Debmalya Biswas

According to our database1, Debmalya Biswas authored at least 38 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Constraints Enabled Autonomous Agent Marketplace: Discovery and Matchmaking.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2021
A Privacy Framework for Hierarchical Federated Learning.
Proceedings of the CIKM 2021 Workshops co-located with 30th ACM International Conference on Information and Knowledge Management (CIKM 2021), 2021

Deep Learning based Asbestos Fiber Detection.
Proceedings of the 50th IEEE Applied Imagery Pattern Recognition Workshop, 2021

2020
Reinforcement Learning based HVAC Optimization in Factories.
Proceedings of the e-Energy '20: The Eleventh ACM International Conference on Future Energy Systems, 2020

Delayed Rewards in the Context of Reinforcement Learning based Recommender Systems.
Proceedings of the First International AAI4H, 2020

Privacy Preserving Chatbot Conversations.
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020

2014
Privacy preserving minimal observability for composite transactional services.
Discret. Event Dyn. Syst., 2014

Privacy preserving and transactional advertising for mobile services.
Computing, 2014

2013
Secure Cloud Transactions.
Comput. Syst. Sci. Eng., 2013

Privacy Panel: Usable and Quantifiable Mobile Privacy.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Distributed and minimal usage control.
Serv. Oriented Comput. Appl., 2012

Privacy Preserving Profiling for Mobile Services.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Privacy policies change management for smartphones.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012

Privacy Preserving Cloud Transactions.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2012, 2012

2011
Distributed Usage Control.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Optimal Compensation for Hierarchical Web Services Compositions Under Restricted Visibility.
Int. J. Inf. Syst. Serv. Sect., 2011

NAT/Firewall traversal cost model for publish-subscribe systems.
Proceedings of the ICPE'11, 2011

Conflict Detection and Lifecycle Management for Access Control in Publish/Subscribe Systems.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

Transforming Privacy Policies to Auditing Specifications.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2010
Privacy-Preserving Outsourced Profiling.
Proceedings of the 12th IEEE Conference on Commerce and Enterprise Computing, 2010

Leakage Quantification of Cryptographic Operations.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2010, 2010

2009
Formalizing visibility characteristics in hierarchical systems.
Data Knowl. Eng., 2009

Atomicity for XML Databases.
Proceedings of the Database and XML Technologies, 6th International XML Database Symposium, 2009

On the practical importance of communication complexity for secure multi-party computation protocols.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Practical privacy-preserving protocols for criminal investigations.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2009

Performance Comparison of Secure Comparison Protocols.
Proceedings of the Database and Expert Systems Applications, 2009

2008
Minimal Observability for Transactional Hierarchical Services.
Proceedings of the Twentieth International Conference on Software Engineering & Knowledge Engineering (SEKE'2008), 2008

A Highly Flexible Data Structure for Multi-level Visibility of P2P Communities.
Proceedings of the Distributed Computing and Networking, 9th International Conference, 2008

Small Logs for Transactional Services: Distinction is Much More Accurate than (Positive) Discrimination.
Proceedings of the 11th IEEE High Assurance Systems Engineering Symposium, 2008

Active XML Replication and Recovery.
Proceedings of the Second International Conference on Complex, 2008

2007
Web Services Discovery and Constraints Composition.
Proceedings of the Web Reasoning and Rule Systems, First International Conference, 2007

Atomicity for P2P based XML Repositories.
Proceedings of the 23rd International Conference on Data Engineering Workshops, 2007

2006
Application of Model Checking to AXML System's Security: A Case Study.
Proceedings of the Web Services and Formal Methods, Third International Workshop, 2006

Modeling Visibility in Hierarchical Systems.
Proceedings of the Conceptual Modeling, 2006

2005
Monitoring for Hierarchical Web Services Compositions.
Proceedings of the Technologies for E-Services, 6th International Workshop, 2005

Spheres of Visibility.
Proceedings of the 2005 IEEE International Conference on Web Services (ICWS 2005), 2005

2004
Compensation in the World of Web Services Composition.
Proceedings of the Semantic Web Services and Web Process Composition, 2004

A Nested Transaction Model for LDAP Transactions.
Proceedings of the Distributed Computing and Internet Technology, 2004


  Loading...