Sarbjeet Singh

According to our database1, Sarbjeet Singh
  • authored at least 22 papers between 2006 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers.
J. Grid Comput., 2017

Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers.
J. Grid Comput., 2017

Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers.
Future Generation Comp. Syst., 2017

A comparative analysis of structural graph metrics to identify anomalies in online social networks.
Computers & Electrical Engineering, 2017

2016
Score-based genetic algorithm for scheduling workflow applications in clouds.
IJGUC, 2016

A novel cloud auditor based trust management framework for cloud computing.
IJGUC, 2016

A review of social network centric anomaly detection techniques.
IJCNDS, 2016

Detecting negative relations in social networks.
IJCNDS, 2016

A dynamic, cost-aware, optimized data replication strategy for heterogeneous cloud data centers.
Future Generation Comp. Syst., 2016

A Budget-constrained Time and Reliability Optimization BAT Algorithm for Scheduling Workflow Applications in Clouds.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

2015
Modelling factors affecting human operator failure probability in railway maintenance tasks: an ISM-based analysis.
Int. J. Systems Assurance Engineering and Management, 2015

Developing RCM strategy for wind turbines utilizing e-condition monitoring.
Int. J. Systems Assurance Engineering and Management, 2015

2014
Self-maintenance techniques: a smart approach towards self-maintenance system.
Int. J. Systems Assurance Engineering and Management, 2014

Peers Feedback and Compliance Based Trust Computation for Cloud Computing.
Proceedings of the Security in Computing and Communications, 2014

A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Dynamic Cost-Aware Re-replication and Rebalancing Strategy in Cloud System.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

Compliance based Trustworthiness Calculation Mechanism in Cloud Environment.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

2013
Deadline and cost based workflow scheduling in hybrid cloud.
Proceedings of the International Conference on Advances in Computing, 2013

2011
Lumbosacral bending moment assessment and parameter optimization using Taguchi design during lifting task in a steel rolling mill.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011

2009
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper].
Proceedings of the Information and Communications Security, 11th International Conference, 2009

2006
A Framework for Handling Security Problems in Grid Environment using Web Services Security Specifications.
Proceedings of the 2006 International Conference on Semantics, 2006

Design of a Framework for Handling Security Issues in Grids.
Proceedings of the 9th International Conference in Information Technology, 2006


  Loading...