Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Ashish Kundu
@article{DBLP:journals/corr/abs-2402-01760, author = {Kausik Lakkaraju and Vedant Khandelwal and Biplav Srivastava and Forest Agostinelli and Hengtao Tang and Prathamjeet Singh and Dezhi Wu and Matthew Irvin and Ashish Kundu}, title = {Trust and ethical considerations in a multi-modal, explainable AI-driven chatbot tutoring system: The case of collaboratively solving Rubik's Cube}, journal = {CoRR}, volume = {abs/2402.01760}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.01760}, doi = {10.48550/ARXIV.2402.01760}, eprinttype = {arXiv}, eprint = {2402.01760}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-01760.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-00935, author = {Adrian Shuai Li and Arun Iyengar and Ashish Kundu and Elisa Bertino}, title = {Transfer Learning for Security: Challenges and Future Directions}, journal = {CoRR}, volume = {abs/2403.00935}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.00935}, doi = {10.48550/ARXIV.2403.00935}, eprinttype = {arXiv}, eprint = {2403.00935}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-00935.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2403-18774, author = {Xun Xian and Ganghua Wang and Xuan Bi and Jayanth Srinivasa and Ashish Kundu and Mingyi Hong and Jie Ding}, title = {{RAW:} {A} Robust and Agile Plug-and-Play Watermark Framework for AI-Generated Images with Provable Guarantees}, journal = {CoRR}, volume = {abs/2403.18774}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2403.18774}, doi = {10.48550/ARXIV.2403.18774}, eprinttype = {arXiv}, eprint = {2403.18774}, timestamp = {Wed, 10 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2403-18774.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/Bertino0HKS0MK23, author = {Elisa Bertino and Hyunwoo Lee and Mengdie Huang and Charalampos Katsis and Zilin Shen and Bruno Ribeiro and Daniel De Mello and Ashish Kundu}, title = {A Pro-Active Defense Framework for IoT Systems}, booktitle = {9th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {125--132}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/CIC58953.2023.00025}, doi = {10.1109/CIC58953.2023.00025}, timestamp = {Thu, 07 Mar 2024 22:43:57 +0100}, biburl = {https://dblp.org/rec/conf/coinco/Bertino0HKS0MK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icml/XianWSKBH023, author = {Xun Xian and Ganghua Wang and Jayanth Srinivasa and Ashish Kundu and Xuan Bi and Mingyi Hong and Jie Ding}, editor = {Andreas Krause and Emma Brunskill and Kyunghyun Cho and Barbara Engelhardt and Sivan Sabato and Jonathan Scarlett}, title = {Understanding Backdoor Attacks through the Adaptability Hypothesis}, booktitle = {International Conference on Machine Learning, {ICML} 2023, 23-29 July 2023, Honolulu, Hawaii, {USA}}, series = {Proceedings of Machine Learning Research}, volume = {202}, pages = {37952--37976}, publisher = {{PMLR}}, year = {2023}, url = {https://proceedings.mlr.press/v202/xian23a.html}, timestamp = {Mon, 28 Aug 2023 17:23:08 +0200}, biburl = {https://dblp.org/rec/conf/icml/XianWSKBH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/XianWSKBH023, author = {Xun Xian and Ganghua Wang and Jayanth Srinivasa and Ashish Kundu and Xuan Bi and Mingyi Hong and Jie Ding}, editor = {Alice Oh and Tristan Naumann and Amir Globerson and Kate Saenko and Moritz Hardt and Sergey Levine}, title = {A Unified Detection Framework for Inference-Stage Backdoor Defenses}, booktitle = {Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10 - 16, 2023}, year = {2023}, url = {http://papers.nips.cc/paper\_files/paper/2023/hash/1868a3c73d0d2a44c42458575fa8514c-Abstract-Conference.html}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nips/XianWSKBH023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/ZhangKPX23, author = {Yuchen Zhang and Ashish Kundu and Georgios Portokalidis and Jun Xu}, editor = {Satish Chandra and Kelly Blincoe and Paolo Tonella}, title = {On the Dual Nature of Necessity in Use of Rust Unsafe Code}, booktitle = {Proceedings of the 31st {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2023, San Francisco, CA, USA, December 3-9, 2023}, pages = {2032--2037}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3611643.3613878}, doi = {10.1145/3611643.3613878}, timestamp = {Mon, 04 Dec 2023 11:02:39 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/ZhangKPX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/IyengarK23, author = {Arun Iyengar and Ashish Kundu}, title = {Large Language Models and Computer Security}, booktitle = {5th {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2023, Atlanta, GA, USA, November 1-4, 2023}, pages = {307--313}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TPS-ISA58951.2023.00045}, doi = {10.1109/TPS-ISA58951.2023.00045}, timestamp = {Tue, 05 Mar 2024 12:00:59 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/IyengarK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-05680, author = {Biplav Srivastava and Kausik Lakkaraju and Tarmo Koppel and Vignesh Narayanan and Ashish Kundu and Sachindra Joshi}, title = {Evaluating Chatbots to Promote Users' Trust - Practices and Open Problems}, journal = {CoRR}, volume = {abs/2309.05680}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.05680}, doi = {10.48550/ARXIV.2309.05680}, eprinttype = {arXiv}, eprint = {2309.05680}, timestamp = {Fri, 15 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-05680.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-10780, author = {Ganghua Wang and Xun Xian and Jayanth Srinivasa and Ashish Kundu and Xuan Bi and Mingyi Hong and Jie Ding}, title = {Demystifying Poisoning Backdoor Attacks from a Statistical Perspective}, journal = {CoRR}, volume = {abs/2310.10780}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.10780}, doi = {10.48550/ARXIV.2310.10780}, eprinttype = {arXiv}, eprint = {2310.10780}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-10780.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2312-13119, author = {Xin Jin and Charalampos Katsis and Fan Sang and Jiahao Sun and Elisa Bertino and Ramana Rao Kompella and Ashish Kundu}, title = {Prometheus: Infrastructure Security Posture Analysis with AI-generated Attack Graphs}, journal = {CoRR}, volume = {abs/2312.13119}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2312.13119}, doi = {10.48550/ARXIV.2312.13119}, eprinttype = {arXiv}, eprint = {2312.13119}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2312-13119.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acml/GulatiVMK22, author = {Kshitij Gulati and Gaurav Verma and Mukesh K. Mohania and Ashish Kundu}, editor = {Vineeth N. Balasubramanian and Ivor W. Tsang}, title = {BeautifAI - Personalised Occasion-based Makeup Recommendation}, booktitle = {Asian Conference on Machine Learning, {ACML} 2022, 12-14 December 2022, Hyderabad, India}, series = {Proceedings of Machine Learning Research}, volume = {189}, pages = {407--419}, publisher = {{PMLR}}, year = {2022}, url = {https://proceedings.mlr.press/v189/gulati23a.html}, timestamp = {Mon, 19 Jun 2023 15:52:13 +0200}, biburl = {https://dblp.org/rec/conf/acml/GulatiVMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LeeMKLB22, author = {Hyunwoo Lee and Anand Mudgerikar and Ashish Kundu and Ninghui Li and Elisa Bertino}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {An Infection-Identifying and Self-Evolving System for IoT Early Defense from Multi-Step Attacks}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13555}, pages = {549--568}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17146-8\_27}, doi = {10.1007/978-3-031-17146-8\_27}, timestamp = {Tue, 27 Sep 2022 21:07:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LeeMKLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-07164, author = {Xin Jin and Charalampos Katsis and Fan Sang and Jiahao Sun and Ashish Kundu and Ramana Kompella}, title = {Edge Security: Challenges and Issues}, journal = {CoRR}, volume = {abs/2206.07164}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.07164}, doi = {10.48550/ARXIV.2206.07164}, eprinttype = {arXiv}, eprint = {2206.07164}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-07164.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/KunduAS21, author = {Ashish Kundu and Arun Ayachitula and Nagamani Sistla}, title = {Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {303--306}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00054}, doi = {10.1109/TPSISA52974.2021.00054}, timestamp = {Thu, 21 Apr 2022 16:21:01 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/KunduAS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/KunduRK21, author = {Ashish Kundu and Abhishek Reddypalle and Chinmay Kundu}, title = {AI-Driven Selective Protection of Multimedia Data}, booktitle = {3rd {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2021, Atlanta, GA, USA, December 13-15, 2021}, pages = {307--313}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/TPSISA52974.2021.00055}, doi = {10.1109/TPSISA52974.2021.00055}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/KunduRK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/KunduLH20, author = {Ashish Kundu and Zhiqiang Lin and Joshua Hammond}, title = {Energy Attacks on Mobile Devices}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {107--117}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00024}, doi = {10.1109/TPS-ISA50397.2020.00024}, timestamp = {Tue, 26 Jan 2021 14:00:08 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/KunduLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/ZhangSKSIL20, author = {Qi Zhang and Zehra Sura and Ashish Kundu and Gong Su and Arun Iyengar and Ling Liu}, title = {StackVault: Protection from Untrusted Functions}, booktitle = {Second {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2020, Atlanta, GA, USA, October 28-31, 2020}, pages = {294--306}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TPS-ISA50397.2020.00045}, doi = {10.1109/TPS-ISA50397.2020.00045}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tpsisa/ZhangSKSIL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-04487, author = {Ashish Kundu and Arun Ayachitula and Nagamani Sistla}, title = {Similarities and Learnings from Ancient Literature on Blockchain Consensus and Integrity}, journal = {CoRR}, volume = {abs/2006.04487}, year = {2020}, url = {https://arxiv.org/abs/2006.04487}, eprinttype = {arXiv}, eprint = {2006.04487}, timestamp = {Fri, 12 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-04487.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdiq/BertinoKS19, author = {Elisa Bertino and Ashish Kundu and Zehra Sura}, title = {Data Transparency with Blockchain and {AI} Ethics}, journal = {{ACM} J. Data Inf. Qual.}, volume = {11}, number = {4}, pages = {16:1--16:8}, year = {2019}, url = {https://doi.org/10.1145/3312750}, doi = {10.1145/3312750}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdiq/BertinoKS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciot/PayneBK19, author = {Josh Payne and Karan K. Budhraja and Ashish Kundu}, editor = {Elisa Bertino and Carl K. Chang and Peter Chen and Ernesto Damiani and Michael Goul and Katsunori Oyama}, title = {How Secure Is Your IoT Network?}, booktitle = {2019 {IEEE} International Congress on Internet of Things, {ICIOT} 2019, Milan, Italy, July 8-13, 2019}, pages = {181--188}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICIOT.2019.00038}, doi = {10.1109/ICIOT.2019.00038}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciot/PayneBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/PayneK19, author = {Josh Payne and Ashish Kundu}, title = {Towards Deep Federated Defenses Against Malware in Cloud Ecosystems}, booktitle = {First {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {92--100}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TPS-ISA48467.2019.00020}, doi = {10.1109/TPS-ISA48467.2019.00020}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/PayneK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/MalvankarPBKCM19, author = {Abhishek Malvankar and Josh Payne and Karan K. Budhraja and Ashish Kundu and Suresh Chari and Mukesh K. Mohania}, title = {Malware Containment in Cloud}, booktitle = {First {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {221--227}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TPS-ISA48467.2019.00036}, doi = {10.1109/TPS-ISA48467.2019.00036}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/MalvankarPBKCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/GunasingheKBKCS19, author = {Hasini Gunasinghe and Ashish Kundu and Elisa Bertino and Hugo Krawczyk and Suresh Chari and Kapil Singh and Dong Su}, editor = {Ling Liu and Ryen W. White and Amin Mantrach and Fabrizio Silvestri and Julian J. McAuley and Ricardo Baeza{-}Yates and Leila Zia}, title = {PrivIdEx: Privacy Preserving and Secure Exchange of Digital Identity Assets}, booktitle = {The World Wide Web Conference, {WWW} 2019, San Francisco, CA, USA, May 13-17, 2019}, pages = {594--604}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3308558.3313574}, doi = {10.1145/3308558.3313574}, timestamp = {Sun, 22 Sep 2019 18:12:47 +0200}, biburl = {https://dblp.org/rec/conf/www/GunasingheKBKCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-03710, author = {Qi Zhang and Zehra Sura and Ashish Kundu and Gong Su and Arun Iyengar and Ling Liu}, title = {StackVault: Protection from Untrusted Functions}, journal = {CoRR}, volume = {abs/1907.03710}, year = {2019}, url = {http://arxiv.org/abs/1907.03710}, eprinttype = {arXiv}, eprint = {1907.03710}, timestamp = {Tue, 22 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-03710.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1908-03270, author = {Mustafa Canim and Ashish Kundu and Josh Payne}, title = {Uncheatable Machine Learning Inference}, journal = {CoRR}, volume = {abs/1908.03270}, year = {2019}, url = {http://arxiv.org/abs/1908.03270}, eprinttype = {arXiv}, eprint = {1908.03270}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1908-03270.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12370, author = {Josh Payne and Ashish Kundu}, title = {Towards Deep Federated Defenses Against Malware in Cloud Ecosystems}, journal = {CoRR}, volume = {abs/1912.12370}, year = {2019}, url = {http://arxiv.org/abs/1912.12370}, eprinttype = {arXiv}, eprint = {1912.12370}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12370.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1912-12373, author = {Josh Payne and Karan K. Budhraja and Ashish Kundu}, title = {How Secure Is Your IoT Network?}, journal = {CoRR}, volume = {abs/1912.12373}, year = {2019}, url = {http://arxiv.org/abs/1912.12373}, eprinttype = {arXiv}, eprint = {1912.12373}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1912-12373.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/internet/IyengarKP18, author = {Arun Iyengar and Ashish Kundu and George Pallis}, title = {Healthcare Informatics and Privacy}, journal = {{IEEE} Internet Comput.}, volume = {22}, number = {2}, pages = {29--31}, year = {2018}, url = {https://doi.org/10.1109/MIC.2018.022021660}, doi = {10.1109/MIC.2018.022021660}, timestamp = {Tue, 27 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/internet/IyengarKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/ArshadKBGK18, author = {Muhammad Umer Arshad and Ashish Kundu and Elisa Bertino and Arif Ghafoor and Chinmay Kundu}, title = {Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {30}, number = {5}, pages = {866--879}, year = {2018}, url = {https://doi.org/10.1109/TKDE.2017.2776221}, doi = {10.1109/TKDE.2017.2776221}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/ArshadKBGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/coinco/KunduSS18, author = {Ashish Kundu and Zehra Sura and Upendra Sharma}, title = {Collaborative and Accountable Hardware Governance Using Blockchain}, booktitle = {4th {IEEE} International Conference on Collaboration and Internet Computing, {CIC} 2018, Philadelphia, PA, USA, October 18-20, 2018}, pages = {114--121}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/CIC.2018.00026}, doi = {10.1109/CIC.2018.00026}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/coinco/KunduSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/VoKM18, author = {Hoang Tam Vo and Ashish Kundu and Mukesh K. Mohania}, editor = {Michael H. B{\"{o}}hlen and Reinhard Pichler and Norman May and Erhard Rahm and Shan{-}Hung Wu and Katja Hose}, title = {Research Directions in Blockchain Data Management and Analytics}, booktitle = {Proceedings of the 21st International Conference on Extending Database Technology, {EDBT} 2018, Vienna, Austria, March 26-29, 2018}, pages = {445--448}, publisher = {OpenProceedings.org}, year = {2018}, url = {https://doi.org/10.5441/002/edbt.2018.43}, doi = {10.5441/002/EDBT.2018.43}, timestamp = {Fri, 29 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/VoKM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/IyengarKSZ18, author = {Arun Iyengar and Ashish Kundu and Upendra Sharma and Ping Zhang}, title = {A Trusted Healthcare Data Analytics Cloud Platform}, booktitle = {38th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2018, Vienna, Austria, July 2-6, 2018}, pages = {1238--1249}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICDCS.2018.00123}, doi = {10.1109/ICDCS.2018.00123}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/IyengarKSZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/ArshadKBGK18, author = {Muhammad Umer Arshad and Ashish Kundu and Elisa Bertino and Arif Ghafoor and Chinmay Kundu}, title = {Efficient and Scalable Integrity Verification of Data and Query Results for Graph Databases}, booktitle = {34th {IEEE} International Conference on Data Engineering, {ICDE} 2018, Paris, France, April 16-19, 2018}, pages = {1821--1822}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/ICDE.2018.00268}, doi = {10.1109/ICDE.2018.00268}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/ArshadKBGK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/BahramiMBKSK17, author = {Mehdi Bahrami and Abhishek Malvankar and Karan K. Budhraja and Chinmay Kundu and Mukesh Singhal and Ashish Kundu}, editor = {Geoffrey C. Fox}, title = {Compliance-Aware Provisioning of Containers on Cloud}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {696--700}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.95}, doi = {10.1109/CLOUD.2017.95}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/BahramiMBKSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/BudhrajaMBKKS17, author = {Karan K. Budhraja and Abhishek Malvankar and Mehdi Bahrami and Chinmay Kundu and Ashish Kundu and Mukesh Singhal}, editor = {Geoffrey C. Fox}, title = {Risk-Based Packet Routing for Privacy and Compliance-Preserving {SDN}}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {761--765}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.109}, doi = {10.1109/CLOUD.2017.109}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/BudhrajaMBKKS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KunduKB17, author = {Ashish Kundu and Chinmay Kundu and Karan K. Budhraja}, title = {Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress)}, journal = {CoRR}, volume = {abs/1704.03049}, year = {2017}, url = {http://arxiv.org/abs/1704.03049}, eprinttype = {arXiv}, eprint = {1704.03049}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KunduKB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/KunduLH17, author = {Ashish Kundu and Zhiqiang Lin and Joshua Hammond}, title = {Energy Attacks on Mobile Devices}, journal = {CoRR}, volume = {abs/1704.04464}, year = {2017}, url = {http://arxiv.org/abs/1704.04464}, eprinttype = {arXiv}, eprint = {1704.04464}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/KunduLH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1708-03807, author = {Ashish Kundu}, title = {Principle of Need-to-Act}, journal = {CoRR}, volume = {abs/1708.03807}, year = {2017}, url = {http://arxiv.org/abs/1708.03807}, eprinttype = {arXiv}, eprint = {1708.03807}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1708-03807.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ibmrd/BeatyCCDHKMP16, author = {Kirk A. Beaty and J. M. Chow and Renato Luiz de Freitas Cunha and K. K. Das and M. F. Hulber and Ashish Kundu and V. Michelini and E. R. Palmer}, title = {Managing sensitive applications in the public cloud}, journal = {{IBM} J. Res. Dev.}, volume = {60}, number = {2-3}, year = {2016}, url = {https://doi.org/10.1147/JRD.2015.2513720}, doi = {10.1147/JRD.2015.2513720}, timestamp = {Fri, 13 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ibmrd/BeatyCCDHKMP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/KatsunoKDTSDM16, author = {Yasuharu Katsuno and Ashish Kundu and Koushik K. Das and Hitomi Takahashi and Robert Schloss and Prasenjit Dey and Mukesh K. Mohania}, title = {Security, Compliance, and Agile Deployment of Personal Identifiable Information Solutions on a Public Cloud}, booktitle = {9th {IEEE} International Conference on Cloud Computing, {CLOUD} 2016, San Francisco, CA, USA, June 27 - July 2, 2016}, pages = {359--366}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CLOUD.2016.0055}, doi = {10.1109/CLOUD.2016.0055}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/KatsunoKDTSDM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sc/BahramiLSK16, author = {Mehdi Bahrami and Dong Li and Mukesh Singhal and Ashish Kundu}, title = {An Efficient Parallel Implementation of a Light-weight Data Privacy Method for Mobile Cloud Users}, booktitle = {Seventh International Workshop on Data-Intensive Computing in the Clouds, DataCloud@SC 2016, Salt Lake, UT, USA, November 14, 2016}, pages = {51--58}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/DataCloud.2016.011}, doi = {10.1109/DATACLOUD.2016.011}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sc/BahramiLSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/DeshpandeSABK14, author = {Pralhad Deshpande and Shachi Sharma and Arup Acharya and Kirk A. Beaty and Ashish Kundu}, title = {Use-Case Centric Dashboard for Cloud Solutions}, booktitle = {{IEEE} International Conference on Services Computing, {SCC} 2014, Anchorage, AK, USA, June 27 - July 2, 2014}, pages = {840--841}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/SCC.2014.115}, doi = {10.1109/SCC.2014.115}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEscc/DeshpandeSABK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/ArshadKBMG14, author = {Muhammad Umer Arshad and Ashish Kundu and Elisa Bertino and Krishna Madhavan and Arif Ghafoor}, editor = {Elisa Bertino and Ravi S. Sandhu and Jaehong Park}, title = {Security of graph data: hashing schemes and definitions}, booktitle = {Fourth {ACM} Conference on Data and Application Security and Privacy, CODASPY'14, San Antonio, TX, {USA} - March 03 - 05, 2014}, pages = {223--234}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2557547.2557564}, doi = {10.1145/2557547.2557564}, timestamp = {Fri, 13 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/codaspy/ArshadKBMG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/NaikBK14, author = {Vijay K. Naik and Kirk A. Beaty and Ashish Kundu}, title = {Service Usage Metering in Hybrid Cloud Environments}, booktitle = {2014 {IEEE} International Conference on Cloud Engineering, Boston, MA, USA, March 11-14, 2014}, pages = {253--260}, publisher = {{IEEE} Computer Society}, year = {2014}, url = {https://doi.org/10.1109/IC2E.2014.76}, doi = {10.1109/IC2E.2014.76}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/NaikBK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/ChandraLKK14, author = {Swarup Chandra and Zhiqiang Lin and Ashish Kundu and Latifur Khan}, editor = {Jing Tian and Jiwu Jing and Mudhakar Srivatsa}, title = {Towards a Systematic Study of the Covert Channel Attacks in Smartphones}, booktitle = {International Conference on Security and Privacy in Communication Networks - 10th International {ICST} Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {152}, pages = {427--435}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-23829-6\_29}, doi = {10.1007/978-3-319-23829-6\_29}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/ChandraLKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/KunduB13, author = {Ashish Kundu and Elisa Bertino}, title = {Privacy-preserving authentication of trees and graphs}, journal = {Int. J. Inf. Sec.}, volume = {12}, number = {6}, pages = {467--494}, year = {2013}, url = {https://doi.org/10.1007/s10207-013-0198-5}, doi = {10.1007/S10207-013-0198-5}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/KunduB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic2e/BeatyKNA13, author = {Kirk A. Beaty and Ashish Kundu and Vijay K. Naik and Arup Acharya}, title = {Network-Level Access Control Management for the Cloud}, booktitle = {2013 {IEEE} International Conference on Cloud Engineering, {IC2E} 2013, San Francisco, CA, USA, March 25-27, 2013}, pages = {98--107}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IC2E.2013.18}, doi = {10.1109/IC2E.2013.18}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic2e/BeatyKNA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/MidiKB13, author = {Daniele Midi and Ashish Kundu and Elisa Bertino}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Towards Authenticated Objects}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {777--783}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_70}, doi = {10.1007/978-3-642-38631-2\_70}, timestamp = {Tue, 09 Feb 2021 08:50:29 +0100}, biburl = {https://dblp.org/rec/conf/nss/MidiKB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codaspy/KunduAB12, author = {Ashish Kundu and Mikhail J. Atallah and Elisa Bertino}, editor = {Elisa Bertino and Ravi S. Sandhu}, title = {Leakage-free redactable signatures}, booktitle = {Second {ACM} Conference on Data and Application Security and Privacy, {CODASPY} 2012, San Antonio, TX, USA, February 7-9, 2012}, pages = {307--316}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2133601.2133639}, doi = {10.1145/2133601.2133639}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/codaspy/KunduAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/Kundu12, author = {Ashish Kundu}, editor = {Anastasios Kementsietsidis and Marcos Antonio Vaz Salles}, title = {Authentication of Data on Devices}, booktitle = {Workshops Proceedings of the {IEEE} 28th International Conference on Data Engineering, {ICDE} 2012, Arlington, VA, USA, April 1-5, 2012}, pages = {236--242}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/ICDEW.2012.79}, doi = {10.1109/ICDEW.2012.79}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/Kundu12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunduAB12, author = {Ashish Kundu and Mikhail J. Atallah and Elisa Bertino}, title = {Efficient Leakage-free Authentication of Trees, Graphs and Forests}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2012}, url = {http://eprint.iacr.org/2012/036}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunduAB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunduB12, author = {Ashish Kundu and Elisa Bertino}, title = {On Hashing Graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {352}, year = {2012}, url = {http://eprint.iacr.org/2012/352}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunduB12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/KunduB11, author = {Ashish Kundu and Elisa Bertino}, title = {A New Class of Buffer Overflow Attacks}, booktitle = {2011 International Conference on Distributed Computing Systems, {ICDCS} 2011, Minneapolis, Minnesota, USA, June 20-24, 2011}, pages = {730--739}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICDCS.2011.63}, doi = {10.1109/ICDCS.2011.63}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/KunduB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edbt/KunduB10, author = {Ashish Kundu and Elisa Bertino}, editor = {Ioana Manolescu and Stefano Spaccapietra and Jens Teubner and Masaru Kitsuregawa and Alain L{\'{e}}ger and Felix Naumann and Anastasia Ailamaki and Fatma {\"{O}}zcan}, title = {How to authenticate graphs without leaking}, booktitle = {{EDBT} 2010, 13th International Conference on Extending Database Technology, Lausanne, Switzerland, March 22-26, 2010, Proceedings}, series = {{ACM} International Conference Proceeding Series}, volume = {426}, pages = {609--620}, publisher = {{ACM}}, year = {2010}, url = {https://doi.org/10.1145/1739041.1739114}, doi = {10.1145/1739041.1739114}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edbt/KunduB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/Kundu09, author = {Ashish Kundu}, editor = {Sheikh Iqbal Ahamed and Elisa Bertino and Carl K. Chang and Vladimir Getov and Lin Liu and Ming Hua and Rajesh Subramanyan}, title = {{SN2K} Attacks and Honest Services}, booktitle = {Proceedings of the 33rd Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} 2009, Seattle, Washington, USA, July 20-24, 2009. Volume 2}, pages = {445--450}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/COMPSAC.2009.174}, doi = {10.1109/COMPSAC.2009.174}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/Kundu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/AtallahFK08, author = {Mikhail J. Atallah and Greg N. Frederickson and Ashish Kundu}, title = {A tree-covering problem arising in integrity of tree-structured data}, journal = {Inf. Process. Lett.}, volume = {109}, number = {1}, pages = {79--82}, year = {2008}, url = {https://doi.org/10.1016/j.ipl.2008.09.004}, doi = {10.1016/J.IPL.2008.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/AtallahFK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pvldb/KunduB08, author = {Ashish Kundu and Elisa Bertino}, title = {Structural signatures for tree data structures}, journal = {Proc. {VLDB} Endow.}, volume = {1}, number = {1}, pages = {138--150}, year = {2008}, url = {http://www.vldb.org/pvldb/vol1/1453876.pdf}, doi = {10.14778/1453856.1453876}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pvldb/KunduB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsmc/KunduB08, author = {Ashish Kundu and Elisa Bertino}, title = {A New Model for Secure Dissemination of {XML} Content}, journal = {{IEEE} Trans. Syst. Man Cybern. Part {C}}, volume = {38}, number = {3}, pages = {292--301}, year = {2008}, url = {https://doi.org/10.1109/TSMCC.2008.919213}, doi = {10.1109/TSMCC.2008.919213}, timestamp = {Thu, 21 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsmc/KunduB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/AtallahCK08, author = {Mikhail J. Atallah and YounSun Cho and Ashish Kundu}, editor = {Gustavo Alonso and Jos{\'{e}} A. Blakeley and Arbee L. P. Chen}, title = {Efficient Data Authentication in an Environment of Untrusted Third-Party Distributors}, booktitle = {Proceedings of the 24th International Conference on Data Engineering, {ICDE} 2008, April 7-12, 2008, Canc{\'{u}}n, Mexico}, pages = {696--704}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICDE.2008.4497478}, doi = {10.1109/ICDE.2008.4497478}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/AtallahCK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/edoc/KunduB06, author = {Ashish Kundu and Elisa Bertino}, title = {Secure Dissemination of {XML} Content Using Structure-based Routing}, booktitle = {Tenth {IEEE} International Enterprise Distributed Object Computing Conference {(EDOC} 2006), 16-20 October 2006, Hong Kong, China}, pages = {153--164}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/EDOC.2006.46}, doi = {10.1109/EDOC.2006.46}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/edoc/KunduB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/AgarwalCDKKKMMS05, author = {Vikas Agarwal and Girish Chafle and Koustuv Dasgupta and Neeran M. Karnik and Arun Kumar and Ashish Kundu and Anupam Mediratta and Sumit Mittal and Biplav Srivastava}, editor = {Manuela M. Veloso and Subbarao Kambhampati}, title = {Building Applications Using End to End Composition of Web Services}, booktitle = {Proceedings, The Twentieth National Conference on Artificial Intelligence and the Seventeenth Innovative Applications of Artificial Intelligence Conference, July 9-13, 2005, Pittsburgh, Pennsylvania, {USA}}, pages = {1672--1673}, publisher = {{AAAI} Press / The {MIT} Press}, year = {2005}, url = {http://www.aaai.org/Library/AAAI/2005/isd05-002.php}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/aaai/AgarwalCDKKKMMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/AgarwalDKKKMS05, author = {Vikas Agarwal and Koustuv Dasgupta and Neeran M. Karnik and Arun Kumar and Ashish Kundu and Sumit Mittal and Biplav Srivastava}, editor = {Allan Ellis and Tatsuya Hagino}, title = {A service creation environment based on end to end composition of Web services}, booktitle = {Proceedings of the 14th international conference on World Wide Web, {WWW} 2005, Chiba, Japan, May 10-14, 2005}, pages = {128--137}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1060745.1060768}, doi = {10.1145/1060745.1060768}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/www/AgarwalDKKKMS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pervasive/BanavarBCCGGHHHKKKOSSW04, author = {Guruduth Banavar and Lawrence D. Bergman and Richard Cardone and Vianney Chevalier and Yves Gaeremynck and Frederique Giraud and Christine Halverson and Shin'ichi Hirose and Masahiro Hori and Fumihiko Kitayama and Goh Kondoh and Ashish Kundu and Kouichi Ono and Andreas Schade and Danny Soroker and Kim Winz}, title = {An Authoring Technology for Multidevice Web Applications}, journal = {{IEEE} Pervasive Comput.}, volume = {3}, number = {3}, pages = {83--93}, year = {2004}, url = {https://doi.org/10.1109/MPRV.2004.1321033}, doi = {10.1109/MPRV.2004.1321033}, timestamp = {Tue, 31 Mar 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pervasive/BanavarBCCGGHHHKKKOSSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.