Bharat Kumar. Bhargava
#131,997
Most Influential Person Now
Bharat Kumar. Bhargava's AcademicInfluence.com Rankings
Bharat Kumar. Bhargavacomputer-science Degrees
Computer Science
#5852
World Rank
#6175
Historical Rank
Cloud Computing
#22
World Rank
#22
Historical Rank
Database
#2973
World Rank
#3100
Historical Rank

Download Badge
Computer Science
Why Is Bharat Kumar. Bhargava Influential?
(Suggest an Edit or Addition)Bharat Kumar. Bhargava's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- A Survey of Computation Offloading for Mobile Systems (2013) (859)
- PROMISE: peer-to-peer media streaming using CollectCast (2003) (479)
- Visualization of wormholes in sensor networks (2004) (335)
- Secure and efficient access to outsourced data (2009) (327)
- A fast MPEG video encryption algorithm (1998) (303)
- On peer-to-peer media streaming (2002) (295)
- Peer-to-peer file-sharing over mobile ad hoc networks (2004) (220)
- Independent checkpointing and concurrent rollback for recovery in distributed systems-an optimistic approach (1988) (218)
- Maintaining consistency of data in mobile distributed environments (1995) (197)
- On the Design of Perceptual MPEG-Video Encryption Algorithms (2005) (186)
- Secure Data Storage and Searching for Industrial IoT by Integrating Fog Computing and Cloud Computing (2018) (186)
- Ensuring relaxed atomicity for flexible transactions in multidatabase systems (1994) (181)
- Advanced Database Systems (1993) (179)
- AO2P: ad hoc on-demand position-based private routing protocol (2005) (175)
- GnuStream: a P2P media streaming system prototype (2003) (165)
- Defending against wormhole attacks in mobile ad hoc networks (2006) (156)
- MPEG Video Encryption in Real-time Using Secret Key Cryptography (1999) (154)
- An efficient MPEG video encryption algorithm (1998) (151)
- Extending Attack Graph-Based Security Metrics and Aggregating Their Application (2012) (139)
- Data Consistency in Intermittently Connected Distributed Systems (1999) (134)
- Study of distance vector routing protocols for mobile ad hoc networks (2003) (134)
- Tree Systems for Syntactic Pattern Recognition (1973) (131)
- MPEG Video Encryption Algorithms (2004) (129)
- An Entity-Centric Approach for Privacy and Identity Management in Cloud Computing (2010) (128)
- Tree-Based Data Broadcast in IEEE 802.15.4 and ZigBee Networks (2006) (123)
- The Pudding of Trust (2004) (122)
- Replication Techniques in Distributed Systems (1996) (121)
- Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA) (2004) (120)
- Protection of Identity Information in Cloud Computing without Trusted Third Party (2010) (118)
- SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems (2013) (111)
- A hybrid architecture for cost-effective on-demand media streaming (2004) (100)
- Building information systems for mobile environments (1994) (100)
- Concurrency Control in Database Systems (1999) (85)
- Concurrent robust checkpointing and recovery in distributed systems (1988) (83)
- Detecting Service Violations and DoS Attacks (2003) (82)
- A Blockchain-Enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing (2019) (79)
- Visualisation of wormholes in underwater sensor networks: a distributed approach (2008) (77)
- Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks (2008) (75)
- On vulnerability and protection of ad hoc on-demand distance vector protocol (2003) (74)
- CollectCast: A peer-to-peer service for media streaming (2005) (73)
- Revising transaction concepts for mobile computing (1994) (73)
- Defending against Collaborative Packet Drop Attacks on MANETs (2009) (72)
- Mobile data and transaction management (2002) (71)
- International journal of security and its applications (2013) (70)
- A Mobile-Cloud Collaborative Traffic Lights Detector for Blind Navigation (2010) (69)
- Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks (2005) (67)
- Extending the Agile Development Process to Develop Acceptably Secure Software (2014) (64)
- A scheme for privacy-preserving data dissemination (2006) (64)
- An Agent-based Optimization Framework for Mobile-Cloud Computing (2013) (64)
- A Transaction Model to Improve Data Availability in Mobile Computing (2001) (63)
- Dealing with Mobility: Issues and Research Challenges (1993) (63)
- Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's (2020) (61)
- The Raid Distributed Database System (1989) (57)
- Concurrency control and reliability in distributed systems (1986) (52)
- Trust-based privacy preservation for peer-to-peer data sharing (2006) (52)
- On-demand media streaming over the Internet (2003) (49)
- Reliable broadcast in ZigBee networks (2005) (49)
- Authorization Based on Evidence and Trust (2002) (44)
- Information system architecture for heterarchial control of large FMSs (1993) (44)
- A Novel Low-Rate Denial of Service Attack Detection Approach in ZigBee Wireless Sensor Network by Combining Hilbert-Huang Transformation and Trust Evaluation (2019) (42)
- A framework for providing consistent and recoverable agent-based access to heterogeneous mobile databases (1995) (42)
- Identifying important characteristics in the KDD99 intrusion detection dataset by feature selection using a hybrid approach (2010) (41)
- On detecting service violations and bandwidth theft in QoS network domains (2003) (39)
- Efficient Retrieval Over Documents Encrypted by Attributes in Cloud Computing (2018) (38)
- A round trip time and time-out aware traffic conditioner for differentiated services networks (2002) (37)
- Secure information sharing in digital supply chains (2013) (37)
- A simulation study of ad hoc networking of UAVs with opportunistic resource utilization networks (2014) (37)
- A model for adaptable systems for transaction processing (1988) (36)
- On the Security of Data Access Control for Multiauthority Cloud Storage Systems (2017) (35)
- On security study of two distance vector routing protocols for mobile ad hoc networks (2003) (35)
- MADF: Mobile-assisted data forwarding for wireless data networks (2004) (35)
- E-notebook Middleware for Accountability and Reputation Based Trust in Distributed Data Sharing Communities (2004) (34)
- Futuristic Trends in Network and Communication Technologies (2018) (34)
- Packet Loss in Mobile Ada Hoc Networks (2003) (34)
- A role-based access in a hierarchical sensor network architecture to provide multilevel security (2008) (32)
- Global Scheduling for Flexible Transactions in Heterogeneous Distributed Database Systems (2001) (31)
- Edge-to-edge measurement-based distributed network monitoring (2004) (31)
- Cheating in online auction - Towards explaining the popularity of English auction (2007) (31)
- Experimental evaluation of concurrent checkpointing and rollback-recovery algorithms (1990) (30)
- Performance Evaluation of the Optimistic Approach to Distributed Database Systems and Its Comparison to Locking (1982) (29)
- Incorporating attacker capabilities in risk estimation and mitigation (2015) (29)
- E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks (2012) (29)
- WANCE: A wide area network communication emulation system (1993) (27)
- Site Recovery in Replicated Distributed Database Systems (1987) (27)
- Source-location privacy full protection in wireless sensor networks (2018) (27)
- SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems (2016) (26)
- Self-Learning Disk Scheduling (2009) (26)
- A Computational Dynamic Trust Model for User Authorization (2015) (26)
- Local geometric algorithm for hole boundary detection in sensor networks (2011) (25)
- ConFoc: Content-Focus Protection Against Trojan Attacks on Neural Networks (2020) (25)
- Adaptability experiments in the RAID distributed database system (1990) (24)
- Source-Location Privacy Protection Based on Anonymity Cloud in Wireless Sensor Networks (2020) (24)
- A Mobile-Cloud Pedestrian Crossing Guide for the Blind (2011) (24)
- A tree-based forward digest protocol to verify data integrity in distributed media streaming (2005) (24)
- Multiple-Query Optimization at Algorithm-Level (1994) (23)
- Characterizing and aggregating attack graph-based security metric (2010) (23)
- Energy-Efficient Routing Schemes for Wireless Sensor Networks (2003) (23)
- Counteracting shill bidding in online english auction (2005) (23)
- Experimental analysis of layered Ethernet software (1987) (23)
- Key distribution and update for secure inter-group multicast communication (2005) (23)
- Defending against wormhole attacks in mobile ad hoc networks: Research Articles (2006) (22)
- Fraud Formalization and Detection (2003) (22)
- A Self-Cloning Agents Based Model for High-Performance Mobile-Cloud Computing (2015) (22)
- Multidimensional Timestamp Protocols for Concurrency Control (1986) (22)
- Vulnerabilities and Threats in Distributed Systems (2004) (21)
- Multi-hop Cross-Layer Design in Wireless Sensor Networks: A Case Study (2008) (21)
- Experiences with Super, a Database Visual Environment (1991) (20)
- Error resilient video transmission over wireless networks (2003) (20)
- (WIP) Blockhub: Blockchain-Based Software Development System for Untrusted Environments (2018) (20)
- Security in Data Warehousing (2000) (20)
- Performance evaluation of the quorum consensus replication method (1995) (20)
- Communication facilities for distributed transaction-processing systems (1991) (20)
- Digital library services in mobile computing (1995) (19)
- Software reliability in real-time systems (1981) (19)
- Transaction Processing and Consistency Control of Replicated Copies during Failures in Distributed Databases (1987) (19)
- Monitoring and controlling QoS network domains (2005) (19)
- Multilabels-Based Scalable Access Control for Big Data Applications (2014) (19)
- A crossing-tier location update/paging scheme in hierarchical cellular networks (2006) (19)
- Addressing Collaborative Attacks and Defense in Ad Hoc Wireless Networks (2009) (18)
- Formalization of dynamic trust and uncertain evidence for user authorization (2005) (18)
- An End-to-End Security Auditing Approach for Service Oriented Architectures (2012) (18)
- Adaptive Security for Intelligent Transport System Applications (2018) (18)
- EPICS: A Framework for Enforcing Security Policies in Composite Web Services (2019) (18)
- Communication Costs in Digital Library Databases (1995) (18)
- Data Organization Issues for Location-Dependent Queries in Mobile Computing (2000) (18)
- Adaptable Safety and Security in V2X Systems (2017) (18)
- Verifying data integrity in peer-to-peer media streaming (2005) (18)
- Likelihood of Threats to Connected Vehicles (2014) (18)
- Mayflies: A Moving Target Defense Framework for Distributed Systems (2016) (17)
- Autonomous transaction processing using data dependency in mobile environments (2003) (17)
- A Systematic Approach for Attack Analysis and Mitigation in V2V Networks (2016) (16)
- Adaptive Voice Spam Control with User Behavior Analysis (2009) (16)
- Privacy and Trust in Online Interactions (2008) (16)
- Revising Transaction Conceptsf or Mobile Computing (1994) (16)
- Trustworthiness Based Authorization on WWW (2001) (16)
- An Algorithm for Building User-Role Profiles in a Trust Environment (2002) (16)
- Consumer Oriented Privacy Preserving Access Control for Electronic Health Records in the Cloud (2016) (16)
- Analyzing Availability of Replicated Database Systems (1991) (15)
- Implementation and measurements of efficient communication facilities for distributed database systems (1989) (15)
- Managing Trust in Cyberspace (2013) (15)
- Engineering the Object-relation Database Model in O-Raid (1989) (15)
- System Defined Prewrites for Increasing Concurrency in Databases (1997) (14)
- Hierarchical structure for supporting movable base stations in wireless networks (2003) (14)
- A low-cost, low-delay location update/paging scheme in hierarchical cellular networks (2003) (14)
- Collaborative attacks in WiMAX networks (2009) (14)
- Self-configuring Node Clusters , Data Aggregation , and Security in Microsensor Networks (2002) (14)
- An open and safe nested transaction model: concurrency and recovery (2000) (14)
- Immunizing mobile ad hoc networks against collaborative attacks using cooperative immune model (2013) (14)
- Using Assurance Cases to Develop Iteratively Security Features Using Scrum (2014) (13)
- Digital Libraries Current Issues (1995) (13)
- Energy-Efficient Routing Schemes for Sensor Networks (2003) (13)
- Privacy-Preserving Data Dissemination in Untrusted Cloud (2017) (13)
- An experimental analysis of replicated copy control site failure and recovery (1988) (13)
- Secure Data Communication in Autonomous V2X Systems (2018) (13)
- PartJoin: An Efficient Storage and Query Execution for Data Warehouses (2002) (13)
- Security in Data Warehousing * (Invited Talk) (2000) (12)
- Cost-Profit Analysis of a Peer-to-Peer Media Streaming Architecture (2003) (12)
- Detection of Message Injection Attacks Onto the CAN Bus Using Similarities of Successive Messages-Sequence Graphs (2021) (12)
- Indexing Noncrashing Failures: A Dynamic Program Slicing-Based Approach (2007) (12)
- Trading Privacy for Trust in Online Interactions (2007) (12)
- Self-Configuring Clusters, Data Aggregation and Authentication in Microsensor Networks (2003) (12)
- Securing IoT-Based Cyber-Physical Human Systems against Collaborative Attacks (2017) (12)
- Performance evaluation of reliability control algorithms for distributed database systems (1984) (12)
- Privacy in Cloud Computing Through Identity Management (2011) (12)
- A Causal Model for Analyzing Distributed Concurrency Control Algorithms (1983) (12)
- On the Correctness of a Transaction Model for Mobile Computing (1998) (12)
- A Distributed Model-Free Ride-Sharing Algorithm with Pricing using Deep Reinforcement Learning (2020) (11)
- A Study of Distributed Transaction Processing in an Internetwork (1995) (11)
- Intrusion Detection in Wireless Mesh Networks Using a Hybrid Approach (2009) (11)
- Communication in the Raid distributed database system (1990) (11)
- A Study of Distributed Transaction Processing in Wide Area Network (1994) (11)
- The Design of an Adaptable Distributed System (1986) (11)
- A Scheme for Batch Verification of Integrity Assertions in a Database System (1984) (11)
- Fault Tolerant Authentication in Mobile Computing (2000) (11)
- Adaptable Recovery Using Dynamic Quorum Assignments (1990) (11)
- Guest Editorial: Quality of Service in Multimedia Networks (2002) (11)
- Resilient Concurrency Control in Distributed Database Systems (1983) (11)
- Digital Libraries Research and Technology Advances (1995) (11)
- Active gateway: a facility for video conferencing traffic control (1997) (11)
- Security Threats and Defensive Approaches in Machine Learning System Under Big Data Environment (2021) (10)
- Classes of Serializable Histories and Synchronization Algorithms in Distributed Database Systems (1982) (10)
- An MTD-Based Self-Adaptive Resilience Approach for Cloud Systems (2017) (10)
- A Dynamic majority determination algorithm for reconfiguration of network partitions (1988) (10)
- Evolution of a Communication System for Distributed Transaction Processing in Raid (1991) (10)
- A review of concurrency and reliability issues in distributed database systems (1987) (10)
- RADical Strategies for Engineering Web-Scale Cloud Solutions (2015) (10)
- Building High Performance Communication Services for Digital Libraries (1995) (10)
- Implementation of RAID (1988) (10)
- A Colour-Based Technique for Measuring Visible Loss for Use in Image Data Communication (1996) (9)
- Performance evaluation of multiple-rate mobile ad hoc networks (2006) (9)
- Achieving Flexibility and Scalability: A New Architecture for Wireless Network* (2001) (9)
- Maximizing network security given a limited budget (2009) (9)
- Virtual routers: a tool for emulating IP routers (2002) (9)
- A model for concurrent checkpointing and recovery using transactions (1989) (9)
- Energy-Efficient Group Key Management Protocols for Hierarchical Sensor Networks (2007) (9)
- A Novel Robust Routing Scheme Against Rushing Attacks in Wireless Ad Hoc Networks (2013) (9)
- Quality of service control for distributed multimedia systems (1997) (9)
- Efficient Implementation of Modularity in RAID (1989) (8)
- Monitoring and Managing Cloud Computing Security using Denial of Service Bandwidth Allowance (2013) (8)
- Integrating Distributed Data Sources Using Federated Objects (1992) (8)
- Detection and filtering Spam over Internet Telephony — a user-behavior-aware intermediate-network-based approach (2009) (8)
- An introduction to enterprise-participant data model (1996) (8)
- Design of Intelligent Query Systems for Large Databases (1980) (8)
- The Effects of Threading, Infection Time, and Multiple-Attacker Collaboration on Malware Propagation (2009) (8)
- Improving Data Availability in Mobile Computing Using Prewrite Operations (1997) (8)
- Secured Web access (2000) (8)
- Feature analysis of selected database recovery techniques (1981) (8)
- Data and Transaction Management in a Mobile Environment (2002) (8)
- Privacy Preserving Access Control in Service-Oriented Architecture (2014) (8)
- Design and Implementation of the RAID V2 Distributed Database System (1992) (8)
- Multidimensional timestamp protocols for concurrency control (1987) (8)
- DeCrypto Pro: Deep Learning Based Cryptomining Malware Detection Using Performance Counters (2020) (8)
- Secure Wireless Network with Movable Base Stations (2003) (8)
- Design and Implementation of a Python-Based Active Network Platform for Network Management and Control (2002) (8)
- A Case for Societal Digital Security Culture (2013) (7)
- End to end security in service oriented architecture (2014) (7)
- Supporting queries in the O-Raid object-oriented database system (1990) (7)
- Separating Between Trust and Access Control Policies: A necessity for Web Applications ∗ (2001) (7)
- A Monitoring Approach for Policy Enforcement in Cloud Services (2017) (7)
- VC collaborator: a mechanism for video conferencing support (1996) (7)
- RL-ABE: A Revocable Lattice Attribute Based Encryption Scheme Based on R-LWE Problem in Cloud Storage (2022) (7)
- Clarification of Two Phase Locking in Concurrent Transaction Processing (1988) (7)
- Kappa-Fuzzy ARTMAP: A Feature Selection Based Methodology to Intrusion Detection in Computer Networks (2013) (7)
- An Evaluation of Transmitting Compressed Images in a Wide Area Network (1995) (7)
- A fragmentation scheme for multimedia traffic in active networks (1998) (7)
- Identity-Preserving Public Integrity Checking with Dynamic Groups for Cloud Storage (2018) (7)
- Crash Recovery in an Open and Safe Nested Transaction Model (1997) (7)
- O-Raid: experiences and experiments (1993) (7)
- From Byzantine Fault-Tolerance to Fault-Avoidance: An Architectural Transformation to Attack and Failure Resiliency (2020) (7)
- SETH: A Quorum-Based Replicated Database System for Experimentation with Failures (1988) (7)
- An adaptable constrained locking protocol for high data contention environments (1999) (7)
- Big Data Analytics for Cyber Security (2019) (6)
- Bio-Inspired Formal Model for Space/Time Virtual Machine Randomization and Diversification (2022) (6)
- Impact of Initial Target Position on Performance of UAV Surveillance Using Opportunistic Resource Utilization Networks (2015) (6)
- A Survey of Computation Offloading for Mobile Systems (2012) (6)
- Implementing object support in the RAID distributed database system (1990) (6)
- Towards Targeted Intrusion Detection Deployments in Cloud Computing (2015) (6)
- MioStream: a peer-to-peer distributed live media streaming on the edge (2019) (6)
- Guest Editorial:Advances In Security and Privacy Technologies for Forthcoming SmartSystems, Services, Computing, and Networks (2018) (6)
- A Study of Communication Delays for Web Transactions (2001) (6)
- Incremental Learning through Graceful Degradations in Autonomous Systems (2018) (6)
- Communication experiments for distributed transaction processing: from lan to wan (1994) (6)
- Effective Strategies for Multi-Media Message Transmission: UDP Cooling and TCP (1995) (6)
- Trusted Routing and Intruder Identification in Mobile Ad Hoc Networks (2002) (6)
- Tech Report 2000-07 Fault-tolerant Authentication and Group Key Management in Mobile Computing (2000) (6)
- Design and evaluation of an adaptive traffic conditioner for differentiated services networks (2001) (6)
- Secure Dissemination of Video Data in Vehicle-to-Vehicle Systems (2015) (6)
- Developing Attack Defense Ideas for Ad Hoc Wireless Networks (2009) (6)
- Scalable Deep Learning through Fuzzy-Based Clustering in Autonomous Systems (2018) (6)
- Network tomography-based unresponsive flow detection and control (2003) (6)
- A Distributed Monitoring and Reconfiguration Approach for Adaptive Network Computing (2015) (6)
- Reliable Broadcasting in ZigBee Networks (2005) (5)
- DL-Raid: An Environment for Supporting Digital Library Services (1994) (5)
- An adaptable network architecture for multimedia traffic management and control (2000) (5)
- Self-Adjusting Congestion Avoidance Routing Protocol for Ad Hoc Networks (2003) (5)
- Secure Data Exchange and Data Leakage Detection in an Untrusted Cloud (2018) (5)
- Tamper-resistant autonomous agents-based mobile-cloud computing (2016) (5)
- A view-based approach to relaxing global serializability in a multidatabase system (1995) (5)
- A Trust-based Approach for Secure Data Dissemination in a Mobile Peer-to-Peer Network of AVs (2012) (5)
- Protecting PLM Data Throughout Their Lifecycle (2013) (5)
- A Note on "MPEG Video Encryption Algorithms" (2004) (4)
- Autonomous Aggregate Data Analytics in Untrusted Cloud (2018) (4)
- Database Integrity Block Construct: Concepts and Design Issues (1985) (4)
- An Architecture for Secure Wireless Networking * (2001) (4)
- Performance Evaluation of the Fuzzy ARTMAP for Network Intrusion Detection (2012) (4)
- Unresponsive Flow Detection and Control Using the Differentiated Services Framework (2001) (4)
- A broad band (visible) heat reflecting mirror (1977) (4)
- Building a user-interface for the O-Raid database system using the Suite system (1992) (4)
- Re-evaluating indexing schemes for nested objects (1994) (4)
- Private and Trusted Collaborations (2004) (4)
- Improving Throughput by Link Distance Control in a Multi-Rate Ad Hoc Network (2004) (4)
- Design and analysis of a hardware-assisted checkpointing and recovery scheme for distributed applications (1998) (4)
- Impact of Codec Schemes on Multimedia Communication (1996) (4)
- Multimedia data transmission and control using active networks (2005) (4)
- Cost Analysis of Selected Database Restoration Techniques (1983) (4)
- TreeSystems forSyntactic Pattern Recognition (1973) (4)
- Hierarchical Aggregation of Consumer Ratings for Service Ecosystem (2015) (4)
- Design and Analysis of an Integrated Checkpointing Recovery Scheme for Distributed Applications (2000) (4)
- A Confidence Ranked Co-Occurrence Approach for Accurate Object Recognition in Highly Complex Scenes (2013) (4)
- A Communication Framework for Digital Libraries (2000) (4)
- Object-Oriented Computing - Guest Editors' Introduction (1992) (3)
- Experimental Study of TCP and UDP Protocols for Future Distributed Databases (1995) (3)
- Three Experiments in Reliable Transaction Processing in RAID (1988) (3)
- Economics of a Collaborative Peer-to- Peer Infrastructure for Content Distribution (2003) (3)
- Knowledge Graphs for Semantic-Aware Anomaly Detection in Video (2020) (3)
- Proceedings of the second international conference on Information and knowledge management (1993) (3)
- On Relaxing Serializability by Constraining Transaction Readsets (1997) (3)
- Performance Studies for an Adaptable Video-conferencing System (2007) (3)
- Applying fault-tolerance principles to security research (2001) (3)
- Digital Libraries: Current Issues, Digital Libraries Workshop, Newark, NJ, USA, May 19-20, 1994, Selected Papers (1995) (3)
- Private Anonymous Messaging (2012) (3)
- Anonymizing Web services through a club mechanism with economic incentives (2004) (3)
- A Facility For Experimenting Distributed Software in the Internet (1993) (3)
- Multipass transmission policy: an effective method of transmitting large multimedia objects in the wide-area network (1997) (3)
- Designing an efficient distributed digital library database for image data (1997) (3)
- Implementation and Performance of a Communication Facility for Distributed Transaction Processing (1990) (3)
- A Model for Adaptable Concurrency Control (1987) (3)
- Performance Study on Two Distance Vector Routing Protocols for Mobile Ad Hoc Networks (2002) (3)
- A Robust Distributed Termination Detection Algorithm (1987) (3)
- Towards Dynamic QoS Monitoring in Service Oriented Architectures (2015) (3)
- Efficient availability mechanisms in distributed database systems (1993) (3)
- Experimental Facility for Kernel Extensions to Support Distributed Database Systems (1989) (3)
- An Approach for Preserving Privacy and Protecting Personally Identifiable Information in Cloud Computing (2010) (3)
- Fibonacci Modeling of Malware Propagation (2008) (3)
- Impacts of Security Attacks on The Effectiveness of Collaborative Adaptive Cruise Control Mechanism (2018) (3)
- An End-to-End Dynamic Trust Framework for Service-Oriented Architecture (2017) (3)
- Enforcement of data consistency in database systems (1987) (3)
- Guest Editorial: Reliability Issues in Distributed Systems (1982) (3)
- Securing Big Data Applications in the Cloud [Guest editors' introduction] (2014) (3)
- Allocation Schemes, Architectures, and Policies for Collaborative Port Scanning Attacks (2011) (2)
- Editorial for Special Issue on “New Technologies and Applications for Wireless Communications & Mobile Cloud Computing” (2013) (2)
- Performance evaluation of linear hash structure model in a nested transaction environment (2002) (2)
- An experimental study of hybrid energy-aware scheduling in a cloud testbed (2014) (2)
- Supporting method migration in a distributed object database system: a performance study (1996) (2)
- Towards situational awareness with multimodal streaming data fusion: serverless computing approach (2021) (2)
- Experimental evaluation of design tradeoff in specialized virtual machine for multimedia traffic in active networks (2000) (2)
- Machine Learning Models to Enhance the Science of Cognitive Autonomy (2018) (2)
- RaaS and Hierarchical Aggregation Revisited (2017) (2)
- Assuring Communications by Balancing Cell Load in Cellular Network (2003) (2)
- RAID: a robust and adaptable distributed system (1986) (2)
- Reliable Stream Transmission in Mobile Computing Environments (1995) (2)
- On Mobile Code Security (2001) (2)
- Communication Issues in Wide Area Networks for Digital Libraries (abstract only) (1994) (2)
- Data Replication in Distributed Database Systems over Large Number of Sites (1995) (2)
- Formalization and Proof of Correctness of the Crash Recovery Algorithm for an Open and Safe Nested Transaction Model (2001) (2)
- CollectCast : A Tomography-Based Network Service for Peer-to-Peer Streaming (2003) (2)
- Communication-based Recovery in Replicated Databases (1989) (2)
- A Kolmogorov Complexity Approach for Measuring Attack Path Complexity (2011) (2)
- Measuring user’s influence in the Yelp recommender system (2017) (2)
- Multi-level transaction model for semantic concurrency control in linear hash structures (2000) (2)
- Adapting Distributed Database Systems for High Availability (1995) (2)
- A Layered Architecture for Supporting Objects in a Relational System: A Performance Study (1995) (2)
- Innovative Ideas in Privacy Research (Keynote Talk) (2006) (2)
- WIP - SKOD: A Framework for Situational Knowledge on Demand (2019) (2)
- Consistent state detection and recovery for concurrent processing (1988) (2)
- Multi-pass Transmission Policy: An Effective method of transmitting large multimedia objects in the wide-area network (2020) (2)
- Analysis of End-to-End SOA Security Protocols with Mobile Devices (2013) (2)
- VERIFYING DATA INTEGRITY IN PEER-TO-PEER VIDEO STREAMING (2002) (2)
- A time-evolution model for the privacy degree of information disseminated in online social networks (2013) (2)
- End-to-End Policy Monitoring and Enforcement for Service-Oriented Architecture (2017) (2)
- Dynamic Trust Production Based on Based on Interaction Sequence (2003) (2)
- SETH: a quorum-based database system for experimentation with failures (1989) (2)
- Performance Study on Supporting Objects in O-Raid Distributed Database Systems (1993) (2)
- A Model for Active Techniques for Compressed Video Transmission (1999) (2)
- Vulnerability analysis and threat assessment/avoidance (2003) (2)
- A self-protecting agents based model for high-performance mobile-cloud computing (2018) (2)
- CIKM 93 : proceedings of the Second International Conference on Information and Knowledge Management, November 1-5, 1993, Washington, DC, USA (1993) (2)
- PD3: policy-based distributed data dissemination (2015) (2)
- On-the-fly Analytics over Encrypted Records in Untrusted V 2 X Environments (2018) (1)
- Novel Secure and Dynamic Clustering Protocols in Wireless Sensor Networks (2011) (1)
- Concurrent Checkpointing and Recovery in Distributed Systems (1987) (1)
- ABTTP : A TTP-based Prototype for Protecting Confidentiality of Sensitive Data with Active Bundles (2011) (1)
- A Distributed Video-on-demand System for Video Conferencing (2007) (1)
- Site Recovery in Replicated Distributed Database (1985) (1)
- A Practical Framework for Secure Document Retrieval in Encrypted Cloud File Systems (2022) (1)
- Fault Tolerant Applications (2009) (1)
- Fully Temporal Relation (2009) (1)
- Proposal for CERIAS 2001 Secure , Survivable , Jam Resistant Communications and Network Management (1)
- Analysis of port scanning attacks (2009) (1)
- Analysis of the Majority Consensus Concurrency Control Algorithm for Correctness and Performance Using the Event Ordering Approach (1983) (1)
- A Conceptual Model for Multimedia Database Systems (1994) (1)
- Authentication-driven Authorization on Web Access* (2001) (1)
- A System for Experimentation in Replicated Copy Control (1987) (1)
- Digital Libraries and Multimedia (2000) (1)
- Proceedings of the third international conference on Information and knowledge management (1994) (1)
- Approaches to multimedia traffic management and control (2000) (1)
- Home Automation using Internet of Things (IOT) (2019) (1)
- Adaptable Video Conferencing (1997) (1)
- Fact-Oriented Modeling (2009) (1)
- Selected Papers from the Digital Libraries, Research and Technology Advances (1995) (1)
- Maintaining Consistency in Multidatabase Systems: A Comprehensive Study (1994) (1)
- Cross-layer algorithms for mobile wireless networks (2006) (1)
- Disruption-resilient Publish and Subscribe (2016) (1)
- A simulation study on multi-rate mobile ad hoc networks (2004) (1)
- Push: An experimental facility for implementing distributed database services in operating systems (1993) (1)
- Typed Token Approach For Database Processing During Network Partitioning (1990) (1)
- A Token-based Model for Fraud Detection and Prevention (2003) (1)
- Hybrid Value/Event Representation of Replicated Objects (1990) (1)
- Energy-Efficient Peer-to-Peer Caching and Mobility Management in 4G Hybrid Networks (2008) (1)
- Guest Editorial: Digital Libraries and Multimedia (2000) (1)
- Understanding the Impact of Shill Bidding in Online English Auctions (2003) (1)
- Hierarchical Mobile Wireless Network ( HMWN ) * (2002) (1)
- 2nd International Workshop on Data Management in Global Data Repositories (2006) (1)
- Transition From A Relation To Object Model Implementation (1993) (1)
- Proceedings of the IEEE Workshop on Advances in Parallel and Distributed Systems, October 6, 1993, Princeton, New Jersey (1993) (1)
- Heterogeneous CPU Services Using Differentiated Admission Control (2002) (1)
- SCHEME FOR VERIFICATION OF INTEGRITY ASSERTIONS IN A TRANSACTION PROCESSING SYSTEM. (1982) (1)
- A Generic Algorithm for Transaction Processing During Network Partitioning (1988) (1)
- The first international workshop on Specialized Ad Hoc Networks and Systems (SAHNS 2007) (2007) (1)
- Scheduling with Compensation in Multi- database Systems (1993) (1)
- Reliability in Distributed Database Systems (Panel). (1985) (1)
- Ensuring Semi-Atomicity in Heterogeneous Distributed Database Systems (1994) (1)
- Privacy-Preserving Data Sharing and Adaptable Service Compositions in Mission-Critical Clouds (2021) (1)
- CIKM 93, Proceedings of the Second International Conference on Information and Knowledge Management, Washington, DC, USA, November 1-5, 1993 (1993) (1)
- Novel Secure and Immune Private Routing Protocol in Mobile Ad Hoc Networks (2011) (1)
- Adaptive and heterogeneous mobile wireless networks (2004) (1)
- Experiments in Security and QoS in Mobile Systems (1)
- A framework for distributed database systems: distribution alternatives and generic architectures, a report by the CODASYL Systems Committee, 1981 (1981) (0)
- NGCRC Project Proposal Blockhub : Blockchain-based Secure Cross-domain Software Development and Sharing System (2017) (0)
- Book Reviews (1981) (0)
- Quality of Service Test by Codec Performance (1996) (0)
- Wireless: can you secure me now? (2008) (0)
- Congestion Avoidance Routing Protocol for Ad-Hoc Networks (2010) (0)
- The Design and Implementation of the RAID-V 2 Distributed Database System * (2013) (0)
- Formal Theory for Security Protocol Analysis of Distributed Denial of Service (2014) (0)
- Design and Implementation of Linear Hash Algorithm in a Nested Transaction Environment (1999) (0)
- Unclassified 3 1 Executive Summary Title Intelligent Autonomous Systems based on Data Analytics and Machine Learning (2017) (0)
- Guest Editor's Introduction: Design Principles for Experimental Distributed Systems (1989) (0)
- Message from the 2CCom 2009 symposium chairs (2009) (0)
- Adaptable Web Browsing of Images in Mobile Computing Environment: Experiments and Observations (2005) (0)
- HACKER: AN INTELLIGENT LEARNING AGENT (2002) (0)
- Securing wireless network topology and routing (2005) (0)
- The Design of an Adaptahle Distributed System t (2013) (0)
- A Communication Framework for Digital Libraries 1 (0)
- Hunting for Insider Threats Using LSTM-Based Anomaly Detection (2023) (0)
- A Model for Adaptable Transaction Systems 1 (2013) (0)
- Evaluation of surface effects in laminar flow of a drag reducing system. (1972) (0)
- AN ADAPTABLE NETW.ORK ARCHITECTURF, FOR MULTWIEDIA TRAFFIC MANAGEMENT AND CONTROL (2000) (0)
- Secure Wireless Command and Maintenance Environment (2003) (0)
- NGCRC Project Proposal for Secure Intelligent Autonomous Systems with Cyber Attribution (2018) (0)
- Simulation Study of a Cellular Aided Mobile Ad-Hoc Network (2004) (0)
- Secure information sharing and access control in plm systems (2013) (0)
- Foreword and editorial - March issue (2013) (0)
- Access and method execution on distributed complex objects (2000) (0)
- Selected Papers from the Digital Libraries Workshop on Digital Libraries: Current Issues (1994) (0)
- CERIAS Tech Report 2002-60 Authorization Based on Evidence and Trust (2002) (0)
- Special issue on networking technologies for sustainable computing (2020) (0)
- 1 COUNTERACTING SHILL BIDDING IN ONLINE ENGLISH AUCION (2004) (0)
- Cost analysis of recovery block scheme and its implementation issues (1981) (0)
- Purdue e-Pubs Purdue e-Pubs A Robust Distributed Termination Detection Algorithm A Robust Distributed Termination Detection Algorithm (2020) (0)
- QoS Layer QoS ParametersApplication Frame RateFrame Size and ResolutionResponse TimeThroughputSecurity and Gurantee of TransactionPrice and (2007) (0)
- Panel: Benefits and Pitfalls of Specialized Ad Hoc Networks and Systems (SAHNS) (2009) (0)
- Purdue e-Pubs Purdue e-Pubs Analyzing Availability of Replicated Database Systems Analyzing Availability of Replicated Database Systems (2020) (0)
- Cross-Layer Algorithms for Video Transmission over Wireless Networks (2005) (0)
- Engineering 1-23-2018 EPICS : A Framework for Enforcing Security Policies in Composite Web Services (2019) (0)
- Behavior-based System for Generation of Security Solutions (2004) (0)
- Experiments in Adaptable and Secure Multimedia Database Systems (Invited Paper) (1999) (0)
- Flex Transactions (2009) (0)
- Technical Program Committee (2018) (0)
- Technology Final Report Intelligent Autonomous Systems Based on Data Analytics and Machine Learning (2018) (0)
- Editorial for Special Issue on “New Technologies and Applications for Wireless Communications & Mobile Cloud Computing” (2012) (0)
- Raid Programmers's Manual (1987) (0)
- A Performance Study of Method Execution Alternatives in a Distributed Object Database System (1995) (0)
- Foreword and editorial - January issue (2013) (0)
- W18 - PDMST '07 & GRep '07: 4th international workshop on P2P Data Management, Security, and Trust: 3rd international workshop on Data management in Global data Repositories (2007) (0)
- Surveillance VideoQuerying With A Human-in-the-Loop (2020) (0)
- Auditable serverless computing for farm management (2021) (0)
- End-to-End Service Oriented Architectures (SOA) Security Project (2012) (0)
- On optimal scheduling of integrity assertions in a transaction processing system (1981) (0)
- uction To Enterprise-Participant Data MO (1996) (0)
- Monitoring QoS-enabled Network Domains to Detect Service Violations and DoS Attacks Primary Investigator : (0)
- An Introduction to the Enterprise-Participant (EP) Data Model (2014) (0)
- Scalable Learning Through Error-correcting Codes based Clustering in Autonomous Systems (2018) (0)
- BUILDING DISTRIBUTED DAT ABASE SYSTEMS † (2004) (0)
- Full Protection in Wireless Sensor Networks (2018) (0)
- A Taxonomy of Data Managements Via Broadcasting in Mobile Computing (2002) (0)
- Supporting Complex Data Types in a Relational Distributed Database System (1994) (0)
- SAHNS 2011 Committees Organizing Committee (2011) (0)
- Principles and Realization Strategies of Intregrating Autonomous Software Systems: Extension of Multidatabase Transaction Management Techniques (1994) (0)
- Unlinkable complex identity claims (2013) (0)
- Workshop Program Committee ASSD 2015 (2015) (0)
- Traffic Conditioner Design for Assured Forwarding in Differentiated Services Network (2013) (0)
- Reliability in distributed database systems (panel discussion) (1985) (0)
- Cerias Tech Report 2003-55 Resilient Video Transmission over Wireless Networks (2003) (0)
- Traffic C onditioner Design for Assured Forwarding in Diffe rentiated Services Network (2000) (0)
- Detecting service violation in internet and mobile ad hoc networks (2006) (0)
- Table of Contents (2009) (0)
- Question A Paper : An Evolution of Transmitting Compressed Images In a Wide Are Network (2002) (0)
- Securing Intelligent Autonomous Systems Through Artificial Intelligence (2021) (0)
- Foreword and Editorial (2015) (0)
- User Content Mining Supporting Usage Content Mining for Web Personalization (2001) (0)
- DISRUPTING PACKET DELIVERY , LOCALIZATION AND SYNCHRONIZATION SERVICES IN UNDERWATER SENSOR NETWORKS (0)
- ON DENIAL-OF-SERVICE ATTACKS IN UNDERWATER SENSOR NETWORKS (0)
- Security auditing in service oriented architecture (2012) (0)
- Wireless ad hoc networks [Editorial] (2009) (0)
- Foreword and editorial: International journal of security and its applications (2015) (0)
- Cerias Tech Report 2005-140 Cross-layer Algorithm for Video Transmission over Wireless Network (0)
- A framework for service activity monitoring (2014) (0)
- Object {open_quotes}request{close_quotes} based clustering for method processing in object-oriented database system (1996) (0)
- Co-tenant application security on mobile devices (2012) (0)
- An Expert System Controlling an Adaptable Distributed Data Base System (1987) (0)
- Coinmunication in the Raid Distributed Database System * (2004) (0)
- k-anonymity Chord for Anonymous Query Response (2014) (0)
- Experiences with Parallelizing a Distributed Database System (1990) (0)
- Anonymous Access to Trust Information Using k-anonymity Chord (2010) (0)
- A Step toward Secure and Trusted Clouds (2015) (0)
- Anonymity for Trust Holders using k-anonymity Chord (2006) (0)
- Privacy through identity management (2012) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Bharat Kumar. Bhargava?
Bharat Kumar. Bhargava is affiliated with the following schools: