default search action
Sharad Mehrotra
Person information
- affiliation: University of California, Irvine, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j89]Yiming Lin, Sharad Mehrotra:
PLAQUE: Automated Predicate Learning at Query Time. Proc. ACM Manag. Data 2(1): 46:1-46:25 (2024) - [j88]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Peeyush Gupta, Dhrubajyoti Ghosh:
Prism: Privacy-Preserving and Verifiable Set Computation Over Multi-Owner Secret Shared Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 21(3): 1355-1371 (2024) - [j87]Primal Pappachan, Shufan Zhang, Xi He, Sharad Mehrotra:
Preventing Inferences Through Data Dependencies on Sensitive Data. IEEE Trans. Knowl. Data Eng. 36(10): 5308-5327 (2024) - [c211]Jun Zhang, Jue Wang, Huan Li, Lidan Shou, Ke Chen, Gang Chen, Sharad Mehrotra:
Draft& Verify: Lossless Large Language Model Acceleration via Self-Speculative Decoding. ACL (1) 2024: 11263-11282 - [c210]Vishal Chakraborty, Stacy Ann-Elvy, Sharad Mehrotra, Faisal Nawab, Mohammad Sadoghi, Shantanu Sharma, Nalini Venkatasubramanian, Farhan Saeed:
Data-CASE: Grounding Data Regulations for Compliant Data Processing Systems. EDBT 2024: 108-115 - [c209]Komal Kumari, Sharad Mehrotra, Shantanu Sharma:
Tutorial: Information Leakage from Cryptographic Techniques. ICDCSW 2024: 9-12 - [c208]Zhenhua Huang, Kunhao Li, Shaojie Wang, Zhaohong Jia, Wentao Zhu, Sharad Mehrotra:
SES: Bridging the Gap Between Explainability and Prediction of Graph Neural Networks. ICDE 2024: 2945-2958 - [c207]Shufan Zhang, Xi He, Ashish Kundu, Sharad Mehrotra, Shantanu Sharma:
Secure Normal Form: Mediation Among Cross Cryptographic Leakages in Encrypted Databases. ICDE 2024: 5560-5573 - [c206]Guoxi Wang, Ryan Hildebrant, Andrew Chio, Sharad Mehrotra, Nalini Venkatasubramanian:
BatchIT: Intelligent and Efficient Batching for IoT Workloads at the Edge. NOMS 2024: 1-7 - [c205]GuangXue Zhang, David L. Feldman, Yiming Lin, Sharad Mehrotra, Nalini Venkatasubramanian, Thayer Drew, Kim Sentovich, Owen Veranth:
Water-COLOR: Water-COnservation using a Learning-based Optimized Recommender. SMARTCOMP 2024: 93-100 - [c204]Shlomi Dolev, Komal Kumari, Sharad Mehrotra, Baruch Schieber, Shantanu Sharma:
Brief Announcement: Make Master Private-Keys Secure by Keeping It Public. SSS 2024: 338-343 - [i35]Nada Lahjouji, Sameera Ghayyur, Xi He, Sharad Mehrotra:
ProBE: Proportioning Privacy Budget for Complex Exploratory Decision Support. CoRR abs/2406.15655 (2024) - [i34]Zhenhua Huang, Kunhao Li, Shaojie Wang, Zhaohong Jia, Wentao Zhu, Sharad Mehrotra:
SES: Bridging the Gap Between Explainability and Prediction of Graph Neural Networks. CoRR abs/2407.11358 (2024) - [i33]Zhenhua Huang, Kunhao Li, Shaojie Wang, Zhaohong Jia, Wentao Zhu, Sharad Mehrotra:
Graph Structure Prompt Learning: A Novel Methodology to Improve Performance of Graph Neural Networks. CoRR abs/2407.11361 (2024) - 2023
- [j86]Shanshan Han, Vishal Chakraborty, Michael T. Goodrich, Sharad Mehrotra, Shantanu Sharma:
Veil: A Storage and Communication Efficient Volume-Hiding Algorithm. Proc. ACM Manag. Data 1(4): 265:1-265:27 (2023) - [j85]Andrew Chio, Daokun Jiang, Peeyush Gupta, Georgios Bouloukakis, Roberto Yus, Sharad Mehrotra, Nalini Venkatasubramanian:
SmartSPEC: A framework to generate customizable, semantics-based smart space datasets. Pervasive Mob. Comput. 93: 101809 (2023) - [j84]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, Swagnik Roychoudhury:
Information-Theoretically Secure and Highly Efficient Search and Row Retrieval. Proc. VLDB Endow. 16(10): 2391-2403 (2023) - [j83]Yiming Lin, Sharad Mehrotra:
ZIP: Lazy Imputation during Query Processing. Proc. VLDB Endow. 17(1): 28-40 (2023) - [c203]Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma:
Supporting Complex Query Time Enrichment For Analytics. EDBT 2023: 92-104 - [c202]Abhishek A. Singh, Yinan Zhou, Mohammad Sadoghi, Sharad Mehrotra, Shantanu Sharma, Faisal Nawab:
WedgeBlock: An Off-Chain Secure Logging Platform for Blockchain Applications. EDBT 2023: 526-539 - [c201]Abhishek A. Singh, Aasim Khan, Sharad Mehrotra, Faisal Nawab:
TransEdge: Supporting Efficient Read Queries Across Untrusted Edge Nodes. EDBT 2023: 684-696 - [c200]Indrajit Ray, Bhavani Thuraisingham, Jaideep Vaidya, Sharad Mehrotra, Vijayalakshmi Atluri, Indrakshi Ray, Murat Kantarcioglu, Ramesh Raskar, Babak Salimi, Steve Simske, Nalini Venkatasubramanian, Vivek K. Singh:
SAFE-PASS: Stewardship, Advocacy, Fairness and Empowerment in Privacy, Accountability, Security, and Safety for Vulnerable Groups. SACMAT 2023: 145-155 - [i32]Ahmed Roushdy Elkordy, Yahya H. Ezzeldin, Shanshan Han, Shantanu Sharma, Chaoyang He, Sharad Mehrotra, Salman Avestimehr:
Federated Analytics: A survey. CoRR abs/2302.01326 (2023) - [i31]Abhishek A. Singh, Aasim Khan, Sharad Mehrotra, Faisal Nawab:
TransEdge: Supporting Efficient Read Queries Across Untrusted Edge Nodes. CoRR abs/2302.08019 (2023) - [i30]Vishal Chakraborty, Stacy Ann-Elvy, Sharad Mehrotra, Faisal Nawab, Mohammad Sadoghi, Shantanu Sharma, Nalini Venkatasubramanian, Farhan Saeed:
Data-CASE: Grounding Data Regulations for Compliant Data Processing Systems. CoRR abs/2308.07501 (2023) - [i29]Jun Zhang, Jue Wang, Huan Li, Lidan Shou, Ke Chen, Gang Chen, Sharad Mehrotra:
Draft & Verify: Lossless Large Language Model Acceleration via Self-Speculative Decoding. CoRR abs/2309.08168 (2023) - [i28]Shanshan Han, Vishal Chakraborty, Michael T. Goodrich, Sharad Mehrotra, Shantanu Sharma:
Hiding Access-pattern is Not Enough! Veil: A Storage and Communication Efficient Volume-Hiding Algorithm. CoRR abs/2310.12491 (2023) - [i27]Shantanu Sharma, Yin Li, Sharad Mehrotra, Nisha Panwar, Dhrubajyoti Ghosh, Peeyush Gupta:
Prism: Private Set Intersection and Union with Aggregation over Multi-Owner Outsourced Data. IACR Cryptol. ePrint Arch. 2023: 133 (2023) - 2022
- [j82]Primal Pappachan, Shufan Zhang, Xi He, Sharad Mehrotra:
Don't Be a Tattle-Tale: Preventing Leakages through Data Dependencies on Access Control Protected Data. Proc. VLDB Endow. 15(11): 2437-2449 (2022) - [j81]Sameera Ghayyur, Dhrubajyoti Ghosh, Xi He, Sharad Mehrotra:
MIDE: Accuracy Aware Minimally Invasive Data Exploration For Decision Support. Proc. VLDB Endow. 15(11): 2653-2665 (2022) - [j80]Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Roberto Yus, Yasser Altowim:
JENNER: Just-in-time Enrichment in Query Processing. Proc. VLDB Endow. 15(11): 2666-2678 (2022) - [j79]Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma:
A Case for Enrichment in Data Management Systems. SIGMOD Rec. 51(2): 38-43 (2022) - [j78]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Attestable Sensor Data Capture in IoT Environments. ACM Trans. Internet Things 3(1): 3:1-3:30 (2022) - [j77]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data. IEEE Trans. Knowl. Data Eng. 34(2): 843-864 (2022) - [j76]Roberto Yus, Georgios Bouloukakis, Sharad Mehrotra, Nalini Venkatasubramanian:
The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces. ACM Trans. Internet Techn. 22(3): 76:1-76:33 (2022) - [j75]Shantanu Sharma, Sharad Mehrotra, Nisha Panwar, Nalini Venkatasubramanian, Peeyush Gupta, Shanshan Han, Guoxi Wang:
Quest: Privacy-Preserving Monitoring of Network Data: A System for Organizational Response to Pandemics. IEEE Trans. Serv. Comput. 15(3): 1233-1250 (2022) - [c199]Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Roberto Yus, Nalini Venkatasubramanian:
Sentaur: Sensor Observable Data Model for Smart Spaces. CIKM 2022: 3131-3140 - [c198]Shantanu Sharma, Sharad Mehrotra:
Cryptographic Techniques for Data Processing. COMAD/CODS 2022: 344-347 - [c197]Andrew Chio, Daokun Jiang, Peeyush Gupta, Georgios Bouloukakis, Roberto Yus, Sharad Mehrotra, Nalini Venkatasubramanian:
SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations. PerCom 2022: 152-162 - [c196]Andrew Chio, Daokun Jiang, Peeyush Gupta, Georgios Bouloukakis, Roberto Yus, Sharad Mehrotra, Nalini Venkatasubramanian:
Artifact: SmartSPEC: Customizable Smart Space Datasets via Event-driven Simulations. PerCom Workshops 2022: 183-184 - [c195]Shantanu Sharma, Sharad Mehrotra, Nisha Panwar, Nalini Venkatasubramanian, Peeyush Gupta, Shanshan Han, Guoxi Wang:
QUEST: Privacy-Preserving Monitoring of Network Data. SERVICES 2022: 21 - [i26]Yiming Lin, Sharad Mehrotra:
QUIP: Query-driven Missing Value Imputation. CoRR abs/2204.00108 (2022) - [i25]Primal Pappachan, Shufan Zhang, Xi He, Sharad Mehrotra:
Don't Be a Tattle-Tale: Preventing Leakages through Data Dependencies on Access Control Protected Data. CoRR abs/2207.08757 (2022) - 2021
- [j74]Praveen Venkateswaran, Kyle E. Benson, Chia-Ying Hsieh, Cheng-Hsin Hsu, Sharad Mehrotra, Nalini Venkatasubramanian:
REAM: A Framework for Resource Efficient Adaptive Monitoring of Community Spaces. Pervasive Mob. Comput. 76: 101459 (2021) - [j73]Abdulrahman Alsaudi, Yasser Altowim, Sharad Mehrotra, Yaming Yu:
TQEL: Framework for Query-Driven Linking of Top-K Entities in Social Media Blogs. Proc. VLDB Endow. 14(11): 2642-2654 (2021) - [j72]Yiming Lin, Pramod P. Khargonekar, Sharad Mehrotra, Nalini Venkatasubramanian:
T-Cove: An exposure tracing System based on Cleaning Wi-Fi Events on Organizational Premises. Proc. VLDB Endow. 14(12): 2783-2786 (2021) - [j71]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
CANOPY: A Verifiable Privacy-Preserving Token Ring-Based Communication Protocol for Smart Homes. ACM Trans. Cyber Phys. Syst. 5(1): 3:1-3:34 (2021) - [j70]Shlomi Dolev, Peeyush Gupta, Yin Li, Sharad Mehrotra, Shantanu Sharma:
Privacy-Preserving Secret Shared Computations Using MapReduce. IEEE Trans. Dependable Secur. Comput. 18(4): 1645-1666 (2021) - [j69]Georgios Bouloukakis, Kyle E. Benson, Luca Scalzotto, Paolo Bellavista, Casey Grant, Valérie Issarny, Sharad Mehrotra, Ioannis D. Moscholios, Nalini Venkatasubramanian:
PrioDeX: A Data Exchange Middleware for Efficient Event Prioritization in SDN-Based IoT Systems. ACM Trans. Internet Things 2(3): 19:1-19:32 (2021) - [c194]Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets. EDBT 2021: 277-288 - [c193]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
PRISM: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. SIGMOD Conference 2021: 1116-1128 - [e4]Jayant R. Haritsa, Shourya Roy, Manish Gupta, Sharad Mehrotra, Balaji Vasan Srinivasan, Yogesh Simmhan:
CODS-COMAD 2021: 8th ACM IKDD CODS and 26th COMAD, Virtual Event, Bangalore, India, January 2-4, 2021. ACM 2021, ISBN 978-1-4503-8817-7 [contents] - [i24]Peeyush Gupta, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Concealer: SGX-based Secure, Volume Hiding, and Verifiable Processing of Spatial Time-Series Datasets. CoRR abs/2102.05238 (2021) - [i23]Yin Li, Dhrubajyoti Ghosh, Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Prism: Private Verifiable Set Computation over Multi-Owner Outsourced Databases. CoRR abs/2104.03354 (2021) - [i22]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Attestable Sensor Data Capture in IoT Environments. CoRR abs/2108.02293 (2021) - [i21]Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Mehrotra, Amedeo D'Ascanio:
Contrained Generalization For Data Anonymization - A Systematic Search Based Approach. CoRR abs/2108.04897 (2021) - 2020
- [j68]Peeyush Gupta, Michael J. Carey, Sharad Mehrotra, Roberto Yus:
SmartBench: A Benchmark For Data Management In Smart Spaces. Proc. VLDB Endow. 13(11): 1807-1820 (2020) - [j67]Primal Pappachan, Roberto Yus, Sharad Mehrotra, Johann-Christoph Freytag:
Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems. Proc. VLDB Endow. 13(11): 2424-2437 (2020) - [j66]Yiming Lin, Daokun Jiang, Roberto Yus, Georgios Bouloukakis, Andrew Chio, Sharad Mehrotra, Nalini Venkatasubramanian:
LOCATER: Cleaning WiFi Connectivity Datasets for Semantic Localization. Proc. VLDB Endow. 14(3): 329-341 (2020) - [j65]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta, Anurag Mishra:
PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. ACM Trans. Manag. Inf. Syst. 11(4): 23:1-23:41 (2020) - [c192]Sharad Mehrotra, Shantanu Sharma:
Recent Advances in Information-Theoretically Secure Data Outsourcing. IWSPA@CODASPY 2020: 31-32 - [c191]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. CODASPY 2020: 165-167 - [c190]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CODASPY 2020: 283-294 - [c189]Ios Kotsogiannis, Stelios Doudalis, Samuel Haney, Ashwin Machanavajjhala, Sharad Mehrotra:
One-sided Differential Privacy. ICDE 2020: 493-504 - [c188]Shantanu Sharma, Anton Burtsev, Sharad Mehrotra:
Advances in Cryptography and Secure Hardware for Data Outsourcing. ICDE 2020: 1798-1801 - [c187]Sameera Ghayyur, Primal Pappachan, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Designing privacy preserving data sharing middleware for internet of things. DATA@SenSys 2020: 1-6 - [c186]Joshua Cao, Jesse Chong, Marissa Lafreniere, Owen Yang, Primal Pappachan, Sharad Mehrotra, Nalini Venkatasubramanian:
The ZotBins solution to waste management using internet of things: poster abstract. SenSys 2020: 731-732 - [c185]Michael August, Christopher Davison, Mamadou H. Diallo, Dhrubajyoti Ghosh, Peeyush Gupta, Christopher T. Graves, Shanshan Han, Michael Holstrom, Pramod P. Khargonekar, Megan Kline, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang, Roberto Yus:
A privacy-enabled platform for COVID-19 applications: poster abstract. SenSys 2020: 745-746 - [c184]Praveen Venkateswaran, Cheng-Hsin Hsu, Sharad Mehrotra, Nalini Venkatasubramanian:
REAM: Resource Efficient Adaptive Monitoring of Community Spaces at the Edge Using Reinforcement Learning. SMARTCOMP 2020: 17-24 - [i20]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CoRR abs/2003.04969 (2020) - [i19]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes. CoRR abs/2004.03841 (2020) - [i18]Primal Pappachan, Roberto Yus, Sharad Mehrotra, Johann-Christoph Freytag:
Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems. CoRR abs/2004.07498 (2020) - [i17]Yiming Lin, Daokun Jiang, Roberto Yus, Georgios Bouloukakis, Andrew Chio, Sharad Mehrotra, Nalini Venkatasubramanian:
LOCATER: Cleaning WiFi Connectivity Datasets for Semantic Localization. CoRR abs/2004.09676 (2020) - [i16]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version. CoRR abs/2004.13115 (2020) - [i15]Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets. CoRR abs/2005.02510 (2020) - [i14]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta:
Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. CoRR abs/2005.06154 (2020)
2010 – 2019
- 2019
- [j64]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries. Proc. VLDB Endow. 12(9): 1030-1043 (2019) - [c183]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CODASPY 2019: 49-60 - [c182]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman:
Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud. CODASPY 2019: 165-167 - [c181]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra:
Partitioned Data Security on Outsourced Sensitive and Non-Sensitive Data. ICDE 2019: 650-661 - [c180]Zhenhua Huang, Zhenyu Wang, Rui Zhang, Yangyang Zhao, Xiaohui Xie, Sharad Mehrotra:
Network2Vec: Learning Node Representation Based on Space Mapping in Networks. ICDM Workshops 2019: 727-734 - [c179]Qing Han, Sharad Mehrotra, Nalini Venkatasubramanian:
AquaSCALE - Exploring Resilience of Community Water Infrastructures. Middleware Demos/Posters 2019: 7-8 - [c178]Qing Han, Sharad Mehrotra, Nalini Venkatasubramanian:
AquaEIS: Middleware Support for Event Identification in Community Water Infrastructures. Middleware 2019: 293-305 - [c177]Eun-Jeong Shin, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
SCARF: a scalable data management framework for context-aware applications in smart environments. MobiQuitous 2019: 358-367 - [c176]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. NCA 2019: 1-9 - [c175]Roberto Yus, Georgios Bouloukakis, Sharad Mehrotra, Nalini Venkatasubramanian:
Abstracting Interactions with IoT Devices Towards a Semantic Vision of Smart Spaces. BuildSys@SenSys 2019: 91-100 - [c174]Sumaya Almanee, Georgios Bouloukakis, Daokun Jiang, Sameera Ghayyur, Dhrubajyoti Ghosh, Peeyush Gupta, Yiming Lin, Sharad Mehrotra, Primal Pappachan, Eun-Jeong Shin, Nalini Venkatasubramanian, Guoxi Wang, Roberto Yus:
SemIoTic: Bridging the Semantic Gap in IoT Spaces. BuildSys@SenSys 2019: 352-353 - [c173]Phillip Lee, Eun-Jeong Shin, Valerie Guralnik, Sharad Mehrotra, Nalini Venkatasubramanian, Kevin T. Smith:
Exploring Privacy Breaches and Mitigation Strategies of Occupancy Sensors in Smart Buildings. TESCA 2019: 18-21 - [i13]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CoRR abs/1901.08618 (2019) - [i12]Jue Wang, Ke Chen, Lidan Shou, Sai Wu, Sharad Mehrotra:
Semi-Supervised Few-Shot Learning for Dual Question-Answer Extraction. CoRR abs/1904.03898 (2019) - [i11]Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Lukasz Krzywiecki, Nalini Venkatasubramanian:
Smart Home Survey on Security and Privacy. CoRR abs/1904.05476 (2019) - [i10]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. CoRR abs/1908.10033 (2019) - [i9]Zhenhua Huang, Zhenyu Wang, Rui Zhang, Yangyang Zhao, Xiaohui Xie, Sharad Mehrotra:
Network2Vec Learning Node Representation Based on Space Mapping in Networks. CoRR abs/1910.10379 (2019) - 2018
- [j63]M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos:
On Optimal and Fair Service Allocation in Mobile Cloud Computing. IEEE Trans. Cloud Comput. 6(3): 815-828 (2018) - [j62]Yasser Altowim, Dmitri V. Kalashnikov, Sharad Mehrotra:
ProgressER: Adaptive Progressive Approach to Relational Entity Resolution. ACM Trans. Knowl. Discov. Data 12(3): 33:1-33:45 (2018) - [c172]Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma:
Exploiting Data Sensitivity on Partitioned Data. From Database to Cyber Security 2018: 274-299 - [c171]Mamadou H. Diallo, Nisha Panwar, Roberto Yus, Sharad Mehrotra:
Trustworthy Privacy Policy Translation in Untrusted IoT Environments. IoTBDS 2018: 132-143 - [c170]Luca Scalzotto, Kyle E. Benson, Georgios Bouloukakis, Paolo Bellavista, Valérie Issarny, Sharad Mehrotra, Nalini Venkatasubramanian:
An Implementation Experience with SDN-enabled IoT Data Exchange Middleware. Middleware (Posters) 2018: 21-22 - [c169]Kyle E. Benson, Georgios Bouloukakis, Casey Grant, Valérie Issarny, Sharad Mehrotra, Ioannis D. Moscholios, Nalini Venkatasubramanian:
FireDeX: a Prioritized IoT Data Exchange Middleware for Emergency Response. Middleware 2018: 279-292 - [c168]Mamadou H. Diallo, Nisha Panwar, Sharad Mehrotra, Ardalan Amiri Sani:
Trustworthy Sensing in an Untrusted IoT Environment. PerCom Workshops 2018: 468-471 - [c167]Sameera Ghayyur, Yan Chen, Roberto Yus, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau, Sharad Mehrotra:
IoT-Detective: Analyzing IoT Data Under Differential Privacy. SIGMOD Conference 2018: 1725-1728 - [c166]Qing Han, Ronald T. Eguchi, Sharad Mehrotra, Nalini Venkatasubramanian:
Enabling State Estimation for Fault Identification in Water Distribution Systems Under Large Disasters. SRDS 2018: 161-170 - [i8]Dhrubajyoti Ghosh, Roberto Yus, Yasser Altowim, Sharad Mehrotra:
Progressive Evaluation of Queries over Untagged Data. CoRR abs/1805.12033 (2018) - [i7]Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma:
Exploiting Data Sensitivity on Partitioned Data. CoRR abs/1812.01741 (2018) - [i6]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra:
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. CoRR abs/1812.09233 (2018) - 2017
- [j61]Hotham Altwaijry, Dmitri V. Kalashnikov, Sharad Mehrotra:
QDA: A Query-Driven Approach to Entity Resolution. IEEE Trans. Knowl. Data Eng. 29(2): 402-417 (2017) - [c165]Primal Pappachan, Martin Degeling, Roberto Yus, Anupam Das, Sruti Bhagavatula, William Melicher, Pardis Emami Naeini, Shikun Zhang, Lujo Bauer, Alfred Kobsa, Sharad Mehrotra, Norman M. Sadeh, Nalini Venkatasubramanian:
Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences. ICDCS Workshops 2017: 193-198 - [c164]Kerim Yasin Oktay, Murat Kantarcioglu, Sharad Mehrotra:
Secure and Efficient Query Processing over Hybrid Clouds. ICDE 2017: 733-744 - [c163]Yasser Altowim, Sharad Mehrotra:
Parallel Progressive Approach to Entity Resolution Using MapReduce. ICDE 2017: 909-920 - [c162]Abdulrahman Alsaudi, Mehdi Sadri, Yasser Altowim, Sharad Mehrotra:
Adaptive Topic Follow-Up on Twitter. ICDE 2017: 1385-1386 - [c161]Doudalis Stylianos, Sharad Mehrotra:
SORTaki: A Framework to Integrate Sorting with Differential Private Histogramming Algorithms. PST 2017: 95-104 - [c160]Eun-Jeong Shin, Roberto Yus, Sharad Mehrotra, Nalini Venkatasubramanian:
Exploring fairness in participatory thermal comfort control in smart buildings. BuildSys@SenSys 2017: 19:1-19:10 - [c159]Saeed Mirzamohammadi, Justin A. Chen, Ardalan Amiri Sani, Sharad Mehrotra, Gene Tsudik:
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices. SenSys 2017: 28:1-28:14 - [r8]Iosif Lazaridis, Sharad Mehrotra:
Aggregate Queries, Progressive Approximate. Encyclopedia of GIS 2017: 59-65 - [r7]Iosif Lazaridis, Sharad Mehrotra:
Multi-resolution Aggregate Tree. Encyclopedia of GIS 2017: 1413-1414 - [r6]Iosif Lazaridis, Sharad Mehrotra:
Progressive Approximate Aggregation. Encyclopedia of GIS 2017: 1668 - [i5]Stelios Doudalis, Ios Kotsogiannis, Samuel Haney, Ashwin Machanavajjhala, Sharad Mehrotra:
One-sided Differential Privacy. CoRR abs/1712.05888 (2017) - 2016
- [j60]Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom:
The Beckman report on database research. Commun. ACM 59(2): 92-99 (2016) - [j59]Liyan Zhang, Xikui Wang, Dmitri V. Kalashnikov, Sharad Mehrotra, Deva Ramanan:
Query-Driven Approach to Face Clustering and Tagging. IEEE Trans. Image Process. 25(10): 4504-4513 (2016) - [c158]Mehdi Sadri, Sharad Mehrotra, Yaming Yu:
Online Adaptive Topic Focused Tweet Acquisition. CIKM 2016: 2353-2358 - [c157]Sharad Mehrotra, Alfred Kobsa, Nalini Venkatasubramanian, Siva Raj Rajagopalan:
TIPPERS: A privacy cognizant IoT environment. PerCom Workshops 2016: 1-6 - [p6]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra:
Context Assisted Person identification for Images and Videos. Handbook of Pattern Recognition and Computer Vision 2016: 197-216 - 2015
- [j58]Hotham Altwaijry, Sharad Mehrotra, Dmitri V. Kalashnikov:
QuERy: A Framework for Integrating Entity Resolution with Query Processing. Proc. VLDB Endow. 9(3): 120-131 (2015) - [j57]Jie Xu, Dmitri V. Kalashnikov, Sharad Mehrotra:
Query Aware Determinization of Uncertain Objects. IEEE Trans. Knowl. Data Eng. 27(1): 207-221 (2015) - [j56]Zhenhua Wang, Lidan Shou, Ke Chen, Gang Chen, Sharad Mehrotra:
On Summarization and Timeline Generation for Evolutionary Tweet Streams. IEEE Trans. Knowl. Data Eng. 27(5): 1301-1315 (2015) - [c156]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Building a Mobile Applications Knowledge Base for the Linked Data Cloud. MoDeST@ISWC 2015: 14-25 - [c155]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Mobipedia: Mobile Applications Linked Data. ISWC (Posters & Demos) 2015 - [c154]Kerim Yasin Oktay, Sharad Mehrotra, Vaibhav Khadilkar, Murat Kantarcioglu:
SEMROD: Secure and Efficient MapReduce Over HybriD Clouds. SIGMOD Conference 2015: 153-166 - 2014
- [j55]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra:
Context-assisted face clustering framework with human-in-the-loop. Int. J. Multim. Inf. Retr. 3(2): 69-88 (2014) - [j54]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Multim. Tools Appl. 68(1): 135-158 (2014) - [j53]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra, Ronen Vaisenberg:
Context-based person identification framework for smart video surveillance. Mach. Vis. Appl. 25(7): 1711-1725 (2014) - [j52]Ronen Vaisenberg, Alessio Della Motta, Sharad Mehrotra, Deva Ramanan:
Scheduling sensors for monitoring sentient spaces using an approximate POMDP policy. Pervasive Mob. Comput. 10: 83-103 (2014) - [j51]Sharad Mehrotra:
Front Matter. Proc. VLDB Endow. 7(10): i-xi (2014) - [j50]Yasser Altowim, Dmitri V. Kalashnikov, Sharad Mehrotra:
Progressive Approach to Relational Entity Resolution. Proc. VLDB Endow. 7(11): 999-1010 (2014) - [j49]Daniel J. Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom:
The Beckman Report on Database Research. SIGMOD Rec. 43(3): 61-70 (2014) - [j48]Leila Jalali, Sharad Mehrotra, Nalini Venkatasubramanian:
Simulation integration: using multidatabase systems concepts. Simul. 90(11): 1268-1289 (2014) - [j47]Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubramanian:
Efficient and Reliable Application Layer Multicast for Flash Dissemination. IEEE Trans. Parallel Distributed Syst. 25(10): 2571-2582 (2014) - [c153]Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Secure Computation on Outsourced Data: A 10-year Retrospective. DASFAA (1) 2014: 16-27 - [c152]Jie Xu, Dmitri V. Kalashnikov, Sharad Mehrotra:
Efficient summarization framework for multi-attribute uncertain data. SIGMOD Conference 2014: 421-432 - [p5]Kerim Yasin Oktay, Mahadevan Gomathisankaran, Murat Kantarcioglu, Sharad Mehrotra, Anoop Singhal:
Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing. Secure Cloud Computing 2014: 213-238 - 2013
- [j46]Nabil Adam, Randy Stiles, Andrew Zimdars, Ryan Timmons, Jackie Leung, Greg Stachnick, Jeff Merrick, Robert Coop, Vadim A. Slavin, Tanya Kruglikov, John Galmiche, Sharad Mehrotra:
Consequence analysis of complex events on critical U.S. infrastructure. Commun. ACM 56(6): 83-91 (2013) - [j45]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
A middleware approach for outsourcing data securely. Comput. Secur. 32: 252-266 (2013) - [j44]Sharad Mehrotra:
Letter from the Special Issue Editor. IEEE Data Eng. Bull. 36(3): 2-3 (2013) - [j43]Sharad Mehrotra, Xiaogang Qiu, Zhidong Cao, Austin Tate:
Technological Challenges in Emergency Response. IEEE Intell. Syst. 28(4): 5-8 (2013) - [j42]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
Privacy aware publication of surveillance video. Int. J. Trust. Manag. Comput. Commun. 1(1): 23-51 (2013) - [j41]Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad Mehrotra:
Adaptive Connection Strength Models for Relationship-Based Entity Resolution. ACM J. Data Inf. Qual. 4(2): 8:1-8:22 (2013) - [j40]Hotham Altwaijry, Dmitri V. Kalashnikov, Sharad Mehrotra:
Query-Driven Approach to Entity Resolution. Proc. VLDB Endow. 6(14): 1846-1857 (2013) - [j39]Mayur Deshpande, Kyungbaek Kim, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
ReCREW: A Reliable Flash-Dissemination System. IEEE Trans. Computers 62(7): 1432-1446 (2013) - [c151]Erman Pattuk, Murat Kantarcioglu, Vaibhav Khadilkar, Huseyin Ulusoy, Sharad Mehrotra:
BigSecret: A Secure Data Management Framework for Key-Value Stores. IEEE CLOUD 2013: 147-154 - [c150]Chen Li, Sharad Mehrotra, Liang Jin:
Record Linkage: A 10-Year Retrospective. DASFAA (1) 2013: 3-12 - [c149]Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu, Sharad Mehrotra:
Risk Aware Approach to Data Confidentiality in Cloud Computing. ICISS 2013: 27-42 - [c148]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra:
A unified framework for context assisted face clustering. ICMR 2013: 9-16 - [c147]Ronen Vaisenberg, Alessio Della Motta, Sharad Mehrotra, Deva Ramanan:
Scheduling sensors for monitoring sentient spaces using an approximate POMDP policy. PerCom 2013: 141-150 - [c146]Sharad Mehrotra:
Towards a Risk-Based Approach to Achieving Data Confidentiality in Cloud Computing. Secure Data Management 2013: 42-47 - [i4]M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos:
On Optimal and Fair Service Allocation in Mobile Cloud Computing. CoRR abs/1308.4391 (2013) - 2012
- [j38]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
Adaptive Transformation for Robust Privacy Protection in Video Surveillance. Adv. Multim. 2012: 639649:1-639649:14 (2012) - [j37]Sharad Mehrotra:
Letter from the Special Issue Editor. IEEE Data Eng. Bull. 35(4): 3 (2012) - [j36]Vaibhav Khadilkar, Kerim Yasin Oktay, Murat Kantarcioglu, Sharad Mehrotra:
Secure Data Processing over Hybrid Clouds. IEEE Data Eng. Bull. 35(4): 46-54 (2012) - [j35]Grit Denker, Nikil D. Dutt, Sharad Mehrotra, Mark-Oliver Stehr, Carolyn L. Talcott, Nalini Venkatasubramanian:
Resilient dependable cyber-physical systems: a middleware perspective. J. Internet Serv. Appl. 3(1): 41-49 (2012) - [j34]Pradeep K. Atrey, Sabu Emmanuel, Sharad Mehrotra, Mohan S. Kankanhalli:
Guest editorial: Privacy-aware multimedia surveillance systems. Multim. Syst. 18(2): 95-97 (2012) - [j33]Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad Mehrotra, Yaming Yu:
Attribute and object selection queries on objects with probabilistic attributes. ACM Trans. Database Syst. 37(1): 3:1-3:41 (2012) - [j32]Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad Mehrotra:
Exploiting Web querying for Web people search. ACM Trans. Database Syst. 37(1): 7:1-7:41 (2012) - [j31]Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats. IEEE Trans. Parallel Distributed Syst. 23(5): 844-852 (2012) - [j30]Bijit Hore, Sharad Mehrotra, Mustafa Canim, Murat Kantarcioglu:
Secure multidimensional range queries over outsourced data. VLDB J. 21(3): 333-358 (2012) - [c145]Kerim Yasin Oktay, Vaibhav Khadilkar, Bijit Hore, Murat Kantarcioglu, Sharad Mehrotra, Bhavani Thuraisingham:
Risk-Aware Workload Distribution in Hybrid Clouds. IEEE CLOUD 2012: 229-236 - [c144]Mamadou H. Diallo, Bijit Hore, Ee-Chien Chang, Sharad Mehrotra, Nalini Venkatasubramanian:
CloudProtect: Managing Data Privacy in Cloud Applications. IEEE CLOUD 2012: 303-310 - [c143]Nabil Adam, Jayan Eledath, Sharad Mehrotra, Nalini Venkatasubramanian:
Social media alert and response to threats to citizens (SMART-C). CollaborateCom 2012: 181-189 - [c142]Bijit Hore, Ee-Chien Chang, Mamadou H. Diallo, Sharad Mehrotra:
Indexing Encrypted Documents for Supporting Efficient Keyword Search. Secure Data Management 2012: 93-110 - [c141]Chunwang Zhang, Junjie Jin, Ee-Chien Chang, Sharad Mehrotra:
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services. Secure Data Management 2012: 111-129 - [c140]Leila Jalali, Carolyn L. Talcott, Nalini Venkatasubramanian, Sharad Mehrotra:
Formal specification of multisimulations using Maude. SpringSim (TMS-DEVS) 2012: 22 - [c139]M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos:
MAPCloud: Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture. UCC 2012: 83-90 - 2011
- [j29]Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian, Kent E. Seamons:
DataVault: secure mobile access and data sharing. Netw. Secur. 2011(5): 16-19 (2011) - [j28]Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian:
Protecting personal data from untrusted web-based data services. Netw. Secur. 2011(9): 11-16 (2011) - [j27]Dmitri V. Kalashnikov, Sharad Mehrotra, Jie Xu, Nalini Venkatasubramanian:
A Semantics-Based Approach for Speech Annotation of Images. IEEE Trans. Knowl. Data Eng. 23(9): 1373-1387 (2011) - [c138]Leila Jalali, Sharad Mehrotra, Nalini Venkatasubramanian:
Multisimulations: Towards Next Generation Integrated Simulation Environments. Formal Modeling: Actors, Open Systems, Biological Systems 2011: 352-367 - [c137]Sai Wu, Feng Li, Sharad Mehrotra, Beng Chin Ooi:
Query optimization for massively parallel data processing. SoCC 2011: 12 - [c136]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
Anonymous surveillance. ICME 2011: 1-6 - [c135]Jinsu Wang, Sharad Mehrotra, Kyungbaek Kim, Nalini Venkatasubramanian:
Enhancing cellular infrastructures: a reflective approach. ARM@Middleware 2011: 7-13 - [c134]Pinaki Sinha, Sharad Mehrotra, Ramesh C. Jain:
Summarization of personal photologs using multidimensional content and context. ICMR 2011: 4 - [c133]Liyan Zhang, Ronen Vaisenberg, Sharad Mehrotra, Dmitri V. Kalashnikov:
Video entity resolution: Applying ER techniques for Smart Video Surveillance. PerCom Workshops 2011: 26-31 - [c132]Pinaki Sinha, Sharad Mehrotra, Ramesh C. Jain:
Effective summarization of large collections of personal photos. WWW (Companion Volume) 2011: 127-128 - [r5]Hakan Hacigümüs, Bijit Hore, Sharad Mehrotra:
Privacy of Outsourced Data. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 965-969 - [r4]Ali Bagherzandi, Bijit Hore, Sharad Mehrotra:
Search over Encrypted Data. Encyclopedia of Cryptography and Security (2nd Ed.) 2011: 1088-1093 - [i3]Vaibhav Khadilkar, Murat Kantarcioglu, Bhavani Thuraisingham, Sharad Mehrotra:
Secure Data Processing in a Hybrid Cloud. CoRR abs/1105.1982 (2011) - 2010
- [j26]Ronen Vaisenberg, Sharad Mehrotra, Deva Ramanan:
SEMARTCam scheduler: semantics driven real-time data collection from indoor camera networks to maximize event detection. J. Real Time Image Process. 5(4): 215-230 (2010) - [j25]Mustafa Canim, Murat Kantarcioglu, Bijit Hore, Sharad Mehrotra:
Building Disclosure Risk Aware Query Optimizers for Relational Databases. Proc. VLDB Endow. 3(1): 13-24 (2010) - [c131]Vidhya Balasubramanian, Dmitri V. Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian:
Efficient and scalable multi-geography route planning. EDBT 2010: 394-405 - [c130]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Sabu Emmanuel, Mohan S. Kankanhalli:
Privacy modeling for video data publication. ICME 2010: 60-65 - [c129]Naveen Ashish, Sharad Mehrotra:
Community driven data integration for emergency response. ISCRAM 2010 - [c128]Leila Jalali, Sharad Mehrotra, Nalini Venkatasubramanian:
Middleware solutions for integrated simulation environments. Middleware Doctoral Symposium 2010: 2-7 - [c127]Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubramanian:
FaReCast: Fast, Reliable Application Layer Multicast for Flash Dissemination. Middleware 2010: 169-190 - [c126]Stefano Bonetti, Sharad Mehrotra, Nalini Venkatasubramanian:
Exploring quality in multisensor pervasive systems - a localization case study. PerCom Workshops 2010: 81-86 - [c125]Christopher Davison, Daniel Massaguer, Lilia Paradis, M. Reza Rahimi, Bo Xing, Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian:
Practical experiences in enabling and ensuring quality sensing in emergency response applications. PerCom Workshops 2010: 388-393 - [c124]Bo Xing, Mayur Deshpande, Sharad Mehrotra, Nalini Venkatasubramanian:
Gateway designation for timely communications in instant mesh networks. PerCom Workshops 2010: 564-569 - [c123]Bo Xing, Sharad Mehrotra, Nalini Venkatasubramanian:
Disruption-Tolerant Spatial Dissemination. SECON 2010: 403-411 - [e3]Feifei Li, Mirella M. Moro, Shahram Ghandeharizadeh, Jayant R. Haritsa, Gerhard Weikum, Michael J. Carey, Fabio Casati, Edward Y. Chang, Ioana Manolescu, Sharad Mehrotra, Umeshwar Dayal, Vassilis J. Tsotras:
Proceedings of the 26th International Conference on Data Engineering, ICDE 2010, March 1-6, 2010, Long Beach, California, USA. IEEE Computer Society 2010, ISBN 978-1-4244-5444-0 [contents]
2000 – 2009
- 2009
- [j24]Iosif Lazaridis, Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian:
Fault Tolerant Evaluation of Continuous Selection Queries over Sensor Data. Int. J. Distributed Sens. Networks 5(4): 338-360 (2009) - [c122]Naveen Ashish, Sharad Mehrotra, Pouria Pirzadeh:
XAR: An Integrated Framework for Information Extraction. CSIE (4) 2009: 462-466 - [c121]Hojjat Jafarpour, Sharad Mehrotra, Nalini Venkatasubramanian, Mirko Montanari:
MICS: an efficient content space representation model for publish/subscribe systems. DEBS 2009 - [c120]Chaitanya Desai, Dmitri V. Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian:
Using Semantics for Speech Annotation of Images. ICDE 2009: 1227-1230 - [c119]Dmitri V. Kalashnikov, Zhaoqi Chen, Rabia Nuray-Turan, Sharad Mehrotra, Zheng Zhang:
WEST: Modern Technologies for Web People Search. ICDE 2009: 1487-1490 - [c118]Bo Xing, Sharad Mehrotra, Nalini Venkatasubramanian:
RADcast: Enabling Reliability Guarantees for Content Dissemination in Ad Hoc Networks. INFOCOM 2009: 1998-2006 - [c117]Naveen Ashish, Jay Lickfett, Sharad Mehrotra, Nalini Venkatasubramanian:
The software EBox: Integrated information for situational awareness. ISI 2009: 77-82 - [c116]Ronen Vaisenberg, Ramesh C. Jain, Sharad Mehrotra:
SMPL, a Specification Based Framework for the Semantic Structure, Annotation and Control of SMIL Documents. ISM 2009: 533-539 - [c115]Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian:
A semantic approach for building pervasive spaces. Middleware Doctoral Symposium 2009: 2:1-2:6 - [c114]Leila Jalali, Nalini Venkatasubramanian, Sharad Mehrotra:
A reflective middleware architecture for simulation integration. ARM 2009: 3 - [c113]Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
CCD: Efficient Customized Content Dissemination in Distributed Publish/Subscribe. Middleware 2009: 62-82 - [c112]Daniel Massaguer, Bijit Hore, Mamadou H. Diallo, Sharad Mehrotra, Nalini Venkatasubramanian:
Middleware for Pervasive Spaces: Balancing Privacy and Utility. Middleware 2009: 247-267 - [c111]Bijit Hore, Jehan Wickramasuriya, Sharad Mehrotra, Nalini Venkatasubramanian, Daniel Massaguer:
Privacy-Preserving Event Detection in Pervasive Spaces. PerCom 2009: 1-10 - [c110]Hojjat Jafarpour, Sharad Mehrotra, Nalini Venkatasubramanian:
Dynamic Load Balancing for Cluster-Based Publish/Subscribe System. SAINT 2009: 57-63 - [c109]Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotra:
Exploiting context analysis for combining multiple entity resolution systems. SIGMOD Conference 2009: 207-218 - [p4]Naveen Ashish, Sharad Mehrotra:
Xar. Cases on Semantic Interoperability for Information Systems Integration 2009: 235-254 - [i2]Naveen Ashish, Dmitri V. Kalashnikov, Sharad Mehrotra, Nalini Venkatasubramanian:
An Event Based Approach To Situational Representation. CoRR abs/0906.4096 (2009) - [i1]Naveen Ashish, Sharad Mehrotra, Pouria Pirzadeh:
Incorporating Integrity Constraints in Uncertain Databases. CoRR abs/0907.1632 (2009) - 2008
- [j23]Sharad Mehrotra, Taieb Znati, Craig W. Thompson:
Crisis Management. IEEE Internet Comput. 12(1): 14-17 (2008) - [j22]Yiming Ma, Dmitri V. Kalashnikov, Sharad Mehrotra:
Toward Managing Uncertain Spatial Information for Situational Awareness Applications. IEEE Trans. Knowl. Data Eng. 20(10): 1408-1423 (2008) - [j21]Dmitri V. Kalashnikov, Zhaoqi Chen, Sharad Mehrotra, Rabia Nuray-Turan:
Web People Search via Connection Analysis. IEEE Trans. Knowl. Data Eng. 20(11): 1550-1565 (2008) - [c108]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
iDataGuard: middleware providing a secure network drive interface to untrusted internet data storage. EDBT 2008: 710-714 - [c107]Ronen Vaisenberg, Arjun Satish, Keith A. Mogensen, Ramesh C. Jain, Sharad Mehrotra:
A new approach for adding browser functionality. Hypertext 2008: 247-248 - [c106]Ramaswamy Hariharan, Bijit Hore, Sharad Mehrotra:
Discovering gis sources on the web using summaries. JCDL 2008: 94-103 - [c105]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
iDataGuard: an interoperable security middleware for untrusted internet data storage. Middleware (Companion) 2008: 36-41 - [c104]Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
Subscription Subsumption Evaluation for Content-Based Publish/Subscribe Systems. Middleware 2008: 62-81 - [c103]Hojjat Jafarpour, Sharad Mehrotra, Nalini Venkatasubramanian:
A Fast and Robust Content-based Publish/Subscribe Architecture. NCA 2008: 52-59 - [c102]Dmitri V. Kalashnikov, Rabia Nuray-Turan, Sharad Mehrotra:
Towards breaking the quality curse.: a web-querying approach to web people search. SIGIR 2008: 27-34 - [p3]Bijit Hore, Sharad Mehrotra, Hakan Hacigümüs:
Managing and Querying Encrypted Data. Handbook of Database Security 2008: 163-190 - [p2]Yiming Ma, Dawit Yimam Seid, Sharad Mehrotra:
Automated Filtering on Data Streaming for Intelligence Analysis. Intelligence and Security Informatics 2008: 199-213 - [r3]Iosif Lazaridis, Sharad Mehrotra:
Aggregate Queries, Progressive Approximate. Encyclopedia of GIS 2008: 11-16 - [r2]Iosif Lazaridis, Sharad Mehrotra:
Multi-Resolution Aggregate Tree. Encyclopedia of GIS 2008: 764-765 - [r1]Iosif Lazaridis, Sharad Mehrotra:
Progressive Approximate Aggregation. Encyclopedia of GIS 2008: 918 - 2007
- [j20]Dawit Yimam Seid, Sharad Mehrotra:
Aggregate Query Processing for Semantic Web Databases: an Algebraic Approach. Int. J. Semantic Comput. 1(4): 479-495 (2007) - [j19]Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian:
Application-aware integration of data collection and power management in wireless sensor networks. J. Parallel Distributed Comput. 67(9): 992-1006 (2007) - [c101]Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad Mehrotra:
Self-tuning in Graph-Based Reference Disambiguation. DASFAA 2007: 325-336 - [c100]Yiming Ma, Sharad Mehrotra:
Integrating Similarity Retrieval and Skyline Exploration Via Relevance Feedback. DASFAA 2007: 1045-1049 - [c99]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
gVault: A Gmail Based Cryptographic Network File System. DBSec 2007: 161-176 - [c98]Jinsu Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
PBCA - Prediction Based Channel Allocation. GLOBECOM 2007: 4801-4806 - [c97]Mayur Deshpande, Abhishek Amit, Mason Chang, Nalini Venkatasubramanian, Sharad Mehrotra:
Flashback: A Peer-to-PeerWeb Server for Flash Crowds. ICDCS 2007: 15 - [c96]Dmitri V. Kalashnikov, Sharad Mehrotra, Zhaoqi Chen, Rabia Nuray-Turan, Naveen Ashish:
Disambiguation Algorithm for People Search on the Web. ICDE 2007: 1258-1260 - [c95]Mirko Montanari, Sharad Mehrotra, Nalini Venkatasubramanian:
Architecture for an Automatic Customized Warning System. ISI 2007: 32-39 - [c94]Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariharan, Sharad Mehrotra, Nalini Venkatasubramanian, Naveen Ashish, Jay Lickfett:
On-Demand Information Portals for Disaster Situations. ISI 2007: 133-136 - [c93]Bijit Hore, Hojjat Jafarpour, Ramesh C. Jain, Shengyue Ji, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian, Utz Westermann:
Design and Implementation of a Middleware for Sentient Spaces. ISI 2007: 137-144 - [c92]Dawit Yimam Seid, Sharad Mehrotra:
Semantically Ranked Graph Pattern Queries for Link Analysis. ISI 2007: 296-299 - [c91]Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotra:
Adaptive graphical approach to entity resolution. JCDL 2007: 204-213 - [c90]Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Mehrotra:
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach. SDM 2007: 497-502 - [c89]Dawit Yimam Seid, Sharad Mehrotra:
Grouping and Aggregate queries Over Semantic Web Databases. ICSC 2007: 775-782 - [c88]Iosif Lazaridis, Sharad Mehrotra:
Optimization of multi-version expensive predicates. SIGMOD Conference 2007: 797-808 - [c87]Ramaswamy Hariharan, Bijit Hore, Chen Li, Sharad Mehrotra:
Processing Spatial-Keyword (SK) Queries in Geographic Information Retrieval (GIR) Systems. SSDBM 2007: 16 - [c86]Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubramanian:
Sensor Scheduling for Aggregate Monitoring inWireless Sensor Networks. SSDBM 2007: 24 - [c85]Bo Xing, Mayur Deshpande, Nalini Venkatasubramanian, Sharad Mehrotra, D. Bren:
Towards Reliable Application Data Broadcast in Wireless Ad Hoc Networks. WCNC 2007: 4063-4068 - [p1]Hakan Hacigümüs, Bijit Hore, Balakrishna R. Iyer, Sharad Mehrotra:
Search on Encrypted Data. Secure Data Management in Decentralized Systems 2007: 383-425 - 2006
- [j18]Dmitri V. Kalashnikov, Sharad Mehrotra:
Domain-independent data cleaning via analysis of entity-relationship graph. ACM Trans. Database Syst. 31(2): 716-767 (2006) - [j17]Chen Li, Liang Jin, Sharad Mehrotra:
Supporting Efficient Record Linkage for Large Data Sets Using Mapping Techniques. World Wide Web 9(4): 557-584 (2006) - [c84]Ravi Chandra Jammalamadaka, Timothy W. van der Horst, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
Delegate: A Proxy Based Architecture for Secure Website Access from an Untrusted Machine. ACSAC 2006: 57-66 - [c83]Daniel Massaguer, Vidhya Balasubramanian, Sharad Mehrotra, Nalini Venkatasubramanian:
Synthetic humans in emergency response drills. AAMAS 2006: 1469-1470 - [c82]Qi Zhong, Iosif Lazaridis, Mayur Deshpande, Chen Li, Sharad Mehrotra, Hal S. Stern:
Supporting Approximate Similarity Queries with Quality Guarantees in P2P Systems. COMAD 2006: 60-71 - [c81]Iosif Lazaridis, Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian:
Fault-Tolerant Queries over Sensor Data. COMAD 2006: 104-115 - [c80]Yiming Ma, Sharad Mehrotra, Dawit Yimam Seid, Qi Zhong:
RAF: An Activation Framework for Refining Similarity Queries Using Learning Techniques. DASFAA 2006: 587-601 - [c79]Dmitri V. Kalashnikov, Yiming Ma, Sharad Mehrotra, Ramaswamy Hariharan, Nalini Venkatasubramanian, Naveen Ashish:
SAT: Spatial Awareness from Textual Input. EDBT 2006: 1159-1163 - [c78]Dmitri V. Kalashnikov, Yiming Ma, Sharad Mehrotra, Ramaswamy Hariharan, Carter T. Butts:
Modeling and querying uncertain spatial information for situational awareness applications. GIS 2006: 131-138 - [c77]Dmitri V. Kalashnikov, Yiming Ma, Sharad Mehrotra, Ramaswamy Hariharan:
Index for fast retrieval of uncertain spatial point data. GIS 2006: 195-202 - [c76]Mayur Deshpande, Nalini Venkatasubramanian, Sharad Mehrotra:
Heuristics for Flash-Dissemination in Heterogenous Networks. HiPC 2006: 607-618 - [c75]Mayur Deshpande, Bo Xing, Iosif Lazaridis, Bijit Hore, Nalini Venkatasubramanian, Sharad Mehrotra:
CREW: A Gossip-based Flash-Dissemination System. ICDCS 2006: 45 - [c74]Ravi Chandra Jammalamadaka, Sharad Mehrotra:
Querying Encrypted XML Documents. IDEAS 2006: 129-136 - [c73]Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubramanian:
SURCH: Distributed Aggregation over Wireless Sensor Networks. IDEAS 2006: 158-165 - [c72]Vidhya Balasubramanian, Daniel Massaguer, Sharad Mehrotra, Nalini Venkatasubramanian:
DrillSim: A Simulation Framework for Emergency Response Drills. ISI 2006: 237-248 - [e2]Sharad Mehrotra, Daniel Dajun Zeng, Hsinchun Chen, Bhavani Thuraisingham, Fei-Yue Wang:
Intelligence and Security Informatics, IEEE International Conference on Intelligence and Security Informatics, ISI 2006, San Diego, CA, USA, May 23-24, 2006, Proceedings. Lecture Notes in Computer Science 3975, Springer 2006, ISBN 3-540-34478-0 [contents] - 2005
- [c71]Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Query Optimization in Encrypted Database Systems. DASFAA 2005: 43-55 - [c70]Ramaswamy Hariharan, Michal Shmueli-Scheuer, Chen Li, Sharad Mehrotra:
Quality-driven approximate methods for integrating GIS data. GIS 2005: 97-104 - [c69]Zhaoqi Chen, Dmitri V. Kalashnikov, Sharad Mehrotra:
Exploiting relationships for object consolidation. IQIS 2005: 47-58 - [c68]Qi Han, Iosif Lazaridis, Sharad Mehrotra, Nalini Venkatasubramanian:
Sensor Data Collection with Expected Reliability Guarantees. PerCom Workshops 2005: 374-378 - [c67]Dmitri V. Kalashnikov, Sharad Mehrotra, Zhaoqi Chen:
Exploiting Relationships for Domain-Independent Data Cleaning. SDM 2005: 262-273 - [c66]Hakan Hacigümüs, Sharad Mehrotra:
Efficient Key Updates in Encrypted Database Systems. Secure Data Management 2005: 1-15 - [c65]Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian:
Pvault: a client server system providing mobile access to personal data. StorageSS 2005: 123-129 - 2004
- [j16]Michael Ortega-Binderberger, Sharad Mehrotra:
Relevance feedback techniques in the MARS image retrieval system. Multim. Syst. 9(6): 535-547 (2004) - [j15]Iosif Lazaridis, Qi Han, Xingbo Yu, Sharad Mehrotra, Nalini Venkatasubramanian, Dmitri V. Kalashnikov, Weiwen Yang:
QUASAR: quality aware sensing architecture. SIGMOD Rec. 33(1): 26-31 (2004) - [j14]Kaushik Chakrabarti, Michael Ortega-Binderberger, Sharad Mehrotra, Kriengkrai Porkaew:
Evaluating Refined Queries in Top-k Retrieval Systems. IEEE Trans. Knowl. Data Eng. 16(2): 256-270 (2004) - [c64]Yiming Ma, Qi Zhong, Sharad Mehrotra, Dawit Yimam Seid:
A framework for refining similarity queries using learning techniques. CIKM 2004: 158-159 - [c63]Bijit Hore, Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Indexing text data under space constraints. CIKM 2004: 198-207 - [c62]Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Efficient Execution of Aggregation Queries over Encrypted Relational Databases. DASFAA 2004: 125-136 - [c61]Hakan Hacigümüs, Sharad Mehrotra:
Performance-Conscious Key Management in Encrypted Databases. DBSec 2004: 95-109 - [c60]Balakrishna R. Iyer, Sharad Mehrotra, Einar Mykletun, Gene Tsudik, Yonghua Wu:
A Framework for Efficient Storage Security in RDBMS. EDBT 2004: 147-164 - [c59]Qi Han, Sharad Mehrotra, Nalini Venkatasubramanian:
Energy Efficient Data Collection in Distributed Sensor Environments. ICDCS 2004: 590-597 - [c58]Iosif Lazaridis, Sharad Mehrotra:
Approximate Selection Queries over Imprecise Data. ICDE 2004: 140-151 - [c57]Dawit Yimam Seid, Sharad Mehrotra:
Efficient Relationship Pattern Mining Using Multi-Relational Iceberg-Cubes. ICDM 2004: 515-518 - [c56]Jehan Wickramasuriya, Mahesh Datt, Sharad Mehrotra, Nalini Venkatasubramanian:
Privacy protecting data collection in media spaces. ACM Multimedia 2004: 48-55 - [c55]Sharad Mehrotra, Carter T. Butts, Dmitri V. Kalashnikov, Nalini Venkatasubramanian, Kemal Altintas, Ramaswamy Hariharan, Haimin Lee, Yiming Ma, Amnon Meyers, Jehan Wickramasuriya, Ron Eguchi, Charles Huyck:
CAMAS: A Citizen Awareness System for Crisis Mitigation. SIGMOD Conference 2004: 955-956 - [c54]Bijit Hore, Sharad Mehrotra, Gene Tsudik:
A Privacy-Preserving Index for Range Queries. VLDB 2004: 720-731 - 2003
- [c53]Liang Jin, Chen Li, Sharad Mehrotra:
Efficient Record Linkage in Large Data Sets. DASFAA 2003: 137-146 - [c52]Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Ensuring the Integrity of Encrypted Databases in the Database-as-a-Service Model. DBSec 2003: 61-74 - [c51]Xingbo Yu, Sharad Mehrotra:
Capturing Uncertainty in Spatial Queries over Imprecise Data. DEXA 2003: 192-201 - [c50]Iosif Lazaridis, Sharad Mehrotra:
Capturing Sensor-Generated Time Series with Quality Guarantees. ICDE 2003: 429-440 - [c49]Michael Ortega-Binderberger, Kaushik Chakrabarti, Sharad Mehrotra:
Efficient Evaluation of Relevance Feedback for Multidimensional All-pairs Retrieval. SAC 2003: 847-852 - 2002
- [j13]Kaushik Chakrabarti, Eamonn J. Keogh, Sharad Mehrotra, Michael J. Pazzani:
Locally adaptive dimensionality reduction for indexing large time series databases. ACM Trans. Database Syst. 27(2): 188-228 (2002) - [c48]Michael Ortega-Binderberger, Kaushik Chakrabarti, Sharad Mehrotra:
An Approach to Integrating Query Refinement in SQL. EDBT 2002: 15-33 - [c47]Iosif Lazaridis, Kriengkrai Porkaew, Sharad Mehrotra:
Dynamic Queries over Mobile Objects. EDBT 2002: 269-286 - [c46]Hakan Hacigümüs, Sharad Mehrotra, Balakrishna R. Iyer:
Providing Database as a Service. ICDE 2002: 29-38 - [c45]Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Encrypted Database Integrity in Database Service Provider Model. Certification and Security in E-Services 2002: 165-174 - [c44]Hakan Hacigümüs, Balakrishna R. Iyer, Chen Li, Sharad Mehrotra:
Executing SQL over encrypted data in the database-service-provider model. SIGMOD Conference 2002: 216-227 - 2001
- [j12]Kaushik Chakrabarti, Michael Ortega, Kriengkrai Porkaew, Sharad Mehrotra:
Query Refinement in Similarity Retrieval Systems. IEEE Data Eng. Bull. 24(3): 3-13 (2001) - [j11]Sharad Mehrotra, Rajeev Rastogi, Yuri Breitbart, Henry F. Korth, Abraham Silberschatz:
Overcoming Heterogeneity and Autonomy in Multidatabase Systems. Inf. Comput. 167(2): 137-172 (2001) - [j10]Eamonn J. Keogh, Kaushik Chakrabarti, Michael J. Pazzani, Sharad Mehrotra:
Dimensionality Reduction for Fast Similarity Search in Large Time Series Databases. Knowl. Inf. Syst. 3(3): 263-286 (2001) - [c43]Howard H. Smith, Aline Deutsch, Sharad Mehrotra, David Widiger, Michael A. Bowen, Allan H. Dansky, Gerard V. Kopcsay, Byron Krauter:
R(f)L(f)C coupled noise evaluation of an S/390 microprocessor chip. CICC 2001: 237-240 - [c42]Eamonn J. Keogh, Kaushik Chakrabarti, Sharad Mehrotra, Michael J. Pazzani:
Locally Adaptive Dimensionality Reduction for Indexing Large Time Series Databases. SIGMOD Conference 2001: 151-162 - [c41]Iosif Lazaridis, Sharad Mehrotra:
Progressive Approximate Aggregate Queries with a Multi-Resolution Tree Structure. SIGMOD Conference 2001: 401-412 - [c40]Kriengkrai Porkaew, Iosif Lazaridis, Sharad Mehrotra:
Querying Mobile Objects in Spatio-Temporal Databases. SSTD 2001: 59-78 - [e1]Sharad Mehrotra, Timos K. Sellis:
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, Santa Barbara, CA, USA, May 21-24, 2001. ACM 2001, ISBN 1-58113-332-4 [contents] - 2000
- [j9]Aidong Zhang, Abraham Silberschatz, Sharad Mehrotra:
Guest Editorial: Continuous Media Databases. Multim. Tools Appl. 11(1): 5-7 (2000) - [c39]Kaushik Chakrabarti, Kriengkrai Porkaew, Sharad Mehrotra:
Efficient Query Refinement in Multimedia Databases. ICDE 2000: 196 - [c38]Kaushik Chakrabarti, Michael Ortega-Binderberger, Kriengkrai Porkaew, Sharad Mehrotra:
Similar Shape Retrieval in MARS. IEEE International Conference on Multimedia and Expo (II) 2000: 709-712 - [c37]Kaushik Chakrabarti, Sharad Mehrotra:
Local Dimensionality Reduction: A New Approach to Indexing High Dimensional Spaces. VLDB 2000: 89-100
1990 – 1999
- 1999
- [j8]Yong Rui, Michael Ortega, Thomas S. Huang, Sharad Mehrotra:
Information Retrieval Beyond the Text Document. Libr. Trends 48(2) (1999) - [j7]Yong Rui, Thomas S. Huang, Sharad Mehrotra:
Constructing Table-of-Content for Videos. Multim. Syst. 7(5): 359-368 (1999) - [c36]Byron Krauter, Sharad Mehrotra, V. Chandramouli:
Including inductive effects in interconnect timing analysis. CICC 1999: 445-452 - [c35]Paul D. Franzon, Mark Basel, Aki Fujimara, Sharad Mehrotra, Ron Preston, Robin C. Sarma, Marty Walker:
Parasitic Extraction Accuracy - How Much is Enough? DAC 1999: 429 - [c34]Kaushik Chakrabarti, Sharad Mehrotra:
The Hybrid Tree: An Index Structure for High Dimensional Feature Spaces. ICDE 1999: 440-447 - [c33]Kriengkrai Porkaew, Michael Ortega, Sharad Mehrotra:
Query Reformulation for Content Based Multimedia Retrieval in MARS. ICMCS, Vol. 2 1999: 747-751 - [c32]Kaushik Chakrabarti, Sharad Mehrotra:
Efficient Concurrency Control in Multidimensional Access Methods. SIGMOD Conference 1999: 25-36 - [c31]Kriengkrai Porkaew, Sharad Mehrotra, Michael Ortega, Kaushik Chakrabarti:
Similarity Search Using Multiple Examples in MARS. VISUAL 1999: 68-75 - 1998
- [j6]Rajeev Rastogi, Sharad Mehrotra, Yuri Breitbart, Henry F. Korth, Abraham Silberschatz:
On Correctness of Nonserializable Executions. J. Comput. Syst. Sci. 56(1): 68-82 (1998) - [j5]Yong Rui, Thomas S. Huang, Michael Ortega, Sharad Mehrotra:
Relevance feedback: a power tool for interactive content-based image retrieval. IEEE Trans. Circuits Syst. Video Technol. 8(5): 644-655 (1998) - [j4]Michael Ortega, Yong Rui, Kaushik Chakrabarti, Kriengkrai Porkaew, Sharad Mehrotra, Thomas S. Huang:
Supporting Ranked Boolean Similarity Queries in MARS. IEEE Trans. Knowl. Data Eng. 10(6): 905-925 (1998) - [j3]Sharad Mehrotra, Rajeev Rastogi, Henry F. Korth, Abraham Silberschatz:
Ensuring Consistency in Multidatabases by Preserving Two-Level Serializability. ACM Trans. Database Syst. 23(2): 199-230 (1998) - [c30]Byron Krauter, Sharad Mehrotra:
Layout Based Frequency Dependent Inductance and Resistance Extraction for On-Chip Interconnect Timing Analysis. DAC 1998: 303-308 - [c29]Kaushik Chakrabarti, Sharad Mehrotra:
Dynamic Granular Locking Approach to Phantom Protection in R-Trees. ICDE 1998: 446-454 - [c28]Yueting Zhuang, Yong Rui, Thomas S. Huang, Sharad Mehrotra:
Adaptive Key Frame Extraction using Unsupervised Clustering. ICIP (1) 1998: 866-870 - [c27]Yong Rui, Thomas S. Huang, Sharad Mehrotra:
Exploring Video Structure Beyond the Shots. ICMCS 1998: 237-240 - [c26]Yong Rui, Thomas S. Huang, Sharad Mehrotra:
Browsing and retrieving video content in a unified framework. MMSP 1998: 9-14 - [c25]Yong Rui, Thomas S. Huang, Sharad Mehrotra:
Relevance Feedback Techniques in Interactive Content-Based Image Retrieval. Storage and Retrieval for Image and Video Databases (SPIE) 1998: 25-36 - [c24]Kexiang Hu, Sharad Mehrotra, Simon M. Kaplan:
Failure Handling in an Optimized Two-Safe Approach to Maintaining Primary-Backup Systems. SRDS 1998: 161-167 - 1997
- [j2]Sharad Mehrotra, Henry F. Korth, Abraham Silberschatz:
Concurrency Control in Hierarchical Multidatabase Systems. VLDB J. 6(2): 152-172 (1997) - [c23]Sharad Mehrotra, Kexiang Hu, Simon M. Kaplan:
Dealing with Partial Failures in Multiple Processor Primary-Backup Systems. CIKM 1997: 371-378 - [c22]Jitendra Kothari, Ed Grossman, Sharad Mehrotra:
Neighborhoods: A Framework For Enabling Web Based Synchronous Collaboration And Hierarchical Navigation. HICSS (1) 1997: 666-675 - [c21]Yong Rui, Thomas S. Huang, Sharad Mehrotra:
Content-Based Image Retrieval with Relevance Feedback in MARS. ICIP (2) 1997: 815-818 - [c20]Sharad Mehrotra, Yong Rui, Michael Ortega, Thomas S. Huang:
Supporting Content-based Queries over Images in MARS. ICMCS 1997: 632-633 - [c19]Michael Ortega, Yong Rui, Kaushik Chakrabarti, Sharad Mehrotra, Thomas S. Huang:
Supporting Similarity Queries in MARS. ACM Multimedia 1997: 403-413 - 1996
- [c18]Thomas S. Huang, Sharad Mehrotra, Kannan Ramchandran:
Multimedia Analysis and Retrieval System (MARS) Project. Data Processing Clinic 1996 - [c17]Daniel Barbará, Sharad Mehrotra, Padmavathi Vallabhaneni:
The Gold Text Indexing Engine. ICDE 1996: 172-179 - 1995
- [c16]Sharad Mehrotra, Paul D. Franzon, Michael B. Steer:
Performance Driven Global Routing and Wiring Rule Generation for High Speed PCBs and MCMs. DAC 1995: 381-387 - [c15]Walid G. Aref, Daniel Barbará, Stephen Johnson, Sharad Mehrotra:
Efficient Processing of Proximity Queries for Large Databases. ICDE 1995: 147-154 - 1994
- [c14]Sharad Mehrotra, Paul D. Franzon, Wentai Liu:
Stochastic Optimization Approach to Transistor Sizing for CMOS VLSI Circuits. DAC 1994: 36-40 - 1993
- [j1]Rajeev Rastogi, Sharad Mehrotra, Henry F. Korth, Abraham Silberschatz:
Transcending the Serializability Requirement. IEEE Data Eng. Bull. 16(2): 8-11 (1993) - [c13]Sharad Mehrotra, Rajeev Rastogi, Yuri Breitbart, Henry F. Korth, Abraham Silberschatz:
Efficient Global Transaction Management in Multidatabase Systems. DASFAA 1993: 29-36 - [c12]Daniel Barbará, Chris Clifton, Fred Douglis, Hector Garcia-Molina, Stephen Johnson, Ben Kao, Sharad Mehrotra, Jens Tellefsen, Rosemary Walsh:
The Gold Mailer. ICDE 1993: 92-99 - [c11]Rajeev Rastogi, Sharad Mehrotra, Yuri Breitbart, Henry F. Korth, Abraham Silberschatz:
On Correctness of Non-serializable Executions. PODS 1993: 97-108 - [c10]Daniel Barbará, Yuri Breitbart, Hector Garcia-Molina, Henry F. Korth, Sharad Mehrotra:
Interoperability with Unstructured Data and Services. RIDE-IMS 1993: 123-125 - 1992
- [c9]Paul D. Franzon, Slobodan Simovich, Michael B. Steer, Mark Basel, Sharad Mehrotra, Tom Mills:
Tools to Aid in Wiring Rule Generation for High Speed Interconnects. DAC 1992: 466-471 - [c8]Sharad Mehrotra, Rajeev Rastogi, Henry F. Korth, Abraham Silberschatz:
A Transaction Model for Multidatabase Systems. ICDCS 1992: 56-63 - [c7]Sharad Mehrotra, Rajeev Rastogi, Yuri Breitbart, Henry F. Korth, Abraham Silberschatz:
Ensuring Transaction Atomicity in Multidatabase Systems. PODS 1992: 164-175 - [c6]Sharad Mehrotra, Rajeev Rastogi, Henry F. Korth, Abraham Silberschatz:
Relaxing Serializability in Multidatabase Systems. RIDE-TQP 1992: 205-212 - [c5]Sharad Mehrotra, Rajeev Rastogi, Yuri Breitbart, Henry F. Korth, Abraham Silberschatz:
The Concurrency Control Problem in Multidatabases: Characteristics and Solutions. SIGMOD Conference 1992: 288-297 - 1991
- [c4]Sharad Mehrotra, Rajeev Rastogi, Henry F. Korth, Abraham Silberschatz:
Non-Serializable Executions in Heterogeneous Distributed Database Systems. PDIS 1991: 245-252 - 1990
- [c3]Sharad Mehrotra, Chien-Ming Cheng, Kai Hwang, Michel Dubois, Dhabaleswar K. Panda:
Algorithm-Driven Simulation and Performance Projection of a RISC-based Orthogonal Multiprocessor. ICPP (3) 1990: 244-253 - [c2]Kai Hwang, Michel Dubois, Dhabaleswar K. Panda, S. Rao, Shisheng Shang, Aydin Üresin, W. Mao, H. Nair, M. Lytwyn, F. Hsieh, J. Liu, Sharad Mehrotra, Chien-Ming Cheng:
OMP: a RISC-based multiprocessor using orthogonal-access memories and multiple spanning buses. ICS 1990: 7-22 - [c1]Sharad Mehrotra:
Developing a simulator for the USC orthogonal multiprocessor. WSC 1990: 857-862
Coauthor Index
aka: Michael Ortega
aka: Abraham Silberschatz
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:11 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint