default search action
Arshad Jhumka
Person information
- affiliation: University of Warwick, Coventry, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c76]Sahrish Khan, Gabriele Pergola, Arshad Jhumka:
Multilingual Sexism Identification via Fusion of Large Language Models. CLEF (Working Notes) 2024: 1070-1079 - 2023
- [j26]Edward Chuah, Arshad Jhumka, Sai Narasimhamurthy:
An empirical study of major page faults for failure diagnosis in cluster systems. J. Supercomput. 79(16): 18445-18479 (2023) - [c75]Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Lin Gui, Franck Cappello, Simon McIntosh-Smith:
Time Machine: Generative Real-Time Model for Failure (and Lead Time) Prediction in HPC Systems. DSN 2023: 508-521 - [c74]Mohammad Sadegh Nourbakhsh, Feng Hao, Arshad Jhumka:
Transaction Fee Mechanism for Order-Sensitive Blockchain-Based Applications. ESORICS Workshops (1) 2023: 327-343 - [c73]Jawaher Alharbi, Arshad Jhumka, Daniele Palossi:
To Checkpoint or Not to Checkpoint: That is the Question. EWSN 2023: 124-131 - [c72]Jawaher Alharbi, Arshad Jhumka:
Poster Abstract: Checkpointing in Transiently Powered IoT Networks. IPSN 2023: 316-317 - [c71]Abdullah Alhajri, Arshad Jhumka, Richard Kirk:
OCC2T: An Early-Read Dual-Track OCC Algorithm For Mixed Mode Systems. SAC 2023: 321-330 - [c70]Jawaher Alharbi, Adam P. Chester, Arshad Jhumka:
Towards Understanding Checkpointing in Transiently Powered IoT Networks. TrustCom 2023: 559-568 - [c69]Abdullah Alhajri, Arshad Jhumka:
Addressing a Malicious Tampering Attack on the Default Isolation Level in DBMS. TrustCom 2023: 2660-2667 - 2022
- [j25]Edward Chuah, Arshad Jhumka, Miroslaw Malek, Neeraj Suri:
A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems. IEEE Access 10: 133487-133503 (2022) - [j24]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Information management for trust computation on resource-constrained IoT devices. Future Gener. Comput. Syst. 135: 348-363 (2022) - [j23]Matthew Bradbury, Arshad Jhumka:
Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. IEEE Trans. Inf. Forensics Secur. 17: 3890-3905 (2022) - [j22]Matthew Bradbury, Arshad Jhumka, Tim Watson, Denys A. Flores, Jonathan Burton, Matthew Butler:
Threat-modeling-guided Trust-based Task Offloading for Resource-constrained Internet of Things. ACM Trans. Sens. Networks 18(2): 29:1-29:41 (2022) - [c68]Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Franck Cappello:
Clairvoyant: a log-based transformer-decoder for failure prediction in large-scale systems. ICS 2022: 35:1-35:14 - 2021
- [c67]Mansour Aldawood, Arshad Jhumka, Suhaib A. Fahmy:
Toward Secure VMs Allocation: Analysis of VMs Allocation Behaviours in the Cloud Computing Environments. CLOSER (Selected Papers) 2021: 25-46 - [c66]Mansour Aldawood, Arshad Jhumka, Suhaib A. Fahmy:
Sit Here: Placing Virtual Machines Securely in Cloud Environments. CLOSER 2021: 248-259 - [c65]Khalid Ayedh Alharthi, Arshad Jhumka, Sheng Di, Franck Cappello, Edward Chuah:
Sentiment Analysis based Error Detection for Large-Scale Systems. DSN 2021: 237-249 - [c64]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Trust Trackers for Computation Offloading in Edge-Based IoT Networks. INFOCOM 2021: 1-10 - [c63]Edward Chuah, Arshad Jhumka, Samantha Alt, R. Todd Evans, Neeraj Suri:
Failure Diagnosis for Cluster Systems using Partial Correlations. ISPA/BDCloud/SocialCom/SustainCom 2021: 1091-1101 - [c62]Edward Chuah, Neeraj Suri, Arshad Jhumka, Samantha Alt:
Challenges in Identifying Network Attacks Using Netflow Data. NCA 2021: 1-10 - [c61]Jasmine Grosso, Arshad Jhumka:
Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks. NCA 2021: 1-10 - [c60]Mansour Aldawood, Arshad Jhumka:
Secure Allocation for Graph-Based Virtual Machines in Cloud Environments. PST 2021: 1-7 - [c59]Matthew Bradbury, Arshad Jhumka, Tim Watson:
Trust assessment in 32 KiB of RAM: multi-application trust-based task offloading for resource-constrained IoT nodes. SAC 2021: 184-193 - [c58]David Richardson, Arshad Jhumka, Luca Mottola:
Protocol transformation for transiently powered wireless sensor networks. SAC 2021: 1112-1121 - [c57]Sara Alhajaili, Arshad Jhumka:
Reliable Logging in Wireless IoT Networks in the Presence of Byzantine Faults. TrustCom 2021: 17-25 - 2020
- [j21]Matthew Bradbury, Arshad Jhumka, Carsten Maple:
A Spatial Source Location Privacy-aware Duty Cycle for Internet of Things Sensor Networks. ACM Trans. Internet Things 2(1): 4:1-4:32 (2020)
2010 – 2019
- 2019
- [j20]Chen Gu, Matthew Bradbury, Arshad Jhumka:
Phantom walkabouts: A customisable source location privacy aware routing protocol for wireless sensor networks. Concurr. Comput. Pract. Exp. 31(20) (2019) - [j19]Yiyan Lin, Sandeep S. Kulkarni, Arshad Jhumka:
Automation of fault-tolerant graceful degradation. Distributed Comput. 32(1): 1-25 (2019) - [j18]Edward Chuah, Arshad Jhumka, Samantha Alt, Daniel Balouek-Thomert, James C. Browne, Manish Parashar:
Towards comprehensive dependability-driven resource use and message log-analysis for HPC systems diagnosis. J. Parallel Distributed Comput. 132: 95-112 (2019) - [c56]Matthew Bradbury, Arshad Jhumka, Carsten Maple:
The impact of decreasing transmit power levels on FlockLab to achieve a sparse network. Bench@CPSIoTWeek 2019: 7-12 - [c55]Jasmine Grosso, Arshad Jhumka, Matthew Bradbury:
Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation. EDCC 2019: 111-118 - [c54]Mohammed Maray, Arshad Jhumka, Adam P. Chester, Mohamed F. Younis:
Scheduling Dependent Tasks in Edge Networks. IPCCC 2019: 1-4 - [c53]Edward Chuah, Arshad Jhumka, Samantha Alt, Juan J. Villalobos, Joshua Fryman, William Barth, Manish Parashar:
Using Resource Use Data and System Logs for HPC System Error Propagation and Recovery Diagnosis. ISPA/BDCloud/SocialCom/SustainCom 2019: 458-467 - [c52]Sara Alhajaili, Arshad Jhumka:
Auditability: An Approach to Ease Debugging of Reliable Distributed Systems. PRDC 2019: 227-235 - [c51]Denys A. Flores, Arshad Jhumka:
Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing. TrustCom/BigDataSE 2019: 224-231 - 2018
- [j17]Jack Kirton, Matthew Bradbury, Arshad Jhumka:
Towards optimal source location privacy-aware TDMA schedules in wireless sensor networks. Comput. Networks 146: 125-137 (2018) - [j16]Chen Gu, Matthew Bradbury, Jack Kirton, Arshad Jhumka:
A decision theoretic framework for selecting source location privacy aware routing protocols in wireless sensor networks. Future Gener. Comput. Syst. 87: 514-526 (2018) - [j15]Matthew Bradbury, Arshad Jhumka, Matthew Leeke:
Hybrid online protocols for source location privacy in wireless sensor networks. J. Parallel Distributed Comput. 115: 67-81 (2018) - 2017
- [j14]Sain Saginbekov, Arshad Jhumka:
Many-to-many data aggregation scheduling in wireless sensor networks with two sinks. Comput. Networks 123: 184-199 (2017) - [c50]Edward Chuah, Arshad Jhumka, Samantha Alt, Theodoros Damoulas, Nentawe Gurumdimma, Marie-Christine Sawley, William L. Barth, Tommy Minyard, James C. Browne:
Enabling Dependability-Driven Resource Use and Message Log-Analysis for Cluster System Diagnosis. HiPC 2017: 317-327 - [c49]Jack Kirton, Matthew Bradbury, Arshad Jhumka:
Source Location Privacy-Aware Data Aggregation Scheduling for Wireless Sensor Networks. ICDCS 2017: 2200-2205 - [c48]Matthew Bradbury, Arshad Jhumka:
Understanding source location privacy protocols in sensor networks via perturbation of time series. INFOCOM 2017: 1-9 - [c47]Nentawe Gurumdimma, Arshad Jhumka:
Detection of Recovery Patterns in Cluster Systems Using Resource Usage Data. PRDC 2017: 58-67 - [c46]Arshad Jhumka, Matthew Bradbury:
Deconstructing source location privacy-aware routing protocols. SAC 2017: 431-436 - [c45]Chen Gu, Matthew Bradbury, Arshad Jhumka:
Phantom walkabouts in wireless sensor networks. SAC 2017: 609-616 - [c44]Sain Saginbekov, Arshad Jhumka, Yerzhan Mademikhanov:
A Lower Bound on the Number of Nodes with Multiple Slots in Wireless Sensor Networks with Multiple Sinks. SENSORNETS 2017: 202-206 - [c43]Matthew Bradbury, Arshad Jhumka:
A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. TrustCom/BigDataSE/ICESS 2017: 409-416 - [c42]Denys A. Flores, Arshad Jhumka:
Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes. TrustCom/BigDataSE/ICESS 2017: 675-682 - [c41]Farrukh Qazi, Arshad Jhumka, Paul D. Ezhilchelvan:
Towards Automated Enforcement of Cloud SLA. UCC (Companion") 2017: 151-156 - 2016
- [j13]Mohannad J. Alhanahnah, Arshad Jhumka, Sahel Alouneh:
A Multidimension Taxonomy of Insider Threats in Cloud Computing. Comput. J. 59(11): 1612-1622 (2016) - [j12]Arshad Jhumka, Luca Mottola:
Neighborhood View Consistency in Wireless Sensor Networks. ACM Trans. Sens. Networks 12(3): 19:1-19:41 (2016) - [c40]Edward Chuah, Arshad Jhumka, James C. Browne, Nentawe Gurumdimma, Sai Narasimhamurthy, Bill Barth:
Using Message Logs and Resource Use Data for Cluster Failure Diagnosis. HiPC 2016: 232-241 - [c39]Sain Saginbekov, Arshad Jhumka, Chingiz Shakenov:
Towards Energy-efficient Collision-free Data Aggregation Scheduling in Wireless Sensor Networks with Multiple Sinks. SENSORNETS 2016: 77-86 - [c38]Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, James C. Browne:
CRUDE: Combining Resource Usage Data and Error Logs for Accurate Error Detection in Large-Scale Distributed Systems. SRDS 2016: 51-60 - [c37]Denys A. Flores, Farrukh Qazi, Arshad Jhumka:
Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information. Trustcom/BigDataSE/ISPA 2016: 1008-1015 - 2015
- [j11]Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Fake source-based source location privacy in wireless sensor networks. Concurr. Comput. Pract. Exp. 27(12): 2999-3020 (2015) - [c36]Edward Chuah, Arshad Jhumka, James C. Browne, Bill Barth, Sai Narasimhamurthy:
Insights into the Diagnosis of System Failures from Cluster Message Logs. EDCC 2015: 225-232 - [c35]Fatimah Adamu-Fika, Arshad Jhumka:
An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution. ICA3PP (4) 2015: 799-813 - [c34]Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, James C. Browne:
Towards Detecting Patterns in Failure Logs of Large-Scale Distributed Systems. IPDPS Workshops 2015: 1052-1061 - [c33]Chen Gu, Matthew Bradbury, Arshad Jhumka, Matthew Leeke:
Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. PRDC 2015: 99-108 - [c32]Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, James C. Browne:
Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems Using Console and Resource Usage Logs. TrustCom/BigDataSE/ISPA (3) 2015: 61-68 - [c31]Matthew Bradbury, Matthew Leeke, Arshad Jhumka:
A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. TrustCom/BigDataSE/ISPA (1) 2015: 531-538 - 2014
- [j10]Sain Saginbekov, Arshad Jhumka:
Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks. Comput. J. 57(12): 1790-1816 (2014) - [j9]Sain Saginbekov, Arshad Jhumka:
Efficient code dissemination in wireless sensor networks. Future Gener. Comput. Syst. 39: 111-119 (2014) - [j8]Arshad Jhumka, Matthew Bradbury, Sain Saginbekov:
Efficient fault-tolerant collision-free data aggregation scheduling for wireless sensor networks. J. Parallel Distributed Comput. 74(1): 1789-1801 (2014) - 2013
- [j7]Henry Franks, Nathan Griffiths, Arshad Jhumka:
Manipulating convention emergence using influencer agents. Auton. Agents Multi Agent Syst. 26(3): 315-353 (2013) - [j6]Matthew Leeke, Arshad Jhumka, Sarabjot Singh Anand:
Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. Comput. J. 56(6): 674-692 (2013) - [c30]Edward Chuah, Arshad Jhumka, Sai Narasimhamurthy, John L. Hammond, James C. Browne, Bill Barth:
Linking Resource Usage Anomalies with System Failures from Cluster Log Data. SRDS 2013: 111-120 - [c29]Alasdair Thomason, Matthew Leeke, Matthew Bradbury, Arshad Jhumka:
Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. TrustCom/ISPA/IUCC 2013: 667-674 - 2012
- [c28]Arshad Jhumka, Matthew Bradbury, Matthew Leeke:
Towards Understanding Source Location Privacy in Wireless Sensor Networks through Fake Sources. TrustCom 2012: 760-768 - [c27]Sain Saginbekov, Arshad Jhumka:
Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks. TrustCom 2012: 1555-1561 - 2011
- [j5]Arshad Jhumka, Matthew Leeke, Sambid Shrestha:
On the Use of Fake Sources for Source Location Privacy: Trade-Offs Between Energy and Privacy. Comput. J. 54(6): 860-874 (2011) - [j4]Sarabjot Singh Anand, Arshad Jhumka, Kimberley Wade:
Towards the Ordering of Events from Multiple Textual Evidence Sources. Int. J. Digit. Crime Forensics 3(2): 16-34 (2011) - [c26]Adam P. Chester, Matthew Leeke, Mohammad A. Alghamdi, Arshad Jhumka, Stephen A. Jarvis:
A Framework for Data Center Scale Dynamic Resource Allocation Algorithms. CIT 2011: 67-74 - [c25]Matthew Leeke, Saima Arif, Arshad Jhumka, Sarabjot Singh Anand:
A methodology for the generation of efficient error detection mechanisms. DSN 2011: 25-36 - [c24]Arshad Jhumka, Matthew Leeke:
The Early Identification of Detector Locations in Dependable Software. ISSRE 2011: 40-49 - 2010
- [j3]Neeraj Suri, Arshad Jhumka, Martin Hiller, András Pataricza, Shariful Islam, Constantin Sârbu:
A software integration approach for designing and assessing dependable embedded systems. J. Syst. Softw. 83(10): 1780-1800 (2010) - [c23]Matthew Leeke, Arshad Jhumka:
Towards Understanding the Importance of Variables in Dependable Software. EDCC 2010: 85-94 - [c22]Chris P. Levett, Arshad Jhumka, Sarabjot Singh Anand:
Towards event ordering in digital forensics. MM&Sec 2010: 35-42 - [c21]Arshad Jhumka:
Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks. SRDS 2010: 44-53 - [p2]Arshad Jhumka:
Dependability in Service-Oriented Computing. Agent-Based Service-Oriented Computing 2010: 141-160
2000 – 2009
- 2009
- [c20]Arshad Jhumka, Matthew Leeke:
Issues on the Design of Efficient Fail-Safe Fault Tolerance. ISSRE 2009: 155-164 - [c19]Matthew Leeke, Arshad Jhumka:
Evaluating the Use of Reference Run Models in Fault Injection Analysis. PRDC 2009: 121-124 - [c18]Arshad Jhumka, Luca Mottola:
On Consistent Neighborhood Views in Wireless Sensor Networks. SRDS 2009: 199-208 - [p1]Mahesh Arumugam, Arshad Jhumka, Fuad Abujarad, Sandeep S. Kulkarni:
Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks. Guide to Wireless Mesh Networks 2009: 77-118 - 2008
- [c17]Nathan Griffiths, Arshad Jhumka, Anthony Dawson, Richard Myers:
A Simple Trust model for On-Demand Routing in Mobile Ad-Hoc Networks. IDC 2008: 105-114 - 2007
- [c16]Arshad Jhumka, Sandeep S. Kulkarni:
On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks. ICDCIT 2007: 42-53 - [c15]Felix C. Freiling, Arshad Jhumka:
Global Predicate Detection in Distributed Systems with Small Faults. SSS 2007: 296-310 - 2006
- [j2]Arshad Jhumka, Felix C. Freiling, Christof Fetzer, Neeraj Suri:
An approach to synthesise safe systems. Int. J. Secur. Networks 1(1/2): 62-74 (2006) - 2005
- [c14]Arshad Jhumka, Stephan Klaus, Sorin A. Huss:
A Dependability-Driven System-Level Design Approach for Embedded Systems. DATE 2005: 372-377 - [c13]Arshad Jhumka, Neeraj Suri:
Designing Efficient Fail-Safe Multitolerant Systems. FORTE 2005: 428-442 - [c12]Arshad Jhumka, Martin Hiller:
Putting Detectors in Their Place. SEFM 2005: 33-43 - 2004
- [j1]Martin Hiller, Arshad Jhumka, Neeraj Suri:
EPIC: Profiling the Propagation and Effect of Data Errors in Software. IEEE Trans. Computers 53(5): 512-530 (2004) - [c11]Felix C. Gärtner, Arshad Jhumka:
Automating the Addition of Fail-Safe Fault-Tolerance: Beyond Fusion-Closed Specifications. FORMATS/FTRTFT 2004: 183-198 - [c10]Arshad Jhumka, Martin Hiller, Neeraj Suri:
An Approach for Designing and Assessing Detectors for Dependable Component-Based Systems. HASE 2004: 69-78 - [c9]Andréas Johansson, Adina Sarbu, Arshad Jhumka, Neeraj Suri:
On Enhancing the Robustness of Commercial Operating Systems. ISAS 2004: 148-159 - 2003
- [b1]Arshad Jhumka:
Automated design of efficient fail-safe fault tolerance. Darmstadt University of Technology, Germany, 2003, pp. 1-143 - [c8]Arshad Jhumka, Neeraj Suri, Martin Hiller:
A Framework for the Design and Validation of Efficient Fail-Safe Fault-Tolerant Programs. SCOPES 2003: 182-197 - 2002
- [c7]Martin Hiller, Arshad Jhumka, Neeraj Suri:
On the Placement of Software Mechanisms for Detection of Data Errors. DSN 2002: 135-144 - [c6]Arshad Jhumka, Martin Hiller, Neeraj Suri:
Component-Based Synthesis of Dependable Embedded Software. FTRTFT 2002: 111-128 - [c5]Arshad Jhumka, Martin Hiller, Neeraj Suri:
An Approach to Specify and Test Component-Based Dependable Software. HASE 2002: 211-220 - [c4]Martin Hiller, Arshad Jhumka, Neeraj Suri:
PROPANE: an environment for examining the propagation of errors in software. ISSTA 2002: 81-85 - [c3]Arshad Jhumka, Martin Hiller, Vilgot Claesson, Neeraj Suri:
On systematic design of globally consistent executable assertions in embedded software. LCTES-SCOPES 2002: 75-84 - 2001
- [c2]Martin Hiller, Arshad Jhumka, Neeraj Suri:
An Approach for Analysing the Propagation of Data Errors in Software. DSN 2001: 161-172 - [c1]Arshad Jhumka, Martin Hiller, Neeraj Suri:
Assessing Inter-Modular Error Propagation in Distributed Software. SRDS 2001: 152-161
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint