default search action
Komminist Weldemariam
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c69]Ayush Jain, Manikandan Padmanaban, Jagabondhu Hazra, Shantanu Godbole, Komminist Weldemariam:
A Framework for Emission Reduction in Scope 3 Climate Actions using Domain-adapted Foundation Model. COMAD/CODS 2024: 316-324 - [c68]Smit Marvaniya, Jitendra Singh, Nicolas Galichet, Fred Ochieng Otieno, Geeth de Mel, Kommy Weldemariam:
Encoding Seasonal Climate Predictions with Modular Neural Network. ICASSP 2024: 6105-6109 - [c67]Yikun Ban, Ishika Agarwal, Ziwei Wu, Yada Zhu, Kommy Weldemariam, Hanghang Tong, Jingrui He:
Neural Active Learning Beyond Bandits. ICLR 2024 - [c66]Zhining Liu, Ruizhong Qiu, Zhichen Zeng, Hyunsik Yoo, David Zhou, Zhe Xu, Yada Zhu, Kommy Weldemariam, Jingrui He, Hanghang Tong:
Class-Imbalanced Graph Learning without Class Rebalancing. ICML 2024 - [i20]Yikun Ban, Ishika Agarwal, Ziwei Wu, Yada Zhu, Kommy Weldemariam, Hanghang Tong, Jingrui He:
Neural Active Learning Beyond Bandits. CoRR abs/2404.12522 (2024) - [i19]Dongqi Fu, Yada Zhu, Hanghang Tong, Kommy Weldemariam, Onkar Bhardwaj, Jingrui He:
Generating Fine-Grained Causality in Climate Time Series Data for Forecasting and Anomaly Detection. CoRR abs/2408.04254 (2024) - 2023
- [j12]Jagabondhu Hazra, Shantanu Godbole, Kommy Weldemariam, Maja Vukovic:
AI for Environmental Intelligence in the Digital Economy. Ubiquity 2023(September): 1-9 (2023) - [i18]Girmaw Abebe Tadesse, Jannis Born, Celia Cintas, William Ogallo, Dmitry Zubarev, Matteo Manica, Komminist Weldemariam:
Domain-agnostic and Multi-level Evaluation of Generative Models. CoRR abs/2301.08750 (2023) - [i17]Ayush Jain, Manikandan Padmanaban, Jagabondhu Hazra, Shantanu Godbole, Kommy Weldemariam:
Supply chain emission estimation using large language models. CoRR abs/2308.01741 (2023) - [i16]Zhining Liu, Zhichen Zeng, Ruizhong Qiu, Hyunsik Yoo, David Zhou, Zhe Xu, Yada Zhu, Kommy Weldemariam, Jingrui He, Hanghang Tong:
Topological Augmentation for Class-Imbalanced Node Classification. CoRR abs/2308.14181 (2023) - [i15]Smit Marvaniya, Jitendra Singh, Nicolas Galichet, Fred Ochieng Otieno, Geeth De Mel, Kommy Weldemariam:
Encoding Seasonal Climate Predictions for Demand Forecasting with Modular Neural Network. CoRR abs/2309.02248 (2023) - [i14]S. Karthik Mukkavilli, Daniel Salles Civitarese, Johannes Schmude, Johannes Jakubik, Anne Jones, Nam Nguyen, Christopher Phillips, Sujit Roy, Shraddha Singh, Campbell D. Watson, Raghu K. Ganti, Hendrik F. Hamann, Udaysankar Nair, Rahul Ramachandran, Kommy Weldemariam:
AI Foundation Models for Weather and Climate: Applications, Design, and Implementation. CoRR abs/2309.10808 (2023) - [i13]Johannes Jakubik, Sujit Roy, C. E. Phillips, Paolo Fraccaro, Denys Godwin, Bianca Zadrozny, Daniela Szwarcman, Carlos Gomes, Gabby Nyirjesy, Blair Edwards, Daiki Kimura, Naomi Simumba, Linsong Chu, S. Karthik Mukkavilli, Devyani Lambhate, Kamal Das, Ranjini Bangalore, Dário A. B. Oliveira, Michal Muszynski, Kumar Ankur, Muthukumaran Ramasubramanian, Iksha Gurung, Sam Khallaghi, Hanxi Li, Michael Cecil, Maryam Ahmadi, Fatemeh Kordi, Hamed Alemohammad, Manil Maskey, Raghu K. Ganti, Kommy Weldemariam, Rahul Ramachandran:
Foundation Models for Generalist Geospatial Artificial Intelligence. CoRR abs/2310.18660 (2023) - 2022
- [j11]Celia Cintas, Skyler Speakman, Girmaw Abebe Tadesse, Victor Akinwande, Edward McFowland III, Komminist Weldemariam:
