Rinku Dewri, Ph.D. - Publications

Affiliations: 
2010 Computer Science Colorado State University, Fort Collins, CO 
Area:
Computer Science

28 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Eltarjaman W, Dewri R, Thurimella R. Private Retrieval of POI Details in Top-K Queries Ieee Transactions On Mobile Computing. 16: 2611-2624. DOI: 10.1109/Tmc.2016.2625256  0.429
2017 Michanan J, Dewri R, Rutherford MJ. GreenC5: An adaptive, energy-aware collection for green software development Sustainable Computing: Informatics and Systems. 13: 42-60. DOI: 10.1016/J.Suscom.2016.11.004  0.321
2016 Dewri R, Thurimella R. Mobile local search with noisy locations Pervasive and Mobile Computing. DOI: 10.1016/J.Pmcj.2016.04.014  0.353
2016 Amini Salehi M, Smith J, Maciejewski AA, Siegel HJ, Chong EKP, Apodaca J, Briceño LD, Renner T, Shestak V, Ladd J, Sutton A, Janovy D, Govindasamy S, Alqudah A, Dewri R, et al. Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system Journal of Parallel and Distributed Computing. 97: 96-111. DOI: 10.1016/J.Jpdc.2016.06.008  0.32
2015 Eltarjaman W, Annadata P, Dewri R, Thurimella R. Leveraging Smartphone Advances for Continuous Location Privacy Proceedings - Ieee International Conference On Mobile Data Management. 1: 197-202. DOI: 10.1109/MDM.2015.36  0.317
2014 Dewri R, Thurimella R. Exploiting service similarity for privacy in location-based search queries Ieee Transactions On Parallel and Distributed Systems. 25: 374-383. DOI: 10.1109/Tpds.2013.34  0.422
2013 Dewri R. Local differential perturbations: Location privacy under approximate knowledge attackers Ieee Transactions On Mobile Computing. 12: 2360-2372. DOI: 10.1109/Tmc.2012.208  0.368
2013 Dewri R, Thurimella R. Can a phone's GPS 'lie' intelligently? Computer. 46: 91-93. DOI: 10.1109/Mc.2013.44  0.358
2012 Poolsappasit N, Dewri R, Ray I. Dynamic security risk management using Bayesian attack graphs Ieee Transactions On Dependable and Secure Computing. 9: 61-74. DOI: 10.1109/Tdsc.2011.34  0.37
2012 Dewri R, Ray I, Whitley D. Utility driven optimization of real time data broadcast schedules Applied Soft Computing Journal. 12: 1832-1846. DOI: 10.1016/J.Asoc.2011.04.006  0.662
2012 Dewri R, Ray I, Poolsappasit N, Whitley D. Optimal security hardening on attack tree models of networks: A cost-benefit analysis International Journal of Information Security. 11: 167-188. DOI: 10.1007/S10207-012-0160-Y  0.597
2011 Dewri R, Ray I, Whitley D. Exploring privacy versus data quality trade-offs in anonymization techniques using multi-objective optimization Journal of Computer Security. 19: 935-974. DOI: 10.3233/Jcs-2011-0428  0.657
2011 Dewri R, Ray I, Whitley D. K-anonymization in the presence of publisher preferences Ieee Transactions On Knowledge and Data Engineering. 23: 1678-1690. DOI: 10.1109/Tkde.2011.106  0.641
2010 Dewri R, Ray I, Whitley D. Query m-invariance: Preventing query disclosures in continuous location-based services Proceedings - Ieee International Conference On Mobile Data Management. 95-104. DOI: 10.1109/MDM.2010.52  0.56
2010 Dewri R, Ray I, Whitley D. Real time stochastic scheduling in broadcast systems with decentralized data storage Real-Time Systems. 45: 143-175. DOI: 10.1007/S11241-010-9102-9  0.652
2010 Dewri R, Ray I, Whitley D. On the formation of historically k-anonymous anonymity sets in a continuous LBS Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 50: 71-88. DOI: 10.1007/978-3-642-16161-2_5  0.584
2010 Dewri R, Ray I, Whitley D. On the identification of property based generalizations in microdata anonymization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6166: 81-96. DOI: 10.1007/978-3-642-13739-6_6  0.593
2009 Dewri R, Ray I, Whitley D. POkA: Identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice International Conference On Information and Knowledge Management, Proceedings. 1037-1046. DOI: 10.1145/1645953.1646085  0.592
2009 Dewri R, Whitley D, Ray I. A multi-objective approach to data sharing with privacy constraints and preference based objectives Proceedings of the 11th Annual Genetic and Evolutionary Computation Conference, Gecco-2009. 1499-1506. DOI: 10.1145/1569901.1570102  0.549
2009 Dewri R, Ray I, Whitley D. On the comparison of microdata disclosure control algorithms Proceedings of the 12th International Conference On Extending Database Technology: Advances in Database Technology, Edbt'09. 240-251. DOI: 10.1145/1516360.1516389  0.59
2008 Dewri R, Ray I, Whitley D. Optimizing on-demand data broadcast scheduling in pervasive environments Advances in Database Technology - Edbt 2008 - 11th International Conference On Extending Database Technology, Proceedings. 559-569. DOI: 10.1145/1353343.1353411  0.652
2008 Dewri R, Ray I, Whitley D. On the optimal selection of k in the k-anonymity problem Proceedings - International Conference On Data Engineering. 1364-1366. DOI: 10.1109/ICDE.2008.4497557  0.606
2008 Dewri R, Ray I, Whitley D. Security provisioning in pervasive environments using multi-objective optimization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5283: 349-363. DOI: 10.1007/978-3-540-88313-5-23  0.336
2008 Dewri R, Whitley D, Ray I. Optimizing real-time ordered-data broadcasts in pervasive environments using evolution strategy Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5199: 991-1000. DOI: 10.1007/978-3-540-87700-4_98  0.598
2008 Dewri R, Whitley D, Ray I. Evolution strategy based optimization of on-demand dependent data broadcast scheduling Gecco'08: Proceedings of the 10th Annual Conference On Genetic and Evolutionary Computation 2008. 1699-1700.  0.372
2007 Dewri R, Poolsappasit N, Ray I, Whitley D. Optimal security hardening using multi-objective optimization on attack tree models of networks Proceedings of the Acm Conference On Computer and Communications Security. 204-213. DOI: 10.1145/1315245.1315272  0.586
2004 Deb K, Mitra K, Dewri R, Majumdar S. Towards a better understanding of the epoxy-polymerization process using multi-objective evolutionary computation Chemical Engineering Science. 59: 4261-4277. DOI: 10.1016/J.Ces.2004.06.012  0.442
2004 Deb K, Mitra K, Dewri R, Majumdar S. Unveiling optimal operating conditions for an epoxy polymerization process using multi-objective evolutionary computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3103: 920-931.  0.316
Show low-probability matches.