Author of the publication

Applying distributed optimization for QoS-security tradeoff in a distributed information system.

, , , , and . AAMAS, page 1261-1262. IFAAMAS, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

System impact characteristics of cyber services, security mechanisms, and attacks with implications in cyber system survivability., , and . Inf. Knowl. Syst. Manag., 12 (1): 75-95 (2013)Prospective monitoring of imaging guideline adherence by physicians in a surgical collaborative: comparison of statistical process control methods for detecting outlying performance., , , , , , , , , and . BMC Medical Informatics Decis. Mak., 20 (1): 89 (2020)Trusted Software Repair for System Resiliency., , , , and . DSN Workshops, page 238-241. IEEE Computer Society, (2016)Scientific formats for object-relational database systems: a study of suitability and performance., , , , and . SIGMOD Record, 35 (2): 10-15 (2006)An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture., , , , , and . DSN Workshops, page 222-225. IEEE Computer Society, (2016)Energy-Efficient Replica Voting Mechanisms for Secure Real-Time Embedded Systems., , and . WOWMOM, page 153-162. IEEE Computer Society, (2005)QoS protocols for end-to-end delay guarantee of instantaneous jobs on computer networks., , and . Inf. Knowl. Syst. Manag., 7 (4): 429-451 (2008)Continuous mission-oriented assessment (CMA) of assurance., , , and . DSN Workshops, page 33-38. IEEE Computer Society, (2011)Cyber Security Resource Allocation: A Markov Decision Process Approach., , , , and . HASE, page 49-52. IEEE Computer Society, (2017)Message Passing for Distributed QoS-Security Tradeoffs., , and . Comput. J., 57 (6): 840-855 (2014)