Publications
(2026).
PRepChain: A versatile privacy-preserving reputation system for dynamic supply chain environments.
Future Generation Computer Systems.
(2025).
A survey of classification tasks and approaches for legal contracts.
Artificial Intelligence Review.
(2025).
Towards Behavior Grammar-Driven IoT Network Traffic Generation using MUD Specifications.
Proceedings of the 2025 Workshop on CPS&IoT Security and Privacy.
(2025).
Demo: TOSense – What Did You Just Agree to?.
2025 IEEE 50th Conference on Local Computer Networks (LCN).
(2025).
Spectraformer: A Unified Random Feature Framework for Transformer.
ACM Transactions on Intelligent Systems and Technology.
(2025).
Evaluating Honeyfile Realism and Enticement Metrics.
ACM Transactions on Privacy and Security.
(2025).
Cumulus: Blockchain-Enabled Privacy-Preserving Data Audit in Cloud.
Distributed Ledger Technologies: Research and Practice.
(2025).
BotSSCL: Social Bot Detection with Self-Supervised Contrastive Learning.
Online Social Networks and Media.
(2025).
Zero Trust Driven Access Control Delegation Using Blockchain.
Blockchain: Research and Applications.
(2025).
TOSense: We Read, You Click.
2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks - Supplemental Volume (DSN-S).
(2025).
SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers.
2025 IEEE Symposium on Security and Privacy (SP).
(2025).
RACCOON: A Retrieval-Augmented Generation Approach for Location Coordinate Capture from News Articles.
Www Companion 2025 Companion Proceedings of the ACM Web Conference 2025.
(2025).
Mathematics driven methods with fractional calculus and topological data analysis in image segmentation.
Journal of Interdisciplinary Mathematics.
(2025).
Graph theory based mathematical methods for improved explainable AI.
Journal of Interdisciplinary Mathematics.
(2025).
Natural Language Processing for Dialects of a Language: A Survey.
ACM Computing Surveys.
(2025).
DeepSneak: User GPS Trajectory Reconstruction from Federated Route Recommendation Models.
ACM Transactions on Intelligent Systems and Technology.
(2025).
VEH-Attack: Stealthy Tracking of Train Passengers With Side-Channel Attack on Vibration Energy Harvesting Wearables.
IEEE Transactions on Intelligent Transportation Systems.
(2025).
Unsupervised Power Load Super-Resolution Based on Contrastive and Internal Learning.
IEEE Transactions on Smart Grid.
(2025).
Unifying View-Specific Learning and Ambiguity Awareness With Emotions for Multimodal Misinformation Detection.
IEEE Transactions on Computational Social Systems.
(2025).
Revisit Time Series Classification Benchmark: The Impact of Temporal Information for Classification.
Pacific-Asia Conference on Knowledge Discovery and Data Mining.
(2025).
Real-Time and Trustworthy Classification of IoT Traffic Using Lightweight Deep Learning.
IEEE Transactions on Network Science and Engineering.
(2025).
Privacy Preserving Reputation System for Self-Sovereign Identity.
Communications in Computer and Information Science.
(2025).
Label Shift Estimation With Incremental Prior Update.
Proceedings of the 2025 SIAM International Conference on Data Mining (SDM).
(2025).
Instance-Wise Monotonic Calibration by Constrained Transformation.
Proceedings of the Forty-first Conference on Uncertainty in Artificial Intelligence.
(2025).
Evaluating Dialect Robustness of Language Models via Conversation Understanding.
Coling 2025 Sumeval 2025 2nd Workshop on Scaling Up Multilingual and Multi Cultural Evaluation Proceedings of the Workshop.
(2025).
BeyondLife: An Open-Source Digital Will Solution for Posthumous Data Management.
IEEE Access.
(2025).
A Graded Modal Approach to Relaxed Semantic Declassification.
38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, CA, USA, June 16-20, 2025.
(2024).
Demystifying Trajectory Recovery from Ash: An Open-Source Evaluation and Enhancement.
2024 17th International Conference on Security of Information and Networks (SIN).
(2024).
Adversarially Guided Stateful Defense Against Backdoor Attacks in Federated Deep Learning.
2024 Annual Computer Security Applications Conference (ACSAC).
(2024).
Comparison of Multilingual and Bilingual Models for Satirical News Detection of Arabic and English.
Alta 2024 Proceedings of the 22nd Annual Workshop of the Australasian Language Technology Association.
(2024).
Partial label learning via identifying outlier features.
Knowledge-Based Systems.
(2024).
A Comprehensive Threat Modelling Analysis for Distributed Energy Resources.
ACM Transactions on Cyber-Physical Systems.
(2024).
\"Is Hate Lost in Translation?\": Evaluation of Multilingual LGBTQIA+ Hate Speech Detection.
Alta 2024 Proceedings of the 22nd Annual Workshop of the Australasian Language Technology Association.
(2024).
AuditNet: A Conversational AI-based Security Assistant.
Mobilehci 2024 Adjunct Proceedings Publication of the 26th International Conference on Mobile Human Computer Interaction.
(2024).
Synthetic Trajectory Generation Through Convolutional Neural Networks.
21st Annual International Conference on Privacy, Security & Trust (PST 2024).
(2024).
Single-Sensor Sparse Adversarial Perturbation Attacks Against Behavioral Biometrics.
IEEE Internet of Things Journal.
(2024).
SoK: Trusting Self-Sovereign Identity.
Proceedings on Privacy Enhancing Technologies.
(2024).
SoK: Can Trajectory Generation Combine Privacy and Utility?.
Proceedings on Privacy Enhancing Technologies (PoPETS).
(2024).
Privacy Preserving Release of Mobile Sensor Data.
arXiv.
(2024).
Leveraging Simulation Data to Understand Bias in Predictive Models of Infectious Disease Spread.
ACM Transactions on Spatial Algorithms and Systems.
(2024).
BAMBINO-LM: (Bilingual-)Human-Inspired Continual Pretraining of BabyLM.
Cmcl 2024 13th Edition of the Workshop on Cognitive Modeling and Computational Linguistics Proceedings of the Workshop.
(2024).
Striking a Balance between Classical and Deep Learning Approaches in Natural Language Processing Pedagogy.
Teachnlp 2024 6th Workshop on Teaching Nlp Proceedings of the Workshop.
(2024).
MFVIEW: Multi-modal Fake News Detection with View-Specific Information Extraction.
European Conference on Information Retrieval.
(2024).
Twitter Trolling Detection Using Machine Learning.
Lecture Notes in Networks and Systems.
(2024).
The 19th Workshop on Programming Languages and Analysis for Security (PLAS 2024).
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, CCS 2024, Salt Lake City, UT, USA, October 14-18, 2024.
(2024).
Supervised Machine Learning Approaches for Customer Reviews Sentiment Analysis.
Lecture Notes in Networks and Systems.
(2024).
Scalable Security Enforcement for Cyber Physical Systems.
IEEE Access.
(2024).
Privacy-Preserving Probabilistic Data Encoding for IoT Data Analysis.
IEEE Transactions on Information Forensics and Security.
(2024).
Optimally Mitigating Backdoor Attacks in Federated Learning.
IEEE Transactions on Dependable and Secure Computing.
(2024).
On Hardware Security Bug Code Fixes By Prompting Large Language Models.
IEEE Transactions on Information Forensics and Security.
(2024).
OCHJRNChain: A Blockchain-Based Security Data Sharing Framework for Online Car-Hailing Journey.
IEEE Transactions on Intelligent Transportation Systems.
(2024).
Medical Document Classification using NLP Techniques.
2024 1st International Conference on Software Systems and Information Technology Ssitcon 2024.
(2024).
Exploring Uncharted Waters of Website Fingerprinting.
IEEE Transactions on Information Forensics and Security.
(2024).
Electric Vehicle Next Charge Location Prediction.
IEEE Transactions on Intelligent Transportation Systems.
(2024).
dcc - Help: Transforming the Role of the Compiler by Generating Context-Aware Error Explanations with Large Language Models.
SIGCSE 2024 - Proceedings of the 55th ACM Technical Symposium on Computer Science Education.
(2024).
Challenges in Designing Blockchain for Cyber-Physical Systems.
Communications of the ACM.
(2024).
A Modal Type Theory of Expected Cost in Higher-Order Probabilistic Programs.
Proc. ACM Program. Lang..
(2024).
(Security) Assertions by Large Language Models.
IEEE Transactions on Information Forensics and Security.
(2023).
Natural Language Processing.
(2023).
Enabling Safe ITS: EEG-Based Microsleep Detection in VANETs.
IEEE Transactions on Intelligent Transportation Systems.
(2023).
Reinforcing Industry 4.0 With Digital Twins and Blockchain-Assisted Federated Learning.
IEEE Journal on Selected Areas in Communications.
(2023).
Advanced Networking and Applications for Metaverse and Web 3.0.
IEEE Network.
(2023).
Uncertainty Estimation With Neural Processes for Meta-Continual Learning.
IEEE Transactions on Neural Networks and Learning Systems.
(2023).
Stacking the Odds: Transformer-Based Ensemble for AI-Generated Text Detection.
Proceedings of the Australasian Language Technology Workshop.
(2023).
Enabling Efficient Deduplication and Secure Decentralized Public Auditing for Cloud Storage: A Redactable Blockchain Approach.
ACM Transactions on Management Information Systems.
(2023).
Accelerated Verifiable Fair Digital Exchange.
Distributed Ledger Technologies: Research and Practice.
(2023).
Strategic Analysis of Griefing Attack in Lightning Network.
IEEE Transactions on Network and Service Management.
(2023).
Queer In AI: A Case Study in Community-Led Participatory AI.
ACM International Conference Proceeding Series.
(2023).
CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments.
IEEE Transactions on Dependable and Secure Computing.
(2023).
A systematic literature review on blockchain governance.
Journal of Systems and Software.
(2023).
Toward Trustworthy AI: Blockchain-Based Architecture Design for Accountability and Fairness of Federated Learning Systems.
IEEE Internet of Things Journal.
(2023).
VCTP: A Verifiable Credential-based Trust Propagation Protocol for Personal Issuers in Self-Sovereign Identity Platforms.
Ieee International Conference on Decentralized Applications and Infrastructures, Dapps.
(2023).
USABILITY OF PRIVACY CONTROLS IN TOP HEALTH WEBSITES.
arXiv.
(2023).
Trust and Reputation Management for Blockchain-enabled IoT.
11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS).
(2023).
Towards the Imagenets of ML4EDA.
arXiv.
(2023).
REMaQE - Reverse Engineering Math Equations from Executables.
arXiv.
(2023).
Privacy-preserving Trust Management for Blockchain-based Resource Sharing in 6G-IoT.
IEEE International Conference on Blockchain and Cryptocurrency.
(2023).
Privacy-preserving targeted mobile advertising: A Blockchain-based framework for mobile ads.
Journal of Network and Computer Applications.
(2023).
Netlist Whisperer: AI and NLP Fight Circuit Leakage!.
ASHES 2023 - Proceedings of the 2023 Workshop on Attacks and Solutions in Hardware Security.
(2023).
Multi-Modal Side Channel Data Driven Golden-Free Detection of Software and Firmware Trojans.
IEEE Transactions on Dependable and Secure Computing.
(2023).
Lost at C: A User Study on the Security Implications of Large Language Model Code Assistants.
32nd USENIX Security Symposium, USENIX Security 2023.
(2023).
Invited Paper: Towards the Imagenets of ML4EDA.
IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD.
(2023).
High-Level Approaches to Hardware Security: A Tutorial.
ACM Transactions on Embedded Computing Systems.
(2023).
From Fine- to Coarse-Grained Dynamic Information Flow Control and Back.
Found. Trends Program. Lang..
(2023).
FLAG: Finding Line Anomalies (in code) with Generative AI.
arXiv.
(2023).
Fixing Hardware Security Bugs with Large Language Models.
arXiv.
(2023).
FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT.
IEEE Transactions on Network and Service Management.
(2023).
Examining Zero-Shot Vulnerability Repair with Large Language Models.
Proceedings - IEEE Symposium on Security and Privacy.
(2023).
DualVAE: Controlling Colours of Generated and Real Images.
ArXiv.
(2023).
Decoding ChatGPT's 'impact' on the future of healthcare.
Cancer Research, Statistics, and Treatment.
(2023).
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives.
IEEE Communications Surveys & Tutorials.
(2023).
Counterfactual Explanations and Model Multiplicity: a Relational Verification View.
Proceedings of the 20th International Conference on Principles of Knowledge Representation and Reasoning, KR 2023, Rhodes, Greece, September 2-8, 2023.
(2023).
Chip-Chat: Challenges and Opportunities in Conversational Hardware Design.
2023 ACM/IEEE 5th Workshop on Machine Learning for CAD, MLCAD 2023.
(2023).
Benchmarking Large Language Models for Automated Verilog RTL Code Generation.
Proceedings -Design, Automation and Test in Europe, DATE.
(2023).
Barriers to blockchain-based decentralised energy trading: a systematic review.
International Journal of Sustainable Energy.
(2023).
BAILIF: A Blockchain Agnostic Interoperability Framework.
IEEE International Conference on Blockchain and Cryptocurrency.
(2023).
AutoChip: Automating HDL Generation Using LLM Feedback.
arXiv.
(2023).
An Integrated Testbed for Trojans in Printed Circuit Boards with Fuzzing Capabilities.
Proceedings - 2023 IEEE 29th International Symposium on On-Line Testing and Robust System Design, IOLTS 2023.
(2023).
A systematic review of federated learning from clients' perspective: challenges and solutions.
Artificial Intelligence Review.
(2023).
A blockchain-based IoT data marketplace.
Cluster Computing.
(2023).
A blockchain framework data integrity enhanced recommender system.
Computational Intelligence.
(2022).
Robust cross-network node classification via constrained graph mutual information.
Knowledge-Based Systems.
(2022).
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms.
Proceedings of the 38th Annual Computer Security Applications Conference (ACSAC ‘22).
(2022).
Defining blockchain governance principles: A comprehensive framework.
Information Systems.
(2022).
Imbalanced Data Sparsity as a Source of Unfair Bias in Collaborative Filtering.
Recsys 2022 Proceedings of the 16th ACM Conference on Recommender Systems.
(2022).
Architectural patterns for the design of federated learning systems.
Journal of Systems and Software.
(2022).
Secure Cloud Storage With Data Dynamics Using Secure Network Coding Techniques.
IEEE Transactions on Cloud Computing.
(2022).
Network Growth From Global and Local Influential Nodes.
IEEE Transactions on Network Science and Engineering.
(2022).
A Systematic Literature Review on Federated Machine Learning.
ACM Computing Surveys.
(2022).
Formal Methods for the Security of Medical Devices.
Applied Smart Health Care Informatics.
(2022).
WIDE: A witness-based data priority mechanism for vehicular forensics.
Blockchain-research and Applications.
(2022).
Understanding and Reducing HVAC Power Consumption Post-Evacuation Events in Commercial Buildings.
IEEE Internet of Things Journal.
(2022).
TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces.
Journal of Network and Computer Applications.
(2022).
Toward Blockchain-Based Trust and Reputation Management for Trustworthy 6G Networks.
IEEE Network Magazine.
(2022).
Striking a Balance: Alleviating Inconsistency in Pre-trained Models for Symmetric Classification Tasks.
Proceedings of the Annual Meeting of the Association for Computational Linguistics.
(2022).
Runtime Interchange of Enforcers for Adaptive Attacks: A Security Analysis Framework for Drones.
2022 20th ACM-IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2022.
(2022).
PrivChain: Provenance and Privacy Preservation in Blockchain enabled Supply Chains.
IEEE International Conference on Blockchain (Blockchain).
(2022).
Privacy in targeted advertising on mobile devices: a survey.
International Journal of Information Security.
(2022).
On the Vulnerability of Community Structure in Complex Networks.
Smart Innovation, Systems and Technologies.
(2022).
Monetizing Parking IoT Data via Demand Prediction and Optimal Space Sharing.
IEEE Internet of Things Journal.
(2022).
MetaGanFi: Cross-Domain Unseen Individual Identification Using WiFi Signals.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.
(2022).
Is This IoT Device Likely to Be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
(2022).
IoT Traffic Obfuscation: Will it Guarantee the Privacy of Your Smart Home?.
Conference Record - International Conference on Communications.
(2022).
IISERB Brains at SemEval-2022 Task 6: A Deep-learning Framework to Identify Intended Sarcasm in English.
Semeval 2022 16th International Workshop on Semantic Evaluation Proceedings of the Workshop.
(2022).
HARB: A Hypergraph-Based Adaptive Consortium Blockchain for Decentralized Energy Trading.
IEEE Internet of Things Journal.
(2022).
Guest Editorial: Special Issue on Recent Advances on Blockchain for Network and Service Management.
IEEE Transactions on Network and Service Management.
(2022).
Guest Editorial Special Issue on Intelligent Blockchain for Future Communications and Networking: Technologies, Trends, and Applications.
IEEE Journal on Selected Areas in Communications.
(2022).
FLAW3D: A Trojan-Based Cyber Attack on the Physical Outcomes of Additive Manufacturing.
IEEE/ASME Transactions on Mechatronics.
(2022).
FLAP: Federated Learning with Attack and Privacy Awareness.
TechRxiv.
(2022).
Estimating Passenger Queue for Bus Resource Optimization Using LoRaWAN-Enabled Ultrasonic Sensors.
IEEE Systems Journal.
(2022).
Don t CWEAT it: Toward CWE analysis techniques in early stages of hardware design.
IEEE/ACM International Conference on Computer-Aided Design, Digest of Technical Papers, ICCAD.
(2022).
DIMY: Enabling privacy-preserving contact tracing.
Journal of Network and Computer Applications.
(2022).
Device Identification in Blockchain-Based Internet of Things.
IEEE Internet of Things Journal.
(2022).
DeTRM: Decentralised Trust and Reputation Management for Blockchain-based Supply Chains.
IEEE International Conference on Blockchain and Cryptocurrency.
(2022).
Determination of Fiber Content in 3D Printed Composite Parts Using Image Analysis.
IEEE Embedded Systems Letters.
(2022).
Detecting Hardware Trojans in PCBs Using Side Channel Loopbacks.
IEEE Transactions on Very Large Scale Integration (VLSI) Systems.
(2022).
Deep Reinforcement Learning for Dynamic Things of Interest Recommendation in Intelligent Ambient Environment.
Lecture Notes in Computer Science.
(2022).
Consensus Algorithms on Appendable-Block Blockchains: Impact and Security Analysis.
Mobile Networks and Applications.
(2022).
Chain or DAG? Underlying data structures, architectures, topologies and consensus in distributed ledger technology: A review, taxonomy and research issues.
Journal of Systems Architecture.
(2022).
Blockchain-Based Decentralized Federated Learning.
Fourth International Conference on Blockchain Computing and Applications (bcca).
(2022).
Automated Privacy Preferences for Smart Home Data Sharing Using Personal Data Stores.
IEEE Security and Privacy.
(2022).
Asleep at the Keyboard? Assessing the Security of GitHub Copilot's Code Contributions.
Proceedings - IEEE Symposium on Security and Privacy.
(2022).
AQA: An Adaptive Quality Assessment Framework for Online Review Systems.
Transactions on Services Computing.
(2022).
Application of micro-computed tomography for authentication of 3D printed composite parts.
Additive Manufacturing Letters.
(2022).
A Survey on Recommender Systems for Internet of Things: Techniques, Applications and Future Directions.
The Computer Journal.
(2022).
A survey of data minimisation techniques in blockchain-based healthcare.
Computer Networks.
(2022).
A Study of Third-party Resources Loading on Web.
arXiv preprint arXiv:2203.03077.
(2022).
A review on Virtual Reality and Augmented Reality use-cases of Brain Computer Interface based applications for smart cities.
Microprocessors and Microsystems.
(2022).
A Novel Emergency Light Based Smart Building Solution: Design, Implementation, and Use Cases.
IEEE INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SMART SYSTEMS (MASS).
(2022).
A machine learning and blockchain based secure and cost-effective framework for minor medical consultations.
Sustainable Computing: Informatics and Systems.
(2022).
<i>CredTrust</i>: Credential Based Issuer Management for Trust in Self-Sovereign Identity.
IEEE International Conference on Blockchain (Blockchain).
(2021).
R-gram: Inferring message formats of service protocols with relative positional n-grams.
Journal of Network and Computer Applications.
(2021).
DR-BFT: A consensus algorithm for blockchain-based multi-layer data integrity framework in dynamic edge computing system.
Future Generation Computer Systems.
(2021).
Design of Anonymous Endorsement System in Hyperledger Fabric.
IEEE Transactions on Emerging Topics in Computing.
(2021).
The Road to Accountable and Dependable Manufacturing.
Automation.
(2021).
A Secure Fog-Based Architecture for Industrial Internet of Things and Industry 4.0.
IEEE Transactions on Industrial Informatics.
(2021).
VID: Human identification through vein patterns captured from commodity depth cameras.
IET Biometrics.
(2021).
Trust-Based Blockchain Authorization for IoT.
IEEE Transactions on Network and Service Management.
(2021).
TradeChain: Decoupling Traceability and Identity in Blockchain enabled Supply Chains.
TRUSTCOM INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11.
(2021).
Traceable, trustworthy and privacy preserving agri-food supply chains.
Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
(2021).
Towards Privacy-preserving Digital Contact Tracing.
IEEE International Conference on Blockchain and Cryptocurrency.
(2021).
Towards Automated Data Sharing in Personal Data Stores.
IEEE International Conference on Pervasive Computing and Communications Workshops and Other Affiliated Events (PerCom Workshops).
(2021).
Towards a blockchain powered IoT data marketplace.
11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS).
(2021).
Temporary immutability: A removable blockchain solution for prosumer-side energy trading.
Journal of Network and Computer Applications.
(2021).
Smart HealthCare System.
arXiv.
(2021).
Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain.
Journal of Network and Computer Applications.
(2021).
Permissive runtime information flow control in the presence of exceptions.
J. Comput. Secur..
(2021).
Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files.
IEEE Embedded Systems Letters.
(2021).
MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System.
TRUSTCOM INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11.
(2021).
MB-EHR: A Multilayer Blockchain-based EHR.
IEEE International Conference on Blockchain and Cryptocurrency.
(2021).
In-situ MIMO-WPT Recharging of UAVs Using Intelligent Flying Energy Sources.
Preprints.org.
(2021).
IEEE International Conference on Pervasive Computing and Communications (PerCom) 2020.
Pervasive and Mobile Computing.
(2021).
Gate-ID: WiFi-Based Human Identification Irrespective of Walking Directions in Smart Home.
IEEE Internet of Things Journal.
(2021).
Evaluating the Security of Machine Learning Based IoT Device Identification Systems Against Adversarial Examples.
Lecture Notes in Computer Science.
(2021).
Energy and Service-priority aware Trajectory Design for UAV-BSs using Double Q-Learning.
IEEE Consumer Communications and Networking Conference.
(2021).
EMPOWERING SUSTAINABLE ENERGY INFRASTRUCTURES VIA AI-ASSISTED WIRELESS COMMUNICATIONS.
IEEE Wireless Communications.
(2021).
Efficient Data Storage and Name Look-Up in Named Data Networking Using Connected Dominating Set and Patricia Trie.
Automatic Control and Computer Sciences.
(2021).
Editor's note.
Ad Hoc Networks.
(2021).
Detecting Internet of Things Bots: A Comparative Study.
IEEE Access.
(2021).
Designing Neural Networks for Real-Time Systems.
IEEE Embedded Systems Letters.
(2021).
Deep Multi-view Spatio-Temporal Network for Urban Crime Prediction.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2021).
Deception for Cyber Defence: Challenges and Opportunities.
Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
(2021).
Decentralised Trustworthy Collaborative Intrusion Detection System for IoT.
IEEE International Conference on Blockchain (Blockchain).
(2021).
DaaS: Dew Computing as a Service for Intelligent Intrusion Detection in Edge-of-Things Ecosystem.
IEEE Internet of Things Journal.
(2021).
Crowdsourcing Software Vulnerability Discovery: Models, Dimensions, and Directions.
Lecture Notes in Computer Science.
(2021).
Cost-effective IoT devices as trustworthy data sources for a blockchain-based water management system in precision agriculture.
Computers and Electronics in Agriculture.
(2021).
Cost-Effective Blockchain-based IoT Data Marketplaces with a Credit Invariant.
IEEE International Conference on Blockchain and Cryptocurrency.
(2021).
Contextual Bandit Learning for Activity-Aware Things-of-Interest Recommendation in an Assisted Living Environment.
Lecture Notes in Computer Science.
(2021).
Can pre-trained Transformers be used in detecting complex sensitive sentences? - A Monsanto case study.
Third IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA).
(2021).
BlockTorrent: A privacy-preserving data availability protocol for multiple stakeholder scenarios.
IEEE International Conference on Blockchain and Cryptocurrency.
(2021).
B-FERL: Blockchain based framework for securing smart vehicles.
Information Processing & Management.
(2021).
Attacking with bitcoin: Using bitcoin to build resilient botnet armies.
Advances in Intelligent Systems and Computing.
(2021).
Appendable-Block Blockchains.
(2021).
A unifying type-theory for higher-order (amortized) cost analysis.
Proc. ACM Program. Lang..
(2021).
A review of computer vision methods in network security.
IEEE Communications Surveys and Tutorials.
(2021).
A Novel Model-Based Security Scheme for LoRa Key Generation.
Ipsn: Proceedings of the Acm/ieee Conference on Information Processing in Sensor Networks.
(2021).
A Novel Blockchain-as-a-Service (BaaS) Platform for Local 5G Operators.
IEEE Open Journal of the Communications Society.
(2021).
“When numbers matter!”: Detecting sarcasm in numerical portions of text.
Wassa@naacl Hlt 2019 10th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Proceedings.
(2020).
Forthcoming applications of quantum computing: peeking into the future.
IET Quantum Communication.
(2020).
A dynamic deep trust prediction approach for online social networks.
ACM International Conference Proceeding Series.
(2020).
Monitoring events with application to syndromic surveillance using social media data.
Engineering Reports.
(2020).
Leveraging Sentiment Distributions to Distinguish Figurative from Literal Health Reports on Twitter.
Web Conference 2020 Proceedings of the World Wide Web Conference Www 2020.
(2020).
Vulnerability Database as a Service for IoT.
Communications in Computer and Information Science.
(2020).
Verifiable and auditable digital interchange framework#.
arXiv.
(2020).
Trust Management in Decentralized IoT Access Control System.
IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020.
(2020).
Towards Decentralized IoT Updates Delivery Leveraging Blockchain and Zero-Knowledge Proofs.
IEEE International Symposium on Network Computing and Applications (NCA).
(2020).
Towards a Distributed Defence Mechanism Against IoT-based Bots.
IEEE Conference on Local Computer Networks.
(2020).
Special Issue on Data Distribution in Industrial and Pervasive Internet.
Computer Communications.
(2020).
Special issue on \"Crowd-sensed Big Data for Internet of Things Services\".
Pervasive and Mobile Computing.
(2020).
Smart I/O Modules for Mitigating Cyber-Physical Attacks on Industrial Control Systems.
IEEE Transactions on Industrial Informatics.
(2020).
Selected papers from the 19th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
Pervasive and Mobile Computing.
(2020).
Security Apps under the Looking Glass: An Empirical Analysis of Android Security Apps.
2020 IEEE 45th Conference on Local Computer Networks (LCN).
(2020).
Recommender Systems for the Internet of Things: A Survey.
ArXiv.
(2020).
Recommendation chart of domains for cross-domain sentiment analysis: Findings of A 20 domain study.
Lrec 2020 12th International Conference on Language Resources and Evaluation Conference Proceedings.
(2020).
Prototype Similarity Learning for Activity Recognition.
Lecture Notes in Computer Science.
(2020).
Protecting Private Attributes in App Based Mobile User Profiling.
IEEE Access.
(2020).
Privacy in targeted advertising: A survey.
TechRxiv.
(2020).
Passive Activity Classification of Smart Homes through Wireless Packet Sniffing.
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
(2020).
On the expressiveness and semantics of information flow types.
J. Comput. Secur..
(2020).
Measuring and Analysing the Chain of Implicit Trust: A Study of Third-party Resources Loading.
ACM Transactions on Privacy and Security (TOPS).
(2020).
Measurement, Characterization, and Modeling of LoRa Technology in Multifloor Buildings.
IEEE Internet of Things Journal.
(2020).
Leveraging lightweight blockchain to establish data integrity for surveillance cameras.
IEEE International Conference on Blockchain and Cryptocurrency.
(2020).
Is Privacy Regulation Slowing Down Research on Pervasive Computing?.
IEEE Computer Magazine.
(2020).
Interoperability and Synchronization Management of Blockchain-Based Decentralized e-Health Systems.
IEEE Transactions on Engineering Management.
(2020).
Identifying highly influential travellers for spreading disease on a public transport system.
Ieee International Symposium on a World of Wireless, Mobile and Multimedia Networks (ieee Wowmom).
(2020).
Harnessing Tweets for Early Detection of an Acute Disease Event.
Epidemiology.
(2020).
Figurative usage detection of symptom words to improve personal health mention detection.
Acl 2019 57th Annual Meeting of the Association for Computational Linguistics Proceedings of the Conference.
(2020).
Exploiting constrained IoT devices in a trustless blockchain-based water management system.
IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020.
(2020).
Evaluating Emergency Evacuation Events Using Building WiFi Data.
ACM/IEEE FIFTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS DESIGN AND IMPLEMENTATION (IOTDI).
(2020).
Enhancing neural sentiment analysis with aspect weights.
ACM International Conference Proceeding Series.
(2020).
Energy-aware Demand Selection and Allocation for Real-time IoT Data Trading.
IEEE International Conference on Smart Computing (SMARTCOMP).
(2020).
EMIoT: A LoRa-enabled Smart Building Solution Based on Emergency Lights.
BuildSys 2020 - Proceedings of the 7th ACM International Conference on Systems for Energy-Efficient Buildings, Cities, and Transportation.
(2020).
Efficient Proofs of Retrievability with Public Verifiability for Dynamic Cloud Storage.
IEEE Transactions on Cloud Computing.
(2020).
Efficient Decentralized Attribute Based Access Control for Mobile Clouds.
IEEE Transactions on Cloud Computing.
(2020).
Echo-ID: Smart User Identification Leveraging Inaudible Sound Signals.
IEEE Access.
(2020).
Design Patterns for Blockchain-based Self-Sovereign Identity.
ACM International Conference Proceeding Series.
(2020).
Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity.
IEEE Software.
(2020).
DAVE: Deriving automatically verilog from English.
arXiv.
(2020).
Context-based Smart Contracts For Appendable-block Blockchains.
IEEE International Conference on Blockchain and Cryptocurrency.
(2020).
Comments on the three-zone approach for social media monitoring.
Quality Engineering.
(2020).
Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2020).
Blockchain-based Verifiable Credential Sharing with Selective Disclosure.
TRUSTCOM INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11.
(2020).
Blockchain and Cyberphysical Systems.
IEEE Computer Magazine.
(2020).
An approach to monitoring time between events when events are frequent.
13th International Workshop on Intelligent Statistical Quality Control 2019 Iwisqc 2019 Proceedings.
(2020).
Adversarial Multi-view Networks for Activity Recognition.
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.
(2020).
Adaptive Two-Dimensional Embedded Image Clustering.
Proceedings of the AAAI Conference on Artificial Intelligence.
(2020).
ACOMTA: An Ant Colony Optimisation based Multi-Task Assignment Algorithm for Reverse Auction based Mobile Crowdsensing.
IEEE Conference on Local Computer Networks.
(2020).
A unified framework for data integrity protection in people-centric smart cities.
Multimedia Tools and Applications.
(2020).
A Technical Look At The Indian Personal Data Protection Bill.
arXiv.
(2020).
A Survey on Trust Prediction in Online Social Networks.
IEEE Access.
(2020).
A Survey of COVID-19 Contact Tracing Apps.
IEEE Access.
(2020).
A Relational Network Framework for Interoperability in Distributed Energy Trading.
IEEE International Conference on Blockchain and Cryptocurrency.
(2020).
A QoS-aware, Energy-efficient Trajectory Optimization for UAV Base Stations using Q-Learning.
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
(2020).
A positional keyword-based approach to inferring fine-grained message formats.
Future Generation Computer Systems.
(2020).
A parallelized disjunctive query based searchable encryption scheme for big data.
Future Generation Computer Systems.
(2020).
A Novel Modeling Involved Security Approach for LoRa Key Generation.
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
(2020).
A journey in applying blockchain for cyberphysical systems.
11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS (COMSNETS).
(2020).
A Decentralized Peer-to-Peer Remote Health Monitoring System.
Sensors.
(2020).
A Comprehensive Survey on Attacks, Security Issues and Blockchain Solutions for IoT and IIoT.
Journal of Network and Computer Applications.
(2020).
A compositional approach using Keras for neural networks in real-time systems.
Proceedings of the 2020 Design, Automation and Test in Europe Conference and Exhibition, DATE 2020.
(2020).
'Watch the flu': A tweet monitoring tool for epidemic intelligence of influenza in australia.
Proceedings of the … AAAI Conference on Artificial Intelligence. AAAI Conference on Artificial Intelligence.
(2019).
DCAT: A Deep Context-Aware Trust Prediction Approach for Online Social Networks.
ACM International Conference Proceeding Series.
(2019).
A New Secure and Lightweight Searchable Encryption Scheme over Encrypted Cloud Data.
IEEE Transactions on Emerging Topics in Computing.
(2019).
A Comparison of Word-based and Context-based Representations for Classification Problems in Health Informatics.
Bionlp 2019 Sigbiomed Workshop on Biomedical Natural Language Processing Proceedings of the 18th Bionlp Workshop and Shared Task.
(2019).
Survey of Text-based Epidemic Intelligence: A Computational Linguistic Perspective.
ACM Computing Surveys.
(2019).
Zero-Shot Object Detection with Textual Descriptions.
Proceedings of the AAAI Conference on Artificial Intelligence.
(2019).
Towards a Privacy-Preserving Way of Vehicle Data Sharing - A Case for Blockchain Technology?.
ADVANCED MICROSYSTEMS FOR AUTOMOTIVE APPLICATIONS 2017: SMART SYSTEMS TRANSFORMING THE AUTOMOBILE.
(2019).
The secure link prediction problem.
Advances in Mathematics of Communications.
(2019).
The Proposal of a Blockchain-Based Architecture for Transparent Certificate Handling.
Lecture Notes in Business Information Processing.
(2019).
The Design, Implementation, and Deployment of a Smart Lighting System for Smart Buildings.
IEEE Internet of Things Journal.
(2019).
The chain of implicit trust: An analysis of the web third-party resources loading.
The World Wide Web Conference.
(2019).
TEXUS: A unified framework for extracting and understanding tables in PDF documents.
Information Processing and Management.
(2019).
Synthesizing IEC 61499 function blocks to hardware.
ICEIC 2019 - International Conference on Electronics, Information, and Communication.
(2019).
Sustainability Analysis for Fog Nodes with Renewable Energy Supplies.
IEEE Internet of Things Journal.
(2019).
STG2Seq: Spatial-Temporal Graph to Sequence Model for Multi-step Passenger Demand Forecasting.
International Joint Conference on Artificial Intelligence.
(2019).
SPB: A Secure Private Blockchain-Based Solution for Distributed Energy Trading.
IEEE Communications Magazine.
(2019).
Spatio-Temporal Graph Convolutional and Recurrent Networks for Citywide Passenger Demand Prediction.
ACM International Conference on Information and Knowledge Management (CIKM).
(2019).
Source-Aware Crisis-Relevant Tweet Identification and Key Information Summarization.
ACM Transactions on Internet Technology.
(2019).
Smart user identification using cardiopulmonary activity.
Pervasive and Mobile Computing.
(2019).
Securing implantable medical devices with runtime enforcement hardware.
MEMOCODE 2019 - 17th ACM-IEEE International Conference on Formal Methods and Models for System Design.
(2019).
Routing-Aware and Malicious Node Detection in a Concealed Data Aggregation for WSNs.
ACM Transactions on Sensor Networks.
(2019).
Reminder Care System: An Activity-Aware Cross-Device Recommendation System.
Lecture Notes in Computer Science.
(2019).
Red-faced ROUGE: Examining the Suitability of ROUGE for Opinion Summary Evaluation.
Proceedings of the Australasian Language Technology Workshop.
(2019).
Recharging of Flying Base Stations using Airborne RF Energy Sources.
IEEE Wireless Communications and Networking Conference Workshops (WCNCW).
(2019).
Recent Trends in User Authentication - A Survey.
IEEE Access.
(2019).
Proactive Eavesdropping via Jamming for Trajectory Tracking of UAVs.
International Wireless Communications and Mobile Computing Conference.
(2019).
Peer-to-Peer EnergyTrade: A Distributed Private Energy Trading Platform.
IEEE International Conference on Blockchain and Cryptocurrency.
(2019).
Passenger Demand Forecasting with Multi-Task Convolutional Recurrent Neural Networks.
Lecture Notes in Computer Science.
(2019).
P-Gram: Positional N-Gram for the Clustering of Machine-Generated Messages.
IEEE Access.
(2019).
Overview of the 2019 ALTA Shared Task: Sarcasm Target Identification.
Proceedings of the Australasian Language Technology Workshop.
(2019).
Optimising architectures for performance, cost, and security.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2019).
On the Activity Privacy of Blockchain for IoT.
IEEE Conference on Local Computer Networks.
(2019).
MRA: A modified reverse auction based framework for incentive mechanisms in mobile crowdsensing systems.
Computer Communications.
(2019).
MOF-BC: A memory optimized and flexible blockchain for large scale networks.
Future Generation Computer Systems.
(2019).
Measuring and Modeling Car Park Usage: Lessons Learned from a Campus Field-Trial.
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
(2019).
Maximal contrast color visual secret sharing schemes.
Designs, Codes, and Cryptography.
(2019).
Malicious attack propagation and source identification.
Advances in Information Security.
(2019).
LSB: A Lightweight Scalable Blockchain for IoT security and anonymity.
Journal of Parallel and Distributed Computing.
(2019).
LowSHeP: Low-overhead forwarding and update Solution in ndn with Hexadecimal Patricia trie.
International Symposium on Advanced Networks and Telecommunication Systems, ANTS.
(2019).
iRecruit: Towards Automating the Recruitment Process.
Lecture Notes in Business Information Processing.
(2019).
Internet of Things Meets Brain-Computer Interface: A Unified Deep Learning Framework for Enabling Human-Thing Cognitive Interactivity.
IEEE Internet of Things Journal.
(2019).
Improving IoT Data Quality in Mobile Crowd Sensing: A Cross Validation Approach.
IEEE Internet of Things Journal.
(2019).
Impact of consensus on appendable-block blockchain for IoT.
PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).
(2019).
Identifying and monitoring the development trends of emerging technologies using patent analysis and Twitter data mining: The case of perovskite solar cell technology.
Technological Forecasting and Social Change.
(2019).
HydraDoctor: Real-time Liquids Intake Monitoring by Collaborative Sensing.
ICDCN: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING.
(2019).
How mobility patterns drive disease spread: A case study using public transit passenger card travel data.
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
(2019).
Guest Editorial: Introduction to the Special Section on Sensor Data Computing as a Service in Internet of Things.
IEEE Transactions on Emerging Topics in Computing.
(2019).
Gargoyle: A Network-based Insider Attack Resilient Framework for Organizations.
Proceedings - Conference on Local Computer Networks, LCN.
(2019).
Fuzzy keywords enabled ranked searchable encryption scheme for a public Cloud environment.
Computer Communications.
(2019).
FSPVDsse: A Forward Secure Publicly Verifiable Dynamic SSE Scheme.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2019).
Fair Scheduling for Data Collection in Mobile Sensor Networks with Energy Harvesting.
IEEE Transactions on Mobile Computing.
(2019).
Experiences With IoT and AI in a Smart Campus for Optimizing Classroom Usage.
IEEE Internet of Things Journal.
(2019).
Energy Efficient Legitimate Wireless Surveillance of UAV Communications.
IEEE Transactions on Vehicular Technology.
(2019).
Editorial: Receiving the Baton.
Ad Hoc Networks.
(2019).
Does Multi-Task Learning Always Help? An Evaluation on Health Informatics Tasks.
Proceedings of the Australasian Language Technology Workshop.
(2019).
Deep models for converting sarcastic utterances into their non sarcastic interpretation.
ACM International Conference Proceeding Series.
(2019).
CROWD MANAGEMENT.
IEEE Communications Magazine.
(2019).
Business process improvement with the AB-BPM methodology.
Information Systems.
(2019).
Blockchain enabled privacy preserving data audit.
arXiv.
(2019).
An Experimental Study for Tracking Crowd in Smart Cities.
IEEE Systems Journal.
(2019).
AETD: An application-aware, energy-efficient trajectory design for flying base stations.
2019 14th IEEE Malaysia International Conference on Communication: Emerging Technologies in IoE and 5G, MICC 2019.
(2019).
A Trust Architecture for Blockchain in IoT.
ArXiv.
(2019).
A Case Based Deep Neural Network Interpretability Framework and Its User Study.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2018).
Automatic sarcasm detection: A survey.
ACM Computing Surveys.
(2018).
Wi-Sign: Device-free Second Factor User Authentication.
PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).
(2018).
Wi-Access: Second Factor User Authentication leveraging WiFi Signals.
IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
(2018).
Understanding the phenomenon of sarcasm.
Cognitive Systems Monographs.
(2018).
Understanding Crowd Density with A Smartphone Sensing System.
IEEE World Forum on Internet of Things.
(2018).
Types for Information Flow Control: Labeling Granularity and Semantic Models.
31st IEEE Computer Security Foundations Symposium, CSF 2018, Oxford, United Kingdom, July 9-12, 2018.
(2018).
Trust and Privacy Challenges in Social Participatory Networks.
Lecture Notes in Business Information Processing.
(2018).
Toward Mitigation-as-a-Service in Cooperative Network Defenses.
IEEE International Conference on Dependable, Autonomic and Secure Computing - International Conference on Pervasive Intelligence and Computing - International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech).
(2018).
TEXUS: Table extraction system for PDF documents.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2018).
Synchronous neural networks for cyber-physical systems.
2018 16th ACM/IEEE International Conference on Formal Methods and Models for System Design, MEMOCODE 2018.
(2018).
SpeedyChain: A framework for decoupling data from blockchain for smart cities.
PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).
(2018).
SmartVM: A multi-layer microservice-based platform for deploying SaaS.
Proceedings - 15th IEEE International Symposium on Parallel and Distributed Processing with Applications and 16th IEEE International Conference on Ubiquitous Computing and Communications, ISPA/IUCC 2017.
(2018).
Shadow Testing for Business Process Improvement.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2018).
Security issues in named data networks.
Computer.
(2018).
Secure Wireless Automotive Software Updates Using Blockchains: A Proof of Concept.
ADVANCED MICROSYSTEMS FOR AUTOMOTIVE APPLICATIONS 2017: SMART SYSTEMS TRANSFORMING THE AUTOMOBILE.
(2018).
Secure computation of inner product of vectors with distributed entries and its applications to SVM.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2018).
Sarcasm target identification: Dataset and an introductory approach.
Lrec 2018 11th International Conference on Language Resources and Evaluation.
(2018).
Sarcasm generation.
Cognitive Systems Monographs.
(2018).
Sarcasm detection using incongruity within target text.
Cognitive Systems Monographs.
(2018).
Sarcasm detection using contextual incongruity.
Cognitive Systems Monographs.
(2018).
Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Transactions on Dependable and Secure Computing.
(2018).
Realizing a Smart University Campus: Vision, Architecture, and Implementation.
IEEE International Conference on Advanced Networks and Telecommunication Systems.
(2018).
ProductChain: Scalable Blockchain Framework to Support Provenance in Supply Chains.
IEEE International Symposium on Network Computing and Applications (NCA).
(2018).
Preferential attachment and the spreading influence of users in online social networks.
2017 IEEE/CIC International Conference on Communications in China, ICCC 2017.
(2018).
Predicting the Performance of Privacy-Preserving Data Analytics Using Architecture Modelling and Simulation.
Proceedings - 2018 IEEE 15th International Conference on Software Architecture, ICSA 2018.
(2018).
On the economic significance of ransomware campaigns: A Bitcoin transactions perspective.
Computers and Security.
(2018).
Multi-Agent Systems: A Survey.
IEEE Access.
(2018).
Mining accurate message formats for service APIs.
25th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2018 - Proceedings.
(2018).
Keyword-based delegable proofs of storage.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2018).
Key predistribution using transversal design on a grid of wireless sensor network.
Ad-Hoc and Sensor Wireless Networks.
(2018).
Investigations in computational sarcasm.
Cognitive Systems Monographs.
(2018).
Introduction.
Cognitive Systems Monographs.
(2018).
Incognito: A method for obfuscating web data.
Proceedings of the 2018 world wide web conference.
(2018).
Faster function blocks for precision timed industrial automation.
Proceedings - 2018 IEEE 21st International Symposium on Real-Time Computing, ISORC 2018.
(2018).
Expect the Unexpected: Harnessing Sentence Completion for Sarcasm Detection.
Communications in Computer and Information Science.
(2018).
Enabling Efficient and High Quality Zooming for Online Video Streaming using Edge Computing.
International Telecommunication Networks and Applications Conference.
(2018).
Dependable IoT using blockchain-based technology.
Eighth Latin-American Symposium on Dependable Computing (LADC).
(2018).
Demo: A Delay-Tolerant Payment Scheme on the Ethereum Blockchain.
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
(2018).
Demo Abstract: A Tool to Access and Visualize Classroom Attendance Data from a Smart Campus.
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
(2018).
Data-Driven Monitoring and Optimization of Classroom Usage in a Smart Campus.
ACM/IEEE International Conference on Information Processing in Sensor Networks (IPSN).
(2018).
Data forwarding and update propagation in grid network for NDN: A low-overhead approach.
International Symposium on Advanced Networks and Telecommunication Systems, ANTS.
(2018).
Converting Your Thoughts to Texts: Enabling Brain Typing via Deep Feature Learning of EEG Signals.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops.
(2018).
Conclusion and future work.
Cognitive Systems Monographs.
(2018).
BRRA: A Bid-Revisable Reverse Auction based Framework for Incentive Mechanisms in Mobile Crowdsensing Systems.
Mswim: Proceedings of the Acm International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems.
(2018).
BlockStore: A secure decentralized storage framework on blockchain.
Proceedings - International Conference on Advanced Information Networking and Applications, AINA.
(2018).
Blockchain Enabled Data Marketplace - Design and Challenges.
arXiv.
(2018).
B-FICA: BlockChain based Framework for Auto-insurance Claim and Adjudication.
IEEE INTERNATIONAL CONGRESS ON CYBERMATICS / IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY.
(2018).
Automatic Device Classification from Network Traffic Streams of Internet of Things.
Proceedings of the IEEE Conference on Local Computer Networks.
(2018).
Applying transmission-coverage algorithms for secure geocasting in VANETs.
International Journal of Computational Science and Engineering.
(2018).
An Efficient Secure Distributed Cloud Storage for Append-Only Data.
IEEE International Conference on Cloud Computing, CLOUD.
(2018).
Algorithmic Governance in Smart Cities The Conundrum and the Potential of Pervasive Computing Solutions.
IEEE Technology and Society Magazine.
(2018).
AB testing for process versions with contextual multi-armed bandit algorithms.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2018).
A survey on security and privacy issues of bitcoin.
IEEE Communications Surveys and Tutorials.
(2018).
A Game-Theoretic Approach to Quality Improvement in Crowdsourcing Tasks.
Lecture Notes in Business Information Processing.
(2017).
WiCare: Towards In-Situ Breath Monitoring.
PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).
(2017).
Wi-Auth: WiFi based Second Factor User Authentication.
PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).
(2017).
WebPol: Fine-Grained Information Flow Policies for Web Browsers.
Computer Security - ESORICS 2017 - 22nd European Symposium on Research in Computer Security, Oslo, Norway, September 11-15, 2017, Proceedings, Part I.
(2017).
Web service implementation and composition techniques.
Web Service Implementation and Composition Techniques.
(2017).
VeinDeep: Smartphone Unlock using Vein Patterns.
IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
(2017).
Using epidemic betweenness to measure the influence of users in complex networks.
Journal of Network and Computer Applications.
(2017).
Type systems for information flow control: the question of granularity.
ACM SIGLOG News.
(2017).
Towards an optimized blockchain for IoT.
Proceedings - 2017 IEEE/ACM 2nd International Conference on Internet-of-Things Design and Implementation, IoTDI 2017 (part of CPS Week).
(2017).
Towards an analysis of traffic shaping and policing in fog networks using stochastic fluid models.
ACM International Conference Proceeding Series.
(2017).
The structure of communities in scale-free networks.
Concurrency Computation.
(2017).
Studying the global spreading influence and local connections of users in online social networks.
Proceedings - 2016 16th IEEE International Conference on Computer and Information Technology, CIT 2016, 2016 6th International Symposium on Cloud and Service Computing, IEEE SC2 2016 and 2016 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2016.
(2017).
Social-PPM: Personal experience sharing and recommendation.
Proceedings - 2016 IEEE 2nd International Conference on Collaboration and Internet Computing, IEEE CIC 2016.
(2017).
Simulation of cyber-physical systems using IEC61499.
MEMOCODE 2017 - 15th ACM-IEEE International Conference on Formal Methods and Models for System Design.
(2017).
Sarcasm suite: A browser-based engine for sarcasm detection and generation.
31st Aaai Conference on Artificial Intelligence Aaai 2017.
(2017).
Reliable and Secure End-to-End Data Aggregation Using Secret Sharing in WSNs.
IEEE Wireless Communications and Networking Conference (WCNC).
(2017).
POSTER: TouchTrack: How Unique are your Touch Gestures?.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security.
(2017).
PELE: Power Efficient Legitimate Eavesdropping via Jamming in UAV Communications.
International Wireless Communications and Mobile Computing Conference.
(2017).
Multi-Level Privacy-Preserving Access Control as a Service for Personal Healthcare Monitoring.
Proceedings - 2017 IEEE 24th International Conference on Web Services, ICWS 2017.
(2017).
Instrumenting Wireless Sensor Networks - A survey on the metrics that matter.
Pervasive and Mobile Computing.
(2017).
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Communications Surveys and Tutorials.
(2017).
Enabling Privacy Preserving Mobile Advertising via Private Information Retrieval.
IEEE Conference on Local Computer Networks.
(2017).
EGAIM: Enhanced Genetic Algorithm based Incentive Mechanism for Mobile Crowdsensing.
PROCEEDINGS OF THE EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS).
(2017).
EACF: extensible access control framework for cloud Environments.
Annals of Telecommunications.
(2017).
Detecting sarcasm using different forms of incongruity.
Emnlp 2017 8th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Wassa 2017 Proceedings of the Workshop.
(2017).
Cloud Data Auditing Using Proofs of Retrievability.
arXiv.
(2017).
Certificate Transparency with Enhancements and Short Proofs.
arXiv.
(2017).
BlockChain: A Distributed Solution to Automotive Security and Privacy.
IEEE Communications Magazine.
(2017).
Blockchain for IoT Security and Privacy: The Case Study of a Smart Home.
IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
(2017).
Bitcoin Block Withholding Attack: Analysis and Mitigation.
IEEE Transactions on Information Forensics and Security.
(2017).
Applications and Challenges of Wearable Visual Lifeloggers.
IEEE Computer Magazine.
(2017).
AB-BPM: Performance-driven instance routing for business process improvement.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2017).
A model driven approach for cardiac pacemaker design using a PRET processor.
Proceedings - 2017 IEEE 20th International Symposium on Real-Time Distributed Computing, ISORC 2017.
(2016).
Are Word Embedding-based Features Useful for Sarcasm Detection?.
Emnlp 2016 Conference on Empirical Methods in Natural Language Processing Proceedings.
(2016).
WiFi-ID: Human Identification using WiFi signal.
IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS).
(2016).
WashInDepth: Lightweight hand wash monitor using depth sensor.
ACM International Conference Proceeding Series.
(2016).
Towards Policy Enforcement Point as a Service (PEPS).
IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN).
(2016).
Towards a common understanding of business process instance data.
MODELSWARD 2016 - Proceedings of the 4th International Conference on Model-Driven Engineering and Software Development.
(2016).
The relation between local and global influence of individuals in scale-free networks.
Proceedings - 2015 International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015.
(2016).
That'll do Fine!: A coarse lexical resource for English-Hindi MT, using polylingual topic models.
Proceedings of the 10th International Conference on Language Resources and Evaluation Lrec 2016.
(2016).
Smart Cities: Intelligent Environments and Dumb People?.
IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
(2016).
SenseFlow: An Experimental Study for Tracking People.
ArXiv.
(2016).
RunSync: A predictable runtime for precision timed automation systems.
Proceedings - 2016 IEEE 19th International Symposium on Real-Time Distributed Computing, ISORC 2016.
(2016).
Reliable transmissions in AWSNs by using O-BESPAR hybrid antenna.
Pervasive and Mobile Computing.
(2016).
QuickFind: Fast and Contact-free Object Detection Using a Depth Sensor.
IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
(2016).
Preferential attachment model with degree bound and its application to key predistribution in WSN.
Proceedings - International Conference on Advanced Information Networking and Applications, AINA.
(2016).
Political issue extraction model: A novel hierarchical topic model that uses tweets by political and non-political authors.
Proceedings of the 7th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Wassa 2016 at the 2016 Conference of the North American Chapter of the Association for Computational Linguistics Human Language Technologies Naacl Hlt 2016.
(2016).
Platform zero: a step closer to ubiquitous computing.
Concurrency and Computation: Practice and Experience.
(2016).
On the Importance of Link Characterization for Aerial Wireless Sensor Networks.
IEEE Communications Magazine.
(2016).
On the application of clique problem for proof-of-work in cryptocurrencies.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2016).
On Access Control, Capabilities, Their Equivalence, and Confused Deputy Attacks.
IEEE 29th Computer Security Foundations Symposium, CSF 2016, Lisbon, Portugal, June 27 - July 1, 2016.
(2016).
Message dissemination in vehicular networks.
Delay Tolerant Networks: Protocols and Applications.
(2016).
K-Source: Multiple source selection for traffic offloading in mobile social networks.
2016 8th International Conference on Wireless Communications and Signal Processing, WCSP 2016.
(2016).
Incentive Mechanism Design for Heterogeneous Crowdsourcing Using All-Pay Contests.
IEEE Transactions on Mobile Computing.
(2016).
Implementation and Evaluation of Adaptive Video Streaming based on Markov Decision Process.
Conference Record - International Conference on Communications.
(2016).
Human Identification Using WiFi Signal.
IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
(2016).
How do cultural differences impact the quality of sarcasm annotation?: A case study of Indian annotators and American text.
Proceedings of the Annual Meeting of the Association for Computational Linguistics.
(2016).
How challenging is sarcasm versus irony classification?: An analysis from human and computational perspectives.
Australasian Language Technology Association Workshop 2016 Alta 2016 Proceedings.
(2016).
Harnessing sequence labeling for sarcasm detection in dialogue from TV series ‘Friends’.
Conll 2016 20th Signll Conference on Computational Natural Language Learning Proceedings.
(2016).
Failure tolerant rational secret sharing.
Proceedings - International Conference on Advanced Information Networking and Applications, AINA.
(2016).
Expressive rating scheme by signatures with predications on ratees.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2016).
Energy-Efficient Cooperative Relaying for Unmanned Aerial Vehicles.
IEEE Transactions on Mobile Computing.
(2016).
Energy Harvesting Wearables Can Tell Which Train Route You Have Taken.
Proceedings - Conference on Local Computer Networks, LCN.
(2016).
EmoGram: An open-source time sequence-based emotion tracker and its innovative applications.
Aaai Workshop Technical Report.
(2016).
Distributed intrusion detection system using mobile agents in cloud computing environment.
Proceedings - 2015 Conference on Information Assurance and Cyber Security, CIACS 2015.
(2016).
DB-SECaaS: a cloud-based protection system for document-oriented NoSQL databases.
EURASIP Journal on Information Security.
(2016).
Constructing A Shortest Path Overhearing Tree With Maximum Lifetime In WSNs.
PROCEEDINGS OF THE 49TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS).
(2016).
Comprehensive Mobile Bandwidth Traces from Vehicular Networks.
ACM Multimedia Systems Conference (MMSys).
(2016).
Carrots and Sticks - Incentives that Make Mobile Crowdsensing Work (CASPer 2016 Keynote Paper).
IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
(2016).
Building a process description repository with knowledge acquisition.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2016).
Blockchain in internet of things: Challenges and Solutions.
ArXiv.
(2016).
Automated table understanding using stub patterns.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2016).
Analysis of the spreading influence variations for online social users under attacks.
2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings.
(2016).
Aggregated search over personal process description graph.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2016).
A popularity-based cache consistency mechanism for information-centric networking.
2016 IEEE Global Communications Conference, GLOBECOM 2016 - Proceedings.
(2016).
A PDF wrapper for table processing.
DocEng 2016 - Proceedings of the 2016 ACM Symposium on Document Engineering.
(2016).
A Framework that Uses the Web for Named Entity Class Identification: Case Study for Indian Classical Music Forums.
Computacion y Sistemas.
(2016).
A Context-based Privacy Preserving Framework for Wearable Visual Lifeloggers.
IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
(2015).
Your sentiment precedes you: Using an author's historical tweets to predict sarcasm.
6th Workshop on Computational Approaches to Subjectivity Sentiment and Social Media Analysis Wassa 2015 at the 2015 Conference on Empirical Methods in Natural Language Processing Emnlp 2015 Proceedings.
(2015).
Trust-based privacy-aware participant selection in social participatory sensing.
Journal of Information Security and Applications.
(2015).
TEXUS: A task-based approach for table extraction and understanding.
DocEng 2015 - Proceedings of the 2015 ACM Symposium on Document Engineering.
(2015).
Taxonomy for trust models in cloud computing.
The Computer Journal.
(2015).
Sparse Representation Based Acoustic Rangefinders: From Sensor Platforms to Mobile Devices.
IEEE Communications Magazine.
(2015).
Social-network-based personal processes.
Lecture Notes in Business Information Processing.
(2015).
Similarity search over personal process description graph.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2015).
SenseFlow: An experimental study of people tracking.
RealWSN 2015 - Proceedings of the 6th ACM Workshop on Real World Wireless Sensor Networks, co-located with SenSys 2015.
(2015).
Secure identity management system for federated Cloud environment.
Studies in Computational Intelligence.
(2015).
RFT: Identifying Suitable Neighbors for Concurrent Transmissions in Point-to-Point Communications.
Mswim: Proceedings of the Acm International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems.
(2015).
Realization of FGAC model using XACML policy specification.
2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD).
(2015).
Predicting the Region of Interest for Dynamic Foveated Streaming.
International Telecommunication Networks and Applications Conference.
(2015).
Personal process description graph for describing and querying personal processes.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2015).
Optimizing HTTP-Based Adaptive Streaming in Vehicular Environment Using Markov Decision Process.
IEEE Transactions on Multimedia.
(2015).
On the proximal Landweber Newton method for a class of nonsmooth convex problems.
Computational Optimization and Applications.
(2015).
Message from the Chairs.
ICSE Workshop on Principles of Engineering Service Oriented Systems.
(2015).
MagicNET: Mobile agents data protection system.
Transactions on Emerging Telecommunications Technologies.
(2015).
Lightweight Clustering of Spatio-Temporal Data in Resource Constrained Mobile Sensing.
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
(2015).
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Transactions on Information Forensics and Security.
(2015).
Information Flow Control for Event Handling and the DOM in Web Browsers.
IEEE 28th Computer Security Foundations Symposium, CSF 2015, Verona, Italy, 13-17 July, 2015.
(2015).
Identifying diffusion sources in large networks: A community structure based approach.
Proceedings - 14th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2015.
(2015).
Harnessing context incongruity for sarcasm detection.
Acl Ijcnlp 2015 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing Proceedings of the Conference.
(2015).
From MANET to people-centric networking: Milestones and open research challenges.
Computer Communications.
(2015).
EPLA: Energy-balancing Packets Scheduling for Airborne Relaying Networks.
Conference Record - International Conference on Communications.
(2015).
Empirical Evaluation of MDP-based DASH Player.
International Telecommunication Networks and Applications Conference.
(2015).
Ear-Phone: A context-aware noise mapping using smart phones.
Pervasive and Mobile Computing.
(2015).
Crowdsourcing with Tullock Contests: A New Perspective.
Proceedings - IEEE INFOCOM.
(2015).
Cloud authorization: exploring techniques and approach towards effective access control framework.
Frontiers of Computer Science.
(2015).
CITEX: A new citation index to measure the relative importance of authors and papers in scientific publications.
IEEE International Conference on Communications.
(2015).
BPIM: A multi-view model for business process instances.
Conferences in Research and Practice in Information Technology Series.
(2015).
Achieving data survivability and confidentiality in unattended wireless sensor networks.
Proceedings - International Conference on Advanced Information Networking and Applications, AINA.
(2015).
A Socially-Aware Incentive Scheme for Social Participatory Sensing.
IEEE Tenth International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
(2015).
A computational approach to automatic prediction of drunk-texting.
Acl Ijcnlp 2015 53rd Annual Meeting of the Association for Computational Linguistics and the 7th International Joint Conference on Natural Language Processing of the Asian Federation of Natural Language Processing Proceedings of the Conference.
(2015).
7th International Workshop on Principles of Engineering Service-Oriented and Cloud Systems (PESOS 2015).
Proceedings - International Conference on Software Engineering.
(2014).
κ-FSOM: Fair Link Scheduling Optimization for Energy-Aware Data Collection in Mobile Sensor Networks.
Lecture Notes in Computer Science.
(2014).
TrustMeter: A Trust Assessment Scheme for Collaborative Privacy Mechanisms in Participatory Sensing Applications.
IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP).
(2014).
Trajectory Approximation for Resource Constrained Mobile Sensor Networks.
IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING IN SENSOR SYSTEMS (IEEE DCOSS).
(2014).
To shut them up or to clarify: Restraining the spread of rumors in online social networks.
IEEE Transactions on Parallel and Distributed Systems.
(2014).
Supporting complex work in crowdsourcing platforms: A view from service-oriented computing.
Proceedings of the Australian Software Engineering Conference, ASWEC.
(2014).
Should silence be heard? Fair rational secret sharing with silent and non-silent players.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2014).
SEW-ing a Simple Endorsement Web to Incentivize Trustworthy Participatory Sensing.
Annual IEEE International Conference on Sensing, Communication, and Networking (SECON).
(2014).
Security services using crowdsourcing.
Procedia Computer Science.
(2014).
Security of sharded NoSQL databases: A comparative analysis.
2014 conference on information assurance and cyber security (CIACS).
(2014).
Reliable Positioning with Hybrid Antenna Model for Aerial Wireless Sensor and Actor Networks.
IEEE Wireless Communications and Networking Conference (WCNC).
(2014).
Randomised Multipath Routing for Secure Data Collection.
IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP).
(2014).
ProfileGuard: Privacy preserving obfuscation for mobile user profiles.
Proceedings of the ACM Conference on Computer and Communications Security.
(2014).
Privacy-Aware Trust-Based Recruitment in Social Participatory Sensing.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering.
(2014).
On the need for a reputation system in mobile phone based sensing.
Ad Hoc Networks.
(2014).
Measuring Sentiment Annotation Complexity of text.
52nd Annual Meeting of the Association for Computational Linguistics Acl 2014 Proceedings of the Conference.
(2014).
Information Flow Control in WebKit's JavaScript Bytecode.
Principles of Security and Trust - Third International Conference, POST 2014, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2014, Grenoble, France, April 5-13, 2014, Proceedings.
(2014).
Improved named entity recognition - Patterns in columns model (PCM).
Proceedings of the ACM Symposium on Applied Computing.
(2014).
Fine-Grained Access Control in Object-Oriented Databases.
Future Information Technology.
(2014).
Evaluation and establishment of trust in cloud federation.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication.
(2014).
Decentralized access control with anonymous authentication of data stored in clouds.
IEEE Transactions on Parallel and Distributed Systems.
(2014).
Creating Personal Bandwidth Maps using Opportunistic Throughput Measurements.
Conference Record - International Conference on Communications.
(2014).
Cloud identity management security issues & solutions: a taxonomy.
Complex Adaptive Systems Modeling.
(2014).
Characterising User Targeting For In-App Mobile Ads.
IEEE INFOCOM - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).
(2014).
Can smart plugs predict electric power consumption? A case study.
MobiQuitous 2014 - 11th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services.
(2014).
Analyzing cascading failures in smart grids under random and targeted attacks.
Proceedings - International Conference on Advanced Information Networking and Applications, AINA.
(2014).
A social network approach to trust management in VANETs.
Peer-to-Peer Networking and Applications.
(2014).
A Reputation Framework for Social Participatory Sensing Systems.
Mobile Networks and Applications.
(2014).
A Distributed Mechanism for Dynamic Resource Trading in Cooperative Mobile Video Streaming.
IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
(2014).
A cognitive study of subjectivity extraction in sentiment annotation.
Proceedings of the Annual Meeting of the Association for Computational Linguistics.
(2013).
Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks (vol 31, pg 1639, 2013).
IEEE Journal on Selected Areas in Communications.
(2013).
Utilizing Link Characterization for Improving the Performance of Aerial Wireless Sensor Networks.
IEEE Journal on Selected Areas in Communications.
(2013).
Trust Assessment in Social Participatory Networks.
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE).
(2013).
Security aspects of virtualization in cloud computing.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2013).
Securing the virtual machine images in Cloud computing.
SIN 2013 - Proceedings of the 6th International Conference on Security of Information and Networks.
(2013).
Psi-CAL: Foundations of a Programming Language for Services Computing.
2013 IEEE International Conference on Services Computing, Santa Clara, CA, USA, June 28 - July 3, 2013.
(2013).
Processbook: Towards social network-based personal process management.
Lecture Notes in Business Information Processing.
(2013).
Priority-based coverage path planning for Aerial Wireless Sensor Networks.
IEEE Eighth International Conference on Intelligent Sensors, Sensor Networks and Information Processing.
(2013).
Platform Zero: A Context-based Computing Platform for Collaboration.
TRUSTCOM INTERNATIONAL JOINT CONFERENCE OF IEEE TRUSTCOM-11/IEEE ICESS-11/FCST-11.
(2013).
Performance analysis of geography-limited broadcasting in multihop wireless networks.
Wireless Communications and Mobile Computing.
(2013).
Participatory sensing: Crowdsourcing data from mobile smartphones in urban spaces.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2013).
Pairwise and triple key distribution in wireless sensor networks with applications.
IEEE Transactions on Computers.
(2013).
Making Headlines in Hindi: Automatic English to Hindi News Headline Translation.
6th International Joint Conference on Natural Language Processing Ijcnlp 2013 Companion Volume of the Proceedings System Demonstrations.
(2013).
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2013).
Jamming resistant schemes for wireless communication: A combinatorial approach.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2013).
Intrusion detection system in cloud computing: Challenges and opportunities.
2013 2nd National Conference on Information Assurance (NCIA).
(2013).
Introduction to the Proceedings of the Workshop on User-Focused Service Engineering, Consumption and Aggregation (USECA) 2011.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2013).
Interactive product browsing and configuration using remote augmented reality sales services.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2013).
IncogniSense: An anonymity-preserving reputation framework for participatory sensing applications.
Pervasive and Mobile Computing.
(2013).
HUBCODE: hub-based forwarding using network coding in delay tolerant networks.
Wireless Communications and Mobile Computing.
(2013).
HTTP-based Adaptive Streaming for Mobile Clients using Markov Decision Process.
20TH INTERNATIONAL PACKET VIDEO WORKSHOP (PV).
(2013).
Form-based web service composition for domain experts.
ACM Transactions on the Web.
(2013).
Erratum: Utilizing link characterization for improving the performance of aerial wireless sensor networks (IEEE Journal on Selected Areas in Communications).
IEEE Journal on Selected Areas in Communications.
(2013).
Enhanced privacy and reliability for secure geocasting in VANET.
IEEE International Conference on Communications.
(2013).
Data authentication scheme for Unattended Wireless Sensor Networks against a mobile adversary.
IEEE Wireless Communications and Networking Conference, WCNC.
(2013).
ConferenceSense: Monitoring of public events using phone sensors.
UbiComp 2013 Adjunct - Adjunct Publication of the 2013 ACM Conference on Ubiquitous Computing.
(2013).
Automatic affiliation extraction from calls-for-papers.
AKBC 2013 - Proceedings of the 2013 Workshop on Automated Knowledge Base Construction, Co-located with CIKM 2013.
(2013).
Assessment criteria for trust models in cloud computing.
2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.
(2013).
Assessment criteria for cloud identity management systems.
2013 IEEE 19th Pacific Rim International Symposium on Dependable Computing.
(2013).
Adaptive Position Update for Geographic Routing in Mobile Ad Hoc Networks.
IEEE Transactions on Mobile Computing.
(2013).
A trust framework for social participatory sensing systems.
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST.
(2013).
A decentralized security framework for data aggregation and access control in smart grids.
IEEE Transactions on Smart Grid.
(2013).
5th International workshop on principles of engineering service-oriented systems (PESOS 2013).
Proceedings - International Conference on Software Engineering.
(2012).
Usage control model specification in XACML policy language XACML policy engine of UCON.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2012).
Towards changing the user perception of mobile communications through geotagged information.
ACM International Conference Proceeding Series.
(2012).
Reliable Communications in Aerial Sensor Networks by Using A Hybrid Antenna.
IEEE Conference on Local Computer Networks.
(2012).
On the Use of Location Window in Geo-Intelligent HTTP Adaptive Video Streaming.
PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON NETWORKS.
(2012).
On the characterisation of vehicular mobility in a large-scale public transport network.
International Journal of Ad Hoc and Ubiquitous Computing.
(2012).
KAAS: Kernel as a Service.
Eighth IEEE World Congress on Services, SERVICES 2012, Honolulu, HI, USA, June 24-29, 2012.
(2012).
Improving QoS in High-Speed Mobility Using Bandwidth Maps.
IEEE Transactions on Mobile Computing.
(2012).
Improved distinguishers for HC-128.
Designs, Codes, and Cryptography.
(2012).
Cost and benefit of using wordnet senses for sentiment analysis.
Proceedings of the 8th International Conference on Language Resources and Evaluation Lrec 2012.
(2012).
Comparative analysis of access control systems on cloud.
2012 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing.
(2012).
Combinatorial batch codes: A lower bound and optimal constructions.
Advances in Mathematics of Communications.
(2012).
Automating form-based processes through annotation.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2012).
A Privacy-Preserving Reputation System for Participatory Sensing.
IEEE Conference on Local Computer Networks.
(2011).
C-Feel-It: A sentiment analyzer for micro-blogs.
Acl Hlt 2011 49th Annual Meeting of the Association for Computational Linguistics Human Language Technologies Proceedings of Student Session.
(2011).
Harnessing WordNet senses for supervised sentiment classification.
Emnlp 2011 Conference on Empirical Methods in Natural Language Processing Proceedings of the Conference.
(2011).
SWAM: Stuxnet worm analysis in Metasploit.
Proceedings - 2011 9th International Conference on Frontiers of Information Technology, FIT 2011.
(2011).
Similarity function recommender service using incremental user knowledge acquisition.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2011).
Service learning and teaching foundry: A virtual SOA/BPM learning and teaching community.
Lecture Notes in Business Information Processing.
(2011).
Robust Sense-Based Sentiment Classification.
Proceedings of the Annual Meeting of the Association for Computational Linguistics.
(2011).
On data-centric misbehavior detection in VANETs.
IEEE Vehicular Technology Conference.
(2011).
Multipath Fading Effect on Spatial Packet Loss Correlation in Wireless Networks.
IEEE Vehicular Technology Conference.
(2011).
Mobile Broadband Performance Measured from High-Speed Regional Trains.
IEEE Vehicular Technology Conference.
(2011).
MashSheet: Mashups in your spreadsheet.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2011).
Link Characterization for Aerial Wireless Sensor Networks.
IEEE GLOBECOM - Workshop on Low Power Wide Area Networking Technologies for Emerging Internet of Things (LPWA4IoT).
(2011).
Key pre-distribution using partially balanced designs in wireless sensor networks.
International Journal of High Performance Computing and Networking.
(2011).
Improved access control mechanism in vehicular ad hoc networks.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2011).
Fully secure pairwise and triple key distribution in wireless sensor networks using combinatorial designs.
Proceedings - IEEE INFOCOM.
(2011).
Forms-based service composition.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2011).
Empirical Evaluation of HTTP Adaptive Streaming under Vehicular Mobility.
Lecture Notes in Computer Science.
(2011).
Automatic Image Capturing and Processing for PetrolWatch.
PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON NETWORKS.
(2011).
A survey on privacy in mobile participatory sensing applications.
Journal of Systems and Software.
(2011).
A pragmatic approach to area coverage in hybrid wireless sensor networks.
Wireless Communications and Mobile Computing.
(2010).
Xi-Calculus: A Calculus for Service Interactions.
2010 IEEE International Conference on Services Computing, SCC 2010, Miami, Florida, USA, July 5-10, 2010.
(2010).
Spreadsheet as a generic purpose mashup development environment.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2010).
Semantic-Based Mashup of Composite Applications.
IEEE Transactions on Services Computing.
(2010).
Safety Assurance and Rescue Communication Systems in High-Stress Environments: A Mining Case Study.
IEEE Communications Magazine.
(2010).
Quality Improvement of Mobile Video Using Geo-intelligent Rate Adaptation.
IEEE Wireless Communications and Networking Conference (WCNC).
(2010).
Preserving privacy in participatory sensing systems.
Computer Communications.
(2010).
Poster Abstract: Experimental Evaluation of Multi-Hop Routing Protocols for Wireless Sensor Networks.
Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks.
(2010).
Mitigating the Effect of Interference in Wireless Sensor Networks.
IEEE Conference on Local Computer Networks.
(2010).
Managing long-tail processes using FormSys.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2010).
FormSys: Form-processing web services.
Proceedings of the 19th International Conference on World Wide Web, WWW ‘10.
(2010).
Editorial message: Middleware for service oriented computing workshop 2010.
Proceedings of the 5th Workshop on Middleware for Service Oriented Computing, MW4SOC 2010, Held at the ACM/IFIP/USENIX International Middleware Conference.
(2010).
Ear-Phone: An End-to-End Participatory Urban Noise Mapping System.
Proceedings of the ACM/IEEE International Conference on Information Processing in Sensor Networks.
(2010).
Detection and Tracking Using Particle-Filter-Based Wireless Sensor Networks.
IEEE Transactions on Mobile Computing.
(2010).
Characterization of a Large-scale Delay Tolerant Network.
IEEE Conference on Local Computer Networks.
(2010).
Authentication and Confidentiality in Wireless Ad Hoc Networks.
Security in Ad Hoc and Sensor Networks.
(2010).
Are You Contributing Trustworthy Data? The Case for a Reputation System in Participatory Sensing.
Mswim: Proceedings of the Acm International Conference on Modeling, Analysis, and Simulation of Wireless and Mobile Systems.
(2010).
An assessment of fire-damaged forest using spatial analysis techniques.
Journal of Spatial Science.
(2010).
An Analysis of Spreadsheet-Based Services Mashup.
Conferences in Research and Practice in Information Technology Series.
(2010).
A Bayesian Routing Framework for Delay Tolerant Networks.
IEEE Wireless Communications and Networking Conference (WCNC).
(2009).
Using scrum in global software development: A systematic literature review.
Proceedings - 2009 4th IEEE International Conference on Global Software Engineering, ICGSE 2009.
(2009).
Towards Privacy-Sensitive Participatory Sensing.
IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
(2009).
Towards a spreadsheet-based service composition framework.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2009).
Risk identification and mitigation processes for using scrum in global software development: A conceptual framework.
Proceedings - Asia-Pacific Software Engineering Conference, APSEC.
(2009).
Revisiting Key Predistribution Using Transversal Designs for a Grid-Based Deployment Scheme.
International Journal of Distributed Sensor Networks.
(2009).
Poster Abstract: Ear-Phone Assessment of Noise Pollution with Mobile Phones.
ACM Conference on Embedded Networked Sensor Systems.
(2009).
Multi-faceted visualisation of worklists.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2009).
Multi-Channel Interference in Wireless Sensor Networks.
International Conference on Information Processing in Sensor Networks (ipsn).
(2009).
Key predistribution using combinatorial designs for grid-group deployment scheme in wireless sensor networks.
ACM Transactions on Sensor Networks.
(2009).
Key predistribution schemes using codes in wireless sensor networks.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2009).
Introduction to the Proceedings of the EDOC 2009 Workshop Middleware for Web Services (MWS) 2009.
Proceedings - IEEE International Enterprise Distributed Object Computing Workshop, EDOC.
(2009).
HUBCODE: Message Forwarding using Hub-based Network Coding in Delay Tolerant Networks.
MSWIM09; PROCEEDINGS OF THE ACM INTERNATIONAL CONFERENCE ON MODELING, ANALYSIS, AND SYSTEMS.
(2009).
Editorial Message: Middleware for Service Oriented Computing Workshop 2009.
Proceedings of the 4th Workshop on Middleware for Service Oriented Computing, MW4SOC 2009 held at the ACM/IFIP/USENIX International Middleware Conference.
(2009).
Data integration in mashups.
SIGMOD Record.
(2009).
Cluster-based Channel Assignment in Multi-radio Multi-channel Wireless Mesh Networks.
IEEE Conference on Local Computer Networks.
(2009).
Attacks and Security Mechanisms.
SECURITY IN WIRELESS MESH NETWORKS.
(2009).
Analysis of Per-Node Traffic Load in Multi-Hop Wireless Sensor Networks.
IEEE Transactions on Wireless Communications.
(2008).
Performance Evaluation of a Wireless Sensor Network Based Tracking System.
IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3.
(2008).
Object-oriented wrappers for the Linux kernel.
Softw. Pract. Exp..
(2008).
Bill organiser portal: A case study on end-user composition.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2008).
Automatic collection of fuel prices from a network of mobile cameras.
Lecture Notes in Computer Science.
(2007).
WS-advisor: A task memory for service composition frameworks.
Proceedings - International Conference on Computer Communications and Networks, ICCCN.
(2007).
Topology control and channel assignment in multi-radio multi-channel wireless mesh networks.
IEEE INTERNATIONAL CONFERENCE ON MOBILE AD-HOC AND SENSOR SYSTEMS, VOLS 1-3.
(2007).
Task memories and task forums: A foundation for sharing service-based personal processes.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2007).
Securing channel assignment in Multi-Radio Multi-Channel Wireless Mesh Networks.
IEEE Wireless Communications and Networking Conference (WCNC).
(2007).
Privacy inspection and monitoring framework for automated business processes.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2007).
On embedding task memory in services composition frameworks.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2007).
Ensuring area coverage in hybrid wireless sensor networks.
Lecture Notes in Computer Science.
(2007).
Distance-based local geocasting in multi-hop wireless networks.
IEEE Wireless Communications and Networking Conference (WCNC).
(2007).
Detection and Tracking Using Wireless Sensor Networks.
ACM Conference on Embedded Networked Sensor Systems.
(2007).
Design, analysis, and implementation of a novel multiple resource scheduler.
IEEE Transactions on Computers.
(2007).
Design, analysis, and implementation of a novel low complexity scheduler for joint resource allocation.
IEEE Transactions on Parallel and Distributed Systems.
(2007).
Conceptual modeling of privacy-aware web service protocols.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2007).
Analysis of resource reservation aggregation in on-board networks.
VTC2005-FALL IEEE VEHICULAR TECHNOLOGY CONFERENCE, 1-4, PROCEEDINGS.
(2006).
Towards semantic-driven, flexible and scalable framework for peering and querying e-catalog communities.
Information Systems.
(2006).
Security Vulnerabilities in Channel Assignment of Multi-Radio Multi-Channel Wireless Mesh Networks.
IEEE Global Communications Conference.
(2006).
QoS driven parallelization of resources to reduce file download delay.
IEEE Transactions on Parallel and Distributed Systems.
(2006).
INDICT: INtruder Detection, Identification, Containment and Termination.
International Conference on Computing and Informatics.
(2006).
Efficient boundary estimation for practical deployment of mobile sensors in hybrid sensor networks.
IEEE INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS, VOLS 1 AND 2.
(2006).
Building and querying e-catalog networks using P2P and data summarisation techniques.
Journal of Intelligent Information Systems.
(2006).
Adaptive Position Update in Geographic Routing.
Conference Record - International Conference on Communications.
(2005).
Toward self-organizing service communities.
IEEE Transactions on Systems, Man, and Cybernetics Part A:Systems and Humans..
(2005).
Service-oriented middleware for peer-to-peer computing.
IEEE International Conference on Industrial Informatics.
(2005).
Resource-centric worklist visualisation.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2005).
Probabilistic coverage in wireless sensor networks.
IEEE Conference on Local Computer Networks.
(2005).
Performance of a Bluetooth IP network for streaming high quality audio.
IEEE Conference on Local Computer Networks.
(2005).
On large scale deployment of parallelized file transfer protocol.
98 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE.
(2005).
Implementation and performance analysis of a packet scheduler on a programmable network processor.
IEEE Conference on Local Computer Networks.
(2005).
An evaluation of fair packet schedulers using a novel measure of instantaneous fairness.
Computer Communications.
(2005).
Aggregation policies over RSVP tunnels.
IEEE Vehicular Technology Conference.
(2005).
A parallelized file-transfer-protocol for on-board IP networks.
IEEE Vehicular Technology Conference.
(2005).
A novel tuneable low-intensity adversarial attack.
IEEE Conference on Local Computer Networks.
(2004).
WS-CatalogNet: Building peer-to-peer e-catalog.
Lecture Notes in Artificial Intelligence (Subseries of Lecture Notes in Computer Science).
(2004).
Peering and querying e-catalog communities.
Proceedings - International Conference on Data Engineering.
(2004).
On-board RSVP: An extension of RSVP to support real-time services in on-board IP networks.
Lecture Notes in Computer Science.
(2004).
On the latency and fairness characteristics of pre-order deficit round Robin.
Computer Communications.
(2003).
Anchored opportunity queueing: a low-latency scheduler for fair arbitration among virtual channels.
Journal of Parallel and Distributed Computing.
(2002).
Usage–centric adaptation of dynamic E–catalogs.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2002).
Personalised organisation of dynamic e-catalogs.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2002).
On the latency bound of pre-order deficit round robin.
IEEE Conference on Local Computer Networks.
(2002).
On the latency bound of deficit round robin.
20TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN).
(2002).
Low-latency guaranteed-rate scheduling using Elastic Round Robin.
Computer Communications.
(2002).
Fair and efficient packet scheduling using Elastic Round Robin.
IEEE Transactions on Parallel and Distributed Systems.
(2002).
Building Adaptive E-Catalog Communities Based on User Interaction Patterns.
IEEE Intelligent Systems.
(2001).
Peer-to-peer traced execution of composite services.
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).
(2001).
Fair, efficient and scalable scheduling without per-flow state.
98 IEEE INTERNATIONAL PERFORMANCE, COMPUTING AND COMMUNICATIONS CONFERENCE.
(2001).
Fair, efficient and low-latency packet scheduling using nested deficit round robin.
IEEE WORKSHOP ON HIGH PERFORMANCE SWITCHING AND ROUTING.
(2000).
A Round-Robin scheduling strategy for reduced delays in wormhole switches with virtual lanes.
cic’: Proceedings of the International Conference on Communications in Computing.