default search action
Timothy Redmond
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c13]Clément Jonquet, John Graybeal, Syphax Bouazzouni, Michael Dorf, Nicola Fiore, Xeni Kechagioglou, Timothy Redmond, Ilaria Rosati, Alex Skrenchuk, Jennifer Vendetti, Mark A. Musen:
Ontology Repositories and Semantic Artefact Catalogues with the OntoPortal Technology. ISWC 2023: 38-58
2010 – 2019
- 2013
- [c12]Matthew Horridge, Timothy Redmond, Tania Tudorache, Mark A. Musen:
Binary OWL. OWLED 2013 - 2012
- [c11]Hans-Georg Fill, Timothy Redmond, Dimitris Karagiannis:
FDMM: A Formalism for Describing ADOxx Meta Models and Models. ICEIS (3) 2012: 133-144 - [c10]Hans-Georg Fill, Timothy Redmond, Dimitris Karagiannis:
Formalizing Meta Models with FDMM: The ADOxx Case. ICEIS 2012: 429-451 - 2010
- [j3]Ömer Egecioglu, Timothy Redmond, Charles Ryavec:
A multilinear operator for almost product evaluation of Hankel determinants. J. Comb. Theory A 117(1): 77-103 (2010) - [c9]Timothy Redmond:
An Open Source Database Backend for the OWL API and Protege 4. OWLED 2010
2000 – 2009
- 2008
- [j2]Ömer Egecioglu, Timothy Redmond, Charles Ryavec:
Almost Product Evaluation of Hankel Determinants. Electron. J. Comb. 15(1) (2008) - [c8]Timothy Redmond, Michael Smith, Nick Drummond, Tania Tudorache:
Managing Change: An Ontology Version Control System. OWLED 2008 - 2002
- [c7]Calvin Ko, Timothy Redmond:
Noninterference and Intrusion Detection. S&P 2002: 177-187 - 2001
- [j1]Ömer Egecioglu, Timothy Redmond, Charles Ryavec:
From a Polynomial Riemann Hypothesis to Alternating Sign Matrices. Electron. J. Comb. 8(1) (2001)
1990 – 1999
- 1993
- [c6]Jaisook Landauer, Timothy Redmond:
A Lattice of Information. CSFW 1993: 65-70 - 1992
- [c5]Sandra Rawlings Murphy, Stephen D. Crocker, Timothy Redmond:
Unwinding and the LOCK Proof Referees Study. CSFW 1992: 9-21 - [c4]Jaisook Landauer, Timothy Redmond:
A Framework for Composition of Security Models. CSFW 1992: 157-166
1980 – 1989
- 1989
- [c3]Jaisook Landauer, Timothy Redmond, Terry Benzel:
Formal Policies for Trusted Processes. CSFW 1989: 31-40 - 1988
- [c2]Leo Marcus, Timothy Redmond:
Two Automated Methods in Implementation Proofs. CADE 1988: 622-642 - [c1]Leo Marcus, Timothy Redmond:
A Model-Theoretic Approach to Specifying, Verifying and Hooking Up Security Policies. CSFW 1988: 127-138
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-10 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint