28 Publications (Page 1 of 2)
2013
An update-based step-wise optimal cache replacement for wireless data access
Chen, HuiXiao, Yang and Vrbsky, Susan V
Computer Networks, vol. 57, (no. 1), Jan 16, 2013. | Journal Article
2010
Scheduling on-demand data broadcast in mixed-type request environments
Lei, MingVrbsky, Susan V and Xiao, Yang
Computer Networks, vol. 54, (no. 5), Apr 8, 2010. | Journal Article
2009
Building a wireless capturing tool for WiFi
Meng, KeXiao, Yang and Vrbsky, Susan V
Security and Communication Networks, vol. 2, (no. 6), pp. 654-668, 2009. | Journal Article
 
Scheduling on-demand broadcast with timing constraints
Fang, Q.Vrbsky, Susan VLei, M. and Borie, Richard B
Journal of Parallel and Distributed Computing, vol. 69, (no. 8), pp. 737-747, 2009. | Journal Article
 
Using camouflaging mobility to protect privacy in mobile ad hoc networks
Tang, LeiHong, Xiaoyan and Vrbsky, Susan V
Security and Communication Networks, vol. 2, (no. 6), pp. 580-594, 2009. | Journal Article
2008
Scalability study of cache access mechanisms in multiple-cell wireless networks
Chen, HuiXiao, Yang and Vrbsky, Susan V
Computer Networks, vol. 52, (no. 15), Oct 23, 2008. | Journal Article
2005
Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories
Jukic, NenadNestorov, SvetlozarVrbsky, Susan V and Parrish, Allen S
Journal of Database Management, vol. 16, (no. 3), pp. 1-10, Jul-Sep 2005. | Journal Article
 
Improved variable and value ranking techniques for mining categorical traffic accident data
Wang, HuanjingParrish, Allen SSmith, Randy K and Vrbsky, Susan V
Expert Systems with Applications, vol. 29, (no. 4), pp. 795-806, 2005. | Journal Article
 
Optimizing disk storage to support statistical analysis operations
Parrish, Allen SVrbsky, Susan VDixon, Brandon and Ni, Weigang
Decision Support Systems, vol. 38, (no. 4), pp. 621-628, Jan 2005. | Journal Article
 
Variable selection and ranking for analyzing automobile traffic accident data
Wang, HuanjingParrish, Allen SSmith, Randy K and Vrbsky, Susan V
Symposium on Applied Computing: Proceedings of the 2005 ACM symposium on Applied computing; 13-17 Mar. 2005. 2005. | Conference Proceeding
2003
Closing the key loophole in MLS databases
Jukic, NenadNestorov, Svetlozar and Vrbsky, Susan V
ACM SIGMOD Record, vol. 32, (no. 2), pp. 15-20, 2003. | Journal Article
2002
Maintaining security and timeliness in real-time database system
Ahmed, Quazi N and Vrbsky, Susan V
Journal of Systems and Software, vol. 61, (no. 1), pp. 15-29, 2002. | Journal Article
2000
New measure of temporal consistency for derived objects in real-time database systems
Tomic, SasaVrbsky, Susan V and Camp, Tracy Kay
Information Sciences, vol. 124, (no. 1), pp. 139-152, 2000. | Journal Article
 
Triggered updates for temporal consistency in real-time databases
Ahmed, Quazi N and Vrbsky, Susan V
Real-Time Systems, vol. 19, (no. 3), pp. 209-243, 2000. | Journal Article
1999
Belief-consistent multilevel secure relational data model
Jukic, NenadVrbsky, Susan VParrish, Allen SDixon, Brandon and Jukic, Boris
Information Systems, vol. 24, (no. 5), pp. 377-400, 1999. | Journal Article
 
Satisfying temporal consistency constraints of real-time databases
Vrbsky, Susan V and Tomic, Sasa
Journal of Systems and Software, vol. 45, (no. 1), pp. 45-60, 1999. | Journal Article
1998
Implementing persistent data structures using C++
Parrish, Allen SDixon, BrandonCordes, David WVrbsky, Susan V and Lusth, John C
SOFTWARE PRACT EXPER, vol. 28, (no. 15), pp. 1559-1579, 1998. | Journal Article
 
Issues in security for real-time databases
Ahmed, Quazi N and Vrbsky, Susan V
The 1998 36th Annual Southeast Conference; Marietta, GA; USA; 01-03 Apr. 1998. 1998. | Conference Proceeding
 
Issues in security for real-time databases
Ahmed, Quazi N and Vrbsky, Susan V
ACM Southeast Regional Conference: Proceedings of the 36th annual Southeast regional conference. 1998. | Conference Proceeding
 
Joining relations in the belief-consistent multilevel secure relational model
Jukic, Nenad and Vrbsky, Susan V
The 1998 36th Annual Southeast Conference; Marietta, GA; USA; 01-03 Apr. 1998. 1998. | Conference Proceeding
 
Joining relations in the belief-consistent multilevel secure relational model
Jukic, Nenad and Vrbsky, Susan V
ACM Southeast Regional Conference: Proceedings of the 36th annual Southeast regional conference. 1998. | Conference Proceeding
 
Satisfying timing constraints of real-time databases
Vrbsky, Susan V and Tomic, Sasa
Journal of Systems and Software, vol. 41, (no. 1), pp. 63-73, 1998. | Journal Article
1997
Asserting beliefs in MLS relational models
Jukic, Nenad and Vrbsky, Susan V
ACM SIGMOD Record, vol. 26, (no. 3), pp. 30-35, 1997. | Journal Article
1996
Data model for approximate query processing of real-time databases
Vrbsky, Susan V
Data & Knowledge Engineering, vol. 21, (no. 1), pp. 79-102, 1996. | Journal Article
 
Feasibility of aggregates in time constrained queries
Jukic, Nenad and Vrbsky, Susan V
Information Systems, vol. 21, (no. 7), pp. 595-614, 1996. | Journal Article