default search action
Gregory Vert
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2003
- [j3]Gregory Vert, Ashley Morris, Molly Stock:
Converting a Fuzzy Data Model to an Object-Oriented Design for Managing GIS Data Files. IEEE Trans. Knowl. Data Eng. 15(2): 510-511 (2003) - 2002
- [j2]Gregory Vert, Molly Stock, Ashley Morris:
Extending ERD modeling notation to fuzzy management of GIS data files. Data Knowl. Eng. 40(2): 163-179 (2002) - [j1]Gregory Vert, Molly Stock, Piotr Jankowski, Paul E. Gessler:
An Architecture for the Management of GIS Data Files. Trans. GIS 6(3): 259-275 (2002)
Conference and Workshop Papers
- 2010
- [c24]Gregory Vert, Anitha Chennamaneni, S. Sitharama Iyengar:
Potential Application of Contextual Information Processing To Data Mining. IKE 2010: 317-325 - [c23]Ray Mahlke, Gregory Vert, Anitha Chennamaneni:
Applying Contextual Processing to Traffic Signal Control Systems. IKE 2010: 326-329 - [c22]Jean Gourd, Gregory Vert:
Hyper Distribution of Contextual Information: Solving the Unknown Producer-Unknown Consumer (UP-UC) Problem. IKE 2010: 336-342 - 2009
- [c21]Gregory Vert, S. S. Iyengar, Vir V. Phoha:
Security models for contextual based global processing an architecture and overview. CSIIRW 2009: 53 - [c20]Gregory Vert, S. Sitharama Iyengar, Vir V. Phoha:
Defining A New Type of Global Information Architecture for Contextual Information Processing. IKE 2009: 214-219 - 2007
- [c19]Gregory Vert, Radhika Radhakrishnan:
A Logical Data Model for Genome Data. BIOCOMP 2007: 510-514 - [c18]Sara Nasser, Gregory Vert, Monica N. Nicolescu, Alison Murray:
Multiple Sequence Alignment using Fuzzy Logic. CIBCB 2007: 304-311 - [c17]Gregory Vert, Phanid Dogiparthi:
A Generic Metric for Evaluation of Database Security. Security and Management 2007: 298-305 - 2006
- [c16]Satish Baddelpeli, Gregory Vert:
Adaptive Security Metrics for Computer Systems. Security and Management 2006: 351-356 - [c15]Rajasekhar Yakkali, Gregory Vert:
Architectural Framework Design for Authentication Mechanism in Mobile Adhoc Networks (MANETs). Security and Management 2006: 357-363 - [c14]Gregory Vert, Manaf Alfize:
An Enhanced Pretty Good Privacy (EPGP) System with Mutual Non-Repudiation. Security and Management 2006: 364-370 - [c13]Sara Nasser, Sergiu Dascalu, Gregory Vert:
User Interface Design of the Interactive Fingerprint Recognition (INFIR) System. Security and Management 2006: 371-377 - [c12]Arthur Reloj, Gregory Vert:
Optical Wireless: Chromatic Encoded Visual Data Transfer. Security and Management 2006: 378-383 - [c11]Gregory Vert, Nic Herndon:
Secure Simultaneous Search of Distributed, Heterogeneous Bioinformatics Databases. Security and Management 2006: 384-389 - [c10]Gregory Vert, Sergiu M. Dascalu, Frederick C. Harris Jr., Sermsak Buntha:
A Visual Environment for Characterization of State Changes in Computer Systems. Security and Management 2006: 435-440 - [c9]Gregory Vert, Rajasekhar Yakkali:
Towards A Collaborative Model Of An Automated Adaptive Content Delivery Training Utilizing Fuzzy Logic. CTS 2006: 165-171 - [c8]Sara Nasser, Rawan Alkhaldi, Gregory Vert:
A Modified Fuzzy K-means Clustering using Expectation Maximization. FUZZ-IEEE 2006: 231-235 - [c7]Gregory Vert, René Doursat, Sara Nasser:
Towards Utilizing Fuzzy Self-Organizing Taxonomies to Identify Attacks on Computer Systems and Adaptively Respond. FUZZ-IEEE 2006: 2216-2222 - 2005
- [c6]Gregory Vert, Rawan Alkhaldi, Sara Nasser:
An Architectural Model for Low Overhead Spatial Data Authentication and Distribution in a Peer To Peer Based Spatial Database Model. CATA 2005: 423-428 - [c5]Gregory Vert, Jill Heaton, Ashley Morris:
A Fuzzy Method to Reconcile Spatial Object Discrepancies In A New Peer To Peer Based Database System. PDPTA 2005: 1222-1229 - 2003
- [c4]Gregory Vert, James Arseneau, Sara Nasser:
Fuzzy Rules for Finger Print Verification using Ridge Extraction. CAINE 2003: 113-116 - [c3]Gregory Vert, B. Yuan, N. Cole:
A Visual Algebra for Detecting Port Attacks on Computer Systems. CAINE 2003: 131-135 - [c2]Gregory Vert, Aparna Phadnis, Rajasekhar Yakkali, Xin Yu:
Towards an Automated Adaptive Content Delivery Training System. CAINE 2003: 339 - [c1]Gregory Vert, Sergiu M. Dascalu:
Towards A White Box Testing Methodology for Safe Software Development. IASSE 2003: 233-237
Parts in Books or Collections
- 2018
- [p3]Gregory Vert, Ann Leslie Claesson-Vert, Jesse Roberts, Erica Bott:
A Technology for Detection of Advanced Persistent Threat in Networks and Systems Using a Finite Angular State Velocity Machine and Vector Mathematics. Computer and Network Security Essentials 2018: 41-64 - 2010
- [p2]Gregory Vert, S. Sitharama Iyengar:
Integration of Fuzzy ERD Modeling to the Management of Global Contextual Data. Uncertainty Approaches for Spatial Data Modeling and Processing 2010: 155-173 - 2009
- [p1]Sara Nasser, Adrienne Breland, Frederick C. Harris Jr., Monica N. Nicolescu, Gregory Vert:
Fuzzy Genome Sequence Assembly for Single and Environmental Genomes. Fuzzy Systems in Bioinformatics and Computational Biology 2009: 19-44
Editorship
- 2010
- [e1]Hamid R. Arabnia, Ray R. Hashemi, Gregory Vert, Anitha Chennamaneni, Ashu M. G. Solo:
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, IKE 2010, July 12-15, 2010, Las Vegas Nevada, USA. CSREA Press 2010, ISBN 1-60132-151-1 [contents]
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 22:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint