Bharat K. Bhargava

Orcid: 0000-0003-3803-8672

Affiliations:
  • Purdue University, Department of Computer Science, West Lafayette, IN, USA


According to our database1, Bharat K. Bhargava authored at least 309 papers between 1973 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service.
IEEE Trans. Veh. Technol., July, 2024

A Hybrid Deep Reinforcement Learning Approach for Jointly Optimizing Offloading and Resource Management in Vehicular Networks.
IEEE Trans. Veh. Technol., 2024

EMERSK -Explainable Multimodal Emotion Recognition With Situational Knowledge.
IEEE Trans. Multim., 2024

RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic Algorithm.
IEEE Trans. Inf. Forensics Secur., 2024

Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking.
IEEE Trans. Dependable Secur. Comput., 2024

A Framework of High-Speed Network Protocol Fuzzing Based on Shared Memory.
IEEE Trans. Dependable Secur. Comput., 2024

Quantitative Evaluation of Extensive Vulnerability Set Using Cost Benefit Analysis.
IEEE Trans. Dependable Secur. Comput., 2024

ABAUS: Active Bundle AUthentication Solution Based on SDN for Vehicular Networks.
IEEE Access, 2024

2023
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain.
IEEE/ACM Trans. Netw., August, 2023

Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023

An Attack to One-Tap Authentication Services in Cellular Networks.
IEEE Trans. Inf. Forensics Secur., 2023

Hunting for Insider Threats Using LSTM-Based Anomaly Detection.
IEEE Trans. Dependable Secur. Comput., 2023

AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023

Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense.
IEEE Trans. Dependable Secur. Comput., 2023


2022
RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.
IEEE Trans. Serv. Comput., 2022

A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Defending Trace-Back Attack in 3D Wireless Internet of Things.
IEEE/ACM Trans. Netw., 2022

PassGoodPool: Joint Passengers and Goods Fleet Management With Reinforcement Learning Aided Pricing, Matching, and Route Planning.
IEEE Trans. Intell. Transp. Syst., 2022

AdaPool: A Diurnal-Adaptive Fleet Management Framework Using Model-Free Deep Reinforcement Learning and Change Point Detection.
IEEE Trans. Intell. Transp. Syst., 2022

Decision Making in Monopoly Using a Hybrid Deep Reinforcement Learning Approach.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

Bio-Inspired Formal Model for Space/Time Virtual Machine Randomization and Diversification.
IEEE Trans. Cloud Comput., 2022

1174: futuristic trends and innovations in multimedia systems using big data, IoT and cloud technologies (FTIMS).
Multim. Tools Appl., 2022

Device fingerprinting using deep convolutional neural networks.
Int. J. Commun. Networks Distributed Syst., 2022

Applying Machine Learning and Data Fusion to the "Missing Person" Problem.
Computer, 2022

Information theoretic approach to detect collusion in multi-agent games.
Proceedings of the Uncertainty in Artificial Intelligence, 2022

2021
Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment.
Wirel. Pers. Commun., 2021

Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage.
IEEE Trans. Serv. Comput., 2021

A Distributed Model-Free Ride-Sharing Approach for Joint Matching, Pricing, and Dispatching Using Deep Reinforcement Learning.
IEEE Trans. Intell. Transp. Syst., 2021

Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs.
IEEE Trans. Inf. Forensics Secur., 2021

Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs.
CoRR, 2021

Learning Monopoly Gameplay: A Hybrid Model-Free Deep Reinforcement Learning and Imitation Learning Approach.
CoRR, 2021

Dataset Augmentation with Generated Novelties.
Proceedings of the Third International Conference on Transdisciplinary AI, 2021

Auditable serverless computing for farm management.
Proceedings of the BiDEDE '21: Proceedings of the International Workshop on Big Data in Emergent Distributed Environments, 2021

Towards situational awareness with multimodal streaming data fusion: serverless computing approach.
Proceedings of the BiDEDE '21: Proceedings of the International Workshop on Big Data in Emergent Distributed Environments, 2021

Securing Intelligent Autonomous Systems Through Artificial Intelligence.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

Novelty Detection and Adaptation: A Domain Agnostic Approach.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

Workshop on Novelties in Open World - Abstract.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

Real Application of Machine Learning (REALM): Situation Knowledge on Demand (SKOD); - Abstract.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021

2020
Device Fingerprinting using Deep Convolutional Neural Networks.
Dataset, December, 2020

Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2020

From Byzantine Fault-Tolerance to Fault-Avoidance: An Architectural Transformation to Attack and Failure Resiliency.
IEEE Trans. Cloud Comput., 2020

Special issue on networking technologies for sustainable computing.
Sustain. Comput. Informatics Syst., 2020

ConFoc: Content-Focus Protection Against Trojan Attacks on Neural Networks.
CoRR, 2020

AdaPool: An Adaptive Model-Free Ride-Sharing Approach for Dispatching using Deep Reinforcement Learning.
Proceedings of the BuildSys '20: The 7th ACM International Conference on Systems for Energy-Efficient Buildings, 2020

A Distributed Model-Free Ride-Sharing Algorithm with Pricing using Deep Reinforcement Learning.
Proceedings of the CSCS '20: Computer Science in Cars Symposium, 2020

Knowledge Graphs for Semantic-Aware Anomaly Detection in Video.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020

2019
EPICS: A Framework for Enforcing Security Policies in Composite Web Services.
IEEE Trans. Serv. Comput., 2019

A Blockchain-Enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing.
IEEE Trans. Ind. Informatics, 2019

Big Data Analytics for Cyber Security.
Secur. Commun. Networks, 2019

MioStream: a peer-to-peer distributed live media streaming on the edge.
Multim. Tools Appl., 2019

A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation.
IEEE Access, 2019

WIP - SKOD: A Framework for Situational Knowledge on Demand.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

Safe and Efficient UAV Navigation Near an Airport.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Flex Transactions.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing.
IEEE Trans. Ind. Informatics, 2018

Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing.
IEEE Trans. Inf. Forensics Secur., 2018

Adaptive Security for Intelligent Transport System Applications.
IEEE Intell. Transp. Syst. Mag., 2018

Source-location privacy full protection in wireless sensor networks.
Inf. Sci., 2018

A self-protecting agents based model for high-performance mobile-cloud computing.
Comput. Secur., 2018

Impacts of Security Attacks on The Effectiveness of Collaborative Adaptive Cruise Control Mechanism.
Proceedings of the IEEE International Smart Cities Conference, 2018

Incremental Learning through Graceful Degradations in Autonomous Systems.
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018

Secure Data Communication in Autonomous V2X Systems.
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018

Autonomous Aggregate Data Analytics in Untrusted Cloud.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

Scalable Deep Learning through Fuzzy-Based Clustering in Autonomous Systems.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

Machine Learning Models to Enhance the Science of Cognitive Autonomy.
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018

(WIP) Blockhub: Blockchain-Based Software Development System for Untrusted Environments.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
On the Security of Data Access Control for Multiauthority Cloud Storage Systems.
IEEE Trans. Serv. Comput., 2017

RaaS and Hierarchical Aggregation Revisited.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Adaptable Safety and Security in V2X Systems.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks.
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017

An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Privacy-Preserving Data Dissemination in Untrusted Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

A Monitoring Approach for Policy Enforcement in Cloud Services.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

An End-to-End Dynamic Trust Framework for Service-Oriented Architecture.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

End-to-End Policy Monitoring and Enforcement for Service-Oriented Architecture.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016

SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems.
Comput. Secur., 2016

Tamper-resistant autonomous agents-based mobile-cloud computing.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Privacy Preserving Access Control in Service-Oriented Architecture.
Proceedings of the IEEE International Conference on Web Services, 2016

Disruption-resilient Publish and Subscribe.
Proceedings of the CLOSER 2016, 2016

Mayflies: A Moving Target Defense Framework for Distributed Systems.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Consumer Oriented Privacy Preserving Access Control for Electronic Health Records in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A Computational Dynamic Trust Model for User Authorization.
IEEE Trans. Dependable Secur. Comput., 2015

Towards Targeted Intrusion Detection Deployments in Cloud Computing.
Int. J. Next Gener. Comput., 2015

Incorporating attacker capabilities in risk estimation and mitigation.
Comput. Secur., 2015

RADical Strategies for Engineering Web-Scale Cloud Solutions.
IEEE Cloud Comput., 2015

Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Hierarchical Aggregation of Consumer Ratings for Service Ecosystem.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Towards Dynamic QoS Monitoring in Service Oriented Architectures.
Proceedings of the CLOSER 2015, 2015

A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud Computing.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Extending the Agile Development Process to Develop Acceptably Secure Software.
IEEE Trans. Dependable Secur. Comput., 2014

A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Netw. Comput. Appl., 2014

An Introduction to the Enterprise-Participant (EP) Data Model.
Int. J. Next Gener. Comput., 2014

Likelihood of Threats to Connected Vehicles.
Int. J. Next Gener. Comput., 2014

Formal Theory for Security Protocol Analysis of Distributed Denial of Service.
Int. J. Next Gener. Comput., 2014

k-anonymity Chord for Anonymous Query Response.
Int. J. Next Gener. Comput., 2014

Multilabels-Based Scalable Access Control for Big Data Applications.
IEEE Cloud Comput., 2014

Securing Big Data Applications in the Cloud [Guest editors' introduction].
IEEE Cloud Comput., 2014

An experimental study of hybrid energy-aware scheduling in a cloud testbed.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks.
Wirel. Pers. Commun., 2013

SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems.
IEEE Trans. Dependable Secur. Comput., 2013

Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model.
Secur. Commun. Networks, 2013

Editorial for Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing".
Mob. Networks Appl., 2013

A Survey of Computation Offloading for Mobile Systems.
Mob. Networks Appl., 2013

An Agent-based Optimization Framework for Mobile-Cloud Computing.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013

A time-evolution model for the privacy degree of information disseminated in online social networks.
Int. J. Commun. Networks Distributed Syst., 2013

Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Case for Societal Digital Security Culture.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Protecting PLM Data Throughout Their Lifecycle.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

Analysis of End-to-End SOA Security Protocols with Mobile Devices.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

2012
Extending Attack Graph-Based Security Metrics and Aggregating Their Application.
IEEE Trans. Dependable Secur. Comput., 2012

A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs.
Int. J. Next Gener. Comput., 2012

Private Anonymous Messaging.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

An End-to-End Security Auditing Approach for Service Oriented Architectures.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Local geometric algorithm for hole boundary detection in sensor networks.
Secur. Commun. Networks, 2011

A Kolmogorov Complexity Approach for Measuring Attack Path Complexity.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

2010
Congestion Avoidance Routing Protocol for Ad-Hoc Networks.
Int. J. Next Gener. Comput., 2010

Protection of Identity Information in Cloud Computing without Trusted Third Party.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach.
Proceedings of the 17th International Conference on Telecommunications, 2010

2009
Flex Transactions.
Proceedings of the Encyclopedia of Database Systems, 2009

Self-Learning Disk Scheduling.
IEEE Trans. Knowl. Data Eng., 2009

Collaborative attacks in WiMAX networks.
Secur. Commun. Networks, 2009

Maximizing network security given a limited budget.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Detection and filtering Spam over Internet Telephony - a user-behavior-aware intermediate-network-based approach.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Panel: Benefits and Pitfalls of Specialized Ad Hoc Networks and Systems (SAHNS).
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Adaptive Voice Spam Control with User Behavior Analysis.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Secure and efficient access to outsourced data.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks.
ACM Trans. Multim. Comput. Commun. Appl., 2008

Visualisation of wormholes in underwater sensor networks: a distributed approach.
Int. J. Secur. Networks, 2008

A role-based access in a hierarchical sensor network architecture to provide multilevel security.
Comput. Commun., 2008

Multi-hop Cross-Layer Design in Wireless Sensor Networks: A Case Study.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
On the Design of Perceptual MPEG-Video Encryption Algorithms.
IEEE Trans. Circuits Syst. Video Technol., 2007

Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks.
Int. J. Distributed Sens. Networks, 2007

Cheating in online auction - Towards explaining the popularity of English auction.
Electron. Commer. Res. Appl., 2007

Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

2006
Defending against wormhole attacks in mobile ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

A crossing-tier location update/paging scheme in hierarchical cellular networks.
IEEE Trans. Wirel. Commun., 2006

Trust-based privacy preservation for peer-to-peer data sharing.
IEEE Trans. Syst. Man Cybern. Part A, 2006

A scheme for privacy-preserving data dissemination.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee Networks.
IEEE Trans. Mob. Comput., 2006

Performance evaluation of multiple-rate mobile ad hoc networks.
Perform. Evaluation, 2006

Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Innovative Ideas in Privacy Research (Keynote Talk).
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

2005
Cross-Layer Algorithms for Video Transmission over Wireless Networks.
Proceedings of the Handbook of Algorithms for Wireless Networking and Mobile Computing., 2005

AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol.
IEEE Trans. Mob. Comput., 2005

A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005

CollectCast: A peer-to-peer service for media streaming.
Multim. Syst., 2005

Monitoring and controlling QoS network domains.
Int. J. Netw. Manag., 2005

Counteracting shill bidding in online english auction.
Int. J. Cooperative Inf. Syst., 2005

Multimedia data transmission and control using active networks.
Comput. Commun., 2005

Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Reliable broadcast in ZigBee networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005

Key distribution and update for secure inter-group multicast communication.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations.
Proceedings of the Distributed Computing and Internet Technology, 2005

2004
MPEG Video Encryption Algorithms.
Multim. Tools Appl., 2004

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA).
Mob. Networks Appl., 2004

MADF: Mobile-assisted data forwarding for wireless data networks.
J. Commun. Networks, 2004

The Pudding of Trust.
IEEE Intell. Syst., 2004

A hybrid architecture for cost-effective on-demand media streaming.
Comput. Networks, 2004

Edge-to-edge measurement-based distributed network monitoring.
Comput. Networks, 2004

Visualization of wormholes in sensor networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Peer-to-peer File-sharing over Mobile Ad hoc Networks.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

A simulation study on multi-rate mobile ad hoc networks.
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004

E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities.
Proceedings of the Trust Management, Second International Conference, 2004

Anonymizing Web Services through a Club Mechanism with Economic Incentives.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Vulnerabilities and Threats in Distributed Systems.
Proceedings of the Distributed Computing and Internet Technology, 2004

2003
On detecting service violations and bandwidth theft in QoS network domains.
Comput. Commun., 2003

Error Resilient Video Transmission over Wireless Networks.
Proceedings of the 1st IEEE Workshop on Software Technologies for Future Embedded Systems, 2003

On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Detecting Service Violations and DoS Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2003

A low-cost, low-delay location update/paging scheme in hierarchical cellular networks.
Proceedings of the Third ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2003

PROMISE: peer-to-peer media streaming using CollectCast.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

GnuStream: a P2P media streaming system prototype.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

On-Demand Media Streaming Over the Internet.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

Network Tomography-Based Unresponsive Flow Detection and Control.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

Autonomous Transaction Processing Using Data Dependency in Mobile Environments.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

Fraud Formalization and Detection.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003

2002
Replication Techniques in Distributed Systems
Advances in Database Systems 4, Kluwer, ISBN: 978-0-7923-9800-4, 2002

Heterogeneous CPU Services Using Differentiated Admission Control.
Multim. Tools Appl., 2002

Guest Editorial: Quality of Service in Multimedia Networks.
Multim. Tools Appl., 2002

Performance evaluation of linear hash structure model in a nested transaction environment.
J. Syst. Softw., 2002

Mobile data and transaction management.
Inf. Sci., 2002

Virtual Routers: A Tool for Emulating IP Routers.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Design and Implementation of a Python-Based Active Network Platform for Network Management and Control.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002

On Peer-to-Peer Media Streaming.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

A round trip time and time-out aware traffic conditioner for differentiated services networks.
Proceedings of the IEEE International Conference on Communications, 2002

An Algorithm for Building User-Role Profiles in a Trust Environment.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

Authorization Based on Evidence and Trust.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

PartJoin: An Efficient Storage and Query Execution for Data Warehouses.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

2001
Global Scheduling for Flexible Transactions in Heterogeneous Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2001

Formalization and Proof of Correctness of the Crash Recovery Algorithm for an Open and Safe Nested Transaction Model.
Int. J. Cooperative Inf. Syst., 2001

A Transaction Model to Improve Data Availability in Mobile Computing.
Distributed Parallel Databases, 2001

A Study of Communication Delays for Web Transactions.
Clust. Comput., 2001

Applying Fault-Tolerance Principles to Security Research.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Design and evaluation of an adaptive traffic conditioner for differentiated services networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
Editorial.
World Wide Web, 2000

Design and Analysis of an Integrated Checkpointing Recovery Scheme for Distributed Applications.
IEEE Trans. Knowl. Data Eng., 2000

A Communication Framework for Digital Libraries.
Multim. Tools Appl., 2000

Guest Editorial: Digital Libraries and Multimedia.
Multim. Tools Appl., 2000

An open and safe nested transaction model: concurrency and recovery.
J. Syst. Softw., 2000

Multi-level transaction model for semantic concurrency control in linear hash structures.
Inf. Softw. Technol., 2000

An adaptable constrained locking protocol for high data contention environments: correctness and performance.
Inf. Softw. Technol., 2000

Secured Web Access.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000

Experimental Evaluation of Design Tradeoff in Specialized Virtual Machine for Multimedia Traffic in Active Networks.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

An Adaptable Network Architecture for Multimedia Traffic Management and Control.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Fault Tolerant Authentication in Mobile Computing.
Proceedings of the International Conference on Internet Computing, 2000

Security in Data Warehousing.
Proceedings of the Data Warehousing and Knowledge Discovery, 2000

Data Organization Issues for Location-Dependent Queries in Mobile Computing.
Proceedings of the Current Issues in Databases and Information Systems, 2000

1999
Data Consistency in Intermittently Connected Distributed Systems.
IEEE Trans. Knowl. Data Eng., 1999

Concurrency Control in Database Systems.
IEEE Trans. Knowl. Data Eng., 1999

MPEG Video Encryption in Real-time Using Secret Key Cryptography.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Design and Implementation of Linear Hash Algorithm in a Nested Transaction Environment.
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

Experiments in Adaptable and Secure Multimedia Database Systems (Invited Paper).
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

An Adaptable Constrained Locking Protocol for High Data Contention Environments.
Proceedings of the Database Systems for Advanced Applications, 1999

1998
A Fragmentation Scheme for Multimedia Traffic in Active Networks.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

An Efficient MPEG Video Encryption Algorithm.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Design and Analysis of a Hardware-Assisted Checkpointing and Recovery Scheme for Distributed Applications.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

A Fast MPEG Video Encryption Algorithm.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

A Transaction Model for Mobile Computing.
Proceedings of the 1998 International Database Engineering and Applications Symposium, 1998

On the Correctness of a Transaction Model for Mobile Computing.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998

1997
On Relaxing Serializability by Constraining Transaction Readsets.
Inf. Syst., 1997

Crash Recovery in an Open and Safe Nested Transaction Model.
Proceedings of the Database and Expert Systems Applications, 8th International Conference, 1997

Multi-pass Transmission Policy: An Effective Method of Transmitting Large Multimedia Objects in the Wide-Area Network.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

Active Gateway: A Facility for Video Conferencing Traffic Control.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

System Defined Prewrites for Increasing Concurrency in Databases.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997

1996
Supporting Method Migration in a Distributed Object Database System: A Performance Study.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

An Introduction to Enterprise-Participant Data Model.
Proceedings of the Seventh International Workshop on Database and Expert Systems Applications, 1996

A Colour-Based Technique for Measuring Visible Loss for Use in Image Data Communication.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996

1995
A Framework for Providing Consistent and Recoverable Agent-Based Access to Heterogeneous in Mobile Databases.
SIGMOD Rec., 1995

Digital Library Services in Mobile Computing.
SIGMOD Rec., 1995

A View-Based Approach to Relaxing Global Serializability in a Multidatabase System (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

Maintaining Consistency of Data in Mobile Distributed Environments.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

A Layered Architecture for Supporting Objects in a Relational System: A Performance Study
Proceedings of the Database and Expert Systems Applications, 1995

Communication Costs in Digital Library Databases
Proceedings of the Database and Expert Systems Applications, 1995

A Study of Distributed Transaction Processing in an Internetwork.
Proceedings of the Information Systems and Data Management, 1995

1994
Multiple-Query Optimization at Algorithm-Level.
Data Knowl. Eng., 1994

Revising Transaction Conceptsf or Mobile Computing.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

Ensuring Relaxed Atomicity for Flexible Transactions in Multidatabase Systems.
Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data, 1994

DL-Raid: An Environment for Supporting Digital Library Services.
Proceedings of the Digital Libraries: Current Issues, 1994

Building Information Systems for Mobile Environments.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994

Re-Evaluating Indexing Schemes for Nested Objects.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994

1993
Transition From A Relation To Object Model Implementation.
Proceedings of the Advanced Database Systems, 1993

Push: An experimental facility for implementing distributed database services in operating systems.
J. Syst. Integr., 1993

Performance Study on Supporting Objects in O-Raid Distributed Database Systems.
Int. J. Cooperative Inf. Syst., 1993

O-Raid: Experiences and Experiments.
Proceedings of the International Conference on Intelligent and Cooperative Information Systems, 1993

Efficient Availability Mechanisms in Distributed Databases Systems.
Proceedings of the CIKM 93, 1993

1992
Object-Oriented Computing - Guest Editors' Introduction.
Computer, 1992

Integrating Distributed Data Sources Using Federated Objects.
Proceedings of the Distributed Object Management, 1992

1991
Analyzing Availability of Replicated Database Systems.
Int. J. Comput. Simul., 1991

Evolution of a Communication System for Distributed Transaction Processing in Raid.
Comput. Syst., 1991

Communication Facilities for Distributed Transaction-Processing Systems.
Computer, 1991

Communication in the Raid Distributed Database System.
Comput. Networks ISDN Syst., 1991

Experiences with Super, a Database Visual Environment.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991

1990
Adaptable Recovery Using Dynamic Quorum Assignments.
Proceedings of the 16th International Conference on Very Large Data Bases, 1990

Adaptility Experiments in the RAID Distributed Data Base System.
Proceedings of the Ninth Symposium on Reliable Distributed Systems, 1990

Implementing Object Support in the RAID Distributed Database System.
Proceedings of the First International Conference on Systems Integration, 1990

Experimental Evaluation of Concurrency Checkpointing and Rollback-Recovery Algorithms.
Proceedings of the Sixth International Conference on Data Engineering, 1990

Supporting queries in the O-Raid object-oriented database system.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1989
The Raid Distributed Database System.
IEEE Trans. Software Eng., 1989

