The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Rinku Dewri: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kalyanmoy Deb, Kishalay Mitra, Rinku Dewri, Saptarshi Majumdar
    Unveiling Optimal Operating Conditions for an Epoxy Polymerization Process Using Multi-objective Evolutionary Computation. [Citation Graph (0, 0)][DBLP]
    GECCO (2), 2004, pp:920-931 [Conf]
  2. Jay Smith, Luis Diego Briceno, Anthony A. Maciejewski, Howard Jay Siegel, Timothy Renner, Vladimir Shestak, Joshua Ladd, Andrew Sutton, David L. Janovy, Sudha Govindasamy, Amin Alqudah, Rinku Dewri, Puneet Prakash
    Measuring the Robustness of Resource Allocations in a Stochastic Dynamic Environment. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]
  3. Lakshminarayanan Renganarayanan, Manjukumar Harthikote-Matha, Rinku Dewri, Sanjay V. Rajopadhye
    Towards Optimal Multi-level Tiling for Stencil Computations. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-10 [Conf]

  4. Optimal security hardening using multi-objective optimization on attack tree models of networks. [Citation Graph (, )][DBLP]


  5. POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice. [Citation Graph (, )][DBLP]


  6. An Opinion Model for Evaluating Malicious Activities in Pervasive Computing Systems. [Citation Graph (, )][DBLP]


  7. On the Identification of Property Based Generalizations in Microdata Anonymization. [Citation Graph (, )][DBLP]


  8. Optimizing on-demand data broadcast scheduling in pervasive environments. [Citation Graph (, )][DBLP]


  9. On the comparison of microdata disclosure control algorithms. [Citation Graph (, )][DBLP]


  10. Security Provisioning in Pervasive Environments Using Multi-objective Optimization. [Citation Graph (, )][DBLP]


  11. Evolution strategy based optimization of on-demand dependent data broadcast scheduling. [Citation Graph (, )][DBLP]


  12. A multi-objective approach to data sharing with privacy constraints and preference based objectives. [Citation Graph (, )][DBLP]


  13. On the Optimal Selection of k in the k-Anonymity Problem. [Citation Graph (, )][DBLP]


  14. Query m-Invariance: Preventing Query Disclosures in Continuous Location-Based Services. [Citation Graph (, )][DBLP]


  15. Optimizing Real-Time Ordered-Data Broadcasts in Pervasive Environments Using Evolution Strategy. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002