Shambhu J. Upadhyaya

Orcid: 0000-0002-0596-1703

Affiliations:
  • State University of New York at Buffalo, Department of Computer Science and Engineering


According to our database1, Shambhu J. Upadhyaya authored at least 194 papers between 1986 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Economic Incentives and Perceptions as Critical Factors for Understanding Insider Hacking Behavior.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Apt Detection of Ransomware - An Approach to Detect Advanced Persistent Threats Using System Call Information.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

2022
A Game Theoretic Approach to the Design of Mitigation Strategies for Generic Ransomware.
Proceedings of the Information Systems Security and Privacy, 2022

Game Theoretic Analysis of Ransomware: A Preliminary Study.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

The interaction of dark traits with the perceptions of apprehension.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
An Analysis of Complexity of Insider Attacks to Databases.
ACM Trans. Manag. Inf. Syst., 2021

An Activity Theory Approach to Leak Detection and Mitigation in Patient Health Information (PHI).
J. Assoc. Inf. Syst., 2021

Advances in Secure Knowledge Management in the Artificial Intelligence Era.
Inf. Syst. Frontiers, 2021

Decepticon: a Theoretical Framework to Counter Advanced Persistent Threats.
Inf. Syst. Frontiers, 2021

2020
Psychological Profiling of Hacking Potential.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
Cybersecurity Interventions for Teens: Two Time-Based Approaches.
IEEE Trans. Educ., 2019

An Activity Theory Approach to Modeling Dispatch-Mediated Emergency Response.
J. Assoc. Inf. Syst., 2019

Decepticon: A Hidden Markov Model Approach to Counter Advanced Persistent Threats.
Proceedings of the Secure Knowledge Management In Artificial Intelligence Era, 2019

2018
Similarity Metrics for SQL Query Clustering.
IEEE Trans. Knowl. Data Eng., 2018

Detecting Data Leakage from Databases on Android Apps with Concept Drift.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Synthetic Forgery Attack against Continuous Keystroke Authentication Systems.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

A Prediction Model of Privacy Control for Online Social Networking Users.
Proceedings of the Designing for a Digital and Globalized World, 2018

2017
Kidemonas: The Silent Guardian.
CoRR, 2017

Sensitivity analysis in keystroke dynamics using convolutional neural networks.
Proceedings of the 2017 IEEE Workshop on Information Forensics and Security, 2017

Anatomy of secondary features in keystroke dynamics - achieving more with less.
Proceedings of the IEEE International Conference on Identity, 2017

Transfer learning in long-text keystroke dynamics.
Proceedings of the IEEE International Conference on Identity, 2017

You've Been Tricked! A User Study of the Effectiveness of Typosquatting Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Continuous Authentication Using Behavioral Biometrics.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Complexity of Insider Attacks to Databases.
Proceedings of the 2017 International Workshop on Managing Insider Security Threats, Dallas, TX, USA, October 30, 2017

2016
Guest Editorial: Introduction to the Special Issue on Emerging Security Trends for Deeply-Embedded Computing Systems.
IEEE Trans. Emerg. Top. Comput., 2016

Online shopping intention in the context of data breach in online retail stores: An examination of older and younger adults.
Decis. Support Syst., 2016

Summarizing Large Query Logs in Ettu.
CoRR, 2016

Ettu: Analyzing Query Intents in Corporate Databases.
Proceedings of the 25th International Conference on World Wide Web, 2016

Shared keystroke dataset for continuous authentication.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Effects of text filtering on authentication performance of keystroke biometrics.
Proceedings of the IEEE International Workshop on Information Forensics and Security, 2016

Building Long Term Trust in Vehicular Networks.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Twitter structure as a composition of two distinct networks.
Proceedings of the 2016 International Conference on Computing, 2016

Deception-Based Game Theoretical Approach to Mitigate DoS Attacks.
Proceedings of the Decision and Game Theory for Security - 7th International Conference, 2016

A user study of the effectiveness of typosquatting techniques.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

User authentication with keystroke dynamics in long-text data.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

Adaptive techniques for intra-user variability in keystroke dynamics.
Proceedings of the 8th IEEE International Conference on Biometrics Theory, 2016

The Landscape of Domain Name Typosquatting: Techniques and Countermeasures.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Emerging issues for education in E-discovery for electronic health records.
Secur. Informatics, 2015

Towards a Cyber Ontology for Insider Threats in the Financial Sector.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2015

Secure and privacy preserving data processing support for active authentication.
Inf. Syst. Frontiers, 2015

Surviving advanced persistent threats in a distributed environment - Architecture and analysis.
Inf. Syst. Frontiers, 2015

Advances in secure knowledge management in the big data era.
Inf. Syst. Frontiers, 2015

Enhanced recognition of keystroke dynamics using Gaussian mixture models.
Proceedings of the 34th IEEE Military Communications Conference, 2015

Investigating the Antecedents of Healthcare Workers' Perceptions of Organizational Resilience in Hospitals.
Proceedings of the International Conference on Information Systems, 2015

A Preliminary Cyber Ontology for Insider Threats in the Financial Sector.
Proceedings of the 7th ACM CCS International Workshop on Managing Insider Security Threats, 2015

2014
Minimum Cost Blocking Problem in Multi-Path Wireless Routing Protocols.
IEEE Trans. Computers, 2014

Factors influencing online health information search: An empirical analysis of a national cancer-related survey.
Decis. Support Syst., 2014

An Activity Theory Approach to Specification of Access Control Policies in Transitive Health Workflows.
Proceedings of the International Conference on Information Systems, 2014

2013
A Dispatch-Mediated Communication Model for Emergency Response Systems.
ACM Trans. Manag. Inf. Syst., 2013

Data Model Development for Fire Related Extreme Events: An Activity Theory Approach.
MIS Q., 2013

Analysis of Malware Propagation in Twitter.
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013

SESAME: Smartphone enabled secure access to multiple entities.
Proceedings of the International Conference on Computing, Networking and Communications, 2013

A Conceptual Examination of Distrusting Beliefs in Older Adults about the Internet.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
The Early (tweet-ing) Bird Spreads the Worm: An Assessment of Twitter for Malware Propagation.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Assessing roles of people, technology and structure in emergency management systems: a public sector perspective.
Behav. Inf. Technol., 2012

Data De-duplication and Event Processing for Security Applications on an Embedded Processor.
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012

Emergency Response System Design: An Examination of Emergency Communication Messages.
Proceedings of the Design Science Research in Information Systems. Advances in Theory and Practice, 2012

Design Principles for Emergency Collaborative Systems: A Situation Awareness Study of Buffalo Plane Crash.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Secure Knowledge Management.
Proceedings of the Encyclopedia of Knowledge Management, Second Edition, 2011

Mandatory Access Control.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Exploration of Attacks on Current Generation Smartphones.
Proceedings of the 2nd International Conference on Ambient Systems, 2011

Accelerated Processing of Secure Email by Exploiting Built-in Security Features on the Intel EP80579 Integrated Processor with Intel QuickAssist Technology.
Proceedings of the 30th IEEE Symposium on Reliable Distributed Systems Workshops, 2011

Information assurance education in two- and four-year institutions.
Proceedings of the 16th annual conference reports on Innovation and technology in computer science education, 2011

Detecting Cheating Aggregators and Report Dropping Attacks in Wireless Sensor Networks.
Proceedings of the Cyber Security, Cyber Crime and Cyber Forensics, 2011

2010
Secure Distance-Based Localization in the Presence of Cheating Beacon Nodes.
IEEE Trans. Mob. Comput., 2010

Anatomy of the Information Security Workforce.
IT Prof., 2010

Women in Cybersecurity: A Study of Career Advancement.
IT Prof., 2010

Security protection design for deception and real system regimes: A model and analysis.
Eur. J. Oper. Res., 2010

An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita.
Commun. Assoc. Inf. Syst., 2010

A Multi-step Simulation Approach toward Secure Fault Tolerant System Evaluation.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010

A Data-Centric Approach to Insider Attack Detection in Database Systems.
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010

QoS-T: QoS Throttling to Elicit User Cooperation in Computer Systems.
Proceedings of the Computer Network Security, 2010

Examination of emergency response from knowledge and psychology perspectives.
Proceedings of the 7th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2010

Protecting senior citizens from cyber security attacks in the e-health scenario: an international perspective.
Proceedings of the 6th Cyber Security and Information Intelligence Research Workshop, 2010

2009
Towards a theory for securing time synchronization in wireless sensor networks.
Proceedings of the Second ACM Conference on Wireless Network Security, 2009

On the Two Factors Affecting Information Systems Success in the Extreme Event Context.
Proceedings of the Exploring the Grand Challenges for Next Generation E-Business, 2009

An exploration of unintended online private information disclosure in educational institutions across four countries.
Proceedings of the 2009 eCrime Researchers Summit, 2009

2008
Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model.
J. Assoc. Inf. Syst., 2008

Design Considerations for High Performance RF Cores Based on Process Variation Study.
J. Electron. Test., 2008

Defect Analysis and Defect Tolerant Design of Multi-port SRAMs.
J. Electron. Test., 2008

Security in grid computing: A review and synthesis.
Decis. Support Syst., 2008

Coordination in emergency response management.
Commun. ACM, 2008

A Novel Approach for Security and Robustness in Wireless Embedded Systems.
Proceedings of the Software Technologies for Embedded and Ubiquitous Systems, 2008

Towards a Theory of Robust Localization Against Malicious Beacon Nodes.
Proceedings of the INFOCOM 2008. 27th IEEE International Conference on Computer Communications, 2008

Inferring Sources of Leaks in Document Management Systems.
Proceedings of the Advances in Digital Forensics IV, 2008

Data Model Development for Fire Related Extreme Events - An Activity Theory and Semiotics Approach.
Proceedings of the International Conference on Information Systems, 2008

Insider abuse comprehension through capability acquisition graphs.
Proceedings of the 11th International Conference on Information Fusion, 2008

Infastructure Interdependencies Modeling and Analysis - A Review and Synthesis.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Perceived Risk and Resilience in the Face of Natural Disasters: A Study of Hospital.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Information Theoretic Approach to Design of Emergency Response Systems.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Mediated Internet Experience for Senior Citizens.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Design principles for critical incident response systems.
Inf. Syst. E Bus. Manag., 2007

On extracting consistent graphs in wireless sensor networks.
Int. J. Sens. Networks, 2007

Short Term and Total Life Impact analysis of email worms in computer systems.
Decis. Support Syst., 2007

Efficiency of critical incident management systems: Instrument development and validation.
Decis. Support Syst., 2007

Self-healing systems - survey and synthesis.
Decis. Support Syst., 2007

ASFALT: A Simple Fault-Tolerant Signature-based Localization Technique for Emergency Sensor Networks.
Proceedings of the 26th IEEE Symposium on Reliable Distributed Systems (SRDS 2007), 2007

Position: the user is the enemy.
Proceedings of the 2007 Workshop on New Security Paradigms, White Mountain Hotel and Resort, New Hampshire, USA, 2007

Surface Transportation and Cyber-Infrastructure: An Exploratory Study.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

SpyCon: Emulating User Activities to Detect Evasive Spyware.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Insider Threat Analysis Using Information-Centric Modeling.
Proceedings of the Advances in Digital Forensics III, 2007

On the Hardness of Minimum Cost Blocking Attacks on Multi-Path Wireless Routing Protocols.
Proceedings of IEEE International Conference on Communications, 2007

Towards Modeling Trust Based Decisions: A Game Theoretic Approach.
Proceedings of the Computer Security, 2007

Emergency Response Coordination and IT Support: Contingency and Strategies.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

QoS-LI: QoS Loss Inference in Disadvantaged Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

AEGIS: A Proactive Methodology to Shield against Zero-Day Exploits.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Design of a wireless test control network with radio-on-chip technology for nanometer system-on-a-chip.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2006

PHONEY: Mimicking User Response to Detect Phishing Attacks.
Proceedings of the 2006 International Symposium on a World of Wireless, 2006

Understanding multistage attacks by attack-track based visualization of heterogeneous event streams.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

A Trust Assignment Model Based on Alternate Actions Payoff.
Proceedings of the Trust Management, 4th International Conference, 2006

AVARE: aggregated vulnerability assessment and response against zero-day exploits.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

Detecting Masquerading Users in a Document Management System.
Proceedings of IEEE International Conference on Communications, 2006

Framework for Analyzing Critical Incident Management Systems (CIMS).
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Effect of Process Variation on the Performance of Phase Frequency Detector.
Proceedings of the 21th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2006), 2006

A 3-port Register File Design for Improved Fault Tolerance on Resistive Defects in Core-Cells.
Proceedings of the 21th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2006), 2006

USim: A User Behavior Simulation Framework for Training and Testing IDSes in GUI Based Systems.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

A Framework for Understanding Minority Students' Cyber Security Career Interests.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Dynamically partitioned test scheduling with adaptive TAM configuration for power-constrained SoC testing.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2005

On the Hardness of Approximating the Min-Hack Problem.
J. Comb. Optim., 2005

Information assurance metric development framework for electronic bill presentment and payment systems using transaction and workflow analysis.
Decis. Support Syst., 2005

Secure knowledge management and the semantic web.
Commun. ACM, 2005

SAWAN: A Survivable Architecture for Wireless LANs.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

An Alert Fusion Framework for Situation Awareness of Coordinated Multistage Attacks.
Proceedings of the 3rd IEEE International Workshop on Information Assurance (IWIA 2005), 2005

Design Principles of Coordinated Multi-incident Emergency Response Systems.
Proceedings of the Intelligence and Security Informatics, 2005

A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field .
Proceedings of the Information Systems Security, First International Conference, 2005

A new SoC test architecture with RF/wireless connectivity.
Proceedings of the 10th European Test Symposium, 2005

Towards a Theory of Insider Threat Assessment.
Proceedings of the 2005 International Conference on Dependable Systems and Networks (DSN 2005), 28 June, 2005

An Investigation of Risk Management Issues in the Context of Emergency Response Systems.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Recovery schemes for mesh arrays utilizing dedicated spares.
IEEE Trans. Reliab., 2004

A generic resource distribution and test scheduling scheme for embedded core-based SoCs.
IEEE Trans. Instrum. Meas., 2004

Electronic Banking and Information Assurance Issues: Surveys and Synthesis.
J. Organ. End User Comput., 2004

Cost Model Analysis of DFT Based Fault Tolerant SOC Designs.
Proceedings of the 5th International Symposium on Quality of Electronic Design (ISQED 2004), 2004

A Framework for a Secure Federated Patient Healthcare System.
Proceedings of the Intelligence and Security Informatics, 2004

WDP: A Wormhole Discovery Protocol for Mobile Ad-Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2004

Data Mining for Intrusion Detection: Techniques, Applications and Systems.
Proceedings of the 20th International Conference on Data Engineering, 2004

A Solution Architecture for Financial Institutions to Handle Illegal Activities: A Neural Networks Approach.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Functionality Defense by Heterogeneity: A new paradigm for Securing Systems.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

ARCHERR: Runtime Environment Driven Program Safety.
Proceedings of the Computer Security, 2004

RABIT: A New Framework for Runtime Emulation and Binary Translation.
Proceedings of the Proceedings 37th Annual Simulation Symposium (ANSS-37 2004), 2004

Metrics for Information Security - A literature review.
Proceedings of the 10th Americas Conference on Information Systems, 2004

Security Policies to Mitigate Insider Threat in the Document Control Domain.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates.
Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC 2004), 2004

A conceptual approach to information security in financial account aggregation.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Guest Editorial: Special Issue on Reliable Distributed Systems.
IEEE Trans. Computers, 2003

Power Constrained Test Scheduling with Dynamically Varied TAM.
Proceedings of the 21st IEEE VLSI Test Symposium (VTS 2003), 27 April, 2003

Real-Time Intrusion Detection with Emphasis on Insider Attacks.
Proceedings of the Computer Network Security, 2003

A Tamper-Resistant Framework for Unambiguous Detection of Attacks in User Space Using Process Monitors.
Proceedings of the First IEEE International Workshop on Information Assurance (IWIA'03), 2003

Intrusion Countermeasures Security Model Based on Prioritization Scheme for Intranet Access Security.
Proceedings of the IEEE Systems, 2003

Insecure Programming: How Culpable is a Language's Syntax?
Proceedings of the IEEE Systems, 2003

Control Constrained Resource Partitioning for Complex SoCs.
Proceedings of the 18th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2003), 2003

2002
Minimizing concurrent test time in SoC's by balancing resource usage.
Proceedings of the 12th ACM Great Lakes Symposium on VLSI 2002, 2002

Adaptive Test Scheduling in SoC's by Dynamic Partitioning.
Proceedings of the 17th IEEE International Symposium on Defect and Fault-Tolerance in VLSI Systems (DFT 2002), 2002

Time Slot Specification Based Approach to Analog Fault Diagnosis Using Built-in Current Sensors and Test Point Insertion.
Proceedings of the 11th Asian Test Symposium (ATS 2002), 18-20 November 2002, Guam, USA, 2002

2001
Automatic generation and compaction of March tests for memory arrays.
IEEE Trans. Very Large Scale Integr. Syst., 2001

System-on-Chip Testability Using LSSD Scan Structures.
IEEE Des. Test Comput., 2001

An Analytical Framework for Reasoning about Intrusions.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

2000
Design and Analysis of an Integrated Checkpointing Recovery Scheme for Distributed Applications.
IEEE Trans. Knowl. Data Eng., 2000

A Local/Global Strategy Based on Signal Strength for Message Routing in Wireless Mobile Ad-Hoc Networks.
Proceedings of the 2000 Academia / Industry Working Conference on Research Challenges (AIWoRC 2000), 2000

1999
A New Framework For Automatic Generation, Insertion and Verification of Memory Built-In Self Test Units.
Proceedings of the 17th IEEE VLSI Test Symposium (VTS '99), 1999

A design for test perspective on memory synthesis.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

Programmable Memory BIST and a New Synthesis Framework.
Proceedings of the Digest of Papers: FTCS-29, 1999

On Programmable Memory Built-In Self Test Architectures.
Proceedings of the 1999 Design, 1999

1998
A Novel Approach to Random Pattern Testing of Sequential Circuits.
IEEE Trans. Computers, 1998

Implementing degradable processing arrays.
IEEE Micro, 1998

Component-ontological representation of function for reasoning about devices.
Artif. Intell. Eng., 1998

Automatic Insertion of Scan Structures to Enhance Testability of Embedded Memories, Cores and Chips.
Proceedings of the 16th IEEE VLSI Test Symposium (VTS '98), 28 April, 1998

Design and Analysis of a Hardware-Assisted Checkpointing and Recovery Scheme for Distributed Applications.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998

A new framework for generating optimal March tests for memory arrays.
Proceedings of the Proceedings IEEE International Test Conference 1998, 1998

1997
A Comprehensive Reconfiguration Scheme for Fault-Tolerant VLSI/WSI Array Processors.
IEEE Trans. Computers, 1997

An Object-Oriented Testbed for the Evaluation of Checkpointing and Recovery Systems.
Proceedings of the Digest of Papers: FTCS-27, 1997

1996
Random Pattern Testing for Sequential Circuits Revisited.
Proceedings of the Digest of Papers: FTCS-26, 1996

1995
Conference Reports.
IEEE Des. Test Comput., 1995

Function-based candidate discrimination during model-based diagnosis.
Appl. Artif. Intell., 1995

Utilizing spares in multichip modules for the dual function of fault coverage and fault diagnosis.
Proceedings of the 1995 IEEE International Symposium on Defect and Fault Tolerance in VLSI and Nanotechnology Systems, 1995

1994
Concurrent Process Monitoring with No Reference Signatures.
IEEE Trans. Computers, 1994

Modeling the Reliability of a Class of Fault-Tolerant VLSI/WSI Systems Based on Multiple-Level Redundancy.
IEEE Trans. Computers, 1994

Implementation of a Gracefully Degradable Binary Tree in Programmable.
Proceedings of the IEEE International Workshop on Defect and Fault Tolerance in VLSI Systems, 1994

Simulation analysis of a dynamic checkpointing strategy for real-time systems.
Proceedings of the Proceedings 27th Annual Simulation Symposium, 1994

1993
Analysis of Noncoherent Systems and an Architecture for the Computation of the System Reliability.
IEEE Trans. Computers, 1993

Yield Analysis of Reconfigurable Array Processors Based on Multiple-Level Redundancy.
IEEE Trans. Computers, 1993

Reliability, Reconfiguration, and Spare Allocation Issues in Binary-Tree Architectures Based on Multiple-Level Redundancy.
IEEE Trans. Computers, 1993

On-chip test generation for combinational circuits by LFSR modification.
Proceedings of the 1993 IEEE/ACM International Conference on Computer-Aided Design, 1993

A parallel VLSI implementation of Viterbi algorithm for accelerated word recognition.
Proceedings of the Third Great Lakes Symposium on Design Automation of High Performance VLSI Systems, 1993

1991
Focusing candidate generation.
Artif. Intell. Eng., 1991

1990
Yield enhancement of field programmable logic arrays by inherent component redundancy.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1990

An analysis of a reconfigurable binary tree architecture based on multiple-level redundancy.
Proceedings of the 20th International Symposium on Fault-Tolerant Computing, 1990

BIST PLAs, Pass or Fail - A Case Study.
Proceedings of the 27th ACM/IEEE Design Automation Conference. Orlando, 1990

Rollback recovery in real-time systems with dynamic constraints.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1988
A new approach to the design of built-in self-testing PLAs for high fault coverage.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1988

An experimental study to determine task size for rollback recovery systems.
IEEE Trans. Computers, 1988

Dynamic Techniques for Yield Enhancement of Field Programmable Logic Arrays.
Proceedings of the Proceedings International Test Conference 1988, 1988

A Unified Approach to Designing Fault-Tolerant Processor Ensembles.
Proceedings of the International Conference on Parallel Processing, 1988

1987
BIST-PLA: A Built-in Self-Test Design of Large Programmable Logic Arrays.
Proceedings of the 24th ACM/IEEE Design Automation Conference. Miami Beach, FL, USA, June 28, 1987

1986
A Wachtdog Processor Based General Rollback Technique with Multiple Retries.
IEEE Trans. Software Eng., 1986


  Loading...