default search action
Ken Barker 0001
Person information
- affiliation: University of Calgary, Alberta, Canada
- affiliation (former): University of Manitoba, Winnipeg, Canada
Other persons with the same name
- Ken Barker 0002 — IBM (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i6]Maryam Majedi, Ken Barker:
The Privacy Policy Permission Model: A Unified View of Privacy Policies. CoRR abs/2403.17414 (2024) - 2023
- [c116]Michael Mireku Kwakye, Ken Barker:
Blockchain-Based Privacy-Preservation Platform for Data Storage and Query Processing. UbiSec 2023: 380-400 - 2021
- [j28]Maryam Majedi, Ken Barker:
The Privacy Policy Permission Model: A Unified View of Privacy Policies. Trans. Data Priv. 14(1): 1-36 (2021) - [c115]Khosro Salmani, Ken Barker:
Don't fool yourself with Forward Privacy, Your queries STILL belong to us! CODASPY 2021: 131-142 - [e2]Ken Barker, Kambiz Ghazinour:
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings. Lecture Notes in Computer Science 12840, Springer 2021, ISBN 978-3-030-81241-6 [contents] - 2020
- [j27]Khobaib Zaamout, Tom Arjannikov, Ken Barker:
A Social Crowdsourcing Community Case Study: Interaction Patterns, Evolution, and Factors That Affect Them. IEEE Trans. Comput. Soc. Syst. 7(3): 659-671 (2020) - [j26]Khobaib Zaamout, Tom Arjannikov, Ken Barker:
Corrections to "A Social Crowdsourcing Community Case Study: Interaction Patterns, Evolution, and Factors That Affect Them". IEEE Trans. Comput. Soc. Syst. 7(5): 1317 (2020) - [c114]Emmanuel Onu, Michael Mireku Kwakye, Ken Barker:
Contextual Privacy Policy Modeling in IoT. DASC/PiCom/CBDCom/CyberSciTech 2020: 94-102
2010 – 2019
- 2018
- [j25]Khobaib Zaamout, Ken Barker:
Structure of Crowdsourcing Community Networks. IEEE Trans. Comput. Soc. Syst. 5(1): 144-155 (2018) - [c113]Zahra Shakeri Hossein Abad, Oliver Karras, Kurt Schneider, Ken Barker, Mike Bauer:
Task Interruption in Software Development Projects: What Makes some Interruptions More Disruptive than Others? EASE 2018: 122-132 - [c112]Zahra Shakeri Hossein Abad, Mohammad Noaeen, Didar Zowghi, Behrouz H. Far, Ken Barker:
Two Sides of the Same Coin: Software Developers' Perceptions of Task Switching and Task Interruption. EASE 2018: 175-180 - [c111]Khobaib Zaamout, Ken Barker:
Towards Quantifying Behaviour in Social Crowdsourcing Communities. HCOMP 2018: 203-212 - [c110]Zahra Shakeri Hossein Abad, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
ELICA: An Automated Tool for Dynamic Extraction of Requirements Relevant Information. AIRE@RE 2018: 8-14 - [c109]Zahra Shakeri Hossein Abad, Munib Rahman, Abdullah Cheema, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
Dynamic Visual Analytics for Elicitation Meetings with ELICA. RE 2018: 492-493 - [i5]Zahra Shakeri Hossein Abad, Mohammad Noaeen, Didar Zowghi, Behrouz H. Far, Ken Barker:
Two Sides of the Same Coin: Software Developers' Perceptions of Task Switching and Task Interruption. CoRR abs/1805.05504 (2018) - [i4]Zahra Shakeri Hossein Abad, Oliver Karras, Kurt Schneider, Ken Barker, Mike Bauer:
Task Interruption in Software Development Projects: What Makes some Interruptions More Disruptive than Others? CoRR abs/1805.05508 (2018) - [i3]Zahra Shakeri Hossein Abad, Munib Rahman, Abdullah Cheema, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
Dynamic Visual Analytics for Elicitation Meetings with ELICA. CoRR abs/1807.06076 (2018) - [i2]Zahra Shakeri Hossein Abad, Vincenzo Gervasi, Didar Zowghi, Ken Barker:
ELICA: An Automated Tool for Dynamic Extraction of Requirements Relevant Information. CoRR abs/1808.05857 (2018) - 2017
- [c108]Md. Moniruzzaman, Ken Barker:
Inferring Time when People Visit a Location Using Social Network Data. ICMLA 2017: 838-841 - 2016
- [j24]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Managing dimensionality in data privacy anonymization. Knowl. Inf. Syst. 49(1): 341-373 (2016) - [c107]Michael Mireku Kwakye, Ken Barker:
Privacy-preservation in the integration and querying of multidimensional data models. PST 2016: 255-263 - 2015
- [c106]Ken Barker:
Privacy Protection or Data Value: Can We Have Both? BDA 2015: 3-20 - [c105]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Big Graph Privacy. EDBT/ICDT Workshops 2015: 255-262 - [c104]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Privacy-preserving big data publishing. SSDBM 2015: 26:1-26:11 - 2014
- [j23]Mohammad Jafari, Reihaneh Safavi-Naini, Philip W. L. Fong, Ken Barker:
A Framework for Expressing and Enforcing Purpose-Based Privacy Policies. ACM Trans. Inf. Syst. Secur. 17(1): 3:1-3:31 (2014) - [c103]Kambiz Ghazinour, Amir Hossein Razavi, Ken Barker:
A Model for Privacy Compromisation Value. EUSPN/ICTH 2014: 143-152 - [c102]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy. SDM 2014: 731-739 - [i1]Hessam Zakerzadeh, Charu C. Aggarwal, Ken Barker:
Towards Breaking the Curse of Dimensionality for High-Dimensional Privacy: An Extended Version. CoRR abs/1401.1174 (2014) - 2013
- [c101]Kambiz Ghazinour, Ken Barker:
A privacy preserving model bridging data provider and collector preferences. EDBT/ICDT Workshops 2013: 174-178 - [c100]Dina Said, Jeroen Stil, Russ Taylor, Ken Barker:
Automatic Identification of Hexagonal Pattern Artifacts in Radio Astronomical Surveys. ICDM Workshops 2013: 40-47 - [c99]Md. Moniruzzaman, Ken Barker:
Redeem with privacy (RWP): privacy protecting framework for geo-social commerce. WPES 2013: 189-200 - 2012
- [j22]Amir H. Chinaei, Rosa Karimi Adl, Chenen Liang, Ken Barker:
Decentralised privacy preservation in social networks. Int. J. Bus. Inf. Syst. 9(4): 402-414 (2012) - [c98]Mina Askari, Reihaneh Safavi-Naini, Ken Barker:
An information theoretic privacy and utility measure for data sanitization mechanisms. CODASPY 2012: 283-294 - [c97]Rosa Karimi Adl, Mina Askari, Ken Barker, Reihaneh Safavi-Naini:
Privacy Consensus in Anonymization Systems via Game Theory. DBSec 2012: 74-89 - 2011
- [j21]Faith-Michael E. Uzoka, Okure Udo Obot, Ken Barker, Joseph Osuji:
An experimental comparison of fuzzy logic and analytic hierarchy process for medical decision support systems. Comput. Methods Programs Biomed. 103(1): 10-27 (2011) - [c96]George Shi, Ken Barker:
Extraction of geospatial information on the Web for GIS applications. IEEE ICCI*CC 2011: 41-48 - [c95]Mohammad Jafari, Philip W. L. Fong, Reihaneh Safavi-Naini, Ken Barker, Nicholas Paul Sheppard:
Towards defining semantic foundations for purpose-based privacy policies. CODASPY 2011: 213-224 - [c94]Kambiz Ghazinour, Ken Barker:
Capturing P3P semantics using an enforceable lattice-based structure. PAIS 2011: 4 - [c93]George Shi, Ken Barker:
Thematic data extraction from Web for GIS and applications. ICSDM 2011: 273-278 - [c92]Md. Moniruzzaman, Ken Barker:
Delegation of access rights in a privacy preserving access control model. PST 2011: 124-133 - [c91]Dina Said, Lisa Stirling, Peter Federolf, Ken Barker:
Data preprocessing for distance-based unsupervised Intrusion Detection. PST 2011: 181-188 - [c90]Mishtu Banerjee, Rosa Karimi Adl, Leanne Wu, Ken Barker:
Quantifying Privacy Violations. Secure Data Management 2011: 1-17 - 2010
- [j20]Faith-Michael E. Uzoka, Ken Barker:
Expert systems and uncertainty in medical diagnosis: a proposal for fuzzy-ANP hybridisation. Int. J. Medical Eng. Informatics 2(4): 329-342 (2010) - [c89]Ken Barker:
"Valuing" Privacy While Exposing Data Utility. BNCOD 2010: 1-2 - [c88]Paul M. K. Gordon, Ken Barker, Christoph W. Sensen:
Helping Biologists Effectively Build Workflows, without Programming. DILS 2010: 74-89 - [c87]Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Barker:
Analysis of social networking privacy policies. EDBT/ICDT Workshops 2010 - [c86]Paul M. K. Gordon, Ken Barker, Christoph W. Sensen:
Programming-by-Example Meets the Semantic Web: Using Ontologies and Web Services to Close the Semantic Gap. VL/HCC 2010: 133-140 - [p3]Kambiz Ghazinour, Sampson Pun, Maryam Majedi, Amir H. Chinaei, Ken Barker:
Extending SQL to Support Privacy Policies. From Sociology to Computing in Social Networks 2010: 377-393 - [p2]Keivan Kianmehr, Jamal Jida, Allan Chan, Nancy Situ, Kim Wong, Reda Alhajj, Jon G. Rokne, Ken Barker:
Attractive Interface for XML: Convincing Naive Users to Go Online. Soft Computing in XML Data Management 2010: 165-191
2000 – 2009
- 2009
- [j19]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Performance evaluation of different replica placement algorithms. Int. J. Grid Util. Comput. 1(2): 121-133 (2009) - [c85]Sampson Pun, Amir H. Chinaei, Ken Barker:
Twins (1): Extending SQL to Support Corporation Privacy Policies in Social Networks. ASONAM 2009: 306-311 - [c84]Maryam Majedi, Kambiz Ghazinour, Amir H. Chinaei, Ken Barker:
SQL Privacy Model for Social Networks. ASONAM 2009: 369-370 - [c83]Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, Adepele Williams:
A Data Privacy Taxonomy. BNCOD 2009: 42-54 - [c82]Adesola Omotayo, Ken Barker, Moustafa A. Hammad, Lisa Higham, Jalal Kawash:
Answering Multiple-Item Queries in Data Broadcast Systems. BNCOD 2009: 120-132 - [c81]Kambiz Ghazinour, Maryam Majedi, Ken Barker:
A Model for Privacy Policy Visualization. COMPSAC (2) 2009: 335-340 - [c80]Kambiz Ghazinour, Maryam Majedi, Ken Barker:
A Lattice-Based Privacy Aware Access Control Model. CSE (3) 2009: 154-159 - [c79]Sampson Pun, Ken Barker:
Privacy FP-Tree. DASFAA Workshops 2009: 246-260 - [c78]Keivan Kianmehr, X. Peng, Chris Luce, Justin Chung, Nam Pham, Walter Chung, Reda Alhajj, Jon G. Rokne, Ken Barker:
Mining online shopping patterns and communities. iiWAS 2009: 400-404 - [c77]Keivan Kianmehr, Shang Gao, Jawad Attari, M. Mushfiqur Rahman, Kofi Akomeah, Reda Alhajj, Jon G. Rokne, Ken Barker:
Text summarization techniques: SVM versus neural networks. iiWAS 2009: 487-491 - 2008
- [j18]Adepele Williams, Ken Barker:
Controlling Inference: Avoiding P-level Reduction During Analysis. J. Res. Pract. Inf. Technol. 40(3): 163-186 (2008) - [j17]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement Strategies in Data Grid. J. Grid Comput. 6(1): 103-123 (2008) - [j16]Rashedur M. Rahman, Reda Alhajj, Ken Barker:
Replica selection strategies in data grid. J. Parallel Distributed Comput. 68(12): 1561-1574 (2008) - [c76]Angela Cristina Duta, Ken Barker:
P4A: A New Privacy Model for XML. DBSec 2008: 65-80 - [c75]Nelson C. N. Chu, Quang Trinh, Ken Barker, Reda Alhajj:
A Dynamic Ontology Mapping Architecture for a Grid Database System. SKG 2008: 343-346 - [c74]Nelson C. N. Chu, Ken Barker:
Grid Scheduling Hub. SKG 2008: 511-512 - [p1]Muhaimenul, Reda Alhajj, Ken Barker:
Alternative Method for Incrementally Constructing the FP-Tree. Intelligent Techniques and Tools for Novel System Architectures 2008: 361-377 - 2007
- [j15]Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection by integrating boosting genetic fuzzy classifier and data mining criteria for rule pre-screening. J. Netw. Comput. Appl. 30(1): 99-113 (2007) - [c73]Adepele Williams, Ken Barker:
Controlling Inference: Avoiding P-level Reduction during Analysis. ACSW 2007: 193-200 - [c72]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
A Predictive Technique for Replica Selection in Grid Environment. CCGRID 2007: 163-170 - [c71]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Study of Different Replica Placement and Maintenance Strategies in Data Grid. CCGRID 2007: 171-178 - [c70]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Performance Analysis of a Replica Selection Strategy in Grid Environment Tuned with Replica Placement Decisions. GCA 2007: 159-165 - [c69]Adesola Omotayo, Moustafa A. Hammad, Ken Barker:
A Cost Model for Storing and Retrieving Data in Wireless Sensor Networks. ICDE Workshops 2007: 29-38 - [c68]Angela Cristina Duta, Ken Barker, Reda Alhajj:
XML schema structural equivalence. ICEIS (1) 2007: 52-59 - [c67]Wendy Osborn, Ken Barker:
An insertion strategy for a two-dimensional spatial access method. ICEIS (1) 2007: 295-300 - [c66]Quang Trinh, Ken Barker, Reda Alhajj:
Semantic Interoperability Between Relational Database Systems. IDEAS 2007: 208-215 - [e1]Bipin C. Desai, Ken Barker:
Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), September 6-8, 2007, Banff, Alberta, Canada. IEEE Computer Society 2007, ISBN 0-7695-2947-X [contents] - 2006
- [j14]Emin Erkan Korkmaz, Jun Du, Reda Alhajj, Ken Barker:
Combining advantages of new chromosome representation scheme and multi-objective genetic algorithms for better clustering. Intell. Data Anal. 10(2): 163-182 (2006) - [j13]Malik Agyemang, Ken Barker, Reda Alhajj:
A comprehensive survey of numeric and symbolic outlier mining techniques. Intell. Data Anal. 10(6): 521-538 (2006) - [j12]Jun Du, Reda Alhajj, Ken Barker:
Genetic algorithms based approach to database vertical partition. J. Intell. Inf. Syst. 26(2): 167-183 (2006) - [j11]Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
VIREX: visual relational to XML conversion tool. J. Vis. Lang. Comput. 17(1): 25-45 (2006) - [j10]Sergio Camorlinga, Ken Barker:
A complex adaptive system based on squirrels behaviors for distributed resource allocation. Web Intell. Agent Syst. 4(1): 1-23 (2006) - [c65]Angela Cristina Duta, Ken Barker, Reda Alhajj:
RA: An XML Schema Reduction Algorithm. ADBIS Research Communications 2006 - [c64]Quang Trinh, Ken Barker, Reda Alhajj:
RDB2ONT: A Tool for Generating OWL Ontologies From Relational Database Systems. AICT/ICIW 2006: 170 - [c63]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement Design with Static Optimality and Dynamic Maintainability. CCGRID 2006: 434-437 - [c62]Janaki Gopalan, Reda Alhajj, Ken Barker:
Discovering Accurate and Interesting Classification Rules Using Genetic Algorithm. DMIN 2006: 389-395 - [c61]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Effective Dynamic Replica Maintenance Algorithm for the Grid Environment. GPC 2006: 336-345 - [c60]Tansel Özyer, Reda Alhajj, Ken Barker:
Clustering by Integrating Multi-objective Optimization with Weighted K-Means and Validity Analysis. IDEAL 2006: 454-463 - [c59]Muhaimenul Adnan, Reda Alhajj, Ken Barker:
Constructing Complete FP-Tree for Incremental Mining of Frequent Patterns in Dynamic Databases. IEA/AIE 2006: 363-372 - [c58]Wendy Osborn, Ken Barker:
Searching through spatial relationships using the 2DR-tree. IMSA 2006: 71-76 - [c57]Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Effective Clustering of High-Dimensional Data. ICDM (Posters) 2006: 91-100 - [c56]Adesola Omotayo, Moustafa A. Hammad, Ken Barker:
Update-Aware Scheduling Algorithms for Hierarchical Data Dissemination Systems. MDM 2006: 18 - [c55]Adesola Omotayo, Moustafa A. Hammad, Ken Barker:
Efficient Data Harvesting for Tracing Phenomena in Sensor Networks. SSDBM 2006: 59-70 - [c54]Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
VIREX: Interactive Approach for Database Querying and Integration by Re-engineering Relational Data into XML. Web Intelligence 2006: 1079-1080 - 2005
- [j9]Osman Abul, Reda Alhajj, Faruk Polat, Ken Barker:
Finding differentially expressed genes for pattern generation. Bioinform. 21(4): 445-450 (2005) - [j8]Malik Agyemang, Ken Barker, Reda Alhajj:
Web outlier mining: Discovering outliers from web datasets. Intell. Data Anal. 9(5): 473-486 (2005) - [j7]Yimin Liu, Tansel Özyer, Reda Alhajj, Ken Barker:
Integrating Multi-Objective Genetic Algorithm and Validity Analysis for Locating and Ranking Alternative Clustering. Informatica (Slovenia) 29(1): 33-40 (2005) - [c53]George Shi, Ken Barker, Reda Alhajj:
Cognitive information fusion of georeferenced data for tactical applications. IEEE ICCI 2005: 160-166 - [c52]Sergio Camorlinga, Ken Barker:
The Biologically Inspired Distributed File System: An Emergent Thinker Instantiation. Self-star Properties in Complex Information Systems 2005: 81-96 - [c51]Malik Agyemang, Ken Barker, Reda Alhajj:
Hybrid Approach to Web Content Outlier Mining Without Query Vector. DaWaK 2005: 285-294 - [c50]Tansel Özyer, Reda Alhajj, Ken Barker:
Intrusion detection: a novel approach that combines boosting genetic fuzzy classifier and data mining techniques. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 13-22 - [c49]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement in Data Grid: A Multi-objective Approach. GCC 2005: 645-656 - [c48]Chunyan Wang, Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
Novel Approach for Reengineering Relational Databases into XML. ICDE Workshops 2005: 1284 - [c47]Janaki Gopalan, Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Effective data mining by integrating genetic algorithm into the data preprocessing phase. ICMLA 2005 - [c46]Malik Agyemang, Ken Barker, Reda Alhajj:
WCOND-Mine: Algorithm for Detecting Web Content Outliers from Web Documents. ISCC 2005: 885-890 - [c45]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica Placement in Data Grid: Considering Utility and Risk. ITCC (1) 2005: 354-359 - [c44]Jun Du, Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Alternative Clustering by Utilizing Multi-objective Genetic Algorithm with Linked-List Based Chromosome Encoding. MLDM 2005: 346-355 - [c43]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
Maintaining Knowledge-Bases of Navigational Patterns from Streams of Navigational Sequences. RIDE 2005: 37-44 - [c42]Malik Agyemang, Ken Barker, Reda Alhajj:
Mining web content outliers using structure oriented weighting techniques and N-grams. SAC 2005: 482-487 - [c41]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Replica selection in grid environment: a data-mining approach. SAC 2005: 695-700 - [c40]John Aycock, Ken Barker:
Viruses 101. SIGCSE 2005: 152-156 - 2004
- [j6]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
A framework for representing navigational patterns as full temporal objects. SIGecom Exch. 5(2): 23-33 (2004) - [c39]Tansel Özyer, Yimin Liu, Reda Alhajj, Ken Barker:
Multi-objective Genetic Algorithm Based Clustering Approach and Its Application to Gene Expression Data. ADVIS 2004: 451-461 - [c38]Jun Du, Emin Erkan Korkmaz, Reda Alhajj, Ken Barker:
Novel Clustering That Employs Genetic Algorithm with New Representation Scheme and Multiple Objectives. DaWaK 2004: 219-228 - [c37]Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
Flexible User Interface for Converting Relational Data into XML. FQAS 2004: 418-431 - [c36]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
An Efficient Framework for Iterative Time-Series Trend Mining. ICEIS (2) 2004: 130-137 - [c35]Angela Cristina Duta, Ken Barker, Reda Alhajj:
Conv2XML: Relational Schema Conversion to XML Nested-Based Schema. ICEIS (1) 2004: 210-215 - [c34]Chunyan Wang, Anthony Chiu Wa Lo, Reda Alhajj, Ken Barker:
Converting Legacy Relational Database into XML Database through Reverse Engineering. ICEIS (1) 2004: 216-221 - [c33]Tansel Özyer, Reda Alhajj, Ken Barker:
Multi-dimensional sequential web mining by utilizing fuzzy interferencing. ICMLA 2004: 34-40 - [c32]Yuliang Bao, Reda Alhajj, Ken Barker:
Hybrid Cache Invalidation Schemes in Mobile Environments. ICPS 2004: 209-218 - [c31]Rashedur M. Rahman, Ken Barker, Reda Alhajj:
Predicting the Performance of GridFTP Transfers. IPDPS 2004 - [c30]Nelson C. N. Chu, Adepele Williams, Reda Alhajj, Ken Barker:
Data Stream Mining Architecture for Network Intrusion Detection. IRI 2004: 363-368 - [c29]Ajumobi Udechukwu, Ken Barker, Reda Alhajj:
Mining User Navigational Patterns in Dynamically Changing Environments. ITCC (2) 2004: 372- - [c28]Tansel Özyer, Reda Alhajj, Ken Barker:
Utilizing Rough Sets and Multi-objective Genetic Algorithms for Automated Clustering. Rough Sets and Current Trends in Computing 2004: 567-572 - [c27]Osman Abul, Reda Alhajj, Faruk Polat, Ken Barker:
Finding differentially expressed genes: pattern generation using Q-values. SAC 2004: 138-142 - [c26]Malik Agyemang, Ken Barker, Reda Alhajj:
Framework for mining web content outliers. SAC 2004: 590-594 - [c25]Mohammad A. Hassan, Reda Alhajj, Mick J. Ridley, Ken Barker:
Simplified access to structured databases by adapting keyword search and database selection. SAC 2004: 674-678 - [c24]Angela Cristina Duta, Ken Barker, Reda Alhajj:
ConvRel: relationship conversion to XML nested structures. SAC 2004: 698-702 - 2003
- [c23]Tansel Özyer, Reda Alhajj, Ken Barker:
A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Techniques for Rule Pre-screening. HIS 2003: 983-992 - [c22]Jun Du, Ken Barker, Reda Alhajj:
Attraction - A Global Affinity Measure for Database Vertical Partitioning. ICWI 2003: 538-548 - [c21]Mohammad A. Hassan, Reda Alhajj, Mick J. Ridley, Ken Barker:
Database Selection and Keyword Search of Structured Databases: Powerful Search for Naive Users. IRI 2003: 175-182 - [c20]Osman Abul, Anthony Chiu Wa Lo, Reda Alhajj, Faruk Polat, Ken Barker:
Cluster validity analysis using subsampling. SMC 2003: 1435-1440 - 2002
- [c19]Ramon Lawrence, Ken Barker:
Using Unity to Semi-Automatically Integrate Relational Schema. ICDE 2002: 329-330 - [c18]Angela Cristina Duta, M. Sheelagh T. Carpendale, Ken Barker:
VICO: A Tool for Supporting Visual Comparisons of Different Pine-Beetle Management Approaches. IV 2002: 234- - 2001
- [j5]Ken Barker, Subhrajyoti Bhar:
A Graphical Approach to Allocating Class Fragments in Distributed Objectbase Systems. Distributed Parallel Databases 10(3): 207-239 (2001) - [c17]Ramon Lawrence, Ken Barker:
Querying Relational Databases without Explicit Joins. ER (Workshops) 2001: 278-291 - [c16]Ramon Lawrence, Ken Barker:
Integrating relational database schemas using a standardized dictionary. SAC 2001: 225-230 - 2000
- [j4]Sylvanus A. Ehikioya, Ken Barker:
A formal perspective to specification of transaction systems. South Afr. Comput. J. 26: 34-44 (2000) - [c15]Randal J. Peters, Ken Barker:
Change Propagation in an Axiomatic Model of Schema Evolution for Objectbase Management Systems. FMLDO 2000: 142-162
1990 – 1999
- 1999
- [c14]Amin Y. Noaman, Ken Barker:
A Horizontal Fragmentation Algorithm for the Fact Relation in a Distributed Data Warehouse. CIKM 1999: 154-161 - [c13]Ahmad R. Hadaegh, Ken Barker:
Partial Re-execution: Reconciling Transactions to Increase Concurrency in Object-bases. PDPTA 1999: 1469-1475 - 1998
- [j3]Christie I. Ezeife, Ken Barker:
Distributed Object Based Design: Vertical Fragmentation of Classes. Distributed Parallel Databases 6(4): 317-350 (1998) - [c12]Coimbatore Rajagopal Saravanan, Randal J. Peters, Ken Barker:
WWW in DSM: Collaborative Caching on the Web. IDEAS 1998: 46-47 - 1997
- [c11]Sylvanus A. Ehikioya, Ken Barker:
CSP with Record Data Type for Supporting Transaction Systems Specification. ADBIS 1997: 64-71 - [c10]Sylvanus A. Ehikioya, Ken Barker:
A Formal Specification Strategy for Electronic Commerce. IDEAS 1997: 201-210 - 1996
- [c9]Ahmad R. Hadaegh, Ken Barker:
Value-serializability and an Architecture for Managing Transactions in Multiversion Objectbase Systems. ADBIS 1996: 126-133 - 1995
- [j2]Christie I. Ezeife, Ken Barker:
A Comprehensive Approach to Horizontal Class Fragmentation in a Distributed Object Based System. Distributed Parallel Databases 3(3): 247-272 (1995) - [c8]Subhrajyoti Bhar, Ken Barker:
Static Allocation in Distributed Objectbase Systems: A Graphical Approach. CISMOD 1995: 92-114 - 1994
- [j1]Ken Barker:
Quantification of autonomy on multidatabase systems. J. Syst. Integr. 4(2): 151-169 (1994) - [c7]Peter C. J. Graham, Ken Barker:
Effective Optimistic Concurrency Control in Multiversion Object Bases. ISOOMS 1994: 313-328 - 1993
- [c6]Michael Zapp, Ken Barker:
The Serializability of Transactions in Object Bases. ICCI 1993: 428-432 - 1992
- [c5]Ken Barker:
A Logical Model and Schema Integration Architecture for Determining Equivalence in ER-Diagrams. ICCI 1992: 320-324 - 1991
- [c4]Ken Barker, M. Tamer Özsu:
Reliable Transaction Execution in Multidatabase Systems. RIDE-IMS 1991: 344-347 - 1990
- [c3]Ken Barker, M. Tamer Özsu:
Concurrent transaction execution in multidatabase systems. COMPSAC 1990: 282-288 - [c2]M. Tamer Özsu, Ken Barker:
Architectural Classification and Transaction Execution Models of Multidatabase Systems. ICCI 1990: 285-294
1980 – 1989
- 1982
- [c1]Ken Barker, Graham M. Birtwistle:
A computer systems simulator. WSC 1982: 329-333
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint