The Library
Browse by Warwick Author
Up a level |
Number of items: 87.
Journal Article
Chuah, Edward, Jhumka, Arshad, Malek, Miroslaw and Suri, Neeraj (2022) A survey of log-correlation tools for failure diagnosis and prediction in cluster systems. IEEE Access, 10 . pp. 133487-133503. doi:10.1109/access.2022.3231454 ISSN 2169-3536.
Gu, Chen, Jhumka, Arshad and Maple, Carsten (2022) Silence is golden : a source location privacy scheme for wireless sensor networks based on silent nodes. Security and Communication Networks, 2022 . 5026549. doi:10.1155/2022/5026549 ISSN 1939-0122.
Bradbury, Matthew S. and Jhumka, Arshad (2022) Quantifying source location privacy routing performance via divergence and information loss. IEEE Transactions on Information Forensics and Security, 17 . pp. 3890-3905. doi:10.1109/TIFS.2022.3217385 ISSN 1556-6013.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2022) Information management for trust computation on resource-constrained IoT devices. Future Generation Computer Systems, 135 . pp. 348-363. doi:10.1016/j.future.2022.05.004 ISSN 0167-739X.
Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, Flores, Denys, Burton, Jonathan and Butler, Matthew (2022) Threat modelling guided trust-based task offloading for resource-constrained Internet of Things. Transactions on Sensor Networks, 18 (2). 29. doi:10.1145/3510424 ISSN 1550-4859.
Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, Flores, Denys, Burton, Jonathan and Butler, Matthew (2022) Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things. ACM Transactions on Sensor Networks, 18 (2). pp. 1-41. 29. doi:10.1145/3510424 ISSN 1550-4867.
Bradbury, Matthew S., Jhumka, Arshad and Maple, Carsten (2021) A spatial source location privacy-aware duty cycle for internet of things sensor networks. ACM Transactions on Internet of Things, 2 (1). 4. doi:10.1145/3430379 ISSN 2691-1914.
Gu, Chen, Bradbury, Matthew S. and Jhumka, Arshad (2019) Phantom walkabouts : a customisable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31 (20). e5304. doi:10.1002/cpe.5304 ISSN 1532-0626.
Lin, Yiyan, Kulkarni, Sandeep and Jhumka, Arshad (2019) Automation of fault-tolerant graceful degradation. Distributed Computing, 32 (1). pp. 1-25. doi:10.1007/s00446-017-0319-x ISSN 0178-2770.
Kirton, Jack, Bradbury, Matthew S. and Jhumka, Arshad (2018) Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146 . p. 125. doi:10.1016/j.comnet.2018.09.010 ISSN 1389-1286.
Gu, Chen, Bradbury, Matthew S., Kirton, Jack and Jhumka, Arshad (2018) A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Generation Computer Systems, 87 . pp. 514-526. doi:10.1016/j.future.2018.01.046 ISSN 0167-739X.
Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2018) Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115 . pp. 67-81. doi:10.1016/j.jpdc.2018.01.006 ISSN 0743-7315.
Saginbekov, Sain and Jhumka, Arshad (2017) Many-to-many data aggregation scheduling in wireless sensor networks with two sinks. Computer Networks, 123 . pp. 184-199. doi:10.1016/j.comnet.2017.05.022 ISSN 1389-1286.
Alhanahnah, Mohannad J., Jhumka, Arshad and Alouneh, Sahel (2016) A multi-dimension taxonomy of insider threats in cloud computing. The Computer Journal, 59 (11). pp. 1612-1622. doi:10.1093/comjnl/bxw020 ISSN 0010-4620.
Jhumka, Arshad and Mottola, Luca (2016) Neighborhood view consistency in wireless sensor networks. ACM Transactions on Sensor Network , 12 (3). 19. doi:10.1145/2901296 ISSN 1550-4859.
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2015) Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2999-3020. doi:10.1002/cpe.3242 ISSN 1532-0626.
Saginbekov, Sain and Jhumka, Arshad (2014) Towards efficient stabilizing code dissemination in wireless sensor networks. The Computer Journal, Volume 57 (Number 12). pp. 1790-1816. doi:10.1093/comjnl/bxt110 ISSN 0010-4620.
Saginbekov, Sain and Jhumka, Arshad (2014) Efficient code dissemination in wireless sensor networks. Future Generation Computer Systems, Volume 39 . pp. 111-119. doi:10.1016/j.future.2013.12.008 ISSN 0167-739X.
Jhumka, Arshad, Bradbury, Matthew S. and Saginbekov, Sain (2014) Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, Volume 74 (Number 1). pp. 1789-1801. doi:10.1016/j.jpdc.2013.09.011 ISSN 0743-7315.
Leeke, Matthew, Jhumka, Arshad and Anand, Sarabjot Singh (2013) Towards the design of efficient error detection mechanisms for transient data errors. Computer Journal, Volume 56 (Number 6). pp. 674-692. doi:10.1093/comjnl/bxs049 ISSN 0010-4620.
Franks, Henry P. W., Griffiths, Nathan and Jhumka, Arshad (2012) Manipulating convention emergence using influencer agents. Autonomous Agents and Multi-Agent Systems, Volume 26 (Number 3). pp. 315-353. doi:10.1007/s10458-012-9193-x ISSN 1387-2532.
Jhumka, Arshad, Leeke, Matthew and Shrestha, Sambid (2011) On the use of fake sources for source location privacy : trade-offs between energy and privacy. The Computer Journal, Volume 54 (Number 6). pp. 860-874. doi:10.1093/comjnl/bxr010 ISSN 0010-4620.
Anand, Sarabjot Singh, Jhumka, Arshad and Wade, Kimberley A. (2011) Towards the ordering of events from multiple textual evidence sources. International Journal of Digital Crime and Forensics, Vol.3 (No.2). pp. 16-34. doi:10.4018/jdcf.2011040102 ISSN 1941-6210.
Suri, Neeraj, Jhumka, Arshad, Hiller, Martin, Pataricza, Andras, Islam, Shariful and Sarbu, Constantin (2010) A software integration approach for designing and assessing dependable embedded systems. Journal of Systems and Software, Vol.83 (No.10). pp. 1780-1800. doi:10.1016/j.jss.2010.04.063 ISSN 0164-1212.
Jhumka, Arshad, Freiling, F. C., Fetzer, C. and Suri, N. (2006) An approach to synthesize safe systems. International Journal of Security and Networks, Volume 1 (Number 2). pp. 62-74. ISSN 1747-8405.
Book Item
Arumugam, M., Abujarad, F., Kulkarni, S. S. and Jhumka, Arshad (2009) Stabilizing inference-free slot assignment for wireless mesh networks. In: Misra, Sudip and Misra, Subhas Chandra and Woungang, Isaac, (eds.) Guide to Wireless Mesh Networks. Computer Communications and Networks . London: Springer. ISBN 9781848009080
Jhumka, Arshad and Kulkarni, Sandeep (2007) On the design of mobility-tolerant TDMA-based media access control (MAC) protocol for mobile sensor networks. In: Janowski, T. and Mohanty, H., (eds.) Distributed Computing and Internet Technology : 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20. Proceedings. Lecture Notes in Computer Science, Volume 4882 . Berlin: Springer-Verlag, pp. 42-53. ISBN 9783540771128
Conference Item
Alharthi, Khalid Ayed, Jhumka, Arshad, Di, Sheng, Gui, Lin, Cappello, Franck and McIntosh-Smith, Simon (2023) Time machine : generative real-time model for failure (and lead time) prediction in HPC systems. In: 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network (IEEE IFIP DSN 2023), Porto, Portugal, 27-30 Jun 2023. Published in: Proceedings of the DSN 2023 pp. 508-521. ISBN 9798350347937. doi:10.1109/DSN58367.2023.00054 ISSN 2158-3927.
Alharbi, Jawaher and Jhumka, Arshad (2023) Checkpointing in transiently powered IoT networks. In: The 22nd International Conference on Information Processing in Sensor Networks, San Antonio, TX, USA, 9-12 May 2023. Published in: IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor Networks pp. 316-317. ISBN 9798400701184. doi:10.1145/3583120.3589827
Aldawood, Mansour, Jhumka, Arshad and Fahmy, Suhaib A. (2023) Toward secure VMs allocation : analysis of VMs allocation behaviours in the cloud computing environments. In: International Conference on Cloud Computing and Services Science. CLOSER 2021, Virtual, 28-30 Apr 2021. Published in: Communications in Computer and Information Science, 1607 pp. 25-46. ISBN 9783031216367. doi:10.1007/978-3-031-21637-4_2 ISSN 1865-0929.
Alharbi, Jawaher and Jhumka, Arshad (2023) To checkpoint or not to checkpoint : that is the question. In: International Conference on Embedded Wireless Systems and Networks (EWSN) 2023, Rende, Italy, 25-27 Sept 2023 (In Press)
Alharthi, Khalid, Jhumka, Arshad, Sheng, Di and Cappello, Franck (2022) Clairvoyant : a log-based transformer-decoder for failure prediction in large-scale systems. In: ACM International Conference on Supercomputing, Virtual, 27-30 Jun 2022. Published in: ICS '22: Proceedings of the 36th ACM International Conference on Supercomputing pp. 1-14. ISBN 9781450392815. doi:10.1145/3524059.3532374
Alhajaili, Sara and Jhumka, Arshad (2022) Reliable logging in wireless IoT networks in the presence of Byzantine faults. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20-22 Oct 2021. Published in: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) pp. 17-25. doi:10.1109/TrustCom53373.2021.00021
Chuah, Edward, Suri, Neeraj, Jhumka, Arshad and Alt, Samantha (2022) Challenges in identifying network attacks using Netflow data. In: 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 23-26 Nov 2021. Published in: Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA) pp. 1-10. ISBN 9781665495509. doi:10.1109/NCA53618.2021.9685305 ISSN 2643-7929.
Grosso, Jasmine and Jhumka, Arshad (2022) Fault-tolerant ant colony based-routing in many-to-many IoT sensor networks. In: 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 23-26 Nov 2021. Published in: Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA) pp. 1-10. ISBN 2643-7929. doi:10.1109/NCA53618.2021.9685935 ISSN 9781665495509.
Aldawood, Mansour and Jhumka, Arshad (2021) Secure allocation for graph-based virtual machines in cloud environments. In: 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 13-15 Dec 2021. Published in: Proceedings of the Annual Conference on Privacy, Security and Trust (PST) pp. 1-7. ISBN 9781665401852. doi:10.1109/PST52912.2021.9647766
Alharthi, Khalid, Jhumka, Arshad, Di, Sheng, Cappello, Franck and Chuah, Edward (2021) Sentiment analysis based error detection for large-scale systems. In: 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (DSN'21), Taipei, Taiwan, 21-24 Jun 2021. Published in: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ISBN 9781665411943. doi:10.1109/DSN48987.2021.00037 ISSN 1530-0889.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Trust trackers for computation offloading in edge-based IoT networks. In: INFOCOM, Virtual, 10-13 May 2021. Published in: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications doi:10.1109/INFOCOM42981.2021.9488844 ISSN 0743-166X.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. In: Symposium on Applied Computing, Virtual conference, Republic of Korea, 22-26 Mar 2021. Published in: SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing pp. 184-193. ISBN 9781450381048. doi:10.1145/3412841.3441898
Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Evans, R. Todd and Suri, Neeraj (2021) Failure diagnosis for cluster systems using partial correlations. In: 2021 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, 30 Sept - 03 Oct 2021. Published in: Proceedings of the 2021 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA/BDCloud/SocialCom/SustainCom) pp. 1091-1101. ISBN 9781665435741. doi:10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00151
Aldawood, Mansour, Jhumka, Arshad and Fahmy, Suhaib A. (2021) Sit here : placing virtual machines securely in cloud environments. In: 11th International Conference on Cloud Computing and Services Science, Virtual conference, 28-30 Apr 2021. Published in: Proceedings of the 11th International Conference on Cloud Computing and Services Science pp. 248-259. ISBN 9789897585104. doi:10.5220/0010459202480259 ISSN 2184-5042.
Grosso, Jasmine, Jhumka, Arshad and Bradbury, Matthew S. (2019) Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. In: European Dependable Computing Conference, Naples, Italy, 17-20 Sep 2019. Published in: 2019 15th European Dependable Computing Conference (EDCC) ISBN 9781728139296. doi:10.1109/EDCC.2019.00030
Flores Armas, Denys and Jhumka, Arshad (2019) Hybrid logical clocks for database forensics : filling the gap between chain of custody and database auditing. In: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , Rotorua, New Zealand, 5-8 Aug 2019. Published in: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) ISBN 9781728127774. doi:10.1109/TrustCom/BigDataSE.2019.00038
Bradbury, Matthew S., Jhumka, Arshad and Maple, Carsten (2019) The impact of decreasing transmit power levels on FlockLab to achieve a sparse network. In: 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, Montreal, Canada, 15 Apr 2019. Published in: CPS-IoTBench '19 : Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things pp. 7-12. ISBN 9781450366939. doi:10.1145/3312480.3313171
Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Damoulas, Theodoros, Gurumdimma, Nentawe, Sawley, Marie-Christine, Barth, William L., Minyard, Tommy and Browne, James C. (2018) Enabling dependability-driven resource use and message log-analysis for cluster system diagnosis. In: 24th IEEE International Conference on High Performance Computing, Data, and Analytics, Jaipur, India, 18-21 Dec 2017. Published in: 2017 IEEE 24th International Conference on High Performance Computing (HiPC) ISBN 9781538622940. doi:10.1109/HiPC.2017.00044
Bradbury, Matthew S. and Jhumka, Arshad (2017) Understanding source location privacy protocols in sensor networks via perturbation of Time Series. In: IEEE International Conference on Computer Communications, Atlanta, GA, USA, 01-05 May 2017. Published in: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017 pp. 1-9. ISBN 9781509053377. doi:10.1109/INFOCOM.2017.8057122 ISSN 0743-166X.
Flores Armas, Denys and Jhumka, Arshad (2017) Implementing chain of custody requirements in database audit records for forensic purposes. In: The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australia, 1-4 Aug 2017. Published in: Trustcom/BigDataSE/ICESS, 2017 IEEE ISBN 9781509049066. ISSN 2324-9013.
Bradbury, Matthew S. and Jhumka, Arshad (2017) A near-optimal source location privacy scheme for wireless sensor networks. In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), Sydney, Australia, 1-4 Aug 2017. Published in: IEEE CPS Proceedings ISBN 9781509049066. ISSN 2324-9013.
Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Damoulas, Theodoros, Gurumdimma, Nentawe, Sawley, Marie-Christine, Barth, William L., Minyard, Tommy and Browne, James C. (2017) Case study of error recovery and error propagation on ranger. In: 24th IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC 2017), Jaipur, India, 18-21 Dec 2017 (Unpublished)
Kirton, Jack, Bradbury, Matthew S. and Jhumka, Arshad (2017) Source location privacy-aware data aggregation scheduling for wireless sensor networks. In: 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), Atlanta, GA, 5–8 Jun 2017. Published in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) doi:10.1109/ICDCS.2017.171 ISSN 1063-6927.
Jhumka, Arshad and Bradbury, Matthew S. (2017) Deconstructing source location privacy-aware routing protocols. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 431-436. ISBN 9781450344869.
Gu, Chen, Bradbury, Matthew S. and Jhumka, Arshad (2017) Phantom walkabouts in wireless sensor networks. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 609-616. ISBN 9781450344869.
Chuah, Edward, Jhumka, Arshad, Browne, James C., Gurumdimma, Nentawe, Narasimhamurthy, Sai and Barth, Bill (2017) Using message logs and resource use data for cluster failure diagnosis. In: 23rd annual IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC 2016), Hyderabad, India, 19-22 Dec 2016 ISBN 9781509054114.
Flores Armas, Denys, Qazi, Farrukh and Jhumka, Arshad (2016) Bring your own disclosure : analysing BYOD threats to corporate information. In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 Aug 2016. Published in: 2016 IEEE Trustcom/BigDataSE/I​SPA pp. 1008-1015. ISBN 9781509032051. doi:10.1109/TrustCom.2016.0169 ISSN 2324-9013.
Gurumdimma, Nentawe, Jhumka, Arshad, Liakata, Maria, Chuah, Edward and Browne, James (2015) Towards increasing the error handling time window in large-scale distributed systems using console and resource usage logs. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20-22 Aug 2015, 3 pp. 61-68. doi:10.1109/Trustcom.2015.613
Bradbury, Matthew S., Leeke, Matthew and Jhumka, Arshad (2015) A dynamic fake source algorithm for source location privacy in wireless sensor networks. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 20-22 Aug 2015. Published in: 2015 IEEE Trustcom/BigDataSE/ISPA, 1 pp. 531-538. doi:10.1109/Trustcom.2015.416
Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2015) Assessing the performance of phantom routing on source location privacy in wireless sensor networks. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 Nov 2015. Published in: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) pp. 99-108. ISBN 9781467393751. doi:10.1109/PRDC.2015.9
Gurumdimma, Nentawe, Jhumka, Arshad, Liakata, Maria, Chuah, Edward and Browne, James (2015) Towards detecting patterns in failure logs of large-scale distributed systems. In: 2015 IEEE International Parallel and Distributed Processing Symposium Workshop (IPDPSW), Hyderabad, 25-29 May 2015 pp. 1052-1061. doi:10.1109/IPDPSW.2015.109
Thomason, Alasdair, Leeke, Matthew, Bradbury, Matthew S. and Jhumka, Arshad (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13), Melbourne, Australia, 16-18 July 2013. Published in: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013) pp. 667-674. doi:10.1109/TrustCom.2013.81
Chuah, Edward, Jhumka, Arshad, Narasimhamurthy, Sai, Hammond, J., Browne, James C. and Barth, Bill (2013) Linking resource usage anomalies with system failures from cluster log data. In: 2013 IEEE 32nd International Symposium onReliable Distributed Systems (SRDS),, Braga, 30 Sep - 3 Oct 2013. Published in: Proceedings of the IEEE Symposium on Reliable Distributed Systems pp. 111-120. doi:10.1109/SRDS.2013.20
Saginbekov, Sain and Jhumka, Arshad (2012) Fast and efficient information dissemination in event-based wireless sensor networks. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, England, 25-27 Jun 2012 pp. 1555-1561. ISBN 9781467321723. doi:10.1109/TrustCom.2012.159
Franks, H., Griffiths, Nathan and Jhumka, Arshad (2012) Robust reputation in decentralised markets. In: 1st ACM Workshop on Incentives and Trust in E-Commerce (WIT-EC 2012), Valencia, Spain, 4-6 Jun 2012. Published in: Proceedings of the First Workshop on Incentives and Trust in E-Commerce (WIT-EC'12), in associateion with the 13th ACM Conference on Electronic Commerce (EC'12). doi:10.1111/coin.12036
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2012) Towards understanding source location privacy in wireless sensor networks through fake sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12), Liverpool, UK, 25-27 Jun 2012 pp. 760-768. ISBN 9781467321723. doi:10.1109/TrustCom.2012.281
Jhumka, Arshad and Leeke, Matthew (2011) The early identification of detector locations in dependable software. In: 22nd IEEE International Symposium on Software Reliability Engineering, Hiroshima, Japan, 29 Nov - 2 Dec 2011. Published in: Proceedings of 22nd IEEE International Symposium on Software Reliability Engineering pp. 40-49. doi:10.1109/ISSRE.2011.34 ISSN 9780769545684.
Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jhumka, Arshad and Jarvis, Stephen A. (2011) A framework for data center scale dynamic resource allocation algorithms. In: 11th IEEE International Conference on Computer and Information Technology (CIT), Pafos, Cyprus, 31st August - 2nd September 2011. Published in: Proceedings of the 11th IEEE International Conference on Scalable Computing and Communications (SCALCOM'11) pp. 67-74. ISBN 9781457703836 . doi:10.1109/CIT.2011.72
Leeke, Matthew and Jhumka, Arshad (2011) An automated wrapper-based approach to the design of dependable software. In: 4th International Conference on Dependability (DEPEND'11), Nice, France, 21-27 August 2011
Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jarvis, Stephen A. and Jhumka, Arshad (2011) A modular failure-aware resource allocation architecture for cloud computing. In: UK Performance Engineering Workshop (UKPEW'11), Bradford, United Kingdom, 7-8 July 2011
Leeke, Matthew, Arif, Saima, Jhumka, Arshad and Anand, Sarabjot Singh (2011) A methodology for the generation of efficient error detection mechanisms. In: IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), Hong Kong, 27-30 June 2011 . Published in: Proceedings of the 41st International Conference on Dependable Systems and Networks pp. 25-36. ISBN 9781424492329. doi:10.1109/DSN.2011.5958204 ISSN 1530-0889.
Franks, Henry P. W., Griffiths, Nathan and Jhumka, Arshad (2010) Image scoring in ad-hoc networks : an investigation on realistic settings. In: 8th European Workshop on Multi-Agent Systems, Paris, France, 16-17 Dec 2010 (Unpublished)
Shrestha, Sambid, Leeke, Matthew and Jhumka, Arshad (2010) On the tradeoff between privacy and energy in wireless sensor networks. In: UK Performance Engineering Workshop (UKPEW'10), Coventry, UK, 9-10 July 2010. Published in: Proceedings of the 26th UK Performance Engineering Workshop (UKPEW 2010) pp. 103-110.
Leeke, Matthew and Jhumka, Arshad (2010) Towards understanding the importance of variables in dependable software. In: 8th European Dependable Computing Conference (EDCC'10), Valencia, Spain, 28-30 April 2010. Published in: 2010 European Dependable Computing Conference (EDCC) pp. 85-94. ISBN 9780769540078. doi:10.1109/EDCC.2010.20
Jhumka, Arshad (2010) Crash-tolerant collision-free data aggregation scheduling for wireless sensor networks. In: 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India, 31 Oct - 03 Nov 2010 . Published in: Symposium on Reliable Distributed Systems. Proceedings pp. 44-53. doi:10.1109/SRDS.2010.14 ISSN 1060-9857.
Levett, C., Jhumka, Arshad and Anand, Sarabjot Singh (2010) Towards event ordering in digital forensics. In: 12th ACM Multimedia Security Workshop, Univ Studi Roma TRE, Roma, Italy, 09-10 Sep 2010 . Published in: MM&Sec '10 : proceedings of the 2010 ACM SIGMM Multimedia and Security Workshop ; September 9-10, 2010, Roma, Italy / sponsored by ACM SIGMM pp. 35-42. doi:10.1145/1854229.1854238 ISSN 9781450302869.
Leeke, Matthew and Jhumka, Arshad (2009) Beyond the golden run : evaluating the use of reference run models in fault injection analysis. In: UK Performance Engineering Workshop (UKPEW 2009), Leeds, UK, 6-7 July 2009. Published in: Proceedings of the 25th UK Performance Engineering Workshop pp. 61-74. ISBN 9780955970313.
Leeke, Matthew and Jhumka, Arshad (2009) Evaluating the use of reference run models in fault injection analysis. In: 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, People's Republic of China, November 16-18, 2009. Published in: IEEE 15th Pacific Rim International Symposium on Dependable Computing, Proceedings pp. 121-124. ISBN 978-0-7695-3849-5. doi:10.1109/PRDC.2009.28
Jhumka, Arshad and Leeke, Matthew (2009) Issues on the design of efficient fail-safe fault tolerance. In: 20th International Symposium on Software Reliability Engineering, 2009. ISSRE '09, Mysuru, Karnataka, 16-19 Nov 2009 . Published in: International Symposium on Software Reliability Engineering. Proceedings pp. 155-164. doi:10.1109/ISSRE.2009.31 ISSN 1071-9458.
Jhumka, Arshad and Mottola, Luca (2009) On consistent neighborhood views in wireless sensor networks. In: 28th IEEE International Symposium on Reliable Distributed Systems, Niagara Falls, NY, September 27-30, 2009. Published in: 2009 28th IEEE International Symposium on Reliable Distributed Systems, Proceedings pp. 199-208. ISBN 978-0-7695-3826-6. doi:10.1109/SRDS.2009.19 ISSN 1060-9857.
Jhumka, Arshad, Griffiths, Nathan, Dawson, A. (Anthony) and Myers, Richard (2008) An outlook on the impact of trust models on routing in mobile ad hoc networks (MANETs). In: Networking and Electronic Commerce Research Conference (NAEC 2008), Lake Garda, Italy, 25-28 Sep 2008 (Unpublished)
Griffiths, Nathan, Jhumka, Arshad, Dawson, A. (Anthony) and Myers, Richard (2008) A simple trust model for on-demand routing in mobile ad-hoc networks. In: 2nd International Symposium on Intelligent and Distributed Computing (IDC 2008), Univ Catania, Catania, Italy, Sep 18-19 2008. Published in: Studies in Computational Intelligence, Volume 162 pp. 105-114. ISBN 9783540852568. doi:10.1007/978-3-540-85257-5_11 ISSN 1860-949X.
Freiling, F. C. and Jhumka, Arshad (2007) Global predicate detection in distributed systems with small faults. In: 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems, Paris, France, 14-16 Nov 2007 . Published in: Proceedings of the 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems pp. 296-310. doi:10.1007/978-3-540-76627-8_23
Dataset
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Buffer management for trust computation in resource-constrained IoT networks. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Trust trackers for computation offloading in edge-based IoT networks. [Dataset]
Grosso, Jasmine, Jhumka, Arshad and Bradbury, Matthew S. (2019) Data for Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. [Dataset]
Bradbury, Matthew S. (2018) Data for Near optimal routing protocols for source location privacy in wireless sensor networks : modelling, design and evaluation. [Dataset]
Gu, Chen, Bradbury, Matthew S., Kirton, Jack and Jhumka, Arshad (2017) Data for Source location privacy aware routing protocols selection results. [Dataset]
Bradbury, Matthew S. and Jhumka, Arshad (2017) Data for A near-optimal source location privacy scheme for wireless sensor networks. [Dataset]
This list was generated on Thu Mar 28 16:15:49 2024 GMT.