default search action
Gordon A. Manson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2006
- [j16]Gang Lu, Gordon A. Manson, Demetrios Belis:
Mobility Modeling in Mobile Ad Hoc Networks with Environment-Aware. J. Networks 1(1): 54-63 (2006) - [c15]Gang Lu, Gordon A. Manson, Demetrios Belis:
Enhancing routing performance for inter-vehicle communication in city environment. PM2HW2N 2006: 82-89 - 2005
- [j15]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
When security meets software engineering: a case of modelling secure information systems. Inf. Syst. 30(8): 609-629 (2005) - [c14]Gang Lu, Demetrios Belis, Gordon A. Manson:
A Novel Environment-Aware Mobility Model for Mobile Ad Hoc Networks. MSN 2005: 654-665 - 2004
- [j14]Nasser Salem Abouzakhar, Gordon A. Manson:
Evaluation of Intelligent Intrusion Detection Models. Int. J. Digit. EVid. 3(1) (2004) - [c13]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
Using Security Attack Scenarios to Analyse Security During Information Systems Design. ICEIS (3) 2004: 10-17 - 2003
- [j13]Haralambos Mouratidis, Gordon A. Manson, Ian R. Philp:
Analysis and Design of the eSAP: An Integrated Health and Social Care Information System. Health Informatics J. 9(2): 89-92 (2003) - [j12]Haralambos Mouratidis, Gordon A. Manson, Ian R. Philp:
A Novel Agent-Based System to Support the Single Assessment Process of Older People. Health Informatics J. 9(3): 149-162 (2003) - [j11]Nasser Salem Abouzakhar, Gordon A. Manson:
Networks security measures using neuro-fuzzy agents. Inf. Manag. Comput. Secur. 11(1): 33-38 (2003) - [c12]Agostino Poggi, Giovanni Rimassa, Paola Turci, James Odell, Haralambos Mouratidis, Gordon A. Manson:
Modeling Deployment and Mobility Issues in Multiagent Systems Using AUML. AOSE 2003: 69-84 - [c11]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
Modelling secure multiagent systems. AAMAS 2003: 859-866 - [c10]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems. CAiSE 2003: 63-78 - [c9]Haralambos Mouratidis, Gordon A. Manson, Abdullah Gani, Paolo Giorgini:
Analysing Security Requirements of Information Systems Using Tropos. ICEIS (3) 2003: 623-626 - [c8]Abdullah Gani, Nasser Salem Abouzakhar, Gordon A. Manson:
UMAS Learning Requirement for Controlling Network Resources. IEA/AIE 2003: 487-494 - [c7]Haralambos Mouratidis, Paolo Giorgini, Gordon A. Manson:
An Ontology for Modelling Security: The Tropos Approach. KES 2003: 1387-1394 - [c6]Paolo Bresciani, Paolo Giorgini, Haralambos Mouratidis, Gordon A. Manson:
Multi-agent Systems and Security Requirements Analysis. SELMAS 2003: 35-48 - [c5]R. Luo, R. M. Edwards, Gordon A. Manson:
Capacity assignment on asymmetric Bluetooth link. WCNC 2003: 1470-1474 - 2002
- [j10]Nasser Salem Abouzakhar, Gordon A. Manson:
An intelligent approach to prevent distributed systems attacks. Inf. Manag. Comput. Secur. 10(5): 203-209 (2002) - [c4]Haralambos Mouratidis, Paolo Giorgini, Ian R. Philp, Gordon A. Manson:
Using Tropos Methodology to Model an Integrated Health Assessment System. AOIS@CAiSE 2002 - [c3]Charalampos V. Ladas, R. M. E. Amiee, Mehdi Mahdavi, Gordon A. Manson:
Class based selective-ARQ scheme for high performance TCP and UDP over wireless links. MWCN 2002: 311-315 - [c2]R. Luo, Demetrios Belis, R. M. Edwards, Gordon A. Manson:
A simulation design for link connection-oriented wireless mesh networks. MWCN 2002: 665-669
1990 – 1999
- 1994
- [j9]Gordon A. Manson, Shahrin Sahib, Chandran Elamvazuthi:
Design and code derivation in the PCSC methodology. Inf. Softw. Technol. 36(7): 413-417 (1994) - 1991
- [j8]Fethi A. Rabhi, Gordon A. Manson:
Experiments with a transputer-based parallel graph reduction machine. Concurr. Pract. Exp. 3(4): 413-422 (1991) - [j7]Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett:
Nearest-neighbour Searching in Files of Text Signatures Using Transputer Networks. Electron. Publ. 4(4): 185-203 (1991) - [j6]Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett:
Network design for the implementation of text searching using a multicomputer. Inf. Process. Manag. 27(4): 265-283 (1991) - [j5]Fethi A. Rabhi, Gordon A. Manson:
Divide-and-conquer and parallel graph reduction. Parallel Comput. 17(2-3): 189-205 (1991) - 1990
- [c1]Janey K. Cringean, Roger England, Gordon A. Manson, Peter Willett:
Parallel Text Searching in Serial Files Using a Processor Farm. SIGIR 1990: 429-453
1980 – 1989
- 1988
- [j4]Janey K. Cringean, Gordon A. Manson, Peter Willett, George A. Wilson:
Efficiency of text scanning in bibliographic databases using microprocessor-based, multiprocessor networks. J. Inf. Sci. 14(6): 335-345 (1988) - [j3]Andrew T. Brint, Valerie J. Gillet, Michael F. Lynch, Peter Willett, Gordon A. Manson, George A. Wilson:
Chemical graph matching using transputer networks. Parallel Comput. 8(1-3): 295-300 (1988) - 1986
- [j2]G. R. Brookes, Gordon A. Manson, Jon A. Thompson:
Lattice and ring array topologies using transputers. Comput. Commun. 9(3): 121-125 (1986) - [j1]Valerie J. Gillet, Stephen M. Welford, Michael F. Lynch, Peter Willett, John M. Barnard, Geoffrey M. Downs, Gordon A. Manson, J. Thompson:
Computer storage and retrieval of generic chemical structures in patents. 7. Parallel simulation of a relaxation algorithm for chemical substructure search. J. Chem. Inf. Comput. Sci. 26(3): 118-126 (1986)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:42 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint