Leszek Lilien

According to our database1, Leszek Lilien authored at least 47 papers between 1981 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Opportunistic topology control for ad hoc wireless network survivability enhancement based on <i>LIMOS</i> model.
J. Netw. Comput. Appl., 2019

An Approach to Identity Management in Clouds without Trusted Third Parties.
CoRR, 2019

2018
PHeDHA: Protecting Healthcare Data in Health Information Exchanges with Active Data Bundles.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Differentiating Security from Privacy in Internet of Things: A Survey of Selected Threats and Controls.
Proceedings of the Computer and Network Security Essentials., 2018

2017
Pushing Data Privacy Control to the Edge in IoT Using Policy Enforcement Fog Module.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

2015
Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015

Protecting users' privacy in healthcare cloud computing with APB-TTP.
Proceedings of the 2015 IEEE International Conference on Pervasive Computing and Communication Workshops, 2015

A collaborative healthcare application based on opportunistic resource utilization networks with OVM primitives.
Proceedings of the 2015 International Conference on Collaboration Technologies and Systems, 2015

2014
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Netw. Comput. Appl., 2014

Extending Lifetime of Wireless Sensor Networks by Management of Spare Nodes.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Comparison by Simulation of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2011
LEACH-SM: A protocol for extending wireless sensor network lifetime by management of spare nodes.
Proceedings of the 9th International Symposium on Modeling and Optimization in Mobile, 2011

Extending Wireless Sensor Network Lifetime in the LEACH-SM Protocol by Spare Selection.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Quantitative Comparison of Energy Consumption and WSN Lifetime for LEACH and LEACH-SM.
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011

2010
Opportunistic resource utilization networks - A new paradigm for specialized ad hoc networks.
Comput. Electr. Eng., 2010

Protection of Identity Information in Cloud Computing without Trusted Third Party.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

The pervasive trust foundation for security in next generation networks.
Proceedings of the 2010 Workshop on New Security Paradigms, 2010

2009
Collaborative attacks in WiMAX networks.
Secur. Commun. Networks, 2009

Panel: Benefits and Pitfalls of Specialized Ad Hoc Networks and Systems (SAHNS).
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

2008
Power Consumption Analysis of Maximum A Posterior Classifier Using LU Decomposition and Jacobi Iterations.
IEEE Trans. Parallel Distributed Syst., 2008

2007
A Taxonomy of Specialized Ad Hoc Networks and Systems for Emergency Applications.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

The MicroOppnet tool for Collaborative Computing experiments with class 2 opportunistic networks.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

2006
A scheme for privacy-preserving data dissemination.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Classification using Efficient LU Decomposition in Sensornets.
Proceedings of the Sixth IASTED International Multi-Conference on Wireless and Optical Communications: Conference on Communication Systems and Applications, 2006

An Efficient MAP Classifier for Sensornets.
Proceedings of the High Performance Computing, 2006

Opportunistic Networks: Challenges in Specializing the P2P Paradigm.
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006

2004
The Pudding of Trust.
IEEE Intell. Syst., 2004

Anonymizing Web Services through a Club Mechanism with Economic Incentives.
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004

Vulnerabilities and Threats in Distributed Systems.
Proceedings of the Distributed Computing and Internet Technology, 2004

2003
Autonomous Transaction Processing Using Data Dependency in Mobile Environments.
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003

1991
An adaptive mixed relation decomposition algorithm for conjunctive retrieval queries.
Inf. Sci., 1991

1989
Pessimistic quasipartitioning protocols for distributed database systems.
IEEE J. Sel. Areas Commun., 1989

Quasi-Partitioning: A New Paradigm for Transaction Execution in Partitioned Distributed Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989

1988
Pessimistic Protocols for Quasi-Partitioned Distributed Database Systems.
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988

A Performance Analysis of an Optimistic and a Basic Timestamp-Ordering Concurrency Control Algorithm for Centralized Database Systems.
Proceedings of the Fourth International Conference on Data Engineering, 1988

1987
A survey of methods for system-level fault diagnosis.
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987

An Extended Entity-Relationship (E²R) Database Specification and its Automatic Verification and Transformation into the Logical Relational Design.
Proceedings of the Entity-Relationship Approach, 1987

Design issues and an architecture for a heterogenous multidatabase system.
Proceedings of the 15th ACM Annual Conference on Computer Science, 1987

1986
Adaptive Techniques for Distributed Query Optimization.
Proceedings of the Second International Conference on Data Engineering, 1986

1985
Database Integrity Block Construct: Concepts and Design Issues.
IEEE Trans. Software Eng., 1985

1984
A Scheme for Batch Verification of Integrity Assertions in a Database System.
IEEE Trans. Software Eng., 1984

1983
Cost Analysis of Selected Database Restoration Techniques.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983

1981
On optimal scheduling of integrity assertions in a transaction processing system.
Int. J. Parallel Program., 1981

Feature analysis of selected database recovery techniques.
Proceedings of the American Federation of Information Processing Societies: 1981 National Computer Conference, 1981


  Loading...