Year |
Citation |
Score |
2017 |
Eltarjaman W, Dewri R, Thurimella R. Private Retrieval of POI Details in Top-K Queries Ieee Transactions On Mobile Computing. 16: 2611-2624. DOI: 10.1109/Tmc.2016.2625256 |
0.429 |
|
2017 |
Michanan J, Dewri R, Rutherford MJ. GreenC5: An adaptive, energy-aware collection for green software development Sustainable Computing: Informatics and Systems. 13: 42-60. DOI: 10.1016/J.Suscom.2016.11.004 |
0.321 |
|
2016 |
Dewri R, Thurimella R. Mobile local search with noisy locations Pervasive and Mobile Computing. DOI: 10.1016/J.Pmcj.2016.04.014 |
0.353 |
|
2016 |
Amini Salehi M, Smith J, Maciejewski AA, Siegel HJ, Chong EKP, Apodaca J, Briceño LD, Renner T, Shestak V, Ladd J, Sutton A, Janovy D, Govindasamy S, Alqudah A, Dewri R, et al. Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system Journal of Parallel and Distributed Computing. 97: 96-111. DOI: 10.1016/J.Jpdc.2016.06.008 |
0.32 |
|
2015 |
Eltarjaman W, Annadata P, Dewri R, Thurimella R. Leveraging Smartphone Advances for Continuous Location Privacy Proceedings - Ieee International Conference On Mobile Data Management. 1: 197-202. DOI: 10.1109/MDM.2015.36 |
0.317 |
|
2014 |
Dewri R, Thurimella R. Exploiting service similarity for privacy in location-based search queries Ieee Transactions On Parallel and Distributed Systems. 25: 374-383. DOI: 10.1109/Tpds.2013.34 |
0.422 |
|
2013 |
Dewri R. Local differential perturbations: Location privacy under approximate knowledge attackers Ieee Transactions On Mobile Computing. 12: 2360-2372. DOI: 10.1109/Tmc.2012.208 |
0.368 |
|
2013 |
Dewri R, Thurimella R. Can a phone's GPS 'lie' intelligently? Computer. 46: 91-93. DOI: 10.1109/Mc.2013.44 |
0.358 |
|
2012 |
Poolsappasit N, Dewri R, Ray I. Dynamic security risk management using Bayesian attack graphs Ieee Transactions On Dependable and Secure Computing. 9: 61-74. DOI: 10.1109/Tdsc.2011.34 |
0.37 |
|
2012 |
Dewri R, Ray I, Whitley D. Utility driven optimization of real time data broadcast schedules Applied Soft Computing Journal. 12: 1832-1846. DOI: 10.1016/J.Asoc.2011.04.006 |
0.662 |
|
2012 |
Dewri R, Ray I, Poolsappasit N, Whitley D. Optimal security hardening on attack tree models of networks: A cost-benefit analysis International Journal of Information Security. 11: 167-188. DOI: 10.1007/S10207-012-0160-Y |
0.597 |
|
2011 |
Dewri R, Ray I, Whitley D. Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization Journal of Computer Security. 19: 935-974. DOI: 10.3233/Jcs-2011-0428 |
0.657 |
|
2011 |
Dewri R, Ray I, Whitley D. K-anonymization in the presence of publisher preferences Ieee Transactions On Knowledge and Data Engineering. 23: 1678-1690. DOI: 10.1109/Tkde.2011.106 |
0.641 |
|
2010 |
Dewri R, Ray I, Whitley D. Query m-invariance: Preventing query disclosures in continuous location-based services Proceedings - Ieee International Conference On Mobile Data Management. 95-104. DOI: 10.1109/MDM.2010.52 |
0.56 |
|
2010 |
Dewri R, Ray I, Whitley D. Real time stochastic scheduling in broadcast systems with decentralized data storage Real-Time Systems. 45: 143-175. DOI: 10.1007/S11241-010-9102-9 |
0.652 |
|
2010 |
Dewri R, Ray I, Whitley D. On the formation of historically k-anonymous anonymity sets in a continuous LBS Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 50: 71-88. DOI: 10.1007/978-3-642-16161-2_5 |
0.584 |
|
2010 |
Dewri R, Ray I, Whitley D. On the identification of property based generalizations in microdata anonymization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 81-96. DOI: 10.1007/978-3-642-13739-6_6 |
0.593 |
|
2009 |
Dewri R, Ray I, Whitley D. POkA: Identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice International Conference On Information and Knowledge Management, Proceedings. 1037-1046. DOI: 10.1145/1645953.1646085 |
0.592 |
|
2009 |
Dewri R, Whitley D, Ray I. A multi-objective approach to data sharing with privacy constraints and preference based objectives Proceedings of the 11th Annual Genetic and Evolutionary Computation Conference, Gecco-2009. 1499-1506. DOI: 10.1145/1569901.1570102 |
0.549 |
|
2009 |
Dewri R, Ray I, Whitley D. On the comparison of microdata disclosure control algorithms Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 240-251. DOI: 10.1145/1516360.1516389 |
0.59 |
|
2008 |
Dewri R, Ray I, Whitley D. Optimizing on-demand data broadcast scheduling in pervasive environments Advances in Database Technology - Edbt 2008 - 11th International Conference On Extending Database Technology, Proceedings. 559-569. DOI: 10.1145/1353343.1353411 |
0.652 |
|
2008 |
Dewri R, Ray I, Whitley D. On the optimal selection of k in the k-anonymity problem Proceedings - International Conference On Data Engineering. 1364-1366. DOI: 10.1109/ICDE.2008.4497557 |
0.606 |
|
2008 |
Dewri R, Ray I, Whitley D. Security provisioning in pervasive environments using multi-objective optimization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5283: 349-363. DOI: 10.1007/978-3-540-88313-5-23 |
0.336 |
|
2008 |
Dewri R, Whitley D, Ray I. Optimizing real-time ordered-data broadcasts in pervasive environments using evolution strategy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5199: 991-1000. DOI: 10.1007/978-3-540-87700-4_98 |
0.598 |
|
2008 |
Dewri R, Whitley D, Ray I. Evolution strategy based optimization of on-demand dependent data broadcast scheduling Gecco'08: Proceedings of the 10th Annual Conference On Genetic and Evolutionary Computation 2008. 1699-1700. |
0.372 |
|
2007 |
Dewri R, Poolsappasit N, Ray I, Whitley D. Optimal security hardening using multi-objective optimization on attack tree models of networks Proceedings of the Acm Conference On Computer and Communications Security. 204-213. DOI: 10.1145/1315245.1315272 |
0.586 |
|
2004 |
Deb K, Mitra K, Dewri R, Majumdar S. Towards a better understanding of the epoxy-polymerization process using multi-objective evolutionary computation Chemical Engineering Science. 59: 4261-4277. DOI: 10.1016/J.Ces.2004.06.012 |
0.442 |
|
2004 |
Deb K, Mitra K, Dewri R, Majumdar S. Unveiling optimal operating conditions for an epoxy polymerization process using multi-objective evolutionary computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3103: 920-931. |
0.316 |
|
Show low-probability matches. |