Search the dblp DataBase
Susan V. Vrbsky :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Susan V. Vrbsky , Jane W.-S. Liu APPROXIMATE - A Query Processor that Produces Monotonically Improving Approximate Answers. [Citation Graph (8, 8)][DBLP ] IEEE Trans. Knowl. Data Eng., 1993, v:5, n:6, pp:1056-1068 [Journal ] Susan V. Vrbsky , Jane W.-S. Liu An Object-Oriented Query Processor that Produces Monotonically Improving Approximate Answers. [Citation Graph (5, 9)][DBLP ] ICDE, 1991, pp:472-481 [Conf ] Susan V. Vrbsky , Kwei-Jay Lin Recovering Imprecise Transactions with Real-Time Constraints. [Citation Graph (2, 0)][DBLP ] Symposium on Reliable Distributed Systems, 1988, pp:185-193 [Conf ] Yaakov L. Varol , Susan V. Vrbsky Distributed Query Processing Allowing for Redundant Data. [Citation Graph (1, 0)][DBLP ] ICDCS, 1984, pp:389-396 [Conf ] Nenad Jukic , Susan V. Vrbsky Asserting Beliefs in MLS Relational Models. [Citation Graph (1, 0)][DBLP ] SIGMOD Record, 1997, v:26, n:3, pp:30-35 [Journal ] Quazi N. Ahmed , Susan V. Vrbsky Issues in security for real-time databases. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1998, pp:297-299 [Conf ] Nenad Jukic , Susan V. Vrbsky Joining relations in the belief-consistent multilevel secure relational model. [Citation Graph (0, 0)][DBLP ] ACM Southeast Regional Conference, 1998, pp:289-296 [Conf ] Quazi N. Ahmed , Susan V. Vrbsky Maintaining Security in Firm Real-Time Database Systems. [Citation Graph (0, 0)][DBLP ] ACSAC, 1998, pp:83-90 [Conf ] Weigang Ni , Susan V. Vrbsky Virtual Locks: A Concurrency Control Protocol for Adaptive Broadcasting System. [Citation Graph (0, 0)][DBLP ] Computers and Their Applications, 2002, pp:339-344 [Conf ] Ming Lei , Susan V. Vrbsky A Data Replication Strategy to Increase Data Availability in Data Grids. [Citation Graph (0, 0)][DBLP ] GCA, 2006, pp:221-227 [Conf ] Weigang Ni , Qiu Fang , Susan V. Vrbsky A Lazy Data Request Approach for On-Demand Data Broadcasting. [Citation Graph (0, 0)][DBLP ] ICDCS Workshops, 2003, pp:790-796 [Conf ] Jingyuan Zhang , Susan V. Vrbsky , Guangbin Fan Time-Optimal Parallel Algorithms for Constructing Optimal Virtual Cellular Networks. [Citation Graph (0, 0)][DBLP ] ICPADS, 2002, pp:42-47 [Conf ] Qiu Fang , Susan V. Vrbsky , Yu Dang , Weigang Ni A Pull-Based Broadcast Algorithm that Considers Timing Constraints. [Citation Graph (0, 0)][DBLP ] ICPP Workshops, 2004, pp:46-53 [Conf ] Susan V. Vrbsky , Randy K. Smith , Allen S. Parrish , Huanjing Wang Strategies to Improve Variable Selection Performance. [Citation Graph (0, 0)][DBLP ] IKE, 2005, pp:209-214 [Conf ] Weigang Ni , Susan V. Vrbsky , Sibabrata Ray Low-cost Coordinated Nonblocking Checkpointing in Mobile Computing Systems. [Citation Graph (0, 0)][DBLP ] ISCC, 2003, pp:1427-1434 [Conf ] Susan V. Vrbsky , Sasa Tomic , Nenad Jukic Concurrency Control for Approximate Query Processing of Real-Time Database Systems. [Citation Graph (0, 0)][DBLP ] RTDB, 1997, pp:227-246 [Conf ] Huanjing Wang , Allen S. Parrish , Randy K. Smith , Susan V. Vrbsky Variable selection and ranking for analyzing automobile traffic accident data. [Citation Graph (0, 0)][DBLP ] SAC, 2005, pp:32-37 [Conf ] Quazi N. Ahmed , Susan V. Vrbsky Maintaining Integrity Constraints and Security in real-Time Database Systems. [Citation Graph (0, 0)][DBLP ] IICIS, 1998, pp:255-270 [Conf ] Allen S. Parrish , Brandon Dixon , David Cordes , Susan V. Vrbsky , David Brown CARE: An Automobile Crash Data Analysis Tool. [Citation Graph (0, 0)][DBLP ] IEEE Computer, 2003, v:36, n:6, pp:22-32 [Journal ] Susan V. Vrbsky A Data Model for Approximate Query Processing of Real-Time Databases. [Citation Graph (0, 0)][DBLP ] Data Knowl. Eng., 1996, v:21, n:1, pp:79-102 [Journal ] Allen S. Parrish , Susan V. Vrbsky , Brandon Dixon , Weigang Ni Optimizing disk storage to support statistical analysis operations. [Citation Graph (0, 0)][DBLP ] Decision Support Systems, 2005, v:38, n:4, pp:621-628 [Journal ] Huanjing Wang , Allen S. Parrish , Randy K. Smith , Susan V. Vrbsky Improved variable and value ranking techniques for mining categorical traffic accident data. [Citation Graph (0, 0)][DBLP ] Expert Syst. Appl., 2005, v:29, n:4, pp:795-806 [Journal ] Nenad Jukic , Susan V. Vrbsky Feasibility of Aggregates in Time Constrained Queries. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1996, v:21, n:7, pp:595-614 [Journal ] Nenad Jukic , Susan V. Vrbsky , Allen S. Parrish , Brandon Dixon , Boris Jukic A Belief-Consistent Multilevel Secure Relational Data Model. [Citation Graph (0, 0)][DBLP ] Inf. Syst., 1999, v:24, n:5, pp:377-400 [Journal ] Sasa Tomic , Susan V. Vrbsky , Tracy Camp A new measure of temporal consistency for derived objects in real-time database systems. [Citation Graph (0, 0)][DBLP ] Inf. Sci., 2000, v:124, n:1-4, pp:139-152 [Journal ] Weigang Ni , Susan V. Vrbsky , Sibabrata Ray Pitfalls In Distributed Nonblocking Checkpointing. [Citation Graph (0, 0)][DBLP ] Journal of Interconnection Networks, 2004, v:5, n:1, pp:47-78 [Journal ] Quazi N. Ahmed , Susan V. Vrbsky Maintaining security and timeliness in real-time database system. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 2002, v:61, n:1, pp:15-29 [Journal ] Susan V. Vrbsky , Jane W.-S. Liu Producing approximate answers to set- and single-valued queries. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1994, v:27, n:3, pp:243-251 [Journal ] Susan V. Vrbsky , Sasa Tomic Satisfying timing constraints of real-time databases. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1998, v:41, n:1, pp:63-73 [Journal ] Susan V. Vrbsky , Sasa Tomic Satisfying temporal consistency constraints of real-time databases. [Citation Graph (0, 0)][DBLP ] Journal of Systems and Software, 1999, v:45, n:1, pp:45-60 [Journal ] Qiu Fang , Susan V. Vrbsky , Hui-Chuan Chen , Yu Dang Pull-based broadcasting with timing constraints. [Citation Graph (0, 0)][DBLP ] Parallel Algorithms Appl., 2005, v:20, n:3-4, pp:235-252 [Journal ] Quazi N. Ahmed , Susan V. Vrbsky Triggered Updates for Temporal Consistency in Real-Time Databases. [Citation Graph (0, 0)][DBLP ] Real-Time Systems, 2000, v:19, n:3, pp:209-243 [Journal ] Nenad Jukic , Svetlozar Nestorov , Susan V. Vrbsky Closing the key loophole in MLS databases. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2003, v:32, n:2, pp:15-20 [Journal ] Ming Lei , Susan V. Vrbsky , Zijie Qi Online Grid Replication Optimizers to Improve System Reliability. [Citation Graph (0, 0)][DBLP ] IPDPS, 2007, pp:1-8 [Conf ] Ming Lei , Zijie Qi , Xiaoyan Hong , Susan V. Vrbsky Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. [Citation Graph (0, 0)][DBLP ] ISI, 2007, pp:377- [Conf ] Nenad Jukic , Svetlozar Nestorov , Susan V. Vrbsky , Allen S. Parrish Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories. [Citation Graph (0, 0)][DBLP ] J. Database Manag., 2005, v:16, n:3, pp:1-20 [Journal ] A Dynamic Data Grid Replication Strategy to Minimize the Data Missed. [Citation Graph (, )][DBLP ] A Remote Data Access Element for Data Grids. [Citation Graph (, )][DBLP ] Secret Little Functions and Codebook for Protecting Users from Password Theft. [Citation Graph (, )][DBLP ] A Virtual Password Scheme to Protect Passwords. [Citation Graph (, )][DBLP ] Active Protection in Wireless Networking. [Citation Graph (, )][DBLP ] Minimizing the Cost of Read-Only Transactions in a Data Sharing Environment. [Citation Graph (, )][DBLP ] Camouflaging mobility for itinerary privacy in mobile ad-hoc networks. [Citation Graph (, )][DBLP ] Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet. [Citation Graph (, )][DBLP ] Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. [Citation Graph (, )][DBLP ] A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments. [Citation Graph (, )][DBLP ] Collaborated Camouflaging Mobility for Mobile Privacy. [Citation Graph (, )][DBLP ] Scalability study of cache access mechanisms in multiple-cell wireless networks. [Citation Graph (, )][DBLP ] Scheduling on-demand data broadcast in mixed-type request environments. [Citation Graph (, )][DBLP ] Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing. [Citation Graph (, )][DBLP ] Search in 0.090secs, Finished in 0.094secs