
Sharad Mehrotra
Person information
- affiliation: University of California, Irvine, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2020
- [j67]Peeyush Gupta, Michael J. Carey, Sharad Mehrotra, Roberto Yus:
SmartBench: A Benchmark For Data Management In Smart Spaces. Proc. VLDB Endow. 13(11): 1807-1820 (2020) - [j66]Primal Pappachan, Roberto Yus, Sharad Mehrotra, Johann-Christoph Freytag:
Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems. Proc. VLDB Endow. 13(11): 2424-2437 (2020) - [j65]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta, Anurag Mishra:
PANDA: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. ACM Trans. Manag. Inf. Syst. 11(4): 23:1-23:41 (2020) - [c188]Sharad Mehrotra, Shantanu Sharma:
Recent Advances in Information-Theoretically Secure Data Outsourcing. IWSPA@CODASPY 2020: 31-32 - [c187]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries. CODASPY 2020: 165-167 - [c186]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CODASPY 2020: 283-294 - [c185]Ios Kotsogiannis, Stelios Doudalis, Samuel Haney, Ashwin Machanavajjhala, Sharad Mehrotra:
One-sided Differential Privacy. ICDE 2020: 493-504 - [c184]Shantanu Sharma, Anton Burtsev, Sharad Mehrotra:
Advances in Cryptography and Secure Hardware for Data Outsourcing. ICDE 2020: 1798-1801 - [c183]Sameera Ghayyur, Primal Pappachan, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Designing privacy preserving data sharing middleware for internet of things. DATA@SenSys 2020: 1-6 - [c182]Joshua Cao, Jesse Chong, Marissa Lafreniere, Owen Yang, Primal Pappachan, Sharad Mehrotra, Nalini Venkatasubramanian:
The ZotBins solution to waste management using internet of things: poster abstract. SenSys 2020: 731-732 - [c181]Michael August, Christopher Davison, Mamadou H. Diallo, Dhrubajyoti Ghosh, Peeyush Gupta, Christopher T. Graves, Shanshan Han, Michael Holstrom, Pramod Khargonekar, Megan Kline, Sharad Mehrotra, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang, Roberto Yus:
A privacy-enabled platform for COVID-19 applications: poster abstract. SenSys 2020: 745-746 - [c180]Praveen Venkateswaran, Cheng-Hsin Hsu, Sharad Mehrotra, Nalini Venkatasubramanian:
REAM: Resource Efficient Adaptive Monitoring of Community Spaces at the Edge Using Reinforcement Learning. SMARTCOMP 2020: 17-24 - [i20]Nisha Panwar, Shantanu Sharma, Peeyush Gupta, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
IoT Expunge: Implementing Verifiable Retention of IoT Data. CoRR abs/2003.04969 (2020) - [i19]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Canopy: A Verifiable Privacy-Preserving Token Ring based Communication Protocol for Smart Homes. CoRR abs/2004.03841 (2020) - [i18]Primal Pappachan, Roberto Yus, Sharad Mehrotra, Johann-Christoph Freytag:
Sieve: A Middleware Approach to Scalable Access Control for Database Management Systems. CoRR abs/2004.07498 (2020) - [i17]Yiming Lin, Daokun Jiang, Roberto Yus, Georgios Bouloukakis, Andrew Chio, Sharad Mehrotra, Nalini Venkatasubramanian:
LOCATER: Cleaning WiFi Connectivity Datasets for Semantic Localization. CoRR abs/2004.09676 (2020) - [i16]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version. CoRR abs/2004.13115 (2020) - [i15]Peeyush Gupta, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Nalini Venkatasubramanian, Guoxi Wang:
Quest: Practical and Oblivious Mitigation Strategies for COVID-19 using WiFi Datasets. CoRR abs/2005.02510 (2020) - [i14]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Dhrubajyoti Ghosh, Peeyush Gupta:
Panda: Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. CoRR abs/2005.06154 (2020)
2010 – 2019
- 2019
- [j64]Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretic Oblivious and Verifiable Aggregation Queries. Proc. VLDB Endow. 12(9): 1030-1043 (2019) - [c179]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CODASPY 2019: 49-60 - [c178]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman:
Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud. CODASPY 2019: 165-167 - [c177]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra:
Partitioned Data Security on Outsourced Sensitive and Non-Sensitive Data. ICDE 2019: 650-661 - [c176]Zhenhua Huang, Zhenyu Wang, Rui Zhang, Yangyang Zhao, Xiaohui Xie, Sharad Mehrotra:
Network2Vec: Learning Node Representation Based on Space Mapping in Networks. ICDM Workshops 2019: 727-734 - [c175]Qing Han, Sharad Mehrotra, Nalini Venkatasubramanian:
AquaSCALE - Exploring Resilience of Community Water Infrastructures. Middleware Demos/Posters 2019: 7-8 - [c174]Qing Han, Sharad Mehrotra, Nalini Venkatasubramanian:
AquaEIS: Middleware Support for Event Identification in Community Water Infrastructures. Middleware 2019: 293-305 - [c173]Eun-Jeong Shin, Dhrubajyoti Ghosh, Sharad Mehrotra, Nalini Venkatasubramanian:
SCARF: a scalable data management framework for context-aware applications in smart environments. MobiQuitous 2019: 358-367 - [c172]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. NCA 2019: 1-9 - [c171]Roberto Yus, Georgios Bouloukakis, Sharad Mehrotra, Nalini Venkatasubramanian:
Abstracting Interactions with IoT Devices Towards a Semantic Vision of Smart Spaces. BuildSys@SenSys 2019: 91-100 - [c170]Sumaya Almanee, Georgios Bouloukakis, Daokun Jiang, Sameera Ghayyur, Dhrubajyoti Ghosh, Peeyush Gupta, Yiming Lin, Sharad Mehrotra, Primal Pappachan, Eun-Jeong Shin, Nalini Venkatasubramanian, Guoxi Wang, Roberto Yus:
SemIoTic: Bridging the Semantic Gap in IoT Spaces. BuildSys@SenSys 2019: 352-353 - [c169]Phillip Lee, Eun-Jeong Shin, Valerie Guralnik, Sharad Mehrotra, Nalini Venkatasubramanian, Kevin T. Smith:
Exploring Privacy Breaches and Mitigation Strategies of Occupancy Sensors in Smart Buildings. TESCA 2019: 18-21 - [i13]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian:
Verifiable Round-Robin Scheme for Smart Homes. CoRR abs/1901.08618 (2019) - [i12]Jue Wang, Ke Chen, Lidan Shou, Sai Wu, Sharad Mehrotra:
Semi-Supervised Few-Shot Learning for Dual Question-Answer Extraction. CoRR abs/1904.03898 (2019) - [i11]Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Lukasz Krzywiecki, Nalini Venkatasubramanian:
Smart Home Survey on Security and Privacy. CoRR abs/1904.05476 (2019) - [i10]Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani:
IoT Notary: Sensor Data Attestation in Smart Environment. CoRR abs/1908.10033 (2019) - [i9]Zhenhua Huang, Zhenyu Wang, Rui Zhang, Yangyang Zhao, Xiaohui Xie, Sharad Mehrotra:
Network2Vec Learning Node Representation Based on Space Mapping in Networks. CoRR abs/1910.10379 (2019) - 2018
- [j63]M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos
:
On Optimal and Fair Service Allocation in Mobile Cloud Computing. IEEE Trans. Cloud Comput. 6(3): 815-828 (2018) - [j62]Yasser Altowim, Dmitri V. Kalashnikov, Sharad Mehrotra:
ProgressER: Adaptive Progressive Approach to Relational Entity Resolution. ACM Trans. Knowl. Discov. Data 12(3): 33:1-33:45 (2018) - [c168]Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma:
Exploiting Data Sensitivity on Partitioned Data. From Database to Cyber Security 2018: 274-299 - [c167]Mamadou H. Diallo, Nisha Panwar, Roberto Yus, Sharad Mehrotra:
Trustworthy Privacy Policy Translation in Untrusted IoT Environments. IoTBDS 2018: 132-143 - [c166]Luca Scalzotto, Kyle E. Benson, Georgios Bouloukakis, Paolo Bellavista
, Valérie Issarny, Sharad Mehrotra, Nalini Venkatasubramanian:
An Implementation Experience with SDN-enabled IoT Data Exchange Middleware. Middleware (Posters) 2018: 21-22 - [c165]Kyle E. Benson, Georgios Bouloukakis, Casey Grant, Valérie Issarny, Sharad Mehrotra, Ioannis D. Moscholios, Nalini Venkatasubramanian:
FireDeX: a Prioritized IoT Data Exchange Middleware for Emergency Response. Middleware 2018: 279-292 - [c164]Mamadou H. Diallo, Nisha Panwar, Sharad Mehrotra, Ardalan Amiri Sani:
Trustworthy Sensing in an Untrusted IoT Environment. PerCom Workshops 2018: 468-471 - [c163]Sameera Ghayyur, Yan Chen, Roberto Yus, Ashwin Machanavajjhala, Michael Hay, Gerome Miklau, Sharad Mehrotra:
IoT-Detective: Analyzing IoT Data Under Differential Privacy. SIGMOD Conference 2018: 1725-1728 - [c162]Qing Han, Ronald T. Eguchi, Sharad Mehrotra, Nalini Venkatasubramanian:
Enabling State Estimation for Fault Identification in Water Distribution Systems Under Large Disasters. SRDS 2018: 161-170 - [i8]Dhrubajyoti Ghosh, Roberto Yus, Yasser Altowim, Sharad Mehrotra:
Progressive Evaluation of Queries over Untagged Data. CoRR abs/1805.12033 (2018) - [i7]Sharad Mehrotra, Kerim Yasin Oktay, Shantanu Sharma:
Exploiting Data Sensitivity on Partitioned Data. CoRR abs/1812.01741 (2018) - [i6]Sharad Mehrotra, Shantanu Sharma, Jeffrey D. Ullman, Anurag Mishra:
Partitioned Data Security on Outsourced Sensitive and Non-sensitive Data. CoRR abs/1812.09233 (2018) - 2017
- [j61]Hotham Altwaijry, Dmitri V. Kalashnikov, Sharad Mehrotra:
QDA: A Query-Driven Approach to Entity Resolution. IEEE Trans. Knowl. Data Eng. 29(2): 402-417 (2017) - [c161]Primal Pappachan, Martin Degeling
, Roberto Yus, Anupam Das, Sruti Bhagavatula, William Melicher, Pardis Emami Naeini, Shikun Zhang, Lujo Bauer, Alfred Kobsa, Sharad Mehrotra, Norman M. Sadeh, Nalini Venkatasubramanian:
Towards Privacy-Aware Smart Buildings: Capturing, Communicating, and Enforcing Privacy Policies and Preferences. ICDCS Workshops 2017: 193-198 - [c160]Kerim Yasin Oktay, Murat Kantarcioglu, Sharad Mehrotra:
Secure and Efficient Query Processing over Hybrid Clouds. ICDE 2017: 733-744 - [c159]Yasser Altowim, Sharad Mehrotra:
Parallel Progressive Approach to Entity Resolution Using MapReduce. ICDE 2017: 909-920 - [c158]Abdulrahman Alsaudi, Mehdi Sadri, Yasser Altowim, Sharad Mehrotra:
Adaptive Topic Follow-Up on Twitter. ICDE 2017: 1385-1386 - [c157]Doudalis Stylianos, Sharad Mehrotra:
SORTaki: A Framework to Integrate Sorting with Differential Private Histogramming Algorithms. PST 2017: 95-104 - [c156]Eun-Jeong Shin, Roberto Yus, Sharad Mehrotra, Nalini Venkatasubramanian:
Exploring fairness in participatory thermal comfort control in smart buildings. BuildSys@SenSys 2017: 19:1-19:10 - [c155]Saeed Mirzamohammadi, Justin A. Chen, Ardalan Amiri Sani, Sharad Mehrotra, Gene Tsudik:
Ditio: Trustworthy Auditing of Sensor Activities in Mobile & IoT Devices. SenSys 2017: 28:1-28:14 - [r8]Iosif Lazaridis, Sharad Mehrotra:
Aggregate Queries, Progressive Approximate. Encyclopedia of GIS 2017: 59-65 - [r7]Iosif Lazaridis, Sharad Mehrotra:
Multi-resolution Aggregate Tree. Encyclopedia of GIS 2017: 1413-1414 - [r6]Iosif Lazaridis, Sharad Mehrotra:
Progressive Approximate Aggregation. Encyclopedia of GIS 2017: 1668 - [i5]Stelios Doudalis, Ios Kotsogiannis, Samuel Haney, Ashwin Machanavajjhala, Sharad Mehrotra:
One-sided Differential Privacy. CoRR abs/1712.05888 (2017) - 2016
- [j60]Daniel Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom:
The Beckman report on database research. Commun. ACM 59(2): 92-99 (2016) - [j59]Liyan Zhang, Xikui Wang, Dmitri V. Kalashnikov, Sharad Mehrotra, Deva Ramanan:
Query-Driven Approach to Face Clustering and Tagging. IEEE Trans. Image Process. 25(10): 4504-4513 (2016) - [c154]Mehdi Sadri, Sharad Mehrotra, Yaming Yu:
Online Adaptive Topic Focused Tweet Acquisition. CIKM 2016: 2353-2358 - [c153]Sharad Mehrotra, Alfred Kobsa, Nalini Venkatasubramanian, Siva Raj Rajagopalan:
TIPPERS: A privacy cognizant IoT environment. PerCom Workshops 2016: 1-6 - [p6]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra:
Context Assisted Person identification for Images and Videos. Handbook of Pattern Recognition and Computer Vision 2016: 197-216 - 2015
- [j58]Hotham Altwaijry, Sharad Mehrotra, Dmitri V. Kalashnikov:
QuERy: A Framework for Integrating Entity Resolution with Query Processing. Proc. VLDB Endow. 9(3): 120-131 (2015) - [j57]Jie Xu, Dmitri V. Kalashnikov, Sharad Mehrotra:
Query Aware Determinization of Uncertain Objects. IEEE Trans. Knowl. Data Eng. 27(1): 207-221 (2015) - [j56]Zhenhua Wang, Lidan Shou, Ke Chen, Gang Chen, Sharad Mehrotra:
On Summarization and Timeline Generation for Evolutionary Tweet Streams. IEEE Trans. Knowl. Data Eng. 27(5): 1301-1315 (2015) - [c152]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Building a Mobile Applications Knowledge Base for the Linked Data Cloud. MoDeST@ISWC 2015: 14-25 - [c151]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Mobipedia: Mobile Applications Linked Data. International Semantic Web Conference (Posters & Demos) 2015 - [c150]Kerim Yasin Oktay, Sharad Mehrotra, Vaibhav Khadilkar, Murat Kantarcioglu:
SEMROD: Secure and Efficient MapReduce Over HybriD Clouds. SIGMOD Conference 2015: 153-166 - 2014
- [j55]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra:
Context-assisted face clustering framework with human-in-the-loop. Int. J. Multim. Inf. Retr. 3(2): 69-88 (2014) - [j54]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
W3-privacy: understanding what, when, and where inference channels in multi-camera surveillance video. Multim. Tools Appl. 68(1): 135-158 (2014) - [j53]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra, Ronen Vaisenberg:
Context-based person identification framework for smart video surveillance. Mach. Vis. Appl. 25(7): 1711-1725 (2014) - [j52]Ronen Vaisenberg, Alessio Della Motta
, Sharad Mehrotra, Deva Ramanan:
Scheduling sensors for monitoring sentient spaces using an approximate POMDP policy. Pervasive Mob. Comput. 10: 83-103 (2014) - [j51]Sharad Mehrotra:
Front Matter. Proc. VLDB Endow. 7(10): i-xi (2014) - [j50]Yasser Altowim, Dmitri V. Kalashnikov, Sharad Mehrotra:
Progressive Approach to Relational Entity Resolution. Proc. VLDB Endow. 7(11): 999-1010 (2014) - [j49]Daniel J. Abadi, Rakesh Agrawal, Anastasia Ailamaki, Magdalena Balazinska, Philip A. Bernstein, Michael J. Carey, Surajit Chaudhuri, Jeffrey Dean, AnHai Doan, Michael J. Franklin, Johannes Gehrke, Laura M. Haas, Alon Y. Halevy, Joseph M. Hellerstein, Yannis E. Ioannidis, H. V. Jagadish, Donald Kossmann, Samuel Madden, Sharad Mehrotra, Tova Milo, Jeffrey F. Naughton, Raghu Ramakrishnan, Volker Markl, Christopher Olston, Beng Chin Ooi, Christopher Ré, Dan Suciu, Michael Stonebraker, Todd Walter, Jennifer Widom:
The Beckman Report on Database Research. SIGMOD Rec. 43(3): 61-70 (2014) - [j48]Leila Jalali, Sharad Mehrotra, Nalini Venkatasubramanian:
Simulation integration: using multidatabase systems concepts. Simul. 90(11): 1268-1289 (2014) - [j47]Kyungbaek Kim, Sharad Mehrotra, Nalini Venkatasubramanian:
Efficient and Reliable Application Layer Multicast for Flash Dissemination. IEEE Trans. Parallel Distributed Syst. 25(10): 2571-2582 (2014) - [c149]Hakan Hacigümüs, Balakrishna R. Iyer, Sharad Mehrotra:
Secure Computation on Outsourced Data: A 10-year Retrospective. DASFAA (1) 2014: 16-27 - [c148]Jie Xu, Dmitri V. Kalashnikov, Sharad Mehrotra:
Efficient summarization framework for multi-attribute uncertain data. SIGMOD Conference 2014: 421-432 - [p5]Kerim Yasin Oktay, Mahadevan Gomathisankaran, Murat Kantarcioglu, Sharad Mehrotra, Anoop Singhal:
Towards Data Confidentiality and a Vulnerability Analysis Framework for Cloud Computing. Secure Cloud Computing 2014: 213-238 - 2013
- [j46]Nabil Adam, Randy Stiles, Andrew Zimdars, Ryan Timmons, Jackie Leung, Greg Stachnick, Jeff Merrick, Robert Coop, Vadim A. Slavin, Tanya Kruglikov, John Galmiche, Sharad Mehrotra:
Consequence analysis of complex events on critical U.S. infrastructure. Commun. ACM 56(6): 83-91 (2013) - [j45]Ravi Chandra Jammalamadaka, Roberto Gamboni, Sharad Mehrotra, Kent E. Seamons, Nalini Venkatasubramanian:
A middleware approach for outsourcing data securely. Comput. Secur. 32: 252-266 (2013) - [j44]Sharad Mehrotra:
Letter from the Special Issue Editor. IEEE Data Eng. Bull. 36(3): 2-3 (2013) - [j43]Sharad Mehrotra, Xiaogang Qiu, Zhidong Cao, Austin Tate:
Technological Challenges in Emergency Response. IEEE Intell. Syst. 28(4): 5-8 (2013) - [j42]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
Privacy aware publication of surveillance video. Int. J. Trust. Manag. Comput. Commun. 1(1): 23-51 (2013) - [j41]Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad Mehrotra:
Adaptive Connection Strength Models for Relationship-Based Entity Resolution. ACM J. Data Inf. Qual. 4(2): 8:1-8:22 (2013) - [j40]Hotham Altwaijry, Dmitri V. Kalashnikov, Sharad Mehrotra:
Query-Driven Approach to Entity Resolution. Proc. VLDB Endow. 6(14): 1846-1857 (2013) - [j39]Mayur Deshpande, Kyungbaek Kim, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
ReCREW: A Reliable Flash-Dissemination System. IEEE Trans. Computers 62(7): 1432-1446 (2013) - [c147]Erman Pattuk, Murat Kantarcioglu, Vaibhav Khadilkar, Huseyin Ulusoy, Sharad Mehrotra:
BigSecret: A Secure Data Management Framework for Key-Value Stores. IEEE CLOUD 2013: 147-154 - [c146]Chen Li, Sharad Mehrotra, Liang Jin:
Record Linkage: A 10-Year Retrospective. DASFAA (1) 2013: 3-12 - [c145]Kerim Yasin Oktay, Vaibhav Khadilkar, Murat Kantarcioglu, Sharad Mehrotra:
Risk Aware Approach to Data Confidentiality in Cloud Computing. ICISS 2013: 27-42 - [c144]Liyan Zhang, Dmitri V. Kalashnikov, Sharad Mehrotra:
A unified framework for context assisted face clustering. ICMR 2013: 9-16 - [c143]Ronen Vaisenberg, Alessio Della Motta, Sharad Mehrotra, Deva Ramanan:
Scheduling sensors for monitoring sentient spaces using an approximate POMDP policy. PerCom 2013: 141-150 - [c142]Sharad Mehrotra:
Towards a Risk-Based Approach to Achieving Data Confidentiality in Cloud Computing. Secure Data Management 2013: 42-47 - [i4]M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos:
On Optimal and Fair Service Allocation in Mobile Cloud Computing. CoRR abs/1308.4391 (2013) - 2012
- [j38]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
Adaptive Transformation for Robust Privacy Protection in Video Surveillance. Adv. Multim. 2012: 639649:1-639649:14 (2012) - [j37]Sharad Mehrotra:
Letter from the Special Issue Editor. IEEE Data Eng. Bull. 35(4): 3 (2012) - [j36]Vaibhav Khadilkar, Kerim Yasin Oktay, Murat Kantarcioglu, Sharad Mehrotra:
Secure Data Processing over Hybrid Clouds. IEEE Data Eng. Bull. 35(4): 46-54 (2012) - [j35]Grit Denker, Nikil D. Dutt
, Sharad Mehrotra, Mark-Oliver Stehr, Carolyn L. Talcott, Nalini Venkatasubramanian:
Resilient dependable cyber-physical systems: a middleware perspective. J. Internet Serv. Appl. 3(1): 41-49 (2012) - [j34]Pradeep K. Atrey, Sabu Emmanuel, Sharad Mehrotra, Mohan S. Kankanhalli:
Guest editorial: Privacy-aware multimedia surveillance systems. Multim. Syst. 18(2): 95-97 (2012) - [j33]Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad Mehrotra, Yaming Yu:
Attribute and object selection queries on objects with probabilistic attributes. ACM Trans. Database Syst. 37(1): 3:1-3:41 (2012) - [j32]Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad Mehrotra:
Exploiting Web querying for Web people search. ACM Trans. Database Syst. 37(1): 7:1-7:41 (2012) - [j31]Hojjat Jafarpour, Bijit Hore, Sharad Mehrotra, Nalini Venkatasubramanian:
CCD: A Distributed Publish/Subscribe Framework for Rich Content Formats. IEEE Trans. Parallel Distributed Syst. 23(5): 844-852 (2012) - [j30]Bijit Hore, Sharad Mehrotra, Mustafa Canim, Murat Kantarcioglu:
Secure multidimensional range queries over outsourced data. VLDB J. 21(3): 333-358 (2012) - [c141]Kerim Yasin Oktay, Vaibhav Khadilkar, Bijit Hore, Murat Kantarcioglu, Sharad Mehrotra, Bhavani M. Thuraisingham:
Risk-Aware Workload Distribution in Hybrid Clouds. IEEE CLOUD 2012: 229-236 - [c140]Mamadou H. Diallo, Bijit Hore, Ee-Chien Chang
, Sharad Mehrotra, Nalini Venkatasubramanian:
CloudProtect: Managing Data Privacy in Cloud Applications. IEEE CLOUD 2012: 303-310 - [c139]Nabil Adam, Jayan Eledath, Sharad Mehrotra, Nalini Venkatasubramanian:
Social media alert and response to threats to citizens (SMART-C). CollaborateCom 2012: 181-189 - [c138]Bijit Hore, Ee-Chien Chang
, Mamadou H. Diallo, Sharad Mehrotra:
Indexing Encrypted Documents for Supporting Efficient Keyword Search. Secure Data Management 2012: 93-110 - [c137]Chunwang Zhang, Junjie Jin, Ee-Chien Chang
, Sharad Mehrotra:
Secure Quasi-Realtime Collaborative Editing over Low-Cost Storage Services. Secure Data Management 2012: 111-129 - [c136]Leila Jalali, Carolyn L. Talcott, Nalini Venkatasubramanian, Sharad Mehrotra:
Formal specification of multisimulations using Maude. SpringSim (TMS-DEVS) 2012: 22 - [c135]M. Reza Rahimi, Nalini Venkatasubramanian, Sharad Mehrotra, Athanasios V. Vasilakos:
MAPCloud: Mobile Applications on an Elastic and Scalable 2-Tier Cloud Architecture. UCC 2012: 83-90 - 2011
- [j29]Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian, Kent E. Seamons
:
DataVault: secure mobile access and data sharing. Netw. Secur. 2011(5): 16-19 (2011) - [j28]Ravi Chandra Jammalamadaka, Sharad Mehrotra, Nalini Venkatasubramanian:
Protecting personal data from untrusted web-based data services. Netw. Secur. 2011(9): 11-16 (2011) - [j27]Dmitri V. Kalashnikov, Sharad Mehrotra, Jie Xu, Nalini Venkatasubramanian:
A Semantics-Based Approach for Speech Annotation of Images. IEEE Trans. Knowl. Data Eng. 23(9): 1373-1387 (2011) - [c134]Leila Jalali, Sharad Mehrotra, Nalini Venkatasubramanian:
Multisimulations: Towards Next Generation Integrated Simulation Environments. Formal Modeling: Actors, Open Systems, Biological Systems 2011: 352-367 - [c133]Sai Wu, Feng Li, Sharad Mehrotra, Beng Chin Ooi:
Query optimization for massively parallel data processing. SoCC 2011: 12 - [c132]Mukesh Kumar Saini, Pradeep K. Atrey, Sharad Mehrotra, Mohan S. Kankanhalli:
Anonymous surveillance. ICME 2011: 1-6 - [c131]Jinsu Wang, Sharad Mehrotra, Kyungbaek Kim, Nalini Venkatasubramanian:
Enhancing cellular infrastructures: a reflective approach. ARM@Middleware 2011: 7-13 - [c130]