Follow
Nabil Adam
Title
Cited by
Cited by
Year
Security-control methods for statistical databases: a comparative study
NR Adam, JC Worthmann
ACM Computing Surveys (CSUR) 21 (4), 515-556, 1989
14091989
Modeling and analysis of workflows using Petri nets
NR Adam, V Atluri, WK Huang
Journal of Intelligent Information Systems 10, 131-158, 1998
5361998
Electronic commerce: technical, business, and legal issues
NR Adam, O Dogramaci, A Gangopadhyay, Y Yesha
Prentice-Hall, Inc., 1998
2621998
Semantics-based automated service discovery
AV Paliwal, B Shafiq, J Vaidya, H Xiong, N Adam
IEEE Transactions on Services Computing 5 (2), 260-275, 2011
2112011
The dynamic lot-sizing problem for multiple items under limited capacity
A Dogramaci, JC Panayiotopoulos, NR Adam
AIIE transactions 13 (4), 294-303, 1981
1921981
A content-based authorization model for digital libraries
NR Adam, V Atluri, E Bertino, E Ferrari
IEEE Transactions on knowledge and data engineering 14 (2), 296-315, 2002
1872002
Proceedings of the Workshop at NIST on Electronic Commerce, Current Research Issues and Applications
NR Adam, Y Yesha
Springer-Verlag, 1994
134*1994
Spatial computing and social media in the context of disaster management
NR Adam, B Shafiq, R Staffin
IEEE Intelligent Systems 27 (6), 90-96, 2012
1312012
Database issues in geographic information systems
NR Adam, A Gangopadhyay
Springer Science & Business Media, 1997
1181997
Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets
NR Adam, VP Janeja, V Atluri
Proceedings of the 2004 ACM symposium on Applied computing, 576-583, 2004
1092004
Globalizing business, education, culture through the Internet
N Adam, B Awerbuch, J Slonim, P Wegner, Y Yesha
Communications of the ACM 40 (2), 115-121, 1997
991997
Strategic directions in electronic commerce and digital libraries: Towards a digital agora
N Adam, Y Yesha
ACM Computing Surveys (CSUR) 28 (4), 818-835, 1996
941996
Migrating to optimal RBAC with minimal perturbation
J Vaidya, V Atluri, Q Guo, N Adam
Proceedings of the 13th ACM symposium on Access control models and …, 2008
912008
A clickstream-based collaborative filtering personalization model: towards a better performance
DH Kim, V Atluri, M Bieber, N Adam, Y Yesha
Proceedings of the 6th annual ACM international workshop on Web information …, 2004
852004
Preserving mobile customer privacy: an access control system for moving objects and customer profiles
M Youssef, V Atluri, NR Adam
Proceedings of the 6th international conference on Mobile data management, 67-76, 2005
732005
Domain knowledge-based automatic workflow generation
SA Chun, V Atluri, NR Adam
International Conference on Database and Expert Systems Applications, 81-93, 2002
722002
SI in digital libraries
NR Adam, VL Atluri, I Adiwijaya
Communications of the ACM 43 (6), 64-72, 2000
712000
Priority assignment procedures in multi-level assembly job shops
NR Adam, JWM Bertrand, J Surkis
IIE transactions 19 (3), 317-328, 1987
691987
Web service discovery: Adding semantics through service request expansion and latent semantic indexing
AV Paliwal, NR Adam, C Bornhovd
IEEE international conference on services computing (SCC 2007), 106-113, 2007
662007
Effective anonymization of query logs
Y Hong, X He, J Vaidya, N Adam, V Atluri
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
622009
The system can't perform the operation now. Try again later.
Articles 1–20