default search action
Onyeka Ezenwoye
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Onyeka Ezenwoye:
Mitigating Injection-Based Weaknesses: A Flexible Template Architecture. J. Object Technol. 23(1): 1 (2024) - [c31]Onyeka Ezenwoye, Eduard Pinconschi:
A Study of Fine-Tuned Language Models in Vulnerability Classification. ISDFS 2024: 1-6 - 2023
- [c30]Yi Liu, Onyeka Ezenwoye:
Use of SecureED as a Tool for Software Security Education: An Experience Report. FIE 2023: 1-7 - 2022
- [c29]Onyeka Ezenwoye, Yi Liu:
Integrating vulnerability risk into the software process. ACM Southeast Regional Conference 2022: 91-98 - [c28]Onyeka Ezenwoye, Yi Liu:
Risk-Based Security Requirements Model for Web Software. RE Workshops 2022: 232-237 - [i1]Onyeka Ezenwoye, Yi Liu:
Web Application Weakness Ontology Based on Vulnerability Data. CoRR abs/2209.08067 (2022) - 2021
- [c27]David Lee, Brandon Steed, Yi Liu, Onyeka Ezenwoye:
Tutorial: A Lightweight Web Application for Software Vulnerability Demonstration. SecDev 2021: 5-6 - [c26]Alok Chandrakant Ratnaparkhi, Onyeka Ezenwoye, Yi Liu:
From Vulnerability Anti-Patterns to Secure Design Patterns (S). SEKE 2021: 98-101 - 2020
- [c25]Onyeka Ezenwoye, Yi Liu, William Patten:
Classifying Common Security Vulnerabilities by Software Type. SEKE 2020: 61-64 - [c24]Drew Alexander, Thuy Nguyen, Patrick Keller, Jason Orlosky, Shilpa Brown, Elena Wood, Onyeka Ezenwoye, Wanda Jirau-Rosaly:
Design of Visual Deficit Simulation for Integration into a Geriatric Physical Diagnosis Course. VR Workshops 2020: 839-840
2010 – 2019
- 2019
- [c23]Jason Orlosky, Onyeka Ezenwoye, Heather Yates, Gina Besenyi:
A Look at the Security and Privacy of Fitbit as a Health Activity Tracker. ACM Southeast Regional Conference 2019: 241-244 - [c22]Onyeka Ezenwoye:
Integrating Security into Computer Science Curriculum. FIE 2019: 1-8 - 2018
- [c21]Onyeka Ezenwoye:
What Language? - The Choice of an Introductory Programming Language. FIE 2018: 1-8 - 2015
- [j3]Sung-Hwan Kim, Onyeka Ezenwoye, Hwan-Gue Cho, Keith D. Robertson, Jeong-Hyeon Choi:
iTagPlot: an accurate computation and interactive drawing tool for tag density plot. Bioinform. 31(14): 2384-2387 (2015) - [c20]Onyeka Ezenwoye, Seyed Masoud Sadjadi, Wei Wang:
Modeling and Simulating Reconfigurable Networked Service Composites. SCC 2015: 765-768 - 2014
- [c19]Onyeka Ezenwoye, S. Masoud Sadjadi:
A Look at Adaptability for Service Workflows. ICCAC 2014: 50-55 - 2013
- [c18]Onyeka Ezenwoye, Minakshi Pokharel:
Towards a Service for Machine Consumable Web Search Results. IEEE SCC 2013: 749-750 - 2010
- [j2]Onyeka Ezenwoye, M. Brian Blake, Gargi Dasgupta, Seyed Masoud Sadjadi, Selim Kalayci, Liana L. Fong:
Managing Faults for Distributed Workflows over Grids. IEEE Internet Comput. 14(2): 84-88 (2010) - [c17]Onyeka Ezenwoye, Bin Tang:
Monitoring Decentralized Interacting Services with a Global State Choreography Model. ICWS 2010: 671-672 - [c16]Selim Kalayci, Gargi Dasgupta, Liana Fong, Onyeka Ezenwoye, Seyed Masoud Sadjadi:
Distributed and Adaptive Execution of Condor DAGMan Workflows. SEKE 2010: 587-590 - [c15]Onyeka Ezenwoye, Salome Busi, Seyed Masoud Sadjadi:
Dynamically Reconfigurable Data-intensive Service Composition. WEBIST (1) 2010: 125-130
2000 – 2009
