The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Susan V. Vrbsky: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Susan V. Vrbsky, Jane W.-S. Liu
    APPROXIMATE - A Query Processor that Produces Monotonically Improving Approximate Answers. [Citation Graph (8, 8)][DBLP]
    IEEE Trans. Knowl. Data Eng., 1993, v:5, n:6, pp:1056-1068 [Journal]
  2. Susan V. Vrbsky, Jane W.-S. Liu
    An Object-Oriented Query Processor that Produces Monotonically Improving Approximate Answers. [Citation Graph (5, 9)][DBLP]
    ICDE, 1991, pp:472-481 [Conf]
  3. Susan V. Vrbsky, Kwei-Jay Lin
    Recovering Imprecise Transactions with Real-Time Constraints. [Citation Graph (2, 0)][DBLP]
    Symposium on Reliable Distributed Systems, 1988, pp:185-193 [Conf]
  4. Yaakov L. Varol, Susan V. Vrbsky
    Distributed Query Processing Allowing for Redundant Data. [Citation Graph (1, 0)][DBLP]
    ICDCS, 1984, pp:389-396 [Conf]
  5. Nenad Jukic, Susan V. Vrbsky
    Asserting Beliefs in MLS Relational Models. [Citation Graph (1, 0)][DBLP]
    SIGMOD Record, 1997, v:26, n:3, pp:30-35 [Journal]
  6. Quazi N. Ahmed, Susan V. Vrbsky
    Issues in security for real-time databases. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 1998, pp:297-299 [Conf]
  7. Nenad Jukic, Susan V. Vrbsky
    Joining relations in the belief-consistent multilevel secure relational model. [Citation Graph (0, 0)][DBLP]
    ACM Southeast Regional Conference, 1998, pp:289-296 [Conf]
  8. Quazi N. Ahmed, Susan V. Vrbsky
    Maintaining Security in Firm Real-Time Database Systems. [Citation Graph (0, 0)][DBLP]
    ACSAC, 1998, pp:83-90 [Conf]
  9. Weigang Ni, Susan V. Vrbsky
    Virtual Locks: A Concurrency Control Protocol for Adaptive Broadcasting System. [Citation Graph (0, 0)][DBLP]
    Computers and Their Applications, 2002, pp:339-344 [Conf]
  10. Ming Lei, Susan V. Vrbsky
    A Data Replication Strategy to Increase Data Availability in Data Grids. [Citation Graph (0, 0)][DBLP]
    GCA, 2006, pp:221-227 [Conf]
  11. Weigang Ni, Qiu Fang, Susan V. Vrbsky
    A Lazy Data Request Approach for On-Demand Data Broadcasting. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:790-796 [Conf]
  12. Jingyuan Zhang, Susan V. Vrbsky, Guangbin Fan
    Time-Optimal Parallel Algorithms for Constructing Optimal Virtual Cellular Networks. [Citation Graph (0, 0)][DBLP]
    ICPADS, 2002, pp:42-47 [Conf]
  13. Qiu Fang, Susan V. Vrbsky, Yu Dang, Weigang Ni
    A Pull-Based Broadcast Algorithm that Considers Timing Constraints. [Citation Graph (0, 0)][DBLP]
    ICPP Workshops, 2004, pp:46-53 [Conf]
  14. Susan V. Vrbsky, Randy K. Smith, Allen S. Parrish, Huanjing Wang
    Strategies to Improve Variable Selection Performance. [Citation Graph (0, 0)][DBLP]
    IKE, 2005, pp:209-214 [Conf]
  15. Weigang Ni, Susan V. Vrbsky, Sibabrata Ray
    Low-cost Coordinated Nonblocking Checkpointing in Mobile Computing Systems. [Citation Graph (0, 0)][DBLP]
    ISCC, 2003, pp:1427-1434 [Conf]
  16. Susan V. Vrbsky, Sasa Tomic, Nenad Jukic
    Concurrency Control for Approximate Query Processing of Real-Time Database Systems. [Citation Graph (0, 0)][DBLP]
    RTDB, 1997, pp:227-246 [Conf]
  17. Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky
    Variable selection and ranking for analyzing automobile traffic accident data. [Citation Graph (0, 0)][DBLP]
    SAC, 2005, pp:32-37 [Conf]
  18. Quazi N. Ahmed, Susan V. Vrbsky
    Maintaining Integrity Constraints and Security in real-Time Database Systems. [Citation Graph (0, 0)][DBLP]
    IICIS, 1998, pp:255-270 [Conf]
  19. Allen S. Parrish, Brandon Dixon, David Cordes, Susan V. Vrbsky, David Brown
    CARE: An Automobile Crash Data Analysis Tool. [Citation Graph (0, 0)][DBLP]
    IEEE Computer, 2003, v:36, n:6, pp:22-32 [Journal]
  20. Susan V. Vrbsky
    A Data Model for Approximate Query Processing of Real-Time Databases. [Citation Graph (0, 0)][DBLP]
    Data Knowl. Eng., 1996, v:21, n:1, pp:79-102 [Journal]
  21. Allen S. Parrish, Susan V. Vrbsky, Brandon Dixon, Weigang Ni
    Optimizing disk storage to support statistical analysis operations. [Citation Graph (0, 0)][DBLP]
    Decision Support Systems, 2005, v:38, n:4, pp:621-628 [Journal]
  22. Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky
    Improved variable and value ranking techniques for mining categorical traffic accident data. [Citation Graph (0, 0)][DBLP]
    Expert Syst. Appl., 2005, v:29, n:4, pp:795-806 [Journal]
  23. Nenad Jukic, Susan V. Vrbsky
    Feasibility of Aggregates in Time Constrained Queries. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1996, v:21, n:7, pp:595-614 [Journal]
  24. Nenad Jukic, Susan V. Vrbsky, Allen S. Parrish, Brandon Dixon, Boris Jukic
    A Belief-Consistent Multilevel Secure Relational Data Model. [Citation Graph (0, 0)][DBLP]
    Inf. Syst., 1999, v:24, n:5, pp:377-400 [Journal]
  25. Sasa Tomic, Susan V. Vrbsky, Tracy Camp
    A new measure of temporal consistency for derived objects in real-time database systems. [Citation Graph (0, 0)][DBLP]
    Inf. Sci., 2000, v:124, n:1-4, pp:139-152 [Journal]
  26. Weigang Ni, Susan V. Vrbsky, Sibabrata Ray
    Pitfalls In Distributed Nonblocking Checkpointing. [Citation Graph (0, 0)][DBLP]
    Journal of Interconnection Networks, 2004, v:5, n:1, pp:47-78 [Journal]
  27. Quazi N. Ahmed, Susan V. Vrbsky
    Maintaining security and timeliness in real-time database system. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 2002, v:61, n:1, pp:15-29 [Journal]
  28. Susan V. Vrbsky, Jane W.-S. Liu
    Producing approximate answers to set- and single-valued queries. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1994, v:27, n:3, pp:243-251 [Journal]
  29. Susan V. Vrbsky, Sasa Tomic
    Satisfying timing constraints of real-time databases. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1998, v:41, n:1, pp:63-73 [Journal]
  30. Susan V. Vrbsky, Sasa Tomic
    Satisfying temporal consistency constraints of real-time databases. [Citation Graph (0, 0)][DBLP]
    Journal of Systems and Software, 1999, v:45, n:1, pp:45-60 [Journal]
  31. Qiu Fang, Susan V. Vrbsky, Hui-Chuan Chen, Yu Dang
    Pull-based broadcasting with timing constraints. [Citation Graph (0, 0)][DBLP]
    Parallel Algorithms Appl., 2005, v:20, n:3-4, pp:235-252 [Journal]
  32. Quazi N. Ahmed, Susan V. Vrbsky
    Triggered Updates for Temporal Consistency in Real-Time Databases. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2000, v:19, n:3, pp:209-243 [Journal]
  33. Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky
    Closing the key loophole in MLS databases. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:2, pp:15-20 [Journal]
  34. Ming Lei, Susan V. Vrbsky, Zijie Qi
    Online Grid Replication Optimizers to Improve System Reliability. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2007, pp:1-8 [Conf]
  35. Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky
    Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ISI, 2007, pp:377- [Conf]
  36. Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky, Allen S. Parrish
    Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories. [Citation Graph (0, 0)][DBLP]
    J. Database Manag., 2005, v:16, n:3, pp:1-20 [Journal]

  37. A Dynamic Data Grid Replication Strategy to Minimize the Data Missed. [Citation Graph (, )][DBLP]


  38. A Remote Data Access Element for Data Grids. [Citation Graph (, )][DBLP]


  39. Secret Little Functions and Codebook for Protecting Users from Password Theft. [Citation Graph (, )][DBLP]


  40. A Virtual Password Scheme to Protect Passwords. [Citation Graph (, )][DBLP]


  41. Active Protection in Wireless Networking. [Citation Graph (, )][DBLP]


  42. Minimizing the Cost of Read-Only Transactions in a Data Sharing Environment. [Citation Graph (, )][DBLP]


  43. Camouflaging mobility for itinerary privacy in mobile ad-hoc networks. [Citation Graph (, )][DBLP]


  44. Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet. [Citation Graph (, )][DBLP]


  45. Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. [Citation Graph (, )][DBLP]


  46. A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments. [Citation Graph (, )][DBLP]


  47. Collaborated Camouflaging Mobility for Mobile Privacy. [Citation Graph (, )][DBLP]


  48. Scalability study of cache access mechanisms in multiple-cell wireless networks. [Citation Graph (, )][DBLP]


  49. Scheduling on-demand data broadcast in mixed-type request environments. [Citation Graph (, )][DBLP]


  50. Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing. [Citation Graph (, )][DBLP]


Search in 0.033secs, Finished in 0.035secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002