Pattern detection in the activation space for identifying synthesized content. Pattern Recognit. Lett. 153: 207-213 (2022) - [c65]Paolo Fraccaro, Nikola Stoyanov, Zaheed Gaffoor, Laura Elena Cue La Rosa, Jitendra Singh, Tatsuya Ishikawa, Blair Edwards, Anne Jones, Komminist Weldemariam:
Deploying an Artificial Intelligence Application to Detect Flood from Sentinel 1 Data. AAAI 2022: 12489-12495 - [i12]Girmaw Abebe Tadesse, Oliver Bent, Komminist Weldemariam, Md. Abrar Istiak, Taufiq Hasan, Andrea Cavallaro:
BON: An extended public domain dataset for human activity recognition. CoRR abs/2209.05077 (2022) - [i11]Blair Edwards, Paolo Fraccaro, Nikola Stoyanov, Nelson Bore, Julian Kuehnert, Kommy Weldemariam, Anne Jones:
Climate Impact Modelling Framework. CoRR abs/2209.12080 (2022) - 2021
- [j10]Girmaw Abebe Tadesse, Hamza A. Javed, Komminist Weldemariam, Yong Liu, Jin Liu, Jiyan Chen, Tingting Zhu:
DeepMI: Deep multi-lead ECG fusion for identifying myocardial infarction and its occurrence-time. Artif. Intell. Medicine 121: 102192 (2021) - [c64]Celia Cintas, Victor Akinwande, Ramya Raghavendra, Girmaw Abebe Tadesse, Aisha Walcott, Charity Wayua, Fredrick Makumbi, Rhoda Wanyenze, Komminist Weldemariam:
Data-Driven Sequential Uptake Pattern Discovery for Family Planning Studies. AMIA 2021 - [d1]Girmaw Abebe Tadesse, Oliver Bent, Komminist Weldemariam, Md. Abrar Istiak, Taufiq Hasan:
BON - Egocentric Vision Dataset for Office Activity Recognition. IEEE DataPort, 2021 - [i10]Girmaw Abebe Tadesse, Hamza A. Javed, Yong Liu, Jin Liu, Jiyan Chen, Komminist Weldemariam, Tingting Zhu:
DeepMI: Deep Multi-lead ECG Fusion for Identifying Myocardial Infarction and its Occurrence-time. CoRR abs/2104.02054 (2021) - [i9]Celia Cintas, Skyler Speakman, Girmaw Abebe Tadesse, Victor Akinwande, Edward McFowland III, Komminist Weldemariam:
Pattern Detection in the Activation Space for Identifying Synthesized Content. CoRR abs/2105.12479 (2021) - 2020
- [j9]Girmaw Abebe Tadesse, Oliver Bent, Lucio Marcenaro, Komminist Weldemariam, Andrea Cavallaro:
Privacy-Aware Human Activity Recognition From a Wearable Camera: Highlights From the IEEE Video And Image Processing Cup 2019 Student Competition [SP Competitions]. IEEE Signal Process. Mag. 37(3): 168-172 (2020) - [c63]William Ogallo, Skyler Speakman, Victor Akinwande, Kush R. Varshney, Aisha Walcott, Charity Wayua, Komminist Weldemariam, Claire-Helene Mershon, Nosa Orobaton:
Identifying Factors Associated with Neonatal Mortality in Sub-Saharan Africa using Machine Learning. AMIA 2020 - [c62]Andrew Kinai, Fred Otieno, Nelson Bore, Komminist Weldemariam:
Multi-factor authentication for users of non-internet based applications of blockchain-based platforms. Blockchain 2020: 525-531 - [c61]Girmaw Abebe Tadesse, Hamza A. Javed, Komminist Weldemariam, Tingting Zhu:
A Spectral-longitudinal Model for Detection of Heart Attack from 12-lead Electrocardiogram Waveforms. EMBC 2020: 6009-6012 - [c60]Samuel C. Maina, Reginald E. Bryant, William O. Ogallo, Kush R. Varshney, Skyler Speakman, Celia Cintas, Aisha Walcott-Bryant, Robert-Florian Samoilescu, Komminist Weldemariam:
Preservation of Anomalous Subgroups On Variational Autoencoder Transformed Data. ICASSP 2020: 3627-3631 - [c59]Nelson Bore, Andrew Kinai, Peninah Waweru, Isaac Wambugu, Juliet Mutahi, Everlyne Kemunto, Reginald E. Bryant, Komminist Weldemariam:
AGWS: Blockchain-enabled Small-scale Farm Digitization. IEEE ICBC 2020: 1-9 - [c58]Charles M. Wachira, Sekou L. Remy, Oliver Bent, Nelson Bore, Samuel Osebe, Komminist Weldemariam, Aisha Walcott-Bryant:
A Platform for Disease Intervention Planning. ICHI 2020: 1-8 - [c57]Celia Cintas, Skyler Speakman, Victor Akinwande, William Ogallo, Komminist Weldemariam, Srihari Sridharan, Edward McFowland:
Detecting Adversarial Attacks via Subset Scanning of Autoencoder Activations and Reconstruction Error. IJCAI 2020: 876-882 - [c56]William Ogallo, Skyler Speakman, Victor Akinwande, Kush R. Varshney, Aisha Walcott-Bryant, Charity Wayua, Komminist Weldemariam:
Inspection of Blackbox Models for Evaluating Vulnerability in Maternal, Newborn, and Child Health. IJCAI 2020: 5282-5284 - [c55]Celia Cintas, Ramya Raghavendra, Victor Akinwande, Aisha Walcott-Bryant, Charity Wayua, Komminist Weldemariam:
Decision Platform for Pattern Discovery and Causal Effect Estimation in Contraceptive Discontinuation. IJCAI 2020: 5288-5290 - [c54]Girmaw Abebe Tadesse, Komminist Weldemariam, Hamza A. Javed, Yong Liu, Jin Liu, Jiyan Chen, Tingting Zhu:
Discriminant Knowledge Extraction from Electrocardiograms for Automated Diagnosis of Myocardial Infarction. PKAW 2020: 70-82 - [i8]Nelson Bore, Andrew Kinai, Peninah Waweru, Isaac Wambugu, Juliet Mutahi, Everlyne Kemunto, Reginald E. Bryant, Komminist Weldemariam:
ADW: Blockchain-enabled Small-scale Farm Digitization. CoRR abs/2003.06862 (2020) - [i7]Andrew Kinai, Fred Otieno, Nelson Bore, Komminist Weldemariam:
Multi-factor authentication for users of non-internet based applications of blockchain-based platforms. CoRR abs/2010.07818 (2020) - [i6]Girmaw Abebe Tadesse, Celia Cintas, Skyler Speakman, Komminist Weldemariam:
Prediction of neonatal mortality in Sub-Saharan African countries using data-level linkage of multiple surveys. CoRR abs/2011.12707 (2020)
2010 – 2019
- 2019
- [c53]Reginald E. Bryant, Celia Cintas, Isaac Wambugu, Andrew Kinai, Abdigani Diriye, Komminist Weldemariam:
Evaluation of Bias in Sensitive Personal Information Used to Train Financial Models. GlobalSIP 2019: 1-5 - [c52]Nelson Bore, Andrew Kinai, Juliet Mutahi, David Kaguma, Fred Otieno, Sekou L. Remy, Komminist Weldemariam:
On Using Blockchain Based Workflows. IEEE ICBC 2019: 112-116 - [c51]Nelson Kibichii Bore, Ravi Kiran Raman, Isaac M. Markus, Sekou L. Remy, Oliver Bent, Michael Hind, Eleftheria Kyriaki Pissadaki, Biplav Srivastava, Roman Vaculín, Kush R. Varshney, Komminist Weldemariam:
Promoting Distributed Trust in Machine Learning and Computational Simulation. IEEE ICBC 2019: 311-319 - [c50]Samuel Osebe, Aisha Walcott, Komminist Weldemariam, Charles M. Wachira, Fiona Matu, Nelson Bore, David Kaguma, Juliet Mutahi, William Ogallo, Celia Cintas, Sekou L. Remy:
Enabling Care Continuity using a Digital Health Wallet. ICHI 2019: 1-7 - [i5]Daniel Omeiza, Skyler Speakman, Celia Cintas, Komminist Weldemariam:
Smooth Grad-CAM++: An Enhanced Inference Level Visualization Technique for Deep Convolutional Neural Network Models. CoRR abs/1908.01224 (2019) - [i4]Reginald E. Bryant, Celia Cintas, Isaac Wambugu, Andrew Kinai, Komminist Weldemariam:
Analyzing Bias in Sensitive Personal Information Used to Train Financial Models. CoRR abs/1911.03623 (2019) - [i3]Samuel C. Maina, Reginald E. Bryant, William O. Goal, Robert-Florian Samoilescu, Kush R. Varshney, Komminist Weldemariam:
Preservation of Anomalous Subgroups On Machine Learning Transformed Data. CoRR abs/1911.03674 (2019) - 2018
- [i2]Skyler Speakman, Srihari Sridharan, Sekou L. Remy, Komminist Weldemariam, Edward McFowland:
Subset Scanning Over Neural Network Activations. CoRR abs/1810.08676 (2018) - [i1]Nelson Kibichii Bore, Ravi Kiran Raman, Isaac M. Markus, Sekou L. Remy, Oliver Bent, Michael Hind, Eleftheria Kyriaki Pissadaki, Biplav Srivastava, Roman Vaculín, Kush R. Varshney, Komminist Weldemariam:
Promoting Distributed Trust in Machine Learning and Computational Simulation via a Blockchain Network. CoRR abs/1810.11126 (2018) - 2017
- [j8]Oliver Bent, Prasenjit Dey, Komminist Weldemariam, Mukesh K. Mohania:
Modeling user behavior data in systems of engagement. Future Gener. Comput. Syst. 68: 456-464 (2017) - [j7]Mattia Zeni, Komminist Weldemariam:
Extracting information from newspaper archives in Africa. IBM J. Res. Dev. 61(6): 12:1-12:12 (2017) - [c49]Andrew Kinai, Juliet Mutahi, Nelson Bore, Samuel Karumba, Srihari Sridharan, Abdigani Diriye, Komminist Weldemariam:
Deploying Large Scale School Census Hub: An Experience Report. ICSE-SEIS 2017: 47-56 - [c48]John Wamburu, David Kaguma, Michiaki Tatsubori, Aisha Walcott-Bryant, Reginald E. Bryant, Komminist Weldemariam:
Roaming Nairobi Roads: Instrumenting Roads under Resource Constraints. MOBILESoft@ICSE 2017: 100-109 - [c47]Nelson Bore, Samuel Karumba, Juliet Mutahi, Shelby Solomon Darnell, Charity Wayua, Komminist Weldemariam:
Towards Blockchain-enabled School Information Hub. ICTD 2017: 19:1-19:4 - [c46]Juliet Mutahi, Andrew Kinai, Nelson Bore, Abdigani Diriye, Komminist Weldemariam:
Studying engagement and performance with learning technology in an African classroom. LAK 2017: 148-152 - 2016
- [c45]David Kaguma, Samuel Karumba, Aisha Walcott-Bryant, Komminist Weldemariam:
Towards cooperative content downloading for resource-constrained mobile devices. MOBILESoft 2016: 189-198 - 2015
- [j6]Juliet Mutahi, Oliver Bent, Andrew Kinai, Komminist Weldemariam, Bikram Sengupta, Danish Contractor:
Seamless blended learning using the Cognitive Learning Companion: A systemic view. IBM J. Res. Dev. 59(6) (2015) - [j5]Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam:
An Empirical Evaluation of Web-Based Fingerprinting. IEEE Softw. 32(4): 46-52 (2015) - [c44]Amin FaizKhademi, Mohammad Zulkernine, Komminist Weldemariam:
FPGuard: Detection and Prevention of Browser Fingerprinting. DBSec 2015: 293-308 - [c43]Mattia Zeni, Elizabeth Ondula, Reagan Mbitiru, Agnes Nyambura, Lianna Samuel, Kala Fleming, Komminist Weldemariam:
Low-power Low-cost Wireless Sensors for Real-time Plant Stress Detection. ACM DEV 2015: 51-59 - [c42]Juliet Mutahi, Oliver Bent, Andrew Kinai, Komminist Weldemariam, Bikram Sengupta:
Capturing Learner's Activity Events from a Mobile Learning System Using Adaptive Event Framework. MOBILESoft 2015: 109-112 - [c41]Jaye Clarkes-Nias, Juliet Mutahi, Andrew Kinai, Oliver Bent, Komminist Weldemariam, Saurabh Srivastava:
Towards Capturing Learners Sentiment and Context. L@S 2015: 217-222 - 2014
- [j4]Hossain Shahriar, Komminist Weldemariam, Mohammad Zulkernine, Thibaud Lutellier:
Effective detection of vulnerable and malicious browser extensions. Comput. Secur. 47: 66-84 (2014) - [c40]Hana Fahim-Hashemi, Mohammad Zulkernine, Komminist Weldemariam:
TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks. CRiSIS 2014: 196-212 - [c39]Kala Fleming, Komminist Weldemariam:
From Needs to Services: Delivering Personalized Water Assurance Services in Urban Africa. ER 2014: 445-457 - [c38]Josh Marston, Komminist Weldemariam, Mohammad Zulkernine:
On evaluating and securing firefox for Android browser extensions. MOBILESoft 2014: 27-36 - [c37]Andrew Kinai, Reginald E. Bryant, Aisha Walcott-Bryant, Eric Mibuari, Komminist Weldemariam, Osamuyimen Stewart:
Twende-twende: a mobile application for traffic congestion awareness and routing. MOBILESoft 2014: 93-98 - [c36]Prasenjit Dey, Mukesh K. Mohania, Komminist Weldemariam:
Some Issues in Modeling User Behavior Data in Systems of Engagement. MEDI 2014: 9-12 - [c35]Kala Fleming, Komminist Weldemariam, Haggai Wangusi, Osamuyimen Stewart:
Monitoring water scarcity risk in Africa. SAC 2014: 567-568 - [c34]Charity Wayua, Komminist Weldemariam, Osamuyimen Stewart:
Rethinking agribusiness models in Africa. SAC 2014: 1174-1175 - [c33]Andrew Kinai, Reginald E. Bryant, Aisha Walcott-Bryant, Eric Mibuari, Komminist Weldemariam, Osamuyimen Stewart:
Traffic 411: a traffic congestion routing and awareness platform for Nairobi. SAC 2014: 1475-1476 - [c32]Komminist Weldemariam, Hossain Shahriar, Vamshee Krishna Devendran:
Dynamic Analysis of Web Objects. SIN 2014: 423 - [c31]Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam:
FRanC: A Ranking Framework for the Prioritization of Software Maintenance. SERE (Companion) 2014: 31-40 - 2013
- [c30]Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine:
EINSPECT: Evolution-Guided Analysis and Detection of Malicious Web Pages. COMPSAC 2013: 375-380 - [c29]Francesco Cuomo, Eric Mibuari, Komminist Weldemariam, Osamuyimen Stewart:
Leveraging Raspberry Pi for interactive education. ACM DEV (4) 2013: 16:1-16:2 - [c28]Anton Barua, Mohammad Zulkernine, Komminist Weldemariam:
Protecting Web Browser Extensions from JavaScript Injection Attacks. ICECCS 2013: 188-197 - [c27]Dhyanesh Chaudhari, Mohammad Zulkernine, Komminist Weldemariam:
Towards a ranking framework for software components. SAC 2013: 495-498 - [c26]Umme Hunny, Mohammad Zulkernine, Komminist Weldemariam:
OSDC: adapting ODC for developing more secure software. SAC 2013: 1131-1136 - [c25]Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam, Mohammad Zulkernine:
Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications. SERE 2013: 188-197 - [c24]Hossain Shahriar, Komminist Weldemariam, Thibaud Lutellier, Mohammad Zulkernine:
A Model-Based Detection of Vulnerable and Malicious Browser Extensions. SERE 2013: 198-207 - 2012
- [c23]Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam:
Understanding the Development Trends of Electronic Voting Systems. ARES 2012: 186-195 - [c22]Ali Fawzi Najm Al-Shammari, Adolfo Villafiorita, Komminist Weldemariam:
Towards an Open Standard Vote Verification Framework in Electronic Voting Systems. ARES 2012: 437-444 - [c21]Henok Sahilu, Adolfo Villafiorita, Komminist Weldemariam, Mesfin Belachew, Amanuel Zewge:
Designing distributed agricultural information services for developing countries. ACM DEV 2012: 24:1 - [c20]Amanuel Zewge, Komminist Weldemariam, Sebsibe Hailemariam, Adolfo Villafiorita, Angelo Susi, Mesfin Belachew:
On the use of goal-oriented methodology for designing agriculture services in developing countries. MEDES 2012: 40-47 - [c19]Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
BINSPECT: Holistic Analysis and Detection of Malicious Web Pages. SecureComm 2012: 149-166 - 2011
- [j3]Komminist Weldemariam, Adolfo Villafiorita:
Procedural security analysis: A methodological approach. J. Syst. Softw. 84(7): 1114-1129 (2011) - [j2]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita:
Formal analysis of an electronic voting system: An experience report. J. Syst. Softw. 84(10): 1618-1637 (2011) - [c18]Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
Early Detection of Security Misconfiguration Vulnerabilities in Web Applications. ARES 2011: 169-174 - [c17]Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
Malicious Website Detection: Effectiveness and Efficiency Issues. SysSec@DIMVA 2011: 123-126 - [c16]Ali Fawzi Najm Al-Shammari, Komminist Weldemariam, Adolfo Villafiorita, Sergio Tessaris:
Vote verification through open standard: A roadmap. REVOTE 2011: 22-26 - 2010
- [b1]Komminist Weldemariam:
Using Formal Methods for Building more Reliable and Secure e-voting Systems. University of Trento, Italy, 2010 - [c15]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita:
Formal Specification and Analysis of an E-voting System. ARES 2010: 164-171 - [c14]Biniyam Asfaw, Dawit Bekele, Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
Host-based anomaly detection for pervasive medical systems. CRiSIS 2010: 1-8 - [c13]Komminist Weldemariam, Adolfo Villafiorita:
A Survey: Electronic Voting Development and Trends. Electronic Voting 2010: 119-131 - [c12]Birhanu Eshete, Andrea Mattioli, Adolfo Villafiorita, Komminist Weldemariam:
ICT for Good: Opportunities, Challenges and the Way Forward. ICDS 2010: 14-19 - [c11]Dawit Bekele, Birhanu Eshete, Adolfo Villafiorita, Komminist Weldemariam:
Context Information Refinement for Pervasive Medical Systems. ICDS 2010: 210-215 - [c10]Adolfo Villafiorita, Komminist Weldemariam, Angelo Susi, Alberto Siena:
Modeling and Analysis of Laws Using BPR and Goal-Oriented Framework. ICDS 2010: 353-358
2000 – 2009
- 2009
- [j1]Adolfo Villafiorita, Komminist Weldemariam, Roberto Tiella:
Development, formal verification, and evaluation of an E-voting system with VVPAT. IEEE Trans. Inf. Forensics Secur. 4(4): 651-661 (2009) - [c9]Aaron Ciaghi, Adolfo Villafiorita, Komminist Weldemariam, Andrea Mattioli, Quoc-Sang Phan:
Supporting Public Administration with an Integrated BPR Environment. AFRICOM 2009: 50-59 - [c8]Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita:
Formal analysis of attacks for e-voting system. CRiSIS 2009: 26-34 - [c7]Komminist Weldemariam, Adolfo Villafiorita, Andrea Mattioli:
Experiments and data analysis of electronic voting system. CRiSIS 2009: 105-112 - [c6]Komminist Weldemariam:
Navigational Web-Interfaces from Formal Tropos Specification. ESAW 2009: 233-235 - [c5]Komminist Weldemariam, Andrea Mattioli, Adolfo Villafiorita:
Managing Requirements for E-Voting Systems: Issues and Approaches. REVOTE 2009: 29-37 - 2008
- [c4]Komminist Weldemariam, Adolfo Villafiorita:
Formal procedural security modeling and analysis. CRiSIS 2008: 249-254 - [c3]Komminist Weldemariam, Adolfo Villafiorita:
A Methodology for Assessing Procedural Security: A Case Study in E-Voting. Electronic Voting 2008: 83-94 - [c2]Komminist Weldemariam, Adolfo Villafiorita:
Modeling and Analysis of Procedural Security in (e)Voting: The Trentino's Approach and Experiences. EVT 2008 - 2007
- [c1]Komminist Weldemariam, Adolfo Villafiorita, Andrea Mattioli:
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach. VOTE-ID 2007: 38-49
Coauthor Index
aka: Girmaw Abebe Tadesse
aka: Nelson Kibichii Bore
aka: Aisha Walcott
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-11 18:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint