Ing-Ray Chen

According to our database1, Ing-Ray Chen authored at least 196 papers between 1986 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Editorial.
IEEE Trans. Services Computing, 2018

PROVEST: Provenance-Based Trust Model for Delay Tolerant Networks.
IEEE Trans. Dependable Sec. Comput., 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
CoRR, 2018

Trust-based mechanism design for cooperative spectrum sensing in cognitive radio networks.
Computer Communications, 2018

Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
Trust-Based Service Composition and Binding with Multiple Objective Optimization in Service-Oriented Mobile Ad Hoc Networks.
IEEE Trans. Services Computing, 2017

Trust-Based Task Assignment With Multiobjective Optimization in Service-Oriented Ad Hoc Networks.
IEEE Trans. Network and Service Management, 2017

Trust-Based Decision Making for Health IoT Systems.
IEEE Internet of Things Journal, 2017

A Survey on Modeling and Optimizing Multi-Objective Systems.
IEEE Communications Surveys and Tutorials, 2017

A survey of trust computation models for service management in internet of things systems.
Computer Communications, 2017

A Mobile Cloud Hierarchical Trust Management Protocol for IoT Systems.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

PDGM: Percolation-based directed graph matching in social networks.
Proceedings of the IEEE International Conference on Communications, 2017

A Case Study of IoT Participatory Sensing of Hazardous Ozone Using Traces.
Proceedings of the Fuzzy Systems and Data Mining III, 2017

2016
Trust Management for SOA-Based IoT and Its Application to Service Composition.
IEEE Trans. Services Computing, 2016

Modeling and Analysis of Attacks and Counter Defense Mechanisms for Cyber Physical Systems.
IEEE Trans. Reliability, 2016

Trust-Based Service Management for Social Internet of Things Systems.
IEEE Trans. Dependable Sec. Comput., 2016

A topic-focused trust model for Twitter.
Computer Communications, 2016

Trust threshold based public key management in mobile ad hoc networks.
Ad Hoc Networks, 2016

Trust-based decision making for environmental health community of interest IoT systems.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Parameterizing Moving Target Defenses.
Proceedings of the 8th IFIP International Conference on New Technologies, 2016

Trust-Based IoT Participatory Sensing for Hazard Detection and Response.
Proceedings of the Service-Oriented Computing - ICSOC 2016 Workshops, 2016

2015
A Survey of Mobile Cloud Computing Applications: Perspectives and Challenges.
Wireless Personal Communications, 2015

Integrated Intrusion Detection and Tolerance in Homogeneous Clustered Sensor Networks.
TOSN, 2015

Adaptive Network Defense Management for Countering Smart Attack and Selective Capture in Wireless Sensor Networks.
IEEE Trans. Network and Service Management, 2015

Behavior Rule Specification-Based Intrusion Detection for Safety Critical Medical Cyber Physical Systems.
IEEE Trans. Dependable Sec. Comput., 2015

Hierarchical trust management of community of interest groups in mobile ad hoc networks.
Ad Hoc Networks, 2015

On modeling of adversary behavior and defense for survivability of military MANET applications.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Trust-Based Task Assignment in Autonomous Service-Oriented Ad Hoc Networks.
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems.
Proceedings of the 2015 IEEE International Conference on Services Computing, 2015

2014
Adaptive Intrusion Detection of Malicious Unmanned Air Vehicles Using Behavior Rule Specifications.
IEEE Trans. Systems, Man, and Cybernetics: Systems, 2014

Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing.
IEEE Trans. Parallel Distrib. Syst., 2014

A survey of intrusion detection in wireless network applications.
Computer Communications, 2014

Scalable and efficient dual-region based mobility management for ad hoc networks.
Ad Hoc Networks, 2014

Trust management in mobile ad hoc networks for bias minimization and application performance maximization.
Ad Hoc Networks, 2014

Trust management for service composition in SOA-based IoT systems.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

Trust-based data fusion mechanism design in cognitive radio networks.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
Smart Routers for Cross-Layer Integrated Mobility and Service Management in Mobile IPv6 Systems.
Wireless Personal Communications, 2013

On Survivability of Mobile Cyber Physical Systems with Intrusion Detection.
Wireless Personal Communications, 2013

Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications.
IEEE Trans. Smart Grid, 2013

Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems.
IEEE Trans. Reliability, 2013

Redundancy Management of Multipath Routing for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Network and Service Management, 2013

A survey of intrusion detection techniques for cyber-physical systems.
ACM Comput. Surv., 2013

