Bharat K. Bhargava

According to our database1, Bharat K. Bhargava
  • authored at least 241 papers between 1973 and 2017.
  • has a "Dijkstra number"2 of three.

Awards

IEEE Fellow

IEEE Fellow 1993, "For contributions to reliability, concurrency, and adaptability of distributed systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
On the Security of Data Access Control for Multiauthority Cloud Storage Systems.
IEEE Trans. Services Computing, 2017

RaaS and Hierarchical Aggregation Revisited.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017

Adaptable Safety and Security in V2X Systems.
Proceedings of the IEEE International Congress on Internet of Things, 2017

Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks.
Proceedings of the IEEE International Congress on Internet of Things, 2017

An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Privacy-Preserving Data Dissemination in Untrusted Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

A Monitoring Approach for Policy Enforcement in Cloud Services.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

An End-to-End Dynamic Trust Framework for Service-Oriented Architecture.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

End-to-End Policy Monitoring and Enforcement for Service-Oriented Architecture.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A Systematic Approach for Attack Analysis and Mitigation in V2V Networks.
JoWUA, 2016

SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems.
Computers & Security, 2016

Tamper-resistant autonomous agents-based mobile-cloud computing.
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016

Privacy Preserving Access Control in Service-Oriented Architecture.
Proceedings of the IEEE International Conference on Web Services, 2016

Disruption-resilient Publish and Subscribe.
Proceedings of the CLOSER 2016, 2016

Mayflies: A Moving Target Defense Framework for Distributed Systems.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Consumer Oriented Privacy Preserving Access Control for Electronic Health Records in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
A Computational Dynamic Trust Model for User Authorization.
IEEE Trans. Dependable Sec. Comput., 2015

Towards Targeted Intrusion Detection Deployments in Cloud Computing.
IJNGC, 2015

Incorporating attacker capabilities in risk estimation and mitigation.
Computers & Security, 2015

RADical Strategies for Engineering Web-Scale Cloud Solutions.
IEEE Cloud Computing, 2015

Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Hierarchical Aggregation of Consumer Ratings for Service Ecosystem.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Towards Dynamic QoS Monitoring in Service Oriented Architectures.
Proceedings of the CLOSER 2015, 2015

A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud Computing.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Extending the Agile Development Process to Develop Acceptably Secure Software.
IEEE Trans. Dependable Sec. Comput., 2014

A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Network and Computer Applications, 2014

An Introduction to the Enterprise-Participant (EP) Data Model.
IJNGC, 2014

Likelihood of Threats to Connected Vehicles.
IJNGC, 2014

Formal Theory for Security Protocol Analysis of Distributed Denial of Service.
IJNGC, 2014

k-anonymity Chord for Anonymous Query Response.
IJNGC, 2014

Multilabels-Based Scalable Access Control for Big Data Applications.
IEEE Cloud Computing, 2014

Securing Big Data Applications in the Cloud [Guest editors' introduction].
IEEE Cloud Computing, 2014

An experimental study of hybrid energy-aware scheduling in a cloud testbed.
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014

Using Assurance Cases to Develop Iteratively Security Features Using Scrum.
Proceedings of the Ninth International Conference on Availability, 2014

2013
A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks.
Wireless Personal Communications, 2013

SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems.
IEEE Trans. Dependable Sec. Comput., 2013

Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model.
Security and Communication Networks, 2013

Editorial for Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing".
MONET, 2013

A Survey of Computation Offloading for Mobile Systems.
MONET, 2013

An Agent-based Optimization Framework for Mobile-Cloud Computing.
JoWUA, 2013

A time-evolution model for the privacy degree of information disseminated in online social networks.
IJCNDS, 2013

Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013

A Case for Societal Digital Security Culture.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

Protecting PLM Data Throughout Their Lifecycle.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

Analysis of End-to-End SOA Security Protocols with Mobile Devices.
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013

2012
Extending Attack Graph-Based Security Metrics and Aggregating Their Application.
IEEE Trans. Dependable Sec. Comput., 2012

A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs.
IJNGC, 2012

Private Anonymous Messaging.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

An End-to-End Security Auditing Approach for Service Oriented Architectures.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Local geometric algorithm for hole boundary detection in sensor networks.
Security and Communication Networks, 2011

A Kolmogorov Complexity Approach for Measuring Attack Path Complexity.
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011

2010
Congestion Avoidance Routing Protocol for Ad-Hoc Networks.
IJNGC, 2010

Protection of Identity Information in Cloud Computing without Trusted Third Party.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

2009
Flex Transactions.
Proceedings of the Encyclopedia of Database Systems, 2009

Self-Learning Disk Scheduling.
IEEE Trans. Knowl. Data Eng., 2009

Collaborative attacks in WiMAX networks.
Security and Communication Networks, 2009

Maximizing network security given a limited budget.
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009

The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009

Detection and filtering Spam over Internet Telephony - a user-behavior-aware intermediate-network-based approach.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Panel: Benefits and Pitfalls of Specialized Ad Hoc Networks and Systems (SAHNS).
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Adaptive Voice Spam Control with User Behavior Analysis.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

Secure and efficient access to outsourced data.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks.
TOMCCAP, 2008

Visualisation of wormholes in underwater sensor networks: a distributed approach.
IJSN, 2008

A role-based access in a hierarchical sensor network architecture to provide multilevel security.
Computer Communications, 2008

Multi-hop Cross-Layer Design in Wireless Sensor Networks: A Case Study.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
On the Design of Perceptual MPEG-Video Encryption Algorithms.
IEEE Trans. Circuits Syst. Video Techn., 2007

Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks.
IJDSN, 2007

Cheating in online auction - Towards explaining the popularity of English auction.
Electronic Commerce Research and Applications, 2007

Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach.
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007

2006
Defending against wormhole attacks in mobile ad hoc networks.
Wireless Communications and Mobile Computing, 2006

A crossing-tier location update/paging scheme in hierarchical cellular networks.
IEEE Trans. Wireless Communications, 2006

Trust-based privacy preservation for peer-to-peer data sharing.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

A scheme for privacy-preserving data dissemination.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2006

Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee Networks.
IEEE Trans. Mob. Comput., 2006

Performance evaluation of multiple-rate mobile ad hoc networks.
Perform. Eval., 2006

Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Innovative Ideas in Privacy Research (Keynote Talk).
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

2005
Cross-Layer Algorithms for Video Transmission over Wireless Networks.
Proceedings of the Handbook of Algorithms for Wireless Networking and Mobile Computing., 2005

AO2P: Ad Hoc On-Demand Position-Based Private Routing Protocol.
IEEE Trans. Mob. Comput., 2005

A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005

CollectCast: A peer-to-peer service for media streaming.
Multimedia Syst., 2005

Monitoring and controlling QoS network domains.
Int. Journal of Network Management, 2005

Counteracting shill bidding in online english auction.
Int. J. Cooperative Inf. Syst., 2005

On the Design of Perceptual MPEG-Video Encryption Algorithms
CoRR, 2005

Multimedia data transmission and control using active networks.
Computer Communications, 2005

Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Reliable broadcast in ZigBee networks.
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor, 2005

Key distribution and update for secure inter-group multicast communication.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations.
Proceedings of the Distributed Computing and Internet Technology, 2005

2004
MPEG Video Encryption Algorithms.
Multimedia Tools Appl., 2004

Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA).
MONET, 2004

MADF: Mobile-assisted data forwarding for wireless data networks.
Journal of Communications and Networks, 2004

The Pudding of Trust.
IEEE Intelligent Systems, 2004

A hybrid architecture for cost-effective on-demand media streaming.
Computer Networks, 2004

Edge-to-edge measurement-based distributed network monitoring.
Computer Networks, 2004

Visualization of wormholes in sensor networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

Peer-to-peer File-sharing over Mobile Ad hoc Networks.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

A simulation study on multi-rate mobile ad hoc networks.
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004

E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities.
Proceedings of the Trust Management, Second International Conference, 2004

Anonymizing Web Services through a Club Mechanism with Economic Incentives.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Vulnerabilities and Threats in Distributed Systems.
Proceedings of the Distributed Computing and Internet Technology, 2004

2003
On detecting service violations and bandwidth theft in QoS network domains.
Computer Communications, 2003

Error Resilient Video Transmission over Wireless Networks.
Proceedings of the 1st IEEE Workshop on Software Technologies for Future Embedded Systems, 2003

On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Detecting Service Violations and DoS Attacks.
Proceedings of the Network and Distributed System Security Symposium, 2003

A low-cost, low-delay location update/paging scheme in hierarchical cellular networks.
Proceedings of the Third ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2003

PROMISE: peer-to-peer media streaming using CollectCast.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

GnuStream: a P2P media streaming system prototype.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

On-Demand Media Streaming Over the Internet.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

Network Tomography-Based Unresponsive Flow Detection and Control.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

Autonomous Transaction Processing Using Data Dependency in Mobile Environments.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

Fraud Formalization and Detection.
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003

2002
Replication Techniques in Distributed Systems
Advances in Database Systems 4, Kluwer, ISBN: 978-0-7923-9800-4, 2002

Heterogeneous CPU Services Using Differentiated Admission Control.
Multimedia Tools Appl., 2002

Guest Editorial: Quality of Service in Multimedia Networks.
Multimedia Tools Appl., 2002

Performance evaluation of linear hash structure model in a nested transaction environment.
Journal of Systems and Software, 2002

Mobile data and transaction management.
Inf. Sci., 2002

Virtual Routers: A Tool for Emulating IP Routers.
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002

Design and Implementation of a Python-Based Active Network Platform for Network Management and Control.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002

On Peer-to-Peer Media Streaming.
ICDCS, 2002

A round trip time and time-out aware traffic conditioner for differentiated services networks.
Proceedings of the IEEE International Conference on Communications, 2002

An Algorithm for Building User-Role Profiles in a Trust Environment.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

Authorization Based on Evidence and Trust.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

PartJoin: An Efficient Storage and Query Execution for Data Warehouses.
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002

2001
Global Scheduling for Flexible Transactions in Heterogeneous Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2001

Formalization and Proof of Correctness of the Crash Recovery Algorithm for an Open and Safe Nested Transaction Model.
Int. J. Cooperative Inf. Syst., 2001

A Transaction Model to Improve Data Availability in Mobile Computing.
Distributed and Parallel Databases, 2001

A Study of Communication Delays for Web Transactions.
Cluster Computing, 2001

Applying Fault-Tolerance Principles to Security Research.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

Design and evaluation of an adaptive traffic conditioner for differentiated services networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
Editorial.
World Wide Web, 2000

Design and Analysis of an Integrated Checkpointing Recovery Scheme for Distributed Applications.
IEEE Trans. Knowl. Data Eng., 2000

A Communication Framework for Digital Libraries.
Multimedia Tools Appl., 2000

Guest Editorial: Digital Libraries and Multimedia.
Multimedia Tools Appl., 2000

An open and safe nested transaction model: concurrency and recovery.
Journal of Systems and Software, 2000

Multi-level transaction model for semantic concurrency control in linear hash structures.
Information & Software Technology, 2000

An adaptable constrained locking protocol for high data contention environments: correctness and performance.
Information & Software Technology, 2000

Secured Web Access.
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000

Experimental Evaluation of Design Tradeoff in Specialized Virtual Machine for Multimedia Traffic in Active Networks.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

An Adaptable Network Architecture for Multimedia Traffic Management and Control.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000

Fault Tolerant Authentication in Mobile Computing.
Proceedings of the International Conference on Internet Computing, 2000

Security in Data Warehousing.
Proceedings of the Data Warehousing and Knowledge Discovery, 2000

Data Organization Issues for Location-Dependent Queries in Mobile Computing.
Proceedings of the Current Issues in Databases and Information Systems, 2000

1999
Data Consistency in Intermittently Connected Distributed Systems.
IEEE Trans. Knowl. Data Eng., 1999

Concurrency Control in Database Systems.
IEEE Trans. Knowl. Data Eng., 1999

MPEG Video Encryption in Real-time Using Secret Key Cryptography.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Design and Implementation of Linear Hash Algorithm in a Nested Transaction Environment.
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

Experiments in Adaptable and Secure Multimedia Database Systems (Invited Paper).
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999

An Adaptable Constrained Locking Protocol for High Data Contention Environments.
Proceedings of the Database Systems for Advanced Applications, 1999

1998
A Fragmentation Scheme for Multimedia Traffic in Active Networks.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

An Efficient MPEG Video Encryption Algorithm.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

Design and Analysis of a Hardware-Assisted Checkpointing and Recovery Scheme for Distributed Applications.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

A Fast MPEG Video Encryption Algorithm.
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998

A Transaction Model for Mobile Computing.
Proceedings of the 1998 International Database Engineering and Applications Symposium, 1998

On the Correctness of a Transaction Model for Mobile Computing.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998

1997
On Relaxing Serializability by Constraining Transaction Readsets.
Inf. Syst., 1997

Crash Recovery in an Open and Safe Nested Transaction Model.
Proceedings of the Database and Expert Systems Applications, 8th International Conference, 1997

Multi-pass Transmission Policy: An Effective Method of Transmitting Large Multimedia Objects in the Wide-Area Network.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

Active Gateway: A Facility for Video Conferencing Traffic Control.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

System Defined Prewrites for Increasing Concurrency in Databases.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997

1996
Supporting Method Migration in a Distributed Object Database System: A Performance Study.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

An Introduction to Enterprise-Participant Data Model.
Proceedings of the Seventh International Workshop on Database and Expert Systems Applications, 1996

A Colour-Based Technique for Measuring Visible Loss for Use in Image Data Communication.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996

1995
A Framework for Providing Consistent and Recoverable Agent-Based Access to Heterogeneous in Mobile Databases.
SIGMOD Record, 1995

Digital Library Services in Mobile Computing.
SIGMOD Record, 1995

A View-Based Approach to Relaxing Global Serializability in a Multidatabase System (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

Maintaining Consistency of Data in Mobile Distributed Environments.
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995

A Layered Architecture for Supporting Objects in a Relational System: A Performance Study
Proceedings of the Database and Expert Systems Applications, 1995

Communication Costs in Digital Library Databases
Proceedings of the Database and Expert Systems Applications, 1995

A Study of Distributed Transaction Processing in an Internetwork.
CISMOD, 1995

1994
Multiple-Query Optimization at Algorithm-Level.
Data Knowl. Eng., 1994

Revising Transaction Conceptsf or Mobile Computing.
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994

Ensuring Relaxed Atomicity for Flexible Transactions in Multidatabase Systems.
Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data, 1994

DL-Raid: An Environment for Supporting Digital Library Services.
Proceedings of the Digital Libraries: Current Issues, 1994

Building Information Systems for Mobile Environments.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, November 29, 1994

Re-Evaluating Indexing Schemes for Nested Objects.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, November 29, 1994

1993
Transition From A Relation To Object Model Implementation.
Proceedings of the Advanced Database Systems, 1993

Push: An experimental facility for implementing distributed database services in operating systems.
Journal of Systems Integration, 1993

Performance Study on Supporting Objects in O-Raid Distributed Database Systems.
Int. J. Cooperative Inf. Syst., 1993

O-Raid: Experiences and Experiments.
CoopIS, 1993

Efficient Availability Mechanisms in Distributed Databases Systems.
Proceedings of the CIKM 93, 1993

1992
Object-Oriented Computing - Guest Editors' Introduction.
IEEE Computer, 1992

Integrating Distributed Data Sources Using Federated Objects.
Proceedings of the Distributed Object Management, 1992

1991
Analyzing Availability of Replicated Database Systems.
Int. Journal in Computer Simulation, 1991

Evolution of a Communication System for Distributed Transaction Processing in Raid.
Computing Systems, 1991

Communication Facilities for Distributed Transaction-Processing Systems.
IEEE Computer, 1991

Communication in the Raid Distributed Database System.
Computer Networks and ISDN Systems, 1991

Experiences with Super, a Database Visual Environment.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991

1990
Adaptable Recovery Using Dynamic Quorum Assignments.
Proceedings of the 16th International Conference on Very Large Data Bases, 1990

Adaptility Experiments in the RAID Distributed Data Base System.
Proceedings of the Ninth Symposium on Reliable Distributed Systems, 1990

Implementing Object Support in the RAID Distributed Database System.
Proceedings of the First International Conference on Systems Integration, 1990

Experimental Evaluation of Concurrency Checkpointing and Rollback-Recovery Algorithms.
Proceedings of the Sixth International Conference on Data Engineering, 1990

Supporting queries in the O-Raid object-oriented database system.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1989
The Raid Distributed Database System.
IEEE Trans. Software Eng., 1989

A Model for Adaptable Systems for Transaction Processing.
IEEE Trans. Knowl. Data Eng., 1989

SETH: A Quorum-Based Database System for Experimentation with Failures.
Proceedings of the Fifth International Conference on Data Engineering, 1989

Implementation and Measurements of Efficient Communication Facilities for Distributed Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989

A model for concurrent checkpointing and recovery using transactions.
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989

Engineering the Object-relation Database Model in O-Raid.
Proceedings of the Foundations of Data Organization and Algorithms, 1989

1988
Clarification of Two Phase Locking in Concurrent Transaction Processing.
IEEE Trans. Software Eng., 1988

A Dynamic majority determination algorithm for reconfiguration of network partitions.
Inf. Sci., 1988

Implementation of RAID.
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988

Independent Checkpointing and Concurrent Rollback for Recovery in Distributed Systems - An Optimistic Approach.
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988

Concurrent Robust Checkpointing and Recovery in Distributed Systems.
Proceedings of the Fourth International Conference on Data Engineering, 1988

A Model for Adaptable Systems for Transaction Processing.
Proceedings of the Fourth International Conference on Data Engineering, 1988

An Experimental Analysis of Replicated Copy Control During Site Failure and Recovery.
Proceedings of the Fourth International Conference on Data Engineering, 1988

A Generic Algorithm for Transaction Processing During Network Partitioning.
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1988

1987
Multidimensional Timestamp Protocols for Concurrency Control.
IEEE Trans. Software Eng., 1987

Transaction Processing and Consistency Control of Replicated Copies during Failures in Distributed Databases.
J. of Management Information Systems, 1987

1986
RAID: a robust and adaptable distributed system.
Proceedings of the 2nd ACM SIGOPS European Workshop, 1986

Multidimensional Timestamp Protocols for Concurrency Control.
Proceedings of the Second International Conference on Data Engineering, 1986

Site Recovery in Replicated Distributed Database Systems.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986

1985
Database Integrity Block Construct: Concepts and Design Issues.
IEEE Trans. Software Eng., 1985

Reliability in Distributed Database Systems (Panel).
Proceedings of the 1985 ACM SIGMOD International Conference on Management of Data, 1985

1984
A Scheme for Batch Verification of Integrity Assertions in a Database System.
IEEE Trans. Software Eng., 1984

Performance evaluation of reliability control algorithms for distributed database systems.
Journal of Systems and Software, 1984

1983
A Causal Model for Analyzing Distributed Concurrency Control Algorithms.
IEEE Trans. Software Eng., 1983

Analysis of the Majority Consensus Concurrency Control Algorithm for Correctness and Performance Using the Event Ordering Approach.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983

Cost Analysis of Selected Database Restoration Techniques.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

1982
Guest Editorial: Reliability Issues in Distributed Systems.
IEEE Trans. Software Eng., 1982

Classes of Serializable Histories and Synchronization Algorithms in Distributed Database Systems.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982

Performance Evaluation of the Optimistic Approach to Distributed Database Systems and Its Comparison to Locking.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982

1981
On optimal scheduling of integrity assertions in a transaction processing system.
International Journal of Parallel Programming, 1981

Cost analysis of recovery block scheme and its implementation issues.
International Journal of Parallel Programming, 1981

Feature analysis of selected database recovery techniques.
Proceedings of the American Federation of Information Processing Societies: 1981 National Computer Conference, 1981

Software reliability in real-time systems.
Proceedings of the American Federation of Information Processing Societies: 1981 National Computer Conference, 1981

1980
Design of Intelligent Query Systems for Large Databases.
Pictorial Information Systems, 1980

1978
Characteristics And Problems Encountered In Different Database Applications (Panel Discussion).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978

Crossfertilization Of DBMS Research With Other Disciplines Of Computer Science (Panel Discussion).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978

1975
A clinical information system (CIS) for ambulatory care.
Proceedings of the American Federation of Information Processing Societies: 1975 National Computer Conference, 1975

1973
Tree Systems for Syntactic Pattern Recognition.
IEEE Trans. Computers, 1973


  Loading...