28 Publications (Page 1 of 2)
2013
An update-based step-wise optimal cache replacement for wireless data accessChen, Hui⋅Xiao, Yang and Vrbsky, Susan VComputer Networks, vol. 57, (no. 1), Jan 16, 2013.
| Journal Article
2010
Scheduling on-demand data broadcast in mixed-type request environmentsLei, Ming⋅Vrbsky, Susan V and Xiao, YangComputer Networks, vol. 54, (no. 5), Apr 8, 2010.
| Journal Article
2009
Building a wireless capturing tool for WiFiMeng, Ke⋅Xiao, Yang and Vrbsky, Susan VSecurity and Communication Networks, vol. 2, (no. 6), pp. 654-668, 2009.
| Journal Article
Scheduling on-demand broadcast with timing constraintsFang, Q.⋅Vrbsky, Susan V⋅Lei, M. and Borie, Richard BJournal of Parallel and Distributed Computing, vol. 69, (no. 8), pp. 737-747, 2009.
| Journal Article
Using camouflaging mobility to protect privacy in mobile ad hoc networksTang, Lei⋅Hong, Xiaoyan and Vrbsky, Susan VSecurity and Communication Networks, vol. 2, (no. 6), pp. 580-594, 2009.
| Journal Article
2008
Scalability study of cache access mechanisms in multiple-cell wireless networksChen, Hui⋅Xiao, Yang and Vrbsky, Susan VComputer Networks, vol. 52, (no. 15), Oct 23, 2008.
| Journal Article
2005
Enhancing Database Access Control by Facilitating Non-Key Related Cover StoriesJukic, Nenad⋅Nestorov, Svetlozar⋅Vrbsky, Susan V and Parrish, Allen SJournal of Database Management, vol. 16, (no. 3), pp. 1-10, Jul-Sep 2005.
| Journal Article
2003
Closing the key loophole in MLS databasesJukic, Nenad⋅Nestorov, Svetlozar and Vrbsky, Susan VACM SIGMOD Record, vol. 32, (no. 2), pp. 15-20, 2003.
| Journal Article
2002
Maintaining security and timeliness in real-time database systemAhmed, Quazi N and Vrbsky, Susan VJournal of Systems and Software, vol. 61, (no. 1), pp. 15-29, 2002.
| Journal Article
2000
New measure of temporal consistency for derived objects in real-time database systemsTomic, Sasa⋅Vrbsky, Susan V and Camp, Tracy KayInformation Sciences, vol. 124, (no. 1), pp. 139-152, 2000.
| Journal Article
Triggered updates for temporal consistency in real-time databasesAhmed, Quazi N and Vrbsky, Susan VReal-Time Systems, vol. 19, (no. 3), pp. 209-243, 2000.
| Journal Article
Satisfying temporal consistency constraints of real-time databasesVrbsky, Susan V and Tomic, SasaJournal of Systems and Software, vol. 45, (no. 1), pp. 45-60, 1999.
| Journal Article
Issues in security for real-time databasesAhmed, Quazi N and Vrbsky, Susan VThe 1998 36th Annual Southeast Conference; Marietta, GA; USA; 01-03 Apr. 1998. 1998.
| Conference Proceeding
Issues in security for real-time databasesAhmed, Quazi N and Vrbsky, Susan VACM Southeast Regional Conference: Proceedings of the 36th annual Southeast regional conference. 1998.
| Conference Proceeding
Joining relations in the belief-consistent multilevel secure relational modelJukic, Nenad and Vrbsky, Susan VThe 1998 36th Annual Southeast Conference; Marietta, GA; USA; 01-03 Apr. 1998. 1998.
| Conference Proceeding
Joining relations in the belief-consistent multilevel secure relational modelJukic, Nenad and Vrbsky, Susan VACM Southeast Regional Conference: Proceedings of the 36th annual Southeast regional conference. 1998.
| Conference Proceeding
Satisfying timing constraints of real-time databasesVrbsky, Susan V and Tomic, SasaJournal of Systems and Software, vol. 41, (no. 1), pp. 63-73, 1998.
| Journal Article
1997
Asserting beliefs in MLS relational modelsJukic, Nenad and Vrbsky, Susan VACM SIGMOD Record, vol. 26, (no. 3), pp. 30-35, 1997.
| Journal Article
1996
Data model for approximate query processing of real-time databasesVrbsky, Susan VData & Knowledge Engineering, vol. 21, (no. 1), pp. 79-102, 1996.
| Journal Article
Feasibility of aggregates in time constrained queriesJukic, Nenad and Vrbsky, Susan VInformation Systems, vol. 21, (no. 7), pp. 595-614, 1996.
| Journal Article