X}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/RabhiM91.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigir/CringeanEMW90, author = {Janey K. Cringean and Roger England and Gordon A. Manson and Peter Willett}, editor = {Jean{-}Luc Vidick}, title = {Parallel Text Searching in Serial Files Using a Processor Farm}, booktitle = {SIGIR'90, 13th International Conference on Research and Development in Information Retrieval, Brussels, Belgium, 5-7 September 1990, Proceedings}, pages = {429--453}, publisher = {{ACM}}, year = {1990}, url = {https://doi.org/10.1145/96749.98249}, doi = {10.1145/96749.98249}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigir/CringeanEMW90.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jis/CringeanM0W88, author = {Janey K. Cringean and Gordon A. Manson and Peter Willett and George A. Wilson}, title = {Efficiency of text scanning in bibliographic databases using microprocessor-based, multiprocessor networks}, journal = {J. Inf. Sci.}, volume = {14}, number = {6}, pages = {335--345}, year = {1988}, url = {https://doi.org/10.1177/016555158801400604}, doi = {10.1177/016555158801400604}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jis/CringeanM0W88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pc/BrintGLWMW88, author = {Andrew T. Brint and Valerie J. Gillet and Michael F. Lynch and Peter Willett and Gordon A. Manson and George A. Wilson}, title = {Chemical graph matching using transputer networks}, journal = {Parallel Comput.}, volume = {8}, number = {1-3}, pages = {295--300}, year = {1988}, url = {https://doi.org/10.1016/0167-8191(88)90133-0}, doi = {10.1016/0167-8191(88)90133-0}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pc/BrintGLWMW88.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/BrookesMT86, author = {G. R. Brookes and Gordon A. Manson and Jon A. Thompson}, title = {Lattice and ring array topologies using transputers}, journal = {Comput. Commun.}, volume = {9}, number = {3}, pages = {121--125}, year = {1986}, url = {https://doi.org/10.1016/0140-3664(86)90015-0}, doi = {10.1016/0140-3664(86)90015-0}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/BrookesMT86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcisd/GilletWLWBDMT86, author = {Valerie J. Gillet and Stephen M. Welford and Michael F. Lynch and Peter Willett and John M. Barnard and Geoffrey M. Downs and Gordon A. Manson and J. Thompson}, title = {Computer storage and retrieval of generic chemical structures in patents. 7. Parallel simulation of a relaxation algorithm for chemical substructure search}, journal = {J. Chem. Inf. Comput. Sci.}, volume = {26}, number = {3}, pages = {118--126}, year = {1986}, url = {https://doi.org/10.1021/ci00051a006}, doi = {10.1021/CI00051A006}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcisd/GilletWLWBDMT86.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.