default search action
Thomas H. Hinke
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2005
- [c20]Walter Brooks, Michael J. Aftosmis, Bryan Biegel, Rupak Biswas, Robert Ciotti, Kenneth Freeman, Christopher E. Henze, Thomas H. Hinke, Haoqiang Jin, William Thigpen:
Impact of the Columbia Supercomputer on NASA Science and Engineering Applications. IWDC 2005: 293-305 - 2003
- [j7]Bruce R. Barkstrom, Thomas H. Hinke, Shradha Gavali, Warren Smith, William J. Seufzer, Chaumin Hu, David E. Cordner:
Distributed Generation of NASA Earth Science Data Products. J. Grid Comput. 1(2): 101-116 (2003) - 2002
- [j6]John A. Rushing, Heggere S. Ranganath, Thomas H. Hinke, Sara J. Graves:
Image segmentation using association rule features. IEEE Trans. Image Process. 11(5): 558-567 (2002) - 2001
- [j5]John A. Rushing, Heggere S. Ranganath, Thomas H. Hinke, Sara J. Graves:
Using Association Rules as Texture Features. IEEE Trans. Pattern Anal. Mach. Intell. 23(8): 845-858 (2001) - 2000
- [j4]Thomas H. Hinke, John A. Rushing, Heggere S. Ranganath, Sara J. Graves:
Techniques and Experience in Mining Remotely Sensed Satellite Data. Artif. Intell. Rev. 14(6): 503-531 (2000) - [c19]Thomas H. Hinke, Jason Novotny:
Data Mining on NASA's Information Power Grid. HPDC 2000: 292-293
1990 – 1999
- 1997
- [j3]Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:
Protecting databases from inference attacks. Comput. Secur. 16(8): 687-708 (1997) - [c18]Thomas H. Hinke, John A. Rushing, Heggere S. Ranganath, Sara J. Graves:
Target-Independent Mining for Scientific Data: Capturing Transients and Trends for Phenomena Mining. KDD 1997: 187-190 - [c17]Thomas H. Hinke, John A. Rushing, Shalini Kansal, Sara J. Graves, Heggere S. Ranganath:
For Scientific Data Discovery: Why Can't the Archive be More Like the Web? SSDBM 1997: 96-99 - 1996
- [j2]Harry S. Delugach, Thomas H. Hinke:
Wizard: A Database Inference Analysis and Detection System. IEEE Trans. Knowl. Data Eng. 8(1): 56-66 (1996) - [c16]Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:
A Framework for Inference-Directed Data Mining. DBSec 1996: 229-239 - [c15]Harry S. Delugach, Thomas H. Hinke:
Microanalysis: Acquiring Database Semantics in Conceptual Graphs. ICCS 1996: 218-228 - [c14]Sara J. Graves, Thomas H. Hinke, Shalini Kansal:
Metadata: The Golden Nuggets of Mining Data. MD 1996 - 1995
- [j1]Thomas H. Hinke, Harry S. Delugach, Asha Chandrasekhar:
A Fast Algorithm for Detecting Second Paths in Database Inference Analysis. J. Comput. Secur. 3(2/3): 147-168 (1995) - [c13]Thomas H. Hinke, Harry S. Delugach, Randall P. Wolf:
ILIAD: An Integrated Laboratoty For Inference Analysis and Detection. DBSec 1995: 333-348 - [c12]Tsau Young Lin, Thomas H. Hinke, Donald G. Marks, Bhavani Thuraisingham:
Security and Data Mining. DBSec 1995: 391-399 - 1993
- [c11]Thomas H. Hinke, Harry S. Delugach, Asha Chandrasekhar:
Layered Knowledge Chunks for Database Inference. DBSec 1993: 275-295 - 1992
- [c10]Thomas H. Hinke, Harry S. Delugach:
Aerie: An Inference Modeling and Detection Approach for Databases. DBSec 1992: 179-194 - [c9]Harry S. Delugach, Thomas H. Hinke:
AERIE: Database Inference Modeling and Detection Using Conceptual Graphs. Workshop on Conceptual Graphs 1992: 206-215
1980 – 1989
- 1989
- [c8]Thomas H. Hinke:
Secure database design panel. ACSAC 1989 - [c7]Thomas H. Hinke:
The trusted server approach to multilevel security. ACSAC 1989: 335-341 - [c6]Thomas H. Hinke:
DBMS Trusted Computing Base Taxonomy. DBSec 1989: 97-108 - [c5]Cristi Garvey, Thomas H. Hinke, Nancy R. Jensen, Jane Solomon, Amy Wu:
A Layered TCB Implementation versus the Hinke-Schaefer Approach. DBSec 1989: 151-165 - 1988
- [c4]Thomas H. Hinke:
Database Inference Engine Design Approach. DBSec 1988: 247-262 - [c3]Thomas H. Hinke:
Inference aggregation detection in database management systems. S&P 1988: 96-106 - 1987
- [c2]Thomas H. Hinke:
DBMS Technology vs. Threats. DBSec 1987: 57-87 - 1983
- [c1]Thomas H. Hinke, Jose Althouse, Richard A. Kemmerer:
SDC Secure Release Terminal Project. S&P 1983: 113-119
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint