Research Output 1998 2019

Filter
Chapter
2018
46 Citations (Scopus)

Specification-based monitoring of cyber-physical systems: A survey on theory, tools and applications

Bartocci, E., Deshmukh, J., Donzé, A., Fainekos, G., Maler, O., Ničković, D. & Sankaranarayanan, S., Jan 1 2018, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag, p. 135-175 41 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10457 LNCS).

Research output: Chapter in Book/Report/Conference proceedingChapter

Monitoring
Specification
Specifications
Discrete Event
Formal Verification
2017

Hardware-aware compilation

Shrivastava, A. & Cai, J., Nov 1 2017, Handbook of Hardware/Software Codesign. Springer Netherlands, p. 795-827 33 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Hardware
Embedded systems
Computer hardware
Costs

RRAM-based hardware security primitives

Yu, S., Sun, X., Liu, R., Wu, H., Pang, Y., Gao, B., Qian, H. & Chen, A., Jan 1 2017, Security Opportunities in Nano Devices and Emerging Technologies. CRC Press, p. 73-92 20 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Hardware
Integrated circuits
Reverse engineering
Intellectual property
Electronic commerce
2016

A secure RFID access control mechanism

Huang, D. & Zhou, Z., Apr 19 2016, Security in RFID and Sensor Networks. CRC Press, p. 237-254 18 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Radio frequency identification (RFID)
Access control
2015
2 Citations (Scopus)

Cloud Security

Xing, T., Xiong, Z., Qian, H., Medhi, D. & Huang, D., Apr 7 2015, Cloud Services, Networking, and Management. wiley, p. 269-294 26 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Intrusion detection
Controllers
Software defined networking
7 Citations (Scopus)

Compact modeling of BTI for circuit reliability analysis

Sutaria, K. B., Velamala, J. B., Ramkumar, A. & Cao, Y., Jan 1 2015, Circuit Design for Reliability. Springer New York, p. 93-119 27 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Reliability analysis
Networks (circuits)
Aging of materials
Temperature
Digital circuits
7 Citations (Scopus)

Compressed spatial hierarchical bitmap (cSHB) indexes for efficiently processing spatial range query workloads

Nagarkar, P., Candan, K. & Bhat, A., 2015, Proceedings of the VLDB Endowment. 12 ed. Association for Computing Machinery, Vol. 8. p. 1382-1393 12 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Query processing
Processing
Planning
Information management
Agglomeration

Introduction

Reis, R., Cao, Y. & Wirth, G., Jan 1 2015, Circuit Design for Reliability. Springer New York, p. 1-4 4 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Networks (circuits)
Integrated circuit design
2011

Data regulation protocol for source-end mitigation of distributed denial of service

Shah, N. & Huang, D., 2011, Network Security, Administration and Management: Advancing Technology and Practice. IGI Global, p. 277-287 11 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Hash functions
Communication
2009
3 Citations (Scopus)

Modeling of gene regulatory network dynamics using threshold logic

Gowda, T., Vrudhula, S. & Kim, S., Mar 2009, Annals of the New York Academy of Sciences. Vol. 1158. p. 71-81 11 p. (Annals of the New York Academy of Sciences; vol. 1158).

Research output: Chapter in Book/Report/Conference proceedingChapter

Threshold logic
Gene Regulatory Networks
Genes
Gene expression
Biological Phenomena
4 Citations (Scopus)

Prediction of pairwise gene interaction using threshold logic

Gowda, T., Vrudhula, S. & Kim, S., Mar 2009, Annals of the New York Academy of Sciences. Vol. 1158. p. 276-286 11 p. (Annals of the New York Academy of Sciences; vol. 1158).

Research output: Chapter in Book/Report/Conference proceedingChapter

Threshold logic
Gene Regulatory Networks
Genes
Melanoma
Computational Biology

Secure multi-path data delivery in sensor networks

Huang, D., 2009, From Problem toward Solution: Wireless Sensor Networks Security. Nova Science Publishers, Inc., p. 107-128 22 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Coding errors
Sensor networks
Telecommunication networks
Communication
2008

ADL-driven Methodologies for Design Automation of Embedded Processors

Mishra, P. & Shrivastava, A., 2008, Processor Description Languages. Elsevier Inc., p. 13-33 21 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Specification languages
Application programs
Automation
Simulators
Memory architecture
2 Citations (Scopus)

Secure and Resilient Routing: Building Blocks for Resilient Network Architectures

Medhi, D. & Huang, D., 2008, Information Assurance. Elsevier Inc., p. 417-448 32 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Network architecture