The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Radu Sion: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Radu Sion, Ramesh Natarajan, Inderpal Narang, Wen-Syan Li, Thomas Phan
    XG: A Data-Driven Computation Grid for Enterprise-Scale Mining. [Citation Graph (0, 0)][DBLP]
    DEXA, 2005, pp:828-837 [Conf]
  2. Radu Sion, Ramesh Natarajan, Inderpal Narang, Thomas Phan
    XG: A Grid-Enabled Query Processing Engine. [Citation Graph (0, 0)][DBLP]
    EDBT, 2006, pp:1115-1120 [Conf]
  3. Yi-Cheng Tu, Sunil Prabhakar, Ahmed K. Elmagarmid, Radu Sion
    QuaSAQ: An Approach to Enabling End-to-End QoS for Multimedia Databases. [Citation Graph (0, 0)][DBLP]
    EDBT, 2004, pp:694-711 [Conf]
  4. Bogdan Carbunar, Radu Sion
    Uncheatable Reputation for Distributed Computation Markets. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:96-110 [Conf]
  5. Radu Sion
    Proving Ownership over Categorical Data. [Citation Graph (0, 0)][DBLP]
    ICDE, 2004, pp:584-596 [Conf]
  6. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    wmdb.: Rights Protection for Numeric Relational Data. [Citation Graph (0, 0)][DBLP]
    ICDE, 2004, pp:863- [Conf]
  7. Radu Sion, Jun'ichi Tatemura
    Dynamic Stochastic Models for Workflow Response Optimization. [Citation Graph (0, 0)][DBLP]
    ICWS, 2005, pp:657-664 [Conf]
  8. Mikhail J. Atallah, Victor Raskin, Christian Hempelmann, Mercan Karahan, Radu Sion, Umut Topkara, Katrina E. Triezenberg
    Natural Language Watermarking and Tamperproofing. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:196-212 [Conf]
  9. Radu Sion
    Power: A Metric for Evaluating Watermarking Algorithms. [Citation Graph (0, 0)][DBLP]
    ITCC, 2002, pp:95-99 [Conf]
  10. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    On-the-fly Intrusion Detection for Web Portals. [Citation Graph (0, 0)][DBLP]
    ITCC, 2003, pp:325-330 [Conf]
  11. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    On Watermarking Numeric Sets. [Citation Graph (0, 0)][DBLP]
    IWDW, 2002, pp:130-146 [Conf]
  12. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    Resilient Information Hiding for Abstract Semi-structures. [Citation Graph (0, 0)][DBLP]
    IWDW, 2003, pp:141-153 [Conf]
  13. Thomas Phan, Kavitha Ranganathan, Radu Sion
    Evolving Toward the Perfect Schedule: Co-scheduling Job Assignments and Data Replication in Wide-Area Systems Using a Genetic Algorithm. [Citation Graph (0, 0)][DBLP]
    JSSPP, 2005, pp:173-193 [Conf]
  14. Ladislau Bölöni, Kyungkoo Jun, Krzysztof Palacz, Radu Sion, Dan C. Marinescu
    The Bond Agent System and Applications. [Citation Graph (0, 0)][DBLP]
    ASA/MA, 2000, pp:99-112 [Conf]
  15. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    Rights Protection for Relational Data. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2003, pp:98-109 [Conf]
  16. Radu Sion, Mikhail J. Atallah
    Attacking digital watermarks. [Citation Graph (0, 0)][DBLP]
    Security, Steganography, and Watermarking of Multimedia Contents, 2004, pp:848-858 [Conf]
  17. Wen-Syan Li, Wang-Pin Hsiung, Dmitri V. Kalashnikov, Radu Sion, Oliver Po, Divyakant Agrawal, K. Selçuk Candan
    Issues and Evaluations of Caching Solutions for Web Application Acceleration. [Citation Graph (0, 0)][DBLP]
    VLDB, 2002, pp:1019-1030 [Conf]
  18. Radu Sion
    Query Execution Assurance for Outsourced Databases. [Citation Graph (0, 0)][DBLP]
    VLDB, 2005, pp:601-612 [Conf]
  19. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    Resilient Rights Protection for Sensor Streams. [Citation Graph (0, 0)][DBLP]
    VLDB, 2004, pp:732-743 [Conf]
  20. Mikhail J. Atallah, Sunil Prabhakar, Keith B. Frikken, Radu Sion
    Digital Rights Protection. [Citation Graph (0, 0)][DBLP]
    IEEE Data Eng. Bull., 2004, v:27, n:1, pp:19-25 [Journal]
  21. Ramesh Natarajan, Radu Sion, Thomas Phan
    A grid-based approach for enterprise-scale data mining. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2007, v:23, n:1, pp:48-54 [Journal]
  22. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    Rights Protection for Relational Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2004, v:16, n:12, pp:1509-1525 [Journal]
  23. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    Rights Protection for Categorical Data. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2005, v:17, n:7, pp:912-926 [Journal]
  24. Radu Sion, Mikhail J. Atallah, Sunil Prabhakar
    Rights Protection for Discrete Numeric Streams. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Knowl. Data Eng., 2006, v:18, n:5, pp:699-714 [Journal]
  25. Ragib Hasan, Marianne Winslett, Radu Sion
    Requirements of Secure Storage Systems for Healthcare Records. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:174-180 [Conf]
  26. Radu Sion
    Secure Data Outsourcing. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:1431-1432 [Conf]
  27. Radu Sion, Marianne Winslett
    Regulatory-Compliant Data Management. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:1433-1434 [Conf]
  28. Radu Sion, Sumeet Bajaj, Bogdan Carbunar, Stefan Katzenbeisser
    NS2: Networked Searchable Store with Correctness. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:1342-1345 [Conf]

  29. Regulatory Compliant Oblivious RAM. [Citation Graph (, )][DBLP]


  30. Building castles out of mud: practical access pattern privacy and correctness on untrusted storage. [Citation Graph (, )][DBLP]


  31. Remembrance: The Unbearable Sentience of Being Digital. [Citation Graph (, )][DBLP]


  32. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. [Citation Graph (, )][DBLP]


  33. Personal Digital Rights Management for Mobile Cellular Devices. [Citation Graph (, )][DBLP]


  34. Conditional E-Cash. [Citation Graph (, )][DBLP]


  35. Strong WORM. [Citation Graph (, )][DBLP]


  36. On the Practicality of Private Information Retrieval. [Citation Graph (, )][DBLP]


  37. Usable PIR. [Citation Graph (, )][DBLP]


  38. The Blind Stone Tablet: Outsourcing Durability to Untrusted Parties. [Citation Graph (, )][DBLP]


  39. Joining Privately on Outsourced Data. [Citation Graph (, )][DBLP]


  40. Introducing secure provenance: problems and challenges. [Citation Graph (, )][DBLP]


  41. The PUF Promise. [Citation Graph (, )][DBLP]


  42. A personal mobile DRM manager for smartphones. [Citation Graph (, )][DBLP]


  43. Remembrance: The Unbearable Sentience of Being Digital [Citation Graph (, )][DBLP]


Search in 0.023secs, Finished in 0.025secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002