Home page of Willem Jonker

Department of Computer Science
Room 3122



Prof. Dr. Willem Jonker
Full professor
Database Technology




Phone +31 534893782/ +31 534893690
Fax +31 534892729
E-mail jonker@cs.utwente.nl
    University of Twente
The Netherlands    
 
 
                      P.O. Box 217
  7500 AE Enschede
  The Netherlands


Publications

2016

Bortolameotti, R. and Peter, A. and Everts, M.H. and Jonker, W. and Hartel, P.H. (2016) Reliably determining data leakage in the presence of strong attackers. In: Proceedings of the 32nd Annual Conference on Computer Security Applications, ACSAC 2016. pp. 484-495. ACM. ISBN 978-1-4503-4771-6
van de Kamp, T.R. and Peter, A. and Everts, M.H. and Jonker, W. (2016) Private Sharing of IOCs and Sightings. In: 3rd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2016. pp. 35-38. ACM. ISBN 978-1-4503-4565-1

2015

Bakondi, B.G. and Peter, A. and Everts, M.H. and Hartel, P.H. and Jonker, W. (2015) Publicly Verifiable Private Aggregation of Time-Series Data. In: 10th International Conference on Availability, Reliability and Security, ARES 2015, 24-27 Aug 2015, Toulouse, France. pp. 50-59. IEEE. ISBN 978-1-4673-6590-1

2014

Bösch, C.T. and Hartel, P.H. and Jonker, W. and Peter, A. (2014) A Survey of Provably Secure Searchable Encryption. ACM computing surveys, 47 (2). 18:1-18:51. ISSN 0360-0300 *** ISI Impact 5,243 ***
Bösch, C.T. and Peter, A. and Hartel, P.H. and Jonker, W. (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy. pp. 2694-2698. IEEE. ISBN 978-1-4799-2893-4
Bösch, C.T. and Peter, A. and Leenders, B. and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, P.H. and Jonker, W. (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada. pp. 330-337. IEEE. ISBN 978-1-4799-3502-4
Makri, E. and Everts, M.H. and de Hoogh, S. and Peter, A. and op den Akker, H. and Hartel, P.H. and Jonker, W. (2014) Privacy-Preserving Verification of Clinical Research. In: Sicherheit 2014: Sicherheit, Schutz und Zuverlässigkeit, Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 19-21 Mar 2014, Wien, Österreich. pp. 481-500. Lecture Notes in Informatics (LNI). Gesellschaft für Informatik e.V.. ISBN 978-3-88579-622-0

2012

Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2012) Method and System of Monitoring a Data Stream. Patent P31230NL00/HSE (Application).
Bösch, C.T. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security (ISC), 19-21 Sep 2012, Passau, Germany. pp. 224-241. Lecture Notes in Computer Science 7483. Springer Verlag. ISBN 978-3-642-33383-5
Jonker, W. and Petkovic, M. (2012) Preface. In: Secure Data Management, 9th VLDB Workshop, SDM 2012, Istanbul, Turkey, August 27, 2012: proceedings. Lecture Notes in Computer Science 7482. Springer Verlag, Berlin. ISSN 0302-9743 ISBN 978-3-642-32872-5

2011

Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 02 Sep 2011, Seattle, WA, USA. pp. 114-127. Lecture Notes in Computer Science 6933. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-23555-9
Ibraimi, L. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2011) Public-Key Encryption with Delegated Search. In: Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS), 7-10 Jun 2011, Nerja, Spain. pp. 532-549. Lecture Notes in Computer Science 6715. Springer Verlag. ISBN 978-3-642-21553-7
Sedghi, S. and Hartel, P.H. and Jonker, W. and Nikova, S.I. (2011) Privacy Enhanced Access Control by Means of Policy Blinding. In: Proceedings of the 7th International Conference on Information Security Practice and Experience, ISPEC 2011, 30 May - 1 Jun 2011, Guangzhou, China. pp. 108-122. Lecture Notes in Computer Science 6672. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-21030-3

2010

Ibraimi, L. and Nikova, S.I. and Jonker, W. and Hartel, P.H. (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. Technical Report TR-CTIT-10-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 1 (2). pp. 1-21. ISSN 1947-3133
Kelkboom, E.J.C. and Garcia Molina, G. and Breebaart, J. and Veldhuis, R.N.J. and Kevenaar, T.A.M. and Jonker, W. (2010) Binary Biometrics: An Analytic Framework to Estimate the Performance Curves Under Gaussian Assumption. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, 40 (3). pp. 555-571. ISSN 1083-4427
van Liesdonk, P. and Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2010) Computationally Efficient Searchable Symmetric Encryption. In: Proceedings of the Seventh International Workshop on Secure Data Management, SDM 2010, 17 Sep 2010, Singapore. pp. 87-100. Lecture Notes in Computer Science (6358). Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-15545-1
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. Technical Report TR-CTIT-10-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2010) Searching Keywords with Wildcards on Encrypted Data. In: Proceedings of the Seventh international Conference on Security and Cryptography for Networks (SCN), 13-15 September 2010, Amalfi, Italy. pp. 138-153. Lecture Notes in Computer Science 6280. Springer Verlag. ISBN 978-3-642-15316-7

2009

Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and its Application (extended version). Technical Report TR-CTIT-09-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: Information Security Applications, 25-27 August 2009, Busan, Korea. pp. 309-323. Lecture Notes in Computer Science 5932/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10837-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th Information Security Practice and Experience Conference (ISPEC), 12-15 April 2009, Xi'an, China. pp. 1-12. Lecture Notes in Computer Science 5451. Springer. ISSN 0302-9743 ISBN 978-3-642-00842-9
Jonker, W. and Brinkman, R. and Maubach, S. (2009) Secure storage system and method for secure storing. Patent WO2007125454 (Assigned).
Jonker, W. and Petkovic, M. (2009) Preface. Journal of Computer Security, 17 (1). pp. 1-3. ISSN 0926-227X
Saffarian, M. and Tang, Qiang and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. Technical Report TR-CTIT-09-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and van Liesdonk, P. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2009) Adaptively Secure Computationally Efficient Searchable Symmetric Encryption. Technical Report TR-CTIT-09-13, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China. pp. 332-347. Lecture Notes in Computer Science 5487. Springer Verlag. ISBN 978-3-642-01439-0

2008

Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. Technical Report TR-CTIT-08-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: Proceedings of the 5th VLDB Workshop, SDM 2008, August 24, 2008, Auckland, New Zealand. pp. 185-198. Lecture Notes in Computer Science 5159. Springer Verlag. ISBN 978-3-540-85258-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Technical Report TR-CTIT-08-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Kelkboom, E.J.C. and Garcia Molina, G. and Kevenaar, T.A.M. and Veldhuis, R.N.J. and Jonker, W. (2008) Binary Biometrics: An Analytic Framework to Estimate the Bit Error Probability under Gaussian Assumption. In: Biometrics: Theory, Applications and BTAS 2008. 2nd IEEE International Conference on Biometrics: Theory Applications and Systems, 2008., 29 Sep - 1 Oct 2008, Washington, USA. pp. 1-6. IEEE Computer Society. ISBN 978-1-4244-2729-1
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption (Extended Version). Technical Report TR-CTIT-08-50, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Sedghi, S. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2008) Towards an Information Theoretic Analysis of Searchable Encryption. In: 10th international conference on information and communication security, 20-22 Oct 2008, Birmingham, UK. pp. 345-360. Lecture Notes in Computer Science 5308. Springer. ISSN 0302-9743 ISBN 978-3-540-88624-2
Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. Technical Report TR-CTIT-08-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2008) Method of Key Management. Patent WO2008026184 (Assigned).
Zych, A.K. and Petkovic, M. and Jonker, W. (2008) Efficient key management for cryptographically enforced access control. Computer Standards & Interfaces, 30 (6). pp. 410-417. ISSN 0920-5489 *** ISI Impact 1,268 ***

2007

Jonker, W. (2007) An Introduction to Digital Rights Management Systems. In: Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 257-265. ISBN 978-3-540-69860-9
Jonker, W. and Brinkman, R. and Maubach, S. (2007) Secure storage system and method for secure storing. Patent WO2007125454 (Application).
Koster, P. and Jonker, W. (2007) Digital Rights Management. In: Multimedia Retrieval. Data-Centric Systems and Applications. Springer Verlag, Berlin, pp. 321-346. ISBN 978-3-540-72894-8
Mihajlovic, V. and Petkovic, M. and Jonker, W. and Blanken, H.M. (2007) Multimodal content-based video retrieval. In: Multimedia Retrieval. Data-Centric Systems and Applications. Springer Verlag, Berlin, pp. 271-294. ISBN 978-3-540-72894-8
Petkovic, M. and Conrado, C. and Schrijen, G.-J. and Jonker, W. (2007) Enhancing Privacy for Digital Rights Management. In: Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 347-364. ISBN 978-3-540-69860-9
Petkovic, M. and Jonker, W. (2007) Privacy and Security Issues in a Digital World. In: Security, Privacy, and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, pp. 3-10. ISBN 978-3-540-69860-9
Petkovic, M. and Jonker, W. (2007) Preface. In: Security, Privacy and Trust in Modern Data Management. Data-Centric Systems and Applications XVIII. Springer Verlag, Berlin, VII-X. ISBN 978-3-540-69860-9
Petkovic, M. and Jonker, W. and Blanken, H.M. (2007) A spatio-temporal and a probabilistic approach for video retrieval. In: Multimedia Retrieval. Data-Centric Systems and Applications. Springer Verlag, Berlin, pp. 251-270. ISBN 978-3-540-72894-8
Zych, A.K. and Petkovic, M. and Jonker, W. (2007) The Interval Revocation Scheme for Broadcasting Messages to Stateless Receivers. In: 21st Annual IFIP WG 11.3 Working Conference on Data and Applications Security, July 8-11, 2007, Redondo Beach, CA, USA. pp. 95-97. Springer. ISBN 978-3-540-73533-5
Zych, A.K. and Petkovic, M. and Jonker, W. (2007) A Key Management Method for Cryptographically Enforced Access Control. In: 5th International Workshop on Security in Information Systems (WoSIS), Funchal, Madeira. pp. 9-22. INSTICC Press. ISBN 978-972-8865-96-2

2006

Smiljanic, M. and van Keulen, M. and Jonker, W. (2006) Using Element Clustering to Increase the Efficiency of XML Schema Matching. In: Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW 2006), 3 Apr 2006, Atlanta, Georgia. 45. IEEE Computer Society. ISBN 0-7695-2571-7
Smiljanic, M. and van Keulen, M. and Jonker, W. (2006) Effectiveness Bounds for Non-Exhaustive Schema Matching Systems. In: Proceedings of the 22nd International Conference on Data Engineering Workshops (ICDEW'06), 7 Apr 2006, Atlanta, Georgia. 83. IEEE Computer Society. ISBN 0-7695-2571-7
Zych, A.K. and Doumen, J.M. and Jonker, W. and Hartel, P.H. and Petkovic, M. (2006) Method of Key Management. Patent PH006387, WO-IB2007/053498, EP-06119878.4 (Application).

2005

Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. Technical Report TR-CTIT-05-37, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Schoenmakers, B. and Doumen, J.M. and Jonker, W. (2005) Experiments With Queries Over Encrypted Data Using Secret Sharing. In: VLDB Workshop on Secure Data Management (SDM), September 2-3, 2005, Trondheim, Norway. pp. 33-46. Lecture Notes in Computer Science 3674. Springer-Verlag. ISBN 3-540-28798-1
Jonker, W. and Brinkman, R. and Doumen, J.M. and Schoenmakers, B. (2005) Method of and device for querying of protected structured data. Patent WO2005116792 (Assigned).
Smiljanic, M. and van Keulen, M. and Jonker, W. (2005) Formalizing the XML Schema Matching Problem as a Constraint Optimization Problem. In: Proceedings of the 16th International Conference on Database and Expert Systems Applications (DEXA2005), 22-26 Aug 2005, Copenhagen, Denmark. pp. 333-342. Lecture Notes in Computer Science 3588. Springer. ISSN 0302-9743 ISBN 978-3-540-28566-3
Wombacher, A. and Wieringa, R.J. and Jonker, W. and Knežević, P. and Pokraev, S.V. (2005) Requirements for Secure Logging of Decentralized Cross-Organizational Workflow Executions. In: On the Move to Meaningful Internet Systems 2005: OTM 2005 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, GADA, MIOS+INTEROP, ORM, PhDS, SeBGIS, SWWS, and WOSE 2005, Agia Napa, Cyprus, 31 Oct - 4 Nov 2005, Agia Napa, Cyprus. pp. 526-536. Lecture Notes in Computer Science 3762. Springer. ISSN 0302-9743 ISBN 978-3-540-29739-0
Zych, A.K. and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2005) A Diffie-Hellman based Key Management Scheme for Hierarchical Access Control. Technical Report TR-CTIT-05-57, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625

2004

Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. Technical Report TR-CTIT-04-35, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Doumen, J.M. and Jonker, W. (2004) Using secret sharing for searching in encrypted data. In: Workshop on Secure Data Management in a Connected World (SDM), 30 Aug 2004, Toronto, Canada. pp. 18-27. Lecture Notes in Computer Science 3178. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-22983-3
Brinkman, R. and Doumen, J.M. and Jonker, W. and Schoenmakers, B. (2004) Method of and device for querying of protected structured data. Patent PHNL040611 US (Application).
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Technical Report TR-CTIT-04-15, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. Information Systems Security Journal, 13 (3). pp. 14-21. ISSN 1065-898X
Brinkman, R. and Feng, Ling and Doumen, J.M. and Hartel, P.H. and Jonker, W. (2004) Efficient Tree Search in Encrypted Data. In: Proceedings of the 2nd International Workshop on Security In Information Systems (WOSIS), 13-14 Apr 2004, Porto, Portugal. pp. 126-135. INSTICC Press. ISBN 972-8865-07-4
Doumen, J.M. and Brinkman, R. and Jonker, W. (2004) Searching in Encrypted Data. In: Finite Fields: Theory and Applications, 5-11 Dec 2004, Oberwolfach, Germany. pp. 2951-2951. Oberwolfach Reports 54/2004. European Mathematical Society. ISSN 1660-8933
Feng, Ling and Apers, P.M.G. and Jonker, W. (2004) Towards Context-Aware Data Management for Ambient Intelligence. In: Proceedings of the 15th International Conference on Database and Expert Systems Applications (DEXA 2004), Aug 30-Sep 3, 2004, Zaragoza, Spain. pp. 422-431. Lecture Notes in Computer Science 3180. Springer-Verlag. ISBN 3-540-22936-1
Feng, Ling and Jonker, W. (2004) Preparations for Encrypted XML Metadata Querying. International Journal of Computer Systems Science & Engineering, 19 (3/4). pp. 95-103. ISSN 0267-6192 *** ISI Impact 0,291 ***
Smiljanic, M. and van Keulen, M. and Jonker, W. (2004) Defining the XML Schema Matching Problem. Technical Report TR-CTIT-04-17, Centre for Telematics and Information Technology University of Twente, Enschede, The Netherlands. ISSN 1381-3625

2003

Boldareva, L. and Hiemstra, D. and Jonker, W. (2003) Relevance feedback in probabilistic multimedia retrieval. In: Proceedings of the DELOS Workshop on Multimedia Contents in Digital Libraries, 2-3 Jun 2003, Chania, Crete, Greece.
Brinkman, R. and Feng, Ling and Etalle, S. and Hartel, P.H. and Jonker, W. (2003) Experimenting with linear search in encrypted data. Technical Report TR-CTIT-03-43, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. Technical Report TR-CTIT-03-16, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Chong, Chuen Ngen and Corin, R.J. and Etalle, S. and Hartel, P.H. and Jonker, W. and Law, Yee Wei (2003) LicenseScript: A Novel Digital Rights Language and its Semantics. In: 3rd Int. Conf. on Web Delivering of Music (WEDELMUSIC), Leeds, UK. pp. 122-129. IEEE Computer Society. ISBN 0-7695-1935-0
Feng, Ling and Jonker, W. (2003) Efficient Processing of Secured XML Metadata. In: On The Move to Meaningful Internet Systems 2003: OTM 2003 Workshops, 3-7 November 2003, Catania, Sicily, Italy. pp. 704-717. Lecture Notes in Computer Science 2889. Springer-Verlag. ISSN 0302-9743 ISBN 3-540-20494-6
Hiemstra, D. and de Vries, A.P. and Blok, H.E. and van Keulen, M. and Jonker, W. and Kersten, M.L. (2003) CIRQUID: Complex Information Retrieval QUeries In a Database. Technical Report TR-CTIT-03-26, Centre for Telematics and Information Technology University of Twente, Enschede, The Netherlands. ISSN 1381-3625
Jonker, W. (2003) XML and Secure Data Management in an Ambient World. International Journal of Computer Systems Science & Engineering, 18 (5). pp. 311-317. ISSN 0267-6192 *** ISI Impact 0,291 ***
Petkovic, M. and Jonker, W. (2003) Content-Based Video Retrieval: A Database Perspective. Multimedia Systems and Applications 25. Springer Verlag, Berlin. ISBN 1-4020-7617-7
Petkovic, M. and Mihajlovic, V. and Jonker, W. (2003) Techniques for Automatic Video Content Derivation. In: Proceedings of the International Conference on Image Processing (ICIP 2003), 14-18 Sep 2003, Barcelona, Spain. pp. 611-614. IEEE Conference Proceedings. IEEE Computer Society. ISSN 1522-4880 ISBN 0-7803-7750-8
Smiljanic, M. and Feng, Ling and Jonker, W. (2003) Web-Based Distributed XML Query Processing. In: Intelligent Search on XML Data: Applications, Languages, Models, Implementations, and Benchmarks. Lecture Notes in Computer Science 2818. Springer, Berlin, Germany, pp. 207-216. ISBN 978-3-540-40768-3
Zivkovic, Z. and Petkovic, M. and van Keulen, M. and van der Heijden, F. and Jonker, W. and Rijnierse, E. (2003) Two Video Analysis Applications Using Foreground/Background Segmentation. In: Proceedings of the VIE2003 Conference on Visual Information Engineering, 7-9 Jul 2003, Surrey, Guildford, UK. pp. 310-313. IEEE Conference Proceedings 495. IEEE Computer Society. ISSN 0537-9989 ISBN 0-85296-757-8

2002

Boldareva, L. and Hiemstra, D. and Jonker, W. (2002) A scalable and efficient content-based multimedia retrieval system. In: Proceedings of the Third Dutch-Belgian Information Retrieval Workshop (DIR 2002), 6 Dec 2002, Leuven, Belgium. pp. 28-37. KU Leuven.
van den Heuvel, S.A.F.A. and Jonker, W. and Kamperman, F.L.A.J. and Lenoir, P.J. (2002) Secure content management in authorised domains. In: Int. Broadcasting Convention (IBC), Amsterdam, The Netherlands. pp. 467-474. Broadcastpapers Pty Ltd.
Petkovic, M. and Jonker, W. (2002) Cobra: A Content-Based Video Retrieval System. In: Advances in Database Technology - EDBT 2002 : 8th International Conference on Extending Database Technology, 25-27 Mar 2002, Prague, Czech Republic. pp. 736-738. Lecture Notes in Computer Science 2287. Springer Verlag. ISSN 0302-9743
Petkovic, M. and Jonker, W. and Mihajlovic, V. (2002) Extending a DBMS to Support Content-Based Video Retrieval: A Formula 1 Case Study. In: XML-Based Data Management and Multimedia Engineering - EDBT 2002: EDBT 2002 Workshops XMLDM, MDDE, and YRWS, 24-28 Mar 2002, Prague, Czech Republic. pp. 318-341. Lecture Notes in Computer Science 2490. Springer Verlag. ISSN 0302-9743
Petkovic, M. and Mihajlovic, V. and Jonker, W. and Djordjevic-Kajan, S. (2002) Multi-Modal Extraction of Highlights from TV Formula 1 Programs. In: Proceedings of the IEEE International Conference on Multimedia and Expo (ICME 2002), 26-29 Aug 2002, Lausanne, Switzerland. pp. 817-820. IEEE Computer Society. ISBN 0-7803-7304-9
Petkovic, M. and Windhouwer, M.A. and van Zwol, R. and Blok, H.E. and Apers, P.M.G. and Kersten, M.L. and Jonker, W. (2002) Content-based Video Indexing for the Support of Digital Library Search. In: Proceedings of the 18th International Conference on Data Engineering (ICDE 2002), 26 Feb - 1 Mar 2002, San Jose, CA, USA. pp. 494-495. IEEE Computer Society. ISSN 1063-6382
Smiljanic, M. and Blanken, H.M. and van Keulen, M. and Jonker, W. (2002) Distributed XML Database Systems. Technical Report TR-CTIT-02-46, Centre for Telematics and Information Technology University of Twente, Enschede, The Netherlands. ISSN 1381-3625

2001

Blok, H.E. and Windhouwer, M.A. and van Zwol, R. and Petkovic, M. and Apers, P.M.G. and Kersten, M.L. and Jonker, W. (2001) Flexible and scalable digital library search. In: Proceedings of the 27th International Conference on Very Large Data Bases (VLDB 2001), 11-14 Sep 2001, Rome, Italy. pp. 705-706. Morgan Kaufmann Publishers Inc.. ISBN 1-55860-804-4
Derks, W.L.A. and Dehnert, J. and Grefen, P.W.P.J. and Jonker, W. (2001) Customized Atomicity Specification for Transactional Workflows. In: 3rd International Symposium on Cooperative Database Systems for Advanced Applications (CODAS), 23-24 Apr 2001, Beijing, China. pp. 140-147. IEEE Computer Society. ISBN 0769511287
Petkovic, M. and Jonker, W. (2001) Content-Based Retrieval of Spatio-Temporal Video Events. In: Managing Information Technology in a Global Economy: Proceedings of the 12th Information Resources Management Association International Conference (IRMA 2001), May 2001, Toronto, Canada. Idea Group Publishing. ISBN 1-930708-07-6
Petkovic, M. and Jonker, W. and Zivkovic, Z. (2001) Recognizing Strokes in Tennis Videos Using Hidden Markov Models. In: Proceedings of the IASTED International Conference on Visualization, Imaging and Image Processing (VIIP 2001), 3-5 Sep 2001, Marbella, Spain. pp. 512-516. ACTA Press. ISBN 0-88986-309-1
Wijnands, J.E.P. and Dijkstra, S.J. and Derks, W.L.A. and Jonker, W. (2001) Experimenting NT Cluster Technology for Massive CDR Processing. In: Databases in Telecommunications II : Proceedings of the VLDB 2001 International Workshop (DBTel 2001), 10 Sep 2001, Rome, Italy. pp. 19-36. Lecture Notes in Computer Science 2209. Springer Verlag. ISBN 978-3-540-42623-3
Zivkovic, Z. and van der Heijden, F. and Petkovic, M. and Jonker, W. (2001) Image Segmentation and Feature Extraction for Recognizing Strokes in Tennis Game Videos. In: Proceedings 7th Annual Conference on the Advanced School for Computing and Imaging (ASCI 2001), 30 May - 1 June 2001, Heijen, The Netherlands. ASCI. ISBN 90-803086-6-8

2000

Derks, W.L.A. and Dehnert, J. and Grefen, P.W.P.J. and Jonker, W. (2000) Customized atomicity specification for transactional workflows. Technical Report TR-CTIT-00-24, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Petkovic, M. and Jonker, W. (2000) A Framework for Video Modeling. In: Eighteenth IASTED International Conference Applied Informatics (AI 2000), 14-17 Feb 2000, Innsbruck, Austria. ACTA Press.
Petkovic, M. and Jonker, W. (2000) An Overview of Data Models and Query Languages for Content-based Video Retrieval. (Invited) In: International Conference on Advances in Infrastructure for E-Business, Science, and Education on the Internet, 31 Jul - 6 Aug 2000, l'Aquila, Italy. Scuola Superiore G. Reiss Romoli. ISBN 88-85280-52-8

1998

Jonker, W. and Grefen, P.W.P.J. (1998) Koppeling Workflow-Systemen Essentieel voor Virtuele Organisaties. Automatisering gids, 1998 (29/30). pp. 19-19. ISSN 0165-4683
Woudstra, A. and Velthausz, D.D. and de Poot, H.J.G. and Moelaart El-Hadidy, F. and Jonker, W. and Houtsma, M.A.W. and Heller, R.G. and Heemskerk, J.N.H. (1998) Modelling and Retrieving Audiovisual Information - A Soccer Video Retrieval System. In: Proceedings of the 4th International Workshop on Advances in Multimedia Information Systems (MIS 1998), 24-26 Sep 1998, Istanbul, Turkey. pp. 161-173. Lecture Notes in Computer Science 1508. Springer Verlag. ISSN 0302-9743

1997

Nijenhuis, R.W. and Jonker, W. and Grefen, P.W.P.J. (1997) Supporting Telecom Business Processes by means of Workflow Management and Federated Databases. Technical Report TR-CTIT-97-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Nijenhuis, R.W. and Jonker, W. and Grefen, P.W.P.J. (1997) Supporting Telecom Business Processes by Means of Workflow Management and Federated Databases. In: Proceedings of the 3rd Americas Conference on Information Systems (AMCIS 1997), 15-17 Aug 1997, Indianapolis, USA. pp. 464-466. Association for Information Systems. ISBN not assigned
Contact: jonker@ewi.utwente.nl