Mukesh Singhal

Orcid: 0000-0002-0497-1942

According to our database1, Mukesh Singhal authored at least 247 papers between 1986 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2001, "For contributions to algorithms for distributed systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Correction: K-means tree: an optimal clustering tree for unsupervised learning.
J. Supercomput., April, 2024

A Committee Based Optimal Asynchronous Byzantine Agreement Protocol W.P. 1.
CoRR, 2024

Slim-ABC: An Optimized Atomic Broadcast Protocol.
CoRR, 2024

Prioritized-MVBA: A New Approach to Design an Optimal Asynchronous Byzantine Agreement Protocol.
CoRR, 2024

VQUNet: Vector Quantization U-Net for Defending Adversarial Atacks by Regularizing Unwanted Noise.
CoRR, 2024

Enhancing Synthetic Reduced Nearest-Neighbor with Two-Layer Neural Networks: A Step Forward in Image Classification.
Proceedings of the IEEE Workshop on Signal Processing Systemsm, 2024

VQUNet: Vector Quantization U-Net for Defending Adversarial Attacks by Regularizing Unwanted Noise.
Proceedings of the 2024 7th International Conference on Machine Vision and Applications, 2024

2023
Towards Energy-Fairness in LoRa Networks.
IEEE Trans. Mob. Comput., September, 2023


2022
An EM-based optimization of synthetic reduced nearest neighbor model towards multiple modalities representation with human interpretability.
Multim. Tools Appl., 2022

Novel Adversarial Defense Techniques for White-Box Attacks.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Recurrent Nerual Imaging: An Evolutionary Approach for Mixed Possion-Gaussian Image Denoising.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

A Novel Approach for Synthetic Reduced Nearest-Neighbor Leveraging Neural Networks.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Stochastic Induction of Decision Trees with Application to Learning Haar Trees.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

Adversarial Label-Poisoning Attacks and Defense for General Multi-Class Models Based on Synthetic Reduced Nearest Neighbor.
Proceedings of the 2022 IEEE International Conference on Image Processing, 2022

FLEX: A Platform for Scalable Service Placement in Multi-Fog and Multi-Cloud Environments.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

2021
K-means tree: an optimal clustering tree for unsupervised learning.
J. Supercomput., 2021

Adversarial Poisoning Attacks and Defense for General Multi-Class Models Based On Synthetic Reduced Nearest Neighbors.
CoRR, 2021

Adversarial Defense Through High Frequency Loss Variational Autoencoder Decoder and Bayesian Update With Collective Voting.
Proceedings of the 17th International Conference on Machine Vision and Applications, 2021

Second-Order Trust-Region Optimization for Data-Limited Inference.
Proceedings of the 29th European Signal Processing Conference, 2021

Multi-Stage Gaussian Noise Reduction with Recurrent Neural Networks.
Proceedings of the 55th Asilomar Conference on Signals, Systems, and Computers, 2021

2020
A hybrid scheduling platform: a runtime prediction reliability aware scheduling platform to improve HPC scheduling performance.
J. Supercomput., 2020

Interpretable Synthetic Reduced Nearest Neighbor: An Expectation Maximization Approach.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
Joint failure recovery, fault prevention, and energy-efficient resource management for real-time SFC in fog-supported SDN.
Comput. Networks, 2019

Active Learning of Reward Dynamics from Hierarchical Queries.
Proceedings of the 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2019

Towards Energy-Fairness in LoRa Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Learning from Richer Human Guidance: Augmenting Comparison-Based Learning with Feature Queries.
Proceedings of the 2018 ACM/IEEE International Conference on Human-Robot Interaction, 2018

Adaptive Online Runtime Prediction to Improve HPC Applications Latency in Cloud.
Proceedings of the 11th IEEE International Conference on Cloud Computing, 2018

2017
Efficient and Scalable Query Authentication for Cloud-Based Storage Systems with Multiple Data Sources.
IEEE Trans. Serv. Comput., 2017

Barrier coverage of WSNs with the imperialist competitive algorithm.
J. Supercomput., 2017

A novel access control protocol using proxy signatures for cloud-based health information exchange.
Comput. Secur., 2017

Learning Data Privacy and Terms of Service from Different Cloud Service Providers.
Proceedings of the 2017 IEEE International Conference on Smart Cloud, 2017

Do You Want Your Autonomous Car To Drive Like You?
Proceedings of the 2017 ACM/IEEE International Conference on Human-Robot Interaction, 2017

Risk-Based Packet Routing for Privacy and Compliance-Preserving SDN.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

Compliance-Aware Provisioning of Containers on Cloud.
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017

2016
A limited-trust capacity model for mitigating threats of internal malicious services in cloud computing.
Clust. Comput., 2016

A secure framework for sharing Electronic Health Records over Clouds.
Proceedings of the 2016 IEEE International Conference on Serious Games and Applications for Health, 2016

An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users.
Proceedings of the Seventh International Workshop on Data-Intensive Computing in the Clouds, 2016

An Energy Efficient Data Privacy Scheme for IoT Devices in Mobile Cloud Computing.
Proceedings of the 2016 IEEE International Conference on Mobile Services, MS 2016, San Francisco, CA, USA, June 27, 2016

Scheduling jobs with non-uniform demands on multiple servers without interruption.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

A Secure Framework for Medical Information Exchange (MI-X) between Healthcare Providers.
Proceedings of the 2016 IEEE International Conference on Healthcare Informatics, 2016

CloudPDB: A light-weight data privacy schema for cloud-based databases.
Proceedings of the 2016 International Conference on Computing, 2016

A Simultaneous Key Generation Technique for Health Information Exchange (HIE) Based on Existing Patients' Credentials.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

Trust Dynamics in Human Autonomous Vehicle Interaction: A Review of Trust Models.
Proceedings of the 2016 AAAI Spring Symposia, 2016

2015
Improving Channel Assignment in Multi-radio Wireless Mesh Networks with Learning Automata.
Wirel. Pers. Commun., 2015

ALATO: An efficient intelligent algorithm for time optimization in an economic grid based on adaptive stochastic Petri net.
J. Intell. Manuf., 2015

An Introduction to Multi-trapdoor Hash Functions and It's Applications.
Proceedings of the 2015 International Conference on Soft Computing and Software Engineering, 2015

A Light-Weight Permutation Based Method for Data Privacy in Mobile Cloud Computing.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

DCCSOA: A Dynamic Cloud Computing Service-Oriented Architecture.
Proceedings of the 2015 IEEE International Conference on Information Reuse and Integration, 2015

A cloud-based web crawler architecture.
Proceedings of the 18th International Conference on Intelligence in Next Generation Networks, 2015

A dynamic cloud computing platform for eHealth systems.
Proceedings of the 17th International Conference on E-health Networking, 2015

Efficient and scalable aggregate signcryption scheme based on multi-trapdoor hash functions.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
PGSW-OS: a novel approach for resource management in a semantic web operating system based on a P2P grid architecture.
J. Supercomput., 2014

An efficient routing algorithm to preserve k-coverage in wireless sensor networks.
J. Supercomput., 2014

Guest Editorial - Cloud and Big Data.
J. Commun., 2014

Multi-trapdoor hash functions and their applications in network security.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
Efficient distributed snapshots in an anonymous asynchronous message-passing system.
J. Parallel Distributed Comput., 2013

Hybrid Metaheuristic Algorithm for Job Scheduling on Computational Grids.
Informatica (Slovenia), 2013

GLOA: A New Job Scheduling Algorithm for Grid Computing.
Int. J. Interact. Multim. Artif. Intell., 2013

Collaboration in Multicloud Computing Environments: Framework and Security Issues.
Computer, 2013

2012
A Trapdoor Hash-Based Mechanism for Stream Authentication.
IEEE Trans. Dependable Secur. Comput., 2012

A Hill-Area-Restricted Geographic Routing Protocol for Mobile <i>Ad Hoc</i> and Sensor Networks.
Comput. J., 2012

2011
A Pre-Processed Cross Link Detection Protocol for geographic routing in mobile ad hoc and sensor networks under realistic environments with obstacles.
J. Parallel Distributed Comput., 2011

2010
An Edge-Constrained Localized Delaunay Graph for Geographic Routing in Mobile Ad Hoc and Sensor Networks.
IEEE Trans. Mob. Comput., 2010

Efficient proxy signatures based on trapdoor hash functions.
IET Inf. Secur., 2010

Recent results in checkpointing and failure recovery in distributed systems and wireless networks.
Proceedings of the 24th IEEE International Symposium on Parallel and Distributed Processing, 2010

Design of an architecture for multiple security levels in wireless sensor networks.
Proceedings of the Seventh International Conference on Networked Sensing Systems, 2010

Information flow control in cloud computing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
An Efficient and Scalable Quasi-Aggregate Signature Scheme Based on LFSR Sequences.
IEEE Trans. Parallel Distributed Syst., 2009

An escrow-less identity-based group-key agreement protocol for dynamic peer groups.
Int. J. Secur. Networks, 2009

A light-weight scalable truthful routing protocol in MANETs with selfish nodes.
Int. J. Ad Hoc Ubiquitous Comput., 2009

2008
Security in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2008

Truthful multipath routing for ad hoc networks with selfish nodes.
J. Parallel Distributed Comput., 2008

A quasi-synchronous checkpointing algorithm that prevents contention for stable storage.
Inf. Sci., 2008

Enhancing Performance by Salvaging Route Reply Messages in On-Demand Routing Protocols for MANETs.
Ad Hoc Sens. Wirel. Networks, 2008

Efficient Proxy Signatures For Ubiquitous Computing.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

2007
ABRP: Anchor-based Routing Protocol for Mobile Ad Hoc Networks.
Wirel. Pers. Commun., 2007

RPSF: A Routing Protocol with Selective Forwarding for Mobile Ad-Hoc Networks.
Wirel. Pers. Commun., 2007

Introduction: Special issue of the IEEE SUTC'06.
ACM Trans. Auton. Adapt. Syst., 2007

On improving the efficiency of truthful routing in MANETs with selfish nodes.
Pervasive Mob. Comput., 2007

On supporting high-throughput routing metrics in on-demand routing protocols for multi-hop wireless networks.
J. Parallel Distributed Comput., 2007

Efficient detection of a locally stable predicate in a distributed system.
J. Parallel Distributed Comput., 2007

A Truthful Geographic Forwarding Algorithm for Ad-hoc Networks with Selfish Nodes.
Int. J. Netw. Secur., 2007

Trust Management in Distributed Systems.
Computer, 2007

Password-Based Authentication: Preventing Dictionary Attacks.
Computer, 2007

ARPC: Anchor-based Routing Protocol for Mobile Ad Hoc NetworksWith Cell ID Management System.
Ad Hoc Sens. Wirel. Networks, 2007

Editorial for the Special Issue of Ad hoc networks "Security issues in sensor and Ad hoc networks".
Ad Hoc Networks, 2007

A self-healing On-demand Geographic Path Routing Protocol for mobile ad-hoc networks.
Ad Hoc Networks, 2007

Carpooling in Mobile Ad Hoc Networks: the Case of Multiple-Target Route Discovery.
Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, 2007

A Secure Position-Based Protocol Framework for Multi-hop Ad-Hoc Networks.
Proceedings of the Third IEEE International Conference on Wireless and Mobile Computing, 2007

An Edge Constrained Localized Delaunay Graph for Geographic Routing in Mobile Ad Hoc Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

BRD: Bilateral Route Discovery in Mobile Ad Hoc Networks.
Proceedings of the NETWORKING 2007. Ad Hoc and Sensor Networks, 2007

Route Discovery in Mobile Ad Hoc Networks: From Unilaterality to Bilaterality.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Authenticating DSR Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2007

Authenticating Feedback in Multicast Applications Using a Novel Multisignature Scheme Based on Cubic LFSR Sequences.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
DOA: DSR over AODV Routing for Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2006

Guest Editors' Note.
Pervasive Mob. Comput., 2006

Two scalable location service protocols for wireless ad hoc networks.
Pervasive Mob. Comput., 2006

Effect of network latency on load sharing in distributed systems.
J. Parallel Distributed Comput., 2006

A distributed multi-party key agreement protocol for dynamic collaborative groups using ECC.
J. Parallel Distributed Comput., 2006

Mobile Ad Hoc and Sensor Systems.
Int. J. Wirel. Inf. Networks, 2006

A localized IP-address auto-configuration protocol for wireless ad-hoc networks.
Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots, 2006

A Secure Routing Protocol for Wireless Ad Hoc Networks.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

ShareEnabler: Policy-Driven Access Management for Ad-Hoc Collaborative Sharing.
Proceedings of the Current Trends in Database Technology - EDBT 2006, 2006

LSTOP: A Light-Weight Scalable Truthful Routing Protocol in MANETs with Selfish Nodes.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks, 5th International Conference, 2006

2005
A Fault-Tolerant Distributed Channel Allocation Scheme for Cellular Networks.
IEEE Trans. Computers, 2005

Introduction to the special issue on PerCom 2005.
Pervasive Mob. Comput., 2005

Bluetooth scatternets: criteria, models and classification.
Ad Hoc Networks, 2005

Hello Protocols for Ad-Hoc Networks: Overhead and Accuracy Tradeoffs.
Proceedings of the 2005 International Conference on a World of Wireless, 2005

A light-weight solution for selfish nodes problem considering battery status in wireless ad-hoc networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

Salvaging route reply for on-demand routing protocols in mobile ad-hoc networks.
Proceedings of the 8th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2005

An Asynchronous Recovery Algorithm Based on a Staggered Quasi-Synchronous Checkpointing Algorithm.
Proceedings of the Distributed Computing, 2005

A Key Establishment Protocol for Bluetooth Scatternets.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

Angular Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

An anchor-based routing protocol with cell ID management system for ad hoc networks.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

2004
Cost effective management frameworks for intrusion detection systems.
J. Comput. Secur., 2004

On the Security of Polling Protocols in Peer-to-Peer Systems.
Proceedings of the 4th International Conference on Peer-to-Peer Computing (P2P 2004), 2004

A path compression technique for on-demand ad-hoc routing protocols.
Proceedings of the 2004 IEEE International Conference on Mobile Ad-hoc and Sensor Systems, 2004

Bluetooth scatternet formation: criteria, models and classification.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

A Fair Distributed Solution for Selfish Nodes Problem in Wireless Ad Hoc Networks.
Proceedings of the Ad-Hoc, Mobile, and Wireless Networks: Third International Conference, 2004

2003
An Efficient Distributed Algorithm for Detection of Knots and Cycles in a Distributed Graph.
IEEE Trans. Parallel Distributed Syst., 2003

Checkpointing with mutable checkpoints.
Theor. Comput. Sci., 2003

PICO: A Middleware Framework for Pervasive Computing.
IEEE Pervasive Comput., 2003

A Comparative Experimental Evaluation Study of Intrusion Detection System Performance in a Gigabit Environment.
J. Comput. Secur., 2003

Online variable-bit-rate video traffic smoothing.
Comput. Commun., 2003

Secure routing in mobile wireless ad hoc networks.
Ad Hoc Networks, 2003

A Fault-Tolerant Dynamic Channel Allocation Scheme for Enhancing QoS in Cellular Networks.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

On Necessary and Sufficient Conditions for Deadlocks in AND and OR Models.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Correction to "Mutable Checkpoints: A New Checkpointing Approach for Mobile Computing Systems".
IEEE Trans. Parallel Distributed Syst., 2002

Cost-Effective Flow Table Designs for High-Speed Routers: Architecture and Performance Evaluation.
IEEE Trans. Computers, 2002

Asynchronous recovery without using vector timestamps.
J. Parallel Distributed Comput., 2002

Communication Patterns in Distributed Computations.
J. Parallel Distributed Comput., 2002

A Distributed Algorithm for Knot Detection in a Distributed Graph.
Proceedings of the 31st International Conference on Parallel Processing (ICPP 2002), 2002

A Reliable Multicast Algorithm for Mobile Ad Hoc Networks.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
Load-Balanced Location Management for Cellular Mobile Systems Using Quorums and Dynamic Hashing.
Wirel. Networks, 2001

A Delay-Optimal Quorum-Based Mutual Exclusion Algorithm for Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 2001

Mutable Checkpoints: A New Checkpointing Approach for Mobile Computing Systems.
IEEE Trans. Parallel Distributed Syst., 2001

Mastering Agreement Problems in Distributed Systems.
IEEE Softw., 2001

Research in High-Confidence Distributed Information Systems.
Proceedings of the 20th Symposium on Reliable Distributed Systems (SRDS 2001), 2001

2000
An Adaptive Distributed Channel Allocation Strategy for Mobile Cellular Networks.
J. Parallel Distributed Comput., 2000

Efficient distributed channel allocation for cellular networks.
Comput. Commun., 2000

A Novel Cache Architecture to Support Layer-Four Packet Classification at Memory Access Speeds.
Proceedings of the Proceedings IEEE INFOCOM 2000, 2000

Security mechanisms in high-speed networks.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000

1999
Quasi-Synchronous Checkpointing: Models, Characterization, and Classification.
IEEE Trans. Parallel Distributed Syst., 1999

A One-Phase Algorithm to Detect Distributed Deadlocks in Replicated Databases.
IEEE Trans. Knowl. Data Eng., 1999

Design of a High-Performance ATM Firewall.
ACM Trans. Inf. Syst. Secur., 1999

Design and evaluation of a high-performance ATM firewall switch and its applications.
IEEE J. Sel. Areas Commun., 1999

A Firewalling Scheme for Securing MPOA-Based Enterprise Networks.
Int. J. Softw. Eng. Knowl. Eng., 1999

Scheduling Support for Multicasting Sessions in Broadband Communication Networks.
Comput. Networks, 1999

A Real-Time Protocol for Stock Market Transactions.
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999

Two Classes of Communication Patterns.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

Delay-Optimal Quorum-Based Mutual Exclusion for Distributed Systems.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

Mutable Check-Points: A New Checkpointing Approach for Mobile Computing Systems.
Proceedings of the Eighteenth Annual ACM Symposium on Principles of Distributed Computing, 1999

H-Rule Mining in Heterogeneous Databases.
Proceedings of the Methodologies for Knowledge Discovery and Data Mining, 1999

MG-Tree: An Efficient Index for Fast Execution of Conjunctive Queries.
Proceedings of the 3rd IEEE Metadata Conference 1999, MD 1999, Bethesda, 1999

Distributed Fault-Tolerant Channel Allocation for Mobile Cellular Networks.
Proceedings of the Proceedings IEEE INFOCOM '99, 1999

A New Access Index for Fast Execution of Conjunctive Queries over Text Data.
Proceedings of the 1999 International Database Engineering and Applications Symposium, 1999

Online VBR video traffic smoothing.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

Universal Constructs in Distributed Computations.
Proceedings of the Euro-Par '99 Parallel Processing, 5th International Euro-Par Conference, Toulouse, France, August 31, 1999

Accessing Data Cubes along Complex Dimensions.
Proceedings of the DOLAP '99, 1999

Impact of unidirectional links in wireless ad-hoc networks.
Proceedings of the Mobile Networks and Computing, 1999

Fuzzy Functional Dependencies and Fuzzy Association Rules.
Proceedings of the Data Warehousing and Knowledge Discovery, 1999

1998
Efficient Distributed Detection of Conjunctions of Local Predicates.
IEEE Trans. Software Eng., 1998

On Coordinated Checkpointing in Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 1998

Route Optimization in Mobile ATM Networks.
Mob. Networks Appl., 1998

A route optimization algorithm and its application to mobile location management in ATM networks.
IEEE J. Sel. Areas Commun., 1998

Signature Cache: A Light Weight Web Cache Indexing Structure.
J. Braz. Comput. Soc., 1998

Necessary and Sufficient Conditions on Information for Causal Message Ordering and Their Optimal Implementation.
Distributed Comput., 1998

A taxonomy of multicast protocols for Internet applications.
Comput. Commun., 1998

Rerouting Connections in Mobile ATM Networks.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

On the Impossibility of Min-Process Non-Blocking Checkpointing and An Efficient Checkpointing Algorithm for Mobile Computing Systems.
Proceedings of the 1998 International Conference on Parallel Processing (ICPP '98), 1998

Certificate Path Generation Protocol (CPGP) for Authenticated Signaling in ATM Networks.
Proceedings of the 1998 International Conference on Network Protocols (ICNP '98), 1998

A Delay-Optimal Quorum-Based Mutual Exclusion Scheme with Fault-Tolerance Capability.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Low-Cost Checkpointing with Mutable Checkpoints in Mobile Computing Systems.
Proceedings of the 18th International Conference on Distributed Computing Systems, 1998

Efficient Distributed Channel Allocation for Mobile Cellular Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Dependency sequences and hierarchical clocks: Efficient alternatives to vector clocks for mobile computing systems.
Wirel. Networks, 1997

Finding Consistent Global Checkpoints in a Distributed Computation.
IEEE Trans. Parallel Distributed Syst., 1997

Real-time causal message ordering in multimedia systems.
Telecommun. Syst., 1997

An Adaptive Causal Ordering Algorithm Suited to Mobile Computing Environments.
J. Parallel Distributed Comput., 1997

Using vector time to handle multiple failures in distributed systems.
IEEE Concurrency, 1997

Performance study of buffer management schemes under multicasting traffic in ATM switching nodes.
Comput. Commun., 1997

A reliable multicast session protocol for collaborative continuous-feed applications.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

Dynamic Hashing + Quorum = Efficient Location Management for Mobile Computing Systems.
Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, 1997

Performance Analysis of a Reliable Multicast Session Protocol for Collaborative Continuous-Feed Application.
Proceedings of the MASCOTS 1997, 1997

Design and Evaluation of a Distributed Multimedia Synchronization Algorithm using Media Scalings and Variable Service Rates.
Proceedings of the 1997 International Conference on Parallel and Distributed Systems (ICPADS '97), 1997

Distributed Detection of Generalized Deadlocks.
Proceedings of the 17th International Conference on Distributed Computing Systems, 1997

1996
Low-Cost Checkpointing and Failure Recovery in Mobile Computing Systems.
IEEE Trans. Parallel Distributed Syst., 1996

Erratum: An Analytic Study of Caching in Computer Systems.
J. Parallel Distributed Comput., 1996

An Analytic Study of Caching in Computer Systems.
J. Parallel Distributed Comput., 1996

Erratum: Deadlock Models and a General Algorithm for Distributed Deadlock Detection.
J. Parallel Distributed Comput., 1996

Logical Time: Capturing Causality in Distributed Systems.
Computer, 1996

Performance study of buffering within switches in LANs.
Comput. Commun., 1996

On-The-Fly Detection Of Conjunctions Of Local Predicates In Distributed Computations.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

A Dynamic Apporach Towards Location Management in Mobile Computing Systems.
Proceedings of the 8th International Conference on Software Engineering and Knowledge Engineering, 1996

An Optimal Algorithm for Generalized Causal Message Ordering (Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Efficient Delta-Causal Broadcasting of Multimedia Applications (Abstract).
Proceedings of the Fifteenth Annual ACM Symposium on Principles of Distributed Computing, 1996

Modeling and analysis of channel transferability in mobile computing environments.
Proceedings of the 1996 International Conference on Parallel and Distributed Systems (ICPADS '96), 1996

An Efficient Causal Ordering Algorithm for Mobile Computing Environments.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

A Low Overhead Recovery Technique Using Quasi-Synchronous Checkpointing.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996

Broadcast with Time and Causality Constraints for Multimedia Applications.
Proceedings of the 22rd EUROMICRO Conference '96, 1996

1995
Measures of the Potential for Load Sharing in Distributed Computing Systems.
IEEE Trans. Software Eng., 1995

Decentralized semaphore support in a virtual shared-memory system.
J. Supercomput., 1995

Deadlock Models and a General Algorithm for Distributed Deadlock Detection.
J. Parallel Distributed Comput., 1995

An Optimality Proof for Asynchronous Recovery Algorithms in Distributed Systems.
Inf. Process. Lett., 1995

An introduction to snapshot algorithms in distributed computing.
Distributed Syst. Eng., 1995

A load index and a transfer policy for global scheduling tasks with deadlines.
Concurr. Pract. Exp., 1995

Distributed Dynamic Channel Allocation for Mobile Computing.
Proceedings of the Fourteenth Annual ACM Symposium on Principles of Distributed Computing, 1995

Alternative configurations for local area network design.
Proceedings of the Proceedings 20th Conference on Local Computer Networks (LCN'95), 1995

Performance study of buffering within switches in local area networks.
Proceedings of the 4th International Conference on Computer Communications and Networks (ICCCN '95), 1995

1994
Efficient Detection and Resolution of Generalized Distributed Deadlocks.
IEEE Trans. Software Eng., 1994

A Distributed Graphics Library System.
Softw. Pract. Exp., 1994

On Characterization and Correctness of Distributed Deadlock Detection.
J. Parallel Distributed Comput., 1994

An Analysis of Performance and Cost Factors in Searching Large Text Databases Using Parallel Search Systems.
J. Am. Soc. Inf. Sci., 1994

Probalistic Analysis of Transaction Blocking under Arbitrary Data Access Distribution in Database System.
Inf. Sci., 1994

Maximal global snapshot with concurrent initiators.
Proceedings of the Sixth IEEE Symposium on Parallel and Distributed Processing, 1994

Priority Communication Schemes on Local Area Networks for Multimedia Traffic.
Proceedings of the Proceedings 19th Conference on Local Computer Networks, 1994

Readings in distributed computing systems.
IEEE, ISBN: 978-0-8186-3032-3, 1994

1993
A Taxonomy of Distributed Mutual Exclusion.
J. Parallel Distributed Comput., 1993

Using Logging and Asynchronous Checkpointing to Implement Recoverable Distributed Shared Memory.
Proceedings of the 12th Symposium on Reliable Distributed Systems, 1993

1992
A Dynamic Information-Structure Mutual Exclusion Algorithm for Distributed Systems.
IEEE Trans. Parallel Distributed Syst., 1992

Performance Analysis of the Communication Architecture of the Connection Machine.
IEEE Trans. Parallel Distributed Syst., 1992

An Efficient Implementation of Vector Clocks.
Inf. Process. Lett., 1992

Load Distributing for Locally Distributed Systems.
Computer, 1992

Distributed Rule Processing in Active Databases.
Proceedings of the Eighth International Conference on Data Engineering, 1992

1991
Invariant-Based Verification of a Distributed Deadlock Detection Algorithm.
IEEE Trans. Software Eng., 1991

Analysis of the Probability of Transaction Abort and Throughput of Two Timestamp Ordering Algorithms for Database Systems.
IEEE Trans. Knowl. Data Eng., 1991

Performance Analysis of the Basic Timestamp Ordering Algorithm via Markov Modeling.
Perform. Evaluation, 1991

A Class of Deadlock-Free Meakawa-Type Algorithms for Mutual Exclusion in Distributed Systems.
Distributed Comput., 1991

Distributed Computing Systems (Guest Editors' Introduction).
Computer, 1991

Efficient Detection of Communication Deadlocks in Distributed Systems.
Proceedings of the International Conference on Parallel Processing, 1991

Efficient Distributed Deadlock Detection and Resolution in Semantic Lock-Based Systems.
Proceedings of the International Conference on Parallel Processing, 1991

A transfer policy for global scheduling algorithms to schedule tasks with deadlines.
Proceedings of the 10th International Conference on Distributed Computing Systems (ICDCS 1991), 1991

1990
Update Transport: A New Technique for Update Synchronization in Replicated Database Systems.
IEEE Trans. Software Eng., 1990

A Fault Tolerant Algorithm for Distributed Mutual Exclusion.
Proceedings of the Ninth Symposium on Reliable Distributed Systems, 1990

Correct Two-Phase and One-Phase Deadlock Detection Algorithms for Distributed Systems.
Proceedings of the Second IEEE Symposium on Parallel and Distributed Processing, 1990

An Improved O(log N) Mutual Exclusion Algorithm for Distributed Systems.
Proceedings of the 1990 International Conference on Parallel Processing, 1990

A hybrid approach to mutual exclusion for distributed systems.
Proceedings of the Fourteenth Annual International Computer Software and Applications Conference, 1990

1989
A Heuristically-Aided Algorithm for Mutual Exclusion in Distributed Systems.
IEEE Trans. Computers, 1989

Deadlock Detection in Distributed Systems.
Computer, 1989

Scatter-Brain: an experiment in distributed problem solving applied to load balancing.
Proceedings of the 13th Annual International Computer Software and Applications Conference, 1989

1988
Issues and Approaches to Design of Real-Time Database Systems.
SIGMOD Rec., 1988

A Polynomial Algorithm for Computation of the Probability of Conflicts in a Database Under Arbitrary Data Access Distribution.
Inf. Process. Lett., 1988

A fully-distributed approach to concurrency control in replicated database systems.
Proceedings of the Twelfth International Computer Software and Applications Conference, 1988

1987
Analysis of Transaction Blocking in Arbitrary Data Access Distribution in Database Systems.
Proceedings of the Computer Performance and Reliability, 1987

On the Application of AI in Decentralized Control: An Illustration by Mutual Exclusion.
Proceedings of the 7th International Conference on Distributed Computing Systems, 1987

1986
Performance Analysis of an Algorithm for Concurrency Control in Replicated Database Systems.
Proceedings of the 1986 ACM SIGMETRICS joint international conference on Computer performance modelling, 1986

A Concurrency Control Algorithm and Its Performance for Replicated Database Systems.
Proceedings of the 6th International Conference on Distributed Computing Systems, 1986


  Loading...