The Library
Browse by Warwick Author
Up a level |
Number of items: 87.
2023
Alharthi, Khalid Ayed, Jhumka, Arshad, Di, Sheng, Gui, Lin, Cappello, Franck and McIntosh-Smith, Simon (2023) Time machine : generative real-time model for failure (and lead time) prediction in HPC systems. In: 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network (IEEE IFIP DSN 2023), Porto, Portugal, 27-30 Jun 2023. Published in: Proceedings of the DSN 2023 pp. 508-521. ISBN 9798350347937. doi:10.1109/DSN58367.2023.00054 ISSN 2158-3927.
Alharbi, Jawaher and Jhumka, Arshad (2023) Checkpointing in transiently powered IoT networks. In: The 22nd International Conference on Information Processing in Sensor Networks, San Antonio, TX, USA, 9-12 May 2023. Published in: IPSN '23: Proceedings of the 22nd International Conference on Information Processing in Sensor Networks pp. 316-317. ISBN 9798400701184. doi:10.1145/3583120.3589827
Aldawood, Mansour, Jhumka, Arshad and Fahmy, Suhaib A. (2023) Toward secure VMs allocation : analysis of VMs allocation behaviours in the cloud computing environments. In: International Conference on Cloud Computing and Services Science. CLOSER 2021, Virtual, 28-30 Apr 2021. Published in: Communications in Computer and Information Science, 1607 pp. 25-46. ISBN 9783031216367. doi:10.1007/978-3-031-21637-4_2 ISSN 1865-0929.
Alharbi, Jawaher and Jhumka, Arshad (2023) To checkpoint or not to checkpoint : that is the question. In: International Conference on Embedded Wireless Systems and Networks (EWSN) 2023, Rende, Italy, 25-27 Sept 2023 (In Press)
2022
Chuah, Edward, Jhumka, Arshad, Malek, Miroslaw and Suri, Neeraj (2022) A survey of log-correlation tools for failure diagnosis and prediction in cluster systems. IEEE Access, 10 . pp. 133487-133503. doi:10.1109/access.2022.3231454 ISSN 2169-3536.
Gu, Chen, Jhumka, Arshad and Maple, Carsten (2022) Silence is golden : a source location privacy scheme for wireless sensor networks based on silent nodes. Security and Communication Networks, 2022 . 5026549. doi:10.1155/2022/5026549 ISSN 1939-0122.
Bradbury, Matthew S. and Jhumka, Arshad (2022) Quantifying source location privacy routing performance via divergence and information loss. IEEE Transactions on Information Forensics and Security, 17 . pp. 3890-3905. doi:10.1109/TIFS.2022.3217385 ISSN 1556-6013.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2022) Information management for trust computation on resource-constrained IoT devices. Future Generation Computer Systems, 135 . pp. 348-363. doi:10.1016/j.future.2022.05.004 ISSN 0167-739X.
Alharthi, Khalid, Jhumka, Arshad, Sheng, Di and Cappello, Franck (2022) Clairvoyant : a log-based transformer-decoder for failure prediction in large-scale systems. In: ACM International Conference on Supercomputing, Virtual, 27-30 Jun 2022. Published in: ICS '22: Proceedings of the 36th ACM International Conference on Supercomputing pp. 1-14. ISBN 9781450392815. doi:10.1145/3524059.3532374
Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, Flores, Denys, Burton, Jonathan and Butler, Matthew (2022) Threat modelling guided trust-based task offloading for resource-constrained Internet of Things. Transactions on Sensor Networks, 18 (2). 29. doi:10.1145/3510424 ISSN 1550-4859.
Bradbury, Matthew S., Jhumka, Arshad, Watson, Tim, Flores, Denys, Burton, Jonathan and Butler, Matthew (2022) Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things. ACM Transactions on Sensor Networks, 18 (2). pp. 1-41. 29. doi:10.1145/3510424 ISSN 1550-4867.
Alhajaili, Sara and Jhumka, Arshad (2022) Reliable logging in wireless IoT networks in the presence of Byzantine faults. In: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, 20-22 Oct 2021. Published in: 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) pp. 17-25. doi:10.1109/TrustCom53373.2021.00021
Chuah, Edward, Suri, Neeraj, Jhumka, Arshad and Alt, Samantha (2022) Challenges in identifying network attacks using Netflow data. In: 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 23-26 Nov 2021. Published in: Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA) pp. 1-10. ISBN 9781665495509. doi:10.1109/NCA53618.2021.9685305 ISSN 2643-7929.
Grosso, Jasmine and Jhumka, Arshad (2022) Fault-tolerant ant colony based-routing in many-to-many IoT sensor networks. In: 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA), Boston, MA, USA, 23-26 Nov 2021. Published in: Proceedings of the 2021 IEEE 20th International Symposium on Network Computing and Applications (NCA) pp. 1-10. ISBN 2643-7929. doi:10.1109/NCA53618.2021.9685935 ISSN 9781665495509.
2021
Aldawood, Mansour and Jhumka, Arshad (2021) Secure allocation for graph-based virtual machines in cloud environments. In: 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand, 13-15 Dec 2021. Published in: Proceedings of the Annual Conference on Privacy, Security and Trust (PST) pp. 1-7. ISBN 9781665401852. doi:10.1109/PST52912.2021.9647766
Alharthi, Khalid, Jhumka, Arshad, Di, Sheng, Cappello, Franck and Chuah, Edward (2021) Sentiment analysis based error detection for large-scale systems. In: 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) (DSN'21), Taipei, Taiwan, 21-24 Jun 2021. Published in: 2021 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) ISBN 9781665411943. doi:10.1109/DSN48987.2021.00037 ISSN 1530-0889.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Trust trackers for computation offloading in edge-based IoT networks. In: INFOCOM, Virtual, 10-13 May 2021. Published in: IEEE INFOCOM 2021 - IEEE Conference on Computer Communications doi:10.1109/INFOCOM42981.2021.9488844 ISSN 0743-166X.
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. In: Symposium on Applied Computing, Virtual conference, Republic of Korea, 22-26 Mar 2021. Published in: SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied Computing pp. 184-193. ISBN 9781450381048. doi:10.1145/3412841.3441898
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Buffer management for trust computation in resource-constrained IoT networks. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Trust assessment in 32 KiB of RAM : multi-application trust-based task offloading for resource-constrained IoT nodes. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Watson, Tim (2021) Data for Trust trackers for computation offloading in edge-based IoT networks. [Dataset]
Bradbury, Matthew S., Jhumka, Arshad and Maple, Carsten (2021) A spatial source location privacy-aware duty cycle for internet of things sensor networks. ACM Transactions on Internet of Things, 2 (1). 4. doi:10.1145/3430379 ISSN 2691-1914.
Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Evans, R. Todd and Suri, Neeraj (2021) Failure diagnosis for cluster systems using partial correlations. In: 2021 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, 30 Sept - 03 Oct 2021. Published in: Proceedings of the 2021 IEEE Intl Conf on Parallel and Distributed Processing with Applications, Big Data and Cloud Computing, Sustainable Computing and Communications, Social Computing and Networking (ISPA/BDCloud/SocialCom/SustainCom) pp. 1091-1101. ISBN 9781665435741. doi:10.1109/ISPA-BDCloud-SocialCom-SustainCom52081.2021.00151
Aldawood, Mansour, Jhumka, Arshad and Fahmy, Suhaib A. (2021) Sit here : placing virtual machines securely in cloud environments. In: 11th International Conference on Cloud Computing and Services Science, Virtual conference, 28-30 Apr 2021. Published in: Proceedings of the 11th International Conference on Cloud Computing and Services Science pp. 248-259. ISBN 9789897585104. doi:10.5220/0010459202480259 ISSN 2184-5042.
2019
Grosso, Jasmine, Jhumka, Arshad and Bradbury, Matthew S. (2019) Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. In: European Dependable Computing Conference, Naples, Italy, 17-20 Sep 2019. Published in: 2019 15th European Dependable Computing Conference (EDCC) ISBN 9781728139296. doi:10.1109/EDCC.2019.00030
Flores Armas, Denys and Jhumka, Arshad (2019) Hybrid logical clocks for database forensics : filling the gap between chain of custody and database auditing. In: 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications , Rotorua, New Zealand, 5-8 Aug 2019. Published in: 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) ISBN 9781728127774. doi:10.1109/TrustCom/BigDataSE.2019.00038
Gu, Chen, Bradbury, Matthew S. and Jhumka, Arshad (2019) Phantom walkabouts : a customisable source location privacy aware routing protocol for wireless sensor networks. Concurrency and Computation: Practice and Experience, 31 (20). e5304. doi:10.1002/cpe.5304 ISSN 1532-0626.
Bradbury, Matthew S., Jhumka, Arshad and Maple, Carsten (2019) The impact of decreasing transmit power levels on FlockLab to achieve a sparse network. In: 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things, Montreal, Canada, 15 Apr 2019. Published in: CPS-IoTBench '19 : Proceedings of the 2nd Workshop on Benchmarking Cyber-Physical Systems and Internet of Things pp. 7-12. ISBN 9781450366939. doi:10.1145/3312480.3313171
Grosso, Jasmine, Jhumka, Arshad and Bradbury, Matthew S. (2019) Data for Reliable many-to-many routing in wireless sensor networks using ant colony optimisation. [Dataset]
Lin, Yiyan, Kulkarni, Sandeep and Jhumka, Arshad (2019) Automation of fault-tolerant graceful degradation. Distributed Computing, 32 (1). pp. 1-25. doi:10.1007/s00446-017-0319-x ISSN 0178-2770.
2018
Kirton, Jack, Bradbury, Matthew S. and Jhumka, Arshad (2018) Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Computer Networks, 146 . p. 125. doi:10.1016/j.comnet.2018.09.010 ISSN 1389-1286.
Gu, Chen, Bradbury, Matthew S., Kirton, Jack and Jhumka, Arshad (2018) A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Generation Computer Systems, 87 . pp. 514-526. doi:10.1016/j.future.2018.01.046 ISSN 0167-739X.
Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2018) Hybrid online protocols for source location privacy in wireless sensor networks. Journal of Parallel and Distributed Computing, 115 . pp. 67-81. doi:10.1016/j.jpdc.2018.01.006 ISSN 0743-7315.
Bradbury, Matthew S. (2018) Data for Near optimal routing protocols for source location privacy in wireless sensor networks : modelling, design and evaluation. [Dataset]
Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Damoulas, Theodoros, Gurumdimma, Nentawe, Sawley, Marie-Christine, Barth, William L., Minyard, Tommy and Browne, James C. (2018) Enabling dependability-driven resource use and message log-analysis for cluster system diagnosis. In: 24th IEEE International Conference on High Performance Computing, Data, and Analytics, Jaipur, India, 18-21 Dec 2017. Published in: 2017 IEEE 24th International Conference on High Performance Computing (HiPC) ISBN 9781538622940. doi:10.1109/HiPC.2017.00044
2017
Gu, Chen, Bradbury, Matthew S., Kirton, Jack and Jhumka, Arshad (2017) Data for Source location privacy aware routing protocols selection results. [Dataset]
Bradbury, Matthew S. and Jhumka, Arshad (2017) Understanding source location privacy protocols in sensor networks via perturbation of Time Series. In: IEEE International Conference on Computer Communications, Atlanta, GA, USA, 01-05 May 2017. Published in: IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, 2017 pp. 1-9. ISBN 9781509053377. doi:10.1109/INFOCOM.2017.8057122 ISSN 0743-166X.
Flores Armas, Denys and Jhumka, Arshad (2017) Implementing chain of custody requirements in database audit records for forensic purposes. In: The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), Sydney, Australia, 1-4 Aug 2017. Published in: Trustcom/BigDataSE/ICESS, 2017 IEEE ISBN 9781509049066. ISSN 2324-9013.
Bradbury, Matthew S. and Jhumka, Arshad (2017) A near-optimal source location privacy scheme for wireless sensor networks. In: 16th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-17), Sydney, Australia, 1-4 Aug 2017. Published in: IEEE CPS Proceedings ISBN 9781509049066. ISSN 2324-9013.
Chuah, Edward, Jhumka, Arshad, Alt, Samantha, Damoulas, Theodoros, Gurumdimma, Nentawe, Sawley, Marie-Christine, Barth, William L., Minyard, Tommy and Browne, James C. (2017) Case study of error recovery and error propagation on ranger. In: 24th IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC 2017), Jaipur, India, 18-21 Dec 2017 (Unpublished)
Saginbekov, Sain and Jhumka, Arshad (2017) Many-to-many data aggregation scheduling in wireless sensor networks with two sinks. Computer Networks, 123 . pp. 184-199. doi:10.1016/j.comnet.2017.05.022 ISSN 1389-1286.
Kirton, Jack, Bradbury, Matthew S. and Jhumka, Arshad (2017) Source location privacy-aware data aggregation scheduling for wireless sensor networks. In: 37th IEEE International Conference on Distributed Computing Systems (ICDCS 2017), Atlanta, GA, 5–8 Jun 2017. Published in: 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS) doi:10.1109/ICDCS.2017.171 ISSN 1063-6927.
Bradbury, Matthew S. and Jhumka, Arshad (2017) Data for A near-optimal source location privacy scheme for wireless sensor networks. [Dataset]
Jhumka, Arshad and Bradbury, Matthew S. (2017) Deconstructing source location privacy-aware routing protocols. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 431-436. ISBN 9781450344869.
Gu, Chen, Bradbury, Matthew S. and Jhumka, Arshad (2017) Phantom walkabouts in wireless sensor networks. In: 32nd ACM SIGAPP Symposium On Applied Computing, Marrakech, Morocco, 3-7 April 2017. Published in: Proceedings of the Symposium on Applied Computing pp. 609-616. ISBN 9781450344869.
Chuah, Edward, Jhumka, Arshad, Browne, James C., Gurumdimma, Nentawe, Narasimhamurthy, Sai and Barth, Bill (2017) Using message logs and resource use data for cluster failure diagnosis. In: 23rd annual IEEE International Conference on High Performance Computing, Data, and Analytics (HiPC 2016), Hyderabad, India, 19-22 Dec 2016 ISBN 9781509054114.
2016
Alhanahnah, Mohannad J., Jhumka, Arshad and Alouneh, Sahel (2016) A multi-dimension taxonomy of insider threats in cloud computing. The Computer Journal, 59 (11). pp. 1612-1622. doi:10.1093/comjnl/bxw020 ISSN 0010-4620.
Jhumka, Arshad and Mottola, Luca (2016) Neighborhood view consistency in wireless sensor networks. ACM Transactions on Sensor Network , 12 (3). 19. doi:10.1145/2901296 ISSN 1550-4859.
Flores Armas, Denys, Qazi, Farrukh and Jhumka, Arshad (2016) Bring your own disclosure : analysing BYOD threats to corporate information. In: 2016 IEEE Trustcom/BigDataSE/ISPA, Tianjin, China, 23-26 Aug 2016. Published in: 2016 IEEE Trustcom/BigDataSE/I​SPA pp. 1008-1015. ISBN 9781509032051. doi:10.1109/TrustCom.2016.0169 ISSN 2324-9013.
2015
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2015) Fake source-based source location privacy in wireless sensor networks. Concurrency and Computation: Practice and Experience, 27 (12). pp. 2999-3020. doi:10.1002/cpe.3242 ISSN 1532-0626.
Gurumdimma, Nentawe, Jhumka, Arshad, Liakata, Maria, Chuah, Edward and Browne, James (2015) Towards increasing the error handling time window in large-scale distributed systems using console and resource usage logs. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, Finland, 20-22 Aug 2015, 3 pp. 61-68. doi:10.1109/Trustcom.2015.613
Bradbury, Matthew S., Leeke, Matthew and Jhumka, Arshad (2015) A dynamic fake source algorithm for source location privacy in wireless sensor networks. In: 2015 IEEE Trustcom/BigDataSE/ISPA, Helsinki, 20-22 Aug 2015. Published in: 2015 IEEE Trustcom/BigDataSE/ISPA, 1 pp. 531-538. doi:10.1109/Trustcom.2015.416
Gu, Chen, Bradbury, Matthew S., Jhumka, Arshad and Leeke, Matthew (2015) Assessing the performance of phantom routing on source location privacy in wireless sensor networks. In: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC), Zhangjiajie, China, 18-20 Nov 2015. Published in: 2015 IEEE 21st Pacific Rim International Symposium on Dependable Computing (PRDC) pp. 99-108. ISBN 9781467393751. doi:10.1109/PRDC.2015.9
Gurumdimma, Nentawe, Jhumka, Arshad, Liakata, Maria, Chuah, Edward and Browne, James (2015) Towards detecting patterns in failure logs of large-scale distributed systems. In: 2015 IEEE International Parallel and Distributed Processing Symposium Workshop (IPDPSW), Hyderabad, 25-29 May 2015 pp. 1052-1061. doi:10.1109/IPDPSW.2015.109
2014
Saginbekov, Sain and Jhumka, Arshad (2014) Towards efficient stabilizing code dissemination in wireless sensor networks. The Computer Journal, Volume 57 (Number 12). pp. 1790-1816. doi:10.1093/comjnl/bxt110 ISSN 0010-4620.
Saginbekov, Sain and Jhumka, Arshad (2014) Efficient code dissemination in wireless sensor networks. Future Generation Computer Systems, Volume 39 . pp. 111-119. doi:10.1016/j.future.2013.12.008 ISSN 0167-739X.
Jhumka, Arshad, Bradbury, Matthew S. and Saginbekov, Sain (2014) Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. Journal of Parallel and Distributed Computing, Volume 74 (Number 1). pp. 1789-1801. doi:10.1016/j.jpdc.2013.09.011 ISSN 0743-7315.
2013
Thomason, Alasdair, Leeke, Matthew, Bradbury, Matthew S. and Jhumka, Arshad (2013) Evaluating the impact of broadcast rates and collisions on fake source protocols for source location privacy. In: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'13), Melbourne, Australia, 16-18 July 2013. Published in: Proceedings: 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2013) pp. 667-674. doi:10.1109/TrustCom.2013.81
Chuah, Edward, Jhumka, Arshad, Narasimhamurthy, Sai, Hammond, J., Browne, James C. and Barth, Bill (2013) Linking resource usage anomalies with system failures from cluster log data. In: 2013 IEEE 32nd International Symposium onReliable Distributed Systems (SRDS),, Braga, 30 Sep - 3 Oct 2013. Published in: Proceedings of the IEEE Symposium on Reliable Distributed Systems pp. 111-120. doi:10.1109/SRDS.2013.20
Leeke, Matthew, Jhumka, Arshad and Anand, Sarabjot Singh (2013) Towards the design of efficient error detection mechanisms for transient data errors. Computer Journal, Volume 56 (Number 6). pp. 674-692. doi:10.1093/comjnl/bxs049 ISSN 0010-4620.
2012
Saginbekov, Sain and Jhumka, Arshad (2012) Fast and efficient information dissemination in event-based wireless sensor networks. In: IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Liverpool, England, 25-27 Jun 2012 pp. 1555-1561. ISBN 9781467321723. doi:10.1109/TrustCom.2012.159
Franks, Henry P. W., Griffiths, Nathan and Jhumka, Arshad (2012) Manipulating convention emergence using influencer agents. Autonomous Agents and Multi-Agent Systems, Volume 26 (Number 3). pp. 315-353. doi:10.1007/s10458-012-9193-x ISSN 1387-2532.
Franks, H., Griffiths, Nathan and Jhumka, Arshad (2012) Robust reputation in decentralised markets. In: 1st ACM Workshop on Incentives and Trust in E-Commerce (WIT-EC 2012), Valencia, Spain, 4-6 Jun 2012. Published in: Proceedings of the First Workshop on Incentives and Trust in E-Commerce (WIT-EC'12), in associateion with the 13th ACM Conference on Electronic Commerce (EC'12). doi:10.1111/coin.12036
Jhumka, Arshad, Bradbury, Matthew S. and Leeke, Matthew (2012) Towards understanding source location privacy in wireless sensor networks through fake sources. In: 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom'12), Liverpool, UK, 25-27 Jun 2012 pp. 760-768. ISBN 9781467321723. doi:10.1109/TrustCom.2012.281
2011
Jhumka, Arshad and Leeke, Matthew (2011) The early identification of detector locations in dependable software. In: 22nd IEEE International Symposium on Software Reliability Engineering, Hiroshima, Japan, 29 Nov - 2 Dec 2011. Published in: Proceedings of 22nd IEEE International Symposium on Software Reliability Engineering pp. 40-49. doi:10.1109/ISSRE.2011.34 ISSN 9780769545684.
Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jhumka, Arshad and Jarvis, Stephen A. (2011) A framework for data center scale dynamic resource allocation algorithms. In: 11th IEEE International Conference on Computer and Information Technology (CIT), Pafos, Cyprus, 31st August - 2nd September 2011. Published in: Proceedings of the 11th IEEE International Conference on Scalable Computing and Communications (SCALCOM'11) pp. 67-74. ISBN 9781457703836 . doi:10.1109/CIT.2011.72
Leeke, Matthew and Jhumka, Arshad (2011) An automated wrapper-based approach to the design of dependable software. In: 4th International Conference on Dependability (DEPEND'11), Nice, France, 21-27 August 2011
Chester, Adam P., Leeke, Matthew, Al-Ghamdi, M., Jarvis, Stephen A. and Jhumka, Arshad (2011) A modular failure-aware resource allocation architecture for cloud computing. In: UK Performance Engineering Workshop (UKPEW'11), Bradford, United Kingdom, 7-8 July 2011
Leeke, Matthew, Arif, Saima, Jhumka, Arshad and Anand, Sarabjot Singh (2011) A methodology for the generation of efficient error detection mechanisms. In: IEEE/IFIP 41st International Conference on Dependable Systems & Networks (DSN), Hong Kong, 27-30 June 2011 . Published in: Proceedings of the 41st International Conference on Dependable Systems and Networks pp. 25-36. ISBN 9781424492329. doi:10.1109/DSN.2011.5958204 ISSN 1530-0889.
Jhumka, Arshad, Leeke, Matthew and Shrestha, Sambid (2011) On the use of fake sources for source location privacy : trade-offs between energy and privacy. The Computer Journal, Volume 54 (Number 6). pp. 860-874. doi:10.1093/comjnl/bxr010 ISSN 0010-4620.
Anand, Sarabjot Singh, Jhumka, Arshad and Wade, Kimberley A. (2011) Towards the ordering of events from multiple textual evidence sources. International Journal of Digital Crime and Forensics, Vol.3 (No.2). pp. 16-34. doi:10.4018/jdcf.2011040102 ISSN 1941-6210.
2010
Franks, Henry P. W., Griffiths, Nathan and Jhumka, Arshad (2010) Image scoring in ad-hoc networks : an investigation on realistic settings. In: 8th European Workshop on Multi-Agent Systems, Paris, France, 16-17 Dec 2010 (Unpublished)
Suri, Neeraj, Jhumka, Arshad, Hiller, Martin, Pataricza, Andras, Islam, Shariful and Sarbu, Constantin (2010) A software integration approach for designing and assessing dependable embedded systems. Journal of Systems and Software, Vol.83 (No.10). pp. 1780-1800. doi:10.1016/j.jss.2010.04.063 ISSN 0164-1212.
Shrestha, Sambid, Leeke, Matthew and Jhumka, Arshad (2010) On the tradeoff between privacy and energy in wireless sensor networks. In: UK Performance Engineering Workshop (UKPEW'10), Coventry, UK, 9-10 July 2010. Published in: Proceedings of the 26th UK Performance Engineering Workshop (UKPEW 2010) pp. 103-110.
Leeke, Matthew and Jhumka, Arshad (2010) Towards understanding the importance of variables in dependable software. In: 8th European Dependable Computing Conference (EDCC'10), Valencia, Spain, 28-30 April 2010. Published in: 2010 European Dependable Computing Conference (EDCC) pp. 85-94. ISBN 9780769540078. doi:10.1109/EDCC.2010.20
Jhumka, Arshad (2010) Crash-tolerant collision-free data aggregation scheduling for wireless sensor networks. In: 29th IEEE International Symposium on Reliable Distributed Systems, New Delhi, India, 31 Oct - 03 Nov 2010 . Published in: Symposium on Reliable Distributed Systems. Proceedings pp. 44-53. doi:10.1109/SRDS.2010.14 ISSN 1060-9857.
Levett, C., Jhumka, Arshad and Anand, Sarabjot Singh (2010) Towards event ordering in digital forensics. In: 12th ACM Multimedia Security Workshop, Univ Studi Roma TRE, Roma, Italy, 09-10 Sep 2010 . Published in: MM&Sec '10 : proceedings of the 2010 ACM SIGMM Multimedia and Security Workshop ; September 9-10, 2010, Roma, Italy / sponsored by ACM SIGMM pp. 35-42. doi:10.1145/1854229.1854238 ISSN 9781450302869.
2009
Leeke, Matthew and Jhumka, Arshad (2009) Beyond the golden run : evaluating the use of reference run models in fault injection analysis. In: UK Performance Engineering Workshop (UKPEW 2009), Leeds, UK, 6-7 July 2009. Published in: Proceedings of the 25th UK Performance Engineering Workshop pp. 61-74. ISBN 9780955970313.
Leeke, Matthew and Jhumka, Arshad (2009) Evaluating the use of reference run models in fault injection analysis. In: 15th Pacific Rim International Symposium on Dependable Computing, Shanghai, People's Republic of China, November 16-18, 2009. Published in: IEEE 15th Pacific Rim International Symposium on Dependable Computing, Proceedings pp. 121-124. ISBN 978-0-7695-3849-5. doi:10.1109/PRDC.2009.28
Jhumka, Arshad and Leeke, Matthew (2009) Issues on the design of efficient fail-safe fault tolerance. In: 20th International Symposium on Software Reliability Engineering, 2009. ISSRE '09, Mysuru, Karnataka, 16-19 Nov 2009 . Published in: International Symposium on Software Reliability Engineering. Proceedings pp. 155-164. doi:10.1109/ISSRE.2009.31 ISSN 1071-9458.
Jhumka, Arshad and Mottola, Luca (2009) On consistent neighborhood views in wireless sensor networks. In: 28th IEEE International Symposium on Reliable Distributed Systems, Niagara Falls, NY, September 27-30, 2009. Published in: 2009 28th IEEE International Symposium on Reliable Distributed Systems, Proceedings pp. 199-208. ISBN 978-0-7695-3826-6. doi:10.1109/SRDS.2009.19 ISSN 1060-9857.
Arumugam, M., Abujarad, F., Kulkarni, S. S. and Jhumka, Arshad (2009) Stabilizing inference-free slot assignment for wireless mesh networks. In: Misra, Sudip and Misra, Subhas Chandra and Woungang, Isaac, (eds.) Guide to Wireless Mesh Networks. Computer Communications and Networks . London: Springer. ISBN 9781848009080
2008
Jhumka, Arshad, Griffiths, Nathan, Dawson, A. (Anthony) and Myers, Richard (2008) An outlook on the impact of trust models on routing in mobile ad hoc networks (MANETs). In: Networking and Electronic Commerce Research Conference (NAEC 2008), Lake Garda, Italy, 25-28 Sep 2008 (Unpublished)
Griffiths, Nathan, Jhumka, Arshad, Dawson, A. (Anthony) and Myers, Richard (2008) A simple trust model for on-demand routing in mobile ad-hoc networks. In: 2nd International Symposium on Intelligent and Distributed Computing (IDC 2008), Univ Catania, Catania, Italy, Sep 18-19 2008. Published in: Studies in Computational Intelligence, Volume 162 pp. 105-114. ISBN 9783540852568. doi:10.1007/978-3-540-85257-5_11 ISSN 1860-949X.
2007
Freiling, F. C. and Jhumka, Arshad (2007) Global predicate detection in distributed systems with small faults. In: 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems, Paris, France, 14-16 Nov 2007 . Published in: Proceedings of the 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems pp. 296-310. doi:10.1007/978-3-540-76627-8_23
Jhumka, Arshad and Kulkarni, Sandeep (2007) On the design of mobility-tolerant TDMA-based media access control (MAC) protocol for mobile sensor networks. In: Janowski, T. and Mohanty, H., (eds.) Distributed Computing and Internet Technology : 4th International Conference, ICDCIT 2007, Bangalore, India, December 17-20. Proceedings. Lecture Notes in Computer Science, Volume 4882 . Berlin: Springer-Verlag, pp. 42-53. ISBN 9783540771128
2006
Jhumka, Arshad, Freiling, F. C., Fetzer, C. and Suri, N. (2006) An approach to synthesize safe systems. International Journal of Security and Networks, Volume 1 (Number 2). pp. 62-74. ISSN 1747-8405.
This list was generated on Wed Apr 17 17:29:21 2024 BST.