Hierarchical agent-based secure and reliable multicast in wireless mesh networks.
Computer Communications, 2013

Dynamic agent-based hierarchical multicast for wireless mesh networks.
Ad Hoc Networks, 2013

On the tradeoff between altruism and selfishness in MANET trust management.
Ad Hoc Networks, 2013

Composite trust-based public key management in mobile ad hoc networks.
Proceedings of the 28th Annual ACM Symposium on Applied Computing, 2013

Trust-Based Service Composition and Binding for Tactical Networks with Multiple Objectives.
Proceedings of the 32th IEEE Military Communications Conference, 2013

Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

Dynamic multisource multipath routing for intrusion tolerance and lifetime maximization of autonomous wireless sensor networks.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

Dual-Region Location Management for Mobile Ad Hoc Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Trust-Based Multi-objective Optimization for Node-to-Task Assignment in Coalition Networks.
Proceedings of the 19th IEEE International Conference on Parallel and Distributed Systems, 2013

Adaptive network management for countering selective capture in wireless sensor networks.
Proceedings of the 9th International Conference on Network and Service Management, 2013

Integrated social and quality of service trust management of mobile groups in ad hoc networks.
Proceedings of the 9th International Conference on Information, 2013

Access Protocols in Data Partitioning Based Cloud Storage.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
DMAP-FR: Dynamic Mobility Anchor Points for Mobility, Service and Failure Recovery Management in Mobile IPv6 Systems.
Wireless Personal Communications, 2012

Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks.
Wireless Personal Communications, 2012

Mobility Management in Wireless Mesh Networks Utilizing Location Routing and Pointer Forwarding.
IEEE Trans. Network and Service Management, 2012

Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection.
IEEE Trans. Network and Service Management, 2012

Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks.
J. Network and Computer Applications, 2012

Reliability Analysis of Wireless Sensor Networks with Distributed Code Attestation.
IEEE Communications Letters, 2012

Trust management for the internet of things and its application to service composition.
Proceedings of the 2012 IEEE International Symposium on a World of Wireless, 2012

Energy vs. QoS Tradeoff Analysis of Multipath Routing Protocols for Intrusion Tolerance in Heterogeneous Wireless Sensor Networks.
Proceedings of the 10th IEEE International Symposium on Parallel and Distributed Processing with Applications, 2012

A Provenance-Based Trust Model for Delay Tolerant Networks.
Proceedings of the Trust Management VI - 6th IFIP WG 11.11 International Conference, 2012

Behavior Rule Based Intrusion Detection for Supporting Secure Medical Cyber Physical Systems.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

An integrated framework for spatio-temporal-textual search and mining.
Proceedings of the SIGSPATIAL 2012 International Conference on Advances in Geographic Information Systems (formerly known as GIS), 2012

2011
Model-Based Evaluation of Distributed Intrusion Detection Protocols for Mobile Group Communication Systems.
Wireless Personal Communications, 2011

Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks.
IEEE Trans. Mob. Comput., 2011

Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks.
IEEE Trans. Dependable Sec. Comput., 2011

Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks.
Perform. Eval., 2011

Adaptive per-user per-object cache consistency management for mobile data access in wireless mesh networks.
J. Parallel Distrib. Comput., 2011

A Survey on Trust Management for Mobile Ad Hoc Networks.
IEEE Communications Surveys and Tutorials, 2011

A hierarchical performance model for intrusion detection in cyber-physical systems.
Proceedings of the 2011 IEEE Wireless Communications and Networking Conference, 2011

Hierarchical trust management for wireless sensor networks and its application to trust-based routing.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Survivability analysis of mobile cyber physical systems with voting-based intrusion detection.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Trust-Threshold Based Routing in Delay Tolerant Networks.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Hierarchical Agent-Based Secure Multicast for Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2011

Trust-Based Intrusion Detection in Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

CROWDSAFE: crowd sourcing of crime incidents and safe routing on mobile devices.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

2010
Performance Analysis of Spillover-Partitioning Call Admission Control in Mobile Wireless Networks.
Wireless Personal Communications, 2010

Regional Registration-Based Mobile Multicast Service Management in Mobile IP Networks.
Wireless Personal Communications, 2010

Modeling and analysis of intrusion detection integrated with batch rekeying for dynamic group communication systems in mobile ad hoc networks.
Wireless Networks, 2010

Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks.
IEEE Trans. Reliability, 2010

Reliability of wireless sensors with code attestation for intrusion detection.
Inf. Process. Lett., 2010

Cross-layer integrated mobility and service management utilizing smart routers in mobile IPv6 systems.
Proceedings of the MoMM'2010, 2010

APPCCM: Adaptive per-user per-object cache consistency management for mobile client-server applications in wireless mesh networks.
Proceedings of the 35th Annual IEEE Conference on Local Computer Networks, 2010

Modeling and Analysis of Trust Management Protocols: Altruism versus Selfishness in MANETs.
Proceedings of the Trust Management IV - 4th IFIP WG 11.11 International Conference, 2010

Trust Management for Encounter-Based Routing in Delay Tolerant Networks.
Proceedings of the Global Communications Conference, 2010

Towards trustworthy shared networked sensor-actuator systems.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
A proxy-based integrated cache consistency and mobility management scheme for client-server applications in Mobile IP systems.
J. Parallel Distrib. Comput., 2009

Elastic threshold-based admission control for QoS satisfaction with reward optimization for servicing multiple priority classes in wireless networks.
Inf. Process. Lett., 2009

Performance characteristics of location-based group membership and data consistency algorithms in mobile ad hoc networks.
Int. J. Pervasive Computing and Communications, 2009

Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks.
Computer Communications, 2009

Signalprint-Based Intrusion Detection in Wireless Networks.
Proceedings of the Security in Emerging Wireless Communication and Networking Systems, 2009

DMAP-FR: Integrated Mobility and Service Management with Failure Recovery Support for Mobile IPv6 Systems.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

On the Reliability of Wireless Sensors with Software-Based Attestation for Intrusion Detection.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Performance analysis of distributed intrusion detection protocols for mobile group communication systems.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Dynamic adaptive redundancy for quality-of-service control in wireless sensor networks.
Proceedings of the 23rd IEEE International Symposium on Parallel and Distributed Processing, 2009

Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Comparative Performance Analysis of CAC Reward Optimization Algorithms in Wireless Networks.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
On optimal batch rekeying for secure group communications in wireless networks.
Wireless Networks, 2008

Performance optimization of region-based group key management in mobile ad hoc networks.
Perform. Eval., 2008

Proxy-based hybrid cache management in Mobile IP systems.
Inf. Process. Lett., 2008

Movement-based checkpointing and logging for failure recovery of database applications in mobile environments.
Distributed and Parallel Databases, 2008

Availability Analysis of Robotic Swarm Systems.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Effect of Intrusion Detection on Failure Time of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks.
Proceedings of the 14th IEEE Pacific Rim International Symposium on Dependable Computing, 2008

Effect of intrusion detection on secure group communications in hierarchically structured group architectures.
Proceedings of the LCN 2008, 2008

On QoS Guarantees with Reward Optimization for Servicing Multiple Priority Classes in Wireless Networks.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008

Spillover-Partitioning Call Admission Control for Revenue Optimization with QoS Guarantees for Multiple Service Classes in Mobile Wireless Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

Performance Analysis of Dynamic Group Communication Systems with Intrusion Detection Integrated with Batch Rekeying in Mobile Ad Hoc Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
DMAP: integrated mobility and service management in mobile IPv6 systems.
Wireless Personal Communications, 2007

Effect of redundancy on the mean time to failure of wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2007

Proxy-based Regional Registration for Integrated Mobility and Service Management in Mobile IP Systems.
Comput. J., 2007

Modeling and analysis of regional registration based mobile multicast service management.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

A Proxy-Based Integrated Cache Consistency and Mobility Management Scheme for Mobile IP Systems.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Extending Proxy Caching Capability: Issues and Performance.
World Wide Web, 2006

Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks.
Wireless Personal Communications, 2006

Filtering strategies for TFC selection schemes in 3GPP W-CDMA systems.
IEEE Trans. Wireless Communications, 2006

On Integrated Location and Service Management for Minimizing Network Cost in Personal Communication Systems.
IEEE Trans. Mob. Comput., 2006

High Assurance Software Systems.
Comput. J., 2006

Performance Characteristics of Region-Based Group Key Management in Mobile Ad Hoc Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Movement-based checkpointing and logging for recovery in mobile computing systems.
Proceedings of the Fifth ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2006

On Optimal Path and Source Redundancy for Achieving QoS and Maximizing Lifetime of Query-Based Wireless Sensor Networks.
Proceedings of the 14th International Symposium on Modeling, 2006

DMAP: A Scalable and Efficient Integrated Mobility and Service Management Scheme for Mobile IPv6 Systems.
Proceedings of the LCN 2006, 2006

Utilizing Call Admission Control to Derive Optimal Pricing of Multiple Service Classes in Wireless Cellular Networks.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Effect of Redundancy on Mean Time to Failure of Wireless Sensor Networks.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Update Propagation Algorithms for Supporting Disconnected Write in Mobile Wireless Systems with Data Broadcasting Capability.
Wireless Personal Communications, 2005

On failure recoverability of client-server applications in mobile wireless environments.
IEEE Trans. Reliability, 2005

Adaptive QoS Control Based on Benefit Optimization for Video Servers Providing Differentiated Services.
Multimedia Tools Appl., 2005

Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems.
MONET, 2005

2004
Replicated Object Management with Periodic Maintenance in Mobile Wireless Systems.
Wireless Personal Communications, 2004

Systematic Reliability Analysis of a Class of Application-Specific Embedded Software Frameworks.
IEEE Trans. Software Eng., 2004

Analyzing reconfigurable algorithms for managing replicated data .
Journal of Systems and Software, 2004

Editorial: Mobile and Pervasive Computing.
Comput. J., 2004

A Hands-on Course on Wireless and Mobile Systems Design.
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004

Survivable Systems Based on an Adaptive NMR Algorithm.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004

Admission Control Algorithms Integrated with Pricing for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

Performance Analysis of Location-Based Data Consistency Algorithms in Mobile Ad Hoc Networks.
Proceedings of the 10th International Conference on Parallel and Distributed Systems, 2004

2003
Quantitative Analysis of a Hybrid Replication with Forwarding Strategy for Efficient and Uniform Location Management in Mobile Wireless Networks.
IEEE Trans. Mob. Comput., 2003

Performance evaluation of an admission control algorithm: dynamic threshold with negotiation.
Perform. Eval., 2003

Analyzing User-Perceived Dependability and Performance Characteristics of Voting Algorithms for Managing Replicated Data.
Distributed and Parallel Databases, 2003

A Cost-Based Admission Control Algorithm for Digital Library Multimedia Systems Storing Heterogeneous Objects.
Comput. J., 2003

High-Assurance Synthesis of Security Services from Basic Microservices.
Proceedings of the 14th International Symposium on Software Reliability Engineering (ISSRE 2003), 2003

Update Propagation Algorithms for Supporting Disconnected Operations in Mobile Wireless Systems with Data Broadcasting.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

Simulation Study of a Class of Autonomous Host-Centric Mobility Prediction Algorithms for Wireless Cellular and Ad Hoc Networks.
Proceedings of the Proceedings 36th Annual Simulation Symposium (ANSS-36 2003), Orlando, Florida, USA, March 30, 2003

2002
Algorithms for Supporting Disconnected Write Operations for Wireless Web Access in Mobile Client-Server Environments.
IEEE Trans. Mob. Comput., 2002

A self-adjusting quality of service control scheme.
Inf. Process. Lett., 2002

A Comparative Cost Analysis of Degradable Location Management Algorithms in Wireless Networks.
Comput. J., 2002

QoS Control Algorithms Based on Benefit Optimization for Video Servers Providing Differentiated Services.
Proceedings of the 6th Joint Conference on Information Science, 2002

Design and Analysis of A Set-Top Box for Video Streaming Services.
Proceedings of the 6th Joint Conference on Information Science, 2002

Reliability Assessment of Framework-Based Distributed Embedded Software Systems.
Proceedings of the 13th International Symposium on Software Reliability Engineering (ISSRE 2002), 2002

An Architecture-Based Comparison of Verification and Statistical Reliability Assessment Methods for Embedded Software Systems.
Proceedings of the 5th International Symposiun on Object Oriented Real-Time Distributed Computing, 2002

2001
Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks.
MONET, 2001

Special Issue Editorial: High Assurance Systems.
Comput. J., 2001

Analysis of Algorithms for Supporting Disconnected Write Operations in Mobile Client-Server Environments.
Proceedings of the Fifth International Symposium on Autonomous Decentralized Systems, 2001

A Cost-Based Admission Control Algorithm for Handling Mixed Workloads in Multimedia Server Systems.
Proceedings of the Eigth International Conference on Parallel and Distributed Systems, 2001

2000
Analysis and Comparison of Location Strategies for Reducing Registration Cost in PCS Networks.
Wireless Personal Communications, 2000

Dynamic Quota-Based Admission Control with Sub-Rating in Multimedia Servers.
Multimedia Syst., 2000

Response time behavior of distributed voting algorithms for managing replicated data.
Inf. Process. Lett., 2000

Analyzing Reconfigurable Algorithms for Managing Replicated Data with Strict Consistency Requirements: A Case Study.
Proceedings of the 24th International Computer Software and Applications Conference (COMPSAC 2000), 2000

1999
Performance and Stability Analysis of Multilevel Data Structures with Deferred Reorganization.
IEEE Trans. Software Eng., 1999

Real-Time Atomic Transaction Processing Using Multi-Invariant Data Structure.
Proceedings of the 4th IEEE International Symposium on High-Assurance Systems Engineering (HASE '99), 1999

Response Time Behavior of Voting Schemes for Managing Replicated Data.
Proceedings of the 23rd International Computer Software and Applications Conference (COMPSAC '99), 1999

1998
Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers.
Perform. Eval., 1998

Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks.
Comput. J., 1998

A Study of Self-adjusting Quality of Service Control Schemes.
Proceedings of the 30th conference on Winter simulation, WSC 1998, 1998

Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks.
Proceedings of the International Conference on Parallel and Distributed Systems, 1998

1997
Performance characterization of forwarding strategies in personal communication networks.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997

1996
Analysis of Replicated Data with Repair Dependency.
Comput. J., 1996

Threshold-Based Admission Control Policies for Multimedia Servers.
Comput. J., 1996

Analyzing Dynamic Voting Using Petri Nets.
Proceedings of the 15th Symposium on Reliable Distributed Systems, 1996

Threshold-based dynamic admission control algorithms for real-time multimedia servers.
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

Repairman Models for Replicated Data Management: A Case Study.
Proceedings of the Fourth International Conference on Parallel and Distributed Information Systems, 1996

1995
On the Reliability of AI Planning Software in Real-Time Applications.
IEEE Trans. Knowl. Data Eng., 1995

Analysis of Probabilistic Error Checking Procedures on Storage Systems.
Comput. J., 1995

Stochastic Petri Net Analysis of Deadlock Detection Algorithms in Transaction Database Systems with Dynamic Locking.
Comput. J., 1995

On Applying Imprecise Computation to Real-Time AI Systems.
Comput. J., 1995

A Degradable Blink-Tree with Periodic Data Reorganization.
Comput. J., 1995

Performance analysis of a periodic data reorganization algorithm for concurrent Blink-trees in database systems.
Proceedings of the 1995 ACM symposium on applied computing, 1995

Quality Assessment for Multiple Server Cooperating Systems.
Proceedings of the 19th International Computer Software and Applications Conference (COMPSAC'95), 1995

1994
Warm Standby in Hierarchically Structured Process-Control Programs.
IEEE Trans. Software Eng., 1994

Performance Evaluation of Rule Grouping on a Real-Time Expert System Architecture.
IEEE Trans. Knowl. Data Eng., 1994

On the reliability of dependable soft real-time cooperating systems.
Proceedings of WORDS '94. The First Workshop on Object-Oriented Real-Time Dependable Systems, 1994

A Petri net model for the performance analysis of transaction database systems with continuous deadlock detection.
Proceedings of the 1994 ACM Symposium on Applied Computing, 1994

1993
Modeling and Analysis of Concurrent Maintenance Policies for Data Structures Using Pointers.
IEEE Trans. Software Eng., 1993

A Software Reliability Model for Artificial Intelligence Programs.
International Journal of Software Engineering and Knowledge Engineering, 1993

Assessment of the Reliability of AI Programs.
International Journal on Artificial Intelligence Tools, 1993

The Reliability of Embedded AI Systems.
IEEE Expert, 1993

Effect of Probabilistic Error Checking Procedures and Performability of Robust Objects.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

Reliability of uniprocessor and multiprocessor real-time artificial intelligence planning systems.
Proceedings of the Fourth International Symposium on Software Reliability Engineering, 1993

1992
A uniform approach to the stability and performance analysis of concurrent data structure maintenance policies.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

1991
A Model for the Stability Analysis of Maintenance Stragies for Linear List.
Comput. J., 1991

1990
Assessment of the reliability of AI programs.
Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence, 1990

1988
A Class of Inherently Fault Tolerant Distributed Programs.
IEEE Trans. Software Eng., 1988

The Role of Artificial Intelligence in Fault-Tolerant Process-Control Systems.
IEA/AIE (Vol. 2), 1988

1986
Performance Analysis of Concurrent Maintenance Policies for Servers in a Distributed Environment.
Proceedings of the Fall Joint Computer Conference, November 2-6, 1986, Dallas, Texas, USA, 1986


  Loading...