A Model for Adaptable Systems for Transaction Processing.
IEEE Trans. Knowl. Data Eng., 1989

SETH: A Quorum-Based Database System for Experimentation with Failures.
Proceedings of the Fifth International Conference on Data Engineering, 1989

Implementation and Measurements of Efficient Communication Facilities for Distributed Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989

A model for concurrent checkpointing and recovery using transactions.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989

Engineering the Object-relation Database Model in O-Raid.
Proceedings of the Foundations of Data Organization and Algorithms, 1989

1988
Clarification of Two Phase Locking in Concurrent Transaction Processing.
IEEE Trans. Software Eng., 1988

A Dynamic majority determination algorithm for reconfiguration of network partitions.
Inf. Sci., 1988

Implementation of RAID.
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988

Independent Checkpointing and Concurrent Rollback for Recovery in Distributed Systems - An Optimistic Approach.
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988

Concurrent Robust Checkpointing and Recovery in Distributed Systems.
Proceedings of the Fourth International Conference on Data Engineering, 1988

An Experimental Analysis of Replicated Copy Control During Site Failure and Recovery.
Proceedings of the Fourth International Conference on Data Engineering, 1988

A Generic Algorithm for Transaction Processing During Network Partitioning.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1988

1987
Multidimensional Timestamp Protocols for Concurrency Control.
IEEE Trans. Software Eng., 1987

Transaction Processing and Consistency Control of Replicated Copies during Failures in Distributed Databases.
J. Manag. Inf. Syst., 1987

Experimental analysis of layered Ethernet software.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987

1986
RAID: a robust and adaptable distributed system.
Proceedings of the 2nd ACM SIGOPS European Workshop, 1986

Site Recovery in Replicated Distributed Database Systems.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986

1985
Database Integrity Block Construct: Concepts and Design Issues.
IEEE Trans. Software Eng., 1985

Reliability in Distributed Database Systems (Panel).
Proceedings of the 1985 ACM SIGMOD International Conference on Management of Data, 1985

1984
A Scheme for Batch Verification of Integrity Assertions in a Database System.
IEEE Trans. Software Eng., 1984

Performance evaluation of reliability control algorithms for distributed database systems.
J. Syst. Softw., 1984

1983
A Causal Model for Analyzing Distributed Concurrency Control Algorithms.
IEEE Trans. Software Eng., 1983

Analysis of the Majority Consensus Concurrency Control Algorithm for Correctness and Performance Using the Event Ordering Approach.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983

Cost Analysis of Selected Database Restoration Techniques.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

1982
Guest Editorial: Reliability Issues in Distributed Systems.
IEEE Trans. Software Eng., 1982

Classes of Serializable Histories and Synchronization Algorithms in Distributed Database Systems.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982

Performance Evaluation of the Optimistic Approach to Distributed Database Systems and Its Comparison to Locking.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982

1981
On optimal scheduling of integrity assertions in a transaction processing system.
Int. J. Parallel Program., 1981

Cost analysis of recovery block scheme and its implementation issues.
Int. J. Parallel Program., 1981

Feature analysis of selected database recovery techniques.
Proceedings of the American Federation of Information Processing Societies: 1981 National Computer Conference, 1981

Software reliability in real-time systems.
Proceedings of the American Federation of Information Processing Societies: 1981 National Computer Conference, 1981

1980
Design of Intelligent Query Systems for Large Databases.
Proceedings of the Pictorial Information Systems, 1980

1978
Characteristics And Problems Encountered In Different Database Applications (Panel Discussion).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978

Crossfertilization Of DBMS Research With Other Disciplines Of Computer Science (Panel Discussion).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978

1975
A clinical information system (CIS) for ambulatory care.
Proceedings of the American Federation of Information Processing Societies: 1975 National Computer Conference, 1975

1973
Tree Systems for Syntactic Pattern Recognition.
IEEE Trans. Computers, 1973


  Loading...