Follow
Rinku Dewri
Title
Cited by
Cited by
Year
Dynamic security risk management using bayesian attack graphs
N Poolsappasit, R Dewri, I Ray
IEEE Transactions on Dependable and Secure Computing 9 (1), 61-74, 2011
7632011
Optimal security hardening using multi-objective optimization on attack tree models of networks
R Dewri, N Poolsappasit, I Ray, D Whitley
Proceedings of the 14th ACM conference on Computer and communications …, 2007
2542007
Local Differential Perturbations: Location Privacy Under Approximate Knowledge Attackers
R Dewri
IEEE Transactions on Mobile Computing 12 (12), 2360-2372, 2013
1532013
Optimal security hardening on attack tree models of networks: a cost-benefit analysis
R Dewri, I Ray, N Poolsappasit, D Whitley
International Journal of Information Security 11, 167-188, 2012
1162012
Query m-invariance: Preventing query disclosures in continuous location-based services
R Dewri, I Ray, I Ray, D Whitley
2010 Eleventh International Conference on Mobile Data Management, 95-104, 2010
852010
Towards a better understanding of the epoxy-polymerization process using multi-objective evolutionary computation
K Deb, K Mitra, R Dewri, S Majumdar
Chemical engineering science 59 (20), 4261-4277, 2004
812004
Simulating recrystallization through cellular automata and genetic algorithms
R Dewri, N Chakraborti
Modelling and Simulation in Materials Science and Engineering 13 (2), 173, 2004
712004
Inferring trip destinations from driving habits data
R Dewri, P Annadata, W Eltarjaman, R Thurimella
Proceedings of the 12th ACM workshop on Workshop on privacy in the …, 2013
702013
Exploiting service similarity for privacy in location-based search queries
R Dewri, R Thurimella
IEEE Transactions on parallel and distributed systems 25 (2), 374-383, 2013
632013
Towards optimal multi-level tiling for stencil computations
L Renganarayana, M Harthikote-Matha, R Dewri, S Rajopadhye
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
602007
Stochastic-based robust dynamic resource allocation for independent tasks in a heterogeneous computing system
MA Salehi, J Smith, AA Maciejewski, HJ Siegel, EKP Chong, J Apodaca, ...
Journal of Parallel and Distributed Computing 97, 96-111, 2016
522016
On the Optimal Selection of k in the k-Anonymity Problem
R Dewri, I Ray, I Ray, D Whitley
2008 IEEE 24th International Conference on Data Engineering, 1364-1366, 2008
422008
Measuring the robustness of resource allocations in a stochastic dynamic environment
J Smith, LD Briceno, AA Maciejewski, HJ Siegel, T Renner, V Shestak, ...
2007 IEEE International Parallel and Distributed Processing Symposium, 1-10, 2007
332007
Optimizing on-demand data broadcast scheduling in pervasive environments
R Dewri, I Ray, I Ray, D Whitley
Proceedings of the 11th international conference on Extending database …, 2008
282008
Modeling the recrystallization process using inverse cellular automata and genetic algorithms: Studies using differential evolution
TD Rane, R Dewri, S Ghosh, N Chakraborti, K Mitra
Journal of Phase Equilibria and Diffusion 26, 311-321, 2005
262005
Driving habits data: Location privacy implications and solutions
J Bellatti, A Brunner, J Lewis, P Annadata, W Eltarjaman, R Dewri, ...
IEEE Security & Privacy 15 (01), 12-20, 2017
232017
GreenC5: An adaptive, energy-aware collection for green software development
J Michanan, R Dewri, MJ Rutherford
Sustainable Computing: Informatics and Systems 13, 42-60, 2017
202017
Understanding the power-performance tradeoff through pareto analysis of live performance data
J Michanan, R Dewri, MJ Rutherford
International Green Computing Conference, 1-8, 2014
172014
Utility driven optimization of real time data broadcast schedules
R Dewri, I Ray, I Ray, D Whitley
Applied Soft Computing 12 (7), 1832-1846, 2012
172012
Location privacy and attacker knowledge: who are we fighting against?
R Dewri
International Conference on Security and Privacy in Communication Systems …, 2011
172011
The system can't perform the operation now. Try again later.
Articles 1–20