default search action
Susan V. Vrbsky
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2018
- [j36]Jeffrey A. Robinson, Susan V. Vrbsky, Xiaoyan Hong, Brian P. Eddy:
Analysis of a High-Performance TSP Solver on the GPU. ACM J. Exp. Algorithmics 23 (2018) - [c44]Michael Galloway, Gabriel Loewen, Jeffrey A. Robinson, Susan V. Vrbsky:
Performance of Virtual Machines Using Diskfull and Diskless Compute Nodes. IEEE CLOUD 2018: 740-745 - 2017
- [j35]Md. Ashfakul Islam, Susan V. Vrbsky:
Transaction management with tree-based consistency in cloud databases. Int. J. Cloud Comput. 6(1): 58-78 (2017) - 2015
- [c43]Michael Galloway, Gabriel Loewen, Susan V. Vrbsky:
Performance Metrics of Virtual Machine Live Migration. CLOUD 2015: 637-644 - 2014
- [j34]Jeffrey Michael Galloway, Gabriel Loewen, Susan V. Vrbsky:
Deploying a cost efficient geographically distributed private cloud architecture. Int. J. Cloud Comput. 3(2): 125-142 (2014) - [j33]Kazi Zunnurhain, Susan V. Vrbsky, Ragib Hasan:
FAPA: flooding attack protection architecture in a cloud system. Int. J. Cloud Comput. 3(4): 379-401 (2014) - [j32]Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsky:
Differentiated Virtual Passwords, Secret Little Functions, and Codebooks for Protecting Users From Password Theft. IEEE Syst. J. 8(2): 406-416 (2014) - 2013
- [j31]Hui Chen, Yang Xiao, Susan V. Vrbsky:
An update-based step-wise optimal cache replacement for wireless data access. Comput. Networks 57(1): 197-212 (2013) - [j30]Susan V. Vrbsky, Michael Galloway, Robert Carr, Rahul Nori, David Grubic:
Decreasing power consumption with energy efficient data aware strategies. Future Gener. Comput. Syst. 29(5): 1152-1163 (2013) - [j29]Md. Ashfakul Islam, Susan V. Vrbsky:
Comparison of consistency approaches for cloud databases. Int. J. Cloud Comput. 2(4): 378-398 (2013) - [j28]Gabriel Loewen, Jeffrey M. Galloway, Jeffrey A. Robinson, Xiaoyan Hong, Susan V. Vrbsky:
THUNDER: helping underfunded NPO's distribute electronic resources. J. Cloud Comput. 2: 24 (2013) - [c42]Zachary Parker, Scott Poe, Susan V. Vrbsky:
Comparing NoSQL MongoDB to an SQL DB. ACM Southeast Regional Conference 2013: 5:1-5:6 - [c41]Gabriel Loewen, Michael Galloway, Susan V. Vrbsky:
A graphical interface for private cloud and cluster management. ACM Southeast Regional Conference 2013: 23:1-23:6 - [c40]Nenad Jukic, Melanie K. Ruiz, Sarah N. Shea, Svetlozar Nestorov, Susan V. Vrbsky, Miguel Velasco, Boris Jukic:
Data Modeling in the Cloud. AMCIS 2013 - [c39]Gabriel Loewen, Michael Galloway, Susan V. Vrbsky:
Designing a Middleware API for Building Private IaaS Cloud Architectures. ICDCS Workshops 2013: 103-107 - [c38]Gabriel Loewen, Michael Galloway, Susan V. Vrbsky:
On the Performance of Apache Hadoop in a Tiny Private IaaS Cloud. ITNG 2013: 189-195 - 2012
- [c37]Jeffrey M. Galloway, Susan V. Vrbsky:
A power efficient persistent storage consolidation algorithm for cloud computing. IGCC 2012: 1-6 - [c36]Md. Ashfakul Islam, Susan V. Vrbsky, Mohammad Asadul Hoque:
Performance analysis of a tree-based consistency approach for cloud databases. ICNC 2012: 39-44 - [c35]Karl Smith, Jeffrey M. Galloway, Susan V. Vrbsky:
An Empirical Study on the Impact of an Idle Limit in Distributed Systems. ITNG 2012: 209-213 - [e1]Randy K. Smith, Susan V. Vrbsky:
Proceedings of the 50th Annual Southeast Regional Conference, 2012, Tuscaloosa, AL, USA, March 29-31, 2012. ACM 2012, ISBN 978-1-4503-1203-5 [contents] - 2011
- [j27]Ferosh Jacob, Amber Wagner, Prateek Bahri, Susan V. Vrbsky, Jeffrey G. Gray:
Simplifying the Development and Deployment of MapReduce Algorithms. Int. J. Next Gener. Comput. 2(2) (2011) - [j26]Monica Anderson, Andrew McKenzie, Briana Wellman, Marcus Brown, Susan V. Vrbsky:
Affecting attitudes in first-year computer science using syntaxfree robotics programming. Inroads 2(3): 51-57 (2011) - [c34]Karl Smith, Michael Galloway, Susan V. Vrbsky:
Reactive power management for distributed systems. ACM Southeast Regional Conference 2011: 270-275 - 2010
- [j25]Ming Lei, Susan V. Vrbsky, Yang Xiao:
Scheduling on-demand data broadcast in mixed-type request environments. Comput. Networks 54(5): 811-825 (2010) - [c33]Susan V. Vrbsky, Ming Lei, Karl Smith, Jeff Byrd:
Data Replication and Power Consumption in Data Grids. CloudCom 2010: 288-295 - [c32]Md. Ashfakul Islam, Susan V. Vrbsky:
Tree-Based Consistency Approach for Cloud Databases. CloudCom 2010: 401-404
2000 – 2009
- 2009
- [j24]Qiu Fang, Susan V. Vrbsky, Ming Lei, Richard Borie:
Scheduling on-demand broadcast with timing constraints. J. Parallel Distributed Comput. 69(8): 737-747 (2009) - [j23]Lei Tang, Xiaoyan Hong, Susan V. Vrbsky:
Using camouflaging mobility to protect privacy in mobile ad hoc networks. Secur. Commun. Networks 2(6): 580-594 (2009) - [j22]Ke Meng, Yang Xiao, Susan V. Vrbsky:
Building a wireless capturing tool for WiFi. Secur. Commun. Networks 2(6): 654-668 (2009) - [c31]Ming Lei, Susan V. Vrbsky, Ryan Horton:
A Remote Data Access Element for Data Grids. GCA 2009: 188-194 - 2008
- [j21]Hui Chen, Yang Xiao, Susan V. Vrbsky:
Scalability study of cache access mechanisms in multiple-cell wireless networks. Comput. Networks 52(15): 3017-3027 (2008) - [j20]Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih Li:
Virtual password using random linear functions for on-line services, ATM machines, and pervasive computing. Comput. Commun. 31(18): 4367-4375 (2008) - [j19]Ming Lei, Susan V. Vrbsky, Xiaoyan Hong:
An on-line replication strategy to increase availability in Data Grids. Future Gener. Comput. Syst. 24(2): 85-98 (2008) - [c30]Lei Tang, Susan V. Vrbsky, Xiaoyan Hong:
Collaborated Camouflaging Mobility for Mobile Privacy. GLOBECOM 2008: 2154-2158 - [c29]Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsky:
Secret Little Functions and Codebook for Protecting Users from Password Theft. ICC 2008: 1525-1529 - [c28]Ming Lei, Yang Xiao, Susan V. Vrbsky, Chung-Chih Li, Li Liu:
A Virtual Password Scheme to Protect Passwords. ICC 2008: 1536-1540 - [c27]Ming Lei, Yang Xiao, Susan V. Vrbsky:
Active Protection in Wireless Networking. MSN 2008: 267-270 - [c26]Ming Lei, Susan V. Vrbsky:
Minimizing the Cost of Read-Only Transactions in a Data Sharing Environment. PDPTA 2008: 908-914 - [c25]Lei Tang, Xiaoyan Hong, Susan V. Vrbsky:
Camouflaging mobility for itinerary privacy in mobile ad-hoc networks. WOWMOM 2008: 1-7 - 2007
- [c24]Ming Lei, Xiaoyan Hong, Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. GLOBECOM 2007: 49-53 - [c23]Ming Lei, Susan V. Vrbsky, Yang Xiao:
A Cost Model for Scheduling On-Demand Data Broadcast in Mixed-Type Request Environments. GLOBECOM 2007: 514-519 - [c22]Hui Chen, Yang Xiao, Susan V. Vrbsky:
Invalidation Report Scalability of Cache Access Mechanisms in Future Multiple-Cell Wireless Internet. GLOBECOM 2007: 1943-1947 - [c21]Ming Lei, Susan V. Vrbsky, Zijie Qi:
Online Grid Replication Optimizers to Improve System Reliability. IPDPS 2007: 1-8 - [c20]Ming Lei, Zijie Qi, Xiaoyan Hong, Susan V. Vrbsky:
Protecting Location Privacy with Dynamic Mac Address Exchanging in Wireless Networks. ISI 2007: 377 - 2006
- [c19]Ming Lei, Susan V. Vrbsky, Xiaoyan Hong:
A Dynamic Data Grid Replication Strategy to Minimize the Data Missed. BROADNETS 2006 - [c18]Ming Lei, Susan V. Vrbsky:
A Data Replication Strategy to Increase Data Availability in Data Grids. GCA 2006: 221-227 - 2005
- [j18]Allen S. Parrish, Susan V. Vrbsky, Brandon Dixon, Weigang Ni:
Optimizing disk storage to support statistical analysis operations. Decis. Support Syst. 38(4): 621-628 (2005) - [j17]Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky:
Improved variable and value ranking techniques for mining categorical traffic accident data. Expert Syst. Appl. 29(4): 795-806 (2005) - [j16]Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky, Allen S. Parrish:
Enhancing Database Access Control by Facilitating Non-Key Related Cover Stories. J. Database Manag. 16(3): 1-20 (2005) - [j15]Qiu Fang, Susan V. Vrbsky, Hui-Chuan Chen, Yu Dang:
Pull-based broadcasting with timing constraints. Parallel Algorithms Appl. 20(3-4): 235-252 (2005) - [c17]Susan V. Vrbsky, Randy K. Smith, Allen S. Parrish, Huanjing Wang:
Strategies to Improve Variable Selection Performance. IKE 2005: 209-214 - [c16]Huanjing Wang, Allen S. Parrish, Randy K. Smith, Susan V. Vrbsky:
Variable selection and ranking for analyzing automobile traffic accident data. SAC 2005: 32-37 - 2004
- [j14]Weigang Ni, Susan V. Vrbsky, Sibabrata Ray:
Pitfalls In Distributed Nonblocking Checkpointing. J. Interconnect. Networks 5(1): 47-78 (2004) - [c15]Qiu Fang, Susan V. Vrbsky, Yu Dang, Weigang Ni:
A Pull-Based Broadcast Algorithm that Considers Timing Constraints. ICPP Workshops 2004: 46-53 - 2003
- [j13]Allen S. Parrish, Brandon Dixon, David Cordes, Susan V. Vrbsky, David Brown:
CARE: An Automobile Crash Data Analysis Tool. Computer 36(6): 22-32 (2003) - [j12]Nenad Jukic, Svetlozar Nestorov, Susan V. Vrbsky:
Closing the key loophole in MLS databases. SIGMOD Rec. 32(2): 15-20 (2003) - [c14]Weigang Ni, Qiu Fang, Susan V. Vrbsky:
A Lazy Data Request Approach for On-Demand Data Broadcasting. ICDCS Workshops 2003: 790-796 - [c13]Weigang Ni, Susan V. Vrbsky, Sibabrata Ray:
Low-cost Coordinated Nonblocking Checkpointing in Mobile Computing Systems. ISCC 2003: 1427-1434 - 2002
- [j11]Quazi N. Ahmed, Susan V. Vrbsky:
Maintaining security and timeliness in real-time database system. J. Syst. Softw. 61(1): 15-29 (2002) - [c12]Weigang Ni, Susan V. Vrbsky:
Virtual Locks: A Concurrency Control Protocol for Adaptive Broadcasting System. CATA 2002: 339-344 - [c11]Jingyuan Zhang, Susan V. Vrbsky, Guangbin Fan:
Time-Optimal Parallel Algorithms for Constructing Optimal Virtual Cellular Networks. ICPADS 2002: 42-47 - 2000
- [j10]Sasa Tomic, Susan V. Vrbsky, Tracy Camp:
A new measure of temporal consistency for derived objects in real-time database systems. Inf. Sci. 124(1-4): 139-152 (2000) - [j9]Quazi N. Ahmed, Susan V. Vrbsky:
Triggered Updates for Temporal Consistency in Real-Time Databases. Real Time Syst. 19(3): 209-243 (2000)
1990 – 1999
- 1999
- [j8]Nenad Jukic, Susan V. Vrbsky, Allen S. Parrish, Brandon Dixon, Boris Jukic:
A Belief-Consistent Multilevel Secure Relational Data Model. Inf. Syst. 24(5): 377-400 (1999) - [j7]Susan V. Vrbsky, Sasa Tomic:
Satisfying temporal consistency constraints of real-time databases. J. Syst. Softw. 45(1): 45-60 (1999) - 1998
- [j6]Susan V. Vrbsky, Sasa Tomic:
Satisfying timing constraints of real-time databases. J. Syst. Softw. 41(1): 63-73 (1998) - [c10]Nenad Jukic, Susan V. Vrbsky:
Joining relations in the belief-consistent multilevel secure relational model. ACM Southeast Regional Conference 1998: 289-296 - [c9]Quazi N. Ahmed, Susan V. Vrbsky:
Issues in security for real-time databases. ACM Southeast Regional Conference 1998: 297-299 - [c8]Quazi N. Ahmed, Susan V. Vrbsky:
Maintaining Security in Firm Real-Time Database Systems. ACSAC 1998: 83-90 - [c7]Quazi N. Ahmed, Susan V. Vrbsky:
Maintaining Integrity Constraints and Security in real-Time Database Systems. IICIS 1998: 255-270 - 1997
- [j5]Nenad Jukic, Susan V. Vrbsky:
Asserting Beliefs in MLS Relational Models. SIGMOD Rec. 26(3): 30-35 (1997) - [c6]Eric Minor, Susan V. Vrbsky:
A tightly secure object-oriented data model using both discretionary and mandatory security methodologies. ACM Southeast Regional Conference 1997: 211-218 - [c5]Daniel Strickland, Susan V. Vrbsky:
Stopping traffic: discretionary access control in a multidatabase system. ACM Southeast Regional Conference 1997: 265-267 - [c4]Susan V. Vrbsky, Sasa Tomic, Nenad Jukic:
Concurrency Control for Approximate Query Processing of Real-Time Database Systems. RTDB 1997: 227-246 - 1996
- [j4]Susan V. Vrbsky:
A Data Model for Approximate Query Processing of Real-Time Databases. Data Knowl. Eng. 21(1): 79-102 (1996) - [j3]Nenad Jukic, Susan V. Vrbsky:
Feasibility of Aggregates in Time Constrained Queries. Inf. Syst. 21(7): 595-614 (1996) - 1994
- [j2]Susan V. Vrbsky, Jane W.-S. Liu:
Producing approximate answers to set- and single-valued queries. J. Syst. Softw. 27(3): 243-251 (1994) - 1993
- [b1]Susan V. Vrbsky:
APPROXIMATE: A Query Processor That Produces Monotonically Improving Approximate Answers. University of Illinois Urbana-Champaign, USA, 1993 - [j1]Susan V. Vrbsky, Jane W.-S. Liu:
APPROXIMATE - A Query Processor that Produces Monotonically Improving Approximate Answers. IEEE Trans. Knowl. Data Eng. 5(6): 1056-1068 (1993) - 1991
- [c3]Susan V. Vrbsky, Jane W.-S. Liu:
An Object-Oriented Query Processor that Produces Monotonically Improving Approximate Answers. ICDE 1991: 472-481
1980 – 1989
- 1988
- [c2]Susan V. Vrbsky, Kwei-Jay Lin:
Recovering Imprecise Transactions with Real-Time Constraints. SRDS 1988: 185-193 - 1984
- [c1]Yaakov L. Varol, Susan V. Vrbsky:
Distributed Query Processing Allowing for Redundant Data. ICDCS 1984: 389-396
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 19:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint