Publications
FRES-CAR: An Adaptive Cache Replacement Policy." In WIRI, 74-81. IEEE Computer Society, 2005. C42.pdf (327.32 KB)
""Functional annotation of genes through statistical analysis of biomedical articles.", 2005. C43.pdf (738.13 KB)
Functional Annotation of Genes through Statistical Analysis of Biomedical Articles." In DEXA Workshops, 585-589. IEEE Computer Society, 2005.
"Intrusion Detection in RBAC-administered Databases." In ACSAC, 170-182. IEEE Computer Society, 2005. C46.pdf (166.5 KB)
""Intrusion Detection in RBAC-administered Databases.", 2005. C46.pdf (166.5 KB)
A Latency-Based Object Placement Approach in Content Distribution Networks." In LA-WEB, 140-147. IEEE Computer Society, 2005.
"A Logic Based Approach for the Multimedia Data Representation and Retrieval." In ISM, 241-248. IEEE Computer Society, 2005.
""A Logic Based Approach for the Multimedia Data Representation and Retrieval.", 2005. C45.pdf (279.49 KB)
"Model-Based Cluster Analysis for Web Users Sessions.", 2005. C41.pdf (171.16 KB)
Model-Based Cluster Analysis for Web Users Sessions." In ISMIS, edited by Mohand-Said Hacid, Neil V. Murray, Zbigniew W. Ras and Shusaku Tsumoto, 219-227. Vol. 3488. Lecture Notes in Computer Science 3488. Springer, 2005.
"PDetect: A Clustering Approach for Detecting Plagiarism in Source Code Datasets." Comput. J. 48 (2005): 651-661.
"Storage and Access Control Issues for XML Documents." In Encyclopedia of Information Science and Technology (V), edited by Mehdi Khosrow-Pour, 2616-2621. Idea Group, 2005.
"XML Data Stores: Emerging Practices." IEEE Internet Computing 9 (2005): 62-69.
"XML Document Indexes: A Classification." IEEE Internet Computing 9 (2005): 64-71.
"XML document indexes: a classification." Internet Computing, IEEE 9 (2005): 64-71.
""XML-Based Revocation and Delegation in a Distributed Environment.", 2005. C34.pdf (118.57 KB)
Credential-Based Policies Management in an Access Control Framework Protecting XML Resources." In ISCIS, edited by Albert Levi, Erkay Savas, Hüsnü Yenigün, Selim Balcisoy and Yücel Saygin, 603-612. Vol. 4263. Lecture Notes in Computer Science 4263. Springer, 2006. C53.pdf (1.51 MB)
""Credential-Based Policies Management in an Access Control Framework Protecting XML Resources.", 2006. C53.pdf (1.51 MB)
"A Divergence-Oriented Approach for Web Users Clustering.", 2006. C48.pdf (258.84 KB)
A Divergence-Oriented Approach for Web Users Clustering." In ICCSA (2), edited by Marina L. Gavrilova, Osvaldo Gervasi, Vipin Kumar, Chih Jeng Kenne Tan, David Taniar, Antonio LaganĂ, Youngsong Mun and Hyunseung Choo, 1229-1238. Vol. 3981. Lecture Notes in Computer Science 3981. Springer, 2006.
""An evolutionary scheme for Web Replication and Caching.", 2006. C8.pdf (279.98 KB)
"Exploring the correlation of biomedical article keywords to MeSH terms.", 2006. C52.pdf (241.43 KB)
Insight and Perspectives for Content Delivery Networks." Commun. ACM 49 (2006): 101-106. PDF (182.83 KB)
""Integrating Caching Techniques on a Content Distribution Network.", 2006. C51.pdf (391.69 KB)
Integrating Caching Techniques on a Content Distribution Network." In ADBIS, edited by Yannis Manolopoulos, Jaroslav Pokorny and Timos K. Sellis, 200-215. Vol. 4152. Lecture Notes in Computer Science 4152. Springer, 2006.
"