default search action
George Dimitoglou
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c15]George Dimitoglou, Carol Jim:
Performance Evaluation of Partially Homomorphic Encryption Algorithms. CSCI 2022: 910-915 - 2020
- [i2]John N. Brewer III, George Dimitoglou:
Evaluation of Attack Vectors and Risks in Automobiles and Road Infrastructure. CoRR abs/2006.16374 (2020)
2010 – 2019
- 2019
- [c14]Anwar Husain, Ahmed Salem, Carol Jim, George Dimitoglou:
Development of an Efficient Network Intrusion Detection Model Using Extreme Gradient Boosting (XGBoost) on the UNSW-NB15 Dataset. ISSPIT 2019: 1-7 - 2018
- [c13]Carol Jim, George Dimitoglou, Ahmed Salem:
Applying Game Theoretic Techniques to Improve the Accuracy of Tree-based Classification Results. ISSPIT 2018: 314-319 - 2014
- [c12]Kenneth May, Seth Kress, Ahmed Salem, George Dimitoglou:
A gaming approach for ad-hoc secure routing in education. CGAMES 2014: 1-7 - 2012
- [j3]Stephen Balakirsky, Sachin Chitta, George Dimitoglou, Jason Gorman, Kayla Kim, Mark Yim:
Robot Challenge [Competitions]. IEEE Robotics Autom. Mag. 19(4): 9-11 (2012) - [i1]George Dimitoglou, James A. Adams, Carol M. Jim:
Comparison of the C4.5 and a Naive Bayes Classifier for the Prediction of Lung Cancer Survivability. CoRR abs/1206.1121 (2012) - 2010
- [c11]Juan Pablo Garcia Ortiz, Vicente González Ruiz, Inmaculada García, Daniel Muller, George Dimitoglou:
Interactive Browsing of Remote JPEF 2000 Image Sequences. ICPR 2010: 3179-3182 - [c10]Juan Pablo Garcia Ortiz, Vicente González Ruiz, Inmaculada García, Daniel Muller, George Dimitoglou:
An efficient prefetching strategy for remote browsing of JPEG 2000 image sequences. WIAMIS 2010: 1-4
2000 – 2009
- 2009
- [j2]Daniel Muller, Bernhard Fleck, George Dimitoglou, Benjamin W. Caplins, Desmond E. Amadigwe, Juan Pablo Garcia Ortiz, Benjamin Wamsler, Alen Alexanderian, V. Keith Hughitt, Jack Ireland:
JHelioviewer: Visualizing Large Sets of Solar Images Using JPEG 2000. Comput. Sci. Eng. 11(5): 38-47 (2009) - [c9]Jason A. Weller, George Dimitoglou:
Survey of Models, Methods and Techniques for Computational Epidemiology. MSV 2009: 99-105 - 2008
- [c8]Kristopher W. Reese, Ahmed Salem, George Dimitoglou:
Using Standard Deviation in Signal Strength Detection to Determine Jamming in Wireless Networks. CAINE 2008: 250-254 - [c7]G. Henson, M. Maynard, X. Liu, George Dimitoglou:
Analysis of a novel docking technique for autonomous robots. PerMIS 2008: 220-223 - [c6]G. Henson, M. Maynard, George Dimitoglou, X. Liu:
Algorithms and performance analysis for path navigation of Ackerman-steered autonomous robots. PerMIS 2008: 230-235 - [c5]Michael Maynard, George Dimitoglou:
A Service Oriented Architecture Complexity Metric, Based on Statistical Hypothesis Testing. Software Engineering Research and Practice 2008: 214-220 - 2007
- [c4]Paul Seymer, George Dimitoglou:
Performance Optimization of Close-Color Pair Steganalysis. Security and Management 2007: 123-130 - [c3]George Dimitoglou, Patrick Doody, Sharif Gaines:
Golden Hour: A Game-Based Simulation Environment. International Conference on Internet Computing 2007: 147-152 - 2006
- [c2]George Dimitoglou, Okan Duzyol, Lawrence Owusu:
Formal Verification of a Simple Automated Negotiation Protocol. Software Engineering Research and Practice 2006: 650-656 - 2003
- [c1]George Dimitoglou, Philippe Moore, Shmuel Rotenstreich:
Middleware for large distributed systems and organizations. ISICT 2003: 536-542
1990 – 1999
- 1998
- [j1]George Dimitoglou:
Deadlocks and Methods for their Detection, Prevention and Recovery in Modern Operating Systems. ACM SIGOPS Oper. Syst. Rev. 32(3): 51-54 (1998)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint