Arshad Jhumka
Title
Cited by
Cited by
Year
Guide to wireless mesh networks
S Misra, SC Misra, I Woungang
Springer, 2009
2532009
An approach for analysing the propagation of data errors in software
M Hiller, A Jhumka, N Suri
2001 International Conference on Dependable Systems and Networks, 161-170, 2001
1232001
EPIC: Profiling the propagation and effect of data errors in software
M Hiller, A Jhumka, N Suri
IEEE Transactions on Computers 53 (5), 512-530, 2004
892004
PROPANE: an environment for examining the propagation of errors in software
M Hiller, A Jhumka, N Suri
ACM SIGSOFT Software Engineering Notes 27 (4), 81-85, 2002
782002
On the placement of software mechanisms for detection of data errors
M Hiller, A Jhumka, N Suri
Proceedings International Conference on Dependable Systems and Networks, 135-144, 2002
672002
On the use of fake sources for source location privacy: Trade-offs between energy and privacy
A Jhumka, M Leeke, S Shrestha
The Computer Journal 54 (6), 860-874, 2011
652011
Assessing inter-modular error propagation in distributed software
A Jhumka, M Hiller, N Suri
Proceedings 20th IEEE Symposium on Reliable Distributed Systems, 152-161, 2001
542001
On the design of mobility-tolerant TDMA-based media access control (MAC) protocol for mobile sensor networks
A Jhumka, S Kulkarni
International Conference on Distributed Computing and Internet Technology, 42-53, 2007
532007
A dependability-driven system-level design approach for embedded systems
A Jhumka, S Klaus, SA Huss
Design, Automation and Test in Europe, 372-377, 2005
522005
Fake source‐based source location privacy in wireless sensor networks
A Jhumka, M Bradbury, M Leeke
Concurrency and Computation: Practice and Experience 27 (12), 2999-3020, 2015
44*2015
Manipulating convention emergence using influencer agents
H Franks, N Griffiths, A Jhumka
Autonomous Agents and Multi-Agent Systems 26 (3), 315-353, 2013
422013
Linking resource usage anomalies with system failures from cluster log data
E Chuah, A Jhumka, S Narasimhamurthy, J Hammond, JC Browne, ...
2013 IEEE 32nd International Symposium on Reliable Distributed Systems, 111-120, 2013
372013
Hybrid online protocols for source location privacy in wireless sensor networks
M Bradbury, A Jhumka, M Leeke
Journal of Parallel and Distributed Computing 115, 67-81, 2018
36*2018
A simple trust model for on-demand routing in mobile ad-hoc networks
N Griffiths, A Jhumka, A Dawson, R Myers
Intelligent Distributed Computing, Systems and Applications, 105-114, 2008
322008
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks
A Jhumka, M Bradbury, S Saginbekov
Journal of Parallel and Distributed Computing 74 (1), 1789-1801, 2014
28*2014
Automating the addition of fail-safe fault-tolerance: Beyond fusion-closed specifications
FC Gärtner, A Jhumka
Formal Techniques, Modelling and Analysis of Timed and Fault-Tolerant …, 2004
242004
An approach to synthesise safe systems
A Jhumka, F Freiling, C Fetzer, N Suri
International Journal of Security and Networks 1 (1-2), 62-74, 2006
222006
Component-based synthesis of dependable embedded software
A Jhumka, M Hiller, N Suri
International Symposium on Formal Techniques in Real-Time and Fault-Tolerant …, 2002
212002
Towards understanding the importance of variables in dependable software
M Leeke, A Jhumka
2010 European Dependable Computing Conference, 85-94, 2010
202010
An approach to specify and test component-based dependable software
A Jhumka, M Hiller, N Suri
7th IEEE International Symposium on High Assurance Systems Engineering, 2002 …, 2002
192002
The system can't perform the operation now. Try again later.
Articles 1–20