- 2009
- [c14]Onyeka Ezenwoye, Balaji Viswanathan, Seyed Masoud Sadjadi, Liana Fong, Gargi Dasgupta, Selim Kalayci:
Task Decomposition for Adaptive Data Staging in Workflows for Distributed Environments. SEKE 2009: 16-19 - 2008
- [j1]Onyeka Ezenwoye, Seyed Masoud Sadjadi:
A Proxy-Based Approach to Enhancing the Autonomic Behavior in Composite Services. J. Networks 3(5): 42-53 (2008) - [c13]Gargi Dasgupta, Onyeka Ezenwoye, Liana Fong, Selim Kalayci, Seyed Masoud Sadjadi, Balaji Viswanathan:
Runtime Fault-Handling for Job-Flow Management in Grid Environments. ICAC 2008: 201-202 - [c12]Selim Kalayci, Onyeka Ezenwoye, Balaji Viswanathan, Gargi Dasgupta, Seyed Masoud Sadjadi, Liana Fong:
Design and Implementation of a Fault Tolerant Job Flow Manager Using Job Flow Patterns and Recovery Policies. ICSOC 2008: 54-69 - [c11]Seyed Masoud Sadjadi, Liana Fong, Rosa M. Badia, Javier Figueroa, Javier Delgado, Xabriel J. Collazo-Mojica, Khalid Saleem, Raju Rangaswami, Shu Shimizu, Hector A. Duran-Limon, Pat Welsh, Sandeep Pattnaik, Anthony Praino, David Villegas, Selim Kalayci, Gargi Dasgupta, Onyeka Ezenwoye, Juan Carlos Martínez, Ivan Rodero, Shuyi Chen, Javier Muñoz, Diego R. López, Julita Corbalán, Hugh Willoughby, Michael McFail, Christine L. Lisetti, Malek Adjouadi:
Transparent grid enablement of weather research and forecasting. Mardi Gras Conference 2008: 39 - [c10]Onyeka Ezenwoye, Seyed Masoud Sadjadi:
A Language-based Approach to Addressing Reliability in Composite Web Services. SEKE 2008: 649-654 - [c9]Gargi Dasgupta, Onyeka Ezenwoye, Liana Fong, Selim Kalayci, Seyed Masoud Sadjadi, Balaji Viswanathan:
Design of a Fault-tolerant Job-flow Manager for Grid Environments Using Standard Technologies, Job-flow Patterns, and a Transparent Proxy. SEKE 2008: 814-819 - 2007
- [c8]Onyeka Ezenwoye, Seyed Masoud Sadjadi:
RobustBPEL2: Transparent Autonomization in Business Processes through Dynamic Proxies. ISADS 2007: 17-24 - [c7]Onyeka Ezenwoye, Seyed Masoud Sadjadi, Ariel Cary, Michael Robinson:
Grid Service Composition in BPEL for Scientific Applications. OTM Conferences (2) 2007: 1304-1312 - [c6]Onyeka Ezenwoye, Seyed Masoud Sadjadi:
TRAP/BPEL - A Framework for Dynamic Adaptation of Composite Services. WEBIST (1) 2007: 216-221 - 2006
- [c5]Onyeka Ezenwoye, Seyed Masoud Sadjadi:
Composing aggregate web services in BPEL. ACM Southeast Regional Conference 2006: 458-463 - [c4]Rosa M. Badia, Gargi Dasgupta, Onyeka Ezenwoye, Liana Fong, Howard Ho, Sawsan Khuri, Yanbin Liu, Steven Luis, Anthony Praino, Jean-Pierre Prost, Ahmed Radwan, Seyed Masoud Sadjadi, Shivkumar Shivaji, Balaji Viswanathan, Pat Welsh, Akmal A. Younis:
Innovative Grid Technologies Applied to Bioinformatics and Hurricane Mitigation. High Performance Computing Workshop 2006: 436-462 - [c3]Onyeka Ezenwoye, Seyed Masoud Sadjadi:
Enabling Robustness in Existing BPEL Processes. ICEIS (1) 2006: 95-102 - 2004
- [c2]Li Yang, Raimund K. Ege, Onyeka Ezenwoye, Qasem Kharma:
A Role-Based Access Control Model for Information Mediation. IRI 2004: 277-282 - [c1]Onyeka Ezenwoye, Raimund K. Ege, Li Yang, Qasem Kharma:
A mediation framework for multimedia delivery. MUM 2004: 251-256
Coauthor Index
aka: S. Masoud Sadjadi
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint