Arshad Jhumka
Orcid: 0000-0003-0540-2845Affiliations:
- University of Warwick, Coventry, UK
According to our database1,
Arshad Jhumka
authored at least 106 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Proceedings of the 2024 Workshop on Forming an Ecosystem Around Software Transformation, 2024
Proceedings of the Working Notes of the Conference and Labs of the Evaluation Forum (CLEF 2024), 2024
2023
J. Supercomput., November, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the 22nd International Conference on Information Processing in Sensor Networks, 2023
Proceedings of the 2023 International Conference on embedded Wireless Systems and Networks, 2023
Proceedings of the Computer Security. ESORICS 2023 International Workshops, 2023
Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things.
ACM Trans. Sens. Networks, 2022
Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss.
IEEE Trans. Inf. Forensics Secur., 2022
Future Gener. Comput. Syst., 2022
A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems.
IEEE Access, 2022
Clairvoyant: a log-based transformer-decoder for failure prediction in large-scale systems.
Proceedings of the ICS '22: 2022 International Conference on Supercomputing, Virtual Event, June 28, 2022
2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the 18th International Conference on Privacy, Security and Trust, 2021
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
Proceedings of the 20th IEEE International Symposium on Network Computing and Applications, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021
Toward Secure VMs Allocation: Analysis of VMs Allocation Behaviours in the Cloud Computing Environments.
Proceedings of the Cloud Computing and Services Science - 11th International Conference, 2021
Proceedings of the 11th International Conference on Cloud Computing and Services Science, 2021
2020
A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks.
ACM Trans. Internet Things, 2020
2019
Towards comprehensive dependability-driven resource use and message log-analysis for HPC systems diagnosis.
J. Parallel Distributed Comput., 2019
Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2019
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing.
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019
Using Resource Use Data and System Logs for HPC System Error Propagation and Recovery Diagnosis.
Proceedings of the 2019 IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2019
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019
Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation.
Proceedings of the 15th European Dependable Computing Conference, 2019
The impact of decreasing transmit power levels on FlockLab to achieve a sparse network.
Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, 2019
2018
J. Parallel Distributed Comput., 2018
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks.
Future Gener. Comput. Syst., 2018
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks.
Comput. Networks, 2018
2017
Comput. Networks, 2017
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017
Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
A Lower Bound on the Number of Nodes with Multiple Slots in Wireless Sensor Networks with Multiple Sinks.
Proceedings of the 6th International Conference on Sensor Networks (SENSORNETS 2017), 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the Symposium on Applied Computing, 2017
Proceedings of the 22nd IEEE Pacific Rim International Symposium on Dependable Computing, 2017
Understanding source location privacy protocols in sensor networks via perturbation of time series.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Enabling Dependability-Driven Resource Use and Message Log-Analysis for Cluster System Diagnosis.
Proceedings of the 24th IEEE International Conference on High Performance Computing, 2017
2016
ACM Trans. Sens. Networks, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
CRUDE: Combining Resource Usage Data and Error Logs for Accurate Error Detection in Large-Scale Distributed Systems.
Proceedings of the 35th IEEE Symposium on Reliable Distributed Systems, 2016
Towards Energy-efficient Collision-free Data Aggregation Scheduling in Wireless Sensor Networks with Multiple Sinks.
Proceedings of the SENSORNETS 2016, 2016
Proceedings of the 23rd IEEE International Conference on High Performance Computing, 2016
2015
Concurr. Comput. Pract. Exp., 2015
Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems Using Console and Resource Usage Logs.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks.
Proceedings of the 21st IEEE Pacific Rim International Symposium on Dependable Computing, 2015
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015
An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 11th European Dependable Computing Conference, 2015
2014
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks.
J. Parallel Distributed Comput., 2014
Future Gener. Comput. Syst., 2014
Comput. J., 2014
2013
Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors.
Comput. J., 2013
Auton. Agents Multi Agent Syst., 2013
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the IEEE 32nd Symposium on Reliable Distributed Systems, 2013
2012
Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources.
Proceedings of the 11th IEEE International Conference on Trust, 2012
2011
Int. J. Digit. Crime Forensics, 2011
On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy.
Comput. J., 2011
Proceedings of the IEEE 22nd International Symposium on Software Reliability Engineering, 2011
Proceedings of the 2011 IEEE/IFIP International Conference on Dependable Systems and Networks, 2011
Proceedings of the 11th IEEE International Conference on Computer and Information Technology, 2011
2010
Proceedings of the Agent-Based Service-Oriented Computing, 2010
A software integration approach for designing and assessing dependable embedded systems.
J. Syst. Softw., 2010
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks.
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Multimedia and Security Workshop, 2010
Proceedings of the Eighth European Dependable Computing Conference, 2010
2009
Proceedings of the Guide to Wireless Mesh Networks, 2009
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
Proceedings of the 2009 15th IEEE Pacific Rim International Symposium on Dependable Computing, 2009
Proceedings of the ISSRE 2009, 2009
2008
Proceedings of the Intelligent Distributed Computing, Systems and Applications, Proceedings of the 2nd International Symposium on Intelligent Distributed Computing, 2008
2007
Proceedings of the Stabilization, 2007
On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2007
2006
2005
Proceedings of the Third IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 2005
Proceedings of the Formal Techniques for Networked and Distributed Systems, 2005
Proceedings of the 2005 Design, 2005
2004
IEEE Trans. Computers, 2004
Proceedings of the Service Availability, 2004
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems.
Proceedings of the 8th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2004), 2004
Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications.
Proceedings of the Formal Techniques, 2004
2003
A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs.
Proceedings of the Software and Compilers for Embedded Systems, 7th International Workshop, 2003
2002
On systematic design of globally consistent executable assertions in embedded software.
Proceedings of the 2002 Joint Conference on Languages, 2002
Proceedings of the International Symposium on Software Testing and Analysis, 2002
Proceedings of the 7th IEEE International Symposium on High-Assurance Systems Engineering (HASE 2002), 2002
Proceedings of the Formal Techniques in Real-Time and Fault-Tolerant Systems, 2002
Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 2002
2001
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001