|
Search the dblp DataBase
Saurabh Bagchi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Yu-Sung Wu, Bingrui Foo, Yongguo Mei, Saurabh Bagchi
Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS. [Citation Graph (0, 0)][DBLP] ACSAC, 2003, pp:234-244 [Conf]
- Saurabh Bagchi
Fast Abstracts. [Citation Graph (0, 0)][DBLP] DSN, 2006, pp:595- [Conf]
- Saurabh Bagchi, Douglas M. Blough, Paolo Santi, Nitin H. Vaidya
DIWANS: Workshop on Dependability Issues in Wireless Ad Hoc Networks and Sensor Networks. [Citation Graph (0, 0)][DBLP] DSN, 2004, pp:900- [Conf]
- Saurabh Bagchi, Y. Liu, Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K. Iyer, Y. Levendel, Lawrence G. Votta
A Framework for Database Audit and Control Flow Checking for a Wireless Telephone Network Controller. [Citation Graph (0, 0)][DBLP] DSN, 2001, pp:225-234 [Conf]
- Sumeer Bhola, Robert E. Strom, Saurabh Bagchi, Yuanyuan Zhao, Joshua S. Auerbach
Exactly-once Delivery in a Content-based Publish-Subscribe System. [Citation Graph (0, 0)][DBLP] DSN, 2002, pp:7-16 [Conf]
- Bingrui Foo, Yu-Sung Wu, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
ADEPTS: Adaptive Intrusion Response Using Attack Graphs in an E-Commerce Environment. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:508-517 [Conf]
- Issa Khalil, Saurabh Bagchi, Ness B. Shroff
LITEWORP: A Lightweight Countermeasure for the Wormhole Attack in Multihop Wireless Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:612-621 [Conf]
- Gunjan Khanna, Saurabh Bagchi, Yu-Sung Wu
Fault Tolerant Energy Aware Data Dissemination Protocol in Sensor Networks. [Citation Graph (0, 0)][DBLP] DSN, 2004, pp:795-804 [Conf]
- Mark D. Krasniewski, Padma Varadharajan, Bryan Rabeler, Saurabh Bagchi, Y. Charlie Hu
TIBFIT: Trust Index Based Fault Tolerance for Arbitrary Data Faults in Sensor Networks. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:672-681 [Conf]
- Sarah Sellke, Ness B. Shroff, Saurabh Bagchi
Modeling and Automated Containment of Worms. [Citation Graph (0, 0)][DBLP] DSN, 2005, pp:528-537 [Conf]
- Yu-Sung Wu, Saurabh Bagchi, Sachin Garg, Navjot Singh, Timothy K. Tsai
SCIDIVE: A Stateful and Cross Protocol Intrusion Detection Architecture for Voice-over-IP Environments. [Citation Graph (0, 0)][DBLP] DSN, 2004, pp:433-442 [Conf]
- Ravishankar K. Iyer, Zbigniew Kalbarczyk, Keith Whisnant, Saurabh Bagchi
A Flexible Software Architecture for High Availability Computing. [Citation Graph (0, 0)][DBLP] HASE, 1998, pp:42-49 [Conf]
- Yuldi Tirta, Zhiyuan Li, Yung-Hsiang Lu, Saurabh Bagchi
Efficient Collection of Sensor Data in Remote Fields Using Mobile Collectors. [Citation Graph (0, 0)][DBLP] ICCCN, 2004, pp:515-520 [Conf]
- Nipoon Malhotra, Mark D. Krasniewski, Chin-Lung Yang, Saurabh Bagchi, William J. Chappell
Location Estimation in Ad Hoc Networks with Directional Antennas. [Citation Graph (0, 0)][DBLP] ICDCS, 2005, pp:633-642 [Conf]
- David T. Stott, Neil A. Speirs, Zbigniew Kalbarczyk, Saurabh Bagchi, Jun Xu, Ravishankar K. Iyer
Comparing Fail-Sailence Provided by Process Duplication versus Internal Error Detection for DHCP Server. [Citation Graph (0, 0)][DBLP] IPDPS, 2001, pp:31- [Conf]
- Saurabh Bagchi, Henrique Madeira
Open Source Software - A Recipe for Vulnerable Software, or The Only Way to Keep the Bugs and the Bad Guys Out? [Citation Graph (0, 0)][DBLP] ISSRE, 2003, pp:347-352 [Conf]
- Serdar Cabuk, Nipoon Malhotra, Longbi Lin, Saurabh Bagchi, Ness B. Shroff
Analysis and Evaluation of Topological and Application Characteristics of Unreliable Mobile Wireless Ad-hoc Network. [Citation Graph (0, 0)][DBLP] PRDC, 2004, pp:248-257 [Conf]
- Gunjan Khanna, Saurabh Bagchi, John Rogers
Failure Handling in a Reliable Multicast Protocol for Improving Buffer Utilization and Accommodating Heterogeneous Receivers. [Citation Graph (0, 0)][DBLP] PRDC, 2004, pp:15-24 [Conf]
- Saurabh Bagchi, Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K. Iyer
The Chameleon Infrastructure for Adaptive, Software Implemented Fault Tolerance. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1998, pp:261-267 [Conf]
- Ravishankar K. Iyer, Zbigniew Kalbarczyk, Saurabh Bagchi
Chameleon: Adaptive Fault Tolerance Using Reliable, Mobile Agents. [Citation Graph (0, 0)][DBLP] Symposium on Reliable Distributed Systems, 1997, pp:61-62 [Conf]
- Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi
Self Checking Network Protocols: A Monitor Based Approach. [Citation Graph (0, 0)][DBLP] SRDS, 2004, pp:18-30 [Conf]
- Nipoon Malhotra, Shrish Ranjan, Saurabh Bagchi
LRRM: A Randomized Reliable Multicast Protocol for Optimizing Recovery Latency and Buffer Utilization. [Citation Graph (0, 0)][DBLP] SRDS, 2005, pp:215-225 [Conf]
- Douglas Herbert, Yung-Hsiang Lu, Saurabh Bagchi, Zhiyuan Li
Detection and Repair of Software Errors in Hierarchical Sensor Networks. [Citation Graph (0, 0)][DBLP] SUTC (1), 2006, pp:403-410 [Conf]
- Gunjan Khanna, Padma Varadharajan, Saurabh Bagchi
Automated Online Monitoring of Distributed Applications through External Monitors. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2006, v:3, n:2, pp:115-129 [Journal]
- Saurabh Bagchi, Balaji Srinivasan, Keith Whisnant, Zbigniew Kalbarczyk, Ravishankar K. Iyer
Hierarchical Error Detection in a Software Implemented Fault Tolerance (SIFT) Environment. [Citation Graph (0, 0)][DBLP] IEEE Trans. Knowl. Data Eng., 2000, v:12, n:2, pp:203-224 [Journal]
- Zbigniew Kalbarczyk, Ravishankar K. Iyer, Saurabh Bagchi, Keith Whisnant
Chameleon: A Software Infrastructure for Adaptive Fault Tolerance. [Citation Graph (0, 0)][DBLP] IEEE Trans. Parallel Distrib. Syst., 1999, v:10, n:6, pp:560-579 [Journal]
- Issa Khalil, Saurabh Bagchi, Ness B. Shroff
SLAM: Sleep-Wake Aware Local Monitoring in Sensor Networks. [Citation Graph (0, 0)][DBLP] DSN, 2007, pp:565-574 [Conf]
- Xiaojuan Ren, Rudolf Eigenmann, Saurabh Bagchi
Failure-aware checkpointing in fine-grained cycle sharing systems. [Citation Graph (0, 0)][DBLP] HPDC, 2007, pp:33-42 [Conf]
- Rajesh Krishna Panta, Issa Khalil, Saurabh Bagchi
Stream: Low Overhead Wireless Reprogramming for Sensor Networks. [Citation Graph (0, 0)][DBLP] INFOCOM, 2007, pp:928-936 [Conf]
- Issa Khalil, Saurabh Bagchi, Ness B. Shroff
Analysis and evaluation of Secos, a protocol for energy efficient and secure communication in sensor networks. [Citation Graph (0, 0)][DBLP] Ad Hoc Networks, 2007, v:5, n:3, pp:360-391 [Journal]
- Issa Khalil, Saurabh Bagchi, Ness B. Shroff
LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:13, pp:3750-3772 [Journal]
- Yu-Sung Wu, Bingrui Foo, Yu-Chun Mao, Saurabh Bagchi, Eugene H. Spafford
Automated adaptive intrusion containment in systems of interacting services. [Citation Graph (0, 0)][DBLP] Computer Networks, 2007, v:51, n:5, pp:1334-1360 [Journal]
- Xiaojuan Ren, Seyong Lee, Rudolf Eigenmann, Saurabh Bagchi
Prediction of Resource Availability in Fine-Grained Cycle Sharing Systems Empirical Evaluation. [Citation Graph (0, 0)][DBLP] J. Grid Comput., 2007, v:5, n:2, pp:173-195 [Journal]
- Gunjan Khanna, Mike Yu Cheng, Padma Varadharajan, Saurabh Bagchi, Miguel P. Correia, Paulo Veríssimo
Automated Rule-Based Diagnosis through a Distributed Monitor System. [Citation Graph (0, 0)][DBLP] IEEE Trans. Dependable Sec. Comput., 2007, v:4, n:4, pp:266-279 [Journal]
- Douglas Herbert, Vinaitheerthan Sundaram, Yung-Hsiang Lu, Saurabh Bagchi, Zhiyuan Li
Adaptive correctness monitoring for wireless sensor networks using hierarchical distributed run-time invariant checking. [Citation Graph (0, 0)][DBLP] TAAS, 2007, v:2, n:3, pp:- [Journal]
3rd Workshop on Recent Advances on Intrusion-Tolerant Systems WRAITS 2009. [Citation Graph (, )][DBLP]
Spam detection in voice-over-IP calls through semi-supervised clustering. [Citation Graph (, )][DBLP]
Resource Availability Prediction in Fine-Grained Cycle Sharing Systems. [Citation Graph (, )][DBLP]
Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection. [Citation Graph (, )][DBLP]
Hermes: Fast and Energy Efficient Incremental Code Updates for Wireless Sensor Networks. [Citation Graph (, )][DBLP]
TCP/IP Timing Channels: Theory to Implementation. [Citation Graph (, )][DBLP]
How to Keep Your Head above Water While Detecting Errors. [Citation Graph (, )][DBLP]
Optimal monitoring in multi-channel multi-radio wireless mesh networks. [Citation Graph (, )][DBLP]
Improving Dependability Using Shared Supplementary Memory and Opportunistic Micro Rejuvenation in Multi-tasking Embedded Systems. [Citation Graph (, )][DBLP]
Determining Placement of Intrusion Detectors for a Distributed Application through Bayesian Network Modeling. [Citation Graph (, )][DBLP]
FALCON: a system for reliable checkpoint recovery in shared grid environments. [Citation Graph (, )][DBLP]
A tale of two synchronizing clocks. [Citation Graph (, )][DBLP]
Stateful Detection in High Throughput Distributed Systems. [Citation Graph (, )][DBLP]
Distributed Diagnosis of Failures in a Three Tier E-Commerce System. [Citation Graph (, )][DBLP]
SeNDORComm: An Energy-Efficient Priority-Driven Communication Layer for Reliable Wireless Sensor Networks. [Citation Graph (, )][DBLP]
Single versus multi-hop wireless reprogramming in sensor networks. [Citation Graph (, )][DBLP]
Optimizing AES for embedded devices and wireless sensor networks. [Citation Graph (, )][DBLP]
Data-Centric Routing in Sensor Networks: Single-hop Broadcast or Multi-hop Unicast? [Citation Graph (, )][DBLP]
Efficient wireless reprogramming through reduced bandwidth usage and opportunistic sleeping. [Citation Graph (, )][DBLP]
MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks. [Citation Graph (, )][DBLP]
UnMask: Utilizing neighbor monitoring for attack mitigation in multihop wireless sensor networks. [Citation Graph (, )][DBLP]
Search in 0.005secs, Finished in 0.421secs
|