Skip to main content Skip to navigation

Arshad Jhumka - Publications

Search By Year: 2011 | 2010 | 2009 | 2008| 2007 | 2006 | 2005 | 2004 | 2003 | 2002 | 2001

2019

  • Matthew Bradbury, Arshad Jhumka and Carsten Maple. The Impact of Decreasing Transmit Power Levels on FlockLab To Achieve a Sparse Network. Proceedings of CPS-IoTBench.
  • Denys Flores and Arshad Jhumka. Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing. Proceedings of TrustCom (To Appear)
  • Chen Gu, Matthew Bradbury and Arshad Jhumka. Phantom Walkabouts: A Customisable Source Location Privacy Aware Routing Protocol for Wireless Sensor Networks. Concurrency and Computation: Practice and Experience (CCPE) - To Appear.
  • Edward Chuah, Arshad Jhumka, Samantha Alt, Daniel Balouek-Thomert, James C. Browne and Manish Parashar. Towards Comprehensive Dependability-Driven Resource Use and Message Log-Analysis for HPC Systems Diagnosis. Journal of Parallel and Distributed Computing (JPDC) - To Appear.
  • Jasmine Grosso, Arshad Jhumka and Matthew Bradbury. Reliable Many-to-Many Routing in Wireless Sensor Networks Using Ant Colony Optimisation. Proceedings of European Dependable Computing Conference (EDCC). To Appear.

2018:

  • Jack Kirton, Matthew Bradbury and Arshad Jhumka. Towards Optimal Source Location Privacy-Aware TDMA Schedules in Wireless Sensor Networks. Computer Networks.
  • Chen Gu, Matthew Bradbury, Jack Kirton and Arshad Jhumka. A Decision Theoretic Framework for Selecting Source Location Privacy Aware Routing Protocols in Wireless Sensor Networks. Future Generation Computer Systems (FGCS), 87:514-526
  • Matthew Bradbury, Arshad Jhumka and Matthew Leeke. Hybrid Online Protocols for Source Location Privacy in Wireless Sensor Networks. Journal of Parallel and Distributed Computing (JPDC), 115:67-81.

2017:

  • Yiyan Lin, Sandeep Kulkarni and Arshad Jhumka. Automation of Fault-tolerant Graceful Degradation. Distributed Computing.
  • Sain Saginbekov and Arshad Jhumka. Many-to-Many Data Aggregation Scheduling in Wireless Sensor Networks with Two Sinks. Computer Networks 123: 184-199.
  • Farrukh Qazi, Arshad Jhumka and Paul Ezhilchelvan. Towards Automated Enforcement of Cloud SLA. The 3rd International Symposium on Real-time Data Processing for Cloud Computing (RTDPCC 2017).
  • Denys A. Flores and Arshad Jhumka. Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes. Proceedings of TrustCom 2017. (Selected one of the best papers - invited journal extension)
  • Edward Chuah, Arshad Jhumka, Samantha Alt, Theo Damoulas, Nentawe Gurumdimma, Marie-Christine Sawley, Bill Barth, Tommy Minyard and James Browne. Enabling Dependability-Driven Resource Use and Message Log-Analysis for Cluster System Diagnosis. HiPC 2017.
  • Matthew Bradbury and Arshad Jhumka. A Near-Optimal Source Location Privacy Scheme for Wireless Sensor Networks. Proceedings of TrustCom 2017.
  • Jack Kirton, Matt Bradbury and Arshad Jhumka. Source-Location Privacy-aware Data Aggregation Scheduling for Wireless Sensor Networks. Proceedings of IEEE International Conference on Distributed Computing Systems (ICDCS), 2017.
  • Matthew Bradbury and Arshad Jhumka. Understanding Source Location Privacy Protocols in Sensor Networks via Perturbation of Time Series. Proceedings International Conference on Computer Communications (INFOCOM), 2017. ("Best-in-Session-Presentation" award) (PDF)
  • Nentawe Gurumdimma and Arshad Jhumka. Detection of Recovery Patterns in Cluster System Using Resource Usage Data. Proceedings of Pacific Rim Dependable Computing (PRDC), 2017.
  • Arshad Jhumka and Matthew Bradbury. Deconstructing Source Location Privacy-aware Routing Protocols. Proceedings of 32nd ACM SIGAPP Symposium On Applied Computing (SAC), Dependable, Adaptive, and Trustworthy Distributed Systems (DADS) track, 2017.
  • Chen Gu, Matthew Bradbury and Arshad Jhumka. Phantom Walkabouts in Wireless Sensor Networks. Proceedings of 32nd ACM SIGAPP Symposium On Applied Computing (SAC), Networking track, 2017.
  • Sain Saginbekov, Arshad Jhumka and Yerxan Mademikhanov. A Lower Bound on the Number of Nodes with Multiple Slots in Wireless Sensor Networks with Multiple Sinks, Proceedings SensorNets 2017.

2016:

  • Arshad Jhumka and Luca Mottola. Neighborhood View Consistency in Wireless Sensor Networks. ACM Transactions on Sensor Networks TOSN 12(3): 19:1-19:41.
  • Mohannad Alhanahnah, Arshad Jhumka and Sahel Alouneh. A Multi-Dimension Taxonomy of Insider Threats in Cloud Computing. The Computer Journal (doi: 10.1093/comjnl/bxw020).
  • Sain Saginbekov and Arshad Jhumka. Towards Energy-Efficient Collision-Free Data Aggregation Scheduling in Wireless Sensor Networks with Multiple Sinks. Proceedings Sensornets - Best Paper candidate.
  • Denys Flores, Arshad Jhumka and Farrukh Qazi. Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information. Proceedings of TrustCom 2016. (PDF)
  • Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah and James Browne: CRUDE: Combining Resource Usage Data and Error Logs for Accurate Error Detection in Large-Scale Distributed Systems. Proceedings of 35th Symposium on Reliable Distributed Systems.
  • Edward Chuah, Arshad Jhumka, James C. Browne, Nentawe Gurumdimma, Sai Narasimhamurthy, Bill Barth. Using Message Logs and Resource Use Data for Cluster Failure Diagnosis. Proceedings High Performance Computing, Data, and Analytics (HiPC'16).

2015:

  • Jhumka, A. and Bradbury, M. and Leeke, M. (2014) Fake Source-based Source Location Privacy in Wireless Sensor Networks, Concurrency and Computation: Practice and Experience. ISSN 1532-0634.
  • Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah and James C. Browne. Towards Increasing the Error Handling Time Window in Large-Scale Distributed Systems using Console and Resource Usage Logs. International Symposium on Parallel and Distributed Processing and Applications - ISPA 2015.
  • Matthew Bradbury, Arshad Jhumka and Matthew Leeke. A Dynamic Fake Source Algorithm for Source Location Privacy in Wireless Sensor Networks. IEEE TrustCom 2015.
  • Chen Gu, Arshad Jhumka, Matthew Bradbury and Matthew Leeke. Assessing the Performance of Phantom Routing on Source Location Privacy in Wireless Sensor Networks. IEEE Pacific Rim Dependable Computing (PRDC) 2015
  • F. Adamu-Fika and A. Jhumka. An Investigation of the Impact of Double Bit-Flip Error Variants on Program Execution. In: The 15th International Conference on Algorithms and Architecture for Parallel Processing (ICA3PP 2015), Zhangjiajie, China, 18-20th November 2015.
  • Fatimah Adamu-Fika, Arshad Jhumka. An Investigation of the Impact of Double Single Bit-Flips Errors on Program Execution. DEPEND 2015.
  • Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah and James C. Browne. On Handling Redundancy for Failure Log Analysis of Cluster Systems, DEPEND 2015.
  • Edward Chuah, Arshad Jhumka, James C Browne, Bill Barth and Sai Narasimhamurty. Insights into the Diagnosis of System Failures from Cluster Message Logs. EDCC 2015.
  • Nentawe Gurumdimma, Arshad Jhumka, Maria Liakata, Edward Chuah, James C. Browne. Towards Detecting Patterns in Failure Logs of Large-Scale Distributed Systems, DPDNS/IPDPS 2015.

2014:

  • Sain Saginbekov and Arshad Jhumka. Towards Efficient Stabilizing Code Dissemination in Wireless Sensor Networks, The Computer Journal, 57(12): 1790-1816 (2014)
  • Sain Saginbekov and Arshad Jhumka. Efficient Code Dissemination in Wireless Sensor Networks, Future Generation Computer Systems (FGCS), 39: 111-119 (2014).
  • Arshad Jhumka, Matthew Bradbury and Sain Saginbekov. Efficient Fault-Tolerant Collision- Free Data Aggregation Scheduling for Wireless Sensor Networks, Journal of Parallel and Distributed Computing, Volume 74, Issue 1, pp. 1789-1801, 2014

2013:

  • Matthew Leeke, Arshad Jhumka and S. S. Anand. Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors. The Computer Journal, 56(6): 674-692, 2013.
  • Henry Franks, Nathan Griffiths and Arshad Jhumka. Manipulating Convention Emergence using Influencer Agents, Journal of Autonomous Agents and Multi-Agent Systems, 26(3): 4 315-353, 2013.
  • Alisdair Thomason, Matthew Leeke, Matthew Bradbury and Arshad Jhumka. Evaluating the Impact of Broadcast Rates and Collisions on Fake Source Protocols for Source Location Privacy. Proceedings of 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’13), 16-18 July 2013, Melbourne, Australia.
  • Edward Chuah, Arshad Jhumka, Sai Narasimhamurthy, John Hammond, James Browne and Bill Barth. Linking Resource Usage Anomalies with System Failures from Cluster Log Data, Proceedings of IEEE Symposium on Reliable Distributed Systems (SRDS), 2013.

2012:

  • S. Saginbekov, A. Jhumka, Stabilizing Information Dissemination in Wireless Sensor Networks, Proceedings of Parallel and Distributed Processing Techniques and Applications (PDPTA), 2012
  • S. Saginbekov, A. Jhumka, Fast and Efficient Information Dissemination in Event-Based Wireless Sensor Networks, Proceedings of 11th
    IEEE International Conference on Ubiquitous Computing and Communications, 2012.
  • A. Jhumka, M. Bradbury, M. Leeke, Towards Understanding Source Location Privacy in Wireless Sensor Networks Through Fake Sources, Proceedings of 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012), 2012.
  • M. Leeke, S. S. Anand, A. Jhumka, Towards the Design of Efficient Error Detection Mechanisms for Transient Data Errors, The Computer Journal.
  • H. Franks, N. Griffiths and A. Jhumka, Manipulating Convention Emergence using Influencer Agents, Journal of Autonomous Agents and Multi-Agent Systems, 2012
  • Oumair Naseer, Arshad jhumka, Atif Ali Khan, Dependability driven feedback control scheduling for real time embedded systems, The 2012 International Conference on Embedded Systems and Applications (ESA'12). 2012.

2011:

  • M. Leeke, S. Arif, A. Jhumka, S.S. Anand, A Methodology for the Generation of Efficient Error Detection Mechanisms, Proceedings of IEEE International Conference on Dependable Systems and Networks, 2011.
  • A. Jhumka, M. Leeke, Early Identification of Locations for Dependability Components in Dependable Software, IEEE Proceedings of International Symposium on Software Reliablity Engineering (ISSRE), Hiroshima, Japan
  • M. Leeke, A. Jhumka, An Automated Wrapper-Based Approach to the Design of Dependable Software, Proceedings of International Conference on Dependability (DEPEND), 2011.
  • A. Chester, M. Leeke, M. AL-Ghamdi, A. Jhumka, S. Jarvis, A Framework for Data Center Scale Dynamic Resource Allocation Algorithms, Proceedings of IEEE International Conference on Scalable Computing and Communications (SCALCOM), 2011.
  • A. Jhumka, M. Leeke, S. Shrestha, On the Use of Fake Sources for Source Location Privacy:Trade-Offs Between Energy and Privacy, The Computer Journal (doi: 10.1093/comjnl/bxr010).
  • S.S. Anand, A. Jhumka, K. Wade, Towards the Ordering of Events from Multiple Textual Evidence Sources, International Journal of Digital Crime and Forensics, vol. 3, no. 2, p. 16-34, 2011
  • Chester, A.P. and Leeke, M. and Al-Ghamdi, M. and Jarvis, S.A. and Jhumka, A. (2011) A Modular Failure-Aware Resource Allocation Architecture for Cloud Computing. In: Proceedings of the UK Performance Engineering Workshop (UKPEW'11), 7-8th July, 2011, Bradford, United Kingdom

2010:

  • M. Leeke, A. Jhumka, Towards Understanding the Importance of Variables in Dependable Software, In Proceedings of the 8th European Dependable Computing Conference (EDCC10), April 28th, 2010, Valencia, Spain
  • Chris Levett, Arshad Jhumka, Sarabjot Singh Anand, Towards Event Ordering in Digital Forensics, In Proceedings of 12th ACM Workshop on Multimedia and Security (MMS), Rome, Italy.
  • Sambid Shrestha, Matt Leeke, Arshad Jhumka, On the Tradeoffs Between Privacy and Energy in Wireless Sensor Networks. In Proceedings of UKPEW 2010.
  • Neeraj Suri, Arshad Jhumka, Martin Hiller, Andras Pataricza, Shariful Islam, Constantin Sarbu, A Software Integration Approach for Designing and Assessing Dependable Embedded Systems, Journal of Systems and Software, 83(10), pp.1780--1800, 2010
  • Arshad Jhumka, Crash-Tolerant Collision-Free Data Aggregation Scheduling for Wireless Sensor Networks, In Proceedings of 29th International Symposium on Reliable Distributed Systems (SRDS), Delhi, India, 2010.
  • H. Franks, N. Griffiths and A. Jhumka, Image Scoring in Ad-Hoc Networks: An Investigation on Realistic Settings, in Pre-proceedings of the 8th European Workshop on Multi-Agent Systems (EUMAS 2010), 2010.

2009:

  • A. Jhumka, M. Leeke, Issues on the Design of Efficient Fail-safe Fault Tolerance, In Proceedings IEEE 20th International Symposium on Software Reliability Engineering (ISSRE09), November 18th, 2009, Bengaluru-Mysuru, India
  • M. Leeke, A. Jhumka, Evaluating the Use of Reference Run Models in Fault Injection Analysis, In Proceedings of the 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC09), November 16th, 2009, Shanghai, China
  • A. Jhumka, L. Mottola, On Consistent Neighborhood Views in Wireless Sensor Networks, In Proceedings of the 28th International Symposium on Reliable Distributed Systems (SRDS09), 2009
  • M. Leeke and A. Jhumka, 'Beyond The Golden Run: Evaluating the Use of Reference Run Models in Fault Injection Analysis', UK Performance Engineering Workshop 2009 (UKPEW09), July, 2006, Leeds, UK

2008:

  • M. Arumugam, A. Jhumka, F. Abujarad, S.S. Kulkarni, `Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks', Book chapter, Handbook of Wireless Mesh Networks, Springer, 2008
  • N. Griffiths, A. Jhumka, A. Dawson and R. Myers, `Simple Trust model for On-Demand Routing in Mobile Ad-hoc Networks', In Proceedings of the 2nd International Symposium on Intelligent Distributed Computing (IDC 2008), 2008
  • A. Jhumka, N. Griffiths, A. Dawson and R. Myers, `An Outlook on Trusted Routing in Mobile Adhoc Networks', Networking and Electronic Commerce Research Conference (NAEC 2008), 2008
  • A. Jhumka, Dependability in Service-Oriented Computing. Book Chapter, in Agent-Based Service-Oriented Computing (L. Jain, X. Wu, N. Griffiths, and K.-M. Chao, eds.), Advanced Information and Knowledge Processing, pp. 141–160, Springer London, 2010.
  • M. Arumugam, A. Jhumka, F. Abujarad, S.S. Kulkarni, `Stabilizing Interference-Free Slot Assignment for Wireless Mesh Networks', Book chapter, Handbook of Wireless Mesh Networks, Springer, 2008

2007:

  • FC Freiling, A Jhumka, `Global Predicate Detection in Distributed Systems with Small Faults', In Proceedings of the 9th International Symposium on Stabilisation, Safety and Security of Distributed Systems, 296-310, 2007
  • A Jhumka, SS Kulkarni, `On the Design of Mobility-Tolerant TDMA-Based Media Access Control (MAC) Protocol for Mobile Sensor Networks', In Proceedings of the International Conference on Distributed Computing and Internet Technology, 42-53, 2007

2006:

  • A Jhumka, FC Freiling, C Fetzer, N Suri, `An approach to synthesise safe systems', International Journal of Security and Networks, 1(1/2), 62-74, 2006

2005:

  • A. Jhumka, M. Hiller, `Putting detectors in their place', In Proceedings of the IEEE International Conference on Software Engineering and Formal Methods (SEFM 2005), 33–43, 2005
  • A. Jhumka, N. Suri, `Designing efficient fail-safe multitolerant systems', In Proceeding of 25th IFIP WG6.1 International Conference on Formal Techniques for Networked and Distributed Systems (FORTE 2005), 428–442, 2005
  • A. Jhumka, S. Klaus, S.A. Huss, `A dependability-driven system-level design approach for embedded systems', In Proceedings of Design, Automation and Test in Europe (DATE 2005), 372–377, 2005
  • M. Hiller, A. Jhumka, N. Suri, `Tracking the Propagation of Errors in Software', Book Chapter, Dependable Computing Systems: Paradigms, Performance Issues and Applications, Hassan B. Diab and Albert Y. Zomaya (Eds)

2004:

  • F.C. Gärtner, A. Jhumka, `Automating the addition of fail-safe fault-tolerance: Beyond fusion-closed specifications', In Proceedings of the 2004 International Conference on Formal Techniques in Real-Time and Fault Tolerant Systems, 183–198, 2004
  • M. Hiller, A. Jhumka, N. Suri, `EPIC: Profiling the propagation and effect of data errors in software', IEEE Transactions on Computers, 53(5), 512–530, 2004
  • A. Jhumka, M. Hiller, N. Suri, `An approach for designing and assessing detectors for dependable component-based systems', In Proceedings of the 7th IEEE International Symposium on High Assurance Systems Engineering, 69–78, 2004
  • A. Johansson, A. Sarbu, A. Jhumka, N. Suri, `On enhancing the robustness of commercial operating systems', In Proceedings of the International Service Availability Symposium 2004 (ISAS 2004), 148–159, 2004

2003:

  • A. Jhumka, N. Suri, M. Hiller, `A framework for the design and validation of efficient fail-safe fault-tolerant programs', In Proceedings of the 6th International Workshop on Software and Compilers for Embedded Systems, 182–197, 2003

2002:

  • M. Hiller, A. Jhumka, N. Suri, `On the placement of software mechanisms for detection of data errors', In Proceedings of the 2002 International Conference on Dependable Systems and Networks (DSN 2002), 135–144, 2002
  • M. Hiller, A. Jhumka, N. Suri, `PROPANE: an environment for examining the propagation of errors in software', In Proceedings of the 2002 International Symposium on Software Testing and Analysis (ISSTA 2002), 81–85, 2002
  • A. Jhumka, M. Hiller, V. Claesson, N. Suri, `On systematic design of globally consistent executable assertions in embedded software', In Proceedings of the 5th International Workshop on Software and Compilers for Embedded Systems (SCOPES 2002), 75–84, 2002
  • A. Jhumka, M. Hiller, N. Suri, `An approach to specify and test component-based dependable software', In Proceedings of the 5th IEEE International Symposium on High Assurance Systems Engineering (HASE 2002), 211–220, 2002
  • A. Jhumka, M. Hiller, N. Suri, `Component-based synthesis of dependable embedded software', In Proceedings of the 2002 International Conference on Formal Techniques in Real-Time and Fault Tolerant Systems (FTRTFT 2002), 111–128, 2002

2001:

  • M. Hiller, A. Jhumka, N. Suri, `An approach for analysing the propagation of data errors in software', In Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001), 161–172, 2001
  • A. Jhumka, M. Hiller, N. Suri, `Assessing inter-modular error propagation in distributed software', In Proceedings of the 20th International Symposium on Reliable Distributed Systems (ISRDS 2001), 152–161, 2001