Susan V. Vrbsky

According to our database1, Susan V. Vrbsky
  • authored at least 78 papers between 1984 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Transaction management with tree-based consistency in cloud databases.
IJCC, 2017

2015
Performance Metrics of Virtual Machine Live Migration.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft.
IEEE Systems Journal, 2014

FAPA: flooding attack protection architecture in a cloud system.
IJCC, 2014

Deploying a cost efficient geographically distributed private cloud architecture.
IJCC, 2014

2013
THUNDER: helping underfunded NPO's distribute electronic resources.
J. Cloud Computing, 2013

Comparison of consistency approaches for cloud databases.
IJCC, 2013

Decreasing power consumption with energy efficient data aware strategies.
Future Generation Comp. Syst., 2013

An update-based step-wise optimal cache replacement for wireless data access.
Computer Networks, 2013

On the Performance of Apache Hadoop in a Tiny Private IaaS Cloud.
Proceedings of the Tenth International Conference on Information Technology: New Generations, 2013

Designing a Middleware API for Building Private IaaS Cloud Architectures.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Data Modeling in the Cloud.
Proceedings of the 19th Americas Conference on Information Systems, 2013

Comparing NoSQL MongoDB to an SQL DB.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

A graphical interface for private cloud and cluster management.
Proceedings of the ACM Southeast Regional Conference 2013, 2013

2012
An Empirical Study on the Impact of an Idle Limit in Distributed Systems.
Proceedings of the Ninth International Conference on Information Technology: New Generations, 2012

Performance analysis of a tree-based consistency approach for cloud databases.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

A power efficient persistent storage consolidation algorithm for cloud computing.
Proceedings of the 2012 International Green Computing Conference, 2012

2011
Affecting attitudes in first-year computer science using syntaxfree robotics programming.
Inroads, 2011

Simplifying the Development and Deployment of MapReduce Algorithms.
IJNGC, 2011

Reactive power management for distributed systems.
Proceedings of the 49th Annual Southeast Regional Conference, 2011

2010
Scheduling on-demand data broadcast in mixed-type request environments.
Computer Networks, 2010

Data Replication and Power Consumption in Data Grids.
Proceedings of the Cloud Computing, Second International Conference, 2010

Tree-Based Consistency Approach for Cloud Databases.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Using camouflaging mobility to protect privacy in mobile ad hoc networks.
Security and Communication Networks, 2009

Building a wireless capturing tool for WiFi.
Security and Communication Networks, 2009

Scheduling on-demand broadcast with timing constraints.
J. Parallel Distrib. Comput., 2009

A Remote Data Access Element for Data Grids.
Proceedings of the 2009 International Conference on Grid Computing & Applications, 2009

2008
An on-line replication strategy to increase availability in Data Grids.
Future Generation Comp. Syst., 2008

Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing.
Computer Communications, 2008

Scalability study of cache access mechanisms in multiple-cell wireless networks.
Computer Networks, 2008

Camouflaging mobility for itinerary privacy in mobile ad-hoc networks.
Proceedings of the 9th IEEE International Symposium on a World of Wireless, 2008

Minimizing the Cost of Read-Only Transactions in a Data Sharing Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2008

Active Protection in Wireless Networking.
Proceedings of the MSN 2008, 2008

Secret Little Functions and Codebook for Protecting Users from Password Theft.
Proceedings of IEEE International Conference on Communications, 2008

A Virtual Password Scheme to Protect Passwords.
Proceedings of IEEE International Conference on Communications, 2008

Collaborated Camouflaging Mobility for Mobile Privacy.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

2007
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Online Grid Replication Optimizers to Improve System Reliability.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments.
Proceedings of the Global Communications Conference, 2007

Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks.
Proceedings of the Global Communications Conference, 2007

Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet.
Proceedings of the Global Communications Conference, 2007

2006
A Data Replication Strategy to Increase Data Availability in Data Grids.
Proceedings of the 2006 International Conference on Grid Computing & Applications, 2006

A Dynamic Data Grid Replication Strategy to Minimize the Data Missed.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Pull-based broadcasting with timing constraints.
Parallel Algorithms Appl., 2005

Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories.
J. Database Manag., 2005

Improved variable and value ranking techniques for mining categorical traffic accident data.
Expert Syst. Appl., 2005

Optimizing disk storage to support statistical analysis operations.
Decision Support Systems, 2005

Variable selection and ranking for analyzing automobile traffic accident data.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

Strategies to Improve Variable Selection Performance.
Proceedings of The 2005 International Conference on Information and Knowledge Engineering, 2005

2004
Pitfalls In Distributed Nonblocking Checkpointing.
Journal of Interconnection Networks, 2004

A Pull-Based Broadcast Algorithm that Considers Timing Constraints.
Proceedings of the 33rd International Conference on Parallel Processing Workshops (ICPP 2004 Workshops), 2004

2003
Closing the key loophole in MLS databases.
SIGMOD Record, 2003

CARE: An Automobile Crash Data Analysis Tool.
IEEE Computer, 2003

Low-cost Coordinated Nonblocking Checkpointing in Mobile Computing Systems.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

A Lazy Data Request Approach for On-Demand Data Broadcasting.
Proceedings of the 23rd International Conference on Distributed Computing Systems Workshops (ICDCS 2003 Workshops), 2003

2002
Maintaining security and timeliness in real-time database system.
Journal of Systems and Software, 2002

Time-Optimal Parallel Algorithms for Constructing Optimal Virtual Cellular Networks.
Proceedings of the 9th International Conference on Parallel and Distributed Systems, 2002

Virtual Locks: A Concurrency Control Protocol for Adaptive Broadcasting System.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

2000
Triggered Updates for Temporal Consistency in Real-Time Databases.
Real-Time Systems, 2000

A new measure of temporal consistency for derived objects in real-time database systems.
Inf. Sci., 2000

1999
Satisfying temporal consistency constraints of real-time databases.
Journal of Systems and Software, 1999

A Belief-Consistent Multilevel Secure Relational Data Model.
Inf. Syst., 1999

1998
Satisfying timing constraints of real-time databases.
Journal of Systems and Software, 1998

Maintaining Integrity Constraints and Security in real-Time Database Systems.
Proceedings of the Integrity and Internal Control in Information Systems, 1998

Maintaining Security in Firm Real-Time Database Systems.
Proceedings of the 14th Annual Computer Security Applications Conference (ACSAC 1998), 1998

Joining relations in the belief-consistent multilevel secure relational model.
ACM Southeast Regional Conference, 1998

Issues in security for real-time databases.
ACM Southeast Regional Conference, 1998

1997
Asserting Beliefs in MLS Relational Models.
SIGMOD Record, 1997

Concurrency Control for Approximate Query Processing of Real-Time Database Systems.
RTDB, 1997

Stopping traffic: discretionary access control in a multidatabase system.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

A tightly secure object-oriented data model using both discretionary and mandatory security methodologies.
Proceedings of the 35th Annual Southeast Regional Conference, 1997

1996
Feasibility of Aggregates in Time Constrained Queries.
Inf. Syst., 1996

A Data Model for Approximate Query Processing of Real-Time Databases.
Data Knowl. Eng., 1996

1994
Producing approximate answers to set- and single-valued queries.
Journal of Systems and Software, 1994

1993
APPROXIMATE - A Query Processor that Produces Monotonically Improving Approximate Answers.
IEEE Trans. Knowl. Data Eng., 1993

1991
An Object-Oriented Query Processor that Produces Monotonically Improving Approximate Answers.
Proceedings of the Seventh International Conference on Data Engineering, 1991

1988
Recovering Imprecise Transactions with Real-Time Constraints.
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988

1984
Distributed Query Processing Allowing for Redundant Data.
Proceedings of the 4th International Conference on Distributed Computing Systems, 1984


  Loading...