Arshad Jhumka - Publications
2023
- Edward Chuah, Arshad Jhumka and Sai Narasimhamurthy. An Empirical Study of Major Page Faults for Failure Diagnosis in Cluster Systems. Journal of Supercomputing.
- Abdullah AlHajri, Arshad Jhumka and Richard Kirk. OCC2T: An Early-Read Dual-Track OCC Algorithm For Mixed Mode Systems. SAC 2023 (Track DBDM - Databases and Big Data Management, with Information Systems). BEST PAPER AWARD
- Abdullah AlHajri and Arshad Jhumka. Addressing a Malicious Tampering Attack of Default Isolation Level in DBMS. International Conference on Ubiquitous Computing and Communications (IUCC).
- Jawaher Alharbi, Adam Chester and Arshad Jhumka. Towards Understanding Checkpointing in Transiently Powered IoT Networks. 22nd IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2023).
- Jawaher Alharbi and Arshad Jhumka. To Checkpoint or Not to Checkpoint: That is the Question. Proceedings International Conference on Embedded Wireless Systems and Networks (EWSN), 2023.
- Jawaher Alharbi and Arshad Jhumka. Understanding Checkpointing in Transiently Powered IoT Networks. Poster, Information Processing in Sensor Networks (IPSN).
- Khalid Alharthi, Arshad Jhumka, Sheng Di, Lin Gui, Franck Cappello and Simon McIntosh-Smith: Time Machine: Generative Real-Time Model For Failure (and Lead Time) Prediction in HPC Systems, Dependable Systems and Networks (DSN).
- Mohammad Sadegh Nourbakhsh, Feng Hao and Arshad Jhumka. Transaction Fee Mechanism For Order-Sensitive Blockchain-based Applications.
7th International Workshop on Cryptocurrencies and Blockchain Technology (CBT) 2023
2022
- Matthew Bradbury, Arshad Jhumka, Tim Watson, Denys Flores, Jonathan Burton, and Matthew Butler. Threat Modelling Guided Trust-based Task Offloading for Resource-constrained Internet of Things. Journal ACM Transactions on Sensor Networks, to Appear. 41 pages.
- Edward Chuah, Neeraj Suri, Miroslaw Malek and Arshad Jhumka. A Survey of Log-Correlation Tools for Failure Diagnosis and Prediction in Cluster Systems. IEEE Access, 10: 133487-133503.
- Khalid Alharthi, Arshad Jhumka, Sheng Di and Franck Cappello. Clairvoyant: A Log-Based Transformer-Decoder for Failure Prediction in Large-Scale Systems. Proceedings of ACM International Conference on Supercomputing (ICS), 2022.
- Mathew Bradbury, Arshad Jhumka and Tim Watson. Information Management for Trust Computation on Resource-constrained IoT Devices . Future Generation Computer Systems.
- Matthew Bradbury and Arshad Jhumka. Quantifying Source Location Privacy Routing Performance via Divergence and Information Loss. IEEE Transactions on Information Forensics and Security (To Appear)
- Chen Gu, Arshad Jhumka and Carsten Maple. Silence is Golden: A Source Location Privacy Scheme for Wireless Sensor Networks Based on Silent Nodes. Security and Communication Networks, vol. 2022.
2021
- Matthew Bradbury, Arshad Jhumka and Tim Watson. Trust Trackers for Computation Offloading in Edge-Based IoT Networks. Proceedings of IEEE International Conference on Computer Communications (Infocom). PDFLink opens in a new window
- Edward Chuah, Arshad Jhumka, Samantha Alt, Richard Evans and Neeraj Suri. Failure Diagnosis for Cluster Systems using Partial Correlations. ISPA 2021
- Mansour Aldawood, Arshad Jhumka and Suhaib Fahmy. Sit Here: Placing Virtual Machines Securely in Cloud Environments. Proceedings 11th International Conference on Cloud Computing and Services Science (CLOSER).
- David Richardson, Arshad Jhumka and Luca Mottola. Protocol Transformation for Transiently Powered Wireless Sensor Networks. Proceedings 36th ACM/SIGAPP Symposium on Applied Computing (SAC), Networking track.
- Matthew Bradbury, Arshad Jhumka and Tim Watson. Trust Assessment in 32 KiB of RAM: Multi-application Trust-based Task Offloading for Resource-constrained IoT Nodes. Proceedings 36th ACM/SIGAPP Symposium on Applied Computing (SAC), Dependable, Adaptive and Secure Distributed Systems track.
- Mansour Aldawood and Arshad Jhumka. Secure Allocation for Graph-Based Virtual Machines in Cloud Environments. Proc IEEE 18th International Conference on Privacy, Security, and Trust (PST 2021).
- Khalid Alharthi, Arshad Jhumka, Sheng Di, Edward Chuah and Franck Cappello. Sentiment Analysis based Error Detection for Large-Scale Systems. Proceedings 51st International Conference on Dependable Systems and Networks (DSN).
- Sara Alhajaili and Arshad Jhumka. Reliable Logging in Wireless Sensor IoT Networks in The Presence of Byzantine Faults. Proceedings of TrustCom 2021.
- Edward Chuah, Neeraj Suri, Arshad Jhumka and Samantha Alt. Challenges in Identifying Network Attacks Using Netflow Data. Proceedings 20th International Symposium on Network Computing and Applications (NCA), 2021.
- Jasmine Grosso and Arshad Jhumka. Fault-Tolerant Ant Colony Based-Routing in Many-to-Many IoT Sensor Networks. Proceedings 20th International Symposium on Network Computing and Applications (NCA), 2021.
2020
- David Richardson and Arshad Jhumka. Profiling Two Broadcast Protocols for Transiently Powered Wireless Sensor Networks. Proceedings 9th European Congress Embedded Real-Time Systems, 2020
- Matt Bradbury, Arshad Jhumka and Carsten Maple. A Spatial Source Location Privacy-Aware Duty Cycle for Internet of Things Sensor Networks. ACM Transactions on Internet of Things (TIoT).
2019
- Matthew Bradbury, Arshad Jhumka and Carsten Maple. The Impact of Decreasing Transmit Power Levels on FlockLab To Achieve a Sparse Network. Proceedings of CPS-IoTBench.
- Sara Alhajaili and Arshad Jhumka. Towards the Design of Reliable Distributed Systems. Proceedings of 24th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2019).
- Edward Chuah, Arshad Jhumka, Samantha Alt, J. J. Villalobos, Joshua Fryman, William L. Barth, Manish Parashar. Using Resource Use Data and System Logs for HPC System Error Propagation and Recovery Diagnosis. Proceedings 17th IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA)
- Denys Flores and Arshad Jhumka. Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing. Proceedings of TrustCom.
- Chen Gu, Matthew Bradbury and Arshad Jhumka. Phantom Walkabouts: A Customisable Source Location Privacy Aware Routing Protocol for Wireless Sensor Networks. Concurrency and Computation: Practice and Experience (CCPE).
- Edward Chuah, Arshad Jhumka, Samantha Alt, Daniel Balouek-Thomert, James C. Browne and Manish Parashar. Towards Comprehensive Dependability-Driven Resource Use and Message Log-Analysis for HPC Systems Diagnosis. Journal of Parallel and Distributed Computing (JPDC).
- Jasmine Grosso, Arshad Jhumka and Matthew Bradbury. Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation. Proceedings of European Dependable Computing Conference (EDCC).
- Mohammad Maray, Arshad Jhumka, Adam Chester and Mohamed Younis. Scheduling Dependent Tasks in Edge Networks. Proceedings IPCCC (poster).
2018:
- Jack Kirton, Matthew Bradbury and Arshad Jhumka. Towards Optimal Source Location Privacy-Aware TDMA Schedules in Wireless Sensor Networks. Computer Networks.
- Chen Gu, Matthew Bradbury, Jack Kirton and Arshad Jhumka. A Decision Theoretic Framework for Selecting Source Location Privacy Aware Routing Protocols in Wireless Sensor Networks. Future Generation Computer Systems (FGCS), 87:514-526
- Matthew Bradbury, Arshad Jhumka and Matthew Leeke. Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing (JPDC), 115:67-81 (PDFLink opens in a new window).
2017:
- Yiyan Lin, Sandeep Kulkarni and Arshad Jhumka. Automation of Fault-tolerant Graceful Degradation. Distributed Computing (PDF).
- Sain Saginbekov and Arshad Jhumka. Many-to-Many Data Aggregation Scheduling in Wireless Sensor Networks with Two Sinks. Computer Networks 123: 184-199.
- Farrukh Qazi, Arshad Jhumka and Paul Ezhilchelvan. Towards Automated Enforcement of Cloud SLA. The 3rd International Symposium on Real-time Data Processing for Cloud Computing (RTDPCC 2017).
- Denys A. Flores and Arshad Jhumka. Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes. Proceedings of TrustCom 2017. (Selected one of the best papers - invited journal extension)
- Edward Chuah, Arshad Jhumka, Samantha Alt, Theo Damoulas, Nentawe Gurumdimma, Marie-Christine Sawley, Bill Barth, Tommy Minyard and James Browne. Enabling Dependability-Driven Resource Use and Message Log-Analysis for Cluster System Diagnosis. HiPC 2017.
- Matthew Bradbury and Arshad Jhumka. A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. Proceedings of TrustCom 2017.
- Jack Kirton, Matt Bradbury and Arshad Jhumka. Source-Location Privacy-aware Data Aggregation Scheduling for Wireless Sensor Networks. Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
- Matthew Bradbury and Arshad Jhumka. Understanding Source Location Privacy Protocols in Sensor Networks via Perturbation of Time Series. Proceedings International Conference on Computer Communications (INFOCOM), 2017. ("Best-in-Session-Presentation" award) (PDF)
- Nentawe Gurumdimma and Arshad Jhumka. Detection of Recovery Patterns in Cluster System Using Resource Usage Data. Proceedings of Pacific Rim Dependable Computing (PRDC), 2017.
- Arshad Jhumka and Matthew Bradbury. Deconstructing Source Location Privacy-aware Routing Protocols. Proceedings of 32nd ACM SIGAPP Symposium On Applied Computing (SAC), Dependable, Adaptive, and Trustworthy Distributed Systems (DADS) track, 2017.
- Chen Gu, Matthew Bradbury and Arshad Jhumka. Phantom Walkabouts in Wireless Sensor Networks. Proceedings of 32nd ACM SIGAPP Symposium On Applied Computing (SAC), Networking track, 2017.
- Sain Saginbekov, Arshad Jhumka and Yerxan Mademikhanov. A Lower Bound on the Number of Nodes with Multiple Slots in Wireless Sensor Networks with Multiple Sinks, Proceedings SensorNets 2017.
2016:
- Arshad Jhumka and Luca Mottola. Neighborhood View Consistency in Wireless Sensor Networks. ACM Transactions on Sensor Networks TOSN 12(3): 19:1-19:41. (PDFLink opens in a new window)
- Mohannad Alhanahnah, Arshad Jhumka and Sahel Alouneh. A Multi-Dimension Taxonomy of Insider Threats in Cloud Computing. The Computer Journal (doi: 10.1093/comjnl/bxw020).
- Sain Saginbekov and Arshad Jhumka. Towards Energy-Efficient Collision-Free Data Aggregation Scheduling in Wireless Sensor Networks with Multiple Sinks. Proceedings Sensornets - Best Paper award candidate.
- Denys Flores, Arshad Jhumka and Farrukh Qazi. Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information. Proceedings of TrustCom 2016. (PDF)
- Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah and James Browne: CRUDE: Combining Resource Usage Data and Error Logs for Accurate Error Detection in Large-Scale Distributed Systems. Proceedings of 35th Symposium on Reliable Distributed Systems.
- Edward Chuah, Arshad Jhumka, James C. Browne, Nentawe Gurumdimma, Sai Narasimhamurthy, Bill Barth. Using Message Logs and Resource Use Data for Cluster Failure Diagnosis. Proceedings High Performance Computing, Data, and Analytics (HiPC'16).
2015:
- Jhumka, A. and Bradbury, M. and Leeke, M. (2014) Fake Source-based Source Location Privacy in Wireless Sensor Networks, Concurrency and Computation: Practice and Experience. ISSN 1532-0634.
- Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah and James C. Browne. Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems using Console and Resource Usage Logs. International Symposium on Parallel and Distributed Processing and Applications - ISPA 2015.
- Matthew Bradbury, Arshad Jhumka and Matthew Leeke. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. IEEE TrustCom 2015.
- Chen Gu, Arshad Jhumka, Matthew Bradbury and Matthew Leeke. Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. IEEE Pacific Rim Dependable Computing (PRDC) 2015
- F. Adamu-Fika and A. Jhumka. An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution. In: The 15th International Conference on Algorithms and Architecture for Parallel Processing (ICA3PP 2015), Zhangjiajie, China, 18-20th November 2015.
- Fatimah Adamu-Fika, Arshad Jhumka. An Investigation of the Impact of Double Single Bit-Flips Errors on Program Execution. DEPEND 2015.
- Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah and James C. Browne. On Handling Redundancy for Failure Log Analysis of Cluster Systems, DEPEND 2015.
- Edward Chuah, Arshad Jhumka, James C Browne, Bill Barth and Sai Narasimhamurty. Insights into the Diagnosis of System Failures from Cluster Message Logs. EDCC 2015.
- Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, James C. Browne. Towards Detecting Patterns in Failure Logs of Large-Scale Distributed Systems, DPDNS/IPDPS 2015.
2014:
- Sain Saginbekov and Arshad Jhumka. Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks, The Computer Journal, 57(12): 1790-1816 (2014)
- Sain Saginbekov and Arshad Jhumka. Efficient Code Dissemination in Wireless Sensor Networks, Future Generation Computer Systems (FGCS), 39: 111-119 (2014).
- Arshad Jhumka, Matthew Bradbury and Sain Saginbekov. Efficient Fault-Tolerant Collision- Free Data Aggregation Scheduling for Wireless Sensor Networks, Journal of Parallel and Distributed Computing, Volume 74, Issue 1, pp. 1789-1801, 2014
2013:
- Matthew Leeke, Arshad Jhumka and S. S. Anand. Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. The Computer Journal, 56(6): 674-692, 2013.
- Henry Franks, Nathan Griffiths and Arshad Jhumka. Manipulating Convention Emergence using Influencer Agents, Journal of Autonomous Agents and Multi-Agent Systems, 26(3): 4 315-353, 2013.
- Alisdair Thomason, Matthew Leeke, Matthew Bradbury and Arshad Jhumka. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. Proceedings of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13), 16-18 July 2013, Melbourne, Australia.
- Edward Chuah, Arshad Jhumka, Sai Narasimhamurthy, John Hammond, James Browne and Bill Barth. Linking Resource Usage Anomalies with System Failures from Cluster Log Data, Proceedings of IEEE Symposium on Reliable Distributed Systems (SRDS), 2013.
2012:
- S. Saginbekov, A. Jhumka, Stabilizing Information Dissemination in Wireless Sensor Networks, Proceedings of Parallel and Distributed Processing Techniques and Applications (PDPTA), 2012
- S. Saginbekov, A. Jhumka, Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks, Proceedings of 11th
IEEE International Conference on Ubiquitous Computing and Communications, 2012. - A. Jhumka, M. Bradbury, M. Leeke, Towards Understanding Source Location Privacy in Wireless Sensor Networks Through Fake Sources, Proceedings of 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.
- M. Leeke, S. S. Anand, A. Jhumka, Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors, The Computer Journal.
- H. Franks, N. Griffiths and A. Jhumka, Manipulating Convention Emergence using Influencer Agents, Journal of Autonomous Agents and Multi-Agent Systems, 2012
- Oumair Naseer, Arshad jhumka, Atif Ali Khan, Dependability driven feedback control scheduling for real time embedded systems, The 2012 International Conference on Embedded Systems and Applications (ESA'12). 2012.
2011:
- M. Leeke, S. Arif, A. Jhumka, S.S. Anand, A Methodology for the Generation of Efficient Error Detection Mechanisms, Proceedings of IEEE International Conference on Dependable Systems and Networks, 2011.
- A. Jhumka, M. Leeke, Early Identification of Locations for Dependability Components in Dependable Software, IEEE Proceedings of International Symposium on Software Reliablity Engineering (ISSRE), Hiroshima, Japan
- M. Leeke, A. Jhumka, An Automated Wrapper-Based Approach to the Design of Dependable Software, Proceedings of International Conference on Dependability (DEPEND), 2011.
- A. Chester, M. Leeke, M. AL-Ghamdi, A. Jhumka, S. Jarvis, A Framework for Data Center Scale Dynamic Resource Allocation Algorithms, Proceedings of IEEE International Conference on Scalable Computing and Communications (SCALCOM), 2011.
- A. Jhumka, M. Leeke, S. Shrestha, On the Use of Fake Sources for Source Location Privacy:Trade-Offs Between Energy and Privacy, The Computer Journal (doi: 10.1093/comjnl/bxr010).
- S.S. Anand, A. Jhumka, K. Wade, Towards the Ordering of Events from Multiple Textual Evidence Sources, International Journal of Digital Crime and Forensics, vol. 3, no. 2, p. 16-34, 2011
- Chester, A.P. and Leeke, M. and Al-Ghamdi, M. and Jarvis, S.A. and Jhumka, A. (2011) A Modular Failure-Aware Resource Allocation Architecture for Cloud Computing. In: Proceedings of the UK Performance Engineering Workshop (UKPEW'11), 7-8th July, 2011, Bradford, United Kingdom
2010:
- M. Leeke, A. Jhumka, Towards Understanding the Importance of Variables in Dependable Software, In Proceedings of the 8th European Dependable Computing Conference (EDCC10), April 28th, 2010, Valencia, Spain
- Chris Levett, Arshad Jhumka, Sarabjot Singh Anand, Towards Event Ordering in Digital Forensics, In Proceedings of 12th ACM Workshop on Multimedia and Security (MMS), Rome, Italy.
- Sambid Shrestha, Matt Leeke, Arshad Jhumka, On the Tradeoffs Between Privacy and Energy in Wireless Sensor Networks. In Proceedings of UKPEW 2010.
- Neeraj Suri, Arshad Jhumka, Martin Hiller, Andras Pataricza, Shariful Islam, Constantin Sarbu, A Software Integration Approach for Designing and Assessing Dependable Embedded Systems, Journal of Systems and Software, 83(10), pp.1780--1800, 2010
- Arshad Jhumka, Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks, In Proceedings of 29th International Symposium on Reliable Distributed Systems (SRDS), Delhi, India, 2010.
- H. Franks, N. Griffiths and A. Jhumka, Image Scoring in Ad-Hoc Networks: An Investigation on Realistic Settings, in Pre-proceedings of the 8th European Workshop on Multi-Agent Systems (EUMAS 2010), 2010.
2009:
- A. Jhumka, M. Leeke, Issues on the Design of Efficient Fail-safe Fault Tolerance, In Proceedings IEEE 20th International Symposium on Software Reliability Engineering (ISSRE09), November 18th, 2009, Bengaluru-Mysuru, India
- M. Leeke, A. Jhumka, Evaluating the Use of Reference Run Models in Fault Injection Analysis, In Proceedings of the 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC09), November 16th, 2009, Shanghai, China
- A. Jhumka, L. Mottola, On Consistent Neighborhood Views in Wireless Sensor Networks, In Proceedings of the 28th International Symposium on Reliable Distributed Systems (SRDS09), 2009 (BEST PAPER AWARD candidate)
- M. Leeke and A. Jhumka, 'Beyond The Golden Run: Evaluating the Use of Reference Run Models in Fault Injection Analysis', UK Performance Engineering Workshop 2009 (UKPEW09), July, 2006, Leeds, UK
2008:
- M. Arumugam, A. Jhumka, F. Abujarad, S.S. Kulkarni, `Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks', Book chapter, Handbook of Wireless Mesh Networks, Springer, 2008
- N. Griffiths, A. Jhumka, A. Dawson and R. Myers, `Simple Trust model for On-Demand Routing in Mobile Ad-hoc Networks', In Proceedings of the 2nd International Symposium on Intelligent Distributed Computing (IDC 2008), 2008
- A. Jhumka, N. Griffiths, A. Dawson and R. Myers, `An Outlook on Trusted Routing in Mobile Adhoc Networks', Networking and Electronic Commerce Research Conference (NAEC 2008), 2008
- A. Jhumka, Dependability in Service-Oriented Computing. Book Chapter, in Agent-Based Service-Oriented Computing (L. Jain, X. Wu, N. Griffiths, and K.-M. Chao, eds.), Advanced Information and Knowledge Processing, pp. 141–160, Springer London, 2010.
- M. Arumugam, A. Jhumka, F. Abujarad, S.S. Kulkarni, `Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks', Book chapter, Handbook of Wireless Mesh Networks, Springer, 2008
2007:
- FC Freiling, A Jhumka, `Global Predicate Detection in Distributed Systems with Small Faults', In Proceedings of the 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems, 296-310, 2007
- A Jhumka, SS Kulkarni, `On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks', In Proceedings of the International Conference on Distributed Computing and Internet Technology, 42-53, 2007
2006:
- A Jhumka, FC Freiling, C Fetzer, N Suri, `An approach to synthesise safe systems', International Journal of Security and Networks, 1(1/2), 62-74, 2006
2005:
- A. Jhumka, M. Hiller, `Putting detectors in their place', In Proceedings of the IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 33–43, 2005
- A. Jhumka, N. Suri, `Designing efficient fail-safe multitolerant systems', In Proceeding of 25th IFIP WG6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2005), 428–442, 2005
- A. Jhumka, S. Klaus, S.A. Huss, `A dependability-driven system-level design approach for embedded systems', In Proceedings of Design, Automation and Test in Europe (DATE 2005), 372–377, 2005
- M. Hiller, A. Jhumka, N. Suri, `Tracking the Propagation of Errors in Software', Book Chapter, Dependable Computing Systems: Paradigms, Performance Issues and Applications, Hassan B. Diab and Albert Y. Zomaya (Eds)
2004:
- F.C. Gärtner, A. Jhumka, `Automating the addition of fail-safe fault-tolerance: Beyond fusion-closed specifications', In Proceedings of the 2004 International Conference on Formal Techniques in Real-Time and Fault Tolerant Systems, 183–198, 2004
- M. Hiller, A. Jhumka, N. Suri, `EPIC: Profiling the propagation and effect of data errors in software', IEEE Transactions on Computers, 53(5), 512–530, 2004
- A. Jhumka, M. Hiller, N. Suri, `An approach for designing and assessing detectors for dependable component-based systems', In Proceedings of the 7th IEEE International Symposium on High Assurance Systems Engineering, 69–78, 2004
- A. Johansson, A. Sarbu, A. Jhumka, N. Suri, `On enhancing the robustness of commercial operating systems', In Proceedings of the International Service Availability Symposium 2004 (ISAS 2004), 148–159, 2004
2003:
- A. Jhumka, N. Suri, M. Hiller, `A framework for the design and validation of efficient fail-safe fault-tolerant programs', In Proceedings of the 6th International Workshop on Software and Compilers for Embedded Systems, 182–197, 2003
2002:
- M. Hiller, A. Jhumka, N. Suri, `On the placement of software mechanisms for detection of data errors', In Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 135–144, 2002
- M. Hiller, A. Jhumka, N. Suri, `PROPANE: an environment for examining the propagation of errors in software', In Proceedings of the 2002 International Symposium on Software Testing and Analysis (ISSTA 2002), 81–85, 2002
- A. Jhumka, M. Hiller, V. Claesson, N. Suri, `On systematic design of globally consistent executable assertions in embedded software', In Proceedings of the 5th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2002), 75–84, 2002
- A. Jhumka, M. Hiller, N. Suri, `An approach to specify and test component-based dependable software', In Proceedings of the 5th IEEE International Symposium on High Assurance Systems Engineering (HASE 2002), 211–220, 2002 (BEST PAPER AWARD)
- A. Jhumka, M. Hiller, N. Suri, `Component-based synthesis of dependable embedded software', In Proceedings of the 2002 International Conference on Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT 2002), 111–128, 2002
2001:
- M. Hiller, A. Jhumka, N. Suri, `An approach for analysing the propagation of data errors in software', In Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001), 161–172, 2001 (BEST PAPER AWARD)
- A. Jhumka, M. Hiller, N. Suri, `Assessing inter-modular error propagation in distributed software', In Proceedings of the 20th International Symposium on Reliable Distributed Systems (ISRDS 2001), 152–161, 2001