The following pages link to Sushil Jajodia (Q209314):
Displaying 50 items.
- Lossless outer joins with incomplete information (Q583910) (← links)
- An algorithm for dynamic data allocation in distributed systems (Q673824) (← links)
- On equivalence of relational and network database models (Q1058312) (← links)
- Surjective stability of units and simple homotopy type (Q1141949) (← links)
- Homotopy classification of lens spaces for one-relator groups with torsion (Q1151631) (← links)
- On 2-dimensional CW-complexes with a single 2-cell (Q1244723) (← links)
- A general framework for time granularity and its application to temporal reasoning. (Q1383352) (← links)
- Intrusion detection in distributed systems. An abstraction-based approach. (Q1418362) (← links)
- Scalable threshold closure (Q1575852) (← links)
- An algebraic representation of calendars (Q1604837) (← links)
- Solving multi-granularity temporal constraint networks (Q1614864) (← links)
- A fragile watermarking scheme for detecting malicious modifications of database relations (Q2489235) (← links)
- Looking into the seeds of time: Discovering temporal patterns in large transaction sets (Q2489249) (← links)
- Unauthorized inferences in semistructured databases (Q2509238) (← links)
- A short technical paper: Determining whether a vote assignment is dominated (Q2638757) (← links)
- (Q2765450) (← links)
- (Q2765458) (← links)
- (Q2777821) (← links)
- An Extension of "Representative Instances and γ-Acyclic Relational Schemes" (Q3026385) (← links)
- Entity-relationship diagrams which are in BCNF (Q3038661) (← links)
- Realizing units as Whitehead torsions in low dimension (Q3042017) (← links)
- (Q3045490) (← links)
- Maintaining replicated authorizations in distributed database systems (Q3122490) (← links)
- (Q3216161) (← links)
- Representative instances and γ-acyclic relational schemes (Q3339329) (← links)
- Flexible support for multiple access control policies (Q3507286) (← links)
- Efficient Security Mechanisms for Overlay Multicast-Based Content Distribution (Q3593129) (← links)
- The Problem of Equivalence for Entity-Relationship Diagrams (Q3659180) (← links)
- A Scheme of Parallel Processing for MIMD Systems (Q3662608) (← links)
- Combinatorial Equivalence between Group Presentations (Q3919885) (← links)
- On the Two-Realizability of Chain Complexes (Q3940491) (← links)
- Spaces Dominated by Two-complexes (Q3952835) (← links)
- (Q4472215) (← links)
- (Q4485446) (← links)
- (Q4530192) (← links)
- Can-Follow Concurrency Control (Q4564227) (← links)
- Enforcing Subscription-Based Authorization Policies in Cloud Scenarios (Q4649767) (← links)
- (Q4782241) (← links)
- (Q4782248) (← links)
- (Q4782263) (← links)
- Consistent policy enforcement in distributed systems using mobile policies (Q4788289) (← links)
- A comparative performance analysis of reliable group rekey transport protocols for secure multicast (Q4788419) (← links)
- (Q4794429) (← links)
- (Q4813531) (← links)
- (Q4817025) (← links)
- (Q4817031) (← links)
- Cardinality-Based Inference Control in Sum-Only Data Cubes (Q5030178) (← links)
- Distributed Computing - IWDC 2003 (Q5191412) (← links)
- Encryption and Fragmentation for Data Confidentiality in the Cloud (Q5253591) (← links)
- An Application-Level Data Transparent Authentication Scheme without Communication Overhead (Q5280735) (← links)