Bharat K. Bhargava
Orcid: 0000-0003-3803-8672Affiliations:
- Purdue University, Department of Computer Science, West Lafayette, IN, USA
According to our database1,
Bharat K. Bhargava
authored at least 309 papers
between 1973 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
BioKA-ASVN: Biometric-Based Key Agreement Scheme for Air Smart Vehicular Networks Using Blockchain Service.
IEEE Trans. Veh. Technol., July, 2024
A Hybrid Deep Reinforcement Learning Approach for Jointly Optimizing Offloading and Resource Management in Vehicular Networks.
IEEE Trans. Veh. Technol., 2024
IEEE Trans. Multim., 2024
RUDOLF: An Efficient and Adaptive Defense Approach Against Website Fingerprinting Attacks Based on Soft Actor-Critic Algorithm.
IEEE Trans. Inf. Forensics Secur., 2024
Malware Speaks! Deep Learning Based Assembly Code Processing for Detecting Evasive Cryptojacking.
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Access, 2024
2023
Secure and Distributed IoT Data Storage in Clouds Based on Secret Sharing and Collaborative Blockchain.
IEEE/ACM Trans. Netw., August, 2023
Lightweight and Secure Data Transmission Scheme Against Malicious Nodes in Heterogeneous Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts.
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents.
Proceedings of the 52nd IEEE Applied Imagery Pattern Recognition Workshop, 2023
2022
RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage.
IEEE Trans. Serv. Comput., 2022
IEEE Trans. Parallel Distributed Syst., 2022
IEEE/ACM Trans. Netw., 2022
PassGoodPool: Joint Passengers and Goods Fleet Management With Reinforcement Learning Aided Pricing, Matching, and Route Planning.
IEEE Trans. Intell. Transp. Syst., 2022
AdaPool: A Diurnal-Adaptive Fleet Management Framework Using Model-Free Deep Reinforcement Learning and Change Point Detection.
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Emerg. Top. Comput. Intell., 2022
Bio-Inspired Formal Model for Space/Time Virtual Machine Randomization and Diversification.
IEEE Trans. Cloud Comput., 2022
1174: futuristic trends and innovations in multimedia systems using big data, IoT and cloud technologies (FTIMS).
Multim. Tools Appl., 2022
Int. J. Commun. Networks Distributed Syst., 2022
Computer, 2022
Proceedings of the Uncertainty in Artificial Intelligence, 2022
2021
Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment.
Wirel. Pers. Commun., 2021
IEEE Trans. Serv. Comput., 2021
A Distributed Model-Free Ride-Sharing Approach for Joint Matching, Pricing, and Dispatching Using Deep Reinforcement Learning.
IEEE Trans. Intell. Transp. Syst., 2021
Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs.
IEEE Trans. Inf. Forensics Secur., 2021
Detection of Message Injection Attacks onto the CAN Bus using Similarity of Successive Messages-Sequence Graphs.
CoRR, 2021
Learning Monopoly Gameplay: A Hybrid Model-Free Deep Reinforcement Learning and Imitation Learning Approach.
CoRR, 2021
Proceedings of the Third International Conference on Transdisciplinary AI, 2021
Proceedings of the BiDEDE '21: Proceedings of the International Workshop on Big Data in Emergent Distributed Environments, 2021
Towards situational awareness with multimodal streaming data fusion: serverless computing approach.
Proceedings of the BiDEDE '21: Proceedings of the International Workshop on Big Data in Emergent Distributed Environments, 2021
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021
Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021
Real Application of Machine Learning (REALM): Situation Knowledge on Demand (SKOD); - Abstract.
Proceedings of the International Semantic Intelligence Conference 2021 (ISIC 2021), 2021
2020
Dataset, December, 2020
Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2020
From Byzantine Fault-Tolerance to Fault-Avoidance: An Architectural Transformation to Attack and Failure Resiliency.
IEEE Trans. Cloud Comput., 2020
Sustain. Comput. Informatics Syst., 2020
CoRR, 2020
AdaPool: An Adaptive Model-Free Ride-Sharing Approach for Dispatching using Deep Reinforcement Learning.
