Ken Barker

Ken Barker

Contact information

Web presence

Phone number

Office: +1 (403) 220-8497

Location

Office: ICT514

Background

Educational Background

B.S. Computer Science, University of Calgary, 1982

Doctor of Philosophy Computer Science, University of Alberta, 1990

M.S. Computer Science, University of Calgary, 1984

Research

Areas of Research

Activities

My research interests have been very wide ranging over the last two plus decades.  My current interests are in the area of Privacy Preserving Data Repositories. I have a variety of interests under the general umbrella of privacy including protecting privacy in mobile applications, its impact on data analytics, and how to architect and design database management systems so they respect user privacy.

There are several other ares that I have worked in over the past several years and still periodically undertake work in those areas but I am not actively seeking collaborations in them. However, privacy has a wide range of applications including its application in mobile environments, tracking data provence, and its application in a variety of different disciplines and applications.

The list to the left is ordered in approximately the chronological order of my contributions but they are also not disjoint. Thus, work privacy has very interesting challenges in a distributed database environment as does the integration of legacy systems when database merge such as in a multidatabase environment. 

Publications

  • ELICA: An Automated Tool for Dynamic Extraction of Reguirements Relevant Information. Kenneth Edwin Barker; D. Zowghi; V. Gervasi; Zahra Shakeri. IEEE 5th International Workshop on Artificial Intelligence for Requirements Engineering Workshop (REW’18). 8 - 14. (2018)
  • Leakless Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. Kenneth Edwin Barker; Salmani Khosro. Proceedings of the ESORICS 2019. 8. (2019)
  • Leakless Privacy-Preserving Multi-keyword Ranked Search over Encrypted Cloud Data. Kenneth Edwin Barker; Khosro Salmani. 10. (2019)
  • ELICA: A requirements Elicitation Air Tool. V. Gervasi; A. Cheema; M. Rahman; Kenneth Edwin Barker; D. Zowghi; Z Shakeri. IEEE 26th International Requirements Engineering Conference (RE’18). 6. (2018)
  • Dynamic Visual Analytics for Elicitation Meeting with ELICA. Kenneth Edwin Barker; V. Gervasi; M. Rahman; D. Zowghi; A. Cheema; Z. Shakeri. IEEE 26th International Requirements Engineering Conference (RE’18). 4. (2018)
  • Towards Quantifying Behaviour in Social Crowdsourcing Communities. Kenneth Edwin Barker; Khobaib Zaamout. AAAI The Sixth AAAI Conference on Human Computation and Crowdsourcing, (HCOMP 2018). 10. (2018)
  • Task Interruption in Software Development Projects: What Makes some Interruptions More Disruptive than Others?. Kenneth Edwin Barker; Zahra Shakeri; M. Bauer; K. Schneider; O. Karras. IEEE Evaluation and Assessment in Software Engineering 2018 (EASE 2018). 13. (2018)
  • Inferring time when people visit a location using social network data . Md. Moniruzzaman; Kenneth Edwin Barker. IEEE International Conference on Machine Learning and Applications (ICMLA 2017). 4. (2017)

More Information

  • Zakerzadeh, H., C. C. Aggarwal, and K. Barker, “Managing Dimensionality in Data Privacy Anonymization,” (In Press) Knowledge and Information Systems (KAIS), 2016.
  • Zakerzadeh, H., C. C. Aggarwal, and K. Barker. ”Big graph privacy: An Extended Version”, (submitted to) Transactions on Data Privacy (TDP), 2015.
  • Jafari, M., P.W.L. Fong, R. Safavi-Naini and K. Barker, “A Framework for Expressing and Enforcing Purpose-Based Privacy Policies,” (In Press) ACM Transactions in Information and System Security (TISSEC), 2014.
  • Chinaei, A.H., R. Karimi Adl, C. Liang, and K. Barker, “Decentralized privacy preservation in social networks,” International Journal of Business Information Systems, Inderscience Publishers, Vol. 9, No. 4/2012, pp. 402-414, April 2012.
  • Uzoka, F.M.E., O. Obot, K. Barker and J. Osuji, “An experimental comparison of fuzzy logic and analytic hierarchy process for medical decision support systems”, Computer Methods and Problems in Biomedicine, 18 pages, 2010.
  • F.-M. E. Uzoka and K. Barker. Expert systems and uncertainty in medical diagnosis: a proposal for fuzzy-anp hybridisation. International Journal of Medical Engineering and Informatics, 2(4):329–342, 2010.
  • Jafari, M., A.H. Chinaei, K. Barker and M. Fathian, “Extending SQL to Support User Privacy Policies”, Journal of Information Assurance and Security (JIAS 2009).
  • Jafari, M., K. Barker, A.H. Chinaei, and M. Fathian, “Role Mining in Access History Logs,” International Journal of Computer Information Systems and Industrial Management Applications (IJCISIM), Vol. 1, pp. 258-265, 2009.
  • Chinaei, A.H., K. Barker, and F. Wm. Tompa, “Comparison of Access Control Administration Models”, Journal of Ubiquitous Communication and Computing Journal (JUBICC), 4(3); 525-532, 2009.
  • Rahman, R.M., K. Barker, and R. Alhajj, “Performance Evaluation of Different Replica Placement Algorithms”, Journal of Grid and Utility Computing, Vol. 1, No. 2, pp. 121-133, April, 2009.
  • Rahman, R.M., K. Barker and R. Alhajj, “Replica Selection Strategies in Data Grid”, Journal of Parallel and Distributed Computing, Vol. 68, No. 12, pp. 1561-1574, December, 2008.
  • Williams, A. and K. Barker, “Controlling Inference: Avoiding P-level Reduction during Analysis”, Journal of Research and Practice in Information Technology, Vol. 40, No. 3, pp. 163-185, August 2008.
  • Rahman, R.M., K. Barker and R.Alhajj, "Replica Placement Strategies in Data Grid", Journal of Grid Computing, Volume 6, Number 1, pp. 103-123, 2008.
  • Ozyer, T., R. Alhajj and K. Barker, “Intrusion Detection by Integrating Boosting Genetic Fuzzy Classifier and Data Mining Criteria for Rule Pre-Screening”, Journal of Network and Computer Applications, Volume 30, Issue 1, 2007 January, pp. 99-113.
  • Agyemang M., K. Barker and R. Alhajj, “A Comprehensive Survey of Numeric and Symbolic Outlier Mining Techniques”, Intelligent Data Analysis, Volume 10, Issue 6, 2006 December, pp. 521-538.
  • Du, J., R. Alhajj and K. Barker, “Genetic Algorithms Based Approach to Database Vertical Partitioning”, Journal of Intelligent Information Systems, Volume 26, Issue 2, 2006 March, pp. 167-183.
  • Lo, A., R. Alhajj, and K. Barker, “VIREX: Visual Relational to XML Conversion Tool”, Journal of Visual Languages and Computing, February 2006. 17(1): p. 25-45.
  • Korkmaz, E., J. Du, R. Alhajj and K. Barker, “Combining Advantages of New Chromosome Representation Scheme and Multi-Objective Genetic Algorithms for Better Clustering,” Intelligent Data Analysis, Volume 10, Issue 2, 2006.
  • Adnan, M., R. Alhajj and K. Barker, “Alternative Method for Incrementally Constructing the FP-Tree”, Intelligent Systems, Springer-Verlag, Editors: Janusz Kacprzyk and Ilias Petrounias, 2006.
  • Agyemang, M., K. Barker, and R. Alhajj, “Web Outlier Mining: Discovering outliers from web databases,” Intelligent Data Analysis, 2006.
  • Camorlinga, S., K. Barker, M. Davidson and B. Henderson, “A Teaching and Research DICOM Web Server Architecture with Local and Remote Secure Access to a Hospital PACS,” The Journal of Radiology, 2006.
  • Camorlinga, S. and K. Barker, A Complex Adaptive System Based on Squirrel Behaviors for Distributed Resource Allocation, Journal of Web Intelligence and Agent Systems, IOS Press Publishers, Volume 4, Number 1, March 2006, 1-23
  • Liu, Y., T. Özyer, R. Alhajj and K. Barker, “Integrating Multi-Objective Genetic Algorithm and Validity Analysis for Locating and Ranking Alternative Clustering,” European Journal of Informatica, Vol.29, No.1, pp.33-40, 2005.
  • Abul, A., R. Alhajj, F. Polat and K. Barker, “Finding differentially expressed genes for pattern generation,” Bioinformatics, Vol.21, No. 2, pp.445-450, 2005.
  • Udechukwu, A., Barker, K., Alhajj, R., A Framework for Representing Navigational Patterns as Full Temporal Objects, ACM SIGEcom Exchanges, Volume 5, Issue 2, December 2004.
  • Duta, K. Barker and R. Alhajj, Converting Relationships to XML Nested Structures, Journal of Information and Organizational Sciences, Volume 28, Issue 1-2, December 2004
  • Wang, A. Lo, R. Alhajj, and K. Barker, Reverse Engineering Based Approach for Transferring Legacy Relational Databases into XML, Journal of Information and Organizational Sciences, Volume 28, Issue 1-2, December 2004.
  • Ehikioya, S. and K. Barker, “A Formal Perspective to Specification of Transaction Systems”, The South African Computer Journal, (this is a selected paper from conference at: The South African Institute of Computer Scientists and Information Technologists Annual Conference”, Cape Town, South Africa, November, 2000).
  • Ezeife, C. and K. Barker, “Distributed Object-based Design: Vertical Fragmentation of Classes”, Parallel and Distributed Database Systems: An International Journal, Kluwar Academic Publishers, Volume 6, Number 4, Pp. 317-350, October, 1998.
  • Noaman, A. and K. Barker, “Distributed Data Warehouse Architectures”, Journal of Data Warehousing”, Vol. 2, No. 2, April 1997, pages 37-50.
  • Ezeife, C.I. and K. Barker, “A Comprehensive Approach to Horizontal Class Fragmentation in a Distributed Object Based System”, International Journal of Distributed and Parallel Databases, Kluwer Academic Publishers, Volume 2, 1995.
  • Graham P.C.J. and K. Barker, “Improved Scheduling in Object Bases Using Statically Derived Information”, The International Journal of Microcomputer Applications (IJMA), Vol. 14, No. 3, pp. 114-122, 1995.
  • Graham, P.C.J. and K. Barker, “Enhancing Intra-Transaction Concurrency in Object Bases,” Journal of Computing and Information (JCI), Vol 1, No. 1, pp. 795-811, May 1994.
  • Barker, K., “Quantification of Autonomy on Multidatebase Systems,” Journal of Systems Integration, Kluwer Academic Publishers, Volume 4, Number 2, pp. 151-169, April 1994.

Book Chapters

  • Ghazinour, K., S. Pun, M. Majedi, A. Chinaei and K. Barker, "Extending SQL to Support Privacy Policies", in Social Networks Analysis and Mining: Foundations and Applications, Book chapter, Springer-Verlag, 2010.
  • Kianmehr K., A. Chan, N. Situ, K. Wong, R. Alhajj, J. Rokne, and K. Barker, “Attractive Interface for XML: Convincing Naive Users to Go Online”, Zongmin Ma (Ed) “Soft Computing in XML Data Management”, Springer-Verlag, 2008.
  • Adnan, M., R. Alhajj and K. Barker, “Alternative Method for Incrementally Constructing the FP-Tree”, Intelligent Techniques and Tools for Novel System Architectures, Springer-Verlag, August, 2008.
  • Williams, A., M. Arlitt, C. Williamson, and K. Barker, “Web Workload Characterization: Ten Years Later,” in Web Context Delivery, Web Information Systems Engineering and Internet Technologies Book Series, X. Tang, J. Xu, and S. Chanson (Eds.), Chapter 1, pp. 3-21, Springer US, 2005.
  • Lawrence R. and K. Barker, “Integrating Data Sources Using a Standardized Global Dictionary”, (Chapter 16 in) Knowledge Discovery in Business Information Systems, Kluwer Academic Publishers, pp. 153-172, 2001. 

Refereed Conference Papers:

  • Kwakye, M. and K. Barker, "Privacy-Preservation in the Integration and Querying of Multidimensional Data Models," 14th International Conference on Privacy, Security, and Trust 2016, Auckland, New Zealand (9 pages), December, 2016.
  • Barker, K., “Privacy Protection or Data Value: Can we have both?” (Invited) In the 4th International Conference on Big Data Analytics 2015 (to appear), (18 pages), December 15-18, 2015.
  • Zakerzadeh, H., C. Aggrawal, K. Barker, “Privacy-Preserving Data Publishing,” 27th International Conference on Scientific and Statistical Database Management, 10 pages, June 29 – July 1, 2015.
  • Zakerzadeh, H., C. Aggarwal, and K. Barker. ”Big graph privacy”, Privacy and Anonymity in the Information Society (PAIS), Brussels, Belgium, March 27, 2015.
  • Ghazimour, K., A.H. Razavi, and K. Barker, “A Model for Privacy Compromisation Value,” In the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks, Elsevier – Procedia Computer Science, Halifax Canada, 10 pages, September 22-25, 2014.
  • Zakerzadeh, H., C. Aggarwal and K. Barker, “Towards breaking the curse of dimensionality in high-dimensional privacy,” SIAM International Conference on Data Mining, Philadelphia, 8 pages, April, 2014.
  • Said, D., J. Stil, R. Taylor and K. Barker, “Automatic Identification of hexagonal Pattern Artifacts in Radio Astronomical Surveys,” in the AstroInformatics Workshop, IEEE International Conference on Data Mining (ICDM), Dallas, December 7, 2013.
  • Moniruzzaman, Md., and K. Barker, “Redeem with Privacy (RwP): Privacy Protecting Framework for Geo-social Commerce,” WPES’13, Berlin, Germany, (11 pages), November 4, 2013.
  • Ghazinour K. and K. Barker, “A Privacy Preserving Model Bridging Data Provider and Collector Preferences”, in the Proceedings of the 2013 EDBT/ICDT Workshops, Genoa, Italy, pp. 174-178, March 18-22, 2013.
  • Chu, C.N.C. and K. Barker, “Dynamic Role Lease Authorization for a Grid/Cloud”, in the ICT-KE 2012: The 10th International Conference on IEEE ICT and Knowledge Engineering”, Bangkok, Thailand, November 21-23, 2012.
  • Askari, M., R. Safavi-Naini and K. Barker, “Privacy Consensus in Anonymization Systems via  Game Theory,” Data and Applications Security and Privacy XXXVI – 26th Annual IFIP WG 11.3 Conference, DBSec 2012, Paris, (Springer LNCS), pp. 74-89,  July 11-13, 2012. (Best Paper Award)
  • Askari, M., R. Safavi-Naini and K. Barker, “An Information Theoretic Privacy and Utility Measure for Data Sanitization Mechanisms,” CODASPY 2012, pp. 283-294,  San Antonio, Feb. 7-9, 2012. (Best Paper Award)
  • Banerjee, M., R. Karimi Adl, and K. Barker, “Quantifying Privacy Violations,” in the  Proceedings of Secure Data Management – 8th VLDB Workshop, SDM 2011, pp. 1 – 17, Seattle, September 2, 2011.
  • Ghazinour K. and K. Barker, “Capturing P3P Semantics Using an Enforceable Lattice-based Structure,” EDBT’11 Proceedings of the 2011 EDBT/ICDT Workshops, Sweden, pp. 1-5, 2011.
  • Shi, G. and K. Barker, “Extraction of Geospatial Information on the Web for GIS applications,” in the 10th International Conference on Cognitive Informatics – ICC (IEEE), pp. 41-48, Banff, August 18-20, 2011.
  • Said, D., L. Stirling, P.Federolf, and K. Barker, “Data Preprocessing for Distance-based Unsupervised Intrusion Detection,” Ninth Annual Conference on Privacy, Security and Trust (PST 2011), pp. 181-188, Montreal, July 19-22, 2011.
  • Moniruzzaman, Md., and K. Barker, “Delegation of Access Rights in a Privacy Preserving Access Control Model,” in the 2011 Ninth Annual International Conference on Privacy, Security and Trust (PST), pp. 124-133, July 19-21, 2011.
  • Shi, G. and K. Barker, “Thematic data extraction from Web for GIS and applications,” in the IEEE International Conference on Spatial Data Mining and Geographical Knowledge Services (ICSDM), Fuzhou, pp. 273-278, June 29 – July 1, 2011.
  • Jafari, M., P. Fong, R. Safavi-Naini, K. Barker and N.P. Sheppard, “Towards Defining Semantic Foundations for Purpose-based Privacy Policies,” Proceedings of the first ACM conference on Data and Applications Security and Privacy (CODASPY 2011), San Antonio, pp. 213-224, February 2011.
  • Gordon, P.M.K., Barker, K., Sensen C.W. (2010) Programming-by-example meets the Semantic Web: Using ontologies and web services to close the semantic gap. In: Proceedings of the IEEE Visual Languages and Human Centric Computing Conference (Leganés-Madrid, Spain), September 21-25, 2010, pp. 133-40.
  • Gordon, P.M.K., K. Barker and C.W. Sensen, “Helping Molecular Biologists Effectively Build Workflows, Without Programming,” in the Proceedings of the 7th International Conference on Data Integration in the Life Sciences (DILS 2010), Gotherburg, Sweden, pp. 74-89, August 25-27, 2010.
  • Barker, K. “Valuing” Privacy While Exposing Data Utility, (keynote talk) at the British National Conference on Databases (BNCOD 2010), (2 pages), Dundee, Scotland, June 29 – July 1, 2010.
  • Wu, L., M. Majedi, K. Ghazinour and K. Barker, “Analysis of Social Networking Privacy Policies,” in The Third International Workshop on Privacy and Anonymity in the Information Society (PIAS), March, 2010.
  • Kianmehr, K., X. Peng, C. Luce, J. Chung, N. Pham, W. Chung, R. Alhajj, J. Rokne and K. Barker, “Mining Online Shopping Patterns and Communities,” Proceeding of the 11th International Conference on Information Integration and Web-based Applications & Services, December 2009; ACM Press.
  • Kianmehr, K., S. Gao, J., Attari, M. Mushfiqur, Rahman, K. Akomeah, R. Alhajj, J. Rokne and K. Barker, “Text Summarization Techniques: SVM versus Neural Networks,” Proceeding of the 11th International Conference on Information Integration and Web-based Applications & Services, December 2009; ACM Press.
  • Chinaei, A. H., K. Barker, and F. Wm. Tompa, “Space of Access Control Administration Models”, Proceedings of the 4th International Conference On Information Technology (ICIT 2009), India, December, 2009.
  • Ghazinour, K., M. Majedi, K. Barker. “A Lattice-based Privacy Aware Access Control Model”, IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), Vancouver, Canada, August 2009, pp. 154-159.
  • Chinaei, A.H., R. Karimi Adl, C. Liang, and K. Barker, “User-Centric Privacy Preservation in Social Networks”, European and Mediterranean Conference on Information Systems (EMCIS 2009), Springer-Verlag, Turkey, July, 2009.
  • K. Ghazinour, M. Majedi, K. Barker. “A model for privacy policy visualization”, 33rd Annual IEEE International Computer Software and Applications Conference (COMPSAC), Seattle, WA, July 2009, pp. 335-340.
  • Majedi, M., K. Ghazinour, A. H. Chinaei, and K. Barker, “SQL Privacy Model for Social Networks”, Proceedings of Advances in Social Network Analysis and Mining (ASONAM 2009), Greece, pp. 369-370, July 2009. (Poster)
  • Pun, S., A. Chinaei, and K. Barker, “Twins(1): Extending SQL to Support Corporation Policies for User Privacy”, Advances in Social Networks Analysis and Mining, Greece, pp. 306-311, July, 2009.
  • Barker, K., M. Askari, M. Banerjee, K. Ghazinour, B. Mackas, M. Majedi, S. Pun, and A. Williams, “A data privacy taxonomy”, BNCOD 26: Proceedings of the 26th British National Conference on Databases, pp. 42-45, Springer-Verlag, July, 2009.
  • Omotayo, A., K. Barker, M.A. Hammad, L. Higham and J. Kawash, “Answering multiple-item queries in data broadcast systems”, BNCOD 26: Proceedings of the 26th British National Conference on Databases, pp. 120-132, Springer-Verlag, July 2009. (Best Paper)
  • Pun, S. and K. Barker, “Privacy FP-Tree”, International Workshop on Privacy-Preserving Data Analysis, April 2009.
  • Chu, N.C.N., Q. Trinh, K. Barker and R. Alhajj, "A Dynamic Ontology Mapping Architecture for a Grid Database System", 4th International Conference on Semantics, Knowledge and Grid 2008, Beijing, China, December 3-5, 2008.
  • Chu, N.C.N. and K. Barker, "Grid Scheduling Hub", 4th International Conference on Semantics (poster paper), Knowledge and Grid 2008, Beijing, China, December 3-5, 2008.
  • Duta, A. and K. Barker, "P4A: A New Privacy Model for XML", Data and Application Security XXII, 22nd Annual IFIP WG 11.3 Working Conference on Data and Application Security, V. Atluri (Ed.), LCNS 5094, Springer, pp. 65-80, July 13-16, 2008.
  • Trinh, Q. and K. Barker, "Semantic Interoperability Between Relational Database Systems", Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), Banff, Canada, pp. 208-215, September 6-8, 2007.
  • Duta, A. and K. Barker, “XML Schema Structural Equivalence”, Proceedings of the 9th International Conference on Enterprise Information Systems (ICEIS 2007), Maderia Islands, Portugal, June 2007.
  • Osborn, W. and K. Barker, “An Insertion Strategy for a Two-Dimensional Spatial Access Method”, Proceedings of the 9th International Conference on Enterprise Information Systems (ICEIS 2007), Maderia Islands, Portugal, June 2007.
  • Rahman, R.M., K. Barker and R. Alhajj, “Study of Different Replica Placement and Maintenance Strategies in Data Grid”, Proceedings of the IEEE International Symposium on Cluster Computing and the Grid, Rio de Janerio, May 2007.
  • Rahman, R.M., K. Barker and R. Alhajj, “A Predictive Technique for Replica Selection in Grid Environments”, Proceedings of the IEEE Symposium on Cluster Computing the Grid, Rio de Janerio, May 2007.
  • Omotayo, A., M.A. Hammad and K. Barker, “A Cost Model for Storing and Retrieving Data in Wireless Sensor Networks”, International Workshop on Ambient in the International Workshop on Ambient Intelligence (AIMS), Istambul, April 2007 (in conjunction with ICDE)
  • Williams, A. and K. Barker, “Controlling Inference: Avoiding P-level Reduction during Analysis”, Australian Information Security Workshop on Privacy Enhancing Technologies (AISW), Ballarat, February 2007.
  • Rahman, R.M., K. Barker and R. Alhajj, “Performance Analysis of a Replica Selection Strategy in Grid Environment Tuned with Replica Placement Decisions”, Proceedings of the International Conference on Grid Computing and Applications, Las Vegas, January 2007.
  • Lo, A., R. Alhajj and K. Barker. VIREX: Interactive Approach to Database Querying and Integration by Re-engineering Relational Data into XML. Proceedings of the IEEE International Conference on Web Intelligence, Hong Kong, December 2006.
  • Özyer, T., R. Alhajj, and K. Barker. Clustering by Integrating Multi-Objective Optimization with Weighted K-Means and Validity Analysis. in Proceedings of the International Conference on Intelligent Data Engineering and Automated Learning. September 2006. Bugos, Spain: Springer-Verlag LNCS.
  • Adnan, M., R. Alhajj, and K. Barker. “Alternative Method for Incrementally Constructing the FP-Tree”, Proceedings of IEEE International Conference on Intelligent Systems. September 2006. London, UK.
  • Duta, A. and K. Barker, “RA: An XML Schema Reduction Algorithm”, ADBIS 2006, Thessaloniki, Greece, September 2006.
  • Osborn, W. and K.  Barker, “Searching Through Spatial Relationship Using the 2DR-tree”, Proceedings of the 10th International Conference on Internet Multimedia and Systems Applications (IMSA 2006), Honolulu, August 2006.
  • Gopalan, J., R. Alhajj, and K. Barker. Discovering Accurate and Interesting Classification Rules Using Genetic Algorithm. Proc. of the International Conference on Data Mining. June 2006. Las Vegas, USA: IEEE.
  • Adnan, M., R. Alhajj, and K. Barker. Constructing Complete FP-Tree for Incremental Mining of Frequent Patterns in Dynamic Databases, Proc. of the International Conf. on Industrial & Engineering Applications of Artificial Intelligence & Expert Systems. June 2006. Annecy, FRANCE: Springer-Verlag LNCS. 363-372.
  • Omotayo, A., M.A. Hammad, and K. Barker. Efficient Data Harvesting for Tracing Phenomena in Sensor Networks. in Proceedings of the 18th International Conference on Scientific and Statistical Database Management (SSDBM). May 2006. Vienna, Austria. 59-70.
  • Omotayo, A., M.A. Hammad, and K. Barker. Update-aware Scheduling Algorithms in Hierarchical Data Dissemination Systems. in Proceedings of the 7th International Conference on Mobile Data Management (MDM). May 2006. Nara, Japan. 18.1-18.6.
  • Rahman, R.M., K. Barker, and R. Alhajj. Effective Dynamic Replica Maintenance Algorithm for the Grid Environment. in Proceedings of the International Conference on Grid and Pervasive Computing. May 2006. Taichung, Taiwan: Springer-Verlag LNCS. 336-345
  • Rahman, R.M., K. Barker, and R. Alhajj. “Replica Placement Design with Static Optimality and Dynamic Maintainability”, Proceedings of IEEE International Symposium on Cluster Computing and the Grid. May 2006. Singapore pp. 434-437.
  • Omotayo, A., M.A. Hammad and K. Barker, “Efficient Data Harvesting for Tracing Phenomena in Sensor Networks”, Proceedings of the 18th International Conference on Scientific and Statistical Database Management (SSDBM), Vienna, January 2006.
  • Gopalan, J., E. Korkmaz, R. Alhajj and K. Barker, “Effective Data Mining by Integrating Genetic Algorithm into the Data Preprocessing Phase,” Proceedings of the International Conference on Machine Learning and Applications, Los Angeles, CA, Dec. 2005.
  • Gopalan, J., E. Korkmaz, R. Alhajj and K. Barker, “Effective Data Mining by Integrating Genetic Algorithm into the Data Preprocessing Phase,” Proceedings of the International Conference on Machine Learning and Applications, Los Angeles, CA, Dec. 2005.
  • Rahman, R.M., K. Barker and R. Alhajj, “Replica Placement in Data Grid: A Multi-objective Approach” Proceedings of International Conference on Grid and Cooperative Computing, Springer-Verlag LNCS, Beijing, China, Nov. 2005.
  • Adnan, M., R. Alhajj and K. Barker, “Performance Analysis of Incremental Update of Association Rules Mining Approaches” Proceedings of IEEE International Conference on Intelligent Engineering Systems, Greece, Sep. 2005.
  • Malik, A., K. Barker, and R. Alhajj, “Hybrid Approach to Web Content Outlier Mining Without Query Vector,” Proceedings of the International Conference on Data Warehouse and Knowledge Discovery, Springer-Verlag LNCS, Copenhagen, Denmark, Aug. 2005.
  • Du, J., E. Korkmaz, R. Alhajj and K. Barker, “Alternative Clustering by Utilizing Multi-Objective Genetic Algorithm with Linked-List Based Chromosome Encoding,” Proceedings of IAPR International Conference on Machine Learning and Data Mining, Lecture Notes in Computer Science, Springer-Verlag LNCS, Leipzig, July 2005.
  • Trinh, Q., K. Barker and R. Alhajj, “Biological Data Integration Using Grid Services and Ontologies” Proceedings of the International Conference on Data Management for Real-life Problems in Biomedicine, San Diego, CA, June 2005.
  • Chi, G., K. Barker and R. Alhajj, “Cognitive Information Fusion of Georeferenced Data For Tactical Applications,” Proceedings of IEEE International Conference on Cognitive Informatics, San Deigo, CA, June 2005.
  • Malik, A., K. Barker, and R. Alhajj, “WCOND-Mine: Algorithm for Detecting Web Content Outliers from Web Documents,” Proceedings of IEEE Symposium on Computers and Communications, Cartagena, Spain, June 2005.
  • Wang, C., A. Lo, R. Alhajj, and K. Barker, “COCALEREX: User Oriented Approach for Reengineering Relational Databases into XML,” Proceedings of the International Conference on Information Technology, Amman, Jordan, Apr. 2005.
  • Rahman, R.M., K. Barker and R. Alhajj, “Replica Placement in Data Grid: Considering Utility and Risk” Proceedings of IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, Apr. 2005.
  • Liu, Y., T. Özyer, R. Alhajj and K. Barker, “Cluster Validity Analysis of Alternative Solutions from Multi-Objective Optimization,” Proceedings of SIAM International Conference on Data Mining, Newport Beach, CA, Apr. 2005.
  • Udechukwu, A., K. Barker and R. Alhajj, “Maintaining Knowledge-Bases of Navigational Patterns from Streams of Navigational Sequences,” Proceedings of IEEE International Workshop on Research Issues on Data Engineering, Tokyo, Japan, Apr. 2005.
  • Wang, C., A. Lo, R. Alhajj, and K. Barker, “Novel Approach for Reengineering Relational Databases into XML,” Proceedings of the International Workshop on XML Schema and Data Management, (in conjunction with ICDE 2005), Tokyo, Japan, Apr. 2005.
  • Özyer, T., R. Alhajj and K. Barker, “Intrusion Detection: A Novel Approach that Combines Boosting Genetic Fuzzy Classifier and Data Mining Techniques,” Proceedings of SPIE Defense and Security Symposium on Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, Orlando, FL, Mar. 2005.
  • Rahman, R.M., K. Barker and R. Alhajj, “Replica Selection in Grid Environment: A Data-mining Approach” Proceedings of ACM Annual Symposium on Applied Computing, New Mexico, Mar. 2005.
  • Malik, A., K. Barker, and R. Alhajj, “Mining Web Content Outliers using Structure Oriented Weighting Techniques and N-grams,” Proceedings of ACM Annual Symposium on Applied Computing, New Mexico, Mar. 2005.
  • Özyer, T. Y. Liu, R. Alhajj and K. Barker, “Multi-Objective Genetic Algorithm Based Cluster Validity Evaluation for Gene Expression Data,” Proceedings of the International Conference on Intelligent Computing and Information Systems, Cairo, Egypt, Mar. 2005.
  • Aycock J. and K. Barker, Virus Writing 101, ACM SIGCSE, February 2005.
  • Özyer, T., R. Alhajj and K. Barker, Multi-Dimensional Sequential Web Mining by Utilizing Fuzzy Inferencing, Proceedings of the International Conference on Machine Learning and Applications, Kentucky USA, December 2004.
  • Chu, N.C.N., A. Williams, R. Alhajj and K. Barker, Data Stream Mining Architecture for Network Intrusion Detection, Proceedings of IEEE International Conference on Information Reuse and Integration, Las Vegas, USA, November 2004.
  • Özyer, T., Y. Liu, R. Alhajj and K. Barker, Multi-objective Genetic Algorithm based Clustering Approach and Its Application to Gene Expression Data, Proceedings of Biennial International Conference on Advances in Information Systems, Izmir, Turkey, October 2004.
  • Özyer, T., R. Alhajj and K. Barker, Fuzzy Inference Approach to Sequential Web Mining, Proceedings of IEEE International Conference on Intelligent Engineering Systems, Romania, September 2004.
  • Liu, Y. T. Özyer, R. Alhajj and K. Barker, Validity Analysis of Clustering Obtained Using Multi-Objective Genetic Algorithm, Proceedings of the International Conference on Intelligent Systems Design and Applications, Budapest, Hungary, August 2004.
  • Du, J., R. Alhajj and K. Barker, A Novel Vertical Partition Approach: Group-Oriented Restricted Growth String Based Genetic Algorithm, Proceedings of the International Conference on Intelligent Systems Design and Applications, Budapest, Hungary, August 2004.
  • Du, J., E. Korkmaz, R. Alhajj and K. Barker, Novel Clustering Approach that Employs Genetic Algorithm with New Representation Scheme and Multiple Objectives, Proceedings of the International Conference on Data Warehouse and Knowledge Discovery, Spain, September 2004.
  • Bao, Y., R. Alhajj and K. Barker, Hybrid Cache Invalidation Schemes in Mobile Environments, Proceedings of IEEE/ACS International Conference on Pervasive Services, Beirut, Lebanon, July 2004.
  • Chi, G., R. Alhajj and K. Barker, Applying Evidential Reasoning to Multiple Source Data Integration for Software Engineering Decision Support, (SEDECS’2004) Proceedings of the International Conference on Software Engineering and Knowledge Engineering, Banff, Canada, June 2004.
  • Lo, R., Alhajj and K. Barker, Flexible User Interface for Converting Relational Data into XML, Proceedings of the International Conference on Flexible Query Answering Systems, Lyon, France, June 2004.
  • Özyer, T., R. Alhajj and K. Barker, Utilizing Rough Sets and Genetic Algorithms for Automated Clustering, Proceedings of the International Conference on Rough Sets and Current Trends in Computing, Uppsala, Sweden, June 2004.
  • Udechukwu, A., K. Barker and R. Alhajj, Discovering Behavioral Traversal Patterns of Users of Streaming Information Systems, Proceedings of the International Conference on Innovations Through Information Technology, New Orleans, May 2004.
  • Rahman, R.M., K. Barker and R. Alhajj, Predicting the Performance of GridFTP Transfers, Proceedings of International Workshop on Parallel and Distributed Scientific and Engineering Computing, Sante Fe, New Mexco, USA, April 2004.
  • Duta, K. Barker, and R. Alhajj, CONV2XML: Relational Schema Conversion to XML Nested-Based Schema, Proceedings of the International Conference on Enterprise Information Systems, Porto, Portugal, April 2004.
  • Udechukwu, A., K. Barker and R. Alhajj, An Efficient Framework for Iterative Time-Series Trend Mining, Proceedings of the International Conference on Enterprise Information Systems, Porto, Portugal, April 2004.
  • Wang, A. Lo, R. Alhajj and K. Barker, Converting Legacy Relational Database into XML Database Through Reserve Engineering, Proceedings of the International Conference on Enterprise Information Systems, Porto, Portugal, April 2004.
  • Udechukwu, A., K. Barker and R. Alhajj, Mining User Navigational Patterns in Dynamically Changing Environments, Proceedings of IEEE International Conference on Information Technology: Coding and Computing, Las Vegas, USA, April 2004.
  • Özyer, T.. Alhajj and K. Barker, Rough Set Clustering Approach Using Nondominated Sorting Genetic Algorithm, Proceedings of the International Conference on Applied Computing, Lisbon, March 2004.
  • Abul, O., R. Alhajj, F. Polat and K. Barker, Finding Differentially Expressed Genes: Pattern Generation using q-values, Proceedings of the ACM Annual Symposium on Applied Computing, Cyprus, March 2004.
  • Malik, A., K. Barker, and R. Alhajj, Framework for Mining Web Content Outliers, Proceedings of the ACM Annual Symposium on Applied Computing, Cyprus, March 2004.
  • Hassan, M., R. Alhajj, M J Ridley and K. Barker, Database Selection and Keyword Search of Structured Databases: Powerful Search for Naive Users, Proceedings of the ACM Annual Symposium on Applied Computing, Cyprus, March 2004.
  • Duta, A., K. Barker, and R. Alhajj, ConvRel: Relationship conversion to XML nested structures, Proceedings of the ACM Annual Symposium on Applied Computing, Cyprus, March 2004.
  • Udechukwu, A., K. Barker and R. Alhajj, Discovering All Frequent Trends in Time Series, Proceedings of the Winter International Symposium on Information and Communication Technologies, Cancun, January 2004.
  • Camorlinga, S., K. Barker and J. Anderson, Multiagent Systems for Resource Allocation in Peer-to-Peer Systems, ACM International Conference Proceedings of the Winter International Symposium on Information and Communication Technologies, Cancun, Mexico, January 2004.
  • Camorlinga S. and K. Barker, The Emergent Thinker, Proceedings of the International Workshop on Self-* Properties in Complex Information Systems, Bertinoro, Italty, May 2004.
  • Camorlinga S. and K. Barker, Emergent Search in Large Distributed Systems, Proceedings of the 8th International Conference on Parallel Problem Solving from Nature Workshop on Games and Emergent Behaviors in Distributed Computing Environments, Birmingham, UK, September 2004.
  • Aycock, J. and K. Barker, Creating a Secure Computer Virus Laboratory, 13th Annual EICAR Conference, April 2004.
  • Özyer, T., R. Alhajj and K. Barker, “A Boosting Genetic Fuzzy Classifier for Intrusion Detection Using Data Mining Criteria for Rule Pre-screening”, Hybrid Intelligent System 2003, Melbourne, Australia, pp. 893-904, Dec. 15-17, 2003
  • Du, J., K. Barker and R. Alhajj, “Attraction – A Global Measure for Database Vertical Partitioning”, IADIS International Conference – WWW/Internet 2003, Algarve, Portugal, November 2003.
  • Osman, A.  A. Lo, R. Alhajj, F. Plat, and K. Barker, “Cluster Validity Analysis Using Subsampling”, IEEE International Conference on Systems, Man & Cybernetics, Washington D.C., USA, October, 2003.
  • Hassan, M., R. Alhajj, M.J. Ridley, and K. Barker, “Database Selection and Keyword Search of Structured Databases: Powerful Search for Naïve Users”, The 2003 IEEE International Conference on Information Reuse and Integration, Las Vegas, USA, October, 2003.
  • Carmolinga, S. and K. Barker, “Scalability and Reliability of Complex Adaptive System Based Algorithms in a Peer-to-Peer System”, Proceedings of the 5th International Workshop on Computer Science and Information Technologies, CSIT’2003, Ufa Russia, September 2003.
  • Trinh, Q.M., K. Barker and R. Alhajj, “World Wide Web Database Integration via Mobile Agents”, Scuola Superiore G Reiss Romoli (SSGRR-2003), L’Aquilla, Italy, July 2003.
  • Cheung, E., S. Camorlinga, J. Rueda, and K. Barker, “A Performance Study of Replicated Metadata for Implementing a Distributed PACS Patient Location System”, The 20th Symposium for Computer Applications in Radiology, Boston, Mass. USA, June 7 – 10, 2003.
  • Trinh, Q, K. Barker and R. Alhajj, “World Wide Web Database Integration Using Mobile Agents”, ACM Symposium on Applied Computing 2003, Melbourn, Florida, March 9 – 12, 2003.
  • Camorlinga S, K. Barker, M. Davidson, and B Henderson, “A Teaching and Research DICOM Web Server Architecture with Local and Remote Secure Access to a Hospital PACS”, Radiological Society of North America Conference, Chicago, Ill USA December 2002
  • Camorlinga S, M. Card, K. Barker, M. Davidson, and M. Enn, “A Methodology to Diagnostic Imaging Workflow Analysis and Problem Area Identification Using the IHE Model, A Variation of UML Modeling Tool and Software Prototypes”, Radiological Society of North America Conference, Chicago Ill USA December 2002
  • Boyer, J., L. Wagter, K. Barker, R. Hughes. "Alberta Cancer Genetics Program Epidemiology Database", National Hereditary Breast Cancer Workshop, Quebec City, Quebec Nov 25 - 26, 2002.
  • Duta, A., S. Carpendale and K. Barker, “VICO: A Tool for Supporting Visual Comparisons of Different Pine-Beetle Management Approaches”, The Sixth International Conference on Information Visualization, Symposium – GeoVis (IV02), London, UK, July 2002. (Note that a preliminary version of this paper appeared in the next paper reference.)
  • Duta, A., S. Carpendale and K. Barker, “VICO: A Tool for Supporting Visual Comparisons of Different Pine-Beetle Management Approaches”, Western Computer Graphics Symposium, (SkiGraph), March 2002. (Note that a substantially expanded version appeared as indicated in the previous reference at IV02.)
  • Nicolson-Klimek, M.L, J. Boyer, L. Wagter, S. Kieffer, D. Gilchrist, K. Barker, R.  Hughes, “The Alberta Cancer Genetic Program - Epidemiology Database” (abstract) The World Conference on Breast Cancer, June, 2002.
  • Barker, K. and R. Lawrence, “Flexible Semantic B2B Integration Using XML Specifications”, SCI 2002 - The 6th World Multi-Conference on Systemics, Cybernetics, and, Informatics, July 14th - 18th, 2002, Orlando, Florida.
  • Lawrence R. and K. Barker, “Using Unity to Semi-Automatically Integrate Relational Schema,” ICDE 2002 - 18th International IEEE Conference on Data Engineering, San Jose, California, February 26-March 1, 2002.
  • Lawrence, R. and K. Barker, “Querying Relational Databases without Explicit Joins, DASWIS 2001- International Workshop on Data Semantics in Web Information Systems (in conjunction with ER'2001), November 29-30, 2001, Yokohama, Japan, (appears in) Conceptual Modeling for New Information Systems Technologies (LNCS #2465) pages 278-291.
  • Lawrence, R. and K. Barker, “Integrating Relational Schemas Using a Standardized Dictionary”, ACM SAC’2001 Symposium on Applied Computing, Las Vegas, USA, pp. 225-230, March, 2001.
  • Graham, P., S. Walkty, R. Peters, and K. Barker, “Optimized Wireless Web Browsing Using Mobile Agents”, in Parallel and Distributed Processing Techniques and Applications (PDPTA’01), Las Vegas, USA, June 25-28, 2001.
  • Ehikioya, S. and K. Barker, “A Formal Perspective to Specification of Transaction Systems”, The South African Institute of Computer Scientists and Information Technologists Annual Conference”, Cape Town, South Africa, November, 2000.
  • Lawrence, R. and K. Barker, "Multidatabase Querying by Context", The 20th Annual Conference on Trends in Databases and Information Systems (DATASEM 2000), Czech Republic, pp. 127-136, October 21-24, 2000.
  • Peters, R. and K. Barker, "Change Proagation in an Axiomatic Model of Schema Evolution for Objectbase Management Systems", Database Schema Evolution and Meta-Modelling 2000, Schloss Dagstuhl, Germany, (to appear as part of LNCS – 2001), September, 2000.
  • Barker, K., "Extracting Usable Semantics from Legacy Systems", International Conference on Advances in Infrastructure for Electronic Business, Science and Education on the Internet (SSGRR 2000), L'Aquila Italy, on CD-ROM, August, 2000.
  • Jayaplan, R., R. Peters and K. Barker, "An Objectbase Schema Evolution Approach to Windows NT Security", The 4th USENIX Windows Systems Symposium, Seattle, Washington, USA, August 2000.
  • Noaman, A. and K. Barker, "A Horizontal Fragmentation Algorithm for the Fact Relation in a Distributed Data Warehouse", In Proceedings of the Eighth International Conference on Information and Knowledge Management (CIKM'99), Kansas, Missouri, November 1999, Pp. 154-161
  • Ehikioya S.A. and K. Barker, "Towards a Formal Specification Methodology for Transaction Systems Protocols", 3rd International IASTED International Conference on Software Engineering and Applications (SEA'99), Scottsdale, Arizona, USA, October 6-8, 1999, IASTED/ACTA Press, Pp. 374-380.
  • Noaman A. and K. Barker, "Distributed Data Warehouse Architectures and Design", In Proceedings of the Fourteenth International Symposium on Computer and Information Sciences (ISCIS'99), Kusadasi, Turkey, October 1999, Pp. 1031-1033.
  • Barker, K. and A. Elmagarmid, “Transaction Management in Multidatabases Systems: Current Techniques and Formalisms”, (Chapter 10) Management of Heterogeneous and Autonomous Database Systems, A.K. Elmagarmid, A. Sheth, M. Rusinkovic (editors), Morgan-Kaufmann, Pp. 277-3, 1998.
  • Lawrence, R., K. Barker and A. Adil, “Simulating MDBS Transaction Management Protocols”, Proceedings of the ISCA 11th International Conference: Computer Applications in Industry and Engineering (CAINE-98), W. Perrizo (ed.), Pp. 93-97, November 1998.
  • Saravanan, C.R., R.J. Peters and K. Barker, “WWW in DSM”, International Database Engineering and Application Symposium, 1998.
  • Peters, R.J., P. Graham and K. Barker, “A Shared Environment to Support Multiple Advanced Application Systems”, The Workshop on Information Technologies and Systems (WITS) – 97, Dec., 1997.
  • Hadaegh, A.R. and K. Barker, “Simple Reconciliation of Transactions to Increase Concurrency in Historical Objectbases”, XII Brazilian Symposium on Database Systems - SBBD’97, Pp. 44-64, October 1997.
  • Ehikioya S.A. and K. Barker, “CSP with Record Data Type for Supporting Transaction Systems Specification”, Advances in Data Base and Information Systems (ADBIS) '97, Moscow, Russia, September, 1997.
  • Ehikioya S.A., R. Peters, K Barker, and S Ramanna, “CSP/Data: A Process Algebra for Data-intensive Systems”, Proceeding of IEEE International Conference on Systems Man and Cybernetics (SMC) : Computational Cybernetics and Simulation, Hyatt Orlando, Orlando, October 1997.
  • Ehikioya S.A. and Barker K.E., “A Formal Specification Strategy for Electronic Commerce”, 1997 International Database Engineering and Applications Symposium (IDEAS 1997) Conference, Montreal, Canada, August 1997.
  • Schaller, T., O. A. Bukhres, A. K Elmagarmid, X. Liu and K. Barker, “The Integration of Database Systems”, Chapter2: Object Oriented Multidatabase Systems, O. Bukhres and A.K. Elmagarmid (editors), Prentice-Hall, pp. 37-55, 1996.
  • Hadaegh, A. and K. Barker, “Version Management in Object Based System”, Advances in Data Base and Information Systems (ADBIS’96), Moscow, pp. 126 - 133, September 10 -13, 1996.
  • Graham, P.C.J., K. Barker, and A. Reza-Hadaegh, “Disconnected Objects: Reconciliation in a Nested Object Transaction Environment”, ECOOP'96 Workshop on Mobility & Replication (WMR), Linz, Austria, July 8th, 1996.
  • Mathew, J., P.C.J. Graham and K. Barker, “Object Directory Design for a Fully Distributed Persistent Object System”, Proceedings of the 1996 Engineering Systems Design and Analysis Conference, Volume 74-2, Object-Oriented Database Management Systems, pp. 75-88, July 1-4, 1996.
  • Barker, K. R.J. Peters and P.C.J. Graham, “Distributed Shared Virtual Memory for Interoperability of Heterogeneous Information Systems,” (Extended Abstract), OOPSLA`95 Workshop on Object Interoperability, Austin, Texas, USA, October 1995.
  • Ezeife, C.I. and K. Barker, “Vertical Fragmentation for Advanced Object Models in a Distributed Object Based System,” Proceedings of the Seventh International Conference on Computing and Information, IEEE Publishers, Volume 8, pp. 613-632, July 1995.
  • Ehikioya, S.A., K. Barker and E.A. Onibere, “Specifying Correctness in the Automation of Banking Operations,” In Adagunodo, E.R., K.O. Kehinde, A.D. Akinde and M.O. Adigun (Eds.) Computer-Based Automation in Developing Countries (Auto-DC`95), Lagos, Nigeria, COAN Conference Series, Vol 6, pp. 103-115, May 1995.
  • Ezeife, C. I. and K. Barker, “Horizontal Class Fragmentation for Advanced Object Models in a Distributed Object-Based System,” In the Proceedings of the Ninth International Symposium on Computer and Information Sciences, Antalya, Turkey, pp. 25-32, Nov. 7-9, 1994.
  • Graham, P.C.J. and K. Barker, “Effective Optimistic Concurrency Control in Multiversion Object Bases,” Proceedings of the International Symposium on Object Oriented Methodologies and Systems (ISOOMIS), Springer-Verlag LNCS-858, pp. 313-328, Palermo, Italy, September 1994.
  • Ezeife, E.I. and K. Barker, “Vertical Class Fragmentation in a Distributed Object-Based System,” In the Proceedings of the Second International Symposium on Applied Corporate Computing, ISACC,” Texas A&M University (publisher), Monterrey, Mexico, Volume 2, Number 1, pp. 43-52, 1994.
  • Ezeife, C.I. and K. Barker, “Horizontal Class Fragmentation in Distributed Object Based Systems,” In the Proceedings of the Second Biennial European Joint Conference on Engineering Systems Design and Analysis, ASME Publications, London, England, Vol. 65, No. 5., pp. 225-235, June 1994.
  • Reza-Hadaegh A., P.C.J. Graham, and K. Barker, “An Architecture and Model for Processing Transactions in Multiversion Object Base Systems,” Proceedings of the 2nd Mid-Continent Information and Database System Conference (MIDAS`94), Fargo, USA, pp. 99-112, May 1994.
  • Ezeife, C.I. and K. Barker, “A Distributed Object Based Design Technique,” Proceedings of the First Annual Mid-Continent Information Systems Conference, Database Research Group, NDU Fargo (publisher), Volume 1, pp. 78-90, Fargo, ND, USA, May 1993.
  • Graham, P.C.J. and K. Barker, “Distributed Object Based Implementation Using a Single, Shared Address Space,” Proceedings of the First Annual Mid-Continent Information Systems Conference, Database Research Group, NDU Fargo (publisher), Volume 1, pp. 62-77, May 1993.
  • Barker, K., M. Evans and J. Anderson, “Quantification of Autonomy in Multi-Agent Systems,” In the Proceedings of the AAAI Workshop on Cooperation Among Heterogeneous Agents, 6 pages, San Jose, CA, July 1992.
  • Barker, K. and M.T. Özsu, “Reliable Transaction Execution in Multidatabase Systems,” In Proceedings of the 1st International Workshop on Interoperability in Multidatabase Systems, Kyoto Japan, pp. 344-347, April 1991.
  • Barker, K. and M.T. Özsu, “Concurrent Transaction Execution in Multidatabase Systems,” In the Proceedings of COMPSAC`90, Chicago USA, pp. 282-288, October 1990.
  • Özsu, M.T. and K. Barker, “Architectural Classification and Transaction Execution Models of Multidatabase Systems,” In the Proceedings of the International Conference on Computing and Information (ICCI), Niagara Falls Canada, pp. 275-279, May 1990. (Also appears in Advances in Computing and Information – ICCI`90, Ak, S.G., K. Fiala, and WW. Koczkokaj (eds.) Springer-Verlag, pp. 285-294, 1990.
  • Barker, K. and Birtwistle, “A Computer Systems Simulator,” In the Proceedings of the 14th Conference on Winter Simulation, Volume 1, WSC`82, Winter Simulation Conference, pp. 329-333, 1982.

Books (Proceedings and Related Publications):

Proceedings of the Fifth International Conference on Information and Knowledge Management, C. Nicholas, N. Pissinou, M.T. Özsu, and K. Barker, ACM CIKM`96, 1996.

Technical Reports and Non-Refereed Contributions

In addition to the list of the refereed contributions listed above there are approximately 50 non-referred or editorially reviewed contributions that are not included.