Proceedings of the BuildSys '20: The 7th ACM International Conference on Systems for Energy-Efficient Buildings, 2020
A Distributed Model-Free Ride-Sharing Algorithm with Pricing using Deep Reinforcement Learning.
Proceedings of the CSCS '20: Computer Science in Cars Symposium, 2020
Proceedings of the 3rd IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2020
DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters.
Proceedings of the IEEE International Conference on Autonomic Computing and Self-Organizing Systems, 2020
2019
IEEE Trans. Serv. Comput., 2019
A Blockchain-Enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing.
IEEE Trans. Ind. Informatics, 2019
Multim. Tools Appl., 2019
A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation.
IEEE Access, 2019
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018
Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing.
IEEE Trans. Ind. Informatics, 2018
IEEE Trans. Inf. Forensics Secur., 2018
IEEE Intell. Transp. Syst. Mag., 2018
Comput. Secur., 2018
Impacts of Security Attacks on The Effectiveness of Collaborative Adaptive Cruise Control Mechanism.
Proceedings of the IEEE International Smart Cities Conference, 2018
Proceedings of the 2018 IEEE International Conference on Cognitive Computing, 2018
Proceedings of the 2018 IEEE International Congress on Internet of Things, 2018
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018
Proceedings of the First IEEE International Conference on Artificial Intelligence and Knowledge Engineering, 2018
(WIP) Blockhub: Blockchain-Based Software Development System for Untrusted Environments.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018
2017
IEEE Trans. Serv. Comput., 2017
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017
Proceedings of the 2017 IEEE International Congress on Internet of Things, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2016
Comput. Secur., 2016
Proceedings of the 2016 IEEE/IFIP Network Operations and Management Symposium, 2016
Proceedings of the IEEE International Conference on Web Services, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Consumer Oriented Privacy Preserving Access Control for Electronic Health Records in the Cloud.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Int. J. Next Gener. Comput., 2015
Comput. Secur., 2015
IEEE Cloud Comput., 2015
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing.
Proceedings of the 34th IEEE Symposium on Reliable Distributed Systems Workshop, 2015
Proceedings of the 2015 IEEE International Conference on Web Services, 2015
Proceedings of the CLOSER 2015, 2015
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
IEEE Trans. Dependable Secur. Comput., 2014
A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks.
J. Netw. Comput. Appl., 2014
Int. J. Next Gener. Comput., 2014
Int. J. Next Gener. Comput., 2014
IEEE Cloud Comput., 2014
IEEE Cloud Comput., 2014
Proceedings of the Global Information Infrastructure and Networking Symposium, 2014
Proceedings of the Ninth International Conference on Availability, 2014
2013
Wirel. Pers. Commun., 2013
IEEE Trans. Dependable Secur. Comput., 2013
Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model.
Secur. Commun. Networks, 2013
Editorial for Special Issue on "New Technologies and Applications for Wireless Communications & Mobile Cloud Computing".
Mob. Networks Appl., 2013
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2013
A time-evolution model for the privacy degree of information disseminated in online social networks.
Int. J. Commun. Networks Distributed Syst., 2013
Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013
Proceedings of the 2013 IEEE 14th International Conference on Mobile Data Management, Milan, Italy, June 3-6, 2013, 2013
2012
IEEE Trans. Dependable Secur. Comput., 2012
A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs.
Int. J. Next Gener. Comput., 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the IEEE 31st Symposium on Reliable Distributed Systems, 2012
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
2011
Secur. Commun. Networks, 2011
Proceedings of the Future Challenges in Security and Privacy for Academia and Industry, 2011
2010
Int. J. Next Gener. Comput., 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the 29th IEEE Symposium on Reliable Distributed Systems (SRDS 2010), New Delhi, Punjab, India, October 31, 2010
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010
Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach.
Proceedings of the 17th International Conference on Telecommunications, 2010
2009
Proceedings of the Richard Tapia Celebration of Diversity in Computing Conference 2009: Intellect, 2009
The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation.
Proceedings of the 28th IEEE Symposium on Reliable Distributed Systems (SRDS 2009), 2009
Detection and filtering Spam over Internet Telephony - a user-behavior-aware intermediate-network-based approach.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks.
ACM Trans. Multim. Comput. Commun. Appl., 2008
Int. J. Secur. Networks, 2008
A role-based access in a hierarchical sensor network architecture to provide multilevel security.
Comput. Commun., 2008
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
2007
IEEE Trans. Circuits Syst. Video Technol., 2007
Int. J. Distributed Sens. Networks, 2007
Electron. Commer. Res. Appl., 2007
Proceedings of the 23rd IEEE International Conference on Software Maintenance (ICSM 2007), 2007
2006
Wirel. Commun. Mob. Comput., 2006
IEEE Trans. Wirel. Commun., 2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
IEEE Trans. Mob. Comput., 2006
Perform. Evaluation, 2006
Energy and Communication Efficient Group Key Management Protocol for Hierarchical Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2006
Proceedings of the 17th International Workshop on Database and Expert Systems Applications (DEXA 2006), 2006
2005
Proceedings of the Handbook of Algorithms for Wireless Networking and Mobile Computing., 2005
IEEE Trans. Mob. Comput., 2005
A Tree-Based Forward Digest Protocol to Verify Data Integrity in Distributed Media Streaming.
IEEE Trans. Knowl. Data Eng., 2005
Int. J. Cooperative Inf. Syst., 2005
Comput. Commun., 2005
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the Second Annual IEEE Communications Society Conference on Sensor and Ad Hoc Communications and Networks, 2005
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations.
Proceedings of the Distributed Computing and Internet Technology, 2005
2004
Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA).
Mob. Networks Appl., 2004
J. Commun. Networks, 2004
Comput. Networks, 2004
Comput. Networks, 2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
Proceedings of the 2nd IEEE Conference on Pervasive Computing and Communications Workshops (PerCom 2004 Workshops), 2004
Proceedings of the 1st ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2004
E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities.
Proceedings of the Trust Management, Second International Conference, 2004
Proceedings of the IEEE International Conference on Web Services (ICWS'04), 2004
Proceedings of the Distributed Computing and Internet Technology, 2004
2003
Comput. Commun., 2003
Proceedings of the 1st IEEE Workshop on Software Technologies for Future Embedded Systems, 2003
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
Proceedings of the Network and Distributed System Security Symposium, 2003
A low-cost, low-delay location update/paging scheme in hierarchical cellular networks.
Proceedings of the Third ACM International Workshop on Data Engineering for Wireless and Mobile Access, 2003
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003
Proceedings of the 9th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2003), 2003
Proceedings of the Data Warehousing and Knowledge Discovery, 5th International Conference, 2003
2002
Advances in Database Systems 4, Kluwer, ISBN: 978-0-7923-9800-4, 2002
Multim. Tools Appl., 2002
Multim. Tools Appl., 2002
Performance evaluation of linear hash structure model in a nested transaction environment.
J. Syst. Softw., 2002
Proceedings of the 27th Annual IEEE Conference on Local Computer Networks (LCN 2002), 2002
Design and Implementation of a Python-Based Active Network Platform for Network Management and Control.
Proceedings of the Active Networks, IFIP-TC6 4th International Working Conference, 2002
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002
A round trip time and time-out aware traffic conditioner for differentiated services networks.
Proceedings of the IEEE International Conference on Communications, 2002
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002
Proceedings of the Data Warehousing and Knowledge Discovery, 4th International Conference, 2002
2001
Global Scheduling for Flexible Transactions in Heterogeneous Distributed Database Systems.
IEEE Trans. Knowl. Data Eng., 2001
Formalization and Proof of Correctness of the Crash Recovery Algorithm for an Open and Safe Nested Transaction Model.
Int. J. Cooperative Inf. Syst., 2001
Distributed Parallel Databases, 2001
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001
Design and evaluation of an adaptive traffic conditioner for differentiated services networks.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001
2000
Design and Analysis of an Integrated Checkpointing Recovery Scheme for Distributed Applications.
IEEE Trans. Knowl. Data Eng., 2000
J. Syst. Softw., 2000
Multi-level transaction model for semantic concurrency control in linear hash structures.
Inf. Softw. Technol., 2000
An adaptable constrained locking protocol for high data contention environments: correctness and performance.
Inf. Softw. Technol., 2000
Proceedings of the 2000 Kyoto International Conference on Digital Libraries: Research and Practice, 2000
Experimental Evaluation of Design Tradeoff in Specialized Virtual Machine for Multimedia Traffic in Active Networks.
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Proceedings of the 2000 IEEE International Conference on Multimedia and Expo, 2000
Fault Tolerant Authentication in Mobile Computing.
Proceedings of the International Conference on Internet Computing, 2000
Proceedings of the Data Warehousing and Knowledge Discovery, 2000
Proceedings of the Current Issues in Databases and Information Systems, 2000
1999
IEEE Trans. Knowl. Data Eng., 1999
MPEG Video Encryption in Real-time Using Secret Key Cryptography.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999
Design and Implementation of Linear Hash Algorithm in a Nested Transaction Environment.
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999
Proceedings of the Database and Expert Systems Applications, 10th International Conference, 1999
Proceedings of the Database Systems for Advanced Applications, 1999
1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Design and Analysis of a Hardware-Assisted Checkpointing and Recovery Scheme for Distributed Applications.
Proceedings of the Seventeenth Symposium on Reliable Distributed Systems, 1998
Proceedings of the 6th ACM International Conference on Multimedia '98, 1998
Proceedings of the 1998 International Database Engineering and Applications Symposium, 1998
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998
1997
Proceedings of the Database and Expert Systems Applications, 8th International Conference, 1997
Multi-pass Transmission Policy: An Effective Method of Transmitting Large Multimedia Objects in the Wide-Area Network.
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997
Proceedings of the 21st International Computer Software and Applications Conference (COMPSAC '97), 1997
System Defined Prewrites for Increasing Concurrency in Databases.
Proceedings of the First East-European Symposium on Advances in Databases and Information Systems (ADBIS'97), 1997
1996
Supporting Method Migration in a Distributed Object Database System: A Performance Study.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996
Proceedings of the Seventh International Workshop on Database and Expert Systems Applications, 1996
A Colour-Based Technique for Measuring Visible Loss for Use in Image Data Communication.
Proceedings of the Database and Expert Systems Applications, 7th International Conference, 1996
1995
A Framework for Providing Consistent and Recoverable Agent-Based Access to Heterogeneous in Mobile Databases.
SIGMOD Rec., 1995
A View-Based Approach to Relaxing Global Serializability in a Multidatabase System (Abstract).
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995
Proceedings of the 15th International Conference on Distributed Computing Systems, Vancouver, British Columbia, Canada, May 30, 1995
A Layered Architecture for Supporting Objects in a Relational System: A Performance Study
Proceedings of the Database and Expert Systems Applications, 1995
Proceedings of the Database and Expert Systems Applications, 1995
Proceedings of the Information Systems and Data Management, 1995
1994
Proceedings of the First Workshop on Mobile Computing Systems and Applications, 1994
Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data, 1994
Proceedings of the Digital Libraries: Current Issues, 1994
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994
1993
Proceedings of the Advanced Database Systems, 1993
Push: An experimental facility for implementing distributed database services in operating systems.
J. Syst. Integr., 1993
Int. J. Cooperative Inf. Syst., 1993
O-Raid: Experiences and Experiments.
Proceedings of the International Conference on Intelligent and Cooperative Information Systems, 1993
Proceedings of the CIKM 93, 1993
1992
Integrating Distributed Data Sources Using Federated Objects.
Proceedings of the Distributed Object Management, 1992
1991
Analyzing Availability of Replicated Database Systems.
Int. J. Comput. Simul., 1991
Comput. Syst., 1991
Computer, 1991
Comput. Networks ISDN Syst., 1991
Experiences with Super, a Database Visual Environment.
Proceedings of the Proceedings of the International Conference on Database and Expert Systems Applications, 1991
1990
Proceedings of the 16th International Conference on Very Large Data Bases, 1990
Proceedings of the Ninth Symposium on Reliable Distributed Systems, 1990
Implementing Object Support in the RAID Distributed Database System.
Proceedings of the First International Conference on Systems Integration, 1990
Experimental Evaluation of Concurrency Checkpointing and Rollback-Recovery Algorithms.
Proceedings of the Sixth International Conference on Data Engineering, 1990
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990
1989
IEEE Trans. Knowl. Data Eng., 1989
Proceedings of the Fifth International Conference on Data Engineering, 1989
Implementation and Measurements of Efficient Communication Facilities for Distributed Database Systems.
Proceedings of the Fifth International Conference on Data Engineering, 1989
Proceedings of the 9th International Conference on Distributed Computing Systems, 1989
Proceedings of the Foundations of Data Organization and Algorithms, 1989
1988
IEEE Trans. Software Eng., 1988
A Dynamic majority determination algorithm for reconfiguration of network partitions.
Inf. Sci., 1988
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988
Independent Checkpointing and Concurrent Rollback for Recovery in Distributed Systems - An Optimistic Approach.
Proceedings of the Seventh Symposium on Reliable Distributed Systems, 1988
Proceedings of the Fourth International Conference on Data Engineering, 1988
An Experimental Analysis of Replicated Copy Control During Site Failure and Recovery.
Proceedings of the Fourth International Conference on Data Engineering, 1988
Proceedings of the Foundations of Software Technology and Theoretical Computer Science, 1988
1987
IEEE Trans. Software Eng., 1987
Transaction Processing and Consistency Control of Replicated Copies during Failures in Distributed Databases.
J. Manag. Inf. Syst., 1987
Proceedings of the 1987 Fall Joint Computer Conference on Exploring technology: today and tomorrow, 1987
1986
Proceedings of the 2nd ACM SIGOPS European Workshop, 1986
Site Recovery in Replicated Distributed Database Systems.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986
1985
IEEE Trans. Software Eng., 1985
Proceedings of the 1985 ACM SIGMOD International Conference on Management of Data, 1985
1984
IEEE Trans. Software Eng., 1984
Performance evaluation of reliability control algorithms for distributed database systems.
J. Syst. Softw., 1984
1983
IEEE Trans. Software Eng., 1983
Analysis of the Majority Consensus Concurrency Control Algorithm for Correctness and Performance Using the Event Ordering Approach.
Proceedings of the Proceedings IEEE INFOCOM 83, San Diego, CA, USA, April 18-21, 1983, 1983
Cost Analysis of Selected Database Restoration Techniques.
Proceedings of the 3rd Int. Conf. on Entity-Relationship Approach (ER'83), 1983
1982
IEEE Trans. Software Eng., 1982
Classes of Serializable Histories and Synchronization Algorithms in Distributed Database Systems.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982
Performance Evaluation of the Optimistic Approach to Distributed Database Systems and Its Comparison to Locking.
Proceedings of the Proceedings of the 3rd International Conference on Distributed Computing Systems, 1982
1981
Int. J. Parallel Program., 1981
Int. J. Parallel Program., 1981
Proceedings of the American Federation of Information Processing Societies: 1981 National Computer Conference, 1981
Proceedings of the American Federation of Information Processing Societies: 1981 National Computer Conference, 1981
1980
Proceedings of the Pictorial Information Systems, 1980
1978
Characteristics And Problems Encountered In Different Database Applications (Panel Discussion).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978
Crossfertilization Of DBMS Research With Other Disciplines Of Computer Science (Panel Discussion).
Proceedings of the Proceedings 1978 ACM Annual Conference, 1978
1975
Proceedings of the American Federation of Information Processing Societies: 1975 National Computer Conference, 